Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 4 of 4
  • Item
    Coherent Radar Target Detection With In-Band Cyclostationary Wireless Interference
    (Institute of Electrical and Electronics Engineers Inc., 2022) Gunnery, G.; Kumar, H.P.; Srihari, P.; Tharmarasa, R.; Kirubarajan, T.
    Spectral congestion necessitates the in-band operation or the spectrum-sharing of legacy radar and communication systems. Since these systems operate in the same band in spectrum-sharing mode, they interfere with one another. To address this problem from the radar's perspective, this paper considers the coherent detection of target-reflected radar signals in the presence of interference from an in-band cyclostationary digital modulated wireless communication signal. Three different cases of target-reflected radar signals, namely, deterministic signals, signals with random phase, and completely random signals, are considered in this paper. The optimum detection rules are derived for these three cases and the corresponding receiver structures for the equalization of the interfering signal are presented. Sub-optimum detection structures are also derived with the assumption that the in-band interference is a white stationary time-invariant Gaussian process. Further, considering the equalization, modified CFAR receiver structures are also presented. By considering the mathematical models for cyclostationary or periodic in-band interference, the performances of the optimum, sub-optimum detectors, and modified CFAR detectors are quantified analytically in terms of detection probability and false alarm probability, and the resulting receiver operating characteristic (ROC) curves are analyzed as a function of the signal-to-interference ratio. It is demonstrated that improper equalization of the interfering signal significantly affects the performance of the optimum detector and this impact is analyzed in detail. As spectrum-sharing becomes more prevalent due to spectrum congestion, the proposed optimal, sub-optimal, and modified CFAR detection rules and receiver structures can be incorporated into existing systems with substantial savings. © 2013 IEEE.
  • Item
    GNSS Spoofing Detection and Mitigation in Multireceiver Configuration via Tracklets and Spoofer Localization
    (Institute of Electrical and Electronics Engineers Inc., 2022) Pardhasaradhi, B.; Gunnery, G.; Vandana, G.S.; Srihari, P.; Aparna., P.
    Global navigation satellite systems (GNSS) sensors estimate its position, velocity, and time (PVT) using pseudorange measurements. When there is no interference, the pseudoranges are due to authentic satellites, and the bearings is distinguishable. Whereas, in the presence of any intentional interference source like spoofer, the pseudorange measurements owing to spurious signals and all the bearings from the same direction. These spurious attacks yield either no position or falsified position to the GNSS receiver. This paper proposes to install multiple GNSS receivers on a vehicle (assumed to be cooperative) to detect and mitigate the spoofing attack. While installing multiple GNSS receivers, we assume that each GNSS receiver's relative position vector (RPV) is assumed to be known to other GNSS receivers. The installed GNSS receivers use the extended Kalman filter (EKF) framework to estimate their PVT. We proposed to calculate the equivalent-measurement and equivalent-measurement covariance of each GNSS receiver in the Cartesian coordinates in the tracklet framework. These tracklets are translated to the vehicle center using RPV to obtain translated-Tracklets. The translated tracklet based generalized likelihood ratio test (GLRT) is derived to detect the spoofing attack at a given epoch. In addition to that, these translated-Tracklets are processed in a batch least square (LS) framework to obtain the vehicle position. Once the attack is detected at a specific epoch, it quantifies that the position information is false. Moreover, another spoofing test is also formulated using DOA of signals. Once both the tests confirm the spoofing attack, the spoofer localization is performed using pseudo-updated states of GNSS receivers and acquired bearings in the iterative least-squares (ILS) framework. Mitigation of spoofing attack can be achieved either by projecting a null beam in the direction of the spoofer or by launching a counter-Attack on the spoofer. The simulation results demonstrate that the proposed algorithm detects spoofing attacks and ensures continuity in the navigation track. As the number of satellite signals increases, the algorithms provide better position root mean square error (PRMSE) for GNSS receivers track, vehicle track, and spoofer localization. © 2013 IEEE.
  • Item
    Performance Analysis of Spectrum Sharing Radar in Multipath Environment
    (Institute of Electrical and Electronics Engineers Inc., 2023) Gunnery, G.; Pardhasaradhi, B.; Mahipathi, A.C.; Prashantha Kumar, P.K.; Srihari, P.; Cenkarmaddi, L.R.
    Radar based sensing and communication systems sharing a common spectrum have become a potential research problem in recent years due to spectrum scarcity. The spectrum sharing radar (SSR) is a new technology that uses the total available bandwidth (BW) for both radar based sensing and communication. Unlike traditional radar, the SSR divides the total available BW into radar-only and mixed-use bands. In a radar-only band, only radar sensor signals can be transmitted and received. In contrast, radar and communication signals can both be transmitted and received in the mixed-use band. Taking such BW sharing into account, this paper investigates the performance of SSR in an information-theoretic sense. To evaluate performance, mutual information (MI), spectral efficiency (SE) and capacity (C) metrics are used. Initially, this paper considered a clean environment (no multipath) in order to evaluate performance metrics in the mixed-use band with and without successive interference cancellation. Following that, this paper addresses the performance of BW allocation by allocating low to high BW in mixed-band. Furthermore, the performance metrics are extended to account for the multipath environment, and the same analogy as in a clean environment is used. In addition, the MI and SE of traditional radar system is taken into account when comparing the performance of SSR with and without the use of the SIC. Finally, MI and capacity results show that using the SIC scheme in a mixed-use band yields performance comparable to traditional radar and communication system. In terms of SE, the SSR with SIC scheme outperforms traditional radar and communication system. © 2020 IEEE.
  • Item
    FPGA Implementation of SSRS Codes for NAND Flash Memory Device
    (Institute of Electrical and Electronics Engineers Inc., 2024) Achala, G.; Nandana, S.; Jomy, F.; Girish, M.M.; Shripathi Acharya, U.S.; Srihari, P.; Cenkarmaddi, L.R.
    NAND flash memory is a non-volatile storage device that is extensively used in personal electronic gadgets, digital television, digital cameras, and many consumer/ professional electronics devices. Error control coding techniques have been incorporated to improve the integrity of information stored in these devices. We have synthesized the Subfield Subcodes of Reed Solomon codes (SSRS) for use on Multi-Level cell (MLC), Triple Level Cell (TLC), and Quadruple Level Cell (QLC) NAND flash devices. The primary advantage of these codes is that the codeword symbols can be correctly matched to the number of bits that can be stored in these multilevel cells. Deployment of these codes improves the integrity of information storage and useful life. This paper describes the implementation of the encoder and decoder of SSRS codes synthesized for MLC, TLC, and QLC NAND flash devices. The encoder circuit is designed using addition and multiplication tables derived from elements of synthesized SSRS codes. The Non-binary decoding procedure consists of the syndrome computation, Berlekamp -Massey algorithm, Chein search, and Forney's algorithm. The designed encoder requires 16% resources for MLC, 18% of resources for TLC, and 18% of resources for QLC. This research work has reported the design of very high rate (R ≥ 0.97) codes that can bring about significant improvements to the Undetected Bit Error Rate (UBER) even when the Raw Bit Error rate (RBER) values are significant (> 10-3). © 2013 IEEE.