7 research outputs found

    MIMO-assisted channel-based authentication in wireless networks

    Full text link

    Differentiating Ethernet devices using Normal Link Pulse with efficient computation and the impacts on performance

    Get PDF
    The tolerances in manufacturing Ethernet devices cause detectable differences in the signals sent by two different devices. Here, the design space is examined for using the IEEE 802.3 Normal Link Pulse (NLP) as the signal to use for differentiating devices. A previously collected set of NLP records as well as new sets of NLP data are used for testing the detection algorithm. Further tests have been run to determine the possibility of reducing the sampling rate to the point where Analogue-to-Digital Converters (ADCs) are more readily available and inexpensive. Reduced precision at each decimation was also tested. The design space survey indicates that trimming the time domain NLP records is beneficial to a certain point, and tracking the changes or drift of the signal has a great benefit. The design space survey also showed both wavelet-based filtering and noise spectra density scaling are beneficial on their own, but noise spectra density scaling can impair our algorithm when wavelet filtering is also being used. The tests on reducing sample rate and precision of the collected NLP records yielded results showing that sample rate effected false negative (device falsely unauthenticated) rates noticeably at decimation factors 8 and 16. Furthermore, false positive (devise falsely authenticated) rates were mostly effected by reduced precision. It is also apparent that performance of the algorithm, as determined by the impostor minimum to authentic maximum power mean squared error ratio, decreases with increasing data decimation before there is an increase in false negatives

    Doctor of Philosophy

    Get PDF
    dissertationThe wireless radio channel is typically thought of as a means to move information from transmitter to receiver, but the radio channel can also be used to detect changes in the environment of the radio link. This dissertation is focused on the measurements we can make at the physical layer of wireless networks, and how we can use those measurements to obtain information about the locations of transceivers and people. The first contribution of this work is the development and testing of an open source, 802.11b sounder and receiver, which is capable of decoding packets and using them to estimate the channel impulse response (CIR) of a radio link at a fraction of the cost of traditional channel sounders. This receiver improves on previous implementations by performing optimized matched filtering on the field-programmable gate array (FPGA) of the Universal Software Radio Peripheral (USRP), allowing it to operate at full bandwidth. The second contribution of this work is an extensive experimental evaluation of a technology called location distinction, i.e., the ability to identify changes in radio transceiver position, via CIR measurements. Previous location distinction work has focused on single-input single-output (SISO) radio links. We extend this work to the context of multiple-input multiple-output (MIMO) radio links, and study system design trade-offs which affect the performance of MIMO location distinction. The third contribution of this work introduces the "exploiting radio windows" (ERW) attack, in which an attacker outside of a building surreptitiously uses the transmissions of an otherwise secure wireless network inside of the building to infer location information about people inside the building. This is possible because of the relative transparency of external walls to radio transmissions. The final contribution of this dissertation is a feasibility study for building a rapidly deployable radio tomographic (RTI) imaging system for special operations forces (SOF). We show that it is possible to obtain valuable tracking information using as few as 10 radios over a single floor of a typical suburban home, even without precise radio location measurements

    Solutions for large scale, efficient, and secure Internet of Things

    Get PDF
    The design of a general architecture for the Internet of Things (IoT) is a complex task, due to the heterogeneity of devices, communication technologies, and applications that are part of such systems. Therefore, there are significant opportunities to improve the state of the art, whether to better the performance of the system, or to solve actual issues in current systems. This thesis focuses, in particular, on three aspects of the IoT. First, issues of cyber-physical systems are analysed. In these systems, IoT technologies are widely used to monitor, control, and act on physical entities. One of the most important issue in these scenarios are related to the communication layer, which must be characterized by high reliability, low latency, and high energy efficiency. Some solutions for the channel access scheme of such systems are proposed, each tailored to different specific scenarios. These solutions, which exploit the capabilities of state of the art radio transceivers, prove effective in improving the performance of the considered systems. Positioning services for cyber-physical systems are also investigated, in order to improve the accuracy of such services. Next, the focus moves to network and service optimization for traffic intensive applications, such as video streaming. This type of traffic is common amongst non-constrained devices, like smartphones and augmented/virtual reality headsets, which form an integral part of the IoT ecosystem. The proposed solutions are able to increase the video Quality of Experience while wasting less bandwidth than state of the art strategies. Finally, the security of IoT systems is investigated. While often overlooked, this aspect is fundamental to enable the ubiquitous deployment of IoT. Therefore, security issues of commonly used IoT protocols are presented, together with a proposal for an authentication mechanism based on physical channel features. This authentication strategy proved to be effective as a standalone mechanism or as an additional security layer to improve the security level of legacy systems
    corecore