Semantic communication allows the receiver to know the intention instead of the bit information itself, which is an emerging technique to support real-time human-machine and machine-to-machine interactions for future wireless communications. In semantic communications, both transmitter and receiver share some common knowledge, which can be used to extract small-size information at the transmitter and recover the original information at the receiver. Due to different design purposes, security issues in semantic communications have two unique features compared to standard bit-wise communications. First, an attacker in semantic communications considers not only the amount of stolen data but also the meanings of stolen data. Second, an attacker in semantic communication systems can attack not only semantic information transmission as done in standard communication systems but also attacks machine learning (ML) models used for semantic information extraction since most of semantic information is generated using ML based methods. Due to these unique features, in this paper, we present an overview on the fundamentals and key challenges in the design of secure semantic communication. We first provide various methods to define and extract semantic information. Then, we focus on secure semantic communication techniques in two areas: information security and semantic ML model security. For each area, we identify the main problems and challenges. Then, we will provide a comprehensive treatment of these problems. In a nutshell, this article provides a holistic set of guidelines on how to design secure semantic communication systems over real-world wireless communication networks.
Intelligent reflecting surfaces (IRS) can improve the physical layer security (PLS) by providing a controllable wireless environment. In this paper, we propose a novel PLS technique with the help of IRS implemented by an intelligent mirror array for the visible light communication (VLC) system. First, for the IRS aided VLC system containing an access point (AP), a legitimate user and an eavesdropper, the IRS channel gain and a lower bound of the achievable secrecy rate are derived. Further, to enhance the IRS channel gain of the legitimate user while restricting the IRS channel gain of the eavesdropper, we formulate an achievable secrecy rate maximization problem for the proposed IRS-aided PLS technique to find the optimal orientations of mirrors. Since the sensitivity of mirrors' orientations on the IRS channel gain makes the optimization problem hard to solve, we transform the original problem into a reflected spot position optimization problem and solve it by a particle swarm optimization (PSO) algorithm. Our simulation results show that secrecy performance can be significantly improved by adding an IRS in a VLC system.
There is a paucity of random access protocols designed for alleviating collisions in visible light communication (VLC) systems, where carrier sensing is hard to be achieved due to the directionality of light. To resolve the problem of collisions, we adopt the successive interference cancellation (SIC) algorithm to enable the coordinator to simultaneously communicate with multiple devices, which is referred to as the multipacket reception (MPR) capability. However, the MPR capability could be fully utilized only when random access algorithms are properly designed. Considering the characteristics of the SIC aided random access VLC system, we propose a novel effective capacity (EC)-based ALOHA-like distributed random access algorithm for MPR-aided uplink VLC systems having heterogeneous quality-of-service (QoS) guarantees. Firstly, we model the VLC network as a conflict graph and derive the EC for each device. Then, we formulate the VLC QoS-guaranteed random access problem as a saturation throughput maximization problem subject to multiple statistical QoS constraints. Finally, the resultant non-concave optimization problem (OP) is solved by a memetic search algorithm relying on invasive weed optimization and differential evolution (IWO-DE). We demonstrate that our derived EC expression matches the Monte Carlo simulation results accurately, and the performance of our proposed algorithms is competitive.
Index Terms-Visible light communication (VLC), multipacket reception (MPR), random access, heterogeneous QoS, effective capacity (EC), saturation throughput maximization.Linlin Zhao received her B.Eng. and M.S. degrees from the
There will be massive M2M terminals to transmit data via LTE uplink in the future. M2M will inevitably influence the QoS of H2H. However, the existing LTE uplink scheduling algorithms can't be applied to M2M services. It is necessary and urgent to optimize the LTE uplink scheduling algorithms. In this paper, we propose a LTE uplink scheduling algorithm named M2MA-SA under massive M2M and H2H arrivals. M2MA-SA differentiates between M2M and H2H services. For massive M2M services, a compound 2-phase scheduling mechanism is presented, which combines maximum-utility scheduling with round robin scheduling. For H2H services, an algorithm named Iternative Maximum Expansion (IME) is used which satisfied the contiguity constraint of LTE uplink resource allocation. The simulation results show that M2MA-SA not only guarantees the QoS of H2H communication, but also improves the system throughput and the capacity of H2H users.
With the increasing demand for intelligent services, the sixth-generation (6G) wireless networks will shift from a traditional architecture that focuses solely on high transmission rate to a new architecture that is based on the intelligent connection of everything. Semantic communication (SemCom), a revolutionary architecture that integrates user as well as application requirements and meaning of information into the data processing and transmission, is predicted to become a new core paradigm in 6G. While SemCom is expected to progress beyond the classical Shannon paradigm, several obstacles need to be overcome on the way to a SemCom-enabled smart wireless Internet. In this paper, we first highlight the motivations and compelling reasons of SemCom in 6G. Then, we outline the major 6G visions and key enabler techniques which lay the foundation of SemCom. Meanwhile, we highlight some benefits of SemComempowered 6G and present a SemCom-native 6G network architecture. Next, we show the evolution of SemCom from its introduction to classical SemCom related theory and modern AIenabled SemCom. Following that, focusing on modern SemCom, we classify SemCom into three categories, i.e., semantic-oriented communication, goal-oriented communication, and semanticaware communication, and introduce three types of semantic metrics. We then discuss the applications, the challenges and technologies related to semantics and communication. Finally, we introduce future research opportunities. In a nutshell, this paper investigates the fundamentals of SemCom, its applications in 6G networks, and the existing challenges and open issues for further direction.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.