7 research outputs found

    A Survey on Semantic Communications for Intelligent Wireless Networks

    Get PDF
    With deployment of 6G technology, it is envisioned that competitive edge of wireless networks will be sustained and next decade's communication requirements will be stratified. Also 6G will aim to aid development of a human society which is ubiquitous and mobile, simultaneously providing solutions to key challenges such as, coverage, capacity, etc. In addition, 6G will focus on providing intelligent use-cases and applications using higher data-rates over mill-meter waves and Tera-Hertz frequency. However, at higher frequencies multiple non-desired phenomena such as atmospheric absorption, blocking, etc., occur which create a bottleneck owing to resource (spectrum and energy) scarcity. Hence, following same trend of making efforts towards reproducing at receiver, exact information which was sent by transmitter, will result in a never ending need for higher bandwidth. A possible solution to such a challenge lies in semantic communications which focuses on meaning (context) of received data as opposed to only reproducing correct transmitted data. This in turn will require less bandwidth, and will reduce bottleneck due to various undesired phenomenon. In this respect, current article presents a detailed survey on recent technological trends in regard to semantic communications for intelligent wireless networks. We focus on semantic communications architecture including model, and source and channel coding. Next, we detail cross-layer interaction, and various goal-oriented communication applications. We also present overall semantic communications trends in detail, and identify challenges which need timely solutions before practical implementation of semantic communications within 6G wireless technology. Our survey article is an attempt to significantly contribute towards initiating future research directions in area of semantic communications for intelligent 6G wireless networks

    Crypto-Coding as DES-Convolution for Land Mobile Satellite Channel

    No full text
    In this paper, secure channel coding schemes based on convolutional codes are suggested to enhance the performance of combined cryptography and coding theory, which is called “Crypto-Coding”. In the proposed work, Data Encryption Standard (DES) for security and channel coding algorithm such as convolutional code for efficient transmission are combined in a mono-block. This modification is required to improve the overall system performance. The combined System’s performances are evaluated on Land Mobile Satellite (LMS) Channel. The results are compared with the system using ideal encryption and decryption

    Enhancing safety communication in autonomous vehicles with hybrid elliptic curve digital signatures

    No full text
    The autonomous vehicles (AVs) are a part of vehicular ad hoc network (VANET) technology which is gaining a lot of researchers' attention for making the vehicle smarter and safer. In VANETs, the vehicles transmit various types of messages, some are important in terms of human lives while others are for infotainment. These messages give various information to the driver so that the driver can take appropriate precautions on the roads. In this work, the main aim was to concentrate on the safety messages that are very important in VANET infrastructure. In VANET the information transmitted are open, hence it is very easy for any attacker to manipulate or change the critical messages. Hence, in this paper, we intend to implement security to these safety messages by encrypting the elliptic curve digital signature algorithm (ECDSA) algorithm which is further optimized by ate pairing. The results have been compared with the traditional ECDSA in terms of throughput. By using the hybrid ECDSA, we increase the strength of ECDSA and still maintain the integrity of ECDSA, making sure that the authenticity of the vehicles and privacy of the messages is maintained within the VANET infrastructure

    Survey on Security for WSN based VANET using ECC

    Get PDF
    With the increase in population, there is an increase in the number of car users drastically. Around the world, either millions of people die due to car accidents or they are severely injured by the accident. Most of the accidents occur due to lack of common information the drivers, as the lane change, applying sudden break, traffic congestion, etc, are the causes of accidents. Safety information such as speed limits, road conditions, traffic status, accidents, etc..., are used in some countries, but still more work is to be achieved. Vehicular Ad Hoc Networks (VANET) should be implemented and they should collect and distribute necessary safety information to other vehicles. VANET is a combination of Road Side Units (RSU’s) and On-Board Units (OBU’s). These RSU’s and OBU’s consist of various sensors, which are used to collect various data. The data collected by the sensors on the OBU’s on the vehicles can either be sent to another vehicle or can be displayed to the driver. Similarly, the sensor collects data at the RSU and sends the data to other RSU or depending on its nature and importance, the RSU may even be broadcasted to other vehicles. The main objective is to provide safety to the drivers, the passengers and to the information that is being transmitted between the nodes. However, in some scenarios, VANET’s may not guarantee timely detection of issues or any type of dangerous. We propose a solution by the integration of VANET and WSN to create a hybrid infrastructure with the in inexpensive wireless sensor nodes integrated on RSU’s along the roadside and on the OBU’s in the vehicle. As the new hybrid structure is proposed, there may be challenges that may occur. This article discussed these challenges and solutions to create an efficient and well-organized VANET-WSN Hybrid network

    Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment

    No full text
    The cloud provides on-demand, high-quality services to its users without the burden of managing hardware and software. Though the users benefit from the remote services provided by the cloud, they do not have their personal data in their physical possession. This certainly poses new security threats for personal and confidential data, bringing the focus back on trusting the use of the cloud for sensitive data. The benefits of the cloud outweigh the concerns raised earlier, and with an increase in cloud usage, it becomes more important for security services to evolve in order to address the ever-changing threat landscape. Advanced encryption standard (AES), being one of the most widely used encryption techniques, has inherent disadvantages related to the secret key that is shared, and predictable patterns in subkey generation. In addition, since cloud storage involves data transfer over a wireless channel, it is important to address the effect of noise and multipath propagation on the transmitted data. Catering to this problem, we propose a new approach—the secure and reliable neural cryptcoding (SARNC) technique—which provides a superior algorithm, dealing with better encryption techniques combined with channel coding. A chain is as strong as the weakest link and, in the case of symmetric key encryption, the weakest link is the shared key. In order to overcome this limitation, we propose an approach wherein the key used for cryptographic purposes is different from the key shared between the sender and the receiver. The shared key is used to derive the secret private key, which is generated by the neural key exchange protocol. In addition, the proposed approach emphasizes strengthening the sub-key generation process and integrating advanced encryption standard (AES) with low-density parity check (LDPC) codes to provide end-to-end security and reliability over wireless channels. The proposed technique was tested against research done in related areas. A comparative study shows a significant improvement in PSNR, MSE, and the structural similarity index (SSIM). The key strength analysis was carried out to understand the strength and weaknesses of the keys generated

    A Survey on Brain-Computer Interface and Related Applications

    Full text link
    BCI systems are able to communicate directly between the brain and computer using neural activity measurements without the involvement of muscle movements. For BCI systems to be widely used by people with severe disabilities, long-term studies of their real-world use are needed, along with effective and feasible dissemination models. In addition, the robustness of the BCI systems' performance should be improved so they reach the same level of robustness as natural muscle-based health monitoring. In this chapter, we review the recent BCI related studies, followed by the most relevant applications of BCI systems. We also present the key issues and challenges which exist in regard to the BCI systems and also provide future directions
    corecore