User-Centrism in Wireless Networking

Total Page:16

File Type:pdf, Size:1020Kb

User-Centrism in Wireless Networking User-centrism in wireless networking A dissertation presented by Pantelis A. Frangoudis to The Department of Informatics in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the subject of Computer Science Athens University of Economics and Business Athens, Greece April 2012 ©2012 - Pantelis A. Frangoudis All rights reserved. Thesis advisor Author Prof. George C. Polyzos Pantelis A. Frangoudis User-centrism in wireless networking Abstract This dissertation delves into various aspects of user-centrism in today’s wireless net- working landscape. We reconsider the traditional operator/provider-centric view of wireless networking by proposing user-centric solutions to problems along three re- search dimensions: (i) wireless access, (ii) provision of communication services, and (iii) information collection to be used, among others, for network management pur- poses. In particular, we first demonstrate cases when users become (micro-)providers of network access themselves. Community wireless networks, where community mem- bers share the wireless infrastructure and build wireless mesh networks are one ex- ample. We propose a classification of public wireless access schemes and, based on empirical data, discover power-law behavior in their structure. We then focus on the design and implementation of a Wi-Fi sharing protocol on top of resource-constrained, low-cost user devices. Based on this Wi-Fi sharing scheme, we show how user-provided mobile multime- dia services can be built in an autonomous, secure, private and decentralized way. We tackle security threats and address legal concerns by proposing a tunneling-based communication scheme with minimal dependence on centralized infrastructures for signaling. We demonstrate the feasibility of secure, user-centric VoIP services to operate on low-cost, off-the-shelf equipment, using a Quality-of-Experience-driven experimental methodology to estimate upper bounds on VoIP capacity in our archi- tecture. Finally, we approach issues of optimizing the operation of the wireless infrastruc- ture in a user-centric way, where discovering the wireless topology (a first step towards reconfiguration and interference mitigation) is crowdsourced to roaming users. We design techniques to counter potential attacks by untrusted users, while we design and implement an architecture based on recently standardized technologies, such as IEEE 802.11k. We derive analytic expressions on the topology discovery accuracy of our scheme, showing that a user-centric scheme can offer more than 2× performance improvement over an infrastructure-centric scheme in realistic scenarios, even in the presence of large ratios of attackers. iii Επιβλέπων Συγγραφέας Καθ. Γεώργιος Πολύζος Παντελής Φραγκούδης Χρηστοκεντρικότητα στην ασύρματη δικτύωση Περίληψη Το αντικείμενο αυτής της διατριβής είναι ο ρόλος του χρήστη σε διάφορα θέ- ματα ασύρματης δικτύωσης. Η παραδοσιακή θεώρηση αντιμετωπίζει το χρήστη ως καταναλωτή και έχει τον πάροχο της υπηρεσίας στο επίκεντρο. Σύγχρονες εξελίξεις όμως φέρνουν το χρήστη στο προσκήνειο με ενδυναμωμένο χαρακτήρα και δημιουργούν τις συνθήκες για επανεξέταση του ρόλου του. Τέτοιες εξελίξεις περιλαμβάνουν την αυξανόμενη ασύρματη κάλυψη εξαιτίας ασύρματων τοπικών δικτύων που ανήκουν και ελέγχονται από οικιακούς χρήστες, ευέλικτες τεχνο- λογίες στο οικιακό ασύρματο δίκτυο και τερματικές συσκευές με πολλαπλές δυνατότητες. Ενδεικτική της ενδυνάμωσης των χρηστών είναι η εξάπλωση του λεγόμενου “crowdsourcing,” δηλαδή της ανάθεσης ενός παραδοσιακά κεντρικο- ποιημένου καθήκοντος σε–πιθανόν ανώνυμα ή ψευδώνυμα–πλήθη χρηστών. Η στροφή προς το σχεδιασμό λύσεων με το χρήστη στο επίκεντρο πηγάζει από την προσπάθεια για καλύτερη αξιοποίηση υποχρησιμοποιούμενων πόρων των χρηστών αλλά και για εκμετάλλευση της κινητικότητάς τους και των υπο- λογιστικών και άλλων δυνατοτήτων των συσκευών τους, ώστε να επιτυγχάνεται αυτόνομη λειτουργία, μείωση της διαχειριστικής πολυπλοκότητας και παροχή υπηρεσιών χαμηλού κόστους. Από την άλλη μεριά, η ανάγκη λειτουργίας σε μη εξειδικευμένο εξοπλισμό χαμηλού κόστους και υπολογιστικών δυνατοτήτων, χωρίς κεντρικό σχεδιασμό, εγείρει θέματα απόδοσης. Ταυτόχρονα, προκύπτουν θέματα ασφάλειας και αξιοπιστίας λόγω της ανάθεσης καθηκόντων σε εξ υπο- θέσεως μη έμπιστους χρήστες και έλλειψης κεντρικού ελέγχου. Αυτή η εργασία αποσκοπεί στο να προτείνει σχήματα που εκμεταλλεύονται τα πλεονεκτήματα που προσφέρει η χρηστοκεντρικότητα, ταυτόχρονα αντιμετωπίζοντας προκλή- σεις αποδοτικότητας, ασφάλειας και αξιοπιστίας. Στο πλαίσιο αυτό, έχουμε ορίσει ένα σύνολο από αρχές στις οποίες λύσεις επικεντρωμένες στο χρήστη πρέπει να είναι πιστές: (i) ο χρήστης πρέπει να παρουσιάζεται ενδυναμωμένος, (ii) το κόστος λειτουργίας να μειώνεται, (iii) η λειτουργία να είναι αποκεντρωμένη και (iv) η συμμετοχή των χρηστών ανοικτή, (v) λαμβάνοντας πάντα υπόψη θέματα ασφάλειας και αξιοπιστίας. Η έρευνά μας στην περιοχή της χρηστοκεντρικής ασύρματης δικτύωσης τοπο- θετείται σε τρεις άξονες: (i) την παροχή ασύρματης πρόσβασης, (ii) την παροχή υπηρεσιών επικοινωνίας, με έμφαση στις υπηρεσίες φωνής και (iii) τη συλλογή iv Περίληψη v πληροφορίας από τους χρήστες για το ασύρματο περιβάλλον, η οποία μπορεί να αξιοποιηθεί από μηχανισμούς διαχείρισης και βελτιστοποίησης της λειτουρ- γίας του δικτύου. Στην διατριβή αυτή δίνουμε απαντήσεις σε μια σειρά από ερωτήματα σε καθένα από αυτούς τους ερευνητικούς άξονες. Στην περιοχή της παροχής ασύρματης πρόσβασης, μελετούμε ασύρματες κοι- νότητες ανά τον κόσμο ως προς τη δομή και τη λειτουργία τους, προτείνουμε μια κατηγοριοποίησή τους και ανακαλύπτουμε εκθετικούς νόμους στη δομή τους. Στη συνέχεια, ασχολούμαστε με θέματα διαμοιρασμού ασύρματης πρόσβασης και ειδικότερα με τις τεχνικές λεπτομέρειες του σχεδιασμού και της υλοποίη- σης ενός τέτοιου πρωτοκόλλου, με στόχο την εκτέλεσή του σε περιορισμένων δυνατοτήτων οικιακό εξοπλισμό. Με αυτό σαν βάση, προτείνουμε μια αρχιτεκτονική ασφαλών επικοινωνιών ειδικά για τέτοια περιβάλλοντα πρόσβασης. Προτείνουμε ένα σχήμα ασφάλειας βασισμένο σε τεχνολογίες “tunneling,” το οποίο εξασφαλίζει την επικοινωνία πάνω από μη έμπιστα ασύρματα οικιακά δίκτυα, αλλά και λύνει ως ένα βαθμό νομικά ζητήματα που προκύπτουν όταν κανείς μοιράζεται το δίκτυό του με αγνώστους. Επίσης, μελετούμε το αντίκτυπο των χρησιμοποιούμενων μηχανι- σμών ασφάλειας στην ποιότητα της εμπειρίας των χρηστών υπηρεσιών φωνής, ειδικά όταν μηχανισμοί ασφάλειας υλοποιούνται σε απλό, μη εξειδικευμένο, περιορισμένο υπολογιστικά οικιακό εξοπλισμό. Τέλος, σχεδιάζουμε και υλοποιούμε μια αρχιτεκτονική για τη συλλογή πλη- ροφοριών για την ασύρματη τοπολογία βασισμένη στην αρχή του crowdsourcing. Ο σχεδιασμός μας βασίζεται εν μέρει σε προτυποποιημένες τεχνολογίες, όπως είναι το πρότυπο IEEE 802.11k, για το οποίο για πρώτη φορά αντιμετωπίζουμε συγκεκριμένες επιθέσεις και προτείνουμε και υλοποιούμε πρακτικές μεθόδους αντιμετώπισης. Συγκεκριμένα, εφαρμόζουμε ένα μηχανισμό φήμης για την αντι- μετώπιση επιθέσεων κατά τις οποίες χρήστες υποβάλλουν ψευδείς πληροφορίες και δίνουμε αναλυτικές εκφράσεις για την απόδοση του συστήματός μας ως προς την ακρίβεια με την οποία ανακαλύπτει την ασύρματη τοπολογία. Ποσο- τικοποιούμε τα πλεονεκτήματα της προσέγγισής μας σε σχέση με μια προσέγ- γιση στην οποία οι χρήστες δε συμμετέχουν στη συλλογή πληροφοριών (παρά μόνο τα κεντρικά ελεγχόμενα ασύρματα σημεία πρόσβασης), δείχνοντας ότι η χρηστοκεντρική προσέγγιση οδηγεί σε υπερδιπλάσια απόδοση σε ρεαλιστικές συνθήκες και για πολύ μεγάλα ποσοστά επιτιθέμενων χρηστών. Acknowledgments I am greatly indebted to Prof. George Polyzos, my thesis advisor. George has been instrumental in all my research efforts and his influence on me cannot be measured. He is an outstanding scientist and teacher, and an exceptional personality. He is credited with creating a unique working environment at the Mobile Multimedia Lab. It has been my pleasure and honor working under his advice. I had the privilege of Costas Courcoubetis co-advising my thesis and helping me with his substantial suggestions and critical view. George Xylomenos, with his deep theoretical and technical expertise and thorough understanding of issues spanning across various areas of networking and computer science, also co-advised my work and was always available for discussions and advice. The help of George Stamoulis and Vasilis Siris was invaluable; their comments and suggestions helped shape important aspects of my work. I have also had the chance to work with Giannis Marias, whom I thank for the collaboration, interesting discussions, and support. I thank Lazaros Merakos and Iordanis Koutsopoulos, who honored me by joining my evaluation committee. In the years I have spent at the MMlab, I met or worked with lots of interesting people; in the beginning, Chris Ververidis, Thanasis Papaioannou, Manos Dramitinos, Sergios Soursos, Panagiotis Antoniadis, Costas Calogiros, and George Thanos, and, in the years that came, Nikos Fotiou, Vaggelis Douros, Xenophon Vasilakos, Chris- tos Tsilopoulos, Michalis Kanakakis, Ioanna Papafili, Eleni Agiatzidou, and Alex Kostopoulos. Ntinos Katsaros, a member of the lab whom I have known since my undergraduate years and admire for his no-nonsense research approach and hard work, has been a good friend and our common interests span far beyond research. I was working on the P2PWNC project for years, a rewarding experience. There, I had the pleasure of working with a cool group including Vasilis Kemerlis, Dimitris Paraskevaidis, Lefteris Stefanis and Stratos Dimopoulos. In this and other projects, it was always fun
Recommended publications
  • Ultra-Low-Power Wide Range Backscatter Communication Using Cellular Generated Carrier †
    sensors Article Ultra-Low-Power Wide Range Backscatter Communication Using Cellular Generated Carrier † Muhammad Usman Sheikh * , Boxuan Xie , Kalle Ruttik , Hüseyin Yi˘gitler , Riku Jäntti and Jyri Hämäläinen Department of Communications and Networking, Aalto University, 02150 Espoo, Finland; boxuan.xie@aalto.fi (B.X.); kalle.ruttik@aalto.fi (K.R.); huseyin.yigitler@aalto.fi (H.Y.); riku.jantti@aalto.fi (R.J.); jyri.hamalainen@aalto.fi (J.H.) * Correspondence: muhammad.sheikh@aalto.fi † This paper is an extended version of our conference paper: Sheikh, M.U., Jameel, F., Yi˘gitler, H., Wang, X., Jäntti, R. “Monostatic Backscatter Communication in Urban Microcellular Environment Using Cellular Networks.” In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Korea, 25–28 May 2020. Abstract: With the popularization of Internet-of-things (IoT) and wireless communication systems, a diverse set of applications in smart cities are emerging to improve the city-life. These applications usually require a large coverage area and minimal operation and maintenance cost. To this end, the recently emerging backscatter communication (BC) is gaining interest in both industry and academia as a new communication paradigm that provides high energy efficient communications that may even work in a battery-less mode and, thus, it is well suited for smart city applications. However, the coverage of BC in urban area deployments is not available, and the feasibility of its utilization for smart city applications is not known. In this article, we present a comprehensive coverage study of a Citation: Sheikh, M.U.; Xie, B.; practical cellular carrier-based BC system for indoor and outdoor scenarios in a downtown area of a Ruttik, K.; Yi˘gitler, H.; Jäntti, R.; Helsinki city.
    [Show full text]
  • Jamming Attacks and Anti-Jamming Strategies in Wireless Networks
    1 Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey Hossein Pirayesh and Huacheng Zeng Department of Computer Science and Engineering, Michigan State University, East Lansing, MI USA Abstract—Wireless networks are a key component of the will become ubiquitously available for massive devices to telecommunications infrastructure in our society, and wireless realize the vision of Internet of Everything (IoE) in the near services become increasingly important as the applications of future [18]. wireless devices have penetrated every aspect of our lives. Although wireless technologies have significantly advanced in As we are increasingly reliant on wireless services, security the past decades, most wireless networks are still vulnerable to threats have become a big concern about the confidentiality, radio jamming attacks due to the openness nature of wireless integrity, and availability of wireless communications. Com- channels, and the progress in the design of jamming-resistant pared to other security threats such as eavesdropping and wireless networking systems remains limited. This stagnation can data fabrication, wireless networks are particularly vulnerable be attributed to the lack of practical physical-layer wireless tech- nologies that can efficiently decode data packets in the presence to radio jamming attacks for the following reasons. First, of jamming attacks. This article surveys existing jamming attacks jamming attacks are easy to launch. With the advances in and anti-jamming strategies in wireless local area networks software-defined radio, one can easily program a small $10 (WLANs), cellular networks, cognitive radio networks (CRNs), USB dongle device to a jammer that covers 20 MHz bandwidth ZigBee networks, Bluetooth networks, vehicular networks, LoRa below 6 GHz and up to 100 mW transmission power [34].
    [Show full text]
  • An Efficient Scheme in IEEE 802.22 WRAN for Real Time and Non-Real Time
    Master’s Thesis Electrical Engineering November 2012 An Efficient Scheme in IEEE 802.22 WRAN for Real time and Non-Real time Traffic Delay This thesis is presented as part of the Degree for Masters of Science in Electrical Engineering Nawfal AlZubaidi R-Smith Khaled Humood Blekinge Institute of Technology November 2012 School of Engineering Blekinge Institute of Technology Supervisor: (Doktorand) Maria Erman Examiner: Karlskrona, Sweden i “The Significant Problems We Face Cannot Be Solved At The Same Level Of Thinking We Were At When We Created Them.” Albert Einstein i ABSTRACT Cognitive radio network has emerged as a prevailing technique and an exciting and promising technology which has the potential of dealing with the inflexible prerequisites and the inadequacy of the radio spectrum usage. In cognitive radios, in-band sensing is fundamental for the protection of the licensed spectrum users, enabling secondary users to vacate channels immediately upon detection of primary users. This channel sensing scheme directly affects the quality-of-service of cognitive radio user and licensed user especially with the undesirable delay induced into the system. In this thesis, a combination of different delay reduction schemes from different papers has been introduced, the first paper [47] argues about performing fine sensing for non-real time traffic, while real time traffic continues transmission in the channel. The second paper [46] argues about performing fine sensing after multiple alarms that have been triggered. Both schemes have combined with applying data rate reservation as well in order to reduce as much as possible this crucial factor of delay for IEEE 802.22 wireless regional area network and to improve the channel utilization.
    [Show full text]
  • Long-Term Spectral Occupancy Findings in Chicago
    2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN) Long-term Spectral Occupancy Findings in Chicago Tanim M. Taher, Roger B. Bacchus, Kenneth J. Zdunek Dennis A. Roberson, Department of Electrical and Computer Engineering Department of Computer Science Illinois Institute of Technology, Chicago, IL Illinois Institute of Technology, Chicago, IL. Abstract—This paper summarizes some of the results of mea- common; in other bands, observations indicate a much lower surements and related analysis efforts at the Illinois Institute of usage level [BAC08]. Technology (IIT) Spectrum Observatory in Chicago over the past Wireless occupancy studies that map how radio spectrum is three years. The results are unique in the sense that the spectral occupancy estimates are based on multiple years of observations, utilized in different bands are useful for planning purposes and whereas previous studies produced occupancy numbers based on developing new regulations to support and sustain the growth short term snapshot measurements, often of a few hours duration and value of radio related technologies and applications. or at most spanning a few days or weeks. The measurements are Spectrum also has a high economic value [KEL08]. The results also presented in a novel way: the occupancy data in a band of of spectral occupancy studies are useful for making decisions interest during a one year span is graphed as a 2-dimensional image that visually reveals daily, weekly, and yearly trends and on the reallocation of spectrum and/or valuation estimation. anomalies. The main objective of this paper is to present year Several short duration studies [ROB06, MCH05, ISL08] have by year first-order statistics about the spectral occupancy across audited spectrum occupancy in the past, but long term studies multiple bands, but more details are presented about radio usage are needed to track trends to develop a comprehensive picture in a few bands like the TV band.
    [Show full text]
  • An Autonomous Channel Selection Algorithm for Wlans
    Technological University Dublin ARROW@TU Dublin Doctoral Engineering 2013-11 An Autonomous Channel Selection Algorithm for WLANs Fuhu Deng Technological University Dublin, [email protected] Follow this and additional works at: https://arrow.tudublin.ie/engdoc Part of the Digital Communications and Networking Commons Recommended Citation Fuhu, D. (2013) An Autonomous Channel Selection Algorithm for WLANs. Doctoral Thesis, Technological University Dublin. doi:10.21427/D73S4K This Theses, Ph.D is brought to you for free and open access by the Engineering at ARROW@TU Dublin. It has been accepted for inclusion in Doctoral by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License Funder: China Scholarship Council Dublin Institute of Technology ARROW@DIT Articles Communications Network Research Institute 2014-02-12 An autonomous channel selection algorithm for WLANs Fuhu Deng Follow this and additional works at: http://arrow.dit.ie/commart Part of the Digital Communications and Networking Commons This Theses, Ph.D is brought to you for free and open access by the Communications Network Research Institute at ARROW@DIT. It has been accepted for inclusion in Articles by an authorized administrator of ARROW@DIT. For more information, please contact [email protected], [email protected]. An Autonomous Channel Selection Algorithm for Wireless LANs By Fuhu Deng B. Eng., M. Eng. A thesis submitted to the Dublin Institute of Technology for the degree of Doctor of Philosophy Supervisor: Dr.
    [Show full text]
  • Paving the Path to Three Tier Spectrum Sharing
    PAVING THE PATH TO THREE TIER SPECTRUM SHARING Manuel Uhm Chair of the Board of Directors, Wireless Innovation Forum Director of Marketing, National Instruments DySPAN 2017 Copyright © 2015 Software Defined Radio Forum, Inc. All Rights Reserved5 Ettus Research Overview • Leader in Software Defined Radio (SDR) and Signals Intelligence (SI) • Maker of Universal Software Radio Peripheral (USRP™) – more than 40,000 units shipped • Enables rapid development and deployment of SDR and cognitive radio systems • Supported by a strong software ecosystem, including National Instruments LabVIEW, GNURadio (open source, C++), MATLAB/Simulink by the MathWorks®, Xilinx® Vivado and Vivado HLS, VHDL and Verilog • DC-6 GHz, MIMO capability, Embedded, USB/GigE • Wireless Innovation Forum – 2010 Technology of the Year • Wireless Innovation Forum – 2014 International Achievement Award • About The Company • Founded in 2004 • Located in Santa Clara, CA – Silicon Valley • Acquired by National Instruments in 2010 Why Share Spectrum? • We have a spectrum efficiency problem, not a spectrum scarcity problem! • A key to maximizing the usage and value of RF spectrum • Starting to gain significant momentum worldwide • Used to lack a clear model on how to define and set up a system to enable spectrum sharing…that has now changed! • The FCC in the US has unanimously approved creation of the Citizens Broadband Radio Service (CBRS) which is now defining such a model • 150MHz band suitable for wireless broadband • Three tiers of shared use • The Wireless Innovation Forum (WINNF) is serving as the multistakeholder group to define the industry standards and procedures for coordinating use of the CBRS Copyright © 2017 Software Defined Radio Forum, Inc.
    [Show full text]
  • Rfdump: an Architecture for Monitoring the Wireless Ether
    RFDump: An Architecture for Monitoring the Wireless Ether Kaushik Lakshminarayanan, Samir Sapra, Srinivasan Seshan, Peter Steenkiste Carnegie Mellon University Pittsburgh, PA 15213 {kaushik, ssapra, srini, prs}@cs.cmu.edu Abstract 1. INTRODUCTION Networking researchers have been using tools like wireshark Tcpdump, Wireshark/Ethereal and similar applications and tcpdump to sniff packets on physical links that use dif- have become a critical part of the tool collections used by ferent types of datalink protocols, e.g. Ethernet or 802.11, networking researchers, networking administrators and ap- allowing them to monitor higher level protocols sharing these plication developers. These tools expose the operation of links. However, monitoring wireless links is more challeng- a network in a detailed, cross-layer fashion. Based on this ing, since the transmission medium is shared by flows us- exposed information, users are able to monitor and analyze ing diverse datalink protocols (e.g. 802.11, Bluetooth) and the interactions between different nodes, different protocols, physical layer schemes (e.g. QPSK and GFSK). To this end, different protocol layers and different applications in the net- we propose RFDump, a software architecture for monitoring work. This has enabled activities such as diagnosing network packets on heterogeneous wireless networks. The key idea protocols, optimizing network performance and even teach- underlying our architecture is the use of a fast detection ing network protocol operation. stage which can tentatively map signals to protocols very Unfortunately, applying these tools in wireless networks efficiently. As a result, RFDump can scale up to a modest fails to provide the same level of insight into the operation of number (5-10) of wireless technologies.
    [Show full text]
  • Ph.D. Thesis Self-Optimization of Radio Resources on IEEE 802.11
    Ph.D. Thesis Self-Optimization of Radio Resources on IEEE 802.11 Networks Ph.D. Candidate: Eduard Garcia Villegas Ph.D. Advisor: Josep Paradells Aspas Wireless Networks Group (WNG) — Telematics Department Universitat Polit`ecnica de Catalunya (UPC) July 2009 Acknowledgements At first glance, anyone may easily infer that the most evident results of the last five years of my life are an incipient alopecia and a loss of shape. I hope that the reader of this thesis would pay regard to other commendable achievements. These achievements are not the fruit of my effort alone since many people have helped me throughout these years. I would like to express my gratitude to those who stood beside me and supported me. Firstly I am particularly indebted to Professor Josep Paradells, who envisioned this thesis five years ago. He has guided me ever since to forge what you hold in your hands, and I wish to enjoy his verve for many years to come. I also like to acknowledge the advice and support of Rafael Vidal, which goes back to even before I “hatched” as an engineer. He has generously read and commented on almost every line I wrote during this thesis. I am grateful to Elena L´opez for her “tech support” with the simulator - which I suggest to rename as Elena’s WLAN incredible simulator (Elwis) -. Many thanks are to Marilet de Andrade for putting up with my “not-always-enjoyable” mood and for sitting with me in the same office without committing murder. I would also like to thank the reviewers (Jeff, H´ector Velayos and Pedro Ruiz) for their valuable and insightful comments that indubitably helped to improve the quality of this document.
    [Show full text]
  • Implementation of Autocorrelation-Based Feature Detector for Cognitive Radio
    AALTO-YLIOPISTON TEKNILLINEN KORKEAKOULU AALTO UNIVERSITY SCHOOL OF SCIENCE AND TECHNOLOGY Faculty of Electronics, Communications and Automation Department of Micro- and Nanosciences Kari Kokkinen Implementation of Autocorrelation-based Feature Detector for Cognitive Radio Thesis submitted for examination for the degree of Master of Science in Technology. Espoo, May 3rd 2010 Supervisor Professor Jussi Ryynänen Instructor D.Sc. Marko Kosunen AALTO UNIVERSITY ABSTRACT OF THE SCHOOLOFSCIENCEANDTECHNOLOGY MASTER’STHESIS Author: Kari Kokkinen Name of the thesis: Implementation of Autocorrelation-based Feature Detector for Cognitive Radio Date: 3.5.2010 Number of pages: 57 Department: Micro- and Nanosciences Professorship: S-87 Electronic Circuit Design Supervisor: Professor Jussi Ryynänen Instructor: D.Sc. Marko Kosunen Emerging wireless systems demand more frequency bands in order to provide high data rate services. Most of the licensed frequency bands are underutilized, because of the rigid spectrum allocation. Cognitive radios aim to relieve the situation by identifying and exploiting the underutilized radio spectrum. A key task of the cognitive radio is spectrum sensing, which is intended to detect unoccupied frequency slots and licensed spectrum user transmissions. This thesis presents an implementation of an autocorrelation-based feature detector for orthogonal frequency-division multiplexing (OFDM) based primary user signals. The autocorrelation-based detection algorithm is optimized in order to achieve power and area efficient hardware realization. The VHDL implementation is presented in de- tail and verified by simulations. After verification, the algorithm is implemented in a field-programmable gate array (FPGA) evaluation environment, and the performance is verified with measurements. An application-specific integrated circuit (ASIC) im- plementation is also realized in order to obtain comparable data of power consumption and area.
    [Show full text]
  • Composing On-Demand Intelligent Physical Layers
    CODIPHY- Composing On-Demand Intelligent PHYsical Layers by Aveek Dutta M.S., University of Colorado Boulder, 2008 B.Tech., University of Kalyani, India, 2002 A thesis submitted to the Faculty of the Graduate School of the University of Colorado in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Electrical, Computer and Energy Engineering 2013 This thesis entitled: CODIPHY- Composing On-Demand Intelligent PHYsical Layers written by Aveek Dutta has been approved for the Department of Electrical, Computer and Energy Engineering Prof. Dirk Grunwald Prof. Douglas Sicker Prof. Tim Brown Prof. Fabio Somenzi Dr. Joeseph Mitola III Date The final copy of this thesis has been examined by the signatories, and we find that both the content and the form meet acceptable presentation standards of scholarly work in the above mentioned discipline. iii Dutta, Aveek (Ph.D., Electrical Engineering) CODIPHY- Composing On-Demand Intelligent PHYsical Layers Thesis directed by Prof. Dirk Grunwald CODIPHY or Composing On-Demand Intelligent Physical Layers aims to solve two fundamental problems in practical cognitive radio networks: Collaboration between two radio physical layers (PHY) with varying capabilities to agree on a common communication protocol, using an ontology based description of the internal structure of the radio subsystems and secondly, provide a method to compose a functioning radio pipeline from a set of pre-compiled components, using the high-level representation provided by the ontology, to target heterogeneous platforms. CODIPHY isolates the various domains of radio engineering, but still allows sharing of domain knowledge to achieve the common goal of radio adaptation.
    [Show full text]
  • Wireless Network Design for Emerging Iiot Applications: Reference Framework and Use Cases Yongkang Liu, Mohamed Kashef, Kang Lee, Lotfi Benmohamed, and Richard Candell
    1 Wireless Network Design for Emerging IIoT Applications: Reference Framework and Use Cases Yongkang Liu, Mohamed Kashef, Kang Lee, Lotfi Benmohamed, and Richard Candell Abstract—Industrial Internet of Things (IIoT) applications, applications in 2025 [89]. As the industrial variant of IoT, featured with data-centric innovations, are leveraging the observ- the Industrial Internet of Things (IIoT) provides customized ability, control, and analytics, as well as the safety of industrial architectures and standardized interfaces in data acquisition, operations. In IIoT deployments, wireless links are increasingly used in improving the operational connectivity for industrial data transmission, and analytics for industrial applications [3]. IIoT services, such as collecting massive process data, communicating is credited to boosting the visibility of production processes with industrial robots, and tracking machines/parts/products on and the transparency of control decisions. It is also actively the factory floor and beyond. The wireless system design for playing in the ongoing innovations of cyber-physical systems IIoT applications is inherently a joint effort between operational (CPS), known under labels, such as Smart Manufacturing [4] technology (OT) engineers, information technology (IT) system 1 architects, and wireless network planners. In this paper, we and Industry 4.0 [5], [117]. propose a new reference framework for the wireless system design IIoT, as an open and scalable information technology in IIoT use cases. The framework presents a generic design (IT) platform, enables the exchange of machine-typed data process and identifies the key questions and tools of individual between industrial devices and the on-premises/cloud com- procedures. Specifically, we extract impact factors from distinct puting facility in the local and wider-areas industrial op- domains including industrial operations and environments, data service dynamics, and the IT infrastructure.
    [Show full text]
  • High Performance Cognitive Radio Platform with Integrated Physical
    Network Centric Cognitive Radio Page: 1 High Performance Cognitive Radio Platform with Integrated Physical and Network Layer Capabilities Bryan Ackland, Dipankar Raychaudhuri, Michael Bushnell, Christopher Rose, Ivan Seskar WINLAB, Rutgers University Theodore Sizer, Dragan Samardzija, John Pastalan, Arnold Siegel, Lucent Bell Labs Joy Laskar, Stephane Pinel and Kyutae Lim, Georgia Institute of Technology Interim Technical Report July 2005 Abstract: This is an interim technical report on the “network centric cognitive radio platform” being developed under the NSF NeTS ProWIN (programmable wireless networks) grant CNS- 0435370. This is a 4-year collaborative research project which started in Oct 2004 with the objective of developing a prototype cognitive radio platform that meets the requirements described above. The network-centric cognitive radio architecture under consideration in this project is aimed at providing a high-performance platform for experimentation with various adaptive wireless network protocols ranging from simple etiquettes to more complex ad-hoc collaboration. Particular emphasis has been placed on high performance in a networked environment where each node may be required to carry out high throughput packet forwarding functions between multiple physical layers. Key design objectives for the cognitive radio platform include: . multi-band operation, fast frequency scanning and agility; . software-defined modem including waveforms such as DSSS/QPSK and OFDM operating at speeds up to 50 Mbps; . packet processor capable of ad-hoc packet routing with aggregate throughput ~100 Mbps; . spectrum policy processor that implements etiquette protocols and algorithms for dynamic spectrum sharing. The cognitive radio prototype’s architecture is based on four major elements: (1) MEMS-based tri-band agile RF front-end, (2) FPGA-based software defined radio (SDR); (3) FPGA-based packet processing engine; and (4) embedded CPU core for control and management.
    [Show full text]