• 제목/요약/키워드: physical layer protocol

검색결과 126건 처리시간 0.023초

Protocol-Aware Radio Frequency Jamming inWi-Fi and Commercial Wireless Networks

  • Hussain, Abid;Saqib, Nazar Abbas;Qamar, Usman;Zia, Muhammad;Mahmood, Hassan
    • Journal of Communications and Networks
    • /
    • 제16권4호
    • /
    • pp.397-406
    • /
    • 2014
  • Radio frequency (RF) jamming is a denial of service attack targeted at wireless networks. In resource-hungry scenarios with constant traffic demand, jamming can create connectivity problems and seriously affect communication. Therefore, the vulnerabilities of wireless networks must be studied. In this study, we investigate a particular type of RF jamming that exploits the semantics of physical (PHY) and medium access control (MAC) layer protocols. This can be extended to any wireless communication network whose protocol characteristics and operating frequencies are known to the attacker. We propose two efficient jamming techniques: A low-data-rate random jamming and a shot-noise based protocol-aware RF jamming. Both techniques use shot-noise pulses to disrupt ongoing transmission ensuring they are energy efficient, and they significantly reduce the detection probability of the jammer. Further, we derived the tight upper bound on the duration and the number of shot-noise pulses for Wi-Fi, GSM, and WiMax networks. The proposed model takes consider the channel access mechanism employed at the MAC layer, data transmission rate, PHY/MAC layer modulation and channel coding schemes. Moreover, we analyze the effect of different packet sizes on the proposed jamming methodologies. The proposed jamming attack models have been experimentally evaluated for 802.11b networks on an actual testbed environment by transmitting data packets of varying sizes. The achieved results clearly demonstrate a considerable increase in the overall jamming efficiency of the proposed protocol-aware jammer in terms of packet delivery ratio, energy expenditure and detection probabilities over contemporary jamming methods provided in the literature.

An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks

  • Byun, Sang-Seon
    • Journal of Information Processing Systems
    • /
    • 제12권1호
    • /
    • pp.73-82
    • /
    • 2016
  • In cognitive radio networks (CRNs), the performance of the transmission control protocol (TCP) at the secondary user (SU) severely drops due to the mistrigger of congestion control. A long disruption is caused by the transmission of primary user, leading to the mistrigger. In this paper, we propose a cross-layer approach, called a CR-aware scheme that enhances TCP performance at the SU. The scheme is a sender side addition to the standard TCP (i.e., TCP-NewReno), and utilizes an explicit cross-layer signal delivered from a physical (or link) layer and the signal gives an indication of detecting the primary transmission (i.e., transmission of the primary user). We evaluated our scheme by implementing it onto a software radio platform, the Universal Software Radio Peripheral (USRP), where many parts of lower layer operations (i.e., operations in a link or physical layer) run as user processes. In our implementation, we ran our CR-aware scheme over IEEE 802.15.4. Furthermore, for the purpose of comparison, we implemented a selective ACK-based local recovery scheme that helps TCP isolate congestive loss from a random loss in a wireless section.

지능형 교통체제에서 차량 단말장치의 DSRC 통신기술 설계 (The Design for DSRC Communication Technology of On Board Equipment in the Intelligent Transport System)

  • 이대식
    • 디지털산업정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.135-142
    • /
    • 2012
  • DSRC system is a communication system that consists of road side equipment and on board equipment to provide services of communication technology for intelligent transportation systems. In this paper, we carry out a short-range dedicated high-speed wireless communications via DSRC system based on board equipment that is installed in the vehicle and road side equipment through wireless channels of communication. on board equipment is system that have a memory which initialization information is stored, it loads physical layer and MAC layer, LLC layer, L7 layer in turn. In the upper, it should analyze the various commands that are sent from roadside base stations, and carry out the operation which is in accordance with the command. and also it designs the structure of protocol stack which is TRM Layer loaded that is to initialize on L7 layer and MAC layer and efficiently designs operation between on board equipment and the road side equipment.

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung;Son, Pham Ngoc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4623-4643
    • /
    • 2015
  • This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.

HDB-3 스크램블링과 HDLC 프로토콜에서 효율적 문자부호 전송을 위한 문자부호 작성 규칙 (Composition Rule of Character Codes to efficiently transmit in HDLC Protocol with HDB-3 Scrambling)

  • 홍완표
    • 한국항행학회논문지
    • /
    • 제16권5호
    • /
    • pp.831-838
    • /
    • 2012
  • 정보 기기 내에서 문자를 어떠한 규칙에 의해 부호화하는가에 따라 데이터 전송효율을 제고시킬 수 있다. 본 논문은 데이터 전송 효율면에서 OSI 표현계층에서 이루어지는 문자부호화 원칙을 제시하였다. 본 논문에서 제시하는 문자부호화 원칙은 두가지점을 고려하여 제시되었다 첫째는 OSI 데이터링크 계층의 HDLC와 PPP 프로토콜의 플래그 필드를 구성하는 비트열이다. 둘째는 OSI 물리계층에서 이루어지는 HDB-3 스크램블링 방식이다. 첫 번째 고려사항에서는 원천부호에 비트"1"이 연속하여 다섯 개 이상 발생치 않도록 하는 것이다. 두번째 고려사항에서는 원천부호에 비트"0"이 연속하여 네 개 이상 발생치 않도록 하는 것이다. 본 논문에서 제시하고 있는 원천부호화 규칙에 의하여 문자를 원천부호화 할 때에 데이터의 전송효율을 제고시키게 된다.

물리 계층의 다양성과 무선 랜의 성능에 미치는 영향 (Physical Layer Diversity and its Effects on the Performance of WLANs)

  • 최선웅;박기홍;김종권
    • 한국정보과학회논문지:정보통신
    • /
    • 제32권6호
    • /
    • pp.723-731
    • /
    • 2005
  • 오늘날 인프라 무선 랜은 많은 사용자들이 사용하는 중요한 인터넷 접속 기술이다. 지금까지 무선 랜에 관한 연구들은 물리 계층의 채널 다양성으로 인하여 발생하는 모델링 부정확성에 대해 충분히 고려하지 않고, MAC 프로토콜의 향상 및 분석 그리고 시뮬레이션을 통한 성능 평가에만 초점을 맞추어 왔다. 본 논문에서는 계층 상호 간의 의존성의 중요성에 주목하는 새로운 시각으로 IEEE 802.11 무선 랜의 특성을 고찰한다. 실제 무선 랜 시스템 상에서 실험을 수행하여 물리 계층에서 발생하는 불평등성을 관찰하였다. 그리고, 그것이 노드들 간의 혼잡 수준을 떨어뜨리는 역할을 하여 경쟁 기반의 MAC 처리율이 혼잡 상태에서도 서서히 감소하는 것을 보인다. 반면에 노드들 간의 공평성과 노드 처리율의 안정성은 시스템 입력 로드가 특정 수준을 넘으면 크게 저하되는 것을 보인다. 이와 같은 결과를 통하여, 처리율을 높이기 위해 링크 계층에서 제어를 할 필요성은 적은 반면에, 공평한 자원 분배나 서비스의 품질을 보장하기 위해서는 트래픽 제어가 필요하다는 것을 알 수 있다. 시스템의 성능 평가를 위하여 시뮬레이션과 실험을 병행하였다.

An Energy Efficient Multichannel MAC Protocol for QoS Provisioning in MANETs

  • Kamruzzaman, S.M.;Hamid, Md. Abdul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권4호
    • /
    • pp.684-702
    • /
    • 2011
  • This paper proposes a TDMA-based multichannel medium access control (MAC) protocol for QoS provisioning in mobile ad hoc networks (MANETs) that enables nodes to transmit their packets in distributed channels. The IEEE 802.11 standard supports multichannel operation at the physical (PHY) layer but its MAC protocol is designed only for a single channel. The single channel MAC protocol does not work well in multichannel environment because of the multichannel hidden terminal problem. Our proposed protocol enables nodes to utilize multiple channels by switching channels dynamically, thus increasing network throughput. Although each node of this protocol is equipped with only a single transceiver but it solves the multichannel hidden terminal problem using temporal synchronization. The proposed energy efficient multichannel MAC (EM-MAC) protocol takes the advantage of both multiple channels and TDMA, and achieves aggressive power savings by allowing nodes that are not involved in communications to go into power saving "sleep mode". We consider the problem of providing QoS guarantee to nodes as well as to maintain the most efficient use of scarce bandwidth resources. Our scheme improves network throughput and lifetime significantly, especially when the network is highly congested. The simulation results show that our proposed scheme successfully exploits multiple channels and significantly improves network performance by providing QoS guarantee in MANETs.

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks

  • Xu, Xiaorong;Hu, Andi;Yao, Yingbiao;Feng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.1-19
    • /
    • 2020
  • In an underlay cognitive simultaneous wireless information and power transfer (SWIPT) network, communication from secondary user (SU) to secondary destination (SD) is accomplished with decode-and-forward (DF) relays. Multiple energy-constrained relays are assumed to harvest energy from SU via power splitting (PS) protocol and complete SU secure information transmission with beamforming. Hence, physical layer security (PLS) is investigated in cognitive SWIPT network. In order to interfere with eavesdropper and improve relay's energy efficiency, a destination-assisted jamming scheme is proposed. Namely, SD transmits artificial noise (AN) to interfere with eavesdropping, while jamming signal can also provide harvested energy to relays. Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization. We solve this non-convex optimization problem via a general two-stage procedure. Firstly, we obtain the optimal beamforming vector through semi-definite relaxation (SDR) method with a fixed power splitting ratio. Secondly, the best power splitting ratio can be obtained by one-dimensional search. We provide simulation results to verify the proposed solution. Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks.

Profibus-DP 프로토콜을 이용한 필드버스 시스템 구현 (Implementation of a Fieldbus System Based on Profibus-DP Protocol)

  • 배규성;김종배;최병욱;임계영
    • 제어로봇시스템학회논문지
    • /
    • 제6권10호
    • /
    • pp.903-910
    • /
    • 2000
  • In this paper, we describe a slave chip based on the Profibus-DP protocol and a system board to verify the developed slave chip. The Profibus-DP protocol is designed using VHDL and implemented on FPGA. The system board adopting the developed FPGA is designed FPGA is designed in which the firmware is implemented on Intel 8051 by using C language. Among the Profibus-DP protocols, low level layers from the physical layer to the data link layer is implemented in the form of hardware that we are able to greatly reduce the CPU load in processing protocols, and then higher layers could be processed by software. These technologies result in an IP to make terminal devices in the distributed control systems. Therefore, many digital logics as well as communication logics can be implemented onto SOC(System On a Chip) and it could be applied to various fieldbus-related areas.

  • PDF

양 방향 중계 네트워크에서의 부호화 협력 통신 (Coded Cooperation Communication over Two-Way Relay Network)

  • 박지환;공형윤
    • 한국전자파학회논문지
    • /
    • 제22권1호
    • /
    • pp.24-29
    • /
    • 2011
  • 네트워크 부호화를 이용한 양 방향 중계 기법은 기존의 단 방향 중계 프로토콜보다 송신 시간을 줄임으로써 전송량을 높일 수 있는 장점을 가지며, 부호화 협력 프로토콜은 물리층에서 이루어지는 부호화를 적용한 알고리즘으로 프로토콜의 신뢰성을 높일 수 있는 장점을 가진다. 본 논문에서는 이러한 두 프로토콜의 장점을 결합한 양 방향 중계 네트워크에서의 부호화 협력 프로토콜을 제안하였다. 제안하는 프로토콜이 기존의 양 방향 증폭후 재전송 프로토콜보다 우수한 신뢰성과 전송량을 가지며, 기존의 양 방향 하이브리드 복호 후 재전송 프로토콜과 동일한 전송량을 가지면서 보다 우수한 신뢰성을 가짐을 시뮬레이션 결과를 통해 증명한다.