Embracing interference in wireless systems / Shyamnath Gollakota
- Author:
- Gollakota, Shyamnath
- Published:
- San Rafael : Morgan & Claypool, [2014]
- Physical Description:
- xiv, 157 pages : illustrations ; 24 cm.
- Series:
- ACM Books #1
- Contents:
- Machine generated contents note: ch. 1 Introduction -- 1.1.Embracing Wireless Interference -- 1.1.1.Decoding 802.11 Collisions -- 1.1.2.Combating High-Power Cross-Technology Interference -- 1.1.3.Non-Invasive Approach to Securing Medical Implants -- 1.1.4.Secure Pairing Without Passwords or Prior Secrets -- 1.2.Organization -- ch. 2 Decoding 802.11 Collisions -- 2.1.Related Work -- 2.2.Scope -- 2.3.A Communication Primer -- 2.3.1.Practical Issues -- 2.4.ZigZag Decoding -- 2.4.1.Is It a Collision? -- 2.4.2.Did the AP Receive Two Matching Collisions? -- 2.4.3.How Does the AP Decode Matching Collisions? -- 2.4.4.Estimating and Tracking System Parameters -- 2.5.Dealing with Errors -- 2.6.Backward Compatibility -- 2.7.Beyond Two Interferers -- 2.8.Complexity -- 2.9.Experimental Environment -- 2.9.1.Setup -- 2.9.2.Micro-Evaluation -- 2.9.3.Does ZigZag Work? -- 2.9.4.The Impact of the SNR -- 2.9.5.Testbed Throughput and Loss Rate -- 2.9.6.Many Hidden Terminals -- 2.10.Discussion -- ch. 3 Combating High-Power Cross-Technology Interference -- 3.1.Impact of Cross-Technology Interference on 802.11n -- 3.1.1.Digital Cordless Phone -- 3.1.2.Baby Monitor -- 3.1.3.Microwave Ovens -- 3.1.4.Frequency Hopping Bluetooth -- 3.1.5.Summary -- 3.2.MIMO and OFDM Background -- 3.3.Problem Domain -- 3.4.TIMO -- 3.5.Decoding in the Presence of Cross-Technology Interference -- 3.5.1.Computing the Interferer's Channel Ratio -- 3.5.2.Decoding the Signal of Interest -- 3.5.3.Iterating to Increase Accuracy -- 3.5.4.Estimating the 802.11n Channel Functions -- 3.5.5.Finding the Interference Boundaries -- 3.5.6.Putting it together -- 3.5.7.Complexity -- 3.6.Ensuring The Interferer Can Decode -- 3.7.Implementation -- 3.8.Performance Evaluation -- 3.8.1.Cordless Phone -- 3.8.2.Baby Monitor -- 3.8.3.Microwave Oven -- 3.8.4.Multiple Interferers -- 3.9.Micro Benchmarks -- 3.10.Related Work -- 3.11.Discussion -- ch. 4 Non-Invasive Approach to Securing Medical Implants -- 4.1.IMD Communication Primer -- 4.2.Assumptions and Threat Model -- 4.2.1.Assumptions -- 4.2.2.Threat Model -- 4.3.System Overview -- 4.4.Jammer-Cum-Receiver -- 4.5.Protecting Against Passive Eavesdroppers -- 4.6.Protecting Against Active Adversaries -- 4.7.Implementation -- 4.8.Testing Environment -- 4.9.Evaluation -- 4.9.1.Micro-Benchmark Results -- 4.9.2.Protecting from Passive Adversaries -- 4.9.3.Protecting from Active Adversaries -- 4.10.Coexistence -- 4.11.Related Work -- 4.12.Discussion -- ch. 5 Secure Pairing without Passwords or Prior Secrets -- 5.1.Related Work -- 5.2.PBC and 802.11 Background -- 5.2.1.Push Button Configuration -- 5.2.2.802.11 -- 5.3.Security Model -- 5.3.1.Threat Model -- 5.3.2.Security Guarantees -- 5.4.TEP Design -- 5.4.1.Tamper-Evident Message (TEM) -- 5.4.2.Securing PBC using TEM -- 5.4.3.Example scenarios -- 5.4.4.Making Pairing Faster -- 5.5.TEM on Off-the-shelf Hardware -- 5.5.1.Scheduling Slot Transmission -- 5.5.2.Energy Detection at the Receiver -- 5.5.3.Sending A Synchronization Packet -- 5.5.4.Checking for TEM While Transmitting -- 5.6.Evaluation -- 5.6.1.Evaluating TEP's Security -- 5.6.2.Evaluating TEP's Accuracy -- 5.6.3.Evaluating TEP's Performance -- 5.6.4.Performance with Non-802.11 Traffic -- 5.7.Discussion -- ch. 6 Conclusion -- 6.1.Looking Forward.
- Subject(s):
- ISBN:
- 162705474X and 9781627054744
- Source of Acquisition:
- Purchased with funds from the Paterno Libraries Endowment (Harrisburg); 2016
View MARC record | catkey: 17286758