485 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Timing and Carrier Synchronization in Wireless Communication Systems: A Survey and Classification of Research in the Last 5 Years

    Get PDF
    Timing and carrier synchronization is a fundamental requirement for any wireless communication system to work properly. Timing synchronization is the process by which a receiver node determines the correct instants of time at which to sample the incoming signal. Carrier synchronization is the process by which a receiver adapts the frequency and phase of its local carrier oscillator with those of the received signal. In this paper, we survey the literature over the last 5 years (2010–2014) and present a comprehensive literature review and classification of the recent research progress in achieving timing and carrier synchronization in single-input single-output (SISO), multiple-input multiple-output (MIMO), cooperative relaying, and multiuser/multicell interference networks. Considering both single-carrier and multi-carrier communication systems, we survey and categorize the timing and carrier synchronization techniques proposed for the different communication systems focusing on the system model assumptions for synchronization, the synchronization challenges, and the state-of-the-art synchronization solutions and their limitations. Finally, we envision some future research directions

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Blind Demodulation of Pass Band OFDMA Signals and Jamming Battle Damage Assessment Utilizing Link Adaptation

    Get PDF
    This research focuses on blind demodulation of a pass band OFDMA signal so that jamming effectiveness can be assessed; referred to in this research as BDA. The research extends, modifies and collates work within literature to perform a new method of blindly demodulating of a passband OFDMA signal, which exhibits properties of the 802.16 Wireless MAN OFDMA standard, and presents a novel method for performing BDA via observation of SC LA. Blind demodulation is achieved by estimating the carrier frequency, sampling rate, pulse shaping filter roll off factor, synchronization parameters and CFO. The blind demodulator\u27s performance in AWGN and a perfect channel is evaluated where it improves using a greater number OFDMA DL symbols and increased CP length. Performance in a channel with a single multi-path interferer is also evaluated where the blind demodulator\u27s performance is degraded. BDA is achieved via observing SC LA modulation behavior of the blindly demodulated signal between successive OFDMA DL sub frames in two scenarios. The first is where modulation signaling can be used to observe change of SC modulation. The second assumes modulation signaling is not available and the SC\u27s modulation must be classified. Classification of SC modulation is performed using sixth-order cumulants where performance increases with the number of OFDMA symbols. The SC modulation classi er is susceptible to the CFO caused by blind demodulation. In a perfect channel it is shown that SC modulation can be classified using a variety of OFDMA DL sub frame lengths in symbols. The SC modulation classifier experienced degraded performance in a multi-path channel and it is recommended that it is extended to perform channel equalization in future work

    Intelligent-Reflecting-Surface-Assisted UAV Communications for 6G Networks

    Full text link
    In 6th-Generation (6G) mobile networks, Intelligent Reflective Surfaces (IRSs) and Unmanned Aerial Vehicles (UAVs) have emerged as promising technologies to address the coverage difficulties and resource constraints faced by terrestrial networks. UAVs, with their mobility and low costs, offer diverse connectivity options for mobile users and a novel deployment paradigm for 6G networks. However, the limited battery capacity of UAVs, dynamic and unpredictable channel environments, and communication resource constraints result in poor performance of traditional UAV-based networks. IRSs can not only reconstruct the wireless environment in a unique way, but also achieve wireless network relay in a cost-effective manner. Hence, it receives significant attention as a promising solution to solve the above challenges. In this article, we conduct a comprehensive survey on IRS-assisted UAV communications for 6G networks. First, primary issues, key technologies, and application scenarios of IRS-assisted UAV communications for 6G networks are introduced. Then, we put forward specific solutions to the issues of IRS-assisted UAV communications. Finally, we discuss some open issues and future research directions to guide researchers in related fields

    IRS-aided UAV for Future Wireless Communications: A Survey and Research Opportunities

    Full text link
    Both unmanned aerial vehicles (UAVs) and intelligent reflecting surfaces (IRS) are gaining traction as transformative technologies for upcoming wireless networks. The IRS-aided UAV communication, which introduces IRSs into UAV communications, has emerged in an effort to improve the system performance while also overcoming UAV communication constraints and issues. The purpose of this paper is to provide a comprehensive overview of IRSassisted UAV communications. First, we provide five examples of how IRSs and UAVs can be combined to achieve unrivaled potential in difficult situations. The technological features of the most recent relevant researches on IRS-aided UAV communications from the perspective of the main performance criteria, i.e., energy efficiency, security, spectral efficiency, etc. Additionally, previous research studies on technology adoption as machine learning algorithms. Lastly, some promising research directions and open challenges for IRS-aided UAV communication are presented

    Joint Detection and Decoding of High-Order Modulation Schemes for CDMA and OFDM Wireless Communications

    Get PDF
    Wireless communications call for high data rate, power and bandwidth efficient transmissions. High-order modulation schemes are suitable candidates for this purpose as the potential to reduce the symbol period is often limited by the multipath-induced intersymbol interference. In order to reduce the power consumption, and at the same time, to estimate time-variant wireless channels, we propose low-complexity, joint detection and decoding schemes for high-order modulation signals in this dissertation. We start with the iterative demodulation and decoding of high-order CPM signals for mobile communications. A low complexity, pilot symbol-assisted coherent modulation scheme is proposed that can significantly improve the bit error rate performance by efficiently exploiting the inherent memory structure of the CPM modulation. A noncoherent scheme based on multiple symbol differential detection is also proposed and the performances of the two schemes are simulated and compared. Second, two iterative demodulation and decoding schemes are proposed for quadrature amplitude modulated signals in flat fading channels. Both of them make use of the iterative channel estimation based on the data signal reconstructed from decoder output. The difference is that one of them has a threshold controller that only allows the data reconstructed with high reliability values to be used for iterative channel estimation, while the other one directly uses all reconstructed data. As the second scheme has much lower complexity with a performance similar to the best of the first one, we further apply it to the space-time coded CDMA Rake receiver in frequency-selective multipath channels. We will compare it to the pilot-aided demodulation scheme that uses a dedicated pilot signal for channel estimation. In the third part of the dissertation, we design anti-jamming multicarrier communication systems. Two types of jamming signals are considered - the partial-band tone jamming and the partial-time pulse jamming. We propose various iterative schemes to detect, estimate, and cancel the jamming signal in both AWGN and fading channels. Simulation results demonstrate that the proposed systems can provide reliable communications over a wide range of jamming-to-signal power ratios. Last, we study the problem of maximizing the throughput of a cellular multicarrier communication network with transmit or receive diversity. The total throughput of the network is maximized subject to power constraints on each mobile. We first extend the distributed water-pouring power control algorithm from single transmit and receive antenna to multiple transmit and receive antennas. Both equal power diversity and selective diversity are considered. We also propose a centralized power control algorithm based on the active set strategy and the gradient projection method. The performances of the two algorithms are assessed with simulation and compared with the equal power allocation algorithm

    Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver

    Get PDF
    This work proposes a new channel training (CT) scheme for a full-duplex receiver to enhance physical layer security. Equipped with NB full-duplex antennas, the receiver simultaneously receives the information signal and transmits artificial noise (AN). In order to reduce the non-cancellable self-interference due to the transmitted AN, the receiver has to estimate the self-interference channel prior to the data communication phase. In the proposed CT scheme, the receiver transmits a limited number of pilot symbols which are known only to itself. Such a secret CT scheme prevents an eavesdropper from estimating the jamming channel from the receiver to the eavesdropper, hence effectively degrading the eavesdropping capability. We analytically examine the connection probability (i.e., the probability of the data being successfully decoded by the receiver) of the legitimate channel and the secrecy outage probability due to eavesdropping for the proposed secret CT scheme. Based on our analysis, the optimal power allocation between CT and data/AN transmission at the legitimate transmitter/receiver is determined. Our examination shows that the newly proposed secret CT scheme significantly outperforms the non-secret CT scheme that uses publicly known pilots when the number of antennas at the eavesdropper is larger than one.ARC Discovery Projects Grant DP15010390

    Signal Processing and Learning for Next Generation Multiple Access in 6G

    Full text link
    Wireless communication systems to date primarily rely on the orthogonality of resources to facilitate the design and implementation, from user access to data transmission. Emerging applications and scenarios in the sixth generation (6G) wireless systems will require massive connectivity and transmission of a deluge of data, which calls for more flexibility in the design concept that goes beyond orthogonality. Furthermore, recent advances in signal processing and learning have attracted considerable attention, as they provide promising approaches to various complex and previously intractable problems of signal processing in many fields. This article provides an overview of research efforts to date in the field of signal processing and learning for next-generation multiple access, with an emphasis on massive random access and non-orthogonal multiple access. The promising interplay with new technologies and the challenges in learning-based NGMA are discussed
    corecore