24 research outputs found

    Secure Wireless Communications Based on Compressive Sensing: A Survey

    Get PDF
    IEEE Compressive sensing (CS) has become a popular signal processing technique and has extensive applications in numerous fields such as wireless communications, image processing, magnetic resonance imaging, remote sensing imaging, and anology to information conversion, since it can realize simultaneous sampling and compression. In the information security field, secure CS has received much attention due to the fact that CS can be regarded as a cryptosystem to attain simultaneous sampling, compression and encryption when maintaining the secret measurement matrix. Considering that there are increasing works focusing on secure wireless communications based on CS in recent years, we produce a detailed review for the state-of-the-art in this paper. To be specific, the survey proceeds with two phases. The first phase reviews the security aspects of CS according to different types of random measurement matrices such as Gaussian matrix, circulant matrix, and other special random matrices, which establishes theoretical foundations for applications in secure wireless communications. The second phase reviews the applications of secure CS depending on communication scenarios such as wireless wiretap channel, wireless sensor network, internet of things, crowdsensing, smart grid, and wireless body area networks. Finally, some concluding remarks are given

    Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach

    Get PDF
    This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated random jamming scheme in which those unscheduled sensors send jamming signals with a certain probability to defeat the eavesdroppers. With the aid of stochastic geometry theory and order statistics, we derive analytical expressions for the connection outage probability and secrecy outage probability to characterize transmission reliability and secrecy, respectively. Based on the obtained analytical results, we formulate an optimization problem for maximizing the sum secrecy throughput subject to both reliability and secrecy constraints, considering a joint design of the wiretap code rates for each scheduled sensor and the jamming probability for the unscheduled sensors. We provide both optimal and low-complexity sub-optimal algorithms to tackle the above problem, and further reveal various properties on the optimal parameters which are useful to guide practical designs. In particular, we demonstrate that the proposed random jamming scheme is beneficial for improving the sum secrecy throughput, and the optimal jamming probability is the result of trade-off between secrecy and throughput. We also show that the throughput performance of the sub-optimal scheme approaches that of the optimal one when facing a stringent reliability constraint or a loose secrecy constraint

    Power optimization, network coding and decision fusion in multi-access relay networks

    Get PDF
    Multi-access relay (MAR) assisted communication appears in various applications such as hierarchical wireless sensor networks (WSN), two-way relay channels (TWRC) etc. since it provides a high speed and reliable communication with considerably large coverage. In this thesis, we develop the optimal power allocation, network coding and information fusion techniques to improve the performance of MAR channel by considering certain criterion (e.g., minimizing the average symbol error rate (SER) or maximizing the average sum-rate. For this purpose, we first derive optimal information fusion rules for hierarchical WSNs with the use of complete channel state information (CSI) and the partial CSI using channel statistics (CS) with the exact phase information. Later, we investigate the optimization of the MAR channel that employs complex field network coding (CFNC), where we have used two different metrics during the optimization: achievable sum rate and SER bound of the network under the assumption of receiver CSI. After that, we formulate the optimal power allocation problem to maximize the achievable sum rate of the MAR with decode and forward relaying while considering fairness among users in terms of their average achievable information rates under the constraints on the total power and network geometry. We show that this problem is non-convex and nonlinear, and obtain an analytical solution by properly dividing parameter space into four regions. Then, we derive an average SER bound for the CFNC coded MAR channel and aim to jointly optimize the CFNC and the relay power by minimizing SER bound under the total power constraint, which we prove as a convex program that cannot be solved analytically since the Karush-Khun-Tucker (KKT) conditions result in highly nonlinearity equations. Following that, we devise an iterative method to obtain SER optimal solutions which uses the information theoretical rate optimal analytical solution during the initialization and we show that this speeds up the convergence of the iterative method as compared to equal power allocation scheme. Next, we integrate CFNC into WSNs that operate over non-orthogonal communication channel, and derive optimal fusion rule accordingly, combine the SER bound minimization and the average rate-fairness ideas to come up with an approximate analytical method to jointly optimize CFNC and the relay power. Simulation results show that the proposed methods outperform the conventional methods in terms of the detection probability, achievable average sum-rate or average SER

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Collaborative tracking and positioning of unmanned aerial vehicles over wireless sensor networks

    Get PDF
    This is the author accepted manuscript. The final version is available from IEEE via the DOI in this record In recent years, wireless sensor networks have been widely applied in information acquisition and real-time monitoring of consumer electronics, particularly for tracking and positioning of consumer unmanned aerial vehicles (UAVs) in outdoor rescue scenarios. However, the challenging outdoor environments introduce reliability and security concerns in the sensor data acquisition process, and there remains a significant gap in related research efforts. To address this issue, this paper introduces an amplify-and-forward relaying strategy to ensure dependable signal transmission, while a residual saturation mechanism is applied to tackle randomly occurring measurement outliers. Additionally, a recursive extended Kalman filter is developed for target tracking to address the challenge of UAVs positioning within wireless sensor networks. The efficacy of the proposed filtering algorithm is validated through simulations of UAV target positioning. When compared with alternative methods, the proposed approach demonstrates superior accuracy in UAV positioning.National Natural Science Foundation of Chin

    D13.2 Techniques and performance analysis on energy- and bandwidth-efficient communications and networking

    Get PDF
    Deliverable D13.2 del projecte europeu NEWCOM#The report presents the status of the research work of the various Joint Research Activities (JRA) in WP1.3 and the results that were developed up to the second year of the project. For each activity there is a description, an illustration of the adherence to and relevance with the identified fundamental open issues, a short presentation of the main results, and a roadmap for the future joint research. In the Annex, for each JRA, the main technical details on specific scientific activities are described in detail.Peer ReviewedPostprint (published version

    Optimization and Communication in UAV Networks

    Get PDF
    UAVs are becoming a reality and attract increasing attention. They can be remotely controlled or completely autonomous and be used alone or as a fleet and in a large set of applications. They are constrained by hardware since they cannot be too heavy and rely on batteries. Their use still raises a large set of exciting new challenges in terms of trajectory optimization and positioning when they are used alone or in cooperation, and communication when they evolve in swarm, to name but a few examples. This book presents some new original contributions regarding UAV or UAV swarm optimization and communication aspects

    MIMO Systems

    Get PDF
    In recent years, it was realized that the MIMO communication systems seems to be inevitable in accelerated evolution of high data rates applications due to their potential to dramatically increase the spectral efficiency and simultaneously sending individual information to the corresponding users in wireless systems. This book, intends to provide highlights of the current research topics in the field of MIMO system, to offer a snapshot of the recent advances and major issues faced today by the researchers in the MIMO related areas. The book is written by specialists working in universities and research centers all over the world to cover the fundamental principles and main advanced topics on high data rates wireless communications systems over MIMO channels. Moreover, the book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity

    Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Towards 6G

    Full text link
    The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of things (IoT), billions of sensors, machines, vehicles, drones, and robots will be connected, making the world around us smarter. The IoT will encompass devices that must wirelessly communicate a diverse set of data gathered from the environment for myriad new applications. The ultimate goal is to extract insights from this data and develop solutions that improve quality of life and generate new revenue. Providing large-scale, long-lasting, reliable, and near real-time connectivity is the major challenge in enabling a smart connected world. This paper provides a comprehensive survey on existing and emerging communication solutions for serving IoT applications in the context of cellular, wide-area, as well as non-terrestrial networks. Specifically, wireless technology enhancements for providing IoT access in fifth-generation (5G) and beyond cellular networks, and communication networks over the unlicensed spectrum are presented. Aligned with the main key performance indicators of 5G and beyond 5G networks, we investigate solutions and standards that enable energy efficiency, reliability, low latency, and scalability (connection density) of current and future IoT networks. The solutions include grant-free access and channel coding for short-packet communications, non-orthogonal multiple access, and on-device intelligence. Further, a vision of new paradigm shifts in communication networks in the 2030s is provided, and the integration of the associated new technologies like artificial intelligence, non-terrestrial networks, and new spectra is elaborated. Finally, future research directions toward beyond 5G IoT networks are pointed out.Comment: Submitted for review to IEEE CS&
    corecore