Visible to the public Biblio

Filters: Keyword is Downlink  [Clear All Filters]
2023-09-01
Torres-Figueroa, Luis, Hörmann, Markus, Wiese, Moritz, Mönich, Ullrich J., Boche, Holger, Holschke, Oliver, Geitz, Marc.  2022.  Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment. GLOBECOM 2022 - 2022 IEEE Global Communications Conference. :4044—4050.
This paper assesses the impact on the performance that information-theoretic physical layer security (IT-PLS) introduces when integrated into a 5G New Radio (NR) system. For this, we implement a wiretap code for IT-PLS based on a modular coding scheme that uses a universal-hash function in its security layer. The main advantage of this approach lies in its flexible integration into the lower layers of the 5G NR protocol stack without affecting the communication's reliability. Specifically, we use IT-PLS to secure the transmission of downlink control information by integrating an extra pre-coding security layer as part of the physical downlink control channel (PDCCH) procedures, thus not requiring any change of the 3GPP 38 series standard. We conduct experiments using a real-time open-source 5G NR standalone implementation and use software-defined radios for over-the-air transmissions in a controlled laboratory environment. The overhead added by IT-PLS is determined in terms of the latency introduced into the system, which is measured at the physical layer for an end-to-end (E2E) connection between the gNB and the user equipment.
2023-05-19
Soosahabi, Reza, Bayoumi, Magdy.  2022.  On Securing MAC Layer Broadcast Signals Against Covert Channel Exploitation in 5G, 6G & Beyond. 2022 IEEE Future Networks World Forum (FNWF). :486—493.
In this work, we propose a novel framework to identify and mitigate a recently disclosed covert channel scheme exploiting unprotected broadcast messages in cellular MAC layer protocols. Examples of covert channel are used in data exfiltration, remote command-and-control (CnC) and espionage. Responsibly disclosed to GSMA (CVD-2021-0045), the SPAR-ROW covert channel scheme exploits the downlink power of LTE/5G base-stations that broadcast contention resolution identity (CRI) from any anonymous device according to the 3GPP standards. Thus, the SPARROW devices can covertly relay short messages across long-distance which can be potentially harmful to critical infrastructure. The SPARROW schemes can also complement the solutions for long-range M2M applications. This work investigates the security vs. performance trade-off in CRI-based contention resolution mechanisms. Then it offers a rig-orously designed method to randomly obfuscate CRI broadcast in future 5G/6G standards. Compared to CRI length reduction, the proposed method achieves considerable protection against SPARROW exploitation with less impact on the random-access performance as shown in the numerical results.
2022-08-26
Liang, Kai, Wu, Youlong.  2021.  Two-layer Coded Gradient Aggregation with Straggling Communication Links. 2020 IEEE Information Theory Workshop (ITW). :1—5.
In many distributed learning setups such as federated learning, client nodes at the edge use individually collected data to compute the local gradients and send them to a central master server, and the master aggregates the received gradients and broadcasts the aggregation to all clients with which the clients can update the global model. As straggling communication links could severely affect the performance of distributed learning system, Prakash et al. proposed to utilize helper nodes and coding strategy to achieve resiliency against straggling client-to-helpers links. In this paper, we propose two coding schemes: repetition coding (RC) and MDS coding both of which enable the clients to update the global model in the presence of only helpers but without the master. Moreover, we characterize the uplink and downlink communication loads, and prove the tightness of uplink communication load. Theoretical tradeoff between uplink and downlink communication loads is established indicating that larger uplink communication load could reduce downlink communication load. Compared to Prakash's schemes which require a master to connect with helpers though noiseless links, our scheme can even reduce the communication load in the absence of master when the number of clients and helpers is relatively large compared to the number of straggling links.
2022-02-10
Madi, Nadim K. M., Madi, Mohammed.  2020.  Analysis of Downlink Scheduling to Bridge between Delay and Throughput in LTE Networks. 2020 7th International Conference on Electrical and Electronics Engineering (ICEEE). :243–247.
The steady growing trend of user demand in using various 4G mobile broadband applications obligates telecom operators to thoroughly plan a precise Quality of Service (QoS) contract with its subscribers. This directly reveals a challenge in figuring out a sophisticated behavior of radio resources (RBs) at the base station to effectively handle the oscillated loads to fulfill their QoS profiles. This paper elaborates on the above issue by analyzing the behavior of the downlink packet scheduling scheme and proposes a solution to bridge between the two major QoS indicators for Real-Time (RT) services, that are, throughput and delay. The proposed scheduling scheme emphasizes that a prior RBs planning indeed has an immense impact on the behavior of the deployed scheduling rule, particularly, when heterogeneous flows share the channel capacity. System-level simulations are performed to evaluate the proposed scheduling scheme in a comparative manner. The numerical results of throughput and delay assured that diverse QoS profiles can be satisfied in case of considering RBs planning.
2021-01-25
Feng, Y., Sun, G., Liu, Z., Wu, C., Zhu, X., Wang, Z., Wang, B..  2020.  Attack Graph Generation and Visualization for Industrial Control Network. 2020 39th Chinese Control Conference (CCC). :7655–7660.
Attack graph is an effective way to analyze the vulnerabilities for industrial control networks. We develop a vulnerability correlation method and a practical visualization technology for industrial control network. First of all, we give a complete attack graph analysis for industrial control network, which focuses on network model and vulnerability context. Particularly, a practical attack graph algorithm is proposed, including preparing environments and vulnerability classification and correlation. Finally, we implement a three-dimensional interactive attack graph visualization tool. The experimental results show validation and verification of the proposed method.
2020-09-28
Park, Seok-Hwan, Simeone, Osvaldo, Shamai Shitz, Shlomo.  2018.  Optimizing Spectrum Pooling for Multi-Tenant C-RAN Under Privacy Constraints. 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). :1–5.
This work studies the optimization of spectrum pooling for the downlink of a multi-tenant Cloud Radio Access Network (C-RAN) system in the presence of inter-tenant privacy constraints. The spectrum available for downlink transmission is partitioned into private and shared subbands, and the participating operators cooperate to serve the user equipments (UEs) on the shared subband. The network of each operator consists of a cloud processor (CP) that is connected to proprietary radio units (RUs) by means of finite-capacity fronthaul links. In order to enable inter-operator cooperation, the CPs of the participating operators are also connected by finite-capacity backhaul links. Inter-operator cooperation may hence result in loss of privacy. The problem of optimizing the bandwidth allocation, precoding, and fronthaul/backhaul compression strategies is tackled under constraints on backhaul and fronthaul capacity, as well as on per-RU transmit power and inter-onerator privacy.
2020-09-08
Meenu, M, Raajan, N.R., Greeta, S.  2019.  Secured Transmission of Data Using Chaos in Wcdma Network. 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN). :1–5.
Spreading code assumes an indispensable work in WCDMA system. Every individual client in a cell is isolated by an exceptional spread code. PN grouping are commonly utilized in WCDMA framework. For example, Walsh codes or gold codes as spread code. Data received from WCDMA are transmitted using chaotic signal and that signal is generated by using logistic map. It is unsuitable to be utilized as spreading sequence. Using a threshold function the chaos signal is changed in the form of binary sequence. Consequently, QPSK modulation techniques is analyzed in W-CDMA downlink over Additive white Gaussian noise channel (AWGN) and Rayleigh multipath fading channel. The activity was assessed with the assistance of BER contrary to SNR utilizing parameters indicating the BER in low to high in SNR.
2020-02-17
Firdaus, Muhammad, Haryadi, Sigit, Shalannanda, Wervyan.  2019.  Sleeping Cell Analysis in LTE Network with Self-Healing Approach. 2019 IEEE 13th International Conference on Telecommunication Systems, Services, and Applications (TSSA). :261–266.
In cellular network systems, it is commonly found that many errors or failures are caused by non-functioning components or human errors. Most failures are detected by a centralized Operation and Maintenance (OAM) software which will trigger an alarm as a form of warning. In fact, there are conditions when a failure or error occurs, but it cannot be detected by OAM software, which in turn will result in many complaints coming from customers. An event like this is called a sleeping cell, which is a condition where the network has a poor performance but does not generate alarm notifications in the Operation and Maintenance Center. In this paper, sleeping cell analysis was carried out on the LTE network using a self-healing approach to speed up the cell outage detection process. The process of sleeping cell analysis was based on the database of cell performance daily for all eNodeB located in West Java, referring the uplink and downlink values as the main parameters. The acquired database would then be processed and analyzed by the measurement method based on inference statistics, where this method would process a portion of the research data (sample), to draw the conclusions regarding the characteristics of the overall data population. Furthermore, data analysis was performed with signaling ladder diagram (SLD) approach to observe the signaling flow on the network, specifically in the uplink and downlink process, which is the initial indication of a sleeping cell.
2019-03-25
Son, W., Jung, B. C., Kim, C., Kim, J. M..  2018.  Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security. 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN). :382–384.
In this paper, we propose a novel pseudo-random beamforming technique with beam selection for improving physical-layer security (PLS) in a downlink cellular network where consists of a base station (BS) with Ntantennas, NMSlegitimate mobile stations (MSs), and NEeavesdroppers. In the proposed technique, the BS generates multiple candidates of beamforming matrix each of which consists of orthogonal beamforming vectors in a pseudo-random manner. Each legitimate MS opportunistically feeds back the received signal-to-interference-and-noise ratio (SINR) value for all beamforming vectors to the BS. The BS transmits data to the legitimate MSs with the optimal beamforming matrix among multiple beam forming matrices that maximizes the secrecy sum-rate. Simulation results show that the proposed technique outperforms the conventional random beamforming technique in terms of the achievable secrecy sum-rate.
2018-06-07
Zhaoye, X., Ruimin, L..  2017.  Physical layer security transmission in cognitive radio network composed of multi-downlinks SU network. 2017 IEEE 17th International Conference on Communication Technology (ICCT). :898–901.
In cognitive radio network, the primary user (PU) network and the secondary user (SU) network interfered with each other because of sharing the spectral resource. Also interference among multi-downlinks in SU network decreased the sum rate in SU network and the eavesdropper in PU network decreased the secrecy rate in PU network. Focusing on above problem, this paper raised two channel selection and beamforming methods based on singular value decomposition (SVD) and uplink-downlink duality respectively, and then analyzed the performance of them in physical layer security.
2015-05-05
Khojastepour, M.A., Aryafar, E., Sundaresan, K., Mahindra, R., Rangarajan, S..  2014.  Exploring the potential for full-duplex in legacy LTE systems. Sensing, Communication, and Networking (SECON), 2014 Eleventh Annual IEEE International Conference on. :10-18.

With the growing demand for increased spectral efficiencies, there has been renewed interest in enabling full-duplex communications. However, existing approaches to enable full-duplex require a clean-slate approach to address the key challenge in full-duplex, namely self-interference suppression. This serves as a big deterrent to enabling full-duplex in existing cellular networks. Towards our vision of enabling full-duplex in legacy cellular, specifically LTE networks, with no modifications to existing hardware at BS and client as well as technology specific industry standards, we present the design of our experimental system FD-LTE, that incorporates a combination of passive SI cancellation schemes, with legacy LTE half-duplex BS and client devices. We build a prototype of FD-LTE, integrate it with LTE's evolved packet core and conduct over-the-air experiments to explore the feasibility and potential for full-duplex with legacy LTE networks. We report promising experimental results from FD-LTE, which currently applies to scenarios with limited ranges that is typical of small cells.