41 research outputs found

    Lightweight and Practical Anonymous Authentication Protocol for RFID systems using physically unclonable functions

    Get PDF
    Radio frequency identification (RFID) has been considered one of the imperative requirements for implementation of Internet-of-Things applications. It helps to solve the identification issues of the things in a cost-effective manner, but RFID systems often suffer from various security and privacy issues. To solve those issues for RFID systems, many schemes have been recently proposed by using the cryptographic primitive, called physically uncloneable functions (PUFs), which can ensure a tamper-evident feature. However, to the best of our knowledge, none of them has succeeded to address the problem of privacy preservation with the resistance of DoS attacks in a practical way. For instance, existing schemes need to rely on exhaustive search operations to identify a tag, and also suffer from several security and privacy related issues. Furthermore, a tag needs to store some security credentials (e.g., secret shared keys), which may cause several issues such as loss of forward and backward secrecy and large storage costs. Therefore, in this paper, we first propose a lightweight privacy-preserving authentication protocol for the RFID system by considering the ideal PUF environment. Subsequently, we introduce an enhanced protocol which can support the noisy PUF environment. It is argued that both of our protocols can overcome the limitations of existing schemes, and further ensure more security properties. By analyzing the performance, we have shown that the proposed solutions are secure, efficient, practical, and effective for the resource-constraint RFID tag

    Shadowing Time-Scale Admission and Power Control for Small Cell Networks

    No full text
    978-1-4673-4533-0International audienceSmall cell networks are widely considered as an efficient low-cost solution to enhance the coverage and capacity of cellular layers on top of being environmentally friendly due to their low energy consumption. However, due to their aggressive spectrum reuse, it is important to properly control interference in such networks before deploying them on a large-scale basis. In this paper, we investigate the joint admission and power control problem in two-tier small cell networks. We aim to maximize the number of small cell users that can be admitted at their desired quality-of-service (QoS) without violating the macrocell users' QoS. However, it can be computationally challenging to perform adaptation at the fast fading time-scale. It also requires substantial signaling overhead due to feedback of channel state information. Therefore, we propose a joint admission and power control method where the QoS metric used is outage constraint so that the algorithm can adapt at a much slower log-normal shadowing time-scale. Even though this joint admission and power control problem is NP-hard, convex relaxation can be used to obtain high quality approximate solutions that demonstrate near optimal performance

    Slow admission and power control for small cell networks via distributed optimization

    No full text
    International audienceAlthough small cell networks are environmentally friendly and can potentially improve the coverage and capacity of cellular layers, it is imperative to control the interference in such networks before overlaying them in a macrocell network on a large-scale basis. In recent work, we developed the joint admission and power control algorithm for two-tier small cell networks in which the number of small cell users that can be admitted at their quality-of-service (QoS) constraints is maximized without violating the macrocell users' QoS constraints. The QoS metric adopted is outage probability. In this paper, we investigate the distributed implementation of the joint admission and power control problem where the small cells can determine jointly their admissibility and transmit powers autonomously

    Adaptive Compression and Joint Detection for Fronthaul Uplinks in Cloud Radio Access Networks

    Get PDF
    Cloud radio access network (C-RAN) has recently attracted much attention as a promising architecture for future mobile networks to sustain the exponential growth of data rate. In C-RAN, one data processing center or baseband unit (BBU) communicates with users via distributed remote radio heads (RRHs), which are connected to the BBU via high capacity, low latency fronthaul links. In this paper, we study the compression on fron- thaul uplinks and propose a joint decompression algorithm at the BBU. The central premise behind the proposed algorithm is to ex- ploit the correlation between RRHs. Our contribution is threefold. First, we propose a joint decompression and detection (JDD) algorithm which jointly performs decompressing and detecting. The JDD algorithm takes into consideration both the fading and compression effect in a single decoding step. Second, block error rate (BLER) of the proposed algorithm is analyzed in closed-form by using pair-wise error probability analysis. Third, based on the analyzed BLER, we propose adaptive compression schemes subject to quality of service (QoS) constraints to minimize the fronthaul transmission rate while satisfying the pre-defined target QoS. As a dual problem, we also propose a scheme to minimize the signal distortion subject to fronthaul rate constraint. Numerical re- sults demonstrate that the proposed adaptive compression schemes can achieve a compression ratio of 300% in experimental setups

    Cross-layer design for mission-critical IoT in mobile edge computing systems

    Get PDF
    In this paper, we establish a cross-layer framework for optimizing user association, packet offloading rates, and bandwidth allocation for mission-critical Internet-of-Things (MC-IoT) services with short packets in mobile edge computing (MEC) systems, where enhanced mobile broadband (eMBB) services with long packets are considered as background services. To reduce communication delay, the fifth generation new radio is adopted in radio access networks. To avoid long queueing delay for short packets from MC-IoT, processor-sharing (PS) servers are deployed at MEC systems, where the service rate of the server is equally allocated to all the packets in the buffer. We derive the distribution of latency experienced by short packets in closed form, and minimize the overall packet loss probability subject to the end-to-end delay requirement. To solve the nonconvex optimization problem, we propose an algorithm that converges to a near optimal solution when the throughput of eMBB services is much higher than MC-IoT services, and extend it into more general scenarios. Furthermore, we derive the optimal solutions in two asymptotic cases: communication or computing is the bottleneck of reliability. The simulation and numerical results validate our analysis and show that the PS server outperforms first-come-first-serve servers

    Power Optimization With BLER Constraint for Wireless Fronthauls in C-RAN

    Get PDF
    Cloud radio access network (C-RAN) is a novel architecture for future mobile networks to sustain the exponential traffic growth thanks to the exploitation of centralized processing. In C-RAN, one data processing center or baseband unit (BBU) communicates with users via distributed remote radio heads (RRHs), which are connected to the BBU via high capacity, low latency fronthaul links. In this letter, we study C-RAN with wireless fronthauls due to their flexibility in deployment and management. First, a tight upper bound of the system block error rate (BLER) is derived in closed-form expression via union bound analysis. Based on the derived bound, adaptive transmission schemes are proposed. Particularly, two practical power optimizations based on the BLER and pair-wise error probability (PEP) are proposed to minimize the consumed energy at the RRHs while satisfying the predefined quality of service (QoS) constraint. The premise of the proposed schemes originates from practical scenarios where most applications tolerate a certain QoS, e.g., a nonzero BLER. The effectiveness of the proposed schemes is demonstrated via intensive simulations

    Characterization and Control of Conservative and Non-conservative Network Dynamics

    Get PDF
    Diffusion processes are instrumental to describe the movement of a continuous quantity in a network of interacting agents. Here, we present a framework for diffusion in networks and study in particular two classes of agent interactions depending on whether the total network quantity follows a conservation law. Focusing on probabilistic, asymmetric interactions between agents, we define how the dynamics of conservative and non-conservative networks relate to the weighted in-degree and out-degree Laplacians. For uncontrolled networks, we compare the convergence behavior of both types of networks as a function of the eigenvectors of the weighted graph Laplacians. For networks with exogenous controls, we also analyze convergence and provide a method to measure the difference between conservative and non-conservative network dynamics based on the comparison of their respective reachable sets. The presented network control framework enables the comparative study of the dynamic and asymptotic network behavior for conservative and non-conservative networks

    Adaptive Cloud Radio Access Networks: Compression and Optimization

    Get PDF
    Future mobile networks are facing with exponential data growth due to the proliferation of diverse mobile equipment and data-hungry applications. Among promising technology candidates to overcome this problem, cloud radio access network (CRAN) has received much attention. In this work, we investigate the design of fronthaul in C-RAN uplink by focusing on the compression and optimization in fronthaul uplinks based on the statistics of wireless fading channels. First, we derive the system block error rate (BLER) under Rayleigh fading channels. In particular, upper and lower bounds of the BLER union bound are obtained in closed-form. From these bounds, we gain insight in terms of diversity order and limits of the BLER. Next, we propose adaptive compression schemes to minimize the fronthaul transmission rate subject to a BLER constraint. Furthermore, a fronthaul rate allocation is proposed to minimize the system BLER. It is shown that the uniform rate allocation approaches the optimal scheme as the total fronthauls’ bandwidth increases. Lastly, numerical results are presented to demonstrate the effectiveness of our proposed optimizations

    Hybrid Division Duplex for Cognitive Small Cell Networks

    No full text
    International audienc
    corecore