320 research outputs found

    Performance Evaluation and Analysis of Effective Range and Data Throughput for Unmodified Bluetooth Communication Devices

    Get PDF
    The DoD and the Air Force continually seek to incorporate new technology in an effort to improve communication, work effectiveness, and efficiency. Office devices utilizing Bluetooth technology simplify device configuration and communication. They provide a means to communicate wirelessly over short distances thereby eliminating the need for different vendor specific cables and interfaces. One of the key concerns involved in incorporating new communication technology is security; the fundamental security concern of wireless communication is interception. Studies focusing on IEEE 802.11b have shown vulnerability zones around many DoD installations that reflect the ranges at which wireless communications using the 802.11b standard can be intercepted

    Device Discovery in Frequency Hopping Wireless Ad Hoc Networks

    Get PDF
    This research develops a method for efficient discovery of wireless devices for a frequency hopping spread spectrum, synchronous, ad hoc network comprised of clustered sub-networks. The Bluetooth wireless protocol serves as the reference protocol. The development of a discovery, or outreach, method for scatternets requires the characterization of performance metrics of Bluetooth piconets, many of which are unavailable in literature. Precise analytical models characterizing the interference caused to Bluetooth network traffic by inquiring devices, the probability mass function of packet error rates between arbitrary pairs of Bluetooth networks, and Bluetooth discovery time distribution are developed. Based on the characterized performance metrics, three scatternet outreach methods are developed and compared. Outreach methods which actively inquire on a regular basis, as proposed in literature, are shown to produce lower goodput, have greater mean packet delay, require more power, and cause significant delays in discovery. By passively remaining available for outreach, each of these disadvantages is avoided

    Improving forwarding mechanisms for mobile personal area networks

    Get PDF
    This thesis presents novel methods for improving forwarding mechanisms for personal area networks. Personal area networks are formed by interconnecting personal devices such as personal digital assistants, portable multimedia devices, digital cameras and laptop computers, in an ad hoc fashion. These devices are typically characterised by low complexity hardware, low memory and are usually batterypowered. Protocols and mechanisms developed for general ad hoc networking cannot be directly applied to personal area networks as they are not optimised to suit their specific constraints. The work presented herein proposes solutions for improving error control and routing over personal area networks, which are very important ingredients to the good functioning of the network. The proposed Packet Error Correction (PEC) technique resends only a subset of the transmitted packets, thereby reducing the overhead, while ensuring improved error rates. PEC adapts the number of re-transmissible packets to the conditions of the channel so that unnecessary retransmissions are avoided. It is shown by means of computer simulation that PEC behaves better, in terms of error reduction and overhead, than traditional error control mechanisms, which means that it is adequate for low-power personal devices. The proposed C2HR routing protocol, on the other hand, is designed such that the network lifetime is maximised. This is achieved by forwarding packets through the most energy efficient paths. C2HR is a hybrid routing protocol in the sense that it employs table-driven (proactive) as well as on-demand (reactive) components. Proactive routes are the primary routes, i.e., packets are forwarded through those paths when the network is stable; however, in case of failures, the protocol searches for alternative routes on-demand, through which data is routed temporarily. The advantage of C2HR is that data can still be forwarded even when routing is re-converging, thereby increasing the throughput. Simulation results show that the proposed routing method is more energy efficient than traditional least hops routing, and results in higher data throughput. C2HR relies on a network leader for collecting and distributing topology information, which in turn requires an estimate of the underlying topology. Thus, this thesis also proposes a new cooperative leader election algorithm and techniques for estimating network characteristics in mobile environments. The proposed solutions are simulated under various conditions and demonstrate appreciable behaviour

    Cooperative Localization on Computationally Constrained Devices

    Get PDF
    Cooperative localization is a useful way for nodes within a network to share location information in order to better arrive at a position estimate. This is handy in GPS contested environments (indoors and urban settings). Most systems exploring cooperative localization rely on special hardware, or extra devices to store the database or do the computations. Research also deals with specific localization techniques such as using Wi-Fi, ultra-wideband signals, or accelerometers independently opposed to fusing multiple sources together. This research brings cooperative localization to the smartphone platform, to take advantage of the multiple sensors that are available. The system is run on Android powered devices, including the wireless hotspot. In order to determine the merit of each sensor, analysis was completed to determine successes and failures. The accelerometer, compass, and received signal strength capability were examined to determine their usefulness in cooperative localization. Experiments at meter intervals show the system detected changes in location at each interval with an average standard deviation of 0.44m. The closest location estimates occurred at 3m, 4m and 6m with average errors of 0.15m, 0.11m, and 0.07m respectively. This indicates that very precise estimates can be achieved with an Android hotspot and mobile nodes

    Prioritizing Content of Interest in Multimedia Data Compression

    Get PDF
    Image and video compression techniques make data transmission and storage in digital multimedia systems more efficient and feasible for the system's limited storage and bandwidth. Many generic image and video compression techniques such as JPEG and H.264/AVC have been standardized and are now widely adopted. Despite their great success, we observe that these standard compression techniques are not the best solution for data compression in special types of multimedia systems such as microscopy videos and low-power wireless broadcast systems. In these application-specific systems where the content of interest in the multimedia data is known and well-defined, we should re-think the design of a data compression pipeline. We hypothesize that by identifying and prioritizing multimedia data's content of interest, new compression methods can be invented that are far more effective than standard techniques. In this dissertation, a set of new data compression methods based on the idea of prioritizing the content of interest has been proposed for three different kinds of multimedia systems. I will show that the key to designing efficient compression techniques in these three cases is to prioritize the content of interest in the data. The definition of the content of interest of multimedia data depends on the application. First, I show that for microscopy videos, the content of interest is defined as the spatial regions in the video frame with pixels that don't only contain noise. Keeping data in those regions with high quality and throwing out other information yields to a novel microscopy video compression technique. Second, I show that for a Bluetooth low energy beacon based system, practical multimedia data storage and transmission is possible by prioritizing content of interest. I designed custom image compression techniques that preserve edges in a binary image, or foreground regions of a color image of indoor or outdoor objects. Last, I present a new indoor Bluetooth low energy beacon based augmented reality system that integrates a 3D moving object compression method that prioritizes the content of interest.Doctor of Philosoph

    Cluster based jamming and countermeasures for wireless sensor network MAC protocols

    Get PDF
    A wireless sensor network (WSN) is a collection of wireless nodes, usually with limited computing resources and available energy. The medium access control layer (MAC layer) directly guides the radio hardware and manages access to the radio spectrum in controlled way. A top priority for a WSN MAC protocol is to conserve energy, however tailoring the algorithm for this purpose can create or expose a number of security vulnerabilities. In particular, a regular duty cycle makes a node vulnerable to periodic jamming attacks. This vulnerability limits the use of use of a WSN in applications requiring high levels of security. We present a new WSN MAC protocol, RSMAC (Random Sleep MAC) that is designed to provide resistance to periodic jamming attacks while maintaining elements that are essential to WSN functionality. CPU, memory and especially radio usage are kept to a minimum to conserve energy while maintaining an acceptable level of network performance so that applications can be run transparently on top of the secure MAC layer. We use a coordinated yet pseudo-random duty cycle that is loosely synchronized across the entire network via a distributed algorithm. This thwarts an attacker\u27s ability to predict when nodes will be awake and likewise thwarts energy efficient intelligent jamming attacks by reducing their effectiveness and energy-efficiency to that of non-intelligent attacks. Implementing the random duty cycle requires additional energy usage, but also offers an opportunity to reduce asymmetric energy use and eliminate energy use lost to explicit neighbor discovery. We perform testing of RSMAC against non-secure protocols in a novel simulator that we designed to make prototyping new WSN algorithms efficient, informative and consistent. First we perform tests of the existing SMAC protocol to demonstrate the relevance of the novel simulation for estimating energy usage, data transmission rates, MAC timing and other relevant macro characteristics of wireless sensor networks. Second, we use the simulation to perform detailed testing of RSMAC that demonstrates its performance characteristics with different configurations and its effectiveness in confounding intelligent jammers

    Epidermal and Conformal Electronics for BioSensing Applications

    Get PDF
    This chapter is concerned with low power epidermally or conformally mounted flexible sensing tags that use passive backscattered communications links with the UHF Gen2 RFID protocol (865–928 MHz). Very low-profile polymer or fabric substrate skin mountable UHF RFID tag designs are introduced, with proposed fabrication by inkjet printing, and incorporation of sensing, while alternatively, integrated, flexible silicon NFC sensing systems at 13.56 MHz have been pioneered

    A Mobile Secure Bluetooth-Enabled Cryptographic Provider

    Get PDF
    The use of digital X509v3 public key certificates, together with different standards for secure digital signatures are commonly adopted to establish authentication proofs between principals, applications and services. One of the robustness characteristics commonly associated with such mechanisms is the need of hardware-sealed cryptographic devices, such as Hardware-Security Modules (or HSMs), smart cards or hardware-enabled tokens or dongles. These devices support internal functions for management and storage of cryptographic keys, allowing the isolated execution of cryptographic operations, with the keys or related sensitive parameters never exposed. The portable devices most widely used are USB-tokens (or security dongles) and internal ships of smart cards (as it is also the case of citizen cards, banking cards or ticketing cards). More recently, a new generation of Bluetooth-enabled smart USB dongles appeared, also suitable to protect cryptographic operations and digital signatures for secure identity and payment applications. The common characteristic of such devices is to offer the required support to be used as secure cryptographic providers. Among the advantages of those portable cryptographic devices is also their portability and ubiquitous use, but, in consequence, they are also frequently forgotten or even lost. USB-enabled devices imply the need of readers, not always and not commonly available for generic smartphones or users working with computing devices. Also, wireless-devices can be specialized or require a development effort to be used as standard cryptographic providers. An alternative to mitigate such problems is the possible adoption of conventional Bluetooth-enabled smartphones, as ubiquitous cryptographic providers to be used, remotely, by client-side applications running in users’ devices, such as desktop or laptop computers. However, the use of smartphones for safe storage and management of private keys and sensitive parameters requires a careful analysis on the adversary model assumptions. The design options to implement a practical and secure smartphone-enabled cryptographic solution as a product, also requires the approach and the better use of the more interesting facilities provided by frameworks, programming environments and mobile operating systems services. In this dissertation we addressed the design, development and experimental evaluation of a secure mobile cryptographic provider, designed as a mobile service provided in a smartphone. The proposed solution is designed for Android-Based smartphones and supports on-demand Bluetooth-enabled cryptographic operations, including standard digital signatures. The addressed mobile cryptographic provider can be used by applications running on Windows-enabled computing devices, requesting digital signatures. The solution relies on the secure storage of private keys related to X509v3 public certificates and Android-based secure elements (SEs). With the materialized solution, an application running in a Windows computing device can request standard digital signatures of documents, transparently executed remotely by the smartphone regarded as a standard cryptographic provider

    Controlo de acesso ao meio em comunicações veiculares de tempo-real

    Get PDF
    Despite several preventive measures, the number of roadway accidents is still very high, being considered even a problem of public health by some entities. This thesis has as global purpose of contributing to the reduction of that number of accidents, and consequent fatalities, by using safety-related applications that use communication among vehicles. In particular, the primary goal is guaranteeing that communication between users in vehicular environments is done with appropriate time bounds to transfer safety-critical information. In detail, it is studied how to manage the scheduling of message’s transmissions (medium access control - MAC), in order to define precisely who will communicate and when is the appropriate instant. The preferable situation where a communication infrastructure is present with full coverage (RSUs) is also studied, from which medium access control is defined precisely, and vehicles (OBUs) become aware of medium utilization. Also, sporadic situations (e.g., absence of RSUs) are studied in which the communication network is “ad hoc” and solely formed by the current vehicles. It is used the recently WAVE / IEEE 802.11p standard, specific for vehicular communications, and it is proposed a TDMA based solution, with appropriate coordination between RSUs in order to effectively disseminate a critical safety event. It is taken into account two different ways of choosing the instant for the initial broadcast, and both cases are compared. In case there is no infrastructure available, methods are derived to minimize communication medium access collisions, and to maximize the available bandwidth. The results reflect the total end-to-end delay, and show that adequate times are attained, and meet with the requisites for the type of applications being considered. Also, enhancements are obtained when using the alternate choice for the initial broadcast instant.Apesar de diversas medidas preventivas, o número de acidentes rodoviários continua a ser muito elevado, sendo mesmo considerado uma questão de saúde pública por algumas entidades. Esta tese tem como objetivo geral contribuir para a redução desse número de acidentes, e consequentes fatalidades, através da utilização de aplicações de segurança que envolvem comunicação entre veículos. Em particular, o objetivo principal é garantir que a comunicação entre utentes, em ambientes veiculares, seja efetuada com limites temporais apropriados à transferência de informações críticas. De forma mais detalhada, é estudada a gestão do escalonamento das transmissões (controlo de acesso ao meio – MAC) que irá definir quem vai comunicar e quando o pode fazer. São estudadas situações (desejadas) onde há uma infra-estrutura de comunicações com cobertura integral (RSUs), a partir da qual se faz a coordenação do acesso ao meio pelos veículos (OBUs), e situações (esporádicas, por ausência de RSU) em que a rede de comunicação é “ad hoc” e apenas constituída pelos veículos presentes. Utiliza-se a recente norma WAVE / IEEE 802.11p, específica para comunicações veiculares, e propõe-se uma solução baseada em TDMA, com coordenação apropriada entre RSUs para disseminação efetiva de um evento crítico de segurança. A escolha do instante para o broadcast inicial do evento de segurança também é tida em conta, e são comparados dois casos distintos. No caso da ausência de infraestrutura, derivam-se métodos para minimizar colisões no acesso ao meio de comunicação, e maximizar a largura de banda disponível. Os resultados refletem o atraso total end-to-end, mostrando tempos apropriados para os requisitos das aplicações em causa, e evidenciando melhorias aquando da escolha alternativa para o instante do broadcast inicial.Programa Doutoral em Engenharia Eletrotécnic
    corecore