References of "IEEE Communications Magazine"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailEnergy- and Cost-Efficient Physical Layer Security in the Era of IoT: The Role of Interference
Wei, Z.; Masouros, C.; Liu, F. et al

in IEEE Communications Magazine (2020), 58(4), 81-87

IoT is emerging as the future evolution of the Internet, aiming to provide connectivity for everyone and everything. Since IoT is expected to carry important and private information, a high level of PHY ... [more ▼]

IoT is emerging as the future evolution of the Internet, aiming to provide connectivity for everyone and everything. Since IoT is expected to carry important and private information, a high level of PHY security is critical for wireless communications in IoT, as a complement for traditional security techniques that are employed at high layers. In this overview, we examine the recent interest in energy-efficient and cost-efficient PHY solutions for securing downlink IoT transmission through interference exploitation. This exciting line of research departs from conventional interference cancellation, and judiciously employs the inherent interference as a useful element for LUs while obstructing the eavesdropping of information. We first discuss the concept of CI, and then elaborate the fundamental CI signal design that employs the traditionally undesired interference as a constructive element to LUs while ensuring they are destructive to potential Eves. Subsequently, we illustrate several low-hardware-cost techniques to inherit the advantage of CI in an energy- and cost-efficient manner, from the perspective of HBF and DM. This family of techniques brings a disruptive vision of interference management for securing wireless communications with an eye on low-cost and hardware-constrained devices tailored for IoT systems. [less ▲]

Detailed reference viewed: 43 (3 UL)
Full Text
Peer Reviewed
See detailSecuring Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography
Liu, Zhe UL; Choo, Kim-Kwang Raymond; Groszschädl, Johann UL

in IEEE Communications Magazine (2018), 56(2), 158-162

In order to increase the security of edge computing, all data transmitted to and from edge devices, as well as all data stored on edge devices, must be encrypted. Especially when the transmitted or stored ... [more ▼]

In order to increase the security of edge computing, all data transmitted to and from edge devices, as well as all data stored on edge devices, must be encrypted. Especially when the transmitted or stored data contains sensitive personal information, long-term protection over periods of ten or more years may be required, which can only be achieved with post-quantum cryptography. This paper first gives a brief overview of post-quantum public-key cryptosystems based on hard mathematical problems related to hash functions, error-correcting codes, multivariate quadratic systems, and lattices. Then, the suitability of lattice-based cryptosystems for resource-constrained devices is discussed and efficient implementations for 8 and 32-bit microcontrollers are outlined. [less ▲]

Detailed reference viewed: 140 (3 UL)
Full Text
Peer Reviewed
See detailCognitive Spectrum Utilization in Ka Band Multibeam Satellite Communications
Maleki, Sina UL; Chatzinotas, Symeon UL; Evans, Barry et al

in IEEE Communications Magazine (2015), 53(3), 24-29

Multibeam satellite networks in Ka band have been designed to accommodate the increasing traffic demands of the coming years. However, these systems are spectrum limited due to the current spectrum ... [more ▼]

Multibeam satellite networks in Ka band have been designed to accommodate the increasing traffic demands of the coming years. However, these systems are spectrum limited due to the current spectrum allocation policies. This paper investigates the potentials of applying cognitive radio techniques in satellite communications in order to increase the spectrum opportunities for future generation of satellite networks without interfering operation of incumbent services. These extra spectrum opportunities can potentially amount to 2.4 GHz of bandwidth in downlink, and to 2 GHz of bandwidth in uplink for high density fixed satellite services (HDFSS). [less ▲]

Detailed reference viewed: 329 (19 UL)
Full Text
Peer Reviewed
See detailWorld Wide Web caching: the application-level view of the Internet
Baentsch, Michael; Baum, Lothar; Molter, Georg et al

in IEEE Communications Magazine (1997), 35(6), 170-178

Detailed reference viewed: 99 (4 UL)