98 research outputs found

    The Role of Physical Layer Security in IoT: A Novel Perspective

    Get PDF
    This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard). As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems

    Modified Spatial Channel Model for MIMO Wireless Systems

    Get PDF
    ?The third generation partnership Project's (3GPP) spatial channel model (SCM) is a stochastic channel model for MIMO systems. Due to fixed subpath power levels and angular directions, the SCM model does not show the degree of variation which is encountered in real channels. In this paper, we propose a modified SCM model which has random subpath powers and directions and still produces Laplace shape angular power spectrum. Simulation results on outage MIMO capacity with basic and modified SCM models show that the modified SCM model gives constantly smaller capacity values. Accordingly, it seems that the basic SCM gives too small correlation between MIMO antennas. Moreover, the variance in capacity values is larger using the proposed SCM model. Simulation results were supported by the outage capacity results from a measurement campaign conducted in the city centre of Oulu, Finland

    A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks

    Get PDF
    Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to the relative energy consumption costs, has to be pursued. This paper aims at proposing new analysis tools and investigating the relation between secrecy capacity and energy consumption in a 3rd Generation Partnership Project (3GPP) cellular network , by focusing on secure and energy efficient communications. New metrics that bind together the secure area in the Base Station (BS) sectors, the afforded date-rate and the power spent by the BS to obtain it, are proposed that permit evaluation of the tradeoff between these aspects. The results show that these metrics are useful in identifying the optimum transmit power level for the BS, so that the maximum secure area can be obtained while minimizing the energy consumption

    Performance Evaluation of a Novel CDMA Detection Technique: The Two-State Approach

    Get PDF
    The use of code division multiple access (CDMA) makes third-generation wireless systems interference limited rather than noise limited. The research for new methods to reduce interference and increase efficiency lead us to formulate a signaling method where fast impulsive silence states are mapped on zero-energy symbols. The theoretical formulation of the optimum receiver is reported and the asymptotic multiuser efficiency (AME) as well as an upper bound of the probability of error have been derived and applied to the conventional receiver and the decorrelating detector. Moreover, computer simulations have been performed to show the advantages of the proposed two-state scheme over the traditional single-state receiver in a multiuser CDMA system operating in a multipath fading channel
    • …
    corecore