ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals
|
|
- Esther Hart
- 5 years ago
- Views:
Transcription
1 ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals Suhas Mathur AT&T Security Research Group Rob Miller, Alex Varshavsky, Wade Trappe, Narayan Madayam Suhas Mathur (AT&T) firstname AT att.com ACM Mobisys, 30 June 2011
2 Overview 1 The Secure Pairing problem 2 How wireless channels can help 3 ProxiMate in detail Suhas Mathur (AT&T) firstname AT att.com ACM Mobisys, 30 June 2011
3 The Secure Pairing problem
4 Alice & Bob have no prior trust relationship Alice Bob
5 Alice & Bob have no prior trust relationship They d like to exchange a secret message. Alice Bob
6 Alice & Bob have no prior trust relationship They d like to exchange a secret message. Alice Bob Eve
7 But they don t share a key Alice Bob Eve
8 Alice? Bob Eve
9 Alice Diffie Hellman key exchange Bob Eve
10 Alice Diffie Hellman key exchange Bob Eve Computational Secrecy (Computationally bounded Eve) k = key, Y = Eve s observations It is computationally infeasible to compute k from Y.
11 Alice Diffie Hellman key exchange Bob Eve But how does Alice know that she is talking to Bob? Easy to spoof identity on the wireless channel, when there is no prior trust relationship.
12 How can Wireless Channels help?
13 What is a Wireless Channel?
14 What is a Wireless Channel? It is the distortion h(t) produced by environment between transmitter and receiver = a randomly varying complex number (= a + j.b)
15 What is a Wireless Channel? It is the distortion h(t) produced by environment between transmitter and receiver = a randomly varying complex number (= a + j.b)
16 What is a Wireless Channel? It is the distortion h(t) produced by environment between transmitter and receiver = a randomly varying complex number (= a + j.b) h(t) decorrelates in space and time: Space: Over distances of λ/2 (= GHz) Time: Over one coherence time T c ( 100s of 2.4 GHz)
17 ProxiMate: Use a public RF source for secure pairing
18 ProxiMate: Use a public RF source for secure pairing
19 ProxiMate: Use a public RF source for secure pairing Assumption: Alice-Bob closer to each other than to Eve
20 Provides Alice & Bob (but not Eve) with a continuous, private source of randomness
21 Provides Alice & Bob (but not Eve) with a continuous, private source of randomness ProxiMate: 1 Use this source to generate a secret key at Alice and Bob
22 Provides Alice & Bob (but not Eve) with a continuous, private source of randomness ProxiMate: 1 Use this source to generate a secret key at Alice and Bob 2 If K alice = K Bob, then Alice & Bob know they are in proximity
23 Provides Alice & Bob (but not Eve) with a continuous, private source of randomness ProxiMate: 1 Use this source to generate a secret key at Alice and Bob 2 If K alice = K Bob, then Alice & Bob know they are in proximity 3 Use the key for encrypting all further communication.
24 ProxiMate in detail
25 Example trace 6 5 x 10 4 Alice Bob Amplitude Time (Sec) Peter-to-Alice and Peter-to-Bob channels FM radio, 88.7 MHz Alice and Bob are 34 cm = wavelength 10 apart.
26 A & B locally compute quantizer threshold (e.g. median) 6 5 x 10 4 Alice Bob Amplitude Time (Sec) Peter-to-Alice and Peter-to-Bob channels FM radio, 88.7 MHz Alice and Bob are 34 cm = wavelength 10 apart.
27 Quantize at intervals > Coherence time 6 5 x 10 4 Alice Bob Amplitude Time (Sec) Bits obtained by Alice and Bob: A s Bits: = w. B s Bits: = w
28 A & B want identical keys, of which Eve knows nothing
29 A & B want identical keys, of which Eve knows nothing A s Bits: = w. B s Bits: = w
30 A & B want identical keys, of which Eve knows nothing A s Bits: = w. B s Bits: = w 1 A sends B code-offset P of w wrt a codeword c 1 in known code C.
31 A & B want identical keys, of which Eve knows nothing A s Bits: = w. B s Bits: = w 1 A sends B code-offset P of w wrt a codeword c 1 in known code C. 2 B uses P along with w to determine w.
32 A & B want identical keys, of which Eve knows nothing A s Bits: = w. B s Bits: = w 1 A sends B code-offset P of w wrt a codeword c 1 in known code C. 2 B uses P along with w to determine w. 3 Eliminate information leaked out to Eve via P by discarding H(P) bits.
33 Experimental evaluation
34 Experimental evaluation
35 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds.
36 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds. 2 TV channels ( 600 MHz) and FM channels ( 100 MHz)
37 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds. 2 TV channels ( 600 MHz) and FM channels ( 100 MHz) 3 Metrics of interest:
38 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds. 2 TV channels ( 600 MHz) and FM channels ( 100 MHz) 3 Metrics of interest: Rate (secret bits per sec)
39 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds. 2 TV channels ( 600 MHz) and FM channels ( 100 MHz) 3 Metrics of interest: Rate (secret bits per sec) Bit-error-rate (fraction of bits that differ at A & B)
40 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds. 2 TV channels ( 600 MHz) and FM channels ( 100 MHz) 3 Metrics of interest: Rate (secret bits per sec) Bit-error-rate (fraction of bits that differ at A & B) Mutual Information: Statistical dependence between two quantities
41 Bit-error-rate Vs. distance between two receivers Fraction of bits that differ (ε) TV FM Distance between receivers (in λ)
42 Shaking devices helps Rate
43 Shaking devices helps Rate 1 Coherence time T c 1/Rate estimated using level crossing rate.
44 Shaking devices helps Rate 1 Coherence time T c 1/Rate estimated using level crossing rate. 2 T c can be increased if Alice and Bob physically shaken together.
45 Shaking devices helps Rate 1 Coherence time T c 1/Rate estimated using level crossing rate. 2 T c can be increased if Alice and Bob physically shaken together. Coherence time estimates Time (sec) Stationary moving slowly moving fast Time (Sec) Stationary moving slowly moving fast TV FM
46 Shaking devices helps Rate 1 Coherence time T c 1/Rate estimated using level crossing rate. 2 T c can be increased if Alice and Bob physically shaken together. Coherence time estimates Time (sec) Stationary moving slowly moving fast Time (Sec) Stationary moving slowly moving fast TV FM 2x in rate by shaking.
47 Shaking devices helps Rate 1 Coherence time T c 1/Rate estimated using level crossing rate. 2 T c can be increased if Alice and Bob physically shaken together. Coherence time estimates Time (sec) Stationary moving slowly moving fast Time (Sec) Stationary moving slowly moving fast TV FM 2x in rate by shaking. Shaking also provides resistance to passive attackers within λ/2!
48 Monitoring multiple sources
49 Monitoring multiple sources
50 Monitoring multiple sources
51 Monitoring multiple sources Rate # of Independent sources of randomness.
52 Number of seconds needed for a 128-bit key with 10 sources Stationary Moving slow Moving fast TV FM Prob(Key mismatch) 10 4
53 What if Eve controls the transmitter? (i.e. Eve = Peter)
54 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 Eve free to vary the transmit signal however she wants
55 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 Eve free to vary the transmit signal however she wants 2 Can Alice & Bob extract bits about which Eve has no information?
56 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 Eve free to vary the transmit signal however she wants 2 Can Alice & Bob extract bits about which Eve has no information? 3 Using Magnitude: No!
57 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 Eve free to vary the transmit signal however she wants 2 Can Alice & Bob extract bits about which Eve has no information? 3 Using Magnitude: No!
58 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 Eve free to vary the transmit signal however she wants 2 Can Alice & Bob extract bits about which Eve has no information? 3 Using Magnitude: No! 4 Using Phase: Yes! Because phase wraps around after 2π
59 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 But Local Alice and Bob are not synchronized. Thus, only change in phase at A & B will be similar in value.
60 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 But Local Alice and Bob are not synchronized. Thus, only change in phase at A & B will be similar in value. 2 Approach: We use differential phase across T c
61 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 But Local Alice and Bob are not synchronized. Thus, only change in phase at A & B will be similar in value. 2 Approach: We use differential phase across T c 3 To test, we let Eve transmit a recorded FM signal
62 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 But Local Alice and Bob are not synchronized. Thus, only change in phase at A & B will be similar in value. 2 Approach: We use differential phase across T c 3 To test, we let Eve transmit a recorded FM signal 4 Eve knows almost nothing about diff-phase at Alice & Bob.
63 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity.
64 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary.
65 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0.
66 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated:
67 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated: # of sources monitored
68 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated: # of sources monitored frequency monitored
69 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated: # of sources monitored frequency monitored E.g.: 4-digit PIN in 0.34 sec with 10 TV sources.
70 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated: # of sources monitored frequency monitored E.g.: 4-digit PIN in 0.34 sec with 10 TV sources. 5 ProxiMate s complexity is O(n) while Diffie-Hellman is O(n 3 ).
71 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated: # of sources monitored frequency monitored E.g.: 4-digit PIN in 0.34 sec with 10 TV sources. 5 ProxiMate s complexity is O(n) while Diffie-Hellman is O(n 3 ). 6 ProxiMate can generate a secret key even if RF source is adversarial.
72 Questions/Comments
73 Backup Slides
74 Related work 1 Low power communications not secure: Susceptible to eavesdropping using a high gain directional antenna Bluetooth can be sniffed from over a mile away [Wright06] NFC is convenient but not secure by itself [Haselsteine06] 2 Existing approaches are cumbersome Human intervention (cables, entering PINs) Faraday cage [Perrig07] 3 Ambient wireless signals like WiFi can help establish proximity [AMIGO-Varshavsky07]
75 Where does the randomness and the spatial & temporal de-correlation come from?
76 Synchronizing Alice & Bob 1 Alice and Bob demodulate their signals 2 Alice sends Bob a snippet of the demodulated signal to indicate t = 0
77 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ
78 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ BSC with crossover prob. = ɛ (capacity = 1 Hb (ɛ))
79 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ BSC with crossover prob. = ɛ (capacity = 1 Hb (ɛ)) 2 For high ɛ, long codes are needed for reasonable rate Long delay.
80 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ BSC with crossover prob. = ɛ (capacity = 1 Hb (ɛ)) 2 For high ɛ, long codes are needed for reasonable rate Long delay. Fraction of bits that differ (ε) Theoretical curve Rate 1/4 LDPC code, n = 1008 P e = 3.5 * Distance (in units of λ)
81 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ BSC with crossover prob. = ɛ (capacity = 1 Hb (ɛ)) 2 For high ɛ, long codes are needed for reasonable rate Long delay. Fraction of bits that differ (ε) Theoretical curve Rate 1/4 LDPC code, n = 1008 P e = 3.5 * Distance (in units of λ) 3 Can we do better overall by ɛ at the cost of a lower R?
82 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ BSC with crossover prob. = ɛ (capacity = 1 Hb (ɛ)) 2 For high ɛ, long codes are needed for reasonable rate Long delay. Fraction of bits that differ (ε) Theoretical curve Rate 1/4 LDPC code, n = 1008 P e = 3.5 * Distance (in units of λ) 3 Can we do better overall by ɛ at the cost of a lower R? 4 We can trade R for ɛ. Let effective rate: R = R (1 H b (ɛ)) bits per sec
83 Copyrights disclaimer The Tux logo, the Adium duck and the BSD devil may be trademarks of their respective owners. They are used in this presentation only for illustrative purposes. No personal financial gain was made from this presentation.
Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength
Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Sriram Nandha Premnath Academic Advisors: Sneha K. Kasera, Neal Patwari nandha@cs.utah.edu, kasera@cs.utah.edu, npatwari@ece.utah.edu
More informationECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading
ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2003 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily
More informationECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading
ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2004 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily
More informationECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading
ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2005 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily
More informationDevice Pairing at the Touch of an Electrode
Device Pairing at the Touch of an Electrode Marc Roeschlin, Ivan Martinovic, Kasper B. Rasmussen NDSS, 19 February 2018 NDSS 2018 (slide 1) Device Pairing (I) Bootstrap secure communication Two un-associated
More informationMethodology for Analysis of LMR Antenna Systems
Methodology for Analysis of LMR Antenna Systems Steve Ellingson June 30, 2010 Contents 1 Introduction 2 2 System Model 2 2.1 Receive System Model................................... 2 2.2 Calculation of
More informationA Practical Method to Achieve Perfect Secrecy
A Practical Method to Achieve Perfect Secrecy Amir K. Khandani E&CE Department, University of Waterloo August 3 rd, 2014 Perfect Secrecy: One-time Pad One-time Pad: Bit-wise XOR of a (non-reusable) binary
More informationContactless snooping: Assessing the real threats
Thomas P. Diakos 1 Johann A. Briffa 1 Tim W. C. Brown 2 Stephan Wesemeyer 1 1 Department of Computing,, Guildford 2 Centre for Communication Systems Research,, Guildford Tomorrow s Transactions forum,
More informationProblems from the 3 rd edition
(2.1-1) Find the energies of the signals: a) sin t, 0 t π b) sin t, 0 t π c) 2 sin t, 0 t π d) sin (t-2π), 2π t 4π Problems from the 3 rd edition Comment on the effect on energy of sign change, time shifting
More informationSpectrum Sensing Brief Overview of the Research at WINLAB
Spectrum Sensing Brief Overview of the Research at WINLAB P. Spasojevic IAB, December 2008 What to Sense? Occupancy. Measuring spectral, temporal, and spatial occupancy observation bandwidth and observation
More informationEECS 380: Wireless Technologies Week 7-8
EECS 380: Wireless Technologies Week 7-8 Michael L. Honig Northwestern University May 2018 Outline Diversity, MIMO Multiple Access techniques FDMA, TDMA OFDMA (LTE) CDMA (3G, 802.11b, Bluetooth) Random
More informationDiversity. Spring 2017 ELE 492 FUNDAMENTALS OF WIRELESS COMMUNICATIONS 1
Diversity Spring 2017 ELE 492 FUNDAMENTALS OF WIRELESS COMMUNICATIONS 1 Diversity A fading channel with an average SNR has worse BER performance as compared to that of an AWGN channel with the same SNR!.
More informationEENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss
EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss Introduction Small-scale fading is used to describe the rapid fluctuation of the amplitude of a radio
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties
More informationKEY ESTABLISHMENT TECHNIQUE FOR SECURE DIVERSIFIED WIRELESS NETWORK
KEY ESTABLISHMENT TECHNIQUE FOR SECURE DIVERSIFIED WIRELESS NETWORK Saleh Asadollahi MSc.IT and CA Department, Saurashtra University, Rajkot, Gujarat, India Bhargavi Goswami MCA Department, Sunshine Group
More informationCSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs
CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs Xu Zhang and Edward W. Knightly ECE Department, Rice University Channel State Information (CSI) CSI plays a key role in wireless
More informationWIRELESS COMMUNICATION TECHNOLOGIES (16:332:546) LECTURE 5 SMALL SCALE FADING
WIRELESS COMMUNICATION TECHNOLOGIES (16:332:546) LECTURE 5 SMALL SCALE FADING Instructor: Dr. Narayan Mandayam Slides: SabarishVivek Sarathy A QUICK RECAP Why is there poor signal reception in urban clutters?
More informationNoncoherent Communications with Large Antenna Arrays
Noncoherent Communications with Large Antenna Arrays Mainak Chowdhury Joint work with: Alexandros Manolakos, Andrea Goldsmith, Felipe Gomez-Cuba and Elza Erkip Stanford University September 29, 2016 Wireless
More informationPerformance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath
Application Note AN143 Nov 6, 23 Performance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath Maurice Schiff, Chief Scientist, Elanix, Inc. Yasaman Bahreini, Consultant
More informationOn the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets
On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets Mohammed Eltayeb*, Junil Choi*, Tareq Al-Naffouri #, and Robert W. Heath Jr.* * Wireless Networking and Communications
More informationJamming-resistant Broadcast Communication without Shared Keys
1/18 Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper Joint work with Mario Strasser and Srdjan Čapkun System Security Group ETH Zürich August 2009 Broadcast Communication
More information1 Interference Cancellation
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.
More informationEavesdropping Near Field Contactless Payments: A Quantitative Analysis
Eavesdropping Near Field Contactless Payments: A Quantitative Analysis Thomas P. Diakos 1 Johann A. Bri a 1 Tim W. C. Brown 2 Stephan Wesemeyer 1 1 Department of Computing,, Guildford 2 Centre for Communication
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication
More informationImplementation of an attack scheme on a practical QKD system
Implementation of an attack scheme on a practical QKD system Q. Liu, I. Gerhardt A. Lamas-Linares, V. Makarov, C. Kurtsiefer Q56.5 - DPG Tagung Hannover, 12. March 2010 Overview Our BBM92 QKD implementation
More informationKey Agreement Algorithms for Vehicular Communication Networks Based on Reciprocity and Diversity Theorems
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY Key Agreement Algorithms for Vehicular Communication Networks Based on Reciprocity and Diversity Theorems Bin Zan, Student Member, IEEE, Marco Gruteser, Member,
More informationWideband Channel Characterization. Spring 2017 ELE 492 FUNDAMENTALS OF WIRELESS COMMUNICATIONS 1
Wideband Channel Characterization Spring 2017 ELE 492 FUNDAMENTALS OF WIRELESS COMMUNICATIONS 1 Wideband Systems - ISI Previous chapter considered CW (carrier-only) or narrow-band signals which do NOT
More informationProf. Xinyu Zhang. Dept. of Electrical and Computer Engineering University of Wisconsin-Madison
Prof. Xinyu Zhang Dept. of Electrical and Computer Engineering University of Wisconsin-Madison 1" Overview of MIMO communications Single-user MIMO Multi-user MIMO Network MIMO 3" MIMO (Multiple-Input Multiple-Output)
More informationINTERFERENCE OF SOUND WAVES
01/02 Interference - 1 INTERFERENCE OF SOUND WAVES The objectives of this experiment are: To measure the wavelength, frequency, and propagation speed of ultrasonic sound waves. To observe interference
More informationEliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices
IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices Syed Taha Ali, Vijay Sivaraman, and Diethelm Ostry Abstract Medical
More informationRobust Location Distinction Using Temporal Link Signatures
Robust Location Distinction Using Temporal Link Signatures Neal Patwari Sneha Kasera Department of Electrical and Computer Engineering What is location distinction? Ability to know when a transmitter has
More informationAn adaptive protocol for distributed beamforming Simulations and experiments
大学共同利用機関法人 情報 システム研究機構 国立情報学研究所 An adaptive protocol for distributed beamforming Simulations and experiments Stephan Sigg, Michael Beigl KIVS 2011, 10.03.2011, Kiel Outline Introduction Distributed beamformig
More informationMIMO-Assisted Channel-Based Authentication in Wireless Networks
1 -Assisted Channel-Based Authentication in Wireless Networks Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe Wireless Information Network Laboratory (WINLAB), Rutgers University 671 Rt. 1
More informationSensitivity of Series Direction Finders
Sensitivity of Series 6000-6100 Direction Finders 1.0 Introduction A Technical Application Note from Doppler Systems April 8, 2003 This application note discusses the sensitivity of the 6000/6100 series
More informationHY448 Sample Problems
HY448 Sample Problems 10 November 2014 These sample problems include the material in the lectures and the guided lab exercises. 1 Part 1 1.1 Combining logarithmic quantities A carrier signal with power
More informationCommunication Channels
Communication Channels wires (PCB trace or conductor on IC) optical fiber (attenuation 4dB/km) broadcast TV (50 kw transmit) voice telephone line (under -9 dbm or 110 µw) walkie-talkie: 500 mw, 467 MHz
More informationUNIT-1. Basic signal processing operations in digital communication
UNIT-1 Lecture-1 Basic signal processing operations in digital communication The three basic elements of every communication systems are Transmitter, Receiver and Channel. The Overall purpose of this system
More informationDifferential-Phase-Shift Quantum Key Distribution
Differential-Phase-Shift Quantum Key Distribution Kyo Inoue Osaka University NTT Basic Research Laboratories JST CREST Collaboration with H. Takesue, T. Honjo (NTT Basic Res. Labs.) Yamamoto group (Stanford
More informationDo You Know Where Your Radios Are? Phase-Comparison Direction Finding
Do You Know Where Your Radios Are? Phase-Comparison Direction Finding Remember jumping on a trampoline as a child and stealing the bounce of a friend? A perfectly timed jump would create the destructive
More informationAnalysis of symmetric key establishment based on reciprocal channel quantization
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2010 Analysis of symmetric key establishment based on reciprocal channel quantization David Wagner Follow this
More information9.4 Temporal Channel Models
ECEn 665: Antennas and Propagation for Wireless Communications 127 9.4 Temporal Channel Models The Rayleigh and Ricean fading models provide a statistical model for the variation of the power received
More informationWireless Technology Wireless devices transmit information via Electromagnetic waves Early wireless devices Radios often called wireless in old WWII movies Broadcast TV TV remote controls Garage door openers
More informationMAGIK: An Efficient Key Extraction Mechanism Based on Dynamic Geomagnetic Field
MAGIK: An Efficient Key Extraction Mechanism Based on Dynamic Geomagnetic Field Fudong Qiu, Zhengxian He, Linghe Kong, and Fan Wu Shanghai Key Laboratory of Scalable Computing and Systems Department of
More informationImplementing a Wide Area High Accuracy UTC Service via eloran
Implementing a Wide Area High Accuracy UTC Service via eloran ION PTTI, Boston, MA December 3, 2014 Dr. Gerard Offermans Overview Basis for consideration of eloran as a source of precise time, frequency,
More informationFundamentals of Digital Communication
Fundamentals of Digital Communication Network Infrastructures A.A. 2017/18 Digital communication system Analog Digital Input Signal Analog/ Digital Low Pass Filter Sampler Quantizer Source Encoder Channel
More informationDistributed Beamforming for Safer Wireless Power Transferring
Distributed Beamforming for Safer Wireless Power Transferring *, Han Ding**, Sugang Li*, Michael Sanzari*, Yanyong Zhang*, Wade Trappe*, Zhu Han*** and Richard Howard* *Wireless Information Network Laboratory
More informationKey Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits
Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits Jon W. Wallace, Chan Chen, Michael A. Jensen School of Engineering and Science, Jacobs University Bremen Campus Ring,
More informationMassive MIMO: Signal Structure, Efficient Processing, and Open Problems I
Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I Saeid Haghighatshoar Communications and Information Theory Group (CommIT) Technische Universität Berlin CoSIP Winter Retreat Berlin,
More informationHELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation
HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation Nirnimesh Ghose, Loukas Lazos, and Ming Li, Electrical and Computer Engineering, University of Arizona, Tucson, AZ https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ghose
More informationChapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band
Chapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band 4.1. Introduction The demands for wireless mobile communication are increasing rapidly, and they have become an indispensable part
More informationChapter 4 Investigation of OFDM Synchronization Techniques
Chapter 4 Investigation of OFDM Synchronization Techniques In this chapter, basic function blocs of OFDM-based synchronous receiver such as: integral and fractional frequency offset detection, symbol timing
More informationChapter-1: Introduction
Chapter-1: Introduction The purpose of a Communication System is to transport an information bearing signal from a source to a user destination via a communication channel. MODEL OF A COMMUNICATION SYSTEM
More informationSecret Key Generation Based on Channel and Distance Measurements
24 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) Secret Key Generation Based on Channel and Distance Measurements Ahmed Badawy, Tamer Khattab,
More informationDevice-Free Decade: the Past and Future of RF Sensing Systems (at least 16 minutes worth) Neal Patwari HotWireless October 2017
Device-Free Decade: the Past and Future of RF Sensing Systems (at least 16 minutes worth) Neal Patwari HotWireless 2017 16 October 2017 Talk Outline The Past The Future Today Talk Outline The Past The
More informationCHAPTER 2 WIRELESS CHANNEL
CHAPTER 2 WIRELESS CHANNEL 2.1 INTRODUCTION In mobile radio channel there is certain fundamental limitation on the performance of wireless communication system. There are many obstructions between transmitter
More informationMSIT 413: Wireless Technologies Week 3
MSIT 413: Wireless Technologies Week 3 Michael L. Honig Department of EECS Northwestern University January 2016 Why Study Radio Propagation? To determine coverage Can we use the same channels? Must determine
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationReceiver Design for Noncoherent Digital Network Coding
Receiver Design for Noncoherent Digital Network Coding Terry Ferrett 1 Matthew Valenti 1 Don Torrieri 2 1 West Virginia University 2 U.S. Army Research Laboratory November 3rd, 2010 1 / 25 Outline 1 Introduction
More informationSolution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.
Example - Coin Toss Coin Toss: Alice and Bob want to toss a coin. Easy to do when they are in the same room. How can they toss a coin over the phone? Mutual Commitments Solution: Alice tosses a coin and
More informationa. Find the minimum number of samples per second needed to recover the signal without loosing information.
1. The digital signal X(t) given below. X(t) 1 0 1 2 3 4 5 7 8 t (msec) a. If the carrier is sin (2000 π t), plot Amplitude Shift Keying (ASK) Modulated signal. b. If digital level 1 is represented by
More informationSecure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg
Secure communication based on noisy input data Fuzzy Commitment schemes Stephan Sigg May 24, 2011 Overview and Structure 05.04.2011 Organisational 15.04.2011 Introduction 19.04.2011 Classification methods
More informationDetection, Estimation, and Modulation Theory
Detection, Estimation, and Modulation Theory Part II. Nonlinear Modulation Theory HARRY L. VAN TREES George Mason University.WILEY- INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION 1 Introduction 1
More informationPractical Implementation of Physical-Layer Key Generation using Standard WLAN Cards and Performance Evaluation
Practical Implementation of Physical-Layer Key Generation using Standard WLAN Cards and Performance Evaluation by Munder Hamruni Master Thesis in Electronics Engineering Ph.D. cand. (ABD) Oana Graur Prof.
More informationVehicle Networks. Wireless communication basics. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl
Vehicle Networks Wireless communication basics Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Outline Wireless Signal Propagation Electro-magnetic waves Signal impairments Attenuation Distortion
More informationDoes The Radio Even Matter? - Transceiver Characterization Testing Framework
Does The Radio Even Matter? - Transceiver Characterization Testing Framework TRAVIS COLLINS, PHD ROBIN GETZ 2017 Analog Devices, Inc. All rights reserved. 1 Which cost least? 3 2017 Analog Devices, Inc.
More informationCommunication using Synchronization of Chaos in Semiconductor Lasers with optoelectronic feedback
Communication using Synchronization of Chaos in Semiconductor Lasers with optoelectronic feedback S. Tang, L. Illing, J. M. Liu, H. D. I. barbanel and M. B. Kennel Department of Electrical Engineering,
More informationModeling Mutual Coupling and OFDM System with Computational Electromagnetics
Modeling Mutual Coupling and OFDM System with Computational Electromagnetics Nicholas J. Kirsch Drexel University Wireless Systems Laboratory Telecommunication Seminar October 15, 004 Introduction MIMO
More informationCS441 Mobile & Wireless Computing Communication Basics
Department of Computer Science Southern Illinois University Carbondale CS441 Mobile & Wireless Computing Communication Basics Dr. Kemal Akkaya E-mail: kemal@cs.siu.edu Kemal Akkaya Mobile & Wireless Computing
More informationFrequently Asked Questions
R Frequently Asked Questions 5.8 GHz DIGITAL Wireless Audio Transmitter / Amplifier, Model 1550 Q: What is the difference between the Amphony 5.8 GHz Digital Wireless Audio Transmitter / Amplifier and
More informationBackground Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia
Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,
More informationWireless Channel Propagation Model Small-scale Fading
Wireless Channel Propagation Model Small-scale Fading Basic Questions T x What will happen if the transmitter - changes transmit power? - changes frequency? - operates at higher speed? Transmit power,
More informationChapter 2 Channel Equalization
Chapter 2 Channel Equalization 2.1 Introduction In wireless communication systems signal experiences distortion due to fading [17]. As signal propagates, it follows multiple paths between transmitter and
More informationCompact MIMO Antenna with Cross Polarized Configuration
Proceedings of the 4th WSEAS Int. Conference on Electromagnetics, Wireless and Optical Communications, Venice, Italy, November 2-22, 26 11 Compact MIMO Antenna with Cross Polarized Configuration Wannipa
More informationMulti-Path Fading Channel
Instructor: Prof. Dr. Noor M. Khan Department of Electronic Engineering, Muhammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +9 (51) 111-878787, Ext. 19 (Office), 186 (Lab) Fax: +9
More informationAnnouncement : Wireless Networks Lecture 3: Physical Layer. A Reminder about Prerequisites. Outline. Page 1
Announcement 18-759: Wireless Networks Lecture 3: Physical Layer Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2010 http://www.cs.cmu.edu/~prs/wirelesss10/
More informationWireless Networks (PHY): Design for Diversity
Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:
More informationSecurity in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury
Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing
More informationPropagation Channels. Chapter Path Loss
Chapter 9 Propagation Channels The transmit and receive antennas in the systems we have analyzed in earlier chapters have been in free space with no other objects present. In a practical communication
More informationTHE broadcast nature of wireless communication links
2496 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 12, DECEMBER 2013 Threshold Constraints on Symmetric Key Extraction from Rician Fading Estimates Gill R. Tsouri, Member, IEEE, and David M. Wagner
More informationEE107 Communication Systems. Introduction
EE107 Communication Systems Introduction Mai Vu 5 September 2017 What is communication? Overview Exchanging/imparting of information What is a communication system? A system facilitating communication
More informationICRF Mode Conversion Flow Drive Studies with Improved Wave Measurement by Phase Contrast Imaging
57 th APS-DPP meeting, Nov. 2015, Savannah, GA, USA ICRF Mode Conversion Flow Drive Studies with Improved Wave Measurement by Phase Contrast Imaging Yijun Lin, E. Edlund, P. Ennever, A.E. Hubbard, M. Porkolab,
More informationVSWR AND ANTENNA SYSTEMS Copyright by Wayne Miller 2018 Revision 4 page 1 of 6
VSWR AND ANTENNA SYSTEMS Wayne Miller 2018, Revision 4 BACKGROUND In the 40 years of consulting in the RF and Microwave field, I have seen so much misunderstanding about VSWR that it has prompted me to
More informationCognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks
Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference
More informationWaveform Encoding - PCM. BY: Dr.AHMED ALKHAYYAT. Chapter Two
Chapter Two Layout: 1. Introduction. 2. Pulse Code Modulation (PCM). 3. Differential Pulse Code Modulation (DPCM). 4. Delta modulation. 5. Adaptive delta modulation. 6. Sigma Delta Modulation (SDM). 7.
More informationRECOMMENDATION ITU-R F.1402*, **
Rec. ITU-R F.1402 1 RECOMMENDATION ITU-R F.1402*, ** FREQUENCY SHARING CRITERIA BETWEEN A LAND MOBILE WIRELESS ACCESS SYSTEM AND A FIXED WIRELESS ACCESS SYSTEM USING THE SAME EQUIPMENT TYPE AS THE MOBILE
More informationProject PHYLAWS (Id ) PHYsical LAyer Wireless Security. Deliverable D.4.4
Project PHYLAWS (Id 317562) PHYsical LAyer Wireless Security Deliverable D.4.4 NETSEC upgrades of existing RATs - simulation and analyses complements Version 1.0-02 / 11 / 2016 ---------------------------------------------------------------------------------
More informationMobile Radio Propagation Channel Models
Wireless Information Transmission System Lab. Mobile Radio Propagation Channel Models Institute of Communications Engineering National Sun Yat-sen University Table of Contents Introduction Propagation
More informationELECTROMAGNETIC COMPATIBILITY HANDBOOK 1. Chapter 8: Cable Modeling
ELECTROMAGNETIC COMPATIBILITY HANDBOOK 1 Chapter 8: Cable Modeling Related to the topic in section 8.14, sometimes when an RF transmitter is connected to an unbalanced antenna fed against earth ground
More information3.1 Introduction to Modulation
Haberlesme Sistemlerine Giris (ELE 361) 9 Eylul 2017 TOBB Ekonomi ve Teknoloji Universitesi, Guz 2017-18 Dr. A. Melda Yuksel Turgut & Tolga Girici Lecture Notes Chapter 3 Amplitude Modulation Speech, music,
More informationELT Receiver Architectures and Signal Processing Fall Mandatory homework exercises
ELT-44006 Receiver Architectures and Signal Processing Fall 2014 1 Mandatory homework exercises - Individual solutions to be returned to Markku Renfors by email or in paper format. - Solutions are expected
More informationUNIT 1 - introduction to GPS
UNIT 1 - introduction to GPS 1. GPS SIGNAL Each GPS satellite transmit two signal for positioning purposes: L1 signal (carrier frequency of 1,575.42 MHz). Modulated onto the L1 carrier are two pseudorandom
More informationChannel. Muhammad Ali Jinnah University, Islamabad Campus, Pakistan. Multi-Path Fading. Dr. Noor M Khan EE, MAJU
Instructor: Prof. Dr. Noor M. Khan Department of Electronic Engineering, Muhammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +9 (51) 111-878787, Ext. 19 (Office), 186 (Lab) Fax: +9
More informationDr. Ali Muqaibel. Associate Professor. Electrical Engineering Department King Fahd University of Petroleum & Minerals Dhahran, Saudi Arabia
By Associate Professor Electrical Engineering Department King Fahd University of Petroleum & Minerals Dhahran, Saudi Arabia Wednesday, December 1, 14 1 st Saudi Symposium for RADAR Technology 9 1 December
More informationLecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.
Lecture #2 EE 471C / EE 381K-17 Wireless Communication Lab Professor Robert W. Heath Jr. Preview of today s lecture u Introduction to digital communication u Components of a digital communication system
More informationMultipath fading effects on short range indoor RF links. White paper
ALCIOM 5, Parvis Robert Schuman 92370 CHAVILLE - FRANCE Tel/Fax : 01 47 09 30 51 contact@alciom.com www.alciom.com Project : Multipath fading effects on short range indoor RF links DOCUMENT : REFERENCE
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationBreaking Through RF Clutter
Breaking Through RF Clutter A Guide to Reliable Data Communications in Saturated 900 MHz Environments Your M2M Expert Introduction Today, there are many mission-critical applications in industries such
More informationENGG2310-B Principles of Communication Systems Last Lecture
ENGG2310-B Principles of Communication Systems Last Lecture Wing-Kin Ma Department of Electronic Engineering The Chinese University of Hong Kong, Hong Kong November 28 29, 2017 Recap on ISI model: y(t)
More informationEffects of Fading Channels on OFDM
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 116-121 Effects of Fading Channels on OFDM Ahmed Alshammari, Saleh Albdran, and Dr. Mohammad
More informationDFS (Dynamic Frequency Selection) Introduction and Test Solution
DFS (Dynamic Frequency Selection) Introduction Sept. 2015 Present by Brian Chi Brian-tn_chi@keysight.com Keysight Technologies Agenda Introduction to DFS DFS Radar Profiles Definition DFS test procedure
More information