967 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    4. generációs mobil rendszerek kutatása = Research on 4-th Generation Mobile Systems

    Get PDF
    A 3G mobil rendszerek szabványosítása a végéhez közeledik, legalábbis a meghatározó képességek tekintetében. Ezért létfontosságú azon technikák, eljárások vizsgálata, melyek a következő, 4G rendszerekben meghatározó szerepet töltenek majd be. Több ilyen kutatási irányvonal is létezik, ezek közül projektünkben a fontosabbakra koncentráltunk. A következőben felsoroljuk a kutatott területeket, és röviden összegezzük az elért eredményeket. Szórt spektrumú rendszerek Kifejlesztettünk egy új, rádiós interfészen alkalmazható hívásengedélyezési eljárást. Szimulációs vizsgálatokkal támasztottuk alá a megoldás hatékonyságát. A projektben kutatóként résztvevő Jeney Gábor sikeresen megvédte Ph.D. disszertációját neurális hálózatokra épülő többfelhasználós detekciós technikák témában. Az elért eredmények Imre Sándor MTA doktori disszertációjába is beépültek. IP alkalmazása mobil rendszerekben Továbbfejlesztettük, teszteltük és általánosítottuk a projekt keretében megalkotott új, gyűrű alapú topológiára épülő, a jelenleginél nagyobb megbízhatóságú IP alapú hozzáférési koncepciót. A témakörben Szalay Máté Ph.D. disszertációja már a nyilvános védésig jutott. Kvantum-informatikai módszerek alkalmazása 3G/4G detekcióra Új, kvantum-informatikai elvekre épülő többfelhasználós detekciós eljárást dolgoztunk ki. Ehhez új kvantum alapú algoritmusokat is kifejlesztettünk. Az eredményeket nemzetközi folyóiratok mellett egy saját könyvben is publikáltuk. | The project consists of three main research directions. Spread spectrum systems: we developed a new call admission control method for 3G air interfaces. Project member Gabor Jeney obtained the Ph.D. degree and project leader Sandor Imre submitted his DSc theses from this area. Application of IP in mobile systems: A ring-based reliable IP mobility mobile access concept and corresponding protocols have been developed. Project member Máté Szalay submitted his Ph.D. theses from this field. Quantum computing based solutions in 3G/4G detection: Quantum computing based multiuser detection algorithm was developed. Based on the results on this field a book was published at Wiley entitled: 'Quantum Computing and Communications - an engineering approach'

    On the stability of the Foschini-Miljanic Algorithm with uncertainty over channel gains

    Get PDF
    Distributed power control in wireless networks faces challenges related to its stability. When perfect information of channel states and transmitting agents are available, previous work has shown that the stability conditions can be known. When there is uncertainty over the parameter space, stability is not well understood. In this work, we study the impact of parameter uncertainty and network structure on the stability and scalability of a well known distributed power control, namely the Foschini-Miljanic algorithm. More specifically, we derive probabilistic conditions with respect to the parameters of the channel distributions for which the system is stable. Furthermore, we study the effects of these parameters for different node distribution on the plane. Numerical examples validate our theoretical results

    On the Feasibility of 5G Slice Resource Allocation With Spectral Efficiency: A Probabilistic Characterization

    Get PDF
    An important concern that 5G networks face is supporting a wide range of services and use cases with heterogeneous requirements. Radio access network (RAN) slices, understood as isolated virtual networks that share a common infrastructure, are a possible answer to this very demanding scenario and enable virtual operators to provide differentiated services over independent logical entities. This article addresses the feasibility of forming 5G slices, answering the question of whether the available capacity (resources) is sufficient to satisfy slice requirements. As spectral efficiency is one of the key metrics in 5G networks, we introduce the minislot-based slicing allocation (MISA) model, a novel 5G slice resource allocation approach that combines the utilization of both complete slots (or physical resource blocks) and mini-slots with the adequate physical layer design and service requirement constraints. We advocate for a probabilistic characterization that allows to estimate feasibility and characterize the behavior of the constraints, while an exhaustive search is very computationally demanding and the methods to check feasibility provide no information on the constraints. In such a characterization, the concept of phase transition allows for the identification of a clear frontier between the feasible and infeasible regions. Our method relies on an adaptation of the Wang-Landau algorithm to determine the existence of, at least, one solution to the problem. The conducted simulations show a significant improvement in spectral efficiency and feasibility of the MISA approach compared to the slot-based formulation, the identification of the phase transition, and valuable results to characterize the satisfiability of the constraints.The work of J. J. Escudero-Garzás was supported in part by the Spanish National Project TERESA-ADA (MINECO/AEI/FEDER, UE) under Grant TEC2017-90093-C3-2-R, and in part by the National Spectrum Consortium, USA, under Project NSC-16-0140
    corecore