634 research outputs found

    Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks

    Get PDF
    In this paper we present a new kind of Denial-of-Service attack against the PHY layer of low power wireless sensor networks. Overcoming the very limited range of jamming-based attacks, this attack can penetrate deep into a target network with high power efficiency. We term this the Droplet attack, as it attains enormous disruption by dropping small, payload-less frame headers to its victim's radio receiver, depriving the latter of bandwidth and sleep time. We demonstrate the Droplet attack's high damage rate to full duty-cycle receivers, and further show that a high frequency version of Droplet can even force nodes running on very low duty-cycle MAC protocols to drop most of their packets

    Joint symbol and chip synchronization for a burst-mode-communication superregenerative MSK receiver

    Get PDF
    In this paper we describe a superregenerative (SR) MSK receiver able to operate in a burst-mode framework where synchronization is required for each packet. The receiver is based on an SR oscillator which provides samples of the incoming instantaneous phase trajectories. We develop a simple yet effective technique to achieve joint chip and symbol synchronization within the time limits of a suitable preamble. We develop some general results and focus on the case of the IEEE 802.15.4 MSK physical layer. We provide details on a VHDL implementation on an FPGA where the most complex digital processing block is an accumulator. Simulation and experimental results are provided to validate the described technique.Peer ReviewedPostprint (published version

    Efficient coding schemes for low‐rate wireless personal area networks

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/166246/1/cmu2bf01608.pd

    Design of linear regression based localization algorithms for wireless sensor networks

    Get PDF

    Real-time localization using received signal strength

    Get PDF
    Locating and tracking assets in an indoor environment is a fundamental requirement for several applications which include for instance network enabled manufacturing. However, translating time of flight-based GPS technique for indoor solutions has proven very costly and inaccurate primarily due to the need for high resolution clocks and the non-availability of reliable line of sight condition between the transmitter and receiver. In this dissertation, localization and tracking of wireless devices using radio signal strength (RSS) measurements in an indoor environment is undertaken. This dissertation is presented in the form of five papers. The first two papers deal with localization and placement of receivers using a range-based method where the Friis transmission equation is used to relate the variation of the power with radial distance separation between the transmitter and receiver. The third paper introduces the cross correlation based localization methodology. Additionally, this paper also presents localization of passive RFID tags operating at 13.56MHz frequency or less by measuring the cross-correlation in multipath noise from the backscattered signals. The fourth paper extends the cross-correlation based localization algorithm to wireless devices operating at 2.4GHz by exploiting shadow fading cross-correlation. The final paper explores the placement of receivers in the target environment to ensure certain level of localization accuracy under cross-correlation based method. The effectiveness of our localization methodology is demonstrated experimentally by using IEEE 802.15.4 radios operating in fading noise rich environment such as an indoor mall and in a laboratory facility of Missouri University of Science and Technology. Analytical performance guarantees are also included for these methods in the dissertation --Abstract, page iv

    同時送信型無線ネットワークの物理層に関する研究

    Get PDF
    学位の種別: 課程博士審査委員会委員 : (主査)東京大学教授 森川 博之, 東京大学教授 相田 仁, 東京大学教授 廣瀬 明, 東京大学准教授 中山 雅哉, 東京大学准教授 落合 秀也University of Tokyo(東京大学

    Obfuscating IEEE 802.15.4 communication using secret spreading codes

    Full text link
    corecore