272 research outputs found

    Throughput Maximization in Unmanned Aerial Vehicle Networks

    Get PDF
    The use of Unmanned Aerial Vehicles (UAVs) swarms in civilian applications such as surveillance, agriculture, search and rescue, and border patrol is becoming popular. UAVs have also found use as mobile or portable base stations. In these applications, communication requirements for UAVs are generally stricter as compared to conventional aircrafts. Hence, there needs to be an efficient Medium Access Control (MAC) protocol that ensures UAVs experience low channel access delays and high throughput. Some challenges when designing UAVs MAC protocols include interference and rapidly changing channel states, which require a UAV to adapt its data rate to ensure data transmission success. Other challenges include Quality of Service (QoS) requirements and multiple contending UAVs that result in collisions and channel access delays. To this end, this thesis aims to utilize Multi-Packet Reception (MPR) technology. In particular, it considers nodes that are equipped with a Successive Interference Cancellation (SIC) radio, and thereby, allowing them to receive multiple transmissions simultaneously. A key problem is to identify a suitable a Time Division Multiple Access (TDMA) transmission schedule that allows UAVs to transmit successfully and frequently. Moreover, in order for SIC to operate, there must be a sufficient difference in received power. However, in practice, due to the location and orientation of nodes, the received power of simultaneously transmitting nodes may cause SIC decoding to fail at a receiver. Consequently, a key problem concerns the placement and orientation of UAVs to ensure there is diversity in received signal strength at a receiving node. Lastly, interference between UAVs serving as base station is a critical issue. In particular, their respective location may have excessive interference or cause interference to other UAVs; all of which have an impact on the schedule used by these UAVs to serve their respective users

    Developing a Systematic Process for Mobile Surveying and Analysis of WLAN security

    Get PDF
    Wireless Local Area Network (WLAN), familiarly known as Wi-Fi, is one of the most used wireless networking technologies. WLANs have rapidly grown in popularity since the release of the original IEEE 802.11 WLAN standard in 1997. We are using our beloved wireless internet connection for everything and are connecting more and more devices into our wireless networks in every form imaginable. As the number of wireless network devices keeps increasing, so does the importance of wireless network security. During its now over twenty-year life cycle, a multitude of various security measures and protocols have been introduced into WLAN connections to keep our wireless communication secure. The most notable security measures presented in the 802.11 standard have been the encryption protocols Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Both encryption protocols have had their share of flaws and vulnerabilities, some of them so severe that the use of WEP and the first generation of the WPA protocol have been deemed irredeemably broken and unfit to be used for WLAN encryption. Even though the aforementioned encryption protocols have been long since deemed fatally broken and insecure, research shows that both can still be found in use today. The purpose of this Master’s Thesis is to develop a process for surveying wireless local area networks and to survey the current state of WLAN security in Finland. The goal has been to develop a WLAN surveying process that would at the same time be efficient, scalable, and easily replicable. The purpose of the survey is to determine to what extent are the deprecated encryption protocols used in Finland. Furthermore, we want to find out in what state is WLAN security currently in Finland by observing the use of other WLAN security practices. The survey process presented in this work is based on a WLAN scanning method called Wardriving. Despite its intimidating name, wardriving is simply a form of passive wireless network scanning. Passive wireless network scanning is used for collecting information about the surrounding wireless networks by listening to the messages broadcasted by wireless network devices. To collect our research data, we conducted wardriving surveys on three separate occasions between the spring of 2019 and early spring of 2020, in a typical medium-sized Finnish city. Our survey results show that 2.2% out of the located networks used insecure encryption protocols and 9.2% of the located networks did not use any encryption protocol. While the percentage of insecure networks is moderately low, we observed during our study that private consumers are reluctant to change the factory-set default settings of their wireless network devices, possibly exposing them to other security threats

    Multi-layer Utilization of Beamforming in Millimeter Wave MIMO Systems

    Get PDF
    mmWave frequencies ranging between (30-300GHz) have been considered the perfect solution to the scarcity of bandwidth in the traditional sub-6GHz band and to the ever increasing demand of many emerging applications in today\u27s era. 5G and beyond standards are all considering the mmWave as an essential part of there networks. Beamforming is one of the most important enabling technologies for the mmWave to compensate for the huge propagation lose of these frequencies compared to the sub-6GHz frequencies and to ensure better spatial and spectral utilization of the mmWave channel space. In this work, we tried to develop different techniques to improve the performance of the systems that use mmWave. In the physical layer, we suggested several hybrid beamforming architectures that both are relatively simple and spectrally efficient by achieving fully digital like spectral efficiency (bits/sec/Hz). For the mobility management, we derived the expected degradation that can affect the performance of a special type of beamforming that is called the Random Beamforming (RBF) and optimized the tunable parameters for such systems when working in different environments. Finally, in the networking layer, we first studied the effect of using mmWave frequencies on the routing performance comparing to the performance achieved when using sub-6 GHz frequencies. Then we developed a novel opportunistic routing protocol for Mobile Ad-Hoc Networks (MANET) that uses a modified version of the Random Beamforming (RBF) to achieve better end to end performance and to reduce the overall delay in delivering data from transmitting nodes to the intended receiving nodes. From all these designs and studies, we conclude that mmWave frequencies and their enabling technologies (i.e. Beamforming, massive MIMO, ...etc.) are indeed the future of wireless communicatons in a high demanding world of Internet of Things (IoT), Augmented Reality (AR), Virtual Reality (VR), and self driving cars
    • …
    corecore