Spelling suggestions: "subject:"underlay"" "subject:"underlays""
21 |
From Vulnerability to Resilience: Securing Signal Transmission Against Jamming and Spoofing AttacksYang, Hanchao 13 January 2025 (has links)
Wireless signal transmission underpins crucial aspects of modern communication, but its susceptibility to jamming and spoofing attacks remains a major concern. These attacks have the potential to disrupt vital services, mislead devices, and compromise the integrity of wireless systems.
Many researchers have addressed anti-jamming and anti-spoofing techniques. Anti-jamming methods include coding techniques, specialized waveforms (e.g., spreading, beamforming, and modulation), and spatial avoidance using relays or reflectors. Anti-spoofing methods include angle-of-arrival detection with antenna arrays, cross-checking with sensor fusion, and authentication and encryption. In recent decades, artificial intelligence and machine learning have boosted the research in anti-jamming and anti-spoofing, making them more flourish.
Despite these advancements, significant challenges persist. For example, while various jamming resistance studies were proposed, their application to vulnerable 5G and narrowband Internet of Things (NB-IoT) communications are unexplored. Additionally, while low-density sparse coding (LDSC) is advantageous for multiplexing and spreading, research into the design of the code itself is lacking. Furthermore, sidelinks, a key component of 5G Advanced and future generation communication, hold the potential to become stealthy, secure channels for countering jamming attacks. As for machine learning based methods, they are limited in theoretical and simulation, instead of applied to commercial ready codebases. In GPS anti-spoofing, existing solutions are often expensive, bulky, or low in accuracy, while authentication and encryption approaches remain restricted to military use. Furthermore, although distributed mobile spoofer analysis has been theoretically explored, it still lacks real-world implementation studies.
Recognizing the increasing complexity of the wireless landscape, this thesis addresses these open problems through multiple works targeting anti-jamming and anti-spoofing. The first work develops a standard-compliant spread spectrum waveform for NB-IoT applications under jamming. The next focuses on LDSC design, applying it to spreading, and devising methods to obtain sub-optimal LDSC designs against interference. Another work proposes a secure, stealthy sidelink underlay channel and develops interference cancellation methods for flexibility and resilience. In the last work of anti-jamming, a machine learning based interference mitigation solution was proposed, running on open sourced industrial standard, narrowing the gap between academic and real world implementation. On the GPS anti-spoofing front, the first work presents a low-cost, smartphone-based spoofing detection solution matching the accuracy of antenna-array methods. The next work leverages crowdsourcing and sensor fusion, enabling high-accuracy and low-latency anti-spoofing. Finally, the thesis implements conceptual distributed GPS spoofer using low-cost software-defined radios (SDRs), addressing multi-spoofer challenges.
Overall, this work offers vital contributions to the security and resilience of wireless signal transmission. The techniques and solutions presented provide powerful approaches to counteract malicious attacks, fostering reliable communication in an increasingly connected world. Looking ahead, AI and ML hold immense potential for further innovation, bolstering security in 5G and future generation networks. / Doctor of Philosophy / Our phones, cars, navigation systems, and countless other devices rely on invisible wireless signals to work. But what happens when these signals are intentionally disrupted or manipulated? Jamming attacks can cut off vital communication, and spoofing tricks devices into giving false information, leading to mishaps and even security breaches. This research is dedicated to making wireless communication more secure and reliable.
We explored ways to design smarter wireless signals that can resist jamming, even in challenging environments. This includes technologies specifically tuned for smart sensors and other devices within the "Internet of Things," which connects everyday objects to the internet. Additionally, we developed techniques to hide important messages within existing wireless transmissions, making them harder for attackers to detect or disrupt. Finally, we created accessible ways to protect navigation systems (like GPS) from spoofing, helping ensure they give accurate information for safer journeys.
This work aims to protect the wireless systems we use every day from interference and deception. As smart devices continue to fill our world, research like this will become increasingly important to ensure these technologies work safely and reliably. Looking ahead, the next stages of this work will use powerful artificial intelligence to anticipate and neutralize wireless security threats, safeguarding the connected future.
|
22 |
Vývoj kompozitních maltových a cementových směsí / Development of Composite Mortar and Cement MixturesHlavinková, Eva January 2014 (has links)
This diploma thesis deals with the design of composition and the study of properties of the ternary binding system based on purposeful ettringite formation, which was subsequently used for the preparation of self-leveling floor materials, specifically self-levelling underlay and thin-layer floor screed. In the designed compositions of the mixtures is then focused attention on optimizing the dosage of two kinds of plasticizer agents, followed by assessing their impact on the technological properties of these materials.
|
23 |
Polyfunkční dům Prudký - stavebně technologický projekt / Multifunctional house Prudký - construction technology projectKaláb, Ondřej January 2018 (has links)
The aim of this Diploma Thesis is constructionally - technological solution of the rough construction of polyfunctional house on the corner of Bánskobystrická and Medlánecká streets in Brno Řečkovice. In the Diploma Thesis I will deal with the plan of the work procedure of the execution of roof construction layers, machine sets, itemized budget, construction schedule, construction site equipment, inspection and testing plan, ecology and transport relations related to the construction. I would like to point out the complication of the construction with a lack of space because the construction is in the area of Brno Řečkovice. The plan of construction execution was more difficult due to lack of space for storage of materials and machinery handling.
|
Page generated in 0.0368 seconds