Secured Operating Regions of Slotted ALOHA in the Presence of Interfering Signals from Other Networks and DoS Attacking Signals Jahangir H. Sarker and.

Slides:



Advertisements
Similar presentations
Presentation on GSM Network
Advertisements

3G and B3G Deployment China Mobile Research Institute
Comments from on Proposed P802.21b PAR IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE /026r2 Date Submitted:
Where Have All The Sine Waves Gone? David Waitt Kate Disney 2008 April Digitizing An Analog World.
Chapter 1: Introduction
Cellular and Mobile Wireless Networks
Mobile Communications Chapter 3 : Media Access
Networks 5 Mobile Communications Dr John Cowell
College of Engineering Capacity Allocation in Multi-cell UMTS Networks for Different Spreading Factors with Perfect and Imperfect Power Control Robert.
CDMA vs GSM -two main competing network technologies -Global System for Mobile Communications -Code Division Multiple Access.
RISET DAN PERKEMBANGAN TEKNOLOGI WIRELESS ACCESS NETWORKS
Computer Networking Lecture 25??: Cellular Eric Anderson Fall
Tutorial 6 Mobile Communication Networks Mohamed Esam.
Final Year Project Presentation FYP 08 Arsalan Tariq Mir Saad Najeeb Syed Ammar Faheem.
Cellular Networks Lecture 6 Paul Flynn.
Overview of new technologies Jørgen Bach Andersen, Aalborg University, Denmark Sven Kuhn, Rasmus Krigslund, Troels B. Sørensen.
Multiple Access Techniques for wireless communication
Qi Wang July 3rd, Mobile Communication Seminar.
Cellular Phone and Data Standards Past, Present, and Future.
David Waitt Kate Disney 2008 April Digitizing An Analog World.
W-CDMA AIR INTERFACE FOR 3G SYSTEMS By Medapati, Sai Raghavendra Reddy Gadige, Raghunath.
Cellular Internet Connections Bo Kvarnström Center for Radio Network Control, Linköping Ericsson Radio Systems AB
UMTS / 3G Wireless ENGR 475 – Telecommunications November 7, 2006 Harding University Jonathan White.
GSM—Global System for Mobile. 2 How does GSM handle multiple users The 1G cellular systems used FDMA. The first cellular standard adopting TDMA was GSM,
GSM standard (continued)
Wireless and going mobile Browsing via low energy photons.
Overview.  UMTS (Universal Mobile Telecommunication System) the third generation mobile communication systems.
First Generation (1G) Alison Griffiths C203 Ext:3292
GSM Security Overview (Part 1)
Mobile Communication Systems 2 MSc Data Comm Mobile Communication Systems 2 MSc Data Comm Rolando A Carrasco Professor in Mobile Communications BSc(Hons),
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
SAMEER NETAM RAHUL GUPTA PAWAN KUMAR SINGH ONKAR BAGHEL OM PANKAJ EKKA Submitted By:
ECE Department Florida Institute of Technology Wireless Data Communication Networks Lecture 21: GSM evolution.
CSci5221: 3G/4G Cellular Network Architecture Overview 1 Cellular Voice/Data Architectures: A Primer Basics of Cellular Networks Survey of 2G/3G Cellular.
Comparing the two most prevalent mobile communication technologies
GSM Network Architecture
Florida Institute of technologies ECE 5221 Personal Communication Systems Prepared by: Dr. Ivica Kostanic Lecture 12: Frequency allocation and channelization.
1 Cellular communications Cellular communications BASIC TELECOMMUNICATIONS.
Cell Phone Technology. Cell Phone Frequencies Cell phones use full-duplex radios, rather than half-duplex radios like those used in walkie-talkies, so.
Utility Based Scheduling in Cognitive Radio Networks Term Project CmpE-300 Analysis of Algorithms Spring 2009 Computer Engineering, Boğaziçi University,
Orthogonal Frequency Division Multiple Access (OFDMA)
GSM,GPRS & CDMA Technology
by P. Sriploy, M. Uthansakul and R. Wongsan
Mobile Phone Standards
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
MOBILE COMMUNICATIONS Alexandre ELAGUINE & Mikhail BAIAKOVSKI
GSM Global System for Mobile communication
Wireless Transmission and Services Chapter 9. Objectives Associate electromagnetic waves at different points on the wireless spectrum with their wireless.
Arun N. Chandorkar Department of Electrical Engineering
MASNET GroupXiuzhen ChengFeb 8, 2006 Terms and Concepts Behind Wireless Communications.
Multiple Access Protocol ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering Department.
WIDEBAND CODE DIVISION MULTIPLE ACCESS & THE CAPACITY IN CODE DIVISION MULTIPLE ACCESS Presented by Maheshwarnath Behary Assisted by Vishwanee Raghoonundun.
GSM Mohammad AL-adwan. Introduction GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard developed by (ETSI)
Digital Cellular Techniques ENGR 475 – Telecommunications October 26, 2006 Harding University Jonathan White.
A Downlink Data Region Allocation Algorithm for IEEE e OFDMA
UMTS: Universal Mobile Telecommunications System
WCDMA Introduction Code Division Multiple Access
Packet service in UMTS: delay- throughput performance of the downlink shared channel Flaminio Borgonovo, Antonio Capone, Matteo Cesana, Luigi Fratta.
Basics of Wireless Networks – Ch. 2 (pp 6-14)
Communication Protocol Engineering Lab. Hyoung Joo. Nam. 1 GSM System Overview Wireless and Mobile Network Architecture Nam Hyoung-Joo
Performance Analysis of RLC/MAC Protocol in General Packet Radio Service K. Premkumar and A. Chockalingam Wireless Research Lab (
Cellular Network Base stations transmit to and receive from mobiles at the assigned spectrum Multiple base stations use the same spectrum The service area.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
LONG TERM EVOLUTION DANISH HASRAT (091042) DEEPAK SINGH (091043) GAURAV THAWANI (091052) NILESH SINGH (091079)
1 Lecture 20 EEE 441 Wireless And Mobile Communications.
IT351: Mobile & Wireless Computing
Long Term Evolution (LTE)
Third Generation (3G) Mobile Communication Systems
Cellular Networks and Mobile Computing COMS , Spring 2012
Physical Layer (2).
Presentation transcript:

Secured Operating Regions of Slotted ALOHA in the Presence of Interfering Signals from Other Networks and DoS Attacking Signals Jahangir H. Sarker and Hussein T. Mouftah School of Information Technology and Engineering (SITE), University of Ottawa, Ottawa, Ontario, Canada K1N 6N5 J. H. Sarker / SITE.uOttawa.ca/~jsarker

WiSense Seminar November 3, 2011 Outline of the Presentation Potential applications of Slotted ALOHA. GSM-the most successful cellular system. Slotted ALOHA and GSM system. Radio Frequency Identification (RFID)-next most widely used technology. Slotted ALOHA and RFID system. Applications of RFID technology. Slotted ALOHA in the presence of interfering signals from other networks and the DoS attacking signals. Security problem of Slotted ALOHA system in the presence of interfering signals from other networks and the DoS attacking signals. Security improvement using multiple channels and capture. Security improvement by limiting the number of retransmission trials. Security improvement using new packet rejection. Conclusions 2 J. H. Sarker / SITE.uOttawa.ca/~jsarker

Potential Applications of Slotted ALOHA The random access channels (RACH) of Global System for Mobile (GSM) communications The random packet access channels (RPACH) General Packet Radio Services (GPRS) Wideband Code Division Multiple Access (WCDMA) system cdma2000 IEEE IEEE J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

GSM-the Most Successful Cellular System 1/(2) 4 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

GSM-the Most Successful Cellular System 2/(2) 5 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Slotted ALOHA and GSM System 1/(7) 6 Mainly 3 elements – MS – BS – MSC J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Slotted ALOHA and GSM System 2/(2) 7 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Slotted ALOHA and GSM System 3/(7) MHz for uplink MHz for Downlink 200 kHz carrier spacing This gives 124 possible carriers in UL and DL. Fu(n)= (n-1) MHz 1<=n<=124 Fu(n) =Fu(n)+45 MHz J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Slotted ALOHA and GSM System 4/(7) 9 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Slotted ALOHA and GSM System 5/(7) 10 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Slotted ALOHA and GSM System 6/(7) 11 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Slotted ALOHA and GSM System 7/(7) 12 There are five different structures of the RACH [24, 25] with approximately 400,000 and n*780,000 RACH slots per hour (n= 1, 2, 3, 4). It is interesting to know the exact choice of these five different possibilities. According to specifications, a maximum of r retransmissions is allowed for each mobile call during the access period. The parameter r can be set to four different possible values 1, 2, 4 or 7 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

How Slotted ALOHA Works 1/(2)? 13 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

How Slotted ALOHA Works 2/(2)? 14 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

How Mobile RFID Works 1/(4)? 15 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

How Mobile RFID Works 2/(4)? 16 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

How Mobile RFID Works 3/(4)? 17 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

How Mobile RFID Works 4/(4)? 18 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Future Store Checkout with RFID tagged items 19 J. H. Sarker / SITE.uOttawa.ca/~jsarker Video Show WiSense Seminar November 3, 2011

RFID Technology in Construction 1/(3) 20 J. H. Sarker / SITE.uOttawa.ca/~jsarker RFID chips are tied to the rebar at a predetermined location before concrete is poured. The encapsulated RFID tag is placed in the area shown by the red circle. RFID chips are read with a handheld scanner. WiSense Seminar November 3, 2011

RFID Technology in Construction 2/(3) 21 J. H. Sarker / SITE.uOttawa.ca/~jsarker Tunnel segments stored in the Woodstock plant all contain RFID chips that can be scanned through the concrete. The application of RFID for tracking construction materials can provide an accurate and efficient means for reducing time and resources being spent collecting and managing data. In a recent example, the NRC in collaboration with Armtec, has developed a system for tracking precast tunnel liner segments manufactured in Armtec’s Woodstock, Ontario plant. The commercially available encapsulated RFID tags which, during the fabrication process, are embedded in the liner segments. WiSense Seminar November 3, 2011

RFID Technology in Construction 3/(3) 22 J. H. Sarker / SITE.uOttawa.ca/~jsarker As the segments move through the plant, their status (i.e., fabrication, quality, storage and shipping) and associated data are updated by the field crew using mobile computers. Armtec is using the system in its Woodstock plant to track the fabrication and inventory data for 58,000 tunnel liner segments being supplied for the York- Spadina subway extension project in Toronto, for two 6.5 km tunnels. The system helps reduce time and resources spent locating concrete units in the storage yard and managing production and quality control data. Another key benefit of the system is that it generates the product handover documentation in electronic format that many asset owners are now requesting. For example, the product handover documentation is currently used by Toronto Transit Commission (TTC) construction contractors working at the subway site to validate the materials received. Source: RFID-based life cycle tracking of precast concrete units WiSense Seminar November 3, 2011

RFID Technology and Printed Electronics 1/(3) 23 J. H. Sarker / SITE.uOttawa.ca/~jsarker Electronic devices can be printed on commercial off-set machines. (Source: pmTUC) Reel-to-reel flexographic printing of electronic devices. (Source: Acreo) Dimatix Materials Printer (DMP) DMP-2800 Series Printer FUJIFILM RFID can be used widely in almost all items Printed electronics opened that door WiSense Seminar November 3, 2011

RFID Technology and Printed Electronics 2/(3) 24 J. H. Sarker / SITE.uOttawa.ca/~jsarker Printed RFID tags (Source: PolyIC) Printed RFID tag.(Source: PolyIC) WiSense Seminar November 3, 2011

RFID Technology and Printed Electronics 3/(3) 25 J. H. Sarker / SITE.uOttawa.ca/~jsarker RFID can be used widely in almost all items Price per tag is an important issue WiSense Seminar November 3, 2011

Success of Printed Electronics 26 J. H. Sarker / SITE.uOttawa.ca/~jsarker Intelligent Packaging Application WiSense Seminar November 3, 2011

Biomedical Applications of RFID 27 J. H. Sarker / SITE.uOttawa.ca/~jsarker Wearable RFID-Enabled Sensor Nodes for Biomedical Applications Source: Wearable RFID-Enabled Sensor Nodes for Biomedical Applications, Li Yang, Rushi Vyas, Amin Rida, Jonathan Pan, and Manos M. Tentzeris, IEEE 2008 WiSense Seminar November 3, 2011

Biosensor and Indicator & RFID 28 J. H. Sarker / SITE.uOttawa.ca/~jsarker Inkjet printed oxygen indicator Source: VTT 2008 Printed enzymatic power supply with integrated capacitor Active RFID tag is better WiSense Seminar November 3, 2011

Organic RFID 29 J. H. Sarker / SITE.uOttawa.ca/~jsarker Source: Design and manufacturing of organic RFID circuits Coping with intrinsic parameter variations in organic devices by circuit design, Jan Genoe, Kris Myny, Soeren Steudel, and Paul Heremans, IEEE 2010 WiSense Seminar November 3, 2011

Multi-channel Slotted ALOHA System in the Presence of Interference from other Net. & Attacking Signals 30 J. H. Sarker / SITE.uOttawa.ca/~jsarker Application of Slotted ALOHA with retransmission cut-off is huge Interference from other Net. DoS attacking signals WiSense Seminar November 3, 2011

Security Improvements of Slotted ALOHA System 31 J. H. Sarker / SITE.uOttawa.ca/~jsarker Four ways of improving the security 1 & 2. Security improvement using multiple channels and capture. 3. Security improvement by limiting the number of retransmission trials 4. Security improvement using new packet rejection WiSense Seminar November 3, 2011

Security Problem under DoS Attacking Signal & Interference from Other Networks 32 J. H. Sarker / SITE.uOttawa.ca/~jsarker Interference from other Net. DoS attacking signals WiSense Seminar November 3, 2011

Security Improvement Using Capture 33 J. H. Sarker / SITE.uOttawa.ca/~jsarker Improvement with capture 1Improvement with capture 2 WiSense Seminar November 3, 2011

Security Improvement using Multiple Channels 34 1-channel system 5-channel system J. H. Sarker / SITE.uOttawa.ca/~jsarker Improvement with multi-channel WiSense Seminar November 3, 2011

Security Improvement using Multiple Channels 35 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Security Improvement using Multiple Channels & Capture 36 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Security Improvement by Limiting the Number of Retransmission Trials 37 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Security Improvement using New Packet Rejection 38 J. H. Sarker / SITE.uOttawa.ca/~jsarker The y-axis should be multiplied by Source: Secured Operating Regions of Slotted ALOHA in the Presence of Interfering Signals from Other Networks and DoS Attacking Signals, Journal of Advanced Research – Elsevier, 2011, Vol. 2, Issue 3, July 2011,Journal of Advanced Research – ElsevierVol. 2, Issue 3 pp Available at WiSense Seminar November 3, 2011

Conclusions 39 The potential application of Slotted ALOHA based technologies are presented The security improvement of Slotted ALOHA in the presence of interference from other networks and DoS attacking signals is studied The current security protected measures such as encryption makes the packets unreadable by unauthorized users. The authentication technique is used to protect the system from illegal users and authorization separates the legal users. In a Slotted ALOHA based network, the interference from other networks and DoS attacking noise packets may collide with message packets and reduces the secured transmission. We have used four different techniques to improve the security of Slotted ALOHA. Security improvement using multiple channels – The use of multiple channels in the Slotted ALOHA protocol reduces the packet collisions Security improvement using capture effect – Capture effect reduces the packet collisions – 3 types of captures are considered Security improvement by limiting the number of retransmission trials. – The retransmissions cut-off technique can limit the aggregate packet flow – It is possible that the 3rd technique retransmissions cut-off technique is not enough to control the flow of message packets. Because of that the 4th technique called new packet rejection probability is introduced. – The system is secured or stable with almost any high value of new packet generation rate. J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Thank you 40 Thanks a lot for your kind attention J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011

Questions? 41 J. H. Sarker / SITE.uOttawa.ca/~jsarker WiSense Seminar November 3, 2011