High-throughput, cyber-secure multiuser superposition covert avionics system

With the ever-growing attention on advanced cyber threats to aerospace systems, research activities on cyber resiliency have accelerated in both academic and industrial communities. For example, in mobile wireless devices, machine-to-machine architectures, as well as broadband transport computing technology, protection and security are a shared responsibility and liability across both government and commercial sectors [1]. Airborne networks are envisioned as an infrastructure consisting of Internet protocol–based airborne nodes and onboard platforms that provide interconnectivity between terrestrial and space networks [2]. The airborne networks will be critical for avionics systems communication, navigation, display, and control [3]. As a consequence, airborne systems, as well as satellite communication (SATCOM) systems, require fast and robust data transfer in a hostile action or adverse conditions.

[1]  Anass Benjebbour,et al.  System-level throughput of NOMA using intra-beam superposition coding and SIC in MIMO downlink when channel estimation error exists , 2014, 2014 IEEE International Conference on Communication Systems.

[2]  Haijian Sun,et al.  Cooperative Non-Orthogonal Multiple Access in Heterogeneous Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[3]  Erik Blasch,et al.  On resilience studies of system detection and recovery techniques against stealthy insider attacks , 2016, SPIE Defense + Security.

[4]  Gary M. Lehto,et al.  Protection Evaluation Framework for Tactical SATCOM Architectures , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[5]  Erik Blasch,et al.  Simulation study of unmanned aerial vehicle communication networks addressing bandwidth disruptions , 2014, Defense + Security Symposium.

[6]  Ram M. Narayanan,et al.  Design, Analysis, and Performance of a Noise Modulated Covert Communications System , 2008, EURASIP J. Wirel. Commun. Netw..

[7]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[8]  Erik Blasch,et al.  Cyber security with radio frequency interferences mitigation study for satellite systems , 2016, SPIE Defense + Security.

[9]  Hyuck M. Kwon,et al.  MIMO Cognitive Radio User Selection With and Without Primary Channel State Information , 2016, IEEE Transactions on Vehicular Technology.

[10]  Xinwen Fu,et al.  DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[11]  Steven Graves,et al.  Commercial SATCOM in support of protected connectivity for the Warfighter and First Responder , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[12]  Hyuck M. Kwon,et al.  Underlay MIMO Cognitive Radio Downlink Scheduling with Multiple Primary Users and No CSI , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[13]  Gang Wang,et al.  Performance evaluation of SATCOM link in the presence of radio frequency interference , 2016, 2016 IEEE Aerospace Conference.

[14]  Haijian Sun,et al.  A NOMA and MU-MIMO Supported Cellular Network with Underlaid D2D Communications , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[15]  Erik Blasch,et al.  Summary of avionics technologies , 2015, IEEE Aerospace and Electronic Systems Magazine.

[16]  Anass Benjebbour,et al.  Non-orthogonal Multiple Access (NOMA) with Successive Interference Cancellation for Future Radio Access , 2015, IEICE Trans. Commun..

[17]  Dan Shen,et al.  Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[18]  Pingzhi Fan,et al.  Impact of User Pairing on 5G Non-Orthogonal Multiple Access , 2014, ArXiv.

[19]  Genshe Chen,et al.  On effectiveness of game theoretic modeling and analysis against cyber threats for avionic systems , 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC).

[20]  Muhammad Imran,et al.  Non-Orthogonal Multiple Access (NOMA) for cellular future radio access , 2017 .

[21]  H. Vincent Poor,et al.  On the number of users served in MIMO-NOMA cellular networks , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).

[22]  Ram M. Narayanan,et al.  Covert communications using heterodyne correlation random noise signals , 2007 .

[23]  Jose B. Cruz,et al.  Game Theoretic Approach to Threat Prediction and Situation Awareness , 2006, 2006 9th International Conference on Information Fusion.

[24]  Gang Wang,et al.  Hybrid onboard and ground based digital channelizer beam-forming for SATCOM interference mitigation and protection , 2016, SPIE Defense + Security.

[25]  Ram M. Narayanan,et al.  Propagation Effects on Noise-Modulated Randomly Polarized Ultrawideband Communication System , 2009 .

[26]  Erik Blasch,et al.  Trends in survivable/secure cognitive networks , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[27]  Haijian Sun,et al.  Hybrid MU-MIMO and non-orthogonal multiple access design in wireless heterogeneous networks , 2016, 2016 24th European Signal Processing Conference (EUSIPCO).