Interference Robustness and Security of Impulse-Radio Ultra-Wide Band Networks

作者: Manuel Flury

DOI: 10.5075/EPFL-THESIS-4698

关键词:

摘要: In this thesis we study Impulse-Radio Ultra-Wide Band (IR-UWB), a physical layer radio technology offering many features that make it promising choice for future short-range wireless networks. The challenges in such networks are many, ranging from the cost-complexity constraints of devices, through presence interference created by other users, up to stringent security requirements imposed sensitive applications. Our main goal is understand and show how low-complexity IR-UWB receiver can be designed able cope with difficult environment will face Although systems promise provide solution some above-mentioned challenges, not panacea: More often than not, live its promises only if entire system carefully designed. One example robustness concurrent which topic first part thesis. Short-range expected self-organized uncoordinated rather centrally organized. This turn leads uncontrolled due transmissions devices. Thanks large bandwidth, combined low duty-cycle transmissions, should theory accommodate number users while keeping multi-user (MUI) levels low. We that, properly addressed, MUI severely affect performance an receiver, making benefit void. especially true complexity architectures, as popular non-coherent energy-detection used. Further, affects all aspects packet reception appropriate algorithms deal thus required at every level. crucial step receive data signal acquisition. present robust algorithm allows reliable acquisition MUI, even near-far scenarios. After acquisition, performs phase channel estimation. Channel estimation particular importance mitigation: distinguish user interest MUI. case receivers compliant standard IEEE 802.15.4a, challenging because signalling structure changes within packet. introduce novel takes peculiarity into account design 802.15.4a final receiving demodulation decoding payload. adaptive thresholding scheme uses state information, obtained during estimation, yield very good against also more sophisticated based on statistical modeling they additional increase second investigate clock-offset tracking receivers. Clock-offset needed oscillators driving clocks average quality best. resulting desynchronization between transmitter may lead huge degradation To overcome sensitivity clock offsets, constructed around Radon transform, image processing tool traditionally used detect line images. fully compatible standard, does hardware reduces loss offsets marginal third thesis, look viewpoint security. evaluate what extent vulnerable distance-decreasing attacks layer. These target mechanism two devices estimate their mutual distance. Commonly, secured secure protocols employing cryptographic mechanisms guarantee estimated distance upper-bound actual However, new breed bypasses these mechanisms, introduced higher communication layers, directly attacking Understanding impact utmost importance: high precision capabilities natural candidate applications, has been specifically ranging. analysis shows automatically attacks. find mandatory modes no countermeasures place, external attacker decrease measured one hundred meters probability.

参考文章(166)
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore, So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Lecture Notes in Computer Science. pp. 83- 97 ,(2006) , 10.1007/11964254_9
W.M. Lovelace, J.K. Townsend, Chip discrimination for large near far power ratios in UWB networks military communications conference. ,vol. 2, pp. 868- 873 ,(2003) , 10.1109/MILCOM.2003.1290237
Z. Kfir, A. Wool, Picking Virtual Pockets using Relay Attacks on Contactless Smartcard international workshop on security. pp. 47- 58 ,(2005) , 10.1109/SECURECOMM.2005.32
A.R. Forouzan, M. Nasiri-Kenari, J.A. Salehi, Performance analysis of ultrawideband time-hopping code division multiple access systems: uncoded and coded schemes international conference on communications. ,vol. 10, pp. 3017- 3021 ,(2001) , 10.1109/ICC.2001.937226
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
D.R. McKinstry, R.M. Buehrer, Issues in the performance and covertness of UWB communications systems midwest symposium on circuits and systems. ,vol. 3, ,(2002) , 10.1109/MWSCAS.2002.1187111
Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, Paul Syverson, Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks ad hoc networks. pp. 279- 298 ,(2006) , 10.1007/978-0-387-46276-9_12
Jean-Yves Le Boudec, Bozidar Radunovic, Raymond Knopp, Optimal PHY and MAC Protocols for Wide-Band Ad-Hoc Networks Forty-Fifth Annual Allerton Conference. ,(2007)