Visible to the public Biblio

Filters: Keyword is Coordinated Multi-Point  [Clear All Filters]
2022-10-16
Özmat, Utku, Demirkol, Mehmet Fatih, Demirci, Nuran, Yazıcı, Mehmet Akif.  2020.  Enhancing Physical Layer Security with Coordinated Multi-Point Transmission in 5G and Beyond Networks. 2020 28th Signal Processing and Communications Applications Conference (SIU). :1–4.
Physical layer security has gained importance with the widespread use of wireless communication systems. Multiantenna systems and multi-point transmission techniques in 5G and beyond are promising techniques not only for enhancing data rates, but also physical layer security. Coordinated multipoint transmission is used for enhancing the service quality and decreasing inter-cell interference especially for cell-edge users. In this study, analysis of physical layer security enhancement via multi-antenna technologies and coordinated multi-point for 5G and beyond networks is provided. The proposed scheme is evaluated on calculations from real-life mobile network topologies. As a figure of performance, the secure and successful detection probability is computed with varying antenna array size, number of coordinated transmission points, and different service requirements.
2022-05-06
Peng, Zheng, Han, Xu, Ye, Yun.  2021.  Enhancing Underwater Sensor Network Security with Coordinated Communications. ICC 2021 - IEEE International Conference on Communications. :1—6.
In recent years, the underwater sensor network has emerged as a promising solution for a wide range of marine applications. The underwater wireless sensors are usually designed to operate in open water, where eavesdropping can be a serious issue. Existing work either utilizes cryptography that is computationally intensive or requires expensive hardware. In this paper, we present a coordinated multi-point transmission based protocol to improve network security. The proposed protocol dynamically pairs sensors for coordinated communications to undermine the eavesdroppers’ capability. Our preliminary results indicate that the underwater sensor network security can be enhanced using the proposed method, especially in applications where cryptography or special hardware are not suitable.