8 research outputs found

    Outage minimization of energy-harvesting wireless sensor network supported by UAV

    Get PDF
    Due to their adaptability, mobility, and capacity to offer an ideal channel, unmanned aerial vehicles (UAVs) have become a potential option for wireless power transfer and data collection in wireless sensor networks (WSNs). This paper examines energy-constrained WSNs, where data transfer to the data center is facilitated by UAV and sensors rely on radio frequency (RF) energy obtained by a Power Beacon (PB). However, due to energy limitations, sensors can only send data using the harvested energy. We consider a WSN in which the nodes are randomly distributed within a circular area, with the PB placed at the center of the WSN. To evaluate the system performance, we consider the dynamic nature of the wireless channel, which includes factors such as signal reflection, scattering, and diffraction. Through numerical analysis and simulations, the main aim is to identify the optimal system parameters that minimize the outage probability. This analysis provides valuable insights for designing more effective and reliable energy-harvesting WSNs with UAV as data collector. By leveraging UAV in WSNs, system performance can be improved, ensuring data transmission to destination nodes placed at a large distance from the WSN

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
    corecore