![]() ; ; et al in Wireless Personal Communications (2022) Research on intelligent wireless network aims at the development of a human society which is ubiquitous and mobile, simultaneously providing solutions to the coverage, capacity, and computing issues ... [more ▼] Research on intelligent wireless network aims at the development of a human society which is ubiquitous and mobile, simultaneously providing solutions to the coverage, capacity, and computing issues. These networks will focus on provisioning intelligent use-cases through higher data-rates over the millimeter waves and the Tera-Hertz frequency. However, at such high frequencies, multiple non-desired phenomena such as, atmospheric absorption and blocking occur which create a bottleneck owing to resource scarcity. Hence, existing trend of exactly reproducing transmitted data at the receiver will result in a constant need for higher bandwidth. A possible solution to such a challenge lies in semantic communications which focuses on meaning (relevance or context) of the received data. This article presents a detailed survey on the recent technological trends in regard to semantic communications for intelligent wireless networks. Initially, the article focuses on the semantic communications architecture including the model, and source and channel coding. Next, cross-layer interaction, and various goal-oriented communication applications are detailed. Further, overall semantic communications trends are presented following which, the key challenges and issues are detailed. Lastly, this survey article is an attempt to significantly contribute towards initiating future research in the area of semantic communications for the intelligent wireless networks. [less ▲] Detailed reference viewed: 16 (0 UL)![]() ; Genç, Ziya Alper ![]() in Wireless Personal Communications (2018), 98(1), 1135-1154 Radio frequency identification (RFID) technology has been increasingly integrated into numerous applications for authentication of objects or individuals. However, because of its limited computation power ... [more ▼] Radio frequency identification (RFID) technology has been increasingly integrated into numerous applications for authentication of objects or individuals. However, because of its limited computation power, RFID technology may cause several security and privacy issues such as tracking the owner of the tag, cloning of the tags and etc. Recently, two chaotic map-based authentication protocols have been proposed for low-cost RFID tags in order to eliminate these issues. In this paper, we give the security analysis of these protocols and uncover their weaknesses. We prove that these protocols are vulnerable to tag tracing, tag impersonation and desynchronization attacks. The attack complexity of an adversary is polynomial and the success probability of these attacks are substantial. Moreover, we also propose an improved RFID authentication protocol that employs Chebyshev chaotic maps and complies with the EPC global Class 1 Generation 2 standard. Finally, we show that our protocol is resistant against those security issues. [less ▲] Detailed reference viewed: 173 (4 UL)![]() ; ; et al in Wireless Personal Communications (2016) Detailed reference viewed: 128 (3 UL)![]() ; ; et al in Wireless Personal Communications (2015), 85(4), 2687-2710 Abstract A power splitting approach for simultaneous wireless information and energy transfer is provided in this paper. We consider coordinated multipiont downlink transmission with M base stations (BSs ... [more ▼] Abstract A power splitting approach for simultaneous wireless information and energy transfer is provided in this paper. We consider coordinated multipiont downlink transmission with M base stations (BSs) and J mobile stations (MSs). The main goal of this paper is to maximize per-MS data rate and receiving energy by dynamically optimizing transmitting beamformer. To improve fairness, this problem can be formulated to maximize the minimum rate of all J MSs with per-BS transmitting power constraints and per-MS receiving energy constraints, which is NP-hard problem. Minimum mean square error receiver, affine approximation and alternative convex optimization (ACO) methods are introduced to decompose the original NP-hard problem to several convex subproblems which can be solved by second-order cone programming with low rank (which is equal to the number of data streams) solutions, and then a fast heuristic algorithm is provided to solve the original problem. Numerical results show that the proposed algorithm can achieve fairness, and outperforms sum rate scheme in terms of fairness and outage probability. The fast convergency also demonstrates the proposed algorithm’s good performance. [less ▲] Detailed reference viewed: 105 (3 UL) |
||