skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Mainland, Geoffrey"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. There are a wide array of methods for writing code generators. We advocate for a point in the design space, which we call *metaprogramming with combinators*, where programmers use (and write) combinator libraries that directly manipulate object language terms. The key language feature that makes this style of programming palatable is quasiquotation. Our approach leverages quasiquotation and other host language features to provide what is essentially a rich, well-typed macro language. Unlike other approaches, metaprogramming with combinators allows full control over generated code, thereby also providing full control over performance and resource usage. This control does not require sacrificing the ability to write high-level abstractions. We demonstrate metaprogramming with combinators through several code generators written in Haskell that produce VHDL targeted to Xilinx FPGAs. 
    more » « less
  2. null (Ed.)
  3. Dynamic Spectrum Access (DSA) radios typically select their radio channels according to their data networking goals, a defined DSA spectrum operating policy, and the state of the RF spectrum. RF spectrum sensing can be used to collect information about the state of the RF spectrum and prioritize which channels should be assigned for DSA radio waveform transmission and reception. This paper describes a Greedy Channel Ranking Algorithm (GCRA) used to calculate and rank RF interference metrics for observed DSA radio channels. The channel rankings can then be used to select and/or avoid channels in order to attain a desired DSA radio performance level. Experimental measurements are collected using our custom software-defined radio (SDR) system to quantify the performance of using GCRA for a DSA radio application. Analysis of these results show that both pre and post-detection average interference power metrics are the most accurate metrics for selecting groups of radio channels to solve constrained channel assignment problems in occupied gray space spectrum. 
    more » « less
  4. Abstract Wireless communication devices must be protected from malicious threats, including active jamming attacks, due to the widespread use of wireless systems throughout our every‐day lives. Jamming mitigation techniques are predominately evaluated through simulation or with hardware for very specific jamming conditions. In this paper, an experimental software defined radio‐based RF jamming mitigation platform which performs online jammer classification and leverages reconfigurable beam‐steering antennas at the physical layer is introduced. A ray‐tracing emulation system is presented and validated to enable hardware‐in‐the‐loop jamming experiments of complex outdoor and mobile site‐specific scenarios. Random forests classifiers are trained based on over‐the‐air collected data and integrated into the platform. The mitigation system is evaluated for both over‐the‐air and ray‐tracing emulated environments. The experimental results highlight the benefit of using the jamming mitigation system in the presence of active jamming attacks. 
    more » « less
  5. Functional hardware description languages (FHDL) provide powerful tools for building new abstractions that enable sophisticated hardware system to be constructed by composing small reusable parts. Raising the level of abstractions in hardware designs means the programmer can focus on high-level circuit structure rather than mundane low-level details. The language features that facilitate this include high-order functions, rich static type system with type inference, and parametric polymorphism. We use hand-written structural and behavioral VHDL, Simulink, and the Kansas Lava FHDL to re-implement several components taken from a Simulink model of an orthogonal frequency-division multiplexing (OFDM) physical layer (PHY). Our development demonstrates that an FHDL can require fewer lines of code than traditional design languages without sacrificing performance. 
    more » « less
  6. As aspects of our daily lives become more interconnected with the emergence of the Internet of Things (IoT), it is imperative that our devices are reliable and secure from threats. Vulnerabilities of Wi-Fi Protected Access (WPA/WPA2) have been exposed in the past, motivating the use of multiple security techniques, even with the release of WPA3. Physical layer security leverages existing components of communication systems to enable methods of protecting devices that are well-suited for IoT applications. In this work, we provide a low-complexity technique for generating secret keys at the Physical layer to enable improved IoT security. We leverage the existing carrier frequency offset (CFO) and channel estimation components of Orthogonal Frequency Division Multiplexing (OFDM) receivers for an efficient approach. The key generation algorithm we propose focuses on the unique CFO and channel experienced between a pair of desired nodes, and to the best of our understanding, the combination of the features has not been examined previously for the purpose of secret key generation. Our techniques are appropriate for IoT devices, as they do not require extensive processing capabilities and are based on second order statistics. We obtain experimental results using USRP N210 software defined radios and analyze the performance of our methods in post-processing. Our techniques improve the capability of desired nodes to establish matching secret keys, while hindering the threat of an eavesdropper, and are useful for protecting future IoT devices. 
    more » « less
  7. Abstract Cyber‐physical systems (CPS) integrate control, sensing, and processing into interconnected physical components to support applications within transportation, energy, healthcare, environment, and various other areas. Secure and reliable wireless communication between devices is necessary to enable the widespread adoption of these emerging technologies. Cyber‐physical systems devices must be protected against active threats, such as Radio Frequency (RF) Jammers, which intentionally disrupt communication links. Jamming detection and mitigation techniques must be evaluated extensively to validate algorithms prior to full implementation. Challenges related to obtaining zoning permits, Federal Aviation Administration (FAA) pilot certification for Unmanned Aerial Vehicles (UAVs), and Federal Communications Commission (FCC) licencing lead to evaluation limited to simulation‐based or simplistic, non‐representative hardware experimentation. A site‐specific ray‐tracing emulation framework is presented to provide a realistic evaluation of communication devices under RF jamming attacks in complex scenarios involving mobility, vehicular, and UAV systems. System architecture and capabilities are provided for the devices under test, real‐world jamming adversaries, channel modelling, and channel emulation. Case studies are provided to demonstrate the use of the framework for different applications and jamming threats. The experimental results illustrate the benefit of the ray‐tracing emulation system for conducting complex wireless communication studies under the presence of RF jamming. 
    more » « less
  8. Traditional approaches to experimental characterization of wireless communication systems typically involves highly specialized and small-scale experiments to examine narrow aspects of each of these applications. We present the Grid SDR testbed, a unified experimental framework to rapidly prototype and evaluate these diverse systems using: (i) field measurements to evaluate real time transceiver and channel-specific effects and (ii) network emulation to evaluate systems at a large scale with controllable and repeatable channels. We present the hardware and software architecture for our testbed, and describe how it being used for research and education. Specifically, we show experimental network layer metrics in different application domains, and discuss future opportunities using this unique experimental capability. 
    more » « less