99 research outputs found

    Signal Detection in Ambient Backscatter Systems: Fundamentals, Methods, and Trends

    Full text link
    Internet-of-Things (IoT) is rapidly growing in wireless technology, aiming to connect vast numbers of devices to gather and distribute vital information. Despite individual devices having low energy consumption, the cumulative demand results in significant energy usage. Consequently, the concept of ultra-low-power tags gains appeal. Such tags communicate by reflecting rather than generating the radio frequency (RF) signals by themselves. Thus, these backscatter tags can be low-cost and battery-free. The RF signals can be ambient sources such as wireless-fidelity (Wi-Fi), cellular, or television (TV) signals, or the system can generate them externally. Backscatter channel characteristics are different from conventional point-to-point or cooperative relay channels. These systems are also affected by a strong interference link between the RF source and the tag besides the direct and backscattering links, making signal detection challenging. This paper provides an overview of the fundamentals, challenges, and ongoing research in signal detection for AmBC networks. It delves into various detection methods, discussing their advantages and drawbacks. The paper's emphasis on signal detection sets it apart and positions it as a valuable resource for IoT and wireless communication professionals and researchers.Comment: Accepted for publication in the IEEE Acces

    Location-Enabled IoT (LE-IoT): A Survey of Positioning Techniques, Error Sources, and Mitigation

    Get PDF
    The Internet of Things (IoT) has started to empower the future of many industrial and mass-market applications. Localization techniques are becoming key to add location context to IoT data without human perception and intervention. Meanwhile, the newly-emerged Low-Power Wide-Area Network (LPWAN) technologies have advantages such as long-range, low power consumption, low cost, massive connections, and the capability for communication in both indoor and outdoor areas. These features make LPWAN signals strong candidates for mass-market localization applications. However, there are various error sources that have limited localization performance by using such IoT signals. This paper reviews the IoT localization system through the following sequence: IoT localization system review -- localization data sources -- localization algorithms -- localization error sources and mitigation -- localization performance evaluation. Compared to the related surveys, this paper has a more comprehensive and state-of-the-art review on IoT localization methods, an original review on IoT localization error sources and mitigation, an original review on IoT localization performance evaluation, and a more comprehensive review of IoT localization applications, opportunities, and challenges. Thus, this survey provides comprehensive guidance for peers who are interested in enabling localization ability in the existing IoT systems, using IoT systems for localization, or integrating IoT signals with the existing localization sensors

    Performance Evaluation of Cognitive Radio Spectrum Sensing Techniques through a Rayleigh Fading Channel

    Get PDF
    In recent years, there has been a steep rise in the demand for bandwidth due to a sharp increase in the number of devices connected to the wireless network. Coupled with the expected commercialization of 5G services and massive adoption of IoT, the upsurge in the number of devices connected to the wireless network will continue to grow exponentially into billions of devices. To accommodate the associated demand for wireless spectrum as we step into this new era of wireless connectivity, traditional methods of spectrum utilization based on fixed and static allocation are no longer adequate. New innovative forms that support dynamic assignment of spectrum space on as-per-need basis are now paramount. Cognitive radio has emerged as one of the most promising techniques that allow flexible usage of the scarce spectrum resource. Cognitive radio allows unlicensed users to opportunistically access spectrum bands assigned to primary users when these spectrum bands are idle. As such, cognitive radio reduces the gap between spectrum scarcity and spectrum underutilization. The most critical function of cognitive radio is spectrum sensing, which establishes the occupation status of a spectrum band, paving the way for a cognitive radio to initiate transmission if the band is idle. The most common and widely used methods for spectrum sensing are energy detection, matched filter detection, cyclostationary feature detection and cooperative based spectrum sensing. This dissertation investigates the performance of these spectrum-sensing techniques through a Rayleigh fading channel. In a wireless environment, a Rayleigh fading channel models the propagation of a wireless signal where there is no dominant line of sight between the transmitter and receiver. Understanding the performance of spectrum sensing techniques in a real world simulation environment is important for both industry and academia, as this allows for the optimal design of cognitive radio systems capable of efficiently executing their function. MATLAB software provides an experimental platform for the fusion of various Rayleigh fading channel parameters that mimic real world wireless channel characteristics. In this project, a MATLAB environment test bed is used to simulate the performance for each spectrum sensing technique across a range of signal-to-noise values, through a Rayleigh fading channel with a given set of parameters for channel delay, channel gain and Doppler shift. Simulation results are presented as plots for probability of detection versus signal-tonoise ratio, receiver operating characteristics (ROC) curves and complementary ROC curves. A detailed performance analysis for each spectrum sensing technique then follows, with comparisons done to determine the technique that offers the best relative performance

    Spektrin Havainnointi Kognitiivisissa Matkaviestinlaitteissa

    Get PDF
    Radio spectrum is becoming a scarce resource as increasing number of wireless devices attempt to access it. As a solution to this issue, spectrum sensing based cognitive radios have been proposed. However, significant part of them are mobile, consumer-grade devices that have strict price and form-factor limitations. This works aims to address the issues related to mobile spectrum sensing by characterizing the non-idealities with a spectrum sensor prototype. Two efficient sensing algorithms and a coarse-fine controller, which aims to minimize the energy consumption and run time of an individual sensor, are implemented on an FPGA. Functionality of the implementations is verified by laboratory and field measurements. Finally, a spatial interpolation method, Kriging, is applied to the non-ideal measurement data to create a uniform radio environment map.Langattomien laitteiden yleistyminen kasvattaa radiospektrin käyttöastetta ylärajaa kohti. Ratkaisuksi ongelmaan on kehitetty spektrin havainnointiin perustuvat kognitiiviset radiot. Näistä valtaosa on kuitenkin kuluttajatason matkaviestinlaitteita, joilla on tiukat rajoitteet muun muassa hinnan ja fyysisen rakenteen suhteen. Tässä työssä perehdytään spektrin havainnoinnin haasteisiin tutkimalla havainnoinnin epäideaalisuuksia spektrisensoriprototyypillä. Työssä on toteutettu FPGA:lle kaksi energiatehokasta havainnointialgoritmia sekä karkea-herkkä -ohjain, joka pyrkii minimoimaan yksittäisen spektrisensorin energiakulutusta sekä havainnointiaikaa. Toteutettujen algoritmien toiminta ja suorituskyky verifioidaan laboratorio- sekä kenttämittauksilla. Lopuksi esitellään avaruudellinen interpolaatiomenetelmä, Kriging, jota sovelletaan epäideaaliseen kenttämittausdataan kattavan radiopeitekartan luomiseksi

    GNSS Vulnerabilities and Existing Solutions:A Review of the Literature

    Get PDF
    This literature review paper focuses on existing vulnerabilities associated with global navigation satellite systems (GNSSs). With respect to the civilian/non encrypted GNSSs, they are employed for proving positioning, navigation and timing (PNT) solutions across a wide range of industries. Some of these include electric power grids, stock exchange systems, cellular communications, agriculture, unmanned aerial systems and intelligent transportation systems. In this survey paper, physical degradations, existing threats and solutions adopted in academia and industry are presented. In regards to GNSS threats, jamming and spoofing attacks as well as detection techniques adopted in the literature are surveyed and summarized. Also discussed are multipath propagation in GNSS and non line-of-sight (NLoS) detection techniques. The review also identifies and discusses open research areas and techniques which can be investigated for the purpose of enhancing the robustness of GNSS

    Recent Advances in Wireless Communications and Networks

    Get PDF
    This book focuses on the current hottest issues from the lowest layers to the upper layers of wireless communication networks and provides "real-time" research progress on these issues. The authors have made every effort to systematically organize the information on these topics to make it easily accessible to readers of any level. This book also maintains the balance between current research results and their theoretical support. In this book, a variety of novel techniques in wireless communications and networks are investigated. The authors attempt to present these topics in detail. Insightful and reader-friendly descriptions are presented to nourish readers of any level, from practicing and knowledgeable communication engineers to beginning or professional researchers. All interested readers can easily find noteworthy materials in much greater detail than in previous publications and in the references cited in these chapters

    Contributions to the security of cognitive radio networks

    Get PDF
    The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this context, Cognitive Radio (CR) technology has been proposed as a possible solution to reuse the spectrum being underutilized by licensed services. CRs are intelligent devices capable of sensing the medium and identifying those portions of the spectrum being unused. Based on their current perception of the environment and on that learned from past experiences, they can optimally tune themselves with regard to parameters such as frequency, coding and modulation, among others. Due to such properties, Cognitive Radio Networks (CRNs) can act as secondary users of the spectrum left unused by their legal owners or primary users, under the requirement of not interfering primary communications. The successful deployment of these networks relies on the proper design of mechanisms in order to efficiently detect spectrum holes, adapt to changing environment conditions and manage the available spectrum. Furthermore, the need for addressing security issues is evidenced by two facts. First, as for any other type of wireless network, the air is used as communications medium and can easily be accessed by attackers. On the other hand, the particular attributes of CRNs offer new opportunities to malicious users, ranging from providing wrong information on the radio environment to disrupting the cognitive mechanisms, which could severely undermine the operation of these networks. In this Ph.D thesis we have approached the challenge of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves not only providing countermeasures for existing attacks but also to identify new potential threats and evaluate their impact on CRNs performance. The main contributions of this thesis can be summarized as follows. First, a critical study on the State of the Art in this area is presented. A qualitative analysis of those threats to CRNs already identified in the literature is provided, and the efficacy of existing countermeasures is discussed. Based on this work, a set of guidelines are designed in order to design a detection system for the main threats to CRNs. Besides, a high level description of the components of this system is provided, being it the second contribution of this thesis. The third contribution is the proposal of a new cross-layer attack to the Transmission Control Protocol (TCP) in CRNs. An analytical model of the impact of this attack on the throughput of TCP connections is derived, and a set of countermeasures in order to detect and mitigate the effect of such attack are proposed. One of the main threats to CRNs is the Primary User Emulation (PUE) attack. This attack prevents CRNs from using available portions of the spectrum and can even lead to a Denial of Service (DoS). In the fourth contribution of this the method is proposed in order to deal with such attack. The method relies on a set of time measures provided by the members of the network and allows estimating the position of an emitter. This estimation is then used to determine the legitimacy of a given transmission and detect PUE attacks. Cooperative methods are prone to be disrupted by malicious nodes reporting false data. This problem is addressed, in the context of cooperative location, in the fifth and last contribution of this thesis. A method based on Least Median Squares (LMS) fitting is proposed in order to detect forged measures and make the location process robust to them. The efficiency and accuracy of the proposed methodologies are demonstrated by means of simulation
    corecore