Paper
20 April 2017 The evolution of transmission security functions in modern military wideband radios
Author Affiliations +
Proceedings Volume 10418, XI Conference on Reconnaissance and Electronic Warfare Systems; 104180E (2017) https://doi.org/10.1117/12.2269288
Event: Conference on Reconnaissance and Electronic Warfare Systems, 2016, Oltarzew, Poland
Abstract
Rapid development of advanced military command and control systems results in a dynamic growth in demand for data rate. One of the methods that make it possible to deal with the problem of limited capacity of military wireless systems is the use of broadband radios. Another one is the increase in the capacity of narrowband radios by implementing advanced modulation systems. Apart from remarkable benefits, such as the increase in system bit rate, there are also certain limitations since such radios are more sensitive to radio-electronic countermeasures, and the operation in the broad band makes it easier for the enemy to detect the radio emission. In such a situation, it is essential to define again and implement the transmission security functions into modern radios consistently. In this article, some current NATO activities are discussed, regarding the definitions of transmission security functions and the way of implementing them in radios, while paying special attention to a new element, that is to AIE radio cryptography (On Air Encryption). In the paper, the authors present an exemplary implementation of the functions in the Cognitive Radio Demonstrator using R-450C radio, the results of the examinations as well as the conclusions.
© (2017) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
R. Matyszkiel, P. Kaniewski, M. Kustra, and J. Jach "The evolution of transmission security functions in modern military wideband radios", Proc. SPIE 10418, XI Conference on Reconnaissance and Electronic Warfare Systems, 104180E (20 April 2017); https://doi.org/10.1117/12.2269288
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Modulation

Quadrature amplitude modulation

Cryptography

Signal processing

Telecommunications

Antennas

RELATED CONTENT


Back to Top