5,233 research outputs found
6G Communications: A Vision on the Potential Applications
6G communication technology is a revolutionary technology that will
revolutionize many technologies and applications. Furthermore, it will be truly
AI-driven and will carry on intelligent space. Hence, it will enable Internet
of Everything (IoE) which will also impact many technologies and applications.
6G communication technology promises high Quality of Services (QoS) and high
Quality of Experiences (QoE). With the combination of IoE and 6G communication
technology, number of applications will be exploded in the coming future,
particularly, vehicles, drones, homes, cities, hospitals, and so on, and there
will be no untouched area. Thence, it is expected that many existing
technologies will fully depend on 6G communication technology and enhance their
performances. 6G communication technology will prove as game changer
communication technology in many fields and will be capable to influence many
applications. Therefore, we envision the potential applications of 6G
communication technology in the near future.Comment: This manuscript is submitted to IEEE for possible publication
Communication Interface Identifier Protocol (CIIP): An Energy Efficient Protocol for smaller IoT Sensor
Today we can use technologies like switched Ethernet, TCP/IP, high-speed wide
area networks, and high-performance low-cost computers very easily. However,
protocols designed for those communication are inefficient or not energy
efficient. Smart home, smart grid, blockchain, Internet of Things (IoT) all
these technologies are coming very rapidly with higher communication facilities
demands an energy efficient Ethernet. Due to controller and network equipment
use a huge quantity of energy. Layer to layer communication making our
communication method more complex and costly. In this work, we propose an
architecture, which will make the communication of sensor devices to outside
world easier. Our proposed system removes certain layer from TCP-IP
communication. We used a communication interface identifier protocol (CIIP)
which can be used for smaller IoT sensors.Comment: Korea Institute of Information and Telecommunication Technology, 2018
Spring General conference, Kongju, South Kore
Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures
As Critical National Infrastructures are becoming more vulnerable to cyber
attacks, their protection becomes a significant issue for any organization as
well as a nation. Moreover, the ability to attribute is a vital element of
avoiding impunity in cyberspace. In this article, we present main threats to
critical infrastructures along with protective measures that one nation can
take, and which are classified according to legal, technical, organizational,
capacity building, and cooperation aspects. Finally we provide an overview of
current methods and practices regarding cyber attribution and cyber peace
keepin
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
This paper presents a comprehensive survey of existing authentication and
privacy-preserving schemes for 4G and 5G cellular networks. We start by
providing an overview of existing surveys that deal with 4G and 5G
communications, applications, standardization, and security. Then, we give a
classification of threat models in 4G and 5G cellular networks in four
categories, including, attacks against privacy, attacks against integrity,
attacks against availability, and attacks against authentication. We also
provide a classification of countermeasures into three types of categories,
including, cryptography methods, humans factors, and intrusion detection
methods. The countermeasures and informal and formal security analysis
techniques used by the authentication and privacy preserving schemes are
summarized in form of tables. Based on the categorization of the authentication
and privacy models, we classify these schemes in seven types, including,
handover authentication with privacy, mutual authentication with privacy, RFID
authentication with privacy, deniable authentication with privacy,
authentication with mutual anonymity, authentication and key agreement with
privacy, and three-factor authentication with privacy. In addition, we provide
a taxonomy and comparison of authentication and privacy-preserving schemes for
4G and 5G cellular networks in form of tables. Based on the current survey,
several recommendations for further research are discussed at the end of this
paper.Comment: 24 pages, 14 figure
5G Mobile Cellular Networks: Enabling Distributed State Estimation for Smart Grids
With transition towards 5G, mobile cellular networks are evolving into a
powerful platform for ubiquitous large-scale information acquisition,
communication, storage and processing. 5G will provide suitable services for
mission-critical and real-time applications such as the ones envisioned in
future Smart Grids. In this work, we show how emerging 5G mobile cellular
network, with its evolution of Machine-Type Communications and the concept of
Mobile Edge Computing, provides an adequate environment for distributed
monitoring and control tasks in Smart Grids. In particular, we present in
detail how Smart Grids could benefit from advanced distributed State Estimation
methods placed within 5G environment. We present an overview of emerging
distributed State Estimation solutions, focusing on those based on distributed
optimization and probabilistic graphical models, and investigate their
integration as part of the future 5G Smart Grid services.Comment: 8 pages, 6 figures, version of the magazine paper submitted for
publicatio
Energy and Information Management of Electric Vehicular Network: A Survey
The connected vehicle paradigm empowers vehicles with the capability to
communicate with neighboring vehicles and infrastructure, shifting the role of
vehicles from a transportation tool to an intelligent service platform.
Meanwhile, the transportation electrification pushes forward the electric
vehicle (EV) commercialization to reduce the greenhouse gas emission by
petroleum combustion. The unstoppable trends of connected vehicle and EVs
transform the traditional vehicular system to an electric vehicular network
(EVN), a clean, mobile, and safe system. However, due to the mobility and
heterogeneity of the EVN, improper management of the network could result in
charging overload and data congestion. Thus, energy and information management
of the EVN should be carefully studied. In this paper, we provide a
comprehensive survey on the deployment and management of EVN considering all
three aspects of energy flow, data communication, and computation. We first
introduce the management framework of EVN. Then, research works on the EV
aggregator (AG) deployment are reviewed to provide energy and information
infrastructure for the EVN. Based on the deployed AGs, we present the research
work review on EV scheduling that includes both charging and vehicle-to-grid
(V2G) scheduling. Moreover, related works on information communication and
computing are surveyed under each scenario. Finally, we discuss open research
issues in the EVN
A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions
The fifth generation (5G) wireless network technology is to be standardized
by 2020, where main goals are to improve capacity, reliability, and energy
efficiency, while reducing latency and massively increasing connection density.
An integral part of 5G is the capability to transmit touch perception type
real-time communication empowered by applicable robotics and haptics equipment
at the network edge. In this regard, we need drastic changes in network
architecture including core and radio access network (RAN) for achieving
end-to-end latency on the order of 1 ms. In this paper, we present a detailed
survey on the emerging technologies to achieve low latency communications
considering three different solution domains: RAN, core network, and caching.
We also present a general overview of 5G cellular networks composed of software
defined network (SDN), network function virtualization (NFV), caching, and
mobile edge computing (MEC) capable of meeting latency and other 5G
requirements.Comment: Accepted in IEEE Communications Surveys and Tutorial
Over-the-Air Time Synchronization for URLLC: Requirements, Challenges and Possible Enablers
Ultra-reliable and low-latency communications (URLLC) is an emerging feature
in 5G and beyond wireless systems, which is introduced to support stringent
latency and reliability requirements of mission-critical industrial
applications. In many potential applications, multiple sensors/actuators
collaborate and require isochronous operation with strict and bounded jitter,
e.g., \SI{1}{\micro\second}. To this end, network time synchronization becomes
crucial for real-time and isochronous communication between a controller and
the sensors/actuators. In this paper, we look at different applications in
factory automation and smart grids to reveal the requirements of device-level
time synchronization and the challenges in extending the high-granularity
timing information to the devices. Also, we identify the potential over-the-air
synchronization mechanisms in 5G radio interface, and discuss the needed
enhancements to meet the jitter constraints of time-sensitive URLLC
applications
A Novel Communication Paradigm for High Capacity and Security via Programmable Indoor Wireless Environments in Next Generation Wireless Systems
Wireless communication environments comprise passive objects that cause
performance degradation and eavesdropping concerns due to anomalous scattering.
This paper proposes a new paradigm, where scattering becomes software-defined
and, subsequently, optimizable across wide frequency ranges. Through the
proposed programmable wireless environments, the path loss, multi-path fading
and interference effects can be controlled and mitigated. Moreover, the
eavesdropping can be prevented via novel physical layer security capabilities.
The core technology of this new paradigm is the concept of metasurfaces, which
are planar intelligent structures whose effects on impinging electromagnetic
waves are fully defined by their micro-structure. Their control over impinging
waves has been demonstrated to span from 1 GHz to 10 THz. This paper
contributes the software-programmable wireless environment, consisting of
several HyperSurface tiles (programmable metasurfaces) controlled by a central
server. HyperSurfaces are a novel class of metasurfaces whose structure and,
hence, electromagnetic behavior can be altered and controlled via a software
interface. Multiple networked tiles coat indoor objects, allowing fine-grained,
customizable reflection, absorption or polarization overall. A central server
calculates and deploys the optimal electromagnetic interaction per tile, to the
benefit of communicating devices. Realistic simulations using full 3D
ray-tracing demonstrate the groundbreaking performance and security potential
of the proposed approach in 2.4 GHz and 60 GHz frequencies.Comment: This work was partially funded by the European Union via the Horizon
2020: Future Emerging Topics call (FETOPEN), grant EU736876, project
VISORSURF. admin note: significant overlap with arXiv:1805.0667
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers
The 5th generation (5G) network adopts a great number of revolutionary
technologies to fulfill continuously increasing requirements of a variety of
applications, including ultra-high bandwidth, ultra-low latency, ultra-massive
device access, ultra-reliability, and so on. Correspondingly, traditional
security focuses on the core network, and the logical (non-physical) layer is
no longer suitable for the 5G network. 5G security presents a tendency to
extend from the network center to the network edge and from the logical layer
to the physical layer. The physical layer security is also an essential part of
5G security. However, the security of each layer in 5G is mostly studied
separately, which causes a lack of comprehensive analysis for security issues
across layers. Meanwhile, potential security threats are lack of automated
solutions. This article explores the 5G security by combining the physical
layer and the logical layer from the perspective of automated attack and
defense, and dedicate to provide automated solution framework for 5G security
- …