C-V2X-Senior-Design / TrackTasks

This repo's for keeping track of weekly tasks.
0 stars 0 forks source link

Signal Analysis / Simulation Team (2 People) #2

Open MaxEllsworth opened 3 years ago

MaxEllsworth commented 3 years ago

For some reason Github won't let me assign this to two people, so this task is meant for @jasoninirio and @yixiuzhu.

We will eventually be collecting data on what normal (non-degraded) C-V2X communications looks like in order to build our machine learning model. This will involve analyzing signals emitted from both the base station and the user-end radios. There are two main programs you will want to use to analyze signal emissions: gqrx and urh (universal radio hacker).

gqrx is for a big-picture analysis of frequency emissions while urh is for a more-granular analysis.

When using gqrx, you will want to acquaint yourself with the process of manually "scanning" (scrolling) through frequencies. You can try this with FM radio or Wi-Fi; the exact frequencies don't matter, it's more so about the process. Zoom in and out. Look at the bandwidth. See if there are side channels. Things like this.

Doing the above will yield itself to letting you discover what sort of bandwidth and frequency decisions C-V2X makes later on. We know that C-V2X will eventually operate around the 5.9 GHz range. This means that when C-V2X does get up and running, you could scroll to 5.9 GHz in gqrx and start looking around.

The next step is to learn how to use uhd. While I have never used it and don't necessarily know if it is the best tool for the job, I do think that using it would give our team the ability to better understand how C-V2X sends data over a radio connection. Avoid worrying about what exactly is inside of a C-V2X packet. Instead focus on trying to understand what modulation parameters and encoding it is using. Take an adversarial approach; think about what features you would need to add to a malicious signal in order to degrade the features you find in a C-V2X signal.

The big picture here is you should practice the techniques, tactics, and procedures you will eventually use to analyze C-V2X broadcasts. Keep in mind that the direction our project is going is to have us "investigate physical-layer attacks on the availability of the C-V2X protocol."

MaxEllsworth commented 3 years ago

Notes from @yixiuzhu and I's meeting with Professor Carruthers on Friday, 19 November.