首页 > 最新文献

2021 28th International Conference on Telecommunications (ICT)最新文献

英文 中文
Modelling and Analysis of FDX cable Systems FDX电缆系统建模与分析
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511523
Jun Wang, A. Al-Banna
Full duplex cable networks are built and analyzed in theoretical models based on the RF performance of their building blocks, including nodes, cables, taps, pluggable devices for taps and cable modems, etc. The key performance-degrading factors in FDX systems are analyzed in the models and the results are proven by experimental results.
全双工电缆网络是根据其构建模块的射频性能在理论模型中构建和分析的,包括节点、电缆、抽头、抽头的可插拔设备和电缆调制解调器等。在模型中分析了FDX系统的主要性能影响因素,并通过实验验证了模型的正确性。
{"title":"Modelling and Analysis of FDX cable Systems","authors":"Jun Wang, A. Al-Banna","doi":"10.1109/ICT52184.2021.9511523","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511523","url":null,"abstract":"Full duplex cable networks are built and analyzed in theoretical models based on the RF performance of their building blocks, including nodes, cables, taps, pluggable devices for taps and cable modems, etc. The key performance-degrading factors in FDX systems are analyzed in the models and the results are proven by experimental results.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fusion of Wireless Signal and Computer Vision for Identification and Tracking 融合无线信号与计算机视觉的识别与跟踪
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511529
Dali Zhu, Hongju Sun, Di Wu
In public safety scenarios, target objects identification and tracking is an important application, and two positioning methods including wireless and computer vision are respectively used for applications. In this article, we combine the wireless signal and computer vision, and propose a novel object identification and tracking technology. The positioning method based on computer vision helps to improve the accuracy of positioning, and we can easily distinguish different users according to wireless device information. Based on our proposed trajectory association technology, the visual trajectory is accurately matched to the corresponding wireless trajectory, and the identity of the visual trajectory is confirmed. Combined with the analysis of the position change and appearance change of visual objects, wireless positioning results are fused to correct the affected visual trajectory to improve overall system performance. A tracking system was deployed in the real world. The fusion path is proved to be closer to the real path and 90% of the errors were less than 1m. We have also implemented large-scale simulation experiments to evaluate our approach. The results show that our association algorithm has a high matching success rate and is insensitive to synchronization errors.
在公共安全场景中,目标物体的识别和跟踪是重要的应用,分别采用无线和计算机视觉两种定位方法进行应用。本文将无线信号与计算机视觉相结合,提出了一种新的目标识别与跟踪技术。基于计算机视觉的定位方法有助于提高定位的精度,我们可以根据无线设备信息轻松区分不同的用户。基于我们提出的轨迹关联技术,将视觉轨迹与相应的无线轨迹精确匹配,确认了视觉轨迹的同一性。结合对视觉目标位置变化和外观变化的分析,融合无线定位结果,修正受影响的视觉轨迹,提高系统整体性能。在现实世界中部署了跟踪系统。结果表明,融合路径更接近真实路径,90%的误差小于1m。我们还实施了大规模的模拟实验来评估我们的方法。结果表明,该算法具有较高的匹配成功率,且对同步误差不敏感。
{"title":"Fusion of Wireless Signal and Computer Vision for Identification and Tracking","authors":"Dali Zhu, Hongju Sun, Di Wu","doi":"10.1109/ICT52184.2021.9511529","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511529","url":null,"abstract":"In public safety scenarios, target objects identification and tracking is an important application, and two positioning methods including wireless and computer vision are respectively used for applications. In this article, we combine the wireless signal and computer vision, and propose a novel object identification and tracking technology. The positioning method based on computer vision helps to improve the accuracy of positioning, and we can easily distinguish different users according to wireless device information. Based on our proposed trajectory association technology, the visual trajectory is accurately matched to the corresponding wireless trajectory, and the identity of the visual trajectory is confirmed. Combined with the analysis of the position change and appearance change of visual objects, wireless positioning results are fused to correct the affected visual trajectory to improve overall system performance. A tracking system was deployed in the real world. The fusion path is proved to be closer to the real path and 90% of the errors were less than 1m. We have also implemented large-scale simulation experiments to evaluate our approach. The results show that our association algorithm has a high matching success rate and is insensitive to synchronization errors.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128075865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bring the human to the network: 5G and beyond 将人类带入网络:5G及未来
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511537
K. Ystgaard, K. Moor
Communication networks beyond 5G will bring about a human existence that is ever more virtual. Allowing new communication services with virtual existence and involvement everywhere is likely to redefine and place new demands on how humans can and wish (or do not wish) to engage with the connected network. The ubiquitous nature of the 6G network evolution enables increased involvement and affords more power to networks and machines (and those designing them) versus humans. This paper advocates that human-centric 6G networks should put humans' interests and potential first and foremost, in a holistic manner. There is a need to critically monitor, (r)evaluate, and adjust the above power implications. Human-centric design perspectives applied to future network technologies incorporate the human element more broadly. Thus, meaningful user control, empowerment, and agency should be key features of future network technologies beyond 5G and 6G. The network system's ability to protect human potential and humanity first, to serve multiple normative standards, while balancing the interests of all parties, can become a catalyst for stimulating better governing practices and for managing consensus building between individuals, communities, governments, and networked machines embedded with human-like capabilities. However, realising this vision and potential requires a thorough alignment with the human- and humanity-centric paradigm and a renewal of its operationalisation and implementation. This paper overviews a set of human-centric design interpretations and discusses the next challenges and implications in a beyond 5G and 6G context.
5G以上的通信网络将使人类的生存更加虚拟。允许无处不在的虚拟存在和参与的新通信服务可能会重新定义并对人类如何能够和希望(或不希望)参与连接的网络提出新的要求。6G网络演进的无所不在的特性使更多的人参与其中,并为网络和机器(以及设计它们的人)提供了比人类更大的力量。本文主张,以人为本的6G网络,应该把人的利益和潜力放在首位,统筹兼顾。有必要严格监测、(或)评估和调整上述电力影响。应用于未来网络技术的以人为中心的设计观点更广泛地融入了人的元素。因此,有意义的用户控制、授权和代理应该是5G和6G以外的未来网络技术的关键特征。网络系统首先保护人类潜能和人性,服务于多种规范标准,同时平衡各方利益的能力,可以成为促进更好的治理实践和管理个人、社区、政府和具有类似人类能力的网络机器之间建立共识的催化剂。然而,实现这一愿景和潜力需要与以人为本和以人为中心的范式彻底一致,并更新其运作和实施。本文概述了一系列以人为中心的设计解释,并讨论了5G和6G之外的下一个挑战和影响。
{"title":"Bring the human to the network: 5G and beyond","authors":"K. Ystgaard, K. Moor","doi":"10.1109/ICT52184.2021.9511537","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511537","url":null,"abstract":"Communication networks beyond 5G will bring about a human existence that is ever more virtual. Allowing new communication services with virtual existence and involvement everywhere is likely to redefine and place new demands on how humans can and wish (or do not wish) to engage with the connected network. The ubiquitous nature of the 6G network evolution enables increased involvement and affords more power to networks and machines (and those designing them) versus humans. This paper advocates that human-centric 6G networks should put humans' interests and potential first and foremost, in a holistic manner. There is a need to critically monitor, (r)evaluate, and adjust the above power implications. Human-centric design perspectives applied to future network technologies incorporate the human element more broadly. Thus, meaningful user control, empowerment, and agency should be key features of future network technologies beyond 5G and 6G. The network system's ability to protect human potential and humanity first, to serve multiple normative standards, while balancing the interests of all parties, can become a catalyst for stimulating better governing practices and for managing consensus building between individuals, communities, governments, and networked machines embedded with human-like capabilities. However, realising this vision and potential requires a thorough alignment with the human- and humanity-centric paradigm and a renewal of its operationalisation and implementation. This paper overviews a set of human-centric design interpretations and discusses the next challenges and implications in a beyond 5G and 6G context.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132391667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enabling URLLC under $kappa-mu$ Shadowed Fading 使能$kappa-mu$下的URLLC
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511464
Teng Wu, Xiaochang Fan, Jie Zeng, Wei Ni, R. Liu
Enabling ultra-reliable and low latency communications (URLLC) under severe fading is really challenging. We study how to realize URLLC under $kappa-mu$ shadowed fading, because we can unify multiple traditional fading models by using the $kappa-mu$ shadowed fading model. For the MIMO system with two single-transmit-antenna users and $L$ receive antennas, we derive the probability density function (PDF) of the signal-to-noise ratio (SNR) of minimum mean squared error detection. In particular, we accomplish the above work in both perfect channel state information (CSI) and imperfect CSI. Then, the error probability can be calculated by the finite blocklength information theory, in accordance with constrained latency and given length of pilots. The simulation results show that we can configure the system parameters according to the $kappa-mu$ parameters, to satisfy the requirements for both latency and reliability. Hence, multiple fading models can be unified by the $hslash-mu$ shadowed fading model to study how to realize URLLC.
在严重衰落下实现超可靠和低延迟通信(URLLC)确实具有挑战性。我们研究如何在$kappa-mu$阴影衰落下实现URLLC,因为使用$kappa-mu$阴影衰落模型可以统一多个传统衰落模型。对于具有两个单发射天线用户和$L$接收天线的MIMO系统,我们推导了最小均方误差检测的信噪比(SNR)的概率密度函数(PDF)。特别是,我们在完全信道状态信息(CSI)和不完全信道状态信息(CSI)两种情况下完成了上述工作。然后,根据受限的时延和给定导频长度,利用有限块长信息理论计算误差概率。仿真结果表明,我们可以根据$kappa-mu$参数配置系统参数,以满足延迟和可靠性的要求。因此,可以通过$hslash-mu$阴影衰落模型统一多个衰落模型来研究如何实现URLLC。
{"title":"Enabling URLLC under $kappa-mu$ Shadowed Fading","authors":"Teng Wu, Xiaochang Fan, Jie Zeng, Wei Ni, R. Liu","doi":"10.1109/ICT52184.2021.9511464","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511464","url":null,"abstract":"Enabling ultra-reliable and low latency communications (URLLC) under severe fading is really challenging. We study how to realize URLLC under $kappa-mu$ shadowed fading, because we can unify multiple traditional fading models by using the $kappa-mu$ shadowed fading model. For the MIMO system with two single-transmit-antenna users and $L$ receive antennas, we derive the probability density function (PDF) of the signal-to-noise ratio (SNR) of minimum mean squared error detection. In particular, we accomplish the above work in both perfect channel state information (CSI) and imperfect CSI. Then, the error probability can be calculated by the finite blocklength information theory, in accordance with constrained latency and given length of pilots. The simulation results show that we can configure the system parameters according to the $kappa-mu$ parameters, to satisfy the requirements for both latency and reliability. Hence, multiple fading models can be unified by the $hslash-mu$ shadowed fading model to study how to realize URLLC.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
Pub Date : 2021-06-01 DOI: 10.1109/ict52184.2021.9511458
{"title":"[Copyright notice]","authors":"","doi":"10.1109/ict52184.2021.9511458","DOIUrl":"https://doi.org/10.1109/ict52184.2021.9511458","url":null,"abstract":"","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131496220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild 照亮阴影:野外TLS客户端证书生态系统综合研究
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511513
Wei Xia, Mingxin Cui, Wen Wang, Yangyang Guan, Zhenzhen Li, Zhen Li, G. Xiong
Client certificate authentication (CCA) is gaining greater significance, as more and more security-critical private activities such like e-bank and e-health are being conducted online, posing strong needs for mutual authentication. Unlike server certificates, active measurement of client certificates via probing techniques is infeasible since CCA is non-mandatory in the TLS protocol. Passive measurement is technically feasible but requires consistent access to large-scale Internet traffic to be comprehensive and convincing, which puts very high requirements on the research conditions. In this paper, we present a comprehensive study of the client certificate ecosystem, as the outcome of by far the largest passive measurement of client certificates in literature. As many as 97 million unique client certificates have been collected from the top-level academic network in China during six months. We analyze the actual use of CCA and classify the client certificates into three categories according to purposes: device authentication, user authentication, and application authentication. We discuss the security of client certificates with respect to the certificate attributes and make comparisons between client and server certificates. We also evaluate the risk of privacy leakage caused by client certificates, indicating the severity and the culprit. We hope our work would benefit the community by depicting an intuitive overview of the client certificate ecosystem and inspiring new thoughts on certificate usage in all kinds of scenarios.
随着越来越多的对安全至关重要的私人活动(如电子银行和电子医疗)在网上进行,对相互认证提出了强烈的需求,客户端证书认证(CCA)变得越来越重要。与服务器证书不同,通过探测技术对客户端证书进行主动测量是不可行的,因为CCA在TLS协议中不是强制性的。被动测量在技术上是可行的,但需要对大规模互联网流量的一致接入才能做到全面可信,这对研究条件提出了很高的要求。在本文中,我们对客户端证书生态系统进行了全面研究,作为迄今为止文献中最大的客户端证书被动测量的结果。在六个月的时间里,从中国顶级学术网络中收集了多达9700万份独特的客户证书。我们分析了CCA的实际使用情况,并将客户端证书根据用途分为三类:设备认证、用户认证和应用程序认证。我们从证书属性的角度讨论客户端证书的安全性,并对客户端证书和服务器证书进行比较。我们还评估了客户端证书引起的隐私泄露风险,指出了严重程度和罪魁祸首。我们希望我们的工作能够对客户端证书生态系统进行直观的概述,并激发人们对各种场景中证书使用的新思考,从而使社区受益。
{"title":"Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild","authors":"Wei Xia, Mingxin Cui, Wen Wang, Yangyang Guan, Zhenzhen Li, Zhen Li, G. Xiong","doi":"10.1109/ICT52184.2021.9511513","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511513","url":null,"abstract":"Client certificate authentication (CCA) is gaining greater significance, as more and more security-critical private activities such like e-bank and e-health are being conducted online, posing strong needs for mutual authentication. Unlike server certificates, active measurement of client certificates via probing techniques is infeasible since CCA is non-mandatory in the TLS protocol. Passive measurement is technically feasible but requires consistent access to large-scale Internet traffic to be comprehensive and convincing, which puts very high requirements on the research conditions. In this paper, we present a comprehensive study of the client certificate ecosystem, as the outcome of by far the largest passive measurement of client certificates in literature. As many as 97 million unique client certificates have been collected from the top-level academic network in China during six months. We analyze the actual use of CCA and classify the client certificates into three categories according to purposes: device authentication, user authentication, and application authentication. We discuss the security of client certificates with respect to the certificate attributes and make comparisons between client and server certificates. We also evaluate the risk of privacy leakage caused by client certificates, indicating the severity and the culprit. We hope our work would benefit the community by depicting an intuitive overview of the client certificate ecosystem and inspiring new thoughts on certificate usage in all kinds of scenarios.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
VoWiFi Cell Capacity Estimation using IEEE 802.11ax 基于IEEE 802.11ax的VoWiFi小区容量估计
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511461
Ayes Chinmay, H. K. Pati
The IEEE 802.11 standard is commonly used to provide wireless networking capabilities for different applications. Although the format was designed mainly to provide data transmission capability, it also became a common medium for speech communication. The reasons are twofold: extensive Wireless Local Area Network (WLAN) connectivity and the low cost of making voice calls on this network. To provide the Quality-of-Service (QoS) of Voice over WiFi (VoWiFi) calls, an appropriate policy for call admission control is required. Such a policy requires VoWiFi user capacity of the WLAN cell. In this paper, we have proposed an analytical model to estimate the number of VoWiFi calls possible in IEEE 802.11ax standard Access Point (AP) (i.e. sixth generation Wireless Fidelity (WiFi) standard) and compared with earlier standards like IEEE 802.11b/g/n/ac. We have used DCF Inter-frame Spacing (DIFS) to detect channel status before transmitting data from one station to another and Short Inter-frame Spacing (SIFS) before sending acknowledgement, Request To Send (RTS) and Clear To Send (CTS) frames. We have used the Compressed RTP (cRTP) protocol to enhance VoWiFi cell capacity. We have measured VoWiFi cell capacity using G.729 voice codec.
IEEE 802.11标准通常用于为不同的应用程序提供无线网络功能。虽然这种格式的设计主要是为了提供数据传输能力,但它也成为语音通信的常用媒介。原因有两个:广泛的无线局域网(WLAN)连接和在该网络上进行语音通话的低成本。为了提供VoWiFi (Voice over WiFi)呼叫的QoS (Quality-of-Service),需要适当的呼叫准入控制策略。这种策略需要WLAN小区的VoWiFi用户容量。在本文中,我们提出了一个分析模型来估计IEEE 802.11ax标准接入点(AP)(即第六代无线保真度(WiFi)标准)中可能的VoWiFi呼叫数量,并与IEEE 802.11b/g/n/ac等早期标准进行比较。我们使用DCF帧间间隔(DIFS)在将数据从一个站传输到另一个站之前检测信道状态,在发送确认,请求发送(RTS)和清除发送(CTS)帧之前使用短帧间间隔(SIFS)。我们使用压缩RTP (cRTP)协议来增强VoWiFi小区容量。我们使用G.729语音编解码器测量了VoWiFi小区容量。
{"title":"VoWiFi Cell Capacity Estimation using IEEE 802.11ax","authors":"Ayes Chinmay, H. K. Pati","doi":"10.1109/ICT52184.2021.9511461","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511461","url":null,"abstract":"The IEEE 802.11 standard is commonly used to provide wireless networking capabilities for different applications. Although the format was designed mainly to provide data transmission capability, it also became a common medium for speech communication. The reasons are twofold: extensive Wireless Local Area Network (WLAN) connectivity and the low cost of making voice calls on this network. To provide the Quality-of-Service (QoS) of Voice over WiFi (VoWiFi) calls, an appropriate policy for call admission control is required. Such a policy requires VoWiFi user capacity of the WLAN cell. In this paper, we have proposed an analytical model to estimate the number of VoWiFi calls possible in IEEE 802.11ax standard Access Point (AP) (i.e. sixth generation Wireless Fidelity (WiFi) standard) and compared with earlier standards like IEEE 802.11b/g/n/ac. We have used DCF Inter-frame Spacing (DIFS) to detect channel status before transmitting data from one station to another and Short Inter-frame Spacing (SIFS) before sending acknowledgement, Request To Send (RTS) and Clear To Send (CTS) frames. We have used the Compressed RTP (cRTP) protocol to enhance VoWiFi cell capacity. We have measured VoWiFi cell capacity using G.729 voice codec.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Secrecy Rate of Downlink NOMA in Underlay Spectrum Sharing with Imperfect CSI: Invited Paper 基于不完全CSI的底层频谱共享下行链路NOMA保密率研究
Pub Date : 2021-05-16 DOI: 10.36227/TECHRXIV.14572548.V1
Vaibhav Kumar, M. Flanagan, D. B. D. Costa, Le-Nam Tran
In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing nonorthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.
本文给出了底层频谱共享非正交多址(NOMA)系统的遍历和保密率(ESSR)分析。我们考虑了二次发射机(ST)发射功率受多个主接收机(pr)的峰值可容忍干扰以及ST的最大发射功率限制的情况,在我们的分析中也考虑了信道估计误差的影响。本文导出了下行NOMA系统的ESSR的精确和渐近封闭表达式,并表明其性能可以分为两个不同的区域,即受干扰约束或受功率约束。我们的结果证实了基于noma的系统比基于正交多址(OMA)的系统的优越性。更有趣的是,我们的结果表明,与OMA相比,NOMA有助于保持强用户的保密率,同时显著提高弱用户的保密性能。通过蒙特卡罗仿真验证了所提研究的正确性。
{"title":"On the Secrecy Rate of Downlink NOMA in Underlay Spectrum Sharing with Imperfect CSI: Invited Paper","authors":"Vaibhav Kumar, M. Flanagan, D. B. D. Costa, Le-Nam Tran","doi":"10.36227/TECHRXIV.14572548.V1","DOIUrl":"https://doi.org/10.36227/TECHRXIV.14572548.V1","url":null,"abstract":"In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing nonorthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128303402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intent-based Network Management and Orchestration for Smart Distribution Grids 基于意图的智能配电网网络管理与编排
Pub Date : 2021-05-12 DOI: 10.1109/ICT52184.2021.9511519
K. Mehmood, H. V. K. Mendis, Katina Kralevska, P. Heegaard
5G technology complements the enabling of communication services for different vertical industries such as smart distribution grids. Automation is an integral and necessary part of the power distribution grid operation and management. This paper postulates a framework by which the smart distribution grid can obtain service-oriented communication services using 5G network slicing and intent-based networking (IBN). IBN provides an interface to service users and network stakeholders to cooperate through a high level abstraction model of service provisioning in a network agnostic manner. The automation and adaptability of the distribution grid are facilitated by using the dynamic and closed-loop mechanism of IBN together with network slicing and network function virtualization for network management and orchestration. We identify the automation parts of the power distribution grid and illustrate the intent processing and its inclusion in the definition of network slice instances, service and network configuration models.
5G技术补充了智能配电网等不同垂直行业的通信服务。自动化是配电网运行管理不可缺少的重要组成部分。本文提出了一种基于5G网络切片和基于意图的网络(IBN)的智能配电网获得面向服务通信服务的框架。IBN为服务用户和网络涉众提供了一个接口,以一种与网络无关的方式通过服务供应的高级抽象模型进行合作。利用IBN的动态闭环机制,结合网络切片和网络功能虚拟化进行网络管理和编排,有利于配电网的自动化和适应性。我们识别了配电网的自动化部分,并说明了意图处理及其在网络切片实例、服务和网络配置模型定义中的包含。
{"title":"Intent-based Network Management and Orchestration for Smart Distribution Grids","authors":"K. Mehmood, H. V. K. Mendis, Katina Kralevska, P. Heegaard","doi":"10.1109/ICT52184.2021.9511519","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511519","url":null,"abstract":"5G technology complements the enabling of communication services for different vertical industries such as smart distribution grids. Automation is an integral and necessary part of the power distribution grid operation and management. This paper postulates a framework by which the smart distribution grid can obtain service-oriented communication services using 5G network slicing and intent-based networking (IBN). IBN provides an interface to service users and network stakeholders to cooperate through a high level abstraction model of service provisioning in a network agnostic manner. The automation and adaptability of the distribution grid are facilitated by using the dynamic and closed-loop mechanism of IBN together with network slicing and network function virtualization for network management and orchestration. We identify the automation parts of the power distribution grid and illustrate the intent processing and its inclusion in the definition of network slice instances, service and network configuration models.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124866537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2021 28th International Conference on Telecommunications (ICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1