Abstract: The growing popularity of systems based on Unmanned Aerial Vehicles (UAVs) is highlighting their vulnerability particularly in relation to the positioning system used. Typically, UAV architectures use the civilian GPS which is exposed to a number of different attacks, such as jamming or spoofing. This is why it is important to develop alternative methodologies to accurately estimate the actual UAV position without relying on GPS measurements only. In this paper we propose a position estimate method for UAVs based on monocular visual odometry. We have developed a flight control system capable of keeping track of the entire trajectory travelled, with a reduced dependency on the availability of GPS signal. Moreover, the simplicity of the developed solution makes it applicable to a wide range of commercial drones. The final goal is to allow for safer flights in all conditions, even under cyber-attacks trying to deceive the drone.
Abstract: Array signal processing techniques have been recently developing in a variety application of the performance enhancement of receivers by refraining the power of jamming and interference signals. In this scenario, biases induced to the antenna array receiver degrade significantly the accurate estimation of the carrier phase. Owing to the integration of frequency becomes the carrier phase, we have obtained the unbiased doppler frequency for the high precision estimation of carrier phase. The unbiased characteristic of Doppler frequency to the power jamming and the other interference signals allows achieving the highly accurate estimation of phase carrier. In this study, we have rigorously investigated the unbiased characteristic of Doppler frequency to the variation of the antenna array geometries. The simulation results have efficiently verified that the Doppler frequency remains also unbiased and accurate to the variation of antenna array geometries.
Abstract: The Unmanned Aircraft Systems (UAS) usually navigate through the Global Navigation Satellite System (GNSS) associated with an Inertial Navigation System (INS). However, GNSS can have its accuracy degraded at any time or even turn off the signal of GNSS. In addition, there is the possibility of malicious interferences, known as jamming. Therefore, the image navigation system can solve the autonomy problem, because if the GNSS is disabled or degraded, the image navigation system would continue to provide coordinate information for the INS, allowing the autonomy of the system. This work aims to evaluate the accuracy of the positioning though photogrammetry concepts. The methodology uses orthophotos and Digital Surface Models (DSM) as a reference to represent the object space and photograph obtained during the flight to represent the image space. For the calculation of the coordinates of the perspective center and camera attitudes, it is necessary to know the coordinates of homologous points in the object space (orthophoto coordinates and DSM altitude) and image space (column and line of the photograph). So if it is possible to automatically identify in real time the homologous points the coordinates and attitudes can be calculated whit their respective accuracies. With the methodology applied in this work, it is possible to verify maximum errors in the order of 0.5 m in the positioning and 0.6ยบ in the attitude of the camera, so the navigation through the image can reach values equal to or higher than the GNSS receivers without differential correction. Therefore, navigating through the image is a good alternative to enable autonomous navigation.
Abstract: Sub-Nyquist sampling jamming method (SNSJ) is a well known deception jamming method for inverse synthetic aperture radar (ISAR). However, the anti-decoy of the SNSJ method performs easier since the amplitude of the false-target images are weaker than the real-target image; the false-target images always lag behind the real-target image, and all targets are located in the same cross-range. In order to overcome the drawbacks mentioned above, a simple modulation based on SNSJ (M-SNSJ) is presented in this paper. The method first uses amplitude modulation factor to make the amplitude of the false-target images consistent with the real-target image, then uses the down-range modulation factor and cross-range modulation factor to make the false-target images move freely in down-range and cross-range, respectively, thus the capacity of deception is improved. Finally, the simulation results on the six available combinations of three modulation factors are given to illustrate our conclusion.
Abstract: Radio interference is one of the major concerns in
using the global positioning system (GPS) for civilian and military
applications. Interference signals are produced not only through
all electronic systems but also illegal jammers. Among different
types of interferences, continuous wave (CW) interference has strong
adverse impacts on the quality of the received signal. In this paper,
we make more detailed analysis for CW interference effects on
GPS signal quality. Based on the C/A code spectrum lines, the
influence of CW interference on the acquisition performance of
GPS receivers is further analysed. This influence is supported by
simulation results using GPS software receiver. As the most important
user parameter of GPS receivers, the mathematical expression of bit
error probability is also derived in the presence of CW interference,
and the expression is consistent with the Monte Carlo simulation
results. The research on CW interference provides some theoretical
gist and new thoughts on monitoring the radio noise environment and
improving the anti-jamming ability of GPS receivers.
Abstract: Wireless networks are built upon the open shared
medium which makes easy for attackers to conduct malicious
activities. Jamming is one of the most serious security threats to
information economy and it must be dealt efficiently. Jammer
prevents legitimate data to reach the receiver side and also it
seriously degrades the network performance. The objective of this
paper is to provide a general overview of jamming in wireless
network. It covers relevant works, different jamming techniques,
various types of jammers and typical prevention techniques.
Challenges associated with comparing several anti-jamming
techniques are also highlighted.
Abstract: This paper presents a novel algorithm for secure,
reliable and flexible transmission of big data in two hop wireless
networks using cooperative jamming scheme. Two hop wireless
networks consist of source, relay and destination nodes. Big data has
to transmit from source to relay and from relay to destination by
deploying security in physical layer. Cooperative jamming scheme
determines transmission of big data in more secure manner by
protecting it from eavesdroppers and malicious nodes of unknown
location. The novel algorithm that ensures secure and energy balance
transmission of big data, includes selection of data transmitting
region, segmenting the selected region, determining probability ratio
for each node (capture node, non-capture and eavesdropper node) in
every segment, evaluating the probability using binary based
evaluation. If it is secure transmission resume with the two- hop
transmission of big data, otherwise prevent the attackers by
cooperative jamming scheme and transmit the data in two-hop
transmission.
Abstract: In this paper, we investigate the effect of friendly
jamming power allocation strategies on the achievable average
secrecy rate over a bank of parallel fading wiretap channels.
We investigate the achievable average secrecy rate in parallel
fading wiretap channels subject to Rayleigh and Rician fading.
The achievable average secrecy rate, due to the presence of a
line-of-sight component in the jammer channel is also evaluated.
Moreover, we study the detrimental effect of correlation across the
parallel sub-channels, and evaluate the corresponding decrease in the
achievable average secrecy rate for the various fading configurations.
We also investigate the tradeoff between the transmission power
and the jamming power for a fixed total power budget. Our
results, which are applicable to current orthogonal frequency division
multiplexing (OFDM) communications systems, shed further light on
the achievable average secrecy rates over a bank of parallel fading
channels in the presence of friendly jammers.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: Due to its capability to resist jamming signals, chirp
spread spectrum (CSS) technique has attracted much attention in
the area of wireless communications. However, there has been little
rigorous analysis for the performance of the CSS communication
system in jamming environments. In this paper, we present analytic
results on the performance of a CSS system by deriving symbol
error rate (SER) expressions for a CSS M-ary phase shift keying
(MPSK) system in the presence of broadband and tone jamming
signals, respectively. The numerical results show that the empirical
SER closely agrees with the analytic result.