Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580402
Lirui Luo, Jiayi Zhang, Shuaifei Chen, B. Ai
In this paper, we investigate the important impacts of imperfect channel state information (CSI) and pilot contamination of cell-free (CF) multiple-input multiple-output (MIMO) systems over non-reciprocal channels with large-scale fading precoding (LSFP). We derive analytical lower bounds of spectral efficiency (SE) for a physically inspired channel nonreciprocity (NRC) model where the NRC variables vary slowly in time. By using our derived closed-form expressions, we study the influence of NRC on the max-min power control scheme. The analysis shows that the achievable downlink SE is only sensitive to the access points (APs) side phase non-reciprocity under pilot contamination and conjugate beamforming, hence the corresponding calibration can be simplified with practical feasibility. Simulation results illustrate that when considering any power control scheme, pilot contamination and NRC both reduce the SE performance while the former shows a greater effect. However, different power control schemes show different sensitivity to NRC. More precisely, the max-min scheme loses its superiority compared to the equal power scheme as the NRC increases. Our results are new and different from the extent CF power control schemes which consider perfect NRC.
{"title":"Performance Analysis and Power Control of Cell-Free Massive MIMO over Non-Reciprocal Channels","authors":"Lirui Luo, Jiayi Zhang, Shuaifei Chen, B. Ai","doi":"10.1109/iccc52777.2021.9580402","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580402","url":null,"abstract":"In this paper, we investigate the important impacts of imperfect channel state information (CSI) and pilot contamination of cell-free (CF) multiple-input multiple-output (MIMO) systems over non-reciprocal channels with large-scale fading precoding (LSFP). We derive analytical lower bounds of spectral efficiency (SE) for a physically inspired channel nonreciprocity (NRC) model where the NRC variables vary slowly in time. By using our derived closed-form expressions, we study the influence of NRC on the max-min power control scheme. The analysis shows that the achievable downlink SE is only sensitive to the access points (APs) side phase non-reciprocity under pilot contamination and conjugate beamforming, hence the corresponding calibration can be simplified with practical feasibility. Simulation results illustrate that when considering any power control scheme, pilot contamination and NRC both reduce the SE performance while the former shows a greater effect. However, different power control schemes show different sensitivity to NRC. More precisely, the max-min scheme loses its superiority compared to the equal power scheme as the NRC increases. Our results are new and different from the extent CF power control schemes which consider perfect NRC.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127045990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580225
Huanchi Wang, He Fang, Xianbin Wang
With the increased deployment of the Unmanned Aerial Vehicles (UAVs) in both military and civilian fields, the authentication of the UAV surveillance and controlling data becomes critical due to the severe consequences of any forged data. With the highly dynamic operation environment, a flying UAV network may not be supported by the infrastructure network on the ground for security provision. Hence, it is vital to improving network security by utilizing on-site resources within a flying UAV swarm. In this paper, we utilize the physical-layer fingerprints to increase the difficulty for the attackers to impersonate the legitimate UAVs. A decentralized authentication scheme is proposed to avoid the single-point failure at the cluster head (CH) caused by the imperfect estimations. To mitigate the high computational cost of the decentralized authentication and to further improving the authentication accuracy, a situational-aware authentication customization algorithm is proposed at each UAV to compute the reliability of different attributes. Only the UAV with reliable attributes observations will contribute to the decentralized authentication process. Moreover, a soft authentication decision algorithm, which is compatible with customized regression models at each UAV, is proposed to further improve the system robustness. Hence, the proposed authentication algorithm can be customized at the system level and node level to maximize the overall authentication accuracy under a minimal extra computational cost based on the decentralized process. The simulation results demonstrate that our proposed scheme significantly increased the accuracy by comparing to the other state-of-the-art machine learning-aided physical-layer authentication schemes.
{"title":"Edge Intelligence Enabled Soft Decentralized Authentication in UAV Swarm","authors":"Huanchi Wang, He Fang, Xianbin Wang","doi":"10.1109/iccc52777.2021.9580225","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580225","url":null,"abstract":"With the increased deployment of the Unmanned Aerial Vehicles (UAVs) in both military and civilian fields, the authentication of the UAV surveillance and controlling data becomes critical due to the severe consequences of any forged data. With the highly dynamic operation environment, a flying UAV network may not be supported by the infrastructure network on the ground for security provision. Hence, it is vital to improving network security by utilizing on-site resources within a flying UAV swarm. In this paper, we utilize the physical-layer fingerprints to increase the difficulty for the attackers to impersonate the legitimate UAVs. A decentralized authentication scheme is proposed to avoid the single-point failure at the cluster head (CH) caused by the imperfect estimations. To mitigate the high computational cost of the decentralized authentication and to further improving the authentication accuracy, a situational-aware authentication customization algorithm is proposed at each UAV to compute the reliability of different attributes. Only the UAV with reliable attributes observations will contribute to the decentralized authentication process. Moreover, a soft authentication decision algorithm, which is compatible with customized regression models at each UAV, is proposed to further improve the system robustness. Hence, the proposed authentication algorithm can be customized at the system level and node level to maximize the overall authentication accuracy under a minimal extra computational cost based on the decentralized process. The simulation results demonstrate that our proposed scheme significantly increased the accuracy by comparing to the other state-of-the-art machine learning-aided physical-layer authentication schemes.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127176335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580436
Shuheng Lv, Shuaishuai Guo, Haixia Zhang
Recently, federated learning (FL) over wireless edge networks has aroused much research interest due to its merits in mitigating the privacy risks. On the basis of the standard FL, a federated averaging (FedAvg) learning algorithm emerges to reduce the communication rounds between the edge nodes and the central server. Even though the number of communication rounds of FedAvg learning is significantly reduced, exchanging all model parameters is still of heavy communication cost. To reduce the communication cost, this paper proposes a model compression method for FedAvg learning that adapts to the model weights distribution, namely distribution-aware weight compression (DAWC). In the proposed DAWC, we propose a parameter-oriented quantization algorithm (POQA) according to the distribution properties of different parameters of the model weights to iterate out the optimal quantization intervals, with the target of minimizing the mean square quantization errors. When the quantization is finished, Huffman coding is used to minimize the average code length. It is analyzed that FedAvg using the proposed DAWC converges at a fast speed. Experiment results show that DAWC exhibits the optimal performance in comparison with existing benchmarks.
{"title":"Distribution-Aware Weight Compression for Federated Averaging Learning Over Wireless Edge Networks","authors":"Shuheng Lv, Shuaishuai Guo, Haixia Zhang","doi":"10.1109/iccc52777.2021.9580436","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580436","url":null,"abstract":"Recently, federated learning (FL) over wireless edge networks has aroused much research interest due to its merits in mitigating the privacy risks. On the basis of the standard FL, a federated averaging (FedAvg) learning algorithm emerges to reduce the communication rounds between the edge nodes and the central server. Even though the number of communication rounds of FedAvg learning is significantly reduced, exchanging all model parameters is still of heavy communication cost. To reduce the communication cost, this paper proposes a model compression method for FedAvg learning that adapts to the model weights distribution, namely distribution-aware weight compression (DAWC). In the proposed DAWC, we propose a parameter-oriented quantization algorithm (POQA) according to the distribution properties of different parameters of the model weights to iterate out the optimal quantization intervals, with the target of minimizing the mean square quantization errors. When the quantization is finished, Huffman coding is used to minimize the average code length. It is analyzed that FedAvg using the proposed DAWC converges at a fast speed. Experiment results show that DAWC exhibits the optimal performance in comparison with existing benchmarks.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121671315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580214
Yu Zhang, Meijun Qu
Hybrid precoding can combat severe attenuation of the millimeter wave (mmWave) link by leveraging large-scale antenna array, while permitting practicable circuits with low power consumption and hardware cost. Although existing near-optimal algorithms have approached the performance of fully-digital precoding, their complexities are still very high. In this paper, we reconsider the problem of frequency selective hybrid precoding and propose an equivalent neural network architecture of point-to-point hybrid precoding for orthogonal frequency division multiplexing (OFDM) multi-input multi-output (MIMO) systems. Under this new architecture, the elements of the digital-and analog- precoders can be regarded as the connecting weights of a single hidden layer neural network. Inspired by the backpropagation (BP) algorithm in feedforward neural networks, we propose an adaptive gradient (AG)-based BP algorithm for hybrid precoding in this new architecture. The numerical simulation results demonstrate that the proposed algorithm can achieve the performance of the unconstrained fully-digital precoding with lower complexity compared with the the existing near-optimal alternating minimization algorithms.
{"title":"Frequency Selective Hybrid Precoding Based on Adaptive Gradient Algorithm in mmWave Systems","authors":"Yu Zhang, Meijun Qu","doi":"10.1109/iccc52777.2021.9580214","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580214","url":null,"abstract":"Hybrid precoding can combat severe attenuation of the millimeter wave (mmWave) link by leveraging large-scale antenna array, while permitting practicable circuits with low power consumption and hardware cost. Although existing near-optimal algorithms have approached the performance of fully-digital precoding, their complexities are still very high. In this paper, we reconsider the problem of frequency selective hybrid precoding and propose an equivalent neural network architecture of point-to-point hybrid precoding for orthogonal frequency division multiplexing (OFDM) multi-input multi-output (MIMO) systems. Under this new architecture, the elements of the digital-and analog- precoders can be regarded as the connecting weights of a single hidden layer neural network. Inspired by the backpropagation (BP) algorithm in feedforward neural networks, we propose an adaptive gradient (AG)-based BP algorithm for hybrid precoding in this new architecture. The numerical simulation results demonstrate that the proposed algorithm can achieve the performance of the unconstrained fully-digital precoding with lower complexity compared with the the existing near-optimal alternating minimization algorithms.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128153085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the continuous improving of performance of the IoT and mobile devices, a new type of machine learning architecture, federated learning came into being. And there is also an increasing need to implement artificial intelligence frameworks on edge nodes. In this paper, we propose a federated learning system deployed in edge computing network, which realizes the server part in distributed form and uses layered model aggregation and dynamic topology to reduce bandwidth usage and time consuming. The experiment shows the effectiveness of federated learning algorithm in our system. And simulation results show that the time cost of our system increases logarithmically with the number of nodes rather than linearly in the traditional system.
{"title":"Layered Model Aggregation based Federated Learning in Mobile Edge Networks","authors":"Qiming Cao, Xing Zhang, Yushun Zhang, Yongdong Zhu","doi":"10.1109/iccc52777.2021.9580403","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580403","url":null,"abstract":"With the continuous improving of performance of the IoT and mobile devices, a new type of machine learning architecture, federated learning came into being. And there is also an increasing need to implement artificial intelligence frameworks on edge nodes. In this paper, we propose a federated learning system deployed in edge computing network, which realizes the server part in distributed form and uses layered model aggregation and dynamic topology to reduce bandwidth usage and time consuming. The experiment shows the effectiveness of federated learning algorithm in our system. And simulation results show that the time cost of our system increases logarithmically with the number of nodes rather than linearly in the traditional system.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124601207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580208
Zhifan Ye, Zhengchun Zhou, P. Fan, Xianfu Lei, Zilong Liu, Xiaohu Tang
In this paper, a new concept called low/zero ambiguity zone (LAZ and ZAZ) for joint radar-communication signal design is introduced. The signals or code sequences having LAZ/ZAZ characteristics are desirable in modern communication and radar systems operating in high mobility environments especially in high frequency bands. Bounds on periodic LAZ/ZAZ of unimodular Doppler-resilient sequences (DRS) are derived, which include the existing bounds on periodic global ambiguity function as special cases. These bounds may be used as theoretical guidelines to measure the optimality of code sequence design. In addition, two classes of optimal constructions of DRSs with respect to the derived lower bounds on the ambiguity function are also presented.
{"title":"Signal Design with Low/Zero Ambiguity Zone Characteristics for Joint Radar-Communication Systems","authors":"Zhifan Ye, Zhengchun Zhou, P. Fan, Xianfu Lei, Zilong Liu, Xiaohu Tang","doi":"10.1109/iccc52777.2021.9580208","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580208","url":null,"abstract":"In this paper, a new concept called low/zero ambiguity zone (LAZ and ZAZ) for joint radar-communication signal design is introduced. The signals or code sequences having LAZ/ZAZ characteristics are desirable in modern communication and radar systems operating in high mobility environments especially in high frequency bands. Bounds on periodic LAZ/ZAZ of unimodular Doppler-resilient sequences (DRS) are derived, which include the existing bounds on periodic global ambiguity function as special cases. These bounds may be used as theoretical guidelines to measure the optimality of code sequence design. In addition, two classes of optimal constructions of DRSs with respect to the derived lower bounds on the ambiguity function are also presented.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125286343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580343
Siyu Fu, Zhiyuan Jiang, B. Han, H. Schotten
In recent years, vehicle platooning has been proven effective in reducing fuel consumption and carbon emissions, as well as increasing road capacity. Subsequently, with the assistance of wireless communication, there has been a qualitative leap in platooning performance, but then some drawbacks also emerge. First of all, for the drawback of packet loss and delay, this article proposes a prediction-assisted platooning mechanism, in which each vehicle establishes its local platoon model to predict the motion of other vehicles, thereby reducing information latency. Then for the malicious data on communication, a detection algorithm based on several indicators is carried out. Finally, the advantages of the proposed platooning mechanism and detection algorithm are verified on a joint simulation platform that combines communication and traffic control. Furthermore, the verification results are more authentic and reliable due to the consideration of imperfections of realistic perception and interaction.
{"title":"Detection of Data Injection Attacks on Predictive Vehicle Platooning","authors":"Siyu Fu, Zhiyuan Jiang, B. Han, H. Schotten","doi":"10.1109/iccc52777.2021.9580343","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580343","url":null,"abstract":"In recent years, vehicle platooning has been proven effective in reducing fuel consumption and carbon emissions, as well as increasing road capacity. Subsequently, with the assistance of wireless communication, there has been a qualitative leap in platooning performance, but then some drawbacks also emerge. First of all, for the drawback of packet loss and delay, this article proposes a prediction-assisted platooning mechanism, in which each vehicle establishes its local platoon model to predict the motion of other vehicles, thereby reducing information latency. Then for the malicious data on communication, a detection algorithm based on several indicators is carried out. Finally, the advantages of the proposed platooning mechanism and detection algorithm are verified on a joint simulation platform that combines communication and traffic control. Furthermore, the verification results are more authentic and reliable due to the consideration of imperfections of realistic perception and interaction.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117018081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580215
Xiaoyu Yang, Xiaoxiao Xian, Hui Gao
This paper studies the robust beamforming design for reconfigurable intelligent surface (RIS) assisted multicell wireless networks, where a RIS is deployed at the edge of cells to assist the joint processing coordinated multipoint transmission from multiple base stations (BSs) to multiple cell-edge users. Considering the imperfect cascade channel state information, we aim to minimize the total transmit power by jointly optimizing the transmit beamforming at the BSs and the phase shifts at the RIS, while satisfying the BSs' individual power constraints and users' worst case target rate constraint. To solve this nonconvex problem of complex coupling of variables, we decouple it into two sub-problems and introduce an alternating optimization framework. The transmit beamforming sub-problem can be recast in a convex form by using the S-Procedure and semidefinite relaxation techniques, when fixing the phase shifts. Subsequently, we transform the phase shifts sub-problem into an object-specific optimization problem, and then an iterative algorithm based on bisection method is proposed to obtain the solution. Simulation results show that the proposed robust beamforming design can converge rapidly and outperforms the reference scheme.
{"title":"Robust Beamforming for Reconfigurable Intelligent Surface Aided Coordinated Multipoint Transmission","authors":"Xiaoyu Yang, Xiaoxiao Xian, Hui Gao","doi":"10.1109/iccc52777.2021.9580215","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580215","url":null,"abstract":"This paper studies the robust beamforming design for reconfigurable intelligent surface (RIS) assisted multicell wireless networks, where a RIS is deployed at the edge of cells to assist the joint processing coordinated multipoint transmission from multiple base stations (BSs) to multiple cell-edge users. Considering the imperfect cascade channel state information, we aim to minimize the total transmit power by jointly optimizing the transmit beamforming at the BSs and the phase shifts at the RIS, while satisfying the BSs' individual power constraints and users' worst case target rate constraint. To solve this nonconvex problem of complex coupling of variables, we decouple it into two sub-problems and introduce an alternating optimization framework. The transmit beamforming sub-problem can be recast in a convex form by using the S-Procedure and semidefinite relaxation techniques, when fixing the phase shifts. Subsequently, we transform the phase shifts sub-problem into an object-specific optimization problem, and then an iterative algorithm based on bisection method is proposed to obtain the solution. Simulation results show that the proposed robust beamforming design can converge rapidly and outperforms the reference scheme.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115169253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, blockchain-based transactive energy systems are introduced into energy trading scenarios which efficiently alleviates drawbacks in centralized energy trading systems such as low compatibility, poor flexibility, and single point of failure. Nevertheless, there still exists performance bottlenecks such as privacy leakage and low trading throughput, which limits the wide application of the blockchain-based energy system to the real world. To solve these concerns, this paper proposes a privacy-preserving cross-chain payment scheme for blockchain-based energy trading. We firstly adopt a stealthy communication algorithm to hide data privacy and transaction privacy during energy trading. Then, we apply the optimized-version hash-locking method to construct the cross-chain payment channel for two-way anchored transactions, which enhances the payment efficiency and hides the trading connection between the trading participants. Moreover, we use non-interactive zero-knowledge (NIZK) to ensure privacy-preserving payment verification. The evaluation results demonstrate that our scheme can effectively protect privacy for cross-chain payment in energy trading systems.
{"title":"Privacy-Preserving Cross-Chain Payment Scheme for Blockchain-Enabled Energy Trading","authors":"Xiaoyan Zhang, Jingwei Chen, Yong Zhou, Shunrong Jiang","doi":"10.1109/iccc52777.2021.9580292","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580292","url":null,"abstract":"Recently, blockchain-based transactive energy systems are introduced into energy trading scenarios which efficiently alleviates drawbacks in centralized energy trading systems such as low compatibility, poor flexibility, and single point of failure. Nevertheless, there still exists performance bottlenecks such as privacy leakage and low trading throughput, which limits the wide application of the blockchain-based energy system to the real world. To solve these concerns, this paper proposes a privacy-preserving cross-chain payment scheme for blockchain-based energy trading. We firstly adopt a stealthy communication algorithm to hide data privacy and transaction privacy during energy trading. Then, we apply the optimized-version hash-locking method to construct the cross-chain payment channel for two-way anchored transactions, which enhances the payment efficiency and hides the trading connection between the trading participants. Moreover, we use non-interactive zero-knowledge (NIZK) to ensure privacy-preserving payment verification. The evaluation results demonstrate that our scheme can effectively protect privacy for cross-chain payment in energy trading systems.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124899482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580278
Jing Xu, Jie Yang, Shi Jin, Bo Gao
In the development of mobile communication systems, localization has become a desirable feature. Channel state information (CSI)-based localization proves extra promising due to the fact that CSI measurement is already a built-in function in most wireless communication systems, which allows a cost-effective integrated design of communication and localization. However, robust localization methods in this novel integrated architecture are yet largely explored. In this paper, we propose a simultaneous user location and velocity estimation algorithm based on the multi-path CSI model. Specially, we first extend the newtonized orthogonal matching pursuit algorithm to extract propagation paths and corresponding channel parameters from the uplink CSI. Then, line-of-sight components are selected out and a weighted least square estimator is built accordingly. We finally propose a channel tracking module to accelerate the algorithm in applications where continuous estimating is required. Simulations show that the proposed algorithm is able to provide accurate location and velocity estimations within a few seconds.
{"title":"CSI-based Simultaneous Location and Velocity Estimation in mmWave Systems","authors":"Jing Xu, Jie Yang, Shi Jin, Bo Gao","doi":"10.1109/iccc52777.2021.9580278","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580278","url":null,"abstract":"In the development of mobile communication systems, localization has become a desirable feature. Channel state information (CSI)-based localization proves extra promising due to the fact that CSI measurement is already a built-in function in most wireless communication systems, which allows a cost-effective integrated design of communication and localization. However, robust localization methods in this novel integrated architecture are yet largely explored. In this paper, we propose a simultaneous user location and velocity estimation algorithm based on the multi-path CSI model. Specially, we first extend the newtonized orthogonal matching pursuit algorithm to extract propagation paths and corresponding channel parameters from the uplink CSI. Then, line-of-sight components are selected out and a weighted least square estimator is built accordingly. We finally propose a channel tracking module to accelerate the algorithm in applications where continuous estimating is required. Simulations show that the proposed algorithm is able to provide accurate location and velocity estimations within a few seconds.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}