81,959 research outputs found

    GCP: Gossip-based Code Propagation for Large-scale Mobile Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSN) have recently received an increasing interest. They are now expected to be deployed for long periods of time, thus requiring software updates. Updating the software code automatically on a huge number of sensors is a tremendous task, as ''by hand'' updates can obviously not be considered, especially when all participating sensors are embedded on mobile entities. In this paper, we investigate an approach to automatically update software in mobile sensor-based application when no localization mechanism is available. We leverage the peer-to-peer cooperation paradigm to achieve a good trade-off between reliability and scalability of code propagation. More specifically, we present the design and evaluation of GCP ({\emph Gossip-based Code Propagation}), a distributed software update algorithm for mobile wireless sensor networks. GCP relies on two different mechanisms (piggy-backing and forwarding control) to improve significantly the load balance without sacrificing on the propagation speed. We compare GCP against traditional dissemination approaches. Simulation results based on both synthetic and realistic workloads show that GCP achieves a good convergence speed while balancing the load evenly between sensors

    Application of adaptive antenna technology to third generation radio architectures

    Get PDF

    Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication

    Full text link
    Secure Device Pairing (SDP) relies on an out-of-band channel to authenticate devices. This requires a common hardware interface, which limits the use of existing SDP systems. We propose to use short-range acoustic communication for the initial pairing. Audio hardware is commonly available on existing off-the-shelf devices and can be accessed from user space without requiring firmware or hardware modifications. We improve upon previous approaches by designing Acoustic Integrity Codes (AICs): a modulation scheme that provides message authentication on the acoustic physical layer. We analyze their security and demonstrate that we can defend against signal cancellation attacks by designing signals with low autocorrelation. Our system can detect overshadowing attacks using a ternary decision function with a threshold. In our evaluation of this SDP scheme's security and robustness, we achieve a bit error ratio below 0.1% for a net bit rate of 100 bps with a signal-to-noise ratio (SNR) of 14 dB. Using our open-source proof-of-concept implementation on Android smartphones, we demonstrate pairing between different smartphone models.Comment: 11 pages, 11 figures. Published at ACM WiSec 2020 (13th ACM Conference on Security and Privacy in Wireless and Mobile Networks). Updated reference

    Migration control for mobile agents based on passport and visa

    Get PDF
    Research on mobile agents has attracted much attention as this paradigm has demonstrated great potential for the next-generation e-commerce. Proper solutions to security-related problems become key factors in the successful deployment of mobile agents in e-commerce systems. We propose the use of passport and visa (P/V) for securing mobile agent migration across communities based on the SAFER e-commerce framework. P/V not only serves as up-to-date digital credentials for agent-host authentication, but also provides effective security mechanisms for online communities to control mobile agent migration. Protection for mobile agents, network hosts, and online communities is enhanced using P/V. We discuss the design issues in details and evaluate the implementation of the proposed system

    Software-only TDOA/RTF positioning for 3G WCDMA wireless network

    Get PDF
    A hybrid location finding technique based oil time difference of arrival (TDOA) with round-trip time (RTT) measurements is proposed for a wideband code division Multiple access (WCDMA) network. In this technique, a mobile station measures timing from at least three base stations using user equipment receive-transmit (UE Rx-Tx) time difference and at least three base stations measure timing from the mobile station using RTT. The timing measurements of mobile and base stations are then combined to solve for both the location of the mobile and the synchronization offset between base stations. A software-only geolocation system based on the above mobile/base stations timing measurements is implemented in Matlab platform and the performance of the system is investigated using large-scale propagation models

    A radio channel emulator for WCDMA, based on the hidden Markov model (HMM)

    Get PDF
    One of the main development and research subjects within the telecommunications area activity is the 3G mobile systems standardisation. The radio access is, of course, the main trouble in mobile systems, so it is important to investigate its implication. This paper describes a radio channel emulator for the UTRA-FDD made, based on the hidden Markov model (HMM). Since a statistical system behaviour is needed to train the HMM, off-line simulations have been made. The results between simulated and emulated statistics are presented. The use of emulation models implies a loss of accuracy with respect to simulation models, but is adequate to operate in real time. Certainly, the main advantage of using HMM in the emulator is the huge reduction in time, resources and effort with regard to a real simulation of the system. The emulator will allow in future works, for fast testing and comparison of several higher layer protocols and error control schemes.Peer ReviewedPostprint (published version
    corecore