39 research outputs found
Digital Twinning in Smart Grid Networks: Interplay, Resource Allocation and Use Cases
Motivated by climate change, increasing industrialization and energy
reliability concerns, the smart grid is set to revolutionize traditional power
systems. Moreover, the exponential annual rise in number of grid-connected
users and emerging key players e.g. electric vehicles strain the limited radio
resources, which stresses the need for novel and scalable resource management
techniques. Digital twin is a cutting-edge virtualization technology that has
shown great potential by offering solutions for inherent bottlenecks in
traditional wireless networks. In this article, we set the stage for various
roles digital twinning can fulfill by optimizing congested radio resources in a
proactive and resilient smart grid. Digital twins can help smart grid networks
through real-time monitoring, advanced precise modeling and efficient radio
resource allocation for normal operations and service restoration following
unexpected events. However, reliable real-time communications, intricate
abstraction abilities, interoperability with other smart grid technologies,
robust computing capabilities and resilient security schemes are some open
challenges for future work on digital twins.Comment: 7 pages, 3 figure
Recommended from our members
Softwarized resource allocation in digital twins-empowered networks for future quantum-enabled consumer applications
Network softwarization (NetSoft), recognized as crucial attribute of 6G networks, promises to provide enhanced and advanced services, including future quantum-enabled consumer applications. Softwarized resource allocation is the core issue in NetSoft concept. Digital twins (DT) guarantees to generate the corresponding digital world that reflects and interacts with the original physical world seamlessly. With DT empowering, the digital replica of softwarized networks can be generated to predict, simulate, analyze the softwarized resource allocation in more economical, convenient and scalable methods.In this paper, we research the softwarized resource allocation of requested services, usually, called as slices, in DT-empowered networks for future quantum-enabled consumer applications. We focus on developing efficient softwarized resource allocation algorithm. At first, we present models of the DT-empowered networks and service requests by using graph theory and hypergraph theory. Then, we design one softwarized resource management framework, labeled as DT-Slice-Soft-6G. This framework has the functions of managing softwarized resources, calculating resource allocation solution in digital replica and sending the calculated solution back to softwarized 6G networks. Thereafter, one efficient and fine-grained softwarized resource allocation algorithm, inserted in DT-Slice-Soft-6G, is detailed. This algorithm is labeled as Heu-DT-Slice-6G and is proposed based on efficient heuristic methods. To validate the highlights of DT-Slice-Soft-6G and Heu-DT-Slice-6G, we conduct the simulation work in our self-developed simulator
Sec12 Binds to Sec16 at Transitional ER Sites
COPII vesicles bud from an ER domain known as the transitional ER (tER). Assembly of the COPII coat is initiated by the transmembrane guanine nucleotide exchange factor Sec12. In the budding yeast Pichia pastoris, Sec12 is concentrated at tER sites. Previously, we found that the tER localization of P. pastoris Sec12 requires a saturable binding partner. We now show that this binding partner is Sec16, a peripheral membrane protein that functions in ER export and tER organization. One line of evidence is that overexpression of Sec12 delocalizes Sec12 to the general ER, but simultaneous overexpression of Sec16 retains overexpressed Sec12 at tER sites. Additionally, when P. pastoris Sec12 is expressed in S. cerevisiae, the exogenous Sec12 localizes to the general ER, but when P. pastoris Sec16 is expressed in the same cells, the exogenous Sec12 is recruited to tER sites. In both of these experimental systems, the ability of Sec16 to recruit Sec12 to tER sites is abolished by deleting a C-terminal fragment of Sec16. Biochemical experiments confirm that this C-terminal fragment of Sec16 binds to the cytosolic domain of Sec12. Similarly, we demonstrate that human Sec12 is concentrated at tER sites, likely due to association with a C-terminal fragment of Sec16A. These results suggest that a Sec12–Sec16 interaction has a conserved role in ER export
Cognitive radio network with secrecy and interference constraints
In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multiple antennas. In order to protect the PU communication from the interference of the SU and the risks of eavesdropping, the SU must have a reasonable adaptive transmission power which is set on the basis of channel state information, interference and security constraints of the PU. Accordingly, an upper bound and lower bound for the SU transmission power are derived. Furthermore, a power allocation policy, which is calculated on the convex combination of the upper and lower bound of the SU transmission power, is proposed. On this basis, we investigate the impact of the PU transmission power and channel mean gains on the security and system performance of the SU. Closed-form expressions for the outage probability, probability of non-zero secrecy capacity, and secrecy outage probability are obtained. Interestingly, our results show that the strong channel mean gain of the PU transmitter to the PU's eavesdropper in the primary network can enhance the SU performance. SafeCOP - Safe Cooperating Cyber-Physical Systems using Wireless Communicatio
Secrecy analysis of a MIMO full-duplex active eavesdropper with channel estimation errors
Abstract
In this paper, we investigate the secrecy performance of the multiple-input multiple-output (MIMO) wiretap channels in the presence of an active full-duplex eavesdropper with consideration of channel estimation error at the legitimate destination and eavesdropper. For this purpose, the probability density functions (PDFs) and cumulative density functions (CDFs) of the receive signal-to-interference-plus-noise ratio (SINR) at the destination and eavesdropper are given by conducting the singular value decomposition (SVD) on the estimated channel coefficient matrices. Consequently, the closed- form expressions for the probability of positive secrecy capacity and secrecy outage probability over Rayleigh fading channels are derived. Finally, the Monte-Carlo simulation results are presented to validate the accuracy of our theoretical analysis