Metasurfaces have drawn significant attentions due to their superior capability in tailoring electromagnetic waves with a wide frequency range,from microwave to visible light.Recently,programmable metasurfaces have de...Metasurfaces have drawn significant attentions due to their superior capability in tailoring electromagnetic waves with a wide frequency range,from microwave to visible light.Recently,programmable metasurfaces have demonstrated the ability of manipulating the amplitude or phase of electromagnetic waves in a programmable manner in real time,which renders them especially appealing in the applications of wireless communications.In this paper,we present the fundamental principle of applying programmable metasurface as transmitter for wireless communications.Then,we establish a prototype system of metasurface-based transmitter to conduct several experiments and measurements over the air,which practically demonstrate the feasibility of using programmable metasurfaces in future communication systems.By exploiting the dynamically controllable property of programmable metasurface,the design,implementation and experimental evaluation of the proposed metasurface-based wireless communication system are presented with the prototype,which realizes single carrier quadrature phase shift keying(QPSK)transmission over the air.In the developed prototype,the phase of the reflected electromagnetic wave of programma-ble metasurface is directly manipulated in real time according to the baseband control signal,which achieves 2.048 Mbps data transfer rate with video streaming transmission over the air.In addition,experimental result is provided to compare the performance of the proposed metasurface-based architecture against the conventional one.With the slight increase of the transmit power by 5 dB,the same bit error rate(BER)performance can be achieved as the conventional system in the absence of channel coding.Such a result is encouraging considering that the metasurface-based system has the advantages of low hardware cost and simple structure,thus leading to a promising new architecture for wireless communications.展开更多
The fifth generation(5G) network is expected to support significantly large amount of mobile data traffic and huge number of wireless connections,to achieve better spectrum- and energy-efficiency,as well as quality of...The fifth generation(5G) network is expected to support significantly large amount of mobile data traffic and huge number of wireless connections,to achieve better spectrum- and energy-efficiency,as well as quality of service(QoS) in terms of delay,reliability and security.Furthermore,the 5G network shall also incorporate high mobility requirements as an integral part,providing satisfactory service to users travelling at a speed up to 500 km/h.This paper provides a survey of potential high mobility wireless communication(HMWC) techniques for 5G network.After discussing the typical requirements and challenges of HMWC,key techniques to cope with the challenges are reviewed,including transmission techniques under the fast timevarying channels,network architecture with mobility support,and mobility management.Finally,future research directions on 5G high mobility communications are given.展开更多
The properties of broadcast nature, high densities of deployment and severe resource limitations of sensor and mobile networks make wireless networks more vulnerable to various attacks, including modification of messa...The properties of broadcast nature, high densities of deployment and severe resource limitations of sensor and mobile networks make wireless networks more vulnerable to various attacks, including modification of messages, eavesdropping, network intrusion and malicious forwarding. Conventional cryptography-based security may consume significant overhead because of low-power devices, so current research shifts to the wireless physical layer for security enhancement. This paper is mainly focused on security issues and solutions for wireless communications at the physical layer. It first describes the RSSI-based and channel based wireless authentication methods respectively, and presents an overview of various secrecy capacity analyses of fading channel, MIMO channel and cooperative transmission, and then examines different misbehavior detection methods. Finally it draws conclusions and introduces the direction of our future work.展开更多
This paper focuses on the design and implementation of an active multibeam antenna system for massive MIMO applications in 5G wireless communications.The highly integrated active multibeam antenna system is designed a...This paper focuses on the design and implementation of an active multibeam antenna system for massive MIMO applications in 5G wireless communications.The highly integrated active multibeam antenna system is designed and implemented at 5.8 GHz with 64 RF Channels and 256 antenna elements.The 64-channel highly integrated active multibeam antenna system provides a verification platform for digital beamforming algorithm and massive MIMO channel estimation for next generation wireless communications.展开更多
Compared with wired communication,the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature.To prevent eavesdropping,many researches on transmission techniques o...Compared with wired communication,the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature.To prevent eavesdropping,many researches on transmission techniques or cryptographic methods are carried out.This paper proposes a new index parameter named as eavesdropping area,to evaluate the anti-eavesdropping performance of wireless system.Given the locations of legitimate transmitter and receiver,eavesdropping area index describes the total area of eavesdropping regions where messages can be wiretapped in the whole evaluating region.This paper gives detailed explanations about its concept and deduces mathematical formulas about performance curves based on region classification.Corresponding key system parameters are analyzed,including the characteristics of eavesdropping region,transmitted beam pattern,beam direction,receiver sensitivity,eavesdropping sensitivity,path loss exponent and so on.The proposed index can give an insight on the confirmation of high-risk eavesdropping region and formulating optimal transmitting scheme for the confidential communications to decrease the eavesdropping probability.展开更多
Advanced technologies are required in future mobile wireless networks to support services with highly diverse requirements in terms of high data rate and reliability,low latency,and massive access.Deep Learning(DL),on...Advanced technologies are required in future mobile wireless networks to support services with highly diverse requirements in terms of high data rate and reliability,low latency,and massive access.Deep Learning(DL),one of the most exciting developments in machine learning and big data,has recently shown great potential in the study of wireless communications.In this article,we provide a literature review on the applications of DL in the physical layer.First,we analyze the limitations of existing signal processing techniques in terms of model accuracy,global optimality,and computational scalability.Next,we provide a brief review of classical DL frameworks.Subsequently,we discuss recent DL-based physical layer technologies,including both DL-based signal processing modules and end-to-end systems.Deep neural networks are used to replace a single or several conventional functional modules,whereas the objective of the latter is to replace the entire transceiver structure.Lastly,we discuss the open issues and research directions of the DL-based physical layer in terms of model complexity,data quality,data representation,and algorithm reliability.展开更多
In industrial wireless scenarios,the impulsive noise(IN)incurred by machine running or operation causes a serious influence on the powerlimited industrial wireless communications.It is challenging to ensure efficient ...In industrial wireless scenarios,the impulsive noise(IN)incurred by machine running or operation causes a serious influence on the powerlimited industrial wireless communications.It is challenging to ensure efficient and reliable transmission with quality of service(QoS)guarantee for machinetype communication devices(MTCDs).Considering the IN in the industrial process,this paper establishes the multiuser multiple-input single-output(MU-MISO)orthogonal frequency division multiplexing(OFDM)system model,which combines transmitter and receiver design.Two precoding schemes are designed to improve communication effectiveness at the transmitter.More specifically,the precoder design scheme which combines semi-definite relaxation(SDR)with difference-of-two-convex-function(D.C.)iterative algorithm,is developed by utilizing the Dinkelbach method to improve the system effectiveness.To decrease the computational complexity,we devise the quadratic-based fractional programming(QFP)algorithm,which decouples the variables by using a quadratic transform method.On this basis,the IN mitigation scheme is studied to reduce the system error rate(SER)at the receiver.With the goal of improving the reliability of industrial wireless communications,we propose a hybrid nonlinear IN mitigation(HNINM)scheme and then derive its closed-form expression of SER.The simulation results show that the proposed QFP algorithm achieves superior performance while the HNINM scheme decreases the SER of industrial wireless communications.展开更多
The high-speed railway and high-way networks are now expanding at a phenomenal speed in Chinaand in many other parts of the world. The related broadband wireless communication over high-speed trains and highway vehicl...The high-speed railway and high-way networks are now expanding at a phenomenal speed in Chinaand in many other parts of the world. The related broadband wireless communication over high-speed trains and highway vehicles is a very challenging task due to hostile transmission channel conditions. The demand for such services is growing rapidly, following the proliferation of laptop/tablet computers and smart phones. This motivates the research on wireless communications in the high mobility environments.展开更多
With the rapid deployment of Next-Generation Networks(NGN),the research community has initiated discussions on an entirely new suite of optical enabling techniques.To pave the way for the development of future wireles...With the rapid deployment of Next-Generation Networks(NGN),the research community has initiated discussions on an entirely new suite of optical enabling techniques.To pave the way for the development of future wireless networks,this article aims to unify the existing infrared,visible light,and ultraviolet subbands while also exploring the potential of the Petahertz(PHz)band to support extremely bandwidth-thirsfy telepresence style applications.Our focus is on the emerging Petahertz Communication(PetaCom)framework,scenario-dependent propagation channels,modulation schemes,system performance,multiple access techniques,and networking.We conclude with a range of PetaCom challenges and open research issues.展开更多
Modern wireless communications gadgets demand multi-standard communications facilities with least overlap between different input radio channels. A sharp digital filter of extremely narrow transition-width with lower ...Modern wireless communications gadgets demand multi-standard communications facilities with least overlap between different input radio channels. A sharp digital filter of extremely narrow transition-width with lower stop band ripples offers alias-free switching among the preferred frequency bands. A computationally competent low pass filter (LPF) structure based on the multistage frequency response masking (FRM) approach is proposed for the design of sharp finite impulse response (FIR) filters which are suitable for wireless communications applications. In comparison of basic FRM with other existing multistage FRM structures, the proposed structure has a narrow transition bandwidth and higher stop band attenuation with significant reduction in terms of the number of computational steps. A design example is incorporated to demonstrate the efficiency of the proposed approach. Simulation results establish the improvement of the proposed scheme over other recently published design strategies.展开更多
Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wirele...Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’uncertainty.However,the physical layer secret key generation(PHY-SKG)depends on two fundamental parameters,i.e.,coherence time and power allocation.The coherence time for PHY-SKG is not applicable to secure wireless channels.This is because coherence time is for a certain period of time.Thus,legitimate users generate the secret keys(SKs)with a shorter key length in size.Hence,an attacker can quickly get information about the SKs.Consequently,the attacker can easily get valuable information from authentic users.Therefore,we considered the scheme of power allocation to enhance the secret key generation rate(SKGR)between legitimate users.Hence,we propose an alternative method,i.e.,a power allocation,to improve the SKGR.Our results show 72%higher SKGR in bits/sec by increasing power transmission.In addition,the power transmission is based on two important parameters,i.e.,epsilon and power loss factor,as given in power transmission equations.We found out that a higher value of epsilon impacts power transmission and subsequently impacts the SKGR.The SKGR is approximately 40.7%greater at 250 from 50 mW at epsilon=1.The value of SKGR is reduced to 18.5%at 250 mW when epsilonis 0.5.Furthermore,the transmission power is also measured against the different power loss factor values,i.e.,3.5,3,and 2.5,respectively,at epsilon=0.5.Hence,it is concluded that the value of epsilon and power loss factor impacts power transmission and,consequently,impacts the SKGR.展开更多
Terahertz(THz)wireless communication has the capability to connect massive devices using its ultra-large spectrum resource.We propose a hybrid precoding scheme for the cluster-based multi-carrier beam division multipl...Terahertz(THz)wireless communication has the capability to connect massive devices using its ultra-large spectrum resource.We propose a hybrid precoding scheme for the cluster-based multi-carrier beam division multiple access(MC-BDMA)to enable THz massive connections.Both the inter-beam interference and inter-band power leakage in this system are considered.A mathematical model is established to analyze and reduce their effects on the THz signal transmission.By considering the peculiarities of THz channels and characteristics of THz hardware components,we further propose a three-step hybrid precoding algorithm with low complexity,where the received signal power enhancement,the inter-beam interference elimination,and the inter-band power leakage suppression are conducted in succession.Simulation results are presented to demonstrate the high spectrum efficiency and high energy efficiency of our proposed algorithm,especially in the massive-connection scenarios.展开更多
In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-respo...In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.展开更多
This paper presents the design of a fully packaged 60 GHz wideband patch antenna incorporating an air cavity and a fused silica superstrate. Circular polarization (CP) is realized by introducing a diagonal slot at the...This paper presents the design of a fully packaged 60 GHz wideband patch antenna incorporating an air cavity and a fused silica superstrate. Circular polarization (CP) is realized by introducing a diagonal slot at the center of the square patch. By optimizing the patch and the slot dimensions, a high efficiency (>90%) microstrip fed CP antenna with an impedance bandwidth of 24% and a 6 dB axial ratio bandwidth of 21.5% is designed. A coplanar waveguide (CPW) to microstrip transition with λ/4-open-ended stubs are then designed to match the antenna to the CPW packaging interface. The experimental results of the final packaged antenna agree reasonably with the simulation results, demonstrating an impedance bandwidth of more than 26% and a 6 dB axial ratio bandwidth of 22.7%.展开更多
This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD...This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD)approach based on multi-agent deep reinforcement learning(MADRL).In high-dynamic and multi-target aviation communication environments,the rapid changes in channels make it difficult for sensors to accurately capture instantaneous channel state information.This poses a challenge to make centralized jamming decisions with single-agent deep reinforcement learning(DRL)approaches.In response,we design a distributed multi-agent decision architecture(DMADA).We formulate multi-jammer resource allocation as a multiagent Markov decision process(MDP)and propose a fingerprint-based double deep Q-Network(FBDDQN)algorithm for solving it.Each jammer functions as an agent that interacts with the environment in this framework.Through the design of a reasonable reward and training mechanism,our approach enables jammers to achieve distributed cooperation,significantly improving the jamming success rate while considering jamming power cost,and reducing the transmission rate of links.Our experimental results show the FBDDQN algorithm is superior to the baseline methods.展开更多
Metasurfaces offer exceptional capabilities for controlling electromagnetic waves,enabling the realization of unique electromagnetic properties.As communication technology continues to evolve,metasurfaces present prom...Metasurfaces offer exceptional capabilities for controlling electromagnetic waves,enabling the realization of unique electromagnetic properties.As communication technology continues to evolve,metasurfaces present promising applications in wireless communications.This paper reviews the latest advancements in metasurface research within the communication sector,explores metasurface-based wireless relay technologies,and summarizes various wireless communication methods employing different types of metasurfaces across diverse modulation schemes.This paper provides a detailed discussion on the design of wireless communication systems based on coding metasurfaces to simplify transmitter architecture,as well as the development of intelligent coding metasurfaces in the communication field.It also elaborates on the application of vector vortex light fields in metasurface communication.Finally,it offers a forward-looking perspective on wireless communication systems that incorporate coded metasurfaces.This review aims to furnish researchers with a thorough understanding of the current state and future directions of coded metasurface applications in communications.展开更多
Meteor Burst Communication(MBC),a niche yet revolutionary wireless communication paradigm,exploits the transient ionized trails generated by meteors ablating in Earth’s atmosphere to enable sporadic yet resilient lon...Meteor Burst Communication(MBC),a niche yet revolutionary wireless communication paradigm,exploits the transient ionized trails generated by meteors ablating in Earth’s atmosphere to enable sporadic yet resilient long-distance radio links.Known for its exceptional resilience,robustness,and sustained connectivity,MBC holds significant promise for applications in emergency communications,remote area connectivity,military/defense systems,and environmental monitoring.However,the scientific exploration and application of MBC have long been highly challenging.In particular,under the combined influence of multiple physical field factors,the channel experiences superimposed multiple random fading effects,exhibiting bursty,highly time-varying,and strongly random characteristics.This persistent technical challenge has resulted in the absence of a practical statistical channel model for MBC to date.展开更多
Unmanned aerial vehicles(UAVs),characterized by their low cost and operational flexibility,have been increasingly deployed across civilian,military,and commercial applications.To improve the coverage and connectivity,...Unmanned aerial vehicles(UAVs),characterized by their low cost and operational flexibility,have been increasingly deployed across civilian,military,and commercial applications.To improve the coverage and connectivity,UAVs can be utilized to realize the comprehensive spatial coverage for the sixth-generation mobile networks.However,the private data in UAV networks is easy to be exposed due to the light-of-sight links and openness of wireless transmission.Covert communication as an emerging technique has shown its superiority in hiding the transmission behavior,which can further enhance the security of UAV networks compared with the traditional physical-layer security.Therefore,in this article,we present a survey on the recent advanced research about covert UAV communications.First,the roles of UAVs for covert communications are described.Then,the covert UAV communications with different uncertainties are introduced.Moreover,the wireless techniques for covert UAV communications are explored.In addition,we point out the applications in covert UAV communications.Finally,the open research issues concerning practical scenarios and promising applications are highlighted.展开更多
Wireless Sensor Network(WSN)comprises a set of interconnected,compact,autonomous,and resource-constrained sensor nodes that are wirelessly linked to monitor and gather data from the physical environment.WSNs are commo...Wireless Sensor Network(WSN)comprises a set of interconnected,compact,autonomous,and resource-constrained sensor nodes that are wirelessly linked to monitor and gather data from the physical environment.WSNs are commonly used in various applications such as environmental monitoring,surveillance,healthcare,agriculture,and industrial automation.Despite the benefits of WSN,energy efficiency remains a challenging problem that needs to be addressed.Clustering and routing can be considered effective solutions to accomplish energy efficiency in WSNs.Recent studies have reported that metaheuristic algorithms can be applied to optimize cluster formation and routing decisions.This study introduces a new Northern Goshawk Optimization with boosted coati optimization algorithm for cluster-based routing(NGOBCO-CBR)method for WSN.The proposed NGOBCO-CBR method resolves the hot spot problem,uneven load balancing,and energy consumption in WSN.The NGOBCO-CBR technique comprises two major processes such as NGO based clustering and BCO-based routing.In the initial phase,the NGObased clustering method is designed for cluster head(CH)selection and cluster construction using five input variables such as residual energy(RE),node proximity,load balancing,network average energy,and distance to BS(DBS).Besides,the NGOBCO-CBR technique applies the BCO algorithm for the optimum selection of routes to BS.The experimental results of the NGOBCOCBR technique are studied under different scenarios,and the obtained results showcased the improved efficiency of the NGOBCO-CBR technique over recent approaches in terms of different measures.展开更多
Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission fo...Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1].展开更多
基金supported in part by the National Science Foundation(NSFC)for Distinguished Young Scholars of China with Grant 61625106the National Natural Science Foundation of China under Grant 61531011
文摘Metasurfaces have drawn significant attentions due to their superior capability in tailoring electromagnetic waves with a wide frequency range,from microwave to visible light.Recently,programmable metasurfaces have demonstrated the ability of manipulating the amplitude or phase of electromagnetic waves in a programmable manner in real time,which renders them especially appealing in the applications of wireless communications.In this paper,we present the fundamental principle of applying programmable metasurface as transmitter for wireless communications.Then,we establish a prototype system of metasurface-based transmitter to conduct several experiments and measurements over the air,which practically demonstrate the feasibility of using programmable metasurfaces in future communication systems.By exploiting the dynamically controllable property of programmable metasurface,the design,implementation and experimental evaluation of the proposed metasurface-based wireless communication system are presented with the prototype,which realizes single carrier quadrature phase shift keying(QPSK)transmission over the air.In the developed prototype,the phase of the reflected electromagnetic wave of programma-ble metasurface is directly manipulated in real time according to the baseband control signal,which achieves 2.048 Mbps data transfer rate with video streaming transmission over the air.In addition,experimental result is provided to compare the performance of the proposed metasurface-based architecture against the conventional one.With the slight increase of the transmit power by 5 dB,the same bit error rate(BER)performance can be achieved as the conventional system in the absence of channel coding.Such a result is encouraging considering that the metasurface-based system has the advantages of low hardware cost and simple structure,thus leading to a promising new architecture for wireless communications.
基金supported by the National Basic Research Program of China (973 Program No.2012CB316100)
文摘The fifth generation(5G) network is expected to support significantly large amount of mobile data traffic and huge number of wireless connections,to achieve better spectrum- and energy-efficiency,as well as quality of service(QoS) in terms of delay,reliability and security.Furthermore,the 5G network shall also incorporate high mobility requirements as an integral part,providing satisfactory service to users travelling at a speed up to 500 km/h.This paper provides a survey of potential high mobility wireless communication(HMWC) techniques for 5G network.After discussing the typical requirements and challenges of HMWC,key techniques to cope with the challenges are reviewed,including transmission techniques under the fast timevarying channels,network architecture with mobility support,and mobility management.Finally,future research directions on 5G high mobility communications are given.
基金supported in part by State Key Program of National Nature Science Foundation of China under Grant No.60932003National High Technical Research and Development Program of China (863 Program ) under Grant No.2007AA01Z452
文摘The properties of broadcast nature, high densities of deployment and severe resource limitations of sensor and mobile networks make wireless networks more vulnerable to various attacks, including modification of messages, eavesdropping, network intrusion and malicious forwarding. Conventional cryptography-based security may consume significant overhead because of low-power devices, so current research shifts to the wireless physical layer for security enhancement. This paper is mainly focused on security issues and solutions for wireless communications at the physical layer. It first describes the RSSI-based and channel based wireless authentication methods respectively, and presents an overview of various secrecy capacity analyses of fading channel, MIMO channel and cooperative transmission, and then examines different misbehavior detection methods. Finally it draws conclusions and introduces the direction of our future work.
文摘This paper focuses on the design and implementation of an active multibeam antenna system for massive MIMO applications in 5G wireless communications.The highly integrated active multibeam antenna system is designed and implemented at 5.8 GHz with 64 RF Channels and 256 antenna elements.The 64-channel highly integrated active multibeam antenna system provides a verification platform for digital beamforming algorithm and massive MIMO channel estimation for next generation wireless communications.
文摘Compared with wired communication,the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature.To prevent eavesdropping,many researches on transmission techniques or cryptographic methods are carried out.This paper proposes a new index parameter named as eavesdropping area,to evaluate the anti-eavesdropping performance of wireless system.Given the locations of legitimate transmitter and receiver,eavesdropping area index describes the total area of eavesdropping regions where messages can be wiretapped in the whole evaluating region.This paper gives detailed explanations about its concept and deduces mathematical formulas about performance curves based on region classification.Corresponding key system parameters are analyzed,including the characteristics of eavesdropping region,transmitted beam pattern,beam direction,receiver sensitivity,eavesdropping sensitivity,path loss exponent and so on.The proposed index can give an insight on the confirmation of high-risk eavesdropping region and formulating optimal transmitting scheme for the confidential communications to decrease the eavesdropping probability.
基金supported by the National Natural Science Foundation of China under Grants 61801208,61931023,and U1936202.
文摘Advanced technologies are required in future mobile wireless networks to support services with highly diverse requirements in terms of high data rate and reliability,low latency,and massive access.Deep Learning(DL),one of the most exciting developments in machine learning and big data,has recently shown great potential in the study of wireless communications.In this article,we provide a literature review on the applications of DL in the physical layer.First,we analyze the limitations of existing signal processing techniques in terms of model accuracy,global optimality,and computational scalability.Next,we provide a brief review of classical DL frameworks.Subsequently,we discuss recent DL-based physical layer technologies,including both DL-based signal processing modules and end-to-end systems.Deep neural networks are used to replace a single or several conventional functional modules,whereas the objective of the latter is to replace the entire transceiver structure.Lastly,we discuss the open issues and research directions of the DL-based physical layer in terms of model complexity,data quality,data representation,and algorithm reliability.
基金supported in part by the National Natural Science Foundation of China under Grant 62071472in part the Program for“Industrial Io T and Emergency Collaboration”Innovative Research Team in CUMT(No.2020ZY002)。
文摘In industrial wireless scenarios,the impulsive noise(IN)incurred by machine running or operation causes a serious influence on the powerlimited industrial wireless communications.It is challenging to ensure efficient and reliable transmission with quality of service(QoS)guarantee for machinetype communication devices(MTCDs).Considering the IN in the industrial process,this paper establishes the multiuser multiple-input single-output(MU-MISO)orthogonal frequency division multiplexing(OFDM)system model,which combines transmitter and receiver design.Two precoding schemes are designed to improve communication effectiveness at the transmitter.More specifically,the precoder design scheme which combines semi-definite relaxation(SDR)with difference-of-two-convex-function(D.C.)iterative algorithm,is developed by utilizing the Dinkelbach method to improve the system effectiveness.To decrease the computational complexity,we devise the quadratic-based fractional programming(QFP)algorithm,which decouples the variables by using a quadratic transform method.On this basis,the IN mitigation scheme is studied to reduce the system error rate(SER)at the receiver.With the goal of improving the reliability of industrial wireless communications,we propose a hybrid nonlinear IN mitigation(HNINM)scheme and then derive its closed-form expression of SER.The simulation results show that the proposed QFP algorithm achieves superior performance while the HNINM scheme decreases the SER of industrial wireless communications.
基金supported by the Major State Basic Research Development Program of China(973 Program No.2012CB316100)the National Natural Science Foundation of China(NSFC No.61032002)the Innovative Intelligence Base Project(111 Project No.111-2-14)
文摘The high-speed railway and high-way networks are now expanding at a phenomenal speed in Chinaand in many other parts of the world. The related broadband wireless communication over high-speed trains and highway vehicles is a very challenging task due to hostile transmission channel conditions. The demand for such services is growing rapidly, following the proliferation of laptop/tablet computers and smart phones. This motivates the research on wireless communications in the high mobility environments.
基金supported by the Key Program of the National Natural Science Foundation of China(No.61631018),Key Research Program of Frontier Sciences of CAS(No.QYZDY-SSW-JSC003)Strategic Priority Research Program of CAS(No.XDA22000000).L.Hanzo would like to acknowledge the financial support of the Engineering and Physical Sciences Research Council projects EP/P034284/1 and EP/P003990/1(COALESCE)as well as of the European Research Council’s Advanced Fellow Grant QuantCom(Grant No.789028).
文摘With the rapid deployment of Next-Generation Networks(NGN),the research community has initiated discussions on an entirely new suite of optical enabling techniques.To pave the way for the development of future wireless networks,this article aims to unify the existing infrared,visible light,and ultraviolet subbands while also exploring the potential of the Petahertz(PHz)band to support extremely bandwidth-thirsfy telepresence style applications.Our focus is on the emerging Petahertz Communication(PetaCom)framework,scenario-dependent propagation channels,modulation schemes,system performance,multiple access techniques,and networking.We conclude with a range of PetaCom challenges and open research issues.
文摘Modern wireless communications gadgets demand multi-standard communications facilities with least overlap between different input radio channels. A sharp digital filter of extremely narrow transition-width with lower stop band ripples offers alias-free switching among the preferred frequency bands. A computationally competent low pass filter (LPF) structure based on the multistage frequency response masking (FRM) approach is proposed for the design of sharp finite impulse response (FIR) filters which are suitable for wireless communications applications. In comparison of basic FRM with other existing multistage FRM structures, the proposed structure has a narrow transition bandwidth and higher stop band attenuation with significant reduction in terms of the number of computational steps. A design example is incorporated to demonstrate the efficiency of the proposed approach. Simulation results establish the improvement of the proposed scheme over other recently published design strategies.
基金supported by the China National Key R&D Program(No.2018YFB0803600)Natural Science Foundation of China(No.61801008)+3 种基金Scientific Research Common Program of Beijing Municipal Education Commission(No.KM201910005025)the Chinese Postdoctoral Science Foundation(No.2020M670074)Key Project of Hunan Provincial,Department of Education(No.26420A205)The Construct Program of Applied Characteristics Discipline in Hunan University of Science and Engineering.
文摘Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’uncertainty.However,the physical layer secret key generation(PHY-SKG)depends on two fundamental parameters,i.e.,coherence time and power allocation.The coherence time for PHY-SKG is not applicable to secure wireless channels.This is because coherence time is for a certain period of time.Thus,legitimate users generate the secret keys(SKs)with a shorter key length in size.Hence,an attacker can quickly get information about the SKs.Consequently,the attacker can easily get valuable information from authentic users.Therefore,we considered the scheme of power allocation to enhance the secret key generation rate(SKGR)between legitimate users.Hence,we propose an alternative method,i.e.,a power allocation,to improve the SKGR.Our results show 72%higher SKGR in bits/sec by increasing power transmission.In addition,the power transmission is based on two important parameters,i.e.,epsilon and power loss factor,as given in power transmission equations.We found out that a higher value of epsilon impacts power transmission and subsequently impacts the SKGR.The SKGR is approximately 40.7%greater at 250 from 50 mW at epsilon=1.The value of SKGR is reduced to 18.5%at 250 mW when epsilonis 0.5.Furthermore,the transmission power is also measured against the different power loss factor values,i.e.,3.5,3,and 2.5,respectively,at epsilon=0.5.Hence,it is concluded that the value of epsilon and power loss factor impacts power transmission and,consequently,impacts the SKGR.
基金the National Natural Science Foundation of China under Grant No.61771054.
文摘Terahertz(THz)wireless communication has the capability to connect massive devices using its ultra-large spectrum resource.We propose a hybrid precoding scheme for the cluster-based multi-carrier beam division multiple access(MC-BDMA)to enable THz massive connections.Both the inter-beam interference and inter-band power leakage in this system are considered.A mathematical model is established to analyze and reduce their effects on the THz signal transmission.By considering the peculiarities of THz channels and characteristics of THz hardware components,we further propose a three-step hybrid precoding algorithm with low complexity,where the received signal power enhancement,the inter-beam interference elimination,and the inter-band power leakage suppression are conducted in succession.Simulation results are presented to demonstrate the high spectrum efficiency and high energy efficiency of our proposed algorithm,especially in the massive-connection scenarios.
基金Project (No. 60372076) supported by the National Natural ScienceFoundation of China
文摘In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.
文摘This paper presents the design of a fully packaged 60 GHz wideband patch antenna incorporating an air cavity and a fused silica superstrate. Circular polarization (CP) is realized by introducing a diagonal slot at the center of the square patch. By optimizing the patch and the slot dimensions, a high efficiency (>90%) microstrip fed CP antenna with an impedance bandwidth of 24% and a 6 dB axial ratio bandwidth of 21.5% is designed. A coplanar waveguide (CPW) to microstrip transition with λ/4-open-ended stubs are then designed to match the antenna to the CPW packaging interface. The experimental results of the final packaged antenna agree reasonably with the simulation results, demonstrating an impedance bandwidth of more than 26% and a 6 dB axial ratio bandwidth of 22.7%.
基金supported in part by the National Natural Science Foundation of China(No.61906156).
文摘This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD)approach based on multi-agent deep reinforcement learning(MADRL).In high-dynamic and multi-target aviation communication environments,the rapid changes in channels make it difficult for sensors to accurately capture instantaneous channel state information.This poses a challenge to make centralized jamming decisions with single-agent deep reinforcement learning(DRL)approaches.In response,we design a distributed multi-agent decision architecture(DMADA).We formulate multi-jammer resource allocation as a multiagent Markov decision process(MDP)and propose a fingerprint-based double deep Q-Network(FBDDQN)algorithm for solving it.Each jammer functions as an agent that interacts with the environment in this framework.Through the design of a reasonable reward and training mechanism,our approach enables jammers to achieve distributed cooperation,significantly improving the jamming success rate while considering jamming power cost,and reducing the transmission rate of links.Our experimental results show the FBDDQN algorithm is superior to the baseline methods.
基金supported in part by National Natural Science Foundation of China(U24A20307 and 62175224)in part by the science and technology innovation leading talent project of special support plan for high-level talents in Zhejiang Province(2021R52032)+2 种基金in part by the China Jiliang University Basic Research ExpensesZhejiang University Students Science and Technology Innovation Activity Plan-New Talent Plan(2024R409C054)in part by the Natural Science Foundation of Zhejiang Province under Grant(ZCLZ25F0502).
文摘Metasurfaces offer exceptional capabilities for controlling electromagnetic waves,enabling the realization of unique electromagnetic properties.As communication technology continues to evolve,metasurfaces present promising applications in wireless communications.This paper reviews the latest advancements in metasurface research within the communication sector,explores metasurface-based wireless relay technologies,and summarizes various wireless communication methods employing different types of metasurfaces across diverse modulation schemes.This paper provides a detailed discussion on the design of wireless communication systems based on coding metasurfaces to simplify transmitter architecture,as well as the development of intelligent coding metasurfaces in the communication field.It also elaborates on the application of vector vortex light fields in metasurface communication.Finally,it offers a forward-looking perspective on wireless communication systems that incorporate coded metasurfaces.This review aims to furnish researchers with a thorough understanding of the current state and future directions of coded metasurface applications in communications.
文摘Meteor Burst Communication(MBC),a niche yet revolutionary wireless communication paradigm,exploits the transient ionized trails generated by meteors ablating in Earth’s atmosphere to enable sporadic yet resilient long-distance radio links.Known for its exceptional resilience,robustness,and sustained connectivity,MBC holds significant promise for applications in emergency communications,remote area connectivity,military/defense systems,and environmental monitoring.However,the scientific exploration and application of MBC have long been highly challenging.In particular,under the combined influence of multiple physical field factors,the channel experiences superimposed multiple random fading effects,exhibiting bursty,highly time-varying,and strongly random characteristics.This persistent technical challenge has resulted in the absence of a practical statistical channel model for MBC to date.
基金supported by the National Natural Science Foundation of China(Nos.U23A20271 and 62325103).
文摘Unmanned aerial vehicles(UAVs),characterized by their low cost and operational flexibility,have been increasingly deployed across civilian,military,and commercial applications.To improve the coverage and connectivity,UAVs can be utilized to realize the comprehensive spatial coverage for the sixth-generation mobile networks.However,the private data in UAV networks is easy to be exposed due to the light-of-sight links and openness of wireless transmission.Covert communication as an emerging technique has shown its superiority in hiding the transmission behavior,which can further enhance the security of UAV networks compared with the traditional physical-layer security.Therefore,in this article,we present a survey on the recent advanced research about covert UAV communications.First,the roles of UAVs for covert communications are described.Then,the covert UAV communications with different uncertainties are introduced.Moreover,the wireless techniques for covert UAV communications are explored.In addition,we point out the applications in covert UAV communications.Finally,the open research issues concerning practical scenarios and promising applications are highlighted.
文摘Wireless Sensor Network(WSN)comprises a set of interconnected,compact,autonomous,and resource-constrained sensor nodes that are wirelessly linked to monitor and gather data from the physical environment.WSNs are commonly used in various applications such as environmental monitoring,surveillance,healthcare,agriculture,and industrial automation.Despite the benefits of WSN,energy efficiency remains a challenging problem that needs to be addressed.Clustering and routing can be considered effective solutions to accomplish energy efficiency in WSNs.Recent studies have reported that metaheuristic algorithms can be applied to optimize cluster formation and routing decisions.This study introduces a new Northern Goshawk Optimization with boosted coati optimization algorithm for cluster-based routing(NGOBCO-CBR)method for WSN.The proposed NGOBCO-CBR method resolves the hot spot problem,uneven load balancing,and energy consumption in WSN.The NGOBCO-CBR technique comprises two major processes such as NGO based clustering and BCO-based routing.In the initial phase,the NGObased clustering method is designed for cluster head(CH)selection and cluster construction using five input variables such as residual energy(RE),node proximity,load balancing,network average energy,and distance to BS(DBS).Besides,the NGOBCO-CBR technique applies the BCO algorithm for the optimum selection of routes to BS.The experimental results of the NGOBCOCBR technique are studied under different scenarios,and the obtained results showcased the improved efficiency of the NGOBCO-CBR technique over recent approaches in terms of different measures.
基金partly supported by the National Natural Science Foundation of China(62273298,62273295)Hebei Natural Science Foundation(F2023203063,F2022203025)+1 种基金China Scholarship Council(CSC)(202308130180)Provincial Key Laboratory Performance Subsidy Project(22567612H)
文摘Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1].