Ascolta e leggi

Entra in un mondo di storie

  • Ascolta e leggi quanto vuoi
  • Oltre 400.000 titoli
  • Prova gratis per 14 giorni, poi 9.99€/mese
  • Disdici quando vuoi
  • Ascolta titoli esclusivi e Storytel Original
Prova Gratis
Device Banner Block 894x1036

Embracing Interference in Wireless Systems

Serie

1 of 64

Lingua
Inglese
Format
Categoria

Non-fiction

The wireless medium is a shared resource. If nearby devices transmit at the

same time, their signals interfere, resulting in a collision. In traditional

networks, collisions cause the loss of the transmitted information. For this

reason, wireless networks have been designed with the assumption that

interference is intrinsically harmful and must be avoided.

This book, a revised version of the author's award-winning Ph.D.

dissertation, takes an alternate approach: Instead of viewing interference

as an inherently counterproductive phenomenon that should to be avoided, we

design practical systems that transform interference into a harmless, and

even a beneficial phenomenon. To achieve this goal, we consider how wireless

signals interact when they interfere, and use this understanding in our

system designs. Specifically, when interference occurs, the signals get

mixed on the wireless medium. By understanding the parameters of this

mixing, we can invert the mixing and decode the interfered packets; thus,

making interference harmless. Furthermore, we can control this mixing

process to create strategic interference that allow decodability at a

particular receiver of interest, but prevent decodability at unintended

receivers and adversaries. Hence, we can transform interference into a

beneficial phenomenon that provides security.

Building on this approach, we make four main contributions: We present the

first WiFi receiver that can successfully reconstruct the transmitted

information in the presence of packet collisions. Next, we introduce a WiFi

receiver design that can decode in the presence of high-power

cross-technology interference from devices like baby monitors, cordless

phones, microwave ovens, or even unknown technologies. We then show how we

can harness interference to improve security. In particular, we develop the

first system that secures an insecure medical implant without any

modification to the implant itself. Finally, we present a solution that

establishes secure connections between any two WiFi devices, without having

users enter passwords or use pre-shared secret keys.

© 2014 ACM Books (Ebook): 9781627054768

Data di uscita

Ebook: 1 giugno 2014

Potrebbero piacerti

Scegli il tuo piano

  • Più di 400.000 titoli

  • Kids Mode (accesso sicuro per bambini)

  • Scarica e ascolta offline

  • Disdici quando vuoi

Il più popolare

Unlimited

La scelta migliore per 1 utente. Ascolta e leggi quanto vuoi.

9.99 € /mese
14 giorni gratis
  • 1 account

  • Ascolto illimitato

  • Disdici quando vuoi

Prova ora

Unlimited Annuale

12 mesi al prezzo di 9. Ascolta e leggi quanto vuoi.

89.99 € /anno
14 giorni gratis
Risparmia il 25%
  • 1 account

  • Ascolto illimitato

  • Disdici quando vuoi

Prova ora

Basic

Per te che non sei un avido ascoltatore.

6.49 € /mese
14 giorni gratis
  • 1 account

  • 10 ore/mese

  • Disdici quando vuoi

Prova ora

Unlimited+

Storie per tutta la famiglia. Entrate insieme in un mondo di storie.

14.99 € /mese
7 giorni gratis
  • 2 account

  • Ascolto illimitato

  • Disdici quando vuoi

Prova ora