Student Seminars: Kickoff
|
|
- Eric Mitchell
- 5 years ago
- Views:
Transcription
1 Seminars Student Seminars: Kickoff Walid Saad Durham 447
2 Seminars Fall Logistics Weekly meetings in SEB 135 SEB 125 used 10/24, 11/07, and 12/05 Contacts: SaiDhiraj Amuru, Harpreet Dhillon, Walid Saad For the students, by the students So what am I doing here? Due to short notice, no student has stepped up Who will participate? The goal is to have most speakers be students Faculty will be attending sporadically 2
3 Seminars What are the goals of these seminars? Sleeping hour for grad students? A form of torture? Debate group : engaging discussions between groups Integrating new students by giving them insights on how to identify and formulate a research problem, how to choose a technique, etc. Practice prelims, defense, etc. Free pizza (outside)! 3
4 Additional Goals Have talks that discuss new directions in wireless or other areas we re engaged in Talks/tutorials that discuss how to use certain tools For example: how to program a USRP? How to use NS3 for wireless simulations? We will solicit such questions from the students Distinguished Speakers from inside and outside VT We will strive to get at least one distinguished speaker per year from outside VT Build a culture of research in our students community => Sustainable only via active students participation 4
5 Best Practices The purpose of these meetings is not to overly defend your research but rather get feedback from fellow students and explain to them what you re doing Strongly suggest to explain a basic problem you re working on, while clarifying methodology, assumptions made, etc. You know this but. use more figures and illustrations to clarify your ideas However, we need sufficient technical details in these seminars so that new students can learn from the rest 5
6 Best Practices Avoid overly texty slides Concise bullets preferred Avoid weird fonts And weird colors Make eye contact with your audience! Prepare for questions, if no questions, you can start the debate Be enthusiastic, not bored! 6
7 Today s Talk On the Physical Layer Security of Backscatter Systems
8 Outline Introduction to RFID systems and the backscatter Motivation and key features Backscatter communication System model Basic communication model What happens in the presence of eavesdroppers? Physical layer security of backscatter systems Introduction and motivation Basic model Main analysis Simulation results Conclusions and future outlook 8
9 RFID Systems A Radio Frequency Identification (RFID) system is composed of two key components RFID tag: electronic device that can store and transmit data to a reader in a contactless manner RFID reader: Transceiver that can read and communicate with RFID tags 9
10 RFID Systems Three types of RFID tags Passive: cheapest does not include any power source, harvests energy from the reader Semi-Passive: can include some basic sotrage elements as well as a possible small battery to power the circuitry (but not for TX) Active: has transmission capabilities basically a small sensor Two main technologies Near-field communication (NFC): operate at very short distances, e.g., few centimeters, over HF frequencies (i.e., MHz). Ultra high frequency (UHF) RFIDs: operate at UHF frequencies (typically 433 MHz), can be used at longer ranges (10 meters is common but recent research is looking at larger distances) Of interest in this talk 10
11 RFID Applications 11
12 Basic RFID Communication Interrogate and Power Tag Responds with data, by modulating the CW Reader transmits a continuous wave (CW) carrier signal Induces an RF voltage across the tag antenna that is converted to DC by a power harvesting circuit to power the tag s circuitry and demodulate the received command Tag transmits back its stored information by controlling the amount of backscatter of the impinging downlink signal by varying the impedance (mis)-match of the antenna front-end Role of the reader in energizing the tag 12
13 RFID Backscatter: Challenges Tags must remain cheap and passive tags must harvest energy Limitations on circuit design. Design of innovative RFIDs is a key challenge. The uplink tag-to-reader communication has a strictly limited bandwidth due to limited backscatter power and tag collisions How to improve the uplink communication? Crucial to allow higher distances, better rate, and new applications! Security is probably the most critical issue Fact: Classical cryptography hard to implement on RFID tags Current solutions (lightweight cryptography) are non-scalable Security solutions with little complexity => Physical layer security! 13
14 System Model Basic UHF RFID system with one reader and one tag The signal backscattered by a tag k toward the receive antenna of a reader i is given by (Griffin et al., IEEE Trans. Antenna and Propagation, Feb 2008): Noise Tagreader channel Readertag channel Reader s TX signal Tag s reflection coefficient (useful signal) 14
15 Presence of Eavesdroppers A nearby eavesdropper can tap into the communication Two main critics of PHY security But cryptography works fine in cellular systems! But not in RFID You assume eaves. location known RFIDs work on small distances! Does the backscatter constitute the ideal PHY security application? Let s see Tag Responds with data/id Interrogate and power Tag Passive tag requires the reader s continuous wave to power up! 15
16 Key Backscatter Features Eavesdropping in a backscatter system is mostly useful at close distances Due to low-power, low-cost nature of the system as well as the reliance on passive tags Eavesdroppers are mainly interested in the uplink signal/tag data So they must focus their effort on the tag, not the reader The downlink reader-tag signal is also received by the eavesdropper during backscatter A feature to exploit for PHY security 16
17 Signal at the Eavesdropper The signal backscattered by a tag toward the receive antenna of a reader as received at the eavesdropper Tag-eave channel Readertag channel Tag s reflection coefficient (useful signal) Reader continuous CW transmission, Reader-eave channel Noise In a classical system, the eavesdropper knows the CW x and, thus, the second term can be cancelled and does not hinder eavesdropping 17
18 Using Artificial Noise Observation: the backscatter channel provides a mean for reader-induced interference, due to the nature of the communication A random noise signal added to the CW transmitted by the readers will be detrimental to the eavesdroppers Can improve the physical layer security of the system While this has been used in PHY security for conventional systems, it often requires MIMO, in RFID, no need for MIMO! Easily implementable, with little changes at the tag 18
19 Using Artificial Noise Each reader transmits x+zwith z being a random narrowband artificial noise known to the reader With noise injection, the reader s signal becomes: And the eavesdropper s received signal: z and z are the same signal, but received by the eavesdropper over different paths and at possibly different time instants Power of the received noise from z will naturally be much larger than that of the backscattered noise 19
20 PHY Security: Basics C d 1 I can hear User 1! Notion of secrecy capacity C e 1 Maximum rate sent from a wireless node to its destination in the presence of eavesdroppers Here, secrecy capacity of user 1 : C 1 = (C d 1 -C e 1) + For RFID, we use the secrecy capacity as a theoretical performance metric to assess how artificial noise can improve secrecy Practical RFID-tailored notions is an interesting direction 20
21 RFID with Artificial Noise Approximation of secrecy capacity of the backscatter communication between reader and tag: The received powers follow the Friis model We assume worst-case scenario at eavesdropper, i.e., noise is 0, hereinafter. 21
22 Positive Secrecy Key question: For this basic model, what is the condition for positive secrecy? Let s look at two baseline cases Case 1: all terminals have omnidirectional antennas Positive secrecy is challenging with eaves. close to the tag. Case 2: any antennas at the eavesdropper Let s look at antenna impact numerically 22
23 Case 2 Even for highly directional antenna, positive secrecy is possible with reasonable noise power 23
24 Back to Case 1 Even for an eavesdropper placed at 10 cm of the tag, positive secrecy is possible with reasonable noise power 24
25 Optimal Power Allocation Reader has a finite transmit power budget that must be split between noise and main CW How to allocate the reader s finite power between noise and real signal? Analytical closed-form solution can be derived easily (simple optimization problem) 25
26 Simulation results (1) Positive secrecy Achievable even for small distances 26
27 Simulation results (2) Positive secrecy Achievable even for highly directive antennas 27
28 Simulation results (3) Only a small noise injection is sufficient for positive secrecy 28
29 The Multi-Reader Case What if we have multiple readers? Key tradeoff: more power for noise, worse SINR at eavesdroppers, but Less power for the useful signal Coupling in actions: It can lead the other readers to change their power allocation, due to the spreading interference New dimension to the problem Adding noise can protect against eavesdroppers but the power of each others noise will impact our performance We now have a problem where decisions between readers are interdependent 29
30 The Multi-Reader Case What are the techniques we can now use? We can still use an optimization problem for the entire system Advantage: ensure system-wide optimality Disadvantage: could require additional overhead and explicit control of all readers (may not be possible in practice) Game theory Why? Interdependence in decisions between the readers Advantage: allows individual optimization per reader (kind of like we did before) Disadvantage: could yield an inefficient point and may still require some form of information at each reader. 30
31 RFID Game Formulation What kind of game? Noncooperative, because we assume no explicit communication between readers We formulate the problem as a strategic, noncooperative game with The readers being the players The action of each reader being the fraction of power allotted to the noise and the useful signal The utility being the sum of secrecy rates at all tags, i.e., 31
32 Game Solution Definition: A Nash equilibrium is a strategy profile s* with the property that no player i can do better by choosing a strategy different from s*, given that every other player j i. For each player i with payoff function u i, we have: Does the Nash equilibrium exist? Not always, multiplicity, efficiency, algorithmic aspects Algorithmic solution via best response Not necessarily the best solution, but can give you insights on a problem 32
33 Best-Response Solution Initial State: -No artificial noise being used -- Discovery of neighboring readers Sequentially, Each reader decides on its optimal power distribution, under the currently observed network state Stage I Best Response Dynamics, until finding a Nash equilibrium - Readers send out the interrogate commands using the derived powers/secrecy - The tags respond using backscatter Stage II Actual data acquisition 33
34 Simulation results (1) Classical approach = Regular channel With no noise Case with 6 Eavesdroppers: Performance advantage particularly when the number Of eavesroppers > Number of readers 34
35 Simulation results (2) Reasonable Number of iterations 35
36 Summary The physical layer security of backscatter RFID systems is still a largely unchartered territory Most natural application for PHY security, due to infeasibility of cryptography and the need for cost-effective, practical solutions Our preliminary results show that a simple solution can lead to significant gains, at least theoretically Future work Advanced signal processing and information theoretic analysis More system-level analysis, multi-reader/tag/eavesdropper Theoretical analysis on performance of RFID PHY security Innovative optimization techniques, beyond basic artificial noise 36
37 Finally. Thank You Questions? 37
Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification
Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification
Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification 1 RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,
More informationAn Empirical Study of UHF RFID Performance. Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof.
An Empirical Study of UHF RFID Performance Michael Buettner and David Wetherall Presented by Qian (Steve) He CS 577 - Prof. Bob Kinicki Overview Introduction Background Knowledge Methodology and Tools
More informationLow-Complexity Beam Allocation for Switched-Beam Based Multiuser Massive MIMO Systems
Low-Complexity Beam Allocation for Switched-Beam Based Multiuser Massive MIMO Systems Jiangzhou Wang University of Kent 1 / 31 Best Wishes to Professor Fumiyuki Adachi, Father of Wideband CDMA [1]. [1]
More informationMultiple Antenna Processing for WiMAX
Multiple Antenna Processing for WiMAX Overview Wireless operators face a myriad of obstacles, but fundamental to the performance of any system are the propagation characteristics that restrict delivery
More informationReliable and Efficient RFID Networks
Reliable and Efficient RFID Networks Jue Wang with Haitham Hassanieh, Dina Katabi, Piotr Indyk Machine Generated Data RFID will be a major source of such traffic In Oil & Gas about 30% annual growth rate
More informationWireless Keyboard Without Need For Battery
Technical Disclosure Commons Defensive Publications Series April 29, 2015 Wireless Keyboard Without Need For Battery Vijay Asrani James Tanner Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More informationPareto Optimization for Uplink NOMA Power Control
Pareto Optimization for Uplink NOMA Power Control Eren Balevi, Member, IEEE, and Richard D. Gitlin, Life Fellow, IEEE Department of Electrical Engineering, University of South Florida Tampa, Florida 33620,
More informationRFID/NFC TECHNOLOGY. With emphasis on physical layer. Ali Zaher Oslo
RFID/NFC TECHNOLOGY With emphasis on physical layer Ali Zaher Oslo 28.09.2012 CONTENTS List of abbreviations. RFID Definition. RFID Coupling. NFC. RFID Physical Model. NFC Physical Model. My work. 2 LIST
More informationInterference management Within 3GPP LTE advanced
Interference management Within 3GPP LTE advanced Konstantinos Dimou, PhD Senior Research Engineer, Wireless Access Networks, Ericsson research konstantinos.dimou@ericsson.com 2013-02-20 Outline Introduction
More informationRFID - a basic introduction
RFID - a basic introduction Sophie Bruce Supervisor: Jerzy Dabrowski May 10, 2016 Contents 1 Introduction 1 2 What is RFID? 2 2.1 Transponders................................. 2 2.1.1 Physical principles
More informationAd hoc and Sensor Networks Chapter 4: Physical layer. Holger Karl
Ad hoc and Sensor Networks Chapter 4: Physical layer Holger Karl Goals of this chapter Get an understanding of the peculiarities of wireless communication Wireless channel as abstraction of these properties
More informationM2M massive wireless access: challenges, research issues, and ways forward
M2M massive wireless access: challenges, research issues, and ways forward Petar Popovski Aalborg University Andrea Zanella, Michele Zorzi André D. F. Santos Uni Padova Alcatel Lucent Nuno Pratas, Cedomir
More informationPerformance review of Pico base station in Indoor Environments
Aalto University School of Electrical Engineering Performance review of Pico base station in Indoor Environments Inam Ullah, Edward Mutafungwa, Professor Jyri Hämäläinen Outline Motivation Simulator Development
More informationFeasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks
Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks He Ba, Ilker Demirkol, and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester
More informationMIMO in 4G Wireless. Presenter: Iqbal Singh Josan, P.E., PMP Director & Consulting Engineer USPurtek LLC
MIMO in 4G Wireless Presenter: Iqbal Singh Josan, P.E., PMP Director & Consulting Engineer USPurtek LLC About the presenter: Iqbal is the founder of training and consulting firm USPurtek LLC, which specializes
More informationContactless snooping: Assessing the real threats
Thomas P. Diakos 1 Johann A. Briffa 1 Tim W. C. Brown 2 Stephan Wesemeyer 1 1 Department of Computing,, Guildford 2 Centre for Communication Systems Research,, Guildford Tomorrow s Transactions forum,
More informationRFID at mm-waves Michael E. Gadringer
RFID at mm-waves Michael E. Gadringer, Philipp F. Freidl, Wolfgang Bösch Institute of Microwave and Photonic Engineering Graz University of Technology www.tugraz.at 2 Agenda Introduction Into mm-wave RFID
More informationBackscatter and Ambient Communication. Yifei Liu
Backscatter and Ambient Communication Yifei Liu Outline 1. Introduction 2. Ambient Backscatter 3. WiFi Backscatter 4. Passive WiFi Backscatter Outline 1. Introduction 2. Ambient Backscatter 3. WiFi Backscatter
More informationBasics of RFID technology Thomas Holtstiege Technical Manager EECC. October 2009
Basics of RFID technology Thomas Holtstiege Technical Manager EECC October 2009 About the European EPC Competence Center (EECC) First European EPCglobal accredited performance test center Active since
More informationBuilding versatile network upon new waveforms
Security Level: Building versatile network upon new waveforms Chan Zhou, Malte Schellmann, Egon Schulz, Alexandros Kaloxylos Huawei Technologies Duesseldorf GmbH 5G networks: A complex ecosystem 5G service
More informationNEAR FIELD COMMUNICATION (NFC) A TECHNICAL OVERVIEW
UNIVERSITY OF VAASA FACULTY OF TECHNOLOGY TELECOMMUNICATION ENGINEERING Naser Hossein Motlagh NEAR FIELD COMMUNICATION (NFC) A TECHNICAL OVERVIEW Master s thesis for the degree of Master of Science in
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication
More informationInstantaneous Inventory. Gain ICs
Instantaneous Inventory Gain ICs INSTANTANEOUS WIRELESS Perhaps the most succinct figure of merit for summation of all efficiencies in wireless transmission is the ratio of carrier frequency to bitrate,
More informationCourse Project. Project team forming deadline has passed Project teams will be announced soon Next step: project proposal presentation
Course Project Project team forming deadline has passed Project teams will be announced soon Next step: project proposal presentation Presentation slides and one-page proposal document are due on Jan 30
More informationTag Localization in Passive UHF RFID
Tag Localization in Passive UHF RFID Daniel Arnitz, Ulrich Muehlmann, Klaus Witrisal Graz University of Technology, Austria NXP Semiconductors, Austria This work has been funded by NXP Semiconductors and
More informationDesign of UHF RFID Emulators with Applications to RFID Testing and Data Transport
Design of UHF RFID Emulators with Applications to RFID Testing and Data Transport Rich Redemske MIT AutoID Lab Cambridge, MA, USA redemske@mit.edu Rich Fletcher TagSense, Inc. Cambridge, MA, USA rf@tagsense.com
More informationWireless Powered Communication Networks: An Overview
Wireless Powered Communication Networks: An Overview Rui Zhang (e-mail: elezhang@nus.edu.sg) ECE Department, National University of Singapore (NUS) WCNC Doha, April 3 2016 Introduction Wireless Communication
More informationDATE: 17/08/2006 Issue No 2 e-plate Operation Overview
Page 1 of 7 Fundamentals Introduction e-pate technology is the next generation of long range RFID (Radio Frequency IDentification). The objective is wireless and automated data collection of vehicles and
More informationBeamforming on mobile devices: A first study
Beamforming on mobile devices: A first study Hang Yu, Lin Zhong, Ashutosh Sabharwal, David Kao http://www.recg.org Two invariants for wireless Spectrum is scarce Hardware is cheap and getting cheaper 2
More informationChapter 2 Overview. Duplexing, Multiple Access - 1 -
Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3
More informationThe sensitivity test of 2.45GHz RFID active tag
Journal of Physics: Conference Series PAPER OPEN ACCESS The sensitivity test of 2.45GHz RFID active tag To cite this article: Xiaoli Shi et al 208 J. Phys.: Conf. Ser. 087 052034 View the article online
More informationAnalysis and Simulation of UHF RFID System
ICSP006 Proceedings Analysis and Simulation of UHF RFID System Jin Li, Cheng Tao Modern Telecommunication Institute, Beijing Jiaotong University, Beijing 00044, P. R. China Email: lijin3@63.com Abstract
More informationECS455: Chapter 4 Multiple Access
ECS455: Chapter 4 Multiple Access Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 1 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Tuesday 13:30-14:30 Thursday 13:30-14:30 ECS455: Chapter 4 Multiple
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECF.2011.
Vatsikas, S., Armour, SMD., De Vos, M., & Lewis, T. (2011). A fast and fair algorithm for distributed subcarrier allocation using coalitions and the Nash bargaining solution. In IEEE Vehicular Technology
More informationLesson Title: Electromagnetics and Antenna Overview
Page 1 of 5 Lesson Title: Electromagnetics and Antenna Overview 6/26/09 Copyright 2008, 2009 by Dale R. Thompson {d.r.thompson@ieee.org} Rationale Why is this lesson important? Why does the student need
More informationA Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure
2013 IEEE Wireless Communications and Networking Conference (WCNC): PHY A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure Yejun He and Bing Zhao Shenzhen Key Lab of Advanced
More informationPanda: Neighbor Discovery on a Power Harvesting Budget. Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman
Panda: Neighbor Discovery on a Power Harvesting Budget Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman The Internet of Tags Small energetically self-reliant tags Enabling technologies
More informationPseudo-random Aloha for Enhanced. Collision-recovery in RFID
Pseudo-random Aloha for Enhanced 1 Collision-recovery in RFID Fabio Ricciato, Paolo Castiglione Università del Salento, Lecce, Italy Telecommunications Research Center Vienna (FTW), Vienna, Austria arxiv:1209.4763v1
More informationRADIO FREQUENCY ENERGY HAVRESTING 4TH YEAR PROJECT
RADIO FREQUENCY ENERGY HAVRESTING 4TH YEAR PROJECT CUESEF Funding Request CARLETON UNIVERSITY February 7, 2014 Table of Contents Abstract... 2 Group Introduction... 3 Faculty Contact... 3 Overview of Project...
More informationCollision Avoidance in a Dense RFID Network
Collision Avoidance in a Dense RFID Network Shweta Jain Computer Science Department Stony Brook University Stony Brook, NY shweta@cs.sunysb.edu Samir R. Das Computer Science Department Stony Brook University
More informationPhysics of RFID. Pawel Waszczur McMaster RFID Applications Lab McMaster University
1 Physics of RFID Pawel Waszczur McMaster RFID Applications Lab McMaster University 2 Agenda Radio Waves Active vs. Passive Near field vs. Far field Behavior of UHF fields Modulation & Signal Coding 3
More informationLong Range and Low Powered RFID Tags with Tunnel Diode
Long Range and Low Powered RFID Tags with Tunnel Diode Francesco Amato, Christopher W. Peterson, Muhammad B. Akbar and Gregory D. Durgin School of Electrical and Computer Engineering Georgia Institute
More informationRFID Integrated Teacher Monitoring
RFID Integrated Teacher Monitoring Introduction Article by Adewopo Adeniyi M.Sc, Texila American University, Nigeria Email: preciousadewopon@yahoo.com Radio Frequency Identification (RFID) is a generic
More informationUser Guide for the Calculators Version 0.9
User Guide for the Calculators Version 0.9 Last Update: Nov 2 nd 2008 By: Shahin Farahani Copyright 2008, Shahin Farahani. All rights reserved. You may download a copy of this calculator for your personal
More informationRFID sensor systems embedded in concrete systematical investigation of the transmission characteristics
RFID sensor systems embedded in concrete systematical investigation of the transmission characteristics More info about this article: http://www.ndt.net/?id=19850 M. Bartholmai, S. Johann, M. Kammermeier,
More informationOptimizing Multi-Cell Massive MIMO for Spectral Efficiency
Optimizing Multi-Cell Massive MIMO for Spectral Efficiency How Many Users Should Be Scheduled? Emil Björnson 1, Erik G. Larsson 1, Mérouane Debbah 2 1 Linköping University, Linköping, Sweden 2 Supélec,
More informationModulated Backscattering Coverage in Wireless Passive Sensor Networks
Modulated Backscattering Coverage in Wireless Passive Sensor Networks Anusha Chitneni 1, Karunakar Pothuganti 1 Department of Electronics and Communication Engineering, Sree Indhu College of Engineering
More informationCHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions
CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions This dissertation reported results of an investigation into the performance of antenna arrays that can be mounted on handheld radios. Handheld arrays
More informationSecuring Deployed RFIDs by Randomizing the Modulation and the Channel Jue Wang, Haitham Hassanieh, Dina Katabi, and Tadayoshi Kohno
Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-23- January 2, 23 Securing Deployed RFIDs by Randomizing the Modulation and the Channel Jue Wang, Haitham Hassanieh,
More informationSchool of Electrical Engineering and Telecommunications
School of Electrical Engineering and Telecommunications SECURED COMMUNICATION IN SWIPT NETWORKS Surabattuni Ramakrishna Supervisor: Dr Derrick Wing Kwan Ng A Thesis Submitted to University of New South
More informationFictitious Play applied on a simplified poker game
Fictitious Play applied on a simplified poker game Ioannis Papadopoulos June 26, 2015 Abstract This paper investigates the application of fictitious play on a simplified 2-player poker game with the goal
More informationEnergy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error
Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error Abhishek Thakur 1 1Student, Dept. of Electronics & Communication Engineering, IIIT Manipur ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationMIMO-aware Cooperative Cognitive Radio Networks. Hang Liu
MIMO-aware Cooperative Cognitive Radio Networks Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact [2] Motivation & Relevance
More informationUnit 3 - Wireless Propagation and Cellular Concepts
X Courses» Introduction to Wireless and Cellular Communications Unit 3 - Wireless Propagation and Cellular Concepts Course outline How to access the portal Assignment 2. Overview of Cellular Evolution
More informationLiving with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington
Living with Interference in Unmanaged Wireless Environments David Wetherall, Daniel Halperin and Tom Anderson Intel Research & University of Washington This talk 1. The problem: inefficient spectrum scheduling
More informationBeamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks
1 Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks UWB Walter project Workshop, ETSI October 6th 2009, Sophia Antipolis A. Hayar EURÉCOM Institute, Mobile
More informationRFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014
RFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014 Un. of Rome La Sapienza Chiara Petrioli, Gaia Maselli Department of Computer Science University of Rome Sapienza Italy RFID Technology Ø RFID
More informationMOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification
MOBILE COMPUTING CSE 40814/60814 Spring 2017 What is RFID? Radio Frequency IDentification Who Are You? I am Product X RFID ADC (automated data collection) technology that uses radio-frequency waves to
More informationProject: IEEE P Working Group for Wireless Personal Area Networks N. WPANs) (WPANs( January doc.: IEEE 802.
Slide Project: IEEE P82.5 Working Group for Wireless Personal Area Networks N (WPANs( WPANs) Title: [Impulsive Direct-Sequence UWB Wireless Networks with Node Cooperation Relaying ] Date Submitted: [January,
More informationWiMAX Basestation: Software Reuse Using a Resource Pool. Arnon Friedmann SW Product Manager
WiMAX Basestation: Software Reuse Using a Resource Pool Cory Modlin Wireless Systems Architect cmodlin@ti.com L. N. Reddy Wireless Software Manager lnreddy@tataelxsi.co.in Arnon Friedmann SW Product Manager
More informationApplication Note: IQ Filtering in an RFID Reader Using Anadigm Integrated circuits,
Application Note: IQ Filtering in an RFID Reader Using Anadigm Integrated circuits, Rev: 1.0.3 Date: 3 rd April 2006 We call this multi-chip circuit solution RangeMaster3, It uses Anadigm s. RangeMaster2
More informationAntenna efficiency calculations for electrically small, RFID antennas
Antenna efficiency calculations for electrically small, RFID antennas Author Mohammadzadeh Galehdar, Amir, Thiel, David, O'Keefe, Steven Published 2007 Journal Title IEEE Antenna and Wireless Propagation
More informationDetection Performance of Spread Spectrum Signatures for Passive, Chipless RFID
Detection Performance of Spread Spectrum Signatures for Passive, Chipless RFID Ryan Measel, Christopher S. Lester, Yifei Xu, Richard Primerano, and Moshe Kam Department of Electrical and Computer Engineering
More informationBecker Mining Systems
Becker Mining Systems Tagging and Tracking in Underground Mining BECKERTAG System Principle FUNCTIONAL FEATURES Vehicle, Beacon, Personnel Tags Pseudo Random Transmission Unique ID Number Battery Status
More informationFiber Distributed Data Interface
Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses
More informationLecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications
COMM 907: Spread Spectrum Communications Lecture 10 - LTE (4G) -Technologies used in 4G and 5G The Need for LTE Long Term Evolution (LTE) With the growth of mobile data and mobile users, it becomes essential
More informationMIMO Systems and Applications
MIMO Systems and Applications Mário Marques da Silva marques.silva@ieee.org 1 Outline Introduction System Characterization for MIMO types Space-Time Block Coding (open loop) Selective Transmit Diversity
More informationLTE-A Carrier Aggregation Enhancements in Release 11
LTE-A Carrier Aggregation Enhancements in Release 11 Eiko Seidel, Chief Technical Officer NOMOR Research GmbH, Munich, Germany August, 2012 Summary LTE-Advanced standardisation in Release 10 was completed
More informationEFFICIENT BIT ENCODING IN BACKSCATTER WIRELESS SYSTEMS
EFFICIENT BIT ENCODING IN BACKSCATTER WIRELESS SYSTEMS A Thesis Presented to the Academic Faculty By Patrick A. Graf In Partial Fulfillment Of the Requirements for the Degree Master of Science in Electrical
More informationA Remote-Powered RFID Tag with 10Mb/s UWB Uplink and -18.5dBm-Sensitivity UHF Downlink in 0.18μm CMOS
A Remote-Powered RFID Tag with 10Mb/s UWB Uplink and -18.5dBm-Sensitivity UHF Downlink in 0.18μm CMOS Majid Baghaei-Nejad 1, David S. Mendoza 1, Zhuo Zou 1, Soheil Radiom 2, Georges Gielen 2, Li-Rong Zheng
More informationDesigning Energy Efficient 5G Networks: When Massive Meets Small
Designing Energy Efficient 5G Networks: When Massive Meets Small Associate Professor Emil Björnson Department of Electrical Engineering (ISY) Linköping University Sweden Dr. Emil Björnson Associate professor
More informationCROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS
CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties
More informationRFID-ECE4803 Lecture 2. Prof. Manos M. Tentzeris
RFID-ECE4803 Lecture 2 Prof. Manos M. Tentzeris (etentze@ece.gatech.edu) Data Rate bit/sec 1G 100M 10M 1M Communication by Applications 802.15.3c mm-wave 802.15.3 UWB WPAN 802.15.1 Bluetooth 802.15.4 ZigBee
More informationUltra Wideband Radio Propagation Measurement, Characterization and Modeling
Ultra Wideband Radio Propagation Measurement, Characterization and Modeling Rachid Saadane rachid.saadane@gmail.com GSCM LRIT April 14, 2007 achid Saadane rachid.saadane@gmail.com ( GSCM Ultra Wideband
More informationHybrid RFID-Based System Using Active Two- Way Tags
San Jose State University SJSU ScholarWorks Master's Theses Master's Theses and Graduate Research Fall 2010 Hybrid RFID-Based System Using Active Two- Way Tags Girish N. Jadhav San Jose State University
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationH. Kimouche * and H. Zemmour Microwaves and Radar Laboratory, Ecole Militaire Polytechnique, Bordj El Bahri, Algeria
Progress In Electromagnetics Research Letters, Vol. 26, 105 114, 2011 A COMPACT FRACTAL DIPOLE ANTENNA FOR 915 MHz AND 2.4 GHz RFID TAG APPLICATIONS H. Kimouche * and H. Zemmour Microwaves and Radar Laboratory,
More informationOn Practical Selective Jamming of Bluetooth Low Energy Advertising
On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,
More informationNFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags
NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags previously known as Kovio NFC Barcode Functional Specification Product Features Passive 13.56MHz 128- or 256-bit Read-Only Memory (ROM) 106 Kb/s Data
More informationSystem Performance of Cooperative Massive MIMO Downlink 5G Cellular Systems
IEEE WAMICON 2016 April 11-13, 2016 Clearwater Beach, FL System Performance of Massive MIMO Downlink 5G Cellular Systems Chao He and Richard D. Gitlin Department of Electrical Engineering University of
More informationRFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode
International Journal of Networking and Computing www.ijnc.org ISSN 2185-2839 (print) ISSN 2185-2847 (online) Volume 4, Number 2, pages 355 368, July 2014 RFID Multi-hop Relay Algorithms with Active Relay
More informationFinal Report for AOARD Grant FA Indoor Localization and Positioning through Signal of Opportunities. Date: 14 th June 2013
Final Report for AOARD Grant FA2386-11-1-4117 Indoor Localization and Positioning through Signal of Opportunities Date: 14 th June 2013 Name of Principal Investigators (PI and Co-PIs): Dr Law Choi Look
More informationFinal Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou
Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Radio Frequency IDentification Frequency Distance LF 125khz Few cm HF 13.56Mhz 1m Example Application Auto- Immobilizer
More informationHedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,
More informationRFID. Contents and form. Petr Bureš, Faculty of transportation sciences Czech technical university in Prague
RFID Contents and form Petr Bureš, bures@fd.cvut.cz Faculty of transportation sciences Czech technical university in Prague RFID considerations Critical performance variables in an RFID system are the
More informationOpportunistic Communication in Wireless Networks
Opportunistic Communication in Wireless Networks David Tse Department of EECS, U.C. Berkeley October 10, 2001 Networking, Communications and DSP Seminar Communication over Wireless Channels Fundamental
More informationResource Allocation Challenges in Future Wireless Networks
Resource Allocation Challenges in Future Wireless Networks Mohamad Assaad Dept of Telecommunications, Supelec - France Mar. 2014 Outline 1 General Introduction 2 Fully Decentralized Allocation 3 Future
More informationDesign Criteria for the RF Section of UHF and Microwave Passive RFID Transponders
Università di Pisa Design Criteria for the RF Section of UHF and Microwave Passive RFID Transponders #$%&'((')*')+$,-) $';)1('E%,(.#8'#+,F%F,%1')#8%GGH+,I.1E)J'.,%K#/G%((1.,'-)*#+,I.1E)('-)*#0%G%-.E:,'-)J'.,'*#
More informationPassive Sensors Technical Guide
Application Note Version 1.0 10/17/2016 This document is a technical user guide to the working principles and usage of Smartrac passive sensor products using RF Micron Magnus S2 and S3 ICs. 1. INTRODUCTION...
More information2015 The MathWorks, Inc. 1
2015 The MathWorks, Inc. 1 What s Behind 5G Wireless Communications? 서기환과장 2015 The MathWorks, Inc. 2 Agenda 5G goals and requirements Modeling and simulating key 5G technologies Release 15: Enhanced Mobile
More informationElectromagnetic Modelling of UHF RFID Tags*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 8, No. 1, February 2011, 1-7 UDK: 621.396.029:537.531 Electromagnetic Modelling of UHF RFID Tags* Nemanja Milošević 1, Branko Kolundžija 1 Abstract: Paper
More informationA Wireless Communication System using Multicasting with an Acknowledgement Mark
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 10 (October. 2017), V2 PP 01-06 www.iosrjen.org A Wireless Communication System using Multicasting with an
More informationJoint Rate and Power Control Using Game Theory
This full text paper was peer reviewed at the direction of IEEE Communications Society subect matter experts for publication in the IEEE CCNC 2006 proceedings Joint Rate and Power Control Using Game Theory
More informationExam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2010 Lecture 19 Today: (1) Diversity Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.
More informationFull-duplex Wireless: From Experiments to Theory
Full-duplex Wireless: From Experiments to Theory Achaleshwar Sahai, Melissa Duarte #, Evan Everett, Jingwen Bai, Gaurav Patel, Chris Dick* and Ashu Sabharwal Department of ECE Rice University # Now at
More informationChapter 1: Telecommunication Fundamentals
Chapter 1: Telecommunication Fundamentals Block Diagram of a communication system Noise n(t) m(t) Information (base-band signal) Signal Processing Carrier Circuits s(t) Transmission Medium r(t) Signal
More informationEavesdropping Near Field Contactless Payments: A Quantitative Analysis
Eavesdropping Near Field Contactless Payments: A Quantitative Analysis Thomas P. Diakos 1 Johann A. Bri a 1 Tim W. C. Brown 2 Stephan Wesemeyer 1 1 Department of Computing,, Guildford 2 Centre for Communication
More informationSPREAD SPECTRUM COMMUNICATIONS. historical and technical overview. Bryan Bergeron, NUlN 27 Stearns Road, Suite 8 Brookline. Massachusetts
Bryan Bergeron, NUlN 27 Stearns Road, Suite 8 Brookline. Massachusetts 02 146 SPREAD SPECTRUM COMMUNICATIONS historical and technical overview A s we all know, the RF spectrum is a finite and exceedingly
More information