sensors-logo

Journal Browser

Journal Browser

Secure Communication for Next-Generation Wireless Networks

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Communications".

Deadline for manuscript submissions: 31 December 2024 | Viewed by 3809

Special Issue Editors


E-Mail Website
Guest Editor
National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, China
Interests: wireless and mobile communications
Special Issues, Collections and Topics in MDPI journals
Institute of Electronic Engineering, China Academy of Engineering Physics, Mianyang 621999, China
Interests: wireless network optimization; high precision time and frequency transfer; UAV swarm systems; wireless communication system architecture and implementation

Special Issue Information

Dear Colleagues,

Communication security remains an open challenge for the upcoming next-generation wireless networks, due to the wide consideration of distributed construction such as cell-free multiple-input multiple-output (MIMO), device-to-device (D2D), relay, etc. However, much broader coverage thanks to the integration of unmanned aerial vehicle (UAV) and satellite communications may also increase the risk of information leakage. Following this line, this Special Issue focuses on secure communication for next-generation wireless networks, and we invite original and unpublished manuscripts that are related, but limited to, these topics:

  • Design of wireless network for information safeguards;
  • Secure Mmwave and terahertz networks;
  • New artificial noise mechanism for preventing eavesdroppers;
  • Physical layer security for broadband wireless transmission;
  • Secure modulation and waveform for single-input single-output (SISO) and MIMO;
  • Covert communications for high-rate transmission;
  • Beamforming design for wireless security.

If you want to learn more information or need any advice, you can contact the Special Issue Editor Penelope Wang via <penelope.wang@mdpi.com> directly.

Prof. Dr. Yue Xiao
Dr. Jie Tian
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

12 pages, 602 KiB  
Article
Clipping Noise Compensation for Overlapped Time Domain Multiplexing toward Low Peak-to-Average Power Ratio
by Chongda Huang, Qianzhen Zhang, Xiaoyuan Li and Yue Xiao
Sensors 2024, 24(5), 1607; https://doi.org/10.3390/s24051607 - 01 Mar 2024
Viewed by 451
Abstract
Overlapped Time Domain Multiplexing (OvTDM) is a high-rate transmission technology that employs the idea of superposition coded modulation (SCM) scheme for signal generation, aiming to achieve maximum channel capacity sharing. Meanwhile, it is also widely considered as a promising technique toward physical layer [...] Read more.
Overlapped Time Domain Multiplexing (OvTDM) is a high-rate transmission technology that employs the idea of superposition coded modulation (SCM) scheme for signal generation, aiming to achieve maximum channel capacity sharing. Meanwhile, it is also widely considered as a promising technique toward physical layer security. As a main drawback of such system, a high peak-to-average power ratio (PAPR) issue in this system, arising from multi-layer superposition, can be addressed through intentional clipping. However, the detection at the receiver side is vulnerable to nonlinear distortion caused by clipping, which can degrade the performance. To mitigate this distortion, this paper proposed an iterative scheme for estimating and partially canceling clipping distortion at the receiver. We managed to mitigate the impact of clipping noise as much as possible and minimize the cost of optimizing PAPR, thereby improving the transmission performance of OvTDM in the context of amplitude clipping. Full article
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)
Show Figures

Figure 1

17 pages, 4036 KiB  
Article
A Novel Non-Coherent Q-Ary TH-PPM Transceiver
by Peng Wang, Jie Tian, Duoye Li, Peng Fei and Xianhua Shi
Sensors 2024, 24(1), 105; https://doi.org/10.3390/s24010105 - 25 Dec 2023
Viewed by 554
Abstract
Time-hopping pulse position modulation (TH-PPM) stands out as a secure communication due to the pseudo-random characteristics of its time-hopping sequence. However, the conventional TH-PPM transceiver encounters challenges in implementation, particularly in achieving the requisite high precision for synchronization. This paper introduces a novel [...] Read more.
Time-hopping pulse position modulation (TH-PPM) stands out as a secure communication due to the pseudo-random characteristics of its time-hopping sequence. However, the conventional TH-PPM transceiver encounters challenges in implementation, particularly in achieving the requisite high precision for synchronization. This paper introduces a novel non-coherent Q-ary TH-PPM transceiver, designed to surpass the Bit error rate (BER) performance of conventional TH-PPM transceivers in scenarios under non-ideal synchronization conditions, which also being straightforward to implement. Firstly, we provide an overview of the conventional TH-PPM transceiver. Secondly, the novel TH-PPM transceiver is introduced. In this context, a novel method for generating the TH-PPM signal is proposed for the transmitter, and a parallel matched-filter algorithm, adapted to the new TH-PPM signal, is presented for the receiver. Subsequently, the investigation delves into an in-depth analysis of BER performance, considering both ideal synchronization conditions and non-ideal synchronization conditions, for both the conventional and the new TH-PPM transceiver. Furthermore, the paper proposes a numerical simulation to validate the theoretical findings. The results demonstrate that the new TH-PPM transceiver outperforms the conventional counterpart by showing better BER performance in scenarios with non-ideal synchronization conditions. Full article
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)
Show Figures

Figure 1

19 pages, 2172 KiB  
Article
Performance Comparison of Relay-Based Covert Communications: DF, CF and AF
by Jihwan Moon
Sensors 2023, 23(21), 8747; https://doi.org/10.3390/s23218747 - 26 Oct 2023
Cited by 4 | Viewed by 785
Abstract
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF). We consider a source node that attempts to send both public and covert messages to a destination node through [...] Read more.
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF). We consider a source node that attempts to send both public and covert messages to a destination node through a relay on which a covert message detector is embedded. By taking the minimum detection error probability (DEP) at the relay into account, we optimize the power distribution between the public and covert messages to achieve the maximum covert rate. We further make a delay-aware comparison among DF, CF and AF relay systems with the obtained closed-form covert rates and conduct an extensive examination on the asymptotic behaviors in different limits. Our analyses reveal that CF or AF tend to outperform DF for high source transmit power or low relay transmit power, while various system parameters such as the processing delay, minimum required quality of service for public messages and DEP threshold lead to different performance relationships among DF, CF and AF for high relay transmit power. Numerical results verify our investigation into the performance comparison in various channel models. Full article
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)
Show Figures

Figure 1

17 pages, 2561 KiB  
Article
Anti-Spoofing Method for Improving GNSS Security by Jointly Monitoring Pseudo-Range Difference and Pseudo-Range Sum Sequence Linearity
by Xinran Zhang, Taotao Liang, Jie Tian, Junwei Wu, Chuan Wang and Maolin Chen
Sensors 2023, 23(20), 8418; https://doi.org/10.3390/s23208418 - 12 Oct 2023
Viewed by 756
Abstract
Spoofing interference is one of the most emerging threats to the Global Navigation Satellite System (GNSS); therefore, the research on anti-spoofing technology is of great significance to improving the security of GNSS. For single spoofing source interference, all the spoofing signals are broadcast [...] Read more.
Spoofing interference is one of the most emerging threats to the Global Navigation Satellite System (GNSS); therefore, the research on anti-spoofing technology is of great significance to improving the security of GNSS. For single spoofing source interference, all the spoofing signals are broadcast from the same antenna. When the receiver is in motion, the pseudo-range of spoofing signals changes nonlinearly, while the difference between any two pseudo-ranges changes linearly. Authentic signals do not have this characteristic. On this basis, an anti-spoofing method is proposed by jointly monitoring the linearity of the pseudo-range difference (PRD) sequence and pseudo-range sum (PRS) sequence, which transforms the spoofing detection problem into the sequence linearity detection problem. In this paper, the model of PRD and PRS is derived, the hypothesis based on the linearity of PRD sequence and PRS sequence is given, and the detection performance of the method is evaluated. This method uses the sum of squares of errors (SSE) of linear fitting of the PRD sequence and PRS sequence to construct detection statistics, and has low computational complexity. Simulation results show that this method can effectively detect spoofing interference and distinguish spoofing signals from authentic signals. Full article
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)
Show Figures

Figure 1

13 pages, 560 KiB  
Communication
Disguised Full-Duplex Covert Communications
by Jihwan Moon
Sensors 2023, 23(14), 6515; https://doi.org/10.3390/s23146515 - 19 Jul 2023
Cited by 1 | Viewed by 666
Abstract
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In [...] Read more.
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages. In this paper, we take a step further and consider a scenario in which a covert communications node disguises itself as another functional entity for even more covertness. To be specific, we study a system where a source node communicates with a seemingly receive-only destination node which, in fact, is full-duplex (FD) and covertly delivers critical messages to another hidden receiver while evading the surveillance. Our aim is to identify the achievable covert rate at the hidden receiver by optimizing the public data rate and the transmit power of the FD destination node subject to the worst-case detection error probability (DEP) of the warden. Closed-form solutions are provided, and we investigate the effects of various system parameters on the covert rate through numerical results, one of which reveals that applying more (less) destination transmit power achieves a higher covert rate when the source transmit power is low (high). Since our work provides a performance guideline from the information-theoretic point of view, we conclude this paper with a discussion on possible future research such as analyses with practical modulations and imperfect channel state information. Full article
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)
Show Figures

Figure 1

Back to TopTop