As the take-up of Long Term Evolution (LTE)/4G cellular accelerates, there is increasing interest in technologies that will define the next generation (5G) telecommunication standard. This paper identifies several emerging technologies which will change and define the future generations of telecommunication standards. Some of these technologies are already making their way into standards such as 3GPP LTE, while others are still in development. Additionally, we will look at some of the research problems that these new technologies pose.
Abstract-Optimization of energy consumption in future intelligent energy networks (or Smart Grids) will be based on grid-integrated near-real-time communications between various grid elements in generation, transmission, distribution and loads. This paper discusses some of the challenges and opportunities of communications research in the areas of smart grid and smart metering. In particular, we focus on some of the key communications challenges for realizing interoperable and futureproof smart grid/metering networks, smart grid security and privacy, and how some of the existing networking technologies can be applied to energy management. Finally, we also discuss the coordinated standardization efforts in Europe to harmonize communications standards and protocols.
This paper discusses malicious false data injection attacks on the wide area measurement and monitoring system in smart grids. Firstly, methods of constructing sparse stealth attacks are developed for two typical scenarios: random attacks in which arbitrary measurements can be compromised and targeted attacks in which specified state variables are modified. It is already demonstrated that stealth attacks can always exist if the number of compromised measurements exceeds a certain value. In this paper it is found that random undetectable attacks can be accomplished by modifying only a much smaller number of measurements than this value. It is well known that protecting the system from malicious attacks can be achieved by making a certain subset of measurements immune to attacks. An efficient greedy search algorithm is then proposed to quickly find this subset of measurements to be protected to defend against stealth attacks. It is shown that this greedy algorithm has almost the same performance as the brute-force method but without the combinatorial complexity. Thirdly, a robust attack detection method is discussed. The detection method is designed based on the robust principal component analysis problem by introducing element-wise constraints. This method is shown to be able to identify the real measurements as well as attacks even when only partial observations are collected. The simulations are conducted based on IEEE test systems.
In this paper, the average sum rate of two-way amplify-and-forward (AF) half-duplex relaying system is analyzed. To this end, we first derive the harmonic mean of two independent gamma distributed random variables which have the same shape parameter but different scale parameters. By deriving tight upper and lower bounds for the average sum rate of two-way relaying, we verify that two-way relaying can significantly recover the spectrum efficiency loss of one-way relaying. We also extend the two-way AF half-duplex relaying to the case where source and destination terminals both transmit Alamouti's orthogonal space time block code (OSTBC) utilizing two antennas and the relay has only one antenna. By deriving both upper and lower bounds for the average sum rate as well as an upper bound for the pairwise error probability (PEP) for the proposed two-way OSTBC scheme, we show that the average sum rate is further improved compared to the single antenna case and a diversity order of two is also achieved. Furthermore, optimal power allocations under a global power constraint for two-way relaying with single antenna and the proposed two-way OSTBC scheme are derived analytically.Index Terms-Two-way relaying, amplify-and-forward, harmonic mean, pairwise error probability, space time block code.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.