More and more devices, such as Bluetooth and IEEE 802.15.4 devices forming Wireless Personal Area Networks (WPANs) and IEEE 802.11 devices constituting Wireless Local Area Networks (WLANs), share the ...2.4 GHz Industrial, Scientific and Medical (ISM) band in the realm of the Internet of Things (IoT) and Smart Cities. However, the coexistence of these devices could pose a real challenge-co-channel interference that would severely compromise network performances. Although the coexistence issues has been partially discussed elsewhere in some articles, there is no single review that fully summarises and compares recent research outcomes and challenges of IEEE 802.15.4 networks, Bluetooth and WLANs together. In this work, we revisit and provide a comprehensive review on the coexistence and interference mitigation for those three types of networks. We summarize the strengths and weaknesses of the current methodologies, analysis and simulation models in terms of numerous important metrics such as the packet reception ratio, latency, scalability and energy efficiency. We discover that although Bluetooth and IEEE 802.15.4 networks are both WPANs, they show quite different performances in the presence of WLANs. IEEE 802.15.4 networks are adversely impacted by WLANs, whereas WLANs are interfered by Bluetooth. When IEEE 802.15.4 networks and Bluetooth co-locate, they are unlikely to harm each other. Finally, we also discuss the future research trends and challenges especially Deep-Learning and Reinforcement-Learning-based approaches to detecting and mitigating the co-channel interference caused by WPANs and WLANs.
Device-to-Device (D2D) communication has emerged as a promising technology for optimizing spectral efficiency in future cellular networks. D2D takes advantage of the proximity of communicating ...devices for efficient utilization of available resources, improving data rates, reducing latency, and increasing system capacity. The research community is actively investigating the D2D paradigm to realize its full potential and enable its smooth integration into the future cellular system architecture. Existing surveys on this paradigm largely focus on interference and resource management. We review recently proposed solutions in over explored and under explored areas in D2D. These solutions include protocols, algorithms, and architectures in D2D. Furthermore, we provide new insights on open issues in these areas. Finally, we discuss potential future research directions.
With the increase in the number of Internet of Things (IoT) applications, the reliance on robust networking, reliable communications, and efficient and secure data storage is increasing day by day. ...Many of these applications such as cellular communications, transportation networks and Internet of Medical Things generate huge volumes of data that need to be stored and analyzed to generate insights and make decisions related to applications. Security of data storage is a paramount concern, particularly in the current cyber security threat landscape. It is important to design novel techniques and algorithms to protect the data against these upcoming attacks. This paper provides a brief overview of security challenges faced by the data storage mechanisms. In comparison to the existing review papers in this area, the work in this paper identifies three major security techniques for data storage and conducts a comprehensive review of the recent advancements related to these techniques. These techniques include Blockchain algorithms, encryption mechanisms, and deduplication algorithms for data storage. Finally, the work highlights future opportunities and challenges related to secure data storage in future networks.
Automotive-Industry 5.0 will use emerging 6G communications to provide robust, computationally intelligent, and energy-efficient data sharing among various onboard sensors, vehicles, and other ...intelligent transportation system entities. Nonorthogonal multiple access (NOMA) and backscatter communications are two key techniques of 6G communications for enhanced spectrum and energy efficiency. In this article, we provide an introduction to green transportation and also discuss the advantages of using backscatter communications and NOMA in Automotive Industry 5.0. We also briefly review the recent work in the area of NOMA empowered backscatter communications. We discuss different use cases of backscatter communications in NOMA-enabled 6G vehicular networks. We also propose a multicell optimization framework to maximize the energy efficiency of the backscatter-enabled NOMA vehicular network. In particular, we jointly optimize the transmit power of the roadside unit and the reflection coefficient of the backscatter device in each cell, where several practical constraints are also taken into account. The problem of energy efficiency is formulated as nonconvex, which is hard to solve directly. Thus, first, we adopt the Dinkelbach method to transform the objective function into a subtractive one, then we decouple the problem into two subproblems. Second, we employ dual theory and KKT conditions to obtain efficient solutions. Finally, we highlight some open issues and future research opportunities related to NOMA-enabled backscatter communications in 6G vehicular networks.
Security and reliability are the major requirements for the successful implementation of Internet of Things (IoT) applications in smart cities such as healthcare. IoT networks are subject to various ...types of network attacks that can put critical IoT data at risk. To mitigate these security issues, robust security algorithms based on Elliptic Curve Cryptography (ECC) may be utilized. However, using such cryptographic techniques requires additional delay for signing/encrypting and verification/decryption of the messages. Hence, there is a tradeoff between the security strength of the algorithm and packet delay. In this paper, we present a novel technique to adaptively select the key size of ECC-based algorithms for multi-hop IoT networks. The proposed technique uses k-means clustering to classify the secrecy rates of the potential relay nodes into k clusters. We allocate lower key sizes to the relay nodes that have the highest secrecy rates and thus have better physical layer security. The key sizes and security strengths are selected as per the recommendation of the National Institute of Standards and Technology (NIST). The second part of the work utilizes the Hungarian algorithm to select the best relay nodes for each source-destination transmission to minimize the total delay. The techniques are implemented in MATLAB and results show that the total delay of the proposed technique is improved by 57% as compared to other techniques in the literature.
Unmanned aerial vehicles (UAVs) are an important component of next-generation wireless networks that can assist in high data rate communications and provide enhanced coverage.Their high mobility and ...aerial nature offer deployment flexibility and low-cost infrastructure support to existing cellular networks and provide many applications that rely on mobile wireless communications. However, security is a major challenge in UAV communications, and physical layer security (PLS) is an important technique to improve the reliability and security of data shared with the assistance of UAVs. Recently, the intelligent reflective surface (IRS) has emerged as a novel technology to extend and/or enhance wireless coverage by reconfiguring the propagation environment of communications. This article provides an overview of how the IRS can improve the PLS of UAV networks. We discuss different use cases of PLS for IRS-enhanced UAV communications and briefly review the recent advances in this area. Then, based on the recent advances, we also present a case study that utilizes alternate optimization to maximize the secrecy capacity for an IRS-enhanced UAV scenario in the presence of multiple Eves. Finally, we highlight several open issues and research challenges to realize PLS in IRS-enhanced UAV communications.
The reliable transmission of multimedia information that is coded through highly compression efficient encoders is a challenging task. This article presents the iterative convergence performance of ...IrRegular Convolutional Codes (IRCCs) with the aid of the multidimensional Sphere Packing (SP) modulation assisted Differential Space Time Spreading Codes (IRCC-SP-DSTS) scheme for the transmission of H.264/Advanced Video Coding (AVC) compressed video coded stream. In this article, three different regular and irregular error protection schemes are presented. In the presented Regular Error Protection (REP) scheme, all of the partitions of the video sequence are regular error protected with a rate of 3/4 IRCC. In Irregular Error Protection scheme-1 (IREP-1) the H.264/AVC partitions are prioritized as A, B & C, respectively. Whereas, in Irregular Error Protection scheme-2 (IREP-2), the H.264/AVC partitions are prioritized as B, A, and C, respectively. The performance of the iterative paradigm of an inner IRCC and outer Rate-1 Precoder is analyzed by the EXtrinsic Information Transfer (EXIT) Chart and the Quality of Experience (QoE) performance of the proposed mechanism is evaluated using the Bit Error Rate (BER) metric and Peak Signal to Noise Ratio (PSNR)-based objective quality metric. More specifically, it is concluded that the proposed IREP-2 scheme exhibits a gain of 1 dB Eb/N0 with reference to the IREP-1 and Eb/N0 gain of 0.6 dB with reference to the REP scheme over the PSNR degradation of 1 dB.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
Unmanned Ariel Vehicles (UAVs) are flying objects whose trajectory can be remotely controlled. UAVs have lot of potential applications in the areas of wireless communications, internet of things, ...security, traffic management, monitoring, and smart surveying. By enabling reliable communication between UAVs and ground nodes, emergency notifications can be efficiently and quickly disseminated to a wider area. UAVs can gather data from remote areas, industrial units, and emergency scenarios without human involvement. UAVs can support ubiquitous connectivity, green communications, and intelligent wireless resource management. To efficiently use UAVs for all these applications, important challenges need to be investigated. In this paper, we first present a detailed classification of UAVs based on factors such as their size, communication range, weight, and flight altitude. We also explain the hardware system configuration and uses of these UAVs. We present a brief overview of recent work done related to three major challenges in UAVs. These challenges include trajectory control, energy efficiency and resource allocation. We also present three open challenges and future opportunities for efficient UAV communications. These include use of learning algorithms for resource allocation and energy efficiency in UAVs, intelligent surfaces-based communications for enhanced reliability in UAVs, and security algorithms to combat malicious attacks against UAVs.
Vehicular Sensor Networks (VSNs) are foreseen as a promising technology that can provide safe and reliable road travel in smart cities. By establishing pervasive connectivity among vehicles and ...infrastructure units on the road, various intelligent transport applications could be realized. Efficient network security for VSNs thus becomes a key challenge to reliably implement these applications. However, robust security techniques incur high security overhead and processing delays which significantly impact Quality of Service (QoS) particularly in a dense traffic scenario. In this paper, we propose a trust-based security adaptation mechanism to improve the QoS of safety applications in VSNs. The trust level is calculated using connectivity duration, security level and centrality metrics of nearby vehicles. The simulation results we have obtained with our proposed research shows an improvement of 25–65% in terms of safety awareness and 33–53% improvement in terms of packet inter-arrival time of safety applications in VSNs.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
Fog computing is a promising technology that can provide storage and computational services to future 6G networks. To support the massive Internet-of-Things (IoT) applications in 6G, fog computing ...will play a vital role. IoT devices and fog nodes have energy limitations and hence, energy-efficient techniques are needed for storage and computation services. We present an overview of massive IoT and 6G-enabling technologies. We discuss different energy-related challenges that arise while using fog computing in 6G-enabled massive IoT. We categorize different energy-efficient fog computing solutions for IoT and describe the recent work done in these categories. Finally, we discuss future opportunities and open challenges in designing energy-efficient techniques for fog computing in the future 6G massive IoT network.