Constant Wireless Sensor Network Signal Analysis for Security Applications

Real time wireless sensor network signal analysis for security applications l.jpg
1 / 7
0
0
1311 days ago, 519 views
PowerPoint PPT Presentation
Diagram. Who is the client? Security offices What is our goal?To assemble and test an arrangement of secure remote correspondences through the utilization of a custom waveform. Foundation. Remote sensor systems utilized today:Signal can be effectively identified and perceived by undesirable listenersDo not use advanced remote technologyHave next to zero security against dynamic or inactive attacksUsing current techn

Presentation Transcript

Slide 1

´╗┐Constant Wireless Sensor Network Signal Analysis for Security Applications EE423 Senior Design Fall 2002 Mark Woolley Eric Andersen Steve Laudato Rebecca Bednarczyk Advisor: Uf Tureli

Slide 2

Outline Who is the client? Security offices What is our objective? To fabricate and test an arrangement of secure remote interchanges using a custom waveform

Slide 3

Background Wireless sensor systems utilized today: Signal can be effortlessly distinguished and perceived by undesirable audience members Do not use present day remote innovation Have next to zero security against dynamic or detached assaults Using current advances, systems can be streamlined for: Efficiency Size Power appropriation Signal security

Slide 4

Problem H iding the transporter waveform from undesirable audience members who need to screen the flag with a range analyzer How has the issue been drawn closer before? Spread-range adjustment has been utilized as a part of cell systems remote LAN Not for our situation (sensor systems )

Slide 5

Design Approach COM-5001 LAN/IP Interface COM-8001 Custom Waveform Generation COM-2001 D/A Conversion COM-4001 Dual Band Modulator RF out Create custom waveform Use spread-range balance to camouflage waveform inside commotion levels Transmitter COM-3001 Dual Band Receiver COM-8002 High Speed Data Acquisition COM-5001 LAN/IP Interface RF in Receiver

Slide 6

Challenges What effect will your answer have? Immense systems can be conveyed and observed without dread of capture attempt or sticking Security offices will have the capacity to remotely screen and record profitable data effectively and safely What challenges do you imagine and by what means will you get around them? Weakness of remote signs Using custom waveforms for spread range tweak Different inspecting rates between Comblock Modules and open gear Comblock Modules will be over-timed to coordinate the example rates of available gear Multiple parts that will require get together, adjustment, testing Using available research facility equipment and programming, Effective correspondence Firm venture arranging

Slide 7

Summary Through custom waveform era and spread-range balance, we will have the capacity to camouflage waveforms These waveforms will show up as commotion and can't be identified This will permit us to construct an arrangement of secure remote interchanges that can be connected to a remote sensor organize

SPONSORS