1 / 7

Real-Time Wireless Sensor Network Signal Analysis for Security Applications

Real-Time Wireless Sensor Network Signal Analysis for Security Applications. EE423 Senior Design Fall 2002 Mark Woolley Eric Andersen Steve Laudato Rebecca Bednarczyk Advisor: Uf Tureli . Outline. Who is the customer? Security agencies What is our goal?

dunne
Download Presentation

Real-Time Wireless Sensor Network Signal Analysis for Security Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Real-Time Wireless Sensor Network Signal Analysis for Security Applications EE423 Senior Design Fall 2002 Mark Woolley Eric Andersen Steve Laudato Rebecca Bednarczyk Advisor: Uf Tureli

  2. Outline • Who is the customer? • Security agencies • What is our goal? • To build and test a system of secure wireless communications through the use of a custom waveform

  3. Background • Wireless sensor networks used today: • Signal can be easily detected and recognized by unwanted listeners • Do not utilize modern wireless technology • Have little or no security against active or passive attacks • Using current technologies, networks can be optimized for: • Efficiency • Size • Power distribution • Signal security

  4. Problem • Hiding the carrier waveform from unwanted listeners who want to monitor the signal with a spectrum analyzer • How has the problem been approached in the past? • Spread-spectrum modulation has been used in • cellular networks • wireless LAN • Not in our case (sensor networks)

  5. Design Approach COM-5001 LAN/IP Interface COM-8001 Custom Waveform Generation COM-2001 D/A Conversion COM-4001 Dual Band Modulator RF out • Create custom waveform • Use spread-spectrum modulation to disguise waveform within noise levels Transmitter COM-3001 Dual Band Receiver COM-8002 High Speed Data Acquisition COM-5001 LAN/IP Interface RF in Receiver

  6. Challenges • What impact will your solution have? • Vast networks can be deployed and monitored without fear of interception or jamming • Security agencies will be able to wirelessly monitor and record valuable information easily and securely • What challenges do you envision and how will you get around them? • Vulnerability of wireless signals • Using custom waveforms for spread spectrum modulation • Different sampling rates between Comblock Modules and accessible equipment • Comblock Modules will be over-clocked to match the the sample rates of accessible equipment • Multiple parts that will require assembly, calibration, testing • Using accessible laboratory hardware and software, • Effective communication • Firm project planning

  7. Summary • Through custom waveform generation and spread-spectrum modulation, we will be able to disguise waveforms • These waveforms will appear as noise and cannot be detected • This will allow us to build a system of secure wireless communications that can be applied to a wireless sensor network

More Related