当前位置: X-MOL 学术Wireless Pers. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Comprehensive Survey on Security Issues in 5G Wireless Communication Network using Beamforming Approach
Wireless Personal Communications ( IF 1.9 ) Pub Date : 2021-05-08 , DOI: 10.1007/s11277-021-08416-0
Arunima Sharma , Rakesh Kumar Jha

Numerous devices are expected to upsurge profoundly in the proximate future with an estimated figure exceeding the 50 billion benchmark of connected devices by 2020. There are some rudimentary demands of the subscribers like system capacity, improved data rates with reduction in the latency and secure transmission of data in an unsecured media and to meet these demands, the cellular network has to go under suitable progression. As a building prospective for fulfilling these demands, to overcome the threats and challenges in the transmission of the data and to provide security to the information from the possible attacks, 5G is emerging as an optimal solution. For the demands of the tremendous count of subscribers, Device-to-Device Wireless Communication Network is an operative technology. The escalating content sharing amongst the users has been resulting in an exponential intensification in the wireless data traffic, coercing networks of cellular users to experience a suitable cataclysm. For allocating the resources to the Cellular Users under an attack scenario, numerous advances have been made till now. In this paper, an adaptive resource block allocation algorithm using HMM with beamforming approach has been projected to achieve high values of secrecy rate and low secrecy outage probability in 5G Wireless Communication Networks with the consideration of different applications demanded by Cellular Users and the priority of the applications (video, voice and data) in accord with enhanced Quality of Service of the channel. As the study of inherent secrecy rate for secure transmission of data in Wireless Communication Networks, random techniques are currently in great interest over the communication field. In this paper, it is to explore a multi-user scenario demanding different applications from BS under threat scenario of multi- eavesdropper. In this paper, different types of Beamforming are studied and different techniques involved for secure communication. An architecture has been provided for the security aspect in accordance with beamforming approach. As for better channel capacity, beamforming approach with diversity is an optimal solution for the secure transmission of information for Next Generation Networks.



中文翻译:

使用波束赋形方法对5G无线通信网络中的安全问题进行全面调查

预计在不久的将来,大量设备将激增,估计到2020年,连接设备的基准数量将超过500亿基准。用户的一些基本需求包括系统容量,提高的数据速率,减少的等待时间和安全传输。为了将数据存储在不安全的媒体中并满足这些需求,蜂窝网络必须经过适当的发展。作为满足这些需求,克服数据传输中的威胁和挑战并为可能的攻击提供信息安全性的潜在建筑物,5G逐渐成为一种最佳解决方案。对于大量用户的需求,设备到设备无线通信网络是一种可操作的技术。用户之间不断升级的内容共享已导致无线数据流量呈指数级增长,从而迫使蜂窝用户的网络经历适当的灾难。为了在攻击情形下向蜂窝用户分配资源,迄今为止已经取得了许多进步。本文提出了一种基于HMM的自适应资源块分配算法,该算法采用波束赋形方法,考虑到蜂窝用户的不同应用需求和优先级,优先考虑在5G无线通信网络中实现较高的保密率和较低的保密中断概率。应用程序(视频,语音和数据)符合增强的频道服务质量。为了研究无线通信网络中数据安全传输的固有保密率,当前,在通信领域中,随机技术引起了极大的兴趣。在本文中,将探讨在多窃听者的威胁情况下,与BS要求不同应用程序的多用户情况。在本文中,研究了不同类型的波束成形以及涉及安全通信的不同技术。已经根据波束成形方法为安全性方面提供了一种架构。至于更好的信道容量,具有分集的波束成形方法是用于下一代网络信息安全传输的最佳解决方案。研究了不同类型的波束成形,并且涉及了用于安全通信的不同技术。已经根据波束成形方法为安全性方面提供了一种架构。至于更好的信道容量,具有分集的波束成形方法是用于下一代网络信息安全传输的最佳解决方案。研究了不同类型的波束成形,并且涉及了用于安全通信的不同技术。已经根据波束成形方法为安全性方面提供了一种架构。至于更好的信道容量,具有分集的波束成形方法是用于下一代网络信息安全传输的最佳解决方案。

更新日期:2021-05-08
down
wechat
bug