277 research outputs found
Wideband Anti-Jamming Based on Free Space Optical Communication and Photonic Signal Processing
We propose and demonstrate an anti-jamming system to defend against wideband jamming attack. Free space optical communication is deployed to provide a reference for jamming cancellation. The mixed signal is processed and separated with photonic signal processing method to achieve large bandwidth. As an analog signal processing method, the cancellation system introduces zero latency. The radio frequency signals are modulated on optical carriers to achieve wideband and unanimous frequency response. With wideband and zero latency, the system meets the key requirements of high speed and real-time communications in transportation systems
Security for 5G Mobile Wireless Networks
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key management and privacy. The paper further discusses the new security features involving different technologies applied to 5G such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software defined networks and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantage of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized
Multilevel Pricing Schemes in a Deregulated Wireless Network Market
Typically the cost of a product, a good or a service has many components.
Those components come from different complex steps in the supply chain of the
product from sourcing to distribution. This economic point of view also takes
place in the determination of goods and services in wireless networks. Indeed,
before transmitting customer data, a network operator has to lease some
frequency range from a spectrum owner and also has to establish agreements with
electricity suppliers. The goal of this paper is to compare two pricing
schemes, namely a power-based and a flat rate, and give a possible explanation
why flat rate pricing schemes are more common than power based pricing ones in
a deregulated wireless market. We suggest a hierarchical game-theoretical model
of a three level supply chain: the end users, the service provider and the
spectrum owner. The end users intend to transmit data on a wireless network.
The amount of traffic sent by the end users depends on the available frequency
bandwidth as well as the price they have to pay for their transmission. A
natural question arises for the service provider: how to design an efficient
pricing scheme in order to maximize his profit. Moreover he has to take into
account the lease charge he has to pay to the spectrum owner and how many
frequency bandwidth to rent. The spectrum owner itself also looks for
maximizing its profit and has to determine the lease price to the service
provider. The equilibrium at each level of our supply chain model are
established and several properties are investigated. In particular, in the case
of a power-based pricing scheme, the service provider and the spectrum owner
tend to share the gross provider profit. Whereas, considering the flat rate
pricing scheme, if the end users are going to exploit the network intensively,
then the tariffs of the suppliers (spectrum owner and service provider)
explode.Comment: This is the last draft version of the paper. Revised version of the
paper accepted by ValueTools 2013 can be found in Proceedings of the 7th
International Conference on Performance Evaluation Methodologies and Tools
(ValueTools '13), December 10-12, 2013, Turin, Ital
- …