scispace - formally typeset
J

Jari Iinatti

Researcher at University of Oulu

Publications -  230
Citations -  4213

Jari Iinatti is an academic researcher from University of Oulu. The author has contributed to research in topics: Ultra-wideband & Body area network. The author has an hindex of 26, co-authored 227 publications receiving 3818 citations.

Papers
More filters
Book

UWB theory and applications

TL;DR: This paper presents UWB Channel Models, a Hierarchical Model for Modulation Schemes of Receiver Structures, and Integrated Circuit Topologies, which describe the construction of receiver structures and the role of antennas in this system.
Journal ArticleDOI

Performance of a low-power wide-area network based on LoRa technology : Doppler robustness, scalability, and coverage

TL;DR: An analysis and reports experimental validation of the various performance metrics of the LoRa low-power wide-area network technology, which shows that at around 40 km/h, the communication performance gets worse, and it is expected that communication link is more reliable when lower spreading factors are used.
Journal ArticleDOI

On the UWB system coexistence with GSM900, UMTS/WCDMA, and GPS

TL;DR: The level of interference caused by different ultra-wideband (UWB) signals to other various radio systems, as well as the performance degradation of UWB systems in the presence of narrowband interference and pulsed jamming are evaluated.
Proceedings ArticleDOI

Evaluation of LoRa LPWAN technology for remote health and wellbeing monitoring

TL;DR: The obtained results show that when using 14 dBm transmit power and the largest spreading factor of 12 for the 868 MHz ISM band, the whole campus area can be covered, and measured packet success delivery ratio was 96.7 % without acknowledgements and retransmissions.
Journal ArticleDOI

Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments

TL;DR: The proposed scheme provides important security attributes including prevention of various popular attacks, such as denial-of-service and eavesdropping attacks, and attains both computation efficiency and communication efficiency as compared with other schemes from the literature.