scispace - formally typeset
Search or ask a question
Author

Marko Hännikäinen

Bio: Marko Hännikäinen is an academic researcher from Tampere University of Technology. The author has contributed to research in topics: Wireless sensor network & Wireless network. The author has an hindex of 27, co-authored 128 publications receiving 3061 citations.


Papers
More filters
Proceedings ArticleDOI
07 Sep 2003
TL;DR: A class of service (CoS) protocol to be used on wireless LANs (WLAN) that differentiates bandwidth and transfer delay for each class and is implemented for testing.
Abstract: This paper presents a class of service (CoS) protocol to be used on wireless LANs (WLAN). The protocol provides two modes for bandwidth control and uses centrally controlled topology. The first mode reserves a fixed bandwidth for a station, while in the second mode the station must request a permission to send data. A traffic scheduler for the network is located in the central controller station. A prototype of the protocol operating on IEEE802.11 WLAN has been implemented for testing. Results show that the protocol provides CoS support that differentiates bandwidth and transfer delay for each class.
Book ChapterDOI
01 Jan 2012
TL;DR: Sensor node platforms implement the physical layer (hardware) of the protocol stack to minimize the power consumption in idle and sleep modes in low data-rate monitoring applications.
Abstract: Sensor node platforms implement the physical layer (hardware) of the protocol stack. The hardware activity measured as the fraction of time the hardware is in an active state (processing data or receiving/transmitting a packet) may be below 1% in low data-rate monitoring applications. Thus, it is very important to minimize the power consumption in idle and sleep modes.
Proceedings ArticleDOI
07 Aug 2002
TL;DR: This paper presents the usage of the specification and description language (SDL) for system simulations of a large-scale telecommunication system for delivering information services to public transport passengers (TUTPIS), and an embedded medium access control protocol for wireless LAN.
Abstract: This paper presents the usage of the specification and description language (SDL) for system simulations. The two studied systems are a large-scale telecommunication system for delivering information services to public transport passengers (TUTPIS), and an embedded medium access control (TUTMAC) protocol for wireless LAN. The TUTPIS system combines the implementation of some systems components by the building of a simulation model for the general service architecture. On the other hand, TUTMAC has been fully implemented in SDL. The formal system designs are simulated for verifying the required functionality. By simulations, the architectural operability of the transport service system design has been tested, e.g. with a very high number of users and with different telecommunication network environments. For the embedded TUTMAC protocol, real-time simulations are performed for evaluating the performance and capacity requirements of the application for the final platform.

Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

Journal ArticleDOI
01 Nov 2007
TL;DR: Comprehensive performance comparisons including accuracy, precision, complexity, scalability, robustness, and cost are presented.
Abstract: Wireless indoor positioning systems have become very popular in recent years. These systems have been successfully used in many applications such as asset tracking and inventory management. This paper provides an overview of the existing wireless indoor positioning solutions and attempts to classify different techniques and systems. Three typical location estimation schemes of triangulation, scene analysis, and proximity are analyzed. We also discuss location fingerprinting in detail since it is used in most current system or solutions. We then examine a set of properties by which location systems are evaluated, and apply this evaluation method to survey a number of existing systems. Comprehensive performance comparisons including accuracy, precision, complexity, scalability, robustness, and cost are presented.

4,123 citations

Book ChapterDOI
28 Sep 2011
TL;DR: This work considers the resistance of ciphers, and LED in particular, to related-key attacks, and is able to derive simple yet interesting AES-like security proofs for LED regarding related- or single- key attacks.
Abstract: We present a new block cipher LED. While dedicated to compact hardware implementation, and offering the smallest silicon footprint among comparable block ciphers, the cipher has been designed to simultaneously tackle three additional goals. First, we explore the role of an ultra-light (in fact non-existent) key schedule. Second, we consider the resistance of ciphers, and LED in particular, to related-key attacks: we are able to derive simple yet interesting AES-like security proofs for LED regarding related- or single-key attacks. And third, while we provide a block cipher that is very compact in hardware, we aim to maintain a reasonable performance profile for software implementation.

848 citations

Book ChapterDOI
30 Aug 2009
TL;DR: A new family of very efficient hardware oriented block ciphers divided into two flavors, which is more compact in hardware, as the key is burnt into the device (and cannot be changed), and achieves encryption speed of 12.5 KBit/sec.
Abstract: In this paper we propose a new family of very efficient hardware oriented block ciphers. The family contains six block ciphers divided into two flavors. All block ciphers share the 80-bit key size and security level. The first flavor, KATAN, is composed of three block ciphers, with 32, 48, or 64-bit block size. The second flavor, KTANTAN, contains the other three ciphers with the same block sizes, and is more compact in hardware, as the key is burnt into the device (and cannot be changed). The smallest cipher of the entire family, KTANTAN32, can be implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48, which is the version we recommend for RFID tags uses 588 GE, whereas KATAN64, the largest and most flexible candidate of the family, uses 1054 GE and has a throughput of 25.1 Kbit/sec (at 100 KHz).

733 citations