-
Mixed Static and Reconfigurable Metasurface Deployment in Indoor Dense Spaces: How Much Reconfigurability is Needed?
Authors:
Zhenyu Li,
Ozan Alp Topal,
Özlem Tuğfe Demir,
Emil Björnson,
Cicek Cavdar
Abstract:
In this paper, we investigate how metasurfaces can be deployed to deliver high data rates in a millimeter-wave (mmWave) indoor dense space with many blocking objects. These surfaces can either be static metasurfaces (SMSs) that reflect with fixed phase-shifts or reconfigurable intelligent surfaces (RISs) that can reconfigure their phase-shifts to the currently served user. The latter comes with an…
▽ More
In this paper, we investigate how metasurfaces can be deployed to deliver high data rates in a millimeter-wave (mmWave) indoor dense space with many blocking objects. These surfaces can either be static metasurfaces (SMSs) that reflect with fixed phase-shifts or reconfigurable intelligent surfaces (RISs) that can reconfigure their phase-shifts to the currently served user. The latter comes with an increased power, cabling, and signaling cost. To see how reconfigurability affects the network performance, we propose an iterative algorithm based on the feasible point pursuit successive convex approximation method. We jointly optimize the types and phase-shifts of the surfaces and the time portion allocated to each user equipment to maximize the minimum data rate achieved by the network. Our numerical results demonstrate that the minimum data rate improves as more RISs are introduced but the gain diminishes after some point. Therefore, introducing more reconfigurability is not always necessary. Another result shows that to reach the same data rate achieved by using 22 SMSs, at least 18 RISs are needed. This suggests that when it is costly to deploy many RISs, as an inexpensive alternative solution, one can reach the same data rate just by densely deploying more SMSs.
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
mmWave Coverage Extension Using Reconfigurable Intelligent Surfaces in Indoor Dense Spaces
Authors:
Zhenyu Li,
Ozan Alp Topal,
Özlem Tuğfe Demir,
Emil Björnson,
Cicek Cavdar
Abstract:
In this work, we consider the deployment of reconfigurable intelligent surfaces (RISs) to extend the coverage of a millimeter-wave (mmWave) network in indoor dense spaces. We first integrate RIS into ray-tracing simulations to realistically capture the propagation characteristics, then formulate a non-convex optimization problem that minimizes the number of RISs under rate constraints. We propose…
▽ More
In this work, we consider the deployment of reconfigurable intelligent surfaces (RISs) to extend the coverage of a millimeter-wave (mmWave) network in indoor dense spaces. We first integrate RIS into ray-tracing simulations to realistically capture the propagation characteristics, then formulate a non-convex optimization problem that minimizes the number of RISs under rate constraints. We propose a feasible point pursuit and successive convex approximation-based algorithm, which solves the problem by jointly selecting the RIS locations, optimizing the RIS phase-shifts, and allocating time resources to user equipments (UEs). The numerical results demonstrate substantial coverage extension by using at least four RISs, and a data rate of 130 Mbit/s is guaranteed for UEs in the considered area of an airplane cabin.
△ Less
Submitted 18 February, 2023;
originally announced February 2023.
-
Physical Layer Authentication for LEO Satellite Constellations
Authors:
Ozan Alp Topal,
Gunes Karabulut Kurt
Abstract:
Physical layer authentication (PLA) is the process of claiming identity of a node based on its physical layer characteristics such as channel fading or hardware imperfections. In this work, we propose a novel PLA method for the inter-satellite communication links (ISLs) of the LEO satellites. In the proposed PLA method, multiple receiving satellites validate the identity of the transmitter by comp…
▽ More
Physical layer authentication (PLA) is the process of claiming identity of a node based on its physical layer characteristics such as channel fading or hardware imperfections. In this work, we propose a novel PLA method for the inter-satellite communication links (ISLs) of the LEO satellites. In the proposed PLA method, multiple receiving satellites validate the identity of the transmitter by comparing the Doppler frequency measurements with the reference mobility information of the legitimate transmitter and then fuse their decision considering the selected decision rule. Analytical expressions are obtained for the spoofing detection probability and false alarm probability of the fusion methods. Numerically obtained high authentication performance results pave the way to a novel and easily integrable authentication mechanism for the LEO satellite networks.
△ Less
Submitted 17 February, 2022;
originally announced February 2022.
-
Securing the Inter-Spacecraft Links: Physical Layer Key Generation from Doppler Frequency Shift
Authors:
Ozan Alp Topal,
Gunes Karabulut Kurt,
Halim Yanikomeroglu
Abstract:
In this work, we propose a secret key generation procedure specifically designed for the inter-spacecraft communication links. As a novel secrecy source, the spacecrafts utilize Doppler frequency shift based measurements. In this way, the mobilities of the communication devices are exploited to generate secret keys, where this resource can be utilized in the environments that the channel fading ba…
▽ More
In this work, we propose a secret key generation procedure specifically designed for the inter-spacecraft communication links. As a novel secrecy source, the spacecrafts utilize Doppler frequency shift based measurements. In this way, the mobilities of the communication devices are exploited to generate secret keys, where this resource can be utilized in the environments that the channel fading based key generation methods are not available. The mobility of a spacecraft is modeled as the superposition of a pre-determined component and a dynamic component. We derive the maximum achievable secret key generation rate from the Doppler frequency shift. The proposed secret key generation procedure extracts the Doppler frequency shift in the form of nominal power spectral density samples (NPSDS). We propose a maximum-likelihood (ML) estimation for the NPSDS at the spacecrafts, then a uniform quantizer is utilized to obtain secret key bits. The key disagreement rate (KDR) is analytically obtained for the proposed key generation procedure. Through numerical studies, the tightness of the provided approximations is shown. Both the theoretical and numerical results demonstrate the validity and the practicality of the presented physical layer key generation procedure considering the security of the communication links of spacecrafts.
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
An Adaptive Multi-Agent Physical Layer Security Framework for Cognitive Cyber-Physical Systems
Authors:
Mehmet Özgün Demir,
Ozan Alp Topal,
Ali Emre Pusane,
Guido Dartmann,
Gerd Ascheid,
Güneş Karabulut Kurt
Abstract:
Being capable of sensing and behavioral adaptation in line with their changing environments, cognitive cyber-physical systems (CCPSs) are the new form of applications in future wireless networks. With the advancement of the machine learning algorithms, the transmission scheme providing the best performance can be utilized to sustain a reliable network of CCPS agents equipped with self-decision mec…
▽ More
Being capable of sensing and behavioral adaptation in line with their changing environments, cognitive cyber-physical systems (CCPSs) are the new form of applications in future wireless networks. With the advancement of the machine learning algorithms, the transmission scheme providing the best performance can be utilized to sustain a reliable network of CCPS agents equipped with self-decision mechanisms, where the interactions between each agent are modeled in terms of service quality, security, and cost dimensions. In this work, first, we provide network utility as a reliability metric, which is a weighted sum of the individual utility values of the CCPS agents. The individual utilities are calculated by mixing the quality of service (QoS), security, and cost dimensions with the proportions determined by the individualized user requirements. By changing the proportions, the CCPS network can be tuned for different applications of next-generation wireless networks. Then, we propose a secure transmission policy selection (STPS) mechanism that maximizes the network utility by using the Markov-decision process (MDP). In STPS, the CCPS network jointly selects the best performing physical layer security policy and the parameters of the selected secure transmission policy to adapt to the changing environmental effects. The proposed STPS is realized by reinforcement learning (RL), considering its real-time decision mechanism where agents can decide automatically the best utility providing policy in an altering environment.
△ Less
Submitted 7 January, 2021;
originally announced January 2021.
-
Securing the Inter-Spacecraft Links: Doppler Frequency Shift based Physical Layer Key Generation
Authors:
Ozan Alp Topal,
Gunes Karabulut Kurt,
Halim Yanikomeroglu
Abstract:
We propose a novel physical layer secret key generation method for the inter-spacecraft communication links. By exploiting the Doppler frequency shifts of the reciprocal spacecraft links as a unique secrecy source, spacecrafts aim to obtain identical secret keys from their individual observations. We obtain theoretical expressions for the key disagreement rate (KDR). Using generalized Gauss-Laguer…
▽ More
We propose a novel physical layer secret key generation method for the inter-spacecraft communication links. By exploiting the Doppler frequency shifts of the reciprocal spacecraft links as a unique secrecy source, spacecrafts aim to obtain identical secret keys from their individual observations. We obtain theoretical expressions for the key disagreement rate (KDR). Using generalized Gauss-Laguerre quadrature, we derive closed form expressions for the KDR. Through numerical studies, the tightness of the provided approximations are shown. Both the theoretical and numerical results demonstrate the validity and the practicality of the presented physical layer key generation procedure considering the security of the communication links of spacecrafts.
△ Less
Submitted 31 August, 2020;
originally announced August 2020.
-
Identification of Smart Jammers: Learning based Approaches Using Wavelet Representation
Authors:
Ozan Alp Topal,
Selen Gecgel,
Ender Mete Eksioglu,
Gunes Karabulut Kurt
Abstract:
Smart jammer nodes can disrupt communication between a transmitter and a receiver in a wireless network, and they leave traces that are undetectable to classical jammer identification techniques, hidden in the time-frequency plane. These traces cannot be effectively identified through the use of the classical Fourier transform based time-frequency transformation (TFT) techniques with a fixed resol…
▽ More
Smart jammer nodes can disrupt communication between a transmitter and a receiver in a wireless network, and they leave traces that are undetectable to classical jammer identification techniques, hidden in the time-frequency plane. These traces cannot be effectively identified through the use of the classical Fourier transform based time-frequency transformation (TFT) techniques with a fixed resolution. Inspired by the adaptive resolution property provided by the wavelet transforms, in this paper, we propose a jammer identification methodology that includes a pre-processing step to obtain a multi-resolution image, followed by the use of a classifier. Support vector machine (SVM) and deep convolutional neural network (DCNN) architectures are investigated as classifiers to automatically extract the features of the transformed signals and to classify them. Three different jamming attacks are considered, the barrage jamming that targets the complete transmission bandwidth, the synchronization signal jamming attack that targets synchronization signals and the reference signal jamming attack that targets the reference signals in an LTE downlink transmission scenario. The performance of the proposed approach is compared with the classical Fourier transform based TFT techniques, demonstrating the efficacy of the proposed approach in the presence of smart jammers.
△ Less
Submitted 27 January, 2019;
originally announced January 2019.