The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper shows the secrecy performance of a network in which secure two-way communication is possible via two half duplex decode and forward (DF) relays with an eavesdropper (EAV) trying to decode the message. In the absence of direct link from source one (S1) to source two (S2), two-way communication is established in two time phases with the help of two half duplex DF relays, first one is in broadcast...
Tactical military communication networks operate in highly complex environments. The survivability and the range of these networks, especially the mobile wireless segments, are and will be a challenge for the present and future defence forces. OPAL, an autonomous system, has been previously presented where it extended the range and improved the survivability of tactical military networks using unmanned...
Spectrum sharing environment permits secondary users (SUs) to utilize radio spectrum of primary users (PUs) but creates cross-interference between SUs and PUs. Moreover, jamming signal is useful in improving information security by deliberately corrupting received signals at eavesdroppers. The current paper presents an analytical framework on communication reliability and information security, which...
One of the challenges in designing dual communication and radar systems employing multi-carrier waveforms is addressing the separate radar and communication objectives. This challenge becomes more difficult when one considers that such a system would be the target of malicious attacks, especially those involving interference. In this paper, to gain insight into the problem, a game-theoretical model...
Security threats such as jamming and route manipulation can have significant consequences on the performance of modern wireless networks. To increase the efficacy and stealthiness of such threats, a number of extremely challenging, next-generation cross-layer attacks have been recently unveiled. Although existing research has thoroughly addressed many single-layer attacks, the problem of detecting...
Interference alignment (IA) is a prospective method to manage interference between users in multi-user networks. On the other hand, jamming can be an effective way to combat adversarial eavesdropping for legitimate networks. In this paper, a beneficial jamming scheme is proposed for interference alignment networks. In the scheme, the jammer utilizes its precoding vector to constrain the jamming signal...
This paper describes an approach to address the challenges currently found in the management, provisioning, and troubleshooting of deployed SATCOM Terminals. We believe the proposed solution will address a major capabilities gap in the DOD's ability to maintain reliable and resilient network communications flows required for mission success in a dynamic net-centric battlefield. The proposed solution...
The interference attack or better known as jamming attacks are very easy to implement affecting the service of any wireless communication system given the vulnerability of data sent to the user. This attack by denying the normal operation of the service detracts from the purpose of these systems. In general, a jamming attack is difficult to detect given the little experimental data provided by the...
In order to counteract hostile communication based on the advanced Orthogonal Frequency Division Multiplexing (OFDM) technology, an efficient and unrecognizable jamming technique by failing the OFDM cyclic prefix (CP) functionality is developed in the paper. CP is introduced into OFDM systems to prevent interference caused by the multipath fading, as long as it is no shorter than the channel delay...
This paper provides a methodology to study the PHY layer vulnerability of wireless protocols in hostile radio environments. Our approach is based on testing the vulnerabilities of a system by analyzing the individual subsystems. By targeting an individual subsystem or a combination of subsystems at a time, we can infer the weakest part and revise it to improve the overall system performance. We apply...
Dynamic Spectrum Access (DSA) has been proposed to increase the spectrum utilization efficiency and to solve the spectrum scarcity problem. However, due to the spectrum sharing and opportunistic access nature of the DSA networks, they are more vulnerable to security threats like jammers. In this paper, we propose an anti-jamming technique in which the secondary network coordinator groups the secondary...
Cognitive radio network (CRN) is regarded as an emerging technology for better spectrum efficiency where unlicensed secondary users (SUs) sense RF spectrum to find idle channels and access them opportunistically without causing any harmful interference to licensed primary users (PUs). However, RF spectrum sensing and sharing along with reconfigurable capabilities of SUs bring severe security vulnerabilities...
In this paper, the design and simulation of the high voltage switchgear are discussed, the current situation and existing problems of high voltage switchgear are expounded, developed a design that can solve the problem, fully meet the portable requirements of the measurement system, the installation method of ground wave sensor based on ultrasonic / ground wave cable partial discharge detection system...
Electronic systems can cause electromagnetic interference that disrupt radio and wireless systems. This is typically unintentional interference and it has been known for about a century now. Nowadays, dedicated jamming equipment is sold openly and at low cost via Internet. This implies that intentional interference can become more common. In this paper results from a measurement campaign of the interference...
FH (frequency hopping) technique is widely used in underwater acoustic communication due to its good performance on anti-interference and anti-fading. In addition, communication might encounter intentionally destruction such as jamming. So it is necessary to make an effect evaluation on FH communication under jamming. Firstly, FH communication system with three typical jamming styles including partial...
The Orthogonal Frequency Division Multiplexing (OFDM) is widely used in the wireless communication systems. The robustness in a wireless environment combined with the ease to perform the channel estimation (CE) are the reasons for the OFDM popularity. Commonly, the channel estimation(CE) is performed in frequency domain using pilot tones. It is known that the wireless communications may be affected...
Using ITU-R P.1546 model for propagation loss prediction of airborne ultrashort wave communication. On this basis, we give the calculation formula of signal to interference ratio of the ultrashort wave communication receiver when the enemy using Gaussian white noise for repressive interference. We also give the calculation method of the bit error rate of the digital communication system when it's...
Target detection in the presence of mainlobe jamming (MLJ) is a challenging task for radar signal processing. Spatial filtering techniques for MLJ cancellation on uniform linear array (ULA) have been proposed recently. However, the performance of these techniques degrades greatly when MLJ is located close to target. To solve this problem, we propose a sparse detection method on uniform distributed...
To guarantee secure communication of the primary system and efficiently utilize the licensed spectrum, in this paper, we propose a two-path successive relaying and jamming based cooperative transmission (TSRJC) scheme. In TSRJC scheme, two secondary users (SU) successively relay the primary message and jam the primary eavesdropper to confirm secure and reliable transmission of the primary system during...
In this paper, we investigate the secrecy performance of an underlay cognitive decode-and- forward relay network (CDRN) by exploiting an active direct link in the presence of primary user's (PU's) interference. Herein, a secondary user (SU) transmitter strives to maintain a secure communication link with a legitimate SU receiver in presence of a passive eavesdropper. On account of system's viability,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.