Дисертації з теми "Radio jamming"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-34 дисертацій для дослідження на тему "Radio jamming".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Samadi, Nima, and Mihail Lupan. "Radio Jamming Detection and Forensics Analysis of Inter-Vehicular Communication Traces." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40565.
Повний текст джерелаRozenbeek, David Jan. "Evaluation of Drone Neutralization Methods using Radio Jamming and Spoofing Techniques." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279557.
Повний текст джерелаPopulariteten av att flyga drönare ökar stadigt i och med att drönartekniken blir mer tillgänglig och an- vändbart för allmänheten. Men användningen av drönare leder också till problem när till exempel flyg- platser har varit tvungna att stänga av på grund av drönar observationer. Det har blivit tydligt att ett anti-drönarsystem måste vara på plats för att neutralisera inkräktande drönare. Men att neutralisera en drönare är inte en enkel uppgift, risken för att orsaka sido-skador på personer, byggander eller objekt; eller störa andra radiosystem måste beaktas starkt när man utformar ett anti-drönarsystem. I detta examensarbete valdes en uppsättning konsumentdrönare ut baserat på marknadens popularitet. Genom att studera de trådlösa kommunikationslänkarna för de valda drönarna identifierades en uppsättning av drönar-neutraliseringsmetoder. För varje neutraliseringsmetod valdes en uppsättning av störnings- och spoofing-tekniker ut från aktuell forskning. Teknikerna användes i praktiken genom att utsätta drönarna för teknikerna i en serie drönar-beteendeexperiment. Resultaten användes sedan för att utvärdera teknikerna i fyra utvärderingskriterier baserade på att undvika sido-skador, mildra radiostörningar, identifieringsbehov och hantering av flera inkräktande drönare. Utvärderingen sammanfattades sedan för att diskutera lämpliga drönar-neutraliseringsmetoder och störnings- spoofing-tekniker. Resultaten visade att det finns neutraliseringsmetoder som potentiellt kan undvika att orsaka sido- skador eller radio-störningar för vissa typer av drönare. En full-bands störningsteknik visade sig vara bäst presterande baserat på utvärderingskriterierna, men var också den teknik som teoretiskt inducerade mest radiostörningar. Dessutom visades det att drönare som flyger i navigeringsläge endast kan neutraliseras med hjälp av en GNSS-störnings- eller spoofing metoder. Att använda en GPS-spoofing metod visade sig också vara svår att implementera i praktiken.
Price, Alfred W. "The evolution of electronic warfare equipment and techniques in the USA, 1901 to 1945." Thesis, Loughborough University, 1985. https://dspace.lboro.ac.uk/2134/7410.
Повний текст джерелаCollins, Travis Fredrick. "Implementation and Analysis of Spectral Subtraction and Signal Separation in Deterministic Wide-Band Anti-Jamming Scenarios." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/297.
Повний текст джерелаKaya, Yildirim. "Simulation of wireless propagation and jamming in a high-rise building." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FKaya.pdf.
Повний текст джерелаArcangeloni, Luca. "Causal Inference for Jamming Detection in Adverse Scenarios." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Знайти повний текст джерелаM, M. Galib Asadullah. "Robust wireless communications under co-channel interference and jamming." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22571.
Повний текст джерелаCommittee Chair: Gordon L. Stuber; Committee Member: Alfred D. Andrew; Committee Member: John A. Buck; Committee Member: Steven W. McLaughlin; Committee Member: Ye (Geoffrey) Li.
Kirkpantur-cadallli, Atiye Asli. "An Investigation Of Jamming Techniques Through A Radar Receiver Simulation." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609079/index.pdf.
Повний текст джерелаDizdar, Onur. "Blind Channel Estimation Based On The Lloyd-max Algorithm Innarrowband Fading Channels And Jamming." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613333/index.pdf.
Повний текст джерелаChen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.
Повний текст джерелаPh. D.
Buret, Sandra. "Transport et rétention des émulsions en milieux poreux. Influence sur les propriétés pétrophysiques." Phd thesis, Université de Haute Alsace - Mulhouse, 2009. http://tel.archives-ouvertes.fr/tel-00541015.
Повний текст джерелаLichtman, Marc Louis. "Antifragile Communications." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72267.
Повний текст джерелаPh. D.
Yan, Qiben. "Security Enhanced Communications in Cognitive Networks." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/49704.
Повний текст джерелаPh. D.
Benfarah, Ahmed. "Sécurisation d'un lien radio UWB-IR." Phd thesis, INSA de Lyon, 2013. http://tel.archives-ouvertes.fr/tel-00961228.
Повний текст джерелаLo, Brandon Fang-Hsuan. "Design and analysis of common control channels in cognitive radio ad hoc networks." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50323.
Повний текст джерелаШвець, Валеріян Анатолійович, та Тетяна Вікторівна Мелешко. "Напрями забезпечення доступності і цілісності інформації глобальних навігаційних супутникових систем". Thesis, RS Global Sp. z O.O. Warsaw, Poland, 2020. http://er.nau.edu.ua/handle/NAU/41256.
Повний текст джерелаKalogrias, Christos. "Performance analysis of the IEEE 802.11A WLAN standard optimum and sub-optimum receiver in frequency-selective, slowly fading Nakagami channels with AWGN and pulsed noise jamming." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FKalogrias.pdf.
Повний текст джерелаThesis advisor(s): Clark Robertson. Includes bibliographical references (p. 143). Also available online.
Gu, Pengwenlong. "Détection des comportements malveillants dans les réseaux véhiculaires." Electronic Thesis or Diss., Paris, ENST, 2018. https://pastel.hal.science/tel-03689506.
Повний текст джерелаThis thesis has been dedicated to addressing the misbehaviour detection problem in vehicular networks. Specifically, we focus on two major issues in PHY layer and application layer respectively: Radio Frequency (RF) Jamming attacks and Sybil attacks. Specifically, we adopted three different machine learning methods including Distance based clustering, Support Vector Machine (SVM) and k-nearest neighbours (kNN) in Sybil nodes detection. Based on variation between benign vehicles and Sybil nodes in their driving patterns, the non-existent virtual nodes can be detected. For RF jamming attacks, we focused on the design of countermeasure for the control channel jamming issue in vehicular networks, which is of vital importance to the safety of I2V communications. We proposed to adopt the cooperative relaying techniques to address the control channel jamming problem in vehicular networks, which is based on the idea that the vehicles outside of the jamming area can serve as relays to help forward the control channel signal to the victim vehicles through other the jamming-free service channels. Thus, we extended the jamming issues in multi-antenna RSU scenarios, where the RSU can serve multiple groups of vehicles simultaneously using the multi-group multicast beamforming technique. As a solution, we propose a two stage anti-jamming scheme, whereby the vehicles who have successfully decoded the signal received in the first stage will be selected as relays to cooperatively serve the victim vehicles in the second stage using the coordinated beamforming techniques over a jamming-free service channel
Shankar, Arun. "Optimal jammer placement to interdict wireless network services." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483583.
Повний текст джерелаThesis Advisor(s): Alderson, David ; Zhou, Hong. "June 2008." Description based on title screen as viewed on August 22, 2008. Includes bibliographical references (p. 39-40). Also available in print.
Wong, Yi Jim. "Link analyses and LPD/AJ strategies for IEEE 802.16a." Thesis, Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/55209.
Повний текст джерелаIn military operations, covertness of operation is of paramount importance. The transmission power of the data link must be kept to the minimum to maintain a low probability of detection (LPD) from the adversary. However, a reduction in the transmitted power implies a reduction in the operating range, though the detection range by the enemy is also reduced. Therefore, to reduce the enemy’s detection range while maintaining operating distance, this thesis explores strategies to discriminate gain against an adversary’s sensor. The strategies involve using processing gain, directional antennas, polarization and the natural environment as a transmission shield. The processing gain strategy analyzed in this thesis uses a diversity technique called Maximal Ratio Combining (MRC) applied to an IEEE 802.16a link. Sinclair D. Smith carried out a study on the possible processing gain derivable from this technique and this thesis will bring his results to practical applications via link analyses. In the event that the link is detected and the enemy decides to carry out jamming, the thesis explores a possible anti-jamming (AJ) strategy by using MRC and a directional antenna. Daniel P. Zastrow carried out a study on the AJ capability of MRC and this thesis brings his results to practical applications via link analyses.
Major, Republic of Singapore Airforce
Chen, Hung-Wei, and 陳泓維. "A Dual-Radio Anti-Jamming Scheme for Cognitive Radio Networks." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/4rucw5.
Повний текст джерела國立中央大學
資訊工程學系
107
In cognitive radio networks (CRNs), channel hopping communications are widely used to improve the utilization of licensed spectrum and solve unlicensed spectrum shortage problem. Besides, since the price of wireless transceivers becomes lower, devices in CRNs can be equipped with more radios to reduce the time to rendezvous (TTR). However, if SUs are equipped with many radios, all signals add together which brings a risk of destructive interference. It implies the devices should spend more computational resource and power to reduce interference. We consider that the devices in CRNs may be low power and low computing capability. Hence, the users (SUs) in CRNs are proper to be equipped with two radios. However, some existing multi-radios channel hopping schemes for CRNs, which have obvious patterns (i.e., a user utilizes a fixed channel for a long while), are vulnerable to jamming attacks in CRNs. Many existing anti-jamming channel hopping scheme in CRNs rely on pre-shared information (e.g., pre-shared channel hopping sequences) to build communication link between senders and receivers. However, pre-shared information among communication pairs is impractical in CRNs. Hence, anti-jamming channel hopping schemes without pre-sharing information have gained more research interests. In this paper, we propose an anti-jamming channel hopping scheme with two radios, DR-CH, and it has bounded time to rendezvous.
Wang, Szu-Yung, and 王嗣詠. "An Anti-Jamming Channel Hopping Scheme in Cognitive Radio Networks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/80053697762349738482.
Повний текст джерела國立中央大學
資訊工程學系
103
In cognitive radio networks (CRNs), channel hopping-based communications are widely used to solve the licensed spectrum shortage problem. However, jamming attacks is one of the major threats in CRNs because of the highly dynamic spectrum availability and the lack of ownership of the spectrum. Pre-sharing secrets (e.g., hopping sequences) is one of approaches to resist against jamming attacks. Senders and receivers exploit these secrets to establish communications. But in CRNs, pre-shared secrets is usually impractical because neighborhoods may dynamic change. Hence, antijamming channel hopping algorithm without pre-shared secrets become more and more important. Most of existing approaches, e.g., uncoordinated frequency hopping (UFH), either have unbounded rendezvous time or require role pre-assignment. Role pre-assignment is inapplicable since each SU may play sender or receiver simultaneously. In this paper, we propose an antijamming channel hopping algorithm without pre-shared secrets, Tri-CH, which has bounded rendezvous time and without role pre-assignment.
Kuo, Heng, and 郭恆. "A Fast Anti-Jamming Channel Hopping Algorithm for Cognitive Radio Networks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/x327am.
Повний текст джерела國立中央大學
資訊工程學系
104
Cognitive radio network (CRN) is a promising technology to solve unlicensed spectrum shortage problem and enhance the utilization of licensed spectrum. Channel hopping scheme are widely used to develop communication links between users (SU) in CRNs. However, existing channel hopping for CRNs, which have fixed hopping patterns, are extremely vulnerable to malicious attacks in CRNs. Most of existing anti-jamming CH protocols need pre-shared informations (e.g. hopping sequences) to the communication link between the communication pairs. Due to the nature of opportunistic spectrum access, pre sharing informations is impractical in CRNs. Hence, anti-jamming channel hopping approaches without pre-shared secrets have gained more and more research interests. For anti-jamming CH protocols without pre-shared informations, they either have unbounded time to rendezvous or require role pre-assignment (i.e. every SU is pre-assigned as either a sender or a receiver). Role pre-assignment is inapplicable to scenarios that a SU may be a sender and receiver simultaneously. In this paper, we propose an anti-jamming channel hopping algorithm, SP CH, with bounded rendezvous time, but without pre-shared secrets.
Li, Wei-Che, and 李瑋哲. "Load-aware Anti-jamming Channel Hopping Protocol for Cognitive Radio Networks." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/n6rn8e.
Повний текст джерела國立臺灣海洋大學
資訊工程學系
106
In cognitive radio networks (CRNs), secondary users (SUs) are vulnerable to malicious attacks because SU nodes do not own the spectrum, hence their opportunistic access cannot be protected from adversaries. Thus, how to design a channel hopping scheme to protect SU nodes from jamming attacks becomes an important issue in CRNs. Existing anti-jamming channel hopping schemes have some limitations: Some require SU nodes to exchange pre-shared secrets in advance; some require an SU node to be either a receiver or a sender, and some are not flexible enough. Furthermore, existing anti-jamming channel hopping schemes do not consider the issue that different nodes have different traffic loads. In this paper, we propose an anti-jamming channel hopping protocol, Load awareness anti-jamming channel hopping scheme (LAA). Nodes running LAA are able to change their channel hopping sequences based on their sending and receiving of traffic. Specifically, LAA uses extended Langford pairing (ELP) to provide rendezvous guarantee and load awareness. Simulation results show that LAA can improve up to 89% and 303% in average time to rendezvous and throughput, respectively.
Silva, Diogo Alexandre Martins da. "GPS jammimg and spoofing using software defined radio." Master's thesis, 2017. http://hdl.handle.net/10071/15244.
Повний текст джерелаO Sistema de Posicionamento Global (GPS) é actualmente o melhor exemplo e o mais usado Sistema de Navegação Global por Satélite (GNSS) e como maior parte dos veículos atuais dependem do posicionamento do GPS para terem autonomia, é importante perceber as vulnerabilidades do GPS e reconhecer as ameaças como o bloqueio e o jamming. Equipamentos para bloquear e fazer spoofing podem ser comprados online a um preço acessível. A tecnologia Software Defined Radio (SDR) traz a flexibilidade e provoca uma ainda maior diminuição de custo. Esta investigação tem como objectivo explorar esta tecnologia respondendo às seguintes questões: Existe uma combinação de forma de onda, potência e amplitude adequada para perturbar o sinal GPS? O bloqueio do GPS é igualmente fácil de realizar em software como é em hardware? Fazer spoofing ao GPS é mais fácil de realizar em software? O desenvolvimento deste trabalho consiste em dois testes: um teste de bloqueio ao GPS onde o foco é perceber qual a combinação de forma de onda, potência e amplitude que consegue bloquear o sinal GPS e um teste de spoofing ao GPS onde o HackRF One é usado para "enganar" um telemóvel. Os resultados do teste de bloqueio mostraram que o bloqueio ao GPS é fácil de realizar usando diferentes combinações, devido à baixa potência de sinal recebido dos receptores de GPS. O teste do spoofing provou que é possível fazer spoof a um telemóvel com uma configuração SDR com um custo acessível.
Teles, Diogo Santos Pinto da Costa. "Development of an Electronic Warfare Package." Master's thesis, 2019. http://hdl.handle.net/10400.26/30267.
Повний текст джерелаAtualmente, com o desenvolvimento e a redução de custos dos veículos não tripulados, as forças armadas em todo o mundo têm utilizado estes sistemas como substituto ou complemento aos sistemas tripulados. Devido às vantagens inerentes à sua utilização, têm havido inúmeras aplicações para estes sistemas. Uma das possíveis aplicações é a sua utilização como veículo para transporte de um pacote de Guerra Eletrónica. A Guerra Eletrónica, desde que os militares começaram a utilizar e a depender do espetro eletromagnético para alcançar os seus objetivos, tem sido uma das principais áreas da guerra de elevado interesse. Nesta dissertação, sugiro a criação de um módulo de Guerra Eletrónica com a capacidade de efetuar empastelamento e mistificação de a sistemas de comunicações, idealizado para ser implementado num veículo não tripulado, com programas dedicados para controlo remoto. Para isto, recorri à tecnologia do Radio Definido por Software assim como ao software GNU Radio, instalado num computador Raspberry Pi por forma a poder ser transportado também por pequenos veículos.
Lara, Karla Valentina de Freitas. "Jammers for mobile cellular systems applied to unauthorized UAVs." Master's thesis, 2020. http://hdl.handle.net/10071/21769.
Повний текст джерелаNeste estudo será feita uma abordagem ao jamming em sistemas móveis digitais, dando um maior foco inicial à tecnologia 2G, Sistema Global para Comunicações Móveis (GSM). O objetivo principal será o desenvolvimento de um sinal jammer, diferente dos já existentes em termos de eficiência e complexidade, capaz de causar interferência em sistemas móveis celulares. Será feito então uma análise às diferentes técnicas de interferência de sinal, capazes de perturbar a comunicação em sistemas móveis celulares, através da realização de simulações a partir da tecnologia Software Defined Radio (SDR) nomeadamente, a plataforma GNU Radio. As mesmas técnicas também serão estudadas e avaliadas num cenário real, de forma a fazer-se a seleção da melhor em termos de eficiência espectral, energia e complexidade. Finalmente, a técnica de jamming que demonstrar melhores resultados, irá representar o jammer que poderá contribuir de forma sustentável para a problemática da circulação de drones em zonas restritas, como aeroportos e zonas residenciais, para a diminuição dos acidentes, atualmente registados, com este tipo de aeronaves.
Stasko, Carly. "A Pedagogy of Holistic Media Literacy: Reflections on Culture Jamming as Transformative Learning and Healing." Thesis, 2009. http://hdl.handle.net/1807/18109.
Повний текст джерелаTomek, Prokop. "Československá redakce Radio Free Europe: historie a vliv na československé dějiny." Doctoral thesis, 2012. http://www.nusl.cz/ntk/nusl-326941.
Повний текст джерелаSemedo, Pedro Emanuel da Conceição. "Estudo de interferências nas comunicações móveis." Master's thesis, 2019. http://hdl.handle.net/10071/20091.
Повний текст джерелаSpectrum spreading techniques have been applied to military systems and important applications in the field of security and confidentiality of communications. Some of these techniques can be used in civilian environments, such as the 3th Generation (3G) that uses Code Division Multiple Access (CDMA) or 4G, Long Term Evolution (LTE), but it is in military applications that can have their full potential. In this dissertation, we will use spectrum spreading techniques in order to intentionally block mobile communication from any operator using 2G, 3G or 4G technologies, such as an WiFi network, since it can operate in the same frequency range. The communications operating in the intended frequency range can be blocked and the device that generates the potentially blocker signal is called a jammer. The frequencies used in the tests are those used by telecom operators resident in Portugal and will be intentionally affected by laboratory tests, intentionally but with very low power and within a reserved room, not to cause any interference in the neighborhood communications. The jammer was implemented on a BladeRFx40 hardware platform, which could be programmed by modified routines of the GNURadio open source library, allowing the creation of a hardware-free radio system that is commonly known by SDR (Software Defined Radio). Some tests were conducted using spread spectrum techniques, whose results are reported for a communication using a mobile phone in the national mobile network.
Silva, André Horácio Carvalho. "Physical-layer Security with Interference Generation by the Receiver." Master's thesis, 2020. http://hdl.handle.net/10316/92554.
Повний текст джерелаO sigilo contra recetores ilegítimos sempre foi uma preocupação principalmente com o crescimento de dispositivos sem fio, dado que não é possível direcionar uma determinada comunicação para um recetor específico. Embora a criptografia ajude a garantir o sigilo numa comunicação, baseia-se na premissa de "poder computacional inviável" para quebrar a segurança de um determinado esquema criptográfico. Os esquemas que de facto são inquebráveis são na realidade impraticáveis devido às suas restrições. Dito isto, nos últimos anos, foram feitos esforços na segurança a nível da camada física para atuar como um complemento aos esquemas criptográficos já existentes e implementados no intuito de melhorar a segurança de uma comunicação.Recentemente, foi proposto um esquema de codificação para sigilo denominado Scrambled Coding for Secrecy with a Hidden Key (SCS-HK) que se baseia na mistura de uma mensagem utilizando uma chave e codificando os dois utilizando um código de correção de erros. Alguns dos bits do código resultante são apagados antes da transmissão para garantir que apenas o recetor legítimo possa recuperar corretamente a informação, e portanto, recuperar a chave para descodificar a informação original. Esse esquema leva em consideração a existência de um canal de escuta, isto é, assume uma melhor relação sinal-ruído no canal para o recetor legítimo do que o canal para o recetor ilegítimo, o que permite o recetor legítimo recuperar os bits apagados.Essa vantagem do recetor legítimo sobre o ilegítimo é difícil de garantir todas as vezes, pelo que emergiram esquemas chamados de interferência cooperativa, onde outro transmissor ajuda a degradar o canal do recetor ilegítimo. No entanto, esse tipo de esquemas apresentam algumas desvantagens como a sincronização, a disposição de cooperação pela parte do ajudante dado que gasta a sua energia para deixar uma comunicação de outrem segura, e ainda, pode degradar o canal do recetor legítimo. Neste trabalho, abordamos esses problemas propondo a utilização do recetor como gerador de interferência e consequentemente aumentando a segurança na comunicação legítima. Além disso, isto elimina a dependência de terceiros (resolve a disposição para a cooperação), ajuda a resolver o problema da sincronização e facilita a remoção da interferência porque o recetor sabe as características do sinal de interferência gerado. Neste trabalho é utilizado o GNU-Radio e as Universal Software Radio Peripherals (USRP) B210 para desenvolver o esquema visionado.Nesta tese é apresentado: 1) Design e implementação de uma adaptação do esquema SCS-HK; 2) Implementação de um esquema de geração de interferência por parte do recetor legítimo, a sincronização e mecanismos/algoritmos de cancelamento da interferência própria (são estudados o Least Mean Squares, o Normalized Least Mean Squares, o Recursive Least Squares e o QR Decomposition Recursive Least Squares); 3) Experimentação e avaliação do SCS-HK e da geração de ruído pelo recetor, de forma independente e combinada, para um conjunto de cenários (um justo, um vantajoso para o recetor legítimo e outro vantajoso para o recetor ilegítimo).
Secrecy against illegitimate actors always been a concern mainly with the growth of wireless devices, since it is not possible to direct a transmission to a given single receptor. Though modern cryptography helps to ensure secrecy in a communication it settles on the premise of "computer power infeasible" to rely on the impossibility of breaking some cryptographic scheme. The information-theoretically secure schemes are unbreakable, however, are unpractical due its constraints. That said, in the past few years there have been efforts on physical layer security to act as a complement of the already existing and implemented modern cryptographic schemes in order to improve security of a communication.Recently it was proposed a coding for secrecy scheme called as Scrambled Coding for Secrecy with a Hidden Key (SCS-HK) which relies on scrambling the information with a random key, followed by encoding them together with an error correction code. Some of the bits of the resulted codeword are erased before the transmission to guarantee that only the legitimate receiver can correctly recover the message, and therefore, recover the key to descrambler into the original information. This scheme takes into account there is a wiretap channel, which assumes a better signal-to-noise ratio of the legitimate receiver's channel than the eavesdropper's channel, which enables the legitimate receiver recover the erased bits.This advantage of the legitimate receiver over illegitimate one is difficult to assure all times, leading to the emergence of cooperative jamming schemes, where another transmitter helps to degrade the eavesdropper's channel. However, this type of schemes has some drawbacks like synchronization, willingness of cooperation by the helper since he has to spend his own energy to make others secure and also can degrade the legitimate receiver’s channel. In this work, we address these drawbacks by proposing the use of the receiver as interference generator and consequently increasing security on a communication. Additionally, this removes a third-party dependency (resolves the willingness for cooperation), helps to solve the synchronization problem and it facilitates the removal of interference, because the receiving device knows the characteristics of the interference signal being generated. In this work is used GNU-Radio and the Universal Software Radio Peripherals (USRP) B210 to develop the envisioned scheme.In this thesis it is presented: 1) Design and implementation of an adapted SCS-HK scheme; 2) Implementation of an interference generation scheme by the legitimate receiver, and of the synchronization and Self-interference cancellation mechanisms/algorithms (the Least Mean Squares, Normalized Least Mean Squares, Recursive Least Squares and QR Decomposition Recursive Least Squares are studied); 3) Experimentation and evaluation of the SCS-HK scheme and the noise generation by the receiver, independently and combined, for a set of scenarios (one fair, one advantageous to the legitimate receiver and another advantageous to the illegitimate receiver).
Outro - This work was funded by the European Regional Development Fund (FEDER), through the Regional Operational Programme of Lisbon under Grant POR LISBOA 2020, by the Competitiveness and Internationalization Operational Programme (COMPETE 2020) of the Portugal 2020 framework [Project 5G with Nr. 024539 under Grant POCI-01-0247-FEDER-024539], and by FCT/MCTES through national funds and when applicable co-funded EU funds under the projects UIDB/EEA/50008/2020, PES3N (SAICT-45-2017-POCI-01-0145-FEDER-030629), SWING2 (PTDC/EEI-TEL/3684/2014).
Youssef, Ahmed. "Enhancement of target detection using software defined radar (SDR)." Thesis, 2018. https://dspace.library.uvic.ca//handle/1828/10403.
Повний текст джерелаGraduate
Chin-WangChen and 陳進旺. "Experimental Study on the Influence of the Aspect Ratio of Elliptical Grains on the Jamming Probability in a Two-Dimensional Rotating Hopper." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/56875291316037315733.
Повний текст джерелаChao-WeiChen and 陳晁偉. "On the effects of the aspect ratio on the jamming phenomenon of a dry elliptic granular matter in a two-dimensional hopper flow." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/89600400517033818986.
Повний текст джерела國立成功大學
土木工程學系碩博士班
98
In the present study, the EDEM simulation package, which is based on the discrete element method, is employed to study the effects of the aspect ratio on the jamming processes of a dry elliptic granular matter flowing from a two-dimensional hopper. In the simulations’ the aspect ratio is taken as the primary simulation parameter, while the volumes of the elliptic particles are kept unchanged at different aspect ratios. Numerical simulations show that the jamming probability increases as the aspect ratio increases. This is due to the facts that arching near the opening of the hopper is easier to be found in elliptic grains. In addition, it is also found that the average volume flow rate decreases as the aspect ratio increases.