10 research outputs found

    Intelligent-Reflecting-Surface-Assisted UAV Communications for 6G Networks

    Full text link
    In 6th-Generation (6G) mobile networks, Intelligent Reflective Surfaces (IRSs) and Unmanned Aerial Vehicles (UAVs) have emerged as promising technologies to address the coverage difficulties and resource constraints faced by terrestrial networks. UAVs, with their mobility and low costs, offer diverse connectivity options for mobile users and a novel deployment paradigm for 6G networks. However, the limited battery capacity of UAVs, dynamic and unpredictable channel environments, and communication resource constraints result in poor performance of traditional UAV-based networks. IRSs can not only reconstruct the wireless environment in a unique way, but also achieve wireless network relay in a cost-effective manner. Hence, it receives significant attention as a promising solution to solve the above challenges. In this article, we conduct a comprehensive survey on IRS-assisted UAV communications for 6G networks. First, primary issues, key technologies, and application scenarios of IRS-assisted UAV communications for 6G networks are introduced. Then, we put forward specific solutions to the issues of IRS-assisted UAV communications. Finally, we discuss some open issues and future research directions to guide researchers in related fields

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    An Efficient Cross-Layer Authentication Scheme for Secure Communication in Vehicular Ad-hoc Networks

    Get PDF
    Intelligent transportation systems contribute to improved traffic safety by facilitating real-time communication between vehicles and infrastructures. In this context, message authentication is crucial to safeguard vehicular ad-hoc networks (VANETs) from malicious attacks. The current state-of-the-art for authentication in VANETs relies on conventional cryptographic primitives, introducing significant computation and communication overheads. This paper presents a cross-layer authentication scheme for vehicular communication, incorporating the short-term reciprocal features of the wireless channel for re-authenticating the corresponding terminal, reducing the overall complexity and computation and communication overheads. The proposed scheme comprises four steps: S1. Upper-layer authentication is used to determine the legitimacy of the corresponding terminal at the first time slot; S2. Upon the verification result, a location-dependent shared key with a minimum number of mismatched bits is extracted between both terminals; S3. Using the extracted key and under binary hypothesis testing, a PHY challenge-response algorithm for multicarrier communication is proposed for re-authentication; S4. In the case of false detection, the key extraction step (S2) is re-executed after adapting the quantisation levels at different conditions of channel non-reciprocity based on the feedback from the re-authentication step (S3). Simulation results show the effectiveness of the proposed scheme even at small signal-to-noise ratios. In addition, the immunity of the proposed scheme is proved against active and passive attacks, including signatures' unforgeability against adaptive chosen message attacks in the random oracle model. Finally, a comprehensive comparison in terms of computation and communication overheads demonstrates the superiority of the proposed scheme over its best rivals

    Unified Framework for Multicarrier and Multiple Access based on Generalized Frequency Division Multiplexing

    Get PDF
    The advancements in wireless communications are the key-enablers of new applications with stringent requirements in low-latency, ultra-reliability, high data rate, high mobility, and massive connectivity. Diverse types of devices, ranging from tiny sensors to vehicles, with different capabilities need to be connected under various channel conditions. Thus, modern connectivity and network techniques at all layers are essential to overcome these challenges. In particular, the physical layer (PHY) transmission is required to achieve certain link reliability, data rate, and latency. In modern digital communications systems, the transmission is performed by means of a digital signal processing module that derives analog hardware. The performance of the analog part is influenced by the quality of the hardware and the baseband signal denoted as waveform. In most of the modern systems such as fifth generation (5G) and WiFi, orthogonal frequency division multiplexing (OFDM) is adopted as a favorite waveform due to its low-complexity advantages in terms of signal processing. However, OFDM requires strict requirements on hardware quality. Many devices are equipped with simplified analog hardware to reduce the cost. In this case, OFDM does not work properly as a result of its high peak-to-average power ratio (PAPR) and sensitivity to synchronization errors. To tackle these problems, many waveforms design have been recently proposed in the literature. Some of these designs are modified versions of OFDM or based on conventional single subcarrier. Moreover, multicarrier frameworks, such as generalized frequency division multiplexing (GFDM), have been proposed to realize varieties of conventional waveforms. Furthermore, recent studies show the potential of using non-conventional waveforms for increasing the link reliability with affordable complexity. Based on that, flexible waveforms and transmission techniques are necessary to adapt the system for different hardware and channel constraints in order to fulfill the applications requirements while optimizing the resources. The objective of this thesis is to provide a holistic view of waveforms and the related multiple access (MA) techniques to enable efficient study and evaluation of different approaches. First, the wireless communications system is reviewed with specific focus on the impact of hardware impairments and the wireless channel on the waveform design. Then, generalized model of waveforms and MA are presented highlighting various special cases. Finally, this work introduces low-complexity architectures for hardware implementation of flexible waveforms. Integrating such designs with software-defined radio (SDR) contributes to the development of practical real-time flexible PHY.:1 Introduction 1.1 Baseband transmission model 1.2 History of multicarrier systems 1.3 The state-of-the-art waveforms 1.4 Prior works related to GFDM 1.5 Objective and contributions 2 Fundamentals of Wireless Communications 2.1 Wireless communications system 2.2 RF transceiver 2.2.1 Digital-analogue conversion 2.2.2 QAM modulation 2.2.3 Effective channel 2.2.4 Hardware impairments 2.3 Waveform aspects 2.3.1 Single-carrier waveform 2.3.2 Multicarrier waveform 2.3.3 MIMO-Waveforms 2.3.4 Waveform performance metrics 2.4 Wireless Channel 2.4.1 Line-of-sight propagation 2.4.2 Multi path and fading process 2.4.3 General baseband statistical channel model 2.4.4 MIMO channel 2.5 Summary 3 Generic Block-based Waveforms 3.1 Block-based waveform formulation 3.1.1 Variable-rate multicarrier 3.1.2 General block-based multicarrier model 3.2 Waveform processing techniques 3.2.1 Linear and circular filtering 3.2.2 Windowing 3.3 Structured representation 3.3.1 Modulator 3.3.2 Demodulator 3.3.3 MIMO Waveform processing 3.4 Detection 3.4.1 Maximum-likelihood detection 3.4.2 Linear detection 3.4.3 Iterative Detection 3.4.4 Numerical example and insights 3.5 Summary 4 Generic Multiple Access Schemes 57 4.1 Basic multiple access and multiplexing schemes 4.1.1 Infrastructure network system model 4.1.2 Duplex schemes 4.1.3 Common multiplexing and multiple access schemes 4.2 General multicarrier-based multiple access 4.2.1 Design with fixed set of pulses 4.2.2 Computational model 4.2.3 Asynchronous multiple access 4.3 Summary 5 Time-Frequency Analyses of Multicarrier 5.1 General time-frequency representation 5.1.1 Block representation 5.1.2 Relation to Zak transform 5.2 Time-frequency spreading 5.3 Time-frequency block in LTV channel 5.3.1 Subcarrier and subsymbol numerology 5.3.2 Processing based on the time-domain signal 5.3.3 Processing based on the frequency-domain signal 5.3.4 Unified signal model 5.4 summary 6 Generalized waveforms based on time-frequency shifts 6.1 General time-frequency shift 6.1.1 Time-frequency shift design 6.1.2 Relation between the shifted pulses 6.2 Time-frequency shift in Gabor frame 6.2.1 Conventional GFDM 6.3 GFDM modulation 6.3.1 Filter bank representation 6.3.2 Block representation 6.3.3 GFDM matrix structure 6.3.4 GFDM demodulator 6.3.5 Alternative interpretation of GFDM 6.3.6 Orthogonal modulation and GFDM spreading 6.4 Summary 7 Modulation Framework: Architectures and Applications 7.1 Modem architectures 7.1.1 General modulation matrix structure 7.1.2 Run-time flexibility 7.1.3 Generic GFDM-based architecture 7.1.4 Flexible parallel multiplications architecture 7.1.5 MIMO waveform architecture 7.2 Extended GFDM framework 7.2.1 Architectures complexity and flexibility analysis 7.2.2 Number of multiplications 7.2.3 Hardware analysis 7.3 Applications of the extended GFDM framework 7.3.1 Generalized FDMA 7.3.2 Enchantment of OFDM system 7.4 Summary 7 Conclusions and Future work

    Authentication enhancement in command and control networks: (a study in Vehicular Ad-Hoc Networks)

    Get PDF
    Intelligent transportation systems contribute to improved traffic safety by facilitating real time communication between vehicles. By using wireless channels for communication, vehicular networks are susceptible to a wide range of attacks, such as impersonation, modification, and replay. In this context, securing data exchange between intercommunicating terminals, e.g., vehicle-to-everything (V2X) communication, constitutes a technological challenge that needs to be addressed. Hence, message authentication is crucial to safeguard vehicular ad-hoc networks (VANETs) from malicious attacks. The current state-of-the-art for authentication in VANETs relies on conventional cryptographic primitives, introducing significant computation and communication overheads. In this challenging scenario, physical (PHY)-layer authentication has gained popularity, which involves leveraging the inherent characteristics of wireless channels and the hardware imperfections to discriminate between wireless devices. However, PHY-layerbased authentication cannot be an alternative to crypto-based methods as the initial legitimacy detection must be conducted using cryptographic methods to extract the communicating terminal secret features. Nevertheless, it can be a promising complementary solution for the reauthentication problem in VANETs, introducing what is known as “cross-layer authentication.” This thesis focuses on designing efficient cross-layer authentication schemes for VANETs, reducing the communication and computation overheads associated with transmitting and verifying a crypto-based signature for each transmission. The following provides an overview of the proposed methodologies employed in various contributions presented in this thesis. 1. The first cross-layer authentication scheme: A four-step process represents this approach: initial crypto-based authentication, shared key extraction, re-authentication via a PHY challenge-response algorithm, and adaptive adjustments based on channel conditions. Simulation results validate its efficacy, especially in low signal-to-noise ratio (SNR) scenarios while proving its resilience against active and passive attacks. 2. The second cross-layer authentication scheme: Leveraging the spatially and temporally correlated wireless channel features, this scheme extracts high entropy shared keys that can be used to create dynamic PHY-layer signatures for authentication. A 3-Dimensional (3D) scattering Doppler emulator is designed to investigate the scheme’s performance at different speeds of a moving vehicle and SNRs. Theoretical and hardware implementation analyses prove the scheme’s capability to support high detection probability for an acceptable false alarm value ≤ 0.1 at SNR ≥ 0 dB and speed ≤ 45 m/s. 3. The third proposal: Reconfigurable intelligent surfaces (RIS) integration for improved authentication: Focusing on enhancing PHY-layer re-authentication, this proposal explores integrating RIS technology to improve SNR directed at designated vehicles. Theoretical analysis and practical implementation of the proposed scheme are conducted using a 1-bit RIS, consisting of 64 × 64 reflective units. Experimental results show a significant improvement in the Pd, increasing from 0.82 to 0.96 at SNR = − 6 dB for multicarrier communications. 4. The fourth proposal: RIS-enhanced vehicular communication security: Tailored for challenging SNR in non-line-of-sight (NLoS) scenarios, this proposal optimises key extraction and defends against denial-of-service (DoS) attacks through selective signal strengthening. Hardware implementation studies prove its effectiveness, showcasing improved key extraction performance and resilience against potential threats. 5. The fifth cross-layer authentication scheme: Integrating PKI-based initial legitimacy detection and blockchain-based reconciliation techniques, this scheme ensures secure data exchange. Rigorous security analyses and performance evaluations using network simulators and computation metrics showcase its effectiveness, ensuring its resistance against common attacks and time efficiency in message verification. 6. The final proposal: Group key distribution: Employing smart contract-based blockchain technology alongside PKI-based authentication, this proposal distributes group session keys securely. Its lightweight symmetric key cryptography-based method maintains privacy in VANETs, validated via Ethereum’s main network (MainNet) and comprehensive computation and communication evaluations. The analysis shows that the proposed methods yield a noteworthy reduction, approximately ranging from 70% to 99%, in both computation and communication overheads, as compared to the conventional approaches. This reduction pertains to the verification and transmission of 1000 messages in total
    corecore