57 research outputs found

    Doctor of Philosophy

    Get PDF
    dissertationCross layer system design represents a paradigm shift that breaks the traditional layer-boundaries in a network stack to enhance a wireless network in a number of di erent ways. Existing work has used the cross layer approach to optimize a wireless network in terms of packet scheduling, error correction, multimedia quality, power consumption, selection of modulation/coding and user experience, etc. We explore the use of new cross layer opportunities to achieve secrecy and e ciency of data transmission in wireless networks. In the rst part of this dissertation, we build secret key establishment methods for private communication between wireless devices using the spatio-temporal variations of symmetric-wireless channel measurements. We evaluate our methods on a variety of wireless devices, including laptops, telosB sensor nodes, and Android smartphones, with diverse wireless capabilities. We perform extensive measurements in real-world environments and show that our methods generate high entropy secret bits at a signi cantly faster rate in comparison to existing approaches. While the rst part of this dissertation focuses on achieving secrecy in wireless networks, the second part of this dissertation examines the use of special pulse shaping lters of the lterbank multicarrier (FBMC) physical layer in reliably transmitting data packets at a very high rate. We rst analyze the mutual interference power across subcarriers used by di erent transmitters. Next, to understand the impact of FBMC beyond the physical layer, we devise a distributed and adaptive medium access control protocol that coordinates data packet tra c among the di erent nodes in the network in a best e ort manner. Using extensive simulations, we show that FBMC consistently achieves an order-of-magnitude performance improvement over orthogonal frequency division multiplexing (OFDM) in several aspects, including packet transmission delays, channel access delays, and e ective data transmission rate available to each node in static indoor settings as well as in vehicular networks

    Intelligent OFDM telecommunication system. Part 1. Model of complex and quaternion systems

    Get PDF
    In this paper, we aim to investigate the superiority and practicability of many-parameter transforms (MPTs) from the physical layer security (PHY-LS) perspective. We propose novel Intelligent OFDM-telecommunication systems based on complex and quaternion MPTs. The new systems use inverse MPT (IMPT) for modulation at the transmitter and MPT for demodulation at the receiver. The purpose of employing the MPT is to improve: 1) the PHY-LS of wireless transmissions against to the wide-band anti-jamming and anti-eavesdropping communication; 2) the bit error rate (BER) performance with respect to the conventional OFDM-TCS; 3) the peak to average power ratio (PAPR). Each MPT depends on finite set of independent parameters (angles). When parameters are changed, many-parametric transform is also changed taking form of a set known (and unknown) orthogonal (or unitary) transforms. For this reason, the concrete values of parameters are specific "key" for entry into OFDM-TCS. Vector of parameters belong to multi-dimension torus space. Scanning of this space for find out the "key" (the concrete values of parameters) is hard problem. MPT has the form of the product of the Jacobi rotation matrixes and it describes a fast algorithm for MPT. The main advantage of using MPT in OFDM TCS is that it is a very flexible anti-eavesdropping and anti-jamming Intelligent OFDM TCS. To the best of our knowledge, this is the first work that utilizes the MPT theory to facilitate the PHY-LS through parameterization of unitary transforms. © 2019 IOP Publishing Ltd. All rights reserved

    A Vision and Framework for the High Altitude Platform Station (HAPS) Networks of the Future

    Full text link
    A High Altitude Platform Station (HAPS) is a network node that operates in the stratosphere at an of altitude around 20 km and is instrumental for providing communication services. Precipitated by technological innovations in the areas of autonomous avionics, array antennas, solar panel efficiency levels, and battery energy densities, and fueled by flourishing industry ecosystems, the HAPS has emerged as an indispensable component of next-generations of wireless networks. In this article, we provide a vision and framework for the HAPS networks of the future supported by a comprehensive and state-of-the-art literature review. We highlight the unrealized potential of HAPS systems and elaborate on their unique ability to serve metropolitan areas. The latest advancements and promising technologies in the HAPS energy and payload systems are discussed. The integration of the emerging Reconfigurable Smart Surface (RSS) technology in the communications payload of HAPS systems for providing a cost-effective deployment is proposed. A detailed overview of the radio resource management in HAPS systems is presented along with synergistic physical layer techniques, including Faster-Than-Nyquist (FTN) signaling. Numerous aspects of handoff management in HAPS systems are described. The notable contributions of Artificial Intelligence (AI) in HAPS, including machine learning in the design, topology management, handoff, and resource allocation aspects are emphasized. The extensive overview of the literature we provide is crucial for substantiating our vision that depicts the expected deployment opportunities and challenges in the next 10 years (next-generation networks), as well as in the subsequent 10 years (next-next-generation networks).Comment: To appear in IEEE Communications Surveys & Tutorial

    Intelligent OFDM telecommunication system. Part 1. Model of system

    Get PDF
    In this paper, we aim to investigate the superiority and practicability of many- parameter transforms (MPTs) from the physical layer security (PHY-LS) perspective. We propose novel Intelligent OFDM-telecommunication systems based on MPT. The new systems use Inverse MPT (IMPT) for modulation at the transmitter and Direct MPT (DMPT) for demodulation at the receiver. The purpose of employing the MPT is to improve: 1) the PHY- LS of wireless transmissions against to the wide-band anti-jamming and anti-eavesdropping communication; 2) the bit error rate (BER) performance with respect to the conventional OFDM-TCS; 3) the peak to average power ratio (PAPR). Each MPT depends on finite set of independent parameters (angles), which could be changed independently of one another. When parameters are changed, MPT is also changed taking form of a set known (and unknown) orthogonal (or unitary) transforms. For this reason, the concrete values of parameters are specific “key” for entry into OFDM-TCS. Vector of parameters belong to multi-dimension torus space. Scanning of this space for find out the “key” (the concrete values of parameters) is hard problem. MPT has the form of the product of the sparse Jacobi rotation matrixes and it describes a fast algorithm for MPT. The main advantage of using MPT in OFDM TCS is that it is a very flexible anti-eavesdropping and anti-jamming Intelligent OFDM TCS. To the best of our knowledge, this is the first work that utilizes the MPT theory to facilitate the PHY-LS through parameterization of unitary transforms.This work was supported by the RFBR grant 17-07-00886 and by the Ural State Forest Engineering’s Center of Excellence in «Quantum and Classical Information Technologies for Remote Sensing Systems

    Helping interferer physical layer security strategies for M-QAM and M-PSK systems

    Get PDF
    Physical layer security encompasses information theoretic approaches that could guarantee perfect secrecy in wireless communication systems. In this framework, helping interferer strategies rely on intentionally creating confusion at a potential eavesdropper by injecting a jamming signal. In cases where the information signal has a Gaussian probability density function (pdf) it has been demonstrated that the optimal jamming signal, under an overall power constraint, should also be Gaussian. However, in practical communication systems where data symbols are typically drawn from discrete uniform probability mass functions (pmf), commonly M-ary Quadrature Amplitude and M-ary Phase Shift Keying modulation schemes, the structure of the optimal jamming signal is still an open question. In the present work we aim at shedding light into this question. Our approach is based on formulating a secrecy capacity maximization problem by expressing the optimal arbitrary helping interferer pdf as a mixture of unknown Gaussians. The proposed approximation is well-suited for jamming signals of practical interest, i.e. Gaussian or M-QAM interferers and reveals that in certain scenarios it is advantageous to use jamming signals whose statistical structure resembles the data rather than the noise. © 2012 IEEE

    Enabling Technology in Optical Fiber Communications: From Device, System to Networking

    Get PDF
    This book explores the enabling technology in optical fiber communications. It focuses on the state-of-the-art advances from fundamental theories, devices, and subsystems to networking applications as well as future perspectives of optical fiber communications. The topics cover include integrated photonics, fiber optics, fiber and free-space optical communications, and optical networking

    Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid

    Get PDF
    The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency. To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario. In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices. To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches
    corecore