首页 > 最新文献

2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)最新文献

英文 中文
Performance Study of High-Efficiency IEEE 802.11ax WLAN Standard Using NS-3 Simulator 基于NS-3模拟器的高效IEEE 802.11ax无线局域网标准性能研究
Aparna Behara, T. Venkatesh
The future Wireless Local Area Network (WLAN) networks are expected to cater to the high-density use-case scenarios such as airports, residential apartments, outdoor stadiums, etc., where numerous Access Points (APs) are deployed to cover the given geographical area. The IEEE 802.11ax is the current generation WLAN standard designed to cater to such high-density networks. To meet the demands of high-density networks, the 802.11ax standard uses a novel frequency reuse mechanism known as Basic-Service Set (BSS)-Coloring. In this paper, we have studied the impact of the BSS-Coloring feature on the performance of the up-link throughput of 802.11ax WLAN. To this end, we have carried out Network-Simulator (NS)-3-based simulation study. Further, we have simulated a multi-BSS environment and studied the performance of throughput due to variation in the following key WLAN parameters: (i) Modulation & Coding Scheme (MCS) Index, (ii) Channel bandwidth, (iii) Number of antennas, (iv) Access-Categories, and (v) Non-saturated Traffic conditions.
未来的无线局域网(WLAN)网络有望满足高密度用例场景,如机场、住宅公寓、室外体育场等,在这些场景中,部署了大量接入点(ap)以覆盖给定的地理区域。IEEE 802.11ax是为满足这种高密度网络而设计的当前一代WLAN标准。为了满足高密度网络的需求,802.11ax标准使用了一种新的频率重用机制,称为基本服务集(BSS)-着色。在本文中,我们研究了bss着色特性对802.11ax无线局域网上行链路吞吐量性能的影响。为此,我们进行了基于Network-Simulator (NS)-3的仿真研究。此外,我们还模拟了一个多bss环境,并研究了由于以下关键WLAN参数变化而导致的吞吐量性能:(i)调制和编码方案(MCS)索引,(ii)信道带宽,(iii)天线数量,(iv)访问类别和(v)非饱和流量条件。
{"title":"Performance Study of High-Efficiency IEEE 802.11ax WLAN Standard Using NS-3 Simulator","authors":"Aparna Behara, T. Venkatesh","doi":"10.1109/CAMAD55695.2022.9966905","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966905","url":null,"abstract":"The future Wireless Local Area Network (WLAN) networks are expected to cater to the high-density use-case scenarios such as airports, residential apartments, outdoor stadiums, etc., where numerous Access Points (APs) are deployed to cover the given geographical area. The IEEE 802.11ax is the current generation WLAN standard designed to cater to such high-density networks. To meet the demands of high-density networks, the 802.11ax standard uses a novel frequency reuse mechanism known as Basic-Service Set (BSS)-Coloring. In this paper, we have studied the impact of the BSS-Coloring feature on the performance of the up-link throughput of 802.11ax WLAN. To this end, we have carried out Network-Simulator (NS)-3-based simulation study. Further, we have simulated a multi-BSS environment and studied the performance of throughput due to variation in the following key WLAN parameters: (i) Modulation & Coding Scheme (MCS) Index, (ii) Channel bandwidth, (iii) Number of antennas, (iv) Access-Categories, and (v) Non-saturated Traffic conditions.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference Mitigation in Dynamic TDD MIMO Interference Channels 动态TDD MIMO干扰信道中的干扰抑制
Amel Tibhirt, D. Slock, Y. Yuan-Wu
Dynamic Time Division Duplexing (DynTDD) is one of the key features that enable the dynamic or flexible uplink and downlink transmission and reception for a specific sub-frame in SG mobile networks. However, the advantages of the DynTDD system are difficult to fully utilize due to the cross-link interference (CLI) arising from neighboring cells using different transmission directions on the same or partially- overlapping time-frequency resources. There are two types of cross-link interference; between the Base Stations (BS), which is known as BS-to-BS or DL-to-UL interference, and between User Equipment (UE) which is known as UE-to-UE or UL-to-DL interference. Rank deficiency of channel matrices is an important aspect of Multi-Input Multi-Output (MIMO) wireless systems. Poor scattering and the presence of single or very few direct paths are some reasons for rank deficiency in wireless channels. While the implications of rank deficient channels are well understood for the single user (SU) point-to-point setting, less is known for interference networks. In this paper, we give a sufficient condition for a full rank MIMO interfering channel, that outperforms the current state of the art, we provide also tighter necessary conditions for Interference Alignment (IA) feasibility, that are very close to the necessary and sufficient condition, which gives all the feasible cases. Then we extend a MIMO Interference Alignment (IA) feasibility framework to rank deficient channels, by investigating our published theorem for the necessary and sufficient condition in this case.
动态时分双工(Dynamic Time Division Duplexing, DynTDD)是SG移动网络中实现特定子帧动态或灵活的上行、下行传输和接收的关键特性之一。然而,由于在相同或部分重叠的时频资源上使用不同传输方向的相邻小区会产生交联干扰(CLI),使得DynTDD系统的优势难以充分发挥。交联干扰有两种类型;基站(BS)之间的干扰被称为BS到BS或dl到ul干扰,用户设备(UE)之间的干扰被称为UE到UE或ul到dl干扰。信道矩阵秩不足是多输入多输出(MIMO)无线系统的一个重要方面。低散射和单一或很少直接路径的存在是导致无线信道秩不足的一些原因。虽然对单用户(SU)点对点设置的秩缺陷信道的影响已经很好地理解,但对干扰网络的影响知之甚少。本文给出了一个优于当前技术水平的全秩MIMO干扰信道的充分条件,并给出了更严格的干扰对准可行性的必要条件,该必要条件非常接近于给出所有可行情况的充分必要条件。然后,我们扩展了MIMO干扰对准(IA)可行性框架,通过研究我们发表的在这种情况下的充要条件定理来对缺陷信道进行排序。
{"title":"Interference Mitigation in Dynamic TDD MIMO Interference Channels","authors":"Amel Tibhirt, D. Slock, Y. Yuan-Wu","doi":"10.1109/CAMAD55695.2022.9966909","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966909","url":null,"abstract":"Dynamic Time Division Duplexing (DynTDD) is one of the key features that enable the dynamic or flexible uplink and downlink transmission and reception for a specific sub-frame in SG mobile networks. However, the advantages of the DynTDD system are difficult to fully utilize due to the cross-link interference (CLI) arising from neighboring cells using different transmission directions on the same or partially- overlapping time-frequency resources. There are two types of cross-link interference; between the Base Stations (BS), which is known as BS-to-BS or DL-to-UL interference, and between User Equipment (UE) which is known as UE-to-UE or UL-to-DL interference. Rank deficiency of channel matrices is an important aspect of Multi-Input Multi-Output (MIMO) wireless systems. Poor scattering and the presence of single or very few direct paths are some reasons for rank deficiency in wireless channels. While the implications of rank deficient channels are well understood for the single user (SU) point-to-point setting, less is known for interference networks. In this paper, we give a sufficient condition for a full rank MIMO interfering channel, that outperforms the current state of the art, we provide also tighter necessary conditions for Interference Alignment (IA) feasibility, that are very close to the necessary and sufficient condition, which gives all the feasible cases. Then we extend a MIMO Interference Alignment (IA) feasibility framework to rank deficient channels, by investigating our published theorem for the necessary and sufficient condition in this case.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125520687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices 一种安全可用的移动旅客身份认证机制的风险评估
M. Papaioannou, G. Mantas, Aliyah Essop, V. Sucasas, N. Aaraj, Jonathan Rodriguez
User Authentication in mobile devices acts as a first line of defense verifying the user's identity to allow access to the resources of a device and typically was based on “something the user knows”, known also as knowledge-based user authentication for several decades. However, recent studies point out that although knowledge-based user authentication has been the most popular for authenticating an individual, nowadays it is no more considered secure and convenient for the mobile user as it is imposing several limitations in terms of security and usability. These limitations stress the need for the development and implementation of more secure and usable user authentication methods. Toward this direction, user authentication based on the “something the user is” has caught the attention. This category includes authentication methods which make use of human physical characteristics (also referred to as physiological biometrics), or involuntary actions (also referred to as behavioral biometrics). In particular, risk-based user authentication based on behavioral biometrics appears to have the potential to increase the reliability of authentication without sacrificing usability. In this context, we focus on the estimation of the risk score, in a continuous mode, of the risk-based user authentication mechanism that we have proposed in our previous work for mobile passenger identification (ID) devices for land/sea border control.
移动设备中的用户身份验证作为验证用户身份以允许访问设备资源的第一道防线,通常基于“用户知道的东西”,几十年来也被称为基于知识的用户身份验证。然而,最近的研究指出,尽管基于知识的用户身份验证一直是最流行的个人身份验证方式,但如今它对移动用户来说不再被认为是安全和方便的,因为它在安全性和可用性方面施加了一些限制。这些限制强调了开发和实现更安全和可用的用户身份验证方法的必要性。在这个方向上,基于“用户是什么”的用户身份验证引起了人们的注意。这一类包括利用人体物理特征(也称为生理生物识别)或非自愿行为(也称为行为生物识别)的身份验证方法。特别是,基于行为生物识别技术的基于风险的用户身份验证似乎有可能在不牺牲可用性的情况下提高身份验证的可靠性。在此背景下,我们专注于以连续模式估计基于风险的用户认证机制的风险评分,该机制是我们在之前的工作中为陆地/海上边境管制的移动乘客识别(ID)设备提出的。
{"title":"Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices","authors":"M. Papaioannou, G. Mantas, Aliyah Essop, V. Sucasas, N. Aaraj, Jonathan Rodriguez","doi":"10.1109/CAMAD55695.2022.9966915","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966915","url":null,"abstract":"User Authentication in mobile devices acts as a first line of defense verifying the user's identity to allow access to the resources of a device and typically was based on “something the user knows”, known also as knowledge-based user authentication for several decades. However, recent studies point out that although knowledge-based user authentication has been the most popular for authenticating an individual, nowadays it is no more considered secure and convenient for the mobile user as it is imposing several limitations in terms of security and usability. These limitations stress the need for the development and implementation of more secure and usable user authentication methods. Toward this direction, user authentication based on the “something the user is” has caught the attention. This category includes authentication methods which make use of human physical characteristics (also referred to as physiological biometrics), or involuntary actions (also referred to as behavioral biometrics). In particular, risk-based user authentication based on behavioral biometrics appears to have the potential to increase the reliability of authentication without sacrificing usability. In this context, we focus on the estimation of the risk score, in a continuous mode, of the risk-based user authentication mechanism that we have proposed in our previous work for mobile passenger identification (ID) devices for land/sea border control.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Unified Method to Design Bridges for OPC UA PubSub Networks in the Industrial IoT 工业物联网中OPC UA公网网桥的统一设计方法
Quang-Duy Nguyen, S. Dhouib, P. Bellot
Specification part 14 of the Open Platform Communication Unified Architecture (OPC UA) standard provides five different profiles to implement the publish-subscribe messaging pattern. The specification is also called OPC UA PubSub, and its profiles are called PubSub profiles. Two devices deployed with the same PubSub profile can exchange and collaborate; however, two devices deployed with two different PubSub profiles are unable to communicate. It is a limit for the Industry Internet of Things, a complex environment where there would be heterogeneous devices and networks. One approach to overcoming this issue is to use a bridge for the devices deployed with different PubSub profiles. In this sense, this paper provides a unified method to design bridges for OPC UA PubSub networks. The proof-of-concept experiment, also presented in this paper, is a use case of bridging PubSub broker-less and broker-based networks.
开放平台通信统一体系结构(OPC UA)标准的规范第14部分提供了五种不同的配置文件来实现发布-订阅消息传递模式。该规范也称为OPC UA PubSub,其配置文件称为PubSub配置文件。具有相同PubSub配置文件的两个设备可以交换和协作;但是,使用两个不同的PubSub配置文件部署的两个设备无法通信。这是工业物联网的一个限制,工业物联网是一个复杂的环境,其中可能存在异构设备和网络。克服此问题的一种方法是为使用不同PubSub配置文件部署的设备使用桥接。从这个意义上讲,本文提供了一种统一的OPC UA公网网桥的设计方法。本文还提出了概念验证实验,这是一个桥接PubSub无代理网络和基于代理网络的用例。
{"title":"A Unified Method to Design Bridges for OPC UA PubSub Networks in the Industrial IoT","authors":"Quang-Duy Nguyen, S. Dhouib, P. Bellot","doi":"10.1109/CAMAD55695.2022.9966908","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966908","url":null,"abstract":"Specification part 14 of the Open Platform Communication Unified Architecture (OPC UA) standard provides five different profiles to implement the publish-subscribe messaging pattern. The specification is also called OPC UA PubSub, and its profiles are called PubSub profiles. Two devices deployed with the same PubSub profile can exchange and collaborate; however, two devices deployed with two different PubSub profiles are unable to communicate. It is a limit for the Industry Internet of Things, a complex environment where there would be heterogeneous devices and networks. One approach to overcoming this issue is to use a bridge for the devices deployed with different PubSub profiles. In this sense, this paper provides a unified method to design bridges for OPC UA PubSub networks. The proof-of-concept experiment, also presented in this paper, is a use case of bridging PubSub broker-less and broker-based networks.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"614 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123341261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Allocation in Quantum Key Distribution (QKD) for Space-Air-Ground Integrated Networks 天空地一体化网络量子密钥分配(QKD)中的资源分配
R. Kaewpuang, Minrui Xu, D. Niyato, Han Yu, Zehui Xiong
Space-air-ground integrated networks (SAGIN) are one of the most promising advanced paradigms in the sixth generation (6G) communication. SAGIN can support high data rates, low latency, and seamless network coverage for interconnected applications and services. However, communications in SAGIN are facing tremendous security threats from the everincreasing capacity of quantum computers. Fortunately, quantum key distribution (QKD) for establishing secure communications in SAGIN, i.e., QKD over SAGIN, can provide information-theoretic security. To minimize the QKD deployment cost in SAGIN with heterogeneous nodes, in this paper, we propose a resource allocation scheme for QKD over SAGIN using stochastic programming. The proposed scheme is formulated via two-stage stochastic programming (SP), while considering uncertainties such as security requirements and weather conditions. Under extensive experiments, the results clearly show that the proposed scheme can achieve the optimal deployment cost under various security requirements and unpredictable weather conditions.
空间-空地综合网络(SAGIN)是第六代(6G)通信中最有前途的先进模式之一。SAGIN可以为互连的应用程序和服务支持高数据速率、低延迟和无缝网络覆盖。然而,随着量子计算机容量的不断增加,SAGIN中的通信面临着巨大的安全威胁。幸运的是,用于在SAGIN中建立安全通信的量子密钥分发(QKD),即基于SAGIN的QKD,可以提供信息理论上的安全性。为了使异构节点SAGIN中的QKD部署成本最小化,本文提出了一种基于随机规划的SAGIN QKD资源分配方案。该方案通过两阶段随机规划(SP)来制定,同时考虑了安全要求和天气条件等不确定性。大量实验结果表明,该方案在各种安全需求和不可预测的天气条件下均能实现最优部署成本。
{"title":"Resource Allocation in Quantum Key Distribution (QKD) for Space-Air-Ground Integrated Networks","authors":"R. Kaewpuang, Minrui Xu, D. Niyato, Han Yu, Zehui Xiong","doi":"10.1109/CAMAD55695.2022.9966894","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966894","url":null,"abstract":"Space-air-ground integrated networks (SAGIN) are one of the most promising advanced paradigms in the sixth generation (6G) communication. SAGIN can support high data rates, low latency, and seamless network coverage for interconnected applications and services. However, communications in SAGIN are facing tremendous security threats from the everincreasing capacity of quantum computers. Fortunately, quantum key distribution (QKD) for establishing secure communications in SAGIN, i.e., QKD over SAGIN, can provide information-theoretic security. To minimize the QKD deployment cost in SAGIN with heterogeneous nodes, in this paper, we propose a resource allocation scheme for QKD over SAGIN using stochastic programming. The proposed scheme is formulated via two-stage stochastic programming (SP), while considering uncertainties such as security requirements and weather conditions. Under extensive experiments, the results clearly show that the proposed scheme can achieve the optimal deployment cost under various security requirements and unpredictable weather conditions.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Prototyping an Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks 基于异常的医疗物联网入侵检测系统原型
G. Zachos, G. Mantas, Ismael Essop, Kyriakos Porfyrakis, J. Ribeiro, Jonathan Rodriguez
Over the past few years, the Internet of Things (IoT) is transforming the healthcare sector through the introduction of the Internet of Medical Things (IoMT) technology, whose purpose is the improvement of the patient's quality of life. Nevertheless, IoMT networks are still vulnerable to a wide range of threats because of their heterogeneity and resource-constrained characteristics. Thus, novel security mechanisms, such as accurate and efficient anomaly-based intrusion detection systems (AIDSs), taking into consideration the inherent limitations of the IoMT networks, are required to be developed before IoMT networks reach their full potential in the market. In our previous work, we presented the system architecture for a novel hybrid AIDS for IoMT networks. In this paper, we expand it by presenting details of the implementation process that led to a prototype of the proposed AIDS. Our target is this work to serve as a guidance for other researchers or engineers to develop their own specific implementations of AIDSs for IoMT networks.
在过去几年中,物联网(IoT)通过引入医疗物联网(IoMT)技术正在改变医疗保健行业,其目的是改善患者的生活质量。然而,由于其异质性和资源受限的特点,物联网网络仍然容易受到各种威胁。因此,在IoMT网络在市场上充分发挥其潜力之前,需要开发新的安全机制,如准确和高效的基于异常的入侵检测系统(aids),同时考虑到IoMT网络的固有局限性。在我们之前的工作中,我们提出了一种用于IoMT网络的新型混合辅助设备的系统架构。在本文中,我们通过介绍导致提出的艾滋病原型的实施过程的细节来扩展它。我们的目标是为其他研究人员或工程师提供指导,以开发他们自己的IoMT网络aids的具体实现。
{"title":"Prototyping an Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks","authors":"G. Zachos, G. Mantas, Ismael Essop, Kyriakos Porfyrakis, J. Ribeiro, Jonathan Rodriguez","doi":"10.1109/CAMAD55695.2022.9966912","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966912","url":null,"abstract":"Over the past few years, the Internet of Things (IoT) is transforming the healthcare sector through the introduction of the Internet of Medical Things (IoMT) technology, whose purpose is the improvement of the patient's quality of life. Nevertheless, IoMT networks are still vulnerable to a wide range of threats because of their heterogeneity and resource-constrained characteristics. Thus, novel security mechanisms, such as accurate and efficient anomaly-based intrusion detection systems (AIDSs), taking into consideration the inherent limitations of the IoMT networks, are required to be developed before IoMT networks reach their full potential in the market. In our previous work, we presented the system architecture for a novel hybrid AIDS for IoMT networks. In this paper, we expand it by presenting details of the implementation process that led to a prototype of the proposed AIDS. Our target is this work to serve as a guidance for other researchers or engineers to develop their own specific implementations of AIDSs for IoMT networks.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Integration of Backscatter Communication with Multi-cell NOMA: A Spectral Efficiency Optimization under Imperfect SIC 后向散射通信与多小区NOMA的集成:不完全SIC下的频谱效率优化
W. U. Khan, E. Lagunas, A. Mahmood, Zain Ali, S. Chatzinotas, B. Ottersten, O. Dobre
Future wireless networks are expected to connect large-scale low-powered communication devices using the available spectrum resources. Backscatter communications (BC) is an emerging technology towards battery-free transmission in future wireless networks by leveraging ambient radio frequency (RF) waves that enable communications among wireless devices. Non-orthogonal multiple access (NOMA) has recently drawn significant attention due to its high spectral efficiency. The combination of these two technologies can play an important role in the development of future networks. This paper proposes a new optimization approach to enhance the spectral efficiency of nonorthogonal multiple access (NOMA)-BC network. Our framework simultaneously optimizes the power allocation of base station and reflection coefficient (RC) of the backscatter device in each cell under the assumption of imperfect signal decoding. The problem of spectral efficiency maximization is coupled on power and RC which is challenging to solve. To make this problem tractable, we first decouple it into two subproblems and then apply the decomposition method and Karush-Kuhn-Tucker conditions to obtain the efficient solution. Numerical results show the performance of the proposed NOMA-BC network over the pure NOMA network without BC.
未来的无线网络有望利用可用的频谱资源连接大规模的低功耗通信设备。反向散射通信(BC)是一种新兴的无线网络无电池传输技术,它利用环境射频(RF)波实现无线设备之间的通信。近年来,非正交多址(NOMA)技术因其频谱效率高而受到广泛关注。这两种技术的结合可以在未来网络的发展中发挥重要作用。为了提高非正交多址(NOMA)-BC网络的频谱效率,提出了一种新的优化方法。该框架在假设信号解码不完全的情况下,同时优化了基站的功率分配和每个小区中后向散射装置的反射系数。频谱效率最大化是一个与功率和RC耦合的问题,是一个具有挑战性的问题。为了使问题易于处理,我们首先将其解耦为两个子问题,然后应用分解方法和Karush-Kuhn-Tucker条件得到有效解。数值结果表明,所提出的NOMA-BC网络的性能优于无BC的纯NOMA网络。
{"title":"Integration of Backscatter Communication with Multi-cell NOMA: A Spectral Efficiency Optimization under Imperfect SIC","authors":"W. U. Khan, E. Lagunas, A. Mahmood, Zain Ali, S. Chatzinotas, B. Ottersten, O. Dobre","doi":"10.1109/CAMAD55695.2022.9966913","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966913","url":null,"abstract":"Future wireless networks are expected to connect large-scale low-powered communication devices using the available spectrum resources. Backscatter communications (BC) is an emerging technology towards battery-free transmission in future wireless networks by leveraging ambient radio frequency (RF) waves that enable communications among wireless devices. Non-orthogonal multiple access (NOMA) has recently drawn significant attention due to its high spectral efficiency. The combination of these two technologies can play an important role in the development of future networks. This paper proposes a new optimization approach to enhance the spectral efficiency of nonorthogonal multiple access (NOMA)-BC network. Our framework simultaneously optimizes the power allocation of base station and reflection coefficient (RC) of the backscatter device in each cell under the assumption of imperfect signal decoding. The problem of spectral efficiency maximization is coupled on power and RC which is challenging to solve. To make this problem tractable, we first decouple it into two subproblems and then apply the decomposition method and Karush-Kuhn-Tucker conditions to obtain the efficient solution. Numerical results show the performance of the proposed NOMA-BC network over the pure NOMA network without BC.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115214815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1