summary of projects - virginia tech · summary of projects may 2011 ... • runs the cognitive...

63
Summary of Projects May 2011 Wireless @ Virginia Tech Virginia Polytechnic Institute and State University 432 Durham Hall Mail Code 0350 Blacksburg, VA 24061 Tel: 540-231-2958 http://www.wireless.vt.edu

Upload: lamnhi

Post on 27-May-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Summary of Projects

May 2011

Wireless @ Virginia TechVirginia Polytechnic Institute and State University

432 Durham HallMail Code 0350

Blacksburg, VA 24061Tel: 540-231-2958

http://www.wireless.vt.edu

Anonoloy

Objective /Goals

Impacts Applications

Highlights

• Create statistically verifiable algorithm to tessellate a reporting area into k-anonomyous regions

• Enable high-granularity tessellations if the population is dense enough to support k-anonymity at that granularity

• Allows locational privacy to be protected in numerous systems that require sensor location reporting

• Enables release of datasets containing locational information for use in multiple other types of research

• Developed algorithm uses no a priori data

• Developed algorithm can dynamically re-tessellate as population distribution changes

• Developed algorithm can handle continuous locations, while prior research can only handle a discrete set of location points

Hamilton Turner, Jules White

Developing algorithms to preserve locationalanonymity in any type of field-based data reporting, such as participatory or opportunistic sensing

Antennas for High-Temperature Sensor Measurements

High-Temperture Gas-Flow SensorOperational and Performance Capabilities - SummaryDesign and develop operational antennas for use in a high-temperature sensor environment

Technical Approach:

• Task 1: Design antenna for broadband environment testing to quantify environment gases

• Task 2: Evaluate environment under operation for transmission bands through the gases => Basis for narrowband sensor and antenna design to sense the environment temperature.

• Task 3: Develop measurement and calibration process for measuring temperature sensor using antennas at the design frequency. Evaluate patterns, efficiency, impedance, and multipath performance

• Task 4: Demonstrate sensor system

To Be Developed:• Analysis of performance of selected designs• Environment characteristics• Narrowband antennas to withstand environment at design frequency and sensitive to temperature sensor

Corporate Information:Virginia Tech, Wireless@VT, VA Tech Antenna GroupDr. William A. Davis302 Whittemore Hall (0111), Blacksburg, VA, 24061Tel: 540-231-6307; Fax: 540-231-3362; E-mail: [email protected]://antenna.ece.vt.edu/

• Transmission frequency bands• Antenna performance: VSWR, Pattern, Efficiency• Antenna survivability in the high-temp environment (copper will melt)• Demonstrate operation of the sensor system with corporate partner

Aperiodic Antenna Arrays Benjamin Baggett (Adviser: Tim Pratt)

Objective /Goals

Impacts ApplicationsFuture Work

Highlights

-80 -60 -40 -20 0 20 40 60 80-60

-50

-40

-30

-20

-10

0

Theta θ

dB

Max SLL = -16.24 dBMax Gain = -1.62 dBHPBW = 1.00 degPointing Error = 0.00 degOper. Freq = 10.50 GHz

• Utilize aperiodic element spacing in antenna arrays

• Wide bandwidth capabilities• Electronic scanning without grating lobes• Reduced number of antenna elements • Maintain comparable far-field pattern

performance to periodic reference array

• Use optimization algorithm to optimize antenna element locations

• Particle Swarm Optimization (PSO)• Array thinned to 77% of original periodic array

• Axial-mode helix used as antenna element

• Scanning ability to ±30°• 1.5-to-1 bandwidth• Grating lobe reduced by over 8.5 dB• Directivity reduced by only 1.0 dB

-80 -60 -40 -20 0 20 40 60 80-60

-50

-40

-30

-20

-10

0

Theta θ

dB

Max SLL = -7.51 dBMax Gain = -1.62 dBHPBW = 1.00 degPointing Error = 0.00 degOper. Freq = 10.50 GHz

Wideband periodic array scanned to +30°

Wideband aperiodicarray scanned to +30°

• Thinning of array elements significantly reduces array cost

• Aperiodicity allows high bandwidth without introduction of grating lobes

• Very useful for any applications requiring high bandwidth arrays

• Theory can be expanded to 2-dimensional arrays

Capacity of Wireless NetworksM. Marathe, G. Pei, A. Vullikanti, VBI, CS and ECE

Objective /Goals

Impacts Highlights

Sponsors: NSF

Characterizing the rate region of a given network and traffic matrixNetwork planning and survivability analysis: estimating potential loss in capacity, and resource allocation to optimize capacity

Develop efficient algorithms for characterizing rate region and quantifying tradeoffs between different objectives, e.g., delays and capacity

Cross-layer optimizationDifferent interference models

Distributed algorithms with low control overhead

Throughput vs long term fairness

Algorithmic framework based on LP framework for approximating rate region

General techniques: linearization and inductive ordering for capturing physical and scheduling constraints

Rigorously provable approximation guarantees for many interference models, including physical interference model based on SINR constraintsCan incorporate a variety of constraints, e.g., power, fairnessDelay throughput tradeoffs with bounds independent of network size

Published in [Pei et al., IEEE INFOCOM 2011], [Chafekar et al., IEEE INFOCOM 2008], [Kumar et al., ACM SIGMETRICS 2005]

Classification of DSA Channel Selection StrategiesTamal Bose, Matthew Rebholz

Objective /Goals

Impacts Highlights

Sponsor: Rockwell Collins Advanced Technology Center

• Further the relationship between Rockwell Collins and Virginia Tech•Develop a Dynamic Spectrum Access (DSA) network simulator•Use the network simulator to analyze different cognitive radio behaviors•Improve the usefulness of different classification techniques to track radios across channels

• Developed and continuously improving the Universal DSA Network Simulator (UDNS)

0 500 1000 1500 2000 2500 3000 3500 4000 4500 500050

55

60

65

70

75

80

85Bayesian Classifier Accuracy Over Next 200 Experiences

Training Experience Length

Per

cent

of I

nput

s S

ucce

ssfu

lly C

lass

ified

Three RadiosFour Radios

• Increased accuracy of radio tracking using naïve Bayesian classification to nearly 80 % with improved scalability

• UDNS will be included in Rockwell Collin’s cognitive engine architecture when completed in July 2011•Potential military and civilian applications •Interface with spectrum sensors and cognitive engines

ClearMobileAdam Antonioli, Steven Byle, Avinash Sridhar, Hamilton Turner, Jules White

Objective /Goals

Impacts Applications

Highlights

• Allow non-programmers to create large-scale data collection applications through a web portal

• Provide storage and visualization of large-scale collected sensor data sets

• Fully usable system creates potential for complex user trials and comparisons to other systems

• Well-defined server API enables expansion to other client systems, such as WP7

• Scalable cloud-based data collection

• Ability to target data collection to specific regions and for user phones to dynamically discover new data collection applications

• Web-based portal to allow researchers to design and deploy data collection apps

Team Lead: Hamilton Turner

Development a framework for rapidly creating applications to collect sensor and other data from users’ smartphones.

NSF-REU: Cognitive CommunicationsTamal Bose, Tonya Smith-Jackson

Objective /Goals

Research Areas

Highlight

To gain hands-on experience in cognitive radios, wireless networking, and their applications;

To develop general research skills and teamwork skills;

To expose the students to the intellectual excitement in emerging wireless communications technology;

To promote creative and independent thinking, a sense of confidence, team spirit, and an appreciation for the potential of interdisciplinary collaboration in creating new knowledge;

To excite the students to pursue graduate studies.

An opportunity for undergraduate students from around the country to participate in the ongoing research activities of Wireless@VT.

Theory and application of algorithms and artificial intelligence for wireless communications;

Signal Processing for software defined radio and cognitive radio communications;

Software framework (OSSIE/GNUradio) and its applications for software defined radio and cognitive radio communications;

Algorithms implementation using a cognitive radio network testbed (VT-CORNET)

Applications of usability/human factors principles, and sociotechnical systems frameworks to cognitive engine and interface design, development, and evaluation.

Sponsor: NSF

Period of Performance: 2009-2012

Cognitive Electronic WarfareM. LaPan, C. Clancy

Sponsor: NRL

Objective /Goals

Applications and Impacts Highlights

Develop highly efficient jamming techniques, as measured by average radiated power

Develop jamming techniques that can learn and track target waveforms

Investigate how learning can be used against intelligent radios, such as cognitive radios using dynamic spectrum access

Apply game theory to optimal jammer design for adaptive waveforms

Investigate non-traditional jamming attacks (targeting implementations rather than protocols)

Support the next generation of electronic warfareBridge the gap between electronic attacks and

computer network attacksFeed future electronic attack platforms with

advanced jamming capabilitiesDevelop attacks that can permanently disable target

devices, rather than simply degrade them temporarily

Cognitive Radar for Spectrum CoexistenceS. Sodagari, M. Marcus, C. Clancy

Sponsor: ICTAS

Objective /Goals

Applications and Impacts Highlights

Develop techniques where a radar platform can use its frequency agility and sensing capabilities to steer around commercial communications networks

Develop communications systems that can take cues from radar platforms to operate in the same band with interference tolerance

Apply these approaches to the Navy’s Aegis AN/SPY-1 platform and address key interference issues with commercial WiMAX platforms

Allows for major spectrum savings for DOD if radar and comms can share the same spectrum

Provides greater resolution to radar platforms by allowing them to leverage existing comms bands

Provides added capacity to comms networks by allowing them to operate in the low-duty-cycle radar bands

Help the DOD solve spectrum crunch issues associated with implementation of the National Broadband Plan

Cognitive Radio Network Testbed (CORNET)PIs: Jeff Reed and Tamal Bose

Objectives/Goals

ImpactsHighlights

• Develop and build an open heterogeneous cognitive radio network testbed for the development, testing, and evaluation of cognitive engine techniques and cognitive radio network applications.

The ICTAS building with the testbed nodes in red

Period of performance:September 2009 – December 2010

Sponsor:Office of Naval Research

• 48 nodes in a modern engineering building• Node hardware:

• Dedicated server for each node• USRP 2• Custom RF DB (100MHz- 4GHz)

• Complete control of the PHY and MAC layer • Remotely accessible• Runs the Cognitive Radio Open Source System(CROSS)

• Enables researchers at Virginia Tech and partner institutions to evaluate independently developed cognitive radio engines, sensing techniques, applications, protocols, performance metrics, and algorithms in a real world wireless environment, in contrast to a computer simulation or single node-to-single node environment• Offers a unique educational environment using real radios

NSF-CCLI: Cognitive Radio Vertical IntegrationTamal Bose, Tonya Smith-Jackson, Carl Dietrich

Objective /Goals

Impacts Highlights

v

Introduce Cognitive/Software Radio concepts to Undergraduates.

Move current Graduate level SDR course into the undergraduate curriculum.

Vertically integrate CR/SDR concepts into several undergraduate courses, starting Freshman year.

Adapt and expand current curriculum to better prepare graduates for modern communications topics.

Develop lab activities and workshops to provide hands-on learning.

Development of undergraduate lab activities at VT and NSU

Digital Communications: SDR Using OSSIE Analog AM/FM analysisDigital PSK/QAM/ASK analysis

Engineering Exploration: Communications Intro using Matlab

Intro to digital modulation and BERPulse shaping and channel filters

Trial labs run during Fall semester 2010Vertical integration self assessment

Preliminary integration of lab activities into the undergraduate curriculum provides a basis for the continued vertical integration of advanced communications topics into the undergraduate curriculum.

Cooperation with NSU facilitates a multi-institutional plan for implementing and analyzing amendments to the curriculum across a diverse cross section of students.

Sponsor: NSF

Period of Performance:2009-2011

Collaborative Position LocationBenton Thompson and Dr. R. Michael Buehrer

Objective /Goals

Impacts and ApplicationsHighlights

Sponsored by the Harry Lynde Bradley Fellowship

−20 −10 0 10 20−20

−15

−10

−5

0

5

10

15

20

X [m]

Y [m

]

PPM

Large error Minimal error • Accurately locate all nodes given noisy range estimates between them.

• Improve upon the inexpensive and distributed parallel projection method (PPM).

• Resolve flip ambiguities and large errors using reflected location estimates.

• Exceed performance of existing solvers.

• Characterization of non-collaborative case reveals multiple minima as main source of error.

• Reflected PPM nearly guarantees optimal solution in non-collaborative case.

• Collaborative localization improved by reflected method; more gains to be achieved.

• Wireless network localization made possible with an accurate, distributed, and inexpensive algorithm.

• Applications include• Geotagging scattered sensors• Creating a real-time map of military

personnel locations• Indoor building layout mapping

Cross-Layer Optimization for Video Transport in Wireless Ad Hoc Networks

Investigators: Thomas Hou, Hanif D. Sherali

Objectives

• Support video communications over dynamic ad hoc networks

• Mitigate the impact of network dynamics (topology change, link/node failure) on video quality

• Optimize video quality under network resource constraints

Impacts

• Numerous applications for public safety, military, and general public

• Serves a critical need in ad hoc networking community

• New educational materials for classroom and research opportunities for students

Highlights

• Exploit multiple description video and multipath routing

• Cross-layer optimization with application layer performance objective

• Design of distributed algorithms and protocols

• Testbed prototyping and validation

Graphic or Photo

Period of Performance: 8/2009 – 8/2012Sponsor: NSF

Cryptographic API and Subsystem SimulatorJ. Reed, J. Park, T. Newman, and B. Brisbon

Objectives/Goals

ImpactsHighlights

• Develop a cryptographic API and the security component adapters that interface with a cryptographic subsystem

• Crypto API and adapters are based on the Security Supplement of the SCA 3.0 specification

• Develop a cryptographic subsystem simulator• Create a waveform demonstration using the developed componentsExample block diagram of an OSSIE system using the

Security Adapter and Crypto Subsystem Simulator.

Period of performance:Sep. 20, 2008 – Sep. 20, 2009

Sponsor:SCA Technica

• The cryptographic adapters that we developed in this project have a multitude of uses. Targeted specifically for the OSSIE software radio framework, the security adapters can be used for COMSEC, TRANSEC, and simply encrypting files on the file system. • We have followed the specification as laid out by the SCA 3.0 Security Supplement, and while not officially supported by JTRS, it provides a solid baseline for security adapter frameworks.

• As a result of this project, a security adapter component and several security enhanced components were added to the library of OSSIE components. As a result, many of the current waveforms can have secure alternatives. Along with the OSSIE components, a software based cryptographic subsystem simulator, while not high performance, can assist academic developers and even be used in classrooms for SDR education and security education.

Dynamic Spectrum Access Security M. Whitaker, C. ClancySponsor: Pentagon CIO

Objective /Goals

Applications and Impacts Highlights

Military is deploying Dynamic Spectrum Access (DSA) tactical radios without fully understanding the impact of recently-discovered attacks

Virginia Tech developed a vulnerability assessment and spectrum simulation tool to inform policy decisions

Virginia Tech has authored DOD’s policy for tactical radios using DSA technology

Ongoing research seeks to further protect DSA systems from jamming attacks

Quantified risk and developed policy that has allowed DSA radios to be fielded

Proof of concept implementation & demonstration done with Shared

Spectrum Company

Proof of concept implementation & demonstration done with Shared

Spectrum Company

Dynamic Spectrum: Models, Allocation and UsageMadhav Marathe, Achla Marathe, Anil Vullikanti,VBI, CS and Agriculture and Applied Economics

Objective /Goals

Impacts HighlightsSponsors: NSF, DTRA

Significant white spaces in many spectrum bandsCognitive networks for dynamic spectrum accessAuctioning of spectrum bands in primary and secondary markets

Spatio-temporal model of spectrum demandModel should be able to account for behavioral changes Understand the impact of new disruptive technologies (tablets, iphones)

Understand the impact of different kinds of market mechanisms for efficient spectrum use and allocation

Spectrum demand in Portland, 1 pm

First principles modeling framework for modeling time-varying spectrum demand in large urban regions

Depends on underlying cellular infrastructure, user mobility, social network, Models effect of behavioral changes on spectrum demandIntegrates a number of public and commercial data setsAgent based framework for studying different market mechanisms

Can study impact of behavioral changes and homophilies in call patternsSpeculators and secondary market has significant impact on market efficiencyTruthful auction mechanisms such as Ausubel’s ascending auction can be applied for efficient market clearing.

Published in DySPAN’10,11 CRIS’10

Efficient Jammers Using a Cognitive Radio NetworkTamal Bose and Jeffrey H. Reed

Objective /Goals

ResultsHighlights

Proposed Cognitive Jammer

Sponsored by: Center for Advanced Engineering and Research

Automatic modulation classifier (AMC) that is robust to multipath effects was developed as a component of the CJ unit.

CJ unit was implemented using USRP and GNU Radio.

Covert Jamming was demonstrated using the proposed testbed

• Malicious users can easily identify the presence of conventional jamming signals and adapt their operations accordingly.

• The goal of this project is to develop Cognitive Jammers (CJ) that overcome the disadvantages of conventional jammers by covertly jamming the malicious users.

• The CJ must also offer least disturbance to friendly users in the frequency band.

The proposed CJ generates a covert jamming signal by taking into consideration the following

•Modulation type used by the malicious users•Type of users operating in the frequency

band•Channel conditions•Energy in the band•Past experience

A three radio cognitive jamming testbed was proposed to test the proposed CJ unit.

An Efficient Jamming System for High Rise BuildingsBei Xie, Majid Manteghi and Tamal Bose

Objective

Impacts, Applications, and OthersHighlights

Ten months’ project

BTS(Femto Cell) BSC

Target

Base Station Subsystem

Radio Subsystem

HandOver

Old Jamming Approach

New Approach

Multistory Urban Jamming Unit (MUJU)

Fig. 1 Illustration of the new jamming approach

This project investigates a new jamming technique for the GSM system which can reduce the time duration of high-power radiation

in the jamming systemcommunicate with any cellular phone in the

jamming areajam the target cellular phone without being

identified by the user

A SDR (software-defined radio)-based BTS is used• Control the interfaces between MS and BTS

and between BTS and BSC• Control the cellular communications in the

targeted area• Software developing is based on the

OpenBTS and the Asterisk PBX• Off the shelf hardware used as the SDR.

The new jamming concept which can control the cellular communications brings a new level of the jamming techniques The new jamming system can be used for high rise buildings and in many military applicationsThis project is based on the GSM system. Future work includes broadening the new jamming technique to the CDMA system or other systems.

Empower

Objective /Goals

ImpactsHighlights

• Create a tool to simulate large-scale data collection applications deployed to smartphones

• Support high-level metric measurement and monitoring for overall success analysis

• Allows opportunistic or participatory system developers to evaluate the success probability of their developed system in the deployment environment

• The methods of handling smartphone property adaptation can be imported into larger simulation environment for greater awareness and use

• Developed simulation is highly flexible and makes extensive use of the Strategy design pattern

• Simulation environment can flexibly describe a number of environments of interest by loading KML geography files

Hamilton Turner, Jules White

Enhancements to OSSIE Software Defined Radio (SDR) Software and Interface, Carl Dietrich, Stephen H. Edwards, Tamal Bose

Objective /Goals

Impacts Highlights

Period of Performance 2009-2011Sponsor: US ARMY CERDEC

To support ongoing research in OSSIE• The OSSIE project's goals are to enable research and education in SDR and wireless communications. • OSSIE includes:

• an SDR core framework based on the JTRS Software Communications Architecture (SCA)• the Waveform Workshop (tools for rapid development of SDR components and waveforms)• an evolving library of pre-built components and waveform applications.

Improved interface and tools for OSSIE SDR software

A flexible way to demonstrate and use Virginia Tech’s Cognitive Radio Network (CORNET) testbed

Enhanced infrastructure for SDR research and education

To be used in SDR class and research at Virginia Tech and beyond

1 graduate and 3 undergraduate students supported

Explored use of alternative CORBA implementation

Improvements to OSSIE tools

OSSIE/SDR testbed web interface (demo w/CORNET)

Exploring Performance Limits of Multi-hop MIMO Networks via Tractable Models and Optimization

Investigators: Thomas Hou, Scott F. Midkiff

Objective and Approach• Observation: Rapid advances of MIMO

research at the physical layer, but a stagnation of research progress at the network layer

• Our goal: Exploring fundamental understanding of multi-hop MIMO networks

• Approach: Build new tractable and accurate models that are amenable for network level optimization

Impacts• Remove the current barrier facing multi-

hop MIMO network research• Offer new network-level understanding of

MIMO networks• Bridging the gap between wireless

communications research and networking research

• Develop new cross-disciplinary course materials for wireless networking

Highlights

• Develop new tractable and accurate models for MIMO links

• Explore performance limits and optimization for multi-hop MIMO networks

• Design distributed optimization algorithms

Graphic or Photo

Period of Performance: 7/2011 – 6/2014Sponsor: NSF

Flexible Internetwork Stack (FINS) FrameworkA. B. MacKenzie, L. A. DaSilva, and M. S. Thompson (Bucknell U)

ObjectivesDevelopment of an open source reconfigurable protocol stack for experimental research on wireless networks.FINS will provide modules:

To build conventional as well as innovative network stacks using existing or new layers, protocols, and algorithms.To monitor, visualize, and log the behavior of all the stack components.To change the behavior of the networking stack while it is in use by modifying the behavior of individual modules or reconfiguring the stack.To teach networking classes with deeper insight into the network stack.

Why FINS ?

Growing doubt about the fidelity of simulations for the evaluation of network protocols and algorithms.The need to overcome technical and logistical challenges in experimental network research.The lack of well-documented, continuously-supported, and easy-to-use experimental networking tools for research and education. The lack of enabling technologies for the implementation of cyber physical system prototypes.

Use Cases

Prototyping experimental cross-layer solutions.Prototyping delay and disruption-tolerant networking protocols such as bundle and routing protocols. Implementing experiments for reconfigurable cognitive networks as well as cognitive nodes.Implementing wireless ad-hoc network experiments.Prototyping context-aware and localization based solutions.

FINS vs Conventional Stack

Sponsor: National Science Foundation, 9/2009 – 8/2012

Fundamental Limits of Antennas –Quality Factor and Band Performance

Fundamental Limits of Antennas – Quality Factor and Band Performance

Operational and Performance Capabilities - SummaryComplete development of a new limit, correcting fundamental errors of energy velocity in last half-century

Technical Approach:

• Task 1: Complete the development of a new fundamental limit and Add higher-order modes for pattern/gain control• Task 2: Estimate excess stored energy causing interference and added loss• Task 3: Relate band performance to the limit as possible and develop fundamental pole-residue modeling relating the performance and antenna structure in a best estimate sense• Task 4: Construct prototypes to demonstrate beam forming limitations of minimum Q antennas• Task 5: Measure prototype performance in VTAG antenna chamber

Deliverables:• New fundamental limits for multiple spherical modes• Determine the minimum excess stored energy in an antenna system and a potential method for measuring Q• Select prototype antennas and measurements

Corporate Information:Virginia Tech, Wireless@VT, VA Tech Antenna GroupDr. William A. Davis302 Whittemore Hall (0111), Blacksburg, VA, 24061Tel: 540-231-6307; Fax: 540-231-3362; E-mail: [email protected]://antenna.ece.vt.edu/

• Lower bound on antenna Quality factor (Q)• Reduced interference to other systems• Increased efficiency for given size• Maximize bandwidth use• Simpler antenna models for Communication systems• Gain control by mode control

• Reduce inter-ference/Absorbtion

• Improved Efficiency• Simpler Structure• Wideband• Gain

Game Theoretic Models for Cooperation in Wireless Networks

Allen B. MacKenzie

Sponsor: National Science Foundation, 6/2005 –5/2012

The figure shows a network under topology control. Frame (a) shows the network before node j is removed from the network. Frame (b) shows the optimal, network-lifetime-maximizing reconnection of the network. Frame (c) shows a good reconnection solution that relies only on incomplete, local information.

This project is developing a theory of cooperation using game theoretic tools, specifically potential games, to explain how network nodes with disparate and limited information can cooperate to achieve network-wide goals. One application is optimal algorithms for controlling transmission power in a network.A second application is selecting code sequences in a wireless network, so called “interference avoidance.”The project also includes outreach to teach underrepresented middle and high school students about wireless networks.

Objectives

Developed significant new algorithms and proof techniques for interference avoidance in CDMA-like systems.Developed significant new game-theory-inspired algorithms for topology control in wireless networks, which have now been implemented by CERDEC.Currently enhancing these topology control algorithms.Currently working on coalition game-theory based analyses of cooperation in mobile ad hoc networks.Taught hundreds of economically disadvantaged middle school students and high school women about wireless communications through hands on activities.

Highlights Key ReferencesA. B. MacKenzie and L. A. DaSilva, Game Theory for Wireless Engineers. Morgan and Claypool, 2006.R. S. Komali, A. B. MacKenzie, and R. P. Gilles, “Effect of selfish node behavior on efficient topology design,” IEEE Transactions on Mobile Computing, vol. 7, pp. 1057–1070, September 2008.R. Menon, A. B. MacKenzie, J. E. Hicks, R. M. Buehrer, and J. H. Reed, “A game-theoretic framework for interference avoidance,” IEEE Transactions on Communications, vol. 57, pp. 1087–1098, April 2009.R. Menon, R. M. Buehrer, A. B. MacKenzie, and J. H. Reed, “Interference avoidance in networks with distributed receivers,” IEEE Transactions on Communications, vol. 57, pp. 3078–3091, October 2009.R. S. Komali, R. W. Thomas, L. A. DaSilva, and A. B. MacKenzie, “The price of ignorance: Distributed topology control in cognitive networks,”IEEE Transactions on Wireless Communications, vol. 9, no. 4, pp. 1434–1445, 2010.

Geolocating MIMO SignalsDr. R. Michael Buehrer, Jacob Overfield

Objectives

ApplicationsDetails

• Determine how MIMO signals will impact Cross-Ambiguity Function (CAF) • Investigate how Time Difference of Arrival (TDOA) and Frequency Difference of Arrival (FDOA) methods for geolocation are impacted by MIMO signals• Investigate methods for improving geolocation for MIMO signals

• Civilian:• Assisted GPS technologies• Aircraft & Satellite Tracking• Rescue Beacon

• Military:• Locating friends/foes• Tracking

MIMO reduces the max correlation

Intelligence Community Center of Academic Excellence (ICCAE)Reed, Bose, Amanna

Objective /Goals

Impacts Highlights

Period of Performance 2009-2014Sponsor: ODNI

• Develop critical thinking and core competencies in new graduates• Increase awareness of the missions of the IC and National Security• Sponsor study abroad to increase cultural awareness• Develop new curriculum• Host symposiums on IC / National Security Topics• Encourage and assist with internship applications• Sponsor pre-collegiate outreach• Engage with IC for guest speakers and student mentoring

I just wanted to give you a big ‘thank you’ for all that you’ve done with the IC-CAE program. I know that you’ve put a lot of time and effort into helping us out as students and as young professionals. I can’t explain how helpful this program has been and how many doors it truly has opened for me.” – Lucas W

“Again, thank you for all your support and guidance over the pastyear! I feel like IC CAE assisted me so much in my job search process and has been such a fantastic program to be a part of, I've enjoyed every minute. Please let me know if I can assist in any other way or if you have any advice for me as I continue in my career after graduation.” –Kammy M.

21 students sent on study abroad since 2009

104 applications to IC agencies for 2011

Over 100 office hours for 2011

9 IC Guest Speakers for 2011

6 COE to Govt. agencies

4 new courses, 1 certificate, 1 minor, in proposal

STEM outreach to Middle school

Information Theoretic Analysis of MIMO Pilot Nulling Attacks S. Sodagari, C. Clancy

Sponsor: ICTAS

Objective /Goals

Applications and Impacts Highlights

Introducing pilot singularity attack for the first timeShowing the effect of jamming MIMO channel sounding

symbols is more destructive than current jamming methods:

e.g. barrage or pilot jamming

Attack attempts to reduce the rank of the channel gain matrix estimate by the receiver

Studying effects on channel bit error rate, capacity, and eigenvalues.Multi-Antenna Pilot Jamming

Attack on MIMO Systems

(a) Mutual Information between MIMO channel matrix and its estimate with no jamming (b) Jammer’s ideal goal in manipulating MIMO CSI at the receiver

Pilots in a 2 × 2 WiMAX OFDM.

Developing constraints associated with jamming MIMO sounding channels

Describing how these attacks specifically impact data symbol estimates for OFDM pilot-based sounding systems

Comparison of perceived MIMO capacity in a 4 × 4 WiMAX vs. SNR with and without differentjamming strategies (20% error in jammer’s CSI estimation)

AUSTIN: An Initiative to Assure Software Radios have Trusted Interactions

Jeff Reed, Tom Hou, Jung-Min Park, Cameron Patterson

Objective /Goals

Impact and ScopeHighlights

• Examine the theoretical underpinnings related to distributed system regulation for software radios

• Develop an architecture that includes trusted components and a security management plane for enhanced regulation

• Research onboard defense mechanisms that involve hardware and software-based security

• Study algorithms that conduct policy regulation, anomaly detection/punishment, and secure accounting of resources

• Holistic approach for regulating software radios• Execution Integrity of Critical Software Modules in CRs

• Using Power Fingerprinting to detect illegal execution• Policy Reasoning Algorithms and Policy Reasoners

• Policy reasoning algorithms and software engines for real-time policy interpretation, process, and enforcement

• Network Resource Optimization for CR Networks• Unifying analytical framework for the multi-dimensional

cross-layer design space of CR for tractability• Configurable Hardware-Assisted Rule Enforcement

Controller for CR reconfigurable platforms• Automatically integrates PHY- and MAC-level policy

enforcement into CR reconfigurable hardware blocks

Period of performance: Sep 2009 – Aug 2011Sponsor: National Science Foundation

• Ensure the trustworthy operation of software radios

• Support the next generation of wireless technology

• Holistic system view

• Deeper understanding of security for highly-programmable wireless devices

• Reduce interference risks and increase trust in CR Technology

• Diverse, multi-disciplinary team

• WINLAB at Rutgers University

• Wireless @ Virginia Tech

• University of Massachusetts

Ana

lysi

s

Des

ign

Polic

y re

ason

ing

an

d en

forc

emen

t

Inte

grity

Ass

essm

ent

Trus

twor

thy

Con

figur

able

HW

Trustworthy CR Operation

Inter-dependent Infrastructures: Reliability, Failures and Human-mediated interactions

C. Barrett, .M. Marathe, A. Marathe, A. Vullikanti: VBI, CS, Ag& App. Economics

Objective /Goals

Impacts HighlightsSponsors: NSF, DTRA

Need tools to study interdependencies in the networked infrastructures. End to end simulation system that can not only model and simulate multiple infrastructures but also capture the points of interdependencies among them.

Systematic study of human-initiated disruption, resulting in cascading failures in infrastructures:

Modeling framework to study cascading failures in inter-dependent infrastructures

Activity based framework for modeling traffic congestion, revised cell usage patterns in face of evacuation caused by a chemical plumeTransportation networks, social phone call networks and cellular networksNetwork planning: model effect of changes in call patterns during evacuation and its impact on transportation and spectrum demand

Study how altered human behavior at the time to crisis causes altered activities, travel, route planning and calling behavior. Study the cascading effect of congestion in transportation network on overloading of base stations and altered spectrum demand.

Published in Beckman et al., DySPAN’10, DySPANCRIS’10, CRIS’09

Low-cost Cognitive Radio Technology for Enhanced Communication

and Situational Awareness for Networks of Small UAVsCharles W. Bostian

Objective /Goals

ApplicationsHighlights

This material is based on research sponsored by Air Force Research Laboratory

under Agreement #FA8750-09-2-0128. The views and conclusions contained herein

are those of the authors and should not be interpreted as necessarily representing

the official policies or endorsements, either expressed or implied, of Air Force

Research Laboratory or the U.S. Government.

• Implement CSERE cognitive engine (CE) on

BeagleBoard single board computer

• Provide USAFRL Rome with prototype flight

model CE and cognitive radio CR called UAV

CSERE, suitable for deployment on USAFRL

UAVs

• Cooperate with USAFRL to develop and conduct

live-flight UAV CR experiments for UAV CSERE

• CSERE: CWT’s self-modifiable,

modular cognitive engine

• BeagleBoard: lightweight

compact single board

computer

• Result: flexible multi-band multi-mode adaptive

radio communications for UAV mission success

• Mission resource

conservation: UAVs

share responsibility

for data backhaul

• Link reliability: UAVs with poor link performance

hand off to with better link performance

• Mission Optimization: UAVs optimize link and

position to ensure optimal mission performance

Low Cost Internet Access for Rural IndiaKaran Desai (Adviser: Tim Pratt)

Objective

Highlights

• Create a low-cost alternative to existing satellite based Internet system for villages in India costing users $ 1.00 per month

• Use an aging Ku band communication satellite in inclined geosynchronous orbit to access a village hub station. Link to users with WiFi.

• Determine availability, link budgets, define implementation strategies to make the project economically feasible

• Analyze use of Intelsat 906 in an inclined geosynchronous orbit. Visibility, look angles and availability calculated using simulations and link budget calculations

• It is possible to provide basic Internet access to 96,000 villages on a best effort basis at a cost of $1 per customer per month using one satellite, one central hub and one unmanned earth station per village

Impact• System can help bridge disparity in

Internet penetration in rural India• Design is generic and can be

replicated in any market using different satellites

• Work performed 8/2010 through 4/2011

• Sponsor: Virginia Tech

Machine Learning for LocalizationJavier Schloemann & Dr. R. Michael Buehrer

Objective /Goals

Current Research FocusPotential Applications

Research sponsored through the Bradley Foundation

Trilateration

θ

Triangulation

TDOA Positioning• Improve localization performance

through the use of machine learning techniques

• Utilize intelligent sensor fusion to improve position estimate using all reliable available data

• Fault detection and isolation/exclusion• Dynamic propagation models• Path delay profiling• Integration of multiple localization

techniques• Integration of map knowledge• Localization of sensors in sensor

networks

Localization

Bayesian networks•Exploit conditional independence relationships between random variables to simplify full joint PDFs•Techniques exist which allow for the inferring of unknown data based on the available known data

Mobile Cognitive Radio TestbedPI: Tamal Bose and Jeff Reed

Objectives/Goals

ImpactsHighlights

• Study research issues pertaining to the mobility of nodes •Test developed algorithms, protocols, and applications in a realistic mobile wireless environment • Reconfigurable mobile network• Connect with the network testbed of fixed CR nodes to have larger scale heterogeneous testbed

Example scenarios that can be evaluated with the proposed mobile nodes

Period of performance:May 2010 – December 2011

Sponsor:Army Research Office

• Custom mobile node that includes:• A Small Laptop PC• Pico Expresscard (Virtex-5 FPGA)• Custom RF board (100Mhz to 4GHz)

• Will facilitate the evaluation of scenarios that involve mobile nodes• Will enhance the capabilities of the existing fixed node testbed, CORNET• Can be used both for educational and research purposes

Modeling and analysis of malware in 3G+ networksM. Marathe, A. Vullikanti, VBI and CS, K. Channakesava (Ericsson)

Objective /Goals

Impacts Highlights

Sponsors: NSF, DTRA

Efficient techniques for detection, analysis and control of the spread of malwareNew approaches to capture heterogeneous and mobile networks

Realistic multi-scale models of mobile networks – proximity based (BlueTooth) and InternetScalable tools for simulation and analysis of malware spread on very large networks

Spread of malware in Activity-based networks

Spread of malware in Random mobility models

New ways to control the spread, detect the onset and finding vulnerable devices Mobility matters - Realistic networks are structurally different than simple random networks.Structural differences affect how malware spreads.Underscores the importance of studying human mobility and its impact on wireless networks

EpiCure: HPC-modeling framework that can represent and study malware over urban scale (with millions of nodes), time varying and heterogeneous networks1000 times faster than prior approachesApproach based on epidemics on social contact networks, BlueTooth specific states abstracted out

Approximation error less than 5%

Published in: IPDPS’11, Simutools’09, BioWire’09

Time

Spac

e

Internet worms

Human worms

DaysSeconds

Mobileworms

Threat of malware increasing with smart phones and mobile devicesChallenges: multiple-scales, self forming networks, need to model user behavior

CAREER: Non-Conventional Solutions forEnsuring Security in Cognitive Radio Networks

Objective

Impact and ApplicationsHighlights

PI: Jung-Min “Jerry” Park

• Robust control channel establishment using channel hopping (CH) in Cognitive Radio (CR) networks

• Multiple rendezvous channels per node pair– Robust to link breakage caused by

licensed users or jamming attackers• Bound for time-to-rendezvous (TTR)

– Small channel access delay• No need for global clock synchronization

• A systematic framework of designing CH-based rendezvous protocols using quorum systems (QS)

• Properties of QS properties of CH systems• Optimal CH system designs for rendezvous

– Maximum # of rendezvous channels per pair of CH sequences

– Minimum CH period (Min bound for TTR)– Maintained rendezvous given clock drift

• Jamming-resistant key establishment using frequency hopping

• Fast neighbor discovery and link establishment in multi-channel environments

• Reliable control channel for comm. between heterogeneous wireless devices/networks

TV White Space ~700MHz

Open Source GSM DevelopmentT. Tsou, T. Cooper, S. Carver, C. Clancy, T. Bose

Sponsor: JHU-APL, Army CERDEC

Objective /Goals

Applications and Impacts Highlights

Supporting further open-source development of the open-source GSM base station platform, OpenBTS

Has numerous potential applications in federal, commercial, and military scenarios

Project goals:Integrate OpenBTS with OpenBSC to support broader

core network for GSMSupport advanced features, such as Cell BroadcastDevelop a command and control infrastructure for

OpenBTSSupport embedded platforms

Supports R&D into cellular security issues allowing full experimentation with the GSM L1/L2/L3 stack

Educational tool allowing students to develop/deploy cellular infrastructure

Applications in developing and prototyping secure cellular infrastructure by adding advanced features to the cellular network

Interested in expanding work to look at GPRS, UMA, and other cellular technologies

OpenBTS system operating on a

USRP2 software-defined radio

platform

OpenBTS system operating on a

USRP2 software-defined radio

platform

Open Source GSM for White SpacesTamal Bose, Jeffrey H. Reed, T. Charles Clancy

Objective/Goals

Related Software to Be UsedHighlights

Period of Performance: 2010-2011Sponsor: U.S. Army CERDEC

• Develop GSM/DSA single-cell network for white spaces• Test network in GSM-900 (unlicensed ISM-900) band• Study cell loading, call quality, and other metrics

affected by white spaces to assess operation feasibility• Determine feasibility of operating GSM network in white

spaces• Lower costs of GSM network operation

• Cheaper hardware (USRP)• Free open source software• Unlicensed spectrum

Proposed GSM Network in Software:• OpenBTS – BTS with SIP L3 (VoIP via Asterisk) and

Um air interface (via USRP)• Osmocom:

• osmo-bts – BTS with Abis-over-IP and no Um air interface

• OpenBSC – Minimal BSC, MSC, HLR, VLR, EIR, and AUC with Abis-over-IP

Power Fingerprinting Monitor

Pow

er T

race

Software Modules

t

Power Fingerprinting in SDR and CR Integrity AssessmentJeffrey. H Reed and Carlos R. Aguayo Gonzalez

Objective /Goals

Applications and ImpactHighlights

Period of performance: Sep 2009 – Oct 2011Sponsor: National Science Foundation

Match real-time power

traces against trusted

signatures

Malicious intrusions cause deviations from the signatures

• Fine-grained, real-time monitoring of power consumption

• Independent, physically separated sensor

• Embedded or external monitor

• Signatures from trusted implementations or models provide a baseline reference

• Obtained during validation phase in controlled environment

• Feature extraction and anomaly detection

• Compare how closely the observed power consumption matches the signatures

• Demonstrate the feasibility of PFP on commercial platforms

• Identify the best discriminatory features to uniquely identify software execution

• Develop optimal classifiers that include multiple features

• Investigate methodologies to profile software modules and extract reference signatures

• Evaluate the expected performance in terms of detect

• Develop a framework to perform regulatory policy enforcement using power fingerprinting

• Effective mechanism to enforce regulatory policy in SDR and CR

• Detect unauthorized modifications in certified radios

• Intrusion detection and integrity assessment in wireless and embedded systems

• Smart phones industrial control

• Independent of platform, OS, and application

• Effective against zero-day attacks

• Inherent physical protection for the monitor

• Minimal overhead

Predicting Future Locations and Arrival Times of IndividualsIngrid Burbey, PhD

Objective /Goals

ContributionsHighlights

Portions of this research were supported by the U.S. National Science Foundation under Grant DGE-9987586.

1. Predict where someone will be at a future time (e.g. Where will you be at 10:00am?)

2. Predict when someone will be at a future location (e.g. When can I find you in your office?)

3. Do the above with sparse data (non-continuous tracking)

Predicting where someone will be at a future time is straightforward, done with a low-order Markov model.

Predicting when someone will be at a future location can be done using a heuristic model.

• Use of sparse data in location prediction. Existing research assumes continuous location tracking.

• Future location prediction. Current work predicts next location, not future locations.

• Time of arrival prediction.

To support applications which are• contextually-intelligent• proactive instead of reactive• support ubiquitous/pervasive computing

Public Safety Cognitive Radio on a DSP PlatformQinqin Chen, Almohanad Fayez, Alex Young, Nicholas Kaminski, Hedieh Alavi,

Charles Bostian, Michael Hsiao

Objective /Goals

• Recognize all public safety waveforms, 150MHz to 700MHz

• Interoperate with all public safety radios• Provides gateway between incompatible networks• Serves as repeater if desired• Open Source• Modular Architecture• Embedded System

• Low cost• Small size

This chart present work done by Virginia Tech’s Center for Wireless Telecommunications Cognitive Wireless Technologies (CWT) team under National Institute of Justice Award No. 2009-SQ-B9-K011.

• Intelligent and affordable solution to public safety communications interoperability problems• Suitable for manufacture by the LMR industry

During an emergency situation like hurricane Katrina, public safety first responders from different agencies need to communicate effectively with each other, but personnel from different jurisdictions and services frequently use incompatible radios.

Capabilities/Features

Problem

•Improve robustness, reliability, and potential for interoperability of wireless communications for PTC

•Develop a Cognitive Radio (Rail CR) engine and integrate it with a Software Defined Radio (SDR)

•Sense spectrum and performance changes, decide on radio mitigation strategies, implement changes, and learn from past decisions.

•Develop Rail-CR concept of operations, functional requirements, and test case scenarios in simulation and SDR hardware platform

Railway Cognitive Radio to Enhance Safety, Security, and Performance of Positive Train Control (PTC)

Project Objectives

Railroad Impact: Safety & Oversight

Sponsor: Federal Railway Administration Period of Performance: 2009-2011

Enhanced communications with…•Other companies, Base Stations, Signal Switches

Protection against…•Interference (multipath, attenuation)•Intentional jamming

Improved…•Radio link performance, spectrum efficiency

Status

• Rail-CR Concept of Operations 100% complete

• Cognitive Engine 75% complete• Rail-CR simulation 90% complete• SDR test-bed platform 50% complete• Test Plan 10% complete• SDR Integration Manual 10%

complete

PI : Dr. Jeff Reed, Ashwin Amanna

RFID Concepts and Applications-- Currently with Dr. Manteghi --

RFID Concepts and Applications Operational and Performance Capabilities - SummaryAdapt small tag designs to weapon systems and consider design processes without chip to reduce power requirements in the presence of ordance

Technical Approach:

• Task 1: For a given footprint, optimize the design of RFID tags to approach the fundamental limit in bandwidth and gain using appropriate meander techniques• Task 2: Improve the efficiency of small tag structures to improve response to minimal power• Task 3: Develop chipless RFID tags based on pole-residue concepts of antenna structures to minimize power requirements in the system.• Task 4: Design a reader concept to optimize low power operation of a tag in the presence of ordance• Task 5: Build and Measure sample tag structures to demonstrate the performance characteristics

To Be Developed:• Optimized tag antenna design for given footprint limitations• Techniques for improving efficiency• Demonstration of a tagless RFID structure and ID differentiation

Corporate Information:Virginia Tech, Wireless@VT, VA Tech Antenna GroupDr. William A. Davis / Dr. Majid Manteghi302 Whittemore Hall (0111), Blacksburg, VA, 24061Tel: 540-231-6307; Fax: 540-231-3362; E-mail: [email protected]://antenna.ece.vt.edu/

• Maximize bandwidth to the fundamental limits of antennas• Improve efficiency of structure• Minimize power requirements• Evaluate performance in new frequency bands and determine the tradeoffs

• Reduce Size of tag• Maximize Efficiency• Chipless Tags• Minimal Power (in presence of ordance)

SDR Technology DevelopmentJeffrey H. Reed, Carl Dietrich, Peter Athanas

Objective /Goals

Impacts Highlights

Period of Performance 2010-2012Sponsor: US Department of Defense

To investigate and develop SDR related technology

•RF front end and related hardware and APIs

• Requirements and fundamental limitations of wireless communications standards

• Implementations of selected standards

RF front end, related hardware, and APIs will facilitate SDR research

Improved understanding of challenges for SDR implementation of communications standards, perspective for designing new standards

SDR implementations/components for use in research

Several students supported

Hardware and APIs under development

Requirements and limitations investigation and implementations in progress

Secrecy CapacityAnnie Martin, R. Michael Buehrer

Project Goals

Determine the secrecy capacity of MIMO systems.Determine how we achieve this rate, or what rates can we actually achieve.

• If Tx has no channel information• If Tx knows only its intended receiver's channel• If Tx knows only where the wiretapper is• If Tx knows all channel state information

Determine how a transmitter increases this capacity.Determine how a receiver increases this capacity.Determine how wiretapper decreases this capacity.

Highlights

The secrecy capacity is generally the difference between the two channel capacities, which are factors of the channel coefficients, H_r towards the receiver and H_w towards the wiretapper.

MIMO communications are technically using multiple spatial channels, which makes the analysis more complex, as we can choose to use only some of the channels based on our knowledge of the channel statistics.

Why worry about physical layer security?Doesn't need encryption computation:

• Less Hardware• Faster

Additional Layer of SecurityCan hide additional factors of a transmission:

• Presence of signal• Modulation of signal

Disadvantages compared to encryption:Based on stochastic processSignificantly lower data rates

Sponsored by Aerospace Corp.

IntendedDestination

Wiretapper

H_r

H_w

Simulation and Design for Handheld Antennas

Small Handheld System Operational and Performance Capabilities - SummarySimulate candidate antenna and design new antennas for use as UHF embedded antennas on handheld.

Technical Approach:

• Task 1: Evaluate potential antenna solutions for an embedded antenna.

• Task 2: Simulate solutions, possibly with active switching to adaptively tune antenna (Narrowband application over a wide user band)

• Task 3: Evaluate Patterns: Gain and efficiency (Efficiency and Q impact the interaction with the user)

• Task 4: Evaluate Impedance and VSWR

To Be Developed:• Analysis of performance of selected designs• Effect produced by platform• Omni-directional patterns for land-based communications and also arial communications

Corporate Information:Virginia Tech, Wireless@VT, VA Tech Antenna GroupDr. William A. Davis302 Whittemore Hall (0111), Blacksburg, VA, 24061Tel: 540-231-6307; Fax: 540-231-3362; E-mail: [email protected]://antenna.ece.vt.edu/

• Reliability• Performance

• VSWR• Pattern

• Relevant software or hardware specifications

• Low to Mid UHF

• 1Watt

• Efficiency - ?

Simulations for Small Antennas on Combatant Craft

Antenna Simulations for Combatant Craft Operational and Performance Capabilities - SummarySimulate a monopole type structure for use at HF in a small antenna category.

Technical Approach:

• Task 1: Simulation of a loaded monopole structure for mounting on a platform and to be used at HF.

• Task 2: Evaluate Vertical and Azimuthal Patterns

• Task 3: Evaluate Impedance and VSWR

• Task 4: Evaluate different methods of analysis for best numerical simulation performance relative to time and accuracy trade-offs.

To Be Developed:• Analysis of performance of selected design• Effect produced by platform• Elevation pattern needs for vertical radiation

(mechanisms)

Corporate Information:Virginia Tech, Wireless@VT, VA Tech Antenna GroupDr. William A. Davis302 Whittemore Hall (0111), Blacksburg, VA, 24061Tel: 540-231-6307; Fax: 540-231-3362; E-mail: [email protected]://antenna.ece.vt.edu/

• Reliability• Performance

• VSWR• Pattern

• Relevant software or hardware specifications

• Small HFmonopole

• Communications• Low Elevation

• Omni• High Elevation

• Arial

NEXT GENERATION SECURE, SCALABLE COMMUNICATION NETWORK FOR SMART GRID

PI: Jeff Reed, Co-Pis: Mike Buehrer and Haris Volos

Objectives/Goals

ImpactsHighlights

• The core objective is to conduct research, development, and demonstrations leading to next generation secure and scalable communication network for smart grid

Virginia Tech will investigate:• Spreading code and multiple access design for

CDMA mesh networks;• Interference/jamming mitigation techniques;• Multiuser detection techniques; and• Combined communication and position location

using spread spectrum waveforms.

Period of performance:February 2010 – October 2011

Sponsor:Oak Ridge National Laboratory (ORNL)

• A new Smart Grid for the generation, transmission, and distribution of electricity is under development• The Smart Grid is depended on wireless technologies for facilitating its operations• The wireless technologies used must be secure and robust•ORNL has a patented Hybrid Spread Spectrum Direct Sequence and Frequency Hopping waveform• Virginia Tech will assist ORNL with applying their waveform to the needs of the Smart Grid

• Meeting the goals of this project, would provide better support to enhance the cyber-security of communication and control systems specific-to smart grid to efficiently perform the production and distribution of electricity.

A Singularity Expansion Method (SEM) based Space-Time-Frequency (STF) Detection Technique

Late Time: The above time-frequency graph shows how to find the beginning of the late time and time of arrival (time-step 350 for this case).

Increasing Accuracy: The real and imaginary parts of each pole can be fund more accurately in presence of noise

This technique allows us to detect an object using its natural resonances and find its xyz position

MAIN ACHIEVEMENT:• A set of poles (natural

resonances) is added to an object as identification code.

• These poles in addition to the native poles of the structure have been detected from the time

QU

AN

TIT

AT

IVE

IM

PA

CT

EN

D-O

F-P

HA

SE

GO

AL

ST

AT

US

QU

ON

EW

IN

SIG

HT

S

Majid Manteghi, Wireless @ Virginia Tech, [email protected]

Challenges associated with the late-time/early-time issues prevented people to use SEM efficiently and effectively. This work tries to address this issue and integrate it with antenna array to create a space-time-frequency detection technique. One can encode a particular object with a known set of poles to be identified uniquely.

•This work proposes a mathematical technique to use special information in addition to the frequency domain and time domain data to:1. Accurately identify a particular object2.Find its three dimensional position.•The current Singularity Expansion Method (SEM) based detection techniques are not able to distinguish between the early time and the late time response of a particular object from its impulse response. This has been a challenge during last 40 years.

A short-time Matrix-Pencil Method is introduced with a multiple antenna configuration to:

1.Increase the accuracy of the detection method in presence of noise.

2.Separate the early-time and the late-time response from the impulse response of an object.

3.Use the time of arrival of each group of poles at different antenna in a triangulation algorithm to find the position of a particular object

-3 -2.5 -2 -1.5 -1 -0.5 0x 109-15

-10

-5

0

5

10

15

Damping

Freq

, GH

z

domain scattered signal resulting from an impulsive illumination (frequency sweep) using both measurement and simulation data by matrix pencil method.

• The real and imaginary parts of poles have been computed much more accurately using this new technique.

0 1 2 3 4-10

-5

0

5

10

Time (nsec)Scat

tere

d si

gnal

mv/

mHOW IT WORKS: A time window moves from the beginning of the received signal to the end sample by sample. The poles of each time window are computed using MPM. The late-time starts when poles show stable behavior with moving time window.

ASSUMPTIONS AND LIMITATIONS:• The frequency range of the illuminator must

include all the resonant frequencies. Therefore, to detect small objects we need very short pulses.

The starting point

of the late time

0 5 10 15 20 250100200300400500600

Imaginary parts of the poles (GHz)

Tim

e w

indo

w

Throughput Optimization of Cooperative Relaying in Wireless Networks

Investigators: Thomas Hou, Scott F. Midkiff, Hanif D. Sherali

Objectives

• Exploit cooperative communications (CC) in a multi-hop ad hoc network

• Optimize network level throughput via cooperative relaying

• Understand potential and performance limits of cooperative relay networks

Impacts• Advancing a key technology to increase

throughput and reliability of wireless networks

• Offer solutions at the network layer for cooperative relay networks

• Develop new mathematical models and tools

• Develop cross-disciplinary course materials for wireless networking

Highlights

• Optimal use of network coding (NC) in cooperative relay networks

• Relay node selection for throughput maximization

• Explore performance bounds of cooperation in multi-hop relay networks

Graphic or Photo

Period of performance: 7/2011 – 6/2014Sponsor: NSF

Thwarting Software Attacks on Data-intensive Platforms Using Configurable Hardware-assisted Application Rule Enforcement (CHARE)

Mohammed M. Farag, Lee W. Lerner and Cameron D. Patterson

Objective /Goals

Cognitive Radio ApplicationHighlightsSponsor: NSF Period of Performance: 9/1/09 – 8/31/12

Architect a Tailored Trustworthy Space (TTS) on a configurable embedded platform

Want cross-layer enforcement: don’t rely solely on SW integrityMain tool is separation, since sharing is the attacker’s best friendHW oversight of certain SW responsibilitiesSynthesis of rule-enforcing HW controllers on HW/SW

boundariesFormal modeling of controllers enables formal verification of rule

enforcementDesign for performance and design for security are quite

compatible with HW implementation

Construct system partitions and module interfaces from a security perspective

Controllers insulate SW from knowledge of or access to:• Datapath structure, configuration, or parameters• Cryptographic keys• Decrypted HW IP configurations

Application-aware controllers scrutinize SW (even OS) requests and monitor data transfers in real time

• Suits networking, communication, defense, high-reliability, and safety critical applications

Developing tools to automatically embed a subset of application-specific rules into FSM-based HW controllers that are formally modeled, synthesized, and verified

Example of physical layer policies enforced / monitored by an automatically synthesized and formally verified hardware controller (“DREC”) wrapping the baseband datapath:

Tightly Coupled Arrays-- Current PhD Research (USCGA) --

Tightly Coupled ArraysOperational and Performance Capabilities - SummaryApply structure design to a typical Navy scenario and design theelement to optimize bandwidth and gain performance

Technical Approach:

To address the needs of satellite or other directed beam needs with broadband performance

• Task 1: Evaluate the source of surface wave creation and related standing waves within the array• Task 2: Optimize array designs to achieve a 4:1 impedance bandwidth and pattern consistent to equivalent uniform aperture• Task 3: Develop feed networks, including physical supports for phased feeding• Task 4: Employ loading strategies to suppress array guided surface wave• Task 5: Demonstrate wideband performance through simulation

Corporate Information:Virginia Tech, Wireless@VT, VA Tech Antenna GroupDr. William A. Davis302 Whittemore Hall (0111), Blacksburg, VA, 24061Tel: 540-231-6307; Fax: 540-231-3362; E-mail: [email protected]://antenna.ece.vt.edu/

• Reduce array element spacing for wider beam scan• Increase the effective element area over the practical physical

size• Allow for multifunctional array usage by specific element

selection (adaptive array!)• Maximize bandwidth use of planar array (target 4:1)

• Smaller elementspacing

• Larger Effective Areaof element

• Wideband Array• Improved grating lobe

performance

Surface Wave

Resonance

0.9 1.88 3 4 5 6 7 8 9 101

2

3

4

5

6

7

8

9

10

Frequency (GHz)

VSW

R

Dual-band PIFA (simulation)Dual-band PIFA (measurement)Spoon UWB (simulation)Spoon UWB (measurement)

Wideband Antennas

WIdeband Antnneas Operational and Performance Capabilities - SummaryRelate the antenna size to bandwidth, specifically evaluating the related upper and lower frequency limits (Note: typical UWB antenna is a high-pass filter)

Technical Approach:

• Task 1: Based on fundamental limits, develop a characteristic lower bound for frequency, with/without tuning• Task 2: Based on fundamental limits, develop a characteristic upper bound for frequency, with/without tuning• Task 3: Relate pole residue structure of antenna to antenna type: narrowband, UWB, and frequency-independent• Task 4: Relate structural properties that denote narrowband, UWB, and frequency-independent structures• Task 5: Develop and measure prototypes to demonstrate concepts and improved performance

To Be Developed:• New methods for estimating minimum and maximum

frequency limits on antennas• Structural relationship to pole response• Sample antennas and measurements

Corporate Information:Virginia Tech, Wireless@VT, VA Tech Antenna GroupDr. William A. Davis302 Whittemore Hall (0111), Blacksburg, VA, 24061Tel: 540-231-6307; Fax: 540-231-3362; E-mail: [email protected]://antenna.ece.vt.edu/

• Obtain lower frequency bound, with/without tuning• Obtain upper frequency bound, with/without tuning• Pole structure types for frequency description• UWB versus Freq.-indep. Design: performance and pole structure

• Small size limitations• Band Performance

vs size• UWB Concepts• Frequency-Indep.

Concepts• Pole Distribution

Wireless Distributed and Social Computing : Architecture, Protocols & PrimitivesC. Kuhlman, M. Khan, M. Marathe, A. Vullikanti,

Virginia Bio-informatics Institute and Dept. Computer Science

Objective /Goals

Impact Highlights

Sponsors: DTRA, NSF, DARPA

Model driven architectures that scale and exploit context (what, when, where and who)

Bio-inspired paradigms Efficient and robust distributed primitives

Time, message and energy efficientAbility to deal with dynamic networks

HPC-based modeling environments to design and analyze WDC systems

Networks with 100,000 nodes and more

• DASim: An HPC-based modeling environment to study distributed protocols, primitives &contagion in wireless social networks

• Algorithms and Statistical techniques to measure performance of large wireless networks

• CoSMO: Cognitively-inspired architecture for distributed sensing, situation assessment and control

• Efficient distributed algorithms, e.g.Topology controlMinimum spanning tree (MST)Broadcast

Challenges:• Interference• Dynamic topology• Energy is crucial• Time critical • Must be scalable to

large number of nodes

New methods for opportunistic offloading that reduce backbone traffic by 50%Methods for targeting nodes to improve the scope and efficiency information diffusionModels suggest ways to develop wireless architectures that can support energy efficient network primitives

Results published in: IEEE JSAC’09, TPDS’09, INFOCOM’08, WINET’11 MONET.

Future wireless networks cannot be effectively designed, analyzed and controlled in isolation without taking into account the social context

Wireless Distributed Computing (WDC)PI: Jeff Reed

Objectives/Goals

ImpactsHighlights

Develop•Preliminary mathematical models•System level architecture;•Standardized APIs•Algorithms and protocols

Demonstration•Using USRPs (Virginia Tech)•Using WNaN radios (BBN)

Period of performance:August 2010 – August 2011

Sponsor:DARPA

• WDC enables low cost/capability devices to perform demanding tasks to

• Improve computational latency• Improve battery life

• Improves security, a captured device doesn’t have all the data and code• Redundancy, no single point of failure• The wireless channel and battery levels pose a challenge

• Resource management and optimization is required

• Replace expensive nodes with many inexpensive and possibly disposable nodes• Use currently available, but under utilized SDR resources to reduce processing time• New applications can be developed based on the WDC architecture and APIs• The code developed will be available as open source enabling further development of the methods implemented

Wireless Grid Innovation Testbed (WiGiT)Tamal Bose, Xuetao Chen

Objective /Goals

Impacts Highlights

• Develop a wireless grid innovation testbed coordinated by Virginia Tech and Syracuse University with academic, government and corporate partners.• Spur growth of new companies and transformative wireless grid applications.• Facilitate people-to-people, people-to-resources, and people-to-facilities interactions.• Create a Virtual organization by using edgeware and cognitive radio.• Encompass wide-range and geographically dispersed activities and group through VO partnership.

Create four 4 new applications

Emergence notification system

Wireless distributed computing

Distributed Learning

4 Universities joined as VO

2 new graduate courses, 1 in proposal

Several media reports

Wireless Power Via Near Field Magnetic CouplingMajid Manteghi, Devin Williams

Objective/Methodology

Applications

• Achieve strong near field coupling (0dB to -10dB)• Analyze effects of coupler structure on efficiency• Investigate geometric displacement on degradation of coupling strength

-38

-36

-34

-32

-30

-28

-26

-24

-22

-20

dBW/m2

• Difference with prototype due to loss within feeding networks• Research currently investigating high Q replacement networks (coax)• Current prototyping efficiencies: 19-23%

•Single: 22.6%•Array: 20.9%•Strip (pictured): 19.1%

• Electro-mobility Applications

•Biomedical Sensors

•Robotics

•Electric (autonomous) vehicles “charge on the go”

78 79 80 81 82 83 84-50

-45

-40

-35

-30

-25

-20

-15

-10

-5

0

Frequency (MHz)

S12

(dB

)

SimulationPrototypeSimulation (distributed)

-.35dB

-7.2dB

-4.7dB

200mm

50mm

Analyzing and Improving OFDM for Acoustic Channels

Sponsored by Currently open

Principal Investigator A. A. (Louis) Beex

Researcher/Collaborator Arjun Thottappilly

Project Duration

Ongoing

OFDM (orthogonal frequency division multiplex) communication is useful for the underwater acoustic channel as it can combat the severe multipath that occurs in littoral environments and the Doppler shift that occurs between moving platforms. We completed the DSP implementation of an OFDM communication system using the over-the-air channel. Due to room acoustics, the channel is subject to multipath and – when microphones are moving, with respect to the transmitting speaker – subject to Doppler shift as well. Our efforts are directed towards analyzing the effects of various environmental parameters, as well as towards making improvements in the overall design of the system, such as different approaches to packet and symbol synchronization and to modeling and estimation of the Doppler variations. Experiments show interactions between the presence of Doppler effects and the performance of synchronization algorithms; currently, domains of performance are being established. Ultimately we hope to follow up with measurements and experiments in a large pool and then a lake.

Increasing Utilization of Legacy Channels

Sponsored by Currently open

Principal Investigator A. A. (Louis) Beex

Student Researcher

TBD

Project Duration Ongoing

When a particular channel is assigned to a particular user, that channel can – presumably – not be used by someone else. The particular utilization of such a channel can then be quite low, as it remains idle until it is needed. Considering the dearth of bandwidth, or number of channels, it would be good to find a way to use available bandwidth that is not currently in use by the legacy, or primary, user(s). Of course, a secondary user must not interfere with the primary user. Also, the existence of the secondary user should be transparent to the legacy user, i.e. the latter need not be concerned with the existence of the former. It is the secondary user who needs to insure that the channel is only used when it is not in primary use. When the legacy user uses a known modulation format, this creates some a priori information that can be used to facilitate a secondary user. For example, a communications burst often consists of a known synchronization pattern followed by the modulated burst carrying the actual information. The secondary user must sense the synchronization pattern in order to vacate the channel before interfering with the primary user. The detection of the synchronization pattern must therefore be quick. If necessary, the detection process for the start of the primary burst can have a large probability of false alarm to insure that the channel is being vacated in time. Once the channel is being used by the primary user, the sensing task of the secondary user becomes one of detecting when the modulation portion of the CPM burst is over. Generally a different detector is needed to detect the modulation portion of the signal, especially when the signal bandwidth approaches the channel bandwidth. To detect the end of the primary burst, the probability of false alarm (deciding modulation has ended when in fact it has not) must be very low while now the probability of detection need not be very high. We are looking into various modulation detection approaches. Another aspect of this project is to determine to what extent collisions of the legacy and secondary communications bursts impact the performance of the legacy system.

Mitigation of Time-Varying Narrowband Interference and Multipath from CPM

Sponsored by Currently open

Principal Investigator A. A. (Louis) Beex

Student Researcher

TBD

Project Duration Ongoing

Mitigation of time-varying narrowband interference is the first goal of this project. Initial efforts were based on predictive modeling with time-varying coefficients. As CPM signals are finitely correlated, this required decorrelating time-varying prediction. The time-varying prediction system causes signal distortion, expressed in ISI, which can be compensated for because the predictive system parameters are continually estimated and thus “known.” We have shown that this approach can effectively mitigate the interference over some range of ISR (interference-to-signal ratio), to the point where the raw SER (symbol-error-rate) is sufficiently good for a Viterbi decoder to work. Towards extending the usable ISR range, we recently concentrated on a time-varying model for the narrowband interference (i.e. no longer predictive). This approach was indeed successful in expanding the range of performance, even though this came at an increased expense in terms of computational effort. Future efforts are towards jointly modeling the interference and the signal, as well as finding the most practical approaches towards (approximately) solving the resulting optimization problems.

Modeling & Recognition of Transients in Speech

Sponsored by Currently open

Principal Investigator A. A. (Louis) Beex

Student Researcher

Areg Baghdasaryan

Project Duration Starting

If we can determine appropriate models for the transients in speech vowels, then the onset of the transient can be detected and the specific vowel identified or recognized. Characterization of the transients in speech is expected to be beneficial for the enhancement of speech coder quality. Another application of the identification task is to be able to associate the particular vowel with the particular person speaking that vowel. This aspect of the project is aimed at speaker identification/verification.

Nonlinear Effects in Adaptive Filtering

Sponsored by Currently open

Principal Investigator A. A. (Louis) Beex

Researcher/Collaborator

Takeshi Ikuma (LSU)

Student Researcher TBD

Project Duration

Ongoing

Adaptive algorithms for noise cancellation, prediction, and equalization may exhibit nonlinear effects when operating in environments with strong narrowband interference present. The nonlinear effects are expressed by time-varying or dynamic behavior of the weights of the transversal adaptive filter, even in a wide-sense stationary environment, and performance that exceeds that of the Wiener filter with the corresponding structure. We’ve shown – and analyzed – recently that the mean of the adaptive equalizer filter weights does not correspond to the Wiener weights. The mean-square error of the adaptive equalizer is significantly smaller than that of the fixed Wiener equalizer, and we’ve shown that this performance improvement is borne out in a lower bit-error-rate. An adaptive algorithm for the above environment has been developed for equalization applications and realizes improved performance. We are looking to extend our previous results in terms of applicability to more encompassing environments and to investigate whether – and how – further performance improvements can be achieved.

Robust Automatic Modulation Classification

Sponsored by Currently open

Principal Investigator A. A. (Louis) Beex

Student Researcher

Amy Malady

Project Duration Ongoing

Knowing whether spectrum is being used and to some extent in what fashion – without actually demodulating a received signal – depends on being able to classify what type of modulation is seen, if any. The main approaches are based on time-spectral features and on statistical features. The latter category often exploits any cyclostationarity properties the signal may exhibit. We are looking at the latter approaches and – in particular – towards extending their range of performance, i.e. lowering the SNR required for achieving a certain high probability of correct classification at or below some low level of missed detection. Use of the robust estimator has led to detection, and classification, at lower SNR, for the same or better probability of detection and false alarm as the non-robust approach. The robust approach is also less sensitive to a mismatch between the receiver bandwidth and the signal bandwidth. Importantly, early results indicate that the robust approach achieves the same performance as the non-robust approach using only one tenth the number of observations. CPM signals exhibit cyclo-stationarity of different order, depending on the modulation indices involved. A more practical detector for CPM signals has been designed that is based on second-order cyclo-stationarity only. Next we aim to extend the SNR range of performance for the detection of CPM by making the estimator robust. Further extension will then aim to widen the class of modulations to include CPM.