66 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Securing NextG networks with physical-layer key generation: A survey

    Get PDF
    As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    A Survey of Air-to-Ground Propagation Channel Modeling for Unmanned Aerial Vehicles

    Full text link
    In recent years, there has been a dramatic increase in the use of unmanned aerial vehicles (UAVs), particularly for small UAVs, due to their affordable prices, ease of availability, and ease of operability. Existing and future applications of UAVs include remote surveillance and monitoring, relief operations, package delivery, and communication backhaul infrastructure. Additionally, UAVs are envisioned as an important component of 5G wireless technology and beyond. The unique application scenarios for UAVs necessitate accurate air-to-ground (AG) propagation channel models for designing and evaluating UAV communication links for control/non-payload as well as payload data transmissions. These AG propagation models have not been investigated in detail when compared to terrestrial propagation models. In this paper, a comprehensive survey is provided on available AG channel measurement campaigns, large and small scale fading channel models, their limitations, and future research directions for UAV communication scenarios

    Modelling, Dimensioning and Optimization of 5G Communication Networks, Resources and Services

    Get PDF
    This reprint aims to collect state-of-the-art research contributions that address challenges in the emerging 5G networks design, dimensioning and optimization. Designing, dimensioning and optimization of communication networks resources and services have been an inseparable part of telecom network development. The latter must convey a large volume of traffic, providing service to traffic streams with highly differentiated requirements in terms of bit-rate and service time, required quality of service and quality of experience parameters. Such a communication infrastructure presents many important challenges, such as the study of necessary multi-layer cooperation, new protocols, performance evaluation of different network parts, low layer network design, network management and security issues, and new technologies in general, which will be discussed in this book

    Cognitive Radio Systems

    Get PDF
    Cognitive radio is a hot research area for future wireless communications in the recent years. In order to increase the spectrum utilization, cognitive radio makes it possible for unlicensed users to access the spectrum unoccupied by licensed users. Cognitive radio let the equipments more intelligent to communicate with each other in a spectrum-aware manner and provide a new approach for the co-existence of multiple wireless systems. The goal of this book is to provide highlights of the current research topics in the field of cognitive radio systems. The book consists of 17 chapters, addressing various problems in cognitive radio systems

    OFDM passive radar employing compressive processing in MIMO configurations

    Get PDF
    A key advantage of passive radar is that it provides a means of performing position detection and tracking without the need for transmission of energy pulses. In this respect, passive radar systems utilising (receiving) orthogonal frequency division multiplexing (OFDM) communications signals from transmitters using OFDM standards such as long term evolution (LTE), WiMax or WiFi, are considered. Receiving a stronger reference signal for the matched filtering, detecting a lower target signature is one of the challenges in the passive radar. Impinging at the receiver, the OFDM waveforms supply two-dimensional virtual uniform rectangul ararray with the first and second dimensions refer to time delays and Doppler frequencies respectively. A subspace method, multiple signals classification (MUSIC) algorithm, demonstrated the signal extraction using multiple time samples. Apply normal measurements, this problem requires high computational resources regarding the number of OFDM subcarriers. For sub-Nyquist sampling, compressive sensing (CS) becomes attractive. A single snap shot measurement can be applied with Basis Pursuit (BP), whereas l1-singular value decomposition (l1-SVD) is applied for the multiple snapshots. Employing multiple transmitters, the diversity in the detection process can be achieved. While a passive means of attaining three-dimensional large-set measurements is provided by co-located receivers, there is a significant computational burden in terms of the on-line analysis of such data sets. In this thesis, the passive radar problem is presented as a mathematically sparse problem and interesting solutions, BP and l1-SVD as well as Bayesian compressive sensing, fast-Besselk, are considered. To increase the possibility of target signal detection, beamforming in the compressive domain is also introduced with the application of conve xoptimization and subspace orthogonality. An interference study is also another problem when reconstructing the target signal. The networks of passive radars are employed using stochastic geometry in order to understand the characteristics of interference, and the effect of signal to interference plus noise ratio (SINR). The results demonstrate the outstanding performance of l1-SVD over MUSIC when employing multiple snapshots. The single snapshot problem along with fast-BesselK multiple-input multiple-output configuration can be solved using fast-BesselK and this allows the compressive beamforming for detection capability
    corecore