216
edits
(→Topics) |
(→Topics) |
||
Line 114: | Line 114: | ||
In case studies, it was observed, that the parameters of the approach need to be adapted in order to provide a good tradeoff between security and usability in environments with varying characteristics such as background noise figure. | In case studies, it was observed, that the parameters of the approach need to be adapted in order to provide a good tradeoff between security and usability in environments with varying characteristics such as background noise figure. | ||
In this project, the students will derive a mechanism to automatically adapt the parameters of the audio-based ad-hoc secure pairing mechanism. | In this project, the students will derive a mechanism to automatically adapt the parameters of the audio-based ad-hoc secure pairing mechanism. | ||
| | |||
|- | |||
| Utilising the channel as a calculator for mathematical functions | |||
| [http://www.stephansigg.de Stephan Sigg] | |||
| [http://dx.doi.org/10.1109/IOT.2012.6402311] | |||
| In traditional wireless communication systems, communication load is limited for its large impact on energy resources of nodes. | |||
However, for passive, such as, RFID, backscatter or parasitic nodes, which constitute a significant share of devices in the upcoming Internet of Things (IoT)~\citeall{IoT_Atzori_2010}, the main constraint will be computational load rather than energy. | |||
In this project, students will develop and deploy a network of distributed nodes that compute functions on the wireless channel. | |||
USRP Software Defined Radio nodes will be provided to serve as network nodes in this project. | |||
| | | | ||
|} | |} |
edits