1,264 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Link Quality Control Mechanism for Selective and Opportunistic AF Relaying in Cooperative ARQs: A MLSD Perspective
Incorporating relaying techniques into Automatic Repeat reQuest (ARQ)
mechanisms gives a general impression of diversity and throughput enhancements.
Allowing overhearing among multiple relays is also a known approach to increase
the number of participating relays in ARQs. However, when opportunistic
amplify-and-forward (AF) relaying is applied to cooperative ARQs, the system
design becomes nontrivial and even involved. Based on outage analysis, the
spatial and temporal diversities are first found sensitive to the received
signal qualities of relays, and a link quality control mechanism is then
developed to prescreen candidate relays in order to explore the diversity of
cooperative ARQs with a selective and opportunistic AF (SOAF) relaying method.
According to the analysis, the temporal and spatial diversities can be fully
exploited if proper thresholds are set for each hop along the relaying routes.
The SOAF relaying method is further examined from a packet delivery viewpoint.
By the principle of the maximum likelihood sequence detection (MLSD),
sufficient conditions on the link quality are established for the proposed
SOAF-relaying-based ARQ scheme to attain its potential diversity order in the
packet error rates (PERs) of MLSD. The conditions depend on the minimum
codeword distance and the average signal-to-noise ratio (SNR). Furthermore,
from a heuristic viewpoint, we also develop a threshold searching algorithm for
the proposed SOAF relaying and link quality method to exploit both the
diversity and the SNR gains in PER. The effectiveness of the proposed
thresholding mechanism is verified via simulations with trellis codes.Comment: This paper has been withdrawn by the authors due to an improper proof
for Theorem 2. To avoid a misleading understanding, we thus decide to
withdraw this pape
Energy-efficient diversity combining for different access schemes in a multi-path dispersive channel
Dissertação para obtenção do Grau de Doutor em
Engenharia Electrotécnica e ComputadoresThe forthcoming generation of mobile communications, 5G, will settle a new standard for a larger bandwidth and better Quality of Service (QoS). With the exploding growth rate of user generated data, wireless
standards must cope with this growth and at the same time be energy efficient to avoid depleting the batteries of wireless devices. Besides these issues, in a broadband wireless setting QoS can be severely affected from a multipath dispersive channel and therefore be energy demanding.
Cross-layered architectures are a good choice to enhance the overall performance of a wireless system.
Examples of cross-layered Physical (PHY) - Medium Access Control (MAC) architectures are type-II Diversity Combining (DC) Hybrid-ARQ (H-ARQ) and Multi-user Detection (MUD) schemes. Cross-layered type-II DC H-ARQ schemes reuse failed packet transmissions to enhance data reception on posterior retransmissions; MUD schemes reuse data information from previously collided packets on posterior retransmissions to enhance data reception. For a multipath dispersive channel, a PHY layer analytical
model is proposed for Single-Carrier with Frequency Domain Equalization (SC-FDE) that supports DC H-ARQ and MUD. Based on this analytical model, three PHY-MAC protocols are proposed. A crosslayered Time Division Multiple Access (TDMA) scheme that uses DC H-ARQ is modeled and its performance is studied in this document; the performance analysis shows that the scheme performs better with DC and achieves a better energy efficiency at the cost of a higher delay. A novel cross-layered prefix-assisted Direct-Sequence Code Division Multiple Access (DS-CDMA) scheme is proposed and modeled in this document, it uses principles of DC and MUD. This protocol performs better by means
of additional retransmissions, achieving better energy efficiency, at the cost of higher redundancy from a code spreading gain. Finally, a novel cross-layered protocol H-ARQ Network Division Multiple Access (H-NDMA) is proposed and modeled, where the combination of DC H-ARQ and MUD is used with the intent of maximizing the system capacity with a lower delay; system results show that the proposed scheme achieves better energy efficiency and a better performance at the cost of a higher number of retransmissions.
A comparison of the three cross-layered protocols is made, using the PHY analytical model, under normalized conditions using the same amount of maximum redundancy. Results show that the H-NDMA protocol, in general, obtains the best results, achieving a good performance and a good energy efficiency
for a high channel load and low Signal-to-Noise Ratio (SNR). TDMA with DC H-ARQ achieves the best energy efficiency, although presenting the worst delay. Prefix-assisted DS-CDMA in the other hand shows good delay results but presents the worst throughput and energy efficiency
Relay Switching Aided Turbo Coded Hybrid-ARQ for Correlated Fading Channel
Hybrid-Automatic-Repeat-reQuest (HARQ) has become an indispensable technique in reliable communications systems. However, its performance is inevitably affected by the channel’s fading correlation. In this paper, we proposed a novel relay-switching aided HARQ scheme in order to mitigate the detrimental effects of correlated fading without unduly increasing the system’s complexity and delay. Our results show that the proposed relay-switching regime operates efficiently in correlated channels, hence significantly reduces the error floor of turbo-coded HARQ. Additionally, a HARQ scheme using Segment Selective Repeat (SSR) is incorporated in the relay-switching scheme for achieving further improvements. Quantitatively, the proposed relay-switching aided turbo-coded HARQ scheme using SSR may achieve an approximately 2 dB gain, compared to the conventional amplify-and-forward aided turbo coded HARQ arrangement using Chase Combining. Index Terms - Relay switching, correlated fading channel, Hybrid-ARQ, turbo codes, chase combining, incremental redundancy, selective segment repeat
Peak-Age Violation Guarantees for the Transmission of Short Packets over Fading Channels
We investigate the probability that the peak age of information in a
point-to-point communication system operating over a multiantenna wireless
fading channel exceeds a predetermined value. The packets are scheduled
according to a last-come first-serve policy with preemption in service, and are
transmitted over the channel using a simple automatic repetition request
protocol. We consider quadrature phase shift keying modulation, pilot-assisted
transmission, maximum-likelihood channel estimation, and mismatched scaled
nearest-neighbor decoding. Our analysis, which exploits nonasymptotic tools in
information theory, allows one to determine, for a given information packet
size, the physical layer parameters such as the SNR, the number of transmit and
receive antennas, the amount of frequency diversity to exploit, and the number
of pilot symbols, to ensure that the system operates below a target peak-age
violation probability.Comment: 6 pages, 6 figures. To be presented at Infocom 201
- …