Pub Date : 2021-07-28DOI: 10.1109/ICCCWorkshops52231.2021.9538893
Xu He, Zhongzheng Ning, Siyuan Liang, Jianbo Du, Ting Nie
Energy consumption has become the research focus of large-scale wireless sensor networks, so it is very important to design an efficient and energy-saving routing protocol. In order to reduce the energy consumption of nodes in the wireless sensor network and extend the life cycle of the network, a energy-balanced clustering routing protocol was proposed. On the basis of sine cosine algorithm, the differential evolution algorithm and adaptive inertia weight are embedded to enhance the convergence accuracy of the algorithm, and the fitness function is constructed by the distance between nodes, between nodes and the base station, and the remaining energy of nodes. The improved sine cosine algorithm is used to select the optimal cluster head. At the same time, a selective multi-hop transmission mechanism of cluster head nodes is designed in the data transmission stage between clusters. Simulation results show that, compared with the Low Energy Adaptive Clustering Hierarchy protocol, the proposed protocol can prolong the stability cycle and life cycle of the network by 61.22% and 19.08%, respectively.
{"title":"Energy Balanced Clustering Routing Protocol for Wireless Sensor Networks","authors":"Xu He, Zhongzheng Ning, Siyuan Liang, Jianbo Du, Ting Nie","doi":"10.1109/ICCCWorkshops52231.2021.9538893","DOIUrl":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538893","url":null,"abstract":"Energy consumption has become the research focus of large-scale wireless sensor networks, so it is very important to design an efficient and energy-saving routing protocol. In order to reduce the energy consumption of nodes in the wireless sensor network and extend the life cycle of the network, a energy-balanced clustering routing protocol was proposed. On the basis of sine cosine algorithm, the differential evolution algorithm and adaptive inertia weight are embedded to enhance the convergence accuracy of the algorithm, and the fitness function is constructed by the distance between nodes, between nodes and the base station, and the remaining energy of nodes. The improved sine cosine algorithm is used to select the optimal cluster head. At the same time, a selective multi-hop transmission mechanism of cluster head nodes is designed in the data transmission stage between clusters. Simulation results show that, compared with the Low Energy Adaptive Clustering Hierarchy protocol, the proposed protocol can prolong the stability cycle and life cycle of the network by 61.22% and 19.08%, respectively.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/ICCCWorkshops52231.2021.9538876
N. Wu, Yikun Zhang, Yunsi Ma, Bin Li, W. Yuan
In this paper, we develop an iterative message passing receiver based on factor graph for orthogonal time frequency space (OTFS) systems over doubly selective channels. By factorizing the joint probability of the data symbols and the received signals, we construct a loop-free factor graph with vector-valued nodes. Then, vector approximate message passing (VAMP) is employed to derive message updating expressions of variables on factor graph. To improve the accuracy of symbol detection, we vectorize the scalar variance terms of VAMP. Based on the singular value decomposition of block circulant channel matrix of OTFS system, we introduce the average approximation to circumvent the matrix inversion operation and then develop a low-complexity VAMP-based algorithm. Simulation results demonstrate the effectiveness of the proposed algorithms, which outperform the existing minimum mean square error algorithm and the message passing algorithm in terms of bit error rate (BER) performance.
{"title":"Vector Approximate Message Passing Based Iterative Receiver for OTFS System","authors":"N. Wu, Yikun Zhang, Yunsi Ma, Bin Li, W. Yuan","doi":"10.1109/ICCCWorkshops52231.2021.9538876","DOIUrl":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538876","url":null,"abstract":"In this paper, we develop an iterative message passing receiver based on factor graph for orthogonal time frequency space (OTFS) systems over doubly selective channels. By factorizing the joint probability of the data symbols and the received signals, we construct a loop-free factor graph with vector-valued nodes. Then, vector approximate message passing (VAMP) is employed to derive message updating expressions of variables on factor graph. To improve the accuracy of symbol detection, we vectorize the scalar variance terms of VAMP. Based on the singular value decomposition of block circulant channel matrix of OTFS system, we introduce the average approximation to circumvent the matrix inversion operation and then develop a low-complexity VAMP-based algorithm. Simulation results demonstrate the effectiveness of the proposed algorithms, which outperform the existing minimum mean square error algorithm and the message passing algorithm in terms of bit error rate (BER) performance.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116769394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/ICCCWorkshops52231.2021.9538873
Yi Zhou, Qunfei Zhang, Zhenhua Yan, Chengbing He
The underwater acoustic network (UAN) without defensive support is unreliable in an increasingly competitive marine environment. In this paper, a hierarchical defense algorithm that applies multi-armed bandit (MAB) learning is presented to combat the intelligent mobile attackers and protect the underwater relay transmissions. Specifically, the identities of the significant nodes of a network are changed periodically to hide the critical routing paths. The learning-based communication system can achieve stable links through the optimal spoofing scheme that is to mislead the attackers sensitive to the environmental feedback, and then alleviate the potential threat from invaders. Simulation results verify that the proposed defense strategy can fast reduce the outage probability of the protected objects and prolong the lifetime of underwater networks.
{"title":"MAB-Learning-Based Hierarchical Defense for Secure Underwater Acoustic Networks","authors":"Yi Zhou, Qunfei Zhang, Zhenhua Yan, Chengbing He","doi":"10.1109/ICCCWorkshops52231.2021.9538873","DOIUrl":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538873","url":null,"abstract":"The underwater acoustic network (UAN) without defensive support is unreliable in an increasingly competitive marine environment. In this paper, a hierarchical defense algorithm that applies multi-armed bandit (MAB) learning is presented to combat the intelligent mobile attackers and protect the underwater relay transmissions. Specifically, the identities of the significant nodes of a network are changed periodically to hide the critical routing paths. The learning-based communication system can achieve stable links through the optimal spoofing scheme that is to mislead the attackers sensitive to the environmental feedback, and then alleviate the potential threat from invaders. Simulation results verify that the proposed defense strategy can fast reduce the outage probability of the protected objects and prolong the lifetime of underwater networks.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"13 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132853715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/ICCCWorkshops52231.2021.9538892
Jun He, Junqiang Wu, Zhu Peng, Fangjiong Chen, Hua Yu, Fei Ji
Underwater wireless communication technology plays a key role in underwater applications such as environmental monitoring and tsunami early warning. This paper proposes an underwater optical-acoustic cooperative communication system, which applies optical communication to transmit large-scale data, and applies acoustic communication to provide acoustic-assisted signaling exchange before optical transmission and Automatic Repeat request (ARQ) during optical transmission. In particular, we design and develop an underwater Remote-Operated Vehicle (ROV) equipped with LED based optical communication and acoustic communication modems. The acoustic link is for remote control of the ROV in far distance. When the ROV is close enough, the optical link with 2Mbps can be triggered at a distance of around 10 meters. During optical data transmission, the acoustic link is applied to ack the lost data packets in the optical data transmission.
{"title":"Underwater Error-Free Data Transmission Based on Optical-Acoustic Cooperative Communication","authors":"Jun He, Junqiang Wu, Zhu Peng, Fangjiong Chen, Hua Yu, Fei Ji","doi":"10.1109/ICCCWorkshops52231.2021.9538892","DOIUrl":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538892","url":null,"abstract":"Underwater wireless communication technology plays a key role in underwater applications such as environmental monitoring and tsunami early warning. This paper proposes an underwater optical-acoustic cooperative communication system, which applies optical communication to transmit large-scale data, and applies acoustic communication to provide acoustic-assisted signaling exchange before optical transmission and Automatic Repeat request (ARQ) during optical transmission. In particular, we design and develop an underwater Remote-Operated Vehicle (ROV) equipped with LED based optical communication and acoustic communication modems. The acoustic link is for remote control of the ROV in far distance. When the ROV is close enough, the optical link with 2Mbps can be triggered at a distance of around 10 meters. During optical data transmission, the acoustic link is applied to ack the lost data packets in the optical data transmission.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129490650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/ICCCWorkshops52231.2021.9538889
Wenhui Wang, Xiaoyan Duan, Wanfei Sun, Ming Ai
Intelligent mobility management and service control based on UE mobility prediction is one hot topic in current AI-assisted 5G/B5G research, which can also be applied to vertical industries communication. We analyzed the standard progress in 3GPP and IMT-2020 on AI based mobility prediction, as well as the challenges and possible solutions. We selected three different models, which are Long Short-Term Memory (LSTM) model, Attention Bidirectional Long Short-Term Memory (BiLSTM-attention) model and Artificial Neural Network (ANN) model for AI based mobility prediction, using the data from Geolife project of Microsoft Research Asia as input. By model retraining and optimization, we achieved higher accuracies of trajectory prediction (around 90%) with shorter training time. In addition, we presented examples of applying UE mobility prediction in various verticals, for which our optimized models may be applied.
{"title":"Research on mobility prediction in 5G and beyond for vertical industries","authors":"Wenhui Wang, Xiaoyan Duan, Wanfei Sun, Ming Ai","doi":"10.1109/ICCCWorkshops52231.2021.9538889","DOIUrl":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538889","url":null,"abstract":"Intelligent mobility management and service control based on UE mobility prediction is one hot topic in current AI-assisted 5G/B5G research, which can also be applied to vertical industries communication. We analyzed the standard progress in 3GPP and IMT-2020 on AI based mobility prediction, as well as the challenges and possible solutions. We selected three different models, which are Long Short-Term Memory (LSTM) model, Attention Bidirectional Long Short-Term Memory (BiLSTM-attention) model and Artificial Neural Network (ANN) model for AI based mobility prediction, using the data from Geolife project of Microsoft Research Asia as input. By model retraining and optimization, we achieved higher accuracies of trajectory prediction (around 90%) with shorter training time. In addition, we presented examples of applying UE mobility prediction in various verticals, for which our optimized models may be applied.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130962400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/ICCCWorkshops52231.2021.9538851
Yao Liu, Luyu Li, Rong Fan, Suya Ma, Xuan Liu, Yishan Su
Due to broadcast nature of acoustic signal, underwater acoustic sensor networks face security challenge. In the paper, we propose a physical layer security transmission scheme with cooperative jamming. The proposed scheme takes advantage of the long propagation delay of the underwater acoustic channel to interfere with eavesdropper without affecting the reception of intended users. The results of both simulation and field experiment show that the proposed mechanism can improve the secrecy capacity of the network and effectively jam eavesdropper.
{"title":"A Physical Layer Security Mechanism based on Cooperative Jamming in Underwater Acoustic Sensor Networks","authors":"Yao Liu, Luyu Li, Rong Fan, Suya Ma, Xuan Liu, Yishan Su","doi":"10.1109/ICCCWorkshops52231.2021.9538851","DOIUrl":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538851","url":null,"abstract":"Due to broadcast nature of acoustic signal, underwater acoustic sensor networks face security challenge. In the paper, we propose a physical layer security transmission scheme with cooperative jamming. The proposed scheme takes advantage of the long propagation delay of the underwater acoustic channel to interfere with eavesdropper without affecting the reception of intended users. The results of both simulation and field experiment show that the proposed mechanism can improve the secrecy capacity of the network and effectively jam eavesdropper.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127193707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/ICCCWorkshops52231.2021.9538871
Tuanwei Tian, Hao Deng, Jianhua Lu, Xianxiang Yu, Xianyuan Wang
This paper investigates the dual-function realization problem for the integrated radar-sensing and communications (IRSC) system. The freedom degrees of design are the transmit and receive beamformers. Firstly, the design problem is formulated as a sensing signal-to-noise ratio (SNR) maximization problem with the constraint of sidelobe level (SLL). Secondly, the formulated non-convex problem is solved through a sequential optimization algorithm that jointly optimizes the transmit and receive beamformers. Finally, simulation results are given to demonstrate the effectiveness of the proposed algorithm and its superiority over the existing algorithm in terms of the symbol error rate performance.
{"title":"Simultaneous Radar Sensing and Communication Enabled by Joint Transmit-Receive Beamforming","authors":"Tuanwei Tian, Hao Deng, Jianhua Lu, Xianxiang Yu, Xianyuan Wang","doi":"10.1109/ICCCWorkshops52231.2021.9538871","DOIUrl":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538871","url":null,"abstract":"This paper investigates the dual-function realization problem for the integrated radar-sensing and communications (IRSC) system. The freedom degrees of design are the transmit and receive beamformers. Firstly, the design problem is formulated as a sensing signal-to-noise ratio (SNR) maximization problem with the constraint of sidelobe level (SLL). Secondly, the formulated non-convex problem is solved through a sequential optimization algorithm that jointly optimizes the transmit and receive beamformers. Finally, simulation results are given to demonstrate the effectiveness of the proposed algorithm and its superiority over the existing algorithm in terms of the symbol error rate performance.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126398983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marine biosphere monitoring is one of the crucial links to the understanding and protection of the marine environment. Moreover, underwater images play an important role in marine biosphere monitoring. Since the capture and transmission conditions are extremely poor in complicated underwater environments, images will suffer typical types of distortions significantly. Pre-evaluation of the image quality to facilitate subsequent processing becomes particularly important. Traditional Image Quality Assessment (IQA) methods are normally developed based on perceptual quality. Nevertheless, images are captured for understanding and analysis to achieve the purpose of intelligent monitoring. There are barriers between traditional IQA and IQA in marine biosphere monitoring. To address this issue, this paper focused on the fish detection task which is a vital task in marine biosphere monitoring. An Underwater Image quality database for Fish Detection (UIFD) is proposed based on the characteristics of the underwater environment. This database can be utilized as a benchmark to develop and evaluate underwater IQA. In addition, it can also be used to provide guidance for improving the performance of underwater fish detection algorithms.
{"title":"Underwater Image Quality Database Towards Fish Detection","authors":"Rongfu Lin, Tiesong Zhao, Weiling Chen, Yannan Zheng, Hongan Wei","doi":"10.1109/ICCCWorkshops52231.2021.9538855","DOIUrl":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538855","url":null,"abstract":"Marine biosphere monitoring is one of the crucial links to the understanding and protection of the marine environment. Moreover, underwater images play an important role in marine biosphere monitoring. Since the capture and transmission conditions are extremely poor in complicated underwater environments, images will suffer typical types of distortions significantly. Pre-evaluation of the image quality to facilitate subsequent processing becomes particularly important. Traditional Image Quality Assessment (IQA) methods are normally developed based on perceptual quality. Nevertheless, images are captured for understanding and analysis to achieve the purpose of intelligent monitoring. There are barriers between traditional IQA and IQA in marine biosphere monitoring. To address this issue, this paper focused on the fish detection task which is a vital task in marine biosphere monitoring. An Underwater Image quality database for Fish Detection (UIFD) is proposed based on the characteristics of the underwater environment. This database can be utilized as a benchmark to develop and evaluate underwater IQA. In addition, it can also be used to provide guidance for improving the performance of underwater fish detection algorithms.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129467907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/ICCCWorkshops52231.2021.9538903
Xinyi Wang, Zesong Fei, Jingxuan Huang, Peng Liu
Integrated sensing and communications (ISAC) technique has been viewed as a promising paradigm for vehicular networks, where various kinds of services are required for different vehicles, which can be achieved with the physical-layer service integration (PHY-SI) technique. In this paper, we investigate the integration of ISAC and PHY-SI techniques in a vehicle-to-infrastructure (V2I) system, where the ISAC base station simultaneously provides integrated public and confidential services for vehicles and performs beam tracking based on the echo signals. Specifically, we aim at maximizing the minimum echo signal SNR from the directions of vehicles under the constraints of public message rate and confidential message secrecy rate for the vehicle with higher security level. The successive convex approximation (SCA) technique is utilized to convert the formulated problems into a series of convex problems and iteratively solve them. Numerical results demonstrate that the echo signal SNR can be improved effectively via the proposed algorithm, while satisfying the communication performance requirements.
{"title":"Transmitter Design for Integrated Sensing and Communication Systems with Integrated Services","authors":"Xinyi Wang, Zesong Fei, Jingxuan Huang, Peng Liu","doi":"10.1109/ICCCWorkshops52231.2021.9538903","DOIUrl":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538903","url":null,"abstract":"Integrated sensing and communications (ISAC) technique has been viewed as a promising paradigm for vehicular networks, where various kinds of services are required for different vehicles, which can be achieved with the physical-layer service integration (PHY-SI) technique. In this paper, we investigate the integration of ISAC and PHY-SI techniques in a vehicle-to-infrastructure (V2I) system, where the ISAC base station simultaneously provides integrated public and confidential services for vehicles and performs beam tracking based on the echo signals. Specifically, we aim at maximizing the minimum echo signal SNR from the directions of vehicles under the constraints of public message rate and confidential message secrecy rate for the vehicle with higher security level. The successive convex approximation (SCA) technique is utilized to convert the formulated problems into a series of convex problems and iteratively solve them. Numerical results demonstrate that the echo signal SNR can be improved effectively via the proposed algorithm, while satisfying the communication performance requirements.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/ICCCWorkshops52231.2021.9538925
Weijie Xu, Zhisong Zuo, Chuanfeng He, Rongyi Hu, Shengjiang Cui, Shuai Shao, Zhi Zhang, Ning Yang
In this paper, we firstly present some vertical use cases that have their specific services requirements which cannot be fulfilled with the existing IoT (Internet Of Things) technologies. Then a novel IoT system supporting zero-power terminals is proposed for 3GPP (3rd Generation Partnership Project) to cover these untouched vertical use cases. The IoT system uses back-scattering and RF (Radio Frequency) power harvesting thus the terminal has distinguished merits of ultra-low complexity, ultra-low cost, small size and battery-less. It can well match the requirements of the identified use cases. However, such a IOT system faces great challenges on the aspects such as services coverage, system efficiency, security management and access procedure etc. Finally, we give an overview of the possibilities to resolve these issues via developing a cellular IoT network and using 3GPP expertise.
{"title":"Opportunities, challenges and feasibilities of Zero-Power IoT in 5G advanced","authors":"Weijie Xu, Zhisong Zuo, Chuanfeng He, Rongyi Hu, Shengjiang Cui, Shuai Shao, Zhi Zhang, Ning Yang","doi":"10.1109/ICCCWorkshops52231.2021.9538925","DOIUrl":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538925","url":null,"abstract":"In this paper, we firstly present some vertical use cases that have their specific services requirements which cannot be fulfilled with the existing IoT (Internet Of Things) technologies. Then a novel IoT system supporting zero-power terminals is proposed for 3GPP (3rd Generation Partnership Project) to cover these untouched vertical use cases. The IoT system uses back-scattering and RF (Radio Frequency) power harvesting thus the terminal has distinguished merits of ultra-low complexity, ultra-low cost, small size and battery-less. It can well match the requirements of the identified use cases. However, such a IOT system faces great challenges on the aspects such as services coverage, system efficiency, security management and access procedure etc. Finally, we give an overview of the possibilities to resolve these issues via developing a cellular IoT network and using 3GPP expertise.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}