Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Computer Engineering

Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher Aug 2015

Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher

The Summer Undergraduate Research Fellowship (SURF) Symposium

Energy loss due to poor transport properties in electrically and thermally conducting materials, such as battery electrodes and thermoelectric composites, contributes to the energy inefficiency of electronic devices. For conductive materials composed of granular materials, particle-particle contact topology strongly governs the efficiency of energy transfer. Although there is a large body of existing work on the arrangements made by granular materials comprised of spherical particles, less is known about the mechanically stable arrangements of granular materials made of convex polyhedra. This project seeks to create a computer simulation of the solidification of convex polyhedra from a diffuse state into a …


Wispernet: Anti-Jamming For Wireless Sensor Networks, Miroslav Pajic, Rahul Mangharam Oct 2012

Wispernet: Anti-Jamming For Wireless Sensor Networks, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration and coordinate communication to extend their battery life. This results in well-defined communication patterns with possibly predictable intervals of activity that are easily detected and jammed by a statistical jammer. We present an anti-jamming protocol for sensor networks which eliminates spatio-temporal patterns …


Anti-Jamming For Embedded Wireless Networks, Miroslav Pajic, Rahul Mangharam Oct 2012

Anti-Jamming For Embedded Wireless Networks, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration and coordinate communication to extend their battery life. This results in well-defined communication patterns with possibly predictable intervals of activity that are easily detected and jammed by a statistical jammer. We present an anti-jamming protocol for sensor networks which eliminates spatio-temporal patterns …


Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague Jul 2011

Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague

Patrick Tague

Jamming attackers can dramatically increase attack efficiency and stealth by randomly or periodically cycling the jamming transmission on and off, attacks respectively known as random and periodic jamming. In this paper, we analyze the impact of such attacks on the IEEE 802.15.4 communication protocol, commonly used in wireless sensor networking applications, and show that the cycling behavior introduces a narrow spectral component into the received signal. We propose the inclusion of a digital filter at the receiver side to effectively eliminate this spectral component, and we discuss the benefits involved in this filter design. We evaluate the impacts of random …


Jamming-Aware Traffic Allocation For Multiple-Path Routing Using Portfolio Selection, Patrick Tague, Sidharth Nabar, James Ritcey, Radha Poovendran Jan 2011

Jamming-Aware Traffic Allocation For Multiple-Path Routing Using Portfolio Selection, Patrick Tague, Sidharth Nabar, James Ritcey, Radha Poovendran

Patrick Tague

Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this article, we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multi-source networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network’s ability to estimate the impact of jamming …


Impact Of Channel Estimation Errors On Effectiveness Of Eigenvector-Based Jamming For Physical Layer Security In Wireless Networks, James M. Taylor, Michael Hempel, Hamid Sharif, Shichuan Ma, Yaoqing Lamar Yang Jan 2011

Impact Of Channel Estimation Errors On Effectiveness Of Eigenvector-Based Jamming For Physical Layer Security In Wireless Networks, James M. Taylor, Michael Hempel, Hamid Sharif, Shichuan Ma, Yaoqing Lamar Yang

Department of Electrical and Computer Engineering: Faculty Publications (to 2015)

In this paper, we present our study of an Eigenvector-based artificial noise-based jamming technique developed to provide increased wireless physical layer security in transmit-receive diversity systems and analyze the impact of channel estimation errors on system performance. Our simulation results showed that with knowledge of perfect channel state information, the technique provided secrecy capacity of approximately 7 bits/s/Hz for a normalized transmit power of 25 dB for a variety of transmit, receive, and eavesdropper configurations. We also describe a novel method to simulate generalized channel state information estimation errors. While other publications neglect the impact of these estimation errors, our …


Improving Anti-Jamming Capability And Increasing Jamming Impact With Mobility Control, Patrick Tague Oct 2010

Improving Anti-Jamming Capability And Increasing Jamming Impact With Mobility Control, Patrick Tague

Patrick Tague

The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the relative geometries of the adversarial network of jammers and the network under attack. Hence, changes in network geometry achieved through node and jammer mobility can have significant influence on the impact of a jamming attack. In this work, we investigate the use of mobility as a tool to allow both the adversarial network and the network under attack to reconfigure their geometry in an attempt to improve attack impact and protocol performance, respectively. We …