135 research outputs found

    Massive MIMO for Next Generation Wireless Systems

    Full text link
    Multi-user Multiple-Input Multiple-Output (MIMO) offers big advantages over conventional point-to-point MIMO: it works with cheap single-antenna terminals, a rich scattering environment is not required, and resource allocation is simplified because every active terminal utilizes all of the time-frequency bins. However, multi-user MIMO, as originally envisioned with roughly equal numbers of service-antennas and terminals and frequency division duplex operation, is not a scalable technology. Massive MIMO (also known as "Large-Scale Antenna Systems", "Very Large MIMO", "Hyper MIMO", "Full-Dimension MIMO" & "ARGOS") makes a clean break with current practice through the use of a large excess of service-antennas over active terminals and time division duplex operation. Extra antennas help by focusing energy into ever-smaller regions of space to bring huge improvements in throughput and radiated energy efficiency. Other benefits of massive MIMO include the extensive use of inexpensive low-power components, reduced latency, simplification of the media access control (MAC) layer, and robustness to intentional jamming. The anticipated throughput depend on the propagation environment providing asymptotically orthogonal channels to the terminals, but so far experiments have not disclosed any limitations in this regard. While massive MIMO renders many traditional research problems irrelevant, it uncovers entirely new problems that urgently need attention: the challenge of making many low-cost low-precision components that work effectively together, acquisition and synchronization for newly-joined terminals, the exploitation of extra degrees of freedom provided by the excess of service-antennas, reducing internal power consumption to achieve total energy efficiency reductions, and finding new deployment scenarios. This paper presents an overview of the massive MIMO concept and contemporary research.Comment: Final manuscript, to appear in IEEE Communications Magazin

    Channel Reciprocity Attacks Using Intelligent Surfaces with Non-Diagonal Phase Shifts

    Full text link
    While reconfigurable intelligent surface (RIS) technology has been shown to provide numerous benefits to wireless systems, in the hands of an adversary such technology can also be used to disrupt communication links. This paper describes and analyzes an RIS-based attack on multi-antenna wireless systems that operate in time-division duplex mode under the assumption of channel reciprocity. In particular, we show how an RIS with a non-diagonal (ND) phase shift matrix (referred to here as an ND-RIS) can be deployed to maliciously break the channel reciprocity and hence degrade the downlink network performance. Such an attack is entirely passive and difficult to detect and counteract. We provide a theoretical analysis of the degradation in the sum ergodic rate that results when an arbitrary malicious ND-RIS is deployed and design an approach based on the genetic algorithm for optimizing the ND structure under partial knowledge of the available channel state information. Our simulation results validate the analysis and demonstrate that an ND-RIS channel reciprocity attack can dramatically reduce the downlink throughput

    PHYSICAL LAYER SECURITY OF LARGE ANTENNA ARRAYS OPERATING IN THE NEAR-FIELD. NEAR-FIELD BEAMFOCUSING AND THE STUDY OF IT’S PHYSICAL LAYER SECURITY CAPABILITIES

    Get PDF
    This thesis explores the security aspects of near-field communications in the context of the upcoming 6th Generation wireless technology. With each decade witnessing significant advancements in cellular wireless communications, the demand for faster, more accessible, and secure networks continues to grow. Tra- ditional security approaches relying on higher-layer cryptography techniques may not be sufficient for the future massively connected world. Therefore, this research focuses on leveraging physical layer security techniques, specifically in the near-field regime, to enhance the confidentiality and privacy of wireless communications. The study begins with an examination of the state of the art, encompassing previous telecommunication generations, Multiple-Input Multiple-Output sys- tems, Multiple-Input Multiple-Output with Extremely Large Antenna Arrays, and an overview of physical layer security concepts. Subsequently, a compre- hensive analysis of the near-field channel modeling components is presented, exploring the unique propagation characteristics of electromagnetic waves within this region. The thesis then delves into the exploration of physical layer security at the near- field, employing the established channel model to calculate the secrecy rate in the downlink and achievable capacity in the uplink. Various scenarios involv- ing a malicious user in the communication link are considered, highlighting the inherent security capabilities of near-field communications. In conclusion, this research contributes to the advancement of secure com- munication technologies by providing insights into the physical layer security aspects of near-field communications in the context of 6th Generation. The findings show the potential of utilizing the propagation features of large an- tenna arrays such as the limited-depth beamforming to enhance security and privacy. The practical implications and potential applications of the research outcomes are also discussed.Esta tese explora os aspetos de segurança das comunicações de campo próximo no contexto da próxima tecnologia sem fios 6G. A cada década, testemunha- mos avanços significativos nas comunicações sem fio, a demanda por redes mais rápidas, acessíveis e seguras continua a crescer. Abordagens tradicionais de segurança que dependem de técnicas criptográficas em camadas superiores podem não ser suficientes para o futuro mundo altamente conectado. Portanto, esta pesquisa concentra-se nas técnicas de seguraça a nivél físico, especifica- mente no regime de campo próximo, para melhorar a confidencialidade e privacidade das comunicações sem fio. O estudo começa com uma análise do estado da arte, abrangendo gerações ante- riores de telecomunicações, sistemas Multiple Input Multiple Output (MIMO), MIMO com Extremely Large Antenna Arrays (ELAA)s, e uma visão geral dos conceitos de seguraça a nivél físico. Posteriormente, é apresentada uma análise abrangente dos componentes de modelagem do canal no campo próximo, explorando as características únicas de propagação de ondas eletromagnéticas nesta região. A tese, em seguida, aprofunda a exploração de seguraça a nivél físico no campo próximo, empregando o modelo de canal estabelecido para calcular a "Secrecy Rate"no "Downlink"e a capacidade máxima atingivel no "Uplink". Vários cenários envolvendo um utilizador malicioso na ligação de comunica- ção são considerados, destacando as capacidades inerentes de segurança das comunicações no campo próximo. Em conclusão, esta pesquisa contribui para o avanço das tecnologias de co- municação segura, fornecendo informações sobre os aspetos de segurança da camada física das comunicações no campo próximo no contexto de 6G. Os resultados mostram o potencial de utilizar as características de propagação de grandes matrizes de antenas, como o feixe de profundidade limitada, para melhorar a segurança e a privacidade. As implicações práticas e potenciais aplicações dos resultados da pesquisa também são discutidas

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Physical-Layer Secret Key Generation via CQI-Mapped Spatial Modulation in Multi-Hop Wiretap Ad-Hoc Networks

    Get PDF
    Providing security guarantee is a critical concern in the ad-hoc networks relying on multi-hop channels, since their flexible topology is vulnerable to security attacks. To enhance the security of a spatial modulation (SM) assisted wireless network, various SM mapping patterns are activated by random channel quality indicator (CQI) patterns over the legitimate link, as a physical-layer secret key. The SM signals are encrypted by random mapping patterns to prevent eavesdroppers from correctly demapping their detections. This secret key is developed for multi-hop wiretap ad-hoc networks, where eavesdroppers might monitor all the transmitting nodes of a legitimate link. We substantially characterise the multi-hop wiretap model with receiver diversity techniques adopted by eavesdroppers. The security performance of the conceived scheme is evaluated in the scenarios where eavesdroppers attempt to detect their received signals using maximal-ratio combining or maximum-gain selection. The achievable data rates of both legitimate and wiretapper links are formulated with the objective of quantifying the secrecy rates for both Gaussian-distributed and finite-alphabet inputs. Illustrative numerical results are provided for the metrics of ergodic secrecy rate and secrecy outage probability, which substantiate the compelling benefits of the physical-layer secret key generation via CQI-mapped SM
    corecore