101 research outputs found

    Collaborative Beamforming for Distributed Wireless Ad Hoc Sensor Networks

    Full text link
    The performance of collaborative beamforming is analyzed using the theory of random arrays. The statistical average and distribution of the beampattern of randomly generated phased arrays is derived in the framework of wireless ad hoc sensor networks. Each sensor node is assumed to have a single isotropic antenna and nodes in the cluster collaboratively transmit the signal such that the signal in the target direction is coherently added in the far- eld region. It is shown that with N sensor nodes uniformly distributed over a disk, the directivity can approach N, provided that the nodes are located sparsely enough. The distribution of the maximum sidelobe peak is also studied. With the application to ad hoc networks in mind, two scenarios, closed-loop and open-loop, are considered. Associated with these scenarios, the effects of phase jitter and location estimation errors on the average beampattern are also analyzed.Comment: To appear in the IEEE Transactions on Signal Processin

    Secrecy Design of Indoor Visible Light Communication Network under Downlink NOMA Transmission

    Full text link
    In this work, we investigate the transmission sum rate as well as the secrecy sum rate of indoor visible light communication (VLC) networks for mobile devices with the power domain non-orthogonal multiple access (NOMA) transmission, where multiple legitimate users are equipped with photodiodes (PDs). We introduce a body blockage model of the legitimate users as well as the eavesdropper to focus on the case where the communications from transmitting light-emitting diodes (LEDs) to receiving devices are blocked by the bodies of receiving users. Furthermore, in order to improve the secrecy without any knowledge of the channel state information (CSI) of the eavesdropper, a novel LED arrangement is introduced to reduce the overlapping area covered by LED units supporting different users. We also propose two LED operation strategies, called simple and smart LED linking, and evaluate their performance against the conventional broadcasting in terms of transmission sum rate and secrecy sum rate. Through computer simulations, the superiority of our proposed strategies is demonstrated.Comment: 30 pages, 13 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Live E! Project: Establishment of Infrastructure Sharing Environmental Information

    Full text link
    The Live E! project is an open research consortium among industry and academia to explore the platform to share the digital information related with the earth and our living environment. We have getting a lot of low cost sensor nodes with Internet connectivity. The deployment of broad-band and ubiquitous networks will enable autonomous and global digital information sharing over the globe. In this paper, we describe the technical and operational overview of Live E! project, while discussing the objective, such as education, disaster protection/reduction/recovery or busi-ness cases, and goal of this project activity. 1

    Beware of Pickpockets: A Practical Attack against Blocking Cards

    Get PDF
    peer reviewedToday, we rely on contactless smart cards to perform several critical operations (e.g., payments and accessing buildings). Attacking smart cards can have severe consequences, such as losing money or leaking sensitive information. Although the security protections embedded in smart cards have evolved over the years, those with weak security properties are still commonly used. Among the different solutions, blocking cards are affordable devices to protect smart cards. These devices are placed close to the smart cards, generating a noisy jamming signal or shielding them. Whereas vendors claim the reliability of their blocking cards, no previous study has ever focused on evaluating their effectiveness. In this paper, we shed light on the security threats on smart cards in the presence of blocking cards, showing the possibility of being bypassed by an attacker. We analyze blocking cards by inspecting their emitted signal and assessing a vulnerability in their internal design.We propose a novel attack that bypasses the jamming signal emitted by a blocking card and reads the content of the smart card. We evaluate the effectiveness of 11 blocking cards when protecting a MIFARE Ultralight smart card and a MIFARE Classic card. Of these 11 cards, we managed to bypass 8 of them and successfully dump the content of a smart card despite the presence of the blocking card. Our findings highlight that the noise type implemented by the blocking cards highly affects the protection level achieved by them. Based on this observation, we propose a countermeasure that may lead to the design of effective blocking cards. To further improve security, we released the tool we developed to inspect the spectrum emitted by blocking cards and set up our attack

    Robotic rehabilitation training with a newly developed upper limb single-joint Hybrid Assistive Limb (HAL-SJ) for elbow flexor reconstruction after brachial plexus injury: A report of two cases

    Get PDF
    This study aimed to evaluate the effectiveness and safety of using the upper limb single-joint Hybrid Assistive Limb (upper limb HAL-SJ) during elbow flexion training following elbow flexor reconstruction for brachial plexus injury (BPI). We present the cases of two patients in whom the upper limb HAL-SJ was implemented 5 and 7 months postoperatively following elbow flexor reconstruction for BPI. They underwent elbow flexor reconstruction with intercostal nerve crossing-to-musculocutaneous nerve (ICN-MCN crossing) after BPI. Postoperative training using the upper limb HAL-SJ was started from the Medical Research Council (MRC) grade 1 elbow flexion power to MRC grade 3 once every week or every 2 weeks. Both patients could implement elbow training using the upper limb HAL-SJ even in MRC grade 1 of their elbow flexion power. Training with the upper limb HAL-SJ was performed safely and effectively in two patients with elbow flexor reconstruction with ICN crossing after BPI
    corecore