Pub Date : 2022-11-02DOI: 10.1109/CAMAD55695.2022.9966905
Aparna Behara, T. Venkatesh
The future Wireless Local Area Network (WLAN) networks are expected to cater to the high-density use-case scenarios such as airports, residential apartments, outdoor stadiums, etc., where numerous Access Points (APs) are deployed to cover the given geographical area. The IEEE 802.11ax is the current generation WLAN standard designed to cater to such high-density networks. To meet the demands of high-density networks, the 802.11ax standard uses a novel frequency reuse mechanism known as Basic-Service Set (BSS)-Coloring. In this paper, we have studied the impact of the BSS-Coloring feature on the performance of the up-link throughput of 802.11ax WLAN. To this end, we have carried out Network-Simulator (NS)-3-based simulation study. Further, we have simulated a multi-BSS environment and studied the performance of throughput due to variation in the following key WLAN parameters: (i) Modulation & Coding Scheme (MCS) Index, (ii) Channel bandwidth, (iii) Number of antennas, (iv) Access-Categories, and (v) Non-saturated Traffic conditions.
{"title":"Performance Study of High-Efficiency IEEE 802.11ax WLAN Standard Using NS-3 Simulator","authors":"Aparna Behara, T. Venkatesh","doi":"10.1109/CAMAD55695.2022.9966905","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966905","url":null,"abstract":"The future Wireless Local Area Network (WLAN) networks are expected to cater to the high-density use-case scenarios such as airports, residential apartments, outdoor stadiums, etc., where numerous Access Points (APs) are deployed to cover the given geographical area. The IEEE 802.11ax is the current generation WLAN standard designed to cater to such high-density networks. To meet the demands of high-density networks, the 802.11ax standard uses a novel frequency reuse mechanism known as Basic-Service Set (BSS)-Coloring. In this paper, we have studied the impact of the BSS-Coloring feature on the performance of the up-link throughput of 802.11ax WLAN. To this end, we have carried out Network-Simulator (NS)-3-based simulation study. Further, we have simulated a multi-BSS environment and studied the performance of throughput due to variation in the following key WLAN parameters: (i) Modulation & Coding Scheme (MCS) Index, (ii) Channel bandwidth, (iii) Number of antennas, (iv) Access-Categories, and (v) Non-saturated Traffic conditions.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-02DOI: 10.1109/CAMAD55695.2022.9966909
Amel Tibhirt, D. Slock, Y. Yuan-Wu
Dynamic Time Division Duplexing (DynTDD) is one of the key features that enable the dynamic or flexible uplink and downlink transmission and reception for a specific sub-frame in SG mobile networks. However, the advantages of the DynTDD system are difficult to fully utilize due to the cross-link interference (CLI) arising from neighboring cells using different transmission directions on the same or partially- overlapping time-frequency resources. There are two types of cross-link interference; between the Base Stations (BS), which is known as BS-to-BS or DL-to-UL interference, and between User Equipment (UE) which is known as UE-to-UE or UL-to-DL interference. Rank deficiency of channel matrices is an important aspect of Multi-Input Multi-Output (MIMO) wireless systems. Poor scattering and the presence of single or very few direct paths are some reasons for rank deficiency in wireless channels. While the implications of rank deficient channels are well understood for the single user (SU) point-to-point setting, less is known for interference networks. In this paper, we give a sufficient condition for a full rank MIMO interfering channel, that outperforms the current state of the art, we provide also tighter necessary conditions for Interference Alignment (IA) feasibility, that are very close to the necessary and sufficient condition, which gives all the feasible cases. Then we extend a MIMO Interference Alignment (IA) feasibility framework to rank deficient channels, by investigating our published theorem for the necessary and sufficient condition in this case.
动态时分双工(Dynamic Time Division Duplexing, DynTDD)是SG移动网络中实现特定子帧动态或灵活的上行、下行传输和接收的关键特性之一。然而,由于在相同或部分重叠的时频资源上使用不同传输方向的相邻小区会产生交联干扰(CLI),使得DynTDD系统的优势难以充分发挥。交联干扰有两种类型;基站(BS)之间的干扰被称为BS到BS或dl到ul干扰,用户设备(UE)之间的干扰被称为UE到UE或ul到dl干扰。信道矩阵秩不足是多输入多输出(MIMO)无线系统的一个重要方面。低散射和单一或很少直接路径的存在是导致无线信道秩不足的一些原因。虽然对单用户(SU)点对点设置的秩缺陷信道的影响已经很好地理解,但对干扰网络的影响知之甚少。本文给出了一个优于当前技术水平的全秩MIMO干扰信道的充分条件,并给出了更严格的干扰对准可行性的必要条件,该必要条件非常接近于给出所有可行情况的充分必要条件。然后,我们扩展了MIMO干扰对准(IA)可行性框架,通过研究我们发表的在这种情况下的充要条件定理来对缺陷信道进行排序。
{"title":"Interference Mitigation in Dynamic TDD MIMO Interference Channels","authors":"Amel Tibhirt, D. Slock, Y. Yuan-Wu","doi":"10.1109/CAMAD55695.2022.9966909","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966909","url":null,"abstract":"Dynamic Time Division Duplexing (DynTDD) is one of the key features that enable the dynamic or flexible uplink and downlink transmission and reception for a specific sub-frame in SG mobile networks. However, the advantages of the DynTDD system are difficult to fully utilize due to the cross-link interference (CLI) arising from neighboring cells using different transmission directions on the same or partially- overlapping time-frequency resources. There are two types of cross-link interference; between the Base Stations (BS), which is known as BS-to-BS or DL-to-UL interference, and between User Equipment (UE) which is known as UE-to-UE or UL-to-DL interference. Rank deficiency of channel matrices is an important aspect of Multi-Input Multi-Output (MIMO) wireless systems. Poor scattering and the presence of single or very few direct paths are some reasons for rank deficiency in wireless channels. While the implications of rank deficient channels are well understood for the single user (SU) point-to-point setting, less is known for interference networks. In this paper, we give a sufficient condition for a full rank MIMO interfering channel, that outperforms the current state of the art, we provide also tighter necessary conditions for Interference Alignment (IA) feasibility, that are very close to the necessary and sufficient condition, which gives all the feasible cases. Then we extend a MIMO Interference Alignment (IA) feasibility framework to rank deficient channels, by investigating our published theorem for the necessary and sufficient condition in this case.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125520687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-02DOI: 10.1109/CAMAD55695.2022.9966915
M. Papaioannou, G. Mantas, Aliyah Essop, V. Sucasas, N. Aaraj, Jonathan Rodriguez
User Authentication in mobile devices acts as a first line of defense verifying the user's identity to allow access to the resources of a device and typically was based on “something the user knows”, known also as knowledge-based user authentication for several decades. However, recent studies point out that although knowledge-based user authentication has been the most popular for authenticating an individual, nowadays it is no more considered secure and convenient for the mobile user as it is imposing several limitations in terms of security and usability. These limitations stress the need for the development and implementation of more secure and usable user authentication methods. Toward this direction, user authentication based on the “something the user is” has caught the attention. This category includes authentication methods which make use of human physical characteristics (also referred to as physiological biometrics), or involuntary actions (also referred to as behavioral biometrics). In particular, risk-based user authentication based on behavioral biometrics appears to have the potential to increase the reliability of authentication without sacrificing usability. In this context, we focus on the estimation of the risk score, in a continuous mode, of the risk-based user authentication mechanism that we have proposed in our previous work for mobile passenger identification (ID) devices for land/sea border control.
{"title":"Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices","authors":"M. Papaioannou, G. Mantas, Aliyah Essop, V. Sucasas, N. Aaraj, Jonathan Rodriguez","doi":"10.1109/CAMAD55695.2022.9966915","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966915","url":null,"abstract":"User Authentication in mobile devices acts as a first line of defense verifying the user's identity to allow access to the resources of a device and typically was based on “something the user knows”, known also as knowledge-based user authentication for several decades. However, recent studies point out that although knowledge-based user authentication has been the most popular for authenticating an individual, nowadays it is no more considered secure and convenient for the mobile user as it is imposing several limitations in terms of security and usability. These limitations stress the need for the development and implementation of more secure and usable user authentication methods. Toward this direction, user authentication based on the “something the user is” has caught the attention. This category includes authentication methods which make use of human physical characteristics (also referred to as physiological biometrics), or involuntary actions (also referred to as behavioral biometrics). In particular, risk-based user authentication based on behavioral biometrics appears to have the potential to increase the reliability of authentication without sacrificing usability. In this context, we focus on the estimation of the risk score, in a continuous mode, of the risk-based user authentication mechanism that we have proposed in our previous work for mobile passenger identification (ID) devices for land/sea border control.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-02DOI: 10.1109/CAMAD55695.2022.9966908
Quang-Duy Nguyen, S. Dhouib, P. Bellot
Specification part 14 of the Open Platform Communication Unified Architecture (OPC UA) standard provides five different profiles to implement the publish-subscribe messaging pattern. The specification is also called OPC UA PubSub, and its profiles are called PubSub profiles. Two devices deployed with the same PubSub profile can exchange and collaborate; however, two devices deployed with two different PubSub profiles are unable to communicate. It is a limit for the Industry Internet of Things, a complex environment where there would be heterogeneous devices and networks. One approach to overcoming this issue is to use a bridge for the devices deployed with different PubSub profiles. In this sense, this paper provides a unified method to design bridges for OPC UA PubSub networks. The proof-of-concept experiment, also presented in this paper, is a use case of bridging PubSub broker-less and broker-based networks.
开放平台通信统一体系结构(OPC UA)标准的规范第14部分提供了五种不同的配置文件来实现发布-订阅消息传递模式。该规范也称为OPC UA PubSub,其配置文件称为PubSub配置文件。具有相同PubSub配置文件的两个设备可以交换和协作;但是,使用两个不同的PubSub配置文件部署的两个设备无法通信。这是工业物联网的一个限制,工业物联网是一个复杂的环境,其中可能存在异构设备和网络。克服此问题的一种方法是为使用不同PubSub配置文件部署的设备使用桥接。从这个意义上讲,本文提供了一种统一的OPC UA公网网桥的设计方法。本文还提出了概念验证实验,这是一个桥接PubSub无代理网络和基于代理网络的用例。
{"title":"A Unified Method to Design Bridges for OPC UA PubSub Networks in the Industrial IoT","authors":"Quang-Duy Nguyen, S. Dhouib, P. Bellot","doi":"10.1109/CAMAD55695.2022.9966908","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966908","url":null,"abstract":"Specification part 14 of the Open Platform Communication Unified Architecture (OPC UA) standard provides five different profiles to implement the publish-subscribe messaging pattern. The specification is also called OPC UA PubSub, and its profiles are called PubSub profiles. Two devices deployed with the same PubSub profile can exchange and collaborate; however, two devices deployed with two different PubSub profiles are unable to communicate. It is a limit for the Industry Internet of Things, a complex environment where there would be heterogeneous devices and networks. One approach to overcoming this issue is to use a bridge for the devices deployed with different PubSub profiles. In this sense, this paper provides a unified method to design bridges for OPC UA PubSub networks. The proof-of-concept experiment, also presented in this paper, is a use case of bridging PubSub broker-less and broker-based networks.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"614 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123341261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-17DOI: 10.1109/CAMAD55695.2022.9966894
R. Kaewpuang, Minrui Xu, D. Niyato, Han Yu, Zehui Xiong
Space-air-ground integrated networks (SAGIN) are one of the most promising advanced paradigms in the sixth generation (6G) communication. SAGIN can support high data rates, low latency, and seamless network coverage for interconnected applications and services. However, communications in SAGIN are facing tremendous security threats from the everincreasing capacity of quantum computers. Fortunately, quantum key distribution (QKD) for establishing secure communications in SAGIN, i.e., QKD over SAGIN, can provide information-theoretic security. To minimize the QKD deployment cost in SAGIN with heterogeneous nodes, in this paper, we propose a resource allocation scheme for QKD over SAGIN using stochastic programming. The proposed scheme is formulated via two-stage stochastic programming (SP), while considering uncertainties such as security requirements and weather conditions. Under extensive experiments, the results clearly show that the proposed scheme can achieve the optimal deployment cost under various security requirements and unpredictable weather conditions.
{"title":"Resource Allocation in Quantum Key Distribution (QKD) for Space-Air-Ground Integrated Networks","authors":"R. Kaewpuang, Minrui Xu, D. Niyato, Han Yu, Zehui Xiong","doi":"10.1109/CAMAD55695.2022.9966894","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966894","url":null,"abstract":"Space-air-ground integrated networks (SAGIN) are one of the most promising advanced paradigms in the sixth generation (6G) communication. SAGIN can support high data rates, low latency, and seamless network coverage for interconnected applications and services. However, communications in SAGIN are facing tremendous security threats from the everincreasing capacity of quantum computers. Fortunately, quantum key distribution (QKD) for establishing secure communications in SAGIN, i.e., QKD over SAGIN, can provide information-theoretic security. To minimize the QKD deployment cost in SAGIN with heterogeneous nodes, in this paper, we propose a resource allocation scheme for QKD over SAGIN using stochastic programming. The proposed scheme is formulated via two-stage stochastic programming (SP), while considering uncertainties such as security requirements and weather conditions. Under extensive experiments, the results clearly show that the proposed scheme can achieve the optimal deployment cost under various security requirements and unpredictable weather conditions.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-20DOI: 10.1109/CAMAD55695.2022.9966912
G. Zachos, G. Mantas, Ismael Essop, Kyriakos Porfyrakis, J. Ribeiro, Jonathan Rodriguez
Over the past few years, the Internet of Things (IoT) is transforming the healthcare sector through the introduction of the Internet of Medical Things (IoMT) technology, whose purpose is the improvement of the patient's quality of life. Nevertheless, IoMT networks are still vulnerable to a wide range of threats because of their heterogeneity and resource-constrained characteristics. Thus, novel security mechanisms, such as accurate and efficient anomaly-based intrusion detection systems (AIDSs), taking into consideration the inherent limitations of the IoMT networks, are required to be developed before IoMT networks reach their full potential in the market. In our previous work, we presented the system architecture for a novel hybrid AIDS for IoMT networks. In this paper, we expand it by presenting details of the implementation process that led to a prototype of the proposed AIDS. Our target is this work to serve as a guidance for other researchers or engineers to develop their own specific implementations of AIDSs for IoMT networks.
{"title":"Prototyping an Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks","authors":"G. Zachos, G. Mantas, Ismael Essop, Kyriakos Porfyrakis, J. Ribeiro, Jonathan Rodriguez","doi":"10.1109/CAMAD55695.2022.9966912","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966912","url":null,"abstract":"Over the past few years, the Internet of Things (IoT) is transforming the healthcare sector through the introduction of the Internet of Medical Things (IoMT) technology, whose purpose is the improvement of the patient's quality of life. Nevertheless, IoMT networks are still vulnerable to a wide range of threats because of their heterogeneity and resource-constrained characteristics. Thus, novel security mechanisms, such as accurate and efficient anomaly-based intrusion detection systems (AIDSs), taking into consideration the inherent limitations of the IoMT networks, are required to be developed before IoMT networks reach their full potential in the market. In our previous work, we presented the system architecture for a novel hybrid AIDS for IoMT networks. In this paper, we expand it by presenting details of the implementation process that led to a prototype of the proposed AIDS. Our target is this work to serve as a guidance for other researchers or engineers to develop their own specific implementations of AIDSs for IoMT networks.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/CAMAD55695.2022.9966913
W. U. Khan, E. Lagunas, A. Mahmood, Zain Ali, S. Chatzinotas, B. Ottersten, O. Dobre
Future wireless networks are expected to connect large-scale low-powered communication devices using the available spectrum resources. Backscatter communications (BC) is an emerging technology towards battery-free transmission in future wireless networks by leveraging ambient radio frequency (RF) waves that enable communications among wireless devices. Non-orthogonal multiple access (NOMA) has recently drawn significant attention due to its high spectral efficiency. The combination of these two technologies can play an important role in the development of future networks. This paper proposes a new optimization approach to enhance the spectral efficiency of nonorthogonal multiple access (NOMA)-BC network. Our framework simultaneously optimizes the power allocation of base station and reflection coefficient (RC) of the backscatter device in each cell under the assumption of imperfect signal decoding. The problem of spectral efficiency maximization is coupled on power and RC which is challenging to solve. To make this problem tractable, we first decouple it into two subproblems and then apply the decomposition method and Karush-Kuhn-Tucker conditions to obtain the efficient solution. Numerical results show the performance of the proposed NOMA-BC network over the pure NOMA network without BC.
{"title":"Integration of Backscatter Communication with Multi-cell NOMA: A Spectral Efficiency Optimization under Imperfect SIC","authors":"W. U. Khan, E. Lagunas, A. Mahmood, Zain Ali, S. Chatzinotas, B. Ottersten, O. Dobre","doi":"10.1109/CAMAD55695.2022.9966913","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966913","url":null,"abstract":"Future wireless networks are expected to connect large-scale low-powered communication devices using the available spectrum resources. Backscatter communications (BC) is an emerging technology towards battery-free transmission in future wireless networks by leveraging ambient radio frequency (RF) waves that enable communications among wireless devices. Non-orthogonal multiple access (NOMA) has recently drawn significant attention due to its high spectral efficiency. The combination of these two technologies can play an important role in the development of future networks. This paper proposes a new optimization approach to enhance the spectral efficiency of nonorthogonal multiple access (NOMA)-BC network. Our framework simultaneously optimizes the power allocation of base station and reflection coefficient (RC) of the backscatter device in each cell under the assumption of imperfect signal decoding. The problem of spectral efficiency maximization is coupled on power and RC which is challenging to solve. To make this problem tractable, we first decouple it into two subproblems and then apply the decomposition method and Karush-Kuhn-Tucker conditions to obtain the efficient solution. Numerical results show the performance of the proposed NOMA-BC network over the pure NOMA network without BC.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115214815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}