76 resultados para AVR, ZigBee, microcontrollori, IEEE, 802, 15, 4, wireless, Arduino, XBee, sensori


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Key generation from wireless channels is a promising alternative to public key cryptography for the establishment of cryptographic keys. It is the first paper to experimentally study the channel reciprocity principle of key generation, through investigating and quantifying channel measurements' cross-correlation relationship affected by noise and non-simultaneous measurements. Channel measurements, both received signal strength and channel state information, are collected from a real experimental platform using the wireless open access research platform (WARP) in a multipath office room. We found that in a slow fading channel (e.g., with a coherence time of about 50~ms), the channel cross-correlation is impacted greatly by noise but little by non-simultaneous measurements with a small sampling time difference (e.g., 0.06 ms). The resolution of the sampling time difference can be satisfied by wireless systems such as IEEE 802.11 to maintain an acceptable cross-correlation coefficient without affecting the bandwidth and communication efficiency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we investigate the secrecy performance of an energy harvesting relay system, where a legitimate source communicates with a legitimate destination via the assistance of multiple trusted relays. In the considered system, the source and relays deploy the time-switching-based radio frequency energy harvesting technique to harvest energy from a multi-antenna beacon. Different antenna selection and relay selection schemes are applied to enhance the security of the system. Specifically, two relay selection schemes based on the partial and full knowledge of channel state information, i.e., optimal relay selection and partial relay selection, and two antenna selection schemes for harvesting energy at source and relays, i.e., maximizing energy harvesting channel for the source and maximizing energy harvesting channel for the selected relay, are proposed. The exact and asymptotic expressions of secrecy outage probability in these schemes are derived. We demonstrate that applying relay selection approaches in the considered energy harvesting system can enhance the security performance. In particular, optimal relay selection scheme outperforms partial relay selection scheme and achieves full secrecy diversity order, regardless of energy harvesting scenarios.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a thorough experimental study on key generation principles, i.e. temporal variation, channel reciprocity, and spatial decorrelation, via a testbed constructed by using wireless open-access research platform (WARP). It is the first comprehensive study through (i) carrying out a number of experiments in different multipath environments, including an anechoic chamber, a reverberation chamber and an indoor office environment, which represents little, rich, and moderate multipath, respectively; (ii) considering static, object moving, and mobile scenarios in these environments, which represents different levels of channel dynamicity; (iii) studying two most popular channel parameters, i.e., channel state information and received signal strength. Through results collected from over a hundred tests, this paper offers insights to the design of a secure and efficient key generation system. We show that multipath is essential and beneficial for key generation as it increases the channel randomness. We also find that the movement of users/objects can help introduce temporal variation/randomness and help users reach an agreement on the keys. This paper complements existing research by experiments constructed by a new hardware platform.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A novel wireless local area network (WLAN) security processor is described in this paper. It is designed to offload security encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable hardware accelerator. The unique design, which comprises dedicated cryptographic instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher block chaining message authentication code protocol, and wireless robust authentication protocol. Existing solutions to wireless security have been implemented on hardware devices and target specific WLAN protocols whereas the programmable security processor proposed in this paper provides support for all WLAN protocols and thus, can offer backwards compatibility as well as future upgrade ability as standards evolve. It provides this additional functionality while still achieving equivalent throughput rates to existing architectures. © 2006 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This letter exposed a serious unfairness problem with IEEE 802.11 MAC based Mobile Ad-hoc Networks (MANETs) when operating TCP connections, and identifies the three common factors that contribute to this problem. The work initiated the development of a programmable wireless framework that is subsequently used in a spin-out company (TOM), and by the Telecoms Technology Testing centre in Taiwan(Dr D Chieng).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile ad hoc networking of dismounted combat personnel is expected to play an important role in the future of network-centric operations. High-speed, short-range, soldier-to-soldier wireless communications will be required to relay information on situational awareness, tactical instructions, and covert surveillance related data during special operations reconnaissance and other missions. This article presents some of the work commissioned by the U. K. Ministry of Defence to assess the feasibility of using 60 GHz millimeter-wave smart antenna technology to provide covert communications capable of meeting these stringent networking needs. Recent advances in RF front-end technology, alongside physical layer transmission schemes that could be employed in millimeter-wave soldier-mounted radio, are discussed. The introduction of covert communications between soldiers will require the development of a bespoke directive medium access layer. A number of adjustments to the IEEE 802.11 distribution coordination function that will enable directional communications are suggested. The successful implementation of future smart antenna technologies and direction of arrival-based protocols will be highly dependent on thorough knowledge of transmission channel characteristics prior to deployment. A novel approach to simulating dynamic soldier-to-soldier signal propagation using state-of-the-art animation-based technology developed for computer game design is described, and important channel metrics such as root mean square angle and delay spread for a team of four networked infantry soldiers over a range of indoor and outdoor environments is reported.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of the overall system. For example, communicational delay associated with the underlying MAC layer needs to be taken into account. Nodes in mobile ad hoc networks must strictly obey the rules of the underlying MAC when transmitting security-related messages while still maintaining a certain quality of service. In this paper a novel authentication protocol, RASCAAL, is described and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-related effects of the cryptographic algorithms employed. To the best of the authors' knowledge, RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head. The performance analysis demonstrates that the communication losses outweigh the computation losses with respect to energy and delay. MAC-related communicational effects account for 99% of the total delay and total energy consumption incurred by the RASCAAL protocol. The results also show that a saving in communicational energy of up to 12.5% can be achieved by changing the status of the wireless nodes during the course of operation. Copyright (C) 2009 G. A. Safdar and M. P. O'Neill (nee McLoone).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract
PURPOSE:
The optimal duration over which lung SBRT should be delivered is unknown. We conducted a randomized pilot study in patients treated with four fractions of lung SBRT delivered over 4 or over 11days.
METHODS:
Patients with a peripheral solitary lung tumor (NSCLC or pulmonary metastasis) ?5cm were eligible. For NSCLC lung tumors ?3cm, a dose of 48Gy in 4 fractions was used, otherwise 52Gy in 4 fractions was delivered. Patients were randomized to receive treatment over 4 consecutive days or over 11days. The primary end-point was acute grade ?2 toxicity. Secondary end-points included quality of life (QOL) assessed using the EORTC QLQ-C30 and QLQ-LC13 questionnaires.
RESULTS:
Fifty four patients were enrolled. More patients in the 11day group had respiratory symptoms at baseline. 55.6% patients treated over 4days and 33.3% of patients treated over 11days experienced acute grade ?2 toxicity (p=0.085). Dyspnea, fatigue and coughing domains were worse in the 11day group at baseline. At 1 and 4months, more patients in the 4day group experienced a clinically meaningful worsening in the dyspnea QOL domain compared to the 11day group (44.5% vs 15.4%, p=0.02; 38.5% vs 12.0%, p=0.03, respectively). However, raw QOL scores were not different at these time-points between treatment groups.
CONCLUSIONS:
Grade 2 or higher acute toxicity was more common in the 4day group, approaching statistical significance. More patients treated on 4 consecutive days reported a clinically meaningful increase in dyspnea, although interpretation of these results is challenging due to baseline imbalance between treatment groups. Larger studies are required to validate these results.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The human body is an extremely challenging environment for the operation of wireless communications systems, not least because of the complex antenna-body electromagnetic interaction effects which can occur. This is further compounded by the impact of movement and the propagation characteristics of the local environment which all have an effect upon body centric communications channels. As the successful design of body area networks (BANs) and other types of body centric system is inextricably linked to a thorough understanding of these factors, the aim of this paper is to conduct a survey of the current state of the art in relation to propagation and channel models primarily for BANs but also considering other types of body centric communications. We initially discuss some of the standardization efforts performed by the Institute of Electrical and Electronics Engineers 802.15.6 task group before focusing on the two most popular types of technologies currently being considered for BANs, namely narrowband and Ultrawideband (UWB) communications. For narrowband communications the applicability of a generic path loss model is contended, before presenting some of the scenario specific models which have proven successful. The impacts of human body shadowing and small-scale fading are also presented alongside some of the most recent research into the Doppler and time dependencies of BANs. For UWB BAN communications, we again consider the path loss as well as empirical tap delay line models developed from a number of extensive channel measurement campaigns conducted by research institutions around the world. Ongoing efforts within collaborative projects such as Committee on Science and Technology Action IC1004 are also described. Finally, recent years have also seen significant developments in other areas of body centric communications such as off-body and body-to-body communications. We highlight some of the newest relevant research in these areas as well as discussing some of the advanced topics which are currently being addressed in the field of body centric communications. Key Points Channel models for body centric comms ©2014. The Authors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Human occupants within indoor environments are not always stationary and their movement will lead to temporal channel variations that strongly affect the quality of indoor wireless communication systems. This paper describes a statistical channel characterization, based on experimental measurements, of human body effects on line-of-sight indoor narrowband propagation at 5.2 GHz. The analysis shows that, as the number of pedestrians within the measurement location increases, the Ricean K-factor that best fits the empirical data tends to decrease proportionally, ranging from K=7 with 1 pedestrian to K=0 with 4 pedestrians. Level crossing rate results were Rice distributed, while average fade duration results were significantly higher than theoretically computed Rice and Rayleigh, due to the fades caused by pedestrians. A novel CDF that accurately characterizes the 5.2 GHz channel in the considered indoor environment is proposed. For the first time, the received envelope CDF is explicitly described in terms of a quantitative measurement of pedestrian traffic within the indoor environment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a new encryption scheme implemented at the physical layer of wireless networks employing orthogonal frequency-division multiplexing (OFDM). The new scheme obfuscates the subcarriers by randomly reserving several subcarriers for dummy data and resequences the training symbol by a new secure sequence. Subcarrier obfuscation renders the OFDM transmission more secure and random, while training symbol resequencing protects the entire physical layer packet, but does not affect the normal functions of synchronization and channel estimation of legitimate users while preventing eavesdroppers from performing these functions. The security analysis shows the system is robust to various attacks by analyzing the search space using an exhaustive key search. Our scheme is shown to have a better performance in terms of search space, key rate and complexity in comparison with other OFDM physical layer encryption schemes. The scheme offers options for users to customize the security level and key rate according to the hardware resource. Its low complexity nature also makes the scheme suitable for resource limited devices. Details of practical design considerations are highlighted by applying the approach to an IEEE 802.11 OFDM system case study.

Relevância:

100.00% 100.00%

Publicador: