5,233 research outputs found

    6G Communications: A Vision on the Potential Applications

    Full text link
    6G communication technology is a revolutionary technology that will revolutionize many technologies and applications. Furthermore, it will be truly AI-driven and will carry on intelligent space. Hence, it will enable Internet of Everything (IoE) which will also impact many technologies and applications. 6G communication technology promises high Quality of Services (QoS) and high Quality of Experiences (QoE). With the combination of IoE and 6G communication technology, number of applications will be exploded in the coming future, particularly, vehicles, drones, homes, cities, hospitals, and so on, and there will be no untouched area. Thence, it is expected that many existing technologies will fully depend on 6G communication technology and enhance their performances. 6G communication technology will prove as game changer communication technology in many fields and will be capable to influence many applications. Therefore, we envision the potential applications of 6G communication technology in the near future.Comment: This manuscript is submitted to IEEE for possible publication

    Communication Interface Identifier Protocol (CIIP): An Energy Efficient Protocol for smaller IoT Sensor

    Full text link
    Today we can use technologies like switched Ethernet, TCP/IP, high-speed wide area networks, and high-performance low-cost computers very easily. However, protocols designed for those communication are inefficient or not energy efficient. Smart home, smart grid, blockchain, Internet of Things (IoT) all these technologies are coming very rapidly with higher communication facilities demands an energy efficient Ethernet. Due to controller and network equipment use a huge quantity of energy. Layer to layer communication making our communication method more complex and costly. In this work, we propose an architecture, which will make the communication of sensor devices to outside world easier. Our proposed system removes certain layer from TCP-IP communication. We used a communication interface identifier protocol (CIIP) which can be used for smaller IoT sensors.Comment: Korea Institute of Information and Telecommunication Technology, 2018 Spring General conference, Kongju, South Kore

    Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures

    Full text link
    As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation. Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace. In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are classified according to legal, technical, organizational, capacity building, and cooperation aspects. Finally we provide an overview of current methods and practices regarding cyber attribution and cyber peace keepin

    Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes

    Full text link
    This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks against privacy, attacks against integrity, attacks against availability, and attacks against authentication. We also provide a classification of countermeasures into three types of categories, including, cryptography methods, humans factors, and intrusion detection methods. The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables. Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID authentication with privacy, deniable authentication with privacy, authentication with mutual anonymity, authentication and key agreement with privacy, and three-factor authentication with privacy. In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables. Based on the current survey, several recommendations for further research are discussed at the end of this paper.Comment: 24 pages, 14 figure

    5G Mobile Cellular Networks: Enabling Distributed State Estimation for Smart Grids

    Full text link
    With transition towards 5G, mobile cellular networks are evolving into a powerful platform for ubiquitous large-scale information acquisition, communication, storage and processing. 5G will provide suitable services for mission-critical and real-time applications such as the ones envisioned in future Smart Grids. In this work, we show how emerging 5G mobile cellular network, with its evolution of Machine-Type Communications and the concept of Mobile Edge Computing, provides an adequate environment for distributed monitoring and control tasks in Smart Grids. In particular, we present in detail how Smart Grids could benefit from advanced distributed State Estimation methods placed within 5G environment. We present an overview of emerging distributed State Estimation solutions, focusing on those based on distributed optimization and probabilistic graphical models, and investigate their integration as part of the future 5G Smart Grid services.Comment: 8 pages, 6 figures, version of the magazine paper submitted for publicatio

    Energy and Information Management of Electric Vehicular Network: A Survey

    Full text link
    The connected vehicle paradigm empowers vehicles with the capability to communicate with neighboring vehicles and infrastructure, shifting the role of vehicles from a transportation tool to an intelligent service platform. Meanwhile, the transportation electrification pushes forward the electric vehicle (EV) commercialization to reduce the greenhouse gas emission by petroleum combustion. The unstoppable trends of connected vehicle and EVs transform the traditional vehicular system to an electric vehicular network (EVN), a clean, mobile, and safe system. However, due to the mobility and heterogeneity of the EVN, improper management of the network could result in charging overload and data congestion. Thus, energy and information management of the EVN should be carefully studied. In this paper, we provide a comprehensive survey on the deployment and management of EVN considering all three aspects of energy flow, data communication, and computation. We first introduce the management framework of EVN. Then, research works on the EV aggregator (AG) deployment are reviewed to provide energy and information infrastructure for the EVN. Based on the deployed AGs, we present the research work review on EV scheduling that includes both charging and vehicle-to-grid (V2G) scheduling. Moreover, related works on information communication and computing are surveyed under each scenario. Finally, we discuss open research issues in the EVN

    A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions

    Full text link
    The fifth generation (5G) wireless network technology is to be standardized by 2020, where main goals are to improve capacity, reliability, and energy efficiency, while reducing latency and massively increasing connection density. An integral part of 5G is the capability to transmit touch perception type real-time communication empowered by applicable robotics and haptics equipment at the network edge. In this regard, we need drastic changes in network architecture including core and radio access network (RAN) for achieving end-to-end latency on the order of 1 ms. In this paper, we present a detailed survey on the emerging technologies to achieve low latency communications considering three different solution domains: RAN, core network, and caching. We also present a general overview of 5G cellular networks composed of software defined network (SDN), network function virtualization (NFV), caching, and mobile edge computing (MEC) capable of meeting latency and other 5G requirements.Comment: Accepted in IEEE Communications Surveys and Tutorial

    Over-the-Air Time Synchronization for URLLC: Requirements, Challenges and Possible Enablers

    Full text link
    Ultra-reliable and low-latency communications (URLLC) is an emerging feature in 5G and beyond wireless systems, which is introduced to support stringent latency and reliability requirements of mission-critical industrial applications. In many potential applications, multiple sensors/actuators collaborate and require isochronous operation with strict and bounded jitter, e.g., \SI{1}{\micro\second}. To this end, network time synchronization becomes crucial for real-time and isochronous communication between a controller and the sensors/actuators. In this paper, we look at different applications in factory automation and smart grids to reveal the requirements of device-level time synchronization and the challenges in extending the high-granularity timing information to the devices. Also, we identify the potential over-the-air synchronization mechanisms in 5G radio interface, and discuss the needed enhancements to meet the jitter constraints of time-sensitive URLLC applications

    A Novel Communication Paradigm for High Capacity and Security via Programmable Indoor Wireless Environments in Next Generation Wireless Systems

    Full text link
    Wireless communication environments comprise passive objects that cause performance degradation and eavesdropping concerns due to anomalous scattering. This paper proposes a new paradigm, where scattering becomes software-defined and, subsequently, optimizable across wide frequency ranges. Through the proposed programmable wireless environments, the path loss, multi-path fading and interference effects can be controlled and mitigated. Moreover, the eavesdropping can be prevented via novel physical layer security capabilities. The core technology of this new paradigm is the concept of metasurfaces, which are planar intelligent structures whose effects on impinging electromagnetic waves are fully defined by their micro-structure. Their control over impinging waves has been demonstrated to span from 1 GHz to 10 THz. This paper contributes the software-programmable wireless environment, consisting of several HyperSurface tiles (programmable metasurfaces) controlled by a central server. HyperSurfaces are a novel class of metasurfaces whose structure and, hence, electromagnetic behavior can be altered and controlled via a software interface. Multiple networked tiles coat indoor objects, allowing fine-grained, customizable reflection, absorption or polarization overall. A central server calculates and deploys the optimal electromagnetic interaction per tile, to the benefit of communicating devices. Realistic simulations using full 3D ray-tracing demonstrate the groundbreaking performance and security potential of the proposed approach in 2.4 GHz and 60 GHz frequencies.Comment: This work was partially funded by the European Union via the Horizon 2020: Future Emerging Topics call (FETOPEN), grant EU736876, project VISORSURF. admin note: significant overlap with arXiv:1805.0667

    Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers

    Full text link
    The 5th generation (5G) network adopts a great number of revolutionary technologies to fulfill continuously increasing requirements of a variety of applications, including ultra-high bandwidth, ultra-low latency, ultra-massive device access, ultra-reliability, and so on. Correspondingly, traditional security focuses on the core network, and the logical (non-physical) layer is no longer suitable for the 5G network. 5G security presents a tendency to extend from the network center to the network edge and from the logical layer to the physical layer. The physical layer security is also an essential part of 5G security. However, the security of each layer in 5G is mostly studied separately, which causes a lack of comprehensive analysis for security issues across layers. Meanwhile, potential security threats are lack of automated solutions. This article explores the 5G security by combining the physical layer and the logical layer from the perspective of automated attack and defense, and dedicate to provide automated solution framework for 5G security
    corecore