
Miroslav VozňákVSB - Technical University of Ostrava · Department of Telecommunications
Miroslav Vozňák
professor
About
555
Publications
123,113
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,257
Citations
Introduction
Professor in Telecommunication engineering.
Research interests: Wireless networks, Next Generation Networks, IP telephony, Speech quality, Network security, big data analytics, generally Information and Communication Technology
Publications
Publications (555)
The evolution of next-generation Internet-of-Things (IoT) in recent years exhibits a unique segment that wireless communication paradigms are oriented towards not only improved spectral efficiency transmission but also energy efficiency. This paper addresses these critical issues by proposing a novel communication model, namely power beacon-assiste...
Neural networks have become foundational in modern technology, driving advancements across diverse domains such as medicine, law enforcement, and information technology. By enabling algorithms to learn from data and perform tasks autonomously, they eliminate the need for explicit programming. A significant challenge in this field is replicating the...
In this study, we investigate the secrecy performance of reconfigurable intelligent surfaces-assisted satellite (RISAS) networks. Specifically, we analytically derive closed-form expressions of the secrecy outage probability (SOP) and the tight lower bound secrecy rate (SR) exploiting the moment matching method (MMM). Furthermore, we explore the as...
Future wireless communications are expected to serve a wide range of emerging applications, such as Online Gaming, Extended Reality (XR), Metaverses, Healthcare or Telemetry, where communication from diverse connected Internet of Things (IoT) devices require not only stringent conditions such as ultra-reliability and low-latency communication (URLL...
The highly efficient HEP algorithm is a useful tool for mining High Occupancy (HO) item sets. Occupancy is an important measure that describes the interestingness of frequent item sets. The current study examines the efficiency problems in mining HO item sets and proposes an improved HEP algorithm, named advanced HEP (A–HEP), based on set theory ru...
This paper investigates the performance of hybrid radio frequency/free space optical (RF/FSO) systems combined with non-orthogonal multiple access communications technology. We examine a scenario where the source and destination are separated by a large distance, with no direct link between them. The relay, denoted R, operates using the decode-and-...
This article introduces novel and deep learning approaches for the security analysis of a hybrid satellite-terrestrial cooperative network. More specifically, a satellite transmits information to a ground user through multiple relays in the presence of an eavesdropper. To prevent potential eavesdropping, multiple friendly jammers are employed to di...
In the present paper, we describe a novel active reconfigurable repeater-aided non-orthogonal multiple access networks within the context of the Internet of Things. The study focuses on a scenario, where a source simultaneously transmits public information to an untrusted user and a covert signal to a legitimate user in the surveillance of an exter...
Secure communication makes the widespread use of telecommunication networks and services possible. With the constant progress of computing and mathematics, new cryptographic methods are being diligently developed. Quantum Key Distribution (QKD) is a promising technology that provides an Information-Theoretically Secure (ITS) solution to the secret-...
In the ongoing discourse surrounding integrating QKD networks as a service for critical infrastructures, key storage design often receives insufficient attention. Nonetheless, it bears crucial significance as it profoundly impacts the efficiency of QKD network services, thereby shaping its suitability for diverse applications. In this article, we a...
This paper investigates the combination of active reconfigurable intelligent surfaces (aRIS) with cognitive radio networks (CRn) enabled by non-orthogonal multiple access (NOMA) to enhance the capability of aRIS-based Internet of Things (IoT) systems. The proposed system model enhances overall performance and energy allocation by combining aRIS and...
In modern network security setups, Intrusion Detection Systems (IDS) are crucial elements that play a key role in protecting against unauthorized access, malicious actions, and policy breaches. Despite significant progress in IDS technology, two of the most major obstacles remain: how to avoid false alarms due to imbalanced data and accurately fore...
Network emulators play an important role in testing network systems, applications, and protocols. Emulators bridge the gap between simulation setups that lack realism in results and real-world trials that are accurate but often expensive, non-reproducible, and uncontrollable. This article presents an extended model of the Quantum Key Distribution N...
Uncovering hidden radioactive materials continues to be a major hurdle in worldwide supply chains. Recent research has not adequately investigated practical Internet of Things (IoT)-based approaches for improving and implementing efficient data fusion techniques. Current systems often misuse resources, leading to security vulnerabilities in typical...
In this paper, we consider effective performance transmission under generalized α − κ − µ the fading distribution. The source-user links are assumed to be non-orthogonal multiple access (NOMA) channels through a downlink power do-main. Two users are selected to service in a situation with perfect channel state information (CSI) in accordance with t...
Communication reliability is one of the key challenging issues in future communications due to massive connections, especially for wireless sensor networks (WSNs) with low-cost devices. This article studies the communication reliability of wireless systems in the presence of multiple sensor relays, which carry out energy harvesting to prolong the n...
Terrestrial networks form the fundamental infrastructure of modern communication systems, serving more than 4 billion users globally. However, terrestrial networks are facing a wide range of challenges, from coverage and reliability to interference and congestion. As the demands of the 6G era are expected to be much higher, it is crucial to address...
The advancement of mobile networks driven by the introduction of 5G/6G technologies has brought more complex security challenges for end-users. Certain services within these advanced networks demand the highest level of performance and security, as any vulnerabilities could lead to critical repercussions. One promising solution to address these con...
The wide range of supported services in modern telecommunication networks has increased the demand for highly secure means of communication. Common security frameworks based on the computational security model are expected to become insecure due to significant advances in quantum computing. Quantum key distribution (QKD), a new secret key agreement...
The performance of two-way full-duplex communications with the help of reconfigurable intelligent surface (RIS) under phase noise is investigated in this work. Particularly, we study the outage probability, the average rate of each end-user, and the average sum rate of the whole network under both optimal phase-shift and random phase-shift design....
In this paper, we investigate an application of the Intelligent Reflecting Surface (IRS). This technology has emerged as promising and low-cost technology for \(6\mathrm{G}\) networks improving wireless communications by collecting dispersed radio waves and redirecting them to the intended destination users. We characterize the achievable rate when...
A two-user cooperative non-orthogonal multiple access (NOMA) network can be improved by exploiting the relay selection (RS) scheme. The best relay selected from the relay can forward signals to distant users relying on a fixed power allocation factor scheme and NOMA. We adopt a decode-and-forward (DF) relay and focus on performance analysis for the...
The digital economy has engendered Health Metaverse, an innovative technology with vast potential to transform healthcare through immersive experiences. The Health Metaverse serves as a convergence point for a multitude of technologies, including artificial intelligence (AI), virtual reality in heath, augmented reality in health, internet-connected...
In this paper, we evaluate short packet communication (SPC) for a cooperative system where one relay assists data transmission between one multi-antenna source and one single antenna destination with the presence of co-channel interference at the relay. Two transmission schemes, i.e., transmit antenna selection (TAS) scheme and beamforming scheme (...
Non-orthogonal multiple access (NOMA) technology is projected to significantly increase the spectrum efficiency of the fifth-generation and subsequent wireless networks. Holographic reconfigurable Intelligent surfaces (HRISs) are a revolutionary technology that can deliver excellent spectral and energy efficiency at a cheap cost in wireless network...
Terrestrial networks form the fundamental infrastructure of modern communication systems, serving more than 4 billion users globally. However, terrestrial networks are facing a wide range of challenges, from coverage and reliability to interference and congestion. As the demands of the 6G era are expected to be much higher, it is crucial to address...
We study the significance of the common trusted relay assumption in quantum networks. While most practical implementations of quantum networks rely on trusted devices, the question of security without this assumption has been rarely addressed. Device independent security attempts to minimize the assumptions made on the quantum hardware, entanglemen...
Massive connectivity and green communication will be important problems for the upcoming sixth generation (6G). Reconfigurable intelligent surfaces (RIS) and non-orthogonal multiple access (NOMA) have recently been presented as two major solutions to address the aforementioned issues. The main purpose of this paper is to investigate a downlink RIS-...
This study analyzes the physical-layer security and covert communication in hybrid power-frequency multiple-access (PFMA) systems. By partially overlapping users’ signals in power domains coupled with orthogonal transmission, PFMA exhibits strong resistance to untrusted users exploiting information intended for a distant user in non-orthogonal mult...
This study proposes a novel partial multiplexing power-frequency multiple access (PFMA) strategy to enhance the performance of downlink active simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS)-based systems. Unlike non-orthogonal multiple-access (NOMA), the proposed PFMA simultaneously serves two users without...
span lang="EN-US">In this paper, the secrecy performance of the spatial modeling for ground devices with randomly placed eavesdroppers when an unmanned aerial vehicle (UAV) acted as two hops decode and forward (DF) was investigated. We characterize the secrecy outage probability (SOP) and intercept probability (IP) expressions. Our capacity perform...
Because the spectrum of services available in modern telecommunication networks is constantly expanding, security has become increasingly important. Simultaneously, in an era of constant progress in mathematics and computing, the security of existing cryptographic solutions becomes questionable. Quantum Key Distribution (QKD) is a promising secret...
In recent years, the development of intelligent reflecting surface (IRS) in wireless communications has enabled control of radio waves to reduce the detrimental impacts of natural wireless propagation. These can achieve significant spectrum and energy efficiency in wireless networks. Non-orthogonal multiple access (NOMA) technology, on the other ha...
During various marine container handling operations, performed mainly in larger-scale container terminals, containers get damaged regularly. Our previous studies showed that each physical impact results in some form of physical deformation of the backbone structure. Even at low accelerations, the spreaders of the quay cranes impact the containers w...
This study aims to address the problem of proper shipping container damage detection during the hooking procedure performed by quay cranes and their hooking mechanisms. We adopted the Impacts Detection Methodology (IDM), developed previously, to detect repeated impacts on the same areas of the container. These concurrent impacts indicate false hook...
Over the last few decades, the classification and prediction of mobility trajectories in dynamic networks have become major research topics. Switching of mobility areas (hand-over) in modern cellular networks is frequent due to restricted coverage area and node speeds (urban, highway, etc.). Accurate management of hand-over events is highly desirab...
Citation: Tran, T.-N.; Nguyen, T.-L.; Hoang, V.T.; Voznak, M. Sensor Clustering Using a K-means Algorithm in Combination with Optimized Unmanned Aerial Vehicle Trajectory in Wireless Sensor Networks. Sensors 2023, 23, 2345. Abstract: We examine a general wireless sensor network (WSN) model which incorporates a large number of sensors distributed ov...
span>This study introduces the non-orthogonal multiple access (NOMA) technique into the wireless energy harvesting K-hop relay network to increase throughput. The relays have no dedicated energy source and thus depend on energy harvested by wireless from a power beacon (PB). Recently, NOMA has been promoted as a technology with the potential to enh...
Outage probability (OP) and potential throughput (PT) of multihop full-duplex (FD) nonorthogonal multiple access (NOMA) systems are addressed in the present paper. More precisely, two metrics are derived in the closed-form expressions under the impact of both imperfect successive interference cancellation (SIC) and imperfect self-interference cance...
This paper investigates the performance of NOMA-based hybrid Satellite-Terrestrial relays system (HSTR) using the millimeter wave (mmWave) technology. Furthermore, the relays are equipped with multiple antennas and utilize the amplify and forward (AF) protocol to forward the satellite’s superimposed information to multiple destinations. Then, the r...
Preprocessed signals from GPS satellites can be used for ionospheric research. Important ionospheric characteristics are for example ionospheric propagation delays and scintillations. These characteristics are important for understanding the ionosphere and showing how the ionosphere reacts to external forces (e.g., the geomagnetic disturbance, sola...
This paper proposes and analyzes the reliability and security trade-off for a satellite-terrestrial (SatTer) relay system. Herein, a satellite sends confidential information to multiple ground users (GUs) with the help of a relay base station (BS) in the presence of multiple eavesdroppers trying to wiretap the information. In particular, a friendly...
Physical layer security (PLS) and simultaneous wireless information and power transfer (SWIPT) in cooperative relaying have gained great interest as technologies for security and energy enhancement in Internet-of-Things (IoT) networks. In this work, we investigate PLS for a SWIPT- and AF-enabled cooperative wireless IoT system, consisting of one so...
Every attempt to access to the Internet through a web browser, email sent, VPN connection, VoIP call, instant message or other use of telecommunications systems involves cryptographic techniques. The most commonly applied technique is asymmetric cryptography, which is generally executed in the background without the user even being aware. It establ...
In this paper, we propose to utilize multiple aerial intelligent reflecting surfaces (AIRSs) for significantly enhancing the ergodic capacity of a non-orthogonal multiple access (NOMA) network. Unlike previous works where only one AIRS was often utilized to support only two NOMA users,
Q
AIRSs and
L
users are applied in the proposed NOMA-AIRS n...
In this study, we investigate the trade-off between reliability and security in unmanned aerial vehicle (UAV) communications systems, considering a UAV-terrestrial network aided by a relay powered by a dedicated power beacon. For this system, we derive the outage probability (OP) under both exact and approximate frameworks and compute the approxima...
To enhance the service quality of the unmanned aerial vehicle (UAV), the UAV-aided Internet of Things (IoT) systems could deploy a Deep Neural Network (DNN) for performance prediction for the users. Non-orthogonal multiple access (NOMA) is applied to such networks in order to improve spectrum efficiency, and results in improved quality of service a...
This paper presents a controllable analysis framework for evaluating the reliability and security of underlay cognitive radio networks (CRs) relying on non-orthogonal multiple access (NOMA). In such systems, a secondary base station (BS) transmits confidential information to multiple secondary users uniformly distributed in the presence of a nearby...
This study investigates a two-way relaying non-orthogonal multiple access (TWR-NOMA) enabled Internet-of-Things (IoT) network, in which two NOMA users communicate via an IoT access point (IAP) relay using a decode-and-forward (DF) protocol. A power beacon (PB) is used to power the IAP to address the IAP's limited lifetime due to energy constraints....
With the low integration costs and quick development cycle of all-IP-based 5G+ technologies, it is not surprising that the proliferation of IP devices for residential or industrial purposes is ubiquitous. Energy scheduling/management and automated device recognition are popular research areas in the engineering community, and much time and work hav...
The requirements for facilitating spectral efficiency and energy efficiency become increasing important for future wireless networks. Ambient backscatter communication (AmBC) has recently been recognized as a technology to meet these requirements. Furthermore, reconfigurable intelligent surfaces (RISs) have recently emerged as an effective technolo...
This paper studies a decode-and-forward (DF) full-duplex cooperative relaying network, whereas one transmitter S transmits information to one receiver D via the help of a relay R. In particular, the transmitter can simultaneously transmit energy and information (SWIPT) to relay R using time-switching (TS) method. Then, relay R can utilize the harve...
The performance of two-way full-duplex communications with the help of reconfigurable intelligent surface (RIS) under phase noise is investigated in this work. Particularly, we study the outage probability, the average rate of each end-user, and the average sum rate of the whole network under both optimal phase-shift and random phase-shift design....
This article deals with quality of service (QoS) in internet protocol (IP) telephony by applying software-defined networking (SDN) tools. The authors develop a new design that deterministically classifies real-time protocol (RTP) streams based on data found in session initiation protocol (SIP) using SIP proxy as a mediator, and the concept making t...
The emergence of internet-of-things (IoT) devices in homes and industry, has resulted in the current and future generation of wireless communications facing unique challenges in spectral efficiency, energy efficiency, and massive connectivity issues. Non-orthogonal multiple access (NOMA) has been proposed as a viable solution to address these chall...
Physical layer security (PLS) with radio-frequency (RF) energy harvesting (EH) in wireless sensor networks has received significant interest as a technology for secure information transmission and prolonging the network lifetime as well as improving energy efficiency. This paper investigates PLS for a simultaneous wireless information and power tra...
In order to improve the Physical Layer Security (PLS) perspective, this paper aims to empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access (NOMA) system in two practical situations. In the proposed schemes, the untrusted user intercepts information transmitted to the far user, or the external eavesdropper overhears confi...
Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable recent interest, especially for supplying energy to relay nodes in the Internet of Things (IoT) systems to assist the information exchange between a source and a destination. Moreover, limited hardware, computational resources, and energy availabili...