scholarly journals Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Shuhua Huang ◽  
Weiwei Liu ◽  
Guangjie Liu ◽  
Yuewei Dai ◽  
Huiwen Bai

With the development of wireless communication technology, more and more information leakage is realized through a wireless covert channel, which brings great challenges to the security of wireless communication. Compared with the wireless covert channel on the upper layer, the wireless covert channel based on the physical layer (WCC-P) has better concealment and greater capacity. As the most widely used scheme of WCC-P, the wireless covert channel with the modulation of the constellation point (WCC-MC) has attracted more and more attention. In this paper, a deep learning scheme based on amplitude-phase characteristics is proposed to detect and classify the WCC-MC scheme. We first extract the amplitude and phase characteristic of error vector magnitude (EVM) and constellation points and then map the amplitude and phase characteristic to the grayscale image, respectively. Finally, the generated feature images are trained, detected, and classified with the adjusted convolution neural network. The experimental results show that the detection accuracy of our proposed scheme can reach 98.5%, and the classification accuracy can reach 81.7%.

2021 ◽  
Vol 11 (11) ◽  
pp. 5039
Author(s):  
Yosoon Choi ◽  
Yeanjae Kim

A smart helmet is a wearable device that has attracted attention in various fields, especially in applied sciences, where extensive studies have been conducted in the past decade. In this study, the current status and trends of smart helmet research were systematically reviewed. Five research questions were set to investigate the research status of smart helmets according to the year and application field, as well as the trend of smart helmet development in terms of types of sensors, microcontrollers, and wireless communication technology. A total of 103 academic research articles published in the past 11 years (2009–2020) were analyzed to address the research questions. The results showed that the number of smart helmet applications reported in literature has been increasing rapidly since 2018. The applications have focused mostly on ensuring the safety of motorcyclists. A single-board-based modular concept unit, such as the Arduino board, and sensor for monitoring human health have been used the most for developing smart helmets. Approximately 85% of smart helmets have been developed to date using wireless communication technology to transmit data obtained from smart helmets to other smart devices or cloud servers.


2013 ◽  
Vol 662 ◽  
pp. 896-901
Author(s):  
Zong Jin Liu ◽  
Yang Yang ◽  
Zheng Fang ◽  
Yan Yan Xu

Because of rapid development of wireless communication technology, there is an increasing adoption of mobile advertising, such as location based advertising (LBA). To what extent can LBA improve advertising effectiveness is an important topic in the field of wireless communication technology research. Most researches quantify long term impacts of advertisings by VAR (Vector Autoregressive) model. However, compared to VAR model, VECM (Vector Error Correction Model) is a better method in that it allows one to estimate both a long-term equilibrium relationship and a short-term dynamic error correction process. In this study, we employ VECM to explore LBA’s (Location Based Advertising) and PUA’s (Pop-up Advertising) sales impact in both short and long terms. The developed VECM reveals that LBA’s sales impact is about more than2 times as big as PUA’s in short dynamic term and nearly 6 times bigger than PUA’s in long equilibrium term. These findings add to advertising and VECM literatures. These results can give managers more confident to apply wireless communication technology to advertising.


2013 ◽  
Vol 2013 ◽  
pp. 1-8 ◽  
Author(s):  
Bo Zhou ◽  
Kun Zhang ◽  
Wenbiao Zhou ◽  
Yanjun Zhang ◽  
Dake Liu

The carrier-frequency (CF) and intermediate-frequency (IF) pulse-width modulators (PWMs) based on delay lines are proposed, where baseband signals are conveyed by both positions and pulse widths or densities of the carrier clock. By combining IF-PWM and precorrected CF-PWM, a fully digital transmitter with unit-delay autocalibration is implemented in 180 nm CMOS for high reconfiguration. The proposed architecture achieves wide CF range of 2 M–1 GHz, high power efficiency of 70%, and low error vector magnitude (EVM) of 3%, with spectrum purity of 20 dB optimized in comparison to the existing designs.


2011 ◽  
Vol 80-81 ◽  
pp. 490-494 ◽  
Author(s):  
Han Bing Liu ◽  
Yu Bo Jiao ◽  
Ya Feng Gong ◽  
Hai Peng Bi ◽  
Yan Yi Sun

A support vector machine (SVM) optimized by particle swarm optimization (PSO)-based damage identification method is proposed in this paper. The classification accuracy of the damage localization and the detection accuracy of severity are used as the fitness function, respectively. The best and can be obtained through velocity and position updating of PSO. A simply supported beam bridge with five girders is provided as numerical example, damage cases with single and multiple suspicious damage elements are established to verify the feasibility of the proposed method. Numerical results indicate that the SVM optimized by PSO method can effectively identify the damage locations and severity.


2018 ◽  
Vol 6 (5) ◽  
pp. 369-376
Author(s):  
Pradeep ◽  
Manjunath

The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.


Sign in / Sign up

Export Citation Format

Share Document