71 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Unmanned Aerial Vehicle (UAV)-Enabled Wireless Communications and Networking
The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the networkâs infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out
Physical layer security in 5G and beyond wireless networks enabling technologies
Information security has always been a critical concern for wireless communications due
to the broadcast nature of the open wireless medium. Commonly, security relies on cryptographic
encryption techniques at higher layers to ensure information security. However,
traditional cryptographic methods may be inadequate or inappropriate due to novel improvements
in the computational power of devices and optimization approaches. Therefore,
supplementary techniques are required to secure the transmission data. Physical layer
security (PLS) can improve the security of wireless communications by exploiting the characteristics
of wireless channels. Therefore, we study the PLS performance in the fifth generation
(5G) and beyond wireless networks enabling technologies in this thesis. The thesis
consists of three main parts.
In the first part, the PLS design and analysis for Device-to-Device (D2D) communication
is carried out for several scenarios. More specifically, in this part, we study the
underlay relay-aided D2D communications to improve the PLS of the cellular network. We
propose a cooperative scheme, whereby the D2D pair, in return for being allowed to share
the spectrum band of the cellular network, serves as a friendly jammer using full-duplex
(FD) and half-duplex (HD) transmissions and relay selection to degrade the wiretapped
signal at an eavesdropper. This part aims to show that spectrum sharing is advantageous
for both D2D communications and cellular networks concerning reliability and robustness
for the former and PLS enhancement for the latter. Closed-form expressions for the D2D
outage probability, the secrecy outage probability (SOP), and the probability of non-zero
secrecy capacity (PNSC) are derived to assess the proposed cooperative system model. The
results show enhancing the robustness and reliability of D2D communication while simultaneously
improving the cellular networkâs PLS by generating jamming signals towards the
eavesdropper. Furthermore, intensive Monte-Carlo simulations and numerical results are
provided to verify the efficiency of the proposed schemes and validate the derived expressionsâ
accuracy.
In the second part, we consider a secure underlay cognitive radio (CR) network in the
presence of a primary passive eavesdropper. Herein, a secondary multi-antenna full-duplex
destination node acts as a jammer to the primary eavesdropper to improve the PLS of the
primary network. In return for this favor, the energy-constrained secondary source gets
access to the primary network to transmit its information so long as the interference to the
latter is below a certain level. As revealed in our analysis and simulation, the reliability and
robustness of the CR network are improved, while the security level of the primary network
is enhanced concurrently.
Finally, we investigate the PLS design and analysis of reconfigurable intelligent surface
(RIS)-aided wireless communication systems in an inband underlay D2D communication
and the CR network. An RIS is used to adjust its reflecting elements to enhance the data
transmission while improving the PLS concurrently. Furthermore, we investigate the design
of active elements in RIS to overcome the double-fading problem introduced in the RISaided
link in a wireless communications system. Towards this end, each active RIS element
amplifies the reflected incident signal rather than only reflecting it as done in passive RIS
modules. As revealed in our analysis and simulation, the use of active elements leads to a
drastic reduction in the size of RIS to achieve a given performance level. Furthermore, a
practical design for active RIS is proposed
Optimal decision making in cognitive radio networks
Cognitive Radio Networks are being researched upon heavily in the various layers of the communication structure. The task of bringing software in the physical layer of communication system led to the concept of a smart radio being able to learn, adapt and make intelligent decisions in an autonomous manner by use of a Software Defined Radio. This work provides novel concepts in the areas of spectrum sensing, learning of ongoing transmissions through Reinforcment learning, use of a game theoretic concept such as Zero-sum game for resilience of authorized users in cases of jamming, and decision making of user transmissions through Markov Decision processes. This is highly applicable in dynamic radio environments such as emergency communications required during natural disasters, large scale events and in mobile wireless communications. Such applications come under the "Internet of Things"
Energy-efficient non-orthogonal multiple access for wireless communication system
Non-orthogonal multiple access (NOMA) has been recognized as a potential solution for enhancing the throughput of next-generation wireless communications. NOMA is a potential option for 5G networks due to its superiority in providing better spectrum efficiency (SE) compared to orthogonal multiple access (OMA). From the perspective of green communication, energy efficiency (EE) has become a new performance indicator. A systematic literature review is conducted to investigate the available energy efficient approach researchers have employed in NOMA. We identified 19 subcategories related to EE in NOMA out of 108 publications where 92 publications are from the IEEE website. To help the reader comprehend, a summary for each category is explained and elaborated in detail. From the literature review, it had been observed that NOMA can enhance the EE of wireless communication systems. At the end of this survey, future research particularly in machine learning algorithms such as reinforcement learning (RL) and deep reinforcement learning (DRL) for NOMA are also discussed
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
- âŠ