Dissertations / Theses on the topic 'Spectrum Access System Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 42 dissertations / theses for your research on the topic 'Spectrum Access System Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Makin, Cameron. "Primary User Obfuscation in an Incumbent Informed Spectrum Access System." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.
Full textMaster of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
Dou, Yanzhi. "Toward Privacy-Preserving and Secure Dynamic Spectrum Access." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81882.
Full textPh. D.
Lu, Chang. "Inclusion of Priority Access in a Privacy-preserving ESC-based DSA System." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/84872.
Full textMaster of Science
Zabransky, Douglas Milton. "Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85001.
Full textMaster of Science
Lin, Yousi. "Spectrum Management Issues in Centralized and Distributed Dynamic Spectrum Access." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104362.
Full textDoctor of Philosophy
Due to the rapid growth in wireless communication demands, the frequency spectrum is becoming increasingly crowded. Traditional spectrum allocation policy gives the unshared access of fixed bands to the licensed users, and there is little unlicensed spectrum left now to allocate to newly emerged communication demands. However, studies on spectrum occupancy show that many licensed users who own the license of certain bands are only active for a small percentage of time, which results in plenty of underutilized spectrum. Hence, a new spectrum sharing paradigm, called dynamic spectrum access (DSA), is proposed to mitigate this problem. DSA enables the spectrum sharing between different classes of users, generally, the unlicensed users in the DSA system can access the licensed spectrum opportunistically without interfering with the licensed users. Based on architecture design, DSA systems can be categorized as centralized and distributed. In centralized systems, a central controller will make decisions on spectrum usage for all unlicensed users. Whereas in distributed systems, unlicensed users can make decisions for themselves independently. To successfully enable DSA, both centralized and distributed DSA systems need to deal with spectrum management issues, such as resource allocation problems and user privacy issues, etc. The resource allocation problems include, for example, the problems to discover and allocate idle bands and the problems to control users' transmit power for successful coexistence. Privacy issues may also arise during the spectrum management process since certain information exchange is inevitable for global decision making. However, due to the Federal Communications Commission's (FCC) regulation, licensed users' privacy such as their location information must be protected in any case. As a result, dynamic and efficient spectrum management techniques are necessary for DSA users. In this dissertation, we investigate the above-mentioned spectrum management issues in both types of DSA systems, specifically, the spectrum sensing challenges with licensed user location privacy issues in centralized DSA, and the spectrum sharing problems in distributed DSA systems. In doing so, we propose novel schemes for solving each related spectrum management problem and demonstrate their efficacy through the results from extensive evaluations and simulations. We believe that this dissertation provides insightful advice for DSA users to solve different spectrum management issues for enabling DSA implementation, and hence helps in a wider adoption of dynamic spectrum sharing.
Bhadriraju, Abhay Rao. "Misuse Detection in Dynamic Spectrum Access Networks." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/49259.
Full textMaster of Science
Ullah, Abid. "Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access System." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/84932.
Full textPh. D.
Ye, Yuxian. "Study of Sensing Issues in Dynamic Spectrum Access." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/90184.
Full textMaster of Science
Spectrum relates to the radio frequencies allocated to the federal users and commercial users for communication over the airwaves. It is a sovereign asset that is overseen by the government in each country to manage the radio spectrum and issue spectrum licenses. In addition, spectrum bands are utilized for various purposes because different bands have different characteristics. However, the overly crowded US frequency allocation chart shows the scarcity of usable radio frequencies. The actual spectrum usage measurements reflect that multiple prized spectrum bands lay idle at most time and location, which indicates that the spectrum shortage is caused by the spectrum management policies rather than the physical scarcity of available frequencies. Dynamic spectrum access (DSA) was proposed as a new paradigm of spectrum sharing that allows commercial users to access the abundant white spaces in the licensed spectrum bands to mitigate the spectrum shortage problem and increase spectrum utilization. In DSA, two of the key technical challenges lie in how to dynamically allocate the spectrum and how to protect spectrum users’ security. This thesis focuses on the development of two types of mechanisms for addressing the above two challenges: (1) developing efficient spectrum monitoring schemes to help secondary users (SU) to accurately and dynamically access the white space in spectrum allocation and (2) developing privacy preservation schemes for incumbent users (IU) to protect their location privacy. Specifically, we proposed an unknown IU pattern monitoring scheme that leverages the power of masses of portable mobile devices to reduce the cost of common spectrum monitoring systems. We demonstrate that our system can track not only the existing IU spectrum access patterns but also the unknown patterns where no historical spectrum information exists. We then leverage the solar energy harvesting and design energy management scheme to support our spectrum monitoring system. Finally, we provide a strategy for both static and mobile IUs to hide their true location under the monitoring of Environmental Sensing Capabilities systems.
Bahrak, Behnam. "Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/24720.
Full textPh. D.
Maggenti, Mark A. "Spread spectrum satellite multiple access and overlay service." Thesis, Virginia Tech, 1987. http://hdl.handle.net/10919/45769.
Full textThis thesis presents two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks. It describes two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation and analyzes their throughput. The analysis considers such factors as satellite power constraints and adjacent satellite interference. It considers the effect of onâ board processing on the multiple access efficiency and investigates the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse.
Master of Science
Kikamaze, Shem. "Design, Deployment and Performance of an Open Source Spectrum Access System." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85629.
Full textMaster of Science
In this information age, the number of wireless devices is growing faster than the infrastructure required to make wireless communication possible. This creates a possibility of not having enough radio spectrum to keep up with this growing demand. To alleviate this issue, there is a need to research and find more ways of efficiently utilizing the current spectrum resources available. Dynamic spectrum allocation is one way forward to archiving this goal. Frequency channels are assigned to devices based on prevailing conditions like device location and availability of channels that would cause low interference to other devices. Spectrum utilization is based on time, frequency and space with devices having the ability to hop to the best channel available. In this thesis, an open-source Spectrum Access System (SAS) was created as a platform through which dynamic spectrum allocation research can be done. The SAS is centralized management system that logs information about the prevailing spectrum usage, and in turn uses this information to dynamically allocate spectrum to devices and networks. This thesis shows how it was implemented, its current performance, and the steps that different researchers can take to add their own functionalities.
ZHENG, YAO. "Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption." Digital WPI, 2011. https://digitalcommons.wpi.edu/etd-theses/902.
Full textRamanujachari, Divya. "Using Incumbent Channel Occupancy Prediction to Minimize Secondary License Grant Revocations." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/86384.
Full textMaster of Science
Studies on spectrum occupancy show that, in certain bands, licensed incumbent users use the spectrum only for some time or only within certain geographical limits. The dynamic spectrum access paradigm proposes to reclaim the underutilized spectrum by allowing unlicensed secondary users to access the spectrum opportunistically in the absence of the licensed users. In the United States, the Federal Communications Commission (FCC) has identified 150 MHz of spectrum space from 3550-3700 MHz to implement a dynamic spectrum sharing service called the Citizens Broadband Radio Service (CBRS). The guiding principle of this service is to maximize secondary user channel utilization while ensuring minimal incumbent user disruption. In this study, we propose that these conflicting requirements can be best balanced in the Spectrum Access System (SAS) by programming it to set the time validity of the secondary license grants by taking into consideration the incumbent spectrum occupancy pattern. In order to enable the SAS to learn incumbent spectrum occupancy in a privacy-preserving manner, we propose the use of a deep learning model, specifically the long-short term memory (LSTM). This model can be trained by federal agencies on historical incumbent spectrum occupancy information and then shared with the SAS in a secure manner to obtain prediction information about possible incumbent activity. Then, using the incumbent spectrum occupancy information from the LSTM model, the SAS could issue license grants that would expire before expected arrival time of incumbent user, thus minimizing the number of revocations on incumbent arrival. The scheme was validated using simulations that demonstrated the effectiveness of this approach in minimizing revocation complexity.
Sohul, Munawwar Mahmud. "Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/88018.
Full textPHD
Williams, Jennifer. "Acceptance of a Remote Desktop Access System to Increase Workspace Awareness." Thesis, University of Waterloo, 2000. http://hdl.handle.net/10012/846.
Full textOyediran, David. "Spectrum Sharing: Overview and Challenges of Small Cells Innovation in the Proposed 3.5 GHz Band." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596402.
Full textSpectrum sharing between Federal and commercial users is a technique proposed by the FCC and NTIA to open up the 3.5 GHz band for wireless broadband use and small cell technology is one of the candidates for its' realization. The traffic on small cells is temporal and their chances of interfering with other services in shared spectrum are limited. DoD has a documented requirement of 865 MHz by 2025 to support telemetry but only 445 MHz is presently available. DoD is conducting researches to realize test and evaluation spectrum efficient technology with the aim to develop, demonstrate, and evaluate technology components required to enable flight and ground test telemetry operations. This paper will provide an overview on spectrum sharing using small cell technology for LTE-Advanced and dynamic spectrum access would be briefly described. Research challenges for protocols and algorithms would be addressed for future studies.
Shin, Hong-Sup. "Analysis of the probability of error in frequency hopping multiple access system /." Thesis, Connect to this title online; UW restricted, 1997. http://hdl.handle.net/1773/5868.
Full textReuben, Jenni. "Privacy-aware Use of Accountability Evidence." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-48550.
Full textThis thesis deals with the evidence that enables accountability, the privacy risks involved in using it and proposes a privacy-aware solution for preventing unauthorized evidence disclosure. Accountability plays a crucial role in the legal privacy frameworks for assuring individuals’ privacy. In the European context, accountability principle is pervasive in the measures that are mandated by the General Data Protection Regulation. In general, these measures are technically achieved through automated privacy audits. Traces that record the system activities are the essential inputs to those audits. Nevertheless, such traces that enable accountability are themselves subject to privacy risks, because in most cases, they inform about the processing of the personal data. Therefore, ensuring the privacy of the traces is equally important as ensuring the privacy of the personal data. The aim of the thesis is to provide a conceptual understanding of the automated privacy compliance research and to contribute to the solutions that promote privacy-aware use of the accountability traces. This is achieved in this dissertation through a systematic study of the existing body of knowledge in automated privacy compliance, a systematic analysis of the privacy challenges involved in processing the traces and a proposal of a privacy-aware access control model for preventing illegitimate access to the traces.
Masrub, Abdullah Ashur. "Cognitive MAC protocols for mobile ad-hoc networks." Thesis, Brunel University, 2013. http://bura.brunel.ac.uk/handle/2438/7621.
Full textMendola, Jeffrey B. "Simulation and analysis of a time hopping spread spectrum communication system." Thesis, This resource online, 1996. http://scholar.lib.vt.edu/theses/available/etd-11012008-063451/.
Full textLim, Eng Chai. "Direct sequence spread spectrum multiple access system performance in an indoor milieu characterized by Rician channel." Thesis, University of Ottawa (Canada), 1989. http://hdl.handle.net/10393/6041.
Full textJaswal, Kavita. "Handoff issues in a transmit diversity system." Thesis, Texas A&M University, 2003. http://hdl.handle.net/1969.1/1586.
Full textMa, Wenjun. "AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-09142007-204819/.
Full textTitle from file title page. Ying Zhu, committee chair; G.Scott Owen, Robert W. Harrison, committee members. Electronic text (87 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Feb. 7, 2008. Includes bibliographical references (p. 84-87).
Chen, Chi-She. "Using TD/CCSK spread spectrum technique to combat multipath interference in a multiple user system." Ohio : Ohio University, 1995. http://www.ohiolink.edu/etd/view.cgi?ohiou1179519410.
Full textAlsharekh, Mohammed Fahad. "Transform domian/cyclic code shift keying system on an urban multipath channel." Ohio : Ohio University, 1998. http://www.ohiolink.edu/etd/view.cgi?ohiou1177003745.
Full textKaba, James, and Barbara Connolly. "Overview of the Telemetry Network System (TMNS) RF Data Link Layer." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581604.
Full textAs the integrated Network Enhanced Telemetry (iNET) program prepares for developmental flights tests, refinements are being made to the Radio Access Network Standard that ensures interoperability of networked radio components. One key aspect of this interoperability is the definition of Telemetry Network System (TmNS) RF Data Link Layer functionality for conducting efficient communications between radios in a TDMA (Time Division Multiple Access) channel sharing scheme. This paper examines the overall structure of the TmNS RF Data Link Layer and provides an overview of its operation. Specific topics include Medium Access Control (MAC) scheduling and framing in the context of a burst-oriented TDMA structure, link layer encryption, the priority-enabled Automatic Repeat reQuest (ARQ) protocol, high-level network packet and link control message encapsulation, payload segmentation and reassembly, and radio Link Layer Control Messaging.
Mustonen, M. (Miia). "Analysis of recent spectrum sharing concepts in policy making." Doctoral thesis, Oulun yliopisto, 2017. http://urn.fi/urn:isbn:9789526216645.
Full textTiivistelmä Parin viimeisen vuosikymmenen aikana tutkimusyhteisö on kehittänyt valtavasti eri käsitteitä ja tuloksia taajuuksien yhteiskäyttöön. Matkapuhelinoperaattoreiden nopeasti kasvavan tiedonsiirto- ja taajuustarpeen myötä myös poliittinen ilmapiiri on muuttunut vastaanottavaisemmiksi uusille jaetuille taajuuksienkäyttömalleille, joilla voidaan sekä lisätä taajuuksien käytön tehokkuutta että mahdollistaa uusien toimijoiden ja innovatiivisten palvelujen kehitys. Taajuuksien yhteiskäyttömalleihin liittyvä tutkimustyö ei kuitenkaan usein palvele suoraan taajuusviranomaisten tarpeita. Tämän työn tavoitteena on selvittää syitä tähän kolmen vallitsevan joustavan taajuuksienkäyttökonseptin avulla: lisensoidun taajuuksien yhteiskäyttömallin, kolmitasoisen taajuuksien yhteiskäyttömallin ja TV kaistojen yhteiskäyttömallin. Eri toimijoilla on hyvin erilaiset roolit taajuuksien yhteiskäytössä ja siksi sekä heidän kannustimensa että keskeiset kriteerit voivat olla hyvin erilaiset. Käytäntöön sopiva jaetun taajuudenkäytön malli onkin usein kompromissi eri näkemysten omaavien toimijoiden kesken, ei välttämättä taajuuksien käytöltään tehokkain vaihtoehto. Tässä työssä analysoidaan eri taajuuksien yhteiskäyttömalleja sekä eri toimijoiden näkökulmia. Analyysin tuloksena luodaan yleinen prosessimalli taajuuksien yhteiskäyttömallien toteutukselle sekä identifioidaan eri toimijoiden roolit sen eri vaiheissa
Font, Brevis Giselle Alejandra. "Privacidad de ubicación para un sistema de monitoreo de la calidad de acceso a internet móvil: Location privacy for a monitoring system of the quality of access to mobile internet." Tesis, Universidad de Chile, 2015. http://repositorio.uchile.cl/handle/2250/132852.
Full textIngeniera Civil en Computación
Con el objeto de medir la calidad de acceso a Internet móvil, NIC Chile Research Labs desarrolló Adkintun Mobile, un monitor pasivo instalado en los celulares de usuarios voluntarios. Periódicamente, la aplicación registra datos relativos al estado de la red, los que son enviados a un servidor que los recolecta. Los investigadores del laboratorio tienen acceso a los datos almacenados por el colector. A partir de la conexión a las antenas de celulares, la ubicación del dispositivo puede ser deducida, por lo que la ubicación de los usuarios queda expuesta a la vista de los investigadores, lo que resulta preocupante desde el punto de vista de la privacidad de ubicación de los individuos. Más aún, sólo cuatro puntos espacio temporales son suficientes para reidentificar al 95% de la población a partir de una base de datos anonimizada. Es por ello que este trabajo se enfoca en resolver el problema usando un enfoque criptográfico. Se propone un modelo en el que los investigadores pueden acceder, consultar y calcular agregaciones sobre los datos almacenados, pero sólo obteniendo de la ubicación de los individuos el resultado de las agregaciones. El modelo utiliza encriptación homomórfica para resguardar la privacidad de ubicación. La información relativa a la ubicación es enviada encriptada desde los celulares hacia el servidor. El servidor puede calcular homomórficamente funciones predefinidas, como contar el número de usuarios en un determinado lugar. Las consultas a la base de datos y la desencriptación, se ejecutan en capas separadas, para evitar que la llave secreta sea utilizada en la desencriptación directa de los datos. Se implementaron dos versiones de la capa de privacidad de ubicación, con encriptación completamente homomórfica (FHE) usando el esquema BGV, y con encriptación parcialmente homomórfica (PHE) usando el esquema Paillier. El desempeño y overhead del sistema, muestran que el modelo es adecuado para cálculo offline de estadísticas. Las contribuciones de este trabajo consisten en proponer una aplicación práctica de FHE para privacidad de ubicación; y discutir sobre el trade-off entre privacidad de ubicación y el desempeño del sistema en ambas implementaciones (FHE y PHE). -------------------------- In order to measure the quality of access to mobile Internet, NIC Chile Research Labs developed Adkintun Mobile, a passive monitor installed in volunteer users' mobile phones. Periodically, the client application records data related to network state, which is sent to the collector server. Researchers of the laboratory have access to such stored data. Since from connexion to antennas location can be deduced, location data of individuals is exposed to researchers, which is a concern for location privacy. Moreover, as only four spatio-temporal points are enough to identify 95\% of the population in an anonymized dataset, this work takes a cryptographic approach to solve the problem. We propose a model where researchers can access, query and compute aggregations on stored data, learning nothing more about users' location than the result of the aggregation. Our model uses homomorphic encryption to preserve location privacy. Location data is sent encrypted from mobile devices to the server. The server can homomorphically evaluate predefined functions such as counting the number of users in a given location. Query and result decryption are performed from a separate layer, which protects the secret key from being used for direct decryption of the records. We implemented two versions of the location privacy layer using a Leveled Fully Homomorphic encryption (FHE) scheme (BGV), and a Partial (additive) Homomorphic encryption (PHE) scheme (Paillier). The overhead and performance evaluation show that both versions are adequate for offline statistical analysis. The contribution of this work is to propose a practical use of FHE for location privacy; and to discuss the trade-off between location privacy and system performance for implementations using FHE and PHE.
Al-Sharari, Hamed. "An implementation of acquisition using transform domain/cycle code shift keying system on a multipath channel." Ohio : Ohio University, 1998. http://www.ohiolink.edu/etd/view.cgi?ohiou1177004799.
Full textIsohookana, M. (Matti). "Taistelunkestävä hajaspektritietovuo kansalliseen sotilasilmailuun." Doctoral thesis, Oulun yliopisto, 2019. http://urn.fi/urn:isbn:9789526223728.
Full textTiivistelmä Suomen ilmavoimien perustehtävä on kansallisen ilmatilan jatkuva valvonta ja vartiointi sekä sodan aikana ilmatilan puolustus. Ilmatilan valvonta hoidetaan pääasiassa ilmavalvontatutkilla – vartiointi ja puolustus sotilaskoneilla. Sotilaskoneiden tehokkaan toiminnan edellytyksenä on tilannetietoisuus. Lento-operaatioon osallistuvilla tahoilla tulee olla käytettävissä ajan tasalla oleva ilmatilannekuva eli tarkat tiedot omista ja vastapuolen koneista, taistelujohdon toimintaohjeet sekä tietoa muun muassa operaatioon osallistuvien koneiden jäljellä olevasta toiminta-ajasta. Tilannetietoisuuden ylläpitäminen edellyttää, että lento-operaatioon osallistuvia lentokoneita ja maassa olevaa taistelujohtoa yhdistää reaaliaikainen varmatoiminen tiedonsiirtoyhteys. Tässä väitöskirjassa tarkastellaan kansallisen sotilasilmailun tarpeet täyttävän lentokelpoisen SIHTI (Suomen ilmavoimien hajaspektritietovuo) -hajaspektritiedonsiirtokoejärjestelmän järjestelmäkehitystä aina vaatimusmäärittelystä lentokelpoisen koelaitteiston suorituskykymittauksiin. Turvallisen, varmatoimisen ja vaikeasti tiedusteltavan tiedonsiirtojärjestelmän tulee mahdollistaa niin lentokoneiden kuin lentokoneiden ja maa-asemien välinen kaksisuuntainen sanomansiirto useiden lähekkäin toimivien verkkojen tapauksessa hyvinkin voimakkaassa tahallisessa häirinnässä. Tiedonsiirtojärjestelmässä ja sen toteutuksessa tulee olla myös riittävä määrä muunneltavuutta, jotta järjestelmän loppukäyttäjä ja järjestelmän ylläpitäjä pystyvät parametri- ja algoritmimuutoksin vaikuttamaan järjestelmän suorituskykyyn. Väitöskirjassa osoitetaan, että FH/DS-CDMA (Frequency Hopping / Direct Sequence Code Division Multiple Access)- ja TDMA (Time Division Multiple Access) -monikäyttömenetelmiin pohjautuva SIHTI-koejärjestelmä pystyy pienin muutoksin täyttämään sille asetetut vaatimukset
Maatougui, Lamyae. "Développement d'un récepteur intelligent dédié aux systèmes sans fil basés sur les modulations M-OAM." Thesis, Valenciennes, 2017. http://www.theses.fr/2017VALE0015.
Full textIn this work of thesis, we propose an original communication system allowing to reach high data rate and to fulfill the requirements of quality of service necessary for the communications short range dedicated to intelligent transport. This system is based on the Ultra Wide Band Impulse (IR-ULB) technology and on new modulation scheme named M-OAM (M-states Orthogonal Amplitude Modulation). M-OAM modulations are based on the principle of modulations M-QAM by replacingthe carriers used for QAM modulation with orthogonal waveforms ULB type MGF (Modified Gegenbauer Function). These modulations were evaluated under the conditions of AWGN channel and IEEE 802.15 channels which take account of the real parameters of the road. Besides the high speed required by inter-vehicular communications, it is necessary to ensure simultaneous information exchange between several users of the road. Accordingly, new adaptive multiple access system is proposed. Each user has the possibility to use the adequate modulation OAM according to the desired speed. The receiver of this system is characterized by an intelligent aspect thanks to the integration of the principle of Cognitive Radio (RC) which makes it able to detect the signal arrival and to identify the parameters of the used modulation in order to adapt the demodulation in an autonomous way. A good quality of service is ensured by the proposed novel demodulation method based on the Higher Orders Statistics (HOS) to eliminate the Gaussian noise. The good performances of M-OAM communication system M-OAM as well as the whole of the suggested aspects are validated in experiments within IEMN-DOAE laboratory. In the last part of this document we presented the realization of prototype using real time processing developed on FPGA plateform and exploiting parallelisable algorithms on reconfigurable architectures
Berrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.
Full textB.S.
Bachelors
Health and Public Affairs
Legal Studies
"Security and Privacy in Dynamic Spectrum Access: Challenges and Solutions." Doctoral diss., 2017. http://hdl.handle.net/2286/R.I.44321.
Full textDissertation/Thesis
Doctoral Dissertation Electrical Engineering 2017
Crohas, Alice. "Practical implementation of a cognitive radio system for dynamic spectrum access." 2008. http://etd.nd.edu/ETD-db/theses/available/etd-07252008-162749/.
Full textThesis directed by J. Nicholas Laneman for the Department of Electrical Engineering. "July 2008." Includes bibliographical references (leaves 46-47).
Sun, Hao-Hsiang, and 孫浩翔. "Fuzzy Active Period Adaptation for Dynamic Spectrum Access in IEEE 802.16h System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/84502675184761949241.
Full text國立交通大學
電信工程系所
96
With the development of communication technology, wireless communications become more important to provide convenient services. It triggers a huge demand for bandwidth for transmission. Because of the spectrum scarcity, how to use the spectrum dynamically and efficiently becomes an important issue. Dynamic spectrum access (DSA) is a promising approach to alleviate the spectrum scarcity that wireless communications face today. To provide the mechanism of DSA networks, the use of “cognitive radio” (CR) technology is viewed as the key technology to fully utilize the bandwidth. In this thesis, a CR-based dynamic spectrum access (DSA) device named fuzzy active period adaptor (FAPA) is proposed in downlink transmission of IEEE 802.16h systems. FAPA decides the active period of CR system to efficiently coexist with WLAN system in 802.16h system. Simulation results show the fuzzy active period adaptation can improve the overall throughput and reduce the idle time of the spectrum with slightly interfering in the operation of the primary WLAN system.
Chan, Kai-Tung, and 詹凱同. "A Novel Comb-Spectrum Code Division Multiple Access Uplink System Using Sparse Gaussian Integer Perfect Sequences." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/51572599451870014550.
Full text國立中山大學
電機工程學系研究所
101
Multi-Carrier Code Division Multiple Access (MC-CDMA) is a promising approach to the challenge of providing high data rate wireless communication. It can be interpreted as CDMA with the spreading taking place in the frequency rather than temporal domain. However, due to the frequency selective fading channel for uplink, the orthogonality among various spreading codes is lost and it causes multi-user interference (MUI). Recently, the comb-spectrum (CS) CDMA system without MUI was proposed. One user’s data are spread on an assigned interleaved subcarrier group. Since a subcarrier is only assigned to one user. Therefore, for uplink, the orthogonality among spreading codes can be restored perfectly in the frequency selective fading channel. However, the spectrum of the CS code is not flat and parts of spectrum are zeros which cause the bit error rate (BER) degradation. A sequence of complex number is called Sparse Gaussian Integer Perfect Sequence (SGIPS) whose real parts and imaginary parts are both integers and whose any cyclic shift is orthogonal to each other. Moreover, the number of nonzero elements of GIPS is independent on the sequence length and much less than the sequence length. In this paper, the SGIPS is utilized as the spreading codes and a novel comb-spectrum code division multiple access system is proposed. From simulation results, the BER of the proposed systems is better than the traditional CS-CDMA systems. For quadrature phase shift keying, the proposed scheme gains about 3dB when BER = 10-4.
HSIEH, TSUNG-HSIEN, and 謝宗憲. "A novel comb-spectrum code division multiple access downlink system using sparse gaussian integer perfect sequences." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/5rbgc3.
Full text國立中山大學
電機工程學系研究所
102
Multi-carrier code division multiple Access (MC-CDMA) is a promising approach to the challenge of providing high data rate wireless communication. It can be interpreted as CDMA with the spreading taking place in the frequency rather than temporal domain. However, one of drawbacks of MC-CDMA systems is high peak-to-average power ratio. Recently, the comb-spectrum (CS) CDMA system was proposed. One user’s data are spread on an assigned interleaved subcarrier group. In addition, the corresponding CS codes in the time domain are of equal magnitude. Therefore, the peak-to-average power ratio can be reduced. However, the spectrum of the CS code is not flat and parts of spectrum are zeros which cause the bit error rate (BER) degradation. A sequence of complex number is called sparse Gaussian integer perfect sequence (SGIPS) whose real parts and imaginary parts are both integers and whose any cyclic shift is orthogonal to each other. Moreover, the number of nonzero elements of GIPS is independent on the sequence length and much less than the sequence length. In this paper, the SGIPS is utilized as the spreading codes and a novel comb-spectrum code division multiple access system is proposed. From simulation results, the BER of the proposed systems is better than the traditional CS-CDMA systems. For quadrature phase shift keying, the proposed scheme gains about 3dB when BER = 10-4.
Tekle, Solomon Mekonnen. "A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP)." Thesis, 2018. http://hdl.handle.net/10500/25968.
Full textInformation Science
D. Phil. (Information Systems)
Ellis, Timothy. "The implementation of a CDMA system on a FPGA-based software radio." Thesis, 2000. http://hdl.handle.net/10413/5252.
Full textThesis (M.Sc.Eng.)-University of Natal, Durban, 2000.
Santhosam, Charles L. "CDMA Base Station Receive Co-Processor Architecture." Thesis, 2004. http://hdl.handle.net/2005/318.
Full text(6620474), Denis A. Ulybyshev. "Data Protection in Transit and at Rest with Leakage Detection." Thesis, 2019.
Find full textIn service-oriented architecture, services can communicate and share data among themselves. This thesis presents a solution that allows detecting several types of data leakages made by authorized insiders to unauthorized services. My solution provides role-based and attribute-based access control for data so that each service can access only those data subsets for which the service is authorized, considering a context and service’s attributes such as security level of the web browser and trust level of service. My approach provides data protection in transit and at rest for both centralized and peer-to-peer service architectures. The methodology ensures confidentiality and integrity of data, including data stored in untrusted cloud. In addition to protecting data against malicious or curious cloud or database administrators, the capability of running a search through encrypted data, using SQL queries, and building analytics over encrypted data is supported. My solution is implemented in the “WAXEDPRUNE” (Web-based Access to Encrypted Data Processing in Untrusted Environments) project, funded by Northrop Grumman Cybersecurity Research Consortium. WAXEDPRUNE methodology is illustrated in this thesis for two use cases, including a Hospital Information System with secure storage and exchange of Electronic Health Records and a Vehicle-to-Everything communication system with secure exchange of vehicle’s and drivers’ data, as well as data on road events and road hazards.
To help with investigating data leakage incidents in service-oriented architecture, integrity of provenance data needs to be guaranteed. For that purpose, I integrate WAXEDPRUNE with IBM Hyperledger Fabric blockchain network, so that every data access, transfer or update is recorded in a public blockchain ledger, is non-repudiatable and can be verified at any time in the future. The work on this project, called “Blockhub,” is in progress.
Menhaj, Lamyae. "Développement d'un récepteur intelligent dédié aux systèmes sans fil basés sur les modulations M-OAM." Thesis, 2017. http://www.theses.fr/2017VALE0015/document.
Full textIn this work of thesis, we propose an original communication system allowing to reach high data rate and to fulfill the requirements of quality of service necessary for the communications short range dedicated to intelligent transport. This system is based on the Ultra Wide Band Impulse (IR-ULB) technology and on new modulation scheme named M-OAM (M-states Orthogonal Amplitude Modulation). M-OAM modulations are based on the principle of modulations M-QAM by replacingthe carriers used for QAM modulation with orthogonal waveforms ULB type MGF (Modified Gegenbauer Function). These modulations were evaluated under the conditions of AWGN channel and IEEE 802.15 channels which take account of the real parameters of the road. Besides the high speed required by inter-vehicular communications, it is necessary to ensure simultaneous information exchange between several users of the road. Accordingly, new adaptive multiple access system is proposed. Each user has the possibility to use the adequate modulation OAM according to the desired speed. The receiver of this system is characterized by an intelligent aspect thanks to the integration of the principle of Cognitive Radio (RC) which makes it able to detect the signal arrival and to identify the parameters of the used modulation in order to adapt the demodulation in an autonomous way. A good quality of service is ensured by the proposed novel demodulation method based on the Higher Orders Statistics (HOS) to eliminate the Gaussian noise. The good performances of M-OAM communication system M-OAM as well as the whole of the suggested aspects are validated in experiments within IEMN-DOAE laboratory. In the last part of this document we presented the realization of prototype using real time processing developed on FPGA plateform and exploiting parallelisable algorithms on reconfigurable architectures