scholarly journals A Modular Design Concept for Shaping Future Wireless TSN Solutions

Information ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 12
Author(s):  
Christoph Fischer ◽  
Dennis Krummacker ◽  
Michael Karrenbauer ◽  
Hans Dieter Schotten

The use of wireless communication systems in industrial environments is gaining international importance. The requirements, which are placed thereby on the communication systems, are manifold depending on the specific use. In the field of industrial manufacturing, however, many applications are characterized by high reliability requirements and hard real-time demands. The latter requires a time-deterministic handling of processed transmissions and therefore requires the use of Time-Sensitive Networking (TSN) solutions. In this paper, we briefly describe which functionalities characterize a wireless TSN system and which approaches have already been pursued in the literature and standardization. Subsequently, we present a concept for a toolbox that allows one to combine the required functionalities into a working solution, which can be used as a guideline for software-based implementation. Additionally, since reliability of transmissions is one of the key challenges, especially in wireless communication, to achieve a performance comparable to wired systems, we provide some further design considerations to improve.

Author(s):  
A. Suresh Babu ◽  
B. Anand

: A Linear Feedback Shift Register (LFSR) considers a linear function typically an XOR operation of the previous state as an input to the current state. This paper describes in detail the recent Wireless Communication Systems (WCS) and techniques related to LFSR. Cryptographic methods and reconfigurable computing are two different applications used in the proposed shift register with improved speed and decreased power consumption. Comparing with the existing individual applications, the proposed shift register obtained >15 to <=45% of decreased power consumption with 30% of reduced coverage area. Hence this proposed low power high speed LFSR design suits for various low power high speed applications, for example wireless communication. The entire design architecture is simulated and verified in VHDL language. To synthesis a standard cell library of 0.7um CMOS is used. A custom design tool has been developed for measuring the power. From the results, it is obtained that the cryptographic efficiency is improved regarding time and complexity comparing with the existing algorithms. Hence, the proposed LFSR architecture can be used for any wireless applications due to parallel processing, multiple access and cryptographic methods.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1439
Author(s):  
Janghyuk Youn ◽  
Woong Son ◽  
Bang Chul Jung

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.


Sign in / Sign up

Export Citation Format

Share Document