20 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Design of large polyphase filters in the Quadratic Residue Number System

    Full text link

    Temperature aware power optimization for multicore floating-point units

    Full text link

    Resource Allocation for Interference Management in Wireless Networks

    Get PDF
    Interference in wireless networks is a major problem that impacts system performance quite substantially. Combined with the fact that the spectrum is limited and scarce, the performance and reliability of wireless systems significantly deteriorates and, hence, communication sessions are put at the risk of failure. In an attempt to make transmissions resilient to interference and, accordingly, design robust wireless systems, a diverse set of interference mitigation techniques are investigated in this dissertation. Depending on the rationale motivating the interfering node, interference can be divided into two categories, communication and jamming. For communication interference such as the interference created by legacy users(e.g., primary user transmitters in a cognitive radio network) at non-legacy or unlicensed users(e.g.,secondary user receivers), two mitigation techniques are presented in this dissertation. One exploits permutation trellis codes combined with M-ary frequency shift keying in order to make SU transmissions resilient to PUs’ interference, while the other utilizes frequency allocation as a mitigation technique against SU interference using Matching theory. For jamming interference, two mitigation techniques are also investigated here. One technique exploits time and structures a jammer mitigation framework through an automatic repeat request protocol. The other one utilizes power and, following a game-theoretic framework, employs a defense strategy against jamming based on a strategic power allocation. Superior performance of all of the proposed mitigation techniques is shown via numerical results

    Physical layer security for IoT applications

    Get PDF
    The increasing demands for Internet of things (IoT) applications and the tremendous increase in the volume of IoT generated data bring novel challenges for the fifth generation (5G) network. Verticals such as e-Health, vehicle to everything (V2X) and unmanned aerial vehicles (UAVs) require solutions that can guarantee low latency, energy efficiency,massive connectivity, and high reliability. In particular, finding strong security mechanisms that satisfy the above is of central importance for bringing the IoT to life. In this regards, employing physical layer security (PLS) methods could be greatly beneficial for IoT networks. While current security solutions rely on computational complexity, PLS is based on information theoretic proofs. By removing the need for computational power, PLS is ideally suited for resource constrained devices. In detail, PLS can ensure security using the inherit randomness already present in the physical channel. Promising schemes from the physical layer include physical unclonable functions (PUFs), which are seen as the hardware fingerprint of a device, and secret key generation (SKG) from wireless fading coefficients, which provide the wireless fingerprint of the communication channel between devices. The present thesis develops several PLS-based techniques that pave the way for a new breed of latency-aware, lightweight, security protocols. In particular, the work proposes: i) a fast multi-factor authentication solution with verified security properties based on PUFs, proximity detection and SKG; ii) an authenticated encryption SKG approach that interweaves data transmission and key generation; and, iii) a set of countermeasures to man-in-the-middle and jamming attacks. Overall, PLS solutions show promising performance, especially in the context of IoT applications, therefore, the advances in this thesis should be considered for beyond-5G networks

    Optimization and Applications of Modern Wireless Networks and Symmetry

    Get PDF
    Due to the future demands of wireless communications, this book focuses on channel coding, multi-access, network protocol, and the related techniques for IoT/5G. Channel coding is widely used to enhance reliability and spectral efficiency. In particular, low-density parity check (LDPC) codes and polar codes are optimized for next wireless standard. Moreover, advanced network protocol is developed to improve wireless throughput. This invokes a great deal of attention on modern communications

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Spectrum sharing for wireless communication subject to regulatory constraints on power

    Get PDF
    Spectrum is or soon will be a scarce asset, and hence methods for effciently sharing spectrum are important. Concern about the possible effects of wireless radiation on health are also growing because of the widespread and growing use of devices that communicate wirelessly. Although some of this concern can be attributed to illinformed alarm, international agreements and industry standards recognise the need for prudence in managing exposure to electromagnetic fields (EMF). When efficient shared use of spectrum is investigated, it is necessary to consider why the power available for wireless transmission is limited, and how this limitation on available power is expressed, and therefore the issue of spectrum sharing cannot be addressed without taking into account safety-related constraints on power. EMF levels need to be regulated to levels well below levels where there might be harm and therefore below the internationally agreed EMF exposure limit standards. Hence, we do not expect to see any health effects at these levels. In Chapter 3 of this dissertation, it is argued that for the safety of human health, we should assume that there must be constraints on the power, or EMF, used at each device participating in the shared communication. These constraints on EMF affect the way we share the spectrum. The way these regulations are expressed needs great care because it will have an effect on the design of the wireless communication systems. In Chapter 4, a Spread Spectrum-Orthogonal Frequency Division Multiplexing (SS-OFDM) model is developed for efficient sharing of the spectrum among nearby users. Efficient sharing is shown to be consistent with nearby WiFi domains appearing as noise to each other (which is the characteristic property of spread-spectrum). In Chapter 5, we assume that there must be constraints on the power, or EMF, used at each device participating in the shared communication. This thesis considers five different forms of power/EMF constraint and compares the sum-throughput achieved by all devices, under these different constraints. Note that the five different approaches to meeting power/EMF constraints that are considered here vary slightly in the way the constraint is expressed, but also, and this is the more significant aspect, in the way in which the constraint is enforced. These five approaches are; Carrier-Sense Multiple Access (CSMA) method, Orthogonal Frequency-Division Multiple Access (OFDMA), EMF limited, SS-OFDM, and mutually interfering. In Chapter 6, cross-subchannel noise in OFDMA is modelled, which shows that nearby systems interfere with each other to a greater degree than might be expected. Conclusions are presented in Chapter 7

    New Approaches Using Cognitive Radio in Green Networking

    Get PDF
    The green networks are energy-efficient network architectures and we consider them as the basis of the wireless communication optimizing energy usage. Indeed, future communication technologies are moving in this direction, meaning that they will be less energy-intensive and, in some cases, even energy self-sufficient. Specifically, cognitive radio (CR) networks, cooperative relay networks, and non-orthogonal multiple access (NOMA) techniques have been considered as effective means to facilitate energy harvesting (EH) and a power spectrum allocation for the minimization of total transmit power, hence, making the wireless communication greener. The dissertation consists of three research sections corresponding to the aims. The first aim deals with an radio frequency (RF) wireless energy transfer model for D2D systems. In order to harvest more energy, a multiple-antenna base station and a power beacon are adopted for the D2D transmission network. We derive expressions outage probability in closed-forms. Further, independent simulations are used to validate the exactness of the theoretical expressions. In the second aim, new cooperative system models are proposed and studied. To reach the second aim, the secondary source acts as a relay and employs Amplify and Forward (AF) mode to serve distant NOMA users under a given interference constraint. To provide a detailed examination of the system performance metrics, we derived closed-form formulas for the outage probability and average throughput of the multi-users in the presence of interference constraints. In the last aim of the dissertation, we designed a new system model for a hybrid satellite-terrestrial cognitive network (HSTCN) relying on NOMA interconnecting a satellite and multiple terrestrial nodes. Reliability and security of transmission were studied to minimize the total transmit power. To reach the third aim, we examined the following performance factors: outage probability, hardware impairment, intercept probability, and average throughput. The novel closed-forms expressions of these performance factors are derived. The last but not at least, we simulated the new HSTCN system model. The achieved results figured that the new proposed approaches make it possible to take into account service quality requirements and are applicable in future green networking.Zelené sítě jsou energeticky efektivní síťové architektury a považujeme je za základ bezdrátové komunikace optimalizující spotřebu energie. Tímto směrem se ubírají budoucí komunikační technologie, což znamená, že budou méně energeticky náročné a v některých případech dokonce energeticky soběstačné. Kognitivní rádiové (CR) sítě, kooperativní relay sítě a neortogonální vícenásobné přístupové (NOMA) techniky jsou považovány za účinný prostředek k usnadnění získávání energie (EH) a přidělování výkonového spektra pro minimalizaci celkového vysílacího výkonu, díky čemuž je bezdrátová komunikace zelenější. Disertační práce se skládá ze tří výzkumných částí odpovídajících cílům. První cíl se zabývá modelem bezdrátového přenosu radiofrekvenční (RF) energie pro systémy D2D. Aby bylo možné získat více energie, jsou pro přenosovou D2D síť použity základnové stanice s více anténami a napájecím radiomajákem. Pro navržený model jsou odvozeny pravděpodobnosti výpadků, kdy tyto výrazy jsou v uzavřené formě. Dále jsou k ověření platnosti získaných teoretických výrazů použity nezávislé simulace. Ve druhém cíli jsou navrženy a zkoumány nové modely kooperativního systému. Aby bylo dosaženo druhého cíle, sekundární zdroj funguje jako relay uzel a využívá režim AF (Amplify and Forward), který slouží vzdáleným NOMA uživatelům za specifických interferenčních podmínek. Abychom poskytli podrobné zhodnocení výkonnostních metrik systému, odvodili jsme vztahy v uzavřené formě pro pravděpodobnost výpadků a průměrnou propustnost více uživatelů za přítomnosti interferenčních omezení. V posledním cíli disertační práce jsme navrhli nový systémový model pro hybridní satelitně-terestrickou kognitivní síť (HSTCN) založenou na neortogonálním vícenásobném přístupu (NOMA) propojující satelit a více terestrických uzlů. Zkoumána byla spolehlivost a zabezpečení přenosu s důrazem na minimalizaci celkového vysílacího výkonu. Pro dosažení třetího cíle jsme zkoumali následující výkonnostní faktory: pravděpodobnost výpadku, poškození hardwaru, pravděpodobnost zachycení a průměrnou propustnost. Pro tyto výkonnostní faktory jsou odvozeny v uzavřených formách nové výrazy. V neposlední řadě jsme rovněž simulovali nový systémový HSTCN model. Dosažené výsledky potvrdily, že nově navržené přístupy umožňují zohledňovat požadavky na kvalitu služeb a jsou použitelné v budoucích zelených sítích.440 - Katedra telekomunikační technikyvyhově
    corecore