frequency hopping
Recently Published Documents


TOTAL DOCUMENTS

1975
(FIVE YEARS 294)

H-INDEX

43
(FIVE YEARS 4)

2022 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Xiujie Zhang ◽  
Xianhua Niu ◽  
Xin Tan

<p style='text-indent:20px;'>Frequency hopping sequences with low hit zone is significant for application in quasi synchronous multiple-access systems. In this paper, we obtained two constructions of optimal frequency hopping sequence sets with low hit zone based on interleaving techniques. The presented low hit zone frequency hopping sequence sets are with new and flexible parameters and large family size which can meet the needs of the practical applications. Moreover, all the sequences in the proposed sets are cyclically inequivalent. Some low hit zone frequency hopping sequence sets constructed in literatures are included in our family. The proposed frequency hopping sequence sets with low hit zone are contributed for quasi-synchronous frequency hopping multiple access system to reduce or eliminate multiple-access interference.</p>


Author(s):  
Indu Priya Eedara ◽  
Moeness G. Amin ◽  
Ahmad Hoorfar ◽  
Batu K. Chalise

2021 ◽  
Vol 18 (12) ◽  
pp. 51-64
Author(s):  
Gao Li ◽  
Wei Wang ◽  
Guoru Ding ◽  
Qihui Wu ◽  
Zitong Liu

2021 ◽  
Vol 11 (22) ◽  
pp. 10812
Author(s):  
Jusung Kang ◽  
Younghak Shin ◽  
Hyunku Lee ◽  
Jintae Park ◽  
Heungno Lee

In a frequency hopping spread spectrum (FHSS) network, the hopping pattern plays an important role in user authentication at the physical layer. However, recently, it has been possible to trace the hopping pattern through a blind estimation method for frequency hopping (FH) signals. If the hopping pattern can be reproduced, the attacker can imitate the FH signal and send the fake data to the FHSS system. To prevent this situation, a non-replicable authentication system that targets the physical layer of an FHSS network is required. In this study, a radio frequency fingerprinting-based emitter identification method targeting FH signals was proposed. A signal fingerprint (SF) was extracted and transformed into a spectrogram representing the time–frequency behavior of the SF. This spectrogram was trained on a deep inception network-based classifier, and an ensemble approach utilizing the multimodality of the SFs was applied. A detection algorithm was applied to the output vectors of the ensemble classifier for attacker detection. The results showed that the SF spectrogram can be effectively utilized to identify the emitter with 97% accuracy, and the output vectors of the classifier can be effectively utilized to detect the attacker with an area under the receiver operating characteristic curve of 0.99.


Sign in / Sign up

Export Citation Format

Share Document