3,533 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Sub 1GHz M2M communications standardization: The advancement in white space utilization for enhancing the energy efficiency

    Get PDF
    Energy efficiency of machine to machine (M2M) communications terminals is one of the major design goals of M2M networks, resulting from anticipated over 50 billion M2M communications devices to be deployed into the networks by 2020 [1]. The stakeholders in the M2M communications have observed that it will be environmental and economic catastrophic to deploy M2M communications devices without solving the energy inefficiencies associated with wireless devices that are expected to be used for M2M communications. In view of the aforementioned energy challenge, sub 1GHz spectra have provided enormous opportunities that can be energy efficient, cost effective and coverage efficiency which can be utilized for M2M communications. This work will evaluate the energy efficiency benefits of optimized Sub 1GHz spectra for M2M communications

    Maximum Average Service Rate and Optimal Queue Scheduling of Delay-Constrained Hybrid Cognitive Radio in Nakagami Fading Channels

    No full text
    As a promising technique to improve achievable bandwidth efficiency, cognitive radio (CR) has attracted substantial research attention from both the academic and industrial communities. To improve the performance attained by the secondary user (SU), a novel hybrid CR system is proposed, which combines the conventional interweave and underlay paradigms to enhance the chance of the SU to access the spectrum. Queuing theory is invoked in this paper to analyze the impact of the primary user’s maximum tolerable delay on the performance of the SU. Multiple queues are assumed for the SU, which is engaged in video communication. Apart from the Poisson traffic generation,we also model the classic Nakagami-m fading channel as a Poisson service process by utilizing the outage probability in the presence of cochannel interference. We optimize both the hybrid interweave/underlay procedure to maximize the average service rate μ_S,max of the SU, as well as the queue’s scheduling scheme, for the sake of minimizing the overall average delay (OAD). As a result, the OAD of the SU is reduced by up to 27% and 20%, compared with the proportion and round-robin schemes, respectively

    Reliable and Low-Latency Fronthaul for Tactile Internet Applications

    Get PDF
    With the emergence of Cloud-RAN as one of the dominant architectural solutions for next-generation mobile networks, the reliability and latency on the fronthaul (FH) segment become critical performance metrics for applications such as the Tactile Internet. Ensuring FH performance is further complicated by the switch from point-to-point dedicated FH links to packet-based multi-hop FH networks. This change is largely justified by the fact that packet-based fronthauling allows the deployment of FH networks on the existing Ethernet infrastructure. This paper proposes to improve reliability and latency of packet-based fronthauling by means of multi-path diversity and erasure coding of the MAC frames transported by the FH network. Under a probabilistic model that assumes a single service, the average latency required to obtain reliable FH transport and the reliability-latency trade-off are first investigated. The analytical results are then validated and complemented by a numerical study that accounts for the coexistence of enhanced Mobile BroadBand (eMBB) and Ultra-Reliable Low-Latency (URLLC) services in 5G networks by comparing orthogonal and non-orthogonal sharing of FH resources.Comment: 11pages, 13 figures, 3 bio photo
    • …
    corecore