service discovery and device identification in cognitive
play

Service Discovery and Device Identification in Cognitive Radio - PowerPoint PPT Presentation

B A WiFi T Bluetooth Bluetooth WiFi F W C E Cognitive Radio D Service Discovery and Device Identification in Cognitive Radio Networks 21 May 2007 WINLAB Research Review Overview Cognitive Radio Introduction Can we use


  1. B A WiFi T Bluetooth Bluetooth WiFi F W C E Cognitive Radio D Service Discovery and Device Identification in Cognitive Radio Networks 21 May 2007 WINLAB Research Review

  2. Overview • Cognitive Radio Introduction • Can we use Physical Layer info for: – Service Discovery – Device Identification • Conclusions

  3. Cognitive Radio • Key Features – Adaptive protocols – Complete PHY/MAC Layer control • Motivations – Higher efficiency/throughput – Interference Avoidance Spectral Sensing is Important

  4. Spectral Sensing Options • Multi-dongle solution (Non-CR approach) • Multi-protocol full SW stack solution • Multi-protocol cooperative SW solution

  5. Spectral Sensing Options • Multi-dongle solution (Non-CR approach) • Multi-protocol full SW stack solution • Multi-protocol cooperative SW solution – Processing re-use (+) – Implement partial protocols (+) – Full PHY Layer access (+) • Security advantages

  6. CR Platform • USRP – 64 Msps A/D – USB 2.0 interface • 16-bit I/Q • 8 MHz BW* • RFX-2400 Transceiver • GNU Radio *USB 2.0 Controller limits us to 4 MHz

  7. Service Discovery • Goal: Obtain a reliable estimate of the services operating in the region. 2465 2465.5 2466 Frequency (MHz) 2466.5 2467 Periodic 2467.5 Broadband Bursts 2468 2468.5 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 Time (s)

  8. Service Discovery • 802.11g (Wi-Fi) Beacon Frames – 20 MHz BW (OFDM) – Periodic (102.4 ms default) 2465 2465.5 2466 Frequency (MHz) 2466.5 2467 Wi-Fi Beacon 2467.5 Frames 2468 2468.5 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 Time (s)

  9. Service Discovery Narrowband • ISM Band Spectrogram Bursts – 50 ms snapshot

  10. Service Discovery • 802.15.1 (Bluetooth) – 1 MHz Instantaneous BW (GFSK) – Frequency hops over 79 MHz Wi-Fi Bluetooth

  11. Classification Service Discovery Algorithm Collection Analysis

  12. Device Identification • Goal: Supplement service discovery findings with device and network specific information. – How many Bluetooth Piconets exist? – How many Wi-Fi networks exist? – Is a spoofed AP in the region?

  13. Device Identification • Bluetooth Piconets – 1 Master – Maximum 7 Active Slaves – Synchronized to the Master’s clock • Timeslots (TS) are 625 µs • All transmissions begin on timeslot boundaries – Specification allows for 20 µs of jitter

  14. Device Identification • Bluetooth Piconet Identification – Method 1: Time-binning approach • Collapse all leading-edge times into a single TS – Perform clustering analysis to determine # of Piconets • Partition a TS into time-bins – Choose a time-bin resolution of 25 µs » 625/25 µs = 25 bins – Single Piconet tests resulted in only +/- 250 ns jitter! 25us Piconet # 1 2 3 4 5 6 25 1 TS = 625 µs

  15. Device Identification • Bluetooth Piconet Identification – Method 2: Bit-comparison approach • Demodulate detected bursts • Compare Channel Access Codes (CACs) – CACs are derived from Master address – Use it as a Piconet identifier CAC

  16. Device Identification • Bluetooth Piconet Identification – Method 2: Bit-comparison approach 2465 Burst 1 2465.5 ← Bluetooth 2466 Frequency (MHz) 2466.5 WiFi → 2467 Burst 2 2467.5 2468 2468.5 0.09 0.095 0.1 0.105 0.11 0.115 0.12 0.125 0.13 0.135 Time (s)

  17. Bluetooth Burst Demodulation Magnitude 1 0.5 Normalized Burst Power 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Inst Freq 200 0 Inst Freq (KHz) − Burst 1 −200 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Inst Freq 200 0 Inst Freq (KHz) − Burst 2 −200 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Magnitude 1 0.5 Bitwise Exclusive−or 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Sample Number

  18. Bluetooth Burst Demodulation Magnitude 1 0.5 Normalized Burst Power 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Inst Freq 200 0 Inst Freq (KHz) − Burst 1 −200 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Inst Freq 200 0 Inst Freq (KHz) − Burst 2 −200 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Magnitude 1 0.5 Bitwise Exclusive−or 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Sample Number

  19. Bluetooth Burst Demodulation Magnitude 1 0.5 Normalized Burst Power 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Inst Freq 200 0 Inst Freq (KHz) − Burst 1 −200 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Inst Freq 200 0 Inst Freq (KHz) − Burst 2 −200 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Magnitude 1 0.5 Bitwise Exclusive−or 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Sample Number

  20. Bluetooth Burst Demodulation Magnitude 1 0.5 Normalized Burst Power 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Inst Freq 200 0 Inst Freq (KHz) − Burst 1 −200 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Inst Freq 200 0 Inst Freq (KHz) − Burst 2 −200 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Magnitude 1 0.5 Bitwise Exclusive−or 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Sample Number

  21. Bluetooth Burst Demodulation Magnitude 1 0.5 Normalized Burst Power 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Inst Freq 200 0 Inst Freq (KHz) − Burst 1 −200 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Inst Freq 200 0 Inst Freq (KHz) − Burst 2 −200 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Magnitude 1 0.5 Bitwise Exclusive−or 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Sample Number Same CACs

  22. Device Identification • Wi-Fi Access Points – Method 1: Beacon Frame Periodicity • Analyze leading edge-times • Leverage standard deinterleaving algorithms time 100ms 2 APs present time 50ms 50ms 1 AP ? 2 APs? 3 APs? …

  23. Device Identification • Wi-Fi Access Points – Method 1: Beacon Frame Periodicity • Analyze leading edge-times • Leverage standard deinterleaving algorithms time 100ms 2 APs present time 50ms 50ms 1 AP? 2 APs ? 3 APs? …

  24. Device Identification • Wi-Fi Access Points – Method 1: Beacon Frame Periodicity • Analyze leading edge-times • Leverage standard deinterleaving algorithms time 100ms 2 APs present time 50ms 50ms 1 AP? 2 APs? 3 APs ? …

  25. Device Identification • Wi-Fi Access Points – Method 2: Channel Estimation • Beacon-Frame TS ES data – 20 MHz OFDM » 64 sub-channels (= 312.5 KHz spacing) • First 8 µs used for Training (TS) – Every 4 th sub-channel is active • Next 8 µs used for Equalization (ES) – Every sub-channel is modulated with equal power

  26. Device Identification • Wi-Fi Access Points – Method 2: Channel Estimation 5 Magnitude (dB) 0 −5 −10 −15 −20 Beacon Frame: −25 −30 2410 2410.5 2411 2411.5 2412 2412.5 2413 2413.5 8 µs Training Sequence Frequency (MHz) 8 µs Equalization Sequence 5 Magnitude (dB) 0 −5 −10 −15 −20 Channel Sounding Waveform −25 −30 2410 2410.5 2411 2411.5 2412 2412.5 2413 2413.5 Frequency (MHz)

  27. Channel Estimation s(t) = transmitted signal n(t) = channel noise h(t) = channel response r(t) = received signal Channel Spectrum Estimate:

  28. Channel Estimation • Given K known APs, correlate against new channel estimates as device identifiers: – If AP i exceeds threshold, update profile – Else, declare a new AP (K+1) • But, should not incorporate phase in our channel estimate for bursty transmissions

  29. Channel Estimation • So, only use magnitude: Note: Correlation range is now [0,1]

  30. Channel Estimation (Beacon 3, AP1) (Beacon 1, AP1) (Beacon 4, AP2) • Experiment: (Beacon 2, AP2) – 2 Wi-Fi Access Points 1 – Identical settings 0.9 (e.g. Channel, 0.8 Normalized Magnitude SSID, PRI, 0.7 name, etc.) 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Time (s)

  31. Channel Estimation • Experiment: – 2 Wi-Fi Access Points – Identical settings 1 (e.g. Channel, SSID, PRI, 0.8 name, etc.) XCorr 0.6 0.4 1 Beacon back 2 Beacons back 0.2 0 4 6 8 10 12 14 16 18 Beacon Number

  32. Final Comments • Service Discovery and Device Identification plausible even given our narrowband snapshot • Bluetooth and Wi-Fi only used as illustrations of protocol-specific techniques – Extend methodology to other protocols • Security Concerns – Full PHY/MAC control can be dangerous – Framework developed to mitigate these risks

  33. Acknowledgements • Dr. Wade Trappe • Wenyuan Xu • Pandurang Kamat

  34. Questions and Comments? • Contact info: Rob Miller rdmiller@winlab.rutgers.edu

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend