Zero Pre-shared Secret Key Establishment in the Presence of Jammers

Size: px
Start display at page:

Download "Zero Pre-shared Secret Key Establishment in the Presence of Jammers"

Transcription

1 Zero Pre-shared Secret Key Establishmet i the Presece of ammers Tao i College of Computer Sciece Northeaster Uiversity Bosto, MA 25 taoji@ccs.eu.edu Guevara Noubir College of Computer Sciece Northeaster Uiversity Bosto, MA 25 oubir@ccs.eu.edu Bishal Thapa College of Computer Sciece Northeaster Uiversity Bosto, MA 25 bthapa@ccs.eu.edu ABSTRACT We cosider the problem of key establishmet over a wireless radio chael i the presece of a commuicatio jammer, iitially itroduced i [4]. The commuicatig odes are ot assumed to pre-share ay secret. The established key ca later be used by a covetioal spread-spectrum commuicatio system. We itroduce ew commuicatio cocepts called itractable forward-decodig ad efficiet backwarddecodig. Decodig uder our mechaism requires at most twice the computatio cost of the covetioal SS decodig ad oe packet worth of sigal storage. We itroduce techiques that apply a key schedule to packet spreadig ad develop a provably optimal key schedule to miimize the bit-despreadig cost. We also use efficiet FFT-based algorithms for packet detectio. We evaluate our techiques ad show that they are efficiet both i terms of resiliecy agaist jammers ad computatio. Fially, our techique has additioal features such as the iability to detect packet trasmissio util the last few bits are beig trasmitted, ad trasmissios beig destiatio-specific. To the best of our kowledge, this is the first solutio that is optimal i terms of commuicatio eergy cost with very little storage ad computatio overhead. Categories ad Subject Descriptors C.2. [Computer-Commuicatio Networks]: Desig Wireless Commuicatio Geeral Terms Algorithms, Desig, Security Keywords Ati-jammig, Spread Spectrum, Zero Pre-shared Secret Permissio to make digital or hard copies of all or part of this work for persoal or classroom use is grated without fee provided that copies are ot made or distributed for profit or commercial advatage ad that copies bear this otice ad the full citatio o the first page. To copy otherwise, to republish, to post o servers or to redistribute to lists, requires prior specific permissio ad/or a fee. MobiHoc 9, May 8 2, 29, New Orleas, Louisiaa, USA. Copyright 29 ACM /9/5...$5... INTRODUCTION Radio-Frequecy wireless commuicatio occurs through the propagatio of electro-magetic waves over a broadcast medium. Such broadcast medium is ot oly shared betwee the commuicatig odes but is also exposed to adversaries. The resiliecy agaist malicious behavior is obviously of sigificat importace for military commuicatio i a battle-field. It is also rapidly gaiig sigificace i civilia ad commercial applicatios due to the icreased reliace o wireless etworks for coectivity to the cyberifrastructure, ad applicatios that moitor our physical ifrastructure such as tuels, bridges, ladmarks, buildigs, etc. ammig ad ati-jammig techiques for the physical layer of wireless systems supportig mostly voice commuicatio have bee extesively studied for several decades [3]. However, it is oly recetly that the popularity of multi-hop data etworks with complex medium sharig, codig, ad applicatio protocols opeed the door for sophisticated attacks ad resulted i the exploratio of ew resiliece mechaisms. Emergig attacks iclude ultra low-power crosslayer attacks that aim at disturbig the operatio of etworks by targetig cotrol-mechaisms such as packet routig, commuicatio beacos or pilots, carrier sesig mechaism, collisio avoidace expoetial back-off mechaism, etwork topology, ad size of the cogestio cotrol widow. For example, by trasmittig a few pulses at the right frequecy, right time ad right locatio, highly efficiet (eergy/computatio wise) attacks ca be deployed with offthe-shelf hardware [, 2,, 4, 6, 5].. Motivatio Spread Spectrum (SS) is oe of the most efficiet mechaisms used for ati-jammig commuicatio. Military systems, i particular, rely o SS systems alog with atea ullig, chael codig to couteract malicious attacks. I civilia systems however, SS has bee discarded from usage maily because it requires a pre-shared secret, which may ot be available [, 7]. For example, i systems which employ large umber of dyamically associatig/disassociatig odes, the pre-sharig has to be doe over a ope chael makig it a easy target by a adversary who focuses all its jammig eergy o the key establishmet protocol. The problem has bee itroduced previously as the atijammig/key establishmet circular depedecy problem [4]. Strasser et al. also propose a ew mechaism called Ucoordiated Frequecy Hoppig (UFH) to break this circular depedecy, however, at a high commuicatio cost.

2 I this paper, we propose a ovel approach for breakig the ati-jammig/key establishmet circular depedecy with sigificat eergy efficiecy advatages over UFH. Our mechaism relies o two mai properties: () itractable forwarddecodig (prevetig a adversary from detectig or decodig a o-goig commuicatio), (2) efficiet backwarddecodig (allowig ay receiver to decode the time-reversed sigals). Note that although the adversary ca also decode the time-reversed sigal (ad fid out which Pseudo radom (PN) spreadig sequece was used), it will be too late for it to jam by the time it retrieves the PN-sequece (See Figure ). The basic idea behid our scheme is that the seder spreads the message with a cryptographically-strog PN-sequece. Forward-decodig the packet requires guessig the whole key iitially, which we will show to be ifeasible for the jammer to accomplish (by brute force) i time to jam the packet before the ed of the packet trasmissio. As commuicatio progresses, the etropy of the spreadig sequece decreases (See Figure 4), thus o the receiver side, decodig the time-reversed versio of the packet oly requires the receiver to guess oe bit of the key at each stage of the decodig process. We will also show that uder our scheme, at each istat the time it takes for a ode to brute-force the PN sequece plus the TX/RX tur-aroud time ad propagatio time is larger tha the time it takes for the seder to sed the remaiig bits of the message. This makes forward-decodig itractable. The mai advatage of our solutio, i compariso with UFH [4], is that it does ot require extra eergy for trasmittig packets. It is i fact as eergy efficiet as the covetioal SS commuicatio where the commuicatig odes pre-share a secret key. UFH, o the other had, requires o average times more eergy tha traditioal SS, beig the spreadig factor that is i the order of hudreds. We achieve this commuicatio-eergy efficiecy with a slight icrease i the receiver computatio ad storage cost. We show that the computatio/decodig cost is at most twice the computatio cost of covetioal SS (See Theorem 2) ad the storage required is of oe packet legth. A secodary advatage of our techique is the delayed commuicatio detectio, which makes it practically impossible for a adversary to sese a ogoig commuicatio util it is almost over. This stealthiess further icreases the iefficiecy of the adversary by forcig it to be a chael-oblivious jammer [2]..2 Related Work Ati-jammig techiques have bee studied for decades [3]. Most of the earlier mechaisms however, oly focussed o a physical layer protectio ad made use of SS techiques, directioal ateas, ad codig schemes. At the time, most wireless commuicatio was ot packetized or etworked. Furthermore, the small size of the etworks the (mostly military), ad the way they were deployed allowed for precofiguratio with shared secret keys to be possible. Reliable commuicatio i the presece of adversaries regaied sigificat iterest i the last few years. New attacks emerged with the advet of more complex applicatios ad deploymet eviromets. Several specifically crafted attacks ad couter-attacks were proposed for: packetized wireless data etworks [, ], multiple access resolutio i the presece of adversaries [3, 2, ], multi-hop etworks [6, 5, ], broadcast commuicatio [6, 5], cross-layer attacks [], ad avigatio iformatio broadcast [2]. While may recetly proposed coutermeasure techiques ca (ad are assumed to) be layered o a SS physical layer, it is usually take for grated that the commuicatig odes pre-share a secret key. Strasser et al. recogized this as a sigificat impedimet to the use of SS, eve whe the commuicatig odes possess public keys ad certificates that potetially allow them to setup a shared secret key [4]. Strasser et al. proposed UFH, a techique for establishig a symmetric secret key i the presece of adversaries. I UFH, the sedig ode hops at a relatively fast rate (e.g., 6 hops per secod) over chaels. It repeatedly seds fragmets of the mutual autheticatio ad key establishmet protocol. The receiver hops, o the other had, are sigificatly slower. Therefore, although the receiver does ot kow the seder s hoppig sequece, statistically, it ca receive / of the set packets. The authors show that a adversary has a very low probability of jammig these packets. They build upo this basic mechaism to costruct a jammig-resiliet mutual autheticatio ad key establishmet protocol. Their paper itroduces the first reliable key establishmet protocol for SS without a pre-shared secret. However, ulike traditioal SS systems with pre-shared keys, the proposed mechaism icurs a icrease i eergy cost by a factor of due to the implicit redudacy i packet trasmissios (retrasmissios of message fragmets that are ot received) required by their scheme. This is the closest work related to our paper. Our mechaism, ulike UFH, retais the mai beefits of the origial SS commuicatio i terms of commuicatio eergy (all trasmitted eergy is used i the packet decodig process). It does icur a higher computatio cost, which we show later is o more tha twice the cost of the traditioal SS with pre-shared secret. With ever icreasig computatio power of computers today, this is a egligible issue. Other coutermeasure techiques discard the possibility of usig SS because of the arrow RF bads available to ad hoc etworks, or because of the absece of a pre-shared key as metioed above [7, ]. These techiques are much less eergy efficiet tha SS. Note that SS ca still be used i arrow bad if the sigal is spread i time at o additioal eergy cost. The tradeoff i that will be a reduced data rate by a factor equal to the spreadig legth, which is ot ecessarily a limitatio as two odes ca have multiple simultaeous commuicatios as i Code Divisio Multiple Access systems..3 Cotributios The cotributios of this paper are both coceptual ad algorithmic: Zero commuicatio-eergy overhead key establishmet of a shared key without pre-agreed kowledge (i compariso with covetioal SS with pre-shared keys): a ovel approach based o itractable forward-decodig ad efficiet backward-decodig. Udetectable commuicatio util ed of trasmissio (delayed detectio) forcig the jammer to become eergy-iefficiet ad chael-oblivious [2]. A destiatio-orieted scheme that prevets efficiet simultaeous-attacks o multiple receivers.

3 Computatioally efficiet ed of the message detectio (a FFT-based techique), ad message extractio (use of a key-schedulig algorithm that requires at most twice the decodig cost of covetioal SS). 2. SETUP MODEL Our setup model cosiders systems that are traditioally capable of doig SS, such as mobile ad hoc etwork. I particular, it is ot applicable to systems with low computatioal power, e.g., wireless sesor etwork. The implemetatio of our scheme requires systems to have at least a GB of memory to carry out FFT computatios. 2. System Model We cosider a wireless commuicatio etwork where several odes are tryig to establish pairwise-shared secret that would eable SS commuicatio. Our model ad the problem formulatio is very similar to [4]. We focus o a pair of commuicatig odes alog with a jammer, all sharig a RF chael. The jammer s objective is to prevet the establishmet of the secret key betwee the commuicatig odes, because oce this key is established, the commuicatig odes ca use covetioal SS for commuicatio makig them resiliet to jammig. Our mai objective is to devise a jammer-resiliet message-delivery mechaism with o pre-shared iformatio. which ca be used by ay Mutual Autheticatio ad Key Agreemet Protocol (MAKAP) to deliver few messages ad establish a key for future SS commuicatio. I this paper, we cosider the same MAKAP as i [4], amely Elliptic Curve Diffie Hellma (ECDH) because of the small umber of messages exchaged (two) ad their short legth. Our method uses Direct-Sequece SS (DSSS), but it easily geeralizes to Frequecy-Hopig SS (FHSS). Assumptio We assume that there exists a trusted Certificate Authority (CA) that issues digital certificates attestig each user s public key. Aythig that is kow to the receiver about the protocol ad the seder is kow to the jammer. This icludes the ecodig the decodig mechaism that makes our system so efficiet Adversary Model We cosider a adversary that is co-located with the seder ad the receiver that ca jam, replay previously collected messages, isert fake messages ad/or modify bits of the message. The primary goal of the adversary is to prevet successful receptio of the seder s message by the receiver. However, i a attempt to do so, a jammer may simply icrease the delay of the message extractio process or cause deial of service (DoS) attack o the receiver side. So, it s secodary goal may very well be to icrease the computatio ad eergy cost of the receiver while miimizig its Note that give the eergy, computatio, ad storage efficiecy of our techiques, if o certificatio authority is available, we ca cosider usig our scheme to trasmit all packet without ever establishig a key. 2 Regardless of the attacker beig oe of the participatig odes or a outside jammer, it has the same amout of iformatio available to the receiver. ow jammig cost. We defie jammer s performace as the trade-off fuctio relatig the packet loss rate (PLR) with the total jammig cost. Our classificatio of the adversary attacks is ispired by the well kow active attack categorizatio ad the attacker model of [4]. However, the specific attacker strategies we desiged ad implemeted for evaluatio of our scheme are protocol-specific. I Sectio 5, we also preset the empirical optimal jammer strategy ad show that it is cost-iefficiet uder our proposed scheme. Assumptio We igore the gai of cofigurig physical layer parameters such as atea gais, codig schemes, ad power-cotrol (e.g., ear-far problem) sice they ca be optimized the same way as they are optimized i covetioal SS, idepedet of our mechaism. Our model does ot cosider the case where the jammer ca block the propagatio of the radio sigal (e.g., by puttig a ode ito a Faraday s cage) We assume that the adversary caot tuel the chael sigals for remote brute-forcig before the ed of the packet trasmissio (few millisecods). Taxoomy of the Attacks. ammig: The attacker ca jam the commuicatio lik i various ways, such as sedig a high-power pulse either at periodic itervals, cotiuously, or i a memoryless fashio [2]. The goal is to distort packets ad cause failure of correct packet decodig. 2. Replay Attack: The attacker ca replay previously captured commuicatio messages. The goal is to icrease the computatio cost of () packet decodig, ad/or (2) sigature verificatio. 3. Targeted Modificatio: The attacker ca modify some bits of the message by focusig the jammig eergy o some portio of the message. The jammer caot determiistically carry out this attack sice it ca ot detect o-goig commuicatio uder our mechaism util last few bits of message are set. 4. Computatio Deial of Service: The attacker iserts partial or complete messages to overwhelm receiver s () packet decodig, ad/or (2) sigature verificatio. Notice that we do ot make ay additioal assumptio o the limitatio of jammer s computatio power ad eergy more tha what a traditioal SS does. Obviously, if the jammer is ifiitely powered eergy-wise ad cotiuously jams all the time, it could reduce the throughput to %, just like it would i a traditioal SS. Our mai goal here is to devise a jammer resiliet key establishmet protocol with o pre-shared key ad at o additioal cost compared to the traditioal SS. I Sectio 5, we evaluate the performace of the jammer types described above ad preset simulatio results.

4 3. TREKS IN DSSS Time-Reversed Message Extractio ad Key Schedulig (TREKS) is a commuicatio approach based o zero preshared key spread spectrum (ZPKS), specifically DSSS (ZPK- DSSS) i this paper. We will first preset the core idea of ZPK-DSSS ad its efficiecy agaist jammig. The we propose a ovel key schedulig scheme, which eables efficiet backward-decodig makig TREKS very applicable to systems i terms of commuicatio eergy, computatio ad storage cost. 3. Zero pre-shared key DSSS Assume that seder S, receiver R, ad jammer all share the same chael. Let M deote the message that S wats to sed to R, l the bit-legth of M. Prior to the start of trasmissio, S radomly geerates a secret key K of k bit legth. Ulike covetioal DSSS, K is ot kow to ayoe but S whe commuicatio occurs. S geerates a cryptographically strog PN-sequece usig S ad spreads M. Although, a PN-sequece cryptographically geerated from the key (as a seed to a symmetric ecryptio algorithm such as AES) are ot optimal i terms of orthogoality, they perform reasoably well ad have bee used i may military SS systems [3]. I covetioal DSSS, R keeps attemptig to despread icomig sigals with the key, that is pre-shared betwee S ad R, util it detects the begiig of the message, the the forward-decodig of whole message starts. I ZPK- DSSS, there is o pre-sharig of the key. Thus, R eeds to first idetify the key K chose by S. Without kowig K, R does ot eve kow whe the DSSS commuicatio occurred. The oly possibility is to brute force all possible keys o every chip of the icomig sigal util a key is foud that could properly decode the complete message. Give that the key size is k bit, the complexity of explorig the key space by brute force is O(2 k ). This cost is ifeasible for real-time commuicatio. I Sectio 3.3, we itroduce our backward-decodig mechaism with a key schedule to be itegrated ito this approach that make its efficiet ad viable for real-time commuicatio. 3.2 ammig resiliecy We first demostrate the fudametal stregths of the proposed approach from the stadpoit of key recovery itractability ad eergy efficiecy agaist jammers Commuicatio eergy efficiecy I this sectio, we preset the way the message bits are spread ad how the total eergy per packet is preserved. We also show that the eergy cost of the jammer to couter the effect of spreadig icreases by factor of. Symbol Defiitio d {+, } BPSK symbols that are estimated ad mapped to {, } equiprobably ˆd {+, } Received BPSK symbols that are estimated ad mapped to {, } Spreadig Factor pi 2 f ; : : : ; g {, +} i t h chip of cryptographically desiged SSEQ ukow to adversary. Eb Eergy per trasmitted bit assumig w.l.o.g bit set per uit time. ui = d E b pi BPSK modulated sigal trasmitted by the seder. ammer eergy per uit time Ii 2 f ; : : : ; g Adversary s trasmitted sigals idexed at the chip level. Mea square of Ii vi Received sigal idexed at chip level. ri jammig chip with uit mea square. BER(x, y, z) Bit Error Rate of despread sigal whe Eb = x, = y ad = z Table : Termiology FACT. Spreadig a sigal by a factor allows, the commuicatig odes to couter a -times stroger jammer at o extra-eergy cost for the seder: P r o o f. Sice, we are oly iterested i the impact of jammig, we ormalize the path loss ad atea gais to. For simplicity, we igore thermal (white) oise. The same result still holds i the geeral case. By defiitio, Eb v i = u i + I i = d p i + r i Cosider the followig decodig techique 3 : ˆd =iff v i p i > We cosider BPSK modulatio but the results geeralize to other modulatios as well. The BER(E b,, ) = Pr[ ˆd =ad d = ] + Pr[ ˆd = ad d = ] = 2 Pr[ v i p i > ad d = ] Eb = 2 Pr[d p i p i + r i p i > ad d = ] Eb = 2 Pr[ p i p i + r i p i > ad d = ] = 2 Pr[ E b + r i p i > ] Pr[d = ] Eb = Pr[ r i p i > ] where p i is a radom variable idepedet from the adversary s r i choices. Therefore, ripi is the sum of radom variables of equal probability takig values {, +}. The distributio of the sum ca be derived from the Biomial distributio. For, this distributio ca be approximated by a Normal distributio of zero mea ad variace : N(,). Thus, BER(E b,, ) = e x2 2π 2 dx = E b E b e x2 dx () 2π 2 Eq. () idicates that whe the spreadig factor is icreased by a factor c, the adversary eeds to scale its jammig eergy by a factor c to maitai the same BER. O the trasmitter side, sice the eergy per bit is kept costat, trasmitter still speds the same amout of eergy while beig resiliet to c times more jammig Computatioal ifeasibility for jammer I order to jam i a cost efficiet way, the jammer eeds to idetify the spreadig key. As show above, the complexity of fidig the key is O(2 k ). If k is desiged such that idetifyig the key takes sigificatly more time tha the packet trasmissio the eve if the jammer evetually fids the key, it is too late to jam the packet as the trasmissio is already over. For example, give a key size of 3 Note that we are assumig that the receiver kows the bit sychroizatio. This is a commo assumptio i aalyzig SS systems. We will see i Sectio 4 how this is achieved.

5 k = 2, =, ad seder chip rate of Mcps (s chip duratio), it takes few millisecods to trasmit (e.g., ms for bits spread with = ). That meas it requires the jammer i the order of multiplicatio operatios per picosecod to brute-force 2 2 possible keys withi few millisecods of trasmissio time, which is ot possible for a field deployed jammer to accomplish. We call this itractable forward-decodig, which is illustrated i Figure Limitatios Itractable forward-decodig is due to zero pre-shared secret i ZPK-DSSS, which i-tur also applies to the receiver. Sice the receiver eeds to try O(2 k ) possibilities o each icomig chip sigal to figure out the spreadig key, it causes a cosiderably high computatio overhead. This is a major limitatio of the basic ZPK-DSSS. I the followig sectio, we itroduce a ovel spreadig key schedulig scheme, which builds upo ZPKS ad eables both itractable forward-decodig ad efficiet backwarddecodig. This drastically reduces the computatio overhead for the receiver from O(2 k ) to O(2k) while the jammig resiliecy remais the same. 3.3 Key scheduled reverse-time decodig 3.3. Key size vs. jammig resiliecy Before delvig ito the details of our key schedulig scheme, we first show how the key-etropy is reduced as the trasmissio gets closer to the ed, which sigificatly cuts dow the cost to idetify the key for the receiver but still requires the same effort from a adversary. T heo r em. Let T t r a s (l) deote the trasmissio time of l bits, T s(k) the time required to brute force all possible k bit keys. Give a message M ad key size k, if it is secure 4 to spread M with a k-bit key, it is secure to spread the last j M j 2 i bits with k i bit key, where i log 2 ( M ). Eq. (2) shows that it is secure to ecode j M j bits with k 2 bit key. Therefore, eve if we use a -bit weaker key to ecode the secod-half of M, we ca guaratee that the whole message ca still be delivered before the jammer brute forces all possible keys. By iductio, it is easy to get that T t r a s ( j M j ) T 2 i s (k i). Thus, it is secure to spread the last j M j bits with k i bit key. 2 i The ituitio behid Theorem is that as trasmissio goes o, less time is left for jammer to fid the key, so it is safe to ecode the rest of the message with slightly weaker keys Spread key schedulig Based o Theorem, we itroduce a key schedulig scheme to TREKS. As show i figure 2, istead of spreadig the complete message with a fixed key, we partitio the message ito k segmets (ote that the segmets are trasmitted i a cotiuous way), where k is the key size. We call each segmet schedule. The size of ith segmet M i is j M j. At the start of spreadig process, we use full legth 2 key i to spread M. After each schedule, we set the most sigificat bit of the key to a kow value ad resume ecodig the ext segmet with this -bit weaker key. We repeat this process util the last schedule, which is ecoded with a key with oly bit secret. So, it is easy to see that the message legth l has to be at least 2 k such that k could be decreased to bit towards the ed of the key schedule. For simplicity, we assume that l = 2 k. We loose this assumptio i the later sectio. Algorithm outlies the message segmetatio ad key schedulig. Symbol M K l k K[m... ] M[m... ] K i M i N i Defiitio message to be trasferred secret key legth of message i bits size of secret key i bits part of the K from m t h bit to t h bit part of the M from m t h bit to t h bit key used i schedule i message segmet belogig to schedule i size of rest of message at the start of schedule i Table 2: Summary of the otatios. Figure : Message delivered before the key is broke. P r o o f. We first show that it is secure to spread the secod half of M with k bit key. Sice it is secure to spread M with a k bit key, we have T t r a s( M ) T s(k) T t r a s( j M j 2 ) = Tt r a s( M ) 2 2 T s(k) =T s (k ) (2) 4 I the rest of the paper, secure key size implies it takes sigificatly more time to brute-force all possible keys used to spread tha to trasmit the message. Algorithm : Seder ecodig message with key schedule.. N M 2. for i =...k do K i K[i... k] M i N i [... N i 2 ] cryptographically geerate PN i ecode M i with PN i N i + N i [ M i +... N i ] from K i Itractable forward-decodig: By the defiitio of the key schedule ad theorem, the property of itractable forward-decodig is maitaied. Efficiet backward-decodig: Due to the decreasig key etropy, it becomes easier for the receiver to idetify the key as the trasmissio is closer to the ed. Specifically, sice the last key schedule has etropy of bit, the receiver eeds 5 Additioal measures ca be take to prevet overlap betwee weakeed key spaces.

6 to try just two keys o each icomig chip to detect the potetial ed of message (EoM). Oce the receiver detects a potetial EoM, it starts iferrig the key from previously received sigals usig the kowledge that the etropy of K i from that of K i i the key schedule icrease by oly a bit i reverse time. So the receiver eeds to try 2k keys i total before realizig all the k bits of the key, sigificatly lowerig the cost of fidig the key from the basic scheme. Figure 4: Key schedulig with liear tail. Figure 2: TREKS with key schedulig. 3.4 Further improvemets ad discussio 3.4. MAC-masked key schedulig I the key schedulig scheme above, the last scheduled key K k is always either or for ay seder/receiver pair. Thus, the jammer could jam with a PN-sequece geerated by or, which is likely to compromise the last message segmet. Oce the EoM is jammed ad the receiver is ot able to detect it, the reverse decodig caot start. I order to tackle this issue, we take the receiver s MAC address to mask the key at each schedule. The revised key schedulig strategy is illustrated i figure 3. The key K i used to ecode M i is geerated by replacig the most sigificat i bits of the receiver s MAC address with the most sigificat i bits of K. It is easy to see that the hardess of the key iferrig remais the same. Whereas, the last scheduled key is differet across differet receivers. Thus, the jammer ca oly target oe receiver at a time. The potetial jammig attack metioed earlier becomes a destiatio-orieted attack. I sectio 5 we will discuss the impact of the MAC jammer ad show that our system is highly resiliet agaist such jammer as it is agaist other jammers Key schedulig with liear tail As metioed at the ed of 3.3.2, we assumed that l = 2 k so that key size ca be decreased dow to bit by k t h schedule, ad total message legth l for k = 2 would be M bits. Obviously this is too large for a message size. We also observed that if T t r a s ( M ) T ±, where T ± is the radio tur aroud time of the jammer, it is impossible for the jammer to jam M. I this case, whe the jammer detects the trasmissio ad switches to a trasmit mode, the message has already bee delivered. Take 82. as a example, the radio tur aroud time is us. Cosider a spreadig factor =, chip rate of Mcps, the we have T t r a s () = us. So for the last bits of the message, the seder ca weake the key at a liear rate of key bit per packet bit. Therefore, oly the first bits of the key eed to be scheduled. Thus, the message size becomes + 9 i= 2i = 33 bits, which is a reasoable size. Note that if T ± allowed for oly the trasmissio of a smaller umber of bits, we ca liearly weake the key by more tha oe key-bit per trasmitted bit. This slightly icreases the computatio cost of key iferrig but oly o a small umber of bits. The revised key schedulig algorithm is illustrated i Figure 4. Next, we preset the efficiet backward decodig algorithm, its computatio complexity ad briefly discuss the key establishmet protocol uder TREKS. 4. EFFICIENT BACKWARD-DECODING Figure 5: Workflow of TREKS Message Decodig 4. Overview of TREKS Decodig MAC-masked TREKS eables efficiet backward-decodig, which is best described as a two-phase pheomeo [See Figure 5]: Phase-I : Fidig EoM by computig the cross-correlatio betwee received chips ad the PN-sequece geerated with receiver s MAC address. Phase-II : Iferrig the key i time-reversed fashio, which is used to despread the message. Figure 3: MAC-masked key schedulig.

7 4.2 Fidig the EoM (Phase-I) As show i Figure 5, Phase-I cosists of two steps, (a) samplig ad bufferig, ad (b) FFT EoM detectio. Whe ew sigal samples arrive, the receiver equeues them ito a FIFO. At ay istace, the receiver oly have to keep 2l chips i his buffer because after fidig the EoM, he will have to traverse at most l legth before he recovers the message. We compute cross-correlatio to achieve bit sychroizatio, a very commo practice i SS systems [3]. However, calculatig cross correlatio is computatioally expesive. We optimize this calculatio (a) by usig FFT, which reduces the cost of computig cross correlatio from 2 2 l to l log(l), ad (b) by processig a batch of l chips at oce durig FFT computatio ulike covetioal SS systems that process chips (spread of a bit) at a time. Symbol Defiitio m message set by the seder, as z segmets Seg[i] Segmets of a message, where i z K[i] Key used to geerate spread PN-sequece, i z Ki Possible set of keys, Ki 2, that receiver tries to despread Seg[i] with. S[i] Real-time Sigal that is sampled at the receiver side. P EoM[i] Array of possible EoM idices. M[i] Array of extracted complete messages. GetBuffer(.) Gets the ext l chips from the sigal stream for samplig. DotP rod(.) Dot product of two vectors (correlatio fuctio). F F T (.) Fast Fourier Trasform. IF F T (.) Iverse Fast Fourier Trasform. Fast Correlate(.) Calculatig Covolutio betwee a short ad a log sigal. Key Ifer(.) Fuctio to ifer the key. P eak Detectio(.) Fuctio to detect peaks at Seg[i], i z Despread(.) Stadard Spread Spectrum fuctio to despread received sigal. Sigature V erify(.) Fuctio to verify the seder. Table 3: Additioal otatios Algorithm 2: Fidig the Ed of the Message (EoM). Old Buffer = GetBuffer(S); 2. for each buffer of legth ( l) do Curret Buffer = GetBuffer(S); Set k = MAC ADDRESS(Rcvr); Corr[ : l]=fast Correlate(Curret Buffer,k); for each j {,, l} do If Corr[j] > threshold the push j ito PEoM[]; If PEoM[] is empty Old Buffer = Curret Buffer; Else Buffer = cocat(old Buffer,Curret Buffer); Key Ifer(Buffer,PEoM); Fast Correlate(Buff,key){ Temp Key[:*l] = Zeros; Temp Key[:] = key; Iput = FFT(Buff); Iput2 = FFT(Temp Key); //Pre-computed Corr[:*l] = IFFT(Iput*Iput2 ); retur Corr;} As illustrated i Algorithm 2, our FFT detectio process iterates over each chip i the buffer to fid the EoM. Oe challege is that there might be more tha oe cadidate for EoM, i.e., multiple values of the correlatio vector may pass the threshold test to produce false positives. Thus, we equeue all possible EoMs ito PEoM[], ad pass it to Phase-II for further processig. We pick threshold value empirically by observig TREKS performace over large umber of simulatio rus, details of which is give i Sectio Message Extractio (Phase-II) Phase-II cosists of Step 3 ad 4 as show i Figure 5. I Step-3, we ifer the key by fidig the legitimate EoM out of all PEoM foud i Phase-I. For each PEoM, we begi timereversed key iferrig. For each key bit, we try two possible choices. Algorithm 3 shows this process. For a certai guess, if more tha 5% of the total bits are detected i a schedule, the we cofirm the value for this key bit ad move oto the ext. Otherwise, we abort the key iferrig. Hece, we get Theorem 2. T heo r em 2. The computatioal cost of TREKS message despreadig is at most twice the computatioal cost of covetioal SS systems with a pre-shared key. P r o o f. For each segmet, the receiver attempts to despread the bits with two potetial keys. Therefore each bit is despread twice. Leadig to a computatioal cost of twice a covetioal spread-spectrum. Note, that this cost ca be reduced by elimiatig oe of the two keys after attemptig oly few bits of a packet. I Phase-II, aother optimizatio we employ is that after we fid the EoM, istead of computig FFT each time to sychroize with the bits of the message, we compute the dot-product betwee chips ad the PN-sequece. The abortio of key iferrig process implies a packet loss otherwise we despread the message usig the key iferred [Step-4]. We discuss the choice of the threshold values used i Algorithm 2 i Sectio 5. Algorithm 3: Message Extractio. Key Ifer(Buffer,PEoM){ for each possible EoM j PEoM do PeakPos = +j; //EoM = Buffer[+j] edidx = PeakPos-; //Ed of Seg[z-] for each p {,,z} do startidx = edidx Seg[z] + ; CtOfSucc = ; for each key cadidate k K z p do succ = Peak Detectio(k,Buffer, startidx, edidx); CtOfSucc = CtOfSucc + succ; If(CtOfSucc==) K[p] =k; Else Abort Key Ifer(Buffer,PEoM); edidx = startidx; m = Despread(Buffer[j ( l) +,j],k[]); Equeue m ito M[];} 2. Sigature Verify(M[]); Peak Detectio(key, Buf, startidx, edidx) { ExpNumofPeaks = (edidx - startidx)/; CtOfPeaks = ; for each d {,,ExpNumOfPeaks} do P=DotProd(key,Buf[startIdx,startIdx+]); If P > threshold the CtOfPeaks = CtOfPeaks+; startidx = startidx+(d ) ; If CtOfPeaks > 5%*ExpNumOfPeaks succ = ; Else succ = ; retur succ; } Sigature Autheticatio ad Key Establishmet At the ed of Algorithm 3, depedig o the type of jammer ad its strategy, a receiver might ed up recoverig more tha oe message, amely the jammer messages. I that case, the receiver has to verify the seder usig some

8 Bit Error Rate (BER).... (a) SNR vs. BER t= t=2.5 No e Sigal to Noise Ratio (SNR) i db Packet Loss Rate (PLR) (b) SNR vs. PLR t=2.5 t= No Sigal to Noise Ratio (SNR) i db Figure 6: Two graphs (a) SNR vs. BER (b) SNR vs. PLR. t = T h r e s h o l d ad No without TREKS. a v e r a g e kid of mutual autheticatio ad idetificatio mechaism. TREKS uses 6 bit Elliptic Curve based Digital Sigature Algorithm (ECDSA) to autheticate the odes ad their data set over the chael. A 6-bit ECC key provides the same level of security as that of a 24-bit RSA key [8], which is sufficietly secure for the purposes of a sessio-based ecrypted message trasmissio of TREKS. The choice of the key establishmet protocol for TREKS eed ot be a specific key establishmet protocol. Similar issue is already discussed extesively i [4]. So, we will use the same protocols of [4]. 5. PERFORMANCE EVALUATION We evaluate the performace of TREKS i terms of the Packet Loss Rate (P LR) as a fuctio of commuicatio/jammer eergy, computatio cost, ad storage cost. Based o Fact, we ca focus o two jammers: () additive white gaussia jammer (whose eergy is reduced by a factor ) evaluated i Sectio 5., ad (2) jammers spreadig a sigal with the receiver MAC address evaluated i Sectio 5.2. Without kowig the begiig of the trasmissio, the jammer is forced to operate as a memoryless jammer with a rate λ. We call these λ-jammers. Note that if λ =, it becomes a cotiuous jammer. Simulatio Setup: We use MATLAB to simulate the commuicatio, jammig, ad message extractio uder various settigs of the cofigurable parameters to depict differet types of jammers uder differet scearios. All the graphs are based o K simulatio rus of same parameter settig. The variables of our simulatios are: Spreadig Factor, Packet Size, l 33 bits Key Size, 9 ammer Power to Sigal Power Ratio, SR [..] Normalized Sigal Power dbw Noise Power -2 dbw Table 4: Parameters for Simulatio. 5. TREKS vs. Gaussia ammers We cosider the case where the seder ad the receiver commuicate uder a white Gaussia jammer. From Fact, this correspods to iterferers ot usig the destiatio MAC address. Their iterferece results i Gaussia oise of eergy reduced by a factor. 5.. Packet Loss Rate (PLR) The P LR uder our model implies oe of the followig: (a) Key Ifer Failure, (b) EoM missig, ad (c) High BER (over 5% []). Figure 6 shows the PLR ad the BER icurred usig TREKS, as a fuctio of a icreasig SNR ad differet detectio threshold. Note that due to the imperfect sychroizatio ad EoM recovery, we oly obtai a gai of 5 7 db (i.e., 2 to 5 times resiliecy gai) False Positives The umber of False Positives (FP) ecoutered durig the FFT EoM detectio process affects the performace of TREKS i terms of its computatioal delay. I fact, we use the PLR ad the umber of FPs observed while ruig TREKS at a fixed oise level of db to choose the peak detectio threshold used i Algorithm-2. We defie threshold as t avg where avg is the average of the correlatio vector produced by fast correlate(.) of Algorithm-2, ad t is a multiplier. Based o the results from Tables 5 ad 6, we chose t to be 2.5 because of a much smaller FP rate observed at threshold = 2.5 avg, eve though we loose about 2dB of jammer resiliecy. SNR (db) t=. t = 2. t = 2.3 t = 2.5 t = 3..79%.48%.94%.58%.22% 5.8%.48%.94%.58%.22%.79%.47%.96%.59%.22% 5.79%.5%.98%.6%.23%.78%.57%.%.64%.25% Table 5: False Positives (FP) SNR (db) t=. t = 2. t = 2.3 t = 2.5 t = % 48.% 49.5% 47.5% 64.5% 5.%.2%.5%.5% 4.%.%.%.%.%.% Table 6: Packet Loss Rate (PLR). Importat Observatio: Figure 7 shows that we detect almost all of the FPs amog PEoMs by the first two iteratios (stages) of key ifer() i Algorithm 3 whe threshold = 2.5 avg. Thus, FP does ot impact TREKS computatioally by much. The icrease i computatio cost is egligible compared to the decodig cost, which itself is less tha double the cost of decodig i traditioal SS Computatio Cost Operatio Usig GPU Lab Computer FFT bechmark ms 28ms Key Iferrig - ms Sigature Verificatio - ms Table 7: TREKS Computatio Cost. Table 7 shows the computatio cost of TREKS performed i our lab computer versus usig a GPU NVidia GeForce 88 GTX. Usig the latter, we ca accelerate the FFT computatio by 28 times [9]. The specificatio of our lab computer is a 64-bit Itel(R) Core(TM)2 CPU with 3GB memory. It clearly shows that with appropriate off-the-shelf hardware, TREKS ca operate i real time with its total executio time uder 3ms. We used OPENSSL-.9.8 versio to calculate the bechmark for verifyig 6-bit ECC-DSA Storage Cost The storage cost of TREKS accouts for (a) the total umber of messages recovered at the ed of message extractio, ad (b) the size of the FIFO used i bufferig the sigal

9 Percetage of FPs Detected (b) FP Detectio Stage Distributio (Threshold 2.5) S S2 S3 S4 S5 S6 S7 S8 S9 Key Iferrig Stages Percetage of FPs Detected (a) FP Detectio Stage Distributio (Threshold ) S S2 S3 S4 S5 S6 S7 S8 S9 Key Iferrig Stages Packet Loss Rate (PLR) a. PLR as a fuctio of Budget (Radom ammer) Budget= Budget=5 Budget= Budget=5.6 Budget= ammer Power to Sigal Power Ratio(SR) Packet Loss Rate (PLR) b. PLR as a fuctio of Budget (MAC ammer) Budget= Budget=5 Budget= Budget=5.6 Budget= ammer Power to Sigal Power Ratio(SR) Figure 7: Distributio of the FP detectio stage. Figure 9: ammer performace uder fixed budget. Packet Loss Rate (PLR) a. PLR due to differet jammers (=).6 (Radom) Sceario-.4 (Radom) Sceario-2 (Radom) Sceario-3 (MAC) Sceario-.2 (MAC) Sceario-2 (MAC) Sceario ammer Power to Sigal Power Ratio(SR) False Positives (FP) b. FP due to differet jammers (=) (Radom) Overlap (Radom) No Overlap (MAC) Overlap (MAC) No Overlap ammer Power to Sigal Power Ratio(SR) Figure 8: ammer performace compariso. samples i Algorithm-2. Eve if a jammer ijects j packets, we store at most (j + ) l/8 bytes, ad the curret buffer i Algorithm-3 holds l samples. Hece, the storage cost of TREKS is 4 l+(j +) l/8 bytes (assumig each sample is a 32-bit I/Q value), clearly withi the storage capacity of today s computer. 5.2 TREKS vs. λ-ammers Cosider a discretized time with timeslots of duratio l chips. We defie two differet kids of jammers that take parameters λ ad SR. λ represets the probability that a jammer seds a jammig message at a give timeslot (this correspods to discretizatio of a Poisso memoryless jammer to a Beroulli jammer), ad SR is the jammer to sigal power ratio. The cost of the jammer is λ SR, ad its goal is to maximize the P LR for a give budget. I our simulatio, we assume that the seder is always sedig messages. Note that the actual jammer impact will be less tha the simulatio graph s because the jammer does ot kow whe a trasmissio occurs. Thus, a source trasmittig with probability µ would cause a jammer efficiecy decrease by a factor of /µ. ammer Types: ammers could also sed partial messages but this ca be idepedetly addressed with appropriate iterleavig ad codig []. Hece, we cosider followig jammers i our simulatio: (Radom) ammer-: Iserts a l-bit message, each bit spread with a radom PN-sequece. (MAC) ammer-2: Iserts a l-bit message, each bit spread with the PN-sequece geerated usig the MAC address of the receiver as the seed. ammig Scearios: Cosider a data message that occurs iside a two timeslot (TS) widow. Now, a jammer message might occur i the first, secod, both or oe of the timeslots. This gives rise to followig possible scearios: Sceario-: ammer message occurs i the first TS. Impact: Key iferrig. Sceario-2: ammer message occurs i secod TS. Impact: EoM detectio. Sceario-3: ammer message itersects both TS. Impact: Key iferrig ad EoM detectio. Sceario-4: Does ot occur durig those two TS. Impact: Noe. Sceario-5: ammer s packet is perfectly sychroized with the seder packet at the receiver side. Impact: If perfect sychroizatio was possible, the there is a.5 probability that the last bit of the message is jammed, hece causig to miss the EoM. Observatio: I Figure 8(b), we show that o matter which of the four scearios we ru, there is o icetive for the jammer to icrease its SR if its objective is to icrease the FPs. With overlappig or without, the resultig umber of FPs that impacts EoM detectio is same. For a give λ, let s defie the expected PLR: E[P LR] =E λ( λ)+e 2 λ( λ)+e 3 λ 2 +E 4 ( λ) 2 where E,E 2,E 3,ad E 4 are the expected P LR for above defied Scearios-,2,3 ad 4 respectively. Figure 8(a) shows that for both the MAC ad Radom jammer, sceario-2 has more impact o PLR tha Sceario- ad Sceario-3 has slightly more impact tha the both. Obviously, E 4 =. Figure 9 shows that Radom ammer ad the MAC ammer attai their optimum (expected) PLR approximately whe SR 5. Note that these results are based o the assumptio that the commuicatio is always happeig. I reality, the impact of the jammer will be much less. Case of the MAC ammer: The MAC jammer outperforms the Radom jammer oly i terms of the umbers of FP produced. However, Figure 7 shows that by the third stage of key iferrig, almost all of the FPs are detected. Thus, its impact i terms of computatio ad delay is egligible compared to decodig cost. I terms of PLR, it is a very close race betwee the MAC jammer ad the Radom jammer with MAC jammer wiig by a slight margi. This is simply because oly the last bit of the message is spread with receiver s MAC address. Case of Perfect Sychroizatio (Sceario 5): We believe that it is very hard for the jammer to attai Sceario 5, i.e., achieve perfect sychroizatio, because uder our mechaism the jammer does ot kow whe the commuicatio is happeig, ad oly oe (last) bit of the packet is actually spread with receiver s MAC address. Therefore, the probability of Sceario 5 is /. 6. CONCLUSION AND FUTURE WORK We itroduce a method for achievig SS ati-jammig without a pre-shared key. Our method has zero eergy overhead i compariso with covetioal SS commuicatio.

10 Our solutio relies o itractable forward-decodig ad efficiet backward-decodig. We propose several algorithms to optimize the decodig ad show that the computatioal cost of despreadig is less tha twice the covetioal SS cost. Our method has additioal beefits of delayed detectio ad destiatio-orieted trasmissio makig jammig ifeasible ad keepig its impact to miimal by prohibitig jammers from simultaeously jammig multiple receivers. Future Work: Sice we focus o the key establishmet for systems like SS, graceful degradatio of the system throughput due to small PLR ad itermittet losses wo t affect our protocol. However, if we were to exted TREKS for log-lived commuicatio without key establishmet, the it would be iterestig to ivestigate their impact. That is our future work. Furthermore, we believe that extedig TREKS to today s popular systems, such as Widebad Orthogoal Frequecy Divisio Multiplexig (W-OFDM), ca icrease the applicability of our scheme. We pla o studyig differet extesios of TREKS i future. 7. ACKNOWLEDGMENTS This work was partially fuded by NSF grat (CAREER) ad NSF CyberTrust grat REFERENCES [] B. Awerbuch, A. Richa, ad C. Scheideler. A jammig-resistat mac protocol for sigle-hop wireless etworks. I ACM PODC, 28. [2] E. Bayraktaroglu, C. Kig, X. Liu, G. Noubir, R. Rajarama, ad B. Thapa. O the performace of ieee 82. uder jammig. I Ifocom, 28. [3] M. A. Beder, M. Farach-Colto, S. He, B. C. Kuszmaul, ad C. E. Leiserso. Adversarial cotetio resolutio for simple chaels. I SPAA, 25. [4] T. Brow,. ames, ad A. Sethi. ammig ad sesig of ecrypted wireless ad hoc etworks. I ACM MobiHoc, 26. [5] A. Cha, X. Liu, G. Noubir, ad B. Thapa. Cotrol chael jammig: Resiliece ad idetificatio of traitors. I IEEE ISIT, 27. [6]. Chiag ad Y.-C. Hu. Cross-layer jammig detectio ad mitigatio i wireless broadcast etworks. I MobiCom, 27. [7] S. Gilbert, R. Guerraoui, ad C. Newport. Of malicious motes ad suspicious sesors: O the efficiecy of malicious iterferece i wireless etworks. I OPODIS, 26. [8] B. Gupta, S. Gupta, ad S. Chag. Performace aalysis of elliptic curve cryptography for ssl. I MobiCom, 22. [9] Gpu bechmarkig. [] M. Li, I. Koutsopoulos, ad R. Poovedra. Optimal jammig attacks ad etwork defese policies i wireless sesor etworks. I INFOCOM, 27. [] G. Li ad G. Noubir. O lik layer deial of service i data wireless las. Wireless Commuicatio ad Mobile Computig, 25. [2] K. B. Rasmusse, S. Capku, ad M. Cagalj. Secav: Secure broadcast localizatio ad time sychroizatio i wireless etworks. I MobiCom, 27. [3] M. K. Simo,. K. Omura, R. A. Scholtz, ad B. K. Levitt. Spread spectrum commuicatios; vols. -3. Computer Sciece Press, Ic., NY, 986. [4] M. Strasser, C. Popper, S. Capku, ad M. Cagalj. ammig-resistat key establishmet usig ucoordiated frequecy hoppig. I ISSP, 28. [5] P. Tague, D. Slater, G. Noubir, ad R. Poovedra. Liear programmig models for jammig attacks o etwork traffic flows. I WiOpt, 28. [6] W. Xu, K. Ma, W. Trappe, ad Y. Zhag. ammig sesor etworks: attack ad defese strategies. IEEE Network, 26.

Zero Pre-shared Secret Key Establishment in the presence of Jammers

Zero Pre-shared Secret Key Establishment in the presence of Jammers Zero Pre-shared Secret Key Establishmet i the presece of Jammers Paper #56975 Abstract We cosider the problem of key establishmet over a wireless radio chael i the presece of a commuicatio jammer, iitially

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Iformatio Trasmissio System Lab. Spread Spectrum Sigal for Digital Commuicatios Istitute of Commuicatios Egieerig Natioal Su Yat-se Uiversity Spread Spectrum Commuicatios Defiitio: The trasmitted

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1 SELEX Elsag 5/18/01 R. Pucci SDR 1 WiComm 1 Military BU - SELEX Elsag Possible update of SDR Platforms to COGNITIVE architectures COGNITIVE MANAGER INTERFACE Geolocatio, Voice, Video, etc Applicatio Policy

More information

SIDELOBE SUPPRESSION IN OFDM SYSTEMS

SIDELOBE SUPPRESSION IN OFDM SYSTEMS SIDELOBE SUPPRESSION IN OFDM SYSTEMS Iva Cosovic Germa Aerospace Ceter (DLR), Ist. of Commuicatios ad Navigatio Oberpfaffehofe, 82234 Wesslig, Germay iva.cosovic@dlr.de Vijayasarathi Jaardhaam Muich Uiversity

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay Efficiet Feedback-Based Schedulig Policies for Chuked Network Codes over Networks with Loss ad Delay Aoosheh Heidarzadeh ad Amir H. Baihashemi Departmet of Systems ad Computer Egieerig, Carleto Uiversity,

More information

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors www.ijecs.i Iteratioal Joural Of Egieerig Ad Computer Sciece ISSN:319-74 Volume 4 Issue 3 March 015, Page No. 760-763 EMU-Sychroizatio Ehaced Mobile Uderwater Networks for Assistig ime Sychroizatio Scheme

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

Adaptive Resource Allocation in Multiuser OFDM Systems

Adaptive Resource Allocation in Multiuser OFDM Systems Adaptive Resource Allocatio i Multiuser OFDM Systems Fial Report Multidimesioal Digital Sigal Processig Malik Meherali Saleh The Uiversity of Texas at Austi malikmsaleh@mail.utexas.edu Sprig 005 Abstract

More information

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II ECE 333: Itroductio to Commuicatio Networks Fall 22 Lecture : Physical layer II Impairmets - distortio, oise Fudametal limits Examples Notes: his lecture cotiues the discussio of the physical layer. Recall,

More information

Cooperative Diversity Based on Code Superposition

Cooperative Diversity Based on Code Superposition 1 Cooperative Diversity Based o Code Superpositio Lei Xiao, Thomas E. Fuja, Jörg Kliewer, Daiel J. Costello, Jr. Departmet of Electrical Egieerig, Uiversity of Notre Dame, Notre Dame, IN 46556, USA Email:

More information

4. INTERSYMBOL INTERFERENCE

4. INTERSYMBOL INTERFERENCE DATA COMMUNICATIONS 59 4. INTERSYMBOL INTERFERENCE 4.1 OBJECT The effects of restricted badwidth i basebad data trasmissio will be studied. Measuremets relative to itersymbol iterferece, usig the eye patter

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

CHAPTER 8 JOINT PAPR REDUCTION AND ICI CANCELLATION IN OFDM SYSTEMS

CHAPTER 8 JOINT PAPR REDUCTION AND ICI CANCELLATION IN OFDM SYSTEMS CHAPTER 8 JOIT PAPR REDUCTIO AD ICI CACELLATIO I OFDM SYSTEMS Itercarrier Iterferece (ICI) is aother major issue i implemetig a OFDM system. As discussed i chapter 3, the OFDM subcarriers are arrowbad

More information

Combined Scheme for Fast PN Code Acquisition

Combined Scheme for Fast PN Code Acquisition 13 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 6 8, 009, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +(0) 4059 4036138, Fax:

More information

Summary of Random Variable Concepts April 19, 2000

Summary of Random Variable Concepts April 19, 2000 Summary of Radom Variable Cocepts April 9, 2000 his is a list of importat cocepts we have covered, rather tha a review that derives or explais them. he first ad primary viewpoit: A radom process is a idexed

More information

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA 1274 LETTER A Novel Adaptive Chael Estimatio Scheme for DS-CDMA Che HE a), Member ad Xiao-xiag LI, Nomember SUMMARY This paper proposes a adaptive chael estimatio scheme, which uses differet movig average

More information

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

Secret Searching in Wireless Sensor Networks with RFIDs

Secret Searching in Wireless Sensor Networks with RFIDs Secret Searchig i Wireless Sesor Networks with RFIDs Shih-I Huag Shiuhpyg Shieh Dept. of Comp. Sci. & Ifo. Eg. Natioal Chiao Tug Uiversity, Hsichu, Taiwa 300 {sihuag,ssp}@csie.ctu.edu.tw Abstract I this

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio Performace Aalysis of Chael Switchig with Various Badwidths i Cogitive Radio Po-Hao Chag, Keg-Fu Chag, Yu-Che Che, ad Li-Kai Ye Departmet of Electrical Egieerig, Natioal Dog Hwa Uiversity, 1,Sec.2, Da-Hsueh

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 troductio to Wireless Commuicatio ystems ECE 476/ECE 501C/C 513 Witer 2003 eview for Exam #1 March 4, 2003 Exam Details Must follow seatig chart - Posted 30 miutes before exam. Cheatig will be treated

More information

Time-Space Opportunistic Routing in Wireless Ad Hoc Networks, Algorithms and Performance

Time-Space Opportunistic Routing in Wireless Ad Hoc Networks, Algorithms and Performance Time-Space Opportuistic Routig i Wireless Ad Hoc Networks, Algorithms ad Performace Fraçois Baccelli, Bartlomiej Blaszczyszy, Paul Muhlethaler To cite this versio: Fraçois Baccelli, Bartlomiej Blaszczyszy,

More information

Lecture 4: Frequency Reuse Concepts

Lecture 4: Frequency Reuse Concepts EE 499: Wireless & Mobile Commuicatios (8) Lecture 4: Frequecy euse Cocepts Distace betwee Co-Chael Cell Ceters Kowig the relatio betwee,, ad, we ca easily fid distace betwee the ceter poits of two co

More information

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 27 Jammig-resistat Multi-radio Multi-chael Opportuistic Spectrum Access i Cogitive Radio Networks Qia Wag, Member, IEEE, Kui Re, Seior Member, IEEE,

More information

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Chapter ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my

More information

Single Bit DACs in a Nutshell. Part I DAC Basics

Single Bit DACs in a Nutshell. Part I DAC Basics Sigle Bit DACs i a Nutshell Part I DAC Basics By Dave Va Ess, Pricipal Applicatio Egieer, Cypress Semicoductor May embedded applicatios require geeratig aalog outputs uder digital cotrol. It may be a DC

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels Compariso of Frequecy Offset Estimatio Methods for OFDM Burst Trasmissio i the Selective Fadig Chaels Zbigiew Długaszewski Istitute of Electroics ad Telecommuicatios Pozań Uiversity of Techology 60-965

More information

ASample of an XML stream is:

ASample of an XML stream is: 1 Efficiet Multichael i XML Wireless Broadcast Stream Arezoo Khatibi* 1 ad Omid Khatibi 2 1 Faculty of Computer Sciece, Uiversity of Kasha, Kasha, Ira 2 Faculty of Mathematics, Uiversity of Viea,Viea,

More information

Lossless image compression Using Hashing (using collision resolution) Amritpal Singh 1 and Rachna rajpoot 2

Lossless image compression Using Hashing (using collision resolution) Amritpal Singh 1 and Rachna rajpoot 2 Lossless image compressio Usig Hashig (usig collisio resolutio) Amritpal Sigh 1 ad Racha rajpoot 2 1 M.Tech.* CSE Departmet, 2 Departmet of iformatio techology Guru Kashi UiversityTalwadi Sabo, Bathida

More information

The Throughput and Delay Trade-off of Wireless Ad-hoc Networks

The Throughput and Delay Trade-off of Wireless Ad-hoc Networks The Throughput ad Delay Trade-off of Wireless Ad-hoc Networks. Itroductio I this report, we summarize the papers by Gupta ad Kumar [GK2000], Grossglauser ad Tse [GT2002], Gamal, Mame, Prabhakar, ad hah

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks www.ijcsi.org http://dx.doi.org/10.20943/01201604.1115 11 Data Miig of Bayesia Networks to Select Fusio Nodes from Wireless Networks Yee Mig Che 1 Chi-Shu Hsueh 2 Chu-Kai Wag 3 1,3 Departmet of Idustrial

More information

Capacity of Large-scale CSMA Wireless Networks

Capacity of Large-scale CSMA Wireless Networks Capacity of Large-scale CSMA Wireless Networks Chi-Ki Chau, Member, IEEE, Mighua Che, Member, IEEE, ad Soug Ch Liew, Seior Member, IEEE Abstract I the literature, asymptotic studies of multi-hop wireless

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

Joint Power Allocation and Beamforming for Cooperative Networks

Joint Power Allocation and Beamforming for Cooperative Networks It. J. Commuicatios, etwork ad System Scieces,, 4, 447-45 doi:.436/ijcs..4753 Published Olie July (http://www.scirp.org/joural/ijcs) Joit Power Allocatio ad Beamformig for Cooperative etworks Sodes Maadi,,

More information

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells The Potetial of Dyamic Power ad Sub-carrier Assigmets i Multi-User OFDM-FDMA Cells Mathias Bohge, James Gross, Adam Wolisz TU Berli Eisteiufer 5, 1587 Berli, Germay {bohge gross wolisz}@tk.tu-berli.de

More information

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks Ehacemet of the IEEE 8.5. MAC Protocol for Scalable Data Collectio i Dese Sesor Networks Kira Yedavalli Departmet of Electrical Egieerig - Systems Uiversity of Souther Califoria Los Ageles, Califoria,

More information

High Speed Area Efficient Modulo 2 1

High Speed Area Efficient Modulo 2 1 High Speed Area Efficiet Modulo 2 1 1-Soali Sigh (PG Scholar VLSI, RKDF Ist Bhopal M.P) 2- Mr. Maish Trivedi (HOD EC Departmet, RKDF Ist Bhopal M.P) Adder Abstract Modular adder is oe of the key compoets

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

Information-Theoretic Analysis of an Energy Harvesting Communication System

Information-Theoretic Analysis of an Energy Harvesting Communication System Iformatio-Theoretic Aalysis of a Eergy Harvestig Commuicatio System Omur Ozel Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 074 omur@umd.edu ulukus@umd.edu

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Cancellation of Multiuser Interference due to Carrier Frequency Offsets in Uplink OFDMA

Cancellation of Multiuser Interference due to Carrier Frequency Offsets in Uplink OFDMA Cacellatio of Multiuser Iterferece due to Carrier Frequecy Offsets i Upli OFDMA S. Maohar, V. Tiiya, D. Sreedhar, ad A. Chocaligam Departmet of ECE, Idia Istitute of Sciece, Bagalore 56001, INDIA Abstract

More information

CDS 270-2: Lecture 6-3 Optimum Receiver Design for Estimation over Wireless Links

CDS 270-2: Lecture 6-3 Optimum Receiver Design for Estimation over Wireless Links CDS 70-: Lecture 6-3 Otimum Receiver Desig for stimatio over Wireless Lis Goals: Yasami Mostofi May 5, 006 To uderstad imact of wireless commuicatio imairmets o estimatio over wireless To lear o-traditioal

More information

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting Test Time Miimizatio for Hybrid BIST with Test Patter Broadcastig Raimud Ubar, Maksim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity EE-126 18 Talli, Estoia {raiub, maksim}@pld.ttu.ee Gert

More information

X-Bar and S-Squared Charts

X-Bar and S-Squared Charts STATGRAPHICS Rev. 7/4/009 X-Bar ad S-Squared Charts Summary The X-Bar ad S-Squared Charts procedure creates cotrol charts for a sigle umeric variable where the data have bee collected i subgroups. It creates

More information

Symbol Error Rate Evaluation for OFDM Systems with MPSK Modulation

Symbol Error Rate Evaluation for OFDM Systems with MPSK Modulation Symbol Error Rate Evaluatio for OFDM Systems with MPS Modulatio Yuhog Wag ad Xiao-Pig Zhag Departmet of Electrical ad Computer Egieerig, Ryerso Uiversity 35 Victoria Street, Toroto, Otario, Caada, M5B

More information

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells The Potetial of Dyamic Power ad Sub-carrier Assigmets i Multi-User OFDM-FDMA Cells Mathias Bohge, James Gross, Adam Wolisz Telecommuicatio Networks Group, TU Berli Eisteiufer 5, 1587 Berli, Germay {bohge

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks 2013 IEEE Wireless Commuicatios ad Networkig Coferece (WCNC): MAC Broadcastig i Multichael Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig Kyug Hee Uiversity 1 Seocheo,Giheug, Yogi,

More information

Wavelength Band Switching in Multigranular Optical WDM Networks

Wavelength Band Switching in Multigranular Optical WDM Networks Wavelegth Bad Switchig i Multigraular Optical WDM Networks Vishal Aad Collaborators X. Cao,, Dr. Y. Xiog ad Dr. C. Qiao LANDER, CSE Departmet, SUNY at Buffalo ~1~ Vishal Aad Outlie λ The Problem with preset

More information

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks O the Delay Performace of I-etwork Aggregatio i Lossy Wireless Sesor Networks Chaghee Joo, Member, IEEE, ad Ness B. Shroff, Fellow, IEEE Abstract I this paper, we study the implicatio of wireless broadcast

More information

Super J-MOS Low Power Loss Superjunction MOSFETs

Super J-MOS Low Power Loss Superjunction MOSFETs Low Power Loss Superjuctio MOSFETs Takahiro Tamura Mutsumi Sawada Takayuki Shimato ABSTRACT Fuji Electric has developed superjuctio MOSFETs with a optimized surface desig that delivers lower switchig.

More information

Low Latency Random Access with TTI Bundling in LTE/LTE-A

Low Latency Random Access with TTI Bundling in LTE/LTE-A Low Latecy Radom Access with TTI Budlig i LTE/LTE-A Kaijie Zhou, Navid Nikaei Huawei Techologies Co., Ltd. Chia, zhoukaijie@huawei.com Eurecom, Frace, avid.ikaei@eurecom.fr Abstract To reduce the uplik

More information

General Model :Algorithms in the Real World. Applications. Block Codes

General Model :Algorithms in the Real World. Applications. Block Codes Geeral Model 5-853:Algorithms i the Real World Error Correctig Codes I Overview Hammig Codes Liear Codes 5-853 Page message (m) coder codeword (c) oisy chael decoder codeword (c ) message or error Errors

More information

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method Proceedigs of the th WSEAS Iteratioal Coferece o APPLIED ad THEORETICAL MECHANICS (MECHANICS '8) The Detectio of Abrupt Chages i Fatigue Data by Usig Cumulative Sum (CUSUM) Method Z. M. NOPIAH, M.N.BAHARIN,

More information

Cooperative Spectrum Sensing in Cognitive Radio Networks

Cooperative Spectrum Sensing in Cognitive Radio Networks Cooperative Spectrum Sesig i Cogitive Radio Networks Ghurumuruha Gaesa ad Ye (Geoffrey) Li School of Electrical ad Computer Egieerig Georgia Istitute of Techology, Atlata, Georgia 30332 0250 Abstract I

More information

Solution 2 Discussion:

Solution 2 Discussion: Mobile Couicatios Solutio 2 Discussio: 4..2007 Solutio 2.: Multiplexig For ultiplexig, SDMA, TDMA, FDMA, ad CDMA were preseted i the lecture. a.) What liits the uber of siultaeous users i a TDM/FDM syste

More information

Encode Decode Sample Quantize [ ] [ ]

Encode Decode Sample Quantize [ ] [ ] Referece Audio Sigal Processig I Shyh-Kag Jeg Departmet of Electrical Egieerig/ Graduate Istitute of Commuicatio Egieerig M. Bosi ad R. E. Goldberg, Itroductio to Digital Audio Codig ad Stadards, Kluwer

More information

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks Throughput/Delay Aalysis of pectrally Phase- Ecoded Optical over etwors K. Putsri *,. ittichivapa * ad H.M.H.halaby ** * Kig Mogut s Istitute of Techology Ladrabag Departmet of Telecommuicatios Egieerig,

More information

Measurement of Equivalent Input Distortion AN 20

Measurement of Equivalent Input Distortion AN 20 Measuremet of Equivalet Iput Distortio AN 2 Applicatio Note to the R&D SYSTEM Traditioal measuremets of harmoic distortio performed o loudspeakers reveal ot oly the symptoms of the oliearities but also

More information

On Balancing Exploration vs. Exploitation in a Cognitive Engine for Multi-Antenna Systems

On Balancing Exploration vs. Exploitation in a Cognitive Engine for Multi-Antenna Systems O Balacig Exploratio vs. Exploitatio i a Cogitive Egie for Multi-Atea Systems Haris I. Volos ad R. Michael Buehrer Mobile ad Portable Radio Research Group (MPRG), Wireless@Virgiia Tech Bradley Departmet

More information

Beam Pattern Scanning (BPS) versus Space-Time Block Coding (STBC) and Space-Time Trellis Coding (STTC)

Beam Pattern Scanning (BPS) versus Space-Time Block Coding (STBC) and Space-Time Trellis Coding (STTC) It. J. Commuicatios, Network ad System Scieces, 2009, 6, 469-479 doi:10.4236/ijcs.2009.26051 Published Olie September 2009 (http://www.scirp.org/joural/ijcs/). 469 Beam Patter Scaig (BPS) versus Space-Time

More information

Design and Construction of a Three-phase Digital Energy Meter

Design and Construction of a Three-phase Digital Energy Meter Desig ad Costructio of a Three-phase Digital Eergy Meter D.P.Chadima, V.G.R.G. Jayawardae, E.A.E.H. Hemachadra, I.N.Jayasekera, H.V.L.Hasaraga, D.C. Hapuarachchi (chadima@elect.mrt.ac.lk, geethagaj@gmail.com,era.hem@gmail.com,ishaivaka@gmail.com,lahiru_hasaraga@yahoo.com,diya_elect.uom@gmail.com)

More information

Capacity of Large-scale CSMA Wireless Networks

Capacity of Large-scale CSMA Wireless Networks Capacity of Large-scale CSMA Wireless Networks Chi-Ki Chau Computer Laboratory, Uiversity of Cambridge; Dept. of E. & E. Egg., Uiversity College Lodo Chi-Ki.Chau@cl.cam.ac.uk Mighua Che Dept. of Iformatio

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

EMPIRICAL MODE DECOMPOSITION IN AUDIO WATERMARKING BY USING WAVELET METHOD

EMPIRICAL MODE DECOMPOSITION IN AUDIO WATERMARKING BY USING WAVELET METHOD EMPIRICAL MODE DECOMPOSITION IN AUDIO WATERMARKING BY USING WAVELET METHOD G.PAVAN KUMAR (PG Scholor) S.RAHUL (M.Tech) Departmet of ECE, S.V.College of Egieerig ad Techology, JNTUH Assistat Professor,

More information

Ch 9 Sequences, Series, and Probability

Ch 9 Sequences, Series, and Probability Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math

More information

A Framework for Analysis of Connectivity and Performance Bounds in Ad Hoc Networks and Its Application to a Slotted-ALOHA Scenario

A Framework for Analysis of Connectivity and Performance Bounds in Ad Hoc Networks and Its Application to a Slotted-ALOHA Scenario JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL., NO., SEPTEMBER 005 35 A Framework for Aalysis of Coectivity ad Performace Bouds i Ad Hoc Networks ad Its Applicatio to a Slotted-ALOHA Sceario Fabrizio

More information

Antenna Diversity Techniques for a Single Carrier System with Frequency Domain Equalization An Overview

Antenna Diversity Techniques for a Single Carrier System with Frequency Domain Equalization An Overview Atea Diversity Techiques for a Sigle Carrier System with Frequecy Domai Equalizatio A Overview. Witschig, G. Strasser,. Weigel, A. Spriger Istitute for Commuicatios ad Istitute for Techical Electroics

More information

Measurements of the Communications Environment in Medium Voltage Power Distribution Lines for Wide-Band Power Line Communications

Measurements of the Communications Environment in Medium Voltage Power Distribution Lines for Wide-Band Power Line Communications Measuremets of the Commuicatios viromet i Medium Voltage Power Distributio Lies for Wide-Bad Power Lie Commuicatios Jae-Jo Lee *,Seug-Ji Choi *,Hui-Myoug Oh *, Wo-Tae Lee *, Kwa-Ho Kim * ad Dae-Youg Lee

More information

7. Counting Measure. Definitions and Basic Properties

7. Counting Measure. Definitions and Basic Properties Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 7. Coutig Measure Defiitios ad Basic Properties Suppose that S is a fiite set. If A S the the cardiality of A is the umber of elemets i A, ad is

More information

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7 Available olie www.jsaer.com, 2018, 5(7):1-7 Research Article ISSN: 2394-2630 CODEN(USA): JSERBR 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

More information

A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks

A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks Commuicatios ad Network, 0, 4, 6-7 http://dx.doi.org/0.436/c.0.4009 Published Olie February 0 (http://www.scirp.org/joural/c) A New Eergy Efficiet Data Gatherig Approach i Wireless Sesor Networks Jafar

More information

3. Error Correcting Codes

3. Error Correcting Codes 3. Error Correctig Codes Refereces V. Bhargava, Forward Error Correctio Schemes for Digital Commuicatios, IEEE Commuicatios Magazie, Vol 21 No1 11 19, Jauary 1983 Mischa Schwartz, Iformatio Trasmissio

More information

Neighbor Discovery for Cognitive Radio Ad Hoc Networks

Neighbor Discovery for Cognitive Radio Ad Hoc Networks Neighbor Discovery for Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig, Kyug Hee Uiversity, 1 Seocheo,Giheug, Yogi, Gyeoggi 449-701 Korea +8-10-561-811 htike@etworkig.khu.ac.kr,

More information

lecture notes September 2, Sequential Choice

lecture notes September 2, Sequential Choice 18.310 lecture otes September 2, 2013 Sequetial Choice Lecturer: Michel Goemas 1 A game Cosider the followig game. I have 100 blak cards. I write dow 100 differet umbers o the cards; I ca choose ay umbers

More information

信號與系統 Signals and Systems

信號與系統 Signals and Systems Sprig 24 信號與系統 Sigals ad Systems Chapter SS- Sigals ad Systems Feg-Li Lia NTU-EE Feb4 Ju4 Figures ad images used i these lecture otes are adopted from Sigals & Systems by Ala V. Oppeheim ad Ala S. Willsky,

More information

Cooperative Detection and Communication in Wireless Sensor Networks

Cooperative Detection and Communication in Wireless Sensor Networks Cooperative Detectio ad Commuicatio i Wireless Sesor Networks Mohiuddi Ahmed, Yug-Szu Tu, ad Gregory Pottie Electrical Egieerig Departmet, Uiversity of Califoria, Los Ageles Box 95594, Los Ageles, Califoria

More information

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission 1 Distributed Resource Maagemet i Multi-hop Cogitive Radio Networs for Delay Sesitive Trasmissio Hsie-Po Shiag ad Mihaela va der Schaar Departmet of Electrical Egieerig (EE), Uiversity of Califoria Los

More information

13 Legislative Bargaining

13 Legislative Bargaining 1 Legislative Bargaiig Oe of the most popular legislative models is a model due to Baro & Ferejoh (1989). The model has bee used i applicatios where the role of committees have bee studies, how the legislative

More information

IEEE TRANSACTIONS ON COMMUNICATIONS 1

IEEE TRANSACTIONS ON COMMUNICATIONS 1 IEEE TRANSACTIONS ON COMMUNICATIONS 3 5 6 7 8 9 0 3 5 6 7 8 9 0 3 5 6 7 Adaptive Buffer-Aided Distributed Space-Time Codig for Cooperative Wireless Networks Tog Peg ad Rodrigo C. de Lamare, Seior Member,

More information

A Research on Spectrum Allocation Using Optimal Power in Downlink Wireless system

A Research on Spectrum Allocation Using Optimal Power in Downlink Wireless system Iteratioal Research Joural of Egieerig ad Techology (IRJET) e-iss: 2395-0056 Volume: 03 Issue: 04 Apr-206 www.irjet.et p-iss: 2395-0072 A Research o Spectrum Allocatio Usig Optimal Power i Dowli Wireless

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract The capacity of wireless ad hoc etwors is maily restricted by the umber

More information

Acquisition of GPS Software Receiver Using Split-Radix FFT

Acquisition of GPS Software Receiver Using Split-Radix FFT 006 IEEE Coferece o Systems, Ma, ad Cyberetics October -, 006, Taipei, Taiwa Acquisitio of GPS Software Receiver Usig Split-Radix FFT W. H. Li, W. L. Mao, H. W. Tsao, F. R. Chag, ad W. H. Huag Abstract

More information

Power Ratio Reduction with OFDM Signals for Broadband Wireless Mobile Communication

Power Ratio Reduction with OFDM Signals for Broadband Wireless Mobile Communication Volume-4, Issue-, February-4, ISSN No.: 5-758 Iteratioal Joural of Egieerig ad Maagemet Research Available at: www.ijemr.et Page Number: 66-7 Power Ratio Reductio with OFDM Sigals for Broadbad Wireless

More information

Simulation of Frequency, Timing Acquisition, and Cell Search Algorithms for OFDMA Based Mobile WiMAX

Simulation of Frequency, Timing Acquisition, and Cell Search Algorithms for OFDMA Based Mobile WiMAX 2011 Iteratioal Coferece o Commuicatio Egieerig ad Networks IPCSIT vol.19 (2011) (2011) IACSIT Press, Sigapore Simulatio of Frequecy, Timig Acquisitio, ad Cell Search Algorithms for OFDMA Based Mobile

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

信號與系統 Signals and Systems

信號與系統 Signals and Systems Sprig 2 信號與系統 Sigals ad Systems Chapter SS- Sigals ad Systems Feg-Li Lia NTU-EE Feb Ju Figures ad images used i these lecture otes are adopted from Sigals & Systems by Ala V. Oppeheim ad Ala S. Willsky,

More information

Blind Interference Suppression for DS/CDMA LEO Satellite Communication Systems

Blind Interference Suppression for DS/CDMA LEO Satellite Communication Systems Blid Iterferece Suppressio for DS/CDMA LEO Satellite Commuicatio Systems Stepha Fischer, Berd-Ludwig Weig, Volker Küh, Karl-Dirk Kammeyer Uiversity of Breme - Departmet of Commuicatios Egieerig - P.O.

More information

HYBRID ERASURE ERROR PROTOCOLS FOR WIRELESS VIDEO

HYBRID ERASURE ERROR PROTOCOLS FOR WIRELESS VIDEO HYBRID ERASURE ERROR PROTOCOLS FOR WIRELESS VIDEO Shirish S. Karade* ad Hayder Radha Departmet of Electrical & Computer Egieerig / 220 Egieerig Buildig Michiga State Uiversity, East Lasig, MI 48824 USA

More information