24 research outputs found
Secure Wireless Communications Based on Compressive Sensing: A Survey
IEEE Compressive sensing (CS) has become a popular signal processing technique and has extensive applications in numerous fields such as wireless communications, image processing, magnetic resonance imaging, remote sensing imaging, and anology to information conversion, since it can realize simultaneous sampling and compression. In the information security field, secure CS has received much attention due to the fact that CS can be regarded as a cryptosystem to attain simultaneous sampling, compression and encryption when maintaining the secret measurement matrix. Considering that there are increasing works focusing on secure wireless communications based on CS in recent years, we produce a detailed review for the state-of-the-art in this paper. To be specific, the survey proceeds with two phases. The first phase reviews the security aspects of CS according to different types of random measurement matrices such as Gaussian matrix, circulant matrix, and other special random matrices, which establishes theoretical foundations for applications in secure wireless communications. The second phase reviews the applications of secure CS depending on communication scenarios such as wireless wiretap channel, wireless sensor network, internet of things, crowdsensing, smart grid, and wireless body area networks. Finally, some concluding remarks are given
Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach
This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated random jamming scheme in which those unscheduled sensors send jamming signals with a certain probability to defeat the eavesdroppers. With the aid of stochastic geometry theory and order statistics, we derive analytical expressions for the connection outage probability and secrecy outage probability to characterize transmission reliability and secrecy, respectively. Based on the obtained analytical results, we formulate an optimization problem for maximizing the sum secrecy throughput subject to both reliability and secrecy constraints, considering a joint design of the wiretap code rates for each scheduled sensor and the jamming probability for the unscheduled sensors. We provide both optimal and low-complexity sub-optimal algorithms to tackle the above problem, and further reveal various properties on the optimal parameters which are useful to guide practical designs. In particular, we demonstrate that the proposed random jamming scheme is beneficial for improving the sum secrecy throughput, and the optimal jamming probability is the result of trade-off between secrecy and throughput. We also show that the throughput performance of the sub-optimal scheme approaches that of the optimal one when facing a stringent reliability constraint or a loose secrecy constraint
Power optimization, network coding and decision fusion in multi-access relay networks
Multi-access relay (MAR) assisted communication appears in various applications such as hierarchical wireless sensor networks (WSN), two-way relay channels (TWRC) etc. since it provides a high speed and reliable communication with considerably large coverage. In this thesis, we develop the optimal power allocation, network coding and information fusion techniques to improve the performance of MAR channel by considering certain criterion (e.g., minimizing the average symbol error rate (SER) or maximizing the average sum-rate. For this purpose, we first derive optimal information fusion rules for hierarchical WSNs with the use of complete channel state information (CSI) and the partial CSI using channel statistics (CS) with the exact phase information. Later, we investigate the optimization of the MAR channel that employs complex field network coding (CFNC), where we have used two different metrics during the optimization: achievable sum rate and SER bound of the network under the assumption of receiver CSI. After that, we formulate the optimal power allocation problem to maximize the achievable sum rate of the MAR with decode and forward relaying while considering fairness among users in terms of their average achievable information rates under the constraints on the total power and network geometry. We show that this problem is non-convex and nonlinear, and obtain an analytical solution by properly dividing parameter space into four regions. Then, we derive an average SER bound for the CFNC coded MAR channel and aim to jointly optimize the CFNC and the relay power by minimizing SER bound under the total power constraint, which we prove as a convex program that cannot be solved analytically since the Karush-Khun-Tucker (KKT) conditions result in highly nonlinearity equations. Following that, we devise an iterative method to obtain SER optimal solutions which uses the information theoretical rate optimal analytical solution during the initialization and we show that this speeds up the convergence of the iterative method as compared to equal power allocation scheme. Next, we integrate CFNC into WSNs that operate over non-orthogonal communication channel, and derive optimal fusion rule accordingly, combine the SER bound minimization and the average rate-fairness ideas to come up with an approximate analytical method to jointly optimize CFNC and the relay power. Simulation results show that the proposed methods outperform the conventional methods in terms of the detection probability, achievable average sum-rate or average SER
Security and Privacy for Modern Wireless Communication Systems
The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
Collaborative tracking and positioning of unmanned aerial vehicles over wireless sensor networks
This is the author accepted manuscript. The final version is available from IEEE via the DOI in this record In recent years, wireless sensor networks have been
widely applied in information acquisition and real-time
monitoring of consumer electronics, particularly for tracking and
positioning of consumer unmanned aerial vehicles (UAVs) in
outdoor rescue scenarios. However, the challenging outdoor
environments introduce reliability and security concerns in the
sensor data acquisition process, and there remains a significant
gap in related research efforts. To address this issue, this paper
introduces an amplify-and-forward relaying strategy to ensure
dependable signal transmission, while a residual saturation
mechanism is applied to tackle randomly occurring measurement
outliers. Additionally, a recursive extended Kalman filter is
developed for target tracking to address the challenge of UAVs
positioning within wireless sensor networks. The efficacy of the
proposed filtering algorithm is validated through simulations of
UAV target positioning. When compared with alternative
methods, the proposed approach demonstrates superior accuracy
in UAV positioning.National Natural Science Foundation of Chin
D13.2 Techniques and performance analysis on energy- and bandwidth-efficient communications and networking
Deliverable D13.2 del projecte europeu NEWCOM#The report presents the status of the research work of the
various Joint Research Activities (JRA) in WP1.3 and the results
that were developed up to the second year of the project. For
each activity there is a description, an illustration of the
adherence to and relevance with the identified fundamental
open issues, a short presentation of the main results, and a
roadmap for the future joint research. In the Annex, for each
JRA, the main technical details on specific scientific activities
are described in detail.Peer ReviewedPostprint (published version
Optimization and Communication in UAV Networks
UAVs are becoming a reality and attract increasing attention. They can be remotely controlled or completely autonomous and be used alone or as a fleet and in a large set of applications. They are constrained by hardware since they cannot be too heavy and rely on batteries. Their use still raises a large set of exciting new challenges in terms of trajectory optimization and positioning when they are used alone or in cooperation, and communication when they evolve in swarm, to name but a few examples. This book presents some new original contributions regarding UAV or UAV swarm optimization and communication aspects
MIMO Systems
In recent years, it was realized that the MIMO communication systems seems to be inevitable in accelerated evolution of high data rates applications due to their potential to dramatically increase the spectral efficiency and simultaneously sending individual information to the corresponding users in wireless systems. This book, intends to provide highlights of the current research topics in the field of MIMO system, to offer a snapshot of the recent advances and major issues faced today by the researchers in the MIMO related areas. The book is written by specialists working in universities and research centers all over the world to cover the fundamental principles and main advanced topics on high data rates wireless communications systems over MIMO channels. Moreover, the book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity
Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Towards 6G
The next wave of wireless technologies is proliferating in connecting things
among themselves as well as to humans. In the era of the Internet of things
(IoT), billions of sensors, machines, vehicles, drones, and robots will be
connected, making the world around us smarter. The IoT will encompass devices
that must wirelessly communicate a diverse set of data gathered from the
environment for myriad new applications. The ultimate goal is to extract
insights from this data and develop solutions that improve quality of life and
generate new revenue. Providing large-scale, long-lasting, reliable, and near
real-time connectivity is the major challenge in enabling a smart connected
world. This paper provides a comprehensive survey on existing and emerging
communication solutions for serving IoT applications in the context of
cellular, wide-area, as well as non-terrestrial networks. Specifically,
wireless technology enhancements for providing IoT access in fifth-generation
(5G) and beyond cellular networks, and communication networks over the
unlicensed spectrum are presented. Aligned with the main key performance
indicators of 5G and beyond 5G networks, we investigate solutions and standards
that enable energy efficiency, reliability, low latency, and scalability
(connection density) of current and future IoT networks. The solutions include
grant-free access and channel coding for short-packet communications,
non-orthogonal multiple access, and on-device intelligence. Further, a vision
of new paradigm shifts in communication networks in the 2030s is provided, and
the integration of the associated new technologies like artificial
intelligence, non-terrestrial networks, and new spectra is elaborated. Finally,
future research directions toward beyond 5G IoT networks are pointed out.Comment: Submitted for review to IEEE CS&