Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Larry J. Greenstein is active.

Publication


Featured researches published by Larry J. Greenstein.


IEEE Transactions on Wireless Communications | 2009

A generic model for optimizing single-hop transmission policy of replenishable sensors

Jing Lei; Roy D. Yates; Larry J. Greenstein

Energy harvesting from the working environment has received increasing attention in the research of wireless sensor networks. Recent developments in this area can be used to replenish the power supply of sensors. However, power management is still a crucial issue for such networks due to the uncertainty of stochastic replenishment. In this paper, we propose a generic mathematical framework to characterize the policy for single hop transmission over a replenishable sensor network. Firstly, we introduce a Markov chain model to describe different modes of energy renewal. Then, we derive the optimal transmission policy for sensors with different energy budgets. Depending on the energy status of a sensor and the reward for successfully transmitting a message, we prove the existence of optimal thresholds that maximize the average reward rate. Our results are quite general since the reward values can be made application-specific for different design objectives. Compared with the unconditional transmit-all policy, which transmits every message as long as the energy storage is positive, the proposed optimal transmission policy is shown to achieve significant gains in the average reward rate.


IEEE Transactions on Wireless Communications | 2008

Using the physical layer for wireless authentication in time-variant channels

Liang Xiao; Larry J. Greenstein; Narayan B. Mandayam; Wade Trappe

The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to exploit the spatial variability of the radio channel response in a rich scattering environment, as is typical of indoor environments. Specifically, we describe a physical-layer authentication algorithm that utilizes channel probing and hypothesis testing to determine whether current and prior communication attempts are made by the same transmit terminal. In this way, legitimate users can be reliably authenticated and false users can be reliably detected. We analyze the ability of a receiver to discriminate between transmitters (users) according to their channel frequency responses. This work is based on a generalized channel response with both spatial and temporal variability, and considers correlations among the time, frequency and spatial domains. Simulation results, using the ray-tracing tool WiSE to generate the time-averaged response, verify the efficacy of the approach under realistic channel conditions, as well as its capability to work under unknown channel variations.


international conference on communications | 2007

Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication

Liang Xiao; Larry J. Greenstein; Narayan B. Mandayam; Wade Trappe

The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to exploit the fact that, in a typically rich scattering environment, the radio channel response decorrelates quite rapidly in space. Specifically, we describe a physical-layer algorithm that combines channel probing (M complex frequency response samples over a bandwidth W) with hypothesis testing to determine whether current and prior communication attempts are made by the same user (same channel response). In this way, legitimate users can be reliably authenticated and false users can be reliably detected. To evaluate the feasibility of our algorithm, we simulate spatially variable channel responses in real environments using the WiSE ray-tracing tool; and we analyze the ability of a receiver to discriminate between transmitters (users) based on their channel frequency responses in a given office environment. For several rooms in the extremities of the building we considered, we have confirmed the efficacy of our approach under static channel conditions. For example, measuring five frequency response samples over a bandwidth of 100 MHz and using a transmit power of 100 mW, valid users can be verified with 99% confidence while rejecting false users with greater than 95% confidence.


Proceedings of the IEEE | 2009

Propagation Issues for Cognitive Radio

Andreas F. Molisch; Larry J. Greenstein; Mansoor Shafi

Cognitive radios are expected to work in bands below about 3.5 GHz and may be used for a variety of applications, e.g., broadband fixed wireless access, mobile and nomadic access, etc. Cognitive radio system designers must have access to a wide range of channel models covering a wide span of operating frequencies, carrier bandwidths, deployment conditions, and environments. This paper provides a comprehensive overview of the propagation channel models that will be used for the design of cognitive radio systems. We start with classical models for signal loss versus distance and discuss their dependence on the physical properties of the environment and operating frequency. Here we also introduce the concept of log-normal shadowing resulting from signal blockage by man-made and natural features. Next, we discuss the time-varying nature of the wireless channel, introduced as a result of the motion of objects in the channel. This is followed by a discussion on the dispersion of the signal caused by various effects of propagation, especially in the time and frequency domains. Angular dispersion, which is discussed next, is important because cognitive radios may be based on modems that exploit the spatial domain. Lastly, we summarize channel models that have been standardized for fixed and mobile systems.


vehicular technology conference | 2004

New approaches for cooperative use of multiple antennas in ad hoc wireless networks

Jianghong Luo; Rick S. Blum; Larry J. Greenstein; Len Cimini; A.M. Haimovich

The paper explores the interaction between cooperative diversity techniques, in the physical layer, and routing, in the network layer. Three approaches are proposed: relay-by-flooding; relay-assisted routing; relay-enhanced routing. In relay-by-flooding, the tradeoff between achieved rate and required power is studied for three selective decode-and-forward schemes: simple relay; space-time-coded relay; best-select relay. In relay-enhanced routing, cooperation is applied to each link of an existing route. Two relay selection approaches are proposed: best-select in the neighbor set; best-select in the decoded set. Best-select in the decoded set is shown to improve the performance significantly.


vehicular technology conference | 2005

Link-failure probabilities for practical cooperative relay networks

Jianghong Luo; Rick S. Blum; Leonard J. Cimini; Larry J. Greenstein; A.M. Haimovich

In this paper, practical cooperative diversity schemes are proposed and investigated. The outage probability is used to evaluate four constant-power decode-and-forward cooperative schemes: pre-select one relay, best-select relay, simple relay, and ST-coded relay. Two new methods for improving these approaches, called simple distributed power allocation and m-group ST-coded relay, are proposed. It is shown that the performance of simple relay and ST-coded relay is improved significantly by employing the proposed power allocation without an increase in implementation complexity. Similarly, m-group ST-coded relay gains in lower complexity with only a slight degradation in performance. Performance of the various schemes in a network is evaluated through the link-failure probability.


IEEE Transactions on Vehicular Technology | 2009

Ricean

Larry J. Greenstein; Saeed S. Ghassemzadeh; Vinko Erceg; David G. Michelson

Fixed wireless channels in suburban macrocells are subject to fading due to scattering by moving objects such as windblown trees and foliage in the environment. When, as is often the case, the fading follows a Ricean distribution, the first-order statistics of fading are completely described by the corresponding average path gain and Ricean K-factor. Because such fading has important implications for the design of both narrow-band and wideband multipoint communication systems that are deployed in such environments, it must be well characterized. We conducted a set of 1.9-GHz experiments in suburban macrocell environments to generate a collective database from which we could construct a simple model for the probability distribution of K as experienced by fixed wireless users. Specifically, we find K to be lognormal, with the median being a simple function of season, antenna height, antenna beamwidth, and distance and with a standard deviation of 8 dB. We also present plausible physical arguments to explain these observations, elaborate on the variability of K with time, frequency, and location, and show the strong influence of wind conditions on K.


vehicular technology conference | 2003

K

Saeed S. Ghassemzadeh; Larry J. Greenstein; Aleksandar Kavcic; Thorvardur Sveinsson; Vahid Tarokh

We present a statistical model for the path loss of ultra-wideband channels in indoor environments. In contrast to previous measurements, the data reported here are for a bandwidth of 6 GHz rather than 1.25 GHz; they encompass commercial buildings in addition to single-family homes (20 of each); and local spatial averaging is included. As before, the center frequency is 5.0 GHz. Separate models are given for commercial and residential environments and-within each category-for line-of-sight (LOS) and non-line-of-sight (NLS) paths. All four models have the same mathematical structure, differing only in their numerical parameters. The two new models (LOS and NLS) for residences closely match those derived from the previous measurements, thus affirming the stability of our path loss modeling. For greater accuracy, we therefore pool the two data sets in our final models for residences. We find that the path loss statistics for the two categories of buildings are quite similar.


IEEE Transactions on Information Forensics and Security | 2009

-Factors in Narrow-Band Fixed Wireless Channels: Theory, Experiments, and Statistical Models

Liang Xiao; Larry J. Greenstein; Narayan B. Mandayam; Wade Trappe

Due to the broadcast nature of the wireless medium, wireless networks are especially vulnerable to Sybil attacks, where a malicious node illegitimately claims a large number of identities and thus depletes system resources. We propose an enhanced physical-layer authentication scheme to detect Sybil attacks, exploiting the spatial variability of radio channels in environments with rich scattering, as is typical in indoor and urban environments. We build a hypothesis test to detect Sybil clients for both wideband and narrowband wireless systems, such as WiFi and WiMax systems. Based on the existing channel estimation mechanisms, our method can be easily implemented with low overhead, either independently or combined with other physical-layer security methods, e.g., spoofing attack detection. The performance of our Sybil detector is verified, via both a propagation modeling software and field measurements using a vector network analyzer, for typical indoor environments. Our evaluation examines numerous combinations of system parameters, including bandwidth, signal power, number of channel estimates, number of total clients, number of Sybil clients, and number of access points. For instance, both the false alarm rate and the miss rate of Sybil attacks are usually below 0.01, with three tones, pilot power of 10 mW, and a system bandwidth of 20 MHz.


IEEE Journal on Selected Areas in Communications | 1996

UWB indoor path loss model for residential and commercial buildings

Sirikiat Lek Ariyavisitakul; Thomas Edward Darcie; Larry J. Greenstein; Mary R. Phillips; Nemmara K. Shankaranarayanan

Broadband analog transport facilities using fiber or fiber/coax cable can play a significant role in the evolution of the network infrastructure for personal communications services (PCSs). Low-power PCS systems require a dense grid of radio ports to provide connectivity to the telephone network. Analog transport has a number of important advantages over digital transmission facilities, including the flexibility to support a variety of air interface formats, shared infrastructure cost with other services such as video distribution, and centralized call processing allowing the use of low cost and simple radio ports. A simulcast technique can be used in such systems to permit low rates of handoff (no handoff within each simulcast area) and sharing of hardware resources among multiple radio ports. This paper provides a detailed model and a simulation analysis of the cochannel interference and noise performance as well as the resource sharing benefit of a simulcast PCS system. Several potential PCS air interfaces are considered, including time division multiple access (TDMA) and code division multiple access (CDMA) techniques. Our investigation shows that the impact of multiple antenna noise in a simulcast system is offset by the improved signal-to-interference (SIR) ratio brought about by distributed antennas. Even with distributed antennas, multiple antenna noise places a limit on the maximum number of radio ports that can be assigned to each simulcast group. This limit, however, is shown to have little impact on the achievable resource sharing benefit of simulcasting (i.e., grouping beyond this limit has diminishing returns). A saving of 40% to 60%, in terms of the required central hardware resources, is typical for both TDMA and CDMA systems in suburban environments.

Collaboration


Dive into the Larry J. Greenstein's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Qi Wang

University of Delaware

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge