241 research outputs found
The Resilience of Massive MIMO PNC to Jamming Attacks in Vehicular Networks
In this article, we investigate the resilience of Massive MIMO Physical Layer Network Coding (PNC) to jamming attack in both sub-6 GHz and millimeter-Wave (mmWave) systems in vehicular networks. Massive MIMO generally is resilient to jamming attacks, and we investigate the impact that PNC has on this resilience, if combined with Massive MIMO. The combination of Massive MIMO and PNC has shown a significant improvement in the bit error rate (BER) in our previous investigation. The corresponding framework is analysed against a barraging attack from a jammer, where the jamming channel is not known to the base station (BS), and the jammer can use any number of transmit antennas. Over Rayleigh channel, our simulation results reveal that Massive MIMO PNC performs better in the lower signal-to-noise ratio (SNR) regions to jamming attacks and this is achieved at twice the spectral efficiency. A similar performance is observed over mmWave channel
Mitigating Smart Jammers in Multi-User MIMO
Wireless systems must be resilient to jamming attacks. Existing mitigation
methods based on multi-antenna processing require knowledge of the jammer's
transmit characteristics that may be difficult to acquire, especially for smart
jammers that evade mitigation by transmitting only at specific instants. We
propose a novel method to mitigate smart jamming attacks on the massive
multi-user multiple-input multiple-output (MU-MIMO) uplink which does not
require the jammer to be active at any specific instant. By formulating an
optimization problem that unifies jammer estimation and mitigation, channel
estimation, and data detection, we exploit that a jammer cannot change its
subspace within a coherence interval. Theoretical results for our problem
formulation show that its solution is guaranteed to recover the users' data
symbols under certain conditions. We develop two efficient iterative algorithms
for approximately solving the proposed problem formulation: MAED, a
parameter-free algorithm which uses forward-backward splitting with a box
symbol prior, and SO-MAED, which replaces the prior of MAED with soft-output
symbol estimates that exploit the discrete transmit constellation and which
uses deep unfolding to optimize algorithm parameters. We use simulations to
demonstrate that the proposed algorithms effectively mitigate a wide range of
smart jammers without a priori knowledge about the attack type.Comment: arXiv admin note: text overlap with arXiv:2201.0877
Reconfigurable Intelligent Surface for Physical Layer Security in 6G-IoT: Designs, Issues, and Advances
Sixth-generation (6G) networks pose substantial security risks because
confidential information is transmitted over wireless channels with a broadcast
nature, and various attack vectors emerge. Physical layer security (PLS)
exploits the dynamic characteristics of wireless environments to provide secure
communications, while reconfigurable intelligent surfaces (RISs) can facilitate
PLS by controlling wireless transmissions. With RIS-aided PLS, a lightweight
security solution can be designed for low-end Internet of Things (IoT) devices,
depending on the design scenario and communication objective. This article
discusses RIS-aided PLS designs for 6G-IoT networks against eavesdropping and
jamming attacks. The theoretical background and literature review of RIS-aided
PLS are discussed, and design solutions related to resource allocation,
beamforming, artificial noise, and cooperative communication are presented. We
provide simulation results to show the effectiveness of RIS in terms of PLS. In
addition, we examine the research issues and possible solutions for RIS
modeling, channel modeling and estimation, optimization, and machine learning.
Finally, we discuss recent advances, including STAR-RIS and malicious RIS.Comment: Accepted for IEEE Internet of Things Journa
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
A prospective look: key enabling technologies, applications and open research topics in 6G networks
The fifth generation (5G) mobile networks are envisaged to enable a plethora of breakthrough advancements in wireless technologies, providing support of a diverse set of services over a single platform. While the deployment of 5G systems is scaling up globally, it is time to look ahead for beyond 5G systems. This is mainly driven by the emerging societal trends, calling for fully automated systems and intelligent services supported by extended reality and haptics communications. To accommodate the stringent requirements of their prospective applications, which are data-driven and defined by extremely low-latency, ultra-reliable, fast and seamless wireless connectivity, research initiatives are currently focusing on a progressive roadmap towards the sixth generation (6G) networks, which are expected to bring transformative changes to this premise. In this article, we shed light on some of the major enabling technologies for 6G, which are expected to revolutionize the fundamental architectures of cellular networks and provide multiple homogeneous artificial intelligence-empowered services, including distributed communications, control, computing, sensing, and energy, from its core to its end nodes. In particular, the present paper aims to answer several 6G framework related questions: What are the driving forces for the development of 6G? How will the enabling technologies of 6G differ from those in 5G? What kind of applications and interactions will they support which would not be supported by 5G? We address these questions by presenting a comprehensive study of the 6G vision and outlining seven of its disruptive technologies, i.e., mmWave communications, terahertz communications, optical wireless communications, programmable metasurfaces, drone-based communications, backscatter communications and tactile internet, as well as their potential applications. Then, by leveraging the state-of-the-art literature surveyed for each technology, we discuss the associated requirements, key challenges, and open research problems. These discussions are thereafter used to open up the horizon for future research directions
A Prospective Look: Key Enabling Technologies, Applications and Open Research Topics in 6G Networks
The fifth generation (5G) mobile networks are envisaged to enable a plethora
of breakthrough advancements in wireless technologies, providing support of a
diverse set of services over a single platform. While the deployment of 5G
systems is scaling up globally, it is time to look ahead for beyond 5G systems.
This is driven by the emerging societal trends, calling for fully automated
systems and intelligent services supported by extended reality and haptics
communications. To accommodate the stringent requirements of their prospective
applications, which are data-driven and defined by extremely low-latency,
ultra-reliable, fast and seamless wireless connectivity, research initiatives
are currently focusing on a progressive roadmap towards the sixth generation
(6G) networks. In this article, we shed light on some of the major enabling
technologies for 6G, which are expected to revolutionize the fundamental
architectures of cellular networks and provide multiple homogeneous artificial
intelligence-empowered services, including distributed communications, control,
computing, sensing, and energy, from its core to its end nodes. Particularly,
this paper aims to answer several 6G framework related questions: What are the
driving forces for the development of 6G? How will the enabling technologies of
6G differ from those in 5G? What kind of applications and interactions will
they support which would not be supported by 5G? We address these questions by
presenting a profound study of the 6G vision and outlining five of its
disruptive technologies, i.e., terahertz communications, programmable
metasurfaces, drone-based communications, backscatter communications and
tactile internet, as well as their potential applications. Then, by leveraging
the state-of-the-art literature surveyed for each technology, we discuss their
requirements, key challenges, and open research problems
- …