Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (317)

Search Parameters:
Keywords = software-defined radio

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 675 KiB  
Article
Integration of DSRC, mmWave, and THz Bands in a 6G CR-SDVN
by Umair Riaz, Muhammad Rafid, Huma Ghafoor and Insoo Koo
Sensors 2025, 25(5), 1580; https://doi.org/10.3390/s25051580 - 4 Mar 2025
Viewed by 273
Abstract
To meet the growing needs of automobile users, and to provide services on demand with stable and efficient paths across different bands amidst this proliferation of users, an integrated approach to the software-defined vehicular network (SDVN) is proposed in this paper. Due to [...] Read more.
To meet the growing needs of automobile users, and to provide services on demand with stable and efficient paths across different bands amidst this proliferation of users, an integrated approach to the software-defined vehicular network (SDVN) is proposed in this paper. Due to the significant increase in users, DSRC is already considered insufficient to fulfill modern needs. Hence, to enhance network performance and fulfill the growing needs of users in SDVN environments, we implement cognitive technology by integrating the DSRC, mmWave, and THz bands to find stable paths among different nodes. To manage these different technologies, an SDN controller is employed as the main controller (MC), recording the global state of all nodes within the network. Channel sensing is conducted individually for each technology, and sensing results—representing the number of available bands for secondary communications—are updated periodically in the MC. Consequently, the MC manages connections by switching between DSRC, mmWave, and THz bands, providing stable paths between the source and destination. The switching decision is taken by considering both the distance from the MC and the availability of channels among these three technologies. This cognitive integration of bands in SDVN improves performance in terms of network delay, packet delivery, and overhead ratio. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Figure 1
<p>CR-SDVN for DSRC, mmWave, and THz communications in a city scenario.</p>
Full article ">Figure 2
<p>Coverage ranges of DSRC, mmWave, and THz bands.</p>
Full article ">Figure 3
<p>A flowchart representing the five cases in a 6G CR-SDVN.</p>
Full article ">Figure 4
<p>Our mobility model’s simulation environment.</p>
Full article ">Figure 5
<p>Performance comparisons for the 6G CR-SDVN in terms of PDR at 100 s and 150 s.</p>
Full article ">Figure 6
<p>Performance comparisons for the 6G CR-SDVN in terms of end-to-end delay at 100 s and 150 s.</p>
Full article ">Figure 7
<p>Performance comparisons for the 6G CR-SDVN in terms of ROR at 100 s and 150 s.</p>
Full article ">
24 pages, 3042 KiB  
Article
Global Navigation Satellite System Meta-Signals with an Arbitrary Number of Components
by Daniele Borio
Remote Sens. 2025, 17(4), 571; https://doi.org/10.3390/rs17040571 - 7 Feb 2025
Viewed by 369
Abstract
Global Navigation Satellite System (GNSS) meta-signals are obtained when components from different frequencies are jointly processed as a single entity. While most research work has focused on GNSS meta-signals made of two side-band components, meta-signal theory has been recently extended to the case [...] Read more.
Global Navigation Satellite System (GNSS) meta-signals are obtained when components from different frequencies are jointly processed as a single entity. While most research work has focused on GNSS meta-signals made of two side-band components, meta-signal theory has been recently extended to the case where the number of components is a power of two. This condition was dictated by the use of multicomplex numbers for the representation of GNSS meta-signals. Multicomplex numbers are multi-dimensional extensions of complex numbers whose dimension is a power of two. In this paper, the theory is further extended and a procedure for the construction of GNSS meta-signals with an arbitrary number of components is provided. Also in this case, multicomplex numbers are used to effectively represent a GNSS meta-signal. From this representation, multi-dimensional Cross Ambiguity Functions (CAFs) are obtained and used to derive acquisition and tracking algorithms suitable for the joint processing of components from different frequencies. The specific case with three components is analysed. Theoretical results are supported by experimental findings obtained by jointly processing Galileo E5a, E5b and E6 signals collected using three synchronized Software-Defined Radio (SDR) HackRF One front-ends. Experimental results confirm the validity of the developed theory. Full article
(This article belongs to the Special Issue Advances in Multi-GNSS Technology and Applications)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Construction of a GNSS meta-signal with three components. The Galileo E5a, E5b and E6 signals are combined using two subcarriers. With the ordering adopted, the AltBOC modulation is found on the bottom branch of the tree.</p>
Full article ">Figure 2
<p>Alternative option for the construction of a GNSS meta-signal based on the combination of the Galileo E5a, E5b and E6 signals. The AltBOC RF is now the nominal meta-signal carrier frequency.</p>
Full article ">Figure 3
<p>General procedure for the construction of GNSS meta-signals with an arbitrary number of components. <span class="html-italic">K</span> is the number of components considered.</p>
Full article ">Figure 4
<p>Construction of a GNSS meta-signal with five components. All the five BDS III signals are combined using four subcarriers.</p>
Full article ">Figure 5
<p>General representation of the joint acquisition process of <span class="html-italic">K</span> components from different frequencies using multicomplex numbers.</p>
Full article ">Figure 6
<p>Schematic representation of a multicomplex tracking architecture for jointly processing <span class="html-italic">K</span> signal components from different frequencies. Multicomplex operations and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>−</mo> <mn>1</mn> </mrow> </semantics></math> SPLLs are used.</p>
Full article ">Figure 7
<p>Schematic representation of a possible implementation of multicomplex PLL/SPLLs using standard components. The multicomplex PLL/SPLLs can be implemented using single-frequency standard PLLs sharing a joint multi-dimensional loop filter.</p>
Full article ">Figure 8
<p>Schematic representation of the multi-dimensional joint loop filter adopted for the PLL/SPLL implementation.</p>
Full article ">Figure 9
<p>CAFs computed considering the Galileo E6, E5b and E5a components. (<b>a</b>) E5a component. (<b>b</b>) E5b component. (<b>c</b>) E6 component. (<b>d</b>) Combined triple-component CAF.</p>
Full article ">Figure 10
<p>Pilot prompt correlator outputs obtained using the quad-loop architecture jointly tracking the E6 (upper plot), E5b (middle plot) and E5a (lower plot) components.</p>
Full article ">Figure 11
<p>(<b>Left</b>) Normalized code, carrier and subcarrier Doppler estimates from the DLL, PLL and two SPLLs used to jointly track the E6, E5b and E5a components. (<b>Right</b>) Zoom of the carrier and subcarrier Doppler estimates.</p>
Full article ">Figure 12
<p>Comparison between <math display="inline"><semantics> <mrow> <mi>C</mi> <mo>/</mo> <msub> <mi>N</mi> <mn>0</mn> </msub> </mrow> </semantics></math> estimates obtained using the meta-signal tracking architecture with three components and single-component tracking loops.</p>
Full article ">
26 pages, 17033 KiB  
Article
Cost-Effective Satellite Ground Stations in Real-World Development for Space Classrooms
by Pirada Techavijit and Polkit Sukchalerm
Aerospace 2025, 12(2), 105; https://doi.org/10.3390/aerospace12020105 - 30 Jan 2025
Viewed by 870
Abstract
This paper presents the development and outcomes of a cost-effective satellite ground station designed as a learning tool for satellite communication and wireless communication education. The study investigates accessible satellites and the methods for accessing them. The developed ground station has the capability [...] Read more.
This paper presents the development and outcomes of a cost-effective satellite ground station designed as a learning tool for satellite communication and wireless communication education. The study investigates accessible satellites and the methods for accessing them. The developed ground station has the capability to access satellites in the V, U, and L frequency bands, allowing it to receive a variety of satellite data. This includes full-disk meteorological images, high-resolution multispectral images, and scientific data from payloads of satellites in both low Earth orbit (LEO) and geostationary orbit (GEO). The ground station demonstrates capabilities similar to those of large organizations but at a significantly lower cost. This is achieved through a process of identifying educational requirements and optimizing the system for cost-efficiency. This paper presents the design demonstration, actual construction of the ground station, and results. Additionally, it compiles characteristics from real signal reception experiences from various satellites. Full article
(This article belongs to the Section Astronautics & Space Science)
Show Figures

Figure 1

Figure 1
<p>Ground station implement according to this research paper. (<b>a</b>) L-band station, (<b>b</b>) terrestrial and LEO satellite station, (<b>c</b>) ground control system.</p>
Full article ">Figure 2
<p>The ground stations and space classrooms: (<b>a</b>) space classroom, (<b>b</b>) control station in the space classroom, (<b>c</b>) ground stations for learning components.</p>
Full article ">Figure 3
<p>Examples of satellites that the satellite ground station in this research can receive and decode signals from.</p>
Full article ">Figure 4
<p>Circuit of ground station receiver.</p>
Full article ">Figure 5
<p>Conceptual design of satellite ground station.</p>
Full article ">Figure 6
<p>System diagram from antennas to SDR server (numbers in figure refer to BOM in <a href="#aerospace-12-00105-t004" class="html-table">Table 4</a>).</p>
Full article ">Figure 7
<p>L-band antenna system: (<b>a</b>) helical feed 2.5 turns with LHCP and LNA with SAW filter and (<b>b</b>) 1.9 m dish antenna setup.</p>
Full article ">Figure 8
<p>Terrestrial and LEO satellite antenna system. (<b>a</b>) Yagi-Uda antenna system, (<b>b</b>) Grid antenna with LPDA feed.</p>
Full article ">Figure 9
<p>Antenna rotator system: (<b>a</b>) Yaesu G-5500 rotator, (<b>b</b>) the diagram of the rotator controller, (<b>c</b>) the error values from the azimuth axis, and (<b>d</b>) the error values from the elevation axis.</p>
Full article ">Figure 10
<p>SDR server: (<b>a</b>) SDR server of satellite ground station and (<b>b</b>) software diagram on computer.</p>
Full article ">Figure 11
<p>Directional antenna patterns: (<b>a</b>) Yagi–Uda VHF test on 145 MHz, (<b>b</b>) Yagi–Uda UHF antenna tested on 437 MHz, (<b>c</b>) grid antenna of 60 cm × 90 cm tested on 1600 MHz, and (<b>d</b>) dish antenna 1.9 m tested on 1700 MHz.</p>
Full article ">Figure 12
<p>Satellite images from FY-2H after the software process.</p>
Full article ">Figure 13
<p>Raw images downloaded from FY-2H.</p>
Full article ">Figure 14
<p>Image from Electro-L N3 after the software process.</p>
Full article ">Figure 15
<p>Raw images from Electro-L N3.</p>
Full article ">Figure 16
<p>Images from Electro-L N3 after the software process.</p>
Full article ">Figure 17
<p>Image from Electro-L N4 after the software process.</p>
Full article ">Figure 18
<p>Images from GK-2A after the SatDump process.</p>
Full article ">Figure 19
<p>Images form GK-2A: (<b>a</b>) Raw image download, and (<b>b</b>) Meteorological data of surface pressure analysis map.</p>
Full article ">Figure 20
<p>Satellite images from NOAA-19 after the process from WXtoImg (<b>a</b>) Natural color composite image showing cloud cover and land features. (<b>b</b>) False-color composite image highlighting cloud intensity and convection areas.</p>
Full article ">Figure 21
<p>STD−C data from Inmarsat4−F2.</p>
Full article ">Figure 22
<p>Inmarsat Aero from Inmarsat4−F2. The waterfall graph represents signal intensity over time. Brighter colors represent stronger signals, while darker colors indicate weaker or no signals.</p>
Full article ">Figure 23
<p>ADS-B data.</p>
Full article ">
36 pages, 16208 KiB  
Article
End-to-End Power Models for 5G Radio Access Network Architectures with a Perspective on 6G
by Bhuvaneshwar Doorgakant, Tulsi Pawan Fowdur and Mobayode O. Akinsolu
Mathematics 2025, 13(3), 466; https://doi.org/10.3390/math13030466 - 30 Jan 2025
Viewed by 598
Abstract
5G, the fifth-generation mobile network, is predicted to significantly increase the traditional trajectory of energy consumption. It now uses four times as much energy as 4G, the fourth-generation mobile network. As a result, compared to previous generations, 5G’s increased cell density makes energy [...] Read more.
5G, the fifth-generation mobile network, is predicted to significantly increase the traditional trajectory of energy consumption. It now uses four times as much energy as 4G, the fourth-generation mobile network. As a result, compared to previous generations, 5G’s increased cell density makes energy efficiency a top priority. The objective of this paper is to formulate end-to-end power consumption models for three different 5G radio access network (RAN) deployment architectures, namely the 5G distributed RAN, the 5G centralized RAN with dedicated hardware and the 5G Cloud Centralized-RAN. The end-to-end modelling of the power consumption of a complete 5G system is obtained by combining the power models of individual components such as the base station, the core network, front-haul, mid-haul and backhaul links, as applicable for the different architectures. The authors considered the deployment of software-defined networking (SDN) at the 5G Core network and gigabit passive optical network as access technology for the backhaul network. This study examines the end-to-end power consumption of 5G networks across various architectures, focusing on key dependent parameters. The findings indicate that the 5G distributed RAN scenario has the highest power consumption among the three models evaluated. In comparison, the centralized 5G and 5G Cloud C-RAN scenarios consume 12% and 20% less power, respectively, than the Centralized RAN solution. Additionally, calculations reveal that base stations account for 74% to 78% of the total power consumption in 5G networks. These insights helped pioneer the calculation of the end-to-end power requirements of different 5G network architectures, forming a solid foundation for their sustainable implementation. Furthermore, this study lays the groundwork for extending power modeling to future 6G networks. Full article
Show Figures

Figure 1

Figure 1
<p>5G D-RAN end-to-end power consumption model.</p>
Full article ">Figure 2
<p>Backhaul connectivity over GPON/NGPON technology.</p>
Full article ">Figure 3
<p>SDN architecture (adapted from [<a href="#B12-mathematics-13-00466" class="html-bibr">12</a>]).</p>
Full article ">Figure 4
<p>NG-RAN architecture (adapted from [<a href="#B4-mathematics-13-00466" class="html-bibr">4</a>]).</p>
Full article ">Figure 5
<p>A standard Cloud C-RAN power consumption model with virtualized CU and DU.</p>
Full article ">Figure 6
<p>A variation of the BS power consumption (<math display="inline"><semantics> <mrow> <msub> <mrow> <mi>P</mi> <mi>W</mi> </mrow> <mrow> <mi>B</mi> <mi>S</mi> </mrow> </msub> </mrow> </semantics></math>) with <math display="inline"><semantics> <mrow> <mi>K</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Variation of the <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>P</mi> <mi>W</mi> </mrow> <mrow> <mi>B</mi> <mi>S</mi> </mrow> </msub> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>N</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Variation of the <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>P</mi> <mi>W</mi> </mrow> <mrow> <mi>B</mi> <mi>L</mi> </mrow> </msub> </mrow> </semantics></math> with the number of RUs.</p>
Full article ">Figure 9
<p>A variation of the core network power consumption with network size (<math display="inline"><semantics> <mrow> <mi>n</mi> </mrow> </semantics></math>).</p>
Full article ">Figure 10
<p>Changes in the end-to-end power usage for 5G D-RAN scenarios based on the number of active antennae.</p>
Full article ">Figure 11
<p>Breakdown of the 5G-DRAN’s end-to-end power usage.</p>
Full article ">Figure 12
<p>Changes in the 5G C-RAN scenario’s BS power consumption with active antennas.</p>
Full article ">Figure 13
<p>Power usage per port during the mid-haul changes with transmission rate.</p>
Full article ">Figure 14
<p>The change in the total power consumption of 5G C-RAN with <math display="inline"><semantics> <mrow> <mi>K</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 15
<p>Power consumption breakdown for the various network segments in a 5G C-RAN scenario.</p>
Full article ">Figure 16
<p>VRAN power usage fluctuation with active RRUs.</p>
Full article ">Figure 17
<p>The variation in the overall power usage for VRAN 5G with active RUs.</p>
Full article ">Figure 18
<p>Power consumption breakdown for various network segments in the VRAN-based 5G network.</p>
Full article ">Figure 19
<p>Comparative analysis for PW<sub>DEC</sub>, PW<sub>HCR</sub>, and PW<sub>VCR</sub>.</p>
Full article ">Figure 20
<p>A comparison of the end-to-end power usage of 5G networks.</p>
Full article ">
23 pages, 12069 KiB  
Article
A Compact Stepped Frequency Continuous Waveform Through-Wall Radar System Based on Dual-Channel Software-Defined Radio
by Xinhui Li, Shengbo Ye, Zihao Wang, Yubing Yuan, Xiaojun Liu, Guangyou Fang and Deyun Ma
Electronics 2025, 14(3), 527; https://doi.org/10.3390/electronics14030527 - 28 Jan 2025
Viewed by 579
Abstract
Software-defined radio (SDR) has high flexibility and low cost. It conforms to the miniaturization, lightweight, and digitization trends in through-wall radar systems. Stepped frequency continuous waveform (SFCW) is commonly used in through-wall radar, which has high resolution and strong anti-interference ability. This article [...] Read more.
Software-defined radio (SDR) has high flexibility and low cost. It conforms to the miniaturization, lightweight, and digitization trends in through-wall radar systems. Stepped frequency continuous waveform (SFCW) is commonly used in through-wall radar, which has high resolution and strong anti-interference ability. This article develops an SFCW through-wall radar system based on a dual-channel SDR platform. Without changing hardware structure and complicated accessories, a phase compensation method of solving the phase incoherence problem in a low-cost dual-channel SDR platform is proposed. In addition, this article proposes a wall clutter mitigation approach by means of singular value decomposition (SVD) and principal component analysis (PCA) framework for through-wall applications. This approach can process the wall clutter and noise efficiently, and then extract the target subspace to obtain location information. The experimental results indicate that the proposed windowing-based SVD-PCA approach is effective for the developed radar system, which can ensure the accuracy of through-wall detection. It is also superior to the traditional methods in terms of the image quality of range profiles or signal-to-noise ratio (SNR). Full article
Show Figures

Figure 1

Figure 1
<p>The structure of the SDR-based through-wall radar system. And the general hardware structure of low-cost SDR this article used.</p>
Full article ">Figure 2
<p>System configuration and the phase compensation procedure.</p>
Full article ">Figure 3
<p>Preprocess for the received signal. A before-and-after comparison of windowing smoothing for distortion.</p>
Full article ">Figure 4
<p>The phase incoherence problem: (<b>a</b>) The received signals at different LO frequencies for channel 1; (<b>b</b>) Relative time delays of the remaining 126 step frequency points with reference to the first step frequency point for channel 1; (<b>c</b>) Phase offsets of two channels in the same A-scan and the phase offset between channel 1 and channel 2.</p>
Full article ">Figure 5
<p>The process of SFCW pulse compression.</p>
Full article ">Figure 6
<p>Time domain results of the loopback experimental measurement: (<b>a</b>) 15 cm cable for reference channel; (<b>b</b>) 4 m cable for measurement channel; (<b>c</b>) The length difference between measurement channel and reference channel after phase compensation.</p>
Full article ">Figure 7
<p>Time domain results of the metal plate position estimation experiments: (<b>a</b>) Metal plate was placed 2.65 m away from antennas; (<b>b</b>) Metal plate was placed 0.84 m away from antennas.</p>
Full article ">Figure 8
<p>The workflow of the windowing-based SVD-PCA approach.</p>
Full article ">Figure 9
<p>The scene of wall-penetrating experiment.</p>
Full article ">Figure 10
<p>Wall-penetrating reflection results in time domain.</p>
Full article ">Figure 11
<p>The scene of static human target detection experiments.</p>
Full article ">Figure 12
<p>The scene of sitting human target detection experiment.</p>
Full article ">Figure 13
<p>One-dimensional range profiles of through-wall sitting human target detection: (<b>a</b>) One-dimensional range profiles using no method, BS method, MS method, and SVD method, respectively; (<b>b</b>) Comparison of normalization results between SVD method, PCA method, and SVD-PCA method.</p>
Full article ">Figure 14
<p>Two-dimensional range profiles of through-wall sitting human target detection: (<b>a</b>) Unprocessed result; (<b>b</b>) The result of BS method; (<b>c</b>) The result of MS method; (<b>d</b>) The result of SVD method; (<b>e</b>) The result of PCA method; (<b>f</b>) The result of SVD-PCA method.</p>
Full article ">Figure 15
<p>The scene of a standing human target detection experiment.</p>
Full article ">Figure 16
<p>One-dimensional range profiles of through-wall standing human target detection: (<b>a</b>) One-dimensional range profiles using no method, BS method, MS method and SVD method, respectively; (<b>b</b>) Comparison of normalization results between SVD method, PCA method and SVD-PCA method.</p>
Full article ">Figure 17
<p>Two-dimensional range profiles of through-wall standing human target detection: (<b>a</b>) Unprocessed result; (<b>b</b>) The result of BS method; (<b>c</b>) The result of MS method; (<b>d</b>) The result of SVD method; (<b>e</b>) The result of PCA method; (<b>f</b>) The result of SVD-PCA method.</p>
Full article ">Figure 18
<p>Three-dimensional graphics of SVD-PCA method in two scenarios: (<b>a</b>) The result of experiment on detecting the sitting state of human target; (<b>b</b>) The result of experiment on detecting standing state of human target.</p>
Full article ">
17 pages, 1899 KiB  
Article
Deep Learning-Based Gain Estimation for Multi-User Software-Defined Radios in Aircraft Communications
by Viraj K. Gajjar and Kurt L. Kosbar
Signals 2025, 6(1), 3; https://doi.org/10.3390/signals6010003 - 22 Jan 2025
Viewed by 502
Abstract
It may be helpful to integrate multiple aircraft communication and navigation functions into a single software-defined radio (SDR) platform. To transmit these multiple signals, the SDR would first sum the baseband version of the signals. This outgoing composite signal would be passed through [...] Read more.
It may be helpful to integrate multiple aircraft communication and navigation functions into a single software-defined radio (SDR) platform. To transmit these multiple signals, the SDR would first sum the baseband version of the signals. This outgoing composite signal would be passed through a digital-to-analog converter (DAC) before being up-converted and passed through a radio frequency (RF) amplifier. To prevent non-linear distortion in the RF amplifier, it is important to know the peak voltage of the composite. While this is reasonably straightforward when a single modulation is used, it is more challenging when working with composite signals. This paper describes a machine learning solution to this problem. We demonstrate that a generalized gamma distribution (GGD) is a good fit for the distribution of the instantaneous voltage of the composite waveform. A deep neural network was trained to estimate the GGD parameters based on the parameters of the modulators. This allows the SDR to accurately estimate the peak of the composite voltage and set the gain of the DAC and RF amplifier, without having to generate or directly observe the composite signal. Full article
Show Figures

Figure 1

Figure 1
<p>Typical communication links of an aircraft [<a href="#B3-signals-06-00003" class="html-bibr">3</a>].</p>
Full article ">Figure 2
<p>SDR-based implementation of an aircraft’s communication links [<a href="#B3-signals-06-00003" class="html-bibr">3</a>]. An SDR generates and sums multiple baseband waveforms, and the resulting composite signal is then amplified and up-converted for transmission.</p>
Full article ">Figure 3
<p>Time domain representation of a composite signal. Its peak amplitude, <span class="html-italic">u</span>, is key to selecting the DAC’s input gain, <span class="html-italic">G</span>, so that the waveform uses the DAC’s full range.</p>
Full article ">Figure 4
<p>Frequency domain representation of a composite signal [<a href="#B3-signals-06-00003" class="html-bibr">3</a>].</p>
Full article ">Figure 5
<p>Four common distributions that closely fit composite signals [<a href="#B3-signals-06-00003" class="html-bibr">3</a>].</p>
Full article ">Figure 6
<p>DNN used to estimate GGD’s parameters.</p>
Full article ">Figure 7
<p>Average MAE training and validation loss trends across 10-fold cross-validation.</p>
Full article ">Figure 8
<p><math display="inline"><semantics> <msup> <mi>R</mi> <mn>2</mn> </msup> </semantics></math> plot for each of the individual parameters of the GGD, estimated using the DNN.</p>
Full article ">Figure 9
<p>Trend in MAE on the hold-out test set with increasing amounts of training data, expressed as a percentage of the total dataset used for training.</p>
Full article ">Figure 10
<p>Trends in MAE as more component signals are added to the composite signal.</p>
Full article ">Figure 11
<p>Trends in <math display="inline"><semantics> <msup> <mi>R</mi> <mn>2</mn> </msup> </semantics></math> score as more component signals are added to the composite signal.</p>
Full article ">Figure 12
<p><math display="inline"><semantics> <msup> <mi>R</mi> <mn>2</mn> </msup> </semantics></math> score comparison for S-DNN and DNN.</p>
Full article ">Figure 13
<p>CDF of the combined signal estimated using the DNN.</p>
Full article ">
33 pages, 703 KiB  
Article
Estimating Word Lengths for Fixed-Point DSP Implementations Using Polynomial Chaos Expansions
by Mushfiqur Rahman and Nicola Nicolici
Electronics 2025, 14(2), 365; https://doi.org/10.3390/electronics14020365 - 17 Jan 2025
Viewed by 618
Abstract
Efficient custom hardware motivates the use of fixed-point arithmetic in the implementation of digital signal-processing (DSP) algorithms. This conversion to finite precision arithmetic introduces quantization noise in the system, which affects the system’s performance. As a result, characterizing quantization noise and its effects [...] Read more.
Efficient custom hardware motivates the use of fixed-point arithmetic in the implementation of digital signal-processing (DSP) algorithms. This conversion to finite precision arithmetic introduces quantization noise in the system, which affects the system’s performance. As a result, characterizing quantization noise and its effects within a DSP system is a challenge that must be addressed to avoid over-allocating hardware resources during implementation. Polynomial chaos expansion (PCE) is a method used to model uncertainty in engineering systems. Although it has been employed to analyze quantization effects in DSP systems, previous investigations have been limited in scope and scale. This paper introduces new techniques that allow the application of PCE to be scaled up to larger DSP blocks with many noise sources, as needed for building blocks in software-defined radios (SDRs). Design space exploration algorithms that leverage the accuracy of PCE to estimate bit widths for fixed-point implementations of DSP blocks in an SDR system are explored, and their advantages will be presented. Full article
Show Figures

Figure 1

Figure 1
<p>Truncation quantizer.</p>
Full article ">Figure 2
<p>Scaling operation.</p>
Full article ">Figure 3
<p>Addition/subtraction operation.</p>
Full article ">Figure 4
<p>Multiplication operation.</p>
Full article ">Figure 5
<p>Delay operation.</p>
Full article ">Figure 6
<p>Simple DSP system.</p>
Full article ">Figure 7
<p>Histogram of actual and PCE-predicted distributions at the output.</p>
Full article ">Figure 8
<p>DFG with noise nodes added.</p>
Full article ">Figure 9
<p>Histogram of actual and PCE-predicted noise distributions at output.</p>
Full article ">Figure 10
<p>SNR estimate vs. number of MC samples.</p>
Full article ">Figure 11
<p>Data flow graph for a third-order Taylor series approximation of <math display="inline"><semantics> <mrow> <mi>sin</mi> <mo>(</mo> <mi>x</mi> <mo>)</mo> </mrow> </semantics></math> around <math display="inline"><semantics> <mrow> <mi>x</mi> <mo>=</mo> <msub> <mi>x</mi> <mn>0</mn> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 12
<p>Histogram of the predicted and actual noise distribution, along with the bit-widths corresponding to 15 dB.</p>
Full article ">Figure 13
<p>Data Flow Graph for an FM Demodulator.</p>
Full article ">Figure 14
<p>FM demodulator histogram of predicted and actual noise distribution with bit widths corresponding to 70 dB.</p>
Full article ">Figure 15
<p>Single pole IIR filter.</p>
Full article ">Figure 16
<p>Convergence of signal power at the IIR filter output.</p>
Full article ">Figure 17
<p>N-Tap FIR filter.</p>
Full article ">Figure 18
<p>Phase-locked loop data flow graph.</p>
Full article ">Figure 19
<p>Convergence of signal power at the PLL output.</p>
Full article ">
34 pages, 25702 KiB  
Article
Software-Defined Radio-Based Internet of Things Communication Systems: An Application for the DASH7 Alliance Protocol
by Dennis Joosens, Noori BniLam, Rafael Berkvens and Maarten Weyn
Appl. Sci. 2025, 15(1), 333; https://doi.org/10.3390/app15010333 - 31 Dec 2024
Viewed by 984
Abstract
Software-Defined Radio (SDR) technology has been a very popular and powerful prototyping device for decades. It finds applications in both fundamental research or application-oriented tasks. Additionally, the continuing rise of the Internet of Things (IoT) necessitates the validation, processing, and decoding of a [...] Read more.
Software-Defined Radio (SDR) technology has been a very popular and powerful prototyping device for decades. It finds applications in both fundamental research or application-oriented tasks. Additionally, the continuing rise of the Internet of Things (IoT) necessitates the validation, processing, and decoding of a large number of received signals. This is where SDRs can be a valuable instrument. In this work, we present an open-source software system using GNU Radio and SDRs, which improves the comprehension of the physical layer aspects of Internet of Things communication systems. Our implementation is generic and application-agnostic. Therefore, it can serve as a learning and investigation instrument for any IoT communication system. Within this work, we implement the open-source DASH7 Alliance Protocol (D7AP). The developed software tool can simulate synthetic DASH7 signals, process recorded data sets, and decode the received DASH7 packets in real time using an SDR front-end. The software is accompanied by three data sets collected in controlled, indoor, and suburban environments. The experimental results revealed that the total packet losses of the data sets were 0%, 2.33%, and 16.67%, respectively. Simultaneously, the three data sets were received by a dedicated DASH7 gateway with total packet losses of 0%, 3.83%, and 7.92%, respectively. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

Figure 1
<p>Functional block diagram of a direct conversion or zero-IF-based SDR architecture. Note that the parallel lines indicate that this process is repeated; i.e., one flow is dedicated to the in-phase data stream and one flow to the quadrature data stream.</p>
Full article ">Figure 2
<p>Concept of an in-phase and quadrature modulator and demodulator.</p>
Full article ">Figure 3
<p>Two−dimensional spectrogram of ten modulated DASH7 packets seen over a time span of 1.4 s and a bandwidth of 200 kHz.</p>
Full article ">Figure 4
<p>Three−dimensional spectrogram of ten modulated DASH7 packets seen over 1.4 s and a bandwidth of 200 kHz.</p>
Full article ">Figure 4 Cont.
<p>Three−dimensional spectrogram of ten modulated DASH7 packets seen over 1.4 s and a bandwidth of 200 kHz.</p>
Full article ">Figure 5
<p>DASH7 packet structure.</p>
Full article ">Figure 6
<p>Packet to symbols conversion flowgraph. The data formatting box exploits three vector sources and a multiplexer block. The respective parameters control the values of the vector sources. The second blue-framed box implements the mapping of the bytes to real values. The byte’s parallel values are converted into a series of symbols, where the 0 b is represented by −1 and the 1 b is represented by 1. The mapped packet is presented in <a href="#applsci-15-00333-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 7
<p>DASH7-mappedpacket structure as seen in the time domain. The figure shows the preamble followed by the sync word and the whitened payload, respectively.</p>
Full article ">Figure 8
<p>The upsampling process and shape filter process in GNU Radio, which is achieved with an interpolating FIR filtering.</p>
Full article ">Figure 9
<p>The upsampled and pulse-shaped waveform as seen in the time domain.</p>
Full article ">Figure 10
<p>Flowgraph of the GFSK modulation. The FSK modulation mainly consists of an IIR filter with configurable taps that act as an integrator and a phase to complex value block.</p>
Full article ">Figure 11
<p>Frequency response of a baseband-modulated DASH7 signal.</p>
Full article ">Figure 12
<p>Fixed-frequency demodulator using recorded data while tuned to channel 0 using the Lo-Rate channel class.</p>
Full article ">Figure 13
<p>Demodulation process. The phase is extracted from the data signal and consecutively accumulated while high-frequency noise is filtered out.</p>
Full article ">Figure 14
<p>Final GNU Radio flowgraph, where the demodulated samples are time-synchronized and put through a matched filter. After this step, a tag is added when a correlation is found to a predefined preamble and sync word sequence. Finally, the message is PN9-decoded, a CRC check is applied, and the output will be printed to the console window.</p>
Full article ">Figure 15
<p>Decoded output of a DASH7 packet with a length of 25 bytes as seen in the console window of GNU Radio. The packet has a payload of three bytes [0x00, 0xAB, 0xCD] followed by two CRC bytes.</p>
Full article ">Figure 16
<p>Indoor and suburban measurement setup consisting of three DASH7 nodes and three DASH7 gateways which send and receive on different Lo-Rate channels. The setup was extended with an Ettus Research (Austin, TX, USA) USRP B210 SDR, which received the transmissions of the DASH7 nodes and stored these transmissions as raw I/Q data. These captured data were investigated during post-processing analysis.</p>
Full article ">Figure 17
<p>A cabled measurement setup consists of a DASH7 gateway, a DASH7 node having a 40 dB attenuator and a Software-Defined Radio, which are connected through coaxial cables.</p>
Full article ">Figure 18
<p>Map of the indoor measurement environment. The 10 TX locations are shown as green pins while the receiving setup, i.e., the SDR and DASH7 gateways, are positioned at the red RX pin. The office spans an area of 64 by 24 m.</p>
Full article ">Figure 19
<p>Map of the suburban measurement environment. The 21 TX locations are shown as green pins while the receiving setup, i.e., the SDR and DASH7 gateways, are positioned at the red RX pin The blue marker indicates measurement point 21.</p>
Full article ">Figure 20
<p>Overview of the relation between RSSI and distance for each received channel measured at the suburban environment. The “N” stands for NLOS locations.</p>
Full article ">Figure 21
<p>An overview of the relationship between distance and packet loss based on measurements from the suburban environment. The data for each received channel were captured by the SDR. The “N” stands for NLOS locations.</p>
Full article ">Figure 22
<p>An overview of the relationship between distance and packet loss based on measurements from the suburban environment. The data for each received channel were captured by dedicated DASH7 gateways. The “N” stands for NLOS locations.</p>
Full article ">Figure A1
<p>Implementation of the FEC operation in DASH7 starting with a convolutional encoder with configuration (n,k,m) = (2,1,3), where n is the number of output bits, k is the number of input bits, and m is the number of shift register stages supplemented with the 4 × 4 matrix interleaver.</p>
Full article ">Figure A2
<p>Buffer 1 and 2.</p>
Full article ">Figure A3
<p>Buffer 3 and 4.</p>
Full article ">Figure A4
<p>PN9 coding circuit.</p>
Full article ">Figure A5
<p>Operation of the PN9 generator.</p>
Full article ">
13 pages, 2554 KiB  
Article
RF Fingerprinting Using Transient-Based Identification Signals at Sampling Rates Close to the Nyquist Limit
by Selçuk Taşcıoğlu, Aykut Kalaycıoğlu, Memduh Köse and Gokhan Soysal
Electronics 2025, 14(1), 4; https://doi.org/10.3390/electronics14010004 - 24 Dec 2024
Cited by 1 | Viewed by 621
Abstract
Radio frequency (RF) fingerprinting is regarded as a promising solution to improve wireless security, especially in applications where resource-limited devices are employed. Unlike steady-state signals, such as preambles or data, the use of short-duration transient signals for RF fingerprinting offers distinct advantages for [...] Read more.
Radio frequency (RF) fingerprinting is regarded as a promising solution to improve wireless security, especially in applications where resource-limited devices are employed. Unlike steady-state signals, such as preambles or data, the use of short-duration transient signals for RF fingerprinting offers distinct advantages for systems with low latency and low complexity requirements. One of the challenges associated with transient-based methods in practice is achieving high performance while utilizing low-cost receivers. In this study, we demonstrate for the first time that the performance of transient-based RF fingerprinting can be enhanced by designing the filter chain in a software defined radio (SDR) receiver, taking into account the relevant signal characteristics. The performance analysis is conducted using transient-based identification signals captured by the SDR receiver, focusing on the sampling rate and duration of the identification signal. In the experiments, signals collected from twenty IEEE 802.11 transmitters are used. Experimental results indicate that so long as the receiver filter parameters and the duration of the identification signal are properly determined, a high classification performance exceeding 92% can be achieved for transient-based RF fingerprinting, even at sampling rates approaching the Nyquist limit. Full article
(This article belongs to the Special Issue Physical Layer Security for Future Wireless Systems)
Show Figures

Figure 1

Figure 1
<p>Block diagram of the RF fingerprinting system containing the design of receiver filter chain.</p>
Full article ">Figure 2
<p>Instantaneous amplitude values of a captured Wi-Fi signal.</p>
Full article ">Figure 3
<p>SDR receiver (<b>left</b>) and IEEE 802.11 transmitters (<b>right</b>).</p>
Full article ">Figure 4
<p>Overall characteristic of the designed filter chain for sampling rate of 40 MS/s.</p>
Full article ">Figure 5
<p>Power spectral densities of signals obtained using the default filter chain for sampling rates of (<b>a</b>) 20 MS/s and (<b>b</b>) 40 MS/s.</p>
Full article ">Figure 6
<p>Power spectral densities of signals obtained using the designed filter chain for sampling rates of (<b>a</b>) 20 MS/s and (<b>b</b>) 40 MS/s.</p>
Full article ">Figure 7
<p>The classification performance results for the designed and default filter chains for SNR values of (<b>a</b>) 15 dB and (<b>b</b>) 30 dB.</p>
Full article ">Figure 8
<p>Classification performance results for different sampling rates and identification signal durations for the designed filter at the SNR value of 15 dB.</p>
Full article ">Figure 9
<p>Classification performance results for different sampling rates and identification signal durations for the designed filter at the SNR value of 30 dB.</p>
Full article ">
23 pages, 2544 KiB  
Article
Hybrid Artificial-Intelligence-Based System for Unmanned Aerial Vehicle Detection, Localization, and Tracking Using Software-Defined Radio and Computer Vision Techniques
by Pablo López-Muñoz, Luis Gimeno San Frutos, Christian Abarca, Francisco José Alegre, Jose Luis Calle and Jose F. Monserrat
Telecom 2024, 5(4), 1286-1308; https://doi.org/10.3390/telecom5040064 - 11 Dec 2024
Viewed by 1198
Abstract
The proliferation of drones in civilian environments has raised growing concerns about their misuse, highlighting the need to develop efficient detection systems to protect public and private spaces. This article presents a hybrid approach for UAV detection that combines two artificial-intelligence-based methods to [...] Read more.
The proliferation of drones in civilian environments has raised growing concerns about their misuse, highlighting the need to develop efficient detection systems to protect public and private spaces. This article presents a hybrid approach for UAV detection that combines two artificial-intelligence-based methods to improve system accuracy. The first method uses a software-defined radio (SDR) to analyze the radio spectrum, employing autoencoders to detect drone control signals and identify the presence of these devices. The second method is a computer vision module consisting of fixed cameras and a PTZ camera, which uses the YOLOv10 object detection algorithm to identify UAVs in real time from video sequences. Additionally, this module integrates a localization and tracking algorithm, allowing the tracking of the intruding UAV’s position. Experimental results demonstrate high detection accuracy, a significant reduction in false positives for both methods, and remarkable effectiveness in UAV localization and tracking with the PTZ camera. These findings position the proposed system as a promising solution for security applications. Full article
Show Figures

Figure 1

Figure 1
<p>Physical architecture of the system, where the colour of each arrow indicates the type of physical connection between the devices.</p>
Full article ">Figure 2
<p>GNU Radio schematic used to receive signals from the bladeRF SDR and process them for input to the detection system.</p>
Full article ">Figure 3
<p>Examples of the performance of the autoencoder-based detection algorithm: (<b>a</b>) shows a situation of no detection as the autoencoder can reconstruct the input signal properly, (<b>b</b>) shows a detection in the part surrounded by the red circle, because the reconstruction error there is very high, as the autoencoder has not been able to reconstruct the input signal, indicating the possible presence of a UAV.</p>
Full article ">Figure 4
<p>Reconstruction Error Calculation process performed with each sample received.</p>
Full article ">Figure 5
<p>Steps of Storing Results, Segment Analysis, and Anomaly Detection in the autoencoder-based detection process.</p>
Full article ">Figure 6
<p>Architecture of autoencoders used for drone detection. The green part, enconder, represents the compression of the input data. The blue is the latent space, which is the representation of compressed data, and the orange, decoder, represents the reconstruction up to the original dimension.</p>
Full article ">Figure 7
<p>Results of the model trained with YOLOv10.</p>
Full article ">Figure 8
<p>Parameters used for zoom adaptation from UAV detection.</p>
Full article ">Figure 9
<p>Representation of the trigonometry used to calculate <math display="inline"><semantics> <msub> <mi>c</mi> <mn>0</mn> </msub> </semantics></math> in (<b>a</b>) and <math display="inline"><semantics> <mrow> <mi>d</mi> <mi>e</mi> <mi>v</mi> <mi>i</mi> <mi>a</mi> <mi>t</mi> <mi>i</mi> <mi>o</mi> <mi>n</mi> </mrow> </semantics></math> in (<b>b</b>), where, the black dotted line refers to the centre of the image over the centre of the circle and the purple dotted line to the position where the UAV is located.</p>
Full article ">Figure 10
<p>Schematic for UAV position estimation using two fixed cameras.</p>
Full article ">Figure 11
<p>Detection test results using the SDR module as a function of distance from the UAV.</p>
Full article ">Figure 12
<p>Time required for UAV detection as a function of distance.</p>
Full article ">Figure 13
<p>Detection test results using the computer vision module as a function of distance from the UAV.</p>
Full article ">Figure 14
<p>Tracking test results using the computer vision module as a function of distance from the UAV.</p>
Full article ">Figure 15
<p>Vision of the cameras in the localization tests. In (<b>a</b>), it is shown that the fixed cameras simultaneously detected the UAV, while in (<b>b</b>) it is shown that the PTZ camera had already located the UAV after being provided with its exact position.</p>
Full article ">
15 pages, 647 KiB  
Article
Anchor-Based Method for Inter-Domain Mobility Management in Software-Defined Networking
by Akichy Adon Jean Rodrigue Kanda, Amanvon Ferdinand Atta, Zacrada Françoise Odile Trey, Michel Babri and Ahmed Dooguy Kora
Algorithms 2024, 17(12), 566; https://doi.org/10.3390/a17120566 - 11 Dec 2024
Viewed by 636
Abstract
Recently, there has been an explosive growth in wireless devices capable of connecting to the Internet and utilizing various services anytime, anywhere, often while on the move. In the realm of the Internet, such devices are called mobile nodes. When these devices are [...] Read more.
Recently, there has been an explosive growth in wireless devices capable of connecting to the Internet and utilizing various services anytime, anywhere, often while on the move. In the realm of the Internet, such devices are called mobile nodes. When these devices are in motion or traverse different domains while communicating, effective mobility management becomes essential to ensure the continuity of their services. Software-defined networking (SDN), a new paradigm in networking, offers numerous possibilities for addressing the challenges of mobility management. By decoupling the control and data planes, SDN enables greater flexibility and adaptability, making them a powerful framework for solving mobility-related issues. However, communication can still be momentarily disrupted due to frequent changes in IP addresses, a drop in radio signals, or configuration issues associated with gateways. Therefore, this paper introduces Routage Inter-domains in SDN (RI-SDN), a novel anchor-based routing method designed for inter-domain mobility in SDN architectures. The method identifies a suitable anchor domain, a critical intermediary domain that contributes to reducing delays during data transfer because it is the closest domain (i.e., node) to the destination. Once the anchor domain is identified, the best routing path is determined as the route with the smallest metric, incorporating elements such as bandwidth, flow operations, and the number of domain hops. Simulation results demonstrate significant improvements in data transfer delay and handover latency compared to existing methods. By leveraging SDN’s potential, RI-SDN presents a robust and innovative solution for real-world scenarios requiring reliable mobility management. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

Figure 1
<p>Algorithm for anchor domain selection.</p>
Full article ">Figure 2
<p>Algorithm for route selection.</p>
Full article ">Figure 3
<p>Basic architecture, from [<a href="#B19-algorithms-17-00566" class="html-bibr">19</a>].</p>
Full article ">Figure 4
<p>Basic simplified architecture.</p>
Full article ">Figure 5
<p>Adjacency matrix.</p>
Full article ">Figure 6
<p>Architecture with routes.</p>
Full article ">Figure 7
<p>Architecture 2 × 3.</p>
Full article ">Figure 8
<p>Architecture 3 × 3.</p>
Full article ">Figure 9
<p>Architecture 3 × 4.</p>
Full article ">Figure 10
<p>Architecture 3 × 5.</p>
Full article ">Figure 11
<p>Data transfer delay.</p>
Full article ">Figure 12
<p>Handover latency.</p>
Full article ">
18 pages, 7741 KiB  
Article
Jamming and Spoofing Techniques for Drone Neutralization: An Experimental Study
by Younes Zidane, José Silvestre Silva and Gonçalo Tavares
Drones 2024, 8(12), 743; https://doi.org/10.3390/drones8120743 - 10 Dec 2024
Viewed by 3086
Abstract
This study explores the use of electronic countermeasures to disrupt communications systems in Unmanned Aerial Vehicles (UAVs), focusing on the protection of airspaces and critical infrastructures such as airports and power stations. The research aims to develop a low-cost, adaptable jamming device using [...] Read more.
This study explores the use of electronic countermeasures to disrupt communications systems in Unmanned Aerial Vehicles (UAVs), focusing on the protection of airspaces and critical infrastructures such as airports and power stations. The research aims to develop a low-cost, adaptable jamming device using Software Defined Radio (SDR) technology, targeting key UAV communication links, including geolocation, radio control, and video transmission. It applies jamming techniques that successfully disrupt UAV communications. GPS spoofing techniques were also implemented, with both static and dynamic spoofing tested to mislead the drones’ navigation systems. Dynamic spoofing, combined with no-fly zone enforcement, proved to be particularly effective in forcing drones to land or exhibit erratic behavior. The conclusions of this study highlight the effectiveness of these techniques in neutralizing unauthorized UAVs, while also identifying the need for future research in countering drones that operate on alternative frequencies, such as 4G/5G, to enhance the system’s robustness in evolving drone environments. Full article
(This article belongs to the Collection Drones for Security and Defense Applications)
Show Figures

Figure 1

Figure 1
<p>Measured S11 magnitude of the 2.4 GHz antenna expressed in dB. The X-axis represents the frequency ranging from to 1.895 GHz to 2.905 GHz.</p>
Full article ">Figure 2
<p>Measured S11 magnitude of the 1.5 GHz antenna, expressed in dB. The X-axis represents the frequency ranging from to 1 GHz to 2 GHz.</p>
Full article ">Figure 3
<p>GNSS barrage jamming Script using GNU radio.</p>
Full article ">Figure 4
<p>GPS BPSK jamming script using GNU radio.</p>
Full article ">Figure 5
<p>Satellite image of the physical testing space.</p>
Full article ">Figure 6
<p>GNSS barrage jamming (fc = SR/3) signal spectrum. The frequency on the X-axis ranges from approximately 1.5686 GHz to 1.5823 GHz.</p>
Full article ">Figure 7
<p>GNSS barrage jamming (fc = SR/6) signal spectrum. The frequency on the X-axis ranges from approximately 1.5720GHz to 1.57888 GHz.</p>
Full article ">Figure 8
<p>GNSS BPSK Jamming signal spectrum. The frequency on the X-axis ranges from approximately 1.5714 GHz to 1.5795 GHz.</p>
Full article ">Figure 9
<p>Spoofing into a No-Fly Zone (controller display).</p>
Full article ">Figure 10
<p>Test area at Campo Militar de Santa Margarida (Portugal).</p>
Full article ">Figure 11
<p>Test area at Academia Militar Amadora (Portugal).</p>
Full article ">Figure 12
<p>System testing set-up.</p>
Full article ">Figure 13
<p>2.4 GHz band jamming signal spectrum (sequential sub-band scan and random sub-band selection). The frequency on the X-axis ranges from 2.40 GHz to 2.48 GHz.</p>
Full article ">Figure 14
<p>Interference detection on the controller.</p>
Full article ">
17 pages, 3121 KiB  
Article
Real-Time Radar Classification Based on Software-Defined Radio Platforms: Enhancing Processing Speed and Accuracy with Graphics Processing Unit Acceleration
by Seckin Oncu, Mehmet Karakaya, Yaser Dalveren, Ali Kara and Mohammad Derawi
Sensors 2024, 24(23), 7776; https://doi.org/10.3390/s24237776 - 4 Dec 2024
Viewed by 974
Abstract
This paper presents a comprehensive evaluation of real-time radar classification using software-defined radio (SDR) platforms. The transition from analog to digital technologies, facilitated by SDR, has revolutionized radio systems, offering unprecedented flexibility and reconfigurability through software-based operations. This advancement complements the role of [...] Read more.
This paper presents a comprehensive evaluation of real-time radar classification using software-defined radio (SDR) platforms. The transition from analog to digital technologies, facilitated by SDR, has revolutionized radio systems, offering unprecedented flexibility and reconfigurability through software-based operations. This advancement complements the role of radar signal parameters, encapsulated in the pulse description words (PDWs), which play a pivotal role in electronic support measure (ESM) systems, enabling the detection and classification of threat radars. This study proposes an SDR-based radar classification system that achieves real-time operation with enhanced processing speed. Employing the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm as a robust classifier, the system harnesses Graphical Processing Unit (GPU) parallelization for efficient radio frequency (RF) parameter extraction. The experimental results highlight the efficiency of this approach, demonstrating a notable improvement in processing speed while operating at a sampling rate of up to 200 MSps and achieving an accuracy of 89.7% for real-time radar classification. Full article
(This article belongs to the Section Radar Sensors)
Show Figures

Figure 1

Figure 1
<p>Illustration of a functional diagram of an ESM system.</p>
Full article ">Figure 2
<p>Functional structure of an SDR receiver.</p>
Full article ">Figure 3
<p>IQ Implementation of DCR.</p>
Full article ">Figure 4
<p>Illustration of radar pulse and some basic parameters.</p>
Full article ">Figure 5
<p>Illustration of the experimental setup.</p>
Full article ">Figure 6
<p>Frequency measurement results of test scenario.</p>
Full article ">Figure 7
<p>Flowchart of the proposed radar classification algorithm.</p>
Full article ">Figure 8
<p>Clusters in PW-RF plane.</p>
Full article ">Figure 9
<p>Clusters in PW-PA domain.</p>
Full article ">
22 pages, 7085 KiB  
Article
Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks
by Ernesto Cadena Muñoz, Gustavo Chica Pedraza and Alexander Aponte Moreno
Future Internet 2024, 16(12), 456; https://doi.org/10.3390/fi16120456 - 4 Dec 2024
Viewed by 602
Abstract
The Mobile Cognitive Radio Network (MCRN) are an alternative to spectrum scarcity. However, like any network, it comes with security issues to analyze. One of the attacks to analyze is the Primary User Emulation (PUE) attack, which leads the system to give the [...] Read more.
The Mobile Cognitive Radio Network (MCRN) are an alternative to spectrum scarcity. However, like any network, it comes with security issues to analyze. One of the attacks to analyze is the Primary User Emulation (PUE) attack, which leads the system to give the attacker the service as a legitimate user and use the Primary Users’ (PUs) spectrum resources. This problem has been addressed from perspectives like arrival time, position detection, cooperative scenarios, and artificial intelligence techniques (AI). Nevertheless, it has been studied with one PUE attack at once. This paper implements a countermeasure that can be applied when several attacks simultaneously exist in a cooperative network. A deep neural network (DNN) is used with other techniques to determine the PUE’s existence and communicate it with other devices in the cooperative MCRN. An algorithm to detect and share detection information is applied, and the results show that the system can detect multiple PUE attacks with coordination between the secondary users (SUs). Scenarios are implemented on software-defined radio (SDR) with a cognitive protocol to protect the PU. The probability of detection (PD) is measured for some signal-to-noise ratio (SNR) values in the presence of one PUE or more in the network, which shows high detection values above 90% for an SNR of -7dB. A database is also created with the attackers’ data and shared with all the SUs. Full article
(This article belongs to the Special Issue AI and Security in 5G Cooperative Cognitive Radio Networks)
Show Figures

Figure 1

Figure 1
<p>PUE attack scenario (source: own).</p>
Full article ">Figure 2
<p>Model for multiple PUE attack detection.</p>
Full article ">Figure 3
<p>Example of global information shared by a base station.</p>
Full article ">Figure 4
<p>Deep artificial neural network [<a href="#B20-futureinternet-16-00456" class="html-bibr">20</a>].</p>
Full article ">Figure 5
<p>Example of the user’s position in the environment (source: own).</p>
Full article ">Figure 6
<p>Example of energy detection (source: own).</p>
Full article ">Figure 7
<p>SDR test bed platform.</p>
Full article ">Figure 8
<p>Mobile SDR device.</p>
Full article ">Figure 9
<p>Probability of detection vs. probability of false alarm results for AWGN channel (source: own).</p>
Full article ">Figure 10
<p>Probability of detection vs. probability of false alarm for CSS for SNR = −10 dB (source: own).</p>
Full article ">Figure 11
<p>Downlink signal without and with active signal (source: own).</p>
Full article ">Figure 12
<p>Uplink signal without and with active signal (source: own).</p>
Full article ">Figure 13
<p>Available networks with PUE screen in the mobile phone (source: own).</p>
Full article ">Figure 14
<p>Confusion matrix -10 dB (source: author).</p>
Full article ">Figure 15
<p>DNN results depend on the epoch size (source: own).</p>
Full article ">Figure 16
<p>DNN code in Keras and Python (source: own).</p>
Full article ">Figure 17
<p>Probability of detection of a PUE attack (source: own).</p>
Full article ">
25 pages, 7600 KiB  
Article
Optimizing Radio Access for Massive IoT in 6G Through Highly Dynamic Cooperative Software-Defined Sharing of Network Resources
by Faycal Bouhafs, Alessandro Raschella, Michael Mackay, Max Hashem Eiza and Frank den Hartog
Future Internet 2024, 16(12), 442; https://doi.org/10.3390/fi16120442 - 28 Nov 2024
Viewed by 921
Abstract
The Internet of Things (IoT) has been a major part of many use cases for 5G networks. From several of these use cases, it follows that 5G should be able to support at least one million devices per km2. In this [...] Read more.
The Internet of Things (IoT) has been a major part of many use cases for 5G networks. From several of these use cases, it follows that 5G should be able to support at least one million devices per km2. In this paper, we explain that the 5G radio access schemes as used today cannot support such densities. This issue will have to be solved by 6G. However, this requires a fundamentally different approach to accessing the wireless medium compared to current generation networks: they are not designed to support many thousands of devices in each other’s vicinity, attempting to send/receive data simultaneously. In this paper, we present a 6G system architecture for trading wireless network resources in massive IoT scenarios, inspired by the concept of the sharing economy, and using the novel concept of spectrum programming. We simulated a truly massive IoT network and evaluated the scalability of the system when managed using our proposed 6G platform, compared to standard 5G deployments. The experiments showed how the proposed scheme can improve network resource allocation by up to 80%. This is accompanied by similarly significant improvements in interference and device energy consumption. Finally, we performed evaluations that demonstrate that the proposed platform can benefit all the stakeholders that decide to join the scheme. Full article
(This article belongs to the Special Issue Moving towards 6G Wireless Technologies—Volume II)
Show Figures

Figure 1

Figure 1
<p>Transmission success rate as a function of the number of attempts to access the medium.</p>
Full article ">Figure 2
<p>Number of attempts necessary to achieve 100% satisfaction as a function of the number of gNBs.</p>
Full article ">Figure 3
<p>Cost incurred by operators to increase the success rate of IoT devices for accessing the RANs.</p>
Full article ">Figure 4
<p>Degree of uncertainty of telecommunication landscape drivers and their degree of impact [<a href="#B26-futureinternet-16-00442" class="html-bibr">26</a>].</p>
Full article ">Figure 5
<p>Factors behind the adoption of programmability in telecommunications with the massive IoT as a major driver behind this trend [<a href="#B40-futureinternet-16-00442" class="html-bibr">40</a>].</p>
Full article ">Figure 6
<p>Depiction of the Wi-5 architecture and programmability [<a href="#B34-futureinternet-16-00442" class="html-bibr">34</a>].</p>
Full article ">Figure 7
<p>Illustration of using LVAPs to manage connectivity in Wi-5.</p>
Full article ">Figure 8
<p>Depiction of the heterogeneous infrastructure plane, heterogeneous spectrum plane, and LVAN in the proposed solution.</p>
Full article ">Figure 9
<p>Description of the deployment of the connectivity application as part of the proposed solution. (<b>a</b>) Use of the controller’s monitoring information and LVAN to manage the connectivity between IoT networks and RANs. (<b>b</b>) Use of the connectivity application in the application plane on top of the controller.</p>
Full article ">Figure 10
<p>Description of the brokering plane and its interaction with operators and the connectivity application.</p>
Full article ">Figure 11
<p>Measured SINR when using 5G and sharing economy for M = 1000.</p>
Full article ">Figure 12
<p>Measured SINR when using 5G and sharing economy for M = 2000.</p>
Full article ">Figure 13
<p>Measured SINR when using 5G and sharing economy for M = 3000.</p>
Full article ">Figure 14
<p>Probability of unsuccessful connectivity for different numbers of IoT nodes.</p>
Full article ">Figure 15
<p>Percentage of satisfied IoT nodes as a function of IoT network density.</p>
Full article ">Figure 16
<p>Number of iterations in relation to success rate.</p>
Full article ">Figure 17
<p>Energy averaged for different numbers of connected IoT nodes.</p>
Full article ">Figure 18
<p>Ops’ gains and costs for M = 1000.</p>
Full article ">Figure 19
<p>OPs’ gains and costs for M = 2000.</p>
Full article ">Figure 20
<p>OPs’ gains and costs for M = 3000.</p>
Full article ">
Back to TopTop