scholarly journals Geometrical Synthesis of Sparse Antenna Arrays Using Compressive Sensing for 5G IoT Applications

Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 350 ◽  
Author(s):  
Giulia Buttazzoni ◽  
Fulvio Babich ◽  
Francesca Vatta ◽  
Massimiliano Comisso

One of the main targets of the forthcoming fifth-generation (5G) cellular network will be the support of the communications for billions of sensors and actuators, so as to finally realize the Internet of things (IoT) paradigm. This pervasive scenario unavoidably requires the design of cheap antenna systems with beamforming capabilities for compensating the strong attenuations that characterize the millimeter-wave (mmWave) channel. To address this issue, this paper proposes an iterative algorithm for sparse antenna arrays that enables to derive the number of elements, their amplitudes, phases, and positions in the presence of constraints on the far-field pattern. The algorithm, which relies on the compressive sensing approach, is formulated by transforming the original nonconvex optimization problem into a convex one. To prove the suitability of the conceived solution for 5G IoT mmWave applications, numerical examples and comparisons with other existing methods are provided, considering synthesis problems with different pattern and aperture specifications.

2009 ◽  
Vol 57 (6) ◽  
pp. 1679-1683 ◽  
Author(s):  
Juan Antonio Rodriguez-Gonzalez ◽  
Francisco Ares-Pena ◽  
Manuel Fernandez-Delgado ◽  
Roberto Iglesias ◽  
SenÉn Barro

2018 ◽  
Vol 7 (3.34) ◽  
pp. 241 ◽  
Author(s):  
Dr S. Chithra ◽  
Dr N. Bhalaji ◽  
S Nandini

The Internet of Things (IoT) refers to system in which smart objects interact with each other with the aid of sensors and actuators through wired/wireless connection. When an IoT concept is implemented for real life application, the possibility of the system being attacked increases. The security measures have to be improved to prevent the attacks.  This paper introduces light weight security schemes for authentication and encryption.  This system uses Blom’s scheme for authentication and Elliptic curve cryptography for encryption. Both these schemes are claimed to be light weight and hence is applicable of IoT applications which is a constrained environment.  These security schemes are applied for healthcare system. The system is proved to be strong against the security attacks. 


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Massimiliano Comisso ◽  
Giulia Buttazzoni ◽  
Roberto Vescovo

This paper proposes a deterministic method for the 3D synthesis of antenna arrays that jointly accounts for far-field pattern reconfigurability, polarization setting, dynamic range ratio reduction, and near-field control. The conceived algorithm, which generalizes some existing solutions, relies on a weighted cost function, whose iterative minimization is accomplished by properly derived closed-form expressions. This feature, combined with the possibility of selecting the weighting parameters, provides a fast and versatile approach, whose capabilities are numerically checked by considering different synthesis problems and array structures in the presence of mutual coupling.


2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Massimiliano Comisso ◽  
Roberto Vescovo

This paper proposes an iterative algorithm for the 3D synthesis of the electric far-field pattern of a conformal antenna array in the presence of requirements on both the polarization and the dynamic range ratio (DRR) of the excitations. Thanks to the use of selectable weights, the algorithm allows a versatile control of the DRR and of the polarization in a given angular region and requires a low CPU time to provide the array excitations. Furthermore, a modified version of the algorithm is developed to enable the optimization of the polarization state by phase-only control. Numerical results are presented to verify the usefulness of the proposed approach for the joint pattern and polarization synthesis of conformal arrays with reduced or even unitary DRR.


2016 ◽  
Vol 2016 ◽  
pp. 1-8 ◽  
Author(s):  
Shafqat Ullah Khan ◽  
Ijaz Mansoor Qureshi ◽  
Aqdas Naveed ◽  
Bilal Shoaib ◽  
Abdul Basit

A compressed sensing based array diagnosis technique has been presented. This technique starts from collecting the measurements of the far-field pattern. The system linking the difference between the field measured using the healthy reference array and the field radiated by the array under test is solved using a genetic algorithm (GA), parallel coordinate descent (PCD) algorithm, and then a hybridized GA with PCD algorithm. These algorithms are applied for fully and partially defective antenna arrays. The simulation results indicate that the proposed hybrid algorithm outperforms in terms of localization of element failure with a small number of measurements. In the proposed algorithm, the slow and early convergence of GA has been avoided by combining it with PCD algorithm. It has been shown that the hybrid GA-PCD algorithm provides an accurate diagnosis of fully and partially defective sensors as compared to GA or PCD alone. Different simulations have been provided to validate the performance of the designed algorithms in diversified scenarios.


2018 ◽  
Vol 28 (5) ◽  
pp. 1705-1711
Author(s):  
Verda Misimi ◽  
Miranda Xhaferi

Communication between people isunavoidable nowadays; sending and receiving information through internet among people is our daily routine which is known as Internet of People. Hence, this kind of communication has grown even more, making possible to communicate not just people but also things which is known as Internet of Things, one of the trendiest technology. The Internet of Things or IoT refers to the billions of physical devices around the world that are now connected to the internet, collecting and sharing data.The increase of population in urban places and their requirements impose the creation of a system that will satisfy all of these requirements. Due to the increasing number of population the numbers of things that people own has grown enormously. Therefore, this fact generated the idea of adding sensors and intelligence to basic objects. Thanks to cheap processors, wireless network,sensors and actuators is possible to turn anything, from a pill to an aeroplane, into part of the Internet of Things. Combining these digital things in the past was very difficult or barely possible simply because the technology was not ready. The IoT integrates the interconnectedness of human culture- our “things” with the interconnectedness of our digital information system- “the internet”.The development of modern technologies and the Internet of Things establishmentmerged the digital and physical worlds, namely adding digital intelligence to devices that would be otherwise dumb, enabling them to communicate.The potential of this tendencyincreases day by day, enabling a very wide usage. The Internet of Things aims to provide a simple interaction between the physical world and virtual world, integrating a large number of devices of the real world to the internet. The Internet of Things promises to make our environment - our homes,offices and vehicles smarter, more measurable and chattier.The benefits of Internet of Things depend on the particular implementation, but the key is that enterprises should have access to more data about their own things and their own internal system and a greater ability to make changes as a result. It is impossible to predict all IoT applications considering the swift progress of technology and the diversely requirements of consumers. Thus, in our paper we will mention some of the most used and most important applications of IoT, as well the benefits of its implementation in different platforms in different environments. In the end, we emphasize the challenges we face during IoT application, moreoverthe common issues in the adoption of IoT on a large scale.


2021 ◽  
Vol 11 (16) ◽  
pp. 7228
Author(s):  
Edward Staddon ◽  
Valeria Loscri ◽  
Nathalie Mitton

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.


Sign in / Sign up

Export Citation Format

Share Document