25 research outputs found

    Channel-Based Detection of Sybil Attacks in Wireless Networks

    Full text link

    An AI-based incumbent protection system for collaborative intelligent radio networks

    Get PDF
    Since the early days of wireless communication, wireless spectrum has been allocated according to a static frequency plan, whereby most of the spectrum is licensed for exclusive use by specific services or radio technologies. While some spectrum bands are overcrowded, many other bands are heavily underutilized. As a result, there is a shortage of available spectrum to deploy emerging technologies that require high demands on data like 5G. Several global efforts address this problem by providing multi-tier spectrum sharing frameworks, for example, the Citizens Broadband Radio Service (CBRS) and Licensed Shared Access (LSA) models, to increase spectrum reuse. In these frameworks, the incumbent (i.e., the technology that used the spectrum exclusively in the past) has to be protected against service disruptions caused by the transmissions of the new technologies that start using the same spectrum. However, these approaches suffer from two main problems. First, spectrum re-allocation to new uses is a slow process that may take years. Second, they do not scale fast since it requires a centralized infrastructure to protect the incumbent and coordinate and grant access to the shared spectrum. As a solution, the Spectrum Collaboration Challenge (SC2) has shown that the collaborative intelligent radio networks (CIRNs) -- artificial intelligence (AI)-based autonomous wireless networks that collaborate -- can share and reuse spectrum efficiently without any coordination and with the guarantee of incumbent protection. In this article, we present the architectural design and the experimental validation of an incumbent protection system for the next generation of spectrum sharing frameworks. The proposed system is a two-step AI-based algorithm that recognizes, learns, and proactively predicts the incumbent's transmission pattern with an accuracy above 95 percent in near real time (less than 300 ms). The proposed algorithm was validated in Colosseum, the RF channel emulator built for the SC2 competition, using up to two incumbents simultaneously with different transmission patterns and sharing spectrum with up to five additional CIRNs

    Detecting Spoofing Attacks in Mobile Wireless Environments

    Full text link

    Incentivizing Signal and Energy Cooperation in Wireless Networks

    Get PDF
    Abstract-We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node

    Contribution to the Federation of the asynchronous SmartSantander service layer within the European Fed4FIRE context

    Get PDF
    This thesis is a contribution to the federation of asynchronous SmartSantander service layer within the European Fed4FIRE context. The thesis was developed in a Smart City background, and its main aims were both to gain knowledge of how Smart Cities, Testbeds and Federations of Testbeds are structured by working on a real deployed system, i.e. SmartSantander framework and Fed4FIRE federation, and to contribute with some of the components required for the integratio

    Design and Evaluation of Compression, Classification and Localization Schemes for Various IoT Applications

    Get PDF
    Nowadays we are surrounded by a huge number of objects able to communicate, read information such as temperature, light or humidity, and infer new information through ex- changing data. These kinds of objects are not limited to high-tech devices, such as desktop PC, laptop, new generation mobile phone, i.e. smart phone, and others with high capabilities, but also include commonly used object, such as ID cards, driver license, clocks, etc. that can made smart by allowing them to communicate. Thus, the analog world of just a few years ago is becoming the a digital world of the Inter- net of Things (IoT), where the information from a single object can be retrieved from the Internet. The IoT paradigm opens several architectural challenges, including self-organization, self-managing, self-deployment of the smart objects, as well as the problem of how to minimize the usage of the limited resources of each device. The concept of IoT covers a lot of communication paradigms such as WiFi, Radio Frequency Identification (RFID), and Wireless Sensor Network (WSN). Each paradigm can be thought of as an IoT island where each device can communicate directly with other devices. The thesis is divided in sections in order to cover each problem mentioned above. The first step is to understand the possibility to infer new knowledge from the deployed device in a scenario. For this reason, the research is focused on the web semantic, web 3.0, to assign a semantic meaning to each thing inside the architecture. The sole semantic concept is unusable to infer new information from the data gathered; in fact, it is necessary to organize the data through a hierarchical form defined by an Ontology. Through the exploitation of the Ontology, it is possible to apply semantic engine reasoners to infer new knowledge about the network. The second step of the dissertation deals with the minimization of the usage of every node in a WSN. The main purpose of each node is to collect environmental data and to exchange hem with other nodes. To minimize battery consumption, it is necessary to limit the radio usage. Therefore, we implemented Razor, a new lightweight algorithm which is expected to improve data compression and classification by leveraging on the advantages offered by data mining methods for optimizing communications and by enhancing information transmission to simplify data classification. Data compression is performed studying the well-know Vector Quantization (VQ) theory in order to create the codebooks necessary for signal compression. At the same time, it is requested to give a semantic meaning to un- known signals. In this way, the codebook feature is able not only to compress the signals, but also to classify unknown signals. Razor is compared with both state-of-the-art compression and signal classification techniques for WSN . The third part of the thesis covers the concept of smart object applied to Robotic research. A critical issue is how a robot can localize and retrieve smart objects in a real scenario without any prior knowledge. In order to achieve the objectives, it is possible to exploit the smart object concept and localize them through RSSI measurements. After the localization phase, the robot can exploit its own camera to retrieve the objects. Several filtering algorithms are developed in order to mitigate the multi–path issue due to the wireless communication channel and to achieve a better distance estimation through the RSSI measurement. The last part of the dissertation deals with the design and the development of a Cognitive Network (CN) testbed using off the shelf devices. The device type is chosen considering the cost, usability, configurability, mobility and possibility to modify the Operating System (OS) source code. Thus, the best choice is to select some devices based on Linux kernel as Android OS. The feature to modify the Operating System is required to extract the TCP/IP protocol stack parameters for the CN paradigm. It is necessary to monitor the network status in real-time and to modify the critical parameters in order to improve some performance, such as bandwidth consumption, number of hops to exchange the data, and throughput
    corecore