Back to Search Start Over

Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks

Authors :
Alwan, Elias
Volakis, John
Islam, Md Khadimul
De Silva, Udara
Madanayake, Arjuna
Sanchez, Jose Angel
Sklivanitis, George
Pados, Dimitris A.
Beckwith, Luke
Azarderakhsh, Reza
Muralkrishan, Madhuvanti
Rastogi, Rishabh
Hore, Aniruddha
Burger, Eric W.
Alwan, Elias
Volakis, John
Islam, Md Khadimul
De Silva, Udara
Madanayake, Arjuna
Sanchez, Jose Angel
Sklivanitis, George
Pados, Dimitris A.
Beckwith, Luke
Azarderakhsh, Reza
Muralkrishan, Madhuvanti
Rastogi, Rishabh
Hore, Aniruddha
Burger, Eric W.
Publication Year :
2023

Abstract

We have built a prototype universal radio adapter which furnishes seamless and secure wireless communication through non-cooperative indigenous 5G networks for military and government users. The adapter consists of a waveform-agnostic hardware add-on that tunnels DoD terrestrial and satellite data. The adapter uses secure protocols for cross-connecting military-grade wireless RF communications equipment using spectrum in the range from UHF to Ka-band. A 5G data transport channel replaces the captured spectrum for transporting information at the IQ-sample level. In a sense, we replace the antenna-air interface and wireless channel with a transparent 5G data network. A plurarity of legacy military systems can operate through modern 5G networks in a seamless way without any knowledge of the characteristics of military waveforms. The adapter incorporates AI/ML based methods for smart spectrum sensing and autonomous radio reconfiguration. This enables intelligent interconnection of a number of military radios through non-cooperative (potentially adversarial) 5G commercial cellular networks. The adapter is built on four technical pillars: 1) ultra-wideband apertures for multi-functional and flexible software-defined radios (SDRs) with agile, wideband, and dual-band tunable RF transceivers for FR1/FR2 bands; 2) physical layer operation that involve device authentication via deep-learning based RF fingerprinting and compression of acquired IQ data; 3) secure and reconfigurable cryptographic co-processors employing the new quantum-safe algorithms selected by NIST to achieve authentication, key exchange, and encryption with focus on resource-constrained low size, weight, power, and cost (SWaP-C) devices; and 4) generative artificial intelligence and spread-spectrum steganography to hide DoD traffic passed through 5G networks and improve resiliency against real-time traffic analysis by nation-state carriers and intelligence agencies.

Details

Database :
OAIster
Notes :
English
Publication Type :
Electronic Resource
Accession number :
edsoai.on1455918993
Document Type :
Electronic Resource