Diana Pamela Moya Osorio

Diana Pamela Moya Osorio
Linköping University | LiU · Department fo Electrical Engineering

Doctor in Electrical Engineering

About

106
Publications
42,037
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,513
Citations
Additional affiliations
August 2015 - June 2022
Federal University of São Carlos
Position
  • Professor (Assistant)
August 2011 - September 2015
State University of Campinas (UNICAMP)
Position
  • PhD Student

Publications

Publications (106)
Preprint
Considering the exponential growth of Internet-of-Things devices and the goals toward sustainable networks, the complexity should be focused on the infrastructure side. For a massive number of passive devices, backscatter communication (BC) is a promising technology that reduces cost and increases energy efficiency by enabling transmitting informat...
Article
To overcome the limitations of visible light communication (VLC) systems while benefiting from high data rates and inherently secure transmissions, hybrid systems combining radio frequency (RF) and VLC have gained appeal for the next generation of wireless networks and their use cases, including the Internet of Things and sensor networks. In this p...
Preprint
Full-text available
Recent developments in polymer microwave fiber (PMF) have opened great opportunities for robust, low-cost, and high-speed sub-terahertz (THz) communications. Noticing this great potential, this paper addresses the problem of estimation of the propagation distance of a sub-Thz signal along a radio over fiber structure. Particularly, this paper consi...
Article
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT) is exacerbating the concerns for the design of future wireless networks. To unveil the full potential of the sixth generation (6G), it is becoming even more evident that security measurements should be considered at all layers of the network. This work aim...
Article
Full-text available
We analyze the outage probability (OP), ergodic capacity (EC), and average bit error probability (ABEP) of L -branch diversity systems using maximal-ratio-combining (MRC) over Multi-cluster-Fluctuating-Two-Ray (MFTR) fading channels, a model well-suited for sub-terahertz bands. We derive exact OP, EC, and ABEP expressions. For this latter metric,...
Preprint
Full-text available
Integrated Sensing and Communication (ISAC) systems are prone to privacy violations, once they aim at handling sensitive identifiable information in several applications. This paper raises the necessity of implementing privacy-preservation measures on the design of cell-free massive multiple-input multiple-output ISAC systems. To that purpose, give...
Article
The fluid antenna system (FAS) has emerged as a disruptive technology that promises outstanding diversity and multiplexing gains comparable to or better than multiple-input multiple-output (MIMO), but without the issues of channel state information (CSI) acquisition and the advantage of requiring smaller physical spaces of upcoming user devices. Th...
Preprint
Backscatter communication (BC) has emerged as a key technology to satisfy the increasing need for low-cost and green Internet-of-Things (IoT) connectivity, especially in large-scale deployments. Unlike the monostatic BC (MoBC), the bistatic BC (BiBC) has the possibility to decrease the round-trip path loss by having the carrier emitter (CE) and the...
Article
Full-text available
The 5th-Generation New Radio (5G-NR) network have been widely deployed around the world in the frequency range 1 /range 2 bands. Once specific frequency bands within these ranges can vary across different countries and regions due to regulatory differences, it should be carried out radio network planning to evaluate the 5G coverage considering the...
Article
By combining the benefits of passive reflecting and active relay, the hybrid active-passive reconfigurable intelligent surfaces (RIS) (HRIS) architecture can overcome the double path loss and limited performance gains of the conventional passive RIS. In this work, we investigate the secrecy performance of a millimeter wave multiple-input-multiple-o...
Article
Full-text available
In this paper, the position control of multiple unmanned aerial vehicles, acting as cooperative jammers, is proposed to improve the security level of a legitimate ground transmission, where a precoder is designed to nullify the jamming signals at the legitimate receiver. In this scenario, the maximization of the weighted secrecy coverage, which mea...
Conference Paper
Full-text available
The vision and key elements of the 6th generation (6G) ecosystem are being discussed very actively in academic and industrial circles. In this work, we provide a timely update to the 6G security vision presented in our previous publications to contribute to these efforts. We elaborate further on some key security challenges for the envisioned 6G wi...
Preprint
Full-text available
p>To overcome the limitations of visible light communications (VLC) systems while still benefiting from the high data rates and inherently secure transmissions, hybrid systems combining radio frequency (RF) and VLC have gained appeal towards the next generation of wireless networks. In this paper, the potential of hybrid systems from the security p...
Preprint
Full-text available
A multi-static sensing-centric integrated sensing and communication (ISAC) network can take advantage of the cell-free massive multiple-input multiple-output infrastructure to achieve remarkable diversity gains and reduced power consumption. While the conciliation of sensing and communication requirements is still a challenge, the privacy of the se...
Preprint
Full-text available
This paper proposes an unmanned aerial vehicle (UAV)-based distributed sensing framework that uses orthogonal frequency-division multiplexing (OFDM) waveforms to detect the position of a ground target, and UAVs operate in half-duplex mode. A spatial grid approach is proposed, where an specific area in the ground is divided into cells of equal size,...
Preprint
Full-text available
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT) is exacerbating the concerns for the design of future wireless networks. To unveil the full potential of the sixth generation (6G), it is becoming even more evident that security measurements should be considered at all layers of the network. This work aim...
Preprint
Full-text available
p>To overcome the limitations of visible light communications (VLC) systems while still benefiting from the high data rates and inherently secure transmissions, hybrid systems combining radio-frequency (RF) and VLC have gained appealing towards future generation of wireless networks. In this paper, the potential of hybrid systems from the security...
Article
As a distributed ledger technology, blockchain has received significant attention in revolutionizing telecommunication and networking domains. This article proposes a blockchain-based network slice brokering mechanism for multioperator and multitenant environments of the envisioned 6G networks.
Preprint
Full-text available
This paper proposes an unmanned aerial vehicle (UAV)-based distributed sensing framework that uses frequency-division multiplexing (OFDM) waveforms to detect the position of a ground target under half-duplex operation. The area of interest, where the target is located, is sectioned into a grid of cells, where the radar cross-section (RCS) of every...
Preprint
Full-text available
The co-design of radar sensing and communications in dual-functional radar communication systems brings promising advantages for next generation wireless networks by providing gains in terms of the efficient and flexible use of spectrum, reduced costs, and lower energy consumption than in two separate systems. Besides the challenges associated with...
Article
Full-text available
By recognizing the tremendous flexibility of the emerging fluid antenna system (FAS), which allows dynamic reconfigurability of the location of the antenna within a given space, this paper investigates the performance of a single-antenna FAS over spatially correlated Nakagami-m fading channels. Specifically, simple and highly accurate closed-form a...
Article
Full-text available
The flexibility and reconfigurability at the radio frequency (RF) front-end offered by the fluid antenna system (FAS) make this technology promising for providing remarkable diversity gains in networks with small and constrained devices. Toward this direction, this letter compares the outage probability (OP) performance of non-diversity and diversi...
Preprint
Full-text available
p>In this paper, the position control of multiple unmanned aerial vehicles, acting as cooperative jammers, is proposed to improve the security level of a legitimate ground transmission, where a precoder is designed to nullify the jamming signals at the legitimate receiver. In this scenario, the maximisation of the weighted secrecy coverage, which m...
Preprint
Full-text available
p>In this paper, the position control of multiple unmanned aerial vehicles, acting as cooperative jammers, is proposed to improve the security level of a legitimate ground transmission, where a precoder is designed to nullify the jamming signals at the legitimate receiver. In this scenario, the maximisation of the weighted secrecy coverage, which m...
Article
Full-text available
Unmanned aerial vehicles (UAVs) are becoming increasingly attractive for the ambitious expectations for 5G and beyond networks due to their several benefits. Indeed, UAV-assisted communications introduce a new range of challenges and opportunities regarding the security of these networks. Thus, in this paper we explore the opportunities that UAVs c...
Preprint
Full-text available
p>To overcome the limitations of visible light communications (VLC) systems while still benefiting from the high data rates and inherently secure transmissions, hybrid systems combining radio-frequency (RF) and VLC have gained appealing towards future generation of wireless networks. In this paper, the potential of hybrid systems from the security...
Preprint
Full-text available
p>To overcome the limitations of visible light communications (VLC) systems while still benefiting from the high data rates and inherently secure transmissions, hybrid systems combining radio-frequency (RF) and VLC have gained appealing towards future generation of wireless networks. In this paper, the potential of hybrid systems from the security...
Preprint
Full-text available
The hybrid relay-reflecting intelligent surface (HR-RIS) has been recently introduced as an efficient solution to overcome the double path loss and limited beamforming diversity of the conventional fully passive reflecting surface. This motivates us to investigate the application of the HR-RIS in improving the secrecy capacity of millimeter wave mu...
Article
Full-text available
This work investigates the secrecy outage performance of a dual-hop relaying network with an untrustworthy energy-constrained amplify-and-forward relay. A destination-based jamming technique is adopted in order to prevent the relay from decoding confidential messages from the source. Additionally, three time switching-based wireless energy transfer...
Article
Full-text available
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence of an eavesdropper. The relay is considered to operate in full-duplex (FD) mode to perform both energy harvesting and information decoding simultaneously. To accomplish that, the r...
Article
Full-text available
As a distributed ledger technology, blockchain has received significant attention in revolutionizing telecommunica-tion and networking domains. Besides, network slicing is a key enabling technology in 5G and a road map to the envisioned 6G, which expects to support multi-tenant and multi-operator environments. In this context, the concept of Networ...
Article
Full-text available
The conceptualisation of the sixth generation of mobile wireless networks (6G) has already started with some potential disruptive technologies resonating as enablers for driving the emergence of a number of innovative applications. Particularly, 6G will be a prominent supporter for the evolution towards a truly Intelligent Transportation System and...
Preprint
Full-text available
Unmanned Aerial Vehicles (UAVs) are becoming increasingly attractive for the ambitious expectations for 5G and beyond networks due to their several benefits. Indeed, UAV-assisted communications introduce a new range of challenges and opportunities regarding the security of these networks. Thus, in this paper we explore the opportunities that UAVs c...
Preprint
Full-text available
In 5G and beyond networks, Unmanned Aerial Vehicles (UAV) are an attractive solution to enhance the secrecy of a wireless systems by exploiting their predominant LOS links and spacial manoeuvrability to introduce a friendly jamming. In this work, we investigate the impact of two cooperative UAV-based jammers on the secrecy performance of a ground w...
Preprint
Full-text available
In this work, we investigate the impact of two cooperative unmanned aerial vehicle (UAV)-based jammers on the secrecy performance of a ground wireless network in the presence of an eavesdropper. For that purpose, we investigate the secrecy-area related metrics, Jamming Coverage and Jamming Efficiency. Moreover, we propose a hybrid metric, the so-ca...
Article
Full-text available
A thorough understanding of fundamental limits of wireless-powered unmanned aerial vehicle (UAV) relay networks in millimeter waves is still missing. We narrow this gap by investigating the outage performance of a UAV-assisted wireless network over fluctuating two-ray (FTR) channels. The FTR fading model is particularly appealing since well charact...
Conference Paper
In this work, we investigate the impact of two cooperative unmanned aerial vehicle (UAV)-based jammers on the secrecy performance of a ground wireless network in the presence of an eavesdropper. For that purpose, we investigate the secrecy-area related metrics, Jamming Coverage and Jamming Efficiency. Moreover, we propose a hybrid metric, the so-ca...
Conference Paper
Full-text available
This paper addresses the secrecy performance of the downlink of a non-orthogonal multiple access network in the presence of multiple randomly located eavesdroppers. The network consists of a base station and a near receiver that are located inside a protected zone, free of eavesdroppers, while a far user is located outside. Herein, it is considered...
Conference Paper
Full-text available
This paper evaluates the effective capacity and maximum average arrival rate of a hybrid radio frequency (RF) and visible light communication (VLC) network in the presence of an eavesdropper. It is assumed that the data is first stored in a buffer prior to transmission. Thus, it is considered that the source operates under constraints of buffer ove...
Article
Full-text available
The recently introduced 5G New Radio is the first wireless standard natively designed to support critical and massive machine type communications (MTC). However, it is already becoming evident that some of the more demanding requirements for MTC cannot be fully supported by 5G networks. Alongside, emerging use cases and applications towards 2030 wi...
Conference Paper
In 5G and beyond networks, Unmanned Aerial Vehicles (UAV) are an attractive solution to enhance the secrecy of a wireless systems by exploiting their predominant LOS links and spacial manoeuvrability to introduce a friendly jamming. In this work, we investigate the impact of two cooperative UAV-based jammers on the secrecy performance of a ground w...
Article
Full-text available
This paper investigates the impact of realistic propagation conditions on the achievable secrecy performance of multiple-input multiple-output systems in the presence of an eavesdropper (Eve). Specifically, we concentrate on the - shadowed fading model because its physical underpinnings capture a wide range of propagation conditions, while, at the...
Conference Paper
Full-text available
Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) ecosystem have already come into discussion. In order to contribute to these efforts and delineate the security and privacy aspects of 6G networks, we survey how security may impact the envisioned 6G wireless syst...
Article
Full-text available
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible...
Technical Report
Full-text available
This deliverable presents the set of test cases selected for validation on the INSPIRE-5Gplus project. This set of test cases were selected by performing an exhaustive requirements elicitation of 5G security use cases defined in WP2, stemming from the new and enhanced 5G security and trust/liability assets developed in WP3 and WP4. Herein, we perfo...
Article
Full-text available
We investigate the realistic propagation conditions effects on wireless physical layer security, which are different from classical Rice and Rayleigh fading. Specifically, we study how the superposition of a number of dominant specular waves and diffusely propagating components impacts the achievable secrecy performance. We derive analytical expres...
Article
Full-text available
Physical layer security is a promising approach that can benefit traditional encryption methods. The idea of physical layer security is to take advantage of the propagation medium’s features and impairments to ensure secure communication in the physical layer. This work introduces a comprehensive review of the main information-theoretic metrics use...
Preprint
Full-text available
Physical layer security is a promising approach that can benefit traditional encryption methods. The idea of physical layer security is to take advantage of the features of the propagation medium and its impairments to ensure secure communication in the physical layer. This work introduces a comprehensive review of the main information-theoretic me...
Article
Full-text available
5G networks must provide a highly resilient, secure, and privacy-protected platform to support the emergence of new business and technologies expected from the so-called vertical-industry paradigm. However, as the definition and implementation of 5G networks are in progress, many security challenges arise. Thus, special emphasis will be given in th...
Preprint
Full-text available
This paper investigates the impact on the achievable secrecy performance of multiple-input multiple-output systems by dealing with realistic propagation conditions. Specifically, we focus on the $\kappa$-$\mu$ shadowing fading model, which has proven to be more accurate in characterizing mm-wave scenarios than traditional Rice and Rayleigh ones. By...
Article
Full-text available
In this paper, we derive closed-form exact expressions for the main statistics of the ratio of squared alpha-mu random variables, which are of interest in many scenarios for future wireless networks where generalized distributions are more suitable to fit with field data. Importantly, different from previous proposals, our expressions are general i...
Preprint
Full-text available
We investigate the physical layer security over N-wave with diffuse power (NWDP) fading model, which is typically encountered in realistic wireless scenarios in the context of millimeter-wave communications and emerging 5G technologies. More specifically, novel and exact expressions of the secrecy out-age probability (SOP) and the lower bound of th...
Article
Full-text available
Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage. These metrics were devised from the concept of fractional eq...
Preprint
Full-text available
Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage. These metrics were devised from the concept of fractional eq...