3,958 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Data-driven design of intelligent wireless networks: an overview and tutorial
Data science or "data-driven research" is a research approach that uses real-life data to gain insight about the behavior of systems. It enables the analysis of small, simple as well as large and more complex systems in order to assess whether they function according to the intended design and as seen in simulation. Data science approaches have been successfully applied to analyze networked interactions in several research areas such as large-scale social networks, advanced business and healthcare processes. Wireless networks can exhibit unpredictable interactions between algorithms from multiple protocol layers, interactions between multiple devices, and hardware specific influences. These interactions can lead to a difference between real-world functioning and design time functioning. Data science methods can help to detect the actual behavior and possibly help to correct it. Data science is increasingly used in wireless research. To support data-driven research in wireless networks, this paper illustrates the step-by-step methodology that has to be applied to extract knowledge from raw data traces. To this end, the paper (i) clarifies when, why and how to use data science in wireless network research; (ii) provides a generic framework for applying data science in wireless networks; (iii) gives an overview of existing research papers that utilized data science approaches in wireless networks; (iv) illustrates the overall knowledge discovery process through an extensive example in which device types are identified based on their traffic patterns; (v) provides the reader the necessary datasets and scripts to go through the tutorial steps themselves
Adaptive Modulation and Coding and Cooperative ARQ in a Cognitive Radio System
In this paper, a joint cross-layer design of adaptive modulation and coding
(AMC) and cooperative automatic repeat request (C-ARQ) scheme is proposed for a
secondary user in a shared-spectrum environment. First, based on the
statistical descriptions of the channel, closed-form expressions of the average
spectral efficiency (SE) and the average packet loss rate (PLR) are presented.
Then, the cross-layer scheme is designed, with the aim of maximizing the
average SE while maintaining the average PLR under a prescribed level. An
optimization problem is formed, and a sub-optimal solution is found: the target
packet error rates (PER) for the secondary system channels are obtained and the
corresponding sub-optimal AMC rate adaptation policy is derived based on the
target PERs. Finally, the average SE and the average PLR performance of the
proposed scheme are presented
A Study of Cross Layer Design compare with Layer Design for MANET
Mobile Ad – hoc networks (MANET) are becoming increasingly popular in wireless technology, especially for providing services in disaster area. Mobile users are looking forward to new technologies that allow them to communicate anytime, anywhere, and using any communication device. Mobile ad – hoc networks suffer from several performance limitations, especially related to excessive burden deriving from the layering approach for the TCP / IP protocol stack design. In fact, TCP / IP protocol stack originally designed for wired networks and it is not suitable for wireless and mobile ad hoc networks. In this paper, it focuses on cross layer network design which is especially for wireless and mobile ad hoc networks. The main objective is to how cross layer differ from layered design, cross layer design approaches, challenges of cross layer design and implementation of cross layer design based MANET. And also this article brief the readers an overview of cross layer concept while discussing different cross layer proposals given by researchers
- …