Pervasive and Mobile Computing. Collaborative jamming and collaborative defense in cognitive radio networks

Size: px
Start display at page:

Download "Pervasive and Mobile Computing. Collaborative jamming and collaborative defense in cognitive radio networks"

Transcription

1 Pevasive and Mobile Computing 9 (2013) Contents lists available at SciVese ScienceDiect Pevasive and Mobile Computing jounal homepage: Fast tack aticle Collaboative jamming and collaboative defense in cognitive adio netwoks Wenjing Wang a, Shameek Bhattachajee a, Mainak Chattejee a,, Kevin Kwiat b a Electical Engineeing and Compute Science, Univesity of Cental Floida, Olando, FL 32816, United States b Ai Foce Reseach Laboatoy, Infomation Diectoate, Rome, NY 13441, United States a t i c l e i n f o a b s t a c t Aticle histoy: Available online 29 June 2012 Keywods: Cognitive adio netwoks Jamming powe distibution Collaboative attacks Collaboative defense Spectum hopping In cognitive adio netwoks, cognitive nodes opeate on a common pool of spectum whee they oppotunistically access and use pats of the spectum not being used by othes. Though coopeation among nodes is desiable fo efficient netwok opeations and pefomance, thee might be some malicious nodes whose objective could be to hinde communications and disupt netwok opeations. The absence of a cental authoity o any policy enfocement mechanism makes these kinds of open-access netwok moe vulneable and susceptible to attacks. In this pape, we analyze a common fom of denial-of-sevice attack, i.e., collaboative jamming. We conside a netwok in which a goup of jammes ties to jam the channels being used by legitimate uses who in tun ty to evade the jammed channels. Fist, we compute the distibution of the jamming signal that a node expeiences by consideing a andom deployment of jammes. Then, we popose diffeent jamming and defending schemes that ae employed by the jammes and legitimate uses, espectively. In paticula, we model and analyze the channel availability when the legitimate uses andomly choose available channels and the jammes jam diffeent channels andomly. We popose a multitie poxy-based coopeative defense stategy to exploit the tempoal and spatial divesity fo the legitimate seconday uses in an infastuctue-based centalized cognitive adio netwok. Illustative esults on spectum availability ates show how to impove esiliency in cognitive adio netwoks in the pesence of jammes Elsevie B.V. All ights eseved. 1. Intoduction A cognitive adio netwok (CRN) is one of the pominent communication technologies that is touted to dive the next geneations of digital communications. Cognitive adio enabled devices have the capability to dynamically access, use, and shae the adio spectum in an oppotunistic manne, in both the licensed and unlicensed bands [1]. Though constant sensing and monitoing of the adio fequency spectum, these adios build a knowledge base of the spectum usage and lean the occupancy and vacancy of vaious bands. The vacant bands ae consideed available, and cognitive adios ae allowed to opeate on the best available channels. Howeve, the bands must be vacated when the pimay uses (i.e., the licenced ownes) of those bands begin tansmission. This eseach was suppoted by National Science Foundation, unde awad no. CCF and the Ai Foce Office of Scientific Reseach (AFOSR). Appoved fo Public Release; Distibution Unlimited: 88ABW dated 02 July Coesponding autho. addesses: wenjing@eecs.ucf.edu (W. Wang), shameek@eecs.ucf.edu (S. Bhattachajee), mainak@eecs.ucf.edu (M. Chattejee), kevin.kwiat@l.af.mil (K. Kwiat) /$ see font matte 2012 Elsevie B.V. All ights eseved. doi: /j.pmcj

2 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Though thee ae majo initiatives fom industy, academia, and policy egulatos on the dynamic, flexible, and efficient use of the adio spectum, thee ae cetain vulneability issues that need to be esolved befoe cognitive adio netwoks can be commecially deployed. Since the spectum is made available to unlicensed uses, it is expected that all such uses follow the egulatoy aspects and the shaing ules. One can think of a vaiety of ways which would make CRNs susceptible to attacks, some of which might be adically diffeent fom those fo taditional multi-channel wieless netwoks. In this eseach, we conside that both jammes and egula uses ae cognitive adio enabled, and that they opeate on a common pool of spectum. The egula uses continuously scan fo available channels and choose channels that ae available o not being jammed. The jammes, on the othe hand, ty to jam the channels that ae being used by the egula uses. We genealize the spectum availability at diffeent locations, i.e., the spectum availability at the jamme side is diffeent fom that at the egula use side, and the jamme has no clue which fequencies the tansmitte/eceive pai would use. Though Ref. [2] examines the jamming poblem in a single-cell IEEE netwok when a single cognitive jamme jams by sweeping all the available channels, such techniques cannot be diectly applied to CRNs. To analyze the cumulative effect of multiple jammes on a single eceive, we fist compute the jamming distibution fom a single jamme on that eceive. We then compute the joint distibution, assuming that the jammes do not employ any tansmit powe contol and that they collaboatively apply a sweeping attack to jam the channels. We conside that the jammes collaboate to distibute thei tansmit powe budget ove multiple channels fo maximizing thei jamming intefeence duing the data tansmission peiods of egula uses. Next, we conside an infastuctued netwok (e.g., IEEE netwok) in which the attacks ae launched at both the base station and the uses. The uses use impetuous and consevative fequency hopping to escape the attacks. We attempt to obtain the spectum availability ates analytically fo both hopping stategies at the base station as well as at the use side. Futhe, we popose a collaboative defense stategy in which the uses fom ties to exploit the tempoal and spatial divesity to avoid jamming. Numeical and simulation esults ae pesented to illustate the spectum availability ates when diffeent attack/defense stategies ae employed. We show the effects of the collaboative attack to eveal how the spectum availability ates change with diffeent paametes. Subsequently we discuss tade-offs between goodput and latency, and show that the communication goodput is geatly enhanced when using communication ties at the cost of latency. The est of the pape is oganized as follows. In Section 2, we discuss the vulneabilities of CRNs and some ecent woks that have been poposed to deal with them. In Section 3, we analyze the distibution of jamming intefeence as expeienced by a eceive fom multiple jammes. In Section 4, we discuss the system model of an infastuctued netwok. We show the effect of jamming and anti-jamming that exploits tempoal and spatial divesity though spectum hopping in Section 5. In Section 6, we show how coopeation can help minimize the jamming pobability. Numeical and simulation studies ae pesented in Section 7. We discuss some pefomance tade-offs in Section 8. Section 9 pesents ou conclusions and futue wok. 2. Peliminaies and elated eseach Just like taditional adios, cognitive adios ae susceptible to hamful intefeence and much moe. Events such as denialof-sevice (DoS) attacks could ende legitimate cognitive adios spectumless. This could easily be achieved if a malicious adio petends to be a pimay tansmitte and spoofs signals that esemble the signal chaacteistics of a licensed use. This is known as pimay use emulation attack which occus at the sensing slot. Since access is fee-fo-all in unlicensed bands, a malicious node can also ty to jam the signals duing the data tansmission slots. Thee ae seveal ways in which communications of a cognitive adio netwok infastuctue can be jeopadized; a common type of attack is denial-of-sevice [3]. In the context of wieless netwoks, DoS attacks ae usually manifested though adio jamming [4]. One of the ways fo adio jamming is the sweeping attack, in which the malicious nodes attack a channel iespective of the channel activity. Anothe altenative way of jamming is the scanning attack: the attackes fist take a constant time to sense the channel to detemine channel activity. The jamme will only jam the channel if it finds legitimate activity on the channel; othewise, it will hop to sense anothe channel until it finds a taget channel to jam. With advanced physical laye techniques, e.g., spead spectum and diectional antennas, it is feasible to defend the netwok fom attacks. Channel/fequency hopping is a popula anti-jamming appoach [5,6]. Anti-jamming hopping is based on the availability of multiple othogonal channels o non-ovelapping fequencies so that the tansmitte/eceive pai can switch, access, and communicate ove a diffeent channel in case the oiginal channel is jammed. The hopping can be tiggeed eithe eactively o poactively. In eactive hopping [5], the tansmitte/eceive pai switch to anothe channel when they obseve jamming, while in poactive hopping [6], the tansmitte and eceive hop thei channels as pe a hopping sequence that is peviously ageed upon. Howeve, it is cucial that all the netwok entities (nodes) shae a contol channel to exchange infomation such as the hopping sequence. Anti-jamming consideations, e.g., using andom assignment of cyptogaphic keys, and contol channel fequency hopping, ae also needed on that channel [7,8]. Theefoe, it is highly desiable that algoithms and potocols that ae devised fo anti-jamming ae distibuted in natue [9,10] o shaed key fee [11,12]. Thee is some body of wok that deals with guading against spuious signal sent ove channels fo disuption o sensoy manipulation [13 15]. In [16], whee the pimay incumbents ae TV stations, the authos popose a method of counteing such attacks by veifying the estimated location fom which the signal has been sent and compaing with aleady

3 574 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) known locations of pimay incumbents. In [14], a dedicated infastuctue-based defense against pimay use emulation is poposed in which an undelying senso netwok monitos malicious jamming on sensing slots. The wok in [17] discusses how pimay use emulation can be achieved by distibuting the total powe budget equally ove a subset of channels chosen fom set of available channels instead of just jamming one channel. Thee ae othe woks, such as [18], which conside ogue nodes that jam the seconday uses. A selective escape stategy as opposed to andom hopping is pusued by egula nodes to avoid jamming. This wok consides that channel usage statistics ae known and that thee is a tade-off between choosing good channels and avoiding jamming by the attacke. This situation is modeled as a dogfight in spectum in multiple stages. In the fist stage, the dogfight is modeled as a nomal zeo-sum game, and the Nash equilibium stategy (max min point) is obtained. Fo the multi-stage game, the dogfight is essentially a stochastic game with patial obsevations and impefect monitoing. The same authos, in [19], have focussed on the poblem of jamming and escaping unde unknown channel statistics and modelled it as a advesaial multi-amed bandit poblem. Lowe bounds on pefomance fo defendes, subject to seveal typical attack stategies, ae deived fo the single-defende case. Fo all the above-mentioned woks, the focus is mostly on jamming the sensing slot fo denying coect sensing decisions on an othewise available channel. Howeve, we focus on jamming fom a usability point of view, whee the jamming could be in any of the sensing o data tansmission slots. 3. Jamming signal distibution In this section, we analyze the effect of andomly distibuted jammes on a single eceive. We fist compute the effect of a single jamme and then sum the jamming signal stengths to compute the total intefeence as the jammes distibute thei tansmit powe budget ove multiple channels System model and assumptions We conside a netwok in which n legitimate uses and m jammes ae andomly scatteed ove a geogaphical egion. The seconday uses wok on fequency bands that ae not occupied by the pimay uses. We assume that both the goups (uses 1 and jammes) ae self-coodinated, i.e., they do not jam each othe within the goup. Also, the pimay uses do not jam the seconday uses. We assume that the jammes have no pio knowledge of the specific channels that ae being used by the egula uses. Even if they come to know about the channel that a egula use is using and ty to jam it, it is not necessay that the egula use will continue to use the same channel. In fact, all egula uses employ eithe a poactive o eactive appoach towads channel hopping. A jamme andomly selects a channel and uses its maximum tansmit powe to jam. We intend to obtain the statistical distibution of jamming powe fom a single jamme that a use expeiences. Then, we will find the expected total jamming at the use fom multiple jammes. To obtain the jamming powe distibution, we use the following assumptions and definitions. 1. All uses and jammes have omnidiectional tansmit and eceive antennas of the same gain. 2. The eceiving distance fom which a use can coectly ecove a tansmitted signal is R T. 3. The intefeence distance R I is defined as the maximum distance fom which a eceiving use can sense a caie. 4. R 0 is the minimum distance between two uses/jammes, i.e., no two uses/jammes could be with a distance of R 0 of each othe. 5. The jammes do not employ tansmit powe contol. Rathe, they use the maximum possible powe to cause maximum damage. If a jamme jams multiple channels, it distibutes the maximum powe equally ove all the channels. Fig. 1 shows use i as the use unde consideation. Use i can coectly decode any tansmission that lies with R T, i.e., its intended tansmitte (say j 2 ) must be within R T. Howeve, use i can be jammed by any jamme (say j 1 ) that lies within R I. The commonly used notation is shown in Table 1. Some of the tems will be defined late Jamming powe distibution Let us compute the pobability density function of the jamming signal fom a jamme that lies within distance R I fom eceive i. If R 0 is the minimum distance between two active nodes, then we can wite the cumulative distibution function (cdf) of the tansmitte eceive distance d, with unifomly andom distibuted jamme as well as egula nodes, as = d2 2 R 0 in (R F D (d) R 2 2 0, R] R 0 (1) = 1 d > R = 0 d R 0, 1 We use the wod use to efe to seconday use.

4 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Fig. 1. Intefeence model of jammes. Table 1 Notation. Symbol n m N j ρ n ρ m R T R R I R 0 N tot N M P t k Meaning Numbe of egula nodes Numbe of jamming nodes Expected numbe of jammes fo any node Density of egula nodes Density of jamming nodes Receiving distance of a node Maximum sensing ange Intefeence distance of a node Minimum distance between two nodes Total numbe of channels Numbe of channels at the uses side Numbe of channels at the base station side Total tansmit powe budget of a jamme Numbe of channels a jamme decides to attack whee andom vaiable (RV) d anges fom R 0 though R, whee R is the maximum sensing ange. Note that R T R I R. Thus the coesponding pobability density function is 2d = in (R f D (d) R 2 0, R] R 0 = 0 elsewhee. (2) We know that the eceived powe P at node i decays with the distance fom the jamme, i.e., P d α, whee α is the path loss exponent. If we define RV y d α, then the cdf of y is = 1 F D y 1 α in (R α, R α ] 0 F y (y) = 1 y R α (3) α = 0 y < R 0. Putting d = y 1 α 2α +1 f y (y) = 2y α(r 2 R 2) 0 in the cdf and diffeentiating with espect to y, we get in (R α, R α 0 ] = 0 elsewhee. Since the eceived powe vaies invesely with d, we define the distibution of eceived intefeence powe p,ji at node i due to a paticula jamme j with a fixed tansmit powe P t as p,ji = P t d α ji, R 0 < d ji R I. (4) (5)

5 576 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Now, P t being constant, p,ji is a RV in the inteval (P t R α I, P t R α 0 ). Thus the pobability distibution function (pdf) of the eceived jamming intefeence powe is given by 2p 2α +1 α = f p,ji (p ) αp 2α P tri p < P t R +1 α 0 t (R 2 I R 2) (6) 0 = 0 elsewhee. Similaly, we can obtain that the distibution of the eceived powe at node i due to a legitimate tansmitte T located within a distance of R T fom i is given by p,ti = P t d α Ti, R 0 < d Ti R T. The coesponding pdf of the intended eceived powe at node i fom legitimate tansmitte T is 2p 2α +1 α = f p,ti (p ) αp 2α in P trt p < P t R +1 α 0 t (R 2 T R2) 0 = 0 elsewhee. (7) (8) 3.3. Jamming powe distibution ove multiple channels Though concentating on a single channel could be vey effective, the jamme s success is based on the odds of selecting a channel that is in use by a egula node. To incease its chances of success, a jamme might decide to distibute its tansmit powe budget among multiple andomly selected channels. This appoach of equal powe patial band spoofing [17] has poved to be vey effective when the geogaphical distibution and the in-use channels of the egula nodes ae unknown to the jammes. Of couse, the dawback of such powe distibution could lead to insufficient intefeence powe on a channel that is indeed being used by a egula node. Since the jammes collaboate, we assume that all the jammes distibute thei powe equally ove a fixed set of channels and einfoce the intefeence powe on each channel fom vaious jamme locations. Fom a egula node s pespective, the jamming powe it expeiences on any channel (if it uses one of the jammed channels) is due to the jammes that ae within its intefeence ange R I. Thus, the expected numbe of such jammes is given by N j = πr 2 I ρ m πr 2 0 ρ m, whee ρ m is the density of the jammes, i.e., numbe of jammes pe unit aea. Note that the distibution obtained in Eq. (6) is due to a single jamme. To get the distibution of the total jamming powe, we have to add the eceived powe fom N j jammes. Thus, the total jamming powe is S Nj = p 1 + p p Nj. We can safely assume that the andom vaiables p 1, p 2,..., p Nj ae independent and identically distibuted (i.i.d.). Hence, to obtain the density function of the total jammed powe, we can use N j -fold convolution since S Nj is the sum of N j i.i.d. andom vaiables [28]. Thus, the density function of S Nj is given by (9) (10) f SNj (p ) = (f p1 f p2 f pnj )(p ), (11) with f SNj (p ) having a suppot ove the inteval [N j P t R α I, N j P t R α 0 ]. 4. Infastuctued system model With the distibution of the jamming known, we poceed to popose an infastuctue fo communication that would allow the uses to evade the jamming to some extent. Though ou analysis in Section 3.2 was geneic, we conside an infastuctue mode fo the hieachy in which the uses ty to connect to a base station using feely available channels. This model could be thought of as an IEEE netwok that consists of a base station and multiple consume pemise equipment in a cell. We conside a netwok in which n uses communicate with a base station (BS) as shown in Fig. 2. Fo the sake of discussion, we assume that the numbe of available channels at the base station side is M. Howeve, it is possible that not all of the M channels ae available at the seconday uses side, and we denote the fequencies available at the uses side as N channels, whee M N. Given this scenaio, we ae inteested in finding what potions of the communication between the base station and the uses ae jammed given m jammes. It is to be noted that the jammes coodinate among themselves to launch collaboative attacks.

6 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Fig. 2. Infastuctue system model. Befoe we can calculate which channels ae jammed, we need to know how the jammes jam and how the uses defend. We conside slotted time, in which the uses and the jammes take actions in each of the equal-length time slots. A time slot is the minimum unit of time we conside in this analysis. 2 As fa as the jammes ae concened, at evey slot, the m jammes will choose m diffeent fequencies to jam and will change the jamming set at the next slot. This type of jamming is called sweeping. Fom the egula uses pespective, they have two ways to defend. Impetuous hopping. The uses, like the jammes, choose a new set of fequencies at evey slot, iespective of jamming. This is also called poactive hopping. Consevative hopping. The unjammed uses will stay at the fequencies fo the next slot, while the jammed uses choose a set of new unused fequencies that exclude the jammed ones. This is also known as eactive hopping. Futhe, we intoduce a hypegeometic-like distibution function f (x, y, z, u, v), which epesents the pobability that, in a finite population of x unique items, and its subset z, whee z x, two independent unifomly distibuted dawings of y and u in x and z espectively shae v common items. z z v x u v whee f (x, y, z, u, v) = x y u v x y z u y v, is the binomial coefficient. (12) 5. Jamming and anti-jamming spectum hopping In this section, we analyze the expected spectum availability ates with espect to vaious paametes. The spectum availability ate ψ is defined as the atio of available (unjammed) spectum to the total spectum fom the uses pespective. A lage spectum availability ate implies highe anti-jamming efficiency. Depending on whee the jamming occus in the system, the analysis consists of two scenaios, i.e., jamming the base station and jamming the uses Base station being jammed When the jammes jam the spectum at the base station, the jammes see M available fequencies, while thee ae N candidate fequencies that the uses access. Based on the anti-jamming hopping stategies, we have the following obsevations. 2 Channel access time and switch time in the time slot ae not in the scope of this pape.

7 578 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Fig. 3. Fou jammes and uses. (a) Jammes choose maximum powe to tansmit, (b) jammes choose modeate powe with modeate numbe of channels to jam, (c) jammes choose lowe powe with many channels to jam. Lemma 1. When the uses adopt the impetuous hopping stategy, the spectum availability ate ψ I = 1 min(m,n) i=0 f (M,m,N,n,i) i. N Sketch of Poof. The pobability of i fequencies being jammed can be modeled using function f (). The poblem is to find the pobability that the two dawings shae i unique fequencies, given fequency dawings m fom M and n fom N. The pobability, which can be expessed as f (M, m, N, n, i), shows the pobability of jamming i channels. The summation ove i [0, min(n, m)] is the total pobability of jamming. To model the consevative hopping stategy, we constuct a Makov chain. Let state i be the state when i fequencies ae jammed. We assume that, when the consevative hopping stategy is adopted, in the next slot, j fequencies will be jammed. The tansitions ae chaacteized by pobability p ij, which futhe constuct a tansition matix P(p ij ). It is natual that this Makov chain is egodic, so the steady-state distibution = lim n P n, whee (π i )P = (π i ). The next lemma shows how to obtain the elements in the tansition matix and calculate the spectum availability ate. Lemma 2. When the uses adopt the consevative hopping stategy, the spectum availability ate ψ C = 1 tansition pobability p ij = j f (M, m, N i, n i, k)f (M k, m k, N n, i, j k). k=0 i iπ i N, and the Sketch of Poof. Conside the case when i fequencies ae jammed, and the hoppings by both uses and jammes esult in j fequencies being jammed. Fom the stategy desciption, i uses will choose fom a candidate fequency set of size N n M. Assume that, in the next slot, k of the n i uses that do not hop ae jammed. The pobability of jamming is given by f (M, m, N i, n i, k). Next, among the emaining i uses that hop, a total of j k uses ae jammed by a total of m k jammes. The fequency spaces fo both jammes and uses shink to M k and N n, espectively. Thus, the pobability of j k jamming in i hopping uses is f (M k, m k, N n, i, j k). The boundaies fo vaiable k ae jointly given by k [0, j] and the equiement of the binomial coefficient is that x y Uses being jammed When the jammes ae in the vicinity of the uses, the spectum they sense is almost the same as what the uses can access. Thus, the spectum space fo them to attack is educed to N. Theefoe, the spectum availability ates is the same as when the jammes ae at the base station, except fo eplacing M by N. In paticula, the spectum availability ate when the uses adopt the impetuous hopping stategy is ψ (U) I = 1 min(m,n) i=0 f (N, m, N, n, i) i, N and the spectum availability ate when the uses adopt the consevative hopping stategy is ψ (U) C obtained using the tansition pobability p (U) ij = j f (N, m, N i, n i, k)f (N k, m k, N n, i, j k). k=0 = 1 i iπ i, whee π N i is We will show the diffeence between the two cases in Section 7.1. When the total tansmit powe of the jamme is a constaint, the jamme can choose to jam a single channel o multiple channels. A jamming powe distibution on multiple channels implies moe channels being jammed i.e., as if thee ae additional jammes. Of couse, with multiple channels, the jamming ate is high, but the coveage is less. An illustative example is shown in Fig. 3, whee thee diffeent tansmit powes ae employed by the fou jamming nodes fo the same

8 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) geogaphical distibution of the jammes and the uses. The jammes ae shown using the solid dots and the uses ae shown using the non-solid dots. In case (a), the jammes tansmit with the maximum powe (P t ), each jamming only one channel but able to each most of the uses. In case (c), the jammes choose to distibute the powe to many channels, theeby only being able to each vey few uses but with a high pobability of jamming those uses. Clealy, thee is a tade-off, which is shown by case (b) Jamming tade-off A jamme can cove the maximum aea when it chooses to use the entie powe budget on a single channel. We have aleady denoted this maximum jamming distance as R I. Fom a use s pespective, any jamming fom beyond R I will have no impact. Thus, we can define the use eceive sensitivity, p sen, as the minimum jamming powe that affects it. In othe wods, any eceived powe that is less than p sen will have no jamming consequence. Thus, we can define the eceive sensitivity as p sen = P t R α I. Instead of focussing on a paticula channel, a jamme might choose to distibute the total powe budget on a subset of k channels so as to incease its chances of jamming a use. Such distibution of powe on k channels deceases the tansmit powe on each channel by a facto k, i.e., the tansmit powe fo each channel is P t, which in tun educes the coveage k distance fo the jamme. If we define R I,k as the coveage adius when the total powe is distibuted ove k channels, then it can be shown that 1 Pt /k α R I,k =. (14) p sen With R I,k as the intefeence ange, the expected numbe of uses that a jamme can taget on a paticula channel is N i = πr 2 I,k ρ n πr 2 0 ρ n, whee ρ n is the density of the uses Bound on the numbe of channels attacked (k) Though inceasing k means attacks on moe channels, it necessaily means less jamming powe to the uses. Note that it does not make sense fo the jammes to use a tansmit powe less than p sen. If k max is the maximum numbe of channels chosen to be attacked and P t /k max is the tansmit powe on each, then the jamme has to ensue that P t /k max R α 0 p sen, as R 0 is the closest a jamme could be to a use. Thus, we get (13) (15) (16) k max = P t p sen R α 0. (17) Pobability of jamming With the total powe distibuted ove k channels, we get the modified pdf (fom Eq. (6)) of the eceived jamming powe at any node i as 2α 2(p k f p,ji k (pk) = ) +1 Pt α(p t /k) 2α +1 (R 2 I,k R2) k R α I 0 = 0 elsewhee. p k < P t k R α 0 The sum of the eceived powe on channel k fom N j,k jammes is S k N j,k = p k 1 + p k p k Nj,k, whee N j,k = πr 2 I,k ρ m πr 0 ρ m is the modified numbe of jammes aound the vicinity of any egula node, with powe distibuted jamming stategy. Likewise, we can modify the density function fo the sum of the eceive powe as f S k N j,k (p k ) = (f p k 1 f p k 2 f p k N j,k )(p k ), with f S k N j,k (p k ) having a suppot ove [N j,k P t k R α I, N j,k P t k R α 0 ]. Now, the jamming will be effective if the total powe is geate than p sen. The pobability that the total eceived powe is moe than p sen is given by P(S k N j > p sen ) = Nj P t /k p sen f S k N j (p k ). (18) (19) (20) (21)

9 580 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Fig. 4. Coopeative defense among legitimate uses. Each jamme can jam one channel at a time. 6. Anti-jamming though coopeation Fom the pevious section, it is intuitive that the jammes can collaboate to jam a set of fequencies the moe jammes thee ae, the moe fequencies thee ae that can be jammed. Nonetheless, it is possible that some of the communication can suvive fom such attacks as long as the numbe of jammes is less than the numbe of available fequencies. This motivates us to exploe ways by which the uses can coopeatively exploit the unjammed fequencies. Coopeative communication [20,21] is one of the methods to chaacteize the means of coopeation between diffeent tansmitting entities in a wieless netwok. Coopeative communication is based on the idea that single-antenna uses in a multi-use scenaio can shae thei antennas in such a way that ceates a vitual multiple-input multiple-output (MIMO) system. With the help of the vitual MIMO system, all the uses can take advantage of the time, fequency, and space divesities to impove communication capacity, speed, and pefomance. In ou scenaio of combating the jammes, the fequency and space divesities of channel availability enable the uses to aggegate thei communication with the BS on the unjammed fequencies and elay infomation coopeatively Coopeation among legitimate uses Fo the time being, let us assume that the N available fequencies at the use end do not ovelap with the M fequencies at the base station side. Using the N fequencies, the uses can communicate among themselves. As shown in Fig. 4, we divide the n uses into two categoies: poxy uses (poxies) and followe uses (followes). The poxy uses act as elays between the followes and the BS that add anothe laye in the communication hieachy. Instead of connecting to the BS diectly, the followes connect to poxies fist and elay the infomation though poxies to the BS. The set of poxies can be eithe pe-selected o dynamically updated as long as thei identities ae evealed to all the followes. The coopeation among the uses woks in thee steps. Fist, the followes connect to the poxies and stoe the infomation to be sent to the BS at the poxies. Then, the poxies connect to the BS and act as elays fo the followes. Last, the poxies elay the infomation fom the BS back to the followes. Due to the boadcast natue of wieless communication, the poxies and followes must have an ageed sequence of hopping fequencies. With h poxies and n h followes, the followes take tuns to access the fequencies in goups of h. Each of the poxies listens to one fequency at a time. Afte n h iteations, each of the h poxies listens to each of the followes only once. Afte the communication between poxies and the BS, the poxies boadcast to the followes at h fequencies each time, and iteate ove available fequencies h times so that each followe can hea at least once. The connections among uses can be modeled with a fully connected bipatite gaph of h(n h) edges. Fo the m jammes, when the legitimate uses coopeate, the jammes will need to jam both the poxies and the followes. Let us assume that l of the jammes ae assigned to jam the communications between the poxy uses and the BS. The emaining of m l jammes ae esponsible fo jamming communications between followes and poxies. We take one communication cycle (i.e., one complete infomation exchange pocess between a followe use and the BS) as an example to analyze the channel availability ate. In the fist phase, the n h followes connect to h poxies in goups of h. All of the followe and poxy pais select unique channels out of the N available channels, since we assume that the uses collaboate. The m l jammes ae awae of the N available fequencies and ty to jam the communications. Since the poxies and followes agee on a sequence of

10 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) channel hopping, it can be viewed as the legitimate uses ae defending using impetuous hopping. The spectum jamming ate φ, which is defined as 1 ψ (spectum availability ate), can be deived fom Lemma 1. Fo a paticula followe, the communication between it and the poxy is unjammed as long as it connects to one of the k poxies successfully. The jamming ate can be expessed as φ 1 = (1 ψ I ) h = min(m l,n h) i=0 h f (N, m l, N, n h, i) i. (22) N In the second phase, the poxies talk to the BS on behalf of the followes. In this setting, l jammes ty to jam the bidiectional communication between h poxies and one BS, given M available fequencies. Accoding to ou analysis above, the jamming ate is φ 2 = 1 ψ I = min(l,h) i=0 f (M, l, N, h, i) i N. (23) Finally, afte the poxies successfully communicate with the BS, they elay the communication back to the followes. This pocess is the evese of the fist phase, whee h poxies ae tansmittes and n h followes ae eceives. Each of the poxies will ty to connect to each of the followes once. Due to the boadcast natue of the communication, multiple followes may connect to the same poxy at a time. Theefoe, when m l jammes ae pesent, the jamming ate is given as φ 3 = (1 ψ I ) h = min(m l,h) i=0 h f (N, m l, N, h, i) i. (24) N When we combine the thee phases, we can obtain the total spectum jamming ate with coopeative uses as φ = 1 (1 φ 1 )(1 φ 2 )(1 φ 3 ). (25) 7. Numeical and simulation study In this section, we show the effect of collaboative attacks on spectum availability ates. We also show how collaboative defense can be employed to counte such attacks Effect of collaboative attack We study how the spectum availability ate changes with diffeent paametes. A geneal obsevation is that consevative hopping (CH) povides moe spectum availability ate than impetuous hopping (IH). We implement a simulato based on C++ to lean the jamming popeties. Duing each ound, both the jammes and the uses choose a andom fequency fom a set of available fequencies known only to thei own goup. This ensues that none of the jammes o uses will jam within thei goup. A total of 10,000 ounds ae simulated. Fig. 5 epesents the simulation and analytical esults fo diffeent values of M, n, and m. The plots suggest a good match between the spectum availability ate deived fom ou modeling and that obtained fom the simulation. In addition, the figue shows that inceasing M impoves the spectum availability ate when the spectum size at the use side (N) is fixed. Fig. 6 is obtained when the numbe of uses is fixed and the numbe of attackes vaies. It clealy shows that the spectum availability ate deceases when moe attackes ae pesent in the netwok. It is obseved in Fig. 7 that the spectum availability ate inceases with inceasing N. Togethe with Fig. 5, this indicates that, when thee ae moe attackes than uses in the netwok, the spectum availability ate dops. The jamming at the use side is illustated in Fig. 8 with the same settings as in Fig. 7. The eason why the spectum availability ate deceases when jamming is at the use side is due to the educed spectum space the attackes can sense. Since the jammes know exactly what candidate fequencies ae available to the uses, the jamming is moe likely to be successful Collaboative defense Just as the attackes collaboate, we let the uses collaboate so that they can coopeatively fom a tie to avoid jamming. We study the spectum availability ate and compae with the pefomance of impetuous hopping (IH) stategy.

11 582 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Fig. 5. Spectum availability ate vesus M. Fig. 6. Spectum availability ate vesus m. A geneal obsevation made fom Figs. 9 and 10 is that, when uses coopeate, the spectum availability ate (ψ) is significantly geate than with the IH stategy. The obsevation indicates that coopeation can effectively educe the jamming pobability and impove the goodput of the netwok. When M and N incease, the spectum availability ate also inceases. This popety, which is same as ou obsevations in Figs. 5 and 7, shows the netwok pefomance gain fom a lage pool of available fequencies. It can be noted that, in Fig. 9, we only conside M N, as stated in the system model. Figs. 13 and 14 show some tade-offs between the numbe of jammes at diffeent locations. In Fig. 13, when moe jammes ae placed at the BS side, a decease of poxy uses will yield bette spectum availability ate, because it educes the pobability of poxy uses getting jammed. Fig. 14 suggests that, when a lage numbe of jammes ae pesent at the BS side, fewe poxies help incease the pefomance. Howeve, fom the jammes pespective, with the incease in poxies, moe jammes should be placed at the BS side Effect of jamming tade-off We study the tade-offs between numbe of nodes affected and the pobability of thei channels being jammed when a jamme distibutes the powe ove k channels. We define the attack utility poduct as the poduct of the numbe of channels jammed at each node and the numbe of nodes affected. We obseve that, while thee is an incease in the pobability of

12 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Fig. 7. Spectum availability ate vesus N. Fig. 8. Spectum availability ate when jammes ae at the use side. jamming of a single node, as k inceases, the numbe of uses affected by the jamme educes exponentially. We show the exponential eduction in numbe of nodes affected by a jamme in Fig. 11 fo diffeent values of α. We obseve a taget numbe of nodes of less than 7 if the numbe of channels attacked is moe than 10, fo α = 4. The high numbe of tagets nodes fo lowe values of α is evident, as fo lowe path loss exponent a signal fom the jamme eaches moe uses, but fo highe values of α we see a dop in the numbe of taget nodes. Next, we show the attack utility poduct, which we obseve to incease with incease in k in Fig. 12. We obseve that thee is significant linea incease in the attack utility poduct when the numbe of channel attacked by the distibuted powe budget inceases with k. 8. Discussions In this section, we show qualitatively the tade-offs between goodput and latency, and then we ague that scanning attacks ae special cases of sweeping attacks Goodput vesus latency When all the legitimate uses diectly connect to the BS, the uses can only exploit the fequency divesity. If the BS has multiple eceives, all the communication can be pefomed concuently, which minimizes the latency incued.

13 584 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Fig. 9. Spectum availability ate vesus M, when uses coopeate. Fig. 10. Spectum availability ate vesus N, when uses coopeate. Howeve, fom ou study, such diect communication suffes fom low spectum availability ates; thus the goodput is compomised. When the legitimate uses coopeate with each othe, communication is divided into ties. Fom the jammes pespective, they must also be divided into goups to jam communications between diffeent ties. Since a followe use can communicate with all the poxies at diffeent times, leaving duplicated copies of infomation on each of the poxies, communication obustness and goodput is geatly enhanced. In this case, it becomes hade fo the jammes to jam. Nonetheless, the dawback is the latency incued fom the duplicated communication. In ou example above, if we elax the assumption of N and M being mutually exclusive, n h + h = n exta time slots ae needed to pefom the infomation exchange among ties. The tade-off between goodput and latency can also lead to optimized design in CRNs. Depending on the equiements of the application, vaious paametes (e.g., coopeation vesus IH/CH, value of h) of the defending schemes can be set which yield diffeent goodput and latency pefomance.

14 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Fig. 11. Numbe of nodes affected ove channels attacked. Fig. 12. Attack utility poduct ove channels attacked Scanning attack vesus sweeping attack In ou analysis, we assume that the jammes use a sweeping attack, i.e., jamming the channel iespective of channel activity. Anothe type of jamming attack is a scanning attack [22]. In a scanning attack, the attackes fist take a constant time to sense the channel to detemine channel activity. The jamme will only jam the channel if it finds the channel having legitimate activity; othewise, it will hop to sense anothe channel until it finds a taget channel to jam. A scanning attack diffes fom a sweeping attack, and the jammes can apidly switch to a channel with legitimate communication if the scanning is sufficiently fast. Nonetheless, the uses can coopeatively use backgound communication ove unused fequencies to cove the intended communication. Fo examples, in ou discussion in Section 6.1, when the followe uses ae not taking thei tuns to connect to the poxies, they can mimic legitimate communication to occupy some cuently unused fequencies. Fom the jammes pespective, they ae deceived to jam those coveing fequencies, leaving the intended communication fequencies unjammed. If we have λ intended communication fequencies, µ coveing fequencies, and γ jammes, when the jammes scan and attack, it is equivalent to γ jammes sweeping and attacking ove

15 586 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) Fig. 13. Spectum availability ate vesus l. M = 20, N = 15, m = 8, n = 5. Fig. 14. Spectum availability ate vesus k. M = 20, N = 15, m = 10, n = 8. λ + µ fequencies on λ uses. Theefoe, a scanning attack can be egaded as a special case of a sweeping attack, and thus we can apply the same methods as we have shown with sweeping attacks to the analysis and defense of scanning attacks. 9. Conclusions and futue wok In this pape, we analyze the distibution of the jamming signals and study collaboative jamming attacks in cognitive adio netwoks. We deive the distibution of the total jamming powe a paticula use is likely to expeience with a collaboative jamming stategy by the jammes. We take the anti-jamming hopping stategy as an example and deive the spectum availability ates when the uses apply diffeent hopping stategies to defend themselves. We futhe popose a coopeative defense stategy which goups the uses into ties in ode to take advantage of the tempoal and spatial divesity. Based on the analysis, we conduct a numeical evaluation. The esults illustate that the spectum availability ate inceases with the total spectum at the base station and the spectum available to the uses, while it deceases when moe attackes/jammes ae pesent. When coopeation is assumed among the uses, the spectum availability ate can be

16 W. Wang et al. / Pevasive and Mobile Computing 9 (2013) geatly impoved. Howeve, the pefomance gain which infes bette goodput is coupled with an incease in communication latency. Though the pefomances of the poposed stategies have been evaluated numeically and though simulations, it would be inteesting to see how these stategies would fae when implemented in eal systems. Recent advances in cognitive adio hadwae pototypes using FPGA [23] and an open-souce softwae suite on commodity hadwae [24] would allow such implementations. In paticula, cognitive adio nodes can be pogammed to sense the channel and switch fequencies accoding to complex algoithms [25]. Futue investigations can take advantage of such technologies and deploy a cognitive adio testbed consisting of nodes simulating both jamme and legitimate use behavio. Testbeds can be used to validate and undestand the pefomance and effectiveness of any anti-jamming stategies. Futhe, a public esouce fo cognitive adio netwoks, e.g., Micosoft KNOWS [26], could be made use of, as that would povide a common platfom to compae vaious popositions. Othe wothwhile effots would be to conside moe ealistic channel/link emulation o simulation setup, e.g., using the famewok of NS3 [27], that would allow a compehensive softwae benchmak fo the evaluation of jamming and collaboative defense mechanisms in cognitive adio netwoks. Refeences [1] I.F. Akyildiz, W.Y. Lee, M.C. Vuan, S. Mohanty, Next geneation/dynamic spectum access/cognitive adio wieless netwoks: a suvey, Compute Netwoks 13 (2006) [2] A. Sampath, H. Dai, H. Zheng, B.Y. Zhao, Multi-channel jamming attacks using cognitive adios, in: IEEE ICCCN 2007, pp [3] T.X. Bown, A. Sethi, Potential cognitive adio denial-of-sevice vulneabilities and potection countemeasues: a multi-dimensional analysis and assessment, Mobile Netwoks and Applications 13 (2008) [4] W. Xu, W. Tappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wieless netwoks, in: ACM Mobihoc 2005, pp [5] S. Khattab, D. Mossé, R. Melhem, Jamming mitigation in multi-adio wieless netwoks: eactive o poactive? in: IEEE/ICST SecueComm [6] W. Xu, W. Tappe, Y. Zhang, Channel sufing: Defending wieless senso netwoks fom jamming and intefeence, in: IEEE IPSN 2007, pp [7] L. Lazos, S. Liu, M. Kunz, Mitigating contol-channel jamming attacks in multi-channel ad hoc netwoks, in: ACM WiSec 2009, pp [8] P. Tague, M. Li, R. Poovendan, Mitigation of contol channel jamming unde node captue attacks, IEEE Tansactions on Mobile Computing (9) (2009) [9] A. Chan, X. Liu, G. Noubi, B. Thapa, Contol channel jamming: esilience and identification of taitos, in: IEEE ISIT 2007, pp [10] M. Stasse, C. Poppe, S. Capkun, M. Cagalj, Jamming-esistant key establishment using uncoodinated fequency hopping, in: IEEE Symposium on Secuity and Pivacy 2008, pp [11] T. Jin, G. Noubi, B. Thapa, Zeo pe-shaed secet key establishment in the pesence of jammes, in: ACM MobiHoc, 2009, pp [12] C. Poppe, M. Stasse, S. Capkun, Jamming-esistant boadcast communication without shaed keys, in: USENIX Secuity Symposium [13] Z. Jin, S. Anand, K.P. Subbalakshmi, Mitigating pimay use emulation attacks in dynamic spectum access netwoks using hypothesis testing, ACM SIGMOBILE Mobile Computing and Communications 13 (2) (2009) [14] R. Chen, J.M. Pak, J.H. Reed, Defense against pimay use emulation attacks, in: Cognitive Radio Theoy and Applications, IEEE Jounal on Selected Aeas in Commun 26 (1) (2008) (special issue). [15] Yi Tan, Shamik Sengupta, K.P. Subbalakshmi, Analysis of coodinated denial-of-sevice attacks in IEEE netwoks, IEEE Jounal on Selected Aeas in Communications 29 (4) (2011). [16] R. Chen, J.M. Pak, Ensuing tustwothy spectum sensing in cognitive adio netwoks, in: 1st IEEE Wokshop on Netwoking Technologies fo Softwae Defined Radio Netwoks, vol. 25, 2006, Sept. 2006, pp [17] Q. Peng, P.C. Cosman, L.B. Milstein, Optimal sensing disuption fo a cognitive adio advesay, IEEE Tansactions on Vehicula Technology 59 (4) (2010). [18] H. Li, Z. Han, Blind dogfight in spectum: combating pimay use emulation attacks in cognitive adio systems with unknown channel statistics, in: IEEE ICC 2010, pp [19] H. Li, Z. Han, Dogfight in spectum: jamming and anti-jamming in multichannel cognitive adio systems, in: IEEE Globecomm 2009, pp [20] K.J.R. Liu, A.K. Sadek, W. Su, A. Kwasinski, Coopeative Communications and Netwoking, Cambidge Univesity Pess, [21] A. Nosatinia, T.E. Hunte, A. Hedayat, Coopeative communication in wieless netwoks, IEEE Communications Magazine 42 (10) (2004) [22] A.D. Wood, J.A. Stankovic, G. Zhou, DEEJAM: defeating enegy-efficient jamming in IEEE based wieless netwoks, in: IEEE SECON 2007, pp [23] S.M. Misha, D. Cabic, C. Chang, D. Willkomm, B. Van Schewick, A. Wolisz, R.W. Bodesen, A eal time cognitive adio testbed fo physical and link laye expeiments, in: IEEE DySpan 2005, pp [24] A. Gonzalez, C.R., C.B. Dietich, S. Sayed, H.I. Volos, J.D. Gaeddet, P. Max Robet, J.H. Reed, F.E. Kagh, Open-souce SCA-based coe famewok and apid development tools enable softwae-defined adio education and eseach, IEEE Communications Magazine 47 (10) (2009) [25] S. Sengupta, K. Hong, R. Chandamouli, K.P. Subbalakshmi, SpideRadio: a cognitive adio netwok with commodity hadwae and open souce softwae, IEEE Communications Magazine 49 (3) (2011) [26] Y. Yuan, P. Bahl, Ranvee Chanda, P.A. Chou, I. Feell, T. Mosciboda, S. Nalanka, Y. Wu, KNOWS: cognitive netwoking ove white spaces, in: IEEE DySpan 2007, pp [27] ns-3, [28] V.A. Dobushkin, Methods in Algoithmic Analysis, CRC pess, 2010.

Optimal Strategies in Jamming Resistant Uncoordinated Frequency Hopping Systems. Bingwen Zhang

Optimal Strategies in Jamming Resistant Uncoordinated Frequency Hopping Systems. Bingwen Zhang Optimal Stategies in Jamming Resistant Uncoodinated Fequency Hopping Systems by Bingwen Zhang A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in patial fulfillment of the equiements

More information

Multiagent Reinforcement Learning Dynamic Spectrum Access in Cognitive Radios

Multiagent Reinforcement Learning Dynamic Spectrum Access in Cognitive Radios Sensos & Tansduces 204 by IFSA Publishing, S L http://wwwsensospotalcom Multiagent Reinfocement Leaning Dynamic Spectum Access in Cognitive Radios Wu Chun, 2 Yin Mingyong, 2 Ma Shaoliang, Jiang Hong School

More information

Efficient Power Control for Broadcast in Wireless Communication Systems

Efficient Power Control for Broadcast in Wireless Communication Systems Efficient Powe Contol fo Boadcast in Wieless Communication Systems A. T. Chonopoulos Compute Science Depatment Univesity of Texas at San Antonio San Antonio, TX Email:atc@cs.utsa.edu P. Cotae Depatment

More information

Spectrum Sharing between Public Safety and Commercial Users in 4G-LTE

Spectrum Sharing between Public Safety and Commercial Users in 4G-LTE 1 Spectum Shaing between Public Safety and Commecial Uses in 4G-LTE Haya Shajaiah, Ahmed Abdel-Hadi and Chales Clancy Badley Depatment of Electical and Compute Engineeing Viginia Tech, Alington, VA, 22203,

More information

where and are polynomials with real coefficients and of degrees m and n, respectively. Assume that and have no zero on axis.

where and are polynomials with real coefficients and of degrees m and n, respectively. Assume that and have no zero on axis. function whee is an unknown constant epesents fo the un-modeled dynamics The pape investigates the position contol of electical moto dives that can be configued as stuctue of Fig 1 This poblem is fomulated

More information

On Reducing Blocking Probability in Cooperative Ad-hoc Networks

On Reducing Blocking Probability in Cooperative Ad-hoc Networks On educing Blocking Pobability in Coopeative Ad-hoc Netwoks Ayda Basyouni, Walaa Hamouda ept of Electical and Compute Engineeing Concodia Univesity, Monteal, Canada Email: {a basy,hamouda}@ececoncodiaca

More information

N2-1. The Voltage Source. V = ε ri. The Current Source

N2-1. The Voltage Source. V = ε ri. The Current Source DC Cicuit nalysis The simplest cicuits to undestand and analyze ae those that cay diect cuent (DC). n this note we continue ou study of DC cicuits with the topics of DC voltage and cuent souces, the idea

More information

Parameters of spinning AM reticles

Parameters of spinning AM reticles Paametes of spinning AM eticles onald G. Digges, Cal E. Halfod, and Glenn D. Boeman A new method of obtaining amplitude modulation (AM) fo detemining taget location with spinning eticles is pesented. The

More information

Optimal Design of Smart Mobile Terminal Antennas for Wireless Communication and Computing Systems

Optimal Design of Smart Mobile Terminal Antennas for Wireless Communication and Computing Systems Optimal Design of Smat Mobile Teminal Antennas fo Wieless Communication and Computing Systems Autho Lu, Junwei, Yang, Shiyou Published 2007 Confeence Title 2007 4th Intenational Symposium on Electomagnetic

More information

VLSI Implementation of Low Complexity MIMO Detection Algorithms

VLSI Implementation of Low Complexity MIMO Detection Algorithms , Impact Facto :.643 eissn : 349-000 & pissn : 394-4544 Intenational Jounal of Reseach and Applications (Ap-Jun 015 Tansactions) (6): 309-313 Intenational Confeence on Emeging Tends in Electonics & Telecommunications

More information

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007 School of Electical and Compute Engineeing, Conell Univesity ECE 303: Electomagnetic Fields and Waves Fall 007 Homewok 1 Due on Nov. 8, 007 by 5:00 PM Reading Assignments: i) Review the lectue notes. ii)

More information

Figure Geometry for Computing the Antenna Parameters.

Figure Geometry for Computing the Antenna Parameters. Spheical Coodinate Systems Definitions Figue 1.2.1 Geomety fo Computing the Antenna Paametes. Antenna Radiation Patten: The distibution of adiated enegy fom an antenna ove a suface of constant adius centeed

More information

1 Performance and Cost

1 Performance and Cost Pefomance and Cost Analysis and Reseach of Ai-Cooled Using Small Diamete Coppe Tubes Wu Yang, Li Changsheng and Deng Bin Abstact Replacing coppe tubes with aluminum tubes and using coppe tubes with smalle

More information

ONE-WAY RADAR EQUATION / RF PROPAGATION

ONE-WAY RADAR EQUATION / RF PROPAGATION ONE-WAY RADAR EQUATION / RF PROPAGATION The one-way (tansmitte to eceive) ada equation is deived in this section. This equation is most commonly used in RWR o ESM type of applications. The following is

More information

Wireless Communication (Subject Code: 7EC3)

Wireless Communication (Subject Code: 7EC3) COMPUCOM INSTITUTE OF TECHNOLOGY & MANAGEMENT, JAIPUR (DEPARTMENT OF ELECTRONICS & COMMUNICATION) Notes Wieless Communication (Subject Code: 7EC3) Pepaed By: LOKESH KUMAR ARYA Class: B. Tech. IV Yea, VII

More information

OPTIMUM MEDIUM ACCESS TECHNIQUE FOR NEXT GENERATION WIRELESS SYSTEMS

OPTIMUM MEDIUM ACCESS TECHNIQUE FOR NEXT GENERATION WIRELESS SYSTEMS 9 th Febuay. Vol. 3 No. 5 - JATIT & LLS. All ights eseved. ISSN: 99-5 www.jatit.og E-ISSN: 7-395 OPTIMUM MEDIUM ACCESS TECHNIQUE FOR NEXT GENERATION WIRELESS SYSTEMS N.AMUTHA PRABHA, V.MANIANDAN VIT UNIVERSITY,

More information

Distributed Spectrum Allocation via Local Bargaining

Distributed Spectrum Allocation via Local Bargaining Distibuted Spectum Allocation via Local Bagaining Lili Cao Shanghai Jiaotong Univesity, Shanghai, P.R. China Email: cao li li@yahoo.com Haitao Zheng Micosoft Reseach Asia, Beijing, P.R. China Email: htzheng@ieee.og

More information

QoE Enhancement of Audio Video IP Transmission with IEEE e EDCA in Mobile Ad Hoc Networks

QoE Enhancement of Audio Video IP Transmission with IEEE e EDCA in Mobile Ad Hoc Networks QoE Enhancement of Audio Video IP Tansmission with IEEE 8.e in Mobile Ad Hoc Netwoks Toshio Nunome and Shuji Tasaka Depatment of Compute Science and Engineeing, Gaduate School of Engineeing, Nagoya Institute

More information

Probabilistic Spectrum Assignment for QoS-constrained Cognitive Radios with Parallel Transmission Capability

Probabilistic Spectrum Assignment for QoS-constrained Cognitive Radios with Parallel Transmission Capability Pobabilistic Spectum Assignment fo QoS-constained Cognitive Radios with Paallel Tansmission Capability Haythem Ahmad any Salameh epatment of Telecommunication Engineeing Yamouk Univesity haythem@yuedujo

More information

Power Minimization in Uni-directional Relay Networks with Cognitive Radio Capabilities

Power Minimization in Uni-directional Relay Networks with Cognitive Radio Capabilities 00 5th Intenational Symposium on elecommunications (IS'00) Poe Minimization in Uni-diectional Relay Netoks ith Cognitive Radio Capabilities Adalan Alizadeh Seyed Mohammad-Sajad Sadough Cognitive elecommunication

More information

An Improved Implementation of Activity Based Costing Using Wireless Mesh Networks with MIMO Channels

An Improved Implementation of Activity Based Costing Using Wireless Mesh Networks with MIMO Channels Poceedings of the 10th WSEAS Intenational Confenence on APPLIED MATHEMATICS, Dallas, Texas, USA, Novembe 1-3, 2006 262 An Impoved Implementation of Activity Based Costing Using Wieless Mesh Netwoks with

More information

Design of A Circularly Polarized E-shaped Patch Antenna with Enhanced Bandwidth for 2.4 GHz WLAN Applications

Design of A Circularly Polarized E-shaped Patch Antenna with Enhanced Bandwidth for 2.4 GHz WLAN Applications VNU Jounal of Science: Comp. Science & Com. Eng., Vol. 31, No. 2 (2015) 1-7 Design of A Ciculaly Polaized E-shaped Patch Antenna with Enhanced Bandwidth fo 2.4 GHz WLAN Applications Hong Van Tam 1, Luong

More information

Low-Complexity Time-Domain SNR Estimation for OFDM Systems

Low-Complexity Time-Domain SNR Estimation for OFDM Systems Low-Complexity Time-Domain SR Estimation fo OFDM Systems A. jaz, A.B. Awoseyila and B.G. Evans A low-complexity SR estimation algoithm fo OFDM systems in fequency-selective fading channels is poposed.

More information

Chamber Influence Estimation for Radiated Emission Testing in the Frequency Range of 1 GHz to 18 GHz

Chamber Influence Estimation for Radiated Emission Testing in the Frequency Range of 1 GHz to 18 GHz Chambe Influence Estimation fo Radiated Emission Testing in the Fequency Range of 1 GHz to 18 GHz Alexande Kiz Electomagnetic Compatibility and RF-Engineeing ARC eibesdof eseach GmbH eibesdof, Austia alexande.kiz@acs.ac.at

More information

Regionalized Interference Alignment in Two-Tiered Cognitive Heterogeneous Networks

Regionalized Interference Alignment in Two-Tiered Cognitive Heterogeneous Networks Jounal of Communications Vol 9, No, Novembe egionalized Intefeence Alignment in Two-Tieed Cognitive eteogeneous Netwoks Jingwen Yang, Li Li*, and Xiaoping Zhou College of Infomation, echanical and Electical

More information

WIRELESS SENSORS EMBEDDED IN CONCRETE

WIRELESS SENSORS EMBEDDED IN CONCRETE 7th Euopean Wokshop on Stuctual Health Monitoing July 8-11, 2014. La Cité, Nantes, Fance Moe Info at Open Access Database www.ndt.net/?id=17296 WIRELESS SENSORS EMBEDDED IN CONCRETE Amal Abbadi 1 Phd Student,

More information

A Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels

A Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels A Tansmission Scheme fo Continuous ARQ Potocols ove Undewate Acoustic Channels Mingsheng Gao 1, Wee-Seng Soh 1 and Meixia Tao 2 1 Dept. of Electical & Compute Engineeing, National Univesity of Singapoe,

More information

INVESTIGATION OF CLOSE-TO-WALL WIRELESS SENSOR DEPLOYMENT USING 2D FINITE-DIFFERENCE TIME-DOMAIN MODELLING. Y. Wu and I. J.

INVESTIGATION OF CLOSE-TO-WALL WIRELESS SENSOR DEPLOYMENT USING 2D FINITE-DIFFERENCE TIME-DOMAIN MODELLING. Y. Wu and I. J. 2 nd Intenational Confeence on Wieless Communications in Undegound and Confined Aeas August 25-27, 2008 Val-d O - Québec - Canada INVESTIGATION OF CLOSE-TO-WALL WIRELESS SENSOR DEPLOYMENT USING 2D FINITE-DIFFERENCE

More information

Optic Cable Tracking and Positioning Method Based on Distributed Optical Fiber Vibration Sensing

Optic Cable Tracking and Positioning Method Based on Distributed Optical Fiber Vibration Sensing 08 5th Intenational Confeence on Electical & Electonics Engineeing and Compute Science (ICEEECS 08) Optic Cable Tacking and Positioning Method Based on Distibuted Optical Fibe Vibation Sensing Zhang Chao,

More information

PERFORMANCE OF TOA ESTIMATION TECHNIQUES IN INDOOR MULTIPATH CHANNELS

PERFORMANCE OF TOA ESTIMATION TECHNIQUES IN INDOOR MULTIPATH CHANNELS PERFORMANCE OF TOA ESTIMATION TECHNIQUES IN INDOOR MULTIPATH CHANNELS Xinong Li, Kaveh Pahlavan, and Jacques Beneat Cente fo Wiele Infomation Netwo Studies Electical and Compute Engineeing Depatment, Woceste

More information

STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM

STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM H PRASHANTHA KUMAR et. al.: STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM DOI:.297/ijct.22.69 STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL

More information

Feasibility of a triple mode, low SAR material coated antenna for mobile handsets

Feasibility of a triple mode, low SAR material coated antenna for mobile handsets Loughboough Univesity Institutional Repositoy Feasibility of a tiple mode, low SAR mateial coated antenna fo mobile handsets This item was submitted to Loughboough Univesity's Institutional Repositoy by

More information

IEEE Broadband Wireless Access Working Group < Modifications to the Feedback Methodologies in UL Sounding

IEEE Broadband Wireless Access Working Group <  Modifications to the Feedback Methodologies in UL Sounding Poject Title Date Submitted IEEE 802.16 Boadband Wieless Access Woking Goup Modifications to the Feedback Methodologies in UL Sounding 2008-01-14 Souce(s) Fed Vook, Jeff Zhuang,

More information

Antenna fundamentals: With answers to questions and problems (See also Chapter 9 in the textbook.)

Antenna fundamentals: With answers to questions and problems (See also Chapter 9 in the textbook.) adio Technology Metopolia/A. Koivumäki Antenna fundamentals: With answes to questions and poblems (See also Chapte 9 in the textbook.) 1. a) Make up a definition fo the tem "antenna". Answe: One definition:

More information

Analytical Performance Evaluation of Mixed Services with Variable Data Rates for the Uplink of UMTS

Analytical Performance Evaluation of Mixed Services with Variable Data Rates for the Uplink of UMTS Analytical Pefomance Evaluation of Mixed Sevices with Vaiable Data Rates fo the Uplink of UMTS Laissa Popova and Wolfgang Koch Lehstuhl fü Mobilkommunikation, Univesität Elangen-Nünbeg, Gemany Email: {popova,

More information

Steve Alpern, Thomas Lidbetter, Alec Morton, and Katerina Papadaki Patrolling a pipeline

Steve Alpern, Thomas Lidbetter, Alec Morton, and Katerina Papadaki Patrolling a pipeline Steve Alpen, Thomas Lidbette, Alec Moton, and Kateina Papadaki Patolling a pipeline Book section Oiginal citation: Oiginally published in Alpen, Steven, Lidbette, Thomas, Moton, Alec and Papadaki, Kateina

More information

The Periodic Ambiguity Function Its Validity and Value

The Periodic Ambiguity Function Its Validity and Value The Peiodic Ambiguity Function Its Validity and Value Nadav Levanon Dept. of Electical Engineeing Systems Tel Aviv Univesity Tel Aviv, Isael nadav@eng.tau.ac.il Abstact The peiodic ambiguity function (PAF)

More information

Cyclic Constellation Mapping Method for PAPR Reduction in OFDM system

Cyclic Constellation Mapping Method for PAPR Reduction in OFDM system 2013 8th Intenational Confeence on Communications and Netwoking in China (CHINACOM) Cyclic Constellation Mapping Method fo PAPR Reduction in OFDM system Yong Cheng, Jianhua Ge, Jun Hou, and Fengkui Gong

More information

Near-field Computation and. Uncertainty Estimation using Basic. Cylindrical-Spherical Formulae

Near-field Computation and. Uncertainty Estimation using Basic. Cylindrical-Spherical Formulae Nea-field Computation and Uncetainty Estimation using Basic Cylindical-Spheical Fomulae Poject... IEC 63 Subject... Basic Nea-Field Computation Document numbe... N/A Revision... 3 Autho... F.D. du Plessis

More information

The reliability of wireless backhaul mesh networks

The reliability of wireless backhaul mesh networks The eliability of wieless backhaul mesh netwoks Gei Egeland 1, Paal E. Engelstad 2 1 Depatment of Electical and Compute Engineeing, Univesity of Stavange, 4036 Stavange Noway 1 gei.egeland@gmail.com 2

More information

NICKEL RELEASE REGULATIONS, EN 1811:2011 WHAT S NEW?

NICKEL RELEASE REGULATIONS, EN 1811:2011 WHAT S NEW? NICKEL RELEASE REGULATIONS, EN 1811:2011 WHAT S NEW? BACKGROUND: EN 1811 is the intenationally ecognised test method which was devised almost 12 yeas ago to detemine the ate of nickel elease fom jewelley,

More information

Performance Evaluation of Maximum Ratio combining Scheme in WCDMA System for Different Modulations

Performance Evaluation of Maximum Ratio combining Scheme in WCDMA System for Different Modulations Intenational Jounal of Emeging Technologies in Engineeing Reseach (IJETER) Volume 4, Issue 5, ay (6) www.ijete.evescience.og efomance Evaluation of aimum Ratio combining Scheme in WCDA System fo Diffeent

More information

Optimised Wireless Network Using Smart Mobile Terminal Antenna (SMTA) System

Optimised Wireless Network Using Smart Mobile Terminal Antenna (SMTA) System Optimised Wieless Netwok Using Smat Mobile Teminal Antenna (SMTA) System Autho Lu, Junwei, Sciven, Ian, Wate, Wayne Published 2010 Confeence Title Poceedings of IEEE APEMC2010 DOI https://doi.og/10.1109/apemc.2010.5475858

More information

Key Laboratory of Earthquake Engineering and Engineering Vibration, China Earthquake Administration, China

Key Laboratory of Earthquake Engineering and Engineering Vibration, China Earthquake Administration, China Shake Table Test fo Lage Indiect-Ai-Cooling Towe Stuctue of Fie Powe Plant Pat I Junwu DAI, Yongqiang YANG & Xuan WNG Key Laboatoy of athquake ngineeing and ngineeing Vibation, China athquake Administation,

More information

Spread Spectrum Codes Identification by Neural Networks

Spread Spectrum Codes Identification by Neural Networks in "Systems and Contol: heoy and Applications", published by WSES, 2, pp. 257-262, ISBN 96-852-4 Spead Spectum Codes Identification by Neual Netwoks Céline BOUDER, Gilles BUREL Laboatoie d Electonique

More information

Design of an LLC Resonant Converter Using Genetic Algorithm

Design of an LLC Resonant Converter Using Genetic Algorithm Design of an LLC Resonant Convete Using Genetic Algoithm H. H. Nien, C. K. Huang, S. K. Changchien, C. H Chan Dept. of Electical Engineeing, Chienkuo Technology Univesity E-mail: nien@ctu.edu.tw Dept,

More information

Available online at ScienceDirect. Procedia Engineering 100 (2015 )

Available online at  ScienceDirect. Procedia Engineering 100 (2015 ) Available online at www.sciencediect.com ScienceDiect Pocedia Engineeing 1 (215 ) 1 14 25th DAAAM Intenational Symposium on Intelligent Manufactuing and Automation DAAAM 214 Measuement of Complex Pemittivity

More information

ABSTRACTT FFT FFT-' Proc. of SPIE Vol U-1

ABSTRACTT FFT FFT-' Proc. of SPIE Vol U-1 Phase econstuction stategies in phase-locking system based on multi-apetue wave font sensos P.A. Semenov, S.D. Pol skikh Shvabe-Reseach, Moscow, Russian Fedeation; e-mail: pite@bk.u ABSTRACTT System of

More information

MACRO-DIVERSITY VERSUS MICRO-DIVERSITY SYSTEM CAPACITY WITH REALISTIC RECEIVER RFFE MODEL

MACRO-DIVERSITY VERSUS MICRO-DIVERSITY SYSTEM CAPACITY WITH REALISTIC RECEIVER RFFE MODEL MACRO-DIVERSITY VERSUS MICRO-DIVERSITY SYSTEM CAACITY WITH REALISTIC RECEIVER RFFE MODEL I Ouachani, Duhamel, K Gosse, S Rouquette-Léveil and D Bateman *Laboatoie des Signaux et Systèmes 3 ue Joliot-Cuie

More information

CCSDS Coding&Synchronization Working Group March Washington DC, USA SLS-C&S_08-CNES02

CCSDS Coding&Synchronization Working Group March Washington DC, USA SLS-C&S_08-CNES02 CCSDS Coding&Synchonization Woking Goup Mach 2008 1 Washington DC, USA DVB-S2 like fame constuction and LDPC codes ate o/and size extension fo use of Vaiable Coding & Modulation suitable fo X and Ka bands

More information

Design of FIR Filter using Filter Response Masking Technique

Design of FIR Filter using Filter Response Masking Technique Design of FIR Filte using Filte Response Masking Technique Sandeep Shivastava, Alok Jain, Ram Kuma Soni Abstact- In this pape autho is tying to implement Fequency esponse masking (FRM) technique. In this

More information

HYBRID FUZZY PD CONTROL OF TEMPERATURE OF COLD STORAGE WITH PLC

HYBRID FUZZY PD CONTROL OF TEMPERATURE OF COLD STORAGE WITH PLC Jounal of Theoetical and Applied Infomation Technology 28 th Febuay 2013. Vol. 48 No.3 2005-2013 JATIT & LLS. All ights eseved. ISSN: 1992-8645 www.jatit.og E-ISSN: 1817-3195 HYBRID FUZZY PD CONTROL OF

More information

Channel Modelling ETIM10. Fading Statistical description of the wireless channel

Channel Modelling ETIM10. Fading Statistical description of the wireless channel Channel Modelling ETIM10 Lectue no: 3 Fading Statistical desciption of the wieless channel Ghassan Dahman \ Fedik Tufvesson Depatment of Electical and Infomation Technology Lund Univesity, Sweden 013-01-8

More information

Analysis of the optimized low-nonlinearity lateral effect sensing detector

Analysis of the optimized low-nonlinearity lateral effect sensing detector Jounal of hysics: Confeence Seies Analysis of the optimized low-nonlineaity lateal effect sensing detecto To cite this aticle: Saeed Olyaee et al J. hys.: Conf. Se. 76 4 Related content - Neual netwok

More information

Design and Characterization of Conformal Microstrip Antennas Integrated into 3D Orthogonal Woven Fabrics

Design and Characterization of Conformal Microstrip Antennas Integrated into 3D Orthogonal Woven Fabrics Design and Chaacteization of Confomal Micostip Antennas Integated into 3D Othogonal Woven Fabics Xin Wang 1, Lan Yao 1, Fujun Xu 2, Dongchun Zhou 1, Yiping Qiu 1 1 College of Textiles, Donghua Univesity,

More information

Realistic Simulation of a Wireless Signal Propagation in an Urban Environment

Realistic Simulation of a Wireless Signal Propagation in an Urban Environment Realistic Simulation of a Wieless Signal Popagation in an Uban Envionment Keyukuma J. Patel Univesity of Southen Queensland Toowoomba, Austalia e-mail: keyupatel@ieee.og Andew Y. J. Lee Nanyang Technological

More information

Analysis of a Fractal Microstrip Patch Antenna

Analysis of a Fractal Microstrip Patch Antenna 124 Analysis of a Factal Micostip Patch Antenna Vibha Rani Gupta and Nisha Gupta* Bila Institute of Technology, Mesa, Ranchi-835215, Jhakhand, India. vgupta@bitmesa.ac.in, ngupta@bitmesa.ac.in Abstact-

More information

Journal of Applied Science and Agriculture

Journal of Applied Science and Agriculture Jounal of Applied Science and Agicultue, 9(16) Octobe 214, Pages: 1-15 AENSI Jounals Jounal of Applied Science and Agicultue ISSN 1816-9112 Jounal home page: www.aensiweb.com/jasa A Design of New Bluetooth

More information

Experimental Investigation of Influence on Non-destructive Testing by Form of Eddy Current Sensor Probe

Experimental Investigation of Influence on Non-destructive Testing by Form of Eddy Current Sensor Probe Expeimental Investigation of Influence on Non-destuctive Testing by Fom of Eddy Cuent Senso Pobe Fengyun Xie * and Jihui Zhou School of Mechanical and Electonical Engineeing, East China Jiaotong Univesity,

More information

2D Coding for Future Perpendicular and Probe Recording

2D Coding for Future Perpendicular and Probe Recording 2D Coding fo Futue Pependicula and Pobe Recoding Joseph A. O Sullivan Naveen Singla Ronald S. Indec Washington Univesity Saint Louis, Missoui s Outline: 2D Coding fo 2D ISI Motivation: 2D Intesymbol Intefeence

More information

Analysis and Implementation of LLC Burst Mode for Light Load Efficiency Improvement

Analysis and Implementation of LLC Burst Mode for Light Load Efficiency Improvement Analysis and Implementation of LLC Bust Mode fo Light Load Efficiency Impovement Bin Wang, Xiaoni Xin, Stone Wu, Hongyang Wu, Jianping Ying Delta Powe Electonics Cente 238 Minxia Road, Caolu Industy Zone,

More information

GAMMA SHAPED MONOPOLE PATCH ANTENNA FOR TABLET PC

GAMMA SHAPED MONOPOLE PATCH ANTENNA FOR TABLET PC GAMMA SHAPED MONOPOLE PATCH ANTENNA FOR TABLET PC Islam Md. Rafiqul, Mohammad Shawkat Habib and Khaizuan Abdullah Depatment of Electical and Compute Engineeing, Intenational Islamic Univesity Malaysia,

More information

ISSN: [Reddy & Rao* et al., 5(12): December, 2016] Impact Factor: 4.116

ISSN: [Reddy & Rao* et al., 5(12): December, 2016] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY SIMULATION COMPARISONS OF INDUCTION MOTOR DRIVE WITH ESTIMATOR AND PLL V. Nasi Reddy *, S. Kishnajuna Rao*, S.Nagenda Kuma * Assistant

More information

An Efficient Control Approach for DC-DC Buck-Boost Converter

An Efficient Control Approach for DC-DC Buck-Boost Converter 2016 Published in 4th Intenational Symposium on Innovative Technologies in Engineeing and Science 3-5 Novembe 2016 (ISITES2016 Alanya/Antalya - Tukey) An Efficient Contol Appoach fo DC-DC Buck-Boost Convete

More information

DESIGN AND PARAMETRIC EVALUATION OF RECTANGULAR MICROSTRIP PATCH ANTENNA FOR GSM APPLICATION

DESIGN AND PARAMETRIC EVALUATION OF RECTANGULAR MICROSTRIP PATCH ANTENNA FOR GSM APPLICATION DESIGN AND PARAMETRIC EVALUATION OF RECTANGULAR MICROSTRIP PATCH ANTENNA FOR GSM APPLICATION RAHUL T. DAHATONDE, SHANKAR B. DEOSARKAR Dept. of E & TC, D. Babasaheb Ambedka Technological Univesity, Lonee,

More information

Design and Implementation of 4 - QAM VLSI Architecture for OFDM Communication

Design and Implementation of 4 - QAM VLSI Architecture for OFDM Communication Design and Implementation of 4 - QAM VLSI Achitectue fo OFDM Communication R. Achitha 1, S. Bhagyalakshmi 2, V. Jaya Suthi 3, D. T. Menakadevi 4 U.G. Students, Depatment of ECE, Adhiyamaan College of Engineeing,

More information

Performance Analysis of Z-Source Inverter Considering Inductor Resistance

Performance Analysis of Z-Source Inverter Considering Inductor Resistance Pefomance Analysis of Z-Souce Invete Consideing Inducto Resistance Fatma A. Khea * and Essam Eddin M. Rashad ** Electic Powe and Machines Engineeing Depatment, Faculty of Engineeing, anta Univesity, anta,

More information

Microwave Finite Element Modeling Applications to Coupled Electromagnetic-Thermal Problems and Characterization of Dielectric Materials

Microwave Finite Element Modeling Applications to Coupled Electromagnetic-Thermal Problems and Characterization of Dielectric Materials Micowave Finite Element Modeling Applications to Coupled Electomagnetic-Themal Poblems and Chaacteization of Dielectic Mateials Hulusi Acikgoz, Yann Le Bihan, Olivie Meye, and Lionel Pichon Laboatoie de

More information

Taking Advantage of Overhearing in Low Power Listening WSNs: A Performance Analysis of the LWT-MAC Protocol

Taking Advantage of Overhearing in Low Power Listening WSNs: A Performance Analysis of the LWT-MAC Protocol DOI.7/s36--28-4 Taking Advantage of Oveheaing in Low Powe Listening WSNs: A Pefomance Analysis of the LWT-MAC Potocol Cistina Cano Bois Bellalta Anna Sfaiopoulou Miquel Olive Jaume Baceló Spinge Science+Business

More information

Synopsis of Technical Report: Designing and Specifying Aspheres for Manufacturability By Jay Kumler

Synopsis of Technical Report: Designing and Specifying Aspheres for Manufacturability By Jay Kumler OPTI 51 Synopsis (Gad Requiement #1) G. Desoches Synopsis of Technical Repot: Designing and Specifying Asphees fo Manufactuability By Jay Kumle Novembe 1, 007 Reviewed by: Gead Desoches Abstact Since asphees

More information

The Effect of Interference in Vehicular Communications on Safety Factors

The Effect of Interference in Vehicular Communications on Safety Factors The Effect of Intefeence in Vehicula Communications on Safety Factos Ali Rakhshan School of Electical and Compute Engineeing Johns Hopkins Univesity Baltimoe, Mayland Emails: aakhsh1@jhu.edu axiv:1706.05758v2

More information

Hexagonal Shaped Microstrip Patch Antenna for Satellite and Military Applications

Hexagonal Shaped Microstrip Patch Antenna for Satellite and Military Applications Intenational Jounal of Engineeing and Advanced Technology (IJEAT) ISSN: 49 8958, Volume-7 Issue-5, June 08 Hexagonal Shaped Micostip Patch Antenna fo Satellite and Militay Applications Jayaenjini N, Unni

More information

Statement of Works Data Template Version: 4.0 Date:

Statement of Works Data Template Version: 4.0 Date: Statement of Woks Data Template Vesion: 4.0 Date: 16.08.17 This Statement of Woks (SoW) Data Template is to be completed by Distibution Netwok Opeatos (DNOs) in ode to povide National Gid the equied data

More information

Spatial Coding Techniques for Molecular MIMO

Spatial Coding Techniques for Molecular MIMO Spatial Coding Techniques fo Molecula MIMO Matin Damath, H. Bikan Yilmaz, Chan-Byoung Chae, and Pete Adam Hoehe Faculty of Engineeing, Kiel Univesity, Gemany, Email: {md, ph}@tf.uni-kiel.de School of Integated

More information

LLR Reliability Improvement for Multilayer Signals

LLR Reliability Improvement for Multilayer Signals LLR Reliability mpovement fo Multilaye Signals C. Regueio, J. Baueco, J. Montalban, P. Angueia, J.L. Odiales, M. Velez Abstact The limitations and igidness of cuent use of spectum esouces have fosteed

More information

Sliding Mode Control for Half-Wave Zero Current Switching Quasi-Resonant Buck Converter

Sliding Mode Control for Half-Wave Zero Current Switching Quasi-Resonant Buck Converter Sliding Mode Contol fo Half-Wave Zeo Cuent Switching Quasi-Resonant Buck Convete M. Ahmed, Student membe, IEEE, M. Kuisma, P. Silventoinen Abstact This pape focuses on the pactical implementation of sliding

More information

Variance? which variance? R squared effect size measures in simple mediation models

Variance? which variance? R squared effect size measures in simple mediation models Vaiance? which vaiance? squaed effect size measues in simple mediation models M This is it? med di X de Heus, P. (01). squaed effect size measues and ovelap between diect and indiect effect in mediation

More information

Performance analysis of ARQ Go-Back-N protocol in fading mobile radio channels

Performance analysis of ARQ Go-Back-N protocol in fading mobile radio channels MILCOM 95, SAN IEGO, CA, NOV. 995 Pefomance analysis of ARQ Go-Back-N potocol in fading mobile adio channels Michele Zozi y, Ramesh R. Rao z, Lauence B. Milstein z y ipatimento di Elettonica e Infomazione,

More information

A New Method of VHF Antenna Gain Measurement Based on the Two-ray Interference Loss

A New Method of VHF Antenna Gain Measurement Based on the Two-ray Interference Loss 7 nd Intenational Confeence on Atificial Intelligence and Engineeing Applications (AIEA 7) ISBN: 978--6595-485- A New Method of VH Antenna Gain Measuement Based on the Two-ay Intefeence Loss ZHIEI YANG,

More information

Fisher Information of Mine Collapse Hole Detection Based on Sensor Nodes Connectivity

Fisher Information of Mine Collapse Hole Detection Based on Sensor Nodes Connectivity Sensos & Tansduces, Vol. 3, Special Issue, July 3, pp. 8-87 Sensos & Tansduces 3 by IFSA http://www.sensospotal.com Fishe Infomation of Mine Collapse Hole Detection Based on Senso Nodes Connectivity, Shengbo

More information

Demosaicking using Adaptive Bilateral Filters

Demosaicking using Adaptive Bilateral Filters Demosaicking using Adaptive Bilateal Filtes Ekine Akuiyibo Timothy Atobatele EE 362, Winte 2006 0. Abstact Digital cameas sample the continuous spectum using an aay of colo filtes such that each pixel

More information

Small Loop Antenna and Duality Theorem

Small Loop Antenna and Duality Theorem Small Loop Antenna and Duality Theoem Page 1 Small Loop Antenna and Duality Theoem Having studied the ideal electic dipole we now tun ou attention to an inteesting antenna closely elated to the electic

More information

Comparison Between Known Propagation Models Using Least Squares Tuning Algorithm on 5.8 GHz in Amazon Region Cities

Comparison Between Known Propagation Models Using Least Squares Tuning Algorithm on 5.8 GHz in Amazon Region Cities 106 Compaison Between Known Popagation Models Using Least Squaes Tuning Algoithm on 5.8 GHz in Amazon Region Cities Buno S. L. Casto, Mácio R. Pinheio, Gevásio P. S. Cavalcante Fedeal Univesity of Paá

More information

Diagnosis method of radiated emission from battery management system for electric vehicle

Diagnosis method of radiated emission from battery management system for electric vehicle Available online at www.sciencediect.com ScienceDiect Enegy Pocedia 88 (2016 ) 662 667 CUE2015-Applied Enegy Symposium and Summit 2015: Low cabon cities and uban enegy systems Diagnosis method of adiated

More information

Modulation and Coding Classification for Adaptive Power Control in 5G Cognitive Communications

Modulation and Coding Classification for Adaptive Power Control in 5G Cognitive Communications Modulation and Coding Classification fo Adaptive Powe Contol in 5G Cognitive Communications Anestis Tsakmalis, Symeon Chatzinotas and Bjön Ottesten SnT - secuityandtust.lu, Univesity of Luxemboug Email:{anestis.tsakmalis,

More information

The Experimental Study of Possibility for Radar Target Detection in FSR Using L1-Based Non-Cooperative Transmitter

The Experimental Study of Possibility for Radar Target Detection in FSR Using L1-Based Non-Cooperative Transmitter The Expeimental Study of Possibility fo Rada Taget Detection in FSR Using L1-Based on-coopeative Tansmitte Ch. Kabakchiev 1, I. Gavanov, V. Beha 3, H. Rohling 4 1 Faculty of Mathematics & Infomatics,Sofia

More information

Study and Design of Dual Frequency High Gain and Conformal Microstrip Patch Antenna

Study and Design of Dual Frequency High Gain and Conformal Microstrip Patch Antenna , pp.236-243 http://dx.doi.og/10.14257/astl.2017.147.33 Study and Design of Dual Fequency High Gain and Confomal Micostip Patch Antenna S. Auna 1, K. Sinivasa Naik 2, J. Ramesh 2 and D. Madhu 2 1 Andha

More information

Residual Self-Interference Mitigation in Full-Duplex Two-Way MIMO Relaying Network

Residual Self-Interference Mitigation in Full-Duplex Two-Way MIMO Relaying Network Residual Self-Intefeence Mitigation in Full-Duplex Two-Way MIMO Relaying Netwok Thesis submitted in patial fulfillment of the equiements fo the degee of Maste of Science in Electonics and Communications

More information

Analysis of Occurrence of Digit 0 in Natural Numbers Less Than 10 n

Analysis of Occurrence of Digit 0 in Natural Numbers Less Than 10 n meican Intenational Jounal of Reseach in Fomal, pplied & Natual Sciences vailable online at http://www.iasi.net ISSN (Pint): 2328-3777, ISSN (Online): 2328-3785, ISSN (CD-ROM): 2328-3793 IJRFNS is a efeeed,

More information

Optimization of the law of variation of shunt regulator impedance for Proximity Contactless Smart Card Applications to reduce the loading effect.

Optimization of the law of variation of shunt regulator impedance for Proximity Contactless Smart Card Applications to reduce the loading effect. Optimization of the law of vaiation of shunt egulato impedance fo Poximity Contactless Smat Cad Applications to educe the loading effect. Catheine Maechal, Dominique Paet. Laboatoie LIT ESIGETEL, ue du

More information

ASSESSMENT OF WIRELESS COMMUNICATION QUALITY BASED ON INDUSTRIAL NOISE

ASSESSMENT OF WIRELESS COMMUNICATION QUALITY BASED ON INDUSTRIAL NOISE Jounal of Theoetical and Applied Infomation Technology 30 th Septembe 2012. Vol. 43 No.2 2005-2012 JATIT & S. All ights eseved. ISSN: 1992-8645 www.jatit.og E-ISSN: 1817-3195 ASSESSMENT OF WIREESS COMMUNICATION

More information

Throughput Maximization of Ad-hoc Wireless Networks Using Adaptive Cooperative Diversity and Truncated ARQ

Throughput Maximization of Ad-hoc Wireless Networks Using Adaptive Cooperative Diversity and Truncated ARQ IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 56, NO. 11, NOVEMBER 008 1907 Thoughput Maimization of Ad-hoc Wieless Netwoks Using Adaptive Coopeative Divesity and Tuncated ARQ Lin Dai, Membe, IEEE, and Khaled

More information

Communication and Compression in Dense Networks of Unreliable Nodes. Dragan Rade Petrović

Communication and Compression in Dense Networks of Unreliable Nodes. Dragan Rade Petrović Communication and Compession in Dense Netwos of Uneliable Nodes by Dagan Rade Petović B.S. (Univesity of Illinois at Ubana-Champaign) 999 M. S. (Univesity of Califonia, Beeley) 00 A dissetation submitted

More information

ScienceDirect. Simplified Generation of Electromagnetic Field within EMC Immunity Test Area

ScienceDirect. Simplified Generation of Electromagnetic Field within EMC Immunity Test Area Available online at www.sciencediect.com ScienceDiect Pocedia Engineeing 69 ( 014 ) 7 34 4th DAAAM Intenational Symposium on Intelligent Manufactuing and Automation, 013 Simplified Geneation of Electomagnetic

More information

Impact of Two Realistic Mobility Model for Vehicular Safety Applications

Impact of Two Realistic Mobility Model for Vehicular Safety Applications Impact of Two Realistic Model fo Vehicula Safety Applications Md. Habibu Rahman Dept. of Compute Science Ameican Intenational Univesity-Bangladesh Dhaka, Bangladesh E-mail: mmmhabib@gmail.com Mohammad

More information

Binary Systematic Network Coding for Progressive Packet Decoding

Binary Systematic Network Coding for Progressive Packet Decoding Binay Systematic etwok Coding fo Pogessive Packet Decoding Andew L. Jones, Ioannis Chatzigeogiou and Andea Tassi School of Computing and Communications, Lancaste Univesity, United Kingdom Email: {a.jones2,

More information

New Approach for Optimizing Control of Switched Reluctance Generator

New Approach for Optimizing Control of Switched Reluctance Generator New Appoach fo Optimizing Contol of Switched Reluctance Geneato R. Rebbah, A. Bentounsi and H. Benalla Abstact This pape pesents a new switching appoach that detemines the optimal contol of the Switched

More information

Volume 1, Number 1, 2015 Pages 1-12 Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages 1-12 Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume, Numbe, 5 Pages - Jodan Jounal of Electical Engineeing ISSN (Pint): 49-96, ISSN (Online): 49-969 Discimination between Tansfome Inush Cuent and Intenal Fault using Combined DFT-ANN Appoach

More information

The Marginal Utility of Cooperation in Sensor Networks

The Marginal Utility of Cooperation in Sensor Networks e Maginal Utility of Coopeation in Senso Netwoks Yu-Ching Tong, Geg Pottie Depatment of Electical Engineeing Univesity of Califonia, Los Angeles Los Angeles, Califonia 99 Email: yuching@ee.ucla.edu, pottie@icsl.ucla.edu

More information

Control Limits of Three-Phase AC Voltage Controller under Induction Motor Load A. I. Alolah Ali M. Eltamaly R. M. Hamouda

Control Limits of Three-Phase AC Voltage Controller under Induction Motor Load A. I. Alolah Ali M. Eltamaly R. M. Hamouda Contol Liits of Thee-Phase AC Voltage Contolle unde Induction Moto Load A. I. Alolah Ali M. Eltaaly R. M. Haouda Abstact Thyistos ae now widely used in any powe electonics and otos dives applications.

More information