Search Results - cem+sahin

5 Results Sort By:
Beam visualization and using augmented reality for control and interaction
PAGE TITLEOverviewPAGE SUMMARY Augmented Reality has gained attention as a visual learning aid, being particularly useful for teaching visually imperceptible subject matter such as wireless communications and electromagnetics. In order to provide a related platform for educators in the STEM field, researchers at the Drexel Wireless Systems Laboratory...
Published: 2/14/2024   |   Inventor(s): Cem Sahin, Danh Nguyen, Kapil Dandekar
Keywords(s):  
Category(s): Computing, Software, Analytics & Information Technology
A Real-Time, Protocol-Aware Reactive Jamming Framework Built on Software Defined Radios
PAGE TITLEOverviewPAGE SUMMARY Wireless network jamming techniques are commonly used in both military and commercial applications to block communication between network devices. Denial-Of-Service techniques (e.g. continuous jamming) are frequently employed but suffer drawbacks including high power consumption and high probability of detection. Reactive...
Published: 7/24/2024   |   Inventor(s): Kapil Dandekar, Nagarajan Kandasamy, Danh Nguyen, Boris Shishkin, Cem Sahin, David Dorsey
Keywords(s):  
Category(s): Communications & Cybersecurity, Computing, Software, Analytics & Information Technology, Electrical Engineering & Electronics, Hardware, Circuits & Sensors, Communications & Cybersecurity > Comm: Reactive Jamming, Communications & Cybersecurity > Comm: Software Defined Radio, Communications & Cybersecurity > Comm: Wireless, Computing, Software, Analytics & Information Technology > Computing: Algorithms, Computing, Software, Analytics & Information Technology > Computing: Simulation & Modeling, Electrical Engineering & Electronics > EE: Electronic Devices, Electrical Engineering & Electronics > EE: Telecommunications, Hardware, Circuits & Sensors > Hardware: Antennas, Hardware, Circuits & Sensors > Hardware: Communication & Networking
Symmetric Encryption Key Generation Using Wireless Physical Layer Information Without Sharing Any Information Pertinent To The Key
PAGE TITLEOverviewPAGE SUMMARY In the wireless scenario, the shared nature of the medium allows for an eavesdropper to snoop on these transmissions without the knowledge of the legitimate users and jeopardize any future sensitive data. In order to prevent eavesdropping attacks, Drexel researchers have developed a symmetric key generation algorithm for...
Published: 1/11/2024   |   Inventor(s): Kapil Dandekar, Cem Sahin
Keywords(s):  
Category(s): Communications & Cybersecurity, Computing, Software, Analytics & Information Technology, Computing, Software, Analytics & Information Technology > Computing: Algorithms, Communications & Cybersecurity > Comm: Antennas, Communications & Cybersecurity > Comm: Network Signal Processing, Communications & Cybersecurity > Comm: Wireless
Physical Gate based Preamble Obfuscation for Securing Wireless Communication
PAGE TITLE Physical Gate based Preamble Obfuscation for Securing Wireless Communication PAGE SUMMARY In wireless networks, the transmission between legitimate users can be easily overheard by an eavesdropper for interception due to the broadcast nature of wireless medium, making the transmission highly vulnerable to eavesdropping attacks. Physical...
Published: 1/11/2024   |   Inventor(s): Kapil Dandekar, Ioannis Savidis, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, James Chacko, Kyle Juretus
Keywords(s):  
Category(s): Computing, Software, Analytics & Information Technology, Communications & Cybersecurity, Electrical Engineering & Electronics, Hardware, Circuits & Sensors, Hardware, Circuits & Sensors > Hardware: Antennas, Hardware, Circuits & Sensors > Hardware: Communication & Networking, Computing, Software, Analytics & Information Technology > Computing: Algorithms, Electrical Engineering & Electronics > EE: Data Communications, Electrical Engineering & Electronics > EE: Telecommunications, Communications & Cybersecurity > Comm: Antennas, Communications & Cybersecurity > Comm: Network Signal Processing, Communications & Cybersecurity > Comm: Obfuscation, Communications & Cybersecurity > Comm: Wireless
PhyLeave: Physical layer key based interleaving for secure wireless communication
PAGE TITLE PhyLeave - Physical layer key based interleaving for secure wireless communication PAGE SUMMARY An assortment of security threats exist due to the standardization of the communication channel between two trusted parties that can be exploited by an intruder. Data security is typically implemented through software based encryption on the payload....
Published: 6/20/2024   |   Inventor(s): Kapil Dandekar, Kyle Juretus, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Ioannis Savidis, James Chacko
Keywords(s):  
Category(s): Communications & Cybersecurity, Electrical Engineering & Electronics, Hardware, Circuits & Sensors, Hardware, Circuits & Sensors > Hardware: Communication & Networking, Electrical Engineering & Electronics > EE: Data Communications, Electrical Engineering & Electronics > EE: Telecommunications, Communications & Cybersecurity > Comm: Network Signal Processing, Communications & Cybersecurity > Comm: Wireless