Embracing Interference in Wireless Systems

Embracing Interference in Wireless Systems

Shyamnath Gollakota ,
ISBN: 9781627054744 | PDF ISBN: 9781627054751
Hardcover ISBN:9781627055444
Copyright © 2014 | 175 Pages | Publication Date: 06/01/2014

BEFORE YOU ORDER: You may have Academic or Corporate access to this title. Click here to find out: 10.1145/2611390

Published by the Association for Computing Machinery and Morgan & Claypool.

Ordering Options: Paperback $59.95   E-book $47.96   Paperback & E-book Combo $74.94
Hardcover $89.95   Hardcover & E-book Combo $112.44

Why pay full price? Members receive 15% off all orders.
Learn More Here

Read Our Digital Content License Agreement (pop-up)

Purchasing Options:

The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.

Table of Contents

Decoding 802.11 Collisions
Combating High-Power Cross-Technology Interference
Non-Invasive Approach to Securing Medical Implants
Secure Pairing without Passwords or Prior Secrets

About the Author(s)

Shyamnath Gollakota , University of Washington
Shyam Gollakota is an assistant professor in the Department of Computer Science and Engineering at the University of Washington. He leads the Networks and Mobile Systems Lab and works on various topics including computer networks, human-computer interaction and mobile health. He earned my M.S. and Ph.D. degrees from the Massachusetts Institute of Technology and his B.Tech. degree from IIT Madras.


Browse by Subject
Case Studies in Engineering
ACM Books
SEM Books

0 items

Note: Registered customers go to: Your Account to subscribe.

E-Mail Address:

Your Name: