Practical Course Advanced Networking (Winter 2014/2015): Difference between revisions

Jump to navigation Jump to search
Line 114: Line 114:
In case studies, it was observed, that the parameters of the approach need to be adapted in order to provide a good tradeoff between security and usability in environments with varying characteristics such as background noise figure.  
In case studies, it was observed, that the parameters of the approach need to be adapted in order to provide a good tradeoff between security and usability in environments with varying characteristics such as background noise figure.  
In this project, the students will derive a mechanism to automatically adapt the parameters of the audio-based ad-hoc secure pairing mechanism.
In this project, the students will derive a mechanism to automatically adapt the parameters of the audio-based ad-hoc secure pairing mechanism.
|
|-
| Utilising the channel as a calculator for mathematical functions
| [http://www.stephansigg.de Stephan Sigg]
| [http://dx.doi.org/10.1109/IOT.2012.6402311]
| In traditional wireless communication systems, communication load is limited for its large impact on energy resources of nodes.
However, for passive, such as, RFID, backscatter or parasitic nodes, which constitute a significant share of devices in the upcoming Internet of Things (IoT)~\citeall{IoT_Atzori_2010}, the main constraint will be computational load rather than energy. 
In this project, students will develop and deploy a network of distributed nodes that compute functions on the wireless channel.
USRP Software Defined Radio nodes will be provided to serve as network nodes in this project.
|
|
|}
|}