Pub Date : 2017-10-01DOI: 10.1109/MILCOM.2017.8170754
S. Watson, Jean-Benoit Larouche
This paper presents the design for a prototype tactical dynamic spectrum access (DSA) mobile ad hoc network, where the network is organized into clusters operating on a single frequency. The frequency may be changed autonomously by the network in response to jamming or interference, after some frequency switching delay. The network node design is implementable on a software defined radio (SDR), such as the Nutaq PicoSDR. The contribution of this work is the prototype design and mapping of the design to the hardware and software architecture of the SDR, with a focus on the estimated delay in switching to a new frequency channel. The frequency switching delay is the result of systematic delays arising from the SDR platform, compounded by delays in the protocols enabling DSA, the gathering of sensing data from network nodes, and the dissemination of the frequency change command throughout the network.
{"title":"Design of a software defined radio-based tactical DSA network","authors":"S. Watson, Jean-Benoit Larouche","doi":"10.1109/MILCOM.2017.8170754","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170754","url":null,"abstract":"This paper presents the design for a prototype tactical dynamic spectrum access (DSA) mobile ad hoc network, where the network is organized into clusters operating on a single frequency. The frequency may be changed autonomously by the network in response to jamming or interference, after some frequency switching delay. The network node design is implementable on a software defined radio (SDR), such as the Nutaq PicoSDR. The contribution of this work is the prototype design and mapping of the design to the hardware and software architecture of the SDR, with a focus on the estimated delay in switching to a new frequency channel. The frequency switching delay is the result of systematic delays arising from the SDR platform, compounded by delays in the protocols enabling DSA, the gathering of sensing data from network nodes, and the dissemination of the frequency change command throughout the network.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114309156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/MILCOM.2017.8170857
S. Arunkumar, M. Srivatsa, E. Bertino
Location Based Services in the world of mobile devices has been used widely in all sectors and in various applications. It allows one to track the location, track services and also perfom other location based operations. Although it's uses are very significant, the information related to location has opened up opportunities for adversary to misuse the mobile clients. This paper addresses one such problem with location information release and the problem addressed is mainly around Intersection Attacks. The two geo-spatial information over a period of time may be kept private but the time interval between the two specific time periods could lead to information leakage. This paper proposes two methodologies called “hierarchical signatures” and “Markov devision process” to mitigate intersection attacks. The paper also details the experimentation and results based on the tests done on two types of datasetc including reality mining datasets and telecommunication datasets.
{"title":"Learning information release policies for preventing intersection attacks","authors":"S. Arunkumar, M. Srivatsa, E. Bertino","doi":"10.1109/MILCOM.2017.8170857","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170857","url":null,"abstract":"Location Based Services in the world of mobile devices has been used widely in all sectors and in various applications. It allows one to track the location, track services and also perfom other location based operations. Although it's uses are very significant, the information related to location has opened up opportunities for adversary to misuse the mobile clients. This paper addresses one such problem with location information release and the problem addressed is mainly around Intersection Attacks. The two geo-spatial information over a period of time may be kept private but the time interval between the two specific time periods could lead to information leakage. This paper proposes two methodologies called “hierarchical signatures” and “Markov devision process” to mitigate intersection attacks. The paper also details the experimentation and results based on the tests done on two types of datasetc including reality mining datasets and telecommunication datasets.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116437488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/MILCOM.2017.8170836
Zafer Vatansever, M. Brandt-Pearce
Indoor target tracking has garnered interest as communication systems and mobile device capabilities advance. Visible light communication (VLC) is an alternative to RF methods that uses light emitting diodes. In this paper, probabilistic filtering algorithms (particle and extended Kalman filters) are used for indoor tracking. The performance of the filters is compared with an another positioning method: trilateration. Probabilistic filtering methods are shown to be more reliable than trilateration for indoor tracking when non-line-of-sight components are significant. The probabilistic filtering algorithms require a light intensity map that is collected as a fingerprint map prior to tracking. The effect of unpredictable shadowing as the conditions change is examined in a scenario where one of the lamps has been shadowed. Our algorithm tracks the user equipment with less error than trilateration. The results also show that the tracking accuracy for our algorithms is on the order of the grid resolution of the fingerprint map for high signal-to-noise ratio environments.
{"title":"Effects of unknown shadowing and non-line-of-sight on indoor tracking using visible light","authors":"Zafer Vatansever, M. Brandt-Pearce","doi":"10.1109/MILCOM.2017.8170836","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170836","url":null,"abstract":"Indoor target tracking has garnered interest as communication systems and mobile device capabilities advance. Visible light communication (VLC) is an alternative to RF methods that uses light emitting diodes. In this paper, probabilistic filtering algorithms (particle and extended Kalman filters) are used for indoor tracking. The performance of the filters is compared with an another positioning method: trilateration. Probabilistic filtering methods are shown to be more reliable than trilateration for indoor tracking when non-line-of-sight components are significant. The probabilistic filtering algorithms require a light intensity map that is collected as a fingerprint map prior to tracking. The effect of unpredictable shadowing as the conditions change is examined in a scenario where one of the lamps has been shadowed. Our algorithm tracks the user equipment with less error than trilateration. The results also show that the tracking accuracy for our algorithms is on the order of the grid resolution of the fingerprint map for high signal-to-noise ratio environments.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134256816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/MILCOM.2017.8170737
Xian Liu
Cloud-fog radio access is a promising technology in evolving wireless communication systems, but its success depends on security. It is fundamental to conduct the secrecy analysis in the physical layer due to the special architecture of CF-RAN. In this paper, we investigate the secrecy impacted by general path-loss effects. We show that the mathematical kernel is the Weibull distribution function with non-integer parameters. This type of problems was challenging since it is not covered in popular mathematical handbooks. However, with the aid of a recently discovered result in the literature, we are able to solve this issue and derive the solution in the closed-form. The presented results provide the necessary facility to expedite the secrecy analysis for other variants of CF-RAN. The simulation shows that the impact of path-loss fading on secrecy is more significant than that of deployed device intensity.
{"title":"Secrecy analysis of the cloud-Fog radio access network with poisson point process and general path-loss parameters","authors":"Xian Liu","doi":"10.1109/MILCOM.2017.8170737","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170737","url":null,"abstract":"Cloud-fog radio access is a promising technology in evolving wireless communication systems, but its success depends on security. It is fundamental to conduct the secrecy analysis in the physical layer due to the special architecture of CF-RAN. In this paper, we investigate the secrecy impacted by general path-loss effects. We show that the mathematical kernel is the Weibull distribution function with non-integer parameters. This type of problems was challenging since it is not covered in popular mathematical handbooks. However, with the aid of a recently discovered result in the literature, we are able to solve this issue and derive the solution in the closed-form. The presented results provide the necessary facility to expedite the secrecy analysis for other variants of CF-RAN. The simulation shows that the impact of path-loss fading on secrecy is more significant than that of deployed device intensity.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"25 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133425430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/MILCOM.2017.8170746
Romain Chayot, N. Thomas, C. Poulliat, M. Boucheret, N. V. Wambeke, G. Lesthievent
In this paper, we present a generalized polyphase representation for Continuous Phase Modulation (CPM) signals suited to the detection over frequency-selective channels. We first develop two different equalizers based on this representation and relate them to the State of Art. We also derive a Least Squares (LS) channel estimation and an improved LS estimation using a priori on the channel. Simulation results show the equivalence between existing equalizers and also show that our channel estimation leads only to a small degradation in term of Bit Error Rate (BER) in the case of an aeronautical communication over a satellite link.
{"title":"Channel estimation and equalization for CPM with application for aeronautical communications via a satellite link","authors":"Romain Chayot, N. Thomas, C. Poulliat, M. Boucheret, N. V. Wambeke, G. Lesthievent","doi":"10.1109/MILCOM.2017.8170746","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170746","url":null,"abstract":"In this paper, we present a generalized polyphase representation for Continuous Phase Modulation (CPM) signals suited to the detection over frequency-selective channels. We first develop two different equalizers based on this representation and relate them to the State of Art. We also derive a Least Squares (LS) channel estimation and an improved LS estimation using a priori on the channel. Simulation results show the equivalence between existing equalizers and also show that our channel estimation leads only to a small degradation in term of Bit Error Rate (BER) in the case of an aeronautical communication over a satellite link.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130539647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/MILCOM.2017.8170831
J. Cheah, Mitre San Diego
This paper introduces a novel way of producing a representative frequency sample data set for a system reference oscillator's operation with respect to its manufacturer's Allan Deviation specifications. The resultant availability of the algorithmically constructed frequency sample can greatly benefit the system analysis demands in which frequency and timing errors are essential parameters to be considered, particularly where external unexpected or unintentional disturbance to the frequency reference is an area of nascent concern. The sample set thus constructed can also be extrapolated to any desirable duration of the operational oscillator's runtime when obtaining the actual frequency behavior measurement sample is not possible.
{"title":"Numerical reference frequency sample","authors":"J. Cheah, Mitre San Diego","doi":"10.1109/MILCOM.2017.8170831","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170831","url":null,"abstract":"This paper introduces a novel way of producing a representative frequency sample data set for a system reference oscillator's operation with respect to its manufacturer's Allan Deviation specifications. The resultant availability of the algorithmically constructed frequency sample can greatly benefit the system analysis demands in which frequency and timing errors are essential parameters to be considered, particularly where external unexpected or unintentional disturbance to the frequency reference is an area of nascent concern. The sample set thus constructed can also be extrapolated to any desirable duration of the operational oscillator's runtime when obtaining the actual frequency behavior measurement sample is not possible.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130302663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/MILCOM.2017.8170727
Jonathan Thews, A. O'Donnell, Alan J. Michaels
The goal of this paper is to expand from previously researched liquid metal linear array models into a dynamically driven two dimensional liquid metal array. Simulations were performed using FEKO to prove the concept that a multi-dimensional array will provide the user more control over the direction of the main beam and also the direction of the nulls, making the resulting array useful for spatially tracking signals and mitigating interference. A proof-of-concept hardware model of the 2D array antenna was built and tested in the context of a dual frequency dual frequency GPS antenna (L1, L2/L5) with results found comparable to simulation. Since the antennas are made from liquid metal, these results make it possible for the user to change the parasitic elements within the 2D array from negligible (height of zero) to directors, to reflectors, or back with the use of a syringe or pump. This spatially adaptable antenna also benefits from the use of a single digitizer chain, offering a concrete alternative for anti-jam GPS antennas as the technology matures.
{"title":"Design and analysis of two-dimensional parasitic liquid metal monopole array","authors":"Jonathan Thews, A. O'Donnell, Alan J. Michaels","doi":"10.1109/MILCOM.2017.8170727","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170727","url":null,"abstract":"The goal of this paper is to expand from previously researched liquid metal linear array models into a dynamically driven two dimensional liquid metal array. Simulations were performed using FEKO to prove the concept that a multi-dimensional array will provide the user more control over the direction of the main beam and also the direction of the nulls, making the resulting array useful for spatially tracking signals and mitigating interference. A proof-of-concept hardware model of the 2D array antenna was built and tested in the context of a dual frequency dual frequency GPS antenna (L1, L2/L5) with results found comparable to simulation. Since the antennas are made from liquid metal, these results make it possible for the user to change the parasitic elements within the 2D array from negligible (height of zero) to directors, to reflectors, or back with the use of a syringe or pump. This spatially adaptable antenna also benefits from the use of a single digitizer chain, offering a concrete alternative for anti-jam GPS antennas as the technology matures.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/MILCOM.2017.8170724
Marcel Rieß, Steffen Moser, F. Slomka
Underwater communication with autonomous underwater vehicles (AUVs) has strong demands on the modems caused by the constantly changing signal propagation (multi-path propagation, scattering, diffraction and refraction at thermal layers, etc.) of the underwater channel. These demands typically lead to a modem designed to match specific conditions. In this paper we present an automated model-based physical layer implementation approach of an underwater acoustic passband modem using QPSK. This paper presents a possibility to automatically simulate, validate and synthesize a physical layer implementation with a significantly improved ease-of-use, maintainability and extensibility of the developed modems. The results are based on a prototype with six variants of adapted Reed Solomon and convolutional en-/decoders, developed and implemented in hardware on an Altera FPGA. In this work we show that the implemented prototype requires up to 88.7 % less energy for the same or better functionality compared to the Micromodem-2. In addition we show that our hardware can be used immediately in the area of long-distance communication based on a SNR test and in areas of high multi-path propagation based on channel simulation using BELLHOP.
{"title":"Efficient underwater communication modem for harsh and highly non-stationary channel conditions — A fully model-based approach","authors":"Marcel Rieß, Steffen Moser, F. Slomka","doi":"10.1109/MILCOM.2017.8170724","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170724","url":null,"abstract":"Underwater communication with autonomous underwater vehicles (AUVs) has strong demands on the modems caused by the constantly changing signal propagation (multi-path propagation, scattering, diffraction and refraction at thermal layers, etc.) of the underwater channel. These demands typically lead to a modem designed to match specific conditions. In this paper we present an automated model-based physical layer implementation approach of an underwater acoustic passband modem using QPSK. This paper presents a possibility to automatically simulate, validate and synthesize a physical layer implementation with a significantly improved ease-of-use, maintainability and extensibility of the developed modems. The results are based on a prototype with six variants of adapted Reed Solomon and convolutional en-/decoders, developed and implemented in hardware on an Altera FPGA. In this work we show that the implemented prototype requires up to 88.7 % less energy for the same or better functionality compared to the Micromodem-2. In addition we show that our hardware can be used immediately in the area of long-distance communication based on a SNR test and in areas of high multi-path propagation based on channel simulation using BELLHOP.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/MILCOM.2017.8170811
Y. Sagduyu, Yi Shi, T. Erpek, S. Soltani, Sharon J. Mackey, D. Cansever, Mitesh P. Patel, Bart F. Panettieri, B. Szymanski, G. Cao
This paper studies the problem of routing in a multilayer (communication and social) network. Network protocols, such as link state routing and its variants, heavily used in mobile ad hoc networks (MANETs) cannot sustain robustness and efficiency as the topological information becomes easily stale with fast network dynamics. Attempts to collect and exchange excessive network information would result in significant overhead and would degrade the overall network performance. This paper presents the SCATE (Social-Cognitive Advancement at Tactical Edge) routing protocol that applies social-cognitive techniques to improve robustness and efficiency of a multilayer network with MANET communication and social links. In a distributed and decentralized setting with local information, nodes learn and update their distances to destinations using social-cognitive metrics and make routing decisions to minimize the end-to-end delay. The SCATE protocol is compared with Optimized Link State Routing (OLSR) with and without social links. Stand-alone computer simulations and high fidelity simulation/emulation tests with CORE and EMANE are used to evaluate SCATE under different communication network (traffic and mobility) and social network effects. Results show that the SCATE protocol is a viable solution to MANET routing by substantially reducing the overhead and the end-to-end delay, and increasing the end-to-end delivery ratio for both unicast and multicast traffic.
本文研究了多层(通信和社交)网络中的路由问题。在移动自组织网络(manet)中大量使用的网络协议,如链路状态路由及其变体,由于拓扑信息在快速的网络动态中容易过时,无法保持鲁棒性和效率。试图收集和交换过多的网络信息将导致巨大的开销,并降低整体网络性能。本文提出了SCATE(战术边缘的社会认知进步)路由协议,该协议应用社会认知技术来提高具有MANET通信和社会链路的多层网络的鲁棒性和效率。在具有本地信息的分布式和分散设置中,节点使用社会认知指标学习和更新到目的地的距离,并做出路由决策,以最大限度地减少端到端延迟。将SCATE协议与OLSR (Optimized Link State Routing)协议进行了比较。利用CORE和EMANE进行独立计算机仿真和高保真仿真/仿真测试,以评估不同通信网络(流量和移动性)和社会网络效应下的SCATE。结果表明,SCATE协议对于单播和组播流量都能显著降低开销和端到端延迟,提高端到端传输比,是一种可行的MANET路由解决方案。
{"title":"Multilayer MANET routing with social-cognitive learning","authors":"Y. Sagduyu, Yi Shi, T. Erpek, S. Soltani, Sharon J. Mackey, D. Cansever, Mitesh P. Patel, Bart F. Panettieri, B. Szymanski, G. Cao","doi":"10.1109/MILCOM.2017.8170811","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170811","url":null,"abstract":"This paper studies the problem of routing in a multilayer (communication and social) network. Network protocols, such as link state routing and its variants, heavily used in mobile ad hoc networks (MANETs) cannot sustain robustness and efficiency as the topological information becomes easily stale with fast network dynamics. Attempts to collect and exchange excessive network information would result in significant overhead and would degrade the overall network performance. This paper presents the SCATE (Social-Cognitive Advancement at Tactical Edge) routing protocol that applies social-cognitive techniques to improve robustness and efficiency of a multilayer network with MANET communication and social links. In a distributed and decentralized setting with local information, nodes learn and update their distances to destinations using social-cognitive metrics and make routing decisions to minimize the end-to-end delay. The SCATE protocol is compared with Optimized Link State Routing (OLSR) with and without social links. Stand-alone computer simulations and high fidelity simulation/emulation tests with CORE and EMANE are used to evaluate SCATE under different communication network (traffic and mobility) and social network effects. Results show that the SCATE protocol is a viable solution to MANET routing by substantially reducing the overhead and the end-to-end delay, and increasing the end-to-end delivery ratio for both unicast and multicast traffic.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124353926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/MILCOM.2017.8170745
Yuyu Ma, Hui Gao, Tiejun Lv, Yueming Lu
In this paper, we propose novel user clustering schemes for downlink non-orthogonal multiple access (NOMA) system, where an N-antenna base station (BS) selects and serves 2N users from K single antenna user equipments (UEs) (K ≥ 2N and K is even). In particular, we propose a signal difference and alignment (SDA) framework to achieve fair and spectral efficient user clustering for NOMA with flexible performance-complexity tradeoff. To be more specific, the BS sorts UEs according to their large-scale fading (LSF) gains and selects N primary UEs with the highest LSF gains to guide the downlink zero-forcing beamforming (ZFBF) vector. Then the BS selects N complementary UEs from the second half of the sorted UE set based on the principle of signal space alignment (SSA). Unlike conventional user scheduling, SDA framework uses the ordered set to create signal strength difference for NOMA while employing opportunistic SSA method to select complementary UEs with minimal inter-cluster interference leakage. Moreover, the SDA framework can enable distributed implementation with graceful performance at lower system overhead. Numerical results verify that the proposed schemes improve the performance in downlink NOMA system.
{"title":"Novel user clustering schemes for downlink NOMA system","authors":"Yuyu Ma, Hui Gao, Tiejun Lv, Yueming Lu","doi":"10.1109/MILCOM.2017.8170745","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170745","url":null,"abstract":"In this paper, we propose novel user clustering schemes for downlink non-orthogonal multiple access (NOMA) system, where an N-antenna base station (BS) selects and serves 2N users from K single antenna user equipments (UEs) (K ≥ 2N and K is even). In particular, we propose a signal difference and alignment (SDA) framework to achieve fair and spectral efficient user clustering for NOMA with flexible performance-complexity tradeoff. To be more specific, the BS sorts UEs according to their large-scale fading (LSF) gains and selects N primary UEs with the highest LSF gains to guide the downlink zero-forcing beamforming (ZFBF) vector. Then the BS selects N complementary UEs from the second half of the sorted UE set based on the principle of signal space alignment (SSA). Unlike conventional user scheduling, SDA framework uses the ordered set to create signal strength difference for NOMA while employing opportunistic SSA method to select complementary UEs with minimal inter-cluster interference leakage. Moreover, the SDA framework can enable distributed implementation with graceful performance at lower system overhead. Numerical results verify that the proposed schemes improve the performance in downlink NOMA system.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123100948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}