Embracing Interference in Wireless Systems

Nonfiction, Computers, Networking & Communications, Electronic Data Interchange, Advanced Computing, Computer Science, Science & Nature, Technology, Engineering
Cover of the book Embracing Interference in Wireless Systems by Shyamnath Gollakota, Association for Computing Machinery and Morgan & Claypool Publishers
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Shyamnath Gollakota ISBN: 9781627054768
Publisher: Association for Computing Machinery and Morgan & Claypool Publishers Publication: June 1, 2014
Imprint: ACM Books Language: English
Author: Shyamnath Gollakota
ISBN: 9781627054768
Publisher: Association for Computing Machinery and Morgan & Claypool Publishers
Publication: June 1, 2014
Imprint: ACM Books
Language: English

The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.

More books from Association for Computing Machinery and Morgan & Claypool Publishers

Cover of the book Text Data Management and Analysis by Shyamnath Gollakota
Cover of the book An Architecture for Fast and General Data Processing on Large Clusters by Shyamnath Gollakota
Cover of the book Declarative Logic Programming by Shyamnath Gollakota
Cover of the book Communities of Computing by Shyamnath Gollakota
Cover of the book Smarter Than Their Machines by Shyamnath Gollakota
Cover of the book The Handbook of Multimodal-Multisensor Interfaces, Volume 2 by Shyamnath Gollakota
Cover of the book Ada's Legacy by Shyamnath Gollakota
Cover of the book The Sparse Fourier Transform by Shyamnath Gollakota
Cover of the book Computational Prediction of Protein Complexes from Protein Interaction Networks by Shyamnath Gollakota
Cover of the book The VR Book by Shyamnath Gollakota
Cover of the book A Framework for Scientific Discovery through Video Games by Shyamnath Gollakota
Cover of the book Verified Functional Programming in Agda by Shyamnath Gollakota
Cover of the book The Handbook of Multimodal-Multisensor Interfaces, Volume 1 by Shyamnath Gollakota
Cover of the book Edmund Berkeley and the Social Responsibility of Computer Professionals by Shyamnath Gollakota
Cover of the book The Continuing Arms Race by Shyamnath Gollakota
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy