868 research outputs found
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Artificial Noise-Aided Biobjective Transmitter Optimization for Service Integration in Multi-User MIMO Gaussian Broadcast Channel
This paper considers an artificial noise (AN)-aided transmit design for
multi-user MIMO systems with integrated services. Specifically, two sorts of
service messages are combined and served simultaneously: one multicast message
intended for all receivers and one confidential message intended for only one
receiver and required to be perfectly secure from other unauthorized receivers.
Our interest lies in the joint design of input covariances of the multicast
message, confidential message and artificial noise (AN), such that the
achievable secrecy rate and multicast rate are simultaneously maximized. This
problem is identified as a secrecy rate region maximization (SRRM) problem in
the context of physical-layer service integration. Since this bi-objective
optimization problem is inherently complex to solve, we put forward two
different scalarization methods to convert it into a scalar optimization
problem. First, we propose to prefix the multicast rate as a constant, and
accordingly, the primal biobjective problem is converted into a secrecy rate
maximization (SRM) problem with quality of multicast service (QoMS) constraint.
By varying the constant, we can obtain different Pareto optimal points. The
resulting SRM problem can be iteratively solved via a provably convergent
difference-of-concave (DC) algorithm. In the second method, we aim to maximize
the weighted sum of the secrecy rate and the multicast rate. Through varying
the weighted vector, one can also obtain different Pareto optimal points. We
show that this weighted sum rate maximization (WSRM) problem can be recast into
a primal decomposable form, which is amenable to alternating optimization (AO).
Then we compare these two scalarization methods in terms of their overall
performance and computational complexity via theoretical analysis as well as
numerical simulation, based on which new insights can be drawn.Comment: 14 pages, 5 figure
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
In this paper, we propose a two-way secure communication scheme where two
transceivers exchange confidential messages via a wireless powered untrusted
amplify-and-forward (AF) relay in the presence of an external jammer. We take
into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ)
scenarios. Based on the time switching (TS) architecture at the relay, the data
transmission is done in three phases. In the first phase, both the
energy-starved nodes, the untrustworthy relay and the jammer, are charged by
non-information radio frequency (RF) signals from the sources. In the second
phase, the two sources send their information signals and concurrently, the
jammer transmits artificial noise to confuse the curious relay. Finally, the
third phase is dedicated to forward a scaled version of the received signal
from the relay to the sources. For the proposed secure transmission schemes, we
derive new closed-form lower-bound expressions for the ergodic secrecy sum rate
(ESSR) in the high signal-to-noise ratio (SNR) regime. We further analyze the
asymptotic ESSR to determine the key parameters; the high SNR slope and the
high SNR power offset of the jamming based scenarios. To highlight the
performance advantage of the proposed FJ, we also examine the scenario of
without jamming (WoJ). Finally, numerical examples and discussions are provided
to acquire some engineering insights, and to demonstrate the impacts of
different system parameters on the secrecy performance of the considered
communication scenarios. The numerical results illustrate that the proposed FJ
significantly outperforms the traditional one-way communication and the
Constellation rotation approach, as well as our proposed benchmarks, the
two-way WoJ and GNJ scenarios.Comment: 14 pages, 6 figures, Submitted to IEEE Transactions on Vehicular
Technolog
Intelligent-Reflecting-Surface-Assisted UAV Communications for 6G Networks
In 6th-Generation (6G) mobile networks, Intelligent Reflective Surfaces
(IRSs) and Unmanned Aerial Vehicles (UAVs) have emerged as promising
technologies to address the coverage difficulties and resource constraints
faced by terrestrial networks. UAVs, with their mobility and low costs, offer
diverse connectivity options for mobile users and a novel deployment paradigm
for 6G networks. However, the limited battery capacity of UAVs, dynamic and
unpredictable channel environments, and communication resource constraints
result in poor performance of traditional UAV-based networks. IRSs can not only
reconstruct the wireless environment in a unique way, but also achieve wireless
network relay in a cost-effective manner. Hence, it receives significant
attention as a promising solution to solve the above challenges. In this
article, we conduct a comprehensive survey on IRS-assisted UAV communications
for 6G networks. First, primary issues, key technologies, and application
scenarios of IRS-assisted UAV communications for 6G networks are introduced.
Then, we put forward specific solutions to the issues of IRS-assisted UAV
communications. Finally, we discuss some open issues and future research
directions to guide researchers in related fields
Performance Enhancement Using NOMA-MIMO for 5G Networks
The integration of MIMO and NOMA technologies addresses key challenges in 5G and beyond, such as connectivity, latency, and dependability. However, resolving these issues, especially in MIMO-enabled 5G networks, required additional research. This involved optimizing parameters like bit error rate, downlink spectrum efficiency, average capacity rate, and uplink transmission outage probability. The model employed Quadrature Phase Shift Keying modulation on selected frequency channels, accommodating diverse user characteristics. Evaluation showed that MIMO-NOMA significantly improved bit error rate and transmitting power for the best user in download transmission. For uplink transmission, there was an increase in the average capacity rate and a decrease in outage probability for the best user. Closed-form formulas for various parameters in both downlink and uplink NOMA, with and without MIMO, were derived. Overall, adopting MIMO-NOMA led to a remarkable performance improvement for all users, even in challenging conditions like interference or fading channels
- …