skip to main content


Title: Development and Testing of an OFDM Physical Layer for the DESERT Simulator
The realization of efficient, robust, and adaptable applications for the emergent Internet of Underwater Things enables the sustainable and effective conservation and exploitation of our oceans and waterways. Recent advances have fo- cused on Orthogonal Frequency-Division Multiplexing (OFDM) physical layers for supporting applications requiring high data rates and swift adaptation to changing underwater conditions. This prompts the need of tools for testing new OFDM-enabled underwater solutions. To this aim, this paper presents the implementation and evaluation of an OFDM-based physical layer module for the popular underwater network simulator DESERT. We aim at modeling the flexibility of the software-defined acoustic SEANet modem by realizing OFDM features that can vary in time, including the number and the selection of subcarriers and their modulation on a per-transmission basis. We demonstrate the usage of the proposed module through the DESERT-based simulation of three simple OFDM-enabled cross-layer MAC protocols in underwater acoustic networks of different sizes. The diverse and detailed set of results are obtained by using our physical layer module simply and swiftly. Our results also confirm the advantages of using the OFDM technology in solutions for underwater networking in challenging environments.  more » « less
Award ID(s):
1726512
NSF-PAR ID:
10298729
Author(s) / Creator(s):
; ; ; ;
Date Published:
Journal Name:
MTS/IEEE OCEANS 2021
Page Range / eLocation ID:
1-8
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. This paper proposes a post-experimental field data reuse method to test the single carrier modulation (SCM) and orthogonal frequency division multiplexing (OFDM) signals interchangeably for multiple access underwater acoustic (UWA) communications. We call this approach the cross evaluation that transforms a set of SCM or OFDM post-experimental field data to their corresponding OFDM or SCM scheme under test (SUT) via linear matrix operation such as fast Fourier transform (FFT) and its inverse (IFFT). At the receiver side, we derived a general framework of turbo equalization (TEQ) that alters the two physical layer schemes but keeps the passband transmitted and received data unchanged. Inherently, some efficient techniques such as pre-cursor and post-cursor interference cancellation (IC), and overlap adding (OLA) operations enhance the equivalence of input and output (I/O) system model between the SCM and OFDM. The proposed approach will bring the gap between the SCM and OFDM, and evaluate the two physical layer schemes under similar or tougher test conditions. The experimental results of the undersea 2008 Surface Processes and Acoustic Communications Experiment (SPACE08) have verified the feasibility of the cross evaluation approach in terms of the BER benchmark. 
    more » « less
  2. Our everyday lives are impacted by the widespread adoption of wireless communication systems integral to residential, industrial, and commercial settings. Devices must be secure and reliable to support the emergence of large scale heterogeneous networks. Higher layer encryption techniques such as Wi-Fi Protected Access (WPA/WPA2) are vulnerable to threats, including even the latest WPA3 release. Physical layer security leverages existing components of the physical or PHY layer to provide a low-complexity solution appropriate for wireless devices. This work presents a PHY layer encryption technique based on frequency induction for Orthogonal Frequency Division Multiplexing (OFDM) signals to increase security against eavesdroppers. The secure transceiver consists of a key to frequency shift mapper, encryption module, and modified synchronizer for decryption. The system has been implemented on a Virtex-7 FPGA. The additional hardware overhead incurred on the Virtex-7 for both the transmitter and the receiver is low. Both simulation and hardware evaluation results demonstrate that the proposed system is capable of providing secure communication from an eavesdropper with no decrease in performance as compared with the baseline case of a standard OFDM transceiver. The techniques developed in this paper provide greater security to OFDM-based wireless communication systems. 
    more » « less
  3. As aspects of our daily lives become more interconnected with the emergence of the Internet of Things (IoT), it is imperative that our devices are reliable and secure from threats. Vulnerabilities of Wi-Fi Protected Access (WPA/WPA2) have been exposed in the past, motivating the use of multiple security techniques, even with the release of WPA3. Physical layer security leverages existing components of communication systems to enable methods of protecting devices that are well-suited for IoT applications. In this work, we provide a low-complexity technique for generating secret keys at the Physical layer to enable improved IoT security. We leverage the existing carrier frequency offset (CFO) and channel estimation components of Orthogonal Frequency Division Multiplexing (OFDM) receivers for an efficient approach. The key generation algorithm we propose focuses on the unique CFO and channel experienced between a pair of desired nodes, and to the best of our understanding, the combination of the features has not been examined previously for the purpose of secret key generation. Our techniques are appropriate for IoT devices, as they do not require extensive processing capabilities and are based on second order statistics. We obtain experimental results using USRP N210 software defined radios and analyze the performance of our methods in post-processing. Our techniques improve the capability of desired nodes to establish matching secret keys, while hindering the threat of an eavesdropper, and are useful for protecting future IoT devices. 
    more » « less
  4. Achieving high throughput and reliability in underwater acoustic networks is a challenging task due to the bandwidth-limited and unpredictable nature of the channel. In a multi-node structure, such as in the Internet of Underwater Things (IoUT), the efficiency of links varies dynamically because of the channel variations. When the channel is not in good condition, e.g., when in deep fade, channel-coding techniques fail to deliver the required information even with multiple rounds of retransmissions. An efficient and agile collaborative strategy among the nodes is required to assign appropriate resources to each link based on their status and capability. Hence, a cross-layer collaborative strategy is introduced to increase the throughput of the network by allocating unequal share of system resources to different nodes/links. The proposed solution adjusts the physical- and link-layer parameters in a collaborative manner for a Code Division Multiple Access (CDMA)-based underwater network. An adaptive Hybrid Automatic Repeat Request (HARQ) solution is employed to guarantee reliable communications against errors in poor communication links. Results are being validated using data collected from the LOON underwater testbed, which is hosted by the NATO STO Centre for Maritime Research and Experimentation (CMRE) in La Spezia, Italy. 
    more » « less
  5. his work presents a sustainable cybersecurity solution using Physical Unclonable Functions (PUF), Trusted Platform Module (TPM), and Tangle Distributed Ledger Technology (DLT) for sustainable device and data security. Security-by-Design (SbD) or Hardware- Assisted Security (HAS) solutions have gained much prominence due to the requirement of tamper-proof storage for hardwareassisted cryptography solutions. Designing complex security mechanisms can impact their efficiency as IoT applications are more decentralized. In the proposed architecture, we presented a novel TPM-enabled PUF-based security mechanism with effective integration of PUF with TPM. The proposed mechanism is based on the process of sealing the PUF key in the TPM, which cannot be accessed outside the TPM and can only be unsealed by the TPM itself. A specified NV-index is assigned to each IoT node for sealing the PUF key to TPM using the Media Access Control (MAC) address. Access to the TPM's Non-Volatile Random Access Memory (NVRAM) is defined by the TPM's Enhanced Authorization policies as specified by the Trust Computing Group (TCG). The proposed architecture uses Tangle for sustainable data security and storage in decentralized IoT systems through a Masked Authentication Messaging (MAM) scheme for efficient and secure access control to Tangle. We validated the proposed approach through experimental analysis and implementation, which substantiates the potential of the presented PUFchain 4.0 for decentralized IoT-driven security solutions. 
    more » « less