Search results for "zigbee"

showing 3 items of 13 documents

An Inter-Technology Communication Scheme for WiFi/ZigBee Coexisting Networks

2017

In this paper we show how inter-technology interference can be exploited to set-up a low-rate bi-directional communication channel between heterogeneous technologies, which coexist in ISM bands. In particular, we focus on WiFi and ZigBee networks, whose high density deployments make coexistence a critical issue. We monitor the transmission duration of the interference and, after recognizing ZigBee interference from WiFi off-the-shelf receivers, we precisely measure the channel busy intervals to map time duration to communication symbols. A similar approach is used on the ZigBee receivers for making the communication channel bidirectional. Extensive experimental results show the feasibility …

ZigBeeSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKScoexistenceWiFi ZigBee wireless networkComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSWireless LAN
researchProduct

BusyBee: Low Rate WiFi-ZigBee Communications without Gateways

2014

Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread us- age of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter- technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and sig- nalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deploy- ment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. Thi…

noisebusywmpcommunicationSettore ING-INF/03 - Telecomunicazioniwifizigbee
researchProduct

Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems

2022

In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed

sulautettu tietotekniikkacybersecurityprotocolsasejärjestelmätilmailucyber-physical systemsfirmwaretakaisinmallinnusvideo surveillanceesineiden internetCCTVkyberturvallisuushaavoittuvuusvulnerabilitieswireless pyrotechnicsremote firing systemsexploitsvalvontajärjestelmätreverse engineeringZigbeeprotokollatcritical infrastructureaviationRFinfrastruktuuritbinareADS-B
researchProduct