期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Radar Signal Recognition by CWD Picture Features 被引量:4
1
作者 Erfan Tahbaz Tavakoli abolfazl falahati 《International Journal of Communications, Network and System Sciences》 2012年第4期238-242,共5页
In this paper a system for automatic recognition of radar waveform is introduced. This technique is used in many spectrum management, surveillance, and cognitive radio and radar applications. For instance the transmit... In this paper a system for automatic recognition of radar waveform is introduced. This technique is used in many spectrum management, surveillance, and cognitive radio and radar applications. For instance the transmitted radar signal is coded into six codes based on pulse compression waveform such as linear frequency modulation (LFM), Frank code, P1, P2, P3 and P4 codes, the latter four are poly phase codes. The classification system is based on drawing Choi Willliams Distribution (CWD) picture and extracting features from it. In this study, various new types of features are extracted from CWD picture and then a pattern recognition method is used to recognize the spectrum. In fact, signals from CWD picture are defined using biometric techniques. We also employ false reject rate (FRR) and false accept rate (FAR) which are two types of fault measurement criteria that are deploy in biometric papers. Fairly good results are obtained for recognition of Signal to Noise Ratio (-11 dB). 展开更多
关键词 PULSE Compression RADAR SPECTRUM Management Signal RECOGNITION
下载PDF
Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment 被引量:1
2
作者 Amirhossein Ebrahimzadeh abolfazl falahati 《Journal of Information Security》 2013年第1期1-6,共6页
Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or unde... Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or undesired receiver does not have the knowledge of the spreading code. For this reason, unencrypted M-sequences are a deficient choice for the spreading code when a high level of security is required. The primary objective of this paper is to analyze vulnerability of linear feedback shift register (LFSRs) codes. Then, a new method based on encryption algorithm applied over spreading codes, named hidden frequency hopping is proposed to improve the security of FHSS. The proposed encryption security algorithm is highly reliable, and can be applied to all existing data communication systems based on spread spectrum techniques. Since the multi-user detection is an inherent characteristic for FHSS, the multi-user interference must be studied carefully. Hence, a new method called optimum pair “key-input” selection is proposed which reduces interference below the desired constant threshold. 展开更多
关键词 FREQUENCY HOPPING SPREAD SPECTRUM KEY Distribution Centre KEY Encryption KEY Linear Feedback Shift REGISTER FREQUENCY HOPPING Code Division Multiple Access Direct Sequence SPREAD SPECTRUM
下载PDF
Employing Power Allocation to Enhance Zero Forcing Scheme Advantages over Multi-Antenna Multiple Relay Networks
3
作者 abolfazl falahati Y. Attar Izi 《International Journal of Communications, Network and System Sciences》 2012年第11期736-742,共7页
A multi-antenna multiple relay (MAMR) network is considered and a variation of two-hop zero-forcing amplify-forward relaying method is proposed. Deploying ZF method together with application of diagonal power allocati... A multi-antenna multiple relay (MAMR) network is considered and a variation of two-hop zero-forcing amplify-forward relaying method is proposed. Deploying ZF method together with application of diagonal power allocation matrices at the relays, it is shown that the overall MAMR network is simplified to M independent single antenna multiple relay (SAMR) networks, where M is the number of source and destination antennas. This enables to incorporate network beamforming proposed for SAMR networks. Accordingly, using the BER as the performance metric, we present simulation results to show the proposed approach outperforms the common ZF method addressed in the literature. 展开更多
关键词 Cooperative Communication MIMO MULTIPLE Antennas MULTIPLE Relay (MAMR) Networks Zero FORCING Power Allocation
下载PDF
Transmission over Cognitive Radio Channel with Novel Secure LT Code
4
作者 Elham Hosseini abolfazl falahati 《Communications and Network》 2013年第3期198-203,共6页
With the increasing of communication applications in recent years, the demand for radio spectral resources has increased significantly. Cognitive radio scenario was proposed to improve spectrum efficiency in wireless ... With the increasing of communication applications in recent years, the demand for radio spectral resources has increased significantly. Cognitive radio scenario was proposed to improve spectrum efficiency in wireless communication systems. In cognitive radio network, it is essential that control information is sent securely and reliably. Ensuring the trustworthiness of the transmitting of spectrum sensing information is important in the CR networks since spectrum sensing directly affects spectrum management and incumbent coexistence. In this paper, the first secondary link channel model is presented, then a secure LT Code is proposed to be compatible with presented channel model and acquires good QoS. As we may know, LT code overcomes packet loss when the channel of the SU is reclaimed by PU. In the new proposed combined encoding and ciphered block, a LT code matrix is used to generate a symmetric cryptographic key. Thus, less complexity observed in the processing computation. Besides, cryptographic key is not sent over the channel. As a result, an attacker has no way to eavesdrop the key unless he is prepared to consider all possible key combinations. This replaced block supplies secure controlling channel and increases spectrum efficiency too. 展开更多
关键词 COGNITIVE RADIO SYMMETRIC CRYPTOGRAPHIC KEY Generation LT Code
下载PDF
A Fault-Tolerant Cooperative Spectrum Sensing Algorithm over Cognitive Radio Network Based on Wireless Sensor Network
5
作者 Mohammad Akbari abolfazl falahati 《Wireless Sensor Network》 2011年第3期83-91,共9页
A serious threat to cognitive radio networks that sense the spectrum in a cooperative manner is the transmission of false spectrum sensing data by malicious sensor nodes. SNR fluctuations due to wireless channel effec... A serious threat to cognitive radio networks that sense the spectrum in a cooperative manner is the transmission of false spectrum sensing data by malicious sensor nodes. SNR fluctuations due to wireless channel effects complicate handling such attackers even further. This enforces the system to acquire authentication. Actually, the decision maker needs to determine the reliability or trustworthiness of the shared data. In this paper, the evaluation process is considered as an estimation dilemma on a set of evidences obtained through sensor nodes that are coordinated in an underlying wireless sensor network. Then, a likelihood-based computational trust evaluation algorithm is proposed to determine the trustworthiness of each sensor node's data. The proposed procedure just uses the information which is obtained from the sensor nodes without any presumptions about node’s reliability. Numerical results confirm the effectiveness of the algorithm in eliminating malicious nodes or faulty nodes which are not necessarily conscious attackers. 展开更多
关键词 Cognitive Radio NETWORK (CRN) Cooperative Spectrum Sensing Wireless Sensor NETWORK (WSN) TRUST Evaluation Maximum LIKELIHOOD Estimation (MLE)
下载PDF
An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
6
作者 Masoud KAVEH abolfazl falahati 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第7期1010-1019,共10页
Recently,bionic signals have been used to achieve covert underwater acoustic communication(UWAC)with high signal-to-noise ratios(SNRs)over transmission systems.A high SNR allows the attackers to proceed with their mis... Recently,bionic signals have been used to achieve covert underwater acoustic communication(UWAC)with high signal-to-noise ratios(SNRs)over transmission systems.A high SNR allows the attackers to proceed with their mischievous goals and makes transmission systems vulnerable against malicious attacks.In this paper we propose an improved Merkle hash tree based secure scheme that can resist current underwater attacks,i.e.,replay attack,fabricated message attack,message-altering attack,and analyst attack.Security analysis is performed to prove that the proposed scheme can resist these types of attacks.Performance evaluations show that the proposed scheme can meet UWAC limitations due to its efficiency regarding energy consumption,communication overhead,and computation cost. 展开更多
关键词 Dolphin whistle Improved Merkle hash tree Secure underwater acoustic communication(UWAC)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部