156 research outputs found

    Joint PHY/MAC layer security design using ARQ with MRC and null-space independent PAPR-aware artificial noise in SISO systems

    Get PDF
    Automatic-repeat-request (ARQ) as a MAC layer mechanism and artificial noise (AN) as a physical layer mechanism along with the help of maximal ratio combining (MRC), are jointly designed to achieve secrecy. Basically, a special AN, which does not require null-space in the channel, is designed based on the quality of service requirements and the channel condition between the legitimate parties and injected to the data packet. If the same packet is requested by the legitimate receiver (Bob), an AN canceling signal is properly designed and added to the next packet. Then, an AN-free packet is obtained by using MRC process at Bob, while deteriorating the eavesdropper's performance. Furthermore, two simple closed-form expressions of the achievable secure throughput are derived. The first one is given in a closed-form for the case of ARQ scheme without AN, while the second one is given in an upper-bound form for the case of ARQ with AN. Moreover, this paper addresses two critical security-associated problems: 1) the joint design of secrecy, reliability, throughput, delay and the tradeoff among them, and 2) the increase in the peak-to-average power ratio (PAPR) due to the added AN. Finally, the proposed design is extended to OFDM to demonstrate its capability in not only enhancing the secrecy due to the frequency selectivity of the channel, but also in reducing the PAPR and out-of-band emission of OFDM-based waveforms, while maintaining secrecy.No sponso

    Resource Allocation for Interference Management in Wireless Networks

    Get PDF
    Interference in wireless networks is a major problem that impacts system performance quite substantially. Combined with the fact that the spectrum is limited and scarce, the performance and reliability of wireless systems signiïŹcantly deteriorates and, hence, communication sessions are put at the risk of failure. In an attempt to make transmissions resilient to interference and, accordingly, design robust wireless systems, a diverse set of interference mitigation techniques are investigated in this dissertation. Depending on the rationale motivating the interfering node, interference can be divided into two categories, communication and jamming. For communication interference such as the interference created by legacy users(e.g., primary user transmitters in a cognitive radio network) at non-legacy or unlicensed users(e.g.,secondary user receivers), two mitigation techniques are presented in this dissertation. One exploits permutation trellis codes combined with M-ary frequency shift keying in order to make SU transmissions resilient to PUs’ interference, while the other utilizes frequency allocation as a mitigation technique against SU interference using Matching theory. For jamming interference, two mitigation techniques are also investigated here. One technique exploits time and structures a jammer mitigation framework through an automatic repeat request protocol. The other one utilizes power and, following a game-theoretic framework, employs a defense strategy against jamming based on a strategic power allocation. Superior performance of all of the proposed mitigation techniques is shown via numerical results

    Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey

    Full text link
    Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation, resource and power optimization, sensing coverage and object detection, and security challenges. In these problems, sensor nodes are to make optimized decisions from a set of accessible strategies to achieve design goals. This survey reviews numerous applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs. Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs

    Multicast MAC extensions for high rate real-time traffic in wireless LANs

    Get PDF
    Nowadays we are rapidly moving from a mainly textual-based to a multimedia-based Internet, for which the widely deployed IEEE 802.11 wireless LANs can be one of the promising candidates to make them available to users anywhere, anytime, on any device. However, it is still a challenge to support group-oriented real-time multimedia services, such as video-on-demand, video conferencing, distance educations, mobile entertainment services, interactive games, etc., in wireless LANs, as the current protocols do not support multicast, in particular they just send multicast packets in open-loop as broadcast packets, i.e., without any possible acknowledgements or retransmissions. In this thesis, we focus on MAC layer reliable multicast approaches which outperform upper layer ones with both shorter delays and higher efficiencies. Different from polling based approaches, which suffer from long delays, low scalabilities and low efficiencies, we explore a feedback jamming mechanism where negative acknowledgement (NACK) frames are allowed from the non-leader receivers to destroy the acknowledgement (ACK) frame from the single leader receiver and prompts retransmissions from the sender. Based on the feedback jamming scheme, we propose two MAC layer multicast error correction protocols, SEQ driven Leader Based Protocol (SEQ-LBP) and Hybrid Leader Based Protocol (HLBP), the former is an Automatic Repeat reQuest (ARQ) scheme while the later combines both ARQ and the packet level Forward Error Correction (FEC). We evaluate the feedback jamming probabilities and the performances of SEQ-LBP and HLBP based on theoretical analyses, NS-2 simulations and experiments on a real test-bed built with consumer wireless LAN cards. Test results confirm the feasibility of the feedback jamming scheme and the outstanding performances of the proposed protocols SEQ-LBP and HLBP, in particular SEQ-LBP is good for small multicast groups due to its short delay, effectiveness and simplicity while HLBP is better for large multicast groups because of its high efficiency and high scalability with respect to the number of receivers per group.Zurzeit vollzieht sich ein schneller Wechsel vom vorwiegend textbasierten zum multimediabasierten Internet. Die weitverbreiteten IEEE 802.11 Drahtlosnetzwerke sind vielversprechende Kandidaten, um das Internet fĂŒr Nutzer ĂŒberall, jederzeit und auf jedem GerĂ€t verfĂŒgbar zu machen. Die UnterstĂŒtzung gruppenorientierter Echtzeit-Dienste in drahtlosen lokalen Netzen ist jedoch immer noch eine Herausforderung. Das liegt daran, dass aktuelle Protokolle keinen Multicast unterstĂŒtzen. Sie senden Multicast-Pakete vielmehr in einer "Open Loop"-Strategie als Broadcast-Pakete, d. h. ohne jegliche RĂŒckmeldung (feedback) oder Paketwiederholungen. In der vorliegenden Arbeit, anders als in den auf Teilnehmereinzelabfragen (polling) basierenden AnsĂ€tzen, die unter langen Verzögerungen, geringer Skalierbarkeit und geringer Effizienz leiden, versuchen wir, Multicast-Feedback bestehend aus positiven (ACK) und negativen BestĂ€tigungen (NACK) auf MAC-Layer im selben Zeitfenster zu bĂŒndeln. Die ĂŒbrigen EmpfĂ€nger können NACK-Frames senden, um das ACK des Leaders zu zerstören und Paketwiederholungen zu veranlassen. Basierend auf einem Feedback-Jamming Schema schlagen wir zwei MAC-Layer-Protokolle fĂŒr den Fehlerschutz im Multicast vor: Das SEQ-getriebene Leader Based Protocol (SEQ-LBP) und das Hybrid Leader Based Protocol (HLBP). SEQ-LBP ist eines Automatic Repeat reQuest (ARQ) Schema. HLBP kombiniert ARQ und paketbasierte Forward Error Correction (FEC). Wir evaluieren die LeistungsfĂ€higkeit von ACK/NACK jamming, SEQ-LBP und HLBP durch Analysis, Simulationen in NS-2, sowie Experimenten in einer realen Testumgebung mit handelsĂŒblichen WLAN-Karten. Die Testergebnisse bestĂ€tigen die Anwendbarkeit der Feedback-Jamming Schemata und die herausragende LeistungsfĂ€higkeit der vorgestellten Protokolle SEQ-LBP und HLBP. SEQ-LBP ist durch seine kurze Verzögerung, seine EffektivitĂ€t und seine Einfachheit fĂŒr kleine Multicast-Gruppen nĂŒtzlich, wĂ€hrend HLBP auf Grund seiner hohen Effizienz und Skalierbarkeit im Bezug auf die GrĂ¶ĂŸe der EmpfĂ€nger eher in großen Multicast-Gruppen anzuwenden ist

    Medium access control, error control and routing in underwater acoustic networks: a discussion on protocol design and implementation

    Get PDF
    The journey of underwater communication which began from Leonardo’s era took four and a half centuries to ïŹnd practical applications for military purposes during World War II. However, over the last three decades, underwater acoustic communications witnessed a massive development due to the advancements in the design of underwater communicating peripherals and their supporting protocols. Successively, doors are opened for a wide range of applications to employ in the underwater environment, such as oceanography, pollution monitoring, offshore exploration, disaster prevention, navigation assistance, monitoring, coastal patrol and surveillance. Different applications may have different characteristics and hence, may require different network architectures. For instance, routing protocols designed for unpartitioned multi-hop networks are not suitable for Delay-Tolerant Networks. Furthermore, single-hop networks do not need routing protocols at all. Therefore, before developing a protocol one must study the network architecture properly and design it accordingly. There are several other factors which should also be considered with the network architecture while designing an efïŹcient protocol for underwater networks, such as long propagation delay, limited bandwidth, limited battery power, high bit error rate of the channel and several other adverse properties of the channel, such as, multi-path, fading and refractive behaviors. Moreover, the environment also has an impact on the performance of the protocols designed for underwater networks. Even temperature changes in a single day have an impact on the performance of the protocols. A good protocol designed for any network should consider some or all of these characteristics to achieve better performance. In this thesis, we ïŹrst discuss the impact of the environment on the performance of MAC and routing protocols. From our investigation, we discover that even temperature changes within a day may affect the sound speed proïŹle and hence, the channel changes and the protocol performance vary. After that we discuss several protocols which are speciïŹcally designed for underwater acoustic networks to serve different purposes and for different network architectures. Underwater Selective Repeat (USR) is an error control protocol designed to assure reliable data transmission in the MAC layer. One may suspect that employing an error control technique over a channel which already suffers from long propagation delays is a burden. However, USR utilizes long propagation by transmitting multiple packets in a single RTT using an interlacing technique. After USR, a routing protocol for surveillance networks is discussed where some sensors are laid down at the bottom of the sea and some sinks are placed outside the area. If a sensor detects an asset within its detection range, it announces the presence of intruders by transmitting packets to the sinks. It may happen that the discovered asset is an enemy ship or an enemy submarine which creates noise to jam the network. Therefore, in surveillance networks, it is necessary that the protocols have jamming resistance capabilities. Moreover, since the network supports multiple sinks with similar anycast address, we propose a Jamming Resistance multi-path Multi-Sink Routing Protocol (MSRP) using a source routing technique. However, the problem of source routing is that it suffers from large overhead (every packet includes the whole path information) with respect to other routing techniques, and also suffers from the unidirectional link problem. Therefore, another routing protocol based on a distance vector technique, called Multi-path Routing with Limited Cross-Path Interference (L-CROP) protocol is proposed, which employs a neighbor-aware multi-path discovery algorithm to support low interference multiple paths between each source-destination pair. Following that, another routing protocol is discussed for next generation coastal patrol and surveillance network, called Underwater Delay-Tolerant Network (UDTN) routing where some AUVs carry out the patrolling work of a given area and report to a shore based control-center. Since the area to be patrolled is large, AUVs experience intermittent connectivity. In our proposed protocol, two nodes that understand to be in contact with each other calculate and divide their contact duration equally so that every node gets a fair share of the contact duration to exchange data. Moreover, a probabilistic spray technique is employed to restrict the number of packet transmissions and for error correction a modiïŹed version of USR is employed. In the appendix, we discuss a framework which was designed by our research group to realize underwater communication through simulation which is used in most of the simulations in this thesis, called DESERT Underwater (short for DEsign, Simulate, Emulate and Realize Test-beds for Underwater network protocols). It is an underwater extension of the NS-Miracle simulator to support the design and implementation of underwater network protocols. Its creation assists the researchers in to utilizing the same codes designed for the simulator to employ in actual hardware devices and test in the real underwater scenario

    A Secure, Configurable, Wireless System for Transfer of Sensor Data from Aircraft to Ground

    Get PDF
    Modern aircraft are complex systems, equipped with hundreds of embedded sensors that record a wide repertoire of data during flight, such as crucial engine and airframe parameters, status of flight control system, air conditioning system, landing gear, life-saving and emergency systems. The data from the sensors is stored in the Flight Data Recorder. Maintenance personnel routinely transfer this sensor data to a ground terminal device to analyze it for aircraft health and performance monitoring purposes. Manual methods of extracting sensor data can be tedious and error-prone when large fleets of aircraft are involved. This paper presents a novel system to extract sensor data from aircraft to a ground terminal, wirelessly. The wireless system is implemented using unique, configurable wireless transmitter receivers (WTRs) designed for this purpose. The hardware for the wireless transfer of data was designed, interfaced with a modern aircraft’s system, and tested with the aircraft on the ground and another flying object. The data from the aircraft’s Flight Data Recorder was successfully transmitted and received wirelessly by the ground terminal, over a distance of 50 meters (with aircraft on ground) and 10 Kilometers (with a flying object), in a secure mode with zero packet loss. The WTRs have also qualified the requisite tests for airborne certification

    Co-Channel Interference Between IEEE 802.11 WLAN and Bluetooth

    Get PDF
    Electrical Engineering Technolog

    Security-centric analysis and performance investigation of IEEE 802.16 WiMAX

    Get PDF
    fi=vertaisarvioitu|en=peerReviewed
    • 

    corecore