11 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Full-Duplex Cloud Radio Access Network: Stochastic Design and Analysis

    Get PDF
    Full-duplex (FD) has emerged as a disruptive communications paradigm for enhancing the achievable spectral efficiency (SE), thanks to the recent major breakthroughs in self-interference (SI) mitigation. The FD versus half-duplex (HD) SE gain, in cellular networks, is however largely limited by the mutual-interference (MI) between the downlink (DL) and the uplink (UL). A potential remedy for tackling the MI bottleneck is through cooperative communications. This paper provides a stochastic design and analysis of FD enabled cloud radio access network (C-RAN) under the Poisson point process (PPP)-based abstraction model of multi-antenna radio units (RUs) and user equipments (UEs). We consider different disjoint and user-centric approaches towards the formation of finite clusters in the C-RAN. Contrary to most existing studies, we explicitly take into consideration non-isotropic fading channel conditions and finite-capacity fronthaul links. Accordingly, upper-bound expressions for the C-RAN DL and UL SEs, involving the statistics of all intended and interfering signals, are derived. The performance of the FD C-RAN is investigated through the proposed theoretical framework and Monte-Carlo (MC) simulations. The results indicate that significant FD versus HD C-RAN SE gains can be achieved, particularly in the presence of sufficient-capacity fronthaul links and advanced interference cancellation capabilities

    D 3. 3 Final performance results and consolidated view on the most promising multi -node/multi -antenna transmission technologies

    Full text link
    This document provides the most recent updates on the technical contributions and research challenges focused in WP3. Each Technology Component (TeC) has been evaluated under possible uniform assessment framework of WP3 which is based on the simulation guidelines of WP6. The performance assessment is supported by the simulation results which are in their mature and stable state. An update on the Most Promising Technology Approaches (MPTAs) and their associated TeCs is the main focus of this document. Based on the input of all the TeCs in WP3, a consolidated view of WP3 on the role of multinode/multi-antenna transmission technologies in 5G systems has also been provided. This consolidated view is further supported in this document by the presentation of the impact of MPTAs on METIS scenarios and the addressed METIS goals.Aziz, D.; Baracca, P.; De Carvalho, E.; Fantini, R.; Rajatheva, N.; Popovski, P.; Sørensen, JH.... (2015). D 3. 3 Final performance results and consolidated view on the most promising multi -node/multi -antenna transmission technologies. http://hdl.handle.net/10251/7675

    Augmenting Wireless Security Using Zero-Forcing Beamforming

    Get PDF
    We present the design and experimental evaluation of Simultaneous TRansmissions with Orthogonally Blinded Eavesdroppers (STROBE). STROBE is a cross-layer approach that exploits the multi-stream capabilities of existing technologies such as 802.11n and the upcoming 802.11ac standard where multi-antenna APs construct simultaneous data streams using Zero-Forcing Beamforming (ZFBF). Instead of using this technique for simultaneous data stream generation, STROBE utilizes ZFBF by allowing an AP to use one stream to communicate with an intended user and the remaining streams to orthogonally "blind" (actively interfere) with any potential eavesdropper thereby preventing eavesdroppers from decoding nearby transmissions. Through extensive experimental evaluation, we show that STROBE reliably outperforms Omnidirectional, Single-User Beamforming (SUBF), and directional antenna based transmission methods by keeping the transmitted signal at the intended receiver and shielded from eavesdroppers. In an indoor Wireless LAN environment, STROBE consistently serves an intended user with a signal 15 dB stronger than an eavesdropper

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Design of large polyphase filters in the Quadratic Residue Number System

    Full text link

    Temperature aware power optimization for multicore floating-point units

    Full text link
    corecore