語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
PHY-techniques to improve higher-lay...
~
Xiao, Liang.
FindBook
Google Book
Amazon
博客來
PHY-techniques to improve higher-layer functions in wireless networks.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
PHY-techniques to improve higher-layer functions in wireless networks./
作者:
Xiao, Liang.
面頁冊數:
151 p.
附註:
Source: Dissertation Abstracts International, Volume: 70-12, Section: B, page: 7769.
Contained By:
Dissertation Abstracts International70-12B.
標題:
Engineering, Electronics and Electrical. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3379088
ISBN:
9781109456196
PHY-techniques to improve higher-layer functions in wireless networks.
Xiao, Liang.
PHY-techniques to improve higher-layer functions in wireless networks.
- 151 p.
Source: Dissertation Abstracts International, Volume: 70-12, Section: B, page: 7769.
Thesis (Ph.D.)--Rutgers The State University of New Jersey - New Brunswick, 2009.
The wireless medium contains location-specific information at various scales, and thus it can serve in multiple ways to enhance the performance of wireless networks. In this thesis we study the use of physical-layer information to improve higher-layer functions in the following categories: (1) the use of the measured large-scale channel gain variations (due to power spreading and shadowing) to estimate signal outage and to perform mobile localization; and (2) the use of the measured small-scale channel gain variations (due to multipath) to improve wireless network security.
ISBN: 9781109456196Subjects--Topical Terms:
626636
Engineering, Electronics and Electrical.
PHY-techniques to improve higher-layer functions in wireless networks.
LDR
:03552nam 2200313 4500
001
1397253
005
20110719084837.5
008
130515s2009 ||||||||||||||||| ||eng d
020
$a
9781109456196
035
$a
(UMI)AAI3379088
035
$a
AAI3379088
040
$a
UMI
$c
UMI
100
1
$a
Xiao, Liang.
$3
1676071
245
1 0
$a
PHY-techniques to improve higher-layer functions in wireless networks.
300
$a
151 p.
500
$a
Source: Dissertation Abstracts International, Volume: 70-12, Section: B, page: 7769.
500
$a
Advisers: Narayan Mandayam; Wade Trappe; Larry Greenstein.
502
$a
Thesis (Ph.D.)--Rutgers The State University of New Jersey - New Brunswick, 2009.
520
$a
The wireless medium contains location-specific information at various scales, and thus it can serve in multiple ways to enhance the performance of wireless networks. In this thesis we study the use of physical-layer information to improve higher-layer functions in the following categories: (1) the use of the measured large-scale channel gain variations (due to power spreading and shadowing) to estimate signal outage and to perform mobile localization; and (2) the use of the measured small-scale channel gain variations (due to multipath) to improve wireless network security.
520
$a
We first consider sensor networks that record received signal strength for estimating and updating network performance. Using a generic path-loss model incorporating distance effects and shadow fading, we apply the principle of importance sampling to the sensor placements. This helps to minimize measurement costs while accurately estimating outage probability and coverage holes, thereby improving the radio resource management of wireless systems. We also analyze the use of sensor networks to locate mobiles, and we propose four simple-yet-accurate localization algorithms that meet E-911 requirements in most environments. The localization performance can be further improved by implementing a minimum mean square error (MMSE) algorithm which meets the Cramer-Rao lower bound. However, the four simple proposed algorithms have much lower numerical complexity than MMSE for real-time operation and require little a priori knowledge of the channel parameters.
520
$a
Next, we exploit the rapid-decorrelation property of the multipath channel to enhance security in environments with rich scattering. We propose a channel-based authentication scheme to detect both spoofing attacks (a spoofing node pretends to be another node to gain access to network resources); and Sybil attacks (a Sybil node maliciously sends multiple service requests with different identities, in hopes of depleting network resources). The scheme uses little additional system overhead, as it exploits pilots or preambles that already exist in most wireless systems. A double-layer authentication protocol is devised, whereby the scheme either combines with higher-layer security mechanisms, such as 802.11i or works independently with some performance degradation. Verification that PHY-based authentication provides good performance is performed using several methods, specifically, stochastic channel modeling, site-specific ray-tracing and field tests.
590
$a
School code: 0190.
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
710
2
$a
Rutgers The State University of New Jersey - New Brunswick.
$b
Graduate School - New Brunswick.
$3
1019196
773
0
$t
Dissertation Abstracts International
$g
70-12B.
790
1 0
$a
Mandayam, Narayan,
$e
advisor
790
1 0
$a
Trappe, Wade,
$e
advisor
790
1 0
$a
Greenstein, Larry,
$e
advisor
790
$a
0190
791
$a
Ph.D.
792
$a
2009
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3379088
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9160392
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入