A Comprehensive Survey on Security Issues in 5G Wireless Communication Network using Beamforming Approach

Numerous devices are expected to upsurge profoundly in the proximate future with an estimated figure exceeding the 50 billion benchmark of connected devices by 2020. There are some rudimentary demands of the subscribers like system capacity, improved data rates with reduction in the latency and secure transmission of data in an unsecured media and to meet these demands, the cellular network has to go under suitable progression. As a building prospective for fulfilling these demands, to overcome the threats and challenges in the transmission of the data and to provide security to the information from the possible attacks, 5G is emerging as an optimal solution. For the demands of the tremendous count of subscribers, Device-to-Device Wireless Communication Network is an operative technology. The escalating content sharing amongst the users has been resulting in an exponential intensification in the wireless data traffic, coercing networks of cellular users to experience a suitable cataclysm. For allocating the resources to the Cellular Users under an attack scenario, numerous advances have been made till now. In this paper, an adaptive resource block allocation algorithm using HMM with beamforming approach has been projected to achieve high values of secrecy rate and low secrecy outage probability in 5G Wireless Communication Networks with the consideration of different applications demanded by Cellular Users and the priority of the applications (video, voice and data) in accord with enhanced Quality of Service of the channel. As the study of inherent secrecy rate for secure transmission of data in Wireless Communication Networks, random techniques are currently in great interest over the communication field. In this paper, it is to explore a multi-user scenario demanding different applications from BS under threat scenario of multi- eavesdropper. In this paper, different types of Beamforming are studied and different techniques involved for secure communication. An architecture has been provided for the security aspect in accordance with beamforming approach. As for better channel capacity, beamforming approach with diversity is an optimal solution for the secure transmission of information for Next Generation Networks.

[1]  Henry Cox,et al.  Robust adaptive beamforming , 2005, IEEE Trans. Acoust. Speech Signal Process..

[2]  Rodney A. Kennedy,et al.  Broadband nearfield beamforming using a radial beampattern transformation , 1998, IEEE Trans. Signal Process..

[3]  Yuan Zhang,et al.  An Adaptive Time Division Scheduling Based Resource Allocation Algorithm for D2D Communication Underlaying Cellular Networks , 2014, GLOBECOM 2014.

[4]  M. Viberg,et al.  Two decades of array signal processing research: the parametric approach , 1996, IEEE Signal Process. Mag..

[5]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[6]  Constantine A. Balanis,et al.  Antenna Theory: Analysis and Design , 1982 .

[7]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[8]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[9]  S. Parkvall,et al.  Evolving Wireless Communications: Addressing the Challenges and Expectations of the Future , 2013, IEEE Vehicular Technology Magazine.

[10]  S. Haykin,et al.  Adaptive Filter Theory , 1986 .

[11]  Rakesh Kumar Jha,et al.  Device-to-Device Communication in Cellular Networks: A Survey , 2016, J. Netw. Comput. Appl..

[12]  Sanjeev Jain,et al.  A survey on device-to-device (D2D) communication: Architecture and security issues , 2017, J. Netw. Comput. Appl..

[13]  Mohammad-Hossein Golbon-Haghighi Beamforming in Wireless Networks , 2016 .

[14]  Litti Tom,et al.  Game-theoretic approach towards network security: A review , 2015, 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015].

[15]  Theodore S. Rappaport,et al.  Millimeter Wave Mobile Communications for 5G Cellular: It Will Work! , 2013, IEEE Access.

[16]  M. Zatman,et al.  How narrow is narrowband , 1998 .

[17]  Don H. Johnson,et al.  Array Signal Processing: Concepts and Techniques , 1993 .

[18]  Harry L. Van Trees,et al.  Optimum Array Processing: Part IV of Detection, Estimation, and Modulation Theory , 2002 .

[19]  Boaz Rafaely,et al.  Microphone Array Signal Processing , 2008 .

[20]  J. Capon High-resolution frequency-wavenumber spectrum analysis , 1969 .

[21]  L. C. Godara,et al.  Applications Of Antenna Arrays To Mobile Communications, Part I: Performance Improvement, Feasibility, And System Considerations , 1997, Proceedings of the IEEE.

[22]  F. Gross Smart Antennas for Wireless Communications: With MATLAB , 2005 .

[23]  L. Surendra,et al.  Performance Comparison of LMS, SMI and RLS Adaptive Beamforming Algorithms for Smart Antennas , 2012 .

[24]  Suhas N. Diggavi,et al.  Great expectations: the value of spatial diversity in wireless networks , 2004, Proceedings of the IEEE.

[25]  Erik G. Larsson,et al.  Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays , 2012, IEEE Signal Process. Mag..

[26]  Juan Melero,et al.  GSM, GPRS and EDGE Performance: Evolution Toward 3G/UMTS , 2002 .

[27]  AKHIL GUPTA,et al.  A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.

[28]  Erik G. Larsson,et al.  PAR-Aware Large-Scale Multi-User MIMO-OFDM Downlink , 2012, IEEE Journal on Selected Areas in Communications.

[29]  Zhouyue Pi,et al.  An introduction to millimeter-wave mobile broadband systems , 2011, IEEE Communications Magazine.

[30]  Wai Tung Ng,et al.  Beamforming system for 3G and 4G wireless LAN applications , 2005, Proceedings of the 2005 European Conference on Circuit Theory and Design, 2005..

[31]  Wei Liu,et al.  Wideband Beamforming: Concepts and Techniques , 2010 .

[32]  Vijay K. Madisetti,et al.  The Digital Signal Processing Handbook , 1997 .

[33]  B.D. Van Veen,et al.  Beamforming: a versatile approach to spatial filtering , 1988, IEEE ASSP Magazine.

[34]  Ivan Dokmanic,et al.  Raking the Cocktail Party , 2015, IEEE Journal of Selected Topics in Signal Processing.

[35]  G.A.E. Vandenbosch,et al.  Conceptual Study of Analog Baseband Beam Forming: Design and Measurement of an Eight-by-Eight Phased Array , 2009, IEEE Transactions on Antennas and Propagation.

[36]  Lajos Hanzo Intelligent Wireless Networking, Smart Antennas and Adaptive Modulation , 2002 .

[37]  A. Lee Swindlehurst,et al.  A vector-perturbation technique for near-capacity multiantenna multiuser communication-part I: channel inversion and regularization , 2005, IEEE Transactions on Communications.

[38]  L. J. Griffiths,et al.  A simple adaptive algorithm for real-time processing in antenna arrays , 1969 .

[39]  Gene Tsudik,et al.  Security and privacy in emerging wireless networks [Invited Paper] , 2010, IEEE Wireless Communications.

[40]  Ying-Dar Lin,et al.  Multihop cellular: a new architecture for wireless communications , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[41]  Jean-Claude Belfiore Codes for wireless wiretap channels , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[42]  Steven D. Gray,et al.  Transmit diversity in 3G CDMA systems , 2002, IEEE Commun. Mag..

[43]  Wael A. E. Ali,et al.  A hybrid least mean square/sample matrix inversion algorithm using microstrip antenna array , 2014, 2014 Science and Information Conference.

[44]  B. Widrow,et al.  Adaptive antenna systems , 1967 .

[45]  Nikos D. Sidiropoulos,et al.  Convex Optimization-Based Beamforming , 2010, IEEE Signal Processing Magazine.

[46]  Monisha Ghosh,et al.  A comparison of implicit and explicit channel feedback methods for MU-MIMO WLAN systems , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[47]  F. M. Kashif,et al.  Efficient implementation of quadrature amplitude modulation transmitters , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..

[48]  R. Muirhead Aspects of Multivariate Statistical Theory , 1982, Wiley Series in Probability and Statistics.

[49]  A. Adenola,et al.  A Simple Comparative Evaluation of Adaptive Beam forming Algorithms , 2013 .

[50]  Giuseppe Caire,et al.  Joint spatial division and multiplexing: Realizing massive MIMO gains with limited channel state information , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[51]  John N. Sahalos,et al.  Technology Medicine Open Access book , 2017 .

[52]  L. Godara Application of antenna arrays to mobile communications. II. Beam-forming and direction-of-arrival considerations , 1997, Proc. IEEE.

[53]  Marc Moonen,et al.  Design of far-field and near-field broadband beamformers using eigenfilters , 2003, Signal Process..

[54]  Ekram Hossain,et al.  Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach , 2014, IEEE Transactions on Wireless Communications.

[55]  B. Widrow,et al.  Adaptive antenna systems , 1967 .

[56]  S. K. Imtiaj,et al.  A comparative study of beamforming techniques using LMS and SMI algorithms in smart antennas , 2012, 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS).

[57]  Yuan Zhang,et al.  A time division scheduling resource allocation algorithm for D2D communication in cellular networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[58]  O. L. Frost,et al.  An algorithm for linearly constrained adaptive array processing , 1972 .

[59]  Amara Prakasa Rao Adaptive Beamforming Algorithms for Smart Antenna Systems , 2014 .

[60]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[61]  P. Stoica,et al.  Robust Adaptive Beamforming , 2013 .

[62]  Hiren Kumar Deva Sarma,et al.  Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[63]  Young-Jun Hong,et al.  Explicit vs. Implicit Feedback for SU and MU-MIMO , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[64]  Anass Benjebbour,et al.  Design considerations for a 5G network architecture , 2014, IEEE Communications Magazine.

[65]  Frank Dürr,et al.  A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.

[66]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[67]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[68]  Bruno Clerckx,et al.  MIMO techniques in WiMAX and LTE: a feature overview , 2010, IEEE Communications Magazine.

[69]  Ashwin Kothari,et al.  Performance Analysis of Adaptive Beamforming Algorithms for Smart Antennas , 2014 .

[70]  Jan Markendahl,et al.  EU FP7 INFSO-ICT-317669 METIS, D1.1 Scenarios, requirements and KPIs for 5G mobile and wireless system , 2013 .

[71]  Borko Furht,et al.  Long Term Evolution: 3GPP LTE Radio and Cellular Technology , 2009 .

[72]  Gerhard Fettweis,et al.  5GNOW: Challenging the LTE Design Paradigms of Orthogonality and Synchronicity , 2012, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[73]  Makis Stamatelatos,et al.  Rethinking the mobile and wireless network architecture: The METIS research into 5G , 2014, 2014 European Conference on Networks and Communications (EuCNC).