1,856 research outputs found

    OFDM over IEEE 802.11b hardware for telemedical applications

    Get PDF
    Using a wireless Local Area Network (WLAN) to transmit live high-quality video suitable for a telemedical application presents many challenges, including ensuring sufficient Quality of Service (QoS) for the end-user to be able to make an accurate diagnosis. One of the many problems that exist when developing such a system is the multipath effect caused by the reflections of the transmitted signals on various surfaces including walls, floors, furniture and people. This degrades the signal quality and reduces the amount of available bandwidth and, thus, the quality of the image. Presently, most of Europe is using the IEEE 802.11b hardware for such applications. As an alternative to the existing modulation of 802.11b, Orthogonal Frequency Division Multiplexing (OFDM) is investigated, especially for use inside hospitals. The advantages of using this modulation over IEEE 802.11b hardware for a telemedicine application are examined by means of simulation using three different simulation packages

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Wireless industrial monitoring and control networks: the journey so far and the road ahead

    Get PDF
    While traditional wired communication technologies have played a crucial role in industrial monitoring and control networks over the past few decades, they are increasingly proving to be inadequate to meet the highly dynamic and stringent demands of today’s industrial applications, primarily due to the very rigid nature of wired infrastructures. Wireless technology, however, through its increased pervasiveness, has the potential to revolutionize the industry, not only by mitigating the problems faced by wired solutions, but also by introducing a completely new class of applications. While present day wireless technologies made some preliminary inroads in the monitoring domain, they still have severe limitations especially when real-time, reliable distributed control operations are concerned. This article provides the reader with an overview of existing wireless technologies commonly used in the monitoring and control industry. It highlights the pros and cons of each technology and assesses the degree to which each technology is able to meet the stringent demands of industrial monitoring and control networks. Additionally, it summarizes mechanisms proposed by academia, especially serving critical applications by addressing the real-time and reliability requirements of industrial process automation. The article also describes certain key research problems from the physical layer communication for sensor networks and the wireless networking perspective that have yet to be addressed to allow the successful use of wireless technologies in industrial monitoring and control networks

    Analysis of Ultra Wide Band (UWB) Technology for an Indoor Geolocation and Physiological Monitoring System

    Get PDF
    The goal of this research is to analyze the utility of UWB for indoor geolocation and to evaluate a prototype system, which will send information detailing a person’s position and physiological status to a command center. In a real world environment, geolocation and physiological status information needs to be sent to a command and control center that may be located several miles away from the operational environment. This research analyzes and characterizes the UWB signal in the various operational environments associated with indoor geolocation. Additionally, typical usage scenarios for the interaction between UWB and other devices are also tested and evaluated

    Channel-based key generation for encrypted body-worn wireless sensor networks

    Get PDF
    Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sensitive data are often transmitted over such a network, motivating the need for encryption. Body-worn sensor networks are deployed in conditions where the wireless communication channel varies dramatically due to fading and shadowing, which is considered a disadvantage for communication. Interestingly, these channel variations can be employed to extract a common encryption key at both sides of the link. Legitimate users share a unique physical channel and the variations thereof provide data series on both sides of the link, with highly correlated values. An eavesdropper, however, does not share this physical channel and cannot extract the same information when intercepting the signals. This paper documents a practical wearable communication system implementing channel-based key generation, including an implementation and a measurement campaign comprising indoor as well as outdoor measurements. The results provide insight into the performance of channel-based key generation in realistic practical conditions. Employing a process known as key reconciliation, error free keys are generated in all tested scenarios. The key-generation system is computationally simple and therefore compatible with the low-power micro controllers and low-data rate transmissions commonly used in wireless sensor networks

    Personal area technologies for internetworked services

    Get PDF

    Ultra Wideband Preliminaries

    Get PDF
    Non
    corecore