Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (303)

Search Parameters:
Keywords = software-defined radio

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 7600 KiB  
Article
Optimizing Radio Access for Massive IoT in 6G Through Highly Dynamic Cooperative Software-Defined Sharing of Network Resources
by Faycal Bouhafs, Alessandro Raschella, Michael Mackay, Max Hashem Eiza and Frank den Hartog
Future Internet 2024, 16(12), 442; https://doi.org/10.3390/fi16120442 - 28 Nov 2024
Viewed by 107
Abstract
The Internet of Things (IoT) has been a major part of many use cases for 5G networks. From several of these use cases, it follows that 5G should be able to support at least one million devices per km2. In this [...] Read more.
The Internet of Things (IoT) has been a major part of many use cases for 5G networks. From several of these use cases, it follows that 5G should be able to support at least one million devices per km2. In this paper, we explain that the 5G radio access schemes as used today cannot support such densities. This issue will have to be solved by 6G. However, this requires a fundamentally different approach to accessing the wireless medium compared to current generation networks: they are not designed to support many thousands of devices in each other’s vicinity, attempting to send/receive data simultaneously. In this paper, we present a 6G system architecture for trading wireless network resources in massive IoT scenarios, inspired by the concept of the sharing economy, and using the novel concept of spectrum programming. We simulated a truly massive IoT network and evaluated the scalability of the system when managed using our proposed 6G platform, compared to standard 5G deployments. The experiments showed how the proposed scheme can improve network resource allocation by up to 80%. This is accompanied by similarly significant improvements in interference and device energy consumption. Finally, we performed evaluations that demonstrate that the proposed platform can benefit all the stakeholders that decide to join the scheme. Full article
(This article belongs to the Special Issue Moving towards 6G Wireless Technologies—Volume II)
Show Figures

Figure 1

Figure 1
<p>Transmission success rate as a function of the number of attempts to access the medium.</p>
Full article ">Figure 2
<p>Number of attempts necessary to achieve 100% satisfaction as a function of the number of gNBs.</p>
Full article ">Figure 3
<p>Cost incurred by operators to increase the success rate of IoT devices for accessing the RANs.</p>
Full article ">Figure 4
<p>Degree of uncertainty of telecommunication landscape drivers and their degree of impact [<a href="#B26-futureinternet-16-00442" class="html-bibr">26</a>].</p>
Full article ">Figure 5
<p>Factors behind the adoption of programmability in telecommunications with the massive IoT as a major driver behind this trend [<a href="#B40-futureinternet-16-00442" class="html-bibr">40</a>].</p>
Full article ">Figure 6
<p>Depiction of the Wi-5 architecture and programmability [<a href="#B34-futureinternet-16-00442" class="html-bibr">34</a>].</p>
Full article ">Figure 7
<p>Illustration of using LVAPs to manage connectivity in Wi-5.</p>
Full article ">Figure 8
<p>Depiction of the heterogeneous infrastructure plane, heterogeneous spectrum plane, and LVAN in the proposed solution.</p>
Full article ">Figure 9
<p>Description of the deployment of the connectivity application as part of the proposed solution. (<b>a</b>) Use of the controller’s monitoring information and LVAN to manage the connectivity between IoT networks and RANs. (<b>b</b>) Use of the connectivity application in the application plane on top of the controller.</p>
Full article ">Figure 10
<p>Description of the brokering plane and its interaction with operators and the connectivity application.</p>
Full article ">Figure 11
<p>Measured SINR when using 5G and sharing economy for M = 1000.</p>
Full article ">Figure 12
<p>Measured SINR when using 5G and sharing economy for M = 2000.</p>
Full article ">Figure 13
<p>Measured SINR when using 5G and sharing economy for M = 3000.</p>
Full article ">Figure 14
<p>Probability of unsuccessful connectivity for different numbers of IoT nodes.</p>
Full article ">Figure 15
<p>Percentage of satisfied IoT nodes as a function of IoT network density.</p>
Full article ">Figure 16
<p>Number of iterations in relation to success rate.</p>
Full article ">Figure 17
<p>Energy averaged for different numbers of connected IoT nodes.</p>
Full article ">Figure 18
<p>Ops’ gains and costs for M = 1000.</p>
Full article ">Figure 19
<p>OPs’ gains and costs for M = 2000.</p>
Full article ">Figure 20
<p>OPs’ gains and costs for M = 3000.</p>
Full article ">
17 pages, 2744 KiB  
Article
Priority/Demand-Based Resource Management with Intelligent O-RAN for Energy-Aware Industrial Internet of Things
by Seyha Ros, Seungwoo Kang, Inseok Song, Geonho Cha, Prohim Tam and Seokhoon Kim
Processes 2024, 12(12), 2674; https://doi.org/10.3390/pr12122674 - 27 Nov 2024
Viewed by 239
Abstract
The last decade has witnessed the explosive growth of the internet of things (IoT), demonstrating the utilization of ubiquitous sensing and computation services. Hence, the industrial IoT (IIoT) is integrated into IoT devices. IIoT is concerned with the limitation of computation and battery [...] Read more.
The last decade has witnessed the explosive growth of the internet of things (IoT), demonstrating the utilization of ubiquitous sensing and computation services. Hence, the industrial IoT (IIoT) is integrated into IoT devices. IIoT is concerned with the limitation of computation and battery life. Therefore, mobile edge computing (MEC) is a paradigm that enables the proliferation of resource computing and reduces network communication latency to realize the IIoT perspective. Furthermore, an open radio access network (O-RAN) is a new architecture that adopts a MEC server to offer a provisioning framework to address energy efficiency and reduce the congestion window of IIoT. However, dynamic resource computation and continuity of task generation by IIoT lead to challenges in management and orchestration (MANO) and energy efficiency. In this article, we aim to investigate the dynamic and priority of resource management on demand. Additionally, to minimize the long-term average delay and computation resource-intensive tasks, the Markov decision problem (MDP) is conducted to solve this problem. Hence, deep reinforcement learning (DRL) is conducted to address the optimal handling policy for MEC-enabled O-RAN architectures. In this study, MDP-assisted deep q-network-based priority/demanding resource management, namely DQG-PD, has been investigated in optimizing resource management. The DQG-PD algorithm aims to solve resource management and energy efficiency in IIoT devices, which demonstrates that exploiting the deep Q-network (DQN) jointly optimizes computation and resource utilization of energy for each service request. Hence, DQN is divided into online and target networks to better adapt to a dynamic IIoT environment. Finally, our experiment shows that our work can outperform reference schemes in terms of resources, cost, energy, reliability, and average service completion ratio. Full article
Show Figures

Figure 1

Figure 1
<p>An intelligent SDN/NFV controller-based MEC server is deployed in the O-RAN.</p>
Full article ">Figure 2
<p>DQN-based MEC for priority/demanding resource utilization.</p>
Full article ">Figure 3
<p>Sub-reward on resource.</p>
Full article ">Figure 4
<p>Sub-reward on cost.</p>
Full article ">Figure 5
<p>Sub-reward on energy.</p>
Full article ">Figure 6
<p>Sub-reward on reliability.</p>
Full article ">Figure 7
<p>Average service complete ratios show how efficient the service percentage is over the different time slots.</p>
Full article ">
21 pages, 11838 KiB  
Article
Advanced SDR-Based Custom OFDM Protocol for Improved Data Rates in HF-NVIS Links
by Emil Șorecău, Mirela Șorecău and Paul Bechet
Appl. Sci. 2024, 14(23), 10841; https://doi.org/10.3390/app142310841 - 22 Nov 2024
Viewed by 422
Abstract
In the current context of global communications, HF (High Frequency) NVIS (Near Vertical Incidence Skywave) data networks can be of strategic importance, providing short- and medium-range communication capabilities independent of terrestrial configuration and existing conventional communications infrastructure. They are essential in critical conditions, [...] Read more.
In the current context of global communications, HF (High Frequency) NVIS (Near Vertical Incidence Skywave) data networks can be of strategic importance, providing short- and medium-range communication capabilities independent of terrestrial configuration and existing conventional communications infrastructure. They are essential in critical conditions, such as natural disasters or conflicts, when terrestrial networks are unavailable. This paper investigates the development of such systems for HF NVIS data communications by introducing a customized Orthogonal Frequency Division Multiplexing (OFDM) protocol with parameters adapted to HF ionospheric propagation, implemented on Software-Defined Radio (SDR) systems, which provide extensive configurability and high adaptability to varying HF channel conditions. This work presents an innovative approach to the application of OFDM narrow-channel aggregation in the HF spectrum, a technique that significantly enhances system performance. The aggregation enables a more efficient utilization of the available spectrum and an increase in the data transmission rate, which represents a substantial advancement in NVIS communications. The implementation was realized using an SDR system, which allows flexible integration of the new OFDM protocol and dynamic adaptation of resources. The work also includes the development of a messaging application capable of using this enhanced HF communication system, taking advantage of the new features of channel aggregation and SDR flexibility. This application demonstrates the applicability of the protocol in real-world scenarios and provides a robust platform for data transmission under conditions of limited access to other means of communication. Thus, this study contributes to the technological advancement of NVIS communications and opens new research and deployment directions in HF communications. Full article
(This article belongs to the Special Issue Cognitive Radio: Trends, Methods, Applications and Challenges)
Show Figures

Figure 1

Figure 1
<p>Graphic diagram for 2xOFDM channel transmitter implementation in GNU Radio.</p>
Full article ">Figure 2
<p>Graphic diagram for 2xOFDM channel receiver implementation in GNU Radio.</p>
Full article ">Figure 3
<p>Data preparation for parallel OFDM transmission.</p>
Full article ">Figure 4
<p>Set OFDM channels on different subcarriers.</p>
Full article ">Figure 5
<p>Receiving IQ streaming and set OFDM channels at baseband.</p>
Full article ">Figure 6
<p>Combined packages received from different channels and output data.</p>
Full article ">Figure 7
<p>HF OFDM TRANSMITTER—graphical user interface (GUI).</p>
Full article ">Figure 8
<p>HF OFDM RECEIVER—graphical user interface (GUI).</p>
Full article ">Figure 9
<p>HF OFDM TRANSMITTER/RECEIVER—settings tab.</p>
Full article ">Figure 10
<p>Receiving OFDM channels—contiguous aggregation.</p>
Full article ">Figure 11
<p>Receiving OFDM channels in non-contiguous aggregation scenario.</p>
Full article ">Figure 12
<p>Monitoring received packages on each channel in both contiguous and non-contiguous aggregation.</p>
Full article ">Figure 13
<p>Check tag debug data saved in *.txt file after each reception.</p>
Full article ">Figure 14
<p>Analyzing tag debug file and calculate PER.</p>
Full article ">Figure 15
<p>Check data transmitted vs. data received in both contiguous and non-contiguous aggregation.</p>
Full article ">Figure 16
<p>Monitoring received packages on each different modulated channel.</p>
Full article ">Figure 17
<p>Monitoring received PER on Channel 1—QPSK modulated channel.</p>
Full article ">Figure 18
<p>Monitoring received PER on Channel 2–8-PSK modulated channel.</p>
Full article ">Figure 19
<p>Real-world system tests: (<b>a</b>) transmitter fixed system and (<b>b</b>) mobile receiver system.</p>
Full article ">Figure 20
<p>Real field HF OFDM transmitter tests—sending mayday messages.</p>
Full article ">Figure 21
<p>Real field HF OFDM receiver tests (receiving mayday messages)—investigating PER.</p>
Full article ">Figure 22
<p>Real field HF OFDM receiver tests—receiving mayday messages.</p>
Full article ">Figure 23
<p>Real field HF OFDM receiver tests—receiving mayday attach file.</p>
Full article ">Figure 24
<p>Real field HF OFDM receiver testing—PER analysis.</p>
Full article ">Figure 25
<p>Real field HF OFDM receiver tests—modified for NVIS propagation.</p>
Full article ">
13 pages, 6726 KiB  
Article
A Software-Defined Radio Platform for Teaching Beamforming Principles
by Annamaria Sârbu, Robert Papa, Angela Digulescu and Cornel Ioana
Appl. Sci. 2024, 14(22), 10386; https://doi.org/10.3390/app142210386 - 12 Nov 2024
Viewed by 417
Abstract
This paper presents the development and validation of a hybrid beamforming system based on software-defined radio (SDR), designed for telecommunications engineering education. The system provides an agile and user-friendly platform that allows students to observe, test, and evaluate beamforming techniques in real time. [...] Read more.
This paper presents the development and validation of a hybrid beamforming system based on software-defined radio (SDR), designed for telecommunications engineering education. The system provides an agile and user-friendly platform that allows students to observe, test, and evaluate beamforming techniques in real time. The platform integrates a multichannel SDR device (USRP N310) with traditional radiofrequency equipment and open-source software, facilitating hands-on learning experiences. The paper details the proposed hardware and software architecture and documents the calibration and validation phases. The testing and validation processes were conducted using a 3.5 GHz antenna array in both indoor and outdoor environments. The results demonstrated the system’s effectiveness in achieving the desired beam orientations, with experimental results aligning closely with simulation and theoretical predictions. Significant differences in the radiation patterns observed between the indoor and outdoor measurements were documented, highlighting the impact of environmental factors on beamforming performance. The insights gained from this research provide valuable contributions to the education of future telecommunications engineers, enhancing their understanding of practical beamforming applications and the integration of modern SDR technology. Full article
Show Figures

Figure 1

Figure 1
<p>5G and Wi-Fi beamforming networks deployed in indoor and outdoor environments.</p>
Full article ">Figure 2
<p>Beamforming platform architecture.</p>
Full article ">Figure 3
<p>GNU Radio transmission flowchart.</p>
Full article ">Figure 4
<p>GNU Radio interface for setting TX channel phase/amplitude.</p>
Full article ">Figure 5
<p>GNU Radio flowchart (<b>top</b>) and spectrum (<b>bottom</b>) for TX channel.</p>
Full article ">Figure 6
<p>Experimental setup for phase alignment.</p>
Full article ">Figure 7
<p>Phase alignment measurement for 3.53 GHz TX frequency.</p>
Full article ">Figure 8
<p>(<b>a</b>) SA measurement of USRP TX signal amplitude; (<b>b</b>) USRP TX channel amplitude linearity.</p>
Full article ">Figure 9
<p>(<b>a</b>) Experimental setup for RX parametrization; (<b>b</b>) USRP/SA RX amplitude linearity.</p>
Full article ">Figure 10
<p>(<b>a</b>) Designed patch antenna; (<b>b</b>) physical patch antenna.</p>
Full article ">Figure 11
<p>Array of patch antennas’ radiation pattern in (<b>a</b>) 3D and (<b>b</b>) azimuth.</p>
Full article ">Figure 12
<p>Phased array beamformer principle.</p>
Full article ">Figure 13
<p>Measured and simulated S11 (<b>a</b>) and S12 (<b>b</b>) parameters.</p>
Full article ">Figure 14
<p>Experimental setup for indoor radiation pattern measurement.</p>
Full article ">Figure 15
<p>Indoor/outdoor measured radiation pattern for two beam orientations.</p>
Full article ">
21 pages, 2302 KiB  
Article
Detecting and Localizing Wireless Spoofing Attacks on the Internet of Medical Things
by Irrai Anbu Jayaraj, Bharanidharan Shanmugam, Sami Azam and Suresh Thennadil
J. Sens. Actuator Netw. 2024, 13(6), 72; https://doi.org/10.3390/jsan13060072 - 1 Nov 2024
Viewed by 778
Abstract
This paper proposes a hybrid approach using design science research to identify rogue RF transmitters and locate their targets. We engineered a framework to identify masquerading attacks indicating the presence of multiple adversaries posing as a single node. We propose a methodology based [...] Read more.
This paper proposes a hybrid approach using design science research to identify rogue RF transmitters and locate their targets. We engineered a framework to identify masquerading attacks indicating the presence of multiple adversaries posing as a single node. We propose a methodology based on spatial correlation calculated from received signal strength (RSS). To detect and mitigate wireless spoofing attacks in IoMT environments effectively, the hybrid approach combines spatial correlation analysis, Deep CNN classification, Elliptic Curve Cryptography (ECC) encryption, and DSRM-powered attack detection enhanced (DADE) detection and localization (DAL) frameworks. A deep neural network (Deep CNN) was used to classify trusted transmitters based on Python Spyder3 V5 and ECC encrypted Hack RF Quadrature Signals (IQ). For localizing targets, this paper also presents DADE and DAL frameworks implemented on Eclipse Java platforms. The hybrid approach relies on spatial correlation based on signal strength. Using the training methods of Deep CNN1, Deep CNN2, and Long Short-Term Memory (LSTM), it was possible to achieve accuracies of 98.88%, 95.05%, and 96.60% respectively. Full article
(This article belongs to the Section Wireless Control Networks)
Show Figures

Figure 1

Figure 1
<p>Generic signal flow for identifying RF imperfection characteristics.</p>
Full article ">Figure 2
<p>IoMT RF security framework.</p>
Full article ">Figure 3
<p>Deep CNN data extraction process.</p>
Full article ">Figure 4
<p>Hack RF device setup.</p>
Full article ">Figure 5
<p>Benchmarking report [<a href="#B20-jsan-13-00072" class="html-bibr">20</a>,<a href="#B22-jsan-13-00072" class="html-bibr">22</a>,<a href="#B37-jsan-13-00072" class="html-bibr">37</a>].</p>
Full article ">
15 pages, 2671 KiB  
Article
Reconfigurable Frequency Response Masking Multi-MAC Filters for Software Defined Radio Channelization
by Subahar Arivalagan, Britto Pari James and Man-Fai Leung
Electronics 2024, 13(21), 4211; https://doi.org/10.3390/electronics13214211 - 27 Oct 2024
Viewed by 476
Abstract
Mobile technology is currently trending toward supporting multiple communication standards on a single device. This means that some reconfigurable techniques must be the foundation of their design. The two essential requirements of channel filters are minimized complexity and reconfigurability. In this research, a [...] Read more.
Mobile technology is currently trending toward supporting multiple communication standards on a single device. This means that some reconfigurable techniques must be the foundation of their design. The two essential requirements of channel filters are minimized complexity and reconfigurability. In this research, a novel extension of Frequency Response Masking (FRM) was investigated by employing Time Division Multiplexing (TDM)-based single Multiply and Accumulate (MAC) architecture using the principle of resource sharing to realize multiple sharp filter responses from a single prototype constant group delay low pass filter. This paper uses a single multiply and add units regardless of the quantity of channels and taps. The suggested reconfigurable filter was synthesized on technology based on 0.18-µm CMOS and put into practice. Further trials were carried out on Virtex-II 2v3000ff1152-4 FPGA device. The outcomes revealed that the suggested channel filter, which was synthesized using FPGA, provides 21.36% of the area curtail and 14.88% of power scaling down on average and put into practice using ASIC provides 5.18% of the area reduction and 9.08% of power scaling down on average. Full article
Show Figures

Figure 1

Figure 1
<p>Design of FIR filter using the FRM technique.</p>
Full article ">Figure 2
<p>Illustration of the FRM approach’s frequency response.</p>
Full article ">Figure 3
<p>Single-channel MAC-based FIR filter.</p>
Full article ">Figure 4
<p>Design of the FIR filter using single MAC-based FRM technique.</p>
Full article ">Figure 5
<p>Multi-channel MAC-based FIR filter.</p>
Full article ">Figure 6
<p>Structure of complementary delays.</p>
Full article ">Figure 7
<p>Proposed Design of FIR filter using Multi-Channel MAC-based FRM technique.</p>
Full article ">Figure 8
<p>Waveform for simulation of multi-channel MAC FIR filter.</p>
Full article ">Figure 9
<p>RTL representation of FIR filter with Multi-Channel MAC.</p>
Full article ">
20 pages, 3793 KiB  
Article
Enhancing Tactile Internet Reliability: AI-Driven Resilience in NG-EPON Networks
by Andrew Tanny Liem, I-Shyan Hwang, Razat Kharga and Chin-Hung Teng
Photonics 2024, 11(10), 903; https://doi.org/10.3390/photonics11100903 - 26 Sep 2024
Viewed by 777
Abstract
To guarantee the reliability of Tactile Internet (TI) applications such as telesurgery, which demand extremely high reliability and are experiencing rapid expansion, we propose a novel smart resilience mechanism for Next-Generation Ethernet Passive Optical Networks (NG-EPONs). Our architecture integrates Artificial Intelligence (AI) and [...] Read more.
To guarantee the reliability of Tactile Internet (TI) applications such as telesurgery, which demand extremely high reliability and are experiencing rapid expansion, we propose a novel smart resilience mechanism for Next-Generation Ethernet Passive Optical Networks (NG-EPONs). Our architecture integrates Artificial Intelligence (AI) and Software-Defined Networking (SDN)-Enabled Broadband Access (SEBA) platform to proactively enhance network reliability and performance. By harnessing the AI’s capabilities, our system automatically detects and localizes fiber faults, establishing backup communication links using Radio Frequency over Glass (RFoG) to prevent service disruptions. This empowers NG-EPONs to maintain uninterrupted, high-quality network service even in the face of unexpected failures, meeting the stringent Quality-of-Service (QoS) requirements of critical TI applications. Our AI model, rigorously validated through 5-fold cross-validation, boasts an average accuracy of 81.49%, with a precision of 84.33%, recall of 78.18%, and F1-score of 81.00%, demonstrating its robust performance in fault detection and prediction. The AI model triggers immediate corrective actions through the SDN controller. Simulation results confirm the efficacy of our proposed mechanism in terms of delay, system throughputs and packet drop rate, and bandwidth waste, ultimately ensuring the delivery of high-quality network services. Full article
(This article belongs to the Special Issue Machine Learning Applied to Optical Communication Systems)
Show Figures

Figure 1

Figure 1
<p>Example of OTDR traces.</p>
Full article ">Figure 2
<p>Generic SEBA architecture.</p>
Full article ">Figure 3
<p>VOLTHA operation architecture.</p>
Full article ">Figure 4
<p>The smart resilience architecture in NG-EPON.</p>
Full article ">Figure 5
<p>Comparison of normal vs. fault condition.</p>
Full article ">Figure 5 Cont.
<p>Comparison of normal vs. fault condition.</p>
Full article ">Figure 6
<p>Proposed framework for fault detection and localization.</p>
Full article ">Figure 7
<p>Simulation-based evaluation setup for generating faulty branch data using Optisystem.</p>
Full article ">Figure 8
<p>The proposed MLP model for fiber fault diagnosis and localization.</p>
Full article ">Figure 9
<p>The pseudocode of RDBA.</p>
Full article ">Figure 10
<p>Mean packet delay of EF, TI, AF and TI traffic.</p>
Full article ">Figure 11
<p>System throughput.</p>
Full article ">Figure 12
<p>Packet drop rate.</p>
Full article ">Figure 13
<p>Bandwidth waste.</p>
Full article ">
19 pages, 10808 KiB  
Article
An Adaptive RF Front-End Architecture for Multi-Band SDR in Avionics
by Behnam Shakibafar, Farzan Farhangian, Jean-Marc Gagne, Rene Jr. Landry and Frederic Nabki
Sensors 2024, 24(18), 5963; https://doi.org/10.3390/s24185963 - 14 Sep 2024
Viewed by 931
Abstract
This study introduces a reconfigurable and agile RF front-end (RFFE) architecture that significantly enhances the performance of software-defined radios (SDRs) by seamlessly adjusting to varying signal requirements, frequencies, and protocols. This flexibility greatly enhances spectrum utilization, signal integrity, and overall system efficiency—critical factors [...] Read more.
This study introduces a reconfigurable and agile RF front-end (RFFE) architecture that significantly enhances the performance of software-defined radios (SDRs) by seamlessly adjusting to varying signal requirements, frequencies, and protocols. This flexibility greatly enhances spectrum utilization, signal integrity, and overall system efficiency—critical factors in aviation, where reliable communication, navigation, and surveillance systems are vital for safety. A versatile RF front-end is thus indispensable, enhancing connectivity and safety standards. We explore the integration of this flexible RF front-end in SDRs, focusing on the detailed design of essential components, such as receivers, transmitters, RF switches, combiners, and splitters, and their corresponding RF pathways. Comprehensive performance evaluations confirm the architecture’s reliability and functionality, including an extensive analysis of receiver gain, linearity, and two-tone test results. These assessments validate the architecture’s suitability for aviation radios and address considerations of size, weight, and power-cost (SWaP-C), demonstrating significant gains in operational efficiency and cost-effectiveness. The introduction of the new RF front-end on a single SDR board not only substantially reduces size and weight but also adds up to 18 dB gain to the received signal. It also allows for a high level of design flexibility, enabling seamless software transitions between different radios and the capacity to manage three times more radios with the same hardware, thereby significantly boosting the system’s ability to handle multiple radio channels efficiently. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed architecture block diagram showing the RF paths.</p>
Full article ">Figure 2
<p>VOR receiver S-parameter block diagram.</p>
Full article ">Figure 3
<p>DME, ADS-B, and TMS gain (S21) and input-matching (S11) simulation.</p>
Full article ">Figure 4
<p>Glide Slope receiver gain (S21) and input-matching (S11) simulation.</p>
Full article ">Figure 5
<p>VOR/ILS LOC gain (S21) and input-matching (S11) simulation.</p>
Full article ">Figure 6
<p>COM gain (S21) and input-matching (S11) simulation.</p>
Full article ">Figure 7
<p>(<b>a</b>) VHF Box. Picture of the VHF rack unit’s design and assembly. (<b>b</b>) VHF rack unit’s ports’ description.</p>
Full article ">Figure 8
<p>(<b>a</b>) L-band box arrangement. L-band rack unit’s design and assembly. (<b>b</b>) L-band rack unit’s ports’ description (<b>b</b>).</p>
Full article ">Figure 9
<p>Diagram of the L-band module connected to a spectrum analyzer.</p>
Full article ">Figure 10
<p>(<b>a</b>) Frequency and time-domain signals of ADS-B at the transmitter antenna (50 dB attenuation). (<b>b</b>) Frequency- and time-domain signal of ADS-B at the receiver (50 dB attenuation) (<b>b</b>).</p>
Full article ">Figure 11
<p>(<b>a</b>) Thermocouple probes’ placement in the L-band radio rack. (<b>b</b>) Final temperature measurement-test setup before test begins at room temperature.</p>
Full article ">Figure 12
<p>Noise figure and gain-measurement result of the L-band receiver block.</p>
Full article ">Figure 13
<p>(<b>a</b>) Receivers block output power gain. (<b>b</b>) Linearity of all the receive paths vs. input signal power.</p>
Full article ">Figure 14
<p>Two-tone measurement setup.</p>
Full article ">Figure 15
<p>OP1dB and IIP3 measurement for the LNA with a two-tone input at 108 MHz/110 MHz.</p>
Full article ">Figure 16
<p>OP1dB and IIP3 measurement for the LNA with a two-tone input at 330 MHz/332 MHz.</p>
Full article ">Figure 17
<p>OP1dB and IP3 measurement for LNA with a two-tone input at 1090 MHz/1092 MHz.</p>
Full article ">Figure 18
<p>First-, second-, and third-order IMD comparison at a 1090 MHz frequency.</p>
Full article ">
13 pages, 1005 KiB  
Article
Modulation Recognition System of Electromagnetic Interference Signal Based on SDR
by Wei Dai and Changpeng Ji
Telecom 2024, 5(3), 928-940; https://doi.org/10.3390/telecom5030046 - 11 Sep 2024
Viewed by 736
Abstract
Considering the electromagnetic interference signal in non-cooperative communication, an automatic modulation identification and detection system of electromagnetic interference signal based on software defined radio is proposed. Based on GNU Radio 3.10.7.0 and HackRF One B210mini, the system estimates the frequency and symbol rate [...] Read more.
Considering the electromagnetic interference signal in non-cooperative communication, an automatic modulation identification and detection system of electromagnetic interference signal based on software defined radio is proposed. Based on GNU Radio 3.10.7.0 and HackRF One B210mini, the system estimates the frequency and symbol rate of the interference signal and completes clock synchronization and matching filtering under the condition of unknown a priori information. By extracting high-order cumulants as characteristic parameters, combined with the decision tree classifier, the classification and recognition of six modulation types of interference signals and signal phase correction are realized. This method can distinguish the recognition results in combination with the signal constellation, and complete the real-time reception and recognition of interference signals. Full article
Show Figures

Figure 1

Figure 1
<p>The structure of the software radio modulation recognition system.</p>
Full article ">Figure 2
<p>Simulation results of different characteristic parameter.</p>
Full article ">Figure 3
<p>Simulation results of characteristic parameter <math display="inline"><semantics> <msub> <mi>f</mi> <mn>4</mn> </msub> </semantics></math> after order reduction processing.</p>
Full article ">Figure 4
<p>HackRF One hardware structure diagram.</p>
Full article ">Figure 5
<p>GRC flow chart of interference recognition syste.</p>
Full article ">Figure 6
<p>Structure diagram of system test platform.</p>
Full article ">Figure 7
<p>Time domain waveform and constellation of each interference signal.</p>
Full article ">
22 pages, 8030 KiB  
Article
A Study on a Radio Source Location Estimation System Using High Altitude Platform Stations (HAPS)
by Yuta Furuse and Gia Khanh Tran
Sensors 2024, 24(17), 5803; https://doi.org/10.3390/s24175803 - 6 Sep 2024
Viewed by 697
Abstract
Currently, there is a system in Japan to detect illegal radio transmitting sources, known as the DEURAS system. Even though crackdowns on illegal radio stations are conducted on a regular basis every year, the number of illegal emission cases still tends to increase, [...] Read more.
Currently, there is a system in Japan to detect illegal radio transmitting sources, known as the DEURAS system. Even though crackdowns on illegal radio stations are conducted on a regular basis every year, the number of illegal emission cases still tends to increase, as ordinary citizens are now able to handle advanced wireless communication technologies, e.g., via software-defined radio. However, the current surveillance system may not be able to accurately detect the source in areas where large buildings are densely packed, such as urban areas, due to the effects of reflected waves. Therefore, in this study, we proposed a system for estimating the location of the source of transmission using a high-flying unmanned aerial vehicle called HAPS. The simulation results using numerical analysis software show that the proposed system can estimate the location of the source over a wider area and with higher accuracy than conventional monitoring systems. Full article
(This article belongs to the Special Issue Emerging Advances in Wireless Positioning and Location-Based Services)
Show Figures

Figure 1

Figure 1
<p>Number of wireless stations in Japan.</p>
Full article ">Figure 2
<p>Statistics of illegal radio stations in Japan.</p>
Full article ">Figure 3
<p>Array antenna.</p>
Full article ">Figure 4
<p>Triangulation method.</p>
Full article ">Figure 5
<p>An example of an antenna pattern.</p>
Full article ">Figure 6
<p>K-element linear array.</p>
Full article ">Figure 7
<p>3D model of the evaluation environment.</p>
Full article ">Figure 8
<p>Simulation overview of LoS ratio calculation.</p>
Full article ">Figure 9
<p>Randomly generated radio wave sources.</p>
Full article ">Figure 10
<p>An example of ray tracing simulation in progress.</p>
Full article ">Figure 11
<p>Analysis of LoS ratio when sensors are away from the evaluation center.</p>
Full article ">Figure 12
<p>Relationship between distance and LoS ratio.</p>
Full article ">Figure 13
<p>Simulation overview of our location estimation process.</p>
Full article ">Figure 14
<p>Cylinder antenna used for simulation.</p>
Full article ">Figure 15
<p>Direction of arrival estimation using high altitude sensors.</p>
Full article ">Figure 16
<p>Location estimation method.</p>
Full article ">Figure 17
<p>CDF of errors using the HAPS at different distances against the emitting sources.</p>
Full article ">Figure 18
<p>CDF of errors using UAV at each distance.</p>
Full article ">Figure 19
<p>Receiving antenna layout assuming the DEURAS system.</p>
Full article ">Figure 20
<p>CDF of errors for different sensor altitudes with sensor radius of 500 m.</p>
Full article ">
23 pages, 916 KiB  
Article
Fake Base Station Detection and Link Routing Defense
by Sourav Purification, Jinoh Kim, Jonghyun Kim and Sang-Yoon Chang
Electronics 2024, 13(17), 3474; https://doi.org/10.3390/electronics13173474 - 1 Sep 2024
Viewed by 804
Abstract
Fake base stations comprise a critical security issue in mobile networking. A fake base station exploits vulnerabilities in the broadcast message announcing a base station’s presence, which is called SIB1 in 4G LTE and 5G NR, to get user equipment to connect to [...] Read more.
Fake base stations comprise a critical security issue in mobile networking. A fake base station exploits vulnerabilities in the broadcast message announcing a base station’s presence, which is called SIB1 in 4G LTE and 5G NR, to get user equipment to connect to the fake base station. Once connected, the fake base station can deprive the user of connectivity and access to the Internet/cloud. We discovered that a fake base station can disable the victim user equipment’s connectivity for an indefinite period of time, which we validated using our threat prototype against current 4G/5G practices. We designed and built a defense scheme which detects and blacklists a fake base station and then, informed by the detection, avoids it through link routing for connectivity availability. For detection and blacklisting, our scheme uses the real-time information of both the time duration and the number of request transmissions, the features of which are directly impacted by the fake base station’s threat and which have not been studied in previous research. Upon detection, our scheme takes an active measure called link routing, which is a novel concept in mobile/4G/5G networking, where the user equipment routes the connectivity request to another base station. To defend against a Sybil-capable fake base station, we use a history–reputation-based link routing scheme for routing and base station selection. We implemented both the base station and the user on software-defined radios using open-source 5G software (srsRAN v23.10 and Open5GS v2.6.6) for validation. We varied the base station implementation to simulate legitimate vs. faulty but legitimate vs. fake and malicious base stations, where a faulty base station notifies the user of the connectivity disruption and releases the session, while a fake base station continues to hold the session. We empirically analyzed the detection and identification thresholds, which vary with the fake base station’s power and the channel condition. By strategically selecting the threshold parameters, our scheme provides zero errors, including zero false positives, to avoid blacklisting a temporarily faulty base station that cannot provide connectivity at the time. Furthermore, our link routing scheme enables the base station to switch in order to restore the connectivity availability and limit the threat impact. We also discuss future directions to facilitate and encourage R&D in securing telecommunications and base station security. Full article
(This article belongs to the Special Issue Multimedia in Radio Communication and Teleinformatics)
Show Figures

Figure 1

Figure 1
<p>5G cellular network architecture with network entities, including user equipment, base station, and 5G core network.</p>
Full article ">Figure 2
<p>The protocol between user equipment, base station, and core network for setting up connectivity, including RRC and NAS. The RRC process between the user equipment and the base station (yellow-shaded) precedes the NAS process between the user equipment and the core network via the base station (blue-shaded). In NAS, the registration request can be repeated until the authentication request is received. The three figures differ in the nature of the base station scenarios: legitimate and working (green) vs. fake (red) vs. faulty (yellow). (<b>a</b>) The legitimate base station operates according to 3GPP standardized protocol [<a href="#B18-electronics-13-03474" class="html-bibr">18</a>]. (<b>b</b>) The fake base station does not comply with the protocol and ceases transmission after receiving the registration request. (<b>c</b>) The unintentionally faulty base station sends an RRC release and authentication reject, notifying user of the connectivity disruption.</p>
Full article ">Figure 2 Cont.
<p>The protocol between user equipment, base station, and core network for setting up connectivity, including RRC and NAS. The RRC process between the user equipment and the base station (yellow-shaded) precedes the NAS process between the user equipment and the core network via the base station (blue-shaded). In NAS, the registration request can be repeated until the authentication request is received. The three figures differ in the nature of the base station scenarios: legitimate and working (green) vs. fake (red) vs. faulty (yellow). (<b>a</b>) The legitimate base station operates according to 3GPP standardized protocol [<a href="#B18-electronics-13-03474" class="html-bibr">18</a>]. (<b>b</b>) The fake base station does not comply with the protocol and ceases transmission after receiving the registration request. (<b>c</b>) The unintentionally faulty base station sends an RRC release and authentication reject, notifying user of the connectivity disruption.</p>
Full article ">Figure 3
<p>Proof of concept fake base station attack on an Android user equipment device connected to a real-world 4G LTE network.</p>
Full article ">Figure 4
<p>Flowchart of our fake base station (BS) detection and link routing during RRC and NAS connection setup procedure. The black-colored blocks represent 3GPP standards and the blue-colored blocks represent our additions to the standards.</p>
Full article ">Figure 5
<p>Hardware setup for our implementation and experiment where the distance between the base station and user equipment is 5 m. The backend core network coexists with the base station in the same computer.</p>
Full article ">Figure 6
<p>Faulty but legitimate base station experimentation measurements at the user equipment level while varying transmission power at the base station. The plots include the averages and the <math display="inline"><semantics> <mrow> <mn>95</mn> <mo>%</mo> </mrow> </semantics></math> confidence interval. (<b>a</b>) RRC and NAS time duration between the UE and base station. (<b>b</b>) Number of registration requests sent by the user equipment.</p>
Full article ">Figure 7
<p>Error (false-positive rate) performances while varying <math display="inline"><semantics> <mi>τ</mi> </semantics></math>. (<b>a</b>) <math display="inline"><semantics> <msub> <mi>τ</mi> <mi>T</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>τ</mi> <mi>N</mi> </msub> </semantics></math> vary jointly with an equal <math display="inline"><semantics> <mi>τ</mi> </semantics></math>. (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>τ</mi> <mi>T</mi> </msub> <mo>=</mo> <mn>897</mn> </mrow> </semantics></math> ms and <math display="inline"><semantics> <msub> <mi>τ</mi> <mi>N</mi> </msub> </semantics></math> varies. (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>τ</mi> <mi>N</mi> </msub> <mo>=</mo> <mn>66</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <msub> <mi>τ</mi> <mi>T</mi> </msub> </semantics></math> varies.</p>
Full article ">Figure 8
<p>Link routing overhead in the time duration of storing, looking up the base station in the reputation vector, and switching connectivity to the legitimate base station.</p>
Full article ">
11 pages, 30719 KiB  
Article
Performance Evaluation of Carrier-Frequency Offset as a Radiometric Fingerprint in Time-Varying Channels
by Abdulsahib Albehadili and Ahmad Y. Javaid
Sensors 2024, 24(17), 5670; https://doi.org/10.3390/s24175670 - 31 Aug 2024
Viewed by 669
Abstract
The authentication of wireless devices through physical layer attributes has attracted a fair amount of attention recently. Recent work in this area has examined various features extracted from the wireless signal to either identify a uniqueness in the channel between the transmitter–receiver pair [...] Read more.
The authentication of wireless devices through physical layer attributes has attracted a fair amount of attention recently. Recent work in this area has examined various features extracted from the wireless signal to either identify a uniqueness in the channel between the transmitter–receiver pair or more robustly identify certain transmitter behaviors unique to certain devices originating from imperfect hardware manufacturing processes. In particular, the carrier frequency offset (CFO), induced due to the local oscillator mismatch between the transmitter and receiver pair, has exhibited good detection capabilities in stationary and low-mobility transmission scenarios. It is still unclear, however, how the CFO detection capability would hold up in more dynamic time-varying channels where there is a higher mobility. This paper experimentally demonstrates the identification accuracy of CFO for wireless devices in time-varying channels. To this end, a software-defined radio (SDR) testbed is deployed to collect CFO values in real environments, where real transmission and reception are conducted in a vehicular setup. The collected CFO values are used to train machine-learning (ML) classifiers to be used for device identification. While CFO exhibits good detection performance (97% accuracy) for low-mobility scenarios, it is found that higher mobility (35 miles/h) degrades (72% accuracy) the effectiveness of CFO in distinguishing between legitimate and non-legitimate transmitters. This is due to the impact of the time-varying channel on the quality of the exchanged pilot signals used for CFO detection at the receivers. Full article
(This article belongs to the Special Issue Security, Privacy and Trust in Connected and Automated Vehicles)
Show Figures

Figure 1

Figure 1
<p>The system model where Alice and Bob are, respectively, the legitimate transmitter and receiver, while Eve is a spoofing transmitter impersonating Alice.</p>
Full article ">Figure 2
<p>The CFO estimation and detection scheme, the top part depicts the OFDM burst which includes the ST field, LT field, and the pilot subcarriers used for CFO estimation. The first stage involves the cCFO, fCFO, and rCFO estimation from the OFDM burst. The second stage illustrates how the three extracted features are utilized for the ML classifiers training/testing.</p>
Full article ">Figure 3
<p>The GNURadio flowgraph of the OFDM receiver. The OFDM frame equalizer block (in dashed green line) includes our added code to extract cCFO, fCFO, and rCFO values estimated from received OFDM bursts detected in the flowgraph blocks preceding the equalizer block.</p>
Full article ">Figure 4
<p>The experiment setup: Alice’s and Eve’s antennas are mounted on the rear end of the vehicle, 2 inches apart; while Bob’s antenna is mounted on the front end of the vehicle with a distance of 15.5 feet from Alice and Eve.</p>
Full article ">Figure 5
<p>A snippet of the first 100 samples of the collected cCFO, fCFO, and rCFO values for stationary and mobility scenarios.</p>
Full article ">Figure 6
<p>ROC curves with their corresponding area under the curve (AUC) for four ML classifiers: LR, KNN, DT, and SVM trained and tested on cCFO, fCFO, and rCFO values extracted at 35 mph speed. For <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> cross-validation, 10 ROC curves for each classifier with their corresponding AUCs are obtained. A higher classier performance is indicated when an ROC curve approaches the left-top corner (i.e., <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>T</mi> <mi>P</mi> </mrow> </msub> <mo>≈</mo> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>F</mi> <mi>P</mi> </mrow> </msub> <mo>≈</mo> <mn>0</mn> </mrow> </semantics></math>), accumulating larger AUC.</p>
Full article ">
41 pages, 1010 KiB  
Review
Survey on 5G Physical Layer Security Threats and Countermeasures
by Michal Harvanek, Jan Bolcek, Jan Kufa, Ladislav Polak, Marek Simka and Roman Marsalek
Sensors 2024, 24(17), 5523; https://doi.org/10.3390/s24175523 - 26 Aug 2024
Cited by 1 | Viewed by 1953
Abstract
With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers. As the complexity of mobile cellular systems grows and the [...] Read more.
With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers. As the complexity of mobile cellular systems grows and the respective countermeasures are implemented to secure data transmissions, the attacks have become increasingly sophisticated on the one hand, but at the same time the system complexity can open up expanded opportunities for security and privacy breaches. After an in-depth summary of possible entry points to attacks to mobile networks, this paper first briefly reviews the basic principles of the physical layer implementation of 4G/5G systems, then gives an overview of possible attacks from a physical layer perspective. It also provides an overview of the software frameworks and hardware tool-software defined radios currently in use for experimenting with 4G/5G mobile networks, and it discusses their basic capabilities. In the final part, the paper summarizes the currently most promising families of techniques to detect illegitimate base stations—the machine-learning-based, localization-based, and behavior-based methods. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) SA vs. (<b>b</b>) NSA architecture of 5G New Radio (NR) network with possible vector attacks.</p>
Full article ">Figure 2
<p>5G architecture block scheme with critical interfaces (red text) and its end points. Purple and blue colors represent Control Plane (CP) and User Plane (UP) functions respectively.</p>
Full article ">Figure 3
<p>Frame structure comparison between 4G LTE and 5G NR.</p>
Full article ">Figure 4
<p>TDD mode vs. FDD in 5G NR.</p>
Full article ">Figure 5
<p>Initial access procedure and its messages. Parameters <math display="inline"><semantics> <mo>Δ</mo> </semantics></math> and K2 specified in [<a href="#B60-sensors-24-05523" class="html-bibr">60</a>].</p>
Full article ">Figure 6
<p>Illustration of jamming types with higher energy efficiency.</p>
Full article ">Figure 7
<p>Hybrid Automatic Repeat reQuest attack in PDCCH.</p>
Full article ">Figure 8
<p>NR beam-alignment procedure and jamming attack.</p>
Full article ">Figure 9
<p>Schematic of a simple CNN for processing 1D input data with depicted <span class="html-italic">Convolutional</span>, <span class="html-italic">Pooling</span>, <span class="html-italic">Flatten</span>, and <span class="html-italic">Fully-Connected</span> layers. The input data are vectors <span class="html-italic">X</span> with length <span class="html-italic">T</span>. Figure from [<a href="#B120-sensors-24-05523" class="html-bibr">120</a>] and extended.</p>
Full article ">Figure 10
<p>The general structure of the triplet network. The network has three inputs—an anchor signal <math display="inline"><semantics> <mrow> <mo>(</mo> <msup> <mi>x</mi> <mi>A</mi> </msup> <mo>)</mo> </mrow> </semantics></math>, a positive signal <math display="inline"><semantics> <mrow> <mo>(</mo> <msup> <mi>x</mi> <mi>P</mi> </msup> <mo>)</mo> </mrow> </semantics></math> and a negative signal <math display="inline"><semantics> <mrow> <mo>(</mo> <msup> <mi>x</mi> <mi>N</mi> </msup> <mo>)</mo> </mrow> </semantics></math>. The inputs are passed through concurrently in parallel through the same structures Deep architectures <span class="html-italic">F</span> with shared weights resulting in embeddings <math display="inline"><semantics> <mrow> <mi>F</mi> <mo>(</mo> <msup> <mi>x</mi> <mi>A</mi> </msup> <mo>)</mo> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>F</mi> <mo>(</mo> <msup> <mi>x</mi> <mi>P</mi> </msup> <mo>)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>F</mi> <mo>(</mo> <msup> <mi>x</mi> <mi>N</mi> </msup> <mo>)</mo> </mrow> </semantics></math>. The embeddings are directly used to calculate the triplet loss, and extra Feed Forward layers are used to calculate the global loss. The final loss is an addition of triplet loss and global loss.</p>
Full article ">Figure 11
<p>The fundamental building cells of (<b>a</b>) RNN and (<b>b</b>) LSTM networks. <math display="inline"><semantics> <msub> <mi>c</mi> <mi>t</mi> </msub> </semantics></math> denotes the cell state, <math display="inline"><semantics> <msub> <mi>h</mi> <mi>t</mi> </msub> </semantics></math> is the current hidden state, and <math display="inline"><semantics> <msub> <mi>x</mi> <mi>t</mi> </msub> </semantics></math> is the input data. <math display="inline"><semantics> <msub> <mi>h</mi> <mrow> <mi>t</mi> <mo>−</mo> <mn>1</mn> </mrow> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>c</mi> <mrow> <mi>t</mi> <mo>−</mo> <mn>1</mn> </mrow> </msub> </semantics></math> are the previous hidden and cell states, respectively. The yellow blocks are component-wise and the red blocks are layers. LSTM has marked the <span class="html-italic">Forget Gate</span>, <span class="html-italic">Input Gate</span>, and <span class="html-italic">Output Gate</span>.</p>
Full article ">Figure 12
<p>The vanilla Transformer architecture from [<a href="#B136-sensors-24-05523" class="html-bibr">136</a>]. The fundamental building blocks are the <span class="html-italic">Input Embeddings</span>, <span class="html-italic">Positional Encoding</span>, <span class="html-italic">Encoder</span> (green block), and <span class="html-italic">Decoder</span> (purple block). The orange blocks represent the Multi-head self attention (MSA) modules, the yellow blocks are the additions of residual connections and normalization layers, and the blue blocks are the feed forward neural networks.</p>
Full article ">Figure 13
<p>General autoencoder architecture.</p>
Full article ">Figure 14
<p>Propagation mechanisms of RIS (<b>left</b>), principle of RIS deployment (<b>right</b>).</p>
Full article ">
20 pages, 10080 KiB  
Article
Enhancing User Localization with an Integrated Sensing and Communication (ISAC) System: An Experimental UAV Search-and-Rescue Use Case
by Stefano Moro, Francesco Linsalata, Marco Manzoni, Maurizio Magarini and Stefano Tebaldini
Remote Sens. 2024, 16(16), 3031; https://doi.org/10.3390/rs16163031 - 18 Aug 2024
Cited by 1 | Viewed by 1448
Abstract
This paper explores the potential of an Integrated Sensing and Communication (ISAC) system to enhance search-and-rescue operations. While prior research has explored ISAC capabilities in Unmanned Aerial Vehicles (UAVs), our study focuses on addressing the specific challenges posed by modern communication standards (e.g., [...] Read more.
This paper explores the potential of an Integrated Sensing and Communication (ISAC) system to enhance search-and-rescue operations. While prior research has explored ISAC capabilities in Unmanned Aerial Vehicles (UAVs), our study focuses on addressing the specific challenges posed by modern communication standards (e.g., power, frequency, and bandwidth limitations) in the context of search-and-rescue missions. The paper details effective methods for processing echoed signals generated by downlink transmissions and evaluates key performance indicators, including Noise Equivalent Sigma Zero (NESZ) and channel capacity. Additionally, we utilize synchronization uplink signals transmitted by User Equipment (UE) to improve target detection and classification of possible victims by fusing SAR imagery with triangulation results from uplink signals. An experimental campaign validates the proposed setup by integrating SAR images of the environment with active localization results, both produced by a UAV equipped with a Software Defined Radio (SDR) payload. Our results demonstrate the system’s capability to detect and localize buried targets in avalanche scenarios, with localization errors ranging from centimeters to 10 m depending on environmental conditions. This successful integration highlights the practical applicability of our approach in challenging search-and-rescue missions. Full article
(This article belongs to the Section Environmental Remote Sensing)
Show Figures

Figure 1

Figure 1
<p>Illustration of the search-and-rescue scenario: A UAV flies over an emergency area, providing connectivity services to rescuers on the ground while simultaneously sensing for victims buried beneath the snow.</p>
Full article ">Figure 2
<p>Block diagram of the proposed localization approach, with each phase attributed to either the UAV or the User Equipment (UE).</p>
Full article ">Figure 3
<p>Illustration depicting the structure of a typical OFDM frame, showcasing divisions into sub-frames, slots, and individual OFDM symbols.</p>
Full article ">Figure 4
<p>Impulse response comparison with sub-carriers modulated with different constellation. (<b>a</b>) QPSK modulated sub-carriers. (<b>b</b>) The 256-QAM modulated sub-carriers.</p>
Full article ">Figure 5
<p>The channel capacity computed for different snow depths with a nominal flying altitude of the UAV of 150 m. The communication link between the drone and a rescuer above the snowpack is based on a 64-QAM.</p>
Full article ">Figure 6
<p>NESZ for various incidence angles and nominal heights of the UAV, with a target above the snowpack.</p>
Full article ">Figure 7
<p>NESZ simulations, varying altitude, and snow depth. The wetness of the snow is 1%. (<b>a</b>) Varying snow depth with UAV flying at 100 m altitude. (<b>b</b>) Varying UAV heights with target buried below 1 m of snow.</p>
Full article ">Figure 8
<p>Effect of snow wetness and UAV altitude change on NESZ. The extinction ratio in the snow can be found in [<a href="#B46-remotesensing-16-03031" class="html-bibr">46</a>].</p>
Full article ">Figure 9
<p>ISAC system focusing SAR images for an ideal point scatterer placed at different snow depths and a nominal UAV flying altitude of 150 m from the air–snow interface.</p>
Full article ">Figure 10
<p>Likelihood map generated with the active localization phase. The red dotted line represents the UAV track, with the green marker and the red diamond representing the estimated and real transmitter location, respectively. The estimation error is 2.7 m in this simulated scenario. A zoomed-in perspective at the transmitter location is reported in the top right corner of the figure.</p>
Full article ">Figure 11
<p>SAR image generated by back-projecting the range-compressed OFDM signal. The black dotted line represents the trajectory of the drone.</p>
Full article ">Figure 12
<p>SAR image generated with the original FMCW radar setup with full bandwidth. The green dotted line represents the trajectory of the drone.</p>
Full article ">Figure 13
<p>Optical satellite image of the scene, with superimposed the UAV trajectory in black dotted line and the corner reflectors with the red triangles.</p>
Full article ">Figure 14
<p>Result of the two-phase localization method: in grayscale, the SAR image is represented, in yellow, the ML map generated with the RSSI-based approach, and the green-dotted line is the UAV scan trajectory.</p>
Full article ">
24 pages, 5669 KiB  
Article
Design of Multichannel Spectrum Intelligence Systems Using Approximate Discrete Fourier Transform Algorithm for Antenna Array-Based Spectrum Perception Applications
by Arjuna Madanayake, Keththura Lawrance, Bopage Umesha Kumarasiri, Sivakumar Sivasankar, Thushara Gunaratne, Chamira U. S. Edussooriya and Renato J. Cintra
Algorithms 2024, 17(8), 338; https://doi.org/10.3390/a17080338 - 1 Aug 2024
Viewed by 1242
Abstract
The radio spectrum is a scarce and extremely valuable resource that demands careful real-time monitoring and dynamic resource allocation. Dynamic spectrum access (DSA) is a new paradigm for managing the radio spectrum, which requires AI/ML-driven algorithms for optimum performance under rapidly changing channel [...] Read more.
The radio spectrum is a scarce and extremely valuable resource that demands careful real-time monitoring and dynamic resource allocation. Dynamic spectrum access (DSA) is a new paradigm for managing the radio spectrum, which requires AI/ML-driven algorithms for optimum performance under rapidly changing channel conditions and possible cyber-attacks in the electromagnetic domain. Fast sensing across multiple directions using array processors, with subsequent AI/ML-based algorithms for the sensing and perception of waveforms that are measured from the environment is critical for providing decision support in DSA. As part of directional and wideband spectrum perception, the ability to finely channelize wideband inputs using efficient Fourier analysis is much needed. However, a fine-grain fast Fourier transform (FFT) across a large number of directions is computationally intensive and leads to a high chip area and power consumption. We address this issue by exploiting the recently proposed approximate discrete Fourier transform (ADFT), which has its own sparse factorization for real-time implementation at a low complexity and power consumption. The ADFT is used to create a wideband multibeam RF digital beamformer and temporal spectrum-based attention unit that monitors 32 discrete directions across 32 sub-bands in real-time using a multiplierless algorithm with low computational complexity. The output of this spectral attention unit is applied as a decision variable to an intelligent receiver that adapts its center frequency and frequency resolution via FFT channelizers that are custom-built for real-time monitoring at high resolution. This two-step process allows the fine-gain FFT to be applied only to directions and bands of interest as determined by the ADFT-based low-complexity 2D spacetime attention unit. The fine-grain FFT provides a spectral signature that can find future use cases in neural network engines for achieving modulation recognition, IoT device identification, and RFI identification. Beamforming and spectral channelization algorithms, a digital computer architecture, and early prototypes using a 32-element fully digital multichannel receiver and field programmable gate array (FPGA)-based high-speed software-defined radio (SDR) are presented. Full article
Show Figures

Figure 1

Figure 1
<p>Simulated magnitude response of (<b>a</b>) ideal 32-point DFT and (<b>b</b>) low-complexity 32-point ADFT [<a href="#B97-algorithms-17-00338" class="html-bibr">97</a>,<a href="#B98-algorithms-17-00338" class="html-bibr">98</a>].</p>
Full article ">Figure 2
<p>(<b>a</b>) The system architecture; (<b>b</b>) the experimental setup of the 32-beam array receiver operates at a 5.700 GHz to 5.800 GHz band followed by the ROACH-2 FPGA system (Xilinx Virtex-6 sx475T FPGA) digital back-end.</p>
Full article ">Figure 3
<p>ROACH-2-based DSP platform based on Xilinx Virtex-6 Sx475 FPGA, and 32-channel ADC card. We gratefully acknowledge Dr. Dan Werthimer at UC Berkeley and the CASPER community for their contributions to the ROACH-2 and CASPER tools.</p>
Full article ">Figure 4
<p>ADFT architecture with spatial windowing and power normalizing units.</p>
Full article ">Figure 5
<p>Simulated magnitude response of 32-point ADFT and its modifications under three different windowing techniques. Subplot (<b>a</b>) shows the baseline response without any windowing. Subplots (<b>b</b>–<b>d</b>) demonstrate the ADFT responses after applying the Butterworth, Humming, and Hanning windows, respectively.</p>
Full article ">Figure 6
<p>ADFT and FFT calibration, energy integration, and overall system block including BRAM registers.</p>
Full article ">Figure 7
<p>Sixteen beams measured from the 5.7 GHz array (vertical axis is in decibel, and the horizontal axis is the azimuthal angle <math display="inline"><semantics> <mrow> <mo>[</mo> <mrow> <mo>−</mo> <mn>90</mn> </mrow> <mo>,</mo> <mn>90</mn> <mo>]</mo> </mrow> </semantics></math>). Each subfigure contains the measured array factor patterns of the beam using the real inputs of the ADFT core. The imaginary component of each ADFT input is set to zero here, thus resulting in symmetrical main lobes as expected.</p>
Full article ">Figure 8
<p>Temporal PSD over the 1024 discrete frequency bins for the particular RF beam at multiple frequencies when the source is placed at 15°, 35°, and 50° broadside receiver angles.</p>
Full article ">Figure 9
<p>Illustration of the overall setup showing the transmitting antennas, receiving antenna array and the multibeam spectral sensor. The 32-element antenna array receiver captures signals from different directions, with the transmitters located 20 m away from the receiver.</p>
Full article ">
Back to TopTop