Publications

Refine Results

(Filters Applied) Clear All

Optimizing media access strategy for competing cognitive radio networks

Published in:
GLOBECOM 2013: 2013 IEEE Global Communications Conf., 9-13 December 2013.

Summary

This paper describes an adaptation of cognitive radio technology for tactical wireless networking. We introduce Competing Cognitive Radio Network (CCRN) featuring both communicator and jamming cognitive radio nodes that strategize in taking actions on an open spectrum under the presence of adversarial threats. We present the problem in the Multi-armed Bandit (MAB) framework and develop the optimal media access strategy consisting of mixed communicator and jammer actions in a Bayesian setting for Thompson sampling based on extreme value theory. Empirical results are promising that the proposed strategy seems to outperform Lai & Robbins and UCB, some of the most important MAB algorithms known to date.
READ LESS

Summary

This paper describes an adaptation of cognitive radio technology for tactical wireless networking. We introduce Competing Cognitive Radio Network (CCRN) featuring both communicator and jamming cognitive radio nodes that strategize in taking actions on an open spectrum under the presence of adversarial threats. We present the problem in the Multi-armed...

READ MORE

Competing Mobile Network Game: embracing antijamming and jamming strategies with reinforcement learning

Published in:
2013 IEEE Conf. on Communications and Network Security (CNS), 14-16 October 2013, pp. 28-36.

Summary

We introduce Competing Mobile Network Game (CMNG), a stochastic game played by cognitive radio networks that compete for dominating an open spectrum access. Differentiated from existing approaches, we incorporate both communicator and jamming nodes to form a network for friendly coalition, integrate antijamming and jamming subgames into a stochastic framework, and apply Q-learning techniques to solve for an optimal channel access strategy. We empirically evaluate our Q-learning based strategies and find that Minimax-Q learning is more suitable for an aggressive environment than Nash-Q while Friend-or-for Q-learning can provide the best solution under distributed mobile ad hoc networking scenarios in which the centralized control can hardly be available.
READ LESS

Summary

We introduce Competing Mobile Network Game (CMNG), a stochastic game played by cognitive radio networks that compete for dominating an open spectrum access. Differentiated from existing approaches, we incorporate both communicator and jamming nodes to form a network for friendly coalition, integrate antijamming and jamming subgames into a stochastic framework...

READ MORE

Reconfigurable RF systems using commercially available digital capacitor arrays

Published in:
38th Annual GOMACTech Conf., 11-14 March 2013.
R&D group:

Summary

Various RF circuit blocks implemented by using commercially available MEMS digital capacitor arrays are presented for reconfigurable RF systems. The designed circuit blocks are impedance-matching network, tunable bandpass filter, and VSWR sensor. The frequency range of the designed circuits is 0.4-4GHz. The MEMS digital capacitor arrays that are employed in the designs have built-in dc-to-dc voltage converter and serial interface significantly simplifying the control circuitry. The RF circuit blocks are suitable to low-cost, high-level of integration, thanks to the commercially available parts and standard RF packaging technologies.
READ LESS

Summary

Various RF circuit blocks implemented by using commercially available MEMS digital capacitor arrays are presented for reconfigurable RF systems. The designed circuit blocks are impedance-matching network, tunable bandpass filter, and VSWR sensor. The frequency range of the designed circuits is 0.4-4GHz. The MEMS digital capacitor arrays that are employed in...

READ MORE

Uses for field communication data in designing air traffic management decision support

Published in:
10th Conf. on Naturalistic Decision Making, 31 May 2011.

Summary

In this paper, example uses of field communication data are provided and how these data impact the evolution of the Route Availability Planning Tool (RAPT) for air traffic management is introduced. Simple communications analyses are provided that illustrate how communications can be used to improve what decision support is provided, who it is provided to, and in what context to present the support. Communications data is also shown to aid in contextualizing the decision support to better fit within the decision support framework in existence, which is critical to the success of situation awareness systems.
READ LESS

Summary

In this paper, example uses of field communication data are provided and how these data impact the evolution of the Route Availability Planning Tool (RAPT) for air traffic management is introduced. Simple communications analyses are provided that illustrate how communications can be used to improve what decision support is provided...

READ MORE

Channel engineering of SOI MOSFETs for RF applications

Summary

Channel engineering of SOI MOSFETs is explored by altering ion implantation without adding any new fabrication steps to the standard CMOS process. The effects of implantation on characteristics important for RF applications, such as transconductance, output resistance, breakdown voltage, are compared. Data show that the best overall RF MOSFET has no body and drain-extension implants.
READ LESS

Summary

Channel engineering of SOI MOSFETs is explored by altering ion implantation without adding any new fabrication steps to the standard CMOS process. The effects of implantation on characteristics important for RF applications, such as transconductance, output resistance, breakdown voltage, are compared. Data show that the best overall RF MOSFET has...

READ MORE

A sub-10mW 2Mbps BFSK transceiver at 1.35 to 1.75GHz.

Published in:
2007 IEEE Radio Frequency Integrated Circuits Symp., 3-5 June 2007, pp. 97-100.
Topic:
R&D group:

Summary

This work presents the design and measurement of a 2Mbps BFSK transceiver at 1.35 to 1.75GHz for use in wireless sensor node applications. The receiver is a direct conversion architecture and has a sensitivity of -74dBm at 2Mbps and consumes 8.0mW. The transmitter generates orthogonal BFSK modulation through the use of digital pre-emphasis of the synthesizer frequency control word and consumes 9.7mW including the power amplifier. The transmitter delivers >3dBm of output power for a total transmitter power efficiency of 23% and a transmitter FOM of 4.85nJ/bit at 2Mbps.
READ LESS

Summary

This work presents the design and measurement of a 2Mbps BFSK transceiver at 1.35 to 1.75GHz for use in wireless sensor node applications. The receiver is a direct conversion architecture and has a sensitivity of -74dBm at 2Mbps and consumes 8.0mW. The transmitter generates orthogonal BFSK modulation through the use...

READ MORE

An end-to-end demonstration of a receiver array based free-space photon counting communications link

Published in:
SPIE Vol. 6304, Free-Space Laser Communications VI, 13-17 August 2006, pp. 63040H-1 - 63040H-13.

Summary

NASA anticipates a significant demand for long-haul communications service from deep-space to Earth in the near future. To address this need, a substantial effort has been invested in developing a free-space laser communications system that can be operated at data rates that are 10-1000 times higher than current RF systems. We have built an endto- end free-space photon counting testbed to demonstrate many of the key technologies required for a deep space optical receiver. The testbed consists of two independent receivers, each using a Geiger-mode avalanche photodiode detector array. A hardware aggregator combines the photon arrivals from the two receivers and the aggregated photon stream is decoded in real time with a hardware turbo decoder. We have demonstrated signal acquisition, clock synchronization, and error free communications at data rates up to 14 million bits per second while operating within 1 dB of the channel capacity with an efficiency of greater than 1 bit per incident photon.
READ LESS

Summary

NASA anticipates a significant demand for long-haul communications service from deep-space to Earth in the near future. To address this need, a substantial effort has been invested in developing a free-space laser communications system that can be operated at data rates that are 10-1000 times higher than current RF systems...

READ MORE

Robust collaborative multicast service for airborne command and control environment

Summary

RCM (Robust Collaborative Multicast) is a communication service designed to support collaborative applications operating in dynamic, mission-critical environments. RCM implements a set of well-specified message ordering and reliability properties that balance two conflicting goals: a)providing low-latency, highly-available, reliable communication service, and b) guaranteeing global consistency in how different participants perceive their communication. Both of these goals are important for collaborative applications. In this paper, we describe RCM, its modular and flexible design, and a collection of simple, light-weight protocols that implement it. We also report on several experiments with an RCM prototype in a test-bed environment.
READ LESS

Summary

RCM (Robust Collaborative Multicast) is a communication service designed to support collaborative applications operating in dynamic, mission-critical environments. RCM implements a set of well-specified message ordering and reliability properties that balance two conflicting goals: a)providing low-latency, highly-available, reliable communication service, and b) guaranteeing global consistency in how different participants perceive...

READ MORE

Information Survivability for Mobile Wireless Systems

Published in:
Lincoln Laboratory Journal, Vol. 12, No. 1, pp. 65-80.

Summary

Mobile wireless networks are more vulnerable to cyber attack and more difficult to defend than conventional wired networks. In discussing security and survivability issues in mobile wireless networks, we focus here on group communication, as applied to multimedia conferencing. The need to conserve resources in wireless networks encourages the use of multicast protocols for group communication, which introduces additional security concerns. We point out the need for rate-adaptation techniques to simultaneously support multiple receivers that each experience different network conditions. The security properties associated with a number of approaches to rate adaptation are compared. We also identify several security issues for reliable group communication, providing examples of denial-of-service attacks and describing appropriate security measures to guard against such attacks. We examine the costs of these security measures in terms of network efficiency and computational overhead. Finally, we introduce a survivability approach called dynamically deployed protocols, in which the effects of an information attack are mitigated by dynamically switching to a new protocol to evade the attack. We suggest that this dynamic protocol deployment can be achieved effectively by transmission of in-line mobile code.
READ LESS

Summary

Mobile wireless networks are more vulnerable to cyber attack and more difficult to defend than conventional wired networks. In discussing security and survivability issues in mobile wireless networks, we focus here on group communication, as applied to multimedia conferencing. The need to conserve resources in wireless networks encourages the use...

READ MORE

Security implications of adaptive multimedia distribution

Published in:
Proc. IEEE Int. Conf. on Communications, Multimedia and Wireless, Vol. 3, 6-10 June 1999, pp. 1563-1567.

Summary

We discuss the security implications of different techniques used in adaptive audio and video distribution. Several sources of variability in the network make it necessary for applications to adapt. Ideally, each receiver should receive media quality commensurate with the capacity of the path leading to it from each sender. Several different techniques have been proposed to provide such adaptation. We discuss the implications of each technique for confidentiality, authentication, integrity, and anonymity. By coincidence, the techniques with better performance also have better security properties.
READ LESS

Summary

We discuss the security implications of different techniques used in adaptive audio and video distribution. Several sources of variability in the network make it necessary for applications to adapt. Ideally, each receiver should receive media quality commensurate with the capacity of the path leading to it from each sender. Several...

READ MORE