The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio frequency identification (RFID) is a technology for automated identification of objects and people. RFID technology is expected to find extensive use in applications related to the Internet of Things, and in particular applications of Internet of Battlefield Things. Of particular interest are passive RFID tags due to a number of their salient advantages. Such tags, lacking energy sources of...
In mobile Cognitive Radio Networks (CRNs), the frequent link breakage and wireless interference urged the need for novel stable routing solutions. In this paper, we propose STAR, a stable routing protocol that aims at selecting interference-free and durable paths. We investigate the particular Hidden interfering Primary User (HIPU) problem caused by the un-detectable presence of the primary user in...
The concept of mesh networks brings many challenges to the research community when designing such system. In this paper, we propose a new routing model to account for the link utilization between nodes, as well as the remaining energy left in each node. The framework, called Distributed Split-path, is implemented on top of the Optimized Link-State Routing (OLSR) protocol. We demonstrate the improvement...
This paper describes a new implementation of the Elastic Multicast (EM) protocol including new design enhancements for improved dynamic operation. The paper also presents additional performance data collected from emulation-based mobile network experiments. EM is a low complexity extension to Simplified Multicast Forwarding (SMF) that adds group-specific dynamic pruning of the SMF-based multicast...
There has been a significant increase in the number of sensors deployed to accomplish military missions. These sensors might be on manned or unmanned resources, and might collect quantitative and/or qualitative information important for mission success. Of critical importance for mission success is ensuring that the collected information is routed to the people/systems that need the information for...
The enterprise and tactical domains have distinct properties and requirements, and have thus evolved independently in incompatible ways. Today the network infrastructure has emerged to, in theory, enable interconnectivity between these domains at a global scale. Unfortunately, even in the presence of these communication capabilities and despite the benefits that each operational domain can gain from...
Mobile tactical networks (MTNs) in military communications extend the capabilities of mobile ad-hoc networks (MANETs). The MTNs are dynamic, infrastructureless, self-forming and self-healing systems designed for non-line-of-sight (NLOS) operations using multi-hop relaying. Unlike their commercial counterparts, MTNs have to offer much higher levels of security, jamming resistance, and service robustness...
Personnel operating in tactical environments heavily rely on information sharing to perform their missions. Solutions deployed in these environments need to focus on reliability and performance, in addition to usability to work as unattended as possible due to the often chaotic nature of operations. In this paper we propose a solution for delay-tolerant data sharing, in particular file sharing, using...
Future tactical communications involves high data rate best effort traffic working alongside real-time traffic for time-critical applications with hard deadlines. Unavailable bandwidth and/or untimely responses may lead to undesired or even catastrophic outcomes. Ethernet-based communication systems are one of the major tactical network standards due to the higher bandwidth, better utilization, and...
In this paper, we propose a fully-integrated radar and communication system — named ComSens. We utilize two different pilot sequences (one for uplink and one for downlink) with the condition that they must be uncorrelated to each other. Within such a framework, the signal received from end-user and the back-scattered signal from the desired objects have uncorrelated pilots. Thus, the base-station...
A joint radar-communication (JRC) system can provide cost-effective and spectrum-efficient platform solution with simultaneous operation, while accomplishing important tasks, sensing via radar processing and allocation of communication links. Existing modulation techniques where information embedding is achieved using sidelobe Amplitude-Shift Keying (ASK) for the JRC system are not investigated so...
Dynamic spectrum access (DSA) has seen a growing interest in recent years due to spectrum scarcity. Cognitive radio is a necessary component to enable DSA. One key requirement for cognitive radio is the ability to blindly detect the presence of signals in time and frequency. One popular method for blind detection is computing a power spectral density estimate using the Welch periodogram. The Welch...
This paper introduces a novel way of producing a representative frequency sample data set for a system reference oscillator's operation with respect to its manufacturer's Allan Deviation specifications. The resultant availability of the algorithmically constructed frequency sample can greatly benefit the system analysis demands in which frequency and timing errors are essential parameters to be considered,...
In this paper, the problem of single-channel blind source separation (SCBSS) of a mixture of two co-frequency phase-shift keying (PSK) signals with unknown carrier frequency offsets (CFOs) is investigated. Two SCBSS algorithms which are robust to CFOs are proposed to perform separation of the mixture signals. In the first algorithm, the phase changes of the received signals caused by CFOs are tracked...
Conventional correlation-based frame synchronization techniques can suffer significant performance degradation over multi-path frequency-selective channels. As a remedy, in this paper we consider joint frame synchronization and channel estimation. This, however, increases the length of the resulting combined channel and its estimation becomes more challenging. On the other hand, since the combined...
HF ionospherical channels are very challenging due to their time and frequency selective, and highly varying natures. Furthermore, they offer only limited data rates, which led generations of engineers to limit the signalization information and to reduce the number of turnarounds to preserve a maximum throughput for useful data. However, new wideband modems [1] [2] have recently been proposed, that...
Cognitive radio network (CRN) is regarded as an emerging technology for better spectrum efficiency where unlicensed secondary users (SUs) sense RF spectrum to find idle channels and access them opportunistically without causing any harmful interference to licensed primary users (PUs). However, RF spectrum sensing and sharing along with reconfigurable capabilities of SUs bring severe security vulnerabilities...
This paper describes and verifies a method of implementing bit error rate (BER) calculation for FPGA-based physical layer security techniques for Software Defined Radio (SDR). Specifically, we describe an independent source signal processing architecture for an efficient calculation of BER for wireless communication modules across the transmitter and receiver nodes. The source components at the transmitter...
Cloud-fog radio access is a promising technology in evolving wireless communication systems, but its success depends on security. It is fundamental to conduct the secrecy analysis in the physical layer due to the special architecture of CF-RAN. In this paper, we investigate the secrecy impacted by general path-loss effects. We show that the mathematical kernel is the Weibull distribution function...
Anomaly detection is the process of identifying unusual signals in a set of observations. This is a vital task in a variety of fields including cybersecurity and the battlefield. In many scenarios, observations are gathered from a set of distributed mobile or small form factor devices. Traditionally, the observations are sent to centralized servers where large-scale systems perform analytics on the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.