Pub Date : 2019-06-24DOI: 10.1109/IWCMC.2019.8766490
Djedjiga Benzid, M. Kadoch, M. Cheriet
In the future Fifth-Generation networks, the eavesdropping is a critical threat due to their broadcast-based transmission. This problem can be addressed with the cryptographic protocols. However, this method is complex and difficult because of the dynamic topology of wireless networks, which does not allow an efficient management of security keys. As a complement solution, Physical-layer security (PLS) is integrated to enhance secrecy in wireless networks. The PLS exploits the schemes features of this layer, namely the modulation, Massive Multi-Input Multi-Output(m-MiMo) and channel coding. The fountain code is one of those systems where the secrecy is provided when the destination retrieves packets encoded before the intruder. Nevertheless, the secrecy can not be guaranteed when eavesdropper uses large number of the antennas as in the m-MiMo. The feature of m-MiMo should be considered to secure main channel with fountain codes. Therefore, we propose to use Raptor code which is a class of fountain code, aided by an Artificial noise (AN) and the punctuated data to reduce the efficient of intruder channel. This allows the main channel to retrieve the signal before eavesdropper. The numerical results show that using Raptor code in massive MiMo enhances the reliability and the security on the channel of legitimate user, while minimizes the abilities of intruders to spy on data.
{"title":"Raptor Code based on punctured LDPC for Secrecy in Massive MiMo","authors":"Djedjiga Benzid, M. Kadoch, M. Cheriet","doi":"10.1109/IWCMC.2019.8766490","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766490","url":null,"abstract":"In the future Fifth-Generation networks, the eavesdropping is a critical threat due to their broadcast-based transmission. This problem can be addressed with the cryptographic protocols. However, this method is complex and difficult because of the dynamic topology of wireless networks, which does not allow an efficient management of security keys. As a complement solution, Physical-layer security (PLS) is integrated to enhance secrecy in wireless networks. The PLS exploits the schemes features of this layer, namely the modulation, Massive Multi-Input Multi-Output(m-MiMo) and channel coding. The fountain code is one of those systems where the secrecy is provided when the destination retrieves packets encoded before the intruder. Nevertheless, the secrecy can not be guaranteed when eavesdropper uses large number of the antennas as in the m-MiMo. The feature of m-MiMo should be considered to secure main channel with fountain codes. Therefore, we propose to use Raptor code which is a class of fountain code, aided by an Artificial noise (AN) and the punctuated data to reduce the efficient of intruder channel. This allows the main channel to retrieve the signal before eavesdropper. The numerical results show that using Raptor code in massive MiMo enhances the reliability and the security on the channel of legitimate user, while minimizes the abilities of intruders to spy on data.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128663328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-24DOI: 10.1109/IWCMC.2019.8766680
J. Pacheco, António Furtado, Rodolfo Oliveira
Recently, Low Power Wide Area Networks (LPWANs) have attracted a great interest due to the need of connecting more and more devices to the so-called Internet of Things (IoT). LoRa networks are LPWANs that allow a long-range radio connection of multiple devices operating in non-licensed bands. In this work, we characterize the performance of LoRa’s Uplink communications where both physical layer (PHY) and medium access control (MAC) are taken into account. By admitting a uniform spatial distribution of the devices, we characterize the performance of the PHY-layer through the probability of successful decoding multiple frames that were transmitted with the same spreading factor and at the same time. The MAC performance is evaluated by admitting that the inter-arrival time of the frames generated by each LoRa device is exponentially distributed. A typical LoRaWAN operating scenario is considered, where the transmissions of LoRa Class A devices are affected by path-loss, shadowing and Rayleigh fading. Numerical results obtained with the modeling methodology are compared with simulation results, and the validation of the proposed model is discussed for different levels of traffic load and PHY-layer conditions. Due to the possibility of capturing multiple frames simultaneously, we consider the maximum achievable performance of the PHY/MAC LoRa scheme according to the Signal-to-interference-plus-noise ratio (SINR). The contribution of this work is primarily focused on studying the average number of successfully received LoRa frames, which establishes a performance upper bound due to the optimal capture condition considered in the PHY-layer.
{"title":"Upper Bound Performance of Uplink Class A LoRa Networks","authors":"J. Pacheco, António Furtado, Rodolfo Oliveira","doi":"10.1109/IWCMC.2019.8766680","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766680","url":null,"abstract":"Recently, Low Power Wide Area Networks (LPWANs) have attracted a great interest due to the need of connecting more and more devices to the so-called Internet of Things (IoT). LoRa networks are LPWANs that allow a long-range radio connection of multiple devices operating in non-licensed bands. In this work, we characterize the performance of LoRa’s Uplink communications where both physical layer (PHY) and medium access control (MAC) are taken into account. By admitting a uniform spatial distribution of the devices, we characterize the performance of the PHY-layer through the probability of successful decoding multiple frames that were transmitted with the same spreading factor and at the same time. The MAC performance is evaluated by admitting that the inter-arrival time of the frames generated by each LoRa device is exponentially distributed. A typical LoRaWAN operating scenario is considered, where the transmissions of LoRa Class A devices are affected by path-loss, shadowing and Rayleigh fading. Numerical results obtained with the modeling methodology are compared with simulation results, and the validation of the proposed model is discussed for different levels of traffic load and PHY-layer conditions. Due to the possibility of capturing multiple frames simultaneously, we consider the maximum achievable performance of the PHY/MAC LoRa scheme according to the Signal-to-interference-plus-noise ratio (SINR). The contribution of this work is primarily focused on studying the average number of successfully received LoRa frames, which establishes a performance upper bound due to the optimal capture condition considered in the PHY-layer.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124129240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-24DOI: 10.1109/IWCMC.2019.8766707
I. Abidi, M. Hizem, Iness Ahriz, M. Dakhli, R. Bouallègue
Sparse code multiple access (SCMA) has attracted growing research interests in order to meet the targets of the next generation of wireless communication networks. Since it relies on non-orthogonal multiple access (NOMA) techniques, it is considered as a promising candidate for future systems that can improve the spectral efficiency and solve the problem of massive user connections. In this paper, the basic concept of SCMA is introduced, including SCMA encoding, codebook mapping, and SCMA decoding. The major challenge of SCMA is the very high detection complexity. Then, a novel strategy for blind decoding based on convolutional neural networks is proposed. Through simulations, we showed that our proposed scheme outperforms conventional schemes in terms of both BER and computational complexity, where 0.9 dB improvements can be achieved.
{"title":"Convolutional Neural Networks for blind decoding in Sparse Code Multiple Access","authors":"I. Abidi, M. Hizem, Iness Ahriz, M. Dakhli, R. Bouallègue","doi":"10.1109/IWCMC.2019.8766707","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766707","url":null,"abstract":"Sparse code multiple access (SCMA) has attracted growing research interests in order to meet the targets of the next generation of wireless communication networks. Since it relies on non-orthogonal multiple access (NOMA) techniques, it is considered as a promising candidate for future systems that can improve the spectral efficiency and solve the problem of massive user connections. In this paper, the basic concept of SCMA is introduced, including SCMA encoding, codebook mapping, and SCMA decoding. The major challenge of SCMA is the very high detection complexity. Then, a novel strategy for blind decoding based on convolutional neural networks is proposed. Through simulations, we showed that our proposed scheme outperforms conventional schemes in terms of both BER and computational complexity, where 0.9 dB improvements can be achieved.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-24DOI: 10.1109/IWCMC.2019.8766782
Nabila Bermad, Salah Zemmoudj, Mawloud Omar
Intelligent traffic light control systems are proposed to solve the problem of congestion in urban areas. In this context, the connected vehicles are used to gather the real-time traffic data surrounding environment. The involvement of vehicles in the control of traffic can reduce considerably the travel delay and maximize throughput. However, if the reported information is fake, then the result could be catastrophic, such as road accidents. Also, the malicious vehicles can send fake displacement urgency to their supervised traffic light, to reach their destinations as fast as possible. To tackle this problem, we propose a Reputation model based Intelligent COntrol Protocol (RICOP). In this protocol, each traffic light computes the negotiating vehicle’s reputation based on its dynamic behavior, the opinions of located traffic lights, and its historical reputation monitored by nearest roadside unit (RSU). According to the reputation value, the traffic light takes an appropriate decision. RICOP guarantees the integrity and authentication of exchanged messages using digital signature and certificateless cryptography. Also, the privacy of the vehicle and its driver is preserved using a pseudonym. To evaluate the effectiveness of our proposal, we set a series of simulations in a network simulator NS3. The results are satisfactory in terms of delay, accuracy and computational cost.
{"title":"Reputation based Intelligent Control Protocol","authors":"Nabila Bermad, Salah Zemmoudj, Mawloud Omar","doi":"10.1109/IWCMC.2019.8766782","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766782","url":null,"abstract":"Intelligent traffic light control systems are proposed to solve the problem of congestion in urban areas. In this context, the connected vehicles are used to gather the real-time traffic data surrounding environment. The involvement of vehicles in the control of traffic can reduce considerably the travel delay and maximize throughput. However, if the reported information is fake, then the result could be catastrophic, such as road accidents. Also, the malicious vehicles can send fake displacement urgency to their supervised traffic light, to reach their destinations as fast as possible. To tackle this problem, we propose a Reputation model based Intelligent COntrol Protocol (RICOP). In this protocol, each traffic light computes the negotiating vehicle’s reputation based on its dynamic behavior, the opinions of located traffic lights, and its historical reputation monitored by nearest roadside unit (RSU). According to the reputation value, the traffic light takes an appropriate decision. RICOP guarantees the integrity and authentication of exchanged messages using digital signature and certificateless cryptography. Also, the privacy of the vehicle and its driver is preserved using a pseudonym. To evaluate the effectiveness of our proposal, we set a series of simulations in a network simulator NS3. The results are satisfactory in terms of delay, accuracy and computational cost.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117303765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-24DOI: 10.1109/IWCMC.2019.8766551
M. Awais, N. Javaid, Nidal Naseer, M. Imran
In recent times, different routing protocols have been proposed in the Internet of Things enabled Underwater Wireless Sensor Networks (IoT-UWSNs) to explore the underwater environment for different purposes, i.e., scientific and military purposes. However, high Energy Consumption (EC), End to End (E2E) delay, low Packet Delivery Ratio (PDR) and minimum network lifetime make the energy efficient communication a challenging task in Underwater Wireless Sensor Network (UWSN). The high E2E delay, EC and reliable data delivery are the critical issues, which play an important role to enhance the network throughput. So, this paper presents two energy efficient routing protocols namely: Shortest Path-Collision avoidance Based Energy Efficient Routing (SP-CBE2R) protocol and Improved-Collision avoidance Based Energy Efficient Routing (Im-CBE2R) protocol. At this end, both routing protocols minimize the probability of void hole occurrence and in return minimizes the EC and E2E delay. In both routing protocols, courier nodes are positioned at different strategic locations to keep the greedy forwarding continuous. The proposed routing protocols are also analyzed by varying the Packet Size (PS) and Data Rate (DR). Additionally, various simulations have been performed to authenticate the proposed routing protocols. Simulation results show that the proposed routing protocols outperform the baseline routing protocols in counterparts.
{"title":"Exploiting Energy Efficient Routing protocols for Void Hole Alleviation in IoT enabled Underwater WSN","authors":"M. Awais, N. Javaid, Nidal Naseer, M. Imran","doi":"10.1109/IWCMC.2019.8766551","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766551","url":null,"abstract":"In recent times, different routing protocols have been proposed in the Internet of Things enabled Underwater Wireless Sensor Networks (IoT-UWSNs) to explore the underwater environment for different purposes, i.e., scientific and military purposes. However, high Energy Consumption (EC), End to End (E2E) delay, low Packet Delivery Ratio (PDR) and minimum network lifetime make the energy efficient communication a challenging task in Underwater Wireless Sensor Network (UWSN). The high E2E delay, EC and reliable data delivery are the critical issues, which play an important role to enhance the network throughput. So, this paper presents two energy efficient routing protocols namely: Shortest Path-Collision avoidance Based Energy Efficient Routing (SP-CBE2R) protocol and Improved-Collision avoidance Based Energy Efficient Routing (Im-CBE2R) protocol. At this end, both routing protocols minimize the probability of void hole occurrence and in return minimizes the EC and E2E delay. In both routing protocols, courier nodes are positioned at different strategic locations to keep the greedy forwarding continuous. The proposed routing protocols are also analyzed by varying the Packet Size (PS) and Data Rate (DR). Additionally, various simulations have been performed to authenticate the proposed routing protocols. Simulation results show that the proposed routing protocols outperform the baseline routing protocols in counterparts.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114372811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-24DOI: 10.1109/IWCMC.2019.8766505
M. Usama, A. Qayyum, Junaid Qadir, Ala Al-Fuqaha
Deep machine learning techniques have shown promising results in network traffic classification, however, the robustness of these techniques under adversarial threats is still in question. Deep machine learning models are found vulnerable to small carefully crafted adversarial perturbations posing a major question on the performance of deep machine learning techniques. In this paper, we propose a black-box adversarial attack on network traffic classification. The proposed attack successfully evades deep machine learning-based classifiers which highlights the potential security threat of using deep machine learning techniques to realize autonomous networks.
{"title":"Black-box Adversarial Machine Learning Attack on Network Traffic Classification","authors":"M. Usama, A. Qayyum, Junaid Qadir, Ala Al-Fuqaha","doi":"10.1109/IWCMC.2019.8766505","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766505","url":null,"abstract":"Deep machine learning techniques have shown promising results in network traffic classification, however, the robustness of these techniques under adversarial threats is still in question. Deep machine learning models are found vulnerable to small carefully crafted adversarial perturbations posing a major question on the performance of deep machine learning techniques. In this paper, we propose a black-box adversarial attack on network traffic classification. The proposed attack successfully evades deep machine learning-based classifiers which highlights the potential security threat of using deep machine learning techniques to realize autonomous networks.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124023608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-24DOI: 10.1109/IWCMC.2019.8766773
I. Abidi, M. Hizem, Iness Ahriz, M. Dakhli, R. Bouallègue
Sparse code multiple access (SCMA) and polar codes (PC) are two promising candidates for Future communication systems since they are capable of achieving high system capacity. In this paper, we develop a novel detection and decoding scheme for SCMA systems combined with channel coding candidate polar codes. First, we propose a separate detection and decoding (SDD) receiver for uplink communications. Then, we introduce a joint detection and decoding (JDD) receiver scheme. The investigation of system receiver is decomposed on message passing algorithm (MPA) based SCMA multiuser detection and soft cancellation (SCAN) algorithm based polar codes decoder. The separate and joint schemes are studied over additive white gaussian noise (AWGN) channels. JDD scheme yields a better performance gain. Moreover, the joint scheme has a lower computational complexity compared to the separate one. Numerical results show that when polar code length polarN = 1024 and R = 1/2, under system loading 150%, JDD outperforms the SDD 1.8dB at BER = 10−2 and 3.3dB at BER = 10−6 over AWGN channels.
稀疏码多址(SCMA)和极化码(PC)由于能够实现高系统容量,是未来通信系统的两种有前途的候选方案。在本文中,我们开发了一种结合信道编码候选极码的SCMA系统检测和解码方案。首先,我们提出了一个单独的检测和解码(SDD)接收器用于上行通信。然后,我们介绍了一种联合检测和解码(JDD)接收器方案。系统接收机的研究分为基于消息传递算法(MPA)的SCMA多用户检测和基于软抵消(SCAN)算法的极化码解码器。研究了加性高斯白噪声(AWGN)信道上的分离方案和联合方案。JDD方案产生更好的性能增益。此外,联合方案比单独方案具有更低的计算复杂度。数值结果表明,当极化码长polarN = 1024, R = 1/2,系统负载为150%时,在AWGN信道上,JDD在BER = 10−2时优于SDD 1.8dB, BER = 10−6时优于SDD 3.3dB。
{"title":"A novel detection and decoding receiver for Polar-Coded SCMA system","authors":"I. Abidi, M. Hizem, Iness Ahriz, M. Dakhli, R. Bouallègue","doi":"10.1109/IWCMC.2019.8766773","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766773","url":null,"abstract":"Sparse code multiple access (SCMA) and polar codes (PC) are two promising candidates for Future communication systems since they are capable of achieving high system capacity. In this paper, we develop a novel detection and decoding scheme for SCMA systems combined with channel coding candidate polar codes. First, we propose a separate detection and decoding (SDD) receiver for uplink communications. Then, we introduce a joint detection and decoding (JDD) receiver scheme. The investigation of system receiver is decomposed on message passing algorithm (MPA) based SCMA multiuser detection and soft cancellation (SCAN) algorithm based polar codes decoder. The separate and joint schemes are studied over additive white gaussian noise (AWGN) channels. JDD scheme yields a better performance gain. Moreover, the joint scheme has a lower computational complexity compared to the separate one. Numerical results show that when polar code length polarN = 1024 and R = 1/2, under system loading 150%, JDD outperforms the SDD 1.8dB at BER = 10−2 and 3.3dB at BER = 10−6 over AWGN channels.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"39 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115858667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IWCMC.2019.8766752
Xiao Zheng, Mingchu Li, Yuanfang Chen, M. Guizani, Jia Liu, Muhammad Tahir
We propose an algorithm for constructing efficient security strategies in the mobile edge computing (MEC), where the protected targets are nodes connected to the MEC and the mobile users (MUs) are agents capable of preventing undesirable activities on the nodes. The algorithm is designed based on the synthetic principles of a specific set of strategies, and it can quickly construct suboptimal solutions even if the number of targets reaches hundreds of millions.
{"title":"Solving Security Problems in MEC Systems","authors":"Xiao Zheng, Mingchu Li, Yuanfang Chen, M. Guizani, Jia Liu, Muhammad Tahir","doi":"10.1109/IWCMC.2019.8766752","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766752","url":null,"abstract":"We propose an algorithm for constructing efficient security strategies in the mobile edge computing (MEC), where the protected targets are nodes connected to the MEC and the mobile users (MUs) are agents capable of preventing undesirable activities on the nodes. The algorithm is designed based on the synthetic principles of a specific set of strategies, and it can quickly construct suboptimal solutions even if the number of targets reaches hundreds of millions.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IWCMC.2019.8766473
Abla Bedoui, Mohamed Et-tolba, Hamid Nouasria
Offset quadrature amplitude modulation-based filter bank multicarrier (OQAM-FBMC) is a promising waveform for future wireless communication systems. Despite its numerous advantages, OQAM-FBMC suffers from high signal distortions in a doubly selective channel where a simple equalization is not sufficient to deal with this issue. In this paper, we propose a hybrid automatic repeat request (HARQ) scheme with integrated MMSE equalizer to improve the efficiency of OQAM-FBMC technique. In addition, we analyse the impact of the new technique on inter-carrier interference (ICI) using the cumulative distribution function (CDF). Simulation results show that the proposed approach provides a significant gain in terms of block error rate (BLER).
{"title":"An MMSE Integrated Equalization for HARQ Chase Combining in OQAM-FBMC systems","authors":"Abla Bedoui, Mohamed Et-tolba, Hamid Nouasria","doi":"10.1109/IWCMC.2019.8766473","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766473","url":null,"abstract":"Offset quadrature amplitude modulation-based filter bank multicarrier (OQAM-FBMC) is a promising waveform for future wireless communication systems. Despite its numerous advantages, OQAM-FBMC suffers from high signal distortions in a doubly selective channel where a simple equalization is not sufficient to deal with this issue. In this paper, we propose a hybrid automatic repeat request (HARQ) scheme with integrated MMSE equalizer to improve the efficiency of OQAM-FBMC technique. In addition, we analyse the impact of the new technique on inter-carrier interference (ICI) using the cumulative distribution function (CDF). Simulation results show that the proposed approach provides a significant gain in terms of block error rate (BLER).","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}