• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 15
  • 8
  • 2
  • 1
  • Tagged with
  • 28
  • 28
  • 10
  • 10
  • 9
  • 9
  • 9
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Cell Acquisition and Synchronization for Unlicensed NB-IoT

Jörgensen, Eskil January 2017 (has links)
Narrowband Internet-of-Things (NB-IoT) is a new wireless technology designed to support cellular networks with wide coverage for a massive number of very cheap low power user devices. Studies have been initiated for deployment of NB-IoT in unlicensed frequency bands, some of which demand the use of a frequency-hopping scheme with a short channel dwell time. In order for a device to connect to a cell, it must synchronize well within the dwell time in order to decode the frequency-hopping pattern. Due to the significant path loss, the narrow bandwidth and the device characteristics, decreasing the synchronization time is a challenge. This thesis studies different methods to decrease the synchronization time for NB-IoT without increasing the demands on the user device. The study shows how artificial fast fading can be combined with denser reference signalling in order to achieve improvements to the cell acquisition and synchronization procedure sufficient for enabling unlicensed operation of NB-IoT. / Narrowband Internet-of-Things (NB-IoT) är en ny trådlös teknik som är designad för att hantera mobilnät med vidsträckt täckning för ett massivt antal mycket billiga och strömsnåla användarenheter. Studier har inletts för att operera NB-IoT i olicensierade frekvensband, varav några kräver att frekvenshoppande spridningsspektrum, med kort uppehållstid per kanal, används. För att en användarenhet ska kunna ansluta till en basstation måste den slutföra synkronisingsfasen inom uppehållstiden, så att basstationens hoppmönster kan avkodas. På grund utav den stora signalförsvagningen, den smala bandbredden och användarenhetens egenskaper är det en stor utmaning att förkorta synkroniseringstiden. Detta examensarbete studerar olika metoder för att förkorta synkroniseringstiden i NB-IoT utan att öka kraven på användarenheten. Arbetet visar att artificiell snabb-fädning kan kombineras med tätare referenssignalering för att uppnå förbättringar i synkroniseringsprocessen som är tillräckliga för att möjliggöra operation av NB-IoT i olicensierade frekvensband.
22

Implementace a vyhodnocení komunikační technologie LTE Cat-M1 v simulačním prostředí Network Simulator 3 / Implementation of Communication Technology LTE Cat-M1 Utilizing the Network Simulator 3

Drápela, Roman January 2019 (has links)
Diploma thesis deals with the implementation of LTE Cat-M1 technology in simulator NS--3 (Network Simulator 3). The theoretical part of the thesis summarizes key terms concerning IoT (Internet of Things), M2M (Machine-to-Machine) communication, LTE (Long Term Evolution) and LPWA (Low-Power Wide Area) networks. The practical part summarizes the possibilities of currently available modules for cellular technologies for NS-3, ie. the LENA module and the subsequent extension of LENA+ and ELENA. Simulation scenarios offer a comparison of LTE/LTE-A and LTE Cat-M1 (also known as eMTC - enhanced Machine Type Communication) technologies for M2M communication. The results of the simulations are well-arranged in the form of graphs and discussed at the end of the thesis.
23

Návrh vhodných HW a SW komponent pro dálkový přenos dat / Design of suitable HW and SW components for remote data transmission

Pietrowicz, Daniel January 2021 (has links)
This thesis is focused on the design of remote data transmission equipment, without access to mains power. The device will measure the voltage of the gas pipeline and send this information to the operator for processing. Analysis of today's technologies for long-distance transmission and based on the selected technology, the device will be designed. According to selected components, its power supply will be designed with the aim of long-term functionality and continuous operation.
24

Comparison Study and Product Development using Wireless Narrowband Low-power Wide-area Network Technologies

Ortis Pasamontes, Enrique January 2017 (has links)
Nowadays it is more clear that the Internet of things (IoT) is not a transient trend but a completely new industry. The internet of things has the capability to enhance current industries (Industry 4.0), as well as to help protecting the environment and people. The latter is the case with the system developed and described in this thesis. The possibilities that IoT brings are due to the interconnection of heterogeneous embedded devices to the internet. This thesis focus on LPWANs (Low Power Wide Area Networks), which is a new set of technologies specifically design for the needs of IoT devices.Due to the recent deploy of NB-IoT (Narrow Band IoT) networks it has become more difficult to know what LPWAN is best for a certain application. Thus, the first half of this thesis involves the comparative study of NB-IoT and LoRaWAN LPWANs. This comparison required an in depth study of each technology, specially on the physical and datalink layers. The comparison briefly displays the main characteristics of each technology and explain the main conclusions in a concise manner. The second part of the thesis describes the development of a GNSS tracker. This tracker will be used on train wagons carrying goods that are dangerous for people and the environment. This thesis report describes the different steps taken, from the requirement specification to the partial development of the software.
25

From Vulnerability to Resilience: Securing Signal Transmission Against Jamming and Spoofing Attacks

Yang, Hanchao 13 January 2025 (has links)
Wireless signal transmission underpins crucial aspects of modern communication, but its susceptibility to jamming and spoofing attacks remains a major concern. These attacks have the potential to disrupt vital services, mislead devices, and compromise the integrity of wireless systems. Many researchers have addressed anti-jamming and anti-spoofing techniques. Anti-jamming methods include coding techniques, specialized waveforms (e.g., spreading, beamforming, and modulation), and spatial avoidance using relays or reflectors. Anti-spoofing methods include angle-of-arrival detection with antenna arrays, cross-checking with sensor fusion, and authentication and encryption. In recent decades, artificial intelligence and machine learning have boosted the research in anti-jamming and anti-spoofing, making them more flourish. Despite these advancements, significant challenges persist. For example, while various jamming resistance studies were proposed, their application to vulnerable 5G and narrowband Internet of Things (NB-IoT) communications are unexplored. Additionally, while low-density sparse coding (LDSC) is advantageous for multiplexing and spreading, research into the design of the code itself is lacking. Furthermore, sidelinks, a key component of 5G Advanced and future generation communication, hold the potential to become stealthy, secure channels for countering jamming attacks. As for machine learning based methods, they are limited in theoretical and simulation, instead of applied to commercial ready codebases. In GPS anti-spoofing, existing solutions are often expensive, bulky, or low in accuracy, while authentication and encryption approaches remain restricted to military use. Furthermore, although distributed mobile spoofer analysis has been theoretically explored, it still lacks real-world implementation studies. Recognizing the increasing complexity of the wireless landscape, this thesis addresses these open problems through multiple works targeting anti-jamming and anti-spoofing. The first work develops a standard-compliant spread spectrum waveform for NB-IoT applications under jamming. The next focuses on LDSC design, applying it to spreading, and devising methods to obtain sub-optimal LDSC designs against interference. Another work proposes a secure, stealthy sidelink underlay channel and develops interference cancellation methods for flexibility and resilience. In the last work of anti-jamming, a machine learning based interference mitigation solution was proposed, running on open sourced industrial standard, narrowing the gap between academic and real world implementation. On the GPS anti-spoofing front, the first work presents a low-cost, smartphone-based spoofing detection solution matching the accuracy of antenna-array methods. The next work leverages crowdsourcing and sensor fusion, enabling high-accuracy and low-latency anti-spoofing. Finally, the thesis implements conceptual distributed GPS spoofer using low-cost software-defined radios (SDRs), addressing multi-spoofer challenges. Overall, this work offers vital contributions to the security and resilience of wireless signal transmission. The techniques and solutions presented provide powerful approaches to counteract malicious attacks, fostering reliable communication in an increasingly connected world. Looking ahead, AI and ML hold immense potential for further innovation, bolstering security in 5G and future generation networks. / Doctor of Philosophy / Our phones, cars, navigation systems, and countless other devices rely on invisible wireless signals to work. But what happens when these signals are intentionally disrupted or manipulated? Jamming attacks can cut off vital communication, and spoofing tricks devices into giving false information, leading to mishaps and even security breaches. This research is dedicated to making wireless communication more secure and reliable. We explored ways to design smarter wireless signals that can resist jamming, even in challenging environments. This includes technologies specifically tuned for smart sensors and other devices within the "Internet of Things," which connects everyday objects to the internet. Additionally, we developed techniques to hide important messages within existing wireless transmissions, making them harder for attackers to detect or disrupt. Finally, we created accessible ways to protect navigation systems (like GPS) from spoofing, helping ensure they give accurate information for safer journeys. This work aims to protect the wireless systems we use every day from interference and deception. As smart devices continue to fill our world, research like this will become increasingly important to ensure these technologies work safely and reliably. Looking ahead, the next stages of this work will use powerful artificial intelligence to anticipate and neutralize wireless security threats, safeguarding the connected future.
26

Univerzální testovací zařízení pro ověření komunikačních parametrů technologie Narrowband IoT / Universal Tester of Radio Conditions for Narrowband IoT Communication Technology

Možný, Radek January 2019 (has links)
Technology Narrowband IoT is a representative LPWA (Low Power Wide Area) tech-nology that due to its promising features aims for demands of the Internet of Thingsapplications for autonomous data sending from sensors in areas of poor mobile coverage.For such applications, it is beneficial to firstly map properties of communication technol-ogy in areas of intended use and evaluate whether or not is this technology applicable.This Master thesis deals with the design of the hand-held measuring device for evaluationof Narrowband IoT properties. The output of this thesis is firstly comparison of LPWAtechnologies secondly, design of the mentioned device and verification of its functional-ity. And in last part description of measurement of transmission delay for delay-tolerantapplications. Transmission delay is a critical parameter for delay-tolerant applications.Such an application can be, for example, smart electrometers for which there is definedmaximal allowed transmission delay of 10 seconds and therefore it is desirable to evalu-ate whether or not is the deployment of the communication technology Narrowband IoTsuitable in the intended area for delay-tolerant or even for delay-intolerant applications.
27

Zařízení pro zaznamenávání proudové spotřeby LPWA senzorů / Design of a current data logger for LPWA sensors

Mikulášek, Michal January 2020 (has links)
This Master thesis deals with the design and construction of a measuring device for measuring and the current consumption logging of sensors using LPWAN (Low Power Wide Area Network) technology. The theoretical part of the thesis firstly summarizes selected LPWAN technologies. Selected technologies, namely: LoRaWAN, Sigfox and Narrowband IoT (NB-IoT), are described more in detail. Further, the current measurement techniques are briefly discussed. The main focus is given to the current shunt measuring methods. The second half of thesis describes procedures conducted during the design and construction of a measuring device. The current measuring is based on the current shunt circuit complemented by the voltage amplification circuit, whose output is subsquently converted into digital form using an AD converter. The thesis describes in great detail the procedures for selecting individual components and important processes used in design of printed circuit boards. An integral part of the measuring device implementation is the design and implementation of control software, which is described in detail and supplemented by workflow charts underlining the entire description. The implementation of the entire measuring device is completed by the design and implementation of the cover box using 3D printing technology. Finally, the specifications of designed device are briefly discussed based on the limits of the used components.
28

On reliable and energy efficient massive wireless communications: the road to 5G

Leyva Mayorga, Israel 14 January 2019 (has links)
La quinta generación de redes móviles (5G) se encuentra a la vuelta de la esquina. Se espera provea de beneficios extraordinarios a la población y que resuelva la mayoría de los problemas de las redes 4G actuales. El éxito de 5G, cuya primera fase de estandarización ha sido completada, depende de tres pilares: comunicaciones tipo-máquina masivas, banda ancha móvil mejorada y comunicaciones ultra fiables y de baja latencia (mMTC, eMBB y URLLC, respectivamente). En esta tesis nos enfocamos en el primer pilar de 5G, mMTC, pero también proveemos una solución para lograr eMBB en escenarios de distribución masiva de contenidos. Específicamente, las principales contribuciones son en las áreas de: 1) soporte eficiente de mMTC en redes celulares; 2) acceso aleatorio para el reporte de eventos en redes inalámbricas de sensores (WSNs); y 3) cooperación para la distribución masiva de contenidos en redes celulares. En el apartado de mMTC en redes celulares, esta tesis provee un análisis profundo del desempeño del procedimiento de acceso aleatorio, que es la forma mediante la cual los dispositivos móviles acceden a la red. Estos análisis fueron inicialmente llevados a cabo por simulaciones y, posteriormente, por medio de un modelo analítico. Ambos modelos fueron desarrollados específicamente para este propósito e incluyen uno de los esquemas de control de acceso más prometedores: access class barring (ACB). Nuestro modelo es uno de los más precisos que se pueden encontrar en la literatura y el único que incorpora el esquema de ACB. Los resultados obtenidos por medio de este modelo y por simulación son claros: los accesos altamente sincronizados que ocurren en aplicaciones de mMTC pueden causar congestión severa en el canal de acceso. Por otro lado, también son claros en que esta congestión se puede prevenir con una adecuada configuración del ACB. Sin embargo, los parámetros de configuración del ACB deben ser continuamente adaptados a la intensidad de accesos para poder obtener un desempeño óptimo. En la tesis se propone una solución práctica a este problema en la forma de un esquema de configuración automática para el ACB; lo llamamos ACBC. Los resultados muestran que nuestro esquema puede lograr un desempeño muy cercano al óptimo sin importar la intensidad de los accesos. Asimismo, puede ser directamente implementado en redes celulares para soportar el tráfico mMTC, ya que ha sido diseñado teniendo en cuenta los estándares del 3GPP. Además de los análisis descritos anteriormente para redes celulares, se realiza un análisis general para aplicaciones de contadores inteligentes. Es decir, estudiamos un escenario de mMTC desde la perspectiva de las WSNs. Específicamente, desarrollamos un modelo híbrido para el análisis de desempeño y la optimización de protocolos de WSNs de acceso aleatorio y basados en cluster. Los resultados muestran la utilidad de escuchar el medio inalámbrico para minimizar el número de transmisiones y también de modificar las probabilidades de transmisión después de una colisión. En lo que respecta a eMBB, nos enfocamos en un escenario de distribución masiva de contenidos, en el que un mismo contenido es enviado de forma simultánea a un gran número de usuarios móviles. Este escenario es problemático, ya que las estaciones base de la red celular no cuentan con mecanismos eficientes de multicast o broadcast. Por lo tanto, la solución que se adopta comúnmente es la de replicar e contenido para cada uno de los usuarios que lo soliciten; está claro que esto es altamente ineficiente. Para resolver este problema, proponemos el uso de esquemas de network coding y de arquitecturas cooperativas llamadas nubes móviles. En concreto, desarrollamos un protocolo para la distribución masiva de contenidos, junto con un modelo analítico para su optimización. Los resultados demuestran que el modelo propuesto es simple y preciso, y que el protocolo puede reducir el con / La cinquena generació de xarxes mòbils (5G) es troba molt a la vora. S'espera que proveïsca de beneficis extraordinaris a la població i que resolga la majoria dels problemes de les xarxes 4G actuals. L'èxit de 5G, per a la qual ja ha sigut completada la primera fase del qual d'estandardització, depén de tres pilars: comunicacions tipus-màquina massives, banda ampla mòbil millorada, i comunicacions ultra fiables i de baixa latència (mMTC, eMBB i URLLC, respectivament, per les seues sigles en anglés). En aquesta tesi ens enfoquem en el primer pilar de 5G, mMTC, però també proveïm una solució per a aconseguir eMBB en escenaris de distribució massiva de continguts. Específicament, les principals contribucions són en les àrees de: 1) suport eficient de mMTC en xarxes cel·lulars; 2) accés aleatori per al report d'esdeveniments en xarxes sense fils de sensors (WSNs); i 3) cooperació per a la distribució massiva de continguts en xarxes cel·lulars. En l'apartat de mMTC en xarxes cel·lulars, aquesta tesi realitza una anàlisi profunda de l'acompliment del procediment d'accés aleatori, que és la forma mitjançant la qual els dispositius mòbils accedeixen a la xarxa. Aquestes anàlisis van ser inicialment dutes per mitjà de simulacions i, posteriorment, per mitjà d'un model analític. Els models van ser desenvolupats específicament per a aquest propòsit i inclouen un dels esquemes de control d'accés més prometedors: el access class barring (ACB). El nostre model és un dels més precisos que es poden trobar i l'únic que incorpora l'esquema d'ACB. Els resultats obtinguts per mitjà d'aquest model i per simulació són clars: els accessos altament sincronitzats que ocorren en aplicacions de mMTC poden causar congestió severa en el canal d'accés. D'altra banda, també són clars en què aquesta congestió es pot previndre amb una adequada configuració de l'ACB. No obstant això, els paràmetres de configuració de l'ACB han de ser contínuament adaptats a la intensitat d'accessos per a poder obtindre unes prestacions òptimes. En la tesi es proposa una solució pràctica a aquest problema en la forma d'un esquema de configuració automàtica per a l'ACB; l'anomenem ACBC. Els resultats mostren que el nostre esquema pot aconseguir un acompliment molt proper a l'òptim sense importar la intensitat dels accessos. Així mateix, pot ser directament implementat en xarxes cel·lulars per a suportar el trànsit mMTC, ja que ha sigut dissenyat tenint en compte els estàndards del 3GPP. A més de les anàlisis descrites anteriorment per a xarxes cel·lulars, es realitza una anàlisi general per a aplicacions de comptadors intel·ligents. És a dir, estudiem un escenari de mMTC des de la perspectiva de les WSNs. Específicament, desenvolupem un model híbrid per a l'anàlisi de prestacions i l'optimització de protocols de WSNs d'accés aleatori i basats en clúster. Els resultats mostren la utilitat d'escoltar el mitjà sense fil per a minimitzar el nombre de transmissions i també de modificar les probabilitats de transmissió després d'una col·lisió. Pel que fa a eMBB, ens enfoquem en un escenari de distribució massiva de continguts, en el qual un mateix contingut és enviat de forma simultània a un gran nombre d'usuaris mòbils. Aquest escenari és problemàtic, ja que les estacions base de la xarxa cel·lular no compten amb mecanismes eficients de multicast o broadcast. Per tant, la solució que s'adopta comunament és la de replicar el contingut per a cadascun dels usuaris que ho sol·liciten; és clar que això és altament ineficient. Per a resoldre aquest problema, proposem l'ús d'esquemes de network coding i d'arquitectures cooperatives anomenades núvols mòbils. En concret, desenvolupem un protocol per a realitzar la distribució massiva de continguts de forma eficient, juntament amb un model analític per a la seua optimització. Els resultats demostren que el model proposat és simple i precís / The 5th generation (5G) of mobile networks is just around the corner. It is expected to bring extraordinary benefits to the population and to solve the majority of the problems of current 4th generation (4G) systems. The success of 5G, whose first phase of standardization has concluded, relies in three pillars that correspond to its main use cases: massive machine-type communication (mMTC), enhanced mobile broadband (eMBB), and ultra-reliable low latency communication (URLLC). This thesis mainly focuses on the first pillar of 5G: mMTC, but also provides a solution for the eMBB in massive content delivery scenarios. Specifically, its main contributions are in the areas of: 1) efficient support of mMTC in cellular networks; 2) random access (RA) event-reporting in wireless sensor networks (WSNs); and 3) cooperative massive content delivery in cellular networks. Regarding mMTC in cellular networks, this thesis provides a thorough performance analysis of the RA procedure (RAP), used by the mobile devices to switch from idle to connected mode. These analyses were first conducted by simulation and then by an analytical model; both of these were developed with this specific purpose and include one of the most promising access control schemes: the access class barring (ACB). To the best of our knowledge, this is one of the most accurate analytical models reported in the literature and the only one that incorporates the ACB scheme. Our results clearly show that the highly-synchronized accesses that occur in mMTC applications can lead to severe congestion. On the other hand, it is also clear that congestion can be prevented with an adequate configuration of the ACB scheme. However, the configuration parameters of the ACB scheme must be continuously adapted to the intensity of access attempts if an optimal performance is to be obtained. We developed a practical solution to this problem in the form of a scheme to automatically configure the ACB; we call it access class barring configuration (ACBC) scheme. The results show that our ACBC scheme leads to a near-optimal performance regardless of the intensity of access attempts. Furthermore, it can be directly implemented in 3rd Generation Partnership Project (3GPP) cellular systems to efficiently handle mMTC because it has been designed to comply with the 3GPP standards. In addition to the analyses described above for cellular networks, a general analysis for smart metering applications is performed. That is, we study an mMTC scenario from the perspective of event detection and reporting WSNs. Specifically, we provide a hybrid model for the performance analysis and optimization of cluster-based RA WSN protocols. Results showcase the utility of overhearing to minimize the number of packet transmissions, but also of the adaptation of transmission parameters after a collision occurs. Building on this, we are able to provide some guidelines that can drastically increase the performance of a wide range of RA protocols and systems in event reporting applications. Regarding eMBB, we focus on a massive content delivery scenario in which the exact same content is transmitted to a large number of mobile users simultaneously. Such a scenario may arise, for example, with video streaming services that offer a particularly popular content. This is a problematic scenario because cellular base stations have no efficient multicast or broadcast mechanisms. Hence, the traditional solution is to replicate the content for each requesting user, which is highly inefficient. To solve this problem, we propose the use of network coding (NC) schemes in combination with cooperative architectures named mobile clouds (MCs). Specifically, we develop a protocol for efficient massive content delivery, along with the analytical model for its optimization. Results show the proposed model is simple and accurate, and the protocol can lead to energy savings of up to 37 percent when compared to the traditional approach. / Leyva Mayorga, I. (2018). On reliable and energy efficient massive wireless communications: the road to 5G [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/115484

Page generated in 0.0276 seconds