416 research outputs found
A Tutorial on Extremely Large-Scale MIMO for 6G: Fundamentals, Signal Processing, and Applications
Extremely large-scale multiple-input-multiple-output (XL-MIMO), which offers
vast spatial degrees of freedom, has emerged as a potentially pivotal enabling
technology for the sixth generation (6G) of wireless mobile networks. With its
growing significance, both opportunities and challenges are concurrently
manifesting. This paper presents a comprehensive survey of research on XL-MIMO
wireless systems. In particular, we introduce four XL-MIMO hardware
architectures: uniform linear array (ULA)-based XL-MIMO, uniform planar array
(UPA)-based XL-MIMO utilizing either patch antennas or point antennas, and
continuous aperture (CAP)-based XL-MIMO. We comprehensively analyze and discuss
their characteristics and interrelationships. Following this, we examine exact
and approximate near-field channel models for XL-MIMO. Given the distinct
electromagnetic properties of near-field communications, we present a range of
channel models to demonstrate the benefits of XL-MIMO. We further motivate and
discuss low-complexity signal processing schemes to promote the practical
implementation of XL-MIMO. Furthermore, we explore the interplay between
XL-MIMO and other emergent 6G technologies. Finally, we outline several
compelling research directions for future XL-MIMO wireless communication
systems.Comment: 38 pages, 10 figure
Combining SOA and BPM Technologies for Cross-System Process Automation
This paper summarizes the results of an industry case study that introduced a cross-system business process automation solution based on a combination of SOA and BPM standard technologies (i.e., BPMN, BPEL, WSDL). Besides discussing major weaknesses of the existing, custom-built, solution and comparing them against experiences with the developed prototype, the paper presents a course of action for transforming the current solution into the proposed solution. This includes a general approach, consisting of four distinct steps, as well as specific action items that are to be performed for every step. The discussion also covers language and tool support and challenges arising from the transformation
Information Leakage Attacks and Countermeasures
The scientific community has been consistently working on the pervasive problem of information leakage, uncovering numerous attack vectors, and proposing various countermeasures. Despite these efforts, leakage incidents remain prevalent, as the complexity of systems and protocols increases, and sophisticated modeling methods become more accessible to adversaries. This work studies how information leakages manifest in and impact interconnected systems and their users. We first focus on online communications and investigate leakages in the Transport Layer Security protocol (TLS). Using modern machine learning models, we show that an eavesdropping adversary can efficiently exploit meta-information (e.g., packet size) not protected by the TLS’ encryption to launch fingerprinting attacks at an unprecedented scale even under non-optimal conditions. We then turn our attention to ultrasonic communications, and discuss their security shortcomings and how adversaries could exploit them to compromise anonymity network users (even though they aim to offer a greater level of privacy compared to TLS). Following up on these, we delve into physical layer leakages that concern a wide array of (networked) systems such as servers, embedded nodes, Tor relays, and hardware cryptocurrency wallets. We revisit location-based side-channel attacks and develop an exploitation neural network. Our model demonstrates the capabilities of a modern adversary but also presents an inexpensive tool to be used by auditors for detecting such leakages early on during the development cycle. Subsequently, we investigate techniques that further minimize the impact of leakages found in production components. Our proposed system design distributes both the custody of secrets and the cryptographic operation execution across several components, thus making the exploitation of leaks difficult
Air Force Institute of Technology Research Report 2003
This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, and Engineering Physics
- …