Logo
User Name

Pamela Njemčević

Društvene mreže:

A. Maric, Pamela Njemcevic

This paper introduces a novel statistical simulator designed to model propagation in two-way diffuse power (TWDP) fading channels. The simulator employs two zero-mean stochastic sinusoids to simulate specular components, while a sum of sinusoids is used to model the diffuse one. Using the developed simulator, the autocorrelation and cross-correlation functions of the quadrature components, as well as the autocorrelation of the complex and squared envelope, are derived for the first time in literature for channels experiencing TWDP fading. The statistical properties of the proposed simulator are thoroughly validated through extensive simulations, which closely align with the theoretical results.

A. Maric, Pamela Njemcevic

In this paper, the conditional phase distribution of the two-wave with diffuse power (TWDP) process is derived as a closed-form and as an infinite-series expression. For the obtained infinite series expression, a truncation analysis is performed and the truncated expression is used to examine the influence of different channel conditions on the behavior of the TWDP phase. All the results are verified through Monte Carlo simulations.

Miralem Mehic, Libor Michalek, Emir Dervisevic, Patrik Burdiak, Matej Plakalovic, J. Rozhon, Nerman Mahovac, Filip Richter, Enio Kaljic et al.

Every attempt to access to the Internet through a Web browser, email sent, VPN connection, VoIP call, instant message or other use of telecommunications systems involves cryptographic techniques. The most commonly applied technique is asymmetric cryptography, which is generally executed in the background without the user even being aware. It establishes a cryptographic code based on the computational complexity of mathematical problems. However, this type of cryptography, which is widely used in today’s telecommunications systems, is under threat as electronics and computing rapidly develop. The development of fifth-generation cellular networks (5G) is gaining momentum, and given its wide field of application, security requires special attention. This is especially true faced with the development of quantum computers. One solution to this security challenge is to use more advanced techniques to establish cryptographic keys that are not susceptible to attack. An essential part of quantum cryptography, Quantum Key Distribution (QKD) uses the principles of quantum physics to establish and distribute symmetric cryptographic keys between two geographically distant users. QKD establishes information-theoretically secure cryptographic keys that are resistant to eavesdropping when they are created. In this paper, we survey the security challenges and approaches in 5G networks concerning network protocols, interfaces and management organizations. We begin by examining the fundamentals of QKD and discuss the creation of QKD networks and their applications. We then outline QKD network architecture and its components and standards, following with a summary of QKD and post-quantum key distribution techniques and approaches for its integration into existing security frameworks such as VPNs (IPsec and MACsec). We also discuss the requirements, architecture and methods for implementing the FPGA-based encryptors needed to execute cryptographic algorithms with security keys. We discuss the performance and technologies of post-quantum cryptography, and finally, examine reported 5G demonstrations which have used quantum technologies, highlighting future research directions.

In this paper, error performance analysis for M-ary phase shift keying (PSK) system in the inverse gamma two-ray with diffuse power (IG/TWDP) composite fading channel is presented. Using Fourier series approach, the average symbol error probability (ASEP) expression is derived in terms of hypergeometric functions, which can be evaluated using standard software packages. Derived expression is used to investigate degradation of error performance cased by shadowing, in regard to those obtained by considering only the TWDP multipath fading. All obtained results are verified by Monte-Carlo simulation.

In this paper, the error performance of coherent systems in presence of imperfect carrier phase estimation is investigated for signals propagating over the two-ray with diffuse power (TWDP) fading channels, in case when synchronization is performed using pilot carrier located out of the signal’s band-width. In that sense, closed-form approximate average binary error probability (ABEP) expressions are derived for binary and quadrature phase shift keying (BPSK and QPSK) modulated signals, with the carrier extracted using phase-locked loop (PLL) and phase noise approximated by Tikhonov probability density function (PDF). Derived expressions are calculated for various combinations of channel and phase loop parameters, enabling us to observe their effects on overall system performance. The accu-racy of derived expressions is verified through their comparison with the exact ABEPs obtained by numerical integration of the appropriate expressions.

Flow table lookup is a well-known bottleneck in software-defined network switches. Associative lookup is the fastest but most costly method. On the other hand, an approximate flow classification based on Bloom filters has an outstanding cost-benefit ratio but comes with a downside of false-positive results. Therefore, we propose a new flow table lookup scheme based on Bloom filters and RAM, which offers a good compromise between cost and performance. We solve the problem of false positives of primary Bloom filters by verifying the results and, if necessary, by linearly searching the contents of secondary RAM. Also, we provide a practical implementation in the FPGA-based SDN switch and experimentally show that the proposed solution can achieve better performance than the classic linear search at the low cost typical of Bloom filters.

A. Maric, Pamela Njemcevic

Two-wave with diffuse power (TWDP) is one of the most promising distribution for description of a small-scale fading in the emerging mmWave band. However, traditional error performance analysis in these channels faces two fundamental issues. It is mostly based on conventional TWDP parameterization which is not in accordance with the model’s underlying physical mechanisms and which hinders accurate observation of the impact of a model parameters on a system’s performance metrics. In addition, the existing average bit/symbol error probability (ABEP/ASEP) expressions for most modulations and diversity schemes are available as approximations, which are accurate only for specific combinations of TWDP parameters. Accordingly, in this paper, the exact ASEP expressions are derived for M-ary rectangular quadrature amplitude modulation (RQAM) with coherent detection and for M-ary DPSK modulation, and are given in terms of physically justified parameters. Besides, in order to relax computational complexity of proposed exact ASEPs in high signal-to-noise ratio (SNR) region, their asymptotic counterparts are derived as the simple closed-form expressions, matching the exact ones for SNR>30dB. Results are verified by Monte-Carlo simulation.

Two-wave with diffuse power (TWDP) is one of the most promising models for description of a small-scale fading effects in the emerging wireless networks. However, its conventional parameterization based on parameters K and Δ is not in line with model’s underlying physical mechanisms. Accordingly, in this paper, we first identified anomalies related to usage of conventional TWDP parameterization in moment-based estimation, showing that the existing Δ-based estimators are unable to provide meaningful estimates in some channel conditions. Then, we derived moment-based estimators of recently introduced physically justified TWDP parameters K and Γ and analyzed their performance through asymptotic variance (AsV) and Cramer–Rao bound (CRB) metrics. Performed analysis has shown that Γ-based estimators managed to overcome all anomalies observed for Δ-based estimators, simultaneously improving the overall moment-based estimation accuracy.

...
...
...

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više