168,322 research outputs found
An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations
With the expansion of wireless sensor networks (WSNs), the need for securing
the data flow through these networks is increasing. These sensor networks allow
for easy-to-apply and flexible installations which have enabled them to be used
for numerous applications. Due to these properties, they face distinct
information security threats. Security of the data flowing through across
networks provides the researchers with an interesting and intriguing potential
for research. Design of these networks to ensure the protection of data faces
the constraints of limited power and processing resources. We provide the
basics of wireless sensor network security to help the researchers and
engineers in better understanding of this applications field. In this chapter,
we will provide the basics of information security with special emphasis on
WSNs. The chapter will also give an overview of the information security
requirements in these networks. Threats to the security of data in WSNs and
some of their counter measures are also presented
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks
Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be
promising in the fifth generation (5G) wireless networks. H-CRANs enable users
to enjoy diverse services with high energy efficiency, high spectral
efficiency, and low-cost operation, which are achieved by using cloud computing
and virtualization techniques. However, H-CRANs face many technical challenges
due to massive user connectivity, increasingly severe spectrum scarcity and
energy-constrained devices. These challenges may significantly decrease the
quality of service of users if not properly tackled. Non-orthogonal multiple
access (NOMA) schemes exploit non-orthogonal resources to provide services for
multiple users and are receiving increasing attention for their potential of
improving spectral and energy efficiency in 5G networks. In this article a
framework for energy-efficient NOMA H-CRANs is presented. The enabling
technologies for NOMA H-CRANs are surveyed. Challenges to implement these
technologies and open issues are discussed. This article also presents the
performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure
Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches
Peer-to-peer (P2P) energy trading has emerged as a next-generation energy
management mechanism for the smart grid that enables each prosumer of the
network to participate in energy trading with one another and the grid. This
poses a significant challenge in terms of modeling the decision-making process
of each participant with conflicting interest and motivating prosumers to
participate in energy trading and to cooperate, if necessary, for achieving
different energy management goals. Therefore, such decision-making process
needs to be built on solid mathematical and signal processing tools that can
ensure an efficient operation of the smart grid. This paper provides an
overview of the use of game theoretic approaches for P2P energy trading as a
feasible and effective means of energy management. As such, we discuss various
games and auction theoretic approaches by following a systematic classification
to provide information on the importance of game theory for smart energy
research. Then, the paper focuses on the P2P energy trading describing its key
features and giving an introduction to an existing P2P testbed. Further, the
paper zooms into the detail of some specific game and auction theoretic models
that have recently been used in P2P energy trading and discusses some important
finding of these schemes.Comment: 38 pages, single column, double spac
- …