JICE: Joint Data Compression and Encryption for Wireless Energy Auditing Networks
|
|
- Candice Price
- 5 years ago
- Views:
Transcription
1 JICE: Joint Data Compression and Encryption for Wireless Energy Auditing Networks Sheng-Yuan Chiu 1,2, Hoang Hai Nguyen 1, Rui Tan 1, David K.Y. Yau 1,3,Deokwoo Jung 1 1 Advanced Digital Science Center, Illinois at Singapore 2 National Tsing Hua University, Taiwan 3 Singapore University of Technology and Design, Singapore
2 Outline Motivation Design of JICE Secrecy of JICE Eperiment 2/19
3 Wireless Energy Auditing Buildings account for 40% electricity use Wireless appliance submetering Smart plugs (ZigBee radio) 3/19
4 Wireless Energy Auditing Buildings account for 40% electricity use Wireless appliance submetering Efficiency analysis 56% energy wasted in our office[jung 2013] Smart plugs (ZigBee radio) 3/19
5 Objectives & Challenges 50W 60W 30W 25W 10W 50W 70W 58W 50W 55W 50W ZigBee smart plugs 90W 50W ZigBee base station 4/19
6 Objectives & Challenges 50W 60W 30W 25W 10W 50W 70W 58W 50W 55W 50W ZigBee smart plugs 90W 50W ZigBee base station Increase coverage (# of meters) and sampling rate 10% coverage by 455 plugs [Haggerty 2012] Down to 1Hz to support load profiling 4/19
7 Objectives & Challenges Crowded wireless band Heavy WiFi traffic 50W 60W 30W 25W 10W 50W 70W 58W 50W 55W 50W ZigBee smart plugs 90W 50W ZigBee base station Increase coverage (# of meters) and sampling rate 10% coverage by 455 plugs [Haggerty 2012] Down to 1Hz to support load profiling 4/19
8 Objectives & Challenges Crowded wireless band Heavy WiFi traffic 50W 60W 30W 25W 10W 50W 70W 58W 50W 55W 50W ZigBee smart plugs 90W 50W ZigBee base station Increase coverage (# of meters) and sampling rate 10% coverage by 455 plugs [Haggerty 2012] Down to 1Hz to support load profiling Data secrecy during wireless communication Threat model: wireless eavesdropping 4/19
9 Objectives & Challenges Costly encryption No crypto for smart meters [Rouf 2012] Crowded wireless band Heavy WiFi traffic 50W 60W 30W 25W 10W 50W 70W 58W 50W 55W 50W ZigBee smart plugs 90W 50W ZigBee base station Increase coverage (# of meters) and sampling rate 10% coverage by 455 plugs [Haggerty 2012] Down to 1Hz to support load profiling Data secrecy during wireless communication Threat model: wireless eavesdropping 4/19
10 Conventional Scheme (Pipeline) Radio sensor compress encrypt decrypt decompress Power meter Base station reduce bandwidth use prevent eavesdropping Inefficient for resource-constrained plugs Computation-intensive compressor and cipher 5/19
11 Compressive Sensing Random matri Smart plug = Compressed Original Efficient compression Simple matri multiplication Most computation to recovery side Weakly encrypt signal [Rachlin 2008] Shared secret random matri Radio Base station Recovery Constrained optimization 6/19
12 Compressive Sensing Random matri Smart plug O(n) = Compressed Original Efficient compression Simple matri multiplication Most computation to recovery side Weakly encrypt signal [Rachlin 2008] Shared secret random matri Radio Base station Recovery Constrained optimization 6/19
13 Outline Motivation Design of JICE Secrecy of JICE Eperiment 7/19
14 Compressive Sensing Basics = Compression y M 1 M N N 1 M N 8/19
15 Compressive Sensing Basics = Compression y M 1 M N N 1 Recovery: compute from y by M N N N arg min z 1 z s.t. y z 8/19
16 Compressive Sensing Basics = Compression y M 1 M N N 1 Recovery: compute from y by N N Representation basis (only used for recovery) arg min z 1 z s.t. y M N z 8/19
17 Compressive Sensing Basics = Compression y M Recovery: compute from y by N N For better recovery Ψ sparsify 1 M N N 1 Representation basis (only used for recovery) arg min z 1 z s.t. y M Ψ -1 has many zeros N z 8/19
18 Trace-Driven Design Select Φ and Ψ based on traces Data traces from 40 branches for 18 hours Classify power consumption patterns Duty-cycled (fridge) Periodic (projector) Time (seconds) Time (seconds) Fluctuating (desktop) Spiky (server) Time (seconds) Time (seconds) 9/19
19 Random Matri Φ Gaussian, Bernoulli, Binary recovery error ~ 2 2 ~ : : original recovered Recovery error (%) Representation basis differential transform cosine transform Haar wavelet transform 10/19
20 Random Matri Φ Gaussian, Bernoulli, Binary recovery error ~ 2 2 ~ : : original recovered Recovery error (%) Representation basis differential transform cosine transform Haar wavelet transform 10/19
21 Random Matri Φ Gaussian, Bernoulli, Binary recovery error ~ 2 2 ~ : : original recovered Recovery error (%) Representation basis differential transform cosine transform Haar wavelet transform 10/19
22 Random Matri Φ Gaussian, Bernoulli, Binary recovery error ~ 2 2 ~ : : original recovered Representation basis dominates recovery performance Use binary random matri Recovery error (%) Representation basis differential transform cosine transform Haar wavelet transform 10/19
23 Representation Basis Ψ Differential transform (Diff) Cosine transform (Cos) Haar wavelet transform (Haar) sparsity # of nonzeros signal length Average sparsity duty-cycled periodic fluctuating spiky 11/19
24 Representation Basis Ψ Differential transform (Diff) Cosine transform (Cos) Haar wavelet transform (Haar) sparsity # of nonzeros signal length Average sparsity duty-cycled periodic fluctuating spiky Best choice: Diff Cos Haar Diff 11/19
25 Representation Basis Ψ Differential transform (Diff) Cosine transform (Cos) Haar wavelet transform (Haar) sparsity # of signal nonzeros length Changing power pattern: TV A plug monitors multiple appliances Average sparsity Adapt Ψ to changing power pattern duty-cycled periodic fluctuating spiky Best choice: Diff Cos Haar Diff 11/19
26 Adaptive Representation Basis Machine learning approach Plug selects Ψ based on shape features Ψ = Diff Ψ = Cos Ψ = Haar Shape feature 1 Compressed signal Smart plug Choice of Ψ Base station 12/19
27 Adaptive Representation Basis Machine learning approach Plug selects Ψ based on shape features Base station learns decision boundaries Ψ = Diff Ψ = Haar Ψ = Cos learn and update to plug Shape feature 1 Compressed signal Smart plug Choice of Ψ Base station 12/19
28 Shape Feature & Decision Table shape feature vector = # of zero crossings # of sharp changes standard deviation # of zero crossings > Δ 1? N N N N Y Y Y Y # of sharp changes > Δ 2? N N Y Y N N Y Y Standard deviation > Δ 3? N Y N Y N Y N Y Choice of basis ADT ADT HWT DCT HWT HWT ADT DCT 13
29 Shape Feature & Decision Table shape feature vector = # of zero crossings # of sharp changes standard deviation # of zero crossings > Δ 1? N N N N Y Y Y Y # of sharp changes > Δ 2? N N Y Y N N Y Y Standard deviation > Δ 3? N Y N Y N Y N Y Choice of basis ADT ADT HWT DCT HWT HWT ADT DCT 13
30 Shape Feature & Decision Table shape feature vector = # of zero crossings # of sharp changes standard deviation # of zero crossings > Δ 1? N N N N Y Y Y Y # of sharp changes > Δ 2? N N Y Y N N Y Y Standard deviation > Δ 3? N Y N Y N Y N Y Choice of basis ADT ADT HWT DCT HWT HWT ADT DCT Trained at base station Minimize recovery error 13
31 Outline Motivation Design of JICE Secrecy of JICE Eperiment 14/19
32 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance Zero mean: appliance is off High mean: appliance is on 15/19
33 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance ~ n n [ k,0,0,,0] T 15/19
34 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance ~ n Representation basis n [ k,0,0,,0] T 15/19
35 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance ~ n Representation basis n [ k,0,0,,0] T shared secret 15/19
36 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance ~ n Representation basis n [ k,0,0,,0] T Statistics depend on k shared secret 15/19
37 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance ~ n n [ k,0,0,,0] T Statistics depend on k Little (no) change to sparsity Little impact on recovery Very sparse in transform domain 15/19
38 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station 16
39 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station power signal perturb & compress y = Φ ( + n) y 16
40 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station power signal Feature etraction perturb & compress y = Φ ( + n) Decision table Ψ choice (2 bits) y 16
41 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station power signal Feature etraction perturb & compress y = Φ ( + n) Decision table Ψ choice (2 bits) y recover & de-perturb = Ψ argmin z - n s.t. y = ΦΨz Recovered signals 16
42 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station power signal Feature etraction perturb & compress y = Φ ( + n) Decision table Ψ choice (2 bits) y updates (14 B) recover & de-perturb = Ψ argmin z - n s.t. y = ΦΨz Decision table training Recovered signals 16
43 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station power signal Feature etraction perturb & compress y = Φ ( + n) Decision table Ψ choice (2 bits) y updates (14 B) recover & de-perturb = Ψ argmin z - n s.t. y = ΦΨz Decision table training Recovered signals eecuted every a few hours 16
44 Outline Motivation Design of JICE Secrecy of JICE Eperiment 17/19
45 Implementation Smart plug [Sonnonet] Kmote Smart plug Kmote (8MHz MCU, 10KB RAM, ZigBee, TinyOS) Baselines Pipeline: Lossy compressor [Liu 2013] + AES Downsampling Lossless pipeline: SLZW + AES 18/19
46 Implementation Smart plug [Sonnonet] Kmote Smart plug Kmote (8MHz MCU, 10KB RAM, ZigBee, TinyOS) Same compression ratio with JICE Baselines Pipeline: Lossy compressor [Liu 2013] + AES Downsampling Lossless pipeline: SLZW + AES 18/19
47 Adaptive Basis vs. Fied Basis For TV Recovery error (%) Time 19/19
48 Adaptive Basis vs. Fied Basis For TV Recovery error (%) Time JICE achieves best performance with one eception 19/19
49 Adaptive Basis vs. Fied Basis For TV Recovery error (%) Time JICE achieves best performance with one eception 19/19
50 Data Fidelity and Scalability Pipeline Background traffic node JICE 20/19
51 Data Fidelity and Scalability Pipeline Background traffic node JICE = 12 X 20/19
52 Data Fidelity and Scalability Pipeline JICE Pipeline # of background traffic nodes Background traffic node JICE = 12 X 20/19
53 Data Fidelity and Scalability Pipeline JICE Project to 96 plugs Project to 144 plugs Pipeline # of background traffic nodes JICE supports 50% more plugs Background traffic node = 12 X JICE 20/19
54 Conclusion & Future work JICE Supports more nodes for same data fidelity Better data secrecy than pure compressive sensing Adaptive to changing power pattern Future work Other applications 21/19
A A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks
A A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks RUI TAN, Nanyang Technological University SHENG-YUAN CHIU, National Tsing Hua University HOANG HAI NGUYEN, University
More informationRecovering Lost Sensor Data through Compressed Sensing
Recovering Lost Sensor Data through Compressed Sensing Zainul Charbiwala Collaborators: Younghun Kim, Sadaf Zahedi, Supriyo Chakraborty, Ting He (IBM), Chatschik Bisdikian (IBM), Mani Srivastava The Big
More informationVolcanic Earthquake Timing Using Wireless Sensor Networks
Volcanic Earthquake Timing Using Wireless Sensor Networks GuojinLiu 1,2 RuiTan 2,3 RuoguZhou 2 GuoliangXing 2 Wen-Zhan Song 4 Jonathan M. Lees 5 1 Chongqing University, P.R. China 2 Michigan State University,
More informationSignal Recovery from Random Measurements
Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse
More informationCompressed Sensing for Multiple Access
Compressed Sensing for Multiple Access Xiaodai Dong Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Tohoku University, Sendai, Japan Oct. 28, 2013 Outline Background Existing
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationCorrelation Power Analysis of Lightweight Block Ciphers
Correlation Power Analysis of Lightweight Block Ciphers From Theory to Practice Alex Biryukov Daniel Dinu Johann Großschädl SnT, University of Luxembourg ESC 2017 (University of Luxembourg) CPA of Lightweight
More informationHybrid Coding (JPEG) Image Color Transform Preparation
Hybrid Coding (JPEG) 5/31/2007 Kompressionsverfahren: JPEG 1 Image Color Transform Preparation Example 4: 2: 2 YUV, 4: 1: 1 YUV, and YUV9 Coding Luminance (Y): brightness sampling frequency 13.5 MHz Chrominance
More informationTSKS01 Digital Communication Lecture 1
TSKS01 Digital Communication Lecture 1 Introduction, Repetition, Channels as Filters, Complex-baseband representation Emil Björnson Department of Electrical Engineering (ISY) Division of Communication
More informationOn-Mote Compressive Sampling in Wireless Seismic Sensor Networks
On-Mote Compressive Sampling in Wireless Seismic Sensor Networks Marc J. Rubin Computer Science Ph.D. Candidate Department of Electrical Engineering and Computer Science Colorado School of Mines mrubin@mines.edu
More informationToward Non-stationary Blind Image Deblurring: Models and Techniques
Toward Non-stationary Blind Image Deblurring: Models and Techniques Ji, Hui Department of Mathematics National University of Singapore NUS, 30-May-2017 Outline of the talk Non-stationary Image blurring
More informationJamming Wireless Networks: Attack and Defense Strategies
Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005 Roadmap Introduction and Motivation Jammer Models
More informationPerformance Analysis of Threshold Based Compressive Sensing Algorithm in Wireless Sensor Network
American Journal of Applied Sciences Original Research Paper Performance Analysis of Threshold Based Compressive Sensing Algorithm in Wireless Sensor Network Parnasree Chakraborty and C. Tharini Department
More information2.4GHz vs. Sub-GHz Markets, Applications & Key Decisions
www.silabs.com 2.4GHz vs. Sub-GHz Markets, Applications & Key Decisions Overview Many customers are trying to decide between 2.4 GHz or sub-ghz This presentation will define the key factors impacting a
More informationCompressed Meter Reading for Delay-sensitive and Secure Load Report in Smart Grid
Compressed Meter Reading for Delay-sensitive Secure Load Report in Smart Grid Husheng Li, Rukun Mao, Lifeng Lai Robert. C. Qiu Abstract It is a key task in smart grid to send the readings of smart meters
More informationFrom network-level measurements to Quality of Experience: Estimating the quality of Internet access with ACQUA
From network-level measurements to Quality of Experience: Estimating the quality of Internet access with ACQUA Chadi.Barakat@inria.fr www-sop.inria.fr/members/chadi.barakat/ Joint work with D. Saucez,
More informationNon-uniform Compressive Sensing in Wireless Sensor Networks: Feasibility and Application
Non-uniform Compressive Sensing in Wireless Sensor Networks: Feasibility and Application Yiran Shen #, Wen Hu, Rajib Rana, Chun Tung Chou # CSIRO ICT centre, Australia {wen.hu,rajib.rana}@csiro.au # School
More informationK-RLE : A new Data Compression Algorithm for Wireless Sensor Network
K-RLE : A new Data Compression Algorithm for Wireless Sensor Network Eugène Pamba Capo-Chichi, Hervé Guyennet Laboratory of Computer Science - LIFC University of Franche Comté Besançon, France {mpamba,
More informationAn Introduction to Compressive Sensing and its Applications
International Journal of Scientific and Research Publications, Volume 4, Issue 6, June 2014 1 An Introduction to Compressive Sensing and its Applications Pooja C. Nahar *, Dr. Mahesh T. Kolte ** * Department
More informationCryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing
More informationVolcanic Earthquake Timing Using Wireless Sensor Networks
Volcanic Earthquake Timing Using Wireless Sensor Networks Guojin Liu,, Rui Tan,, Ruogu Zhou, Guoliang Xing, Wen-Zhan Song, Jonathan M. Lees College of Communication Engineering, Chongqing University, P.R.
More informationCompressive Sampling with R: A Tutorial
1/15 Mehmet Süzen msuzen@mango-solutions.com data analysis that delivers 15 JUNE 2011 2/15 Plan Analog-to-Digital conversion: Shannon-Nyquist Rate Medical Imaging to One Pixel Camera Compressive Sampling
More informationWAVELET-BASED COMPRESSED SPECTRUM SENSING FOR COGNITIVE RADIO WIRELESS NETWORKS. Hilmi E. Egilmez and Antonio Ortega
WAVELET-BASED COPRESSED SPECTRU SENSING FOR COGNITIVE RADIO WIRELESS NETWORKS Hilmi E. Egilmez and Antonio Ortega Signal & Image Processing Institute, University of Southern California, Los Angeles, CA,
More informationCOMPRESSIVE SENSING BASED ECG MONITORING WITH EFFECTIVE AF DETECTION. Hung Chi Kuo, Yu Min Lin and An Yeu (Andy) Wu
COMPRESSIVESESIGBASEDMOITORIGWITHEFFECTIVEDETECTIO Hung ChiKuo,Yu MinLinandAn Yeu(Andy)Wu Graduate Institute of Electronics Engineering, ational Taiwan University, Taipei, 06, Taiwan, R.O.C. {charleykuo,
More informationResource Allocation in a Cognitive Digital Home
Resource Allocation in a Cognitive Digital Home Tianming Li, Narayan B. Mandayam@ Alex Reznik@InterDigital Inc. Outline Wireless Home Networks A Cognitive Digital Home Joint Channel and Radio Access Technology
More informationCooperative Compressed Sensing for Decentralized Networks
Cooperative Compressed Sensing for Decentralized Networks Zhi (Gerry) Tian Dept. of ECE, Michigan Tech Univ. A presentation at ztian@mtu.edu February 18, 2011 Ground-Breaking Recent Advances (a1) s is
More informationScaling Network- based Spectrum Analyzer with Constant Communica<on Cost
Scaling Network- based Spectrum Analyzer with Constant Communica
More informationInformation Hiding: Steganography & Steganalysis
Information Hiding: Steganography & Steganalysis 1 Steganography ( covered writing ) From Herodotus to Thatcher. Messages should be undetectable. Messages concealed in media files. Perceptually insignificant
More informationEmpirical Rate-Distortion Study of Compressive Sensing-based Joint Source-Channel Coding
Empirical -Distortion Study of Compressive Sensing-based Joint Source-Channel Coding Muriel L. Rambeloarison, Soheil Feizi, Georgios Angelopoulos, and Muriel Médard Research Laboratory of Electronics Massachusetts
More informationRate-Adaptive Compressed-Sensing and Sparsity Variance of Biomedical Signals
Rate-Adaptive Compressed- and Sparsity Variance of Biomedical Signals Vahid Behravan, Neil E. Glover, Rutger Farry, Patrick Y. Chiang Oregon State University Corvallis, OR, USA {behravav,gloverne,farryr,pchiang}@onid.oregonstate.edu
More informationChapter 9 Image Compression Standards
Chapter 9 Image Compression Standards 9.1 The JPEG Standard 9.2 The JPEG2000 Standard 9.3 The JPEG-LS Standard 1IT342 Image Compression Standards The image standard specifies the codec, which defines how
More informationTime-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers. Praveen Vadnala
Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers Praveen Vadnala Differential Power Analysis Implementations of cryptographic systems leak Leaks from bit 1 and bit 0 are
More informationSensors & Transducers 2015 by IFSA Publishing, S. L.
Sensors & Transducers 5 by IFSA Publishing, S. L. http://www.sensorsportal.com Low Energy Lossless Image Compression Algorithm for Wireless Sensor Network (LE-LICA) Amr M. Kishk, Nagy W. Messiha, Nawal
More informationTemplates and Image Pyramids
Templates and Image Pyramids 09/06/11 Computational Photography Derek Hoiem, University of Illinois Project 1 Due Monday at 11:59pm Options for displaying results Web interface or redirect (http://www.pa.msu.edu/services/computing/faq/autoredirect.html)
More informationImaging with Wireless Sensor Networks
Imaging with Wireless Sensor Networks Rob Nowak Waheed Bajwa, Jarvis Haupt, Akbar Sayeed Supported by the NSF What is a Wireless Sensor Network? Comm between army units was crucial Signal towers built
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationGeneral MIMO Framework for Multipath Exploitation in Through-the-Wall Radar Imaging
General MIMO Framework for Multipath Exploitation in Through-the-Wall Radar Imaging Michael Leigsnering, Technische Universität Darmstadt Fauzia Ahmad, Villanova University Moeness G. Amin, Villanova University
More informationTemplates and Image Pyramids
Templates and Image Pyramids 09/07/17 Computational Photography Derek Hoiem, University of Illinois Why does a lower resolution image still make sense to us? What do we lose? Image: http://www.flickr.com/photos/igorms/136916757/
More informationRobust Location Distinction Using Temporal Link Signatures
Robust Location Distinction Using Temporal Link Signatures Neal Patwari Sneha Kasera Department of Electrical and Computer Engineering What is location distinction? Ability to know when a transmitter has
More informationSPEECH COMPRESSION USING WAVELETS
SPEECH COMPRESSION USING WAVELETS HATEM ELAYDI Electrical & Computer Engineering Department Islamic University of Gaza Gaza, Palestine helaydi@mail.iugaza.edu MUSTAFA I. JABER Electrical & Computer Engineering
More informationAn Energy Efficient Compressed Sensing Framework for the Compression of Electroencephalogram Signals
Sensors 2014, 14, 1474-1496; doi:10.3390/s140101474 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article An Energy Efficient Compressed Sensing Framework for the Compression of Electroencephalogram
More informationBayesian Positioning in Wireless Networks using Angle of Arrival
Bayesian Positioning in Wireless Networks using Angle of Arrival Presented by: Rich Martin Joint work with: David Madigan, Eiman Elnahrawy, Wen-Hua Ju, P. Krishnan, A.S. Krishnakumar Rutgers University
More informationProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals
ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals Suhas Mathur AT&T Security Research Group Rob Miller, Alex Varshavsky, Wade Trappe, Narayan Madayam Suhas Mathur (AT&T) firstname
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication
More informationCommutative reversible data hiding and encryption
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 3; 6:396 43 Published online March 3 in Wiley Online Library (wileyonlinelibrary.com)..74 RESEARCH ARTICLE Xinpeng Zhang* School of Communication
More informationSensor network: storage and query. Overview. TAG Introduction. Overview. Device Capabilities
Sensor network: storage and query TAG: A Tiny Aggregation Service for Ad- Hoc Sensor Networks Samuel Madden UC Berkeley with Michael Franklin, Joseph Hellerstein, and Wei Hong Z. Morley Mao, Winter Slides
More informationEnergy-Effective Communication Based on Compressed Sensing
American Journal of etworks and Communications 2016; 5(6): 121-127 http://www.sciencepublishinggroup.com//anc doi: 10.11648/.anc.20160506.11 ISS: 2326-893X (Print); ISS: 2326-8964 (Online) Energy-Effective
More informationSteganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005
Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.
More informationImproved Compressive Sensing of Natural Scenes Using Localized Random Sampling
Improved Compressive Sensing of Natural Scenes Using Localized Random Sampling Victor J. Barranca 1, Gregor Kovačič 2 Douglas Zhou 3, David Cai 3,4,5 1 Department of Mathematics and Statistics, Swarthmore
More informationCollege of Engineering
WiFi and WCDMA Network Design Robert Akl, D.Sc. College of Engineering Department of Computer Science and Engineering Outline WiFi Access point selection Traffic balancing Multi-Cell WCDMA with Multiple
More informationEvaluation of On-chip Decoupling Capacitor s Effect on AES Cryptographic Circuit
R1-3 SASIMI 2013 Proceedings Evaluation of On-chip Decoupling Capacitor s Effect on AES Cryptographic Circuit Tsunato Nakai Mitsuru Shiozaki Takaya Kubota Takeshi Fujino Graduate School of Science and
More informationRobust Key Establishment in Sensor Networks
Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties
More informationINDOOR POSITIONING IN WIRELESS LANS USING COMPRESSIVE SENSING SIGNAL-STRENGTH FINGERPRINTS
INDOOR POSITIONING IN WIRELESS LANS USING COMPRESSIVE SENSING SIGNAL-STRENGTH FINGERPRINTS Dimitris Milioris,3,4, George Tzagkarakis 5, Philippe Jacquet 4 and Panagiotis Tsakalides, Department of Computer
More informationSparsity-Driven Feature-Enhanced Imaging
Sparsity-Driven Feature-Enhanced Imaging Müjdat Çetin mcetin@mit.edu Faculty of Engineering and Natural Sciences, Sabancõ University, İstanbul, Turkey Laboratory for Information and Decision Systems, Massachusetts
More informationWIRELESS Sensor Networks (WSN) has attracted interests
2016 IEEE First International Conference on Internet-of-Things Design and Implementation On the Implementation of Compressive Sensing on Wireless Sensor Network Dong-Yu Cao, Kai Yu, Shu-Guo Zhuo, Yu-Hen
More informationECE5713 : Advanced Digital Communications
ECE5713 : Advanced Digital Communications Bandpass Modulation MPSK MASK, OOK MFSK 04-May-15 Advanced Digital Communications, Spring-2015, Week-8 1 In-phase and Quadrature (I&Q) Representation Any bandpass
More informationData Compression via Logic Synthesis
Data Compression via Logic Synthesis Luca Amarú 1, Pierre-Emmanuel Gaillardon 1, Andreas Burg 2, Giovanni De Micheli 1 Integrated Systems Laboratory (LSI), EPFL, Switzerland 1 Telecommunication Circuits
More informationAutonomous Self-deployment of Wireless Access Networks in an Airport Environment *
Autonomous Self-deployment of Wireless Access Networks in an Airport Environment * Holger Claussen Bell Labs Research, Swindon, UK. * This work was part-supported by the EU Commission through the IST FP5
More informationCh. 3: Image Compression Multimedia Systems
4/24/213 Ch. 3: Image Compression Multimedia Systems Prof. Ben Lee (modified by Prof. Nguyen) Oregon State University School of Electrical Engineering and Computer Science Outline Introduction JPEG Standard
More informationModule 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains:
The Lecture Contains: The Need for Video Coding Elements of a Video Coding System Elements of Information Theory Symbol Encoding Run-Length Encoding Entropy Encoding file:///d /...Ganesh%20Rana)/MY%20COURSE_Ganesh%20Rana/Prof.%20Sumana%20Gupta/FINAL%20DVSP/lecture%2040/40_1.htm[12/31/2015
More informationINSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad - 500 043 ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK Course Title Course Code Class Branch DIGITAL IMAGE PROCESSING A70436 IV B. Tech.
More informationApplication of Discrete Wavelet Transform for Compressing Medical Image
Application of Discrete Wavelet Transform for Compressing Medical 1 Ibrahim Abdulai Sawaneh, 2 Joshua Hamid Koroma, 3 Abu Koroma 1, 2, 3 Department of Computer Science: Institute of Advanced Management
More informationThe Strengths and Weaknesses of Different Image Compression Methods. Samuel Teare and Brady Jacobson
The Strengths and Weaknesses of Different Image Compression Methods Samuel Teare and Brady Jacobson Lossy vs Lossless Lossy compression reduces a file size by permanently removing parts of the data that
More informationA Practical Approach to Landmark Deployment for Indoor Localization
A Practical Approach to Landmark Deployment for Indoor Localization Yingying Chen, John-Austen Francisco, Wade Trappe, and Richard P. Martin Dept. of Computer Science Wireless Information Network Laboratory
More informationFinding the key in the haystack
A practical guide to Differential Power hunz Zn000h AT gmail.com December 30, 2009 Introduction Setup Procedure Tunable parameters What s DPA? side channel attack introduced by Paul Kocher et al. 1998
More informationImages with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information
Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information 1992 2008 R. C. Gonzalez & R. E. Woods For the image in Fig. 8.1(a): 1992 2008 R. C. Gonzalez & R. E. Woods Measuring
More informationTransport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported
More informationEE3723 : Digital Communications
EE3723 : Digital Communications Week 8-9: Bandpass Modulation MPSK MASK, OOK MFSK 04-May-15 Muhammad Ali Jinnah University, Islamabad - Digital Communications - EE3723 1 In-phase and Quadrature (I&Q) Representation
More informationCamera Image Processing Pipeline: Part II
Lecture 13: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements
More informationMultiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique
Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique Wen-Yuan Chen, Jen-Tin Lin, Chi-Yuan Lin, and Jin-Rung Liu Department of Electronic Engineering, National Chin-Yi Institute of Technology,
More informationSatellite Communications: Part 4 Signal Distortions & Errors and their Relation to Communication Channel Specifications. Howard Hausman April 1, 2010
Satellite Communications: Part 4 Signal Distortions & Errors and their Relation to Communication Channel Specifications Howard Hausman April 1, 2010 Satellite Communications: Part 4 Signal Distortions
More informationDeformation Monitoring Based on Wireless Sensor Networks
Deformation Monitoring Based on Wireless Sensor Networks Zhou Jianguo tinyos@whu.edu.cn 2 3 4 Data Acquisition Vibration Data Processing Summary 2 3 4 Data Acquisition Vibration Data Processing Summary
More informationCompressive Sensing based Asynchronous Random Access for Wireless Networks
Compressive Sensing based Asynchronous Random Access for Wireless Networks Vahid Shah-Mansouri, Suyang Duan, Ling-Hua Chang, Vincent W.S. Wong, and Jwo-Yuh Wu Department of Electrical and Computer Engineering,
More informationCOMPRESSING LIDAR WAVEFORM DATA
COMPRESSING LIDAR WAVEFORM DATA Sandor Laky 1,2, Piroska Zaletnyik 1,2, Charles Toth 1 1 Budapest University of Technology and Economics, HAS-BME Research Group for Physical Geodesy and Geodynamics, Muegyetem
More informationAnna University, Chennai B.E./B.TECH DEGREE EXAMINATION, MAY/JUNE 2013 Seventh Semester
www.vidyarthiplus.com Anna University, Chennai B.E./B.TECH DEGREE EXAMINATION, MAY/JUNE 2013 Seventh Semester Electronics and Communication Engineering EC 2029 / EC 708 DIGITAL IMAGE PROCESSING (Regulation
More informationSpeech Compression Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. VI (May - June 2017), PP 33-41 www.iosrjournals.org Speech Compression Using Wavelet Transform
More informationOptimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function
Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering
More informationApplied to Wireless Sensor Networks. Objectives
Communication Theory as Applied to Wireless Sensor Networks muse Objectives Understand the constraints of WSN and how communication theory choices are influenced by them Understand the choice of digital
More informationTransform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep.
978-1-4673-2451-9/12/$31.00 2012 IEEE 201 CPA Performance Comparison based on Wavelet Transform Aesun Park Department of Mathematics Kookmin University Seoul, Korea Rep. aesons@kookmin.ac.kr Dong-Guk Han
More informationCOMPRESSIVE SENSING IN WIRELESS COMMUNICATIONS
COMPRESSIVE SENSING IN WIRELESS COMMUNICATIONS A Dissertation Presented to the Faculty of the Electrical and Computer Engineering Department University of Houston in Partial Fulfillment of the Requirements
More informationMulticasting over Multiple-Access Networks
ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity
More informationSPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS
SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS Puneetha R 1, Dr.S.Akhila 2 1 M. Tech in Digital Communication B M S College Of Engineering Karnataka, India 2 Professor Department of
More informationCompact VNA - TR1300/1
Compact VNA - TR1300/1 TM Extended Specifications Frequency range: 300 khz - 1.3 GHz Wide output power adjustment range: -55 dbm to +3 dbm Dynamic range: 135 db (10 Hz IF bandwidth) typ. Measurement time
More informationAirMagnet Spectrum XT
AirMagnet Spectrum XT AirMagnet Spectrum XT is the industry s first professional spectrum analyzer solution that combines in-depth RF analysis with real-time WLAN information for quicker and more accurate
More informationHarvesting a Clock from a GSM Signal for the Wake-Up of a Wireless Sensor Network
Harvesting a Clock from a GSM Signal for the Wake-Up of a Wireless Sensor Network Jonathan K. Brown and David D. Wentzloff University of Michigan Ann Arbor, MI, USA ISCAS 2010 Acknowledgment: This material
More informationCompressive sensing in wireless sensor network for poultry acoustic monitoring
94 March, 2017 Int J Agric & Biol Eng Open Access at https://www.ijabe.org Vol. 10 o.2 Compressive sensing in wireless sensor network for poultry acoustic monitoring Xuan Chuanzhong 1, Wu Pei 1*, Zhang
More informationSmart Metering Communication Network Need, Selection and Comparison
Smart Metering Communication Network Need, Selection and Comparison 1 Communication Technology for Smart Metering- Parameters for Selection Reliability and robustness Performance to meet SLA targets Cost
More informationA Practical Method to Achieve Perfect Secrecy
A Practical Method to Achieve Perfect Secrecy Amir K. Khandani E&CE Department, University of Waterloo August 3 rd, 2014 Perfect Secrecy: One-time Pad One-time Pad: Bit-wise XOR of a (non-reusable) binary
More informationObjective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs
Objective Evaluation of Edge Blur and Artefacts: Application to JPEG and JPEG 2 Image Codecs G. A. D. Punchihewa, D. G. Bailey, and R. M. Hodgson Institute of Information Sciences and Technology, Massey
More informationOptimization Techniques for Alphabet-Constrained Signal Design
Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques
More informationNovel Methods for Microscopic Image Processing, Analysis, Classification and Compression
Novel Methods for Microscopic Image Processing, Analysis, Classification and Compression Ph.D. Defense by Alexander Suhre Supervisor: Prof. A. Enis Çetin March 11, 2013 Outline Storage Analysis Image Acquisition
More informationarxiv: v1 [cs.it] 5 Jun 2016
AN ENERGY-EFFICIENT COMPRESSIVE SENSING FRAMEWORK INCORPORATING ONLINE DICTIONARY LEARNING FOR LONG-TERM WIRELESS HEALTH MONITORING Kai XU, Yixing Li, Fengbo Ren Parallel Systems and Computing Laboratory
More informationThe Mote Revolution: Low Power Wireless Sensor Network Devices
The Mote Revolution: Low Power Wireless Sensor Network Devices University of California, Berkeley Joseph Polastre Robert Szewczyk Cory Sharp David Culler The Mote Revolution: Low Power Wireless Sensor
More informationSIMULTANEOUS COMPRESSIVE SENSING AND OPTICAL ENCRYPTION OF SIGNALS AND IMAGES
SIMULTANEOUS COMPRESSIVE SENSING AND OPTICAL ENCRYPTION OF SIGNALS AND IMAGES Dr. Ertan Atar Türk Telekom İstanbul-I Area Offices İstanbul, Turkey ertan.atar@turktelekom.com.tr Prof. Dr. Okan K. Ersoy
More informationArray-Transmission Based Physical-Layer Security Techniques For Wireless Sensor Networks
Proceedings of the IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada July 2005 Array-Transmission Based Physical-Layer Security Techniques For Wireless Sensor Networks Xiaohua(Edward)
More informationPhysical Layer. Networked Systems (H) Lecture 3
Physical Layer Networked Systems (H) Lecture 3 This work is licensed under the Creative Commons Attribution-NoDerivatives 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/4.0/
More informationCamera Image Processing Pipeline: Part II
Lecture 14: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements
More informationResearch Article A Robust Zero-Watermarking Algorithm for Audio
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 453580, 7 pages doi:10.1155/2008/453580 Research Article A Robust Zero-Watermarking Algorithm for
More informationAntennas and Propagation. Chapter 6d: Diversity Techniques and Spatial Multiplexing
Antennas and Propagation d: Diversity Techniques and Spatial Multiplexing Introduction: Diversity Diversity Use (or introduce) redundancy in the communications system Improve (short time) link reliability
More information