474 research outputs found

    Authentication enhancement in command and control networks: (a study in Vehicular Ad-Hoc Networks)

    Get PDF
    Intelligent transportation systems contribute to improved traffic safety by facilitating real time communication between vehicles. By using wireless channels for communication, vehicular networks are susceptible to a wide range of attacks, such as impersonation, modification, and replay. In this context, securing data exchange between intercommunicating terminals, e.g., vehicle-to-everything (V2X) communication, constitutes a technological challenge that needs to be addressed. Hence, message authentication is crucial to safeguard vehicular ad-hoc networks (VANETs) from malicious attacks. The current state-of-the-art for authentication in VANETs relies on conventional cryptographic primitives, introducing significant computation and communication overheads. In this challenging scenario, physical (PHY)-layer authentication has gained popularity, which involves leveraging the inherent characteristics of wireless channels and the hardware imperfections to discriminate between wireless devices. However, PHY-layerbased authentication cannot be an alternative to crypto-based methods as the initial legitimacy detection must be conducted using cryptographic methods to extract the communicating terminal secret features. Nevertheless, it can be a promising complementary solution for the reauthentication problem in VANETs, introducing what is known as “cross-layer authentication.” This thesis focuses on designing efficient cross-layer authentication schemes for VANETs, reducing the communication and computation overheads associated with transmitting and verifying a crypto-based signature for each transmission. The following provides an overview of the proposed methodologies employed in various contributions presented in this thesis. 1. The first cross-layer authentication scheme: A four-step process represents this approach: initial crypto-based authentication, shared key extraction, re-authentication via a PHY challenge-response algorithm, and adaptive adjustments based on channel conditions. Simulation results validate its efficacy, especially in low signal-to-noise ratio (SNR) scenarios while proving its resilience against active and passive attacks. 2. The second cross-layer authentication scheme: Leveraging the spatially and temporally correlated wireless channel features, this scheme extracts high entropy shared keys that can be used to create dynamic PHY-layer signatures for authentication. A 3-Dimensional (3D) scattering Doppler emulator is designed to investigate the scheme’s performance at different speeds of a moving vehicle and SNRs. Theoretical and hardware implementation analyses prove the scheme’s capability to support high detection probability for an acceptable false alarm value ≤ 0.1 at SNR ≥ 0 dB and speed ≤ 45 m/s. 3. The third proposal: Reconfigurable intelligent surfaces (RIS) integration for improved authentication: Focusing on enhancing PHY-layer re-authentication, this proposal explores integrating RIS technology to improve SNR directed at designated vehicles. Theoretical analysis and practical implementation of the proposed scheme are conducted using a 1-bit RIS, consisting of 64 × 64 reflective units. Experimental results show a significant improvement in the Pd, increasing from 0.82 to 0.96 at SNR = − 6 dB for multicarrier communications. 4. The fourth proposal: RIS-enhanced vehicular communication security: Tailored for challenging SNR in non-line-of-sight (NLoS) scenarios, this proposal optimises key extraction and defends against denial-of-service (DoS) attacks through selective signal strengthening. Hardware implementation studies prove its effectiveness, showcasing improved key extraction performance and resilience against potential threats. 5. The fifth cross-layer authentication scheme: Integrating PKI-based initial legitimacy detection and blockchain-based reconciliation techniques, this scheme ensures secure data exchange. Rigorous security analyses and performance evaluations using network simulators and computation metrics showcase its effectiveness, ensuring its resistance against common attacks and time efficiency in message verification. 6. The final proposal: Group key distribution: Employing smart contract-based blockchain technology alongside PKI-based authentication, this proposal distributes group session keys securely. Its lightweight symmetric key cryptography-based method maintains privacy in VANETs, validated via Ethereum’s main network (MainNet) and comprehensive computation and communication evaluations. The analysis shows that the proposed methods yield a noteworthy reduction, approximately ranging from 70% to 99%, in both computation and communication overheads, as compared to the conventional approaches. This reduction pertains to the verification and transmission of 1000 messages in total

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum

    On Age-of-Information Aware Resource Allocation for Industrial Control-Communication-Codesign

    Get PDF
    Unter dem Überbegriff Industrie 4.0 wird in der industriellen Fertigung die zunehmende Digitalisierung und Vernetzung von industriellen Maschinen und Prozessen zusammengefasst. Die drahtlose, hoch-zuverlässige, niedrig-latente Kommunikation (engl. ultra-reliable low-latency communication, URLLC) – als Bestandteil von 5G gewährleistet höchste Dienstgüten, die mit industriellen drahtgebundenen Technologien vergleichbar sind und wird deshalb als Wegbereiter von Industrie 4.0 gesehen. Entgegen diesem Trend haben eine Reihe von Arbeiten im Forschungsbereich der vernetzten Regelungssysteme (engl. networked control systems, NCS) gezeigt, dass die hohen Dienstgüten von URLLC nicht notwendigerweise erforderlich sind, um eine hohe Regelgüte zu erzielen. Das Co-Design von Kommunikation und Regelung ermöglicht eine gemeinsame Optimierung von Regelgüte und Netzwerkparametern durch die Aufweichung der Grenze zwischen Netzwerk- und Applikationsschicht. Durch diese Verschränkung wird jedoch eine fundamentale (gemeinsame) Neuentwicklung von Regelungssystemen und Kommunikationsnetzen nötig, was ein Hindernis für die Verbreitung dieses Ansatzes darstellt. Stattdessen bedient sich diese Dissertation einem Co-Design-Ansatz, der beide Domänen weiterhin eindeutig voneinander abgrenzt, aber das Informationsalter (engl. age of information, AoI) als bedeutenden Schnittstellenparameter ausnutzt. Diese Dissertation trägt dazu bei, die Echtzeitanwendungszuverlässigkeit als Folge der Überschreitung eines vorgegebenen Informationsalterschwellenwerts zu quantifizieren und fokussiert sich dabei auf den Paketverlust als Ursache. Anhand der Beispielanwendung eines fahrerlosen Transportsystems wird gezeigt, dass die zeitlich negative Korrelation von Paketfehlern, die in heutigen Systemen keine Rolle spielt, für Echtzeitanwendungen äußerst vorteilhaft ist. Mit der Annahme von schnellem Schwund als dominanter Fehlerursache auf der Luftschnittstelle werden durch zeitdiskrete Markovmodelle, die für die zwei Netzwerkarchitekturen Single-Hop und Dual-Hop präsentiert werden, Kommunikationsfehlerfolgen auf einen Applikationsfehler abgebildet. Diese Modellierung ermöglicht die analytische Ableitung von anwendungsbezogenen Zuverlässigkeitsmetriken wie die durschnittliche Dauer bis zu einem Fehler (engl. mean time to failure). Für Single-Hop-Netze wird das neuartige Ressourcenallokationsschema State-Aware Resource Allocation (SARA) entwickelt, das auf dem Informationsalter beruht und die Anwendungszuverlässigkeit im Vergleich zu statischer Multi-Konnektivität um Größenordnungen erhöht, während der Ressourcenverbrauch im Bereich von konventioneller Einzelkonnektivität bleibt. Diese Zuverlässigkeit kann auch innerhalb eines Systems von Regelanwendungen, in welchem mehrere Agenten um eine begrenzte Anzahl Ressourcen konkurrieren, statistisch garantiert werden, wenn die Anzahl der verfügbaren Ressourcen pro Agent um ca. 10 % erhöht werden. Für das Dual-Hop Szenario wird darüberhinaus ein Optimierungsverfahren vorgestellt, das eine benutzerdefinierte Kostenfunktion minimiert, die niedrige Anwendungszuverlässigkeit, hohes Informationsalter und hohen durchschnittlichen Ressourcenverbrauch bestraft und so das benutzerdefinierte optimale SARA-Schema ableitet. Diese Optimierung kann offline durchgeführt und als Look-Up-Table in der unteren Medienzugriffsschicht zukünftiger industrieller Drahtlosnetze implementiert werden.:1. Introduction 1 1.1. The Need for an Industrial Solution . . . . . . . . . . . . . . . . . . . 3 1.2. Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2. Related Work 7 2.1. Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2. Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.3. Codesign . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.3.1. The Need for Abstraction – Age of Information . . . . . . . . 11 2.4. Dependability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3. Deriving Proper Communications Requirements 17 3.1. Fundamentals of Control Theory . . . . . . . . . . . . . . . . . . . . 18 3.1.1. Sampling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.1.2. Performance Requirements . . . . . . . . . . . . . . . . . . . 21 3.1.3. Packet Losses and Delay . . . . . . . . . . . . . . . . . . . . . 22 3.2. Joint Design of Control Loop with Packet Losses . . . . . . . . . . . . 23 3.2.1. Method 1: Reduced Sampling . . . . . . . . . . . . . . . . . . 23 3.2.2. Method 2: Markov Jump Linear System . . . . . . . . . . . . . 25 3.2.3. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3.3. Focus Application: The AGV Use Case . . . . . . . . . . . . . . . . . . 31 3.3.1. Control Loop Model . . . . . . . . . . . . . . . . . . . . . . . 31 3.3.2. Control Performance Requirements . . . . . . . . . . . . . . . 33 3.3.3. Joint Modeling: Applying Reduced Sampling . . . . . . . . . . 34 3.3.4. Joint Modeling: Applying MJLS . . . . . . . . . . . . . . . . . 34 3.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 4. Modeling Control-Communication Failures 43 4.1. Communication Assumptions . . . . . . . . . . . . . . . . . . . . . . 43 4.1.1. Small-Scale Fading as a Cause of Failure . . . . . . . . . . . . 44 4.1.2. Connectivity Models . . . . . . . . . . . . . . . . . . . . . . . 46 4.2. Failure Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 4.2.1. Single-hop network . . . . . . . . . . . . . . . . . . . . . . . . 49 4.2.2. Dual-hop network . . . . . . . . . . . . . . . . . . . . . . . . 51 4.3. Performance Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 4.3.1. Mean Time to Failure . . . . . . . . . . . . . . . . . . . . . . . 54 4.3.2. Packet Loss Ratio . . . . . . . . . . . . . . . . . . . . . . . . . 55 4.3.3. Average Number of Assigned Channels . . . . . . . . . . . . . 57 4.3.4. Age of Information . . . . . . . . . . . . . . . . . . . . . . . . 57 4.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 5. Single Hop – Single Agent 61 5.1. State-Aware Resource Allocation . . . . . . . . . . . . . . . . . . . . 61 5.2. Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 5.3. Erroneous Acknowledgments . . . . . . . . . . . . . . . . . . . . . . 67 5.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 6. Single Hop – Multiple Agents 71 6.1. Failure Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 6.1.1. Admission Control . . . . . . . . . . . . . . . . . . . . . . . . 72 6.1.2. Transition Probabilities . . . . . . . . . . . . . . . . . . . . . . 73 6.1.3. Computational Complexity . . . . . . . . . . . . . . . . . . . 74 6.1.4. Performance Metrics . . . . . . . . . . . . . . . . . . . . . . . 75 6.2. Illustration Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 6.3. Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 6.3.1. Verification through System-Level Simulation . . . . . . . . . 78 6.3.2. Applicability on the System Level . . . . . . . . . . . . . . . . 79 6.3.3. Comparison of Admission Control Schemes . . . . . . . . . . 80 6.3.4. Impact of the Packet Loss Tolerance . . . . . . . . . . . . . . . 82 6.3.5. Impact of the Number of Agents . . . . . . . . . . . . . . . . . 84 6.3.6. Age of Information . . . . . . . . . . . . . . . . . . . . . . . . 84 6.3.7. Channel Saturation Ratio . . . . . . . . . . . . . . . . . . . . 86 6.3.8. Enforcing Full Channel Saturation . . . . . . . . . . . . . . . 86 6.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 7. Dual Hop – Single Agent 91 7.1. State-Aware Resource Allocation . . . . . . . . . . . . . . . . . . . . 91 7.2. Optimization Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 7.3. Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 7.3.1. Extensive Simulation . . . . . . . . . . . . . . . . . . . . . . . 96 7.3.2. Non-Integer-Constrained Optimization . . . . . . . . . . . . . 98 7.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 8. Conclusions and Outlook 105 8.1. Key Results and Conclusions . . . . . . . . . . . . . . . . . . . . . . . 105 8.2. Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 A. DC Motor Model 111 Bibliography 113 Publications of the Author 127 List of Figures 129 List of Tables 131 List of Operators and Constants 133 List of Symbols 135 List of Acronyms 137 Curriculum Vitae 139In industrial manufacturing, Industry 4.0 refers to the ongoing convergence of the real and virtual worlds, enabled through intelligently interconnecting industrial machines and processes through information and communications technology. Ultrareliable low-latency communication (URLLC) is widely regarded as the enabling technology for Industry 4.0 due to its ability to fulfill highest quality-of-service (QoS) comparable to those of industrial wireline connections. In contrast to this trend, a range of works in the research domain of networked control systems have shown that URLLC’s supreme QoS is not necessarily required to achieve high quality-ofcontrol; the co-design of control and communication enables to jointly optimize and balance both quality-of-control parameters and network parameters through blurring the boundary between application and network layer. However, through the tight interlacing, this approach requires a fundamental (joint) redesign of both control systems and communication networks and may therefore not lead to short-term widespread adoption. Therefore, this thesis instead embraces a novel co-design approach which keeps both domains distinct but leverages the combination of control and communications by yet exploiting the age of information (AoI) as a valuable interface metric. This thesis contributes to quantifying application dependability as a consequence of exceeding a given peak AoI with the particular focus on packet losses. The beneficial influence of negative temporal packet loss correlation on control performance is demonstrated by means of the automated guided vehicle use case. Assuming small-scale fading as the dominant cause of communication failure, a series of communication failures are mapped to an application failure through discrete-time Markov models for single-hop (e.g, only uplink or downlink) and dual-hop (e.g., subsequent uplink and downlink) architectures. This enables the derivation of application-related dependability metrics such as the mean time to failure in closed form. For single-hop networks, an AoI-aware resource allocation strategy termed state-aware resource allocation (SARA) is proposed that increases the application reliability by orders of magnitude compared to static multi-connectivity while keeping the resource consumption in the range of best-effort single-connectivity. This dependability can also be statistically guaranteed on a system level – where multiple agents compete for a limited number of resources – if the provided amount of resources per agent is increased by approximately 10 %. For the dual-hop scenario, an AoI-aware resource allocation optimization is developed that minimizes a user-defined penalty function that punishes low application reliability, high AoI, and high average resource consumption. This optimization may be carried out offline and each resulting optimal SARA scheme may be implemented as a look-up table in the lower medium access control layer of future wireless industrial networks.:1. Introduction 1 1.1. The Need for an Industrial Solution . . . . . . . . . . . . . . . . . . . 3 1.2. Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2. Related Work 7 2.1. Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2. Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.3. Codesign . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.3.1. The Need for Abstraction – Age of Information . . . . . . . . 11 2.4. Dependability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3. Deriving Proper Communications Requirements 17 3.1. Fundamentals of Control Theory . . . . . . . . . . . . . . . . . . . . 18 3.1.1. Sampling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.1.2. Performance Requirements . . . . . . . . . . . . . . . . . . . 21 3.1.3. Packet Losses and Delay . . . . . . . . . . . . . . . . . . . . . 22 3.2. Joint Design of Control Loop with Packet Losses . . . . . . . . . . . . 23 3.2.1. Method 1: Reduced Sampling . . . . . . . . . . . . . . . . . . 23 3.2.2. Method 2: Markov Jump Linear System . . . . . . . . . . . . . 25 3.2.3. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3.3. Focus Application: The AGV Use Case . . . . . . . . . . . . . . . . . . 31 3.3.1. Control Loop Model . . . . . . . . . . . . . . . . . . . . . . . 31 3.3.2. Control Performance Requirements . . . . . . . . . . . . . . . 33 3.3.3. Joint Modeling: Applying Reduced Sampling . . . . . . . . . . 34 3.3.4. Joint Modeling: Applying MJLS . . . . . . . . . . . . . . . . . 34 3.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 4. Modeling Control-Communication Failures 43 4.1. Communication Assumptions . . . . . . . . . . . . . . . . . . . . . . 43 4.1.1. Small-Scale Fading as a Cause of Failure . . . . . . . . . . . . 44 4.1.2. Connectivity Models . . . . . . . . . . . . . . . . . . . . . . . 46 4.2. Failure Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 4.2.1. Single-hop network . . . . . . . . . . . . . . . . . . . . . . . . 49 4.2.2. Dual-hop network . . . . . . . . . . . . . . . . . . . . . . . . 51 4.3. Performance Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 4.3.1. Mean Time to Failure . . . . . . . . . . . . . . . . . . . . . . . 54 4.3.2. Packet Loss Ratio . . . . . . . . . . . . . . . . . . . . . . . . . 55 4.3.3. Average Number of Assigned Channels . . . . . . . . . . . . . 57 4.3.4. Age of Information . . . . . . . . . . . . . . . . . . . . . . . . 57 4.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 5. Single Hop – Single Agent 61 5.1. State-Aware Resource Allocation . . . . . . . . . . . . . . . . . . . . 61 5.2. Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 5.3. Erroneous Acknowledgments . . . . . . . . . . . . . . . . . . . . . . 67 5.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 6. Single Hop – Multiple Agents 71 6.1. Failure Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 6.1.1. Admission Control . . . . . . . . . . . . . . . . . . . . . . . . 72 6.1.2. Transition Probabilities . . . . . . . . . . . . . . . . . . . . . . 73 6.1.3. Computational Complexity . . . . . . . . . . . . . . . . . . . 74 6.1.4. Performance Metrics . . . . . . . . . . . . . . . . . . . . . . . 75 6.2. Illustration Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 6.3. Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 6.3.1. Verification through System-Level Simulation . . . . . . . . . 78 6.3.2. Applicability on the System Level . . . . . . . . . . . . . . . . 79 6.3.3. Comparison of Admission Control Schemes . . . . . . . . . . 80 6.3.4. Impact of the Packet Loss Tolerance . . . . . . . . . . . . . . . 82 6.3.5. Impact of the Number of Agents . . . . . . . . . . . . . . . . . 84 6.3.6. Age of Information . . . . . . . . . . . . . . . . . . . . . . . . 84 6.3.7. Channel Saturation Ratio . . . . . . . . . . . . . . . . . . . . 86 6.3.8. Enforcing Full Channel Saturation . . . . . . . . . . . . . . . 86 6.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 7. Dual Hop – Single Agent 91 7.1. State-Aware Resource Allocation . . . . . . . . . . . . . . . . . . . . 91 7.2. Optimization Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 7.3. Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 7.3.1. Extensive Simulation . . . . . . . . . . . . . . . . . . . . . . . 96 7.3.2. Non-Integer-Constrained Optimization . . . . . . . . . . . . . 98 7.4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 8. Conclusions and Outlook 105 8.1. Key Results and Conclusions . . . . . . . . . . . . . . . . . . . . . . . 105 8.2. Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 A. DC Motor Model 111 Bibliography 113 Publications of the Author 127 List of Figures 129 List of Tables 131 List of Operators and Constants 133 List of Symbols 135 List of Acronyms 137 Curriculum Vitae 13

    RF Wireless Power and Data Transfer : Experiment-driven Analysis and Waveform Design

    Get PDF
    The brisk deployment of the fifth generation (5G) mobile technology across the globe has accelerated the adoption of Internet of Things (IoT) networks. While 5G provides the necessary bandwidth and latency to connect the trillions of IoT sensors to the internet, the challenge of powering such a multitude of sensors with a replenishable energy source remains. Far-field radio frequency (RF) wireless power transfer (WPT) is a promising technology to address this issue. Conventionally, the RF WPT concepts have been deemed inadequate to deliver wireless power due to the undeniably huge over-the-air propagation losses. Nonetheless, the radical decline in the energy requirement of simple sensing and computing devices over the last few decades has rekindled the interest in RF WPT as a feasible solution for wireless power delivery to IoT sensors. The primary goal in any RF WPT system is to maximize the harvested direct current (DC) power from the minuscule incident RF power. As a result, optimizing the receiver power efficiency is pivotal for an RF WPT system. On similar lines, it is essential to minimize the power losses at the transmitter in order to achieve a sustainable and economically viable RF WPT system. In this regard, this thesis explores the system-level study of an RF WPT system using a digital radio transmitter for applications where alternative analog transmit circuits are impractical. A prototype test-bed comprising low-cost software-defined radio (SDR) transmitter and an off-the-shelf RF energy-harvesting (EH) receiver is developed to experimentally analyze the impact of clipping and nonlinear amplification at the digital radio transmitter on digital baseband waveform. The use of an SDR allows leveraging the test-bed for the research on RF simultaneous wireless information and power transfer (SWIPT); the true potential of this technology can be realized by utilizing the RF spectrum to transport data and power together. The experimental results indicate that a digital radio severely distorts high peak-to-average power ratio (PAPR) signals, thereby reducing their average output power and rendering them futile for RF WPT. On similar lines, another test-bed is developed to assess the impact of different waveforms, input impedance mismatch, incident RF power, and load on the receiver power efficiency of an RF WPT system. The experimental results provide the foundation and notion to develop a novel mathematical model for an RF EH receiver. The parametric model relates the harvested DC power to the power distribution of the envelope signal of the incident waveform, which is characterized by the amplitude, phase and frequency of the baseband waveform. The novel receiver model is independent of the receiver circuit’s matching network, rectifier configuration, number of diodes, load as well as input frequency. The efficacy of the model in accurately predicting the output DC power for any given power-level distribution is verified experimentally. Since the novel receiver model associates the output DC power to the parameters of the incident waveform, it is further leveraged to design optimal transmit wave-forms for RF WPT and SWIPT. The optimization problem reveals that a constant envelope signal with varying duty cycle is optimal for maximizing the harvested DC power. Consequently, a pulsed RF waveform is optimal for RF WPT, whereas a continuous phase modulated pulsed RF signal is suitable for RF SWIPT. The superior WPT performance of pulsed RF waveforms over multisine signals is demonstrated experimentally. Similarly, the pulsed phase-shift keying (PSK) signals exhibit superior receiver power efficiency than other communication signals. Nonetheless, varying the duty-cycle of pulsed PSK waveform leads to an efficiency—throughput trade-off in RF SWIPT. Finally, the SDR test-bed is used to evaluate the overall end-to-end power efficiency of different digital baseband waveforms through wireless measurements. The results indicate a 4-PSK modulated signal to be suitable for RF WPT considering the overall power efficiency of the system. The corresponding transmitter, channel and receiver power efficiencies are evaluated as well. The results demonstrate the transmitter power efficiency to be lower than the receiver power efficiency

    Designing data-aided demand-driven user-centric architecture for 6G and beyond networks

    Get PDF
    Despite advancements in capacity-enhancing technologies like massive MIMO (multiple input, multiple output) and intelligent reflective surfaces, network densification remains crucial for significant capacity gains in future networks such as 6G. However, network densification increases interference and power consumption. Traditional cellular architectures struggle to minimize these without compromising service quality or capacity, which necessitates a shift to a user-centric radio access network (UC-RAN). The UC-RAN approach offers additional degrees of freedom to ease the spectral-energy efficiency interlock while improving the service quality. However, its increased degrees of freedom make its optimal design and operation more challenging. This dissertation introduces four novel approaches for UC-RAN optimal design and operation. The objectives include mitigating interference, reducing power consumption, ensuring diverse user/vertical service quality, facilitating proactive network operation, risk-aware optimization, adopting an open radio access network, and enabling universal coverage. First, we construct an analytical framework to assess the effects of incorporating Coordinated Multipoint (CoMP) technology into UC-RAN to reduce interference and power consumption. We use stochastic geometry tools to derive expressions for network-wide coverage, spectral efficiency, and energy efficiency as a function of UC-RAN Configuration and Optimization Parameters (COPs), including data base station densities and user-centric service zone sizes. While the analytical framework provides insightful performance analysis that can guide overall system design, it cannot fully capture the dynamics of a UC-RAN system to enable optimal operation. Next, we present a Deep Reinforcement Learning (DRL) based method to dynamically orchestrate the UC-RAN service zone size to satisfy varying application demands of various service verticals during its operation. We define a novel multi-objective optimization problem that fairly optimizes otherwise conflicting key performance indicators (KPIs). DRL's practical adaptation by the industry remains thwarted by the risk it poses to the safe operation of a live network. To address this challenge, we propose a digital twin-enabled approach to enrich the DRL-based optimization framework, ensuring risk-aware COP optimization. We use Open Radio Access Network standards-based simulations to show that the proposed risk-aware DRL framework can maximize system-level KPIs while maintaining safe operational requirements. Lastly, we propose a hybrid model of aerial and terrestrial UC-RAN deployment to ensure universal coverage. We assess the impact of aerial base station parameters on system-level KPIs, providing a quantitative analysis of the advantages of a hybrid over a solely terrestrial UC-RAN. We develop a robust multi-objective function solvable via our DRL-based framework to balance and optimize these KPIs in a hybrid UC-RAN. Our extensive analytical and system-level simulation results suggest that these contributions can foster the much-needed paradigm shift towards demand-driven, elastic, and user-centric architecture in emerging and future cellular networks

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    In-band-full-duplex integrated access and backhaul enabled next generation wireless networks

    Get PDF
    In sixth generation (6G) wireless networks, the severe traffic congestion in the microwave frequencies motivates the exploration of the large available bandwidth in the millimetre-wave (mmWave) frequencies to achieve higher network capacity and data rate. Since large-scale antenna arrays and dense base station deployment are required, the hybrid beamforming architecture and the recently proposed integrated access and backhaul (IAB) networks become potential candidates for providing cost and hardware-friendly techniques for 6G wireless networks. In addition, in-band-full-duplex (IBFD) has been recently paid much more research attention since it can make the transmission and reception occur in the same time and frequency band, which nearly doubles the communication spectral efficiency (SE) compared with state-of-the-art half-duplex (HD) systems. Since 6G will explore sensing as its new capability, future wireless networks can go far beyond communications. Motivated by this, the development of integrated sensing and communications (ISAC) systems, where radar and communication systems share the same spectrum resources and hardware, has become one of the major goals in 6G. This PhD thesis focuses on the design and analysis of IBFD-IAB wireless networks in the frequency range 2 (FR2) band (≥ 24.250 GHz) at mmWave frequencies for the potential use in 6G. Firstly, we develop a novel design for the single-cell FR2-IBFD-IAB networks with subarray-based hybrid beamforming, which can enhance the SE and coverage while reducing the latency. The radio frequency (RF) beamformers are obtained via RF codebooks given by a modified matrix-wise Linde-Buzo-Gray (LBG) algorithm. The self-interference (SI) is cancelled in three stages, where the first stage of antenna isolation is assumed to be successfully deployed. The second stage consists of the optical domain-based RF cancellation, where cancellers are connected with the RF chain pairs. The third stage is comprised of the digital cancellation via successive interference cancellation followed by minimum mean-squared error (MSE) baseband receiver. Multiuser interference in the access link is cancelled by zero-forcing at the IAB-node transmitter. The proposed codebook algorithm avoids undesirable low-rank behaviour, while the proposed staged-SI cancellation (SIC) shows satisfactory cancellation performance in the wideband IBFD scenario. However, the system performance can be affected by the hardware impairments (HWI) and RF effective channel estimation errors. Secondly, we study an FR2-IBFD-ISAC-IAB network for vehicle-to-everything communications, where the IAB-node acts as a roadside unit performing sensing and communication simultaneously (i.e., at the same time and frequency band). The SI due to the IBFD operation will be cancelled in the propagation, analogue, and digital domains; only the residual SI (RSI) is reserved for performance analysis. Considering the subarray-based hybrid beamforming structure, including HWI and RF effective SI channel estimation error, the unscented Kalman filter is used for tracking multiple vehicles in the studied scenario. The proposed system shows an enhanced SE compared with the HD system, and the tracking MSEs averaged across all vehicles of each state parameter are close to their posterior Cramér-Rao lower bounds. Thirdly, we analyse the performance of the multi-cell wideband single-hop backhaul FR2-IBFD-IAB networks by using stochastic geometry analysis. We model the wired-connected next generation NodeBs (gNBs) as the Matérn hard-core point process (MHCPP) to meet the real-world deployment requirement and reduce the cost caused by wired connection in the network. We first derive association probabilities that reflect how likely the typical user-equipment is served by a gNB or an IAB-node based on the maximum long-term averaged biased-received-desired-signal power criteria. Further, by leveraging the composite Gamma-Lognormal distribution, we derive results for the signal to interference plus noise ratio coverage, capacity with outage, and ergodic capacity of the network. In order to assess the impact of noise, we consider the sidelobe gain on inter-cell interference links and the analogue to digital converter quantization noise. Compared with the HD transmission, the designated system shows an enhanced capacity when the SIC operates successfully. We also study how the power bias and density ratio of the IAB-node to gNB, and the hard-core distance can affect system performance. Overall, this thesis aims to contribute to the research efforts of shaping the 6G wireless networks by designing and analysing the FR2-IBFD-IAB inspired networks in the FR2 band at mmWave frequencies that will be potentially used in 6G for both communication only and ISAC scenarios

    Electronic Devices for the Combination of Electrically Controlled Drug Release, Electrostimulation, and Optogenetic Stimulation for Nerve Tissue Regeneration

    Full text link
    [ES] La capacidad de las células madre para proliferar formando distintas células especializadas les otorga la potencialidad de servir de base para terapias efectivas para patologías cuyo tratamiento era inimaginable hasta hace apenas dos décadas. Sin embargo, esta capacidad se encuentra mediada por estímulos fisiológicos, químicos, y eléctricos, específicos y complejos, que dificultan su traslación a la rutina clínica. Por ello, las células madre representan un campo de estudio en el que se invierten amplios esfuerzos por parte de la comunidad científica. En el ámbito de la regeneración nerviosa, para modular su desarrollo y diferenciación el tratamiento farmacológico, la electroestimulación, y la estimulación optogenética son técnicas que están consiguiendo prometedores resultados. Es por ello por lo que en la presente tesis se ha desarrollado un conjunto de sistemas electrónicos para permitir la aplicación combinada de estas técnicas in vitro, con perspectiva a su aplicación in vivo. Hemos diseñado una novedosa tecnología para la liberación eléctricamente controlada de fármacos. Esta tecnología está basada en nanopartículas de sílice mesoporosa y puertas moleculares de bipiridina-heparina. Las puertas moleculares son electroquímicamente reactivas, y encierran los fármacos en el interior de las nanopartículas, liberándolos ante un estímulo eléctrico. Hemos caracterizado esta tecnología, y la hemos validado mediante la liberación controlada de rodamina en cultivos celulares de HeLa. Para la combinación de liberación controlada de fármacos y electroestimulación hemos desarrollado dispositivos que permiten aplicar los estímulos eléctricos de forma configurable desde una interfaz gráfica de usuario. Además, hemos diseñado un módulo de expansión que permite multiplexar las señales eléctricas a diferentes cultivos celulares. Además, hemos diseñado un dispositivo de estimulación optogenética. Este tipo de estimulación consiste en la modificación genética de las células para que sean sensibles a la radiación lumínica de determinada longitud de onda. En el ámbito de la regeneración de tejido mediante células precursoras neurales, es de interés poder inducir ondas de calcio, favoreciendo su diferenciación en neuronas y la formación de circuitos sinápticos. El dispositivo diseñado permite obtener imágenes en tiempo real mediante microscopía confocal de las respuestas transitorias de las células al ser irradiadas. El dispositivo se ha validado irradiando neuronas modificadas con luz pulsada de 100 ms. También hemos diseñado un dispositivo electrónico complementario de medida de irradiancia con el doble fin de permitir la calibración del equipo de irradiancia y medir la irradiancia en tiempo real durante los experimentos in vitro. Los resultados del uso de los bioactuadores en procesos complejos y dinámicos, como la regeneración de tejido nervioso, son limitados en lazo abierto. Uno de los principales aspectos analizados es el desarrollo de biosensores que permitiesen la cuantización de ciertas biomoléculas para ajustar la estimulación suministrada en tiempo real. Por ejemplo, la segregación de serotonina es una respuesta identificada en la elongación de células precursoras neurales, pero hay otras biomoléculas de interés para la implementación de un control en lazo cerrado. Entre las tecnologías en el estado del arte, los biosensores basados en transistores de efecto de campo (FET) funcionalizados con aptámeros son realmente prometedores para esta aplicación. Sin embargo, esta tecnología no permitía la medición simultánea de más de una biomolécula objetivo en un volumen reducido debido a las interferencias entre los distintos FETs, cuyos terminales se encuentran inmersos en la solución. Por ello, hemos desarrollado instrumentación electrónica capaz de medir simultáneamente varios de estos biosensores, y la hemos validado mediante la medición simultánea de pH y la detección preliminar de serotonina y glutamato.[CA] La capacitat de les cèl·lules mare per a proliferar formant diferents cèl·lules especialitzades els atorga la potencialitat de servir de base per a teràpies efectives per a patologies el tractament de les quals era inimaginable fins fa a penes dues dècades. No obstant això, aquesta capacitat es troba mediada per estímuls fisiològics, químics, i elèctrics, específics i complexos, que dificulten la seua translació a la rutina clínica. Per això, les cèl·lules mare representen un camp d'estudi en el qual s'inverteixen amplis esforços per part de la comunitat científica. En l'àmbit de la regeneració nerviosa, per a modular el seu desenvolupament i diferenciació el tractament farmacològic, l'electroestimulació, i l'estimulació optogenética són tècniques que estan aconseguint prometedors resultats. És per això que en la present tesi s'ha desenvolupat un conjunt de sistemes electrònics per a permetre l'aplicació combinada d'aquestes tècniques in vitro, amb perspectiva a la seua aplicació in vivo. Hem dissenyat una nova tecnologia per a l'alliberament elèctricament controlat de fàrmacs. Aquesta tecnologia està basada en nanopartícules de sílice mesoporosa i portes moleculars de bipiridina-heparina. Les portes moleculars són electroquímicament reactives, i tanquen els fàrmacs a l'interior de les nanopartícules, alliberant-los davant un estímul elèctric. Hem caracteritzat aquesta tecnologia, i l'hem validada mitjançant l'alliberament controlat de rodamina en cultius cel·lulars de HeLa. Per a la combinació d'alliberament controlat de fàrmacs i electroestimulació hem desenvolupat dispositius que permeten aplicar els estímuls elèctrics de manera configurable des d'una interfície gràfica d'usuari. A més, hem dissenyat un mòdul d'expansió que permet multiplexar els senyals elèctrics a diferents cultius cel·lulars. A més, hem dissenyat un dispositiu d'estimulació optogenètica. Aquest tipus d'estimulació consisteix en la modificació genètica de les cèl·lules perquè siguen sensibles a la radiació lumínica de determinada longitud d'ona. En l'àmbit de la regeneració de teixit mitjançant cèl·lules precursores neurals, és d'interés poder induir ones de calci, afavorint la seua diferenciació en neurones i la formació de circuits sinàptics. El dispositiu dissenyat permet obtindré imatges en temps real mitjançant microscòpia confocal de les respostes transitòries de les cèl·lules en ser irradiades. El dispositiu s'ha validat irradiant neurones modificades amb llum polsada de 100 ms. També hem dissenyat un dispositiu electrònic complementari de mesura d'irradiància amb el doble fi de permetre el calibratge de l'equip d'irradiància i mesurar la irradiància en temps real durant els experiments in vitro. Els resultats de l'ús dels bioactuadors en processos complexos i dinàmics, com la regeneració de teixit nerviós, són limitats en llaç obert. Un dels principals aspectes analitzats és el desenvolupament de biosensors que permeteren la quantització de certes biomolècules per a ajustar l'estimulació subministrada en temps real. Per exemple, la segregació de serotonina és una resposta identificada amb l'elongació de les cèl·lules precursores neurals, però hi ha altres biomolècules d'interés per a la implementació d'un control en llaç tancat. Entre les tecnologies en l'estat de l'art, els biosensors basats en transistors d'efecte de camp (FET) funcionalitzats amb aptàmers són realment prometedors per a aquesta aplicació. No obstant això, aquesta tecnologia no permetia el mesurament simultani de més d'una biomolècula objectiu en un volum reduït a causa de les interferències entre els diferents FETs, els terminals dels quals es troben immersos en la solució. Per això, hem desenvolupat instrumentació electrònica capaç de mesurar simultàniament diversos d'aquests biosensors i els hem validat amb mesurament simultani del pH i la detecció preliminar de serotonina i glutamat.[EN] The stem cells' ability to proliferate to form different specialized cells gives them the potential to serve as the basis for effective therapies for pathologies whose treatment was unimaginable until just two decades ago. However, this capacity is mediated by specific and complex physiological, chemical, and electrical stimuli that complicate their translation to clinical routine. For this reason, stem cells represent a field of study in which the scientific community is investing a great deal of effort. In the field of nerve regeneration, to modulate their development and differentiation, pharmacological treatment, electrostimulation, and optogenetic stimulation are techniques that are achieving promising results. For this reason, we have developed a set of electronic systems to allow the combined application of these techniques in vitro, with a view to their application in vivo. We have designed a novel technology for the electrically controlled release of drugs. This technology is based on mesoporous silica nanoparticles and bipyridine-heparin molecular gates. The molecular gates are electrochemically reactive and entrap the drugs inside the nanoparticles, releasing them upon electrical stimulus. We have characterized this technology and validated it by controlled release of rhodamine in HeLa cell cultures. For combining electrostimulation and controlled drug release we have developed devices that allow applying the different electrical stimuli in a configurable way from a graphical user interface. In addition, we have designed an expansion module that allows multiplexing electrical signals to different cell cultures. In addition, we have designed an optogenetic stimulation device. This type of stimulation consists of genetically modifying cells to make them sensitive to light radiation of a specific wavelength. In tissue regeneration using neural precursor cells, it is interesting to be able to induce calcium waves, favoring the cell differentiation into neurons and the formation of synaptic circuits. The designed device enable the obtention of real-time images through confocal microscopy of the transient responses of cells upon irradiation. The device has been validated by irradiating modified neurons with 100 ms pulsed light stimulation. We have also designed a complementary electronic irradiance measurement device to allow calibration of the irradiator equipment and measuring irradiance in real time during in vitro experiments. The results of using bioactuators in complex and dynamic processes, such as nerve tissue regeneration, are limited in an open loop. One of the main aspects analyzed is the development of biosensors that would allow quantifying of specific biomolecules to adjust the stimulation provided in real time. For instance, serotonin secretion is an identified response of neural precursor cells elongation, among other biomolecules of interest for the implementation of a closed-loop control. Among the state-of-the-art technologies, biosensors based on field effect transistors (FETs) functionalized with aptamers are promising for this application. However, this technology did not allow the simultaneous measurement of more than one target biomolecule in a small volume due to interferences between the different FETs, whose terminals are immersed in the solution. This is why we have developed electronic instrumentation capable of simultaneously measuring several of these biosensors, and we have validated it with the simultaneous pH measurement and the preliminary detection of serotonin and glutamate.Monreal Trigo, J. (2023). Electronic Devices for the Combination of Electrically Controlled Drug Release, Electrostimulation, and Optogenetic Stimulation for Nerve Tissue Regeneration [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/19384
    corecore