WIRELESS SELF-PROTECTIO SYSTEM by Samer Fayssal

Total Page:16

File Type:pdf, Size:1020Kb

WIRELESS SELF-PROTECTIO SYSTEM by Samer Fayssal Wireless Self-Protection System Item Type text; Electronic Dissertation Authors Fayssal, Samer Nabih Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 03/10/2021 00:51:21 Link to Item http://hdl.handle.net/10150/195773 WIRELESS SELF-PROTECTIO SYSTEM By Samer Fayssal ____________________ Copyright © 2008 Samer Fayssal A Dissertation Submitted to the Faculty of the DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIOZNA 2008 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Samer Fayssal entitled “ Wireless Self-Protection System ” and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy __________________________________________________Date: August 22, 2008 Salim Hariri, Ph.D. __________________________________________________ Date: August 22, 2008 Jerzy W. Rozenblit, Ph.D. __________________________________________________ Date: August 22, 2008 Ali Akoglu, Ph.D. Final approval and acceptance of this dissertation is contingent upon the candidate’s submission of the final copies of the dissertation to the Graduate College. I hereby certify that I have read this dissertation prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ________________________________________________ Date: August 22, 2008 Dissertation Director: Salim Hariri, Ph.D. 3 STATEMENT BY AUTHOR This dissertation has been submitted in partial fulfillment of requirements for an advanced degree at the University of Arizona and is deposited in the University Library to be made available to borrowers under rules of the Library. Brief quotations from this dissertation are allowable without special permission, provided that accurate acknowledgment of source is made. Requests for permission for extended quotation from or reproduction of this manuscript in whole or in part may be granted by the head of the major department or the Dean of the Graduate College when in his or her judgment the proposed use of the material is in the interests of scholarship. In all other instances, however, permission must be obtained from the copyright holder. SIGNED: Samer Fayssal 4 ACKOWLEDGEMETS Special thanks to professor Salim Hariri, my advisor and mentor. Professor Hariri taught me that in order of becoming a better learner, I should be humble and open minded. He taught me to be patient, tolerant, and hard working person. I would like to thank my committee members Professor Jerzy Rozenblit, Professor Bernard Zeigler, and Dr. Ali Akuglo for serving in my comprehensive exam and defense committees. I would like to thank my laboratory mates, especially Yousif AlNashif. I would like to thank my parents, my brother and sister for all their support, without them I could never made it that far in my educational journey. 5 TABLE OF COTETS LIST OF FIGURES.......................................................................................................... 10 LIST OF TABLES …........................................................................................................12 ABSTRACT .…………………………………………………………………………… 13 Chapter 1. INTRODUCTION ......................…………………………………………… 15 1.1 Motivation ….……………...…………………………………………………. 15 1.2 Contribution ………………………………………………………………...... 17 1.3 Organization ………………………………………………………………….. 19 Chapter 2 . WIRELESS NETWORK OVERVIEW…………...……………………….. 20 2.1 Wireless protocols ….…………………………………………………........ 20 2.1.1 IEEE 802.11 WLAN Overview ………………………………………... 21 2.1.2 IEEE 802.15 WPAN Overview………………………………………… 22 2.1.3 IEEE 802.16 WMAN Overview ……………………………………….. 25 2.1.4 IEEE 802.20 WWAN Overview ……………………………………….. 27 2.1.5 IEEE 802.22 WRAN Overview ………………………………………... 28 2.1.6 Future Networks ………………………………………………………... 28 2.2 IEEE 802.11 Wireless Local Area Networks Review ……………………….. 29 2.2.1 History and Characteristics …………………………………………….. 29 2.2.2 IEEE 802.11 PHY and MAC layers Overview …………………….. 32 2.2.2.1 MAC characteristics and security analysis …………………….. 32 6 TABLE OF COTETS – COTIUED 2.2.2.2 802.11 Physical Layer ……………………………………………….. 41 2.3 Cryptographic Methods for wireless networks ………………………………. 44 2.3.1 Introduction to Cryptography and Cryptanalysis ……...……………... 45 2.3.2 History and Classification of Cryptography Ciphers ………………… 46 2.3.2.1 Symmetric Ciphers ……………………………………….. 46 2.3.2.2 Asymmetric Ciphers ……………………………………... 49 2.3.3 Cryptographic Methods used in IEEE 802.11 ………...……………... 49 2.4 Conclusion of Chapter 2 …………………………………………………… 52 Chapter 3. REVIEW OF WIRELESS ATTACKS AND SECURITY METHODS….... 53 3.1 Review of Wireless Network Attacks ……………………………………... 53 3.1.1 Attacks on wireless Personal Area Networks ………..………… 53 3.1.2 Attacks on wireless Local Area Networks …………….……….. 55 3.1.3 Attacks on wireless Metropolitan Area Networks ……………... 60 3.2 Existing Wireless Security Techniques …………………………………… 60 3.3 Conclusion of Chapter 3 …………………………………………………... 63 Chapter 4. TAXONOMY OF WLAN ATTACKS ………...…………………………... 64 4.1 Complexity ………………………………………………………………... 65 4.2 Source Validity …………………………………………………………… 66 4.3 Activity …………………………………………………………………… 67 4.4 Purpose ……………………………………………………………………. 68 7 TABLE OF COTETS – COTIUED 4.5 Vulnerability ……………………………………………………………… 70 4.6 Medium …………………………………………………………………… 72 4.7 Characterization …………………………………………………………... 72 4.8 Victim …………………………………………………………………….. 73 4.9 Analysis of Attack behaviors …………………………………………….. 74 4.10 Conclusion of Chapter 4 ………………………………………………….. 75 Chapter 5. WIRELESS SELF-PROTECTION SYSTEM METHODOLOGY…...……. 76 5.1 Flow Monitoring ………………………………………………………….. 77 5.1.1 Cisco NetFlow ………………………………………………… 77 5.1.2 Sflow …………….……………………………………………... 78 5.2 Wireless Network Flow …...……………………………………………… 78 5.2.1 Measurement Attributes ………………………………….…….. 79 5.2.1.1 Signal Information Measurement Attributes ………....... 80 5.2.1.2 Channel Information …………………………………… 83 5.2.1.3 Packet Information ……………………………………... 84 5.3 WNetFlow Methodology …………………………………………………. 85 5.4 Feature Selection ………………………………………………………….. 87 5.5 Temporal Analysis of WNetFlows ………...……………………………... 90 5.6 Anomaly Behavior Analysis …………………………………………….... 92 5.6.1 State Machine Anomaly Analysis …………………………...... 93 8 TABLE OF COTETS – COTIUED 5.6.2 WSPS Training-based Anomaly Behavior Analysis …...……… 93 5.7 Attack Detection and Proactive Actions ………………………………….. 95 5.8 Conclusion of Chapter 5 ………………………………………………….. 96 Chapter 6. WIDS EVALUATION METHODOLOGY ………...……………………… 97 6.1 Review of Evaluation methodologies …………………………………….. 97 6.2 Proposed WIDS Evaluation Methodology …………………………………98 6.2.1 Accuracy ………………………………………………...……... 98 6.2.1.1 False Positive …………………………………………... 98 6.2.1.2 Detection Rate …………………………………………. 99 6.2.1.3 Receiver Operating Characteristic ……………………. 100 6.2.2 Adaptability ……...……………………………………………. 101 6.2.3 Scalability and Overhead …………………………………...… 103 6.2.4 Latency for Dynamic Configuration ………………………….. 104 6.3 Conclusion of Chapter 6 ……………………………………...…………. 104 Chapter 7. EXPERIMENTAL RESULTS ……………………………………………. 105 7.1 Test Bed at ITL The University of Arizona …….……………………….. 105 7.1.1 WSPS Configuration ………………………………………... 105 7.2 Experimental Results …………………………………………………… 108 7.2.1 WSPS Evaluation and Experimental Results ……………….. 109 7.2.1.1 Experimental Results ……………..…………………... 111 9 TABLE OF COTETS – COTIUED 7.2.2 Evaluation Methodology Experimental Results ……………… 122 7.2.2.1 Accuracy ……………………………………………… 122 7.2.2.2 Adaptability …………………………………………… 127 7.2.2.3 Scalability and Overhead ……………………………... 129 Chapter 8. CONCLUSION AND FUTURE WORK ………...……………………….. 132 8.1 Dissertation summary ……………………………………………………. 132 8.2 Contribution ……………………………………………………………….132 8.3 Future Research ………………………………………………………….. 134 8.3.1 Implementing more features for WSPS ………….………….... 134 8.3.2 Applying WNetFlow to different Wireless Models ………….. 135 8.3.2.1 Wireless Personal Area Networks ……………………. 135 8.3.2.2 Wireless Metropolitan Area Networks ……………….. 136 8.3.2.3 Wireless Regional Area Networks ……………………. 136 8.3.2.4 Future Networks ………………………………………. 136 REFERENCES ……………………………………………………………………….. 137 10 LIST OF FIGURES 2.1: Wireless Networks sorted by transmission range………………………………….. 20 2.2: IEEE 802.11/802.11i state machine ……………………………………………….. 31 2.3: MAC frame architecture ………...………………………………………………… 34 2.4: DES Standard ……………………………………………………………………… 46 2.5: WEP Design ……………………………………………………………………….. 46 4.1: Wireless Network Attack Mechanisms……………………………………………. 64 5.1: Concept of Operations for WSPS …..……………………………………………... 77 5.2: WNetFlow Structure ………………………………………………………………. 79 5.3: Rule based analysis for Wireless attack detection algorithm ……………………... 95 6.1: ROC Curve showing direct comparison between AWIDS and Airdefense for 4 different types of attacks……………………………………..… 101 7.1: Testbed at ITL/The University of Arizona ………………………………………. 108 7.2: Median number of frames for 50 frames per second beacon flood attack observed using multiple features (f1:conn_num, f2:beacon_frm, f3:beacon_src, f4:mgmt_frm) with 3
Recommended publications
  • Ultra-Low-Power Wide Range Backscatter Communication Using Cellular Generated Carrier †
    sensors Article Ultra-Low-Power Wide Range Backscatter Communication Using Cellular Generated Carrier † Muhammad Usman Sheikh * , Boxuan Xie , Kalle Ruttik , Hüseyin Yi˘gitler , Riku Jäntti and Jyri Hämäläinen Department of Communications and Networking, Aalto University, 02150 Espoo, Finland; boxuan.xie@aalto.fi (B.X.); kalle.ruttik@aalto.fi (K.R.); huseyin.yigitler@aalto.fi (H.Y.); riku.jantti@aalto.fi (R.J.); jyri.hamalainen@aalto.fi (J.H.) * Correspondence: muhammad.sheikh@aalto.fi † This paper is an extended version of our conference paper: Sheikh, M.U., Jameel, F., Yi˘gitler, H., Wang, X., Jäntti, R. “Monostatic Backscatter Communication in Urban Microcellular Environment Using Cellular Networks.” In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Korea, 25–28 May 2020. Abstract: With the popularization of Internet-of-things (IoT) and wireless communication systems, a diverse set of applications in smart cities are emerging to improve the city-life. These applications usually require a large coverage area and minimal operation and maintenance cost. To this end, the recently emerging backscatter communication (BC) is gaining interest in both industry and academia as a new communication paradigm that provides high energy efficient communications that may even work in a battery-less mode and, thus, it is well suited for smart city applications. However, the coverage of BC in urban area deployments is not available, and the feasibility of its utilization for smart city applications is not known. In this article, we present a comprehensive coverage study of a Citation: Sheikh, M.U.; Xie, B.; practical cellular carrier-based BC system for indoor and outdoor scenarios in a downtown area of a Ruttik, K.; Yi˘gitler, H.; Jäntti, R.; Helsinki city.
    [Show full text]
  • Jamming Attacks and Anti-Jamming Strategies in Wireless Networks
    1 Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey Hossein Pirayesh and Huacheng Zeng Department of Computer Science and Engineering, Michigan State University, East Lansing, MI USA Abstract—Wireless networks are a key component of the will become ubiquitously available for massive devices to telecommunications infrastructure in our society, and wireless realize the vision of Internet of Everything (IoE) in the near services become increasingly important as the applications of future [18]. wireless devices have penetrated every aspect of our lives. Although wireless technologies have significantly advanced in As we are increasingly reliant on wireless services, security the past decades, most wireless networks are still vulnerable to threats have become a big concern about the confidentiality, radio jamming attacks due to the openness nature of wireless integrity, and availability of wireless communications. Com- channels, and the progress in the design of jamming-resistant pared to other security threats such as eavesdropping and wireless networking systems remains limited. This stagnation can data fabrication, wireless networks are particularly vulnerable be attributed to the lack of practical physical-layer wireless tech- nologies that can efficiently decode data packets in the presence to radio jamming attacks for the following reasons. First, of jamming attacks. This article surveys existing jamming attacks jamming attacks are easy to launch. With the advances in and anti-jamming strategies in wireless local area networks software-defined radio, one can easily program a small $10 (WLANs), cellular networks, cognitive radio networks (CRNs), USB dongle device to a jammer that covers 20 MHz bandwidth ZigBee networks, Bluetooth networks, vehicular networks, LoRa below 6 GHz and up to 100 mW transmission power [34].
    [Show full text]
  • An Efficient Scheme in IEEE 802.22 WRAN for Real Time and Non-Real Time
    Master’s Thesis Electrical Engineering November 2012 An Efficient Scheme in IEEE 802.22 WRAN for Real time and Non-Real time Traffic Delay This thesis is presented as part of the Degree for Masters of Science in Electrical Engineering Nawfal AlZubaidi R-Smith Khaled Humood Blekinge Institute of Technology November 2012 School of Engineering Blekinge Institute of Technology Supervisor: (Doktorand) Maria Erman Examiner: Karlskrona, Sweden i “The Significant Problems We Face Cannot Be Solved At The Same Level Of Thinking We Were At When We Created Them.” Albert Einstein i ABSTRACT Cognitive radio network has emerged as a prevailing technique and an exciting and promising technology which has the potential of dealing with the inflexible prerequisites and the inadequacy of the radio spectrum usage. In cognitive radios, in-band sensing is fundamental for the protection of the licensed spectrum users, enabling secondary users to vacate channels immediately upon detection of primary users. This channel sensing scheme directly affects the quality-of-service of cognitive radio user and licensed user especially with the undesirable delay induced into the system. In this thesis, a combination of different delay reduction schemes from different papers has been introduced, the first paper [47] argues about performing fine sensing for non-real time traffic, while real time traffic continues transmission in the channel. The second paper [46] argues about performing fine sensing after multiple alarms that have been triggered. Both schemes have combined with applying data rate reservation as well in order to reduce as much as possible this crucial factor of delay for IEEE 802.22 wireless regional area network and to improve the channel utilization.
    [Show full text]
  • Long-Term Spectral Occupancy Findings in Chicago
    2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN) Long-term Spectral Occupancy Findings in Chicago Tanim M. Taher, Roger B. Bacchus, Kenneth J. Zdunek Dennis A. Roberson, Department of Electrical and Computer Engineering Department of Computer Science Illinois Institute of Technology, Chicago, IL Illinois Institute of Technology, Chicago, IL. Abstract—This paper summarizes some of the results of mea- common; in other bands, observations indicate a much lower surements and related analysis efforts at the Illinois Institute of usage level [BAC08]. Technology (IIT) Spectrum Observatory in Chicago over the past Wireless occupancy studies that map how radio spectrum is three years. The results are unique in the sense that the spectral occupancy estimates are based on multiple years of observations, utilized in different bands are useful for planning purposes and whereas previous studies produced occupancy numbers based on developing new regulations to support and sustain the growth short term snapshot measurements, often of a few hours duration and value of radio related technologies and applications. or at most spanning a few days or weeks. The measurements are Spectrum also has a high economic value [KEL08]. The results also presented in a novel way: the occupancy data in a band of of spectral occupancy studies are useful for making decisions interest during a one year span is graphed as a 2-dimensional image that visually reveals daily, weekly, and yearly trends and on the reallocation of spectrum and/or valuation estimation. anomalies. The main objective of this paper is to present year Several short duration studies [ROB06, MCH05, ISL08] have by year first-order statistics about the spectral occupancy across audited spectrum occupancy in the past, but long term studies multiple bands, but more details are presented about radio usage are needed to track trends to develop a comprehensive picture in a few bands like the TV band.
    [Show full text]
  • An Autonomous Channel Selection Algorithm for Wlans
    Technological University Dublin ARROW@TU Dublin Doctoral Engineering 2013-11 An Autonomous Channel Selection Algorithm for WLANs Fuhu Deng Technological University Dublin, [email protected] Follow this and additional works at: https://arrow.tudublin.ie/engdoc Part of the Digital Communications and Networking Commons Recommended Citation Fuhu, D. (2013) An Autonomous Channel Selection Algorithm for WLANs. Doctoral Thesis, Technological University Dublin. doi:10.21427/D73S4K This Theses, Ph.D is brought to you for free and open access by the Engineering at ARROW@TU Dublin. It has been accepted for inclusion in Doctoral by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License Funder: China Scholarship Council Dublin Institute of Technology ARROW@DIT Articles Communications Network Research Institute 2014-02-12 An autonomous channel selection algorithm for WLANs Fuhu Deng Follow this and additional works at: http://arrow.dit.ie/commart Part of the Digital Communications and Networking Commons This Theses, Ph.D is brought to you for free and open access by the Communications Network Research Institute at ARROW@DIT. It has been accepted for inclusion in Articles by an authorized administrator of ARROW@DIT. For more information, please contact [email protected], [email protected]. An Autonomous Channel Selection Algorithm for Wireless LANs By Fuhu Deng B. Eng., M. Eng. A thesis submitted to the Dublin Institute of Technology for the degree of Doctor of Philosophy Supervisor: Dr.
    [Show full text]
  • Paving the Path to Three Tier Spectrum Sharing
    PAVING THE PATH TO THREE TIER SPECTRUM SHARING Manuel Uhm Chair of the Board of Directors, Wireless Innovation Forum Director of Marketing, National Instruments DySPAN 2017 Copyright © 2015 Software Defined Radio Forum, Inc. All Rights Reserved5 Ettus Research Overview • Leader in Software Defined Radio (SDR) and Signals Intelligence (SI) • Maker of Universal Software Radio Peripheral (USRP™) – more than 40,000 units shipped • Enables rapid development and deployment of SDR and cognitive radio systems • Supported by a strong software ecosystem, including National Instruments LabVIEW, GNURadio (open source, C++), MATLAB/Simulink by the MathWorks®, Xilinx® Vivado and Vivado HLS, VHDL and Verilog • DC-6 GHz, MIMO capability, Embedded, USB/GigE • Wireless Innovation Forum – 2010 Technology of the Year • Wireless Innovation Forum – 2014 International Achievement Award • About The Company • Founded in 2004 • Located in Santa Clara, CA – Silicon Valley • Acquired by National Instruments in 2010 Why Share Spectrum? • We have a spectrum efficiency problem, not a spectrum scarcity problem! • A key to maximizing the usage and value of RF spectrum • Starting to gain significant momentum worldwide • Used to lack a clear model on how to define and set up a system to enable spectrum sharing…that has now changed! • The FCC in the US has unanimously approved creation of the Citizens Broadband Radio Service (CBRS) which is now defining such a model • 150MHz band suitable for wireless broadband • Three tiers of shared use • The Wireless Innovation Forum (WINNF) is serving as the multistakeholder group to define the industry standards and procedures for coordinating use of the CBRS Copyright © 2017 Software Defined Radio Forum, Inc.
    [Show full text]
  • Rfdump: an Architecture for Monitoring the Wireless Ether
    RFDump: An Architecture for Monitoring the Wireless Ether Kaushik Lakshminarayanan, Samir Sapra, Srinivasan Seshan, Peter Steenkiste Carnegie Mellon University Pittsburgh, PA 15213 {kaushik, ssapra, srini, prs}@cs.cmu.edu Abstract 1. INTRODUCTION Networking researchers have been using tools like wireshark Tcpdump, Wireshark/Ethereal and similar applications and tcpdump to sniff packets on physical links that use dif- have become a critical part of the tool collections used by ferent types of datalink protocols, e.g. Ethernet or 802.11, networking researchers, networking administrators and ap- allowing them to monitor higher level protocols sharing these plication developers. These tools expose the operation of links. However, monitoring wireless links is more challeng- a network in a detailed, cross-layer fashion. Based on this ing, since the transmission medium is shared by flows us- exposed information, users are able to monitor and analyze ing diverse datalink protocols (e.g. 802.11, Bluetooth) and the interactions between different nodes, different protocols, physical layer schemes (e.g. QPSK and GFSK). To this end, different protocol layers and different applications in the net- we propose RFDump, a software architecture for monitoring work. This has enabled activities such as diagnosing network packets on heterogeneous wireless networks. The key idea protocols, optimizing network performance and even teach- underlying our architecture is the use of a fast detection ing network protocol operation. stage which can tentatively map signals to protocols very Unfortunately, applying these tools in wireless networks efficiently. As a result, RFDump can scale up to a modest fails to provide the same level of insight into the operation of number (5-10) of wireless technologies.
    [Show full text]
  • Ph.D. Thesis Self-Optimization of Radio Resources on IEEE 802.11
    Ph.D. Thesis Self-Optimization of Radio Resources on IEEE 802.11 Networks Ph.D. Candidate: Eduard Garcia Villegas Ph.D. Advisor: Josep Paradells Aspas Wireless Networks Group (WNG) — Telematics Department Universitat Polit`ecnica de Catalunya (UPC) July 2009 Acknowledgements At first glance, anyone may easily infer that the most evident results of the last five years of my life are an incipient alopecia and a loss of shape. I hope that the reader of this thesis would pay regard to other commendable achievements. These achievements are not the fruit of my effort alone since many people have helped me throughout these years. I would like to express my gratitude to those who stood beside me and supported me. Firstly I am particularly indebted to Professor Josep Paradells, who envisioned this thesis five years ago. He has guided me ever since to forge what you hold in your hands, and I wish to enjoy his verve for many years to come. I also like to acknowledge the advice and support of Rafael Vidal, which goes back to even before I “hatched” as an engineer. He has generously read and commented on almost every line I wrote during this thesis. I am grateful to Elena L´opez for her “tech support” with the simulator - which I suggest to rename as Elena’s WLAN incredible simulator (Elwis) -. Many thanks are to Marilet de Andrade for putting up with my “not-always-enjoyable” mood and for sitting with me in the same office without committing murder. I would also like to thank the reviewers (Jeff, H´ector Velayos and Pedro Ruiz) for their valuable and insightful comments that indubitably helped to improve the quality of this document.
    [Show full text]
  • Implementation of Autocorrelation-Based Feature Detector for Cognitive Radio
    AALTO-YLIOPISTON TEKNILLINEN KORKEAKOULU AALTO UNIVERSITY SCHOOL OF SCIENCE AND TECHNOLOGY Faculty of Electronics, Communications and Automation Department of Micro- and Nanosciences Kari Kokkinen Implementation of Autocorrelation-based Feature Detector for Cognitive Radio Thesis submitted for examination for the degree of Master of Science in Technology. Espoo, May 3rd 2010 Supervisor Professor Jussi Ryynänen Instructor D.Sc. Marko Kosunen AALTO UNIVERSITY ABSTRACT OF THE SCHOOLOFSCIENCEANDTECHNOLOGY MASTER’STHESIS Author: Kari Kokkinen Name of the thesis: Implementation of Autocorrelation-based Feature Detector for Cognitive Radio Date: 3.5.2010 Number of pages: 57 Department: Micro- and Nanosciences Professorship: S-87 Electronic Circuit Design Supervisor: Professor Jussi Ryynänen Instructor: D.Sc. Marko Kosunen Emerging wireless systems demand more frequency bands in order to provide high data rate services. Most of the licensed frequency bands are underutilized, because of the rigid spectrum allocation. Cognitive radios aim to relieve the situation by identifying and exploiting the underutilized radio spectrum. A key task of the cognitive radio is spectrum sensing, which is intended to detect unoccupied frequency slots and licensed spectrum user transmissions. This thesis presents an implementation of an autocorrelation-based feature detector for orthogonal frequency-division multiplexing (OFDM) based primary user signals. The autocorrelation-based detection algorithm is optimized in order to achieve power and area efficient hardware realization. The VHDL implementation is presented in de- tail and verified by simulations. After verification, the algorithm is implemented in a field-programmable gate array (FPGA) evaluation environment, and the performance is verified with measurements. An application-specific integrated circuit (ASIC) im- plementation is also realized in order to obtain comparable data of power consumption and area.
    [Show full text]
  • Composing On-Demand Intelligent Physical Layers
    CODIPHY- Composing On-Demand Intelligent PHYsical Layers by Aveek Dutta M.S., University of Colorado Boulder, 2008 B.Tech., University of Kalyani, India, 2002 A thesis submitted to the Faculty of the Graduate School of the University of Colorado in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Electrical, Computer and Energy Engineering 2013 This thesis entitled: CODIPHY- Composing On-Demand Intelligent PHYsical Layers written by Aveek Dutta has been approved for the Department of Electrical, Computer and Energy Engineering Prof. Dirk Grunwald Prof. Douglas Sicker Prof. Tim Brown Prof. Fabio Somenzi Dr. Joeseph Mitola III Date The final copy of this thesis has been examined by the signatories, and we find that both the content and the form meet acceptable presentation standards of scholarly work in the above mentioned discipline. iii Dutta, Aveek (Ph.D., Electrical Engineering) CODIPHY- Composing On-Demand Intelligent PHYsical Layers Thesis directed by Prof. Dirk Grunwald CODIPHY or Composing On-Demand Intelligent Physical Layers aims to solve two fundamental problems in practical cognitive radio networks: Collaboration between two radio physical layers (PHY) with varying capabilities to agree on a common communication protocol, using an ontology based description of the internal structure of the radio subsystems and secondly, provide a method to compose a functioning radio pipeline from a set of pre-compiled components, using the high-level representation provided by the ontology, to target heterogeneous platforms. CODIPHY isolates the various domains of radio engineering, but still allows sharing of domain knowledge to achieve the common goal of radio adaptation.
    [Show full text]
  • User-Centrism in Wireless Networking
    User-centrism in wireless networking A dissertation presented by Pantelis A. Frangoudis to The Department of Informatics in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the subject of Computer Science Athens University of Economics and Business Athens, Greece April 2012 ©2012 - Pantelis A. Frangoudis All rights reserved. Thesis advisor Author Prof. George C. Polyzos Pantelis A. Frangoudis User-centrism in wireless networking Abstract This dissertation delves into various aspects of user-centrism in today’s wireless net- working landscape. We reconsider the traditional operator/provider-centric view of wireless networking by proposing user-centric solutions to problems along three re- search dimensions: (i) wireless access, (ii) provision of communication services, and (iii) information collection to be used, among others, for network management pur- poses. In particular, we first demonstrate cases when users become (micro-)providers of network access themselves. Community wireless networks, where community mem- bers share the wireless infrastructure and build wireless mesh networks are one ex- ample. We propose a classification of public wireless access schemes and, based on empirical data, discover power-law behavior in their structure. We then focus on the design and implementation of a Wi-Fi sharing protocol on top of resource-constrained, low-cost user devices. Based on this Wi-Fi sharing scheme, we show how user-provided mobile multime- dia services can be built in an autonomous, secure, private and decentralized way. We tackle security threats and address legal concerns by proposing a tunneling-based communication scheme with minimal dependence on centralized infrastructures for signaling. We demonstrate the feasibility of secure, user-centric VoIP services to operate on low-cost, off-the-shelf equipment, using a Quality-of-Experience-driven experimental methodology to estimate upper bounds on VoIP capacity in our archi- tecture.
    [Show full text]
  • Wireless Network Design for Emerging Iiot Applications: Reference Framework and Use Cases Yongkang Liu, Mohamed Kashef, Kang Lee, Lotfi Benmohamed, and Richard Candell
    1 Wireless Network Design for Emerging IIoT Applications: Reference Framework and Use Cases Yongkang Liu, Mohamed Kashef, Kang Lee, Lotfi Benmohamed, and Richard Candell Abstract—Industrial Internet of Things (IIoT) applications, applications in 2025 [89]. As the industrial variant of IoT, featured with data-centric innovations, are leveraging the observ- the Industrial Internet of Things (IIoT) provides customized ability, control, and analytics, as well as the safety of industrial architectures and standardized interfaces in data acquisition, operations. In IIoT deployments, wireless links are increasingly used in improving the operational connectivity for industrial data transmission, and analytics for industrial applications [3]. IIoT services, such as collecting massive process data, communicating is credited to boosting the visibility of production processes with industrial robots, and tracking machines/parts/products on and the transparency of control decisions. It is also actively the factory floor and beyond. The wireless system design for playing in the ongoing innovations of cyber-physical systems IIoT applications is inherently a joint effort between operational (CPS), known under labels, such as Smart Manufacturing [4] technology (OT) engineers, information technology (IT) system 1 architects, and wireless network planners. In this paper, we and Industry 4.0 [5], [117]. propose a new reference framework for the wireless system design IIoT, as an open and scalable information technology in IIoT use cases. The framework presents a generic design (IT) platform, enables the exchange of machine-typed data process and identifies the key questions and tools of individual between industrial devices and the on-premises/cloud com- procedures. Specifically, we extract impact factors from distinct puting facility in the local and wider-areas industrial op- domains including industrial operations and environments, data service dynamics, and the IT infrastructure.
    [Show full text]