30 research outputs found

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Komunikace na milimetrových vlnách v 5G a dalších sítích: Nové systémové modely a analýza výkonnosti

    Get PDF
    The dissertation investigates different network models, focusing on three important features for next generation cellular networks with respect to millimeter waves (mmWave) communications: the impact of fading and co-channel interference (CCI), energy efficiency, and spectrum efficiency. To address the first aim, the dissertation contains a study of a non-orthogonal multiple access (NOMA) technique in a multi-hop relay network which uses relays that harvest energy from power beacons (PB). This part derives the exact throughput expressions for NOMA and provides a performance analysis of three different NOMA schemes to determine the optimal parameters for the proposed system’s throughput. A self-learning clustering protocol (SLCP) in which a node learns its neighbor’s information is also proposed for determining the node density and the residual energy used to cluster head (CH) selection and improve energy efficiency, thereby prolonging sensor network lifetime and gaining higher throughput. Second, NOMA provides many opportunities for massive connectivity at lower latencies, but it may also cause co-channel interference by reusing frequencies. CCI and fading play a major role in deciding the quality of the received signal. The dissertation takes into account the presence of η and µ fading channels in a network using NOMA. The closed-form expressions of outage probability (OP) and throughput were derived with perfect successive interference cancellation (SIC) and imperfect SIC. The dissertation also addresses the integration of NOMA into a satellite communications network and evaluates its system performance under the effects of imperfect channel state information (CSI) and CCI. Finally, the dissertation presents a new model for a NOMA-based hybrid satellite-terrestrial relay network (HSTRN) using mmWave communications. The satellite deploys the NOMA scheme, whereas the ground relays are equipped with multiple antennas and employ the amplify and forward (AF) protocol. The rain attenuation coefficient is considered as the fading factor of the mmWave band to choose the best relay, and the widely applied hybrid shadowed-Rician and Nakagami-m channels characterize the transmission environment of HSTRN. The closed-form formulas for OP and ergodic capacity (EC) were derived to evaluate the system performance of the proposed model and then verified with Monte Carlo simulations.Dizertační práce zkoumala různé modely sítí a zaměřila se na tři důležité vlastnosti pro buňkové sítě příští generace s ohledem na mmW komunikace, kterými jsou: vliv útlumu a mezikanálového rušení (CCI), energetická účinnost a účinnost spektra. Co se týče prvního cíle, dizertace obsahuje studii techniky neortogonálního vícenásobného přístupu (NOMA) v bezdrátové multiskokové relay síti využívající získávání energie, kde relay uzly sbírají energii z energetických majáků (PB). Tato část přináší přesné výrazy propustnosti pro NOMA a analýzu výkonnosti se třemi různými schématy NOMA s cílem určit optimální parametry pro propustnost navrženého systému. Dále byl navržen samoučící se shlukovací protokol (SLCP), ve kterém se uzel učí informace o sousedech, aby určil hustotu uzlů a zbytkovou energii použitou k výběru hlavy shluku CH pro zlepšení energetické účinnosti, čímž může prodloužit životnost sensorové sítě a zvýšit propustnost. Za druhé, přístup NOMA poskytl mnoho příležitostí pro masivní připojení s nižší latencí, NOMA však může způsobovat mezikanálové rušení v důsledku opětovného využívání kmitočtů. CCI a útlum hrají klíčovou roli při rozhodování o kvalitě přijímaného signálu. V této dizertace je brána v úvahu přítomnost η a µ útlumových kanálů v síti užívající NOMA. Odvozeny jsou výrazy v uzavřené formě pro pravděpodobnost výpadku (OP) a propustnost s dokonalým postupným rušením rušení (SIC) a nedokonalým SIC. Dále se dizertace zabývá integrací přístupu NOMA do satelitní komunikační sítě a vyhodnocuje výkonnost systému při dopadech nedokonalé informace o stavu kanálu (CSI) a CCI. Závěrem disertační práce představuje nový model pro hybridní družicově-terestriální přenosovou síť (HSTRN) založenou na NOMA vícenásobném přístupu využívající mmWave komunikaci. Satelit využívá NOMA schéma, zatímco pozemní relay uzly jsou vybaveny více anténami a aplikují protokol zesilování a předávání (AF). Je zaveden srážkový koeficient, který je uvažován jako útlumový faktor mmWave pásma při výběru nejlepšího relay uzlu. Samotné přenosové prostředí HSTRN je charakterizováno pomocí hybridních Rician a Nakagami-m kanálů. Vztahy pro vyhodnocení výkonnosti systému navrženého modelu vyjadřující ergodickou kapacitu (EC) a pravděpodobnost ztrát (OP) byly odvozeny v uzavřené formě a následně ověřeny pomocí simulační numerické metody Monte Carlo.440 - Katedra telekomunikační technikyvyhově

    Performance of wireless optical telecommunication systems in the presence of fading and interference

    Get PDF
    Postojeći komunikacioni sistem u domenu RF elektromagnetnog spektra nije u mogućnosti da zadovolji sve potrebe brzog i obimnog prenosa podataka, koje se javljaju usled ekspanzije i sve veće upotrebe IoT uređaja, 5G i B5G mreža, kao i raznovrsnih aplikacija i multimedijalnog sadržaja. Optička bežična komunikacija (OWC), koja koristi veliki opseg nelicenciranog dela spektra, se pokazala kao dobra alternativa za ublažavanje nedostataka konvencionalnog sistema za prenos podataka koji radi u RF domenu. FSO (Free Space Optics) tehnologija predstavlja jednu od vrsta optičkih bežičnih komunikacija, ima veliku upotrebu u LAN i MAN mrežama , bežičnom video nadzoru, koristi se u medicinske svrhe, u svemirskoj komunikaciji, za rešavanje problema poslednje milje itd. Primena bežičnih komunikacija, znatno može da doprinese performansama sistema, i to u smislu spektralne i energetske efikasnosti kao i u smislu pouzdanosti. U disertaciji je u cilju utvrđivanja optimalnog scenarija prijema signala, kao i određivanja optimalnih vrednosti parametara takvog prenosa, izvršena analiza karakteristika bežičnog optičkog prenosa signala u prisustvu turbulencije i efekta greške pozicioniranja, koji se odvija pod kompozitnim uticajem navedenih smetnji. Za posmatrane scenarije prenosa razmatrane su standardne mere performansi sistema, kao što su srednja verovatnoća greške po bitu, posmatrana za odgovarajuće modulacione formate, kao i verovatnoća otkaza. Predstavljena su analitička i numerička rešenja problema, a uticaji pojedinih parametara sistema na performanse bežičnog optičkog prenosa prikazani su i grafički

    Physical-Layer Security in Cognitive Radio Networks

    Get PDF
    The fifth-generation (5G) communications and beyond are expected to serve a huge number of devices and services. However, due to the fixed spectrum allocation policies, the need for cognitive radio networks (CRNs) has increased accordingly. CRNs have been proposed as a promising approach to address the problem of under-utilization and scarcity of the spectrum. In CRNs, secondary users (SUs) access the licensed spectrum of the primary users (PUs) using underlay, overlay, or interweave paradigms. SUs can access the spectrum band simultaneously with the PUs in underlay access mode provided that the SUs’ transmission power does not cause interference to the PUs’ communication. In this case, SUs should keep monitoring the interference level that the PU receiver can tolerate and adjust the transmission power accordingly. However, varying the transmission power may lead to some threats to the privacy of the information transfer of CRNs. Therefore, securing data transmission in an underlay CRN is a challenge that should be addressed. Physical-layer security (PLS) has recently emerged as a reliable method to protect the confidentiality of the SUs’ transmission against attacks, especially for the underlay model with no need for sharing security keys. Indeed, PLS has the advantage of safeguarding the data transmission without the necessity of adding enormous additional resources, specifically when there are massively connected devices. Apart from the energy consumed by the various functions carried out by SUs, enhancing security consumes additional energy. Therefore, energy harvesting (EH) is adopted in our work to achieve both; energy efficiency and spectral efficiency. EH is a significant breakthrough for green communication, allowing the network nodes to reap energy from multiple sources to lengthen battery life. The energy from various sources, such as solar, wind, vibration, and radio frequency (RF) signals, can be obtained through the process of EH. This accumulated energy can be stored to be used for various processes, such as improving the users’ privacy and prolonging the energy-constrained devices’ battery life. In this thesis, for the purpose of realistic modelling of signal transmission, we explicitly assume scenarios involving moving vehicles or nodes in networks that are densely surrounded by obstacles. Hence, we begin our investigations by studying the link performance under the impact of cascaded κ−μ fading channels. Moreover, using the approach of PLS, we address the privacy of several three-node wiretap system models, in which there are two legitimate devices communicating under the threat of eavesdroppers. We begin by a three-node wiretap system model operating over cascaded κ − μ fading channels and under worst-case assumptions. Moreover, assuming cascaded κ − μ distributions for all the links, we investigate the impact of these cascade levels, as well as the impact of multiple antennas employed at the eavesdropper on security. Additionally, the PLS is examined for two distinct eavesdropping scenarios: colluding and non-colluding eavesdroppers. Throughout the thesis, PLS is mainly evaluated through the secrecy outage probability (SOP), the probability of non-zero secrecy capacity (Pnzcr ), and the intercept probability (Pint). Considering an underlay CRN operating over cascaded Rayleigh fading channel, with the presence of an eavesdropper, we explore the PLS for SUs in the network. This study is then extended to investigate the PLS of SUs in an underlay single-input-multiple-output (SIMO) CRN over cascaded κ-μ general fading channels with the presence of a multi-antenna eavesdropper. The impact of the constraint over the transmission power of the SU transmitter due to the underlay access mode is investigated. In addition, the effects of multiple antennas and cascade levels over security are well-explored. In the second part of our thesis, we propose an underlay CRN, in which an SU transmitter communicates with an SU destination over cascaded κ-μ channels. The confidentiality of the shared information between SUs is threatened by an eavesdropper. Our major objective is to achieve a secured network, while at the same time improving the energy and spectrum efficiencies with practical modeling for signals’ propagation. Hence, we presume that the SU destination harvests energy from the SU transmitter. The harvested energy is used to produce jamming signals to be transmitted to mislead the eavesdropper. In this scenario, a comparison is made between an energy-harvesting eavesdropper and a non-energy harvesting one. Additionally, we present another scenario in which cooperative jamming is utilized as one of the means to boost security. In this system model, the users are assumed to communicate over cascaded Rayleigh channels. Moreover, two scenarios for the tapping capabilities of the eavesdroppers are presented; colluding and non-colluding eavesdroppers. This study is then extended for the case of non-colluding eavesdroppers, operating over cascaded κ-μ channels. Finally, we investigate the reliability of the SUs and PUs while accessing the licensed bands using the overlay mode, while enhancing the energy efficiency via EH techniques. Hence, we assume that multiple SUs are randomly distributed, in which one of the SUs is selected to harvest energy from the PUs’ messages. Then, utilizing the gathered energy, this SU combines its own messages with the amplified PUs messages and forwards them to the destinations. Furthermore, we develop two optimization problems with the potential of maximizing the secondary users’ rate and the sum rate of both networks

    Networks, Communication, and Computing Vol. 2

    Get PDF
    Networks, communications, and computing have become ubiquitous and inseparable parts of everyday life. This book is based on a Special Issue of the Algorithms journal, and it is devoted to the exploration of the many-faceted relationship of networks, communications, and computing. The included papers explore the current state-of-the-art research in these areas, with a particular interest in the interactions among the fields

    Evolution of Non-Terrestrial Networks From 5G to 6G: A Survey

    Get PDF
    Non-terrestrial networks (NTNs) traditionally have certain limited applications. However, the recent technological advancements and manufacturing cost reduction opened up myriad applications of NTNs for 5G and beyond networks, especially when integrated into terrestrial networks (TNs). This article comprehensively surveys the evolution of NTNs highlighting their relevance to 5G networks and essentially, how it will play a pivotal role in the development of 6G ecosystem. We discuss important features of NTNs integration into TNs and the synergies by delving into the new range of services and use cases, various architectures, technological enablers, and higher layer aspects pertinent to NTNs integration. Moreover, we review the corresponding challenges arising from the technical peculiarities and the new approaches being adopted to develop efficient integrated ground-air-space (GAS) networks. Our survey further includes the major progress and outcomes from academic research as well as industrial efforts representing the main industrial trends, field trials, and prototyping towards the 6G networks

    Machine Learning-Aided Operations and Communications of Unmanned Aerial Vehicles: A Contemporary Survey

    Full text link
    The ongoing amalgamation of UAV and ML techniques is creating a significant synergy and empowering UAVs with unprecedented intelligence and autonomy. This survey aims to provide a timely and comprehensive overview of ML techniques used in UAV operations and communications and identify the potential growth areas and research gaps. We emphasise the four key components of UAV operations and communications to which ML can significantly contribute, namely, perception and feature extraction, feature interpretation and regeneration, trajectory and mission planning, and aerodynamic control and operation. We classify the latest popular ML tools based on their applications to the four components and conduct gap analyses. This survey also takes a step forward by pointing out significant challenges in the upcoming realm of ML-aided automated UAV operations and communications. It is revealed that different ML techniques dominate the applications to the four key modules of UAV operations and communications. While there is an increasing trend of cross-module designs, little effort has been devoted to an end-to-end ML framework, from perception and feature extraction to aerodynamic control and operation. It is also unveiled that the reliability and trust of ML in UAV operations and applications require significant attention before full automation of UAVs and potential cooperation between UAVs and humans come to fruition.Comment: 36 pages, 304 references, 19 Figure

    6G Enabled Smart Infrastructure for Sustainable Society: Opportunities, Challenges, and Research Roadmap

    Get PDF
    The 5G wireless communication network is currently faced with the challenge of limited data speed exacerbated by the proliferation of billions of data-intensive applications. To address this problem, researchers are developing cutting-edge technologies for the envisioned 6G wireless communication standards to satisfy the escalating wireless services demands. Though some of the candidate technologies in the 5G standards will apply to 6G wireless networks, key disruptive technologies that will guarantee the desired quality of physical experience to achieve ubiquitous wireless connectivity are expected in 6G. This article first provides a foundational background on the evolution of different wireless communication standards to have a proper insight into the vision and requirements of 6G. Second, we provide a panoramic view of the enabling technologies proposed to facilitate 6G and introduce emerging 6G applications such as multi-sensory–extended reality, digital replica, and more. Next, the technology-driven challenges, social, psychological, health and commercialization issues posed to actualizing 6G, and the probable solutions to tackle these challenges are discussed extensively. Additionally, we present new use cases of the 6G technology in agriculture, education, media and entertainment, logistics and transportation, and tourism. Furthermore, we discuss the multi-faceted communication capabilities of 6G that will contribute significantly to global sustainability and how 6G will bring about a dramatic change in the business arena. Finally, we highlight the research trends, open research issues, and key take-away lessons for future research exploration in 6G wireless communicatio

    Reliability performance analysis of half-duplex and full-duplex schemes with self-energy recycling

    Get PDF
    Abstract. Radio frequency energy harvesting (EH) has emerged as a promising option for improving the energy efficiency of current and future networks. Self-energy recycling (sER), as a variant of EH, has also appeared as a suitable alternative that allows to reuse part of the transmitted energy via an energy loop. In this work we study the benefits of using sER in terms of reliability improvements and compare the performance of full-duplex (FD) and half-duplex (HD) schemes when using multi-antenna techniques at the base station side. We also assume a model for the hardware energy consumption, making the analysis more realistic since most works only consider the energy spent on transmission. In addition to spectral efficiency enhancements, results show that FD performs better than HD in terms of reliability. We maximize the outage probability of the worst link in the network using a dynamic FD scheme where a small base station (SBS) determines the optimal number of antennas for transmission and reception. This scheme proves to be more efficient than classical HD and FD modes. Results show that the use of sER at the SBS introduces changes on the distribution of antennas for maximum fairness when compared to the setup without sER. Moreover, we determine the minimum number of active radio frequency chains required at the SBS in order to achieve a given reliability target

    Optimization and Communication in UAV Networks

    Get PDF
    UAVs are becoming a reality and attract increasing attention. They can be remotely controlled or completely autonomous and be used alone or as a fleet and in a large set of applications. They are constrained by hardware since they cannot be too heavy and rely on batteries. Their use still raises a large set of exciting new challenges in terms of trajectory optimization and positioning when they are used alone or in cooperation, and communication when they evolve in swarm, to name but a few examples. This book presents some new original contributions regarding UAV or UAV swarm optimization and communication aspects
    corecore