ARQ secrecy over correlated fading channels
In this paper, we develop novel Automatic Repeat reQuest (ARQ) key sharing protocols for correlated fading channels. In particular, a novel role of "dumb antennas" in overcoming the negative impact of spatial correlation, on the achievable secrecy rates , is unveiled. We further develop an adaptive rate allocation policy which achieves higher secrecy rates by exploiting the channel temporal correlation. The performance gains offered by the proposed schemes are demonstrated by a comprehensive set of numerical results.
ARQ secrecy: From theory to practice
Inspired by our earlier work on Automatic Repeat reQuest (ARQ) secrecy, we propose a simple, yet efficient, security overlay protocol to existing 802.11 networks. Our work targets networks secured by theWired Equivalent Privacy (WEP) protocol because of its widespread use and vulnerability to a multitude of security threats. By exploiting the existing ARQ protocol in the 802.11 standard, our proposed opportunistic secrecy scheme is shown to defend against all known passive WEP attacks. Moreover, our implementation on the madwifi-ng driver is used to establish the achievability of a vanishing
Asymmetrical clipping optical filter bank multi-carrier modulation scheme
Filter bank multi-carrier (FBMC) is considered a promising alternative to the Orthogonal Frequency Division Multiplexing (OFDM) scheme. It improves spectral efficiency by eliminating the need for cyclic prefix while attenuating interference due to the robustness of the out-of-band emission. In this work, we present a framework, and the performance evaluation of FBMC is a multi-carrier modulation scheme for the direct detection of optical communications. As the proposed model has higher spectral efficiency than the classical ACO-OFDM, as removing the guard interval enhances the spectral
Authentication over noisy channels
An authentication counterpart of Wyner's study of the wiretap channel is developed in this work. More specifically, message authentication over noisy channels is studied while impersonation and substitution attacks are investigated for both single- and multiple-message scenarios. For each scenario, information-theoretic lower and upper bounds on the opponent's success, or cheating, probability are derived. Remarkably, in both scenarios, the lower and upper bounds are shown to match, and hence, the fundamental limits on message authentication over noisy channels are fully characterized. The
Towards Extended Bit Tracking for Scalable and Robust RFID Tag Identification Systems
The surge in demand for Internet of Things (IoT) systems and applications has motivated a paradigm shift in the development of viable radio frequency identification technology (RFID)-based solutions for ubiquitous real-Time monitoring and tracking. Bit tracking-based anti-collision algorithms have attracted considerable attention, recently, due to its positive impact on decreasing the identification time. We aim to extend bit tracking to work effectively over erroneous channels and scalable multi RFID readers systems. Towards this objective, we extend the bit tracking technique along two
Interference-based optimal power-efficient access scheme for cognitive radio networks
In this paper, we propose a new optimization-based access strategy of multi-packet reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum. We devise an analytical model that realizes the multi-packet access strategy of the SUs. All the network receiving nodes have MPR capability. We aim at maximizing the throughput of the individual SUs subject to the PU's queue stability. Moreover, we are interested in providing an energy-efficient cognitive scheme. Therefore, we include energy constraints on the PU and SU average transmitted energy to the
Content Delivery in Mobility-Aware D2D Caching Networks
The massive data exchange between base stations and network backhaul creates a strong overhead on mobile networks, especially at peak times. This motivates researchers to think about the proactive caching concept which depends mainly on caching some of the expected data items during off-peak times. The caching problem consists of two distinct phases, placement phase and delivery phase. In this work, we consider a mobility-aware device-to-device (D2D) caching network. We assume that data contents were already cached in users devices during the content placement phase and we focus on the content
Joint power allocation and beamforming for multiuser MIMO two-way relay networks
In this paper, a multiuser cellular two-way relaying scenario is considered where multiple single-antenna mobile stations (MSs) and one multiple-antenna base station (BS) communicate, bidirectionally, via one half-duplex multiple-antenna relay station (RS). Furthermore, the case when the number of antennas at the RS is not sufficient to decode the individual messages is addressed. For this case, a two-phase two-way relaying scenario is considered. In the first phase, the multiple access, a minimum Mean Square Error (MSE) optimization problem is formulated which is found to be non-convex. Thus
Tactile sensing biohybrid soft E-skin based on bioimpedance using aloe vera pulp tissues
Soft and flexible E-skin advances are a subset of soft robotics field where the soft morphology of human skin is mimicked. The number of prototypes that conformed the use of biological tissues within the structure of soft robots—to develop “Biohybrid Soft Robots”—has increased in the last decade. However, no research was conducted to realize Biohybrid E-skin. In this paper, a novel biohybrid E-skin that provides tactile sensing is developed. The biohybrid E-skin highly mimics the human skin softness and morphology and can sense forces as low as 0.01 newton. The tactile sensing feature is
Odd clipping optical orthogonal frequency division multiplexing for VLC system
The Orthogonal Frequency Division Multiplexing (OFDM) has emerged as one of the promising techniques because of its robustness to multipath fading with high-speed data transmission. Classical bipolar OFDM cannot be used in intensity modulated with direct detection (IM/DD) optical communication systems, as visible light communication (VLC), so many optical modulation techniques as asymmetrical clipped optical OFDM (ACO-OFDM) and DC-Clipped OFDM (DCO-OFDM) have been investigated. In this paper, we introduce a novel optical modulation scheme that meets the optical communications requirements. The
Pagination
- Previous page ‹‹
- Page 14
- Next page ››