Chapter-7 Special topics in ranging Prof. Jae-Young Pyun Presentation By Amod Pudasaini WHYNET lab Date: 5 th May 2015 1.

Slides:



Advertisements
Similar presentations
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
Hitchhike: Riding Control on Preambles Xiaoyu Ji Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang and Yunhao Liu INFOCOM, 2014, Toronto Hong.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
#7 1 Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science University of Kansas 2335 Irving Hill Dr. Lawrence,
II. Medium Access & Cellular Standards. TDMA/FDMA/CDMA.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Doc.: IEEE /1428r0 Submission Der-Jiunn Deng (NCUE) Clear Channel Assessment for OFDMA PHY Date: Slide 1 November 2014 Authors:
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Medium Access Control Sublayer
1/26 Chapter 6 Digital Data Communication Techniques.
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING(OFDM)
Lecture #2 Chapter 14 Wireless LANs.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
CSC 335 Data Communications and Networking Lecture 4c: Communication and Multiplexing Dr. Cheer-Sun Yang.
Vehicular Networking An introduction
IEEE High Rate WPAN - MAC functionalities & Power Save Mode Mobile Network Lab. 정상수, 한정애.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
Orthogonal Frequency Division Multiple Access (OFDMA)
1 Introduction to. 2 Contents: DEFINITION OF SPREAD SPECTRUM ( SS ) CHARACTERISTICS OF SPREAD SPECTRUM BASIC PRINCIPLES OF DIRECT SEQUENCE SPREAD SPECTRUM.
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Computer Communication & Networks Lecture # 05 Physical Layer: Signals & Digital Transmission Nadeem Majeed Choudhary
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
 Leaf test codes are secure sine they would not be jammed by jammers.  When few normal users are present, many leaf code tests are wasted since absent.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
ECS 152A 4. Communications Techniques. Asynchronous and Synchronous Transmission Timing problems require a mechanism to synchronize the transmitter and.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Medium Access Control Sub Layer
Wireless Multiple Access Schemes in a Class of Frequency Selective Channels with Uncertain Channel State Information Christopher Steger February 2, 2004.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Understanding Network Architecture CHAPTER FOUR. The Function of Access Methods The set of rules that defines how a computer puts data onto the network.
Midterm Review. Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
CRMA: Collision Resistant Multiple Access Lili Qiu University of Texas at Austin Joint work with Tianji Li, Mi Kyung Han, Apurv Bhartia, Eric Rozner, Yin.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Data and Computer Communications Digital Data Communications Techniques + Error Control+ Digital Data Communications Techniques + Error Control+Multiplexing.
2. Data Link Layer: Medium Access Control. Scheduling.
April 25th 2005Doc: IEEE a Zafer Sahinoglu, Mitsubishi Electric SlideTG4a1 Project: IEEE P Working Group for Wireless Personal Area.
Bandwidth Utilization (Multiplexing and Spectrum Spreading)
Jamming for good: a fresh approach to authentic communication in WSNs
Lab 7 – CSMA/CD (Data Link Layer Layer)
Communication Networks: Technology & Protocols
Subject Name: Digital Communication Subject Code: 10EC61
Advanced Wireless Networks
The Three Main Sources of Transmission Errors
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Channel Allocation (MAC)
CS 457 – Lecture 7 Wireless Networks
Communication Networks NETW 501
11/29/2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Secure Ranging] Date Submitted: [19 September.
Date Submitted: [24 June 2005]
Lecture 5- Data Link Layer
Wireless LAN Simulation IEEE MAC Protocol
2/24/2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Secure Ranging] Date Submitted: [15 August.
Date Submitted: November 11, 2005]
4/26/2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Secure Ranging] Date Submitted: [19 September.
Signal Waveform Comparisons
Multiplexing Simultaneous transmission of multiple signals across a single data link As data & telecomm use increases, so does traffic Add individual links.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Chapter-7 Special topics in ranging Prof. Jae-Young Pyun Presentation By Amod Pudasaini WHYNET lab Date: 5 th May

Contents Interference mitigation techniques Clear Channel Assessment Privacy and security for ranging signals 2

Interference mitigationtechniques Interference Scenarios Narrowband interference mitigation Multiuser interference in IEEE a networks 3

Interference scenarios(1/3) 4

Interference scenarios(2/3) CaseDescription A Some preamble symbols may get corrupted and those symbol cannot be used for SNR improvement. It impacts range accuracy because the achievable processing gain decreases. B SFD part is affected and frame synchronization is lost. PHR and payload data cannot be decoded. Retransmission is required. 5

Interference scenarios(3/3) CaseDescription C If data rate field of PHR gets corrupted irrecoverably then payload data use is almost impossible. Source of the frame cannot be identified and TOA will be of no importance Retransmission is required. D If interference damage MAC header, the sender cannot be identified. Even after successful acquisition and synchronization MAC payload becomes useless. 6

Narrowband Interference Mitigation(1/3) 7

Narrowband Interference Mitigation(2/3) Divide UWB spectrum into sub bands Deactivate the Sub band that corresponds to frequency band of narrowband device 8

Narrowband Interference Mitigation(3/3) A multicarrier template waveform that consists of several sub band pulses is correlated with the received signal. 9

Multiuser interference in IEEE a networks Users of UWB share a common spectrum and management of multiple access within the same spectrum is important. IEEE a specifies 16 frequency channels and only 2 different preamble sequence is allowed within each band, one for each simultaneously Operating Pico nets (SOP). Multiuser Preamble are constructed from either of two symbols. 10

Multiuser interference in IEEE a networks Different cases of MUI coming from same code User 11 Fig a) With no MUI present the desired output is obtained Fig b) tm<td and Em<Ed, MUI is subjected to be seen as leading path Fig c) tm>td and Em<Ed, MUI would look like another multipath component Fig d) tm>td and Em>Ed, receiver locks in MUI peaks failing the ranging

Multiuser interference in IEEE a networks Relative position of preamble pulse with respect to data burst for T sym =T f 12 T sym : Data Symbol interval T f : Preamble frame interval Fig a) Data Symbol Fig b) preamble pulse falls into guard interval Fig c) Collision of Preamble Pulse and Data burst Fig d) Preamble Pulse and data burst arrive at different half and they do not collide

Multiuser interference in IEEE a networks R pp : Ratio of preamble length to payload length T sym : Data Symbol interval T f : Preamble frame interval 13

Multiuser interference in IEEE a networks 14 Fig a) Interference free Co-relator output Fig b) Co-relator output with transient interference Fig c) Co-relator output with median filtering

Clear Channel Assessment(1/4) Clear Channel Assessment (CCA) is one of the mechanism to sense the channel. The channel is supervised whether it is free or busy to receive a packet from next node. It determines the current state of a wireless medium for collision avoidance. Eg, CSMA/CA In UWB preamble with minimum or near zero autocorrelation are used for time synchronization. The correlation peaks are used to detect preamble. 15

Clear Channel Assessment(2/4) Preamble symbols are multiplexed with the entire PPDU(PHY Protocol Data Unit). Insert preamble into header and payload part of IEEE a packet after every k-symbol long interval. The inserted preamble do not interfere with the data, but reduces data carrying capability.  TDMA-type multiplexed preamble scheme 16 * Si: Preamble Symbol

Clear Channel Assessment(3/4) Periodically repeated preamble symbols are superimposed onto the entire PPDU(PHY Protocol Data Unit) Power level of overlaid preamble is set to lower than data symbols, consequently the circuit complexity is increased.  CDMA-type multiplexed preamble scheme 17

Clear Channel Assessment(4/4) 18

Private Ranging(1/6) An intruder intends to figure out location of sensor and tries to tamper and disable them. Prevent ranging devices from obtaining correct range information A malicious device can behave as a snooper, imposter or jammer Snooper observes signals in secret to obtain information on whereabouts of devices. Imposter engages in deception under an assumed name or identity to cause error in victims range calculations. A jammer simply emits interference to stall communications in a network. 19

Private Ranging(2/6)  Challenge-Response 20

Private Ranging(3/6) Assuming Secret key K is shared A sends a random challenge nonce(i-bit) N j to B B responds with Nj and another random nonce(i-bit) M j A sets timer t j time elapse between challenge and response B sends to A a number v=h k (nj | |m j ), where h k is fast hash function A checks if h k (nj | |m j )=v or not If it is not equal then A considers it as a bogus. 21

Private Ranging(4/6)  Cyclic Shift of perfectly balanced ternary sequences IEEE a signal structure publicly specifies eight length-31 PBTSs for the preamble for ranging. Imposter can acquire a transmitted IEEE a sequence out of a set of eight, especially running 8 correlators in parallel. Cyclic Shift property of ternary sequences is employed to disguise imposter. Assume a ternary symbol waveform expressed as The transmitted ranging waveform is expressed as 22

Private Ranging(5/6)  Cyclic Shift of perfectly balanced ternary sequences 23

Private Ranging(6/6) Cyclic Shift operation preserves the perfect periodic auto correlation property, but it circularly shifts the correlation peaks. Imposters unaware of the cyclic shift index k can still observe ranging waveform, but with ckT s meters error.  Cyclic Shift of perfectly balanced ternary sequences 24

Private Ranging(6/6)  Dynamic Preamble Selection IEEE a Dynamic Preamble Selection(DPS) is used as privacy mechanism for ranging. Authentication message is used between ranging parties to use preamble symbol for ranging In the message, originator defines the target of the ranging symbol to be used in RFRAME req and RFRAME rep frames. Then TW-TOA ranging protocol is run 25

Thank You 26