首页 > 最新文献

IEEE Open Journal of the Communications Society最新文献

英文 中文
A Novel Approach for Differential Privacy-Preserving Federated Learning 差分隐私保护联邦学习的一种新方法
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-12-23 DOI: 10.1109/OJCOMS.2024.3521651
Anis Elgabli;Wessam Mesbah
In this paper, we start with a comprehensive evaluation of the effect of adding differential privacy (DP) to federated learning (FL) approaches, focusing on methodologies employing global (stochastic) gradient descent (SGD/GD), and local SGD/GD techniques. These global and local techniques are commonly referred to as FedSGD/FedGD and FedAvg, respectively. Our analysis reveals that, as far as only one local iteration is performed by each client before transmitting to the parameter server (PS) for FedGD, both FedGD and FedAvg achieve the same accuracy/loss for the same privacy guarantees, despite requiring different perturbation noise power. Furthermore, we propose a novel DP mechanism, which is shown to ensure privacy without compromising performance. In particular, we propose the sharing of a random seed (or a specified sequence of random seeds) among collaborative clients, where each client uses this seed to introduces perturbations to its updates prior to transmission to the PS. Importantly, due to the random seed sharing, clients possess the capability to negate the noise effects and recover their original global model. This mechanism preserves privacy both at a “curious” PS or at external eavesdroppers without compromising the performance of the final model at each client, thus mitigating the risk of inversion attacks aimed at retrieving (partially or fully) the clients’ data. Furthermore, the importance and effect of clipping in the practical implementation of DP mechanisms, in order to upper bound the perturbation noise, is discussed. Moreover, owing to the ability to cancel noise at individual clients, our proposed approach enables the introduction of arbitrarily high perturbation levels, and hence, clipping can be totally avoided, resulting in the same performance of noise-free standard FL approaches.
在本文中,我们首先全面评估了将差分隐私(DP)添加到联邦学习(FL)方法中的效果,重点介绍了采用全局(随机)梯度下降(SGD/GD)和局部SGD/GD技术的方法。这些全局和局部技术通常分别称为FedSGD/FedGD和fedag。我们的分析表明,只要每个客户端在将FedGD发送到参数服务器(PS)之前只执行一次本地迭代,FedGD和FedAvg都可以在相同的隐私保证下获得相同的精度/损失,尽管需要不同的扰动噪声功率。此外,我们提出了一种新的DP机制,该机制在不影响性能的情况下确保隐私。特别是,我们建议在协作客户端之间共享随机种子(或指定的随机种子序列),其中每个客户端在传输到PS之前使用该种子向其更新引入扰动。重要的是,由于随机种子共享,客户端具有消除噪声影响并恢复其原始全局模型的能力。这种机制在“好奇的”PS或外部窃听者面前保护隐私,而不会损害每个客户端的最终模型的性能,从而降低了旨在检索(部分或全部)客户端数据的反转攻击的风险。此外,还讨论了裁剪在实际实现中的重要性和作用,以达到扰动噪声的上界。此外,由于能够消除单个客户端的噪声,我们提出的方法可以引入任意高扰动水平,因此可以完全避免裁剪,从而获得与无噪声标准FL方法相同的性能。
{"title":"A Novel Approach for Differential Privacy-Preserving Federated Learning","authors":"Anis Elgabli;Wessam Mesbah","doi":"10.1109/OJCOMS.2024.3521651","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3521651","url":null,"abstract":"In this paper, we start with a comprehensive evaluation of the effect of adding differential privacy (DP) to federated learning (FL) approaches, focusing on methodologies employing global (stochastic) gradient descent (SGD/GD), and local SGD/GD techniques. These global and local techniques are commonly referred to as FedSGD/FedGD and FedAvg, respectively. Our analysis reveals that, as far as only one local iteration is performed by each client before transmitting to the parameter server (PS) for FedGD, both FedGD and FedAvg achieve the same accuracy/loss for the same privacy guarantees, despite requiring different perturbation noise power. Furthermore, we propose a novel DP mechanism, which is shown to ensure privacy without compromising performance. In particular, we propose the sharing of a random seed (or a specified sequence of random seeds) among collaborative clients, where each client uses this seed to introduces perturbations to its updates prior to transmission to the PS. Importantly, due to the random seed sharing, clients possess the capability to negate the noise effects and recover their original global model. This mechanism preserves privacy both at a “curious” PS or at external eavesdroppers without compromising the performance of the final model at each client, thus mitigating the risk of inversion attacks aimed at retrieving (partially or fully) the clients’ data. Furthermore, the importance and effect of clipping in the practical implementation of DP mechanisms, in order to upper bound the perturbation noise, is discussed. Moreover, owing to the ability to cancel noise at individual clients, our proposed approach enables the introduction of arbitrarily high perturbation levels, and hence, clipping can be totally avoided, resulting in the same performance of noise-free standard FL approaches.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"466-476"},"PeriodicalIF":6.3,"publicationDate":"2024-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10812948","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DP With Auxiliary Information: Gaussian Mechanism Versus Laplacian Mechanism 辅助信息下的DP:高斯机制与拉普拉斯机制
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-12-23 DOI: 10.1109/OJCOMS.2024.3521940
Wessam Mesbah
Differential privacy (DP) has been widely used in communication systems, especially those using federated learning or distributed computing. DP comes in the data preparation stage before line coding and transmission. In contrast to the literature where differential privacy is mainly discussed from the point of view of data/computer science, in this paper we approach DP from a perspective that provides a better understanding to the communications engineering community. From this perspective, we show the contrast between the MAP detection problem in communications and the DP problem. In this paper, we consider two DP mechanisms, namely, the Gaussian Mechanism (GM) and the Laplacian Mechanism (LM). We explain why the definition of $epsilon$ -DP is associated with the LM, while we must resort to the definition of ( $epsilon, delta$ )-DP if the GM is used. Furthermore, we derive a new lower bound on the perturbation noise required for the GM to guarantee ( $epsilon, delta$ )-DP. Although no closed form is obtained for the new lower bound, a very simple one dimensional search algorithm can be used to achieve the lowest possible noise variance. Since the perturbation noise is known to negatively affect the performance of the data analysis (such as the convergence in federated learning), the new lower bound on the perturbation noise is expected to improve the performance over the classical GM. Moreover, we derive the perturbation noise required for both the LM and the GM in case of the adversary having auxiliary information in the form of the prior probabilities of the different databases. We show that the availability of auxiliary information at the adversary, is equivalent to reducing the tolerable privacy leakage, and hence it requires more perturbation noise. Finally, we analytically derive the border between the region where GM is better to use and the region where LM is better to use.
差分隐私(DP)在通信系统中得到了广泛的应用,特别是在使用联邦学习和分布式计算的通信系统中。DP是在线路编码和传输之前的数据准备阶段。与主要从数据/计算机科学的角度讨论差异隐私的文献相反,在本文中,我们从一个为通信工程界提供更好理解的角度来处理DP。从这个角度来看,我们展示了通信中的MAP检测问题和DP问题之间的对比。本文考虑了两种DP机制,即高斯机制(GM)和拉普拉斯机制(LM)。我们解释了为什么$epsilon$ -DP的定义与LM相关联,而如果使用GM,我们必须求助于($epsilon, delta$)-DP的定义。此外,我们导出了GM保证($epsilon, delta$)-DP所需的摄动噪声的新下界。虽然没有得到新的下界的封闭形式,但可以使用一种非常简单的一维搜索算法来实现尽可能低的噪声方差。由于已知扰动噪声会对数据分析的性能产生负面影响(例如联邦学习中的收敛性),因此预计扰动噪声的新下界将提高经典GM的性能。此外,我们推导了LM和GM在对手具有不同数据库的先验概率形式的辅助信息的情况下所需的扰动噪声。我们表明,对手的辅助信息的可用性,相当于减少可容忍的隐私泄漏,因此它需要更多的扰动噪声。最后,我们解析地推导出GM更适合使用的区域和LM更适合使用的区域之间的边界。
{"title":"DP With Auxiliary Information: Gaussian Mechanism Versus Laplacian Mechanism","authors":"Wessam Mesbah","doi":"10.1109/OJCOMS.2024.3521940","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3521940","url":null,"abstract":"Differential privacy (DP) has been widely used in communication systems, especially those using federated learning or distributed computing. DP comes in the data preparation stage before line coding and transmission. In contrast to the literature where differential privacy is mainly discussed from the point of view of data/computer science, in this paper we approach DP from a perspective that provides a better understanding to the communications engineering community. From this perspective, we show the contrast between the MAP detection problem in communications and the DP problem. In this paper, we consider two DP mechanisms, namely, the Gaussian Mechanism (GM) and the Laplacian Mechanism (LM). We explain why the definition of \u0000<inline-formula> <tex-math>$epsilon$ </tex-math></inline-formula>\u0000-DP is associated with the LM, while we must resort to the definition of (\u0000<inline-formula> <tex-math>$epsilon, delta$ </tex-math></inline-formula>\u0000)-DP if the GM is used. Furthermore, we derive a new lower bound on the perturbation noise required for the GM to guarantee (\u0000<inline-formula> <tex-math>$epsilon, delta$ </tex-math></inline-formula>\u0000)-DP. Although no closed form is obtained for the new lower bound, a very simple one dimensional search algorithm can be used to achieve the lowest possible noise variance. Since the perturbation noise is known to negatively affect the performance of the data analysis (such as the convergence in federated learning), the new lower bound on the perturbation noise is expected to improve the performance over the classical GM. Moreover, we derive the perturbation noise required for both the LM and the GM in case of the adversary having auxiliary information in the form of the prior probabilities of the different databases. We show that the availability of auxiliary information at the adversary, is equivalent to reducing the tolerable privacy leakage, and hence it requires more perturbation noise. Finally, we analytically derive the border between the region where GM is better to use and the region where LM is better to use.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"143-153"},"PeriodicalIF":6.3,"publicationDate":"2024-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10813007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing and Generalizing Position-Velocity Tracking in Imperfect mmWave Systems Using a Low-Complexity Neural Network 利用低复杂度神经网络增强和推广非完美毫米波系统的位置-速度跟踪
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-12-23 DOI: 10.1109/OJCOMS.2024.3522189
Deeb Assad Tubail;Mohammed Zourob;Salama Ikki
This work aims to enhance and generalize the joint position-velocity tracking process in millimeter wave (mmWave) systems that suffer from hardware impairments (HWIs), all while considering computational complexity. Initially, we investigate the performance of two widely used traditional trackers: the extended Kalman filter (EKF) and the unscented Kalman filter (UKF). Through this investigation, we identify the strengths and limitations of these trackers. Besides, we evaluate the gap between traditional tracking performance and the theoretical optimum by deriving the Bayesian Cramér-Rao Bound (BCRB) as a benchmark. Our findings reveal a significant disparity between the performance of traditional trackers and the benchmark, with performance being influenced by noise characteristics, initial conditions, and the accuracy of prior knowledge about the transition model. To address these challenges, we propose a neural network (NN)-based approach to achieve accurate and generalized tracking without relying on prior knowledge of the transition model, initial conditions, or noise characteristics. Specifically, our method trains a NN that performs effectively under any noise conditions, without needing to recognize the transition model or initial state. To manage the computational demands of the training phase, we employ a low-complexity algorithm, the Extreme Learning Machine (ELM), which calculates weights and biases through closed-form solution, avoiding complex optimization processes. Finally, we validate the accuracy and generality of the ELM tracker through computer simulations, testing it under various scenarios, including Gaussian and non-Gaussian HWI distortions, as well as systems with known transition models and those involving uncharacterized inputs.
这项工作旨在增强和推广毫米波(mmWave)系统中受硬件损伤(hwi)影响的关节位置-速度跟踪过程,同时考虑计算复杂性。首先,我们研究了两种广泛使用的传统跟踪器:扩展卡尔曼滤波器(EKF)和无气味卡尔曼滤波器(UKF)的性能。通过这次调查,我们确定了这些跟踪器的优势和局限性。此外,我们通过推导贝叶斯cram - rao边界(BCRB)作为基准来评估传统跟踪性能与理论最优之间的差距。我们的研究结果表明,传统跟踪器的性能与基准之间存在显著差异,性能受到噪声特性、初始条件和先验知识的准确性的影响。为了解决这些挑战,我们提出了一种基于神经网络(NN)的方法来实现准确和广义的跟踪,而不依赖于过渡模型、初始条件或噪声特征的先验知识。具体来说,我们的方法训练了一个在任何噪声条件下都能有效执行的神经网络,而不需要识别过渡模型或初始状态。为了管理训练阶段的计算需求,我们采用了一种低复杂度的算法——极限学习机(ELM),它通过封闭形式的解来计算权重和偏差,避免了复杂的优化过程。最后,我们通过计算机模拟验证了ELM跟踪器的准确性和通用性,在各种场景下进行了测试,包括高斯和非高斯HWI扭曲,以及具有已知过渡模型和涉及非特征输入的系统。
{"title":"Enhancing and Generalizing Position-Velocity Tracking in Imperfect mmWave Systems Using a Low-Complexity Neural Network","authors":"Deeb Assad Tubail;Mohammed Zourob;Salama Ikki","doi":"10.1109/OJCOMS.2024.3522189","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3522189","url":null,"abstract":"This work aims to enhance and generalize the joint position-velocity tracking process in millimeter wave (mmWave) systems that suffer from hardware impairments (HWIs), all while considering computational complexity. Initially, we investigate the performance of two widely used traditional trackers: the extended Kalman filter (EKF) and the unscented Kalman filter (UKF). Through this investigation, we identify the strengths and limitations of these trackers. Besides, we evaluate the gap between traditional tracking performance and the theoretical optimum by deriving the Bayesian Cramér-Rao Bound (BCRB) as a benchmark. Our findings reveal a significant disparity between the performance of traditional trackers and the benchmark, with performance being influenced by noise characteristics, initial conditions, and the accuracy of prior knowledge about the transition model. To address these challenges, we propose a neural network (NN)-based approach to achieve accurate and generalized tracking without relying on prior knowledge of the transition model, initial conditions, or noise characteristics. Specifically, our method trains a NN that performs effectively under any noise conditions, without needing to recognize the transition model or initial state. To manage the computational demands of the training phase, we employ a low-complexity algorithm, the Extreme Learning Machine (ELM), which calculates weights and biases through closed-form solution, avoiding complex optimization processes. Finally, we validate the accuracy and generality of the ELM tracker through computer simulations, testing it under various scenarios, including Gaussian and non-Gaussian HWI distortions, as well as systems with known transition models and those involving uncharacterized inputs.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"236-251"},"PeriodicalIF":6.3,"publicationDate":"2024-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10812951","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near-Field Analysis of Extremely Large-Scale MIMO: Power, Correlation, and User Selection 超大规模MIMO的近场分析:功率、相关性和用户选择
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-12-19 DOI: 10.1109/OJCOMS.2024.3520822
Xiangyu Cui;Ki-Hong Park;Mohamed Slim Alouini
With the fast development of communication technology, mobile networks have been evolving from the fifth generation (5G) to the sixth generation (6G). One of the most important technologies in 5G is massive multiple input multiple output (MIMO). In 6G, it has been extended to extremely large-scale MIMO (XL-MIMO) over the TeraHz band, which makes it easier for users to fall into the near-field communication range. However, the previous performance analysis based on the far-field assumption can be very inaccurate under the near-field scenario. Hence, it is necessary to use the near-field channel models to redo these analyses. In this work, we summarize previous analytical results on received signal-to-noise ratio for specific near-field wave models. Then, we derive the generalized formula for the received power of different wave models and antenna structures. We newly derive our closed-form formula for the correlation between different users by the stationary phase method. These results can be applied to different beam-forming schemes and the multipath case. Based on these analytical results, we manage to make a sum rate analysis for different antenna arrays and near-field channel models in a multi-user XL-MIMO system. Finally, with the modification by our analytical result, we show a dramatic speed-up of the previous user selection algorithm, while reaching the same sum rate.
随着通信技术的快速发展,移动网络已经从第五代(5G)向第六代(6G)演进。5G最重要的技术之一是大规模多输入多输出(MIMO)。在6G中,它已经扩展到太赫兹频段上的超大规模MIMO (XL-MIMO),这使得用户更容易陷入近场通信范围。然而,以往基于远场假设的性能分析在近场情况下可能非常不准确。因此,有必要使用近场信道模型来重新进行这些分析。在这项工作中,我们总结了以往对特定近场波模型的接收信噪比分析结果。然后,推导出不同波型和天线结构下接收功率的广义公式。本文用定相法推导出了不同用户间相关性的封闭公式。这些结果可以应用于不同的波束形成方案和多径情况。基于这些分析结果,我们对多用户xml - mimo系统中不同天线阵列和近场信道模型进行了和速率分析。最后,通过对我们的分析结果的修改,我们展示了之前的用户选择算法的显着加速,同时达到相同的求和速率。
{"title":"Near-Field Analysis of Extremely Large-Scale MIMO: Power, Correlation, and User Selection","authors":"Xiangyu Cui;Ki-Hong Park;Mohamed Slim Alouini","doi":"10.1109/OJCOMS.2024.3520822","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3520822","url":null,"abstract":"With the fast development of communication technology, mobile networks have been evolving from the fifth generation (5G) to the sixth generation (6G). One of the most important technologies in 5G is massive multiple input multiple output (MIMO). In 6G, it has been extended to extremely large-scale MIMO (XL-MIMO) over the TeraHz band, which makes it easier for users to fall into the near-field communication range. However, the previous performance analysis based on the far-field assumption can be very inaccurate under the near-field scenario. Hence, it is necessary to use the near-field channel models to redo these analyses. In this work, we summarize previous analytical results on received signal-to-noise ratio for specific near-field wave models. Then, we derive the generalized formula for the received power of different wave models and antenna structures. We newly derive our closed-form formula for the correlation between different users by the stationary phase method. These results can be applied to different beam-forming schemes and the multipath case. Based on these analytical results, we manage to make a sum rate analysis for different antenna arrays and near-field channel models in a multi-user XL-MIMO system. Finally, with the modification by our analytical result, we show a dramatic speed-up of the previous user selection algorithm, while reaching the same sum rate.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"252-270"},"PeriodicalIF":6.3,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10810362","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Service Level Agreement-Differentiated Protection in C+L Multiband Optical Networks 在C+L多带光网络中实现业务水平协议差分保护
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-12-19 DOI: 10.1109/OJCOMS.2024.3520234
Soheil Hosseini;Ignacio De Miguel;Noemí Merayo;Óscar González De Dios;Rubén M. Lorenzo;Ramón J. Durán Barroso
Band division multiplexing (BDM) is a promising technology to upgrade the capacity of elastic optical networks (EON). By using both C and L bands instead of just the C-band, networks can support a larger number of connections. This paper presents and analyzes a set of novel strategies to ensure resiliency in multiband optical networks leveraging the unique characteristics of these networks and their amplifiers. We investigate two new protection methods for these networks, erbium-doped fiber amplifier (EDFA) protection and hybrid protection, and compare them with two established protection techniques, dedicated path protection (DPP) and shared backup path protection (SBPP). Recognizing that protection requirements vary among services, we also propose a service level agreement (SLA) differentiated protection mechanism that combines these strategies. High-priority clients receive robust protection against single failures of fibers or EDFAs through DPP or SBPP, while low-priority clients are safeguarded at least against EDFA failures via EDFA or hybrid protection. Our studies explore the most effective combinations of these techniques across various scenarios, demonstrating the advantages of SLA-differentiated protection over the utilization of a single classical protection method for all clients. Furthermore, we propose and analyze a more flexible protection mechanism that allows clients to divide their traffic into two segments: one requiring a high level of protection and the other a lower level. This flexibility enhances the protection options available, enabling a finer categorization of user needs and making it an attractive choice for network operators.
带分复用(BDM)是一种很有前途的提升弹性光网络容量的技术。通过同时使用C波段和L波段而不是仅仅使用C波段,网络可以支持更多的连接。本文提出并分析了一套利用多频带光网络及其放大器的独特特性来确保多频带光网络弹性的新策略。我们研究了两种新的网络保护方法,掺铒光纤放大器(EDFA)保护和混合保护,并将它们与两种现有的保护技术,专用路径保护(DPP)和共享备份路径保护(SBPP)进行了比较。认识到保护需求因服务而异,我们还提出了一种结合这些策略的服务水平协议(SLA)差异化保护机制。通过DPP或SBPP,高优先级客户端可以获得针对光纤或EDFA单个故障的强大保护,而通过EDFA或混合保护,低优先级客户端至少可以获得针对EDFA故障的保护。我们的研究探索了这些技术在各种情况下的最有效组合,证明了sla差异化保护优于对所有客户使用单一经典保护方法的优势。此外,我们提出并分析了一种更灵活的保护机制,该机制允许客户将其流量分为两个部分:一个需要高级别保护,另一个需要低级别保护。这种灵活性增强了可用的保护选项,能够更好地对用户需求进行分类,并使其成为网络运营商的有吸引力的选择。
{"title":"Enabling Service Level Agreement-Differentiated Protection in C+L Multiband Optical Networks","authors":"Soheil Hosseini;Ignacio De Miguel;Noemí Merayo;Óscar González De Dios;Rubén M. Lorenzo;Ramón J. Durán Barroso","doi":"10.1109/OJCOMS.2024.3520234","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3520234","url":null,"abstract":"Band division multiplexing (BDM) is a promising technology to upgrade the capacity of elastic optical networks (EON). By using both C and L bands instead of just the C-band, networks can support a larger number of connections. This paper presents and analyzes a set of novel strategies to ensure resiliency in multiband optical networks leveraging the unique characteristics of these networks and their amplifiers. We investigate two new protection methods for these networks, erbium-doped fiber amplifier (EDFA) protection and hybrid protection, and compare them with two established protection techniques, dedicated path protection (DPP) and shared backup path protection (SBPP). Recognizing that protection requirements vary among services, we also propose a service level agreement (SLA) differentiated protection mechanism that combines these strategies. High-priority clients receive robust protection against single failures of fibers or EDFAs through DPP or SBPP, while low-priority clients are safeguarded at least against EDFA failures via EDFA or hybrid protection. Our studies explore the most effective combinations of these techniques across various scenarios, demonstrating the advantages of SLA-differentiated protection over the utilization of a single classical protection method for all clients. Furthermore, we propose and analyze a more flexible protection mechanism that allows clients to divide their traffic into two segments: one requiring a high level of protection and the other a lower level. This flexibility enhances the protection options available, enabling a finer categorization of user needs and making it an attractive choice for network operators.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"316-331"},"PeriodicalIF":6.3,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10807265","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Aware Dynamic UAV Operation for 6G FSO Backhaul Network Performance Improvement 6G FSO回程网络性能改进的云感知动态无人机操作
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-12-19 DOI: 10.1109/OJCOMS.2024.3520636
Minseung Park;Minsu Choi;Jong-Moon Chung
Non-terrestrial networks (NTNs) that support communication via unmanned aerial vehicles (UAVs) in 6G systems are attracting considerable interest. To meet the quality of service (QoS) requirements for future 6G devices, the backhaul network of NTNs must provide higher throughput and more secure wireless connectivity. It is anticipated that backhaul NTNs with high throughput free space optical (FSO) communication will play a significant role in supporting multiple users. However, establishing a stable FSO communication link using UAVs can be disrupted by various obstacles, including clouds and atmospheric conditions. To address this challenge, it is essential to consider the effect of clouds on the FSO backhaul network. In this paper, the method for optimizing the deployment of multiple UAVs considering the probability of cloud attenuation is proposed. Specifically, this paper presents a cloud-aware dynamic UAV operation (CDUO) scheme, which contains an optimization process using the generalized Lagrange multiplier method (GLMM). Simulation results (based on blimp-type unmanned aerial stations (UASs)) show that the CDUO scheme can provide a superior outage probability performance compared to existing schemes. The CDUO scheme can be utilized in NTNs that operate above the clouds.
在6G系统中支持通过无人驾驶飞行器(uav)进行通信的非地面网络(ntn)引起了相当大的兴趣。为了满足未来6G设备对服务质量(QoS)的要求,ntn回程网络必须提供更高的吞吐量和更安全的无线连接。具有高吞吐量自由空间光通信(FSO)功能的回程ntn有望在支持多用户方面发挥重要作用。然而,使用无人机建立稳定的FSO通信链路可能会受到各种障碍的干扰,包括云和大气条件。为了应对这一挑战,必须考虑云对FSO回程网络的影响。本文提出了考虑云衰减概率的多无人机优化部署方法。具体而言,本文提出了一种云感知无人机动态操作(CDUO)方案,该方案包含一个使用广义拉格朗日乘子方法(GLMM)的优化过程。基于飞艇型无人机站(UASs)的仿真结果表明,与现有方案相比,CDUO方案具有更好的中断概率性能。CDUO方案可用于运行在云之上的ntn。
{"title":"Cloud Aware Dynamic UAV Operation for 6G FSO Backhaul Network Performance Improvement","authors":"Minseung Park;Minsu Choi;Jong-Moon Chung","doi":"10.1109/OJCOMS.2024.3520636","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3520636","url":null,"abstract":"Non-terrestrial networks (NTNs) that support communication via unmanned aerial vehicles (UAVs) in 6G systems are attracting considerable interest. To meet the quality of service (QoS) requirements for future 6G devices, the backhaul network of NTNs must provide higher throughput and more secure wireless connectivity. It is anticipated that backhaul NTNs with high throughput free space optical (FSO) communication will play a significant role in supporting multiple users. However, establishing a stable FSO communication link using UAVs can be disrupted by various obstacles, including clouds and atmospheric conditions. To address this challenge, it is essential to consider the effect of clouds on the FSO backhaul network. In this paper, the method for optimizing the deployment of multiple UAVs considering the probability of cloud attenuation is proposed. Specifically, this paper presents a cloud-aware dynamic UAV operation (CDUO) scheme, which contains an optimization process using the generalized Lagrange multiplier method (GLMM). Simulation results (based on blimp-type unmanned aerial stations (UASs)) show that the CDUO scheme can provide a superior outage probability performance compared to existing schemes. The CDUO scheme can be utilized in NTNs that operate above the clouds.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"130-142"},"PeriodicalIF":6.3,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10810353","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security, Privacy, and Trust for Open Radio Access Networks in 6G 6G开放无线接入网络的安全、隐私和信任
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-12-18 DOI: 10.1109/OJCOMS.2024.3519725
Pawani Porambage;Maria Christopoulou;Bin Han;Mohammad Asif Habibi;Hanna Bogucka;Pawel Kryszkiewicz
The programmability of radio access networks was already introduced in the fifth generation of mobile networks by leading the pathway towards the Open RAN. To cater the stringent requirements emerging with the novel services and use cases, Open RAN is becoming integral to 6G as well. The most highlighted characteristics of Open RAN such as disaggregated architecture, cloudification of network functions, open interfaces, and intelligent network management are also associated with many challenges related to the security of the end-to-end telco networks. Most existing research works and specifications focus on security in Open RAN in 5G. In this paper, we discuss the role of Open RAN in 6G focusing on three aspects such as security, privacy, and trust, while highlighting their emerging trends and relevance to 6G. Our contributions include presenting a holistic view of Open RAN security within the 6G ecosystem, with insights into use case and stakeholder perspectives and standardization efforts. This includes a concise update on Open RAN security in the 5G era and their applicability to 6G exploration. Moreover, we identify the key research endeavors focused on privacy and trust in Open RAN, with an emphasis on their development toward 6G. Finally, we discuss the possibilities of incorporating energy awareness, quantum-safe solutions, and other emerging technological enablers with Open RAN security.
无线接入网的可编程性已经在第五代移动网络中引入,引领了通往开放式RAN的道路。为了满足新服务和用例出现的严格要求,Open RAN也正在成为6G不可或缺的一部分。Open RAN最突出的特点,如分解架构、网络功能的云化、开放接口和智能网络管理,也与端到端电信网络的安全性相关的许多挑战相关联。大多数现有的研究工作和规范都集中在5G开放RAN的安全性上。本文从安全、隐私和信任三个方面讨论了Open RAN在6G中的作用,同时强调了它们的新兴趋势和与6G的相关性。我们的贡献包括在6G生态系统中呈现开放式RAN安全的整体视图,以及对用例和利益相关者观点以及标准化工作的见解。这包括对5G时代开放式RAN安全性及其在6G探索中的适用性的简要更新。此外,我们还确定了开放式RAN中关注隐私和信任的关键研究工作,重点是向6G方向发展。最后,我们讨论了将能量感知、量子安全解决方案和其他新兴技术与Open RAN安全相结合的可能性。
{"title":"Security, Privacy, and Trust for Open Radio Access Networks in 6G","authors":"Pawani Porambage;Maria Christopoulou;Bin Han;Mohammad Asif Habibi;Hanna Bogucka;Pawel Kryszkiewicz","doi":"10.1109/OJCOMS.2024.3519725","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3519725","url":null,"abstract":"The programmability of radio access networks was already introduced in the fifth generation of mobile networks by leading the pathway towards the Open RAN. To cater the stringent requirements emerging with the novel services and use cases, Open RAN is becoming integral to 6G as well. The most highlighted characteristics of Open RAN such as disaggregated architecture, cloudification of network functions, open interfaces, and intelligent network management are also associated with many challenges related to the security of the end-to-end telco networks. Most existing research works and specifications focus on security in Open RAN in 5G. In this paper, we discuss the role of Open RAN in 6G focusing on three aspects such as security, privacy, and trust, while highlighting their emerging trends and relevance to 6G. Our contributions include presenting a holistic view of Open RAN security within the 6G ecosystem, with insights into use case and stakeholder perspectives and standardization efforts. This includes a concise update on Open RAN security in the 5G era and their applicability to 6G exploration. Moreover, we identify the key research endeavors focused on privacy and trust in Open RAN, with an emphasis on their development toward 6G. Finally, we discuss the possibilities of incorporating energy awareness, quantum-safe solutions, and other emerging technological enablers with Open RAN security.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"332-361"},"PeriodicalIF":6.3,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10807044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Deep Neural Network Approach for WiFi Fingerprinting-Based Multi-Floor Indoor Localization 基于WiFi指纹的多楼层室内定位的增强深度神经网络方法
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-12-18 DOI: 10.1109/OJCOMS.2024.3520005
Shehu Lukman Ayinla;Azrina Abd Aziz;Micheal Drieberg;Misfa Susanto;Afidalina Tumian;Mazlaini Yahya
WiFi fingerprinting based on the Received Signal Strength Indicator (RSSI) is a widely used technique for indoor localization. However, achieving the necessary precision for most smart applications has proven difficult due to various challenges, including the time-varying characteristics of indoor RSSI, device heterogeneity, and ambiguity in the positional fingerprints. To address these concerns, Artificial Intelligence (AI) techniques such as Machine Learning (ML) and Deep Learning (DL) have been used to classify and predict indoor locations. While these techniques have shown promising results, they face two significant challenges. First, their complex multilayer architecture requires extensive training iterations. Second, the distribution of the input layer fluctuates as the network’s parameters are updated. In this study, we propose a WiFi indoor localization framework based on Recursive Feature Elimination with Cross-Validation (RFECV) and Deep Neural Network with Batch Normalization (DNNBN). The CV process is repeated multiple times to assess the RFE’s generalization ability for optimal feature selection, and the BN algorithm is integrated into each layer of the DNN to ensure consistent activation value distribution and stabilization of the training process. Two datasets were used to assess the performance of the proposed RFECV-DNNBN method. The results show that the method addresses the challenges faced by existing AI techniques and outperforms current methods in classification and regression tasks. Our proposed framework achieved 100% accuracy in building classification and 94.69% and 96.39% in floor classification on the UJIIndoorLoc and UTSIndoorLoc datasets, respectively, demonstrating its effectiveness. Additionally, it achieved a Mean Absolute Error (MAE) of 5.08 m and 4.29 m for the respective datasets, highlighting its potential in multi-floored environments.
基于接收信号强度指示器(RSSI)的WiFi指纹识别技术是一种应用广泛的室内定位技术。然而,由于各种挑战,包括室内RSSI的时变特性、设备异构性和位置指纹的模糊性,大多数智能应用都难以实现必要的精度。为了解决这些问题,机器学习(ML)和深度学习(DL)等人工智能(AI)技术已被用于分类和预测室内位置。虽然这些技术已经显示出有希望的结果,但它们面临着两个重大挑战。首先,它们复杂的多层体系结构需要大量的训练迭代。其次,输入层的分布随着网络参数的更新而波动。在这项研究中,我们提出了一个基于递归特征消除交叉验证(RFECV)和深度神经网络批归一化(DNNBN)的WiFi室内定位框架。通过多次重复CV过程来评估RFE对最优特征选择的泛化能力,并将BN算法集成到DNN的每一层中,以确保激活值分布的一致性和训练过程的稳定性。使用两个数据集来评估所提出的RFECV-DNNBN方法的性能。结果表明,该方法解决了现有人工智能技术面临的挑战,在分类和回归任务中优于当前方法。我们提出的框架在UJIIndoorLoc和UTSIndoorLoc数据集上的建筑分类准确率达到100%,楼层分类准确率分别为94.69%和96.39%,证明了它的有效性。此外,它在各自的数据集上实现了5.08 m和4.29 m的平均绝对误差(MAE),突出了它在多层环境中的潜力。
{"title":"An Enhanced Deep Neural Network Approach for WiFi Fingerprinting-Based Multi-Floor Indoor Localization","authors":"Shehu Lukman Ayinla;Azrina Abd Aziz;Micheal Drieberg;Misfa Susanto;Afidalina Tumian;Mazlaini Yahya","doi":"10.1109/OJCOMS.2024.3520005","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3520005","url":null,"abstract":"WiFi fingerprinting based on the Received Signal Strength Indicator (RSSI) is a widely used technique for indoor localization. However, achieving the necessary precision for most smart applications has proven difficult due to various challenges, including the time-varying characteristics of indoor RSSI, device heterogeneity, and ambiguity in the positional fingerprints. To address these concerns, Artificial Intelligence (AI) techniques such as Machine Learning (ML) and Deep Learning (DL) have been used to classify and predict indoor locations. While these techniques have shown promising results, they face two significant challenges. First, their complex multilayer architecture requires extensive training iterations. Second, the distribution of the input layer fluctuates as the network’s parameters are updated. In this study, we propose a WiFi indoor localization framework based on Recursive Feature Elimination with Cross-Validation (RFECV) and Deep Neural Network with Batch Normalization (DNNBN). The CV process is repeated multiple times to assess the RFE’s generalization ability for optimal feature selection, and the BN algorithm is integrated into each layer of the DNN to ensure consistent activation value distribution and stabilization of the training process. Two datasets were used to assess the performance of the proposed RFECV-DNNBN method. The results show that the method addresses the challenges faced by existing AI techniques and outperforms current methods in classification and regression tasks. Our proposed framework achieved 100% accuracy in building classification and 94.69% and 96.39% in floor classification on the UJIIndoorLoc and UTSIndoorLoc datasets, respectively, demonstrating its effectiveness. Additionally, it achieved a Mean Absolute Error (MAE) of 5.08 m and 4.29 m for the respective datasets, highlighting its potential in multi-floored environments.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"560-575"},"PeriodicalIF":6.3,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10806782","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Earthquake Network Restoration: Statistical Seismic Road Closure Prediction and Efficient MDRU Routing 震后路网恢复:统计地震封路预测和高效MDRU路由
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-12-17 DOI: 10.1109/OJCOMS.2024.3519314
Ahmet Enes Duranay;Xhelja Kodheli;Amr M. Abdelhady;Abdulkadir Celik;Ahmed M. Eltawil;Hüseyin Arslan
Post-earthquake scenarios have brought connectivity challenges to the forefront of research in recent years. Particularly, the randomness and large-scale of road and telecom network infrastructure damage within the aftermath hinders communications coverage restoration during the most critical hours when lives are at stake. This paper proposes a seismic-based post-earthquake city and cellular network model to statistically predict the status of road closures and base station failures based on fundamental earthquake measurements. The presented model considers a generic Manhattan grid-based city model, with buildings featuring random heights. In addition, it quantifies the probability of building collapse and the consequent probability of road closure which accounts for the random debris nature. Moreover, the model accounts for the dependencies between the debris width, height, and the relative location with respect to the earthquake epicenter. Furthermore, a routing algorithm for movable and deployable resource units (MDRUs) that exploits the derived statistical model is proposed to ensure that MDRUs are efficiently deployed and connectivity is restored swiftly. The proposed routing algorithm is extensively tested over a large set of simulation scenarios depicting different earthquake magnitudes and was shown to provide up to 31% traveling time reduction compared to a blind distance-based approach. Finally, the conducted simulations showed the effectiveness of the proposed MDRUs deployment approach in restoring the communications coverage from a signal-to-interference plus noise ratio perspective in the majority of the considered locations.
近年来,震后情景将连通性挑战带到了研究的前沿。特别是,震后道路和电信网络基础设施的随机性和大规模破坏,阻碍了在生命受到威胁的最关键时刻恢复通信覆盖。本文提出了一种基于地震的震后城市和蜂窝网络模型,用于基于基本地震测量的道路封闭和基站故障状态的统计预测。提出的模型考虑了一个通用的基于网格的曼哈顿城市模型,其中建筑物具有随机高度。此外,它量化了建筑物倒塌的概率和随之而来的道路封闭的概率,这说明了随机碎片的性质。此外,该模型考虑了碎片宽度、高度和相对于震中的相对位置之间的依赖关系。在此基础上,提出了一种基于统计模型的可移动可部署资源单元路由算法,以保证可移动可部署资源单元的有效部署和连接的快速恢复。所提出的路由算法在描述不同地震震级的大量模拟场景中进行了广泛的测试,结果表明,与基于盲距离的方法相比,该算法最多可减少31%的行进时间。最后,所进行的模拟显示了所提出的mdru部署方法在大多数考虑位置从信噪比角度恢复通信覆盖的有效性。
{"title":"Post-Earthquake Network Restoration: Statistical Seismic Road Closure Prediction and Efficient MDRU Routing","authors":"Ahmet Enes Duranay;Xhelja Kodheli;Amr M. Abdelhady;Abdulkadir Celik;Ahmed M. Eltawil;Hüseyin Arslan","doi":"10.1109/OJCOMS.2024.3519314","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3519314","url":null,"abstract":"Post-earthquake scenarios have brought connectivity challenges to the forefront of research in recent years. Particularly, the randomness and large-scale of road and telecom network infrastructure damage within the aftermath hinders communications coverage restoration during the most critical hours when lives are at stake. This paper proposes a seismic-based post-earthquake city and cellular network model to statistically predict the status of road closures and base station failures based on fundamental earthquake measurements. The presented model considers a generic Manhattan grid-based city model, with buildings featuring random heights. In addition, it quantifies the probability of building collapse and the consequent probability of road closure which accounts for the random debris nature. Moreover, the model accounts for the dependencies between the debris width, height, and the relative location with respect to the earthquake epicenter. Furthermore, a routing algorithm for movable and deployable resource units (MDRUs) that exploits the derived statistical model is proposed to ensure that MDRUs are efficiently deployed and connectivity is restored swiftly. The proposed routing algorithm is extensively tested over a large set of simulation scenarios depicting different earthquake magnitudes and was shown to provide up to 31% traveling time reduction compared to a blind distance-based approach. Finally, the conducted simulations showed the effectiveness of the proposed MDRUs deployment approach in restoring the communications coverage from a signal-to-interference plus noise ratio perspective in the majority of the considered locations.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"671-689"},"PeriodicalIF":6.3,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10804642","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Propagation Channel Measurements for Indoor-to-Outdoor Communications for Device-to-Device Public Safety Applications 面向设备对设备公共安全应用的室内外通信传播信道测量
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-12-13 DOI: 10.1109/OJCOMS.2024.3516763
Hussein Hammoud;Zihang Cheng;Jorge Gomez-Ponce;Seun Sangodoyin;Jason Kahn;Andreas F. Molisch
Recent interest in Device-to-Device (D2D) communication systems, particularly by Public Safety Organizations (PSOs), arises from scenarios where no infrastructure is available. One notable scenario is Indoor-to-Outdoor (I2O), where emergency responders inside buildings communicate with command posts on the street. We aim to understand the propagation channel for designing wireless systems in such contexts. We report findings from a comprehensive measurement campaign in the public safety frequency band near 800 MHz, assessing multiple-input-multiple-output (MIMO) channels between users across five floors of a California office building and a multi-antenna base station at street level. This study provides insights as well as statistical channel models for pathgain, delay spread, angular spreads, and power distribution among Multi-Path Components (MPCs) and their dependence on indoor-user height. In Line-of-Sight (LoS) scenarios, 10 dB pathgain variation was observed between ground and the 5th floor, while Non-Line-Of-Sight (NLoS) cases showed no such variation. Delay spreads exhibited a similar trend in LoS scenarios, with a 10 ns variation based on RX height, while NLoS scenarios remained heightindependent. Angular spreads were consistently large for indoor units, regardless of height. Analysis of the probability density function of the MPC powers using a 5D κ parameter revealed approximately 8 dB for LoS scenarios and −1 dB for NLoS scenarios, assuming beamforming for maximum received power.
最近对设备到设备(D2D)通信系统的兴趣,特别是公共安全组织(pso),源于没有可用基础设施的场景。一个值得注意的场景是室内到室外(I2O),在这种情况下,建筑物内的紧急救援人员与街道上的指挥所进行通信。我们的目标是了解在这种情况下设计无线系统的传播信道。我们报告了在800 MHz附近的公共安全频段进行的一项综合测量活动的结果,该活动评估了加利福尼亚办公楼五层用户和街道上的多天线基站之间的多输入多输出(MIMO)信道。本研究为路径增益、延迟扩展、角扩展和多路径组件(mpc)之间的功率分布及其对室内用户高度的依赖提供了见解和统计信道模型。在视距(LoS)情况下,地面和5楼之间的路径增益变化为10 dB,而非视距(NLoS)情况下则没有这种变化。在LoS情景中,延迟差表现出类似的趋势,基于RX高度有10 ns的变化,而NLoS情景保持高度无关。无论高度如何,室内单元的角扩散始终很大。使用5D κ参数分析MPC功率的概率密度函数显示,假设波束形成为最大接收功率,LoS场景约为8 dB, NLoS场景约为- 1 dB。
{"title":"Propagation Channel Measurements for Indoor-to-Outdoor Communications for Device-to-Device Public Safety Applications","authors":"Hussein Hammoud;Zihang Cheng;Jorge Gomez-Ponce;Seun Sangodoyin;Jason Kahn;Andreas F. Molisch","doi":"10.1109/OJCOMS.2024.3516763","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3516763","url":null,"abstract":"Recent interest in Device-to-Device (D2D) communication systems, particularly by Public Safety Organizations (PSOs), arises from scenarios where no infrastructure is available. One notable scenario is Indoor-to-Outdoor (I2O), where emergency responders inside buildings communicate with command posts on the street. We aim to understand the propagation channel for designing wireless systems in such contexts. We report findings from a comprehensive measurement campaign in the public safety frequency band near 800 MHz, assessing multiple-input-multiple-output (MIMO) channels between users across five floors of a California office building and a multi-antenna base station at street level. This study provides insights as well as statistical channel models for pathgain, delay spread, angular spreads, and power distribution among Multi-Path Components (MPCs) and their dependence on indoor-user height. In Line-of-Sight (LoS) scenarios, 10 dB pathgain variation was observed between ground and the 5th floor, while Non-Line-Of-Sight (NLoS) cases showed no such variation. Delay spreads exhibited a similar trend in LoS scenarios, with a 10 ns variation based on RX height, while NLoS scenarios remained heightindependent. Angular spreads were consistently large for indoor units, regardless of height. Analysis of the probability density function of the MPC powers using a 5D κ parameter revealed approximately 8 dB for LoS scenarios and −1 dB for NLoS scenarios, assuming beamforming for maximum received power.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"154-170"},"PeriodicalIF":6.3,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10798454","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Open Journal of the Communications Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1