Search results for "NeuRFon"

showing 8 items of 8 documents

ErrorSense: Characterizing WiFi Error Patterns for Detecting ZigBee Interference

2014

Recent years have witnessed the increasing adoption of heterogeneous wireless networks working in unlicensed ISM bands, thus creating serious problems of spectrum overcrowding. Although ZigBee, Bluetooth and WiFi networks have been natively designed for working in presence of interference, it has been observed that several performance impairments may occur because of heterogeneous sensitivity to detect or react to the presence of other technologies. In this paper we focus on the WiFi capability to detect interfering ZigBee links. Despite of the narrowband transmissions performed by ZigBee, in emerging scenarios ZigBee interference can have a significant impact on WiFi performance. Therefore…

Computer scienceWireless networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSwlan 802.11 802.15.4 frame error detection wireless coexistenceInterference (wave propagation)law.inventionBluetoothNarrowbandlawSensitivity (control systems)businessHeterogeneous networkComputer networkNeuRFon
researchProduct

Decentralized Synchronization for Zigbee wireless sensor networks in Multi-Hop Topology

2010

Abstract The most effective solution for energy saving in low-rate wireless sensor networks is maintaining each node in a doze state as long as possible. In order to guarantee network connectivity, the intervals at which the network sensors are turned on and off have to be coordinated. We analyze the Zigbee MAC performance in sensor networks deployed in multi-hop topologies. For this networks, critical inefficiencies can arise due to transmissions performed by hidden nodes. We evaluate the impact of different synchronization schemes on the network performance, both in terms of network capacity and in terms of energy consumption. We show how the synchronization function can be opportunistica…

Engineeringsensor networks; synchronization; zigbeeWireless networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniGeneral MedicineEnergy consumptionsensor networks synchronization zigbeeNetwork topologyzigbeeKey distribution in wireless sensor networksSettore ING-INF/04 - Automaticasensor networksComputer Science::Networking and Internet ArchitectureMobile wireless sensor networkNetwork performanceSettore MAT/09 - Ricerca OperativabusinessWireless sensor networksynchronizationNeuRFonComputer network
researchProduct

DEMO: Unconventional WiFi-ZigBee communications without gateways

2014

Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread usage of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter-technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and signalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deployment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. This capab…

Exploitbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniReading (computer)Node (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork interfacezigbeeEmbedded systemDefault gatewayComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessProtocol (object-oriented programming)Computer networkNeuRFonCommunication channel
researchProduct

QoS Mechanisms for IEEE 802.11 Wireless LANs

2004

Currently the Internet provides users with access to information across the world using IP technology. Until now most access points to the Internet have been fixed stations at given locations, but with increasing sales of mobile devices, mobility has become a major trend. Therefore, the Internet is becoming more and more heterogeneous due to the recent explosion of wireless networks. The IEEE 802.11 wireless LAN (WLAN) is the most widely used WLAN standard nowadays. Currently the IEEE 802.11 standard specifies an over-the-air interface between wireless devices. However, QoS services over this technology are still being defined aiming to provide support to multiple applications. Thus, a larg…

IEEE 802.11uWi-Fi arrayComputer scienceInter-Access Point ProtocolMobile computinglaw.inventionIEEE 802.11lawWireless lanInternet ProtocolWirelessFixed wirelessIEEE 802.11sbusiness.industryWireless networkQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Multimedia ExtensionsTelecommunications networkWLAN Authentication and Privacy InfrastructureWireless site surveyThe InternetIEEE 802.11e-2005businessTelecommunicationsMobile deviceNeuRFonComputer network
researchProduct

A Network Protocol to Enhance Robustness in Tree-Based WSNs Using Data Aggregation

2007

This paper proposes a data gathering strategy for wireless sensor networks and an implementation based on the IEEE 802.15.4 standard. The algorithm combines the benefits of single-path and multi-path routing strategies in a hybrid solution which makes use of alternative paths when necessary. We adopt a caching and retransmission technique, which exploits some peculiar features of data aggregation, with the use of implicit acknowledgments of reception. The paper also discusses simulation results that show how the mentioned techniques, combined with exploitation of the features of the IEEE 802.15.4 standard have been used to obtain an efficient protocol that takes energy consumption into acco…

Routing protocolDynamic Source RoutingInter-Access Point ProtocolComputer scienceDistributed computingRetransmissionEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolMobile wireless sensor networkIEEE 802.11sZone Routing Protocolbusiness.industryWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPath vector protocolEnergy consumptionAd hoc wireless distribution serviceWireless sensor networksKey distribution in wireless sensor networksOptimized Link State Routing ProtocolLink-state routing protocolMultipath routingHazy Sighted Link State Routing ProtocolCommunications protocolbusinessWireless sensor networkComputer networkNeuRFon2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems
researchProduct

Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned

2013

In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…

business.industryComputer scienceProcess (engineering)SIGNAL (programming language)Computer securitycomputer.software_genreWireless securitySecurity serviceVulnerability evaluationComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinesscomputerKey exchangeComputer networkNeuRFon2013 46th Hawaii International Conference on System Sciences
researchProduct

Learning from Errors: Detecting ZigBee Interference in WiFi Networks

2014

In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingwlan 802.11 802.15.4 frame error detection wireless coexistenceInterval (mathematics)Interference (wave propagation)SynchronizationLearning from errorsTransmission (telecommunications)HeaderbusinessHidden Markov modelComputer networkNeuRFon
researchProduct

ZigBee networks performance under WLAN 802.11b/g interference

2009

ZigBee is a standard protocol suite for low rate wireless personal area networks (LR-WPANs) and has been widely utilized in various fields. Since both ZigBee and WLAN (802.11b/g) operate in the 2.4GHz unlicensed industrial scientific medical (ISM) frequency band, mutual interference is likely to exist and cause signal degradation. In this paper, an interference analysis model is suggested to obtain an estimate of Packet Error Rate (PER) of a ZigBee network. A ZigBee evaluation kit, AVR RZ200, was implemented for measurement of Packet Loss Ratio (PLR). The measured PLR matches the estimated PER, with varied distances and different center frequency offsets of different channels.

business.industryFrequency bandComputer sciencePacket lossBit error rateWirelessCenter frequencybusinessInterference (wave propagation)Computer networkDegradation (telecommunications)NeuRFon2009 4th International Symposium on Wireless Pervasive Computing
researchProduct