scholarly journals Wireless Environment as a Service Enabled by Reconfigurable Intelligent Surfaces: The RISE-6G Perspective

Author(s):  
Emilio Calvanese Strinati ◽  
George C. Alexandropoulos ◽  
Vincenzo Sciancalepore ◽  
Marco Di Renzo ◽  
Henk Wymeersch ◽  
...  
Keyword(s):  
2012 ◽  
Vol 25 (3) ◽  
pp. 235-243 ◽  
Author(s):  
Rashmi Deka ◽  
Soma Chakraborty ◽  
Sekhar Roy

Spectrum availability is becoming scarce due to the rise of number of users and rapid development in wireless environment. Cognitive radio (CR) is an intelligent radio system which uses its in-built technology to use the vacant spectrum holes for the use of another service provider. In this paper, genetic algorithm (GA) is used for the best possible space allocation to cognitive radio in the spectrum available. For spectrum reuse, two criteria have to be fulfilled - 1) probability of detection has to be maximized, and 2) probability of false alarm should be minimized. It is found that with the help of genetic algorithm the optimized result is better than without using genetic algorithm. It is necessary that the secondary user should vacate the spectrum in use when licensed users are demanding and detecting the primary users accurately by the cognitive radio. Here, bit error rate (BER) is minimized for better spectrum sensing purpose using GA.


2017 ◽  
Vol 13 (05) ◽  
pp. 29
Author(s):  
XueWen Yu

Wireless multi-point real-time environmental monitoring system based on LabVIEW is composed of three parts: wireless environment information collection node, communication gateway, and host computer monitoring system. The purpose of this study is to explore the application of wireless monitoring technology in industry. Since that it is at the stage of research feasibility, various sensors used for the applications select the level limited to the ordinary teaching using sensor. AGV uses vehicle manipulator developed by Wuhan Depushi Technology Company and some sensors are simulated. The results of simple basic experiments showed that the wireless module can achieve point to multipoint communication. It is concluded that the monitoring interface can simultaneously process the data of a simulated pipeline terminal node with a simulated AGV data and make them work in a closed loop state.


2020 ◽  
Author(s):  
jie yang ◽  
Xinsheng Ji ◽  
Kaizhi Huang ◽  
Xiaoli Sun ◽  
Xiaoming Xu

Pilot spoofing attack brings challenges to the physical layer secure transmission. However, since the inherent characteristics of wireless environment have not changed, active eavesdropping can be detected based on prior information. Intelligent reflecting surface (IRS), with the real-time programmable characteristics for wireless environment, provides new possibilities for effective pilot spoofing. In this paper, the IRS is deployed near the legitimate users and the control strategy is embeded into the legitimate communication process under time-division duplex (TDD) mode to assist eavesdroppers to implement pilot spoofing. By designing different phase shifts at the IRS during the uplink phase and downlink phase, the channel reciprocity between uplink and downlink disappears, and thus the secure beamforming vector is biased towards the eavesdropper. Furthermore, in order to obtain more information, the average secrecy rate based on the statistical channel state information is established by carefully designing the phase shifts. The formulated problem is non-trivial to solve. By using alternating optimization and Charnes-Cooper transformation technique, the original problem is transformed into convex form and a sub-optimal solution is achieved. Finally, simulation results show that our proposed scheme poses serious secure threat for TDD systems.


Sign in / Sign up

Export Citation Format

Share Document