127 research outputs found

    Secrecy Outage Analysis of <i>k</i>-th Best Link in Random Wireless Networks

    Get PDF

    Practical aspects of physical and MAC layer security in visible light communication systems

    Get PDF
    Abstract— Visible light communication (VLC) has been recently proposed as an alternative standard to radio-based wireless networks. Originally developed as a physical media for PANs (Personal area Networks) it evolved into universal WLAN technology with a capability to transport internet suite of network and application level protocols. Because of its physical characteristics, and in line with the slogan "what you see is what you send", VLC is considered a secure communication method. In this work we focus on security aspects of VLC communication, starting from basic physical characteristics of the communication channel. We analyze the risks of signal jamming, data snooping and data modification. We also discuss MAC-level security mechanisms as defined in the IEEE 802.15.7 standard. This paper is an extension of work originally reported in Proceedings of the 13th IFAC and IEEE Conference on Programmable Devices and Embedded Systems — PDES 2015

    Intrinsic Secrecy in Inhomogeneous Stochastic Networks

    Get PDF
    Network secrecy is vital for a variety of wireless applications and can be accomplished by exploiting network interference. Recently, interference engineering strategies (IESs) have been developed to harness network interference, depending on the wireless environment (node distribution, transmission policy, and channel conditions). Typically, the node spatial distribution has been modeled according to a homogeneous Poisson point process for mathematical tractability. However, such a model can be inadequate for inhomogeneous (e.g., sensor and vehicular) networks. This paper develops a framework for the design and analysis of inhomogeneous wireless networks with intrinsic secrecy. Based on the characterization of the network interference and received signal-to-interference ratio for different receiver selection strategies. Local and global secrecy metrics are introduced for characterizing the level of intrinsic secrecy in inhomogeneous wireless networks from a link and a network perspective. The benefits of IESs are quantified by simulations in various scenarios, thus corroborating the analysis. Results show that IESs can elevate the network secrecy significantly

    Exploiting Randomly-located Blockages for Large-Scale Deployment of Intelligent Surfaces

    Get PDF
    One of the promising technologies for the next generation wireless networks is the reconfigurable intelligent surfaces (RISs). This technology provides planar surfaces the capability to manipulate the reflected waves of impinging signals, which leads to a more controllable wireless environment. One potential use case of such technology is providing indirect line-of-sight (LoS) links between mobile users and base stations (BSs) which do not have direct LoS channels. Objects that act as blockages for the communication links, such as buildings or trees, can be equipped with RISs to enhance the coverage probability of the cellular network through providing extra indirect LoS-links. In this paper, we use tools from stochastic geometry to study the effect of large-scale deployment of RISs on the performance of cellular networks. In particular, we model the blockages using the line Boolean model. For this setup, we study how equipping a subset of the blockages with RISs will enhance the performance of the cellular network. We first derive the ratio of the blind-spots to the total area. Next, we derive the probability that a typical mobile user associates with a BS using an RIS. Finally, we derive the probability distribution of the path-loss between the typical user and its associated BS. We draw multiple useful system-level insights from the proposed analysis. For instance, we show that deployment of RISs highly improves the coverage regions of the BSs. Furthermore, we show that to ensure that the ratio of blind-spots to the total area is below 10^5, the required density of RISs increases from just 6 RISs/km2 when the density of the blockages is 300 blockage/km^2 to 490 RISs/km^2 when the density of the blockages is 700 blockage/km^2.Comment: Accepted in IEEE Journal on Selected Areas in Communication

    Fine-grained performance analysis of massive MTC networks with scheduling and data aggregation

    Get PDF
    Abstract. The Internet of Things (IoT) represents a substantial shift within wireless communication and constitutes a relevant topic of social, economic, and overall technical impact. It refers to resource-constrained devices communicating without or with low human intervention. However, communication among machines imposes several challenges compared to traditional human type communication (HTC). Moreover, as the number of devices increases exponentially, different network management techniques and technologies are needed. Data aggregation is an efficient approach to handle the congestion introduced by a massive number of machine type devices (MTDs). The aggregators not only collect data but also implement scheduling mechanisms to cope with scarce network resources. This thesis provides an overview of the most common IoT applications and the network technologies to support them. We describe the most important challenges in machine type communication (MTC). We use a stochastic geometry (SG) tool known as the meta distribution (MD) of the signal-to-interference ratio (SIR), which is the distribution of the conditional SIR distribution given the wireless nodes’ locations, to provide a fine-grained description of the per-link reliability. Specifically, we analyze the performance of two scheduling methods for data aggregation of MTC: random resource scheduling (RRS) and channel-aware resource scheduling (CRS). The results show the fraction of users in the network that achieves a target reliability, which is an important aspect to consider when designing wireless systems with stringent service requirements. Finally, the impact on the fraction of MTDs that communicate with a target reliability when increasing the aggregators density is investigated

    Cooperative Network Synchronization: Asymptotic Analysis

    Get PDF
    Accurate clock synchronization is required for collaborative operations among nodes across wireless networks. Compared with traditional layer-by-layer methods, cooperative network synchronization techniques lead to significant improvement in performance, efficiency, and robustness. This paper develops a framework for the performance analysis of cooperative network synchronization. We introduce the concepts of cooperative dilution intensity (CDI) and relative CDI to characterize the interaction between agents, which can be interpreted as properties of a random walk over the network. Our approach enables us to derive closed-form asymptotic expressions of performance limits, relating them to the quality of observations as well as the network topology

    VOICE OVER IP NETWORKS: QUALITY OF SERVICE, PRICING AND SECURITY

    Get PDF
    The growth of the Internet over the past decade together with the promise of lower costs to the customer has led to the rapid emergence of Voice over Internet Protocol (VoIP). As a real-time application in large scale packet switched networks, VoIP networks face many challenges such as availability, voice quality and network security. This dissertation addresses three important issues in VoIP networks: Quality of Service, pricing and security.In addressing Quality of Service (QoS), this dissertation introduces the notion of delay not exceeding an upper limit, termed the bounded delay (rather than the average delay), to measure the Quality of Service in VoIP networks. Queuing models are introduced to measure performance in terms of bounded delays. Closed form solutions relating the impact of bounding delays on throughput of VoIP traffic are provided. Traffic that exceeds the delay threshold is treated as lost throughput. The results addressed can be used in scaling resources in a VoIP network for different thresholds of acceptable delays. Both single and multiple switching points are addressed. The same notion and analysis are also applied on jitter, another important indicator of the VoIP QoSThis dissertation also develops a pricing model based on the Quality of Service provided in VoIP networks. It presents the impact of quality of VoIP service demanded by the customer on the transmission resources required by the network using an analytical approach. The price to be paid by the customer is based on the throughput meeting this criterion and the network transmission resources required. In particular, the impact of Quality of Service presented can be used in the design of VoIP networks in a way that would provide fairness to the user in terms of quality of service and price while optimizing the resources of the network at the same time.This dissertation also extends and applies the delay throughput analysis developed for VoIP networks in assessing the impact of risks constituted by a number of transportation channels, where the risk associated with each channel can be quantified by a known distribution. For VoIP security, this dissertation mainly focuses on the signaling authentication. It presents a networking solution that incorporates network-based authentication as an inherent feature. The authentication feature that we propose introduces a range of flexibilities not available in the PSTN. Since most calls will likely terminate on the network of another service provider, we also present a mechanism using which networks can mutually authenticate each other to afford the possibility of authentication across networks. Finally, this dissertation explores areas for future research that can be built on the foundation of research presented
    • …
    corecore