Location-based Access Control. Outline. Why do we need location in WSN? SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks
|
|
- Bartholomew Montgomery
- 5 years ago
- Views:
Transcription
1 SeRLoc: Secure Range-Independent Localization for Wirele Senor Network Louka Lazo Advior: Radha Poovendran Network Security Lab Univerity of Wahington Outline Motivation Secure Localization Problem SeRLoc Threat and defene Performance Evaluation Concluion 2 Why do we need location in WSN? Network function Location-dependent ervice Acce Control Location-baed Acce Control Microphone uername Databae query Monitoring App 3 Acce i decided baed on the location of the uer. Different privilege for variou area 4 1
2 Geographical Routing Report Monitoring Information Accelerometer 3 8 A B A want to end a meage to B Each node forward the meage to the neighbor cloet to the detination. Monitor the tructural health of the bridge Senor aociate their location with the reporting data 5 6 Localization Problem Localization: Senor Location Etimation How do enor become aware of their poition when they are randomly deployed or mobile? Algorithm Deign conideration What type of localization i required? Coare or Fine Grain? Where i the WSN deployed? Indoor or Outdoor What are the capabilitie of the enor? Hardware and Power Contraint Claification of Loc. Scheme Indoor v. Outdoor: GPS, VOR, Centroid (outdoor), RADAR, Active Bat, AhLo, (indoor). Infratructurele (I-L) v. Infratructure baed (I-B): AhLo, Amorphou, DV-Hop (I-L), RADAR, Active Bat, AVL (I-B). Range-baed (R-B) v. Range-Independent (R-I): Radar, Ahlo, GPS, Active Bat, VOR (R-B), APIT, DV-Hop, Amorphou, Centroid (R-I)
3 Localization in un-truted environment Previou cheme aumed truted node and no external attack, but WSN may be deployed in hotile environment Several threat in WSN localization: Replay attack, Node Imperonation attack, Compromie of network entitie. Secure Localization Problem Secure Localization: Enure robut location etimation even in the preence of adverarie. Related work: An Aymmetric Security Mechanim for navigation ignal [Kuhn 2004]. Secure Poitioning of Wirele Device with Application to Senor Network (SPINE) [Capkun et al, Infocom 2004] Outline Motivation Problem Decription SeRLoc Threat and defene Performance Concluion Our Approach: SeRLoc SeRLoc: SEcure Range-independent LOCalization SeRLoc feature Paive Localization, Robut againt ource of error, Decentralized Implementation, Scalable. Robut againt attack - Lightweight ecurity
4 Network Model Aumption (1) Two-tier network architecture Locator: Known Directional Location, Randomly deployed Orientation Antenna Senor range r r (X 2, Y 2 ) Senor: Omnidirectional Randomly deployed, Antenna unknown location (X 4, Y 4 ) Network Model Aumption (2) Locator deployment: Homogeneou Poion point proce of rate ρ L Random patial ditribution. Beamwidth θ (X 1, Y 1 ) θ R (X 3, Y 3 ) (X 5, Y 5 ) Senor deployment: Poion point proce of rate ρ independent of locator deployment Or can be een a Random ampling with rate ρ. Locator Senor Locator range R W N S E P ρ πr k! 2 k ( ) ( ) 2 L ρlπr LH = k = e LH : Locator heard at a enor The Idea of SeRLoc L 2 Locator Senor ROI ROI = Each locator L i tranmit information that define the ector S i, covered by each tranmiion. Senor define the region of interection (ROI), from all locator it hear. LH I S i i=1 SeRLoc Step 1: Beacon reception (0, 0) Locator Senor θ 2,2 L 2: (X 2, Y 2 ) θ 2,1 Locator : L 2 : : : The enor collect information from all the locator that it can hear. Coordinate (X 1, Y 1 ) (X 2, Y 2 ) (X 3, Y 3 ) (X 4, Y 4 ) Slope [θ 1,1, θ 1,2 ] [θ 2,1, θ 2,2 ] [θ 3,1, θ 3,2 ] [θ 4,1, θ 4,2 ]
5 SeRLoc Step 2: Search area Locator (X (X max -R, Y min +R) 1, Y 1 ) L 2 R R (X max -R, Y max -R) (X 2, Y 2 ) 2R+X min -X max Senor Search Area (X (X min +R, Y min +R) 4, Y 4 ) X min = min { X i i LH } (X R 3, Y 3 ) Y min = min { Y i i LH } Define: X max = max { Y i i LH } Locator heard by the enor Y max = max { Y i i LH } (X min +R, Y max -R) Senor place a grid of equally paced point into the earch area SeRLoc Step 3: Grid-ector tet Locator Senor R: Locator Range Senor hold a Grid Score Table (GST) initialized at zero. θ 1,2 θ For every point in the grid θ 1,1 R g: (xg,y g ) and every ector heard, perform Grid ector tet: C1 : g Li R, C 2 : θ1,1 θ θ1,2 If tet poitive increae core value by one SeRLoc Step 4: ROI computation Senor ROI Search Area GRID Score Table (GST) Outline Motivation Problem SeRLoc Threat and defene Performance High reolution localization: HiRLoc Concluion Majority vote: Point with highet core define the ROI. Error introduction due to dicrete computation. Accuracy v. Complexity tradeoff
6 Attacker Model Attacker aim at diplacing the enor. Attacker mut remain undetected. No DoS attack. SeRLoc - Security mechanim Meage Encryption: Meage encrypted with a ymmetric key K 0. ID authentication Beacon Format: L i : { (X i, Y i ) (θ i,1, θ i,2 ) (H n-j (PW i )), j } K0 No jamming of the communication medium. Locator coordinate Slope of the ector Shared ymmetric key H PW i H 0 (Pw i ) H H 1 (Pw i ) H H H n (Pw i ) Jamming f Hah chain one-way Every hah enor function tore the value H n (PW i ) for all the locator. A enor can authenticate all locator that are within it range (one-hop authentication) SeRLoc Wormhole Attack L 2 enor Locator Attacker THREAT MODEL The attacker record beacon information at region A, Region B tunnel it via the wormhole link at region B, and replay the beacon Senor i miled to believe it hear the et of locator LH : { -L 8 }. Wormhole link L L 7 Region A No compromie of integrity, L 5 8 authenticity of the communication or crypto protocol. Record beacon Direct link allow replay of the beacon in a timely fahion. L 6 23 Wormhole attack detection (1) P Accept only ingle meage per locator enor obtacle Locator A c Wormhole link ρ L Ac ( SG) = P( LH A 1) = 1 e c Attacker Multiple meage from the ame locator are heard due to: Multi-path effect Imperfect ectorization Replay attack 24 6
7 Wormhole attack detection (2) Communication range contraint property. enor Locator Attacker A i P L i 2R Wormhole link A j ρl A ρl A i j ( CR) ( 1 e )( 1 e ) L j Locator heard by a enor cannot be more than 2R apart. Li L j 2R R: locator-to-enor communication range. Wormhole attack detection (3) Probability of wormhole detection enor A i Wormhole link Pdet = U 2R A c Locator A j Attacker P( SG CR) = P( SG) + P( CR) ρ ( 1 ) ( 1 ) 2 L Ac ρl Ac ρl Ai e + e e The event of a locator being within any region A i, A j, A c are independent (Region do not overlap). P( SG) P( CR) Wormhole attack detection (4) Probability of wormhole detection 99.48% Reolution of location ambiguity A enor need to ditinguih the valid et of locator from the replayed one. Attach to Cloet Locator Algorithm (ACLA) Region B L 2 Cloet Locator 1. Senor : Broadcat a nonce η. 2. Locator L i : Reply with a beacon + the nonce η, encrypted with the pairwie key K,Li. 3. Senor : Identify the locator L c with the firt authentic reply. 4. Senor : A locator L i belong to the valid et, only if it overlap with the ector defined by the beacon of L c. L 5 L 8 L Wormhole link Region A L 6 L
8 SeRLoc Sybil Attack THREAT MODEL The attacker imperonate multiple locator (compromie of the globally hared key K 0 ). L L 2 3 Collect hah value Imperonator Attacker can fabricate arbitrary beacon. Hence, compromie the majority-baed cheme, if more than LH locator imperonated. 29 Sybil Attack detection(1) In a Sybil attack, the enor hear at leat twice the number of locator. Define a threhold L max a the maximum allowable number of locator heard, uch that: Lmax P( LH > Lmax ) = ε, P( LH > ) = 1 δ 2 Probability of fale alarm Probability of Sybil attack detection Deign goal: Given ecurity requirement δ, minimize fale alarm probability ε. 30 Sybil Attack detection - Defene Random locator deployment we can derive the L max value: 99% Detection probability 26 locator 5% Fale alarm P k 2 i ( ) ( ρlπr ) LH > k = 1 i= 1 i! e 2 ρ LπR Once the Sybil Attack i detected: Execute ACLA 52 locator 31 SeRLoc Compromied entitie THREAT MODEL Compromied network entitie: Attacker gain: 1. Knowledge of all cryptographic quantitie 2. Full control over the behavior of the entity. Compromie of a enor reveal the globally hared key K 0. Compromie of a locator reveal K 0, mater key K Li, and the hah chain of the locator. Imperonate the Cloet Locator Compromie the ACLA algorithm Diplace any enor 32 8
9 Enhanced location determination algorithm 1. The enor tranmit a nonce with hi ID 2. Locator within r from and et LH the enor relay the nonce. L7 3. Locator within R reply with a beacon + the nonce. L 2. Senor accept 9 L firt L max replie. 6 Outline Motivation Secure Localization Problem SeRLoc Threat and defene Performance Evaluation Concluion L 5 L 8 Attacker ha to compromie more than L max /2 locator, AND Replay before authentic replie arrive at Performance Evaluation Simulation etup: Random locator ditribution with denity ρ L. Random enor ditribution with denity 0.5. Performance evaluation metric: Localization Error v. LH Each locator i equivalent to M reference point, LE = 1 S S i= 1 et i r i M number of antenna ector et i : Senor location etimation. i : Senor actual location. r : Senor-to-enor communication range. S : Number of enor. SeRLoc outperform current cheme for any LH value
10 Localization error v. antenna ector Localization error v. ector error Higher number of directional antenna (narrower ector) reduce LH. Sector error: Fraction of ector falely etimated at each enor. More expenive hardware at each locator. SeRLoc i reilient againt ector error due to the majority vote cheme. Even when 50% of the ector are falely etimated, LE < r for LH Localization error v. GPS error Communication Cot GPS Error (GPSE): Error in the locator coordinate. For GPSE = 1.8r and LH = 3, LE = 1.1r. DV-hop/Amorphou: LE = 1.1r require LH = 5 with no GPSE. APIT: LE = 1.1r require LH = 12 with no GPSE. Communication cot i independent of the number of enor Communication cot increae with the locator denity, or number of directional antenna at each locator
11 Performance Summary Increaing number of ector Reduction in error and power needed but increaed complexity Senitivity to GPSE error GPSE=1.8r; Avg. LE=1.1r; require SeRLoc need LH=3; Dv-Hop need LH=5, no GPSE; APIT need LH=12, no GPSE; Communication cot; APIT require S + L SeRLoc require L *M S: Set of enor, L: Set of locator, M: # of antenna 41 Concluion We need to ecure location etimation to claim ecure location-dependent function/app. SeRLoc: SEcure Range-independent LOCalization Robutly compute the location even in the preence of attack Better performance than up-to-date range independent localization cheme Decentralized implementation, reilient to ource of error Current development Reitance to jamming attack Analytical evaluation of error bound 42 Thank you for your time! Any Quetion 43 11
HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks
HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,
More informationHiRLoc: High-resolution Robust Localization for Wireless Sensor Networks
HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,
More informationLocali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall
Localization ation For Wireless Sensor Networks Univ of Alabama, Fall 2011 1 Introduction - Wireless Sensor Network Power Management WSN Challenges Positioning of Sensors and Events (Localization) Coverage
More informationSecure Localization in Wireless Sensor Networks: A Survey
Secure Localization in Wireless Sensor Networks: A Survey arxiv:1004.3164v1 [cs.cr] 19 Apr 2010 Waleed Ammar, Ahmed ElDawy, and Moustafa Youssef {ammar.w, aseldawy, moustafa}@alex.edu.eg Computer and Systems
More informationLocalization in WSN. Marco Avvenuti. University of Pisa. Pervasive Computing & Networking Lab. (PerLab) Dept. of Information Engineering
Localization in WSN Marco Avvenuti Pervasive Computing & Networking Lab. () Dept. of Information Engineering University of Pisa m.avvenuti@iet.unipi.it Introduction Location systems provide a new layer
More informationSeRLoc: Robust Localization for Wireless Sensor Networks
SeRLoc: Robust Localization for Wireless Sensor Networks LOUKAS LAZOS and RADHA POOVENDRAN University of Washington Many distributed monitoring applications of Wireless Sensor Networks (WSNs) require the
More informationMIMO Systems: Multiple Antenna Techniques
ADVANCED MIMO SYSTEMS MIMO Sytem: Multiple Antenna Technique Yiqing ZOU, Zhengang PAN, Kai-Kit WONG Dr, Senior Member of IEEE, Aociate Editor, IEEE TWirele, IEEE CL, and JoC (AP), Senior Lecturer, Department
More informationII. SYSTEM MODEL. A. Link and path model
HARQ I. INTRODUCTION ARQ (automatic repeat-requet i a link layer protocol ued for packet error detection and retranmiion. Errordetection bit (uch a CRC bit are attached and tranmitted along with the meage
More informationStability Analysis in a Cognitive Radio System with Cooperative Beamforming
Stability Analyi in a Cognitive Radio Sytem with Cooperative Beamforming Mohammed Karmooe, Ahmed Sultan, Moutafa Youef Department of Electrical Engineering, Alexandria Univerity, Alexandria, Egypt Wirele
More informationSecuring Wireless Localization: Living with Bad Guys. Zang Li, Yanyong Zhang, Wade Trappe Badri Nath
Securing Wireless Localization: Living with Bad Guys Zang Li, Yanyong Zhang, Wade Trappe Badri Nath Talk Overview Wireless Localization Background Attacks on Wireless Localization Time of Flight Signal
More informationBadri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004
Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization
More informationAdaptive Space/Frequency Processing for Distributed Aperture Radars
Adaptive Space/Frequency Proceing for Ditributed Aperture Radar Raviraj Adve a, Richard Schneible b, Robert McMillan c a Univerity of Toronto Department of Electrical and Computer Engineering 10 King College
More informationRESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE
RESEARCH ON NEAR FIED PASSIVE OCAIZATION BASED ON PHASE MEASUREMENT TECHNOOGY BY TWO TIMES FREQUENCY DIFFERENCE Xuezhi Yan, Shuxun Wang, Zhongheng Ma and Yukuan Ma College of Communication Engineering
More informationAutomatic Target Recognition with Unknown Orientation and Adaptive Waveforms
Automatic Target Recognition wi Unknown Orientation and Adaptive Waveform Junhyeong Bae Department of Electrical and Computer Engineering Univerity of Arizona 13 E. Speedway Blvd, Tucon, Arizona 8571 dolbit@email.arizona.edu
More informationInternet Routing Games
Internet Routing Game João P. Hepanha Center for Control Dynamical Sytem an Computation Univerity of California Santa Barbara In collaboration with: S. Bohacek (Univ. Delaware), K. Obraczka (UC Santa Cruz)
More informationThe Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding
The Performance Analyi of MIMO OFDM Sytem with Different M-QAM Modulation and Convolution Channel Coding H. S. Shwetha M.tech, Digital Communication Engineering Siddaganga Intitute of Technology Tumakuru,
More informationSynthetic aperture radar raw signal simulator for both pulsed and FM-CW modes
Computational Method and Experimental Meaurement XV 43 Synthetic aperture radar raw ignal imulator for both puled and FM-CW mode P. Serafi C. Lenik & A. Kawalec Intitute of adioelectronic, Military Univerity
More informationSloppy Addition and Multiplication
Sloppy Addition and Multiplication IMM-Technical Report-2011-14 Alberto Nannarelli Dept. Informatic and Mathematical Modelling Technical Univerity of Denmark Kongen Lyngby, Denmark Email: an@imm.dtu.dk
More informationWireless Link SNR Mapping Onto An Indoor Testbed
Wirele Link SNR Mapping Onto An Indoor Tetbed Jing Lei, Roy Yate, Larry Greentein, Hang Liu WINLAB Rutger Univerity 73 Brett Road, Picataway, NJ 8854, USA {michelle, ryate, ljg, hliu}@winlab.rutger.edu
More informationASSISTING PERSONAL POSITIONING IN INDOOR ENVIRONMENTS USING MAP MATCHING
Archive of Photogrammetry, Cartography and Remote Sening, Vol., 0, pp. 39-49 ISSN 083-4 ASSISTING PERSONAL POSITIONING IN INDOOR ENVIRONMENTS USING MAP MATCHING Mohamed Attia, Adel Moua, ing Zhao 3, Naer
More informationRaising Cavity Q for Microwave-Pulse Compression by Reducing Aperture Skin-Effect Losses
Circuit and Electromagnetic Sytem Deign Note Note 6 8 June 9 Raiing Cavity Q for Microwave-Pule Compreion by Reducing Aperture Skin-Effect Loe Carl E. Baum Univerity of New Meico Department of Electrical
More informationPre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems
Pre- and Pot- Combining Space Receiver for Wideband Multi-Carrier Sytem Muhammad Imadur Rahman, Suvra Sekhar Da, Frank HP Fitzek, Ramjee Praad Center for TeleInFratruktur (CTiF), Aalborg Univerity, Denmark
More informationAlternating Opportunistic Large Arrays in Broadcasting for Network Lifetime Extension
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL 8, NO 6, JUNE 009 831 Alternating Opportunitic Large Array in Broadcating for Network Lifetime Extenion Aravind Kaila and Mary Ann Ingram Abtract We propoe
More informationComm 502: Communication Theory. Lecture 5. Intersymbol Interference FDM TDM
Lecture 5 Interymbol Interference FDM TDM 1 Time Limited Waveform Time-Limited Signal = Frequency Unlimited Spectrum Square Pule i a Time-Limited Signal Fourier Tranform 0 T S -3/T S -2/T S -1/T S 0 1/T
More informationMIMO Enabled Efficient Mapping of Data in WiMAX Networks
MIMO Enabled Efficient Mapping of Data in WiMAX Network Penumarthi Phani Krihna, R. Saravana Manickam, and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Intitute of Technology
More informationA Proportional Fair Resource Allocation Algorithm for Hybrid Hierarchical Backhaul Networks
A Proportional Fair Reource Allocation Algorithm for Hybrid Hierarchical Backhaul Network Intitute of Communication and Information Sytem, Hohai Univerity, Nanjing, 211100, China E-mail: 498807912@qq.com
More informationGPS signal Rician fading model for precise navigation in urban environment
Indian Journal of Radio & Space Phyic Vol 42, June 203, pp 92-96 GPS ignal Rician fading model for precie navigation in urban environment G Sai Bhuhana Rao, G Sateeh Kumar $,* & M N V S S Kumar Department
More informationAPPLICATION OF PHASOR MEASUREMENT UNIT IN SMART GRID
APPLICATION OF PHASOR MEASUREMENT UNIT IN SMART GRID 1 Chandarani Sutar, 2 Dr. K. S. Verma 1 RRSIMT Amethi (U.P.), 2 KNIT Sultapur (U.P.) Email: 1 Chandarani_t@yahoo.com, 2 kv211@rediffmail.com, Abtract-A
More informationPerformance Analysis of DV-Hop Localization Using Voronoi Approach
Vol.3, Issue.4, Jul - Aug. 2013 pp-1958-1964 ISSN: 2249-6645 Performance Analysis of DV-Hop Localization Using Voronoi Approach Mrs. P. D.Patil 1, Dr. (Smt). R. S. Patil 2 *(Department of Electronics and
More informationReinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios
1 Reinforcement Learning Baed Anti-jamming with Wideband Autonomou Cognitive Radio Stephen Machuzak, Student Member, IEEE, and Sudharman K. Jayaweera, Senior Member, IEEE Communication and Information
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS SIMULATION PERFORMANCE OF MULTIPLE-INPUT MULTIPLE-OUTPUT SYSTEMS EMPLOYING SINGLE- CARRIER MODULATION AND ORTHOGONAL FRE- QUENCY DIVISION MULTIPLEXING
More informationPulse Interval Modulation Dual Header (PIM-DH)
Pule Interval Modulation Dual Header () N. Aldiiat, Z. Ghaemlooy, and R. Saatchi Electronic Reearch Group, School of Engineering Sheffield Hallam Univerity Sheaf Building, Pond Street Sheffield S WB United
More informationMassachusetts Institute of Technology Haystack Observatory WESTFORD, MASSACHUSETTS DATE 07/15/2009
BBD Memo #033 Maachuett Intitute of Technolog Hatack Obervator WESTFORD, MASSACHUSETTS 0886 DATE 07/5/2009 To: Broadband Development Group From: C. J. Beaudoin Subject: Holographic Proceing and Conideration
More informationMaking Use Of What You Don t See: Negative Information In Markov Localization
Making Ue Of What You Don t See: Negative Information In Markov Localization Jan Hoffmann, Michael Spranger, Daniel Göhring, and Matthia Jüngel Department of Computer Science Artificial Intelligence Laboratory
More informationSimultaneous usage of TV spectrum for mobile broadband and TV broadcast transmission. Joachim Sachs Ericsson Research AAchen, Germany
Simultaneou uage of TV pectrum for mobile broadband and TV broadcat tranmiion Joachim Sach Ericon Reearch AAchen, Germany OUtline Background and motivation Spectrum haring between TV and mobile network
More informationDeterministic Deployment for Wireless Image Sensor Nodes
Send Order for Reprint to reprint@benthamcience.ae 668 The Open Electrical & Electronic Engineering Journal, 04, 8, 668-674 Determinitic Deployment for Wirele Image Senor Node Open Acce Junguo Zhang *,
More informationA Secant Location Estimation Algorithm for Wireless Sensor Networks
A Secant Location Etimation Algorithm for Wirele Senor Network Tung-Han Lee, Yu-Jhong Fu, Lin-huang Chang Department of Computer an Information Science National Taichung Univerity Taichung, Taiwan, R.O.C.
More informationFormatting and Baseband. Formatting & Baseband. Page 1. Formatting and Baseband Modulation. CSE4214 Digital Communications
CSE4214 Digital Communication CSE4214 Digital Communication Chapter 2 Formatting Formatting and Baeband Modulation Formatting & Baeband Formatting and Baeband 3 4 Page 1 1 What i Formatting? Information
More informationSubcarrier exclusion techniques
Subcarrier excluion technique for coded OFDM ytem Kai-Uwe Schmidt, Jochen Ertel, Michael Benedix, and Adolf Finger Communication Laboratory, Dreden Univerity of Technology, 62 Dreden, Germany email: {chmidtk,
More informationECE 6640 Digital Communications
ECE 6640 Digital Communication Dr. Bradley J. Bazuin Aitant Profeor Department of Electrical and Computer Engineering College of Engineering and Applied Science Chapter 2 2. Formatting and Baeband Modulation.
More informationDIGITAL COMMUNICATION
DEPARTMENT OF ELECTRICAL &ELECTRONICS ENGINEERING DIGITAL COMMUNICATION Spring 2010 Yrd. Doç. Dr. Burak Kelleci OUTLINE Line Code Differential Encoding Regeneration, Decoding and Filtering Delta Modulation
More informationAd hoc and Sensor Networks Chapter 9: Localization & positioning
Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Means for a node to determine its physical position (with
More informationTrimble s ubiquitous approach to cadastre throughout the World
u-trimble Trimble ubiquitou approach to cadatre throughout the World Keith Hofgartner Project Manager Worldwide (Ubiquitou) Trimble Navigation Limited Oct 2009 Opening Statement Trimble i.. Ubiqitou. -
More informationKAIROS Base Station/Repeater. Professional infrastructure for Digital Mobile Radios
IROS Bae Station/Repeater Profeional infratructure for Digital Mobile Radio IROS Bae Station/Repeater Deigned and manufactured in Italy Kairo i an ancient Greek word meaning the right moment in which everything
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More information/09/$ IEEE 472
Bai Puruit for Robut Paive Acoutic Beamforming Ben Shapo and Chri Kreucher Integrity Application Incorporated 900 Victor Way, Suite 220 Ann Arbor, MI 48108 bhapo@integrity-app.com, ckreuche@umich.edu Abtract
More informationTwo Novel Handover Algorithms with Load Balancing for Heterogeneous Network
Two Novel Handover Algorithm Load Balancing for Heterogeneou Network Rintaro Yoneya, Abolfazl Mehbodniya and Fumiyuki Adachi Dept. of Communication Engineering, Graduate School of Engineering, Tohoku Univerity,
More informationCSS: Conditional State-based Scheduling for Networked Control Systems
In Proc. of the IEEE International Conference on Embedded and Real-Time Computing Sytem and Application (RTCSA), Seoul, South Korea, Augut 2012. Revied verion. CSS: Conditional State-baed Scheduling for
More informationRelay Selection and Resource Allocation in LTE-Advanced Cognitive Relay Networks
International Journal on Communication Antenna and Propagation (I.Re.C.A.P.), Vol. 1, N. 4 Augut 2011 Relay Selection and Reource Allocation in LTE-Advanced Cognitive Relay Network Ardalan Alizadeh, Seyed
More informationA New Technique to TEC Regional Modeling using a Neural Network.
A New Technique to TEC Regional Modeling uing a Neural Network. Rodrigo F. Leandro Geodetic Reearch Laboratory, Department of Geodey and Geomatic Engineering, Univerity of New Brunwick, Fredericton, Canada
More informationAustralian Journal of Basic and Applied Sciences. Advanced Heterogeneous Vehicular Network for Emerging Vehicular Services
AENSI Journal Autralian Journal of Baic and Applied Science Journal home page: www.ajbaweb.com Advanced Heterogeneou Vehicular Network for Emerging Vehicular Service 1 Saied M. Abd El-atty and KontantinoLizo
More informationOne interesting embedded system
One interesting embedded system Intel Vaunt small glass Key: AR over devices that look normal https://www.youtube.com/watch?v=bnfwclghef More details at: https://www.theverge.com/8//5/696653/intelvaunt-smart-glasses-announced-ar-video
More informationKAIROS Base Station/Repeater. Professional infrastructure for Digital Mobile Radios
IROS Bae Station/Repeater Profeional infratructure for Digital Mobile Radio Key Feature Dual mode It perform the automatic witching between analog and digital modulation, according to the type of incoming
More informationInternet Routing Protocols Lecture 02 Intra-domain Routing
Internet Routing Protocol Lecture Intra-domain Routing dvanced Sytem Topic Lent Term, 8 Timothy G. Griffin Computer Lab Cambridge UK Shortet Path Generalize ditance to weighted etting igraph G = (V,E)
More informationControl of Electromechanical Systems using Sliding Mode Techniques
Proceeding of the 44th IEEE Conference on Deciion and Control, and the European Control Conference 25 Seville, Spain, December 2-5, 25 MoC7. Control of Electromechanical Sytem uing Sliding Mode Technique
More informationChapter Introduction
Chapter-6 Performance Analyi of Cuk Converter uing Optimal Controller 6.1 Introduction In thi chapter two control trategie Proportional Integral controller and Linear Quadratic Regulator for a non-iolated
More informationResearch on Direct Torque Control of Induction Motor Based on TMS320LF2407A
Available online at www.ciencedirect.com Phyic Procedia 5 ( ) 53 59 International Conference on Solid State Device and Material Science Reearch on Direct Torque Control of Induction Motor Baed on TMS3LF47A
More informationArtificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy
Artificial Interymbol Interference ISI to Exploit Receiver Imperfection for Secrecy Azadeh Sheikholelami, Denni Goeckel and Hoein ihro-nik Electrical and Computer Engineering Department, Univerity of Maachuett,
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECS.2009.
Nordin, R., Armour, S. M. D., & McGeehan, J. P. (9). Overcoming elfinterference in SM-OFDMA with and dynamic ubcarrier allocation. In IEEE 69th Vehicular Technology Conference 9 (VTC Spring 9), Barcelona
More informationIndoor Localization in Wireless Sensor Networks
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 4, Issue 03 (August 2014) PP: 39-44 Indoor Localization in Wireless Sensor Networks Farhat M. A. Zargoun 1, Nesreen
More informationSCK LAB MANUAL SAMPLE
SCK LAB MANUAL SAMPLE VERSION 1.2 THIS SAMPLE INCLUDES: TABLE OF CONTENTS TWO SELECTED LABS FULL VERSION IS PROVIDED FREE WITH KITS Phone: +92 51 8356095, Fax: +92 51 8311056 Email: info@renzym.com, URL:www.renzym.com
More informationSecurity in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury
Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing
More informationAn FM signal in the region of 4.2 to 4.6
A LOW COST, HIGH ACCURACY RADAR ALTIMETER Thi article decribe the development of a frequency modulated (FM) radar altimeter for meauring the height of flying object. The entire tructure comprie two part:
More informationA COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES
A COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES Jame D. Huff John C. Mantovani Carl W. Sirle The Howland Company, Inc. 4540 Atwater
More informationBefore the beginning of the Q wave At the top of the R wave After the end of the S wave
334 AcqKnowledge 4 Software Guide Detect and Claify Heartbeat Thi robut QRS detector i tuned for human ECG Lead II ignal. It attempt to locate QRS complexe and place an event near the center of each QRS
More informationSyed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University
Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous
More informationA Programmable Compensation Circuit for System-on- Chip Application
http://dx.doi.org/0.5573/jsts.0..3.98 JOURAL OF SEMICODUCTOR TECHOLOGY AD SCIECE, VOL., O.3, SEPTEMBER, 0 A Programmable Compenation Circuit for Sytem-on- Chip Application Woo-Chang Choi* and Jee-Youl
More informationA Real-Time Wireless Channel Emulator For MIMO Systems
A eal-time Wirele Channel Emulator For MIMO Sytem Hamid Elami, Ahmed M. Eltawil {helami,aeltawil}@uci.edu Abtract: The improvement in channel capacity hailed by MIMO ytem i directly related to intricate
More informationIMPROVED SPATIAL MODULATION FOR HIGH SPECTRAL EFFICIENCY
IMPOVED SPIL MODULION FO HIGH SPECL EFFICIENCY ajab M. Legnain, ohdy H.M. Hafez 1 and bdelgader M. Legnain 2 1 Department of Sytem and Computer Eng., Carleton Univerity, Ottawa, Canada {rlegnain, hafez}@ce.carleton.ca
More informationFrequency Calibration of A/D Converter in Software GPS Receivers
Frequency Calibration of A/D Converter in Software GPS Receiver L. L. Liou, D. M. Lin, J. B. Tui J. Schamu Senor Directorate Air Force Reearch Laboratory Abtract--- Thi paper preent a oftware-baed method
More informationNetwork Coding for Multi-Resolution Multicast
Network Coding for Multi-Reolution Multicat MinJi Kim, Daniel Lucani, Xiaomeng Shi, Fang Zhao, Muriel Médard Maachuett Intitute of Technology, Cambridge, MA 02139, USA Email: {minjikim, dlucani, xhi, zhaof,
More informationGPS WIRELESS SENSOR NETWORK FOR MONITORING QUASI-STATIC DISPLACEMENT
GPS WIRELESS SENSOR NETWORK FOR MONITORING QUASI-STATIC DISPLACEMENT Maayuki SAEKI 1, Mai SAWADA 2, Yukio SHIBA 3 and Kenji OGUNI 4 1 Member of JSCE, Aociate Profeor, Dept. of Civil Eng., Tokyo Univerity
More informationA Study for Finding Location of Nodes in Wireless Sensor Networks
A Study for Finding Location of Nodes in Wireless Sensor Networks Shikha Department of Computer Science, Maharishi Markandeshwar University, Sadopur, Ambala. Shikha.vrgo@gmail.com Abstract The popularity
More informationDownlink Small-cell Base Station Cooperation Strategy in Fractal Small-cell Networks
Downlink Small-cell Bae Station Cooperation Strategy in Fractal Small-cell Network Fen Bin, Jiaqi Chen, Xiaohu Ge, and Wei Xiang, School of Electronic Information and Communication Huazhong Univerity of
More informationImplementation and Testing of a Low-Overhead Network Synchronization Protocol
Implementation and Teting of a Low-Overhead Network Synchronization Protocol Skye R. Kowalki, Timothy M. Chritman, Andrew G. Klein Department of Engineering and Deign, Wetern Wahington Univerity Bellingham,
More informationECE 6640 Digital Communications
ECE 6640 Digital Communication Dr. Bradley J. Bazuin Aitant Profeor Department of Electrical and Computer Engineering College of Engineering and Applied Science Chapter. Formatting and Baeband Modulation.
More informationLOCALIZATION SCHEME FOR THREE DIMENSIONAL WIRELESS SENSOR NETWORKS USING GPS ENABLED MOBILE SENSOR NODES
LOCALIZATION SCHEME FOR THREE DIMENSIONAL WIRELESS SENSOR NETWORKS USING GPS ENABLED MOBILE SENSOR NODES Vibha Yadav, Manas Kumar Mishra, A.K. Sngh and M. M. Gore Department of Computer Science & Engineering,
More informationPublished in: Proceedings of 2018 IEEE 19th Workshop on Control and Modeling for Power Electronics (COMPEL)
Aalborg Univeritet A Synchronization Method for Grid Converter with Enhanced Small-Signal and Tranient Dynamic Steinkohl, Joachim; Taul, Mad Graungaard; Wang, Xiongfei; Blåbjerg, Frede; Haler, Jean- Philippe
More informationResilient Large-Scale Cognitive Radio Ad Hoc Networking Using Path-Time Codes
IEEE ICC 2017 Cognitive Radio and Network Sympoium Reilient Large-Scale Cognitive Radio Ad Hoc Networking Uing Path-Time Code Yi-Chi Chen 1, I-Wei Lai 2 and Kwang-Cheng Chen 3 Graduate Intitute of Communication
More informationPPP-RTK: Results of CORS Network-Based PPP with Integer Ambiguity Resolution
2 International Sympoium on GPS/GNSS October 26-28, 2. PPP-RTK: Reult of CORS Network-Baed PPP with Integer Ambiguity Reolution P.J.G. Teunien,2, D Odik, and B Zhang,3* GNSS Reearch Centre, Curtin Univerity
More information105 SERIES REMOTE RECEIVER DECODERS
Remote Decoder; Radio, Infra-Red, Pager 4 Channel Expandable To 15 Radio ; 433 / 458 / 868 MHz IP65 Rated Encloure Eay Intallation Via Screw Terminal 230Vac Or 12-30Vdc Supply 15 CMOS/TTL Channel O/P'
More informationActive Harmonic Elimination in Multilevel Converters Using FPGA Control
Active Harmonic Elimination in Multilevel Converter Uing FPGA Control Zhong Du, Leon M. Tolbert, John N. Chiaon Electrical and Computer Engineering The Univerity of Tenneee Knoxville, TN 7996- E-mail:
More informationAN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS
AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS Alion de Oliveira Morae (1), Joé Antonio Azevedo Duarte (1), Sergio Fugivara (1) (1) Comando-Geral de Tecnologia Aeroepacial,
More informationPHASE FUNCTION MEASUREMENT FOR MODELLING RADIOWAVE ATTENUATION AND SCATTER IN VEGETATION BASED ON THE THEORY OF RADIATIVE ENERGY TRANSFER
PHASE FUNCTION MEASUREMENT FOR MODELLING RADIOWAVE ATTENUATION AND SCATTER IN VEGETATION BASED ON THE THEORY OF RADIATIVE ENERGY TRANSFER Jürgen Richter 1, Miqdad Al-Nuaimi 1, Rafael Caldeirinha 1 Univerity
More informationRange-Free Localization
Range-Free Localization Radu Stoleru 1, Tian He 2 and John A. Stankovic 3 1 Department of Computer Science, University of Virginia, stoleru@cs.virginia.edu 2 Department of Computer Science and Engineering,
More informationCooperative Diversity in Interference Limited Wireless Networks
Cooperative Diverity in Interference Limited Wirele Network Sam Vakil, Student Member, IEEE, and Ben Liang, Senior Member, IEEE Abtract Uing relay in wirele network can potentially lead to ignificant capacity
More informationWe are IntechOpen, the first native scientific publisher of Open Access books. International authors and editors. Our authors are among the TOP 1%
We are IntechOpen, the firt native cientific publiher of Open Acce book 3,350 108,000 1.7 M Open acce book available International author and editor Download Our author are among the 151 Countrie delivered
More informationDecision-Making Level Fusion Based on DSmT for Multi-Sensor Life Detection Platform
enor & Tranducer 204 by IFA Publihing,. L. http://www.enorportal.com Deciion-Making Level Fuion Baed on DmT for Multi-enor Life Detection Platform Jingong YANG, Xun CHEN Department of Diater Prevention
More informationDESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS
DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS 1 DHANABAL R, 2 BHARATHI V, 3 NAAMATHEERTHAM R SAMHITHA, 4 G.SRI CHANDRAKIRAN, 5 SAI PRAMOD KOLLI 1 Aitant Profeor (Senior Grade), VLSI
More informationOn Practical Selective Jamming of Bluetooth Low Energy Advertising
On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,
More informationOn-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Networks
On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Network Shimin Gong, Xu Chen, Jianwei Huang, and Ping Wang Centre for Multimedia and Network Technology, Nanyang Technological Univerity
More informationMobile Communications TCS 455
Mobile Communication TCS 455 Dr. Prapun Sukompong prapun@iit.tu.ac.th Lecture 23 1 Office Hour: BKD 3601-7 Tueday 14:00-16:00 Thurday 9:30-11:30 Announcement Read Chapter 9: 9.1 9.5 Section 1.2 from [Bahai,
More informationOptimal Control for Single-Phase Brushless DC Motor with Hall Sensor
Reearch Journal of Applied Science, Engineering and Technology 5(4): 87-92, 23 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 23 Submitted: June 22, 22 Accepted: Augut 7, 22 Publihed:
More informationDouble Directional Channel Characterization on Board Ships
Double Directional Channel Characterization on Board Ship H. Kdouh, H. Farhat, C. Broueau, G. Zaharia, G. Grunfelder, G. El Zein Intitut d Electronique et de Télécommunication de Renne Renne, France huein.kdouh@ina-renne.fr
More informationOnline Adaptive Fuzzy Logic Controller Using Genetic Algorithm and Neural Network for Networked Control Systems
1 Online Adaptive Fuzzy Logic Controller Uing Genetic Algorithm and Neural Network for Networked Control Sytem Pooya Hajebi*, Seyed Mohammad Taghi AlModarrei* *Electrical and Computer Engineering Department,
More informationELG4139: Passive Filters
EG439: Paive Filter A ilter i a ytem that procee a ignal in ome deired ahion. There are two broad categorie o ilter: An analog ilter procee continuou-time ignal A digital ilter procee dicrete-time ignal.
More informationReliable Local Broadcast in a Wireless Network Prone to Byzantine Failures
Reliable Local Broadcat in a Wirele Network Prone to Byzantine Failure ABSTRACT Vartika Bhandari Dept. of Computer Science, and Coordinated Science Laboratory Univerity of Illinoi at Urbana-Champaign vbhandar@uiuc.edu
More informationPosition Control of a Large Antenna System
Poition Control of a Large Antenna Sytem uldip S. Rattan Department of Electrical Engineering Wright State Univerity Dayton, OH 45435 krattan@c.wright.edu ABSTRACT Thi report decribe the deign of a poition
More informationParallel DCMs APPLICATION NOTE AN:030. Introduction. Sample Circuit
APPLICATION NOTE AN:030 Parallel DCM Ugo Ghila Application Engineering Content Page Introduction 1 Sample Circuit 1 Output Voltage Regulation 2 Load Sharing 4 Startup 5 Special Application: Optimizing
More informationAN UNSUPERVISED BAYESIAN CLASSIFIER FOR MULTIPLE SPEAKER DETECTION AND LOCALIZATION
AN UNSUPERVISED BAYESIAN CLASSIFIER FOR MULTIPLE SPEAKER DETECTION AND LOCALIZATION Youef Oualil, Friedrich Faubel, Dietrich Klakow Spoken Language Sytem, Saarland Univerity, Saarbrücken, Germany youef.oualil@lv.uni-aarland.de
More information