ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals

Size: px
Start display at page:

Download "ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals"

Transcription

1 ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals Suhas Mathur AT&T Security Research Group Rob Miller, Alex Varshavsky, Wade Trappe, Narayan Madayam Suhas Mathur (AT&T) firstname AT att.com ACM Mobisys, 30 June 2011

2 Overview 1 The Secure Pairing problem 2 How wireless channels can help 3 ProxiMate in detail Suhas Mathur (AT&T) firstname AT att.com ACM Mobisys, 30 June 2011

3 The Secure Pairing problem

4 Alice & Bob have no prior trust relationship Alice Bob

5 Alice & Bob have no prior trust relationship They d like to exchange a secret message. Alice Bob

6 Alice & Bob have no prior trust relationship They d like to exchange a secret message. Alice Bob Eve

7 But they don t share a key Alice Bob Eve

8 Alice? Bob Eve

9 Alice Diffie Hellman key exchange Bob Eve

10 Alice Diffie Hellman key exchange Bob Eve Computational Secrecy (Computationally bounded Eve) k = key, Y = Eve s observations It is computationally infeasible to compute k from Y.

11 Alice Diffie Hellman key exchange Bob Eve But how does Alice know that she is talking to Bob? Easy to spoof identity on the wireless channel, when there is no prior trust relationship.

12 How can Wireless Channels help?

13 What is a Wireless Channel?

14 What is a Wireless Channel? It is the distortion h(t) produced by environment between transmitter and receiver = a randomly varying complex number (= a + j.b)

15 What is a Wireless Channel? It is the distortion h(t) produced by environment between transmitter and receiver = a randomly varying complex number (= a + j.b)

16 What is a Wireless Channel? It is the distortion h(t) produced by environment between transmitter and receiver = a randomly varying complex number (= a + j.b) h(t) decorrelates in space and time: Space: Over distances of λ/2 (= GHz) Time: Over one coherence time T c ( 100s of 2.4 GHz)

17 ProxiMate: Use a public RF source for secure pairing

18 ProxiMate: Use a public RF source for secure pairing

19 ProxiMate: Use a public RF source for secure pairing Assumption: Alice-Bob closer to each other than to Eve

20 Provides Alice & Bob (but not Eve) with a continuous, private source of randomness

21 Provides Alice & Bob (but not Eve) with a continuous, private source of randomness ProxiMate: 1 Use this source to generate a secret key at Alice and Bob

22 Provides Alice & Bob (but not Eve) with a continuous, private source of randomness ProxiMate: 1 Use this source to generate a secret key at Alice and Bob 2 If K alice = K Bob, then Alice & Bob know they are in proximity

23 Provides Alice & Bob (but not Eve) with a continuous, private source of randomness ProxiMate: 1 Use this source to generate a secret key at Alice and Bob 2 If K alice = K Bob, then Alice & Bob know they are in proximity 3 Use the key for encrypting all further communication.

24 ProxiMate in detail

25 Example trace 6 5 x 10 4 Alice Bob Amplitude Time (Sec) Peter-to-Alice and Peter-to-Bob channels FM radio, 88.7 MHz Alice and Bob are 34 cm = wavelength 10 apart.

26 A & B locally compute quantizer threshold (e.g. median) 6 5 x 10 4 Alice Bob Amplitude Time (Sec) Peter-to-Alice and Peter-to-Bob channels FM radio, 88.7 MHz Alice and Bob are 34 cm = wavelength 10 apart.

27 Quantize at intervals > Coherence time 6 5 x 10 4 Alice Bob Amplitude Time (Sec) Bits obtained by Alice and Bob: A s Bits: = w. B s Bits: = w

28 A & B want identical keys, of which Eve knows nothing

29 A & B want identical keys, of which Eve knows nothing A s Bits: = w. B s Bits: = w

30 A & B want identical keys, of which Eve knows nothing A s Bits: = w. B s Bits: = w 1 A sends B code-offset P of w wrt a codeword c 1 in known code C.

31 A & B want identical keys, of which Eve knows nothing A s Bits: = w. B s Bits: = w 1 A sends B code-offset P of w wrt a codeword c 1 in known code C. 2 B uses P along with w to determine w.

32 A & B want identical keys, of which Eve knows nothing A s Bits: = w. B s Bits: = w 1 A sends B code-offset P of w wrt a codeword c 1 in known code C. 2 B uses P along with w to determine w. 3 Eliminate information leaked out to Eve via P by discarding H(P) bits.

33 Experimental evaluation

34 Experimental evaluation

35 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds.

36 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds. 2 TV channels ( 600 MHz) and FM channels ( 100 MHz)

37 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds. 2 TV channels ( 600 MHz) and FM channels ( 100 MHz) 3 Metrics of interest:

38 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds. 2 TV channels ( 600 MHz) and FM channels ( 100 MHz) 3 Metrics of interest: Rate (secret bits per sec)

39 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds. 2 TV channels ( 600 MHz) and FM channels ( 100 MHz) 3 Metrics of interest: Rate (secret bits per sec) Bit-error-rate (fraction of bits that differ at A & B)

40 Experimental evaluation 1 USRP/GNUradio - bridges the physical & software worlds. 2 TV channels ( 600 MHz) and FM channels ( 100 MHz) 3 Metrics of interest: Rate (secret bits per sec) Bit-error-rate (fraction of bits that differ at A & B) Mutual Information: Statistical dependence between two quantities

41 Bit-error-rate Vs. distance between two receivers Fraction of bits that differ (ε) TV FM Distance between receivers (in λ)

42 Shaking devices helps Rate

43 Shaking devices helps Rate 1 Coherence time T c 1/Rate estimated using level crossing rate.

44 Shaking devices helps Rate 1 Coherence time T c 1/Rate estimated using level crossing rate. 2 T c can be increased if Alice and Bob physically shaken together.

45 Shaking devices helps Rate 1 Coherence time T c 1/Rate estimated using level crossing rate. 2 T c can be increased if Alice and Bob physically shaken together. Coherence time estimates Time (sec) Stationary moving slowly moving fast Time (Sec) Stationary moving slowly moving fast TV FM

46 Shaking devices helps Rate 1 Coherence time T c 1/Rate estimated using level crossing rate. 2 T c can be increased if Alice and Bob physically shaken together. Coherence time estimates Time (sec) Stationary moving slowly moving fast Time (Sec) Stationary moving slowly moving fast TV FM 2x in rate by shaking.

47 Shaking devices helps Rate 1 Coherence time T c 1/Rate estimated using level crossing rate. 2 T c can be increased if Alice and Bob physically shaken together. Coherence time estimates Time (sec) Stationary moving slowly moving fast Time (Sec) Stationary moving slowly moving fast TV FM 2x in rate by shaking. Shaking also provides resistance to passive attackers within λ/2!

48 Monitoring multiple sources

49 Monitoring multiple sources

50 Monitoring multiple sources

51 Monitoring multiple sources Rate # of Independent sources of randomness.

52 Number of seconds needed for a 128-bit key with 10 sources Stationary Moving slow Moving fast TV FM Prob(Key mismatch) 10 4

53 What if Eve controls the transmitter? (i.e. Eve = Peter)

54 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 Eve free to vary the transmit signal however she wants

55 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 Eve free to vary the transmit signal however she wants 2 Can Alice & Bob extract bits about which Eve has no information?

56 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 Eve free to vary the transmit signal however she wants 2 Can Alice & Bob extract bits about which Eve has no information? 3 Using Magnitude: No!

57 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 Eve free to vary the transmit signal however she wants 2 Can Alice & Bob extract bits about which Eve has no information? 3 Using Magnitude: No!

58 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 Eve free to vary the transmit signal however she wants 2 Can Alice & Bob extract bits about which Eve has no information? 3 Using Magnitude: No! 4 Using Phase: Yes! Because phase wraps around after 2π

59 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 But Local Alice and Bob are not synchronized. Thus, only change in phase at A & B will be similar in value.

60 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 But Local Alice and Bob are not synchronized. Thus, only change in phase at A & B will be similar in value. 2 Approach: We use differential phase across T c

61 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 But Local Alice and Bob are not synchronized. Thus, only change in phase at A & B will be similar in value. 2 Approach: We use differential phase across T c 3 To test, we let Eve transmit a recorded FM signal

62 What if Eve controls the transmitter? (i.e. Eve = Peter) 1 But Local Alice and Bob are not synchronized. Thus, only change in phase at A & B will be similar in value. 2 Approach: We use differential phase across T c 3 To test, we let Eve transmit a recorded FM signal 4 Eve knows almost nothing about diff-phase at Alice & Bob.

63 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity.

64 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary.

65 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0.

66 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated:

67 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated: # of sources monitored

68 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated: # of sources monitored frequency monitored

69 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated: # of sources monitored frequency monitored E.g.: 4-digit PIN in 0.34 sec with 10 TV sources.

70 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated: # of sources monitored frequency monitored E.g.: 4-digit PIN in 0.34 sec with 10 TV sources. 5 ProxiMate s complexity is O(n) while Diffie-Hellman is O(n 3 ).

71 Summary 1 ProxiMate: secure pairing of wireless devices based on just proximity. 2 Secure against even a computationally unbounded adversary. 3 Prob. of key mismatch can be driven to 0. 4 Rate at which a common key is generated: # of sources monitored frequency monitored E.g.: 4-digit PIN in 0.34 sec with 10 TV sources. 5 ProxiMate s complexity is O(n) while Diffie-Hellman is O(n 3 ). 6 ProxiMate can generate a secret key even if RF source is adversarial.

72 Questions/Comments

73 Backup Slides

74 Related work 1 Low power communications not secure: Susceptible to eavesdropping using a high gain directional antenna Bluetooth can be sniffed from over a mile away [Wright06] NFC is convenient but not secure by itself [Haselsteine06] 2 Existing approaches are cumbersome Human intervention (cables, entering PINs) Faraday cage [Perrig07] 3 Ambient wireless signals like WiFi can help establish proximity [AMIGO-Varshavsky07]

75 Where does the randomness and the spatial & temporal de-correlation come from?

76 Synchronizing Alice & Bob 1 Alice and Bob demodulate their signals 2 Alice sends Bob a snippet of the demodulated signal to indicate t = 0

77 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ

78 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ BSC with crossover prob. = ɛ (capacity = 1 Hb (ɛ))

79 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ BSC with crossover prob. = ɛ (capacity = 1 Hb (ɛ)) 2 For high ɛ, long codes are needed for reasonable rate Long delay.

80 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ BSC with crossover prob. = ɛ (capacity = 1 Hb (ɛ)) 2 For high ɛ, long codes are needed for reasonable rate Long delay. Fraction of bits that differ (ε) Theoretical curve Rate 1/4 LDPC code, n = 1008 P e = 3.5 * Distance (in units of λ)

81 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ BSC with crossover prob. = ɛ (capacity = 1 Hb (ɛ)) 2 For high ɛ, long codes are needed for reasonable rate Long delay. Fraction of bits that differ (ε) Theoretical curve Rate 1/4 LDPC code, n = 1008 P e = 3.5 * Distance (in units of λ) 3 Can we do better overall by ɛ at the cost of a lower R?

82 How many secret bits / second? 1 Suppose Alice & Bob generate R bits/sec that differ with prob. ɛ BSC with crossover prob. = ɛ (capacity = 1 Hb (ɛ)) 2 For high ɛ, long codes are needed for reasonable rate Long delay. Fraction of bits that differ (ε) Theoretical curve Rate 1/4 LDPC code, n = 1008 P e = 3.5 * Distance (in units of λ) 3 Can we do better overall by ɛ at the cost of a lower R? 4 We can trade R for ɛ. Let effective rate: R = R (1 H b (ɛ)) bits per sec

83 Copyrights disclaimer The Tux logo, the Adium duck and the BSD devil may be trademarks of their respective owners. They are used in this presentation only for illustrative purposes. No personal financial gain was made from this presentation.

Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength

Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Sriram Nandha Premnath Academic Advisors: Sneha K. Kasera, Neal Patwari nandha@cs.utah.edu, kasera@cs.utah.edu, npatwari@ece.utah.edu

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2003 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2004 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2005 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily

More information

Device Pairing at the Touch of an Electrode

Device Pairing at the Touch of an Electrode Device Pairing at the Touch of an Electrode Marc Roeschlin, Ivan Martinovic, Kasper B. Rasmussen NDSS, 19 February 2018 NDSS 2018 (slide 1) Device Pairing (I) Bootstrap secure communication Two un-associated

More information

Methodology for Analysis of LMR Antenna Systems

Methodology for Analysis of LMR Antenna Systems Methodology for Analysis of LMR Antenna Systems Steve Ellingson June 30, 2010 Contents 1 Introduction 2 2 System Model 2 2.1 Receive System Model................................... 2 2.2 Calculation of

More information

A Practical Method to Achieve Perfect Secrecy

A Practical Method to Achieve Perfect Secrecy A Practical Method to Achieve Perfect Secrecy Amir K. Khandani E&CE Department, University of Waterloo August 3 rd, 2014 Perfect Secrecy: One-time Pad One-time Pad: Bit-wise XOR of a (non-reusable) binary

More information

Contactless snooping: Assessing the real threats

Contactless snooping: Assessing the real threats Thomas P. Diakos 1 Johann A. Briffa 1 Tim W. C. Brown 2 Stephan Wesemeyer 1 1 Department of Computing,, Guildford 2 Centre for Communication Systems Research,, Guildford Tomorrow s Transactions forum,

More information

Problems from the 3 rd edition

Problems from the 3 rd edition (2.1-1) Find the energies of the signals: a) sin t, 0 t π b) sin t, 0 t π c) 2 sin t, 0 t π d) sin (t-2π), 2π t 4π Problems from the 3 rd edition Comment on the effect on energy of sign change, time shifting

More information

Spectrum Sensing Brief Overview of the Research at WINLAB

Spectrum Sensing Brief Overview of the Research at WINLAB Spectrum Sensing Brief Overview of the Research at WINLAB P. Spasojevic IAB, December 2008 What to Sense? Occupancy. Measuring spectral, temporal, and spatial occupancy observation bandwidth and observation

More information

EECS 380: Wireless Technologies Week 7-8

EECS 380: Wireless Technologies Week 7-8 EECS 380: Wireless Technologies Week 7-8 Michael L. Honig Northwestern University May 2018 Outline Diversity, MIMO Multiple Access techniques FDMA, TDMA OFDMA (LTE) CDMA (3G, 802.11b, Bluetooth) Random

More information

Diversity. Spring 2017 ELE 492 FUNDAMENTALS OF WIRELESS COMMUNICATIONS 1

Diversity. Spring 2017 ELE 492 FUNDAMENTALS OF WIRELESS COMMUNICATIONS 1 Diversity Spring 2017 ELE 492 FUNDAMENTALS OF WIRELESS COMMUNICATIONS 1 Diversity A fading channel with an average SNR has worse BER performance as compared to that of an AWGN channel with the same SNR!.

More information

EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss

EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss Introduction Small-scale fading is used to describe the rapid fluctuation of the amplitude of a radio

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

KEY ESTABLISHMENT TECHNIQUE FOR SECURE DIVERSIFIED WIRELESS NETWORK

KEY ESTABLISHMENT TECHNIQUE FOR SECURE DIVERSIFIED WIRELESS NETWORK KEY ESTABLISHMENT TECHNIQUE FOR SECURE DIVERSIFIED WIRELESS NETWORK Saleh Asadollahi MSc.IT and CA Department, Saurashtra University, Rajkot, Gujarat, India Bhargavi Goswami MCA Department, Sunshine Group

More information

CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs

CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs Xu Zhang and Edward W. Knightly ECE Department, Rice University Channel State Information (CSI) CSI plays a key role in wireless

More information

WIRELESS COMMUNICATION TECHNOLOGIES (16:332:546) LECTURE 5 SMALL SCALE FADING

WIRELESS COMMUNICATION TECHNOLOGIES (16:332:546) LECTURE 5 SMALL SCALE FADING WIRELESS COMMUNICATION TECHNOLOGIES (16:332:546) LECTURE 5 SMALL SCALE FADING Instructor: Dr. Narayan Mandayam Slides: SabarishVivek Sarathy A QUICK RECAP Why is there poor signal reception in urban clutters?

More information

Noncoherent Communications with Large Antenna Arrays

Noncoherent Communications with Large Antenna Arrays Noncoherent Communications with Large Antenna Arrays Mainak Chowdhury Joint work with: Alexandros Manolakos, Andrea Goldsmith, Felipe Gomez-Cuba and Elza Erkip Stanford University September 29, 2016 Wireless

More information

Performance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath

Performance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath Application Note AN143 Nov 6, 23 Performance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath Maurice Schiff, Chief Scientist, Elanix, Inc. Yasaman Bahreini, Consultant

More information

On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets

On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets Mohammed Eltayeb*, Junil Choi*, Tareq Al-Naffouri #, and Robert W. Heath Jr.* * Wireless Networking and Communications

More information

Jamming-resistant Broadcast Communication without Shared Keys

Jamming-resistant Broadcast Communication without Shared Keys 1/18 Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper Joint work with Mario Strasser and Srdjan Čapkun System Security Group ETH Zürich August 2009 Broadcast Communication

More information

1 Interference Cancellation

1 Interference Cancellation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.

More information

Eavesdropping Near Field Contactless Payments: A Quantitative Analysis

Eavesdropping Near Field Contactless Payments: A Quantitative Analysis Eavesdropping Near Field Contactless Payments: A Quantitative Analysis Thomas P. Diakos 1 Johann A. Bri a 1 Tim W. C. Brown 2 Stephan Wesemeyer 1 1 Department of Computing,, Guildford 2 Centre for Communication

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Implementation of an attack scheme on a practical QKD system

Implementation of an attack scheme on a practical QKD system Implementation of an attack scheme on a practical QKD system Q. Liu, I. Gerhardt A. Lamas-Linares, V. Makarov, C. Kurtsiefer Q56.5 - DPG Tagung Hannover, 12. March 2010 Overview Our BBM92 QKD implementation

More information

Key Agreement Algorithms for Vehicular Communication Networks Based on Reciprocity and Diversity Theorems

Key Agreement Algorithms for Vehicular Communication Networks Based on Reciprocity and Diversity Theorems IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY Key Agreement Algorithms for Vehicular Communication Networks Based on Reciprocity and Diversity Theorems Bin Zan, Student Member, IEEE, Marco Gruteser, Member,

More information

Wideband Channel Characterization. Spring 2017 ELE 492 FUNDAMENTALS OF WIRELESS COMMUNICATIONS 1

Wideband Channel Characterization. Spring 2017 ELE 492 FUNDAMENTALS OF WIRELESS COMMUNICATIONS 1 Wideband Channel Characterization Spring 2017 ELE 492 FUNDAMENTALS OF WIRELESS COMMUNICATIONS 1 Wideband Systems - ISI Previous chapter considered CW (carrier-only) or narrow-band signals which do NOT

More information

Prof. Xinyu Zhang. Dept. of Electrical and Computer Engineering University of Wisconsin-Madison

Prof. Xinyu Zhang. Dept. of Electrical and Computer Engineering University of Wisconsin-Madison Prof. Xinyu Zhang Dept. of Electrical and Computer Engineering University of Wisconsin-Madison 1" Overview of MIMO communications Single-user MIMO Multi-user MIMO Network MIMO 3" MIMO (Multiple-Input Multiple-Output)

More information

INTERFERENCE OF SOUND WAVES

INTERFERENCE OF SOUND WAVES 01/02 Interference - 1 INTERFERENCE OF SOUND WAVES The objectives of this experiment are: To measure the wavelength, frequency, and propagation speed of ultrasonic sound waves. To observe interference

More information

Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices

Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices Syed Taha Ali, Vijay Sivaraman, and Diethelm Ostry Abstract Medical

More information

Robust Location Distinction Using Temporal Link Signatures

Robust Location Distinction Using Temporal Link Signatures Robust Location Distinction Using Temporal Link Signatures Neal Patwari Sneha Kasera Department of Electrical and Computer Engineering What is location distinction? Ability to know when a transmitter has

More information

An adaptive protocol for distributed beamforming Simulations and experiments

An adaptive protocol for distributed beamforming Simulations and experiments 大学共同利用機関法人 情報 システム研究機構 国立情報学研究所 An adaptive protocol for distributed beamforming Simulations and experiments Stephan Sigg, Michael Beigl KIVS 2011, 10.03.2011, Kiel Outline Introduction Distributed beamformig

More information

MIMO-Assisted Channel-Based Authentication in Wireless Networks

MIMO-Assisted Channel-Based Authentication in Wireless Networks 1 -Assisted Channel-Based Authentication in Wireless Networks Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe Wireless Information Network Laboratory (WINLAB), Rutgers University 671 Rt. 1

More information

Sensitivity of Series Direction Finders

Sensitivity of Series Direction Finders Sensitivity of Series 6000-6100 Direction Finders 1.0 Introduction A Technical Application Note from Doppler Systems April 8, 2003 This application note discusses the sensitivity of the 6000/6100 series

More information

HY448 Sample Problems

HY448 Sample Problems HY448 Sample Problems 10 November 2014 These sample problems include the material in the lectures and the guided lab exercises. 1 Part 1 1.1 Combining logarithmic quantities A carrier signal with power

More information

Communication Channels

Communication Channels Communication Channels wires (PCB trace or conductor on IC) optical fiber (attenuation 4dB/km) broadcast TV (50 kw transmit) voice telephone line (under -9 dbm or 110 µw) walkie-talkie: 500 mw, 467 MHz

More information

UNIT-1. Basic signal processing operations in digital communication

UNIT-1. Basic signal processing operations in digital communication UNIT-1 Lecture-1 Basic signal processing operations in digital communication The three basic elements of every communication systems are Transmitter, Receiver and Channel. The Overall purpose of this system

More information

Differential-Phase-Shift Quantum Key Distribution

Differential-Phase-Shift Quantum Key Distribution Differential-Phase-Shift Quantum Key Distribution Kyo Inoue Osaka University NTT Basic Research Laboratories JST CREST Collaboration with H. Takesue, T. Honjo (NTT Basic Res. Labs.) Yamamoto group (Stanford

More information

Do You Know Where Your Radios Are? Phase-Comparison Direction Finding

Do You Know Where Your Radios Are? Phase-Comparison Direction Finding Do You Know Where Your Radios Are? Phase-Comparison Direction Finding Remember jumping on a trampoline as a child and stealing the bounce of a friend? A perfectly timed jump would create the destructive

More information

Analysis of symmetric key establishment based on reciprocal channel quantization

Analysis of symmetric key establishment based on reciprocal channel quantization Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2010 Analysis of symmetric key establishment based on reciprocal channel quantization David Wagner Follow this

More information

9.4 Temporal Channel Models

9.4 Temporal Channel Models ECEn 665: Antennas and Propagation for Wireless Communications 127 9.4 Temporal Channel Models The Rayleigh and Ricean fading models provide a statistical model for the variation of the power received

More information

Wireless Technology Wireless devices transmit information via Electromagnetic waves Early wireless devices Radios often called wireless in old WWII movies Broadcast TV TV remote controls Garage door openers

More information

MAGIK: An Efficient Key Extraction Mechanism Based on Dynamic Geomagnetic Field

MAGIK: An Efficient Key Extraction Mechanism Based on Dynamic Geomagnetic Field MAGIK: An Efficient Key Extraction Mechanism Based on Dynamic Geomagnetic Field Fudong Qiu, Zhengxian He, Linghe Kong, and Fan Wu Shanghai Key Laboratory of Scalable Computing and Systems Department of

More information

Implementing a Wide Area High Accuracy UTC Service via eloran

Implementing a Wide Area High Accuracy UTC Service via eloran Implementing a Wide Area High Accuracy UTC Service via eloran ION PTTI, Boston, MA December 3, 2014 Dr. Gerard Offermans Overview Basis for consideration of eloran as a source of precise time, frequency,

More information

Fundamentals of Digital Communication

Fundamentals of Digital Communication Fundamentals of Digital Communication Network Infrastructures A.A. 2017/18 Digital communication system Analog Digital Input Signal Analog/ Digital Low Pass Filter Sampler Quantizer Source Encoder Channel

More information

Distributed Beamforming for Safer Wireless Power Transferring

Distributed Beamforming for Safer Wireless Power Transferring Distributed Beamforming for Safer Wireless Power Transferring *, Han Ding**, Sugang Li*, Michael Sanzari*, Yanyong Zhang*, Wade Trappe*, Zhu Han*** and Richard Howard* *Wireless Information Network Laboratory

More information

Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits

Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits Jon W. Wallace, Chan Chen, Michael A. Jensen School of Engineering and Science, Jacobs University Bremen Campus Ring,

More information

Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I

Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I Saeid Haghighatshoar Communications and Information Theory Group (CommIT) Technische Universität Berlin CoSIP Winter Retreat Berlin,

More information

HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation

HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation Nirnimesh Ghose, Loukas Lazos, and Ming Li, Electrical and Computer Engineering, University of Arizona, Tucson, AZ https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ghose

More information

Chapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band

Chapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band Chapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band 4.1. Introduction The demands for wireless mobile communication are increasing rapidly, and they have become an indispensable part

More information

Chapter 4 Investigation of OFDM Synchronization Techniques

Chapter 4 Investigation of OFDM Synchronization Techniques Chapter 4 Investigation of OFDM Synchronization Techniques In this chapter, basic function blocs of OFDM-based synchronous receiver such as: integral and fractional frequency offset detection, symbol timing

More information

Chapter-1: Introduction

Chapter-1: Introduction Chapter-1: Introduction The purpose of a Communication System is to transport an information bearing signal from a source to a user destination via a communication channel. MODEL OF A COMMUNICATION SYSTEM

More information

Secret Key Generation Based on Channel and Distance Measurements

Secret Key Generation Based on Channel and Distance Measurements 24 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) Secret Key Generation Based on Channel and Distance Measurements Ahmed Badawy, Tamer Khattab,

More information

Device-Free Decade: the Past and Future of RF Sensing Systems (at least 16 minutes worth) Neal Patwari HotWireless October 2017

Device-Free Decade: the Past and Future of RF Sensing Systems (at least 16 minutes worth) Neal Patwari HotWireless October 2017 Device-Free Decade: the Past and Future of RF Sensing Systems (at least 16 minutes worth) Neal Patwari HotWireless 2017 16 October 2017 Talk Outline The Past The Future Today Talk Outline The Past The

More information

CHAPTER 2 WIRELESS CHANNEL

CHAPTER 2 WIRELESS CHANNEL CHAPTER 2 WIRELESS CHANNEL 2.1 INTRODUCTION In mobile radio channel there is certain fundamental limitation on the performance of wireless communication system. There are many obstructions between transmitter

More information

MSIT 413: Wireless Technologies Week 3

MSIT 413: Wireless Technologies Week 3 MSIT 413: Wireless Technologies Week 3 Michael L. Honig Department of EECS Northwestern University January 2016 Why Study Radio Propagation? To determine coverage Can we use the same channels? Must determine

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Receiver Design for Noncoherent Digital Network Coding

Receiver Design for Noncoherent Digital Network Coding Receiver Design for Noncoherent Digital Network Coding Terry Ferrett 1 Matthew Valenti 1 Don Torrieri 2 1 West Virginia University 2 U.S. Army Research Laboratory November 3rd, 2010 1 / 25 Outline 1 Introduction

More information

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result. Example - Coin Toss Coin Toss: Alice and Bob want to toss a coin. Easy to do when they are in the same room. How can they toss a coin over the phone? Mutual Commitments Solution: Alice tosses a coin and

More information

a. Find the minimum number of samples per second needed to recover the signal without loosing information.

a. Find the minimum number of samples per second needed to recover the signal without loosing information. 1. The digital signal X(t) given below. X(t) 1 0 1 2 3 4 5 7 8 t (msec) a. If the carrier is sin (2000 π t), plot Amplitude Shift Keying (ASK) Modulated signal. b. If digital level 1 is represented by

More information

Secure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg

Secure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg Secure communication based on noisy input data Fuzzy Commitment schemes Stephan Sigg May 24, 2011 Overview and Structure 05.04.2011 Organisational 15.04.2011 Introduction 19.04.2011 Classification methods

More information

Detection, Estimation, and Modulation Theory

Detection, Estimation, and Modulation Theory Detection, Estimation, and Modulation Theory Part II. Nonlinear Modulation Theory HARRY L. VAN TREES George Mason University.WILEY- INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION 1 Introduction 1

More information

Practical Implementation of Physical-Layer Key Generation using Standard WLAN Cards and Performance Evaluation

Practical Implementation of Physical-Layer Key Generation using Standard WLAN Cards and Performance Evaluation Practical Implementation of Physical-Layer Key Generation using Standard WLAN Cards and Performance Evaluation by Munder Hamruni Master Thesis in Electronics Engineering Ph.D. cand. (ABD) Oana Graur Prof.

More information

Vehicle Networks. Wireless communication basics. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

Vehicle Networks. Wireless communication basics. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Vehicle Networks Wireless communication basics Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Outline Wireless Signal Propagation Electro-magnetic waves Signal impairments Attenuation Distortion

More information

Does The Radio Even Matter? - Transceiver Characterization Testing Framework

Does The Radio Even Matter? - Transceiver Characterization Testing Framework Does The Radio Even Matter? - Transceiver Characterization Testing Framework TRAVIS COLLINS, PHD ROBIN GETZ 2017 Analog Devices, Inc. All rights reserved. 1 Which cost least? 3 2017 Analog Devices, Inc.

More information

Communication using Synchronization of Chaos in Semiconductor Lasers with optoelectronic feedback

Communication using Synchronization of Chaos in Semiconductor Lasers with optoelectronic feedback Communication using Synchronization of Chaos in Semiconductor Lasers with optoelectronic feedback S. Tang, L. Illing, J. M. Liu, H. D. I. barbanel and M. B. Kennel Department of Electrical Engineering,

More information

Modeling Mutual Coupling and OFDM System with Computational Electromagnetics

Modeling Mutual Coupling and OFDM System with Computational Electromagnetics Modeling Mutual Coupling and OFDM System with Computational Electromagnetics Nicholas J. Kirsch Drexel University Wireless Systems Laboratory Telecommunication Seminar October 15, 004 Introduction MIMO

More information

CS441 Mobile & Wireless Computing Communication Basics

CS441 Mobile & Wireless Computing Communication Basics Department of Computer Science Southern Illinois University Carbondale CS441 Mobile & Wireless Computing Communication Basics Dr. Kemal Akkaya E-mail: kemal@cs.siu.edu Kemal Akkaya Mobile & Wireless Computing

More information

Frequently Asked Questions

Frequently Asked Questions R Frequently Asked Questions 5.8 GHz DIGITAL Wireless Audio Transmitter / Amplifier, Model 1550 Q: What is the difference between the Amphony 5.8 GHz Digital Wireless Audio Transmitter / Amplifier and

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

Wireless Channel Propagation Model Small-scale Fading

Wireless Channel Propagation Model Small-scale Fading Wireless Channel Propagation Model Small-scale Fading Basic Questions T x What will happen if the transmitter - changes transmit power? - changes frequency? - operates at higher speed? Transmit power,

More information

Chapter 2 Channel Equalization

Chapter 2 Channel Equalization Chapter 2 Channel Equalization 2.1 Introduction In wireless communication systems signal experiences distortion due to fading [17]. As signal propagates, it follows multiple paths between transmitter and

More information

Compact MIMO Antenna with Cross Polarized Configuration

Compact MIMO Antenna with Cross Polarized Configuration Proceedings of the 4th WSEAS Int. Conference on Electromagnetics, Wireless and Optical Communications, Venice, Italy, November 2-22, 26 11 Compact MIMO Antenna with Cross Polarized Configuration Wannipa

More information

Multi-Path Fading Channel

Multi-Path Fading Channel Instructor: Prof. Dr. Noor M. Khan Department of Electronic Engineering, Muhammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +9 (51) 111-878787, Ext. 19 (Office), 186 (Lab) Fax: +9

More information

Announcement : Wireless Networks Lecture 3: Physical Layer. A Reminder about Prerequisites. Outline. Page 1

Announcement : Wireless Networks Lecture 3: Physical Layer. A Reminder about Prerequisites. Outline. Page 1 Announcement 18-759: Wireless Networks Lecture 3: Physical Layer Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2010 http://www.cs.cmu.edu/~prs/wirelesss10/

More information

Wireless Networks (PHY): Design for Diversity

Wireless Networks (PHY): Design for Diversity Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

Propagation Channels. Chapter Path Loss

Propagation Channels. Chapter Path Loss Chapter 9 Propagation Channels The transmit and receive antennas in the systems we have analyzed in earlier chapters have been in free space with no other objects present. In a practical communication

More information

THE broadcast nature of wireless communication links

THE broadcast nature of wireless communication links 2496 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 12, DECEMBER 2013 Threshold Constraints on Symmetric Key Extraction from Rician Fading Estimates Gill R. Tsouri, Member, IEEE, and David M. Wagner

More information

EE107 Communication Systems. Introduction

EE107 Communication Systems. Introduction EE107 Communication Systems Introduction Mai Vu 5 September 2017 What is communication? Overview Exchanging/imparting of information What is a communication system? A system facilitating communication

More information

ICRF Mode Conversion Flow Drive Studies with Improved Wave Measurement by Phase Contrast Imaging

ICRF Mode Conversion Flow Drive Studies with Improved Wave Measurement by Phase Contrast Imaging 57 th APS-DPP meeting, Nov. 2015, Savannah, GA, USA ICRF Mode Conversion Flow Drive Studies with Improved Wave Measurement by Phase Contrast Imaging Yijun Lin, E. Edlund, P. Ennever, A.E. Hubbard, M. Porkolab,

More information

VSWR AND ANTENNA SYSTEMS Copyright by Wayne Miller 2018 Revision 4 page 1 of 6

VSWR AND ANTENNA SYSTEMS Copyright by Wayne Miller 2018 Revision 4 page 1 of 6 VSWR AND ANTENNA SYSTEMS Wayne Miller 2018, Revision 4 BACKGROUND In the 40 years of consulting in the RF and Microwave field, I have seen so much misunderstanding about VSWR that it has prompted me to

More information

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference

More information

Waveform Encoding - PCM. BY: Dr.AHMED ALKHAYYAT. Chapter Two

Waveform Encoding - PCM. BY: Dr.AHMED ALKHAYYAT. Chapter Two Chapter Two Layout: 1. Introduction. 2. Pulse Code Modulation (PCM). 3. Differential Pulse Code Modulation (DPCM). 4. Delta modulation. 5. Adaptive delta modulation. 6. Sigma Delta Modulation (SDM). 7.

More information

RECOMMENDATION ITU-R F.1402*, **

RECOMMENDATION ITU-R F.1402*, ** Rec. ITU-R F.1402 1 RECOMMENDATION ITU-R F.1402*, ** FREQUENCY SHARING CRITERIA BETWEEN A LAND MOBILE WIRELESS ACCESS SYSTEM AND A FIXED WIRELESS ACCESS SYSTEM USING THE SAME EQUIPMENT TYPE AS THE MOBILE

More information

Project PHYLAWS (Id ) PHYsical LAyer Wireless Security. Deliverable D.4.4

Project PHYLAWS (Id ) PHYsical LAyer Wireless Security. Deliverable D.4.4 Project PHYLAWS (Id 317562) PHYsical LAyer Wireless Security Deliverable D.4.4 NETSEC upgrades of existing RATs - simulation and analyses complements Version 1.0-02 / 11 / 2016 ---------------------------------------------------------------------------------

More information

Mobile Radio Propagation Channel Models

Mobile Radio Propagation Channel Models Wireless Information Transmission System Lab. Mobile Radio Propagation Channel Models Institute of Communications Engineering National Sun Yat-sen University Table of Contents Introduction Propagation

More information

ELECTROMAGNETIC COMPATIBILITY HANDBOOK 1. Chapter 8: Cable Modeling

ELECTROMAGNETIC COMPATIBILITY HANDBOOK 1. Chapter 8: Cable Modeling ELECTROMAGNETIC COMPATIBILITY HANDBOOK 1 Chapter 8: Cable Modeling Related to the topic in section 8.14, sometimes when an RF transmitter is connected to an unbalanced antenna fed against earth ground

More information

3.1 Introduction to Modulation

3.1 Introduction to Modulation Haberlesme Sistemlerine Giris (ELE 361) 9 Eylul 2017 TOBB Ekonomi ve Teknoloji Universitesi, Guz 2017-18 Dr. A. Melda Yuksel Turgut & Tolga Girici Lecture Notes Chapter 3 Amplitude Modulation Speech, music,

More information

ELT Receiver Architectures and Signal Processing Fall Mandatory homework exercises

ELT Receiver Architectures and Signal Processing Fall Mandatory homework exercises ELT-44006 Receiver Architectures and Signal Processing Fall 2014 1 Mandatory homework exercises - Individual solutions to be returned to Markku Renfors by email or in paper format. - Solutions are expected

More information

UNIT 1 - introduction to GPS

UNIT 1 - introduction to GPS UNIT 1 - introduction to GPS 1. GPS SIGNAL Each GPS satellite transmit two signal for positioning purposes: L1 signal (carrier frequency of 1,575.42 MHz). Modulated onto the L1 carrier are two pseudorandom

More information

Channel. Muhammad Ali Jinnah University, Islamabad Campus, Pakistan. Multi-Path Fading. Dr. Noor M Khan EE, MAJU

Channel. Muhammad Ali Jinnah University, Islamabad Campus, Pakistan. Multi-Path Fading. Dr. Noor M Khan EE, MAJU Instructor: Prof. Dr. Noor M. Khan Department of Electronic Engineering, Muhammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +9 (51) 111-878787, Ext. 19 (Office), 186 (Lab) Fax: +9

More information

Dr. Ali Muqaibel. Associate Professor. Electrical Engineering Department King Fahd University of Petroleum & Minerals Dhahran, Saudi Arabia

Dr. Ali Muqaibel. Associate Professor. Electrical Engineering Department King Fahd University of Petroleum & Minerals Dhahran, Saudi Arabia By Associate Professor Electrical Engineering Department King Fahd University of Petroleum & Minerals Dhahran, Saudi Arabia Wednesday, December 1, 14 1 st Saudi Symposium for RADAR Technology 9 1 December

More information

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr. Lecture #2 EE 471C / EE 381K-17 Wireless Communication Lab Professor Robert W. Heath Jr. Preview of today s lecture u Introduction to digital communication u Components of a digital communication system

More information

Multipath fading effects on short range indoor RF links. White paper

Multipath fading effects on short range indoor RF links. White paper ALCIOM 5, Parvis Robert Schuman 92370 CHAVILLE - FRANCE Tel/Fax : 01 47 09 30 51 contact@alciom.com www.alciom.com Project : Multipath fading effects on short range indoor RF links DOCUMENT : REFERENCE

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Breaking Through RF Clutter

Breaking Through RF Clutter Breaking Through RF Clutter A Guide to Reliable Data Communications in Saturated 900 MHz Environments Your M2M Expert Introduction Today, there are many mission-critical applications in industries such

More information

ENGG2310-B Principles of Communication Systems Last Lecture

ENGG2310-B Principles of Communication Systems Last Lecture ENGG2310-B Principles of Communication Systems Last Lecture Wing-Kin Ma Department of Electronic Engineering The Chinese University of Hong Kong, Hong Kong November 28 29, 2017 Recap on ISI model: y(t)

More information

Effects of Fading Channels on OFDM

Effects of Fading Channels on OFDM IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 116-121 Effects of Fading Channels on OFDM Ahmed Alshammari, Saleh Albdran, and Dr. Mohammad

More information

DFS (Dynamic Frequency Selection) Introduction and Test Solution

DFS (Dynamic Frequency Selection) Introduction and Test Solution DFS (Dynamic Frequency Selection) Introduction Sept. 2015 Present by Brian Chi Brian-tn_chi@keysight.com Keysight Technologies Agenda Introduction to DFS DFS Radar Profiles Definition DFS test procedure

More information