Staff View
PHY-techniques to improve higher-layer functions in wireless networks

Descriptive

TypeOfResource
Text
TitleInfo (ID = T-1)
Title
PHY-techniques to improve higher-layer functions in wireless networks
Identifier
ETD_1617
Identifier (type = hdl)
http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.000051424
Language
LanguageTerm (authority = ISO639-2); (type = code)
eng
Genre (authority = marcgt)
theses
Subject (ID = SBJ-1); (authority = RUETD)
Topic
Electrical and Computer Engineering
Subject (ID = SBJ-1); (authority = ETD-LCSH)
Topic
Wireless sensor networks
Subject (ID = SBJ-1); (authority = ETD-LCSH)
Topic
Wireless communication systems
Abstract
The wireless medium contains location-specific
information at various scales, and thus it can serve in multiple ways to enhance the performance of wireless networks. In this thesis we study the use of physical-layer information to improve higher-layer functions in the following categories: (1) the use of
the measured large-scale channel gain variations (due to power spreading and shadowing) to estimate signal outage and to perform mobile localization; and (2) the use of the measured small-scale channel gain variations (due to multipath) to improve wireless network security.
We first consider sensor networks that record received signal strength for estimating and updating network performance. Using a generic path-loss model incorporating distance effects and shadow fading, we apply the principle of importance sampling to the sensor placements. This helps to minimize measurement costs while accurately estimating outage probability and coverage holes, thereby improving the radio resource management of wireless systems. We also analyze the use of sensor networks to locate
mobiles, and we propose four simple-yet-accurate localization algorithms that meet E-911 requirements in most environments. The localization performance can be further improved by implementing a minimum mean square error (MMSE) algorithm which meets the
Cramer-Rao lower bound. However, the four simple proposed algorithms have much lower numerical complexity than MMSE for real-time operation and require little a priori knowledge of the channel parameters.
Next, we exploit the rapid-decorrelation property of the multipath channel to enhance security in environments with rich scattering. We propose a channel-based authentication scheme to detect both spoofing attacks (a spoofing node pretends to be another node to gain access to network resources); and Sybil attacks (a Sybil node maliciously sends multiple service requests with different identities, in hopes of depleting network resources). The scheme uses little additional system overhead, as it exploits pilots or preambles that already exist in most wireless systems. A double-layer authentication protocol is devised, whereby the scheme either combines with higher-layer security mechanisms, such as 802.11i or works independently with some performance degradation. Verification that PHY-based authentication provides good performance is performed using several methods, specifically,
stochastic channel modeling, site-specific ray-tracing and field tests.
PhysicalDescription
Form (authority = gmd)
electronic resource
Extent
xix, 132 p. : ill.
InternetMediaType
application/pdf
InternetMediaType
text/xml
Note (type = degree)
Ph.D.
Note (type = bibliography)
Includes bibliographical references (p. 125-129)
Note (type = statement of responsibility)
by Liang Xiao
Name (ID = NAME-1); (type = personal)
NamePart (type = family)
Xiao
NamePart (type = given)
Liang
NamePart (type = date)
1980
Role
RoleTerm (authority = RULIB); (type = )
author
DisplayForm
Liang Xiao
Name (ID = NAME-2); (type = personal)
NamePart (type = family)
Mandayam
NamePart (type = given)
Narayan
Role
RoleTerm (authority = RULIB); (type = )
chair
Affiliation
Advisory Committee
DisplayForm
Narayan Mandayam
Name (ID = NAME-3); (type = personal)
NamePart (type = family)
Trappe
NamePart (type = given)
Wade
Role
RoleTerm (authority = RULIB); (type = )
internal member
Affiliation
Advisory Committee
DisplayForm
Wade Trappe
Name (ID = NAME-4); (type = personal)
NamePart (type = family)
Greenstein
NamePart (type = given)
Larry
Role
RoleTerm (authority = RULIB); (type = )
internal member
Affiliation
Advisory Committee
DisplayForm
Larry Greenstein
Name (ID = NAME-5); (type = personal)
NamePart (type = family)
Valenzuela
NamePart (type = given)
Reinaldo
Role
RoleTerm (authority = RULIB); (type = )
outside member
Affiliation
Advisory Committee
DisplayForm
Reinaldo Valenzuela
Name (ID = NAME-1); (type = corporate)
NamePart
Rutgers University
Role
RoleTerm (authority = RULIB); (type = )
degree grantor
Name (ID = NAME-2); (type = corporate)
NamePart
Graduate School - New Brunswick
Role
RoleTerm (authority = RULIB); (type = )
school
OriginInfo
DateCreated (point = ); (qualifier = exact)
2009
DateOther (qualifier = exact); (type = degree)
2009-05
Place
PlaceTerm (type = code)
xx
RelatedItem (type = host)
TitleInfo
Title
Rutgers University Electronic Theses and Dissertations
Identifier (type = RULIB)
ETD
RelatedItem (type = host)
TitleInfo
Title
Graduate School - New Brunswick Electronic Theses and Dissertations
Identifier (type = local)
rucore19991600001
Location
PhysicalLocation (authority = marcorg); (displayLabel = Rutgers, The State University of New Jersey)
NjNbRU
Identifier (type = doi)
doi:10.7282/T3H41RN4
Genre (authority = ExL-Esploro)
ETD doctoral
Back to the top

Rights

RightsDeclaration (AUTHORITY = GS); (ID = rulibRdec0006)
The author owns the copyright to this work.
Copyright
Status
Copyright protected
Availability
Status
Open
RightsEvent (AUTHORITY = rulib); (ID = 1)
Type
Permission or license
Detail
Non-exclusive ETD license
AssociatedObject (AUTHORITY = rulib); (ID = 1)
Type
License
Name
Author Agreement License
Detail
I hereby grant to the Rutgers University Libraries and to my school the non-exclusive right to archive, reproduce and distribute my thesis or dissertation, in whole or in part, and/or my abstract, in whole or in part, in and from an electronic format, subject to the release date subsequently stipulated in this submittal form and approved by my school. I represent and stipulate that the thesis or dissertation and its abstract are my original work, that they do not infringe or violate any rights of others, and that I make these grants as the sole owner of the rights to my thesis or dissertation and its abstract. I represent that I have obtained written permissions, when necessary, from the owner(s) of each third party copyrighted matter to be included in my thesis or dissertation and will supply copies of such upon request by my school. I acknowledge that RU ETD and my school will not distribute my thesis or dissertation or its abstract if, in their reasonable judgment, they believe all such rights have not been secured. I acknowledge that I retain ownership rights to the copyright of my work. I also retain the right to use all or part of this thesis or dissertation in future works, such as articles or books.
Back to the top

Technical

ContentModel
ETD
MimeType (TYPE = file)
application/pdf
MimeType (TYPE = container)
application/x-tar
FileSize (UNIT = bytes)
839680
Checksum (METHOD = SHA1)
cc0b1fa589fcf9f059959f5c7a9bb79af7f33011
Back to the top
Version 8.5.5
Rutgers University Libraries - Copyright ©2024