86 research outputs found

    Managing Service-Heterogeneity using Osmotic Computing

    Full text link
    Computational resource provisioning that is closer to a user is becoming increasingly important, with a rise in the number of devices making continuous service requests and with the significant recent take up of latency-sensitive applications, such as streaming and real-time data processing. Fog computing provides a solution to such types of applications by bridging the gap between the user and public/private cloud infrastructure via the inclusion of a "fog" layer. Such approach is capable of reducing the overall processing latency, but the issues of redundancy, cost-effectiveness in utilizing such computing infrastructure and handling services on the basis of a difference in their characteristics remain. This difference in characteristics of services because of variations in the requirement of computational resources and processes is termed as service heterogeneity. A potential solution to these issues is the use of Osmotic Computing -- a recently introduced paradigm that allows division of services on the basis of their resource usage, based on parameters such as energy, load, processing time on a data center vs. a network edge resource. Service provisioning can then be divided across different layers of a computational infrastructure, from edge devices, in-transit nodes, and a data center, and supported through an Osmotic software layer. In this paper, a fitness-based Osmosis algorithm is proposed to provide support for osmotic computing by making more effective use of existing Fog server resources. The proposed approach is capable of efficiently distributing and allocating services by following the principle of osmosis. The results are presented using numerical simulations demonstrating gains in terms of lower allocation time and a higher probability of services being handled with high resource utilization.Comment: 7 pages, 4 Figures, International Conference on Communication, Management and Information Technology (ICCMIT 2017), At Warsaw, Poland, 3-5 April 2017, http://www.iccmit.net/ (Best Paper Award

    Secure information transmission with self jamming SWIPT

    Get PDF
    Grant No. 19-37-50083\19This article is focused on implementing simultaneous wireless information and power transmission as a physical layer security measure by using artificial noise. A series of high energy precoded symbols is simultaneously transmitted along with the information symbols over a Rayleigh frequency selective fading channel. The high energy precoded symbols act as an artificial noise for the eavesdroppers. The energy symbols are precoded on the basis of a legitimate user’s channel matrix to form a null space vector, which eliminates the interference of energy symbols at the information symbol receiver antennas, while allowing the rectenna to harvest energy from the superimposed information and energy symbols. We analyze the secrecy rate and error rate performance at the receiver under different circumstances, and we show that the performance of the legitimate user can be improved by using the iterative block decision feedback equalization method at the receiver.publishersversionpublishe

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Full duplex component-forward cooperative communication for a secure wireless communication system

    Get PDF
    The technological breakthrough in the form of Internet of Things (IoT), Big data and connected world is increasing the demand of better spectrum utilization. Half-Duplex (HD) transmission is mostly used in the earlier communication systems. The high transmission demand requires the better utilization of the existing spectrum. There are several possible ways to overcome the problem of better spectrum usage. In-Band Full Duplex (IBFD) is one of the techniques that can double the Spectral Efficiency (SE) in a Beyond 5G (B5G) communication system. In this paper, our aim is to use the spectral efficient IBFD scheme to improve the security of the system with minimum interference. The interference can be reduced by the addition of orthogonality between the transmitted and received signal of a relay. A component-forward scheme is proposed in this paper to create such orthogonality. For achieving the desired aim, IBFD is used with Device-to-Device (D2D), Artificial Noise (AN), Modulation based orthogonalization, Radio Frequency Energy Harvesting (RFEH) and proposed Full-Duplex Component Forward (FD-CF) algorithm for multiple relays. We also use non-linear harvested power as one of the sources to reuse the exiting power for evaluating the system performance. The derivation of Secrecy Outage Probability (SOP) and throughput is derived in this paper for the FD-CF cooperative communication and is explored with and without non-linear RFEH. The simulation results show the comparison between the component-forward and decode-and-forward communication with one or more relays

    Wireless Energy Harvesting Assisted Two-Way Cognitive Relay Networks: Protocol Design and Performance Analysis

    Get PDF
    This paper analyzes the effects of realistic relay transceiver on the outage probability and throughput of a two-way relay cognitive network that is equipped with an energy-harvesting relay. In this paper, we configure the network with two wireless power transfer policies and two bidirectional relaying protocols. Furthermore, the differences in receiver structure of relay node that can be time switching or power splitting structure are also considered to develop closed-form expressions of outage and throughput of the network providing that the delay of transmission is limited. Numerical results are presented to corroborate our analysis for all considered network configurations. This paper facilitates us not only to quantify the degradation of outage probability and throughput due to the impairments of realistic transceiver but also to provide an insight into practical effects of specified configuration of power transfer policy, relaying protocol, and receiver structure on outage and throughput. For instance, the system with multiple access broadcast protocol and the power splitting-based receiver architecture achieves ceiling throughout higher than that of the transmission rate of source nodes. On the contrary, a combination of dual-source energy transfer policy and the time division broadcast protocol is contributed the highest level of limiting factor in terms of transceiver hardware impairments on the network throughput.</p

    A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing

    Get PDF
    With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Computing, it inherited numerous security and privacy issues from the latter. Further, decentralized architectures and diversified deployment environments used in MEC platforms also aggravate the problem; causing great concerns for the research fraternity. Thus, in this paper, we propose an efficient and lightweight mutual authentication protocol for MEC environments; based on Elliptic Curve Cryptography (ECC), one-way hash functions and concatenation operations. The designed protocol also leverages the advantages of discrete logarithm problems, computational Diffie-Hellman, random numbers and time-stamps to resist various attacks namely-impersonation attacks, replay attacks, man-in-the-middle attacks, etc. The paper also presents a comparative assessment of the proposed scheme relative to the current state-of-the-art schemes. The obtained results demonstrate that the proposed scheme incurs relatively less communication and computational overheads, and is appropriate to be adopted in resource constraint MEC environments.Comment: To appear in IEEE GLOBECOM 201

    Backscatter Assisted NOMA-PLNC Based Wireless Networks

    Get PDF
    In this paper, sum capacity maximization of the non-orthogonal multiple access (NOMA)-based wireless network is studied in the presence of ambient backscattering (ABS). Assuming that ABS is located next to far nodes, it improves the signal strength of far node cluster. By applying suitable successive interference cancellation (SIC) operation, far node cluster act as an internet of things (IoT) reader. Moreover, to improve the uplink performance of the nodes, a physical layer network coding (PLNC) scheme is applied in the proposed network. Power optimization is employed at the access point (AP) to enhance the downlink performance with total transmit power constraint and minimum data rate requirement per user constraint using Lagrangian’s function. In addition, end-to-end outage performance of the proposed wireless network is analyzed to enhance each wireless link capacity. Numerical results evident that the outage performance of the proposed network is significantly improved while using the ABS. Furthermore, the average bit error rate (BER) performance of the proposed wireless network is studied to improve the reliability. Simulation results are presented to validate the analytical expressions

    Outage Probability Analysis of Downlink UAV-assisted Cellular Systems

    Get PDF
    The deployment of unmanned aerial vehicles (UAVs) as floating base stations (BSs) has a huge impact in the field of wireless communication. Coverage area and spectral efficiency can be improved by efficiently using floating UAV base stations. Floating UAV BSs are very effective in delivering temporary ondemand services due to their flexible deployment capability. One of the major disadvantages of this model is that the Line of Sight (LoS) propagation environment causes severe interference to other adjacent cell users and UAV BSs. The effectiveness of the UAVs acting as wireless base station for the ground users is analyzed based on the outage probability of the LoS and non-LoS (NLoS) links. The outage probability of the downlink depends on both height of the UAV BS from the ground and its coverage radius. The analysis is carried out by varying the height and the coverage radius of the UAV BS. The simulation results show that the outage probability is minimum for an optimum height of 180m to 200m for a coverage radius of 500m and a Signal to Interference Noise Ratio (SINR) threshold of 10dB
    corecore