ترغب بنشر مسار تعليمي؟ اضغط هنا

A reconfigurable intelligent surface (RIS) is a metamaterial that can be integrated into walls and influence the propagation of electromagnetic waves. This, typically passive radio frequency (RF) technology is emerging for indoor and outdoor use with the potential of making wireless communications more reliable in increasingly challenging radio environments. This paper goes one step further and introduces mobile RIS, specifically, RIS carried by unmanned aerial vehicles (UAVs) to support cellular communications networks and services of the future. We elaborate on several use cases, challenges, and future research opportunities for designing and optimizing wireless systems at low cost and with low energy footprint.
This paper discusses the problem of securing the transmissions of multiple ground users against eavesdropping attacks. We propose and optimize the deployment of a single unmanned aerial vehicle (UAV), which serves as an aerial relay between the user cluster and the base station. The focus is on maximizing the secrecy energy efficiency by jointly optimizing the uplink transmission powers of the ground users and the position of the UAV. The joint optimization problem is nonconvex; therefore we split it into two subproblems and solve them using an iterative algorithm.
An unmanned aircraft system (UAS) consists of an unmanned aerial vehicle (UAV) and its controller which use radios to communicate. While the remote controller (RC) is traditionally operated by a person who is maintaining visual line of sight with the UAV it controls, the trend is moving towards long-range control and autonomous operation. To enable this, reliable and widely available wireless connectivity is needed because it is the only way to manually control a UAV or take control of an autonomous UAV flight. This article surveys the ongoing Third Generation Partnership Project (3GPP) standardization activities for enabling networked UASs. In particular, we present the requirements, envisaged architecture and services to be offered to/by UAVs and RCs, which will communicate with one another, with the UAS Traffic Management (UTM), and with other users through cellular networks. Critical research directions relate to security and spectrum coexistence, among others. We identify major R&D platforms that will drive the standardization of cellular communications networks and applications.
Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting many applications and services, such as precision agriculture, search and rescue, temporary network deployment or coverage extension, and security. UAVs are being considered for integration into emerging 5G networks as aerial users or network support nodes. We propose to leverage UAVs in 5G to assist in the prevention, detection, and recovery of attacks on 5G networks. Specifically, we consider jamming, spoofing, eavesdropping and the corresponding mitigation mechanisms that are enabled by the versatility of UAVs. We introduce the hot zone, safe zone and UAV-based secondary authorization entity, among others, to increase the resilience and confidentiality of 5G radio access networks and services. We present simulation results and discuss open issues and research directions, including the need for experimental evaluation and a research platform for prototyping and testing the proposed technologies.
Unmanned aerial vehicles (UAVs) are emerging in commercial spaces and will support many applications and services, such as smart agriculture, dynamic network deployment, and network coverage extension, surveillance and security. The unmanned aircraft system (UAS) traffic management (UTM) provides a framework for safe UAV operation integrating UAV controllers and central data bases via a communications network. This paper discusses the challenges and opportunities for machine learning (ML) for effectively providing critical UTM services. We introduce the four pillars of UTM---operation planning, situational awareness, status and advisors and security---and discuss the main services, specific opportunities for ML and the ongoing research. We conclude that the multi-faceted operating environment and operational parameters will benefit from collected data and data-driven algorithms, as well as online learning to face new UAV operation situations.
The Internet of Things (IoT) will soon be omnipresent and billions of sensors and actuators will support our industries and well-being. IoT devices are embedded systems that are connected using wireless technology for most of the cases. The availabil ity of the wireless network serving the IoT, the privacy, integrity, and trustworthiness of the data are of critical importance, since IoT will drive businesses and personal decisions. This paper proposes a new approach in the wireless security domain that leverages advanced wireless technology and the emergence of the unmanned aerial system or vehicle (UAS or UAV). We consider the problem of eavesdropping and analyze how UAVs can aid in reducing, or overcoming this threat in the mobile IoT context. The results show that huge improvements in terms of channel secrecy rate can be achieved when UAVs assist base stations for relaying the information to the desired IoT nodes. Our approach is technology agnostic and can be expanded to address other communications security aspects.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا