Jamming-resistant Broadcast Communication without Shared Keys
|
|
- Matthew Blankenship
- 5 years ago
- Views:
Transcription
1 1/18 Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper Joint work with Mario Strasser and Srdjan Čapkun System Security Group ETH Zürich August 2009
2 Broadcast Communication Jamming Attacks Problem Statement Our Solution 2/18 Broadcast Communication Setting: Broadcast of (authenticated) messages to a (large) number of receivers Wireless RF communication Receivers may be unknown and/or untrusted Broadcast Applications: Alarm broadcast Broadcast of navigation signals...
3 Broadcast Communication Jamming Attacks Problem Statement Our Solution 3/18 Jamming Attacks Jamming Attacks: Jamming devices are cheap and easy to obtain Anti-Jamming Techniques: Spread Spectrum Techniques, e.g., Frequency Hopping Spread Spectrum Direct-Sequence Spread-Spectrum (DSSS) Rely on a secret key (or code) pre-shared between sender and receivers before the communication
4 Broadcast Communication Jamming Attacks Problem Statement Our Solution 4/18 Jamming Attacks Anti-Jamming Techniques in Broadcast Settings: Pre-sharing keys is complex or infeasible Public key cryptography does not help Even if secret keys are pre-shared, receivers still need to be trusted Anti-jamming Broadcast Problem
5 Broadcast Communication Jamming Attacks Problem Statement Our Solution 5/18 Problem Statement Problem Statement: How can we enable jamming-resistant broadcast communication if the sender does not share secret keys with (all the) receivers? In [Desmedt et al., ICON99] and [Chiang et al., InfoCom08], solutions were proposed for jamming-resistant broadcast, but they rely on shared secret information
6 Broadcast Communication Jamming Attacks Problem Statement Our Solution 6/18 Our Solution Anti-jamming Broadcast without Shared Secrets Scheme called (UDSSS) Achieve communication to an unknown/untrusted set of receivers in the presence of communication jamming Key Idea: Base the communication on DSSS but release the requirement of shared secret keys by randomization Key Observation: Whatever has arrived unjammed at the receiver can be decoded A B M M M M t t
7 7/18 (UDSSS) DSSS
8 7/18 (UDSSS) DSSS UDSSS
9 7/18 (UDSSS) - Public set C of spreading sequences Sender randomly selects sequence c s C to spread message M Receivers record signal and despread M by applying sequences from C using a trial-and-error method UDSSS
10 8/18 UDSSS Sender Side Message repetitions, due to lacking synchronization between sender and receivers the possibility of successful jamming attacks A M 1 M 1 M 1 M 1 M 1 M 2 M 2 M 2 M 2 t buffer buffer B M 1 M 2 sampling (st m ) decoding (T d ) t
11 9/18 UDSSS Code Set & Despreading Code set C composed of n code sequences Each code sequence is composed of l spreading codes containing N chips l codes per code sequence E.g., N = 100 chips 20 db processing gain Auto-correlation and cross-correlation properties c 1 c 1,1 c 1,2 c 1,l c 2 c 2,1 c 2,2 c 2,l N chips per code c s c s,1 c s,2 c s,l c n c n,1 c s,1 M[1] M[2] c n,2 c n,l c s,l M[l] M n code sequences Successful despreading requires to hit the correct spreading sequence and the correct synchronization
12 10/18 Attacker Analysis Attacker goal: To prevent communication Attacker types Non-reactive jammers blindly jam part of the spectrum Reactive jammers sense for ongoing transmissions Decoding jammers: try to find the used spreading codes and construct the corresponding jamming signal Repeater jammers: intercept the signal and re-radiate it without knowledge of the used spreading codes Attacker strength: Jamming probability p j (with respect to a given message transmission)
13 11/18 Evaluation metric: Message transmission time One receiver: Expected time for message recovery at a receiver with jamming (p j > 0) and without jamming (p j = 0) Multiple receivers: Expected time until all l receivers have received the message (for independent receptions) under p j One receiver: T r T s + T d = 2 M N R + n 2 kqn M + M Λ B (N) R = 1/Tc chip rate q samples per chip Λ B (N): # bit despreading operations that the receiver can perform per second despread k bits before decision on code sequence, etc.
14 12/18 Analytical Evaluation and Simulation Multiple (l) receivers Probability that a message is received by all l = 100 receivers 0.4 m = 1 p j = p j = 0.2 p j = 0.5 p j = number of message decodings (i) Time (in sec) after which all l receivers have decoded the message T d = 2s m = 1 p j = 0.0 p j = 0.2 p j = 0.5 p j = number of receivers (l) UDSSS can be enhanced to yield the same performance as (non-synchronized) DSSS in the absence of jamming by two parallel signal transmission using C 1 = {c 1 } and C 2
15 13/18 Implementation Prototype implementation of UDSSS on USRP/GnuRadio Carrier frequency of 2.4 GHz (8,4)-Hamming-code ECC 2 USRPs positioned indoors at a distance of around 5 m message sender ECC encoding bit scrambling bit spreading usrp sink USRP message receiver ECC decoding bit unscrambling bit despreading usrp source USRP
16 14/18 Implementation Results Duration (in sec) to receive and decode a message M = 256 M = 512 M = 1024 M = 1536 M = 2048 n IPS = 100 = code length N per bit Duration (in sec) to receive and decode a message M = 256 M = 512 M = 1024 M = 1536 M = 2048 N IPS = 256 = number of code sequences n Increasing the processing gain (i.e., N) is more harmful to the latency/throughput than increasing the code set (i.e., n)
17 15/18 UDSSS Optimization Idea: Use UDSSS to transmit the spreading key only Trick: First transmit message M using a random spreading code K, then transmit the spreading code K using UDSSS A K {0, 1} M c s C K t B M K UDSSS despreading t K Advantages: Smaller spreading code set. Quicker decoding. Longer messages. More flexible security level.
18 Navigation Signals : Navigation Signal Broadcasts For positioning and/or time-synchronization Requirements: signals from three to four different base stations precise time-stamping of signal reception A1 J t1, pos1 t2, pos2 A2 Receiver buffer A3 t3, pos3 t4, pos4 UDSSS A4 t, pos received power tr broadband recording UDSSS signals UDSSS provides: anti-jamming transmission of multiple signals in parallel precise time-stamping of signal reception (despite delayed recovery) & updated time-stamps in each transmitted message anti-spoofing protection of authenticated messages 16/18 tr + Tr noise level t
19 17/18 Concluding Remarks We tackled the anti-jamming broadcast problem: antijamming broadcast communication without pre-shared secrets such that devices cannot jam the reception of other receivers Uncoordinated Spread Spectrum techniques are a solution to the anti-jamming broadcast problem UDSSS ZPK-DSSS [Jin et al, MobiHoc09] UFH [Strasser et al., S&P08], [Strasser et al., MobiHoc09], and [Slater et al., WiSec09] Basic idea: randomize the spreading operation (random code selection) Application: e.g., anti-jamming navigation signal broadcasts
20 18/18 Questions
Jamming-resistant Broadcast Communication without Shared Keys
Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper System Security Group ETH Zurich, Switzerland poepperc@inf.ethz.ch Mario Strasser Communication Systems Group ETH Zurich,
More informationDefending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure
Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure Abstract Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping
More informationUSD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure
USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University, Raleigh, NC 27695 {aliu3,
More informationANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING
ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING P.MANJULA 1, S.SHARMILA 2 1&2 Assistant Professor, Veltech Multitech Engg College ABSTRACT This paper proposes a technique called
More informationJamming-resistant Key Establishment using Uncoordinated Frequency Hopping
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Mario Strasser Computer Eng. and Networks Laboratory ETH Zurich, Switzerland strasser@tik.ee.ethz.ch Srdjan Čapkun Department of
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationDefending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure
Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University {aliu3, pning, huaiyu_dai, yliu0}@ncsu.edu
More informationSpread Spectrum: Definition
Spread Spectrum: Definition refers to the expansion of signal bandwidth, by several orders of magnitude in some cases, which occurs when a key is attached to the communication channel an RF communications
More informationSecurity in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury
Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing
More informationAn Effective Defensive Node against Jamming Attacks in Sensor Networks
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 6ǁ June. 2013 ǁ PP.41-46 An Effective Defensive Node against Jamming Attacks in Sensor
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,
More informationCHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )
CHAPTER 2 Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication (2170710) Syllabus Chapter-2.4 Spread Spectrum Spread Spectrum SS was developed initially for military and intelligence
More informationBitTrickle: Defending against Broadband and High-power Reactive Jamming Attacks
BitTrickle: Defending against Broadband and High-power Reactive Jamming Attacks Yao Liu, Peng Ning North Carolina State University, Raleigh, NC 27695 {yliu2, pning}@ncsu.edu Abstract Reactive jamming is
More informationCode Division Multiple Access.
Code Division Multiple Access Mobile telephony, using the concept of cellular architecture, are built based on GSM (Global System for Mobile communication) and IS-95(Intermediate Standard-95). CDMA allows
More informationDetection and Prevention of Physical Jamming Attacks in Vehicular Environment
Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,
More informationSpread Spectrum (SS) is a means of transmission in which the signal occupies a
SPREAD-SPECTRUM SPECTRUM TECHNIQUES: A BRIEF OVERVIEW SS: AN OVERVIEW Spread Spectrum (SS) is a means of transmission in which the signal occupies a bandwidth in excess of the minimum necessary to send
More informationOn Practical Selective Jamming of Bluetooth Low Energy Advertising
On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,
More informationWireless Sensor Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless
More informationDEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks
More informationFrequency-Hopped Spread-Spectrum
Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading
More informationSpread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access
Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal
More informationAnalysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks
Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks Chengzhi Li, Huaiyu Dai, Liang Xiao 2 and Peng Ning 3 ECE Dept, 2 Dept Comm Engineering, 3 CS Dept, NC State
More informationECS455: Chapter 4 Multiple Access
ECS455: Chapter 4 Multiple Access 4.4 DS/SS 1 Dr.Prapun Suksompong prapun.com/ecs455 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Tuesday 13:30-14:30 Thursday 13:30-14:30 Spread spectrum (SS) Historically
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 3: Antennas, Propagation, and Spread Spectrum September 30, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Antennas and
More informationInterleaving And Channel Encoding Of Data Packets In Wireless Communications
Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218
More informationTowards Optimal UFH-based Anti-jamming Wireless Communication
Towards Optimal UFH-based Anti-jamming Wireless Communication 1 Qian Wang, Ping Xu, Kui Ren, and Xiang-yang Li Department of Electrical and Computer Engineering Department of Computer Science Illinois
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication
More informationMultiple Access System
Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same
More informationJR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
2011 31st International Conference on Distributed Computing Systems JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile d Hoc Networks Rui Zhang, Yanchao Zhang School of Electrical, Computer,
More informationSpread Spectrum Modulation
Spread Spectrum Modulation A collective class of signaling techniques are employed before transmitting a signal to provide a secure communication, known as the Spread Spectrum Modulation. The main advantage
More informationRandomized Channel Hopping Scheme for Anti-Jamming Communication
Randomized Channel Hopping Scheme for Anti-Jamming Communication Eun-Kyu Lee, Soon Y. Oh, and Mario Gerla Computer Science Department University of California at Los Angeles, Los Angeles, CA, USA {eklee,
More informationAssignment 1: Solutions to Problems on Direct Sequence Spread Spectrum
G. S. Sanyal School of Telecommunications Indian Institute of Technology Kharagpur MOOC: Spread Spectrum Communications & Jamming Assignment 1: Solutions to Problems on Direct Sequence Spread Spectrum
More informationSPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS
Dr. Ali Muqaibel SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS VERSION 1.1 Dr. Ali Hussein Muqaibel 1 Introduction Narrow band signal (data) In Spread Spectrum, the bandwidth W is much greater
More informationThe Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS
The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS A Thesis in Computer Science and Engineering by Xuan Jiang c 2011 Xuan
More informationOn the Physical Layer for Secure Distance Measurement
On the Physical Layer for Secure Distance Measurement Srdjan Čapkun Department of Computer Science ETH Zurich All photographs, imagery, media belong to their respective owners/creators. Secure Distance
More informationWireless Networks (PHY): Design for Diversity
Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:
More informationMultiple Access Schemes
Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many
More informationSpread Spectrum Techniques
0 Spread Spectrum Techniques Contents 1 1. Overview 2. Pseudonoise Sequences 3. Direct Sequence Spread Spectrum Systems 4. Frequency Hopping Systems 5. Synchronization 6. Applications 2 1. Overview Basic
More informationLecture 9: Spread Spectrum Modulation Techniques
Lecture 9: Spread Spectrum Modulation Techniques Spread spectrum (SS) modulation techniques employ a transmission bandwidth which is several orders of magnitude greater than the minimum required bandwidth
More informationPerformance Evaluation of Satellite Communication under Jamming Environment
Performance Evaluation of Satellite Communication under Jamming Environment Tarun Varma 1,Dr. Akhilesh R. Upadhyay 2 1 Research scholar ECE,MewarUniversity,Raj. 2 Director SIRTS Bhopal(MP) ABSTRACT A major
More informationJamming Attacks with its Various Techniques and AODV in Wireless Networks
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its
More informationTrust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R.
Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. RAVI 2 1 Research Scholar, Department of Computer Science and Engineering,
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties
More informationPerformance Analysis of DSSS and FHSS Techniques over AWGN Channel
Performance Analysis of DSSS and FHSS Techniques over AWGN Channel M. Katta Swamy, M.Deepthi, V.Mounika, R.N.Saranya Vignana Bharathi Institute of Technology, Hyderabad, and Andhra Pradesh, India. Corresponding
More informationIJSER 1. INTRODUCTION 2. ANALYSIS
International Journal of Scientific & Engineering Research, Volume 6, Issue 10, October-2015 1011 Packet-Hiding Methods for Preventing Selective Jamming Attacks Guttula Pavani Abstract The open nature
More informationWireless Communication Project : Spread Spectrum. Name: Qin Xiaosong Student ID:
Wireless Communication Project : Spread Spectrum Name: Qin Xiaosong Student ID: 5100109073 June 23, 2013 Abstract This report has mainly recorded the process of the project of the Wireless Communication.
More informationEnabling Jamming-Resistant Communications in Wireless MIMO Networks
Enabling Jamming-Resistant Communications in Wireless MIMO Networks Huacheng Zeng Chen Cao Hongxiang Li Qiben Yan University of Louisville University of Nebraska-Lincoln Abstract In this paper, we propose
More informationSC - Single carrier systems One carrier carries data stream
Digital modulation SC - Single carrier systems One carrier carries data stream MC - Multi-carrier systems Many carriers are used for data transmission. Data stream is divided into sub-streams and each
More information5588 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015
5588 IEEE TRNSCTIONS ON WIRELESS COMMUNICTIONS, VOL. 14, NO. 10, OCTOBER 2015 Jamming-Resilient Secure Neighbor Discovery in Mobile d Hoc Networks Rui Zhang, Member, IEEE, Jingchao Sun, Student Member,
More informationOutline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.
Wireless Networks (PHY): Design or Diversity Admin and recap Design or diversity Y. Richard Yang 9/2/212 2 Admin Assignment 1 questions Assignment 1 oice hours Thursday 3-4 @ AKW 37A Channel characteristics
More informationAdaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing Qi Dong Department of Computer Science and Engineering The University of Texas at Arlington Email: qi.dong@mavs.uta.edu Donggang
More informationUWB for Sensor Networks:
IEEE-UBC Symposium on future wireless systems March 10 th 2006, Vancouver UWB for Sensor Networks: The 15.4a standard Andreas F. Molisch Mitsubishi Electric Research Labs, and also at Department of Electroscience,
More informationMinimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique
International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1 Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique R.Priyadarshini,
More informationKeywords: Network Security, Wireless Communications, piggybacking, Encryption.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Framework for
More informationSpread Spectrum Communications and Jamming Prof. Kutty Shajahan M G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur
Spread Spectrum Communications and Jamming Prof. Kutty Shajahan M G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Lecture - 06 Tutorial I Hello friends, welcome to this
More informationSpread Spectrum Signal for Digital Communications
Wireless Information Transmission System Lab. Spread Spectrum Signal for Digital Communications Institute of Communications Engineering National Sun Yat-sen University Multiple Access Schemes Table of
More informationFrequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks
Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Min Song, Trent Allison Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529, USA Abstract
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to
More informationANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau
ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu
More informationChapter 7 Spread-Spectrum Modulation
Chapter 7 Spread-Spectrum Modulation Spread Spectrum Technique simply consumes spectrum in excess of the minimum spectrum necessary to send the data. 7.1 Introduction Definition of spread-spectrum modulation
More informationPerformance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 02 July 2016 ISSN (online): 2349-6010 Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming
More informationECS455: Chapter 4 Multiple Access
ECS455: Chapter 4 Multiple Access 4.4 DS/SS 1 Dr.Prapun Suksompong prapun.com/ecs455 Office Hours: BKD 3601-7 Wednesday 15:30-16:30 Friday 9:30-10:30 Spread spectrum (SS) Historically spread spectrum was
More informationEfficient Spread Spectrum Communication without Pre-shared Secrets
Efficient Spread Spectrum Communication without Pre-shared Secrets Aldo Cassola, Tao Jin, Guevara Noubir, Bishal Thapa 1 Abstract Spread spectrum (SS) communication relies on the assumption that some secret
More informationPhysical Layer Watermarking of Direct Sequence Spread Spectrum Signals
Physical Layer Watermarking of Direct Sequence Spread Spectrum Signals Xiang Li, Chansu Yu, Murad Hizlan, Won-Tae Kim and Seungmin Park Department of ECE, Cleveland State University, Cleveland, OH 44115,
More informationMultiple Access Techniques
Multiple Access Techniques EE 442 Spring Semester Lecture 13 Multiple Access is the use of multiplexing techniques to provide communication service to multiple users over a single channel. It allows for
More informationChapter 7 Spread-Spectrum Modulation
Chapter 7 Spread-Spectrum Modulation Spread Spectrum Technique simply consumes spectrum in excess of the minimum spectrum necessary to send the data. 7.1 Introduction o Definition of spread-spectrum modulation
More informationMohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2
AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant
More informationMobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)
192620010 Mobile & Wireless Networking Lecture 2: Wireless Transmission (2/2) [Schiller, Section 2.6 & 2.7] [Reader Part 1: OFDM: An architecture for the fourth generation] Geert Heijenk Outline of Lecture
More informationAnalysis, Design and Testing of Frequency Hopping Spread Spectrum Transceiver Model Using MATLAB Simulink
Analysis, Design and Testing of Frequency Hopping Spread Spectrum Transceiver Model Using MATLAB Simulink Mr. Ravi Badiger 1, Dr. M. Nagaraja 2, Dr. M. Z Kurian 3, Prof. Imran Rasheed 4 M.Tech Digital
More informationDetection of Reactive Jamming in Sensor Networks
Detection of Reactive Jamming in Sensor Networks MARIO STRASSER, BORIS DANEV, and SRDJAN ČAPKUN ETH Zurich, Switzerland An integral part of most security- and safety-critical applications is a dependable
More informationUnderstanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø
Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification
More informationAdoption of this document as basis for broadband wireless access PHY
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Proposal on modulation methods for PHY of FWA 1999-10-29 Source Jay Bao and Partha De Mitsubishi Electric ITA 571 Central
More informationDifference Between. 1. Old connection is broken before a new connection is activated.
Difference Between Hard handoff Soft handoff 1. Old connection is broken before a new connection is activated. 1. New connection is activated before the old is broken. 2. "break before make" connection
More informationPERFORMANCE EVALUATION OF DIRECT SEQUENCE SPREAD SPECTRUM UNDER PHASE NOISE EFFECT WITH SIMULINK SIMULATIONS
PERFORMANCE EVALUATION OF DIRECT SEQUENCE SPREAD SPECTRUM UNDER PHASE NOISE EFFECT WITH SIMULINK SIMULATIONS Rupender Singh 1, Dr. S.K. Soni 2 1,2 Department of Electronics & Communication Engineering,
More informationW-CDMA for UMTS Principles
W-CDMA for UMTS Principles Introduction CDMA Background/ History Code Division Multiple Access (CDMA) Why CDMA? CDMA Principles / Spreading Codes Multi-path Radio Channel and Rake Receiver Problems to
More informationChapter 2 Overview - 1 -
Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next
More informationExperimental and Theoretical Evaluation of Interference Characteristics between 2.4-GHz ISM-band Wireless LANs
Experimental and Theoretical Evaluation of Interference Characteristics between 2.4-GHz ISM-band Wireless LANs Kazuhiro Takaya, Yuji Maeda, and Nobuo Kuwabara NTT Multimedia Networks Laboratories 9-11
More informationA Multicarrier CDMA Based Low Probability of Intercept Network
A Multicarrier CDMA Based Low Probability of Intercept Network Sayan Ghosal Email: sayanghosal@yahoo.co.uk Devendra Jalihal Email: dj@ee.iitm.ac.in Giridhar K. Email: giri@ee.iitm.ac.in Abstract The need
More informationSecure Location Verification with Hidden and Mobile Base Stations
Secure Location Verification with Hidden and Mobile Base Stations S. Capkun, K.B. Rasmussen - Department of Computer Science, ETH Zurich M. Cagalj FESB, University of Split M. Srivastava EE Department,
More informationUnit 1 Introduction to Spread- Spectrum Systems. Department of Communication Engineering, NCTU 1
Unit 1 Introduction to Spread- Spectrum Systems Department of Communication Engineering, NCTU 1 What does it mean by spread spectrum communications Spread the energy of an information bit over a bandwidth
More informationDADS with short spreading sequences for high data rate communications or improved BER performance
1 DADS short spreading sequences for high data rate communications omproved performance Vincent Le Nir and Bart Scheers Abstract In this paper, a method is proposed to improve the performance of the delay
More informationAn Improved VLSI Architecture Using Galois Sequence for High Speed DSSS Signal Acquisition at Low SNR
International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 9 (November2012) PP: 42-48 An Improved VLSI Architecture Using Galois Sequence for High Speed DSSS Signal
More informationIFH SS CDMA Implantation. 6.0 Introduction
6.0 Introduction Wireless personal communication systems enable geographically dispersed users to exchange information using a portable terminal, such as a handheld transceiver. Often, the system engineer
More informationFrequency hopping does not increase anti-jamming resilience of wireless channels
Frequency hopping does not increase anti-jamming resilience of wireless channels Moritz Wiese and Panos Papadimitratos Networed Systems Security Group KTH Royal Institute of Technology, Stocholm, Sweden
More informationDEPARTMENT OF COMPUTER GCE@Bodi_ SCIENCE GCE@Bodi_ AND ENIGNEERING GCE@Bodi_ GCE@Bodi_ GCE@Bodi_ Analog and Digital Communication GCE@Bodi_ DEPARTMENT OF CsE Subject Name: Analog and Digital Communication
More informationMultiple access techniques
Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ
More informationBy Nour Alhariqi. nalhareqi
By Nour Alhariqi nalhareqi - 2014 1 Outline Basic background Research work What I have learned nalhareqi - 2014 2 DS-CDMA Technique For years, direct sequence code division multiple access (DS-CDMA) appears
More informationPart 3. Multiple Access Methods. p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU
Part 3. Multiple Access Methods p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU Review of Multiple Access Methods Aim of multiple access To simultaneously support communications between
More informationPhysical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1
Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error
More informationCH 5. Air Interface of the IS-95A CDMA System
CH 5. Air Interface of the IS-95A CDMA System 1 Contents Summary of IS-95A Physical Layer Parameters Forward Link Structure Pilot, Sync, Paging, and Traffic Channels Channel Coding, Interleaving, Data
More informationFrom Securing Navigation Systems to Securing Wireless Communication Through Location-Awareness
From Securing Navigation Systems to Securing Wireless Communication Through Location-Awareness Srdjan Čapkun Department of Computer Science ETH Zürich Purdue, 17.10.2007 Age of wireless communication...
More informationB SCITEQ. Transceiver and System Design for Digital Communications. Scott R. Bullock, P.E. Third Edition. SciTech Publishing, Inc.
Transceiver and System Design for Digital Communications Scott R. Bullock, P.E. Third Edition B SCITEQ PUBLISHtN^INC. SciTech Publishing, Inc. Raleigh, NC Contents Preface xvii About the Author xxiii Transceiver
More informationA MULTICARRIER CDMA ARCHITECTURE BASED ON ORTHOGONAL COMPLEMENTARY CODES FOR NEW GENERATION OF WIDEBAND WIRELESS COMMUNICATIONS
A MULTICARRIER CDMA ARCHITECTURE BASED ON ORTHOGONAL COMPLEMENTARY CODES FOR NEW GENERATION OF WIDEBAND WIRELESS COMMUNICATIONS BY: COLLINS ACHEAMPONG GRADUATE STUDENT TO: Dr. Lijun Quin DEPT OF ELECTRICAL
More informationRESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS
Abstract of Doctorate Thesis RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS PhD Coordinator: Prof. Dr. Eng. Radu MUNTEANU Author: Radu MITRAN
More informationZigBee Propagation Testing
ZigBee Propagation Testing EDF Energy Ember December 3 rd 2010 Contents 1. Introduction... 3 1.1 Purpose... 3 2. Test Plan... 4 2.1 Location... 4 2.2 Test Point Selection... 4 2.3 Equipment... 5 3 Results...
More informationModern Communications Jamming Principles and Techniques
Modern Communications Jamming Principles and Techniques Richard A. Poisel m Artech House Boston London www.artechhouse.com Contents Preface Acknowledgments xiii xv Chapter 1 Antijam Communications and
More informationJamming Mitigation by Randomized Bandwidth Hopping
Jamming Mitigation by Randomized Bandwidth Hopping Marc Liechti ETH Zurich Zurich, Switzerland marc@ liechti.one Vincent Lenders armasuisse Thun, Switzerland vincent.lenders@ armasuisse.ch Domenico Giustiniano
More informationWireless Medium Access Control and CDMA-based Communication Lesson 16 Orthogonal Frequency Division Medium Access (OFDM)
Wireless Medium Access Control and CDMA-based Communication Lesson 16 Orthogonal Frequency Division Medium Access (OFDM) 1 4G File transfer at 10 Mbps High resolution 1024 1920 pixel hi-vision picture
More information