66 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Securing NextG networks with physical-layer key generation: A survey
As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks
Radio Communications
In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks
A Survey of Air-to-Ground Propagation Channel Modeling for Unmanned Aerial Vehicles
In recent years, there has been a dramatic increase in the use of unmanned
aerial vehicles (UAVs), particularly for small UAVs, due to their affordable
prices, ease of availability, and ease of operability. Existing and future
applications of UAVs include remote surveillance and monitoring, relief
operations, package delivery, and communication backhaul infrastructure.
Additionally, UAVs are envisioned as an important component of 5G wireless
technology and beyond. The unique application scenarios for UAVs necessitate
accurate air-to-ground (AG) propagation channel models for designing and
evaluating UAV communication links for control/non-payload as well as payload
data transmissions. These AG propagation models have not been investigated in
detail when compared to terrestrial propagation models. In this paper, a
comprehensive survey is provided on available AG channel measurement campaigns,
large and small scale fading channel models, their limitations, and future
research directions for UAV communication scenarios
Modelling, Dimensioning and Optimization of 5G Communication Networks, Resources and Services
This reprint aims to collect state-of-the-art research contributions that address challenges in the emerging 5G networks design, dimensioning and optimization. Designing, dimensioning and optimization of communication networks resources and services have been an inseparable part of telecom network development. The latter must convey a large volume of traffic, providing service to traffic streams with highly differentiated requirements in terms of bit-rate and service time, required quality of service and quality of experience parameters. Such a communication infrastructure presents many important challenges, such as the study of necessary multi-layer cooperation, new protocols, performance evaluation of different network parts, low layer network design, network management and security issues, and new technologies in general, which will be discussed in this book
Cognitive Radio Systems
Cognitive radio is a hot research area for future wireless communications in the recent years. In order to increase the spectrum utilization, cognitive radio makes it possible for unlicensed users to access the spectrum unoccupied by licensed users. Cognitive radio let the equipments more intelligent to communicate with each other in a spectrum-aware manner and provide a new approach for the co-existence of multiple wireless systems. The goal of this book is to provide highlights of the current research topics in the field of cognitive radio systems. The book consists of 17 chapters, addressing various problems in cognitive radio systems
OFDM passive radar employing compressive processing in MIMO configurations
A key advantage of passive radar is that it provides a means of performing position detection and tracking without the need for transmission of energy pulses. In this respect, passive radar systems utilising (receiving) orthogonal frequency division multiplexing (OFDM) communications signals from transmitters using OFDM standards such as long term evolution (LTE), WiMax or WiFi, are considered. Receiving a stronger reference signal for the matched filtering, detecting a lower target signature is one of the challenges in the passive radar. Impinging at the receiver, the OFDM waveforms supply two-dimensional virtual uniform rectangul ararray with the first and second dimensions refer to time delays and Doppler frequencies respectively. A subspace method, multiple signals classification (MUSIC) algorithm, demonstrated the signal extraction using multiple time samples. Apply normal measurements, this problem requires high computational resources regarding the number of OFDM subcarriers. For sub-Nyquist sampling, compressive sensing (CS) becomes attractive. A single snap shot measurement can be applied with Basis Pursuit (BP), whereas l1-singular value decomposition (l1-SVD) is applied for the multiple snapshots. Employing multiple transmitters, the diversity in the detection process can be achieved. While a passive means of attaining three-dimensional large-set measurements is provided by co-located receivers, there is a significant computational burden in terms of the on-line analysis of such data sets. In this thesis, the passive radar problem is presented as a mathematically sparse problem and interesting solutions, BP and l1-SVD as well as Bayesian compressive sensing, fast-Besselk, are considered. To increase the possibility of target signal detection, beamforming in the compressive domain is also introduced with the application of conve xoptimization and subspace orthogonality. An interference study is also another problem when reconstructing the target signal. The networks of passive radars are employed using stochastic geometry in order to understand the characteristics of interference, and the effect of signal to interference plus noise ratio (SINR). The results demonstrate the outstanding performance of l1-SVD over MUSIC when employing multiple snapshots. The single snapshot problem along with fast-BesselK multiple-input multiple-output configuration can be solved using fast-BesselK and this allows the compressive beamforming for detection capability
- …