摘要:
Various examples are provided for jamming avoidance response (JAR), and photonic implementations thereof. In one example, a method includes generating optical pulses that correspond to raising envelope of a beat signal associated with an interference signal and a reference signal; generating optical spikes that correspond to positive zero crossing points of the reference signal; and providing a phase output that indicates whether the beat signal is leading or lagging the reference signal, the phase output based at least in part upon the optical spikes. An adjustment to a reference frequency can be determined based at least in part upon the optical pulses and the phase output. In another example, a JAR system includes photonic circuitry to generate the optical pulses; photonic circuitry to generate the optical spikes; and photonic circuitry to provide the phase output. A logic unit can determine the adjustment to the reference frequency.
摘要:
A system for near field communications is provided. The system can include a near field generator configured to generate a near field detectable signal comprising information. The system can include a near field detector configured to receive the near field detectable signal and output the information. The system can include an Electro-Magnetic (EM) shield surrounding the near field generator to block EM radio frequency (RF) signals in the vicinity of the near field generator from interfering with operations of the near field generator. The EM shield does not prevent communication of the near field detectable signal between the near field generator and the near field detector. The EM shield can be configured to reduce magnetic field loss from eddy currents in the EM shield as the near field detectable signal passes through the EM shield.
摘要:
Apparatus and methods performing secure communications in an energy delivery system. Energy delivery systems may include phasor measurement units (PMU), phasor data concentrators (PDC) along with power generation, transmission and consumption equipment. The PMU and PDC may communicate in a grid network over secured wired or wireless communication protocols. Embodiments may include utilizing spread spectrum communication between PMU devices and PDC devices to sustain energy delivery functionality during a communications attack. Communications security may include a cryptographic key management scheme for secure PMU and PDC communication and identification. Embodiments may include clustering of PMU and PDC data for analysis and real-time presentation to grid operators. Embodiments may include clustering of PMU devices in a hexagonal geometry to provide for frequency reuse among devices with directional antenna.
摘要:
An inductively coupled power and data transmission system include a main power source, apparel having an electrical conductor in electrical communication with the main power source, the apparel having a first inductively couplable power and data transmission sub-system to regulate power to the primary coil or coils and transmission of power and data by the primary coil or coils and reception of data by the primary coil or coils, and an independent device having a second inductively couplable power and data transmission sub-system so as to regulate reception of power and data by the secondary coil or coils and transmission of data from a secondary processor by the secondary coil or coils. The first and second primary coils transfer said power and data during inductive coupling, at electromagnetic radiation frequencies, between the first primary coil or coils and the secondary coil or coils.
摘要:
A wireless network may comprise a plurality of base stations and a plurality of access points, such as femtocells, which may be installed in homes and/or offices, as deemed necessary to provide improved signal quality and increased data throughput while off-loading capacity from one or more near-by base stations. A user device may be configured to detect proximity to an access point and establish communications preferentially with the access point while refraining from communicating with a base station even though the user device is within a service region of the base station and can communicate with that base station.
摘要:
A method for communication includes generating one or more data streams for transmission to respective target receivers, and one or more jamming streams. At least one parameter, selected from a group of parameters consisting of power ratios for allocation to the jamming streams and Modulation and Coding Schemes (MCSs) for assigning to the data streams, is calculated based on a criterion that is set to reduce a probability of the data streams being decoded by at least one eavesdropping receiver. The data streams and the jamming streams are transmitted using an antenna array while applying the at least one parameter.
摘要:
Systems, methods and/or mobile devices are provided that enable a level of privacy/security in wireless communications to be increased responsive to a content of the wireless communications, biometric data and/or a position from which the wireless communications takes place. A plurality of communications modes is used by the system infrastructure and the plurality of mobile devices communicating therewith to increase privacy and undetectability of transmitted signals. The increased level of privacy and undetectability of signals is provided via pseudo-randomly generated signaling alphabets that are used by the mobile devices and by the system infrastructure to provide the communications. This represents a level of encryption/scrambling that is over and above the conventional encryption and/or scrambling at the bit level. Accordingly, systems, methods and/or devices providing a concatenated level of encryption/scrambling are provided.
摘要:
There is described the use of Digital Radio Frequency Memory (DRFM) modules to jam certain communication signals while allowing others to be received on a given frequency band. The DRFM modules exploit the multi-path phenomenon by using transmitted signals to cause full band destructive echoes and/or distortions. A set of receivers used in conjunction with the DRFM modules are aware of the exact multi-path induced by the DRFM modules and are therefore able to mitigate or even benefit from the effects of the destructive multi-path and maintain or improve communications.
摘要:
An available signal space, whether it is a priori specified or is cognitively determined based upon an assessment of frequency utilization, serves to provide a number of signal dimensions which may be occupied by a number of pseudo-randomly generated waveforms. The number of pseudo-randomly generated waveforms may be based upon a key input to a pseudo-random number generator and a desired statistical distribution and may be subjected to an orthogonalization procedure to produce a respective number of orthogonal pseudo-random waveforms which may serve as a communications alphabet. A specific data sequence to be communicated may be associated with a respective specific element/member of the orthogonal pseudo-random waveforms and that specific element/member may be transmitted in lieu of the specific data sequence. Systems/methods of spread-spectrum communications that are substationally devoid of revealing signatures such as chipping and cyclostationarity are presented, offering increased privacy, reduced detectability and reduced exploitation of communications.
摘要:
A communication network includes a local area network (LAN) and a wireless access point coupled to the LAN. In one embodiment, each access point includes a medium access control (MAC) stage, and a radio frequency (RF) transmitter/receiver for communicating unsecure message data via RF links with users of associated wireless devices. An optical transmitter/receiver in the access point enables the users to communicate secure message data over the LAN via free space optical (FSO) links with the users. The MAC stage operates (i) to direct unsecure data from the LAN to the wireless device users and to direct unsecure data from the users to the LAN, via the RF transmitter/receiver; and (ii) to direct secure data from the LAN to the wireless device users and to direct secure data from the users to the LAN, via the optical transmitter/receiver. An integrated VoIP/FSO portable handset is also disclosed.