2,046 research outputs found
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Etude et réalisation d'un système de communications par lumière visible (VLC/LiFi). Application au domaine automobile.
The scientific problematic of this PhD is centered on the usage of Visible LightCommunications (VLC) in automotive applications. By enabling wireless communication amongvehicles and also with the traffic infrastructure, the safety and efficiency of the transportation canbe substantially increased. Considering the numerous advantages of the VLC technologyencouraged the study of its appropriateness for the envisioned automotive applications, as analternative and/or a complement for the traditional radio frequency based communications.In order to conduct this research, a low-cost VLC system for automotive application wasdeveloped. The proposed system aims to ensure a highly robust communication between a LEDbasedVLC emitter and an on-vehicle VLC receiver. For the study of vehicle to vehicle (V2V)communication, the emitter was developed based on a vehicle backlight whereas for the study ofinfrastructure to vehicle (I2V) communication, the emitter was developed based on a traffic light.Considering the VLC receiver, a central problem in this area is the design of a suitable sensorable to enhance the conditioning of the signal and to avoid disturbances due to the environmentalconditions, issues that are addressed in the thesis. The performances of a cooperative drivingsystem integrating the two components were evaluated as well.The experimental validation of the VLC system was performed in various conditions andscenarios. The results confirmed the performances of the proposed system and demonstrated thatVLC can be a viable technology for the considered applications. Furthermore, the results areencouraging towards the continuations of the work in this domain.La problématique scientifique de cette thèse est centrée sur le développement decommunications par lumière visible (Visible Light Communications - VLC) dans lesapplications automobiles. En permettant la communication sans fil entre les véhicules, ou entreles véhicules et l’infrastructure routière, la sécurité et l'efficacité du transport peuvent êtreconsidérablement améliorées. Compte tenu des nombreux avantages de la technologie VLC,cette solution se présente comme une excellente alternative ou un complément pour lescommunications actuelles plutôt basées sur les technologies radio-fréquences traditionnelles.Pour réaliser ces travaux de recherche, un système VLC à faible coût pour applicationautomobile a été développé. Le système proposé vise à assurer une communication très robusteentre un émetteur VLC à base de LED et un récepteur VLC monté sur un véhicule. Pour l'étudedes communications véhicule à véhicule (V2V), l'émetteur a été développé sur la base d’un pharearrière rouge de voiture, tandis que pour l'étude des communications de l'infrastructure auvéhicule (I2V), l'émetteur a été développé sur la base d'un feu de circulation. Considérant lerécepteur VLC, le problème principal réside autour d’un capteur approprié, en mesured'améliorer le conditionnement du signal et de limiter les perturbations dues des conditionsenvironnementales. Ces différents points sont abordés dans la thèse, d’un point de vue simulationmais également réalisation du prototype.La validation expérimentale du système VLC a été réalisée dans différentes conditions etscénarii. Les résultats démontrent que la VLC peut être une technologie viable pour lesapplications envisagées
A collaborative physical layer security scheme
High level of security is essential in wireless 5G communications. The last few years there has been an increase in research interest in the potential of the radio channel’s physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in 5G New Radio (NR). In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot subcarriers, typically essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the subcarriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper, does not have access to the information of the pilot subcarriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity and the outage probability. The proposed scheme is very simple and robust, strengthening security in multimedia applications
A Tutorial on Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions
IEEE Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area
Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions
Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area
Waveform-Defined Security: A Low-Cost Framework for Secure Communications
Communication security could be enhanced at physical layer but at the cost of complex algorithms and redundant hardware, which would render traditional physical layer security (PLS) techniques unsuitable for use with resource-constrained communication systems. This work investigates a waveform-defined security (WDS) framework, which differs fundamentally from traditional PLS techniques used in today’s systems. The framework is not dependent on channel conditions such as signal power advantage and channel state information (CSI). Therefore, the framework is more reliable than channel dependent beamforming and artificial noise (AN) techniques. In addition, the framework is more than just increasing the cost of eavesdropping. By intentionally tuning waveform patterns to weaken signal feature diversity and enhance feature similarity, eavesdroppers will not be able to identify correctly signal formats. The wrong classification of signal formats would result in subsequent detection errors even when an eavesdropper uses brute-force detection techniques. To get a robust WDS framework, three impact factors, namely training data feature, oversampling factor and bandwidth compression factor (BCF) offset, are investigated. An optimal WDS waveform pattern is obtained at the end after a joint study of the three factors. To ensure a valid eavesdropping model, artificial intelligence (AI) dependent signal classifiers are designed followed by optimal performance achievable signal detectors. To show the compatibility in available communication systems, the WDS framework is successfully integrated in IEEE 802.11a with nearly no adding computational complexity. Finally, a low-cost software-defined radio (SDR) experiment is designed to verify the feasibility of the WDS framework in resource-constrained communications
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
The security of the Internet of Things (IoT) is receiving considerable
interest as the low power constraints and complexity features of many IoT
devices are limiting the use of conventional cryptographic techniques. This
article provides an overview of recent research efforts on alternative
approaches for securing IoT wireless communications at the physical layer,
specifically the key topics of key generation and physical layer encryption.
These schemes can be implemented and are lightweight, and thus offer practical
solutions for providing effective IoT wireless security. Future research to
make IoT-based physical layer security more robust and pervasive is also
covered
OCC Future and Obstacles under 5g Requirements
Telecommunications specifications of the fifth-generation (5 G) are being established to satisfy the rising demands of high-speed broadband networks (i.e., a few tens of Gigabits every second). The 5 G standard derives primarily from a rising number of subscribers and a multitude of various apps, commonly referred to as smart devices, communicating as part of Internet-of-Things (IoT) network For 5 G, a few possible developments such as millimeter waves, large multiple-input multiple-output, and small cell connectivity have appeared. While such technologies will meet 5 G specifications, attention is being given to a complementary potential wireless optical wireless communication (OWC) system. Clear light contact (VLC) as part of OWC. Among the most desirable solutions for 5 G networks and beyond are optical camera communications (OCCs). As part of future smart cities, VLC with huge frequency spectrum integrated with IoT that opens up a broad range of indoor and outdoor applications. This paper gives a description of the VLC-centric all-optical IoT and Potential implementations and issues centered on OCC under 5 G Requirement
- …