Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Enabling cyber-physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber-security

Cyber-physical systems (CPS) help create new services and applications by revolutionising our world in different fields through their tight interactions and automated decisions. This is especially true with the ongoing increase in the number of physical things (sensors, actuators, smartphones, tablets, and so on) along with the explosive increase in the usage of online networking services and applications. Future fifth generation (5G) cellular networks will facilitate the enabling of CPS communications over current network infrastructure through different technologies such as device-to-device (D2D) communications. In this study, the authors discuss about the main challenges that cellular providers will face as the massive number of CPS devices attempt to access the cellular spectrum. A case study is presented on how to ease the spectrum access of these devices through D2D spatial spectrum sensing. Furthermore, the authors discuss about protecting these D2D links from eavesdropping, since security is becoming a critical aspect in the cyber-physical space, especially with the large amount of traffic that is constantly flowing through the network.

References

    1. 1)
    2. 2)
      • 42. Chen, H., Liu, L.: ‘Resource allocation for sensing-based device-to-device (D2D) networks’. 2015 49th Asilomar Conf. on Signals, Systems and Computers, November 2015, pp. 10581062.
    3. 3)
    4. 4)
    5. 5)
    6. 6)
      • 20. Atat, R., Liu, L., Ashdown, J., et al: ‘On the performance of relay-assisted D2D networks under spatially correlated interference’. 2016 IEEE Global Communications Conf. (GLOBECOM), December 2016, pp. 16.
    7. 7)
      • 9. Mahmood, T., Afzal, U.: ‘Security analytics: big data analytics for cybersecurity: a review of trends, techniques and tools’. 2013 second National Conf. on Information Assurance (NCIA), December 2013, pp. 129134.
    8. 8)
    9. 9)
    10. 10)
    11. 11)
      • 12. Liu, L., Miao, G., Zhang, J.: ‘Energy-efficient scheduling for downlink multi-user MIMO’. 2012 IEEE Int. Conf. on Communications (ICC), June 2012, pp. 43944394.
    12. 12)
      • 24. Sreng, V., Yanikomeroglu, H., Falconer, D.: ‘Coverage enhancement through two-hop relaying in cellular radio systems’. 2002 IEEE Wireless Communications and Networking Conf. (WCNC 2002), March 2002, vol. 2, pp. 881885.
    13. 13)
      • 44. Wang, H., Zhou, X., Reed, M.C.: ‘Physical layer security in cellular networks: a stochastic geometry approach’, IEEE Trans. Commun., 2013, 12, (6), pp. 27762787.
    14. 14)
      • 26. Chen, H., Liu, L., Mastronarde, N., et al: ‘Cooperative retransmission for massive MTC under spatiotemporally correlated interference’. 2016 IEEE Global Communications Conf. (GLOBECOM), December 2016.
    15. 15)
    16. 16)
    17. 17)
      • 14. Mahmood, F., Perrins, E., Liu, L.: ‘Modeling and analysis of energy consumption for RF transceivers in wireless cellular systems’. 2015 IEEE Global Communications Conf. (GLOBECOM), December 2015, pp. 16.
    18. 18)
    19. 19)
      • 23. Zhang, J., Shao, C., Wang, Y., et al: ‘Performance of a two-hop cellular system with different power allocation schemes’. 2004 IEEE 60th Vehicular Technology Conf. (VTC2004-Fall), September 2004, vol. 6, pp. 45384542.
    20. 20)
      • 33. Wang, M., Yan, Z.: ‘Security in D2D communications: a review’. 2015 IEEE Trustcom/BigDataSE/ISPA, August 2015, vol. 1, pp. 11991204.
    21. 21)
    22. 22)
      • 1. Cisco: ‘Fog computing and the internet of things: extend the cloud to where the things are’. Technical report, white paper, Cisco, 2015.
    23. 23)
    24. 24)
      • 21. Atat, R., Liu, L., Mastronarde, N., et al: ‘Energy harvesting-based D2D-assisted machine-type communications’, IEEE Trans. Commun., 2016, PP, (99), pp. 11.
    25. 25)
    26. 26)
    27. 27)
    28. 28)
    29. 29)
    30. 30)
    31. 31)
      • 35. Pospiil, J., Novotný, M.: ‘Evaluating cryptanalytical strength of lightweight cipher present on reconfigurable hardware’. 2012 15th Euromicro Conf. on Digital System Design, September 2012, pp. 560567.
    32. 32)
      • 37. Canelo, F., Silva, B.M.C., Rodrigues, J.J.P.C., et al: ‘Performance evaluation of an enhanced cryptography solution for m-health applications in cooperative environments’. 2013 IEEE Global Communications Conf. (GLOBECOM), December 2013, pp. 17111716.
    33. 33)
      • 43. Atat, R., Liu, L.: ‘On the achievable transmission capacity of secrecy-based D2D cellular networks’. IEEE Global Communications Conf. (GLOBECOM), December 2016, pp. 16.
    34. 34)
    35. 35)
    36. 36)
    37. 37)
    38. 38)
      • 11. Recommendation ITU-R M.2083-0: IMT vision – framework and overall objectives of the future development of IMT for 2020 and beyond’ (International Telecommunication Union, 2015).
    39. 39)
    40. 40)
    41. 41)
    42. 42)
      • 10. 5G RESEARCH IN HORIZON 2020.
    43. 43)
    44. 44)
      • 27. Zhou, Y., Zhuang, W.: ‘Opportunistic cooperation in wireless ad hoc networks with interference correlation’, Peer-to-Peer Netw. Appl., 2017, 10, (1), pp. 238252.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0010
Loading

Related content

content/journals/10.1049/iet-cps.2017.0010
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address