Pub Date : 2013-12-11DOI: 10.1109/PIMRC.2013.6666567
Yuan Ma, Yue Gao, Xing Zhang, L. Cuthbert
Cooperative spectrum sensing is employed in Cognitive Radio (CR) networks to reliably detect Primary User (PU) transmissions by fusing the sensed data of multiple Secondary Users (SUs). The local detection reliability of an individual SU is closely related to its channel condition. In this paper, we propose a scheme that uses SNR to evaluate the reliability of each individual SU's local decision. We optimize the number of SUs for the sensing based on their channel conditions to achieve the optimal global detection probability at the fusion centre. Simulation results show that the proposed algorithm is robust against noise uncertainty with the optimal number of SUs and better receiver operating characteristic (ROC) performance is obtained in comparison to conventional schemes.
协同频谱感知是认知无线电(Cognitive Radio, CR)网络中采用的一种方法,通过融合多个Secondary User (Secondary User)的感知数据,对Primary User (PU)的传输进行可靠检测。单个SU的局部检测可靠性与其信道条件密切相关。在本文中,我们提出了一种使用信噪比来评估每个单个SU局部决策可靠性的方案。为了在融合中心获得最优的全局检测概率,我们根据传感器的信道条件对传感器的数量进行优化。仿真结果表明,该算法对噪声不确定性具有较强的鲁棒性,具有最优的单元数,并且与传统方案相比具有更好的接收机工作特性(ROC)性能。
{"title":"Optimization of collaborating secondary users in a cooperative sensing under noise uncertainty","authors":"Yuan Ma, Yue Gao, Xing Zhang, L. Cuthbert","doi":"10.1109/PIMRC.2013.6666567","DOIUrl":"https://doi.org/10.1109/PIMRC.2013.6666567","url":null,"abstract":"Cooperative spectrum sensing is employed in Cognitive Radio (CR) networks to reliably detect Primary User (PU) transmissions by fusing the sensed data of multiple Secondary Users (SUs). The local detection reliability of an individual SU is closely related to its channel condition. In this paper, we propose a scheme that uses SNR to evaluate the reliability of each individual SU's local decision. We optimize the number of SUs for the sensing based on their channel conditions to achieve the optimal global detection probability at the fusion centre. Simulation results show that the proposed algorithm is robust against noise uncertainty with the optimal number of SUs and better receiver operating characteristic (ROC) performance is obtained in comparison to conventional schemes.","PeriodicalId":210993,"journal":{"name":"2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114408075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-11DOI: 10.1109/PIMRC.2013.6666177
Satyanarayana Vuppala, G. Abreu
We investigated the secrecy outage of unicast channels in random networks exposed to unknown numbers of randomly located eavesdroppers, obtaining original expressions which include uncertainty in terms of the location of legitimate nodes relative to eavesdroppers, the number of eavesdroppers, and fading. Under such conditions, we derive the path gain distributions of legitimate and eavesdropper nodes, as well as the corresponding secrecy non-outage. Two interesting conclusions can be drawn from our analysis. The first is that the uncertainty on the number of eavesdropper does not play a significant role in quantifying secrecy outage; and the second is that secret communication at a given rate is possible (albeit subjected to outage), with very low power. Specifically, it is found that the for a given fading figure and network density (which fundamentally determines the secrecy outage) similar secrecy outage is experience by the k-th furthest legitimate node, independent on the source's transmit power.
{"title":"Secrecy outage in random wireless networks subjected to fading","authors":"Satyanarayana Vuppala, G. Abreu","doi":"10.1109/PIMRC.2013.6666177","DOIUrl":"https://doi.org/10.1109/PIMRC.2013.6666177","url":null,"abstract":"We investigated the secrecy outage of unicast channels in random networks exposed to unknown numbers of randomly located eavesdroppers, obtaining original expressions which include uncertainty in terms of the location of legitimate nodes relative to eavesdroppers, the number of eavesdroppers, and fading. Under such conditions, we derive the path gain distributions of legitimate and eavesdropper nodes, as well as the corresponding secrecy non-outage. Two interesting conclusions can be drawn from our analysis. The first is that the uncertainty on the number of eavesdropper does not play a significant role in quantifying secrecy outage; and the second is that secret communication at a given rate is possible (albeit subjected to outage), with very low power. Specifically, it is found that the for a given fading figure and network density (which fundamentally determines the secrecy outage) similar secrecy outage is experience by the k-th furthest legitimate node, independent on the source's transmit power.","PeriodicalId":210993,"journal":{"name":"2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114754405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-11DOI: 10.1109/PIMRC.2013.6666527
F. Benedetto, G. Giunta, Elena Guzzon, M. Renfors
In cognitive radio networks, the unoccupied frequency bands licensed to primary users can be opportunistically accessed by secondary (low-power or hidden) cognitive users. Secondary users can be authorized low-power users, or unauthorized (hidden) users that occupy the band illegally transmitting under the noise level. More in details, the devised method is able to detect unknown low-power constant-modulus signals in noise of unknown variance, exploiting higher order moments of the received signal. The decision variable used in the detection stage is represented (only) by the estimated power of the hidden signal. Performance analysis is carried out in comparison with conventional energy detection, in the presence of noise uncertainty. In particular, the detection probabilities of the proposed and conventional methods as well as the mean detection time are evaluated and compared. The numerical results, obtained from wide simulation trials, have evidenced the efficiency of our method for detecting the hidden user's low-power signal in cognitive communications.
{"title":"Detection of hidden users in cognitive radio networks","authors":"F. Benedetto, G. Giunta, Elena Guzzon, M. Renfors","doi":"10.1109/PIMRC.2013.6666527","DOIUrl":"https://doi.org/10.1109/PIMRC.2013.6666527","url":null,"abstract":"In cognitive radio networks, the unoccupied frequency bands licensed to primary users can be opportunistically accessed by secondary (low-power or hidden) cognitive users. Secondary users can be authorized low-power users, or unauthorized (hidden) users that occupy the band illegally transmitting under the noise level. More in details, the devised method is able to detect unknown low-power constant-modulus signals in noise of unknown variance, exploiting higher order moments of the received signal. The decision variable used in the detection stage is represented (only) by the estimated power of the hidden signal. Performance analysis is carried out in comparison with conventional energy detection, in the presence of noise uncertainty. In particular, the detection probabilities of the proposed and conventional methods as well as the mean detection time are evaluated and compared. The numerical results, obtained from wide simulation trials, have evidenced the efficiency of our method for detecting the hidden user's low-power signal in cognitive communications.","PeriodicalId":210993,"journal":{"name":"2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123083860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-11DOI: 10.1109/PIMRC.2013.6666244
Christoph Thein, Martin Fuhrwerk, J. Peissig
The problem of synchronization in non-contiguous OFDM (NC-OFDM) in the presence of other in-band systems is addressed by means of a comparison between time-and frequency-based signal processing approaches. The filterbank multicarrier scheme with its spectral-efficient offset-QAM (OQAM) OFDM implementation is thereby a good choice for an NC-OFDM system design due to its well-localized spectral signal shape. In this work, we present and discuss two NC-OFDM synchronization methods for OQAM-OFDM, employing the time domain and the already demodulated frequency domain signal for synchronization and evaluate them in terms of sustainable bit-error rate over signal-to-interference ratio and variance of time and frequency offset estimation in different resource allocation scenarios. Additionally, their computational complexity is taken into account to estimate the costs of implementation on hardware. The results show that the task of synchronization can be achieved with comparable performance in both domains with an advantage of frequency domain processing over time domain processing in terms of efficiency in preamble design and complexity.
{"title":"About the use of different processing domains for synchronization in non-contiguous FBMC systems","authors":"Christoph Thein, Martin Fuhrwerk, J. Peissig","doi":"10.1109/PIMRC.2013.6666244","DOIUrl":"https://doi.org/10.1109/PIMRC.2013.6666244","url":null,"abstract":"The problem of synchronization in non-contiguous OFDM (NC-OFDM) in the presence of other in-band systems is addressed by means of a comparison between time-and frequency-based signal processing approaches. The filterbank multicarrier scheme with its spectral-efficient offset-QAM (OQAM) OFDM implementation is thereby a good choice for an NC-OFDM system design due to its well-localized spectral signal shape. In this work, we present and discuss two NC-OFDM synchronization methods for OQAM-OFDM, employing the time domain and the already demodulated frequency domain signal for synchronization and evaluate them in terms of sustainable bit-error rate over signal-to-interference ratio and variance of time and frequency offset estimation in different resource allocation scenarios. Additionally, their computational complexity is taken into account to estimate the costs of implementation on hardware. The results show that the task of synchronization can be achieved with comparable performance in both domains with an advantage of frequency domain processing over time domain processing in terms of efficiency in preamble design and complexity.","PeriodicalId":210993,"journal":{"name":"2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122685437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-11DOI: 10.1109/PIMRC.2013.6666649
S. Sagari, A. Baid, I. Seskar, T. Murase, M. Oguchi, D. Raychaudhuri
This paper presents a study of mobile wireless LAN (WLAN) hotspots which are used to provide cellular-WiFi tethering service to personal devices. A dense deployment scenario for fixed and mobile WLAN is described and potential performance problems due to interference are identified. An analytical model for coexisting fixed and mobile WLAN hotspots with heterogeneous traffic is presented. The model is used to evaluate the performance of a mobile WLAN as it transits through a set of densely deployed fixed access points (APs), and performance problems due to lack of frequency coordination are identified. An adaptive channel assignment (ACA) scheme for improving mobile AP performance is proposed and evaluated. It is shown that significant performance gains can be achieved with ACA with maximum absolute and percentage throughput gains up to 1.24 Mbps and 42.8% respectively. We also show that setting the scanning interval in ACA requires consideration of the speed at which the mobile WLAN is moving in order to compensate for the throughput losses during channel scanning.
{"title":"Performance evaluation of mobile hotspots in densely deployed WLAN environments","authors":"S. Sagari, A. Baid, I. Seskar, T. Murase, M. Oguchi, D. Raychaudhuri","doi":"10.1109/PIMRC.2013.6666649","DOIUrl":"https://doi.org/10.1109/PIMRC.2013.6666649","url":null,"abstract":"This paper presents a study of mobile wireless LAN (WLAN) hotspots which are used to provide cellular-WiFi tethering service to personal devices. A dense deployment scenario for fixed and mobile WLAN is described and potential performance problems due to interference are identified. An analytical model for coexisting fixed and mobile WLAN hotspots with heterogeneous traffic is presented. The model is used to evaluate the performance of a mobile WLAN as it transits through a set of densely deployed fixed access points (APs), and performance problems due to lack of frequency coordination are identified. An adaptive channel assignment (ACA) scheme for improving mobile AP performance is proposed and evaluated. It is shown that significant performance gains can be achieved with ACA with maximum absolute and percentage throughput gains up to 1.24 Mbps and 42.8% respectively. We also show that setting the scanning interval in ACA requires consideration of the speed at which the mobile WLAN is moving in order to compensate for the throughput losses during channel scanning.","PeriodicalId":210993,"journal":{"name":"2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-11DOI: 10.1109/PIMRC.2013.6666201
C. Tsinos, Evangelos Vlachos, K. Berberidis
In the present paper, we propose two novel algorithms which enable the relay cooperation for the distributed computation of the beamforming weights in a blind and adaptive manner, without the need to forward the data to a fusion center. In the first scheme, the beamforming vector is computed through minimization of the total transmit power subject to a receiver quality-of-service constraint (QoS). In the second scheme, the beamforming weights are obtained through maximization of the receiver signal-to-noise-ratio (SNR) subject to a total transmit power constraint. The proposed approaches distribute the computational overhead equally among the relay nodes and achieve close performance to the one of the optimal beamforming solutions. Note, that the aforementioned optimal solutions are derived assuming perfect channel state information at the relays' side. In order to verify the performance of the proposed approaches, indicative simulations were carried out for static and time-varying channels.
{"title":"Distributed blind adaptive computation of beamforming weights for relay networks","authors":"C. Tsinos, Evangelos Vlachos, K. Berberidis","doi":"10.1109/PIMRC.2013.6666201","DOIUrl":"https://doi.org/10.1109/PIMRC.2013.6666201","url":null,"abstract":"In the present paper, we propose two novel algorithms which enable the relay cooperation for the distributed computation of the beamforming weights in a blind and adaptive manner, without the need to forward the data to a fusion center. In the first scheme, the beamforming vector is computed through minimization of the total transmit power subject to a receiver quality-of-service constraint (QoS). In the second scheme, the beamforming weights are obtained through maximization of the receiver signal-to-noise-ratio (SNR) subject to a total transmit power constraint. The proposed approaches distribute the computational overhead equally among the relay nodes and achieve close performance to the one of the optimal beamforming solutions. Note, that the aforementioned optimal solutions are derived assuming perfect channel state information at the relays' side. In order to verify the performance of the proposed approaches, indicative simulations were carried out for static and time-varying channels.","PeriodicalId":210993,"journal":{"name":"2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127570324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-11DOI: 10.1109/PIMRC.2013.6666569
A. Raschellà, J. Pérez-Romero, O. Sallent, A. Umbert
Dynamic Spectrum Access, based on the Cognitive Radio (CR) paradigm, is a promising solution to improve the currently inefficient spectrum utilization. In this respect, this paper deals with the spectrum selection problem when a number of radio links has to be established in a CR network. A novel strategy based on a Partially Observable Markov Decision Process (POMDP) is proposed combining partial observations of the interference state together with a statistical characterization of the interference dynamics. In this context, the use of an efficient observation strategy is a key element to account for the trade-off between achieved performance and measurement requirements. For that purpose, the aim of the paper is to propose and evaluate different observation policies for the POMDP-based spectrum selection framework. Results show that the proposed framework is able to achieve very similar performance than a strategy operating under full knowledge of the interference state requiring much less associated signaling.
{"title":"On the impact of the observation strategy in a POMDP-based framework for spectrum selection","authors":"A. Raschellà, J. Pérez-Romero, O. Sallent, A. Umbert","doi":"10.1109/PIMRC.2013.6666569","DOIUrl":"https://doi.org/10.1109/PIMRC.2013.6666569","url":null,"abstract":"Dynamic Spectrum Access, based on the Cognitive Radio (CR) paradigm, is a promising solution to improve the currently inefficient spectrum utilization. In this respect, this paper deals with the spectrum selection problem when a number of radio links has to be established in a CR network. A novel strategy based on a Partially Observable Markov Decision Process (POMDP) is proposed combining partial observations of the interference state together with a statistical characterization of the interference dynamics. In this context, the use of an efficient observation strategy is a key element to account for the trade-off between achieved performance and measurement requirements. For that purpose, the aim of the paper is to propose and evaluate different observation policies for the POMDP-based spectrum selection framework. Results show that the proposed framework is able to achieve very similar performance than a strategy operating under full knowledge of the interference state requiring much less associated signaling.","PeriodicalId":210993,"journal":{"name":"2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127855039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-11DOI: 10.1109/PIMRC.2013.6666386
C. Sum, F. Kojima, H. Harada
This paper presents the performance analysis of an IEEE 802.15.4g multi-hop orthogonal frequency division multiplexing (OFDM) system in a network with multiple physical (PHY) layer design. Identified usage models for the IEEE 802.15.4g standard are low energy wireless sensor network and smart grid/utility network applications. For that, a total of three PHY layer designs under a unified medium access control (MAC) are specified to address different market segments. The multi-PHY layer architecture has an advantage of covering a wide range of pervasive use case scenarios, at the expense of inter-PHY interference (IPI) among respective PHY layers. This paper focuses on the OFDM PHY that promises high data rate and superior propagation performance. To enable optimized operation in the targeted applications, a multi-hop MAC layer design is specified to extend the operating range of the network, while low energy features are designed to increase energy efficiency of the system. Additionally, an IPI mitigation technique is also developed to combat IPI generated from the interfering network. As a result, it is found that the average throughput of a multi-hop OFDM network is 8% lower than that of a single-hop OFDM network, but with larger achievable operating range. Secondly, with the proposed IPI mitigation technique, no degradation among devices with different PHY layer designs is observed to take place. Thirdly, with the energy-efficient non-beacon-enabled mode, devices are consuming less power, at the expense of immunity reduction against interferer.
{"title":"Performance analysis of a multi-hop IEEE 802.15.4g OFDM system in multi-PHY layer network","authors":"C. Sum, F. Kojima, H. Harada","doi":"10.1109/PIMRC.2013.6666386","DOIUrl":"https://doi.org/10.1109/PIMRC.2013.6666386","url":null,"abstract":"This paper presents the performance analysis of an IEEE 802.15.4g multi-hop orthogonal frequency division multiplexing (OFDM) system in a network with multiple physical (PHY) layer design. Identified usage models for the IEEE 802.15.4g standard are low energy wireless sensor network and smart grid/utility network applications. For that, a total of three PHY layer designs under a unified medium access control (MAC) are specified to address different market segments. The multi-PHY layer architecture has an advantage of covering a wide range of pervasive use case scenarios, at the expense of inter-PHY interference (IPI) among respective PHY layers. This paper focuses on the OFDM PHY that promises high data rate and superior propagation performance. To enable optimized operation in the targeted applications, a multi-hop MAC layer design is specified to extend the operating range of the network, while low energy features are designed to increase energy efficiency of the system. Additionally, an IPI mitigation technique is also developed to combat IPI generated from the interfering network. As a result, it is found that the average throughput of a multi-hop OFDM network is 8% lower than that of a single-hop OFDM network, but with larger achievable operating range. Secondly, with the proposed IPI mitigation technique, no degradation among devices with different PHY layer designs is observed to take place. Thirdly, with the energy-efficient non-beacon-enabled mode, devices are consuming less power, at the expense of immunity reduction against interferer.","PeriodicalId":210993,"journal":{"name":"2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124445992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-11DOI: 10.1109/PIMRC.2013.6666117
Tien-Thinh Nguyen, C. Bonnet, Jérôme Härri
It is widely acknowledged that the key limitation to a raising market deployment of Electric Vehicles (EV) is correlated to the anxiety related to electric vehicle charging services (EVCS). From a user perspective, the electricity service should provide widely available and easily reachable charging stations with transparent payment options. From electricity operator perspective, charging vehicles should be well scheduled in time and space to avoid sudden burst of requests. Such EVCS should be conducted before reaching a charging station as well as ubiquitous and transparent to the mobility of EVs. An efficient heterogeneous communication system is then required. The centralized nature of the EVCS makes a network-based IP mobility such as PMIPv6 a good choice, first to make heterogeneous technologies transparent to the EVCS, but also hides the mobility of the EVs to the service. In this paper, we first present the mapping between the charging type and use cases of the EVCS. We then describe the required extensions to PMIPv6 to be integrated to the EVCS, and finally via a near-to-real testbed show that the EVCS satisfies the data delivery time required by the IEEE 1646.
{"title":"Proxy mobile IPv6 for electric vehicle charging service: Use cases and analysis","authors":"Tien-Thinh Nguyen, C. Bonnet, Jérôme Härri","doi":"10.1109/PIMRC.2013.6666117","DOIUrl":"https://doi.org/10.1109/PIMRC.2013.6666117","url":null,"abstract":"It is widely acknowledged that the key limitation to a raising market deployment of Electric Vehicles (EV) is correlated to the anxiety related to electric vehicle charging services (EVCS). From a user perspective, the electricity service should provide widely available and easily reachable charging stations with transparent payment options. From electricity operator perspective, charging vehicles should be well scheduled in time and space to avoid sudden burst of requests. Such EVCS should be conducted before reaching a charging station as well as ubiquitous and transparent to the mobility of EVs. An efficient heterogeneous communication system is then required. The centralized nature of the EVCS makes a network-based IP mobility such as PMIPv6 a good choice, first to make heterogeneous technologies transparent to the EVCS, but also hides the mobility of the EVs to the service. In this paper, we first present the mapping between the charging type and use cases of the EVCS. We then describe the required extensions to PMIPv6 to be integrated to the EVCS, and finally via a near-to-real testbed show that the EVCS satisfies the data delivery time required by the IEEE 1646.","PeriodicalId":210993,"journal":{"name":"2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121162350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-11DOI: 10.1109/PIMRC.2013.6666670
Xiang Xu, G. Kutrolli, R. Mathar
In this work, a downlink power control scheme based on channel quality indicator (CQI) is proposed for LTE femtocells. Unlike the conventional methods, this scheme takes the service types of users into account. Without making strong assumptions, such as full knowledge of the network or perfect coordination among basestations, a completely decentralized solution is provided. Simulation results confirm, that comparing to the conventional schemes, better throughput and coverage can be achieved simultaneously by the proposed algorithm.
{"title":"Autonomous downlink power control for LTE femtocells based on channel quality indicator","authors":"Xiang Xu, G. Kutrolli, R. Mathar","doi":"10.1109/PIMRC.2013.6666670","DOIUrl":"https://doi.org/10.1109/PIMRC.2013.6666670","url":null,"abstract":"In this work, a downlink power control scheme based on channel quality indicator (CQI) is proposed for LTE femtocells. Unlike the conventional methods, this scheme takes the service types of users into account. Without making strong assumptions, such as full knowledge of the network or perfect coordination among basestations, a completely decentralized solution is provided. Simulation results confirm, that comparing to the conventional schemes, better throughput and coverage can be achieved simultaneously by the proposed algorithm.","PeriodicalId":210993,"journal":{"name":"2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121652024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}