Pub Date : 2022-05-16DOI: 10.1109/iccworkshops53468.2022.9814541
Yacine Benatia, Anne Savard, Romain Negrel, E. Belmega
In this paper, an unsupervised deep learning approach is proposed to solve the constrained and non-convex Shannon rate maximization problem in a relay-aided cognitive radio network. This network consists of a primary and a sec-ondary user-destination pair and a secondary full-duplex relay performing Decode-and-Forward. The primary communication is protected by a Quality of Service (QoS) constraint in terms of tolerated Shannon rate degradation. The relaying operation leads to non-convex objective and primary QoS constraint, which makes deep learning approaches relevant and promising. For this, we propose a fully-connected neural network architecture coupled with a custom and communication-tailored loss function to be minimized during training in an unsupervised manner. A major interest of our approach is that the required training data contains only system parameters without the ground truth, i.e., the corresponding solutions to the non-convex optimization problem, as opposed to supervised approaches. Our numerical experiments show that our proposed approach has a high generalization capability on unseen data without overfitting. Also, the predicted solution performs close to the brute force one, highlighting the high potential of our unsupervised approach.
{"title":"Unsupervised deep learning to solve power allocation problems in cognitive relay networks","authors":"Yacine Benatia, Anne Savard, Romain Negrel, E. Belmega","doi":"10.1109/iccworkshops53468.2022.9814541","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814541","url":null,"abstract":"In this paper, an unsupervised deep learning approach is proposed to solve the constrained and non-convex Shannon rate maximization problem in a relay-aided cognitive radio network. This network consists of a primary and a sec-ondary user-destination pair and a secondary full-duplex relay performing Decode-and-Forward. The primary communication is protected by a Quality of Service (QoS) constraint in terms of tolerated Shannon rate degradation. The relaying operation leads to non-convex objective and primary QoS constraint, which makes deep learning approaches relevant and promising. For this, we propose a fully-connected neural network architecture coupled with a custom and communication-tailored loss function to be minimized during training in an unsupervised manner. A major interest of our approach is that the required training data contains only system parameters without the ground truth, i.e., the corresponding solutions to the non-convex optimization problem, as opposed to supervised approaches. Our numerical experiments show that our proposed approach has a high generalization capability on unseen data without overfitting. Also, the predicted solution performs close to the brute force one, highlighting the high potential of our unsupervised approach.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121898608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-16DOI: 10.1109/iccworkshops53468.2022.9814617
{"title":"Blockchain Networks and Communications","authors":"","doi":"10.1109/iccworkshops53468.2022.9814617","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814617","url":null,"abstract":"","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-16DOI: 10.1109/iccworkshops53468.2022.9814512
Ahmed Maksud, Y. Hua
Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.
{"title":"Physical Layer Encryption for UAV-to-Ground Communications","authors":"Ahmed Maksud, Y. Hua","doi":"10.1109/iccworkshops53468.2022.9814512","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814512","url":null,"abstract":"Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125139271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-16DOI: 10.1109/iccworkshops53468.2022.9814562
Hulin Yang, Alia Asheralieva, Jin Zhang, Md. Monjurul Karim, D. Niyato, Khuhawar Arif Raza
The forthcoming Industry 5.0 era reinforces the role of the “human( user )-centric” approach for future technologies, services and applications, where the key objective is to satisfy the quality of service (QoS), security and privacy requirements of each individual user. To meet this objective, blockchain is considered as one of the prime enablers, as it allows secure, reliable, verifiable, and transparent management of private user data. However, contemporary blockchains are not suitable for Industry 5.0 applications due to their inability to ensure high throughput while maintaining reasonable security levels. Hence, in this paper, we design a user-centric sharded blockchain that enables generating, verifying, and storing blocks of data related to individual users with the aim to satisfy their QoS, security and privacy requirements. By analyzing the impact of user allocations to shards on the block period, we devise the user-shard allocation algorithm to minimize the block period or, equivalently, maximize the system throughput, and demonstrate the superior performance of our framework via simulations.
{"title":"User-Centric Blockchain for Industry 5.0 Applications","authors":"Hulin Yang, Alia Asheralieva, Jin Zhang, Md. Monjurul Karim, D. Niyato, Khuhawar Arif Raza","doi":"10.1109/iccworkshops53468.2022.9814562","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814562","url":null,"abstract":"The forthcoming Industry 5.0 era reinforces the role of the “human( user )-centric” approach for future technologies, services and applications, where the key objective is to satisfy the quality of service (QoS), security and privacy requirements of each individual user. To meet this objective, blockchain is considered as one of the prime enablers, as it allows secure, reliable, verifiable, and transparent management of private user data. However, contemporary blockchains are not suitable for Industry 5.0 applications due to their inability to ensure high throughput while maintaining reasonable security levels. Hence, in this paper, we design a user-centric sharded blockchain that enables generating, verifying, and storing blocks of data related to individual users with the aim to satisfy their QoS, security and privacy requirements. By analyzing the impact of user allocations to shards on the block period, we devise the user-shard allocation algorithm to minimize the block period or, equivalently, maximize the system throughput, and demonstrate the superior performance of our framework via simulations.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-16DOI: 10.1109/iccworkshops53468.2022.9814484
Xiangyu Zeng, Shuhao Xia, Kai Yang, Youlong Wu, Yuanming Shi
Vertical federated learning (FL) is a critical tech-nology to support distributed artificial intelligence (AI) services in futuristic 6G systems, since it enables efficient and secure collaborative machine learning from a number of heteroge-neous devices in Internet of Things. In order to improve communication efficiency in vertical FL, we propose an over-the-air computation (AirComp) assisted vertical FL approach to achieve fast global aggregation. We theoretically establish the convergence analysis of the approach and thus propose to minimize the mean-squared error (MSE) of AirComp to reduce the optimality gap. So as to tackle the intractable non-convex problem, we propose an algorithm based on superiorization of bounded perturbation with convergence guarantee. Numerical experiments demonstrate that our proposed algorithm achieves low AirComp MSE in short running time, thereby improving the learning performance of vertical FL.
{"title":"Over-the-Air Computation for Vertical Federated Learning","authors":"Xiangyu Zeng, Shuhao Xia, Kai Yang, Youlong Wu, Yuanming Shi","doi":"10.1109/iccworkshops53468.2022.9814484","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814484","url":null,"abstract":"Vertical federated learning (FL) is a critical tech-nology to support distributed artificial intelligence (AI) services in futuristic 6G systems, since it enables efficient and secure collaborative machine learning from a number of heteroge-neous devices in Internet of Things. In order to improve communication efficiency in vertical FL, we propose an over-the-air computation (AirComp) assisted vertical FL approach to achieve fast global aggregation. We theoretically establish the convergence analysis of the approach and thus propose to minimize the mean-squared error (MSE) of AirComp to reduce the optimality gap. So as to tackle the intractable non-convex problem, we propose an algorithm based on superiorization of bounded perturbation with convergence guarantee. Numerical experiments demonstrate that our proposed algorithm achieves low AirComp MSE in short running time, thereby improving the learning performance of vertical FL.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123329403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-16DOI: 10.48550/arXiv.2205.10519
N. Sabu, Abhishek Gupta, Neeraj Varshney, Anshuman Jindal
Molecular communication is a promising solution to enable intra-body communications among nanomachines. However, malicious and non-cooperative receivers can degrade the performance, compromising these systems' security. Analyzing the communication and security performance of these systems requires accurate channel models. However, such models are not present in the literature. In this work, we develop an analytical framework to derive the hitting probability of a molecule on a fully absorbing receiver (FAR) in the presence of other FARs, which can be either be cooperative or malicious. We first present an approximate hitting probability expression for the 3-FARs case. A simplified expression is obtained for the case when FARs are symmetrically positioned. Using the derived expressions, we study the impact of malicious receivers on the intended receiver and discuss how to minimize this impact to obtain a secure communication channel. We also study the gain that can be obtained by the cooperation of these FARs. We then present an approach to extend the analysis for a system with $N$ FARs. The derived expressions can be used to analyze and design multiple input/output and secure molecular communication systems.
{"title":"Impact of Multiple Fully-Absorbing Receivers in Molecular Communications","authors":"N. Sabu, Abhishek Gupta, Neeraj Varshney, Anshuman Jindal","doi":"10.48550/arXiv.2205.10519","DOIUrl":"https://doi.org/10.48550/arXiv.2205.10519","url":null,"abstract":"Molecular communication is a promising solution to enable intra-body communications among nanomachines. However, malicious and non-cooperative receivers can degrade the performance, compromising these systems' security. Analyzing the communication and security performance of these systems requires accurate channel models. However, such models are not present in the literature. In this work, we develop an analytical framework to derive the hitting probability of a molecule on a fully absorbing receiver (FAR) in the presence of other FARs, which can be either be cooperative or malicious. We first present an approximate hitting probability expression for the 3-FARs case. A simplified expression is obtained for the case when FARs are symmetrically positioned. Using the derived expressions, we study the impact of malicious receivers on the intended receiver and discuss how to minimize this impact to obtain a secure communication channel. We also study the gain that can be obtained by the cooperation of these FARs. We then present an approach to extend the analysis for a system with $N$ FARs. The derived expressions can be used to analyze and design multiple input/output and secure molecular communication systems.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-16DOI: 10.1109/iccworkshops53468.2022.9814622
K. Ntontin, S. Chatzinotas
The aim of this work is to examine the efficacy of wireless energy harvesting for autonomous reconfigurable intelligent surfaces that is performed either at millimeter wave or the lower THz bands. Towards this, we first consider an architecture in which a subset of unit cells is dedicated to energy harvesting and the rest to information transmission to a receiver through reflection. Subsequently, we compute the RIS energy consumption per frame according to the considered channel-estimation protocol. Based on it, we formulate an optimization problem that has as aim the maximization of the average rate under the constraint of meeting the RIS long-term energy consumption demands and provide its closed-form solution. Finally, numerical results are provided that target the performance comparison between the RIS-assisted links operating at the 28 GHz and 140 GHz bands. They reveal that the energy harvesting becomes more effective at the 140 GHz band, owing to the larger amount of unit cells that can be accommodated onto the same physical space.
{"title":"Millimeter Wave vs. THz Energy Harvesting for Autonomous Reconfigurable Intelligent Surfaces","authors":"K. Ntontin, S. Chatzinotas","doi":"10.1109/iccworkshops53468.2022.9814622","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814622","url":null,"abstract":"The aim of this work is to examine the efficacy of wireless energy harvesting for autonomous reconfigurable intelligent surfaces that is performed either at millimeter wave or the lower THz bands. Towards this, we first consider an architecture in which a subset of unit cells is dedicated to energy harvesting and the rest to information transmission to a receiver through reflection. Subsequently, we compute the RIS energy consumption per frame according to the considered channel-estimation protocol. Based on it, we formulate an optimization problem that has as aim the maximization of the average rate under the constraint of meeting the RIS long-term energy consumption demands and provide its closed-form solution. Finally, numerical results are provided that target the performance comparison between the RIS-assisted links operating at the 28 GHz and 140 GHz bands. They reveal that the energy harvesting becomes more effective at the 140 GHz band, owing to the larger amount of unit cells that can be accommodated onto the same physical space.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"182 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120880947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-16DOI: 10.1109/iccworkshops53468.2022.9814535
Cenk Albayrak, H. Arslan, K. Türk
Visible light communication (VLC) is an important alternative and/or complementary technology for next generation indoor wireless broadband communication systems. In order to ensure data security for VLC in public areas, many studies in literature consider physical layer security (PLS). These studies generally neglect the reflections in the VLC channel and assume no inter symbol interference (ISI). However, increasing the data transmission rate causes ISI. In addition, even if the power of the reflections is small compared to the line of sight (LoS) components, it can affect the secrecy rate in a typical indoor VLC system. In this study, we investigate the effects of ISI and reflected channel components on secrecy rate in multiple-input single-output (MISO) VLC scenario utilized null-steering (NS) and artificial noise (AN) PLS techniques.
{"title":"Physical Layer Security for Visible Light Communication in the Presence of ISI and NLoS","authors":"Cenk Albayrak, H. Arslan, K. Türk","doi":"10.1109/iccworkshops53468.2022.9814535","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814535","url":null,"abstract":"Visible light communication (VLC) is an important alternative and/or complementary technology for next generation indoor wireless broadband communication systems. In order to ensure data security for VLC in public areas, many studies in literature consider physical layer security (PLS). These studies generally neglect the reflections in the VLC channel and assume no inter symbol interference (ISI). However, increasing the data transmission rate causes ISI. In addition, even if the power of the reflections is small compared to the line of sight (LoS) components, it can affect the secrecy rate in a typical indoor VLC system. In this study, we investigate the effects of ISI and reflected channel components on secrecy rate in multiple-input single-output (MISO) VLC scenario utilized null-steering (NS) and artificial noise (AN) PLS techniques.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-16DOI: 10.1109/ICCWorkshops53468.2022.9882148
Jiajin Yang, Junhua Tang, Jianhua Li, Futai Zou, Linsen Li
In-network content caching is a key feature of Information Centric Network (ICN), which facilitates efficient content distribution with reduced bandwidth consumption, less network congestion, and improved content retrieval latency. However, this ubiquitous caching of ICN is vulnerable to side-channel timing attack, where the adversary takes advantage of the response time difference between the cached and un-cached contents from the router, to detect if a privacy-sensitive object is cached, or even infer which user requested the object. To mitigate this type of privacy risk in ICN, we propose a differential defense mechanism against distributed timing attack in this paper. Specifically, we design an algorithm based on differential privacy to determine whether a cache-hit or cache-miss is returned for a certain request, which effectively hide the actual cache hit with differential privacy guarantee. Furthermore, a differential delay algorithm for artificial cache miss is implemented based on Laplace mechanism of differential privacy. Performance analysis and simulation results show that our scheme is more effective against distributed timing attack and incurs less impact on caching efficiency and delay performance compared with existing defense schemes for ICN.
{"title":"Differential Defense Against Distributed Timing Attack for Privacy-Preserving Information Centric Network","authors":"Jiajin Yang, Junhua Tang, Jianhua Li, Futai Zou, Linsen Li","doi":"10.1109/ICCWorkshops53468.2022.9882148","DOIUrl":"https://doi.org/10.1109/ICCWorkshops53468.2022.9882148","url":null,"abstract":"In-network content caching is a key feature of Information Centric Network (ICN), which facilitates efficient content distribution with reduced bandwidth consumption, less network congestion, and improved content retrieval latency. However, this ubiquitous caching of ICN is vulnerable to side-channel timing attack, where the adversary takes advantage of the response time difference between the cached and un-cached contents from the router, to detect if a privacy-sensitive object is cached, or even infer which user requested the object. To mitigate this type of privacy risk in ICN, we propose a differential defense mechanism against distributed timing attack in this paper. Specifically, we design an algorithm based on differential privacy to determine whether a cache-hit or cache-miss is returned for a certain request, which effectively hide the actual cache hit with differential privacy guarantee. Furthermore, a differential delay algorithm for artificial cache miss is implemented based on Laplace mechanism of differential privacy. Performance analysis and simulation results show that our scheme is more effective against distributed timing attack and incurs less impact on caching efficiency and delay performance compared with existing defense schemes for ICN.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134256237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-16DOI: 10.1109/iccworkshops53468.2022.9814563
Minseok Kim, Hibiki Tsukada, Keiichiro Kumakura, Riku Takahashi, Naoya Suzuki, H. Sawada, T. Matsumura
The use of millimeter-wave (mm-wave) bands has been expanding in new wireless communication systems such as fifth-generation (5G) mobile systems and WiGig WLANs. Since mm-waves have quasi-optical propagation characteristics, it is necessary to develop a channel model that can cover site-specific characteristics of various environments. For this reason, a large amount of channel measurement data measured in a wide range of frequency bands covering mm-wave in various environments should still be required. In particular, it is necessary to obtain the angular channel characteristics on both sides of the transmitter and receiver, but this requires considerable time and cost. The authors' previous study developed a 60-GHz double-directional (D-D) channel sounder using commercial-off-the-shelf (COTS) phased-array beamforming RFs, and it has currently been extended to realize 24/60-GHz dual-band simultaneous measurement. In this paper, we detailed the design of the dual-band D-D channel sounder. As a demonstration of the operation, some measurement results taken in typical urban macro-cell (UMa)/micro-cell (UMi) scenarios were quickly reported.
{"title":"A 24/60-GHz Dual-Band Double-Directional Channel Sounder Using COTS Phased Arrays","authors":"Minseok Kim, Hibiki Tsukada, Keiichiro Kumakura, Riku Takahashi, Naoya Suzuki, H. Sawada, T. Matsumura","doi":"10.1109/iccworkshops53468.2022.9814563","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814563","url":null,"abstract":"The use of millimeter-wave (mm-wave) bands has been expanding in new wireless communication systems such as fifth-generation (5G) mobile systems and WiGig WLANs. Since mm-waves have quasi-optical propagation characteristics, it is necessary to develop a channel model that can cover site-specific characteristics of various environments. For this reason, a large amount of channel measurement data measured in a wide range of frequency bands covering mm-wave in various environments should still be required. In particular, it is necessary to obtain the angular channel characteristics on both sides of the transmitter and receiver, but this requires considerable time and cost. The authors' previous study developed a 60-GHz double-directional (D-D) channel sounder using commercial-off-the-shelf (COTS) phased-array beamforming RFs, and it has currently been extended to realize 24/60-GHz dual-band simultaneous measurement. In this paper, we detailed the design of the dual-band D-D channel sounder. As a demonstration of the operation, some measurement results taken in typical urban macro-cell (UMa)/micro-cell (UMi) scenarios were quickly reported.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134287215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}