2,046 research outputs found

    Physical Layer Service Integration in 5G: Potentials and Challenges

    Full text link
    High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can establish perfect security using only the characteristics of wireless medium. Nonetheless, to further increase the spectral efficiency, an emerging concept, termed physical-layer service integration (PHY-SI), has been recognized as an effective means. Its basic idea is to combine multiple coexisting services, i.e., multicast/broadcast service and confidential service, into one integral service for one-time transmission at the transmitter side. This article first provides a tutorial on typical PHY-SI models. Furthermore, we propose some state-of-the-art solutions to improve the overall performance of PHY-SI in certain important communication scenarios. In particular, we highlight the extension of several concepts borrowed from conventional single-service communications, such as artificial noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These techniques are shown to be effective in the design of reliable and robust PHY-SI schemes. Finally, several potential research directions are identified for future work.Comment: 12 pages, 7 figure

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Etude et réalisation d'un système de communications par lumière visible (VLC/LiFi). Application au domaine automobile.

    Get PDF
    The scientific problematic of this PhD is centered on the usage of Visible LightCommunications (VLC) in automotive applications. By enabling wireless communication amongvehicles and also with the traffic infrastructure, the safety and efficiency of the transportation canbe substantially increased. Considering the numerous advantages of the VLC technologyencouraged the study of its appropriateness for the envisioned automotive applications, as analternative and/or a complement for the traditional radio frequency based communications.In order to conduct this research, a low-cost VLC system for automotive application wasdeveloped. The proposed system aims to ensure a highly robust communication between a LEDbasedVLC emitter and an on-vehicle VLC receiver. For the study of vehicle to vehicle (V2V)communication, the emitter was developed based on a vehicle backlight whereas for the study ofinfrastructure to vehicle (I2V) communication, the emitter was developed based on a traffic light.Considering the VLC receiver, a central problem in this area is the design of a suitable sensorable to enhance the conditioning of the signal and to avoid disturbances due to the environmentalconditions, issues that are addressed in the thesis. The performances of a cooperative drivingsystem integrating the two components were evaluated as well.The experimental validation of the VLC system was performed in various conditions andscenarios. The results confirmed the performances of the proposed system and demonstrated thatVLC can be a viable technology for the considered applications. Furthermore, the results areencouraging towards the continuations of the work in this domain.La problématique scientifique de cette thèse est centrée sur le développement decommunications par lumière visible (Visible Light Communications - VLC) dans lesapplications automobiles. En permettant la communication sans fil entre les véhicules, ou entreles véhicules et l’infrastructure routière, la sécurité et l'efficacité du transport peuvent êtreconsidérablement améliorées. Compte tenu des nombreux avantages de la technologie VLC,cette solution se présente comme une excellente alternative ou un complément pour lescommunications actuelles plutôt basées sur les technologies radio-fréquences traditionnelles.Pour réaliser ces travaux de recherche, un système VLC à faible coût pour applicationautomobile a été développé. Le système proposé vise à assurer une communication très robusteentre un émetteur VLC à base de LED et un récepteur VLC monté sur un véhicule. Pour l'étudedes communications véhicule à véhicule (V2V), l'émetteur a été développé sur la base d’un pharearrière rouge de voiture, tandis que pour l'étude des communications de l'infrastructure auvéhicule (I2V), l'émetteur a été développé sur la base d'un feu de circulation. Considérant lerécepteur VLC, le problème principal réside autour d’un capteur approprié, en mesured'améliorer le conditionnement du signal et de limiter les perturbations dues des conditionsenvironnementales. Ces différents points sont abordés dans la thèse, d’un point de vue simulationmais également réalisation du prototype.La validation expérimentale du système VLC a été réalisée dans différentes conditions etscénarii. Les résultats démontrent que la VLC peut être une technologie viable pour lesapplications envisagées

    A collaborative physical layer security scheme

    Get PDF
    High level of security is essential in wireless 5G communications. The last few years there has been an increase in research interest in the potential of the radio channel’s physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in 5G New Radio (NR). In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot subcarriers, typically essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the subcarriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper, does not have access to the information of the pilot subcarriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity and the outage probability. The proposed scheme is very simple and robust, strengthening security in multimedia applications

    A Tutorial on Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions

    Get PDF
    IEEE Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area

    Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions

    Get PDF
    Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area

    Waveform-Defined Security: A Low-Cost Framework for Secure Communications

    Get PDF
    Communication security could be enhanced at physical layer but at the cost of complex algorithms and redundant hardware, which would render traditional physical layer security (PLS) techniques unsuitable for use with resource-constrained communication systems. This work investigates a waveform-defined security (WDS) framework, which differs fundamentally from traditional PLS techniques used in today’s systems. The framework is not dependent on channel conditions such as signal power advantage and channel state information (CSI). Therefore, the framework is more reliable than channel dependent beamforming and artificial noise (AN) techniques. In addition, the framework is more than just increasing the cost of eavesdropping. By intentionally tuning waveform patterns to weaken signal feature diversity and enhance feature similarity, eavesdroppers will not be able to identify correctly signal formats. The wrong classification of signal formats would result in subsequent detection errors even when an eavesdropper uses brute-force detection techniques. To get a robust WDS framework, three impact factors, namely training data feature, oversampling factor and bandwidth compression factor (BCF) offset, are investigated. An optimal WDS waveform pattern is obtained at the end after a joint study of the three factors. To ensure a valid eavesdropping model, artificial intelligence (AI) dependent signal classifiers are designed followed by optimal performance achievable signal detectors. To show the compatibility in available communication systems, the WDS framework is successfully integrated in IEEE 802.11a with nearly no adding computational complexity. Finally, a low-cost software-defined radio (SDR) experiment is designed to verify the feasibility of the WDS framework in resource-constrained communications

    Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Get PDF
    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered

    OCC Future and Obstacles under 5g Requirements

    Get PDF
    Telecommunications specifications of the fifth-generation (5 G) are being established to satisfy the rising demands of high-speed broadband networks (i.e., a few tens of Gigabits every second). The 5 G standard derives primarily from a rising number of subscribers and a multitude of various apps, commonly referred to as smart devices, communicating as part of Internet-of-Things (IoT) network For 5 G, a few possible developments such as millimeter waves, large multiple-input multiple-output, and small cell connectivity have appeared. While such technologies will meet 5 G specifications, attention is being given to a complementary potential wireless optical wireless communication (OWC) system. Clear light contact (VLC) as part of OWC. Among the most desirable solutions for 5 G networks and beyond are optical camera communications (OCCs). As part of future smart cities, VLC with huge frequency spectrum integrated with IoT that opens up a broad range of indoor and outdoor applications. This paper gives a description of the VLC-centric all-optical IoT and Potential implementations and issues centered on OCC under 5 G Requirement
    corecore