Publications

Refine Results

(Filters Applied) Clear All

A sub-10mW 2Mbps BFSK transceiver at 1.35 to 1.75GHz.

Published in:
2007 IEEE Radio Frequency Integrated Circuits Symp., 3-5 June 2007, pp. 97-100.
Topic:
R&D group:

Summary

This work presents the design and measurement of a 2Mbps BFSK transceiver at 1.35 to 1.75GHz for use in wireless sensor node applications. The receiver is a direct conversion architecture and has a sensitivity of -74dBm at 2Mbps and consumes 8.0mW. The transmitter generates orthogonal BFSK modulation through the use of digital pre-emphasis of the synthesizer frequency control word and consumes 9.7mW including the power amplifier. The transmitter delivers >3dBm of output power for a total transmitter power efficiency of 23% and a transmitter FOM of 4.85nJ/bit at 2Mbps.
READ LESS

Summary

This work presents the design and measurement of a 2Mbps BFSK transceiver at 1.35 to 1.75GHz for use in wireless sensor node applications. The receiver is a direct conversion architecture and has a sensitivity of -74dBm at 2Mbps and consumes 8.0mW. The transmitter generates orthogonal BFSK modulation through the use...

READ MORE

Information Survivability for Mobile Wireless Systems

Published in:
Lincoln Laboratory Journal, Vol. 12, No. 1, pp. 65-80.

Summary

Mobile wireless networks are more vulnerable to cyber attack and more difficult to defend than conventional wired networks. In discussing security and survivability issues in mobile wireless networks, we focus here on group communication, as applied to multimedia conferencing. The need to conserve resources in wireless networks encourages the use of multicast protocols for group communication, which introduces additional security concerns. We point out the need for rate-adaptation techniques to simultaneously support multiple receivers that each experience different network conditions. The security properties associated with a number of approaches to rate adaptation are compared. We also identify several security issues for reliable group communication, providing examples of denial-of-service attacks and describing appropriate security measures to guard against such attacks. We examine the costs of these security measures in terms of network efficiency and computational overhead. Finally, we introduce a survivability approach called dynamically deployed protocols, in which the effects of an information attack are mitigated by dynamically switching to a new protocol to evade the attack. We suggest that this dynamic protocol deployment can be achieved effectively by transmission of in-line mobile code.
READ LESS

Summary

Mobile wireless networks are more vulnerable to cyber attack and more difficult to defend than conventional wired networks. In discussing security and survivability issues in mobile wireless networks, we focus here on group communication, as applied to multimedia conferencing. The need to conserve resources in wireless networks encourages the use...

READ MORE