FH-SCMA: Frequency-Hopping Based Sparse Code Multiple Access for Next Generation Internet of Things

Author(s):  
Zhicheng Bai ◽  
Bo Li ◽  
Mao Yang ◽  
Zhongjiang Yan ◽  
Xiaoya Zuo ◽  
...  
Author(s):  
Syed Aamer Hussain ◽  
Norulhusna Ahmad ◽  
Ibraheem Shayea ◽  
Hazilah Mad Kaidi ◽  
Liza Abdul Latiff ◽  
...  

<span lang="EN-GB">The progressions in telecommunication beyond the 5<sup>th</sup> generation have created a need to improve research drifts. The current 5G study has an important focus on non-orthogonal multiple access (NOMA) technology. sparse code multiple access (SCMA) is a promising technique within NOMA, enhancing the multi-user handling capability of next-generation communication. In the SCMA sphere, codebook designing and optimisation are essential research matters. This study conversed with different codebook design practises existing in the literature, analysing them for numerous parameters, including bit error rate (BER), an optimisation technique, and channel settings. From the analysis, the paper presents the efficiency of different approaches. The article also discusses the prospects and challenges of SCMA optimisation in practical implementation in various domains.</span>


2019 ◽  
Vol 15 (3) ◽  
pp. 155014771983509 ◽  
Author(s):  
Vinod Kumar Verma ◽  
Klimis Ntalianis ◽  
Carlos Manuel Moreno ◽  
Chao-Tung Yang

2021 ◽  
pp. 619-631
Author(s):  
César López ◽  
Ignacio Lacalle ◽  
Andreu Belsa ◽  
Zbigniew Kopertowski ◽  
Carlos E.Palau ◽  
...  

Author(s):  
Dimitrios Pliatsios ◽  
Sotirios K. Goudos ◽  
Thomas Lagkas ◽  
Vasileios Argyriou ◽  
Alexandros Apostolos A. Boulogeorgos ◽  
...  

2019 ◽  
Vol 52 (5-6) ◽  
pp. 338-353 ◽  
Author(s):  
Murat Aydos ◽  
Yılmaz Vural ◽  
Adem Tekerek

Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation. With the advent of Industry 4.0, Internet of Things has been started to be used and it has led to the emergence of innovative business models. The processing and production capabilities of Internet of Things objects in hidden and critical data provide great advantages for the next generation of Internet. However, the integrated features of Internet of Things objects cause vulnerabilities in terms of security, making them the target of cyber threats. In this study, a security model which offers an integrated risk-based Internet of Things security approach for the Internet of Things vulnerabilities while providing detailed information about Internet of Things and the types of attacks targeting Internet of Things is proposed. In addition, in this study, the vulnerabilities of Internet of Things were explained by classifying attack types threatening the physical layer, network layer, data processing layer and application layer. Moreover, the risk-based security model has been proposed by examining the vulnerabilities and threats of smart objects that generate the Internet of Things. The proposed Internet of Things model is a holistic security model that separately evaluates the Internet of Things layers against vulnerabilities and threats based on the risk-level approach.


Sign in / Sign up

Export Citation Format

Share Document