You are here
Search results
(1 - 6 of 6)
- Title
- An energy efficient link-layer security protocol for wireless sensor networks
- Creator
- Lightfoot, Leonard E.
- Date
- 2006
- Collection
- Electronic Theses & Dissertations
- Title
- Providing source privacy in wireless sensor networks
- Creator
- Li, Yun
- Date
- 2010
- Collection
- Electronic Theses & Dissertations
- Title
- Secure communication system design for wireless networks
- Creator
- Ling, Qi
- Date
- 2007
- Collection
- Electronic Theses & Dissertations
- Title
- Secure and private service discovery in pervasive computing environments
- Creator
- Zhu, Feng
- Date
- 2006
- Collection
- Electronic Theses & Dissertations
- Title
- Exploiting cross-technology interference for efficient network services in wireless systems
- Creator
- Zhou, Ruogu
- Date
- 2014
- Collection
- Electronic Theses & Dissertations
- Description
-
In the last decade, we have witnessed the wide adoption of a variety of wireless technologies like WiFi, Cellular, Bluetooth, ZigBee, and Near-field Communication(NFC). However, the fast growth of wireless networks generates significant cross-technology interference, which leads to network performance degradation and potential security breach. In this dissertation, we propose two novel physical layer techniques to deal with the interference, and improve the performance and security of sensor...
Show moreIn the last decade, we have witnessed the wide adoption of a variety of wireless technologies like WiFi, Cellular, Bluetooth, ZigBee, and Near-field Communication(NFC). However, the fast growth of wireless networks generates significant cross-technology interference, which leads to network performance degradation and potential security breach. In this dissertation, we propose two novel physical layer techniques to deal with the interference, and improve the performance and security of sensor networks and mobile systems, respectively. First, we exploit the WiFi interference as a ``blessing" in the design of sensor networks and develop novel WiFi interference detection techniques for ZigBee sensors. Second, utilizing these techniques, we design three efficient network services: WiFi discovery which detects the existence of nearby WiFi networks using ZigBee sensors, WiFi performance monitoring which measures and tracks performance of WiFi networks using a ZigBee sensor network, and time synchronization which provides synchronized clocks for sensor networks based on WiFi signals. Third, we design a novel, noninvasive NFC security system called {\em nShield} to reduce the transmission power of NFC radios, which protects NFC against passive eavesdropping. nShield implements a novel adaptive RF attenuation scheme, in which the extra RF energy of NFC transmissions is determined and absorbed by nShield. At the same time, nShield scavenges the extra RF energy to sustain the perpetual operation. Together with the extremely lo-power design, it enables nShield to provide the host uninterrupted protection against malicious eavesdropping. The above systems are implemented and extensively evaluated on a testbed of sensor networks and smartphones.
Show less
- Title
- Spectrally efficient anti-jamming system design in wireless networks
- Creator
- Zhang, Lei
- Date
- 2011
- Collection
- Electronic Theses & Dissertations
- Description
-
In wireless networks, one of the most commonly used techniques for limiting the effectiveness of an opponent's communication is referred to as jamming, in which the legitimate user's signal is deliberately interfered by the adversary. Along with the wide spread of various wireless devices, especially with the advent of user reconfigurable intelligent devices, jamming attack is no longer limited to military applications, but has become an urgent and serious threat to civilian communications as...
Show moreIn wireless networks, one of the most commonly used techniques for limiting the effectiveness of an opponent's communication is referred to as jamming, in which the legitimate user's signal is deliberately interfered by the adversary. Along with the wide spread of various wireless devices, especially with the advent of user reconfigurable intelligent devices, jamming attack is no longer limited to military applications, but has become an urgent and serious threat to civilian communications as well. Motivated by this observation, in this dissertation, we consider hostile jamming modeling, classification, and spectrally efficient anti-jamming system design and analysis.First, we investigate the cognitive jamming modeling and classification in wireless communications. Instead of using existing jamming models that assume the jamming remains invariant during the signal transmission period, we focus on time-varying jamming and its classification based on time-frequency analysis and the relative correlation between the signal and the jamming interference: (i) We introduce the general concepts of time-varying jamming coherence time and time-frequency jamming coherence bandwidth, and propose a new jamming classification scheme based on these parameters; (ii) We introduce the concept of disguised jamming, where the jamming is highly correlated with the signal, and has a power level close or equal to the signal power; (iii) Based on time-frequency analysis and approximation theory, we propose algorithms to estimate the time-varying coherence time and the time-frequency coherence bandwidth for both stationary and locally stationary jamming.Next, we break new ground on anti-jamming system design in wireless networks based on message-driven frequency hopping (MDFH). MDFH is a highly efficient spread spectrum technique that is particularly robust under strong jamming. However, it experiences considerable performance losses under disguised jamming. To overcome this drawback, we propose an anti-jamming MDFH (AJ-MDFH) system. The main idea is to transmit a secure ID sequence along with the information stream. The ID sequence is generated through a cryptographic algorithm using the shared secret between the transmitter and receiver, it is then exploited by the receiver for signal extraction. It is shown that AJ-MDFH can effectively reduce the performance degradation caused by disguised jamming while remains robust under strong jamming. We investigate ID constellation design and its impact on the performance of AJ-MDFH under both noise jamming and disguised jamming. In addition, we extend AJ-MDFH to a multi-carrier scheme, which can increase the system efficiency and jamming resistance significantly through jamming randomization and frequency diversity, and can readily be used as a collision-free multiple access system. Our analysis indicates that: while AJ-MDFH has strong anti-jamming property, its spectral efficiency is very close to that of MDFH, which is several times higher than that of the conventional FH.Finally, we analyze the capacity of MDFH and AJ-MDFH under disguised jamming using the arbitrarily varying channel (AVC) model. We show that under the worst case disguised jamming, as long as the secure ID sequence is unavailable to jammer (which is ensured by AES), the AVC corresponding to AJ-MDFH is nonsymmetrizable. This implies that the deterministic code capacity of AJ-MDFH with respect to the average probability of error is positive. On the other hand, due to lack of shared randomness, the AVC corresponding to MDFH is symmetric, resulting in zero deterministic code capacity. We further calculate the capacity of AJ-MDFH and show that it converges as the ID constellation size goes to infinity, which echoes with convergence result for the probability of error of AJ-MDFH. We also extend the capacity analysis to multiuser AJ-MDFH system (MC-AJ-MDFH) and show that it outperforms the multiple access scheme for conventional FH (FHMA).Future research will be conducted on adaptive transceiver design under cognitive jamming scenario.
Show less