Pub Date : 2020-12-14DOI: 10.1109/ANTS50601.2020.9342822
Kratika Sharma, Saumya Bhadauria
MANETs are wireless networks, providing properties such as self-configuration, mobility, and flexibility to the network, which make them a popular and widely used technique. As the usage and popularity of the networks increases, security becomes the most important factor to be concerned. For the sake of security, several protocols and methodologies have been developed for the networks. Along with the increase in security mechanisms, the number of attacks and attackers also increases and hence the threat to the network and secure communication within it increases as well. Some of the attacks have been resolved by the proposed methodologies but some are still a severe threat to the framework, one such attack is Black Hole Attack. The proposed work integrates the SUPERMAN (Security Using Pre-Existing Routing for Mobile Ad-hoc Networks) framework with appropriate methodology to detect and prevent the network from the Black Hole Attack. The mechanism is based on the AODV (Ad-hoc On-demand Distance Vector) routing protocol. In the methodology, the source node uses two network routes, from the source to the destination, one for sending the data packet and another for observing the intermediate nodes of the initial route. If any node is found to be a Black Hole node, then the route is dropped and the node is added to the Black Hole list and a new route to send the data packet to the destination is discovered.
{"title":"Detection and Prevention of Black Hole Attack in SUPERMAN","authors":"Kratika Sharma, Saumya Bhadauria","doi":"10.1109/ANTS50601.2020.9342822","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342822","url":null,"abstract":"MANETs are wireless networks, providing properties such as self-configuration, mobility, and flexibility to the network, which make them a popular and widely used technique. As the usage and popularity of the networks increases, security becomes the most important factor to be concerned. For the sake of security, several protocols and methodologies have been developed for the networks. Along with the increase in security mechanisms, the number of attacks and attackers also increases and hence the threat to the network and secure communication within it increases as well. Some of the attacks have been resolved by the proposed methodologies but some are still a severe threat to the framework, one such attack is Black Hole Attack. The proposed work integrates the SUPERMAN (Security Using Pre-Existing Routing for Mobile Ad-hoc Networks) framework with appropriate methodology to detect and prevent the network from the Black Hole Attack. The mechanism is based on the AODV (Ad-hoc On-demand Distance Vector) routing protocol. In the methodology, the source node uses two network routes, from the source to the destination, one for sending the data packet and another for observing the intermediate nodes of the initial route. If any node is found to be a Black Hole node, then the route is dropped and the node is added to the Black Hole list and a new route to send the data packet to the destination is discovered.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114409443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/ANTS50601.2020.9342781
Prativa Rai, M. Ghose, H. Sarma
Cognitive Radio enabled Wireless Sensor Network has attracted researchers in present time. Channel allocation in such a network is a challenging task. Game Theory (GT) may also be applied to solve such issues and limited literature is available on this. However, while designing games for channel allocation, the choice of utility function plays an important role to meet higher performance levels by the channel allocation algorithm. In this paper, the impact of various utility functions which may be used in GT based channel allocation algorithms is explored. The entire process of assigning channels to different nodes through game-based allocation has been detailed. Simulations results are reported showing the performance of three different utility functions which may be used in game-based channel allocation. Future scopes of the work are outlined.
{"title":"An Analysis on the Impact of Utility Functions on the Performance of Game Theory Based Channel Allocation in Cognitive Radio Wireless Sensor Network","authors":"Prativa Rai, M. Ghose, H. Sarma","doi":"10.1109/ANTS50601.2020.9342781","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342781","url":null,"abstract":"Cognitive Radio enabled Wireless Sensor Network has attracted researchers in present time. Channel allocation in such a network is a challenging task. Game Theory (GT) may also be applied to solve such issues and limited literature is available on this. However, while designing games for channel allocation, the choice of utility function plays an important role to meet higher performance levels by the channel allocation algorithm. In this paper, the impact of various utility functions which may be used in GT based channel allocation algorithms is explored. The entire process of assigning channels to different nodes through game-based allocation has been detailed. Simulations results are reported showing the performance of three different utility functions which may be used in game-based channel allocation. Future scopes of the work are outlined.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115052087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/ANTS50601.2020.9342767
A. Prabhakar, T. Anjali
Access control mechanism in IoT is a challenge in itself owing to the massive scale and heterogeneity of IoT devices that are connected. The task becomes more difficult when there are resource-constrained devices in the network. Employing a resourceful trusted third party as a centralized authority for access control and storage of data is no more an ideal solution due to possible breach of privacy and single point of failure. It also hampers the scalability of the IoT system. The On-demand Trust-based Access Control(OTAC) framework proposes a distributed trust-based blockchain model optimized for access control in resource-constrained environments. OTAC offers a differential level of security and privacy on a demand basis. The hierarchical structure of OTAC framework gives it a decentralized architecture. OTAC uses a customized trust-based consensus, immune to Byzantine attack and hence gives it an edge over other blockchain-based access control schemes.
{"title":"A Novel On-demand Trust-based Access Control Framework for Resource-constrained IoT System","authors":"A. Prabhakar, T. Anjali","doi":"10.1109/ANTS50601.2020.9342767","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342767","url":null,"abstract":"Access control mechanism in IoT is a challenge in itself owing to the massive scale and heterogeneity of IoT devices that are connected. The task becomes more difficult when there are resource-constrained devices in the network. Employing a resourceful trusted third party as a centralized authority for access control and storage of data is no more an ideal solution due to possible breach of privacy and single point of failure. It also hampers the scalability of the IoT system. The On-demand Trust-based Access Control(OTAC) framework proposes a distributed trust-based blockchain model optimized for access control in resource-constrained environments. OTAC offers a differential level of security and privacy on a demand basis. The hierarchical structure of OTAC framework gives it a decentralized architecture. OTAC uses a customized trust-based consensus, immune to Byzantine attack and hence gives it an edge over other blockchain-based access control schemes.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"24 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116639108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/ANTS50601.2020.9342794
Nabajyoti Nath, Sanya Anees
A $mathcal{T} times mathcal{R}$ multiple-input multiple-output (MIMO) based underwater wireless optical communication (UWOC) system employing Intensity Modulation (IM) / Direct Detection (DD) with On-Off keying (OOK) is considered. The UWOC channel is affected by underwater optical turbulence (UOT), which is modeled by Exponential Generalized Gamma (EGG) distribution. The performance of UWOC system is highly dependent on the effect of absorption, scattering and UOT. The EGG underwater optical channel model efficiently describes the optical irradiance induced due to air bubbles, temperature gradient and salinity, thus works well for the entire weak to strong turbulence regimes. The information is sent by $mathcal{T}$ transmit apertures and received by $mathcal{R}$ receiver apertures. The bit error rate (BER) analysis is performed for single-input multiple-output (SIMO), multiple-input single-output (MISO) and MIMO configurations for OOK modulation scheme. The closed form BER expression is derived for the SIMO case. For different channel parameters and configurations, the results for the BER performance of SIMO-UWOC and single-input single-output (SISO)-UWOC systems are obtained. For bubble level (BL) 2.4 litres/min and fresh water scenario, 15 dB performance improvement is seen at 10−2 BER for 1 × 2 SIMO with respect to SISO configuration.
{"title":"Performance Analysis of SIMO-UWOC System","authors":"Nabajyoti Nath, Sanya Anees","doi":"10.1109/ANTS50601.2020.9342794","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342794","url":null,"abstract":"A $mathcal{T} times mathcal{R}$ multiple-input multiple-output (MIMO) based underwater wireless optical communication (UWOC) system employing Intensity Modulation (IM) / Direct Detection (DD) with On-Off keying (OOK) is considered. The UWOC channel is affected by underwater optical turbulence (UOT), which is modeled by Exponential Generalized Gamma (EGG) distribution. The performance of UWOC system is highly dependent on the effect of absorption, scattering and UOT. The EGG underwater optical channel model efficiently describes the optical irradiance induced due to air bubbles, temperature gradient and salinity, thus works well for the entire weak to strong turbulence regimes. The information is sent by $mathcal{T}$ transmit apertures and received by $mathcal{R}$ receiver apertures. The bit error rate (BER) analysis is performed for single-input multiple-output (SIMO), multiple-input single-output (MISO) and MIMO configurations for OOK modulation scheme. The closed form BER expression is derived for the SIMO case. For different channel parameters and configurations, the results for the BER performance of SIMO-UWOC and single-input single-output (SISO)-UWOC systems are obtained. For bubble level (BL) 2.4 litres/min and fresh water scenario, 15 dB performance improvement is seen at 10−2 BER for 1 × 2 SIMO with respect to SISO configuration.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125760308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/ANTS50601.2020.9342811
K. Jindal, Rishu Raj, A. Dixit
In this paper, we improve the fairness of non-orthogonal multiple access (NOMA) by proposing a power allocation scheme that ensures all users experience the same bit error rate (BER) irrespective of their channel conditions. We also derive analytical expressions for the BER obtained using this novel power allocation scheme by applying it to a downlink NOMA-based visible light communication (VLC) system. The numerically simulated results for different scenarios match the analytical results, thereby validating the derived power allocation expression. Finally, we demonstrate a significant improvement in the fairness of NOMA for our novel power allocation scheme compared to the existing gain ratio power allocation and normalized gain difference power allocation schemes.
{"title":"On Improving the Fairness of NOMA-Based Indoor Visible Light Communication System","authors":"K. Jindal, Rishu Raj, A. Dixit","doi":"10.1109/ANTS50601.2020.9342811","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342811","url":null,"abstract":"In this paper, we improve the fairness of non-orthogonal multiple access (NOMA) by proposing a power allocation scheme that ensures all users experience the same bit error rate (BER) irrespective of their channel conditions. We also derive analytical expressions for the BER obtained using this novel power allocation scheme by applying it to a downlink NOMA-based visible light communication (VLC) system. The numerically simulated results for different scenarios match the analytical results, thereby validating the derived power allocation expression. Finally, we demonstrate a significant improvement in the fairness of NOMA for our novel power allocation scheme compared to the existing gain ratio power allocation and normalized gain difference power allocation schemes.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129950915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
4G communications were ruling the entire world with its high-speed network; however, if the users increased, then its speed gets decreased. The 5G model developed, and its rate of data is higher than the 4G frame model. Also, the dense weight node in the cellular network consumed more energy that tends to signal failure. So to make the 5G mobile communications efficient, the present article aimed to develop a novel Grey Wolf (GW) clustering model to choose the cluster head. Moreover, the codeword selection refined by a novel Generalized Intelligent Fuzzy (GIF) mode. Finally, the predictive model as a novel African Buffalo-based Recurrent Model (ABRM) deep learning model developed as the predictive model for continuous multiuser (MU) prediction and monitoring. Subsequently, the data transferred effectively, and its success rate is evaluated with existing models our proposed model gained an excellent outcome by attaining 98.8% of accuracy and reduced complexity rate as 17%.
{"title":"A Novel Frame model for Cluster Head Selection and Codeword Detection in the 5G Cellular Networks","authors":"Venkata Sunil Reddy Timmareddy, S. Badri, Vijay Bhaskar Reddy Chintakunta, Rishabh Mohta, Kalpana Vattikunta","doi":"10.1109/ANTS50601.2020.9342829","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342829","url":null,"abstract":"4G communications were ruling the entire world with its high-speed network; however, if the users increased, then its speed gets decreased. The 5G model developed, and its rate of data is higher than the 4G frame model. Also, the dense weight node in the cellular network consumed more energy that tends to signal failure. So to make the 5G mobile communications efficient, the present article aimed to develop a novel Grey Wolf (GW) clustering model to choose the cluster head. Moreover, the codeword selection refined by a novel Generalized Intelligent Fuzzy (GIF) mode. Finally, the predictive model as a novel African Buffalo-based Recurrent Model (ABRM) deep learning model developed as the predictive model for continuous multiuser (MU) prediction and monitoring. Subsequently, the data transferred effectively, and its success rate is evaluated with existing models our proposed model gained an excellent outcome by attaining 98.8% of accuracy and reduced complexity rate as 17%.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"22 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131077787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/ANTS50601.2020.9342788
M. S. Chaudhari, S. Majhi
The adaptive communication system is going to play a major role for fifth-generation (5G) and beyond wireless communication where the physical layer signal parameters need to be changed at the transmitters as per system requirement and the receiver needs to estimate them to recover the signal. In this paper, we have proposed an efficient and robust automated symbol rate estimation model for single carrier system over frequency-selective fading environment by using deep neural network (DNN) approach. The proposed scheme estimates symbol rate without having any prior knowledge of the signal bandwidth which was the main assumption for existing statistical methods. In the proposed scheme, no additional knowledge such as channel state information (CSI) and synchronization parameters are required to estimate the symbol rate. The proposed model outperforms the existing statistical models in terms of the performance. The performance of the symbol rate estimator is depicted by the normalized mean square error (NMSE).
{"title":"Automated Symbol Rate Estimation Over Frequency-Selective Fading Channel by Using Deep Neural Network","authors":"M. S. Chaudhari, S. Majhi","doi":"10.1109/ANTS50601.2020.9342788","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342788","url":null,"abstract":"The adaptive communication system is going to play a major role for fifth-generation (5G) and beyond wireless communication where the physical layer signal parameters need to be changed at the transmitters as per system requirement and the receiver needs to estimate them to recover the signal. In this paper, we have proposed an efficient and robust automated symbol rate estimation model for single carrier system over frequency-selective fading environment by using deep neural network (DNN) approach. The proposed scheme estimates symbol rate without having any prior knowledge of the signal bandwidth which was the main assumption for existing statistical methods. In the proposed scheme, no additional knowledge such as channel state information (CSI) and synchronization parameters are required to estimate the symbol rate. The proposed model outperforms the existing statistical models in terms of the performance. The performance of the symbol rate estimator is depicted by the normalized mean square error (NMSE).","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128696841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/ANTS50601.2020.9342763
Sree Krishna Das, Ratna Mudi
Fifth-generation (5G) permits user equipments (UEs) to communicate directly with one another for providing better service to the increasing number of UEs by reducing power consumption and improving resource efficiency (RE). As machine-to-machine (M2M) UEs (MUEs) use resource blocks (RBs) and produce interference, therefore how to assign the RBs properly is crucial. Hence, to locate an unknown machine (UM) in 5G is essential for facilitating the proper spectrum reuse in M2M communications. This paper proposes a location-aware mode selection based RE and energy efficiency (EE) optimization process for M2M communications over cellular networks using orthogonal resource sharing scheme. Firstly we develop a location-aware water filing algorithm based RE optimization process for cellular user equipments (CUEs) and EE optimization process for MUEs. RE optimization process provides available resources for CUE and then M2M pair reuses the residual spectrum in the proposed network. As a result, the water filling algorithm reduces the power consumption of UE as well as ensures satisfactory data rate which improves the EE. The proposed network is evaluated using extensive MATLAB simulation results which demonstrate that the proposed scheme provides a substantial improvement of the system performance.
{"title":"A Location-Aware Energy-Efficient Scheme for M2M Communications by Resource Efficiency Optimization","authors":"Sree Krishna Das, Ratna Mudi","doi":"10.1109/ANTS50601.2020.9342763","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342763","url":null,"abstract":"Fifth-generation (5G) permits user equipments (UEs) to communicate directly with one another for providing better service to the increasing number of UEs by reducing power consumption and improving resource efficiency (RE). As machine-to-machine (M2M) UEs (MUEs) use resource blocks (RBs) and produce interference, therefore how to assign the RBs properly is crucial. Hence, to locate an unknown machine (UM) in 5G is essential for facilitating the proper spectrum reuse in M2M communications. This paper proposes a location-aware mode selection based RE and energy efficiency (EE) optimization process for M2M communications over cellular networks using orthogonal resource sharing scheme. Firstly we develop a location-aware water filing algorithm based RE optimization process for cellular user equipments (CUEs) and EE optimization process for MUEs. RE optimization process provides available resources for CUE and then M2M pair reuses the residual spectrum in the proposed network. As a result, the water filling algorithm reduces the power consumption of UE as well as ensures satisfactory data rate which improves the EE. The proposed network is evaluated using extensive MATLAB simulation results which demonstrate that the proposed scheme provides a substantial improvement of the system performance.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Millimeter-wave (mmWave) assisted device-to-device (D2D) communications system has evolved as a promising technology for the fifth-generation (5G) and beyond cellular networks. The demand for ultra-high data rate and increased spectral efficiency has been an impetus for leveraging the benefits of mmWave assisted D2D communications. Hence, the integration of non-orthogonal multiple access (NOMA) and full-duplex (FD) communications with mmWave assisted D2D communications has become an essential part of 5G and beyond cellular networks to support the high capacity demand of emerging technologies. This paper proposes a mmWave assisted FD cooperative D2D (C-D2D) system utilizing the properties of NOMA, wherein a D2D transmitter (DT) acts as an FD relay which decodes the cellular uplink transmission and forwards the superimposed signal consisting of cellular as well as D2D user’s data to D2D receiver (DR) and the base station (BS). The decoding of respective signals at the BS and DR is done utilizing the successive interference cancellation (SIC) property of NOMA. We have considered that each node is equipped with directional antennas capable of beamforming. Closed-form expressions of cellular and D2D outage probabilities have been derived and verified with the help of simulations. Results show the variation of cellular and D2D outage probabilities with respect to the various transmission distances and the power splitting factor (α), and an optimum value of α has been shown.
{"title":"Outage Analysis of Millimeter Wave Assisted Full-Duplex Cooperative D2D communications System with Non-orthogonal Multiple Access","authors":"Rahul Bajpai, Kshitij Nawandar, Sharad Nag, Naveen Gupta","doi":"10.1109/ANTS50601.2020.9342774","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342774","url":null,"abstract":"Millimeter-wave (mmWave) assisted device-to-device (D2D) communications system has evolved as a promising technology for the fifth-generation (5G) and beyond cellular networks. The demand for ultra-high data rate and increased spectral efficiency has been an impetus for leveraging the benefits of mmWave assisted D2D communications. Hence, the integration of non-orthogonal multiple access (NOMA) and full-duplex (FD) communications with mmWave assisted D2D communications has become an essential part of 5G and beyond cellular networks to support the high capacity demand of emerging technologies. This paper proposes a mmWave assisted FD cooperative D2D (C-D2D) system utilizing the properties of NOMA, wherein a D2D transmitter (DT) acts as an FD relay which decodes the cellular uplink transmission and forwards the superimposed signal consisting of cellular as well as D2D user’s data to D2D receiver (DR) and the base station (BS). The decoding of respective signals at the BS and DR is done utilizing the successive interference cancellation (SIC) property of NOMA. We have considered that each node is equipped with directional antennas capable of beamforming. Closed-form expressions of cellular and D2D outage probabilities have been derived and verified with the help of simulations. Results show the variation of cellular and D2D outage probabilities with respect to the various transmission distances and the power splitting factor (α), and an optimum value of α has been shown.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121678815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/ANTS50601.2020.9342821
Dattaraj Raut Mulgaonkar, Diwakar Sharma, R. Mehrotra, T. Vrind
Availability of wide bandwidth makes mmWave spectrum in 26 and 28 GHz an attractive candidate for terrestrial cellular and satellite services. Dividing the spectrum into parts for each service proportionally shrinks the available resources for each service, thus co-existence of competing service in mmWave band is an indispensable subject to maximize usage of the spectrum. However, in the available literature co-existence has not been explored adequately for deployed technologies in satellite and terrestrial cellular communication. We have evaluated interference on satellite services in 26/28 GHz, which originates from the 5G terrestrial cellular network. To the best of our knowledge, for the first time in this paper, we have proposed interference mitigation mechanism for operating satellite communication in both space to earth (S-E) and earth to space (E-S) scenarios. In the S-E scenario, where 5G stations (base station and User Equipment (UE)) create interference on satellite earth stations, we have proposed applying (a) site shielding, and (b) beam nulling and power adaptation (BNAP) at 5G base stations to mitigate interference. In E-S scenario, where 5G stations create interference at the satellite space station, we have proposed applying (i) BNAP at the UE, (ii) Transmit Time Interval (TTI) bundling with reduced uplink transmission power at the UE, and (iii) localized deployment for the 5G base station to mitigate interference. Through extensive analytical modelling and simulations, we show that the proposed interference mitigation techniques can provide 10-20dB interference reduction and offer better co-existence for satellite and terrestrial services in the mmWave spectrum.
{"title":"Advanced Mechanisms for Satellite and Terrestrial Co-existence in 26/28 GHz mmWave spectrum","authors":"Dattaraj Raut Mulgaonkar, Diwakar Sharma, R. Mehrotra, T. Vrind","doi":"10.1109/ANTS50601.2020.9342821","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342821","url":null,"abstract":"Availability of wide bandwidth makes mmWave spectrum in 26 and 28 GHz an attractive candidate for terrestrial cellular and satellite services. Dividing the spectrum into parts for each service proportionally shrinks the available resources for each service, thus co-existence of competing service in mmWave band is an indispensable subject to maximize usage of the spectrum. However, in the available literature co-existence has not been explored adequately for deployed technologies in satellite and terrestrial cellular communication. We have evaluated interference on satellite services in 26/28 GHz, which originates from the 5G terrestrial cellular network. To the best of our knowledge, for the first time in this paper, we have proposed interference mitigation mechanism for operating satellite communication in both space to earth (S-E) and earth to space (E-S) scenarios. In the S-E scenario, where 5G stations (base station and User Equipment (UE)) create interference on satellite earth stations, we have proposed applying (a) site shielding, and (b) beam nulling and power adaptation (BNAP) at 5G base stations to mitigate interference. In E-S scenario, where 5G stations create interference at the satellite space station, we have proposed applying (i) BNAP at the UE, (ii) Transmit Time Interval (TTI) bundling with reduced uplink transmission power at the UE, and (iii) localized deployment for the 5G base station to mitigate interference. Through extensive analytical modelling and simulations, we show that the proposed interference mitigation techniques can provide 10-20dB interference reduction and offer better co-existence for satellite and terrestrial services in the mmWave spectrum.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}