The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Civil aviation is continuing to grow, and along with growth in numbers of flights and passengers comes growth in communications. In particular airport surface environments are one of the areas in which rapid development of communication systems is taking place. Several years ago the Federal Aviation Administration, EUROCONTROL, and the International Civil Aviation Organization proposed a communication...
In this work, we implement and demonstrate differential amplify-and-forward (DAF) cooperative relaying as a novel diversity technique to combat bit errors and outages common in airborne environments. By using differential modulation and demodulation, we reduce the system complexity by avoiding channel estimation which is often unreliable or computationally costly in dynamic environments with mobile...
In this paper, we model a Stackelberg game in a simple Gaussian test channel where a human transmitter (leader) communicates a source message to a human receiver (follower). We model human decision making using prospect theory models proposed for continuous decision spaces. Assuming that the value function is the squared distortion at both the transmitter and the receiver, we analyze the effects of...
We propose a likelihood test for a covariance estimated from sample data which is used to determine the number of narrow band source signals. This Minimum Description Length (MDL) estimator is shown to be robust against deviations from the assumption of equal noise level across the array. A number of source Direction-Of-Arrivals (DOA) greater than the number of physical array elements is of interest...
As the rate at which digital data is generated continues to grow, so does the need to ensure that data can be stored securely. The use of an NSA-certified Inline Media Encryptor (IME) is often required to protect classified data, as its security properties can be fully analyzed and certified with minimal coupling to the environment in which it is embedded. However, these devices are historically purpose-built...
Covert/side channel attacks based on electromagnetic (EM) emanations are difficult to detect because they are practiced wirelessly. Hence, quantifying information leakage is crucial when designing secure hardware and software. To address this problem, this paper establishes a connection between the signal energy available to an attacker in electromagnetic side/covert channel and capacity of the covert/side...
This paper studies the problem of routing in a multilayer (communication and social) network. Network protocols, such as link state routing and its variants, heavily used in mobile ad hoc networks (MANETs) cannot sustain robustness and efficiency as the topological information becomes easily stale with fast network dynamics. Attempts to collect and exchange excessive network information would result...
Wideband SATCOM provides essential beyond line-of-sight communications services. At this time, however, no widely adopted protocols exist to facilitate roaming between access domains. In addition, most commercial SATCOM networks rely on proprietary network management systems. This paper addresses use of a Manager of Manager architecture, supported by local intelligent agents, for managing a global...
The stationarity region, i.e., the area in which the statistics of a propagation channel remain constant, is an important measure of the propagation channel, and essential for efficient system design. This paper presents what is to our knowledge the first extensive measurement campaign for measuring the stationarity region of MIMO mm-wave channels. Using a novel 28 GHz phased-array sounder with high...
Citizen Broadband Radio Service band (3550–3700 GHz) is seen as one of the key frequency bands to enable improvements in the performance of wireless broadband and cellular systems. A careful study of interference caused by a secondary cellular communication system coexisting with an incumbent naval radar is required to establish a pragmatic protection distance, which not only protects the incumbent...
We consider a communication problem in which a transmitter encodes a source into several streams that are subject to modification by an omniscient adversary while en route. We design encodings with a distortion guarantee that degrades gradually as the number of streams that the adversary alters increases. Notably, we find that a mixture of highly redundant coding and uncoded transmission outperforms...
This paper provides a methodology to study the PHY layer vulnerability of wireless protocols in hostile radio environments. Our approach is based on testing the vulnerabilities of a system by analyzing the individual subsystems. By targeting an individual subsystem or a combination of subsystems at a time, we can infer the weakest part and revise it to improve the overall system performance. We apply...
We investigate adaptive transmission for tactical packet radio networks in which a source uses fountain coding to multicast a file to a number of destinations over time-varying links. We examine two strategies from the literature for packet-by-packet adaptation of the modulation and channel code. The maximum data-recovery rate philosophy attempts to maximize the throughput for each transmitted packet...
The edge computing techniques have been developed to support the exponentially increasing service demands in the fifth generation (5G) networks by bringing the data contents and their corresponding computations/communications near to mobile users. As a promising and efficient solution to implement edge computing techniques, mobile data offloading complements the traditional cellular transmission through...
Fuzzing is a critical part of secure software development life-cycle, for finding vulnerabilities, developing exploits, and reverse engineering. This relies on appropriate approaches, tools and frameworks. File and protocol fuzzing is well covered, multiple approaches and implementations exist. Unfortunately, assessed tools do not posses the required capabilities for working with protocols, where...
Content-Centric Networking (CCN) proposals rethink the communication model around named data. In-network caching is a fundamental feature to distinguish the CCN from the current host-centric IP network. In this paper, we have proposed a hybrid caching scheme which combines the on-path one and the off-path one. We leverage the ISOMAP manifold learning algorithm to distinguish the importance of nodes...
Future tactical communications involves high data rate best effort traffic working alongside real-time traffic for time-critical applications with hard deadlines. Unavailable bandwidth and/or untimely responses may lead to undesired or even catastrophic outcomes. Ethernet-based communication systems are one of the major tactical network standards due to the higher bandwidth, better utilization, and...
The decode-and-forward (DF) relay based cellular network is considered an efficient technique for solving the coverage and improving system capacity of the current fourth-generation (4G) and the emerging fifth-generation (5G) mobile telecommunication technologies. In this analysis, we control the codeword's transmission parameters by achieving a good trade-off between setting more resources with changing...
The Hoyt distribution can be used to characterize two types of fading in satellite communications. In this paper, the secrecy of the Hoyt-Hoyt fading channel is investigated. A set of exact formulas of the probability of strictly positive secrecy capacity are derived. Profile examples are illustrated to show the effects of secrecy capacity.
Communications survivability of mobile wireless segments in tactical military networks is and will be an enormous challenge in the present and future defence forces, which is vital to fulfill military missions in a timely manner. We have previously presented an autonomous system named OPAL, which uses distributed cooperative management solutions for enhancing communications survivability in volatile...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.