SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(TEKNIK OCH TEKNOLOGIER) hsv:(Elektroteknik och elektronik) ;lar1:(kth)"

Sökning: hsv:(TEKNIK OCH TEKNOLOGIER) hsv:(Elektroteknik och elektronik) > Kungliga Tekniska Högskolan

  • Resultat 1-10 av 21252
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Zhang, Kewei, et al. (författare)
  • Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks
  • Annan publikation (övrigt vetenskapligt/konstnärligt)abstract
    • As the security of global navigation satellite systems (GNSS) for civilian usage is increasingly important, navigation message authentication (NMA) significantly improves resilience to spoofing attacks. However, not all attacks can be effectively countered: a strong variant of replay/relay attacks, distance-decreasing (DD) attacks, can shorten pseudorange measurements, without manipulating the cryptographically protected navigation message, thus manipulating the position, velocity, and time solution undetected. First, we discuss how DD attacks can tamper with GNSS signals, demonstrating the attack effectiveness on a recorded Galileo signal. DD attacks might introduce bit errors to the forged signals, but the adversary can keep this error rate very low with proper attack parameter settings. Then, based on our mathematical model of the prompt correlator output of the tracking phase at the victim receiver, we find that the correlator output distribution changes in the presence of DD attacks. This leads us to apply hypothesis testing to detect DD attacks, notably a Goodness of Fit (GoF) test and a generalized likelihood ratio test (GLRT), depending on the victim’s knowledge on the DD attacks. Monte Carlo simulations are used to evaluate the detection probability and the receiver operating characteristic (ROC) curves for two tests, for different adversary configuration and noise settings. Then, we evaluate the effectiveness of the GoF and GLRT tests with a synthesized DD signal. Both tests can detect DD attacks with similar performance in high signal-to-noise ratio (SNR) environments. The GLRT detection probability is approximately 20% higher than that of the GoF test in low SNR environments.
  •  
2.
  • Gülgün, Ziya, et al. (författare)
  • Multiple Spoofer Detection for Mobile GNSS Receivers Using Statistical Tests
  • 2021
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 9, s. 166382-166394
  • Tidskriftsartikel (refereegranskat)abstract
    • We consider Global Navigation Satellite Systems (GNSS) spoofing attacks and devise a countermeasure appropriate for mobile GNSS receivers. Our approach is to design detectors that, operating after the signal acquisition, enable the victim receiver to determine with high probability whether it is under a spoofing attack or not. Namely, the binary hypothesis is that either the GNSS receiver tracks legitimate satellite signals, H-0, or spoofed signals, H-1. We assume that there exists an unknown number of multiple spoofers in the environment and the attack strategy (which legitimate signals are spoofed by which spoofers) is not known to the receiver. Based on these assumptions, we propose an algorithm that identifies the number of spoofers and clusters the spoofing data by using Bayesian information criterion (BIC) rule. Depending on the estimated and clustered data we propose a detector, called as generalized likelihood ratio (GLRT)-like detector. We compare the performance of the GLRT-like detector with a genie-aided detector in which the attack strategy and the number of spoofers is known by the receiver. In addition to this, we extend the GLRT-like detector for the case where the noise variance is also unknown and present the performance results.
  •  
3.
  • Kang, Jeongwan, et al. (författare)
  • Optimized Switching Between Sensing and Communication for mmWave MU-MISO Systems
  • 2022
  • Ingår i: 2022 Ieee International Conference On Communications Workshops (Icc Workshops). - : Institute of Electrical and Electronics Engineers (IEEE). ; , s. 498-503
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we propose a scheme optimizing the per-user channel sensing duration in millimeter-wave (mmWave) multi-user multiple-input single-output (MU-MISO) systems. For each user, the BS predicts the effective rate to be achieved after pilot transmission. Then, the channel sensing duration of each user is optimized by ending the pilot transmission when the predicted rate is lower than the current rate. The robust regularized zero-forcing (RRZF) precoder and equal power allocation (EPA) are adopted to transmit sensing pilots and data. Numerical results show that the more severe the interference among users, the longer channel sensing duration is required. Moreover, the proposed scheme results in a higher sum rate compared to benchmark schemes.
  •  
4.
  • Schrammar, Nicolas, et al. (författare)
  • Average Throughput in AWGN Cognitive Fading Interference Channel with Multiple Secondary Pairs
  • 2012
  • Ingår i: Proceedings of the 2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2012. - : IEEE Computer Society. - 2166-5370. - 9781936968558 - 9781467329767 ; , s. 158-162
  • Konferensbidrag (refereegranskat)abstract
    • We consider the additive white Gaussian noise (AWGN) cognitive fading interference channel consisting of one primary and multiple secondary transmitter-receiver pairs. The secondary transmitters have non-causal knowledge of the primary message. We find a tuple of achievable rates by utilizing the discrete superposition model (DSM), which is a simplified, deterministic channel model. The coding scheme devised for the DSM can be translated into a coding scheme for the AWGN model, where the rate achieved in the AWGN model is at most a constant gap below the rate achieved in the DSM. We then calculate the average throughput of the secondary pairs under the assumption of Rayleigh fading channels. The main result is that our scheme performs well in the weak interference regime. The sum-throughput increases with the number of secondary pairs.
  •  
5.
  •  
6.
  • Wang, Chao, et al. (författare)
  • On the Degrees of Freedom of Parallel Relay Networks
  • 2010
  • Ingår i: 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010. - 1930-529X. - 9781424456383 - 9781424456369
  • Konferensbidrag (refereegranskat)abstract
    • We study the degrees of freedom (DOF) of a single-antenna M-user time-varying parallel relay network, where the communications between M pairs of unconnected sources and destinations are provided by a large number of half-duplex decode-and-forward (DF) relays. Unlike the conventional relaying strategy which demands all the relays to simultaneously assist the sources, we divide the relays into two clusters and permit them to take turns forwarding the source messages. With appropriate interference alignment design, it is proved that the M-user time-varying relay network has M DOF, provided that the number of relays is infinitely large.
  •  
7.
  • Yanggratoke, Rerngvit, 1983- (författare)
  • Data-driven Performance Prediction and Resource Allocation for Cloud Services
  • 2016
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Cloud services, which provide online entertainment, enterprise resource management, tax filing, etc., are becoming essential for consumers, businesses, and governments. The key functionalities of such services are provided by backend systems in data centers. This thesis focuses on three fundamental problems related to management of backend systems. We address these problems using data-driven approaches: triggering dynamic allocation by changes in the environment, obtaining configuration parameters from measurements, and learning from observations. The first problem relates to resource allocation for large clouds with potentially hundreds of thousands of machines and services. We developed and evaluated a generic gossip protocol for distributed resource allocation. Extensive simulation studies suggest that the quality of the allocation is independent of the system size for the management objectives considered.The second problem focuses on performance modeling of a distributed key-value store, and we study specifically the Spotify backend for streaming music. We developed analytical models for system capacity under different data allocation policies and for response time distribution. We evaluated the models by comparing model predictions with measurements from our lab testbed and from the Spotify operational environment. We found the prediction error to be below 12% for all investigated scenarios.The third problem relates to real-time prediction of service metrics, which we address through statistical learning. Service metrics are learned from observing device and network statistics. We performed experiments on a server cluster running video streaming and key-value store services. We showed that feature set reduction significantly improves the prediction accuracy, while simultaneously reducing model computation time. Finally, we designed and implemented a real-time analytics engine, which produces model predictions through online learning.
  •  
8.
  • Zhang, Kewei (författare)
  • Secure GNSS-based Positioning and Timing : Distance-Decreasing attacks, fault detection and exclusion, and attack detection with the help of opportunistic signals
  • 2021
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • With trillions of devices connected in large scale systems in a wired or wireless manner, positioning and synchronization become vital. Global Navigation Satellite System (GNSS) is the first choice to provide global coverage for positioning and synchronization services. From small mobile devices to aircraft, from intelligent transportation systems to cellular networks, and from cargo tracking to smart grids, GNSS plays an important role, thus, requiring high reliability and security protection.       However, as GNSS signals propagate from satellites to receivers at distance of around 20 000 km, the signal power arriving at the receivers is very low, making the signals easily jammed or overpowered. Another vulnerability stems from that civilian GNSS signals and their specifications are publicly open, so that anyone can craft own signals to spoof GNSS receivers: an adversary forges own GNSS signals and broadcasts them to the victim receiver, to mislead the victim into believing that it is at an adversary desired location or follows a false trajectory, or adjusts its clock to a time dictated by the adversary. Another type of attack is replaying GNSS signals: an adversary transmits a pre-recorded GNSS signal stream to the victim receiver, so that the receiver calculates an erroneous position and time. Recent incidents reported in press show that the GNSS functionalities in a certain area, e.g., Black Sea, have been affected by cyberattacks composed of the above-mentioned attack types.        This thesis, thus, studies GNSS vulnerabilities and proposes detection and mitigation methods for GNSS attacks, notably spoofing and replay attacks. We analyze the effectiveness of one important and powerful replay attack, the so-called Distance-decreasing (DD) attacks that were previously investigated for wireless communication systems, on GNSS signals. DD attacks are physical layer attacks, targeting time-of-flight ranging protocols, to shorten the perceived as measured distance between the transmitter and receiver. The attacker first transmits an adversary-chosen data bit to the victim receiver before the signal arrives at the attacker; upon receipt of the GNSS signal, the attacker estimates the data bit based on the early fraction of the bit period, and then switches to transmitting the estimate to the victim receiver. Consequently, the DD signal arrives at the victim receiver earlier than the genuine GNSS signals would have, which in effect shortens the pseudorange measurement between the sender (satellite) and the victim receiver, consequently, affecting the calculated position and time of the receiver. We study how the DD attacks affect the bit error rate (BER) of the received signals at the victim, and analyze its effectiveness, that is, the ability to shorten pseudorange measurements, on different GNSS signals. Several approaches are considered for the attacker to mount a DD attack with high probability of success (without being detected) against a victim receiver, for cryptographically unprotected and protected signals. We analyze the tracking output of the DD signals at the victim receiver and propose a Goodness of Fit (GoF) test and a Generalized Likelihood Ratio Test (GLRT) to detect the attacks. The evaluation of the two tests shows that they are effective, with the result being perhaps more interesting when considering DD attacks against Galileo signals that can be cryptographically protected.       Moreover, this thesis investigates the feasibility of validating the authenticity of the GNSS signals with the help of opportunistic signals, which is information readily available in modern communication environments, e.g., 3G, 4G and WiFi. We analyze the time synchronization accuracy of different technologies, e.g., Network Time Protocol (NTP), WiFi and local oscillator, as the basis for detecting a discrepancy with the GNSS-obtained time. Two detection approaches are proposed and one testbench is designed for the evaluation. A synthesized spoofing attack is used to verify the effectiveness of the approaches.       Beyond attack detection, we develop algorithms to detect and exclude faulty signals, namely the Clustering-based Solution Separation Algorithm (CSSA) and the Fast Multiple Fault Detection and Exclusion (FM-FDE). They both utilize the redundant available satellites, more than the minimum a GNSS receiver needs for position and time offset calculation. CSSA adopts data clustering to group subsets of positions calculated with different subsets of available satellites. Basically, these positions, calculated with subsets not containing any faulty satellites, should be close to each other, i.e., in a dense area; otherwise they should be scattered. FM-FDE is a more efficient algorithm that uses distances between positions, calculated with fixed-size subsets, as test statistics to detect and exclude faulty satellite signals. As the results show, FM-FDE runs faster than CSSA and other solution-separation fault detection and exclusion algorithms while remaining equally effective.
  •  
9.
  • Zhang, Lu, et al. (författare)
  • Lattice pilot aided DMT transmission for optical interconnects achieving 5.82-bits/Hz per lane
  • 2019
  • Ingår i: IET Conference Publications. - : Institution of Engineering and Technology. ; 2019:CP765
  • Konferensbidrag (refereegranskat)abstract
    • We experimentally demonstrate 276-Gbps net rate 128QAM-DMT transmission at soft-FEC limit in an IM/DD system with a single C-band packaged EML, a DAC and a photo-detector, proposing a lattice pilot algorithm for channel equalization with only 1% overhead reaching spectral efficiency of 5.82-bits/Hz per lane. 
  •  
10.
  • Björnson, Emil, et al. (författare)
  • DISTRIBUTED MASSIVE MIMO IN CELLULAR NETWORKS: IMPACT OF IMPERFECT HARDWARE AND NUMBER OF OSCILLATORS
  • 2015
  • Ingår i: 2015 23rd European Signal Processing Conference. - : Institute of Electrical and Electronics Engineers (IEEE). - 2076-1465. - 9780992862633 ; , s. 2436-2440
  • Konferensbidrag (refereegranskat)abstract
    • Distributed massive multiple-input multiple-output (MIMO) combines the array gain of coherent MIMO processing with the proximity gains of distributed antenna setups. In this paper, we analyze how transceiver hardware impairments affect the downlink with maximum ratio transmission. We derive closed-form spectral efficiencies expressions and study their asymptotic behavior as the number of the antennas increases. We prove a scaling law on the hardware quality, which reveals that massive MIMO is resilient to additive distortions, while multiplicative phase noise is a limiting factor. It is also better to have separate oscillators at each antenna than one per BS.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 21252
Typ av publikation
konferensbidrag (11309)
tidskriftsartikel (7189)
doktorsavhandling (880)
annan publikation (451)
bokkapitel (410)
licentiatavhandling (386)
visa fler...
rapport (277)
patent (189)
forskningsöversikt (76)
bok (53)
konstnärligt arbete (24)
proceedings (redaktörskap) (15)
samlingsverk (redaktörskap) (14)
recension (2)
visa färre...
Typ av innehåll
refereegranskat (18178)
övrigt vetenskapligt/konstnärligt (2785)
populärvet., debatt m.m. (283)
Författare/redaktör
Ottersten, Björn, 19 ... (744)
Tenhunen, Hannu (401)
Johansson, Karl Henr ... (394)
Dimarogonas, Dimos V ... (390)
He, Sailing (390)
Skoglund, Mikael (379)
visa fler...
Östling, Mikael (311)
Johansson, Karl H., ... (308)
Jantsch, Axel (277)
Björnson, Emil, Prof ... (276)
Sandberg, Henrik (270)
Hjalmarsson, Håkan, ... (263)
Söder, Lennart (260)
Fischione, Carlo (255)
Johansson, Mikael (219)
Lu, Zhonghai (213)
Wosinska, Lena (206)
Chen, Jiajia (206)
Quevedo-Teruel, Osca ... (204)
Xiao, Ming, 1975- (197)
Chatzinotas, S. (196)
Popov, Sergei (189)
Nee, Hans-Peter, 196 ... (187)
Wahlberg, Bo, 1959- (185)
Wang, Lihui (183)
Händel, Peter (182)
Hemani, Ahmed (180)
Pang, Xiaodan, Dr. (178)
Schatz, Richard, 196 ... (174)
Händel, Peter, 1962- (167)
Stemme, Göran (162)
Jansson, Magnus (156)
Vanfretti, Luigi (155)
Dán, György (155)
Zheng, Li-Rong (152)
Ozolins, Oskars (151)
$$$Nee, Hans Peter (142)
Rasmussen, Lars Kild ... (142)
Zetterling, Carl-Mik ... (139)
Skoglund, Mikael, 19 ... (135)
Larsson, Erik G (133)
Zander, Jens (133)
Engdahl, Göran (132)
Gross, James, 1975- (129)
Johansson, Karl H. (125)
Söder, Lennart, 1956 ... (121)
Öberg, Johnny (120)
Chatterjee, Saikat (120)
Nordström, Lars (116)
Xiao, Ming (116)
visa färre...
Lärosäte
Linköpings universitet (484)
RISE (453)
Chalmers tekniska högskola (426)
Uppsala universitet (343)
Högskolan i Gävle (232)
visa fler...
Lunds universitet (221)
Mälardalens universitet (91)
Mittuniversitetet (90)
Stockholms universitet (85)
Umeå universitet (68)
Göteborgs universitet (60)
Linnéuniversitetet (59)
Karolinska Institutet (57)
Luleå tekniska universitet (55)
Högskolan i Skövde (48)
Högskolan i Borås (42)
Örebro universitet (34)
Blekinge Tekniska Högskola (20)
Högskolan i Halmstad (17)
Karlstads universitet (16)
Södertörns högskola (14)
Jönköping University (10)
Gymnastik- och idrottshögskolan (7)
Högskolan Dalarna (7)
Handelshögskolan i Stockholm (5)
Försvarshögskolan (5)
VTI - Statens väg- och transportforskningsinstitut (5)
Malmö universitet (4)
Sveriges Lantbruksuniversitet (3)
Högskolan Kristianstad (2)
Högskolan Väst (1)
Konstfack (1)
Röda Korsets Högskola (1)
Kungl. Musikhögskolan (1)
visa färre...
Språk
Engelska (21144)
Svenska (84)
Japanska (9)
Tyska (3)
Franska (3)
Spanska (3)
visa fler...
Italienska (2)
Portugisiska (2)
Polska (1)
Ungerska (1)
visa färre...
Forskningsämne (UKÄ/SCB)
Teknik (21252)
Naturvetenskap (1882)
Samhällsvetenskap (136)
Medicin och hälsovetenskap (123)
Humaniora (44)
Lantbruksvetenskap (5)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy