729 research outputs found

    Satellite Communications: Impact on Developing Economies

    Get PDF
    Access to information and communication infrastructure greatly enhances economic growth. When a reliable and affordable medium for information exchange is available, previously unanticipated developments ensue. Most areas in developing countries are sparsely populated and highly rural. Satellite communication is an excellent option for meeting this and many other pressing communication needs of developing economies. This paper examines the impact of satellite communication on developing economies, using popular examples as case study

    Towards joint communication and sensing (Chapter 4)

    Get PDF
    Localization of user equipment (UE) in mobile communication networks has been supported from the early stages of 3rd generation partnership project (3GPP). With 5th Generation (5G) and its target use cases, localization is increasingly gaining importance. Integrated sensing and localization in 6th Generation (6G) networks promise the introduction of more efficient networks and compelling applications to be developed

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    Doctor of Philosophy

    Get PDF
    dissertationLow-cost wireless embedded systems can make radio channel measurements for the purposes of radio localization, synchronization, and breathing monitoring. Most of those systems measure the radio channel via the received signal strength indicator (RSSI), which is widely available on inexpensive radio transceivers. However, the use of standard RSSI imposes multiple limitations on the accuracy and reliability of such systems; moreover, higher accuracy is only accessible with very high-cost systems, both in bandwidth and device costs. On the other hand, wireless devices also rely on synchronized notion of time to coordinate tasks (transmit, receive, sleep, etc.), especially in time-based localization systems. Existing solutions use multiple message exchanges to estimate time offset and clock skew, which further increases channel utilization. In this dissertation, the design of the systems that use RSSI for device-free localization, device-based localization, and breathing monitoring applications are evaluated. Next, the design and evaluation of novel wireless embedded systems are introduced to enable more fine-grained radio signal measurements to the application. I design and study the effect of increasing the resolution of RSSI beyond the typical 1 dB step size, which is the current standard, with a couple of example applications: breathing monitoring and gesture recognition. Lastly, the Stitch architecture is then proposed to allow the frequency and time synchronization of multiple nodes' clocks. The prototype platform, Chronos, implements radio frequency synchronization (RFS), which accesses complex baseband samples from a low-power low-cost narrowband radio, estimates the carrier frequency offset, and iteratively drives the difference between two nodes' main local oscillators (LO) to less than 3 parts per billion (ppb). An optimized time synchronization and ranging protocols (EffToF) is designed and implemented to achieve the same timing accuracy as the state-of-the-art but with 59% less utilization of the UWB channel. Based on this dissertation, I could foresee Stitch and RFS further improving the robustness of communications infrastructure to GPS jamming, allow exploration of applications such as distributed beamforming and MIMO, and enable new highly-synchronous wireless sensing and actuation systems

    Software Defined Radio Localization using 802.11-style Communications

    Get PDF
    This major qualifying project implements a simple indoor localization system using software defined radio. Both time of arrival and received signal strength methods are used by an array of wireless receivers to trilaterate a cooperative transmitter. The implemented system builds upon an IEEE 802.11b-like communications platform implemented in GNU Radio. Our results indicate substantial room for improvement, particularly in the acquisition of time data. This project contributes a starting point for ongoing research in indoor localization, both through our literature review and system implementation

    Smart hospital emergency system via mobile-based requesting services

    Get PDF
    In recent years, the UK’s emergency call and response has shown elements of great strain as of today. The strain on emergency call systems estimated by a 9 million calls (including both landline and mobile) made in 2014 alone. Coupled with an increasing population and cuts in government funding, this has resulted in lower percentages of emergency response vehicles at hand and longer response times. In this paper, we highlight the main challenges of emergency services and overview of previous solutions. In addition, we propose a new system call Smart Hospital Emergency System (SHES). The main aim of SHES is to save lives through improving communications between patient and emergency services. Utilising the latest of technologies and algorithms within SHES is aiming to increase emergency communication throughput, while reducing emergency call systems issues and making the process of emergency response more efficient. Utilising health data held within a personal smartphone, and internal tracked data (GPU, Accelerometer, Gyroscope etc.), SHES aims to process the mentioned data efficiently, and securely, through automatic communications with emergency services, ultimately reducing communication bottlenecks. Live video-streaming through real-time video communication protocols is also a focus of SHES to improve initial communications between emergency services and patients. A prototype of this system has been developed. The system has been evaluated by a preliminary usability, reliability, and communication performance study

    Indoor Positioning using the IEEE 802.11 Infrastructure

    Get PDF
    We propose a new indoor localization method which can be used to track a mobile node . Our method uses only the received signal strengths as input information . In addition our approach doesn't require any prior knowledge of the mobile node's motion and therefore doesn't use a cinematic motion model for tracking the mobile node. We discuss in detail the features of our approach and its resulting algorithm .We evaluate the performances of our algorithm using a real signal map

    Occupancy Detection using Wireless Sensor Network in Indoor Environment

    Get PDF
    Occupancy detection plays an important role in many smart buildings such as reducing building energy usage by controlling heating, ventilation and air conditioning (HVAC) systems, monitoring systems and managing lighting systems, tracking people in hospitals for medical issues, advertising to people in malls, and to search and rescue missions. The global positioning system (GPS) is used most widely as a localization system but highly inaccurate for indoor applications. The indoor environment is difficult to handle because along with the loss of signals, privacy is a major concern. Indoor tracking has many aspects in common with sensor localization in Wireless Sensor Networks (WSN). The contribution of this work is the demonstration of a nonintrusive approach to detect an occupancy in a building using wireless sensor networks to detect energy from cell phones in a secure facility and perform indoor localization based on the minimum mean square error (MMSE). To estimate the occupancy, the detected cellular signals information such as signal amplitude, frequency, power and detection time is sent to a fusion server, matched the detected signals by time and channel information, performed localization to estimate a location, and finally estimated the occupancy of rooms in a building from the estimated locations

    Unobtrusive Location-Based Access Control Utilizing Existing IEEE 802.11 Infrastructure

    Get PDF
    Mobile devices can sense several types of signals over the air using different radio frequency technologies (e.g., Wi-Fi, Bluetooth, cellular signals, etc.). Furthermore, mobile devices receive broadcast messages from transmitting entities (e.g., network access points, cellular phone towers, etc.) and can measure the received signal strength from these entities. Broadcast messages carry the information needed in case a mobile device chooses to establish communication. We believe that these signals can be utilized in the context of access control, specifically because they could provide an indication of the location of a user\u27s device. Such a “location proof” could then be used to provide access to location-based services. In this research, we propose a location-based access control (LBAC) system that utilizes tokens broadcasted by IEEE 802.11 (Wi-Fi) access points as a location proof for clients requesting access to a resource. This work differs from existing research in that it allows the verification of a client’s location continuously and unobtrusively, utilizing existing IEEE 802.11 infrastructure (which makes it easily deployable), and resulting in a secure and convenient LBAC system. This work illustrates an important application of location-based services (LBS): security. LBAC systems manage access to resources by utilizing the location of clients. The proposed LBAC system attempts to take advantage of the current IEEE 802.11 infrastructure, making it directly applicable to an existing ubiquitous system infrastructure
    • …
    corecore