Pub Date : 2023-09-01DOI: 10.1109/mcomstd.0003.2200003
Gunasekaran Raja, Gayathri Saravanan, Kapal Dev
Energy consumption is a critical constraint for Unmanned Aerial Vehicles (UAVs) delivery operations to achieve their full potential of providing fast delivery, reducing cost, and cutting emissions. In this article, we propose a synchronized delivery mechanism that employs trucks and UAVs to construct an energy efficient essential service delivery model using Multi-Swarm UAV-Truck (MSUT) framework in a sixth generation (6G) assisted environment. Firstly, we introduce an efficient Brain Storm Optimization (BSO) algorithm that determines the optimal placement location for the trucks and the number of UAV launch sites, given the delivery requirements for optimal delivery of essentials to the target destination. Further, a Multi-Agent Reinforcement Learning (MARL) model, namely Multi-Agent Advantage Actor Critic (MAAC), is employed on UAVs in a swarm for route optimization and efficient energy consumption while en route to the destination. We further investigate the reduced overall delivery time and energy metrics for the proposed UAV-truck network by comparing it with existing Deep Reinforcement Learning (DRL) delivery models.
{"title":"6G-Assisted UAV-Truck Networks: Toward Efficient Essential Services Delivery","authors":"Gunasekaran Raja, Gayathri Saravanan, Kapal Dev","doi":"10.1109/mcomstd.0003.2200003","DOIUrl":"https://doi.org/10.1109/mcomstd.0003.2200003","url":null,"abstract":"Energy consumption is a critical constraint for Unmanned Aerial Vehicles (UAVs) delivery operations to achieve their full potential of providing fast delivery, reducing cost, and cutting emissions. In this article, we propose a synchronized delivery mechanism that employs trucks and UAVs to construct an energy efficient essential service delivery model using Multi-Swarm UAV-Truck (MSUT) framework in a sixth generation (6G) assisted environment. Firstly, we introduce an efficient Brain Storm Optimization (BSO) algorithm that determines the optimal placement location for the trucks and the number of UAV launch sites, given the delivery requirements for optimal delivery of essentials to the target destination. Further, a Multi-Agent Reinforcement Learning (MARL) model, namely Multi-Agent Advantage Actor Critic (MAAC), is employed on UAVs in a swarm for route optimization and efficient energy consumption while en route to the destination. We further investigate the reduced overall delivery time and energy metrics for the proposed UAV-truck network by comparing it with existing Deep Reinforcement Learning (DRL) delivery models.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135735691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/MCOMSTD.0010.2100073
Kunpeng Liu, Shijie Cai, Xiang Gao, Xianda Liu, Changzhao Dong, Zhening Zhang, Jin Lian, Jingbo Tan, Leiming Zhang, M. Zhang, Zukang Shen, Shaobo Wang
Massive multiple-input multiple-output (MIMO) has been a key technology in 5G New Radio (NR) standard, which empowers significant system performance improvement in previous 5G NR Releases. To support higher data rate and multi-user simultaneous transmission in downlink, enhancement in massive MIMO is essential for NR Release 18 (Rel-18). In this article, we explore performance requirements, challenges, and potential technologies for MIMO enhancement. First, we summarize major performance requirements for MIMO in Enhanced Mobile Broadband scenario. Based on these requirements, we identify three critical challenges of MIMO enhancement for single transmission reception point (TRP) and multiple TRPs scheme, in which we highlight the promising coherent joint transmission (CJT) technique. For each challenge, we present specific description from requirement perspective and technique perspective, evaluate the pros and cons of potential solutions, and carry out simulations to illustrate the potential performance gain. Some insights on how to solve these challenges to enhance massive MIMO performance in NR Rel-18 are also provided.
{"title":"NR Enhancements for Downlink MIMO in Rel-18","authors":"Kunpeng Liu, Shijie Cai, Xiang Gao, Xianda Liu, Changzhao Dong, Zhening Zhang, Jin Lian, Jingbo Tan, Leiming Zhang, M. Zhang, Zukang Shen, Shaobo Wang","doi":"10.1109/MCOMSTD.0010.2100073","DOIUrl":"https://doi.org/10.1109/MCOMSTD.0010.2100073","url":null,"abstract":"Massive multiple-input multiple-output (MIMO) has been a key technology in 5G New Radio (NR) standard, which empowers significant system performance improvement in previous 5G NR Releases. To support higher data rate and multi-user simultaneous transmission in downlink, enhancement in massive MIMO is essential for NR Release 18 (Rel-18). In this article, we explore performance requirements, challenges, and potential technologies for MIMO enhancement. First, we summarize major performance requirements for MIMO in Enhanced Mobile Broadband scenario. Based on these requirements, we identify three critical challenges of MIMO enhancement for single transmission reception point (TRP) and multiple TRPs scheme, in which we highlight the promising coherent joint transmission (CJT) technique. For each challenge, we present specific description from requirement perspective and technique perspective, evaluate the pros and cons of potential solutions, and carry out simulations to illustrate the potential performance gain. Some insights on how to solve these challenges to enhance massive MIMO performance in NR Rel-18 are also provided.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"48-55"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44985130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/MCOMSTD.0006.2200077
Daniela Pöhn, Wolfgang Hommel
Identity and access management is a core building block for the majority of web services. Cloud-based services, social webs, mobile apps, but also IoT-related services rely on identity management to provide a seamless and secure user experience. Transmitting and sharing sensitive information with other organizations always poses a security and privacy risk to all participating entities. One solution to tackle this problem is the principle of federated identity management (FIM). FIM is used to authenticate and authorize users across multiple organizations and platforms in order to obtain access to resources and services. The benefits of FIM are, for example, consistent data, reduced amount of sensitive information needed to be shared, as well as less passwords for the user to remember. Both predominant standards, Secure Assertion Markup Language (SAML) 2.0 and Open Authentication (OAuth) 2.0 with the authentication layer OpenID Connect, are in wide-spread practical use for at least a decade. However, these protocols were developed with different requirements in mind than nowadays present. This led to several extensions to tackle real-world problems, making it cumbersome to comply with every flavor. Also, Request for Comments (RFC) 8252 suggests that a native app opens a system browser for user authentication; consequently, new protocols are currently developed. For example, within Internet Engineering Task Force (IETF), Kantara Initiative, and OpenID Foundation, which (should) have three main goals in common: • Reducing the complexity in contrast to SAML 2.0 and OAuth 2.0. • Decreasing the amount of extensions and varieties found in the wild. Both help developers to comply with the standards and, consequently, increase the security. • Including edge and future use cases, making the protocols even more useful. This article gives insights into current developments and possible future paths.
{"title":"New Directions and Challenges within Identity and Access Management","authors":"Daniela Pöhn, Wolfgang Hommel","doi":"10.1109/MCOMSTD.0006.2200077","DOIUrl":"https://doi.org/10.1109/MCOMSTD.0006.2200077","url":null,"abstract":"Identity and access management is a core building block for the majority of web services. Cloud-based services, social webs, mobile apps, but also IoT-related services rely on identity management to provide a seamless and secure user experience. Transmitting and sharing sensitive information with other organizations always poses a security and privacy risk to all participating entities. One solution to tackle this problem is the principle of federated identity management (FIM). FIM is used to authenticate and authorize users across multiple organizations and platforms in order to obtain access to resources and services. The benefits of FIM are, for example, consistent data, reduced amount of sensitive information needed to be shared, as well as less passwords for the user to remember. Both predominant standards, Secure Assertion Markup Language (SAML) 2.0 and Open Authentication (OAuth) 2.0 with the authentication layer OpenID Connect, are in wide-spread practical use for at least a decade. However, these protocols were developed with different requirements in mind than nowadays present. This led to several extensions to tackle real-world problems, making it cumbersome to comply with every flavor. Also, Request for Comments (RFC) 8252 suggests that a native app opens a system browser for user authentication; consequently, new protocols are currently developed. For example, within Internet Engineering Task Force (IETF), Kantara Initiative, and OpenID Foundation, which (should) have three main goals in common: • Reducing the complexity in contrast to SAML 2.0 and OAuth 2.0. • Decreasing the amount of extensions and varieties found in the wild. Both help developers to comply with the standards and, consequently, increase the security. • Including edge and future use cases, making the protocols even more useful. This article gives insights into current developments and possible future paths.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"84-90"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45481971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/MCOMSTD.0005.2200020
Arturo Bellin, Marco Centenaro, N. Pietro, Arif Ishaq, D. Munaretto, D. Ronzani, Andrea Spinato, S. Tomasin, F. Granelli
As mobile systems for private use are gaining momentum, the area of network management automation is bound to attract renewed attention from standardization organizations and vendors. Prominent examples of tasks that would benefit from network automation tools are provisioning, diagnosing, and healing. Nevertheless, due to the various network and service providers as well as stakeholders involved in the deployment of a non-public mobile system, the success of such automation heavily depends on a smooth and effective interoperability among the components of the overall system. In this article, we review the state of the art of network operations, administration, and management in the context of mobile systems for non-public use, highlighting the differences with respect to traditional public networks. Then, we provide insights about the automated provisioning of an entire core network and a network slice subnet, both for private use, performed on a research testbed under continuous integration. Lastly, we propose a list of future challenges in this research area.
{"title":"Autonomous Private Mobile Networks: State of the Art and Future Challenges","authors":"Arturo Bellin, Marco Centenaro, N. Pietro, Arif Ishaq, D. Munaretto, D. Ronzani, Andrea Spinato, S. Tomasin, F. Granelli","doi":"10.1109/MCOMSTD.0005.2200020","DOIUrl":"https://doi.org/10.1109/MCOMSTD.0005.2200020","url":null,"abstract":"As mobile systems for private use are gaining momentum, the area of network management automation is bound to attract renewed attention from standardization organizations and vendors. Prominent examples of tasks that would benefit from network automation tools are provisioning, diagnosing, and healing. Nevertheless, due to the various network and service providers as well as stakeholders involved in the deployment of a non-public mobile system, the success of such automation heavily depends on a smooth and effective interoperability among the components of the overall system. In this article, we review the state of the art of network operations, administration, and management in the context of mobile systems for non-public use, highlighting the differences with respect to traditional public networks. Then, we provide insights about the automated provisioning of an entire core network and a network slice subnet, both for private use, performed on a research testbed under continuous integration. Lastly, we propose a list of future challenges in this research area.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"24-31"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47707064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/MCOMSTD.0009.2100046
Jianlin Guo, Yukimasa Nagai, B. Rolfe, T. Sumi, P. Orlik, Joerg Robert, K. Yano, Steve Shellhammer, S. Kitazawa, Y. Inoue, T. Baykaş
Internet of Things (IoT) applications are rapidly increasing. A broad range of low-power wide-area technologies have been developed in the Sub-1 GHz frequency bands to meet various application requirements. Massive IEEE 802.15.4g based systems have been deployed to provide low to moderate data rate capabilities. IEEE 802.11ah is designed to provide higher data rate capabilities than the data rates of IEEE 802.15.4g. In addition, other Sub-1 GHz band systems, including LoRa and SigFox, are also installed for applications with longer range communication need. There is considerable overlap in use cases targeted by these technologies. Due to the constrained spectrum allocation in the Sub-1 GHz frequency bands, these systems are likely to coexist. Therefore, the coexistence of heterogeneous Sub-1 GHz band wireless technologies becomes an issue to be addressed. Our measurements and simulations reveal significant interference among these systems. Previously the Sub-1 GHz band coexistence is not well addressed. Accordingly, IEEE New Standards Committee and Standard Board formed IEEE 802.19.3 Task Group in December 2018 to develop IEEE 802.19.3 standard for the coexistence of IEEE 802.11ah and IEEE 802.15.4g based systems to guide product deployment. IEEE 802.19.3 standard was published in April 2021. This article summarizes the Sub-1 GHz band systems, spectrum allocation, interference and noise measurements, coexistence issues, and coexistence recommendations presented in IEEE 802.19.3. It aims to introduce IEEE 802.19.3 standard to readers outside of IEEE 802 standard body and to application developers to raise awareness of potential coexistence issues and available coexistence techniques for the better system deployment. In addition, this article presents performance evaluation of the coexistence methods recommended in IEEE 802.19.3.
{"title":"IEEE 802.19.3 Coexistence Recommendations for IEEE 802.11 and IEEE 802.15.4 Based Systems Operating in SUB-1 GHz Frequency Bands","authors":"Jianlin Guo, Yukimasa Nagai, B. Rolfe, T. Sumi, P. Orlik, Joerg Robert, K. Yano, Steve Shellhammer, S. Kitazawa, Y. Inoue, T. Baykaş","doi":"10.1109/MCOMSTD.0009.2100046","DOIUrl":"https://doi.org/10.1109/MCOMSTD.0009.2100046","url":null,"abstract":"Internet of Things (IoT) applications are rapidly increasing. A broad range of low-power wide-area technologies have been developed in the Sub-1 GHz frequency bands to meet various application requirements. Massive IEEE 802.15.4g based systems have been deployed to provide low to moderate data rate capabilities. IEEE 802.11ah is designed to provide higher data rate capabilities than the data rates of IEEE 802.15.4g. In addition, other Sub-1 GHz band systems, including LoRa and SigFox, are also installed for applications with longer range communication need. There is considerable overlap in use cases targeted by these technologies. Due to the constrained spectrum allocation in the Sub-1 GHz frequency bands, these systems are likely to coexist. Therefore, the coexistence of heterogeneous Sub-1 GHz band wireless technologies becomes an issue to be addressed. Our measurements and simulations reveal significant interference among these systems. Previously the Sub-1 GHz band coexistence is not well addressed. Accordingly, IEEE New Standards Committee and Standard Board formed IEEE 802.19.3 Task Group in December 2018 to develop IEEE 802.19.3 standard for the coexistence of IEEE 802.11ah and IEEE 802.15.4g based systems to guide product deployment. IEEE 802.19.3 standard was published in April 2021. This article summarizes the Sub-1 GHz band systems, spectrum allocation, interference and noise measurements, coexistence issues, and coexistence recommendations presented in IEEE 802.19.3. It aims to introduce IEEE 802.19.3 standard to readers outside of IEEE 802 standard body and to application developers to raise awareness of potential coexistence issues and available coexistence techniques for the better system deployment. In addition, this article presents performance evaluation of the coexistence methods recommended in IEEE 802.19.3.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"72-82"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48149580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of Things (IoT) technologies, including drones, can efficiently capture industrial data, promoting the fourth industrial revolution, Industry 4.0. Moreover, as the 5G technologies evolve, Edge AI can push the AI programs from the remote cloud to the network edges close to end devices, enabling reliable and low-latency intelligent services. Compared with traditional applications, Industry 4.0 applications require more accuracy and lower latency. Most importantly, the robustness of Edge AI system is also critical for Industry 4.0 applications. In this work, we propose a robust Edge AI system for real-time industry 4.0 applications. Our proposed robust AI system can conduct model combination design and model deployment design based on the demands of applications, for example, application accuracy and application latency. Our system is also robust to physical system failures and resumes running intermediately when physical system failures occur.
{"title":"Robust Edge AI for Real-Time Industry 4.0 Applications in 5G Environment","authors":"Xiaofeng Zou, Kuan-Ching Li, Joey Tianyi Zhou, Wei Wei, Cen Chen","doi":"10.1109/MCOMSTD.0008.2100019","DOIUrl":"https://doi.org/10.1109/MCOMSTD.0008.2100019","url":null,"abstract":"Internet of Things (IoT) technologies, including drones, can efficiently capture industrial data, promoting the fourth industrial revolution, Industry 4.0. Moreover, as the 5G technologies evolve, Edge AI can push the AI programs from the remote cloud to the network edges close to end devices, enabling reliable and low-latency intelligent services. Compared with traditional applications, Industry 4.0 applications require more accuracy and lower latency. Most importantly, the robustness of Edge AI system is also critical for Industry 4.0 applications. In this work, we propose a robust Edge AI system for real-time industry 4.0 applications. Our proposed robust AI system can conduct model combination design and model deployment design based on the demands of applications, for example, application accuracy and application latency. Our system is also robust to physical system failures and resumes running intermediately when physical system failures occur.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"64-70"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43187715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/MCOMSTD.0002.2200008
S. Chaudhry, H. Malazi, Sangita Dhara, Aqeel H. Kazmi, S. Clarke
Recent advances in vehicular technologies illuminate the significance of vehicular networking, where information dissemination between constituent network elements plays a crucial role. Information sharing in vehicular networks is challenging because mobility introduces a dynamic environment with overwhelming data traffic. Information-Centric Networking (ICN) reduces overheads by in-network caching and name-oriented communication to mitigate these challenges. However, network resources can be used more efficiently if both RSUs and vehicles are managed autonomously. This article proposes autonomous networking to improve information dissemination in vehicular ICN by using available in-network contextual information. First, a Segment-aware ICN (SA-ICN) scheme is proposed by developing a new dynamic namespace convention. Then, we extend SA-ICN by proposing a Segment and Provider-aware Gossiping enabled ICN (SPG-ICN) that leverages a gossip protocol to self-configure and self-optimize the network using content providers. The simulation results demonstrate performance improvements compared to existing content dissemination schemes regarding packet overheads, data delivery delay, and network load.
{"title":"Toward Context-Aware Information Dissemination in Autonomous Networks of Vehicles","authors":"S. Chaudhry, H. Malazi, Sangita Dhara, Aqeel H. Kazmi, S. Clarke","doi":"10.1109/MCOMSTD.0002.2200008","DOIUrl":"https://doi.org/10.1109/MCOMSTD.0002.2200008","url":null,"abstract":"Recent advances in vehicular technologies illuminate the significance of vehicular networking, where information dissemination between constituent network elements plays a crucial role. Information sharing in vehicular networks is challenging because mobility introduces a dynamic environment with overwhelming data traffic. Information-Centric Networking (ICN) reduces overheads by in-network caching and name-oriented communication to mitigate these challenges. However, network resources can be used more efficiently if both RSUs and vehicles are managed autonomously. This article proposes autonomous networking to improve information dissemination in vehicular ICN by using available in-network contextual information. First, a Segment-aware ICN (SA-ICN) scheme is proposed by developing a new dynamic namespace convention. Then, we extend SA-ICN by proposing a Segment and Provider-aware Gossiping enabled ICN (SPG-ICN) that leverages a gossip protocol to self-configure and self-optimize the network using content providers. The simulation results demonstrate performance improvements compared to existing content dissemination schemes regarding packet overheads, data delivery delay, and network load.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"8-15"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43440701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}