Abstract:
Presenting a visualization of antenna radiation patterns may include sending a request to a server for up-to-date information regarding an antenna mode; receiving the request at the server and reading a register value for the antenna mode; responding, by the server, with updated antenna mode information; and overlaying antenna radiation patterns on an image based on the mode information.
Abstract:
Channel based authentication schemes for intrusion detection that operates at the physical layer are described that apply the capabilities of a pattern reconfigurable antenna for improved performance. Performance gains are achieved by the schemes as a function of the number of antenna modes. The first scheme relies on a channel based fingerprint for differentiating between transmitters whereas another scheme poses the intruder detection problem as a generalized likelihood ratio (GLR) test problem that operates on the channel realizations corresponding to different modes present in a reconfigurable antenna. The benefits of these two schemes over single element antennas are demonstrated. General guidelines are provided on how to choose the different elements of the decision metric in order to realize better performance for physical layer based authentication schemes based on any diversity scheme.
Abstract:
Composite Right/Left Handed (CRLH) Leaky-Wave Antennas (LWAs) are a class of radiating elements characterized by an electronically steerable radiation pattern. The design is comprised of a cascade of CRLH unit-cells populated with varactor diodes. By varying the voltage across the varactor diodes, the antenna can steer its directional beam from broadside to backward and forward end-fire directions. A CRLH Leaky-Wave Antenna for the 2.4 GHz Wi-Fi band is miniaturized by etching a Complementary Split-Ring Resonator (CSRR) underneath each CRLH unit-cell. As opposed to conventional LWA designs, the LWA layout does not require thin interdigital capacitors, significantly reducing the PCB manufacturing constraints required to achieve size reduction. The resulting antenna enables CRLH LWAs to be used not only for wireless access points, but also potentially for mobile devices.
Abstract:
Symmetric keys are generated by an algorithm that uses the randomness from the wireless PHY layer to extract the keys. When used with reconfigurable antennas, the algorithm yields longer keys. By using the randomness from the wireless PHY layer, the algorithm solves the issue of secure information leakage to the wireless channel during key establishment phase. The algorithm also omits transmitting anything secure during this phase and prevents any intruder from obtaining information related to the key. This approach can automatically secure the communications over open wireless networks (those without authentication or encryption) or closed wireless networks using other methods of authentication.
Abstract:
An optically transparent conformal polymer antenna and a method for producing the antenna from optically transparent conductive polymers. The method includes selecting an antenna design; providing an optically transparent conductive polymer material capable of being printed using an ink-jet printer device; and printing layers of the polymer in the desired antenna design pattern onto a substrate. The surface tension of the polymer solution is adjusted to allow the material to pass through a printer head for printing on a flexible substrate. The material is modified to have a higher conductivity than regular conductive polymer materials so that a suitable antenna may be formed.
Abstract:
By using reconfigurable antenna based pattern diversity, an optimal channel can be realized in order to maximize the distance between two subspaces, thereby increasing sum-rate. The inventors show the benefits of pattern reconfigurability using real-world channels, measured in a MIMO-OFDM interference network. The results are quantified with two different reconfigurable antenna architectures. An additional 47% gain in choral distance and 45% gain in sum capacity were achieved by exploiting pattern diversity with IA. Due to optimal channel selection, the performance of IA can also be improved in a low SNR regime.
Abstract:
Symmetric keys are generated by an algorithm that uses the randomness from the wireless PHY layer to extract the keys. When used with reconfigurable antennas, the algorithm yields longer keys. By using the randomness from the wireless PITY layer, the algorithm solves the issue of secure information leakage to the wireless channel during key establishment phase. The algorithm also omits transmitting anything secure during this phase and prevents any intruder from obtaining information related to the key. This approach can automatically secure the communications over open wireless networks (those without authentication or encryption) or closed wireless networks using other methods of authentication.
Abstract:
A reactive jamming software defined radio (SDR) apparatus to target Frequency Hopping Spread-Spectrum (FHSS) signals includes a peripheral module for SDR processing; a reactive jamming hardware IP core that implements time-sensitive operations on a field programmable gate array (FGPA); and a host computer that implements non-time-critical operations, such as jammer configuration, logging, and strategy composition.
Abstract:
A planar reconfigurable antenna that is capable of generating omnidirectional and directional radiation patterns over a wide frequency band or over multiple frequency bands includes a substrate, one or more pairs of conductive elements on at least one side of the substrate, a common RF feed point, and respective switches that selectively connects one or all of the conductive elements to the common RF feed point. An omni-directional radiation pattern is generated when all of the conductive elements are connected to the common RF feed point, while a directional radiation pattern is generated when only a pair of conductive elements on opposite sides of the substrate are connected to the common RF feed point. In the directional radiation mode, the conductive elements that are not connected to the common RF feed point act as a reflector for other conductive elements that are connected to the common RF feed point.
Abstract:
Channel based authentication schemes for intrusion detection that operates at the physical layer are described that apply the capabilities of a pattern reconfigurable antenna for improved performance. Performance gains are achieved by the schemes as a function of the number of antenna modes. The first scheme relies on a channel based fingerprint for differentiating between transmitters whereas another scheme poses the intruder detection problem as a generalized likelihood ratio (GLR) test problem that operates on the channel realizations corresponding to different modes present in a reconfigurable antenna. The benefits of these two schemes over single element antennas are demonstrated. General guidelines are provided on how to choose the different elements of the decision metric in order to realize better performance for physical layer based authentication schemes based on any diversity scheme.