DMCA
Ph.D. Dissertation Robust Wireless Communication for Multi-Antenna, Multi-Rate, Multi-Carrier Systems (2015)
Citations
1869 | Performance analysis of the IEEE 802.11 distributed coordination function
- Bianchi
- 2000
(Show Context)
Citation Context ...icant amount of research, devoted to their modeling, analysis and evaluation. Early work modeled 802.11 MAC layer using Markov chains and developed an analytical formulation for saturation throughput =-=[10]-=-. Despite the CHAPTER 4. SWIFI: WI-FI NETWORK ANALYSIS WITH SDR 87 elegant formulation and analytical power, these results were limited to a simple interference model that assumes that all nodes are w... |
210 | Bit-rate Selection in Wireless Networks,
- Bicket
- 2005
(Show Context)
Citation Context ...ated. Rate Adaptation Algorithms (RAA) adjust the physical layer transmission rate to the channel characteristics; ideally selecting a low rate MCS for a low SNR channel and a high rates for high SNR =-=[11, 51, 58, 61, 68, 71, 79, 117, 120]-=-. To illustrate the criticality of hiding the communication rate, we first provide some insights into rate adaptation attacks. The key idea in the highly efficient RAA-attack is to force a device to u... |
117 | New Proofs for NMAC and HMAC Security without Collision-Resistance.
- Bellare
- 2006
(Show Context)
Citation Context ... the interleaving functions are generated using a key-hashed pseudorandom function h with secret key K applied on the packet number s and block index i, the coefficients A and B are indistinguishable =-=[7]-=-, thus the interleaved symbol sequences are also indistinguishable.The header is also semantically secure due to the use of random R with AES encryption. CHAPTER 3. CBM – CONCEALING RATE INFORMATION A... |
57 | Ciphers with arbitrary finite domains. In
- Black, Rogaway
- 2002
(Show Context)
Citation Context ...a new seed for every block of coded symbols. Alternatively, another FPE approach called prefix cipher can be used, where symbol indices are encrypted and then ranked to produce a new ordered sequence =-=[12]-=-. Nevertheless, this provably-secure solution requires more overhead with m operations required per m-symbol block plus m logm comparisons for ranking. In the following, we will describe our solution,... |
54 | A jamming-resistant MAC protocol for single-hop wireless networks.
- Awerbuch, Richa, et al.
- 2008
(Show Context)
Citation Context ...loped at the physical layer [104] include directional antennas [60], spread spectrum communication, and power, modulation, and coding control. More recently, research has also addressed higher layers =-=[4, 9, 25, 29, 41, 56, 59, 66, 67, 86, 105, 107, 108, 119, 122, 123]-=-. However, given the ease of building high power jamming devices, there is still a strong need for efficient and flexible techniques operating at the physical layer. There is a demand for low-cost sol... |
49 | Adversarial contention resolution for simple channels.
- Bender, Farach-Colton, et al.
- 2005
(Show Context)
Citation Context ...loped at the physical layer [104] include directional antennas [60], spread spectrum communication, and power, modulation, and coding control. More recently, research has also addressed higher layers =-=[4, 9, 25, 29, 41, 56, 59, 66, 67, 86, 105, 107, 108, 119, 122, 123]-=-. However, given the ease of building high power jamming devices, there is still a strong need for efficient and flexible techniques operating at the physical layer. There is a demand for low-cost sol... |
47 |
GNU Radio: Tools for Exploring the Radio Frequency Spectrum
- Blossom
- 2004
(Show Context)
Citation Context ...ain b of the residual signal is considered as a new channel gain of the signal after removing the jamming signal. Therefore, the data can be decoded by the decoder with well-known decoding techniques =-=[16, 88]-=- in software-defined radio. Consequently, estimation of b is not required. 2.4.3 Practical Issues In practice, we need to address the issue of frequency offset between the received signals which are u... |
5 |
Channel tracking for fast time-varying channels in ieee802.11p systems
- Bourdoux, Cappelle, et al.
- 2011
(Show Context)
Citation Context ...ation accuracy because a channel distortion on training and pilot sequences results in a critical impact on the data subcarrier channel recoverability. The principle of Decision Directed equalization =-=[17, 92]-=- is to use the statistical characteristics of data subcarriers to estimate the channel. In particular, each subcarrier is decoded according to the known modulation of the current OFDM symbol, and the ... |
5 |
Phased arrays and radars – past, present and future.
- Brookner
- 2006
(Show Context)
Citation Context ...signal identification and channel estimation. The closest related work to our approach consists of phased array antennas and MIMO systems. Phased array antennas were very well studied since the 1950s =-=[18, 19, 60, 111]-=-. Likewise, MIMO systems were also very well studied since the mid 90s [112]. Our design and approach have unique characteristics that distinguishes them from prior work. Similar performance phased ar... |
3 |
Your WiFi is leaking: Inferring user behaviour, encryption irrelevant.
- Atkinson, Adetoye, et al.
- 2013
(Show Context)
Citation Context ... devise explicit codes with higher coding gain than traditional codes conforming to uniformity. By Cryptographic Interleaving, CBM also helps mitigating passive attacks against users traffic analysis =-=[3]-=-. Our simulation results show that in most cases this modulation hiding scheme has the side effect of boosting resiliency by up to seven times in comparison to regular rate-exposing systems. However, ... |
3 |
An IEEE 802.11a/g/p OFDM Receiver for GNU Radio
- Bloessl, Segata, et al.
- 2013
(Show Context)
Citation Context ...ignals to 4MHz) [6], several efforts have been made to enable Wi-Fi communications on low-cost SDR platforms such as the Utah University FPGA-assisted implementation [34], or the more recent attempts =-=[14, 15]-=-. However, to the best of our knowledge none of these platforms exceeds QPSK modulation in terms of design and have very limited performance even for these low rates. A unique characteristic of higher... |
2 |
Decoding IEEE 802.11a/g/p OFDM in Software using GNU Radio
- Bloessl, Segata, et al.
- 2013
(Show Context)
Citation Context ...ignals to 4MHz) [6], several efforts have been made to enable Wi-Fi communications on low-cost SDR platforms such as the Utah University FPGA-assisted implementation [34], or the more recent attempts =-=[14, 15]-=-. However, to the best of our knowledge none of these platforms exceeds QPSK modulation in terms of design and have very limited performance even for these low rates. A unique characteristic of higher... |
2 |
Phased-array radar: Past, astounding breakthroughs, and future trends.
- Brookner
- 2008
(Show Context)
Citation Context ... a $50 microwave oven’s magnetron that can generate a 1KWatt interfering signal (covering hundreds of meters) and can be tuned to a wide range of frequencies by slightly modifying its resonant cavity =-=[19, 83]-=-. In contrast, the communication nodes’ regulated power is usually limited to 100mW. This type of jamming can completely block the ongoing transmission between communication nodes. CHAPTER 1. INTRODUC... |
1 |
Srdjan Capkun. Enabling short fragments for uncoordinated spread spectrum communication
- Ahmed, Pöpper
- 2014
(Show Context)
Citation Context ...tion of choice for anti-jamming, it suffers from a need for preshared secrets between the communicating nodes. Several solutions were recently proposed for alleviating the need for pre-shared secrets =-=[2, 22, 41, 56, 65, 67, 107, 108]-=-. However, they are not designed to tackle powerful jammers (meaning jammer with power 4-5 orders of magnitude higher than the transmitting node). Other recent work has demonstrated mechanisms for can... |
1 | A GNURadio Based Receiver Toolkit for IEEE 802.11a/g/p - Bloessl, Segata, et al. - 2013 |
1 |
Michalis Faloutsos, and Vivek P. Mhatre. Measurement-driven guidelines for 802.11 WLAN design
- Broustis, Papagiannaki, et al.
- 2010
(Show Context)
Citation Context ...ed for analyzing Wi-Fi networks in the wild. In parallel, several researchers developed measurement-driven approaches to analyze and experiment with dense Wi-Fi networks in real world setting such as =-=[20]-=-. Measurement-driven approaches to Wi-Fi led to better protocols for frequency/channel auto-configuration, load-balancing, powercontrol, and rate adaptation [73, 102, 121]. However, most of the early ... |
1 |
Leandros Tassiulas. Fiji: Fighting implicit jamming in 802.11 wlans
- Krishnamurthy
(Show Context)
Citation Context ...the comeback to higher rates is slow. Finally, the equiprobability of transmission CHAPTER 1. INTRODUCTION 6 among devices enables the adversary to focus on a single link to degrade the whole network =-=[21]-=-. Previous work [74, 81, 86] demonstrated both analytically and experimentally that knowledge of the rate used in a transmission enables selective jamming of packets resulting in link degradation (e.g... |