Skip to main content

Narthil: Push the Limit of Cross Technology Coexistence for Interfered Preambles

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10040))

Included in the following conference series:

Abstract

Recent studies show that cross technology interference is critically important for emergence of innovative applications in today’s wireless networks. Existing approaches either suffer from the constraint of the need of clean preamble, or requiring technological similarities among cross technology systems.

This paper makes the first attempt for tackling this stalemate. We propose Narthil (Narthil is a sword in The Lord of the Rings and The Silmarillion. Narthil was broken in the overthrow of Sauron at the end of the Second Age and was later reforged.), an innovative coexistence system based on imperfect interference management, handling packet detection and symbol synchronization with interfered preambles. Moreover, it recovers the channel state information without the presents of clean preamble.

In Narthil, simple Butterworth bandstop filter is applied for an imperfect interference filtering. And the residual signals could be used for packet detection, symbol synchronization, and CSI estimation. The insight is, the inherent properties of preamble such as periodicity and modulation scheme, and the continuity in OFDM band could be effectively leveraged for some important operation such as signal detection, synchronization, and CSI estimation.

This inspiring design policy could be further leveraged for other cross technology signals. We implement Natrtil on our USRP/GNU radio platform, and evaluate its performance by using 15 USRP N210 devices. The experimental results demonstrates that Narthil could effectively perform the signal detection and synchronization, as well as CSI estimation without the presents of clean preamble.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)

    Google Scholar 

  2. Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014)

    Google Scholar 

  3. Xie, S., Wang, Y.: Construction of tree network with limited delivery latency in homogeneous wirelsss sensor networks. Wirel. Pers. Commun. 78(1), 231–246 (2014)

    Article  Google Scholar 

  4. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting paralled computing. In: IEICE Transactions on Communications, vol. E98-B, no. 1, pp. 190–200 (2015)

    Google Scholar 

  5. Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)

    Google Scholar 

  6. Zhangjie, F., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. In: IEEE Transactions on Parallel and Distributed Systems (2015). doi:10.1109/TPDS.2015.2506573

    Google Scholar 

  7. Tan, K., Liu, H., Fang, J.: SAM: enabling practical spatial multiple access in wireless LAN. In: Proceedings of The Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 49–60. ACM (2009)

    Google Scholar 

  8. Yubo, Y., Panlong, Y., Xiangyang, L., Yue, T., Lan, Z., Lizhao, Y.: ZIMO: building cross-technology MIMO to harmonize zigbee smog with wifi flash without intervention. In: Proceedings of The Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 465–476. ACM (2013)

    Google Scholar 

  9. Yubo, Y., Panlong, Y., Xiang-Yang, L., Yafei, Z., Jianjiang, L., Lizhao, Y., Jiliang, W., Jinsong, H., Yan, X.: WizBee: wise ZigBee coexisetence via interference cancellation with single antenna. IEEE Trans. Mob. Comput. 14(12), 2590–2603 (2015)

    Article  Google Scholar 

  10. Gollakota, S., Adib, F., Katabi, D., Seshan, S.: Clearing the RF smog: making 802.11 robust to cross-technology interference. ACM SIGCOMM Comput. Commun. Rev. 41(4), 170–181 (2011)

    Article  Google Scholar 

Download references

Acknowledgement

This research is partially supported by NSF China under Grants No. 61272487, 61232018, Jiangsu Distinguished Young Scholar Awards under Grant No. BK 20150030, and Project PAPD and Project CICAEET.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Panlong Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Li, P. et al. (2016). Narthil: Push the Limit of Cross Technology Coexistence for Interfered Preambles. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48674-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48673-4

  • Online ISBN: 978-3-319-48674-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics