-
Cross-Layer-Optimized Link Selection for Hologram Video Streaming over Millimeter Wave Networks
Authors:
Yiming Jiang,
Yanwei Liu,
Jinxia Liu,
Antonios Argyriou,
Yifei Chen,
Wen Zhang
Abstract:
Holographic-type communication brings an immersive tele-holography experience by delivering holographic contents to users. As the direct representation of holographic contents, hologram videos are naturally three-dimensional representation, which consist of a huge volume of data. Advanced multi-connectivity (MC) millimeter-wave (mmWave) networks are now available to transmit hologram videos by pro…
▽ More
Holographic-type communication brings an immersive tele-holography experience by delivering holographic contents to users. As the direct representation of holographic contents, hologram videos are naturally three-dimensional representation, which consist of a huge volume of data. Advanced multi-connectivity (MC) millimeter-wave (mmWave) networks are now available to transmit hologram videos by providing the necessary bandwidth. However, the existing link selection schemes in MC-based mmWave networks neglect the source content characteristics of hologram videos and the coordination among the parameters of different protocol layers in each link, leading to sub-optimal streaming performance. To address this issue, we propose a cross-layer-optimized link selection scheme for hologram video streaming over mmWave networks. This scheme optimizes link selection by jointly adjusting the video coding bitrate, the modulation and channel coding schemes (MCS), and link power allocation to minimize the end-to-end hologram distortion while guaranteeing the synchronization and quality balance between real and imaginary components of the hologram. Results show that the proposed scheme can effectively improve the hologram video streaming performance in terms of PSNR by 1.2dB to 6.4dB against the non-cross-layer scheme.
△ Less
Submitted 7 March, 2025;
originally announced March 2025.
-
Power-Efficient Deceptive Wireless Beamforming Against Eavesdroppers
Authors:
Georgios Chrysanidis,
Antonios Argyriou,
Le-Nam Tran,
Yanming Zhang,
Yanwei Liu
Abstract:
Eavesdroppers of wireless signals want to infer as much as possible regarding the transmitter (Tx). Popular methods to minimize information leakage to the eavesdropper include covert communication, directional modulation, and beamforming with nulling. In this paper we do not attempt to prevent information leakage to the eavesdropper like the previous methods. Instead we propose to beamform the wir…
▽ More
Eavesdroppers of wireless signals want to infer as much as possible regarding the transmitter (Tx). Popular methods to minimize information leakage to the eavesdropper include covert communication, directional modulation, and beamforming with nulling. In this paper we do not attempt to prevent information leakage to the eavesdropper like the previous methods. Instead we propose to beamform the wireless signal at the Tx in such a way that it incorporates deceptive information. The beamformed orthogonal frequency division multiplexing (OFDM) signal includes a deceptive value for the Doppler (velocity) and range of the Tx. To design the optimal baseband waveform with these characteristics, we define and solve an optimization problem for power-efficient deceptive wireless beamforming (DWB). The relaxed convex Quadratic Program (QP) is solved using a heuristic algorithm. Our simulation results indicate that our DWB scheme can successfully inject deceptive information with low power consumption, while preserving the shape of the created beam.
△ Less
Submitted 6 March, 2025;
originally announced March 2025.
-
Waveform Manipulation Against DNN-based Modulation Classification Attacks
Authors:
Dimitrios Varkatzas,
Antonios Argyriou
Abstract:
In this paper we propose a method for defending against an eavesdropper that uses a Deep Neural Network (DNN) for learning the modulation of wireless communication signals. Our method is based on manipulating the emitted waveform with the aid of a continuous time frequency-modulated (FM) obfuscating signal that is mixed with the modulated data. The resulting waveform allows a legitimate receiver (…
▽ More
In this paper we propose a method for defending against an eavesdropper that uses a Deep Neural Network (DNN) for learning the modulation of wireless communication signals. Our method is based on manipulating the emitted waveform with the aid of a continuous time frequency-modulated (FM) obfuscating signal that is mixed with the modulated data. The resulting waveform allows a legitimate receiver (LRx) to demodulate the data but it increases the test error of a pre-trained or adversarially-trained DNN classifier at the eavesdropper. The scheme works for analog modulation and digital single carrier and multi carrier orthogonal frequency division multiplexing (OFDM) waveforms, while it can implemented in frame-based wireless protocols. The results indicate that careful selection of the parameters of the obfuscating waveform can drop classification performance at the eavesdropper to less than 10% in AWGN and fading channels with no performance loss at the LRx.
△ Less
Submitted 3 October, 2023;
originally announced October 2023.
-
False Target Detection in OFDM-based Joint RADAR-Communication Systems
Authors:
Antonios Argyriou
Abstract:
Joint RADAR communication (JRC) systems that use orthogonal frequency division multiplexing (OFDM) can be compromised by an adversary that re-produces the received OFDM signal creating thus false RADAR targets. This paper presents a set of algorithms that can be deployed at the JRC system and can detect the presence of false targets. The presence of a false target is detected depending on whether…
▽ More
Joint RADAR communication (JRC) systems that use orthogonal frequency division multiplexing (OFDM) can be compromised by an adversary that re-produces the received OFDM signal creating thus false RADAR targets. This paper presents a set of algorithms that can be deployed at the JRC system and can detect the presence of false targets. The presence of a false target is detected depending on whether there is residual carrier frequency offset (CFO) beyond Doppler in the received signal, with a Generalized Likelihood Ratio Test (GLRT). To evaluate the performance of our approach we measure the detection probability versus the false alarm rate through simulation for different system configurations of an IEEE 802.11-based JRC system.
△ Less
Submitted 26 March, 2023;
originally announced March 2023.
-
Range-Doppler Spoofing in OFDM Signals for Preventing Wireless Passive Emitter Tracking
Authors:
Antonios Argyriou
Abstract:
Passive emitter tracking (PET) algorithms can estimate both the range and Doppler of a wireless emitter when it uses orthogonal frequency division multiplexing (OFDM). In this paper we are interested to prevent this from happening by an unauthorized receiver (URx). To accomplish that we introduce in the transmitted signal a \textit{spoofing signal} that varies across subcarriers and successive OFD…
▽ More
Passive emitter tracking (PET) algorithms can estimate both the range and Doppler of a wireless emitter when it uses orthogonal frequency division multiplexing (OFDM). In this paper we are interested to prevent this from happening by an unauthorized receiver (URx). To accomplish that we introduce in the transmitted signal a \textit{spoofing signal} that varies across subcarriers and successive OFDM symbols. With this technique the emitter is not only able to spoof its actual range and Doppler (allowing covert communication in terms of these two parameters), but is also capable of producing additional false emitter signatures to further confuse the URx. To evaluate the performance of our approach we calculate the range-Doppler response at the URx for different system configurations of an 802.11-based system.
△ Less
Submitted 12 March, 2023;
originally announced March 2023.
-
Obfuscation of Human Micro-Doppler Signatures in Passive Wireless RADAR
Authors:
Antonios Argyriou
Abstract:
When wireless communication signals impinge on a moving human they are affected by micro-Doppler. A passive receiver of the resulting signals can calculate the spectrogram that produces different signatures depending on the human activity. This constitutes a significant privacy breach when the human is unaware of it. This paper presents a methodology for preventing this when we want to do so by in…
▽ More
When wireless communication signals impinge on a moving human they are affected by micro-Doppler. A passive receiver of the resulting signals can calculate the spectrogram that produces different signatures depending on the human activity. This constitutes a significant privacy breach when the human is unaware of it. This paper presents a methodology for preventing this when we want to do so by injecting into the transmitted signal frequency variations that obfuscate the micro-Doppler signature. We assume a system that uses orthogonal frequency division multiplexing (OFDM) and a passive receiver that estimates the spectrogram based on the instantaneous channel state information (CSI). We analyze the impact of our approach on the received signal and we propose two strategies that do not affect the demodulation of the digital communication signal at the intended receiver. To evaluate the performance of our approach we use an IEEE 802.11-based OFDM system and realistic human signal reflection models.
△ Less
Submitted 6 March, 2023;
originally announced March 2023.
-
Doppler Spoofing in OFDM Wireless Communication Systems
Authors:
Antonios Argyriou,
Dimitrios Kosmanos
Abstract:
In this paper we present a method that prevents an unauthorized receiver (URx) from correctly estimating the Doppler shift present in an orthogonal frequency division multiplexing (OFDM) wireless signal. To prevent this estimation we propose to insert an artificial frequency variation in the transmitted signal that mimics a transmitter (Tx) movement with a spoofed/fake speed. This spoofed Doppler…
▽ More
In this paper we present a method that prevents an unauthorized receiver (URx) from correctly estimating the Doppler shift present in an orthogonal frequency division multiplexing (OFDM) wireless signal. To prevent this estimation we propose to insert an artificial frequency variation in the transmitted signal that mimics a transmitter (Tx) movement with a spoofed/fake speed. This spoofed Doppler shift does not affect data demodulation since it can be compensated at the legitimate receiver (LRx). We evaluate our method for its efficacy through simulations and we show that it offers a reliable way to protect one key element of the privacy of a wireless source, namely the speed of the transmitter.
△ Less
Submitted 29 December, 2022;
originally announced December 2022.
-
Data-Driven Modulation and Antenna Classification of Wireless Digital Communication Signals
Authors:
Apostolos Pappas,
Antonios Argyriou
Abstract:
In this paper we are interested to learn from a wireless digitally modulated signal the number of antennas that the transmitter (Tx) of this signal uses, as well as its specific modulation scheme (from phase-shift keying (PSK) or quadrature amplitude modulation (QAM)). Formally, these are modulation and antenna classification problems. We examine the problems with data-driven machine learning (ML)…
▽ More
In this paper we are interested to learn from a wireless digitally modulated signal the number of antennas that the transmitter (Tx) of this signal uses, as well as its specific modulation scheme (from phase-shift keying (PSK) or quadrature amplitude modulation (QAM)). Formally, these are modulation and antenna classification problems. We examine the problems with data-driven machine learning (ML)-based techniques. The two sub-problems of modulation and number of transmitter antenna classification are initially examined independently for a variety for system parameters, namely the SNR, number of receiver (Rx) antennas, and classification algorithms. Then we consider the joint problem where we follow two approaches. One, where the sub-problems are solved independently and in parallel, and one where the antenna classifier waits on the result of the modulation classifier. The two proposed schemes do not require any knowledge/details of the used modulation schemes and the way the Tx antennas are used (spatial multiplexing, space-time codes,etc.) as it is fully data-driven and not decision-theoretic based. The results of our approach are characterized by high classification accuracy and they pave the way for more ML-based data-driven techniques that reveal more characteristics of the Tx.
△ Less
Submitted 20 November, 2020;
originally announced November 2020.
-
Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks
Authors:
Dimitrios Kosmanos,
Savvas Chatzisavvas,
Antonios Argyriou,
Leandros Maglaras
Abstract:
In this paper, we are concerned with the problem of estimating the speed of an RF jammer that moves towards a group/platoon of moving wireless communicating nodes. In our system model, the group of nodes receives an information signal from a master node, that they want to decode, while the Radio Frequency (RF) jammer desires to disrupt this communication as it approaches them. For this system mode…
▽ More
In this paper, we are concerned with the problem of estimating the speed of an RF jammer that moves towards a group/platoon of moving wireless communicating nodes. In our system model, the group of nodes receives an information signal from a master node, that they want to decode, while the Radio Frequency (RF) jammer desires to disrupt this communication as it approaches them. For this system model, we propose first a transmission scheme where the master node remains silent for a time period while it transmits in a subsequent slot. Second, we develop a joint data and jamming estimation algorithm that uses Linear Minimum Mean Square Error (LMMSE) estimation. We develop analytical closed-form expressions that characterize the Mean Square Error (MSE) of the data and jamming signal estimates. Third, we propose a cooperative jammer speed estimation algorithm based on the jamming signal estimates at each node of the network. Our numerical and simulation results for different system configurations prove the ability of our overall system to estimate with high accuracy and the RF jamming signals and the speed of the jammer.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
Estimating the Relative Speed of RF Jammers in VANETs
Authors:
Dimitrios Kosmanos,
Antonios Argyriou,
Leandros Maglaras
Abstract:
Vehicular Ad-Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their performance. In this paper, we propose a novel Relative Speed Estimation Algorithm (RSEA) of a moving interfering vehicle that approaches a Transmitter (…
▽ More
Vehicular Ad-Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their performance. In this paper, we propose a novel Relative Speed Estimation Algorithm (RSEA) of a moving interfering vehicle that approaches a Transmitter ($Tx$) - Receiver ($Rx$) pair, that interferes with their Radio Frequency (RF) communication by conducting a Denial of Service (DoS) attack. Our scheme is completely sensorless and passive and uses a pilot-based received signal without hardware or computational cost in order to, firstly, estimate the combined channel between the transmitter - receiver and jammer - receiver and secondly, to estimate the jamming signal and the relative speed between the jammer - receiver using the RF Doppler shift. Moreover, the relative speed metric exploits the Angle of Projection (AOP) of the speed vector of the jammer in the axis of its motion in order to form a two-dimensional representation of the geographical area. This approach can effectively be applied both for a jamming signal completely unknown to the receiver and for a jamming signal partly known to the receiver. Our speed estimator method is proven to have quite accurate performance, with a Mean Absolute Error (MAE) value of approximately $10\%$ compared to the optimal zero MAE value under different jamming attack scenarios.
△ Less
Submitted 31 December, 2018;
originally announced December 2018.
-
Route Optimization of Electric Vehicles based on Dynamic Wireless Charging
Authors:
Dimitrios Kosmanos,
Leandros Maglaras,
Michalis Mavrovouniotis,
Sotiris Moschoyiannis,
Antonios Argyriou,
Athanasios Maglaras,
Helge Janicke
Abstract:
One of the barriers to adoption of Electric Vehicles (EVs) is the anxiety around the limited driving range. Recent proposals have explored charging EVs on the move, using dynamic wireless charging which enables power exchange between the vehicle and the grid while the vehicle is moving. In this article, we focus on the intelligent routing of EVs in need of charging so that they can make most effic…
▽ More
One of the barriers to adoption of Electric Vehicles (EVs) is the anxiety around the limited driving range. Recent proposals have explored charging EVs on the move, using dynamic wireless charging which enables power exchange between the vehicle and the grid while the vehicle is moving. In this article, we focus on the intelligent routing of EVs in need of charging so that they can make most efficient use of the so-called {\it Mobile Energy Disseminators} (MEDs) which operates as mobile charging stations. We present a method for routing EVs around MEDs on the road network, which is based on constraint logic programming and optimisation using a graph-based shortest path algorithm. The proposed method exploits Inter-Vehicle (IVC) communications in order to eco-route electric vehicles. We argue that combining modern communications between vehicles and state of the art technologies on energy transfer, the driving range of EVs can be extended without the need for larger batteries or overtly costly infrastructure. We present extensive simulations in city conditions that show the driving range and consequently the overall travel time of electric vehicles is improved with intelligent routing in the presence of MEDs.
△ Less
Submitted 9 October, 2017;
originally announced October 2017.