117,724 research outputs found
Fix It, Don't Bin It! - CRC Error Correction in Bluetooth Low Energy
In this paper, we introduce error correction to the Bluetooth Low Energy (BLE) standard by utilising data redundancy provided by the Cyclic Redundancy Check (CRC) code used to detect erroneous packets. We assume a scenario with an energy-constrained transmitter and a constraint-free infrastructure, which allows us to introduce additional signal processing at the receiving side while keeping the transmitter intact. A novel approach of applying iterative decoding techniques to the BLE CRC code is investigated in this work. By using these techniques and real BLE packets collected in an office environment, we show that by enabling CRC error correction, the sensitivity of the BLE receiver can be improved by up to 3 dB. At the same time, up to 60% of corrupted packets can be corrected, which directly translates to a significant reduction in the number of retransmissions and a noticeable energy saving
Recommended from our members
Detailed examination of a packet collision model for Bluetooth Low Energy advertising mode
The aim of this paper is to investigate the amount of energy that is required to successfully transmit information inside the Bluetooth Low Energy (BLE) advertising packets. There are applications that require more than one BLE node to simultaneously transmit data. The BLE protocol utilizes a specific communication method termed advertising mode to perform unidirectional broadcasts of data from the advertising devices. However, with an increased number of BLE devices advertising simultaneously, there will be inevitable packet collisions from the advertising devices. This results in a waste of energy, specifically in low-power applications where lower consumption is desirable to minimize the need for battery replacements. This paper examines a packet collision model for the BLE advertising mode with the results validated using experimental data. Our analysis shows that when the throughput of the BLE network starts to fall due to an increase in the number of packet collisions, the energy consumption of the BLE nodes increase exponentially with respect to the number of nodes
Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption
Nowadays, advanced security mechanisms exist to protect data, systems, and
networks. Most of these mechanisms are effective, and security experts can
handle them to achieve a sufficient level of security for any given system.
However, most of these systems have not been designed with focus on good
usability for the average end user. Today, the average end user often struggles
with understanding and using security mecha-nisms. Other security mechanisms
are simply annoying for end users. As the overall security of any system is
only as strong as the weakest link in this system, bad usability of IT security
mechanisms may result in operating errors, resulting in inse-cure systems.
Buying decisions of end users may be affected by the usability of security
mechanisms. Hence, software provid-ers may decide to better have no security
mechanism then one with a bad usability. Usability of IT security mechanisms is
one of the most underestimated properties of applications and sys-tems. Even IT
security itself is often only an afterthought. Hence, usability of security
mechanisms is often the after-thought of an afterthought. This paper presents
some guide-lines that should help software developers to improve end user
usability of security-related mechanisms, and analyzes com-mon applications
based on these guidelines. Based on these guidelines, the usability of email
encryption is analyzed and an email encryption solution with increased
usability is presented. The approach is based on an automated key and trust
man-agement. The compliance of the proposed email encryption solution with the
presented guidelines for usable security mechanisms is evaluated
A Platform for the Analysis of Qualitative and Quantitative Data about the Built Environment and its Users
There are many scenarios in which it is necessary to collect data from multiple sources in order to evaluate a system, including the collection of both quantitative data - from sensors and smart devices - and qualitative data - such as observations and interview results. However, there are currently very few systems that enable both of these data types to be combined in such a way that they can be analysed side-by-side.
This paper describes an end-to-end system for the collection, analysis, storage and visualisation of qualitative and quantitative data, developed using the e-Science Central cloud analytics platform. We describe the experience of developing the system, based on a case study that involved collecting data about the built environment and its users. In this case study, data is collected from older adults living in residential care. Sensors were placed throughout the care home and smart devices were issued to the residents. This sensor data is uploaded to the analytics platform and the processed results are stored in a data warehouse, where it is integrated with qualitative data collected by healthcare and architecture researchers. Visualisations are also presented which were intended to allow the data to be explored and for potential correlations between the quantitative and qualitative data to be investigated
The Parkes Observatory Pulsar Data Archive
The Parkes pulsar data archive currently provides access to 144044 data files
obtained from observations carried out at the Parkes observatory since the year
1991. Around 10^5 files are from surveys of the sky, the remainder are
observations of 775 individual pulsars and their corresponding calibration
signals. Survey observations are included from the Parkes 70cm and the
Swinburne Intermediate Latitude surveys. Individual pulsar observations are
included from young pulsar timing projects, the Parkes Pulsar Timing Array and
from the PULSE@Parkes outreach program. The data files and access methods are
compatible with Virtual Observatory protocols. This paper describes the data
currently stored in the archive and presents ways in which these data can be
searched and downloaded.Comment: Accepted by PAS
Recommended from our members
The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques
A battery of recorded spoofing scenarios has been compiled
for evaluating civil Global Positioning System (GPS) signal
authentication techniques. The battery can be considered
the data component of an evolving standard meant to
define the notion of spoof resistance for commercial GPS
receivers. The setup used to record the scenarios is described.
A detailed description of each scenario reveals
readily detectable anomalies that spoofing detectors could target to improve GPS securityAerospace Engineering and Engineering Mechanic
- …
