This is an open access article published by the IET under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0/)
Cyber-physical systems (CPS) help create new services and applications by revolutionising our world in different fields through their tight interactions and automated decisions. This is especially true with the ongoing increase in the number of physical things (sensors, actuators, smartphones, tablets, and so on) along with the explosive increase in the usage of online networking services and applications. Future fifth generation (5G) cellular networks will facilitate the enabling of CPS communications over current network infrastructure through different technologies such as device-to-device (D2D) communications. In this study, the authors discuss about the main challenges that cellular providers will face as the massive number of CPS devices attempt to access the cellular spectrum. A case study is presented on how to ease the spectrum access of these devices through D2D spatial spectrum sensing. Furthermore, the authors discuss about protecting these D2D links from eavesdropping, since security is becoming a critical aspect in the cyber-physical space, especially with the large amount of traffic that is constantly flowing through the network.
References
-
-
1)
-
7. Wang, D., Liu, J.: ‘Optimizing big data processing performance in the public cloud: opportunities and approaches’, IEEE Netw., 2015, 29, (5), pp. 31–35 (doi: 10.1109/MNET.2015.7293302).
-
2)
-
42. Chen, H., Liu, L.: ‘Resource allocation for sensing-based device-to-device (D2D) networks’. 2015 49th Asilomar Conf. on Signals, Systems and Computers, November 2015, pp. 1058–1062.
-
3)
-
16. Yi, Y., Liao, Y., Wang, B., et al: ‘FPGA based spike-time dependent encoder and reservoir design in neuromorphic computing processors’, Microprocess. Microsyst., 2016, 46, , pp. 175–183 (doi: 10.1016/j.micpro.2016.03.009).
-
4)
-
31. Chen, H., Liu, L., Novlan, T., et al: ‘Spatial spectrum sensing-based device-to-device cellular networks’, IEEE Trans. Wirel. Commun., 2016, 15, (11), pp. 7299–7313 (doi: 10.1109/TWC.2016.2600561).
-
5)
-
36. Li, Z., Oechtering, T.J.: ‘Privacy-aware distributed Bayesian detection’, IEEE J. Sel. Top. Signal Process., 2015, 9, (7), pp. 1345–1357 (doi: 10.1109/JSTSP.2015.2429123).
-
6)
-
20. Atat, R., Liu, L., Ashdown, J., et al: ‘On the performance of relay-assisted D2D networks under spatially correlated interference’. 2016 IEEE Global Communications Conf. (GLOBECOM), December 2016, pp. 1–6.
-
7)
-
9. Mahmood, T., Afzal, U.: ‘Security analytics: big data analytics for cybersecurity: a review of trends, techniques and tools’. 2013 second National Conf. on Information Assurance (NCIA), December 2013, pp. 129–134.
-
8)
-
25. Haenggi, M., Smarandache, R.: ‘Diversity polynomials for the analysis of temporal correlations in wireless networks’, IEEE Trans. Wirel. Commun., 2013, 12, (11), pp. 5940–5951 (doi: 10.1109/TWC.2013.100313.131027).
-
9)
-
6. Guo, B., Chen, C., Zhang, D., et al: ‘Mobile crowd sensing and computing: when participatory sensing meets participatory social media’, IEEE Commun. Mag., 2016, 54, (2), pp. 131–137 (doi: 10.1109/MCOM.2016.7402272).
-
10)
-
3. Lee, J., Bagheri, B., Kao, H.: ‘A cyber-physical systems architecture for industry 4.0-based manufacturing systems’, Manuf. Lett., 2015, 3, pp. 18–23 (doi: 10.1016/j.mfglet.2014.12.001).
-
11)
-
12. Liu, L., Miao, G., Zhang, J.: ‘Energy-efficient scheduling for downlink multi-user MIMO’. 2012 IEEE Int. Conf. on Communications (ICC), June 2012, pp. 4394–4394.
-
12)
-
24. Sreng, V., Yanikomeroglu, H., Falconer, D.: ‘Coverage enhancement through two-hop relaying in cellular radio systems’. 2002 IEEE Wireless Communications and Networking Conf. (WCNC 2002), March 2002, vol. 2, pp. 881–885.
-
13)
-
44. Wang, H., Zhou, X., Reed, M.C.: ‘Physical layer security in cellular networks: a stochastic geometry approach’, IEEE Trans. Commun., 2013, 12, (6), pp. 2776–2787.
-
14)
-
26. Chen, H., Liu, L., Mastronarde, N., et al: ‘Cooperative retransmission for massive MTC under spatiotemporally correlated interference’. 2016 IEEE Global Communications Conf. (GLOBECOM), December 2016.
-
15)
-
34. Raychaudhuri, K., Ray, P.: ‘Privacy challenges in the use of ehealth systems for public health management’, Int. J. E-Health Med. Commun., 2010, 1, (2), pp. 12–23 (doi: 10.4018/jehmc.2010040102).
-
16)
-
17. Haykin, S., Thomson, D., Reed, J.: ‘Spectrum sensing for cognitive radio’, Proc. IEEE, 2009, 97, pp. 849–877 (doi: 10.1109/JPROC.2009.2015711).
-
17)
-
14. Mahmood, F., Perrins, E., Liu, L.: ‘Modeling and analysis of energy consumption for RF transceivers in wireless cellular systems’. 2015 IEEE Global Communications Conf. (GLOBECOM), December 2015, pp. 1–6.
-
18)
-
4. Lin, X., Andrews, J., Ghosh, A.: ‘Spectrum sharing for device-to-device communication in cellular networks’, Trans. Wirel. Commun., 2014, 13, (12), pp. 6727–6740 (doi: 10.1109/TWC.2014.2360202).
-
19)
-
23. Zhang, J., Shao, C., Wang, Y., et al: ‘Performance of a two-hop cellular system with different power allocation schemes’. 2004 IEEE 60th Vehicular Technology Conf. (VTC2004-Fall), September 2004, vol. 6, pp. 4538–4542.
-
20)
-
33. Wang, M., Yan, Z.: ‘Security in D2D communications: a review’. 2015 IEEE Trustcom/BigDataSE/ISPA, August 2015, vol. 1, pp. 1199–1204.
-
21)
-
28. Nigam, G., Minero, P., Haenggi, M.: ‘Spatiotemporal cooperation in heterogeneous cellular networks’, IEEE J. Sel. Areas Commun., 2015, 33, (6), pp. 1253–1265 (doi: 10.1109/JSAC.2015.2417017).
-
22)
-
1. Cisco: ‘Fog computing and the internet of things: extend the cloud to where the things are’. , Cisco, 2015.
-
23)
-
24. Novlan, T.D., Dhillon, H.S., Andrews, J.G.: ‘Analytical modeling of uplink cellular networks’, IEEE Trans. Wirel. Commun., 2013, 12, (6), pp. 2669–2679 (doi: 10.1109/TWC.2013.050613.120325).
-
24)
-
21. Atat, R., Liu, L., Mastronarde, N., et al: ‘Energy harvesting-based D2D-assisted machine-type communications’, IEEE Trans. Commun., 2016, PP, (99), pp. 1–1.
-
25)
-
2. Tsai, C.W., Lai, C.F., Chiang, M.C., et al: ‘Data mining for internet of things: a survey’, IEEE Commun. Surv. Tutor., 2014, 16, (1), pp. 77–97 (doi: 10.1109/SURV.2013.103013.00206).
-
26)
-
5. Chi, M., Plaza, A., Benediktsson, J.A., et al: ‘Big data for remote sensing: challenges and opportunities’, Proc. IEEE, 2016, 104, (11), pp. 2207–2219 (doi: 10.1109/JPROC.2016.2598228).
-
27)
-
38. ElSawy, H., Hossain, E., Haenggi, M.: ‘Stochastic geometry for modeling, analysis, and design of multi-tier and cognitive cellular wireless networks: A survey’, IEEE Commun. Surv. Tutor., 2013, 15, (3), pp. 996–1019 (doi: 10.1109/SURV.2013.052213.00000).
-
28)
-
17. Socievole, A., Ziviani, A., De Rango, F., et al: ‘Cyber-physical systems for mobile opportunistic networking in proximity (MNP)’, Comput. Netw., 2016, 111, pp. 1–5 (doi: 10.1016/j.comnet.2016.09.009).
-
29)
-
8. Qu, F., Wang, F.Y., Yang, L.: ‘Intelligent transportation spaces: vehicles, traffic, communications, and beyond’, IEEE Commun. Mag., 2010, 48, (11), pp. 136–142 (doi: 10.1109/MCOM.2010.5621980).
-
30)
-
13. Liu, L., Yi, Y., Chamberland, J.F., et al: ‘Energy-efficient power allocation for delay-sensitive multimedia traffic over wireless systems’, IEEE Trans. Veh. Technol., 2014, 63, (5), pp. 2038–2047 (doi: 10.1109/TVT.2014.2313864).
-
31)
-
35. Pospiil, J., Novotný, M.: ‘Evaluating cryptanalytical strength of lightweight cipher present on reconfigurable hardware’. 2012 15th Euromicro Conf. on Digital System Design, September 2012, pp. 560–567.
-
32)
-
37. Canelo, F., Silva, B.M.C., Rodrigues, J.J.P.C., et al: ‘Performance evaluation of an enhanced cryptography solution for m-health applications in cooperative environments’. 2013 IEEE Global Communications Conf. (GLOBECOM), December 2013, pp. 1711–1716.
-
33)
-
43. Atat, R., Liu, L.: ‘On the achievable transmission capacity of secrecy-based D2D cellular networks’. IEEE Global Communications Conf. (GLOBECOM), December 2016, pp. 1–6.
-
34)
-
22. Neonakis Aggelou, G., Tafazolli, R.: ‘On the relaying capability of next-generation GSM cellular networks’, IEEE Pers. Commun. Mag., 2001, 8, (1), pp. 40–47 (doi: 10.1109/98.904898).
-
35)
-
10. Laya, A., Alonso, L., Alonso-Zarate, J.: ‘Is the random access channel of LTE and LTE-A suitable for M2M communications? A survey of alternatives’, IEEE Commun. Surv. Tutor., 2014, 16, (1), pp. 4–16 (doi: 10.1109/SURV.2013.111313.00244).
-
36)
-
22. Yucek, T., Arslan, H.: ‘A survey of spectrum sensing algorithms for cognitive radio applications’, IEEE Commun. Surv. Tutorials, 2009, 11, (1), pp. 116–130 (doi: 10.1109/SURV.2009.090109).
-
37)
-
40. Sakr, A.H., Hossain, E.: ‘Cognitive and energy harvesting-based D2D communication in cellular networks: stochastic geometry modeling and analysis’, IEEE Trans. Commun., 2015, 63, (5), pp. 1867–1880 (doi: 10.1109/TCOMM.2015.2411266).
-
38)
-
11. ‘Recommendation ITU-R M.2083-0: IMT vision – framework and overall objectives of the future development of IMT for 2020 and beyond’ (International Telecommunication Union, 2015).
-
39)
-
16. Andrews, J., Buzzi, S., Choi, W., et al: ‘What will 5 g be?’, IEEE J. Sel. Areas Commun., 2014, 32, (6), pp. 1065–1082 (doi: 10.1109/JSAC.2014.2328098).
-
40)
-
4. Perera, C., Zaslavsky, A., Christen, P., et al: ‘Context aware computing for the internet of things: a survey’, IEEE Commun. Surv. Tutor., 2014, 16, (1), pp. 414–454 (doi: 10.1109/SURV.2013.042313.00197).
-
41)
-
15. Zhao, C., Wysocki, B.T., Liu, Y., et al: ‘Spike-time-dependent encoding for neuromorphic processors’, J. Emerg. Technol. Comput. Syst., 2015, 12, (3), pp. 23:1–23:21 (doi: 10.1145/2738040).
-
42)
-
43)
-
41. ElSawy, H., Hossain, E., Alouini, M.S.: ‘Analytical modeling of mode selection and power control for underlay D2D communication in cellular networks’, IEEE Trans. Commun., 2014, 62, (11), pp. 4147–4161 (doi: 10.1109/TCOMM.2014.2363849).
-
44)
-
27. Zhou, Y., Zhuang, W.: ‘Opportunistic cooperation in wireless ad hoc networks with interference correlation’, Peer-to-Peer Netw. Appl., 2017, 10, (1), pp. 238–252.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0010
Related content
content/journals/10.1049/iet-cps.2017.0010
pub_keyword,iet_inspecKeyword,pub_concept
6
6