![]() ; Lei, Lei ![]() ![]() in IEEE Wireless Communications and Networking Conference (WCNC) 2020 (2020, May) Detailed reference viewed: 65 (0 UL)![]() Vu, Thang Xuan ![]() ![]() ![]() in IEEE Wireless Communications and Networking Conference (WCNC), Seoul, 25-38 May 2020 (2020, May) In this paper, we investigate the performance of simultaneous wireless information and power transfer (SWIPT) multiuser systems, in which a base station serves a set of users with both information and ... [more ▼] In this paper, we investigate the performance of simultaneous wireless information and power transfer (SWIPT) multiuser systems, in which a base station serves a set of users with both information and energy simultaneously via a power splitting (PS) mechanism. To capture realistic scenarios, a nonlinear energy harvesting (EH) model is considered. In particular, we jointly design the PS factors and the beamforming vectors in order to maximize the total harvested energy, subjected to rate requirements and a total transmit power budget. To deal with the inherent non-convexity of the formulated problem, an iterative optimization algorithm is proposed based on the inner approximation method and semidefinite relaxation (SDR), whose convergence is theoretically guaranteed. Numerical results show that the proposed scheme significantly outperforms the baseline max-min based SWIPT multicast and fixed-power PS designs. [less ▲] Detailed reference viewed: 200 (2 UL)![]() Alves Martins, Wallace ![]() ![]() ![]() in International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2020), Barcelona 4-8 May 2020 (2020, May) This paper tackles the problem of both multi-user and intersymbol interference stemming from co-channel users transmitting at a faster-than-Nyquist (FTN) rate in multi-antenna downlink transmissions. We ... [more ▼] This paper tackles the problem of both multi-user and intersymbol interference stemming from co-channel users transmitting at a faster-than-Nyquist (FTN) rate in multi-antenna downlink transmissions. We propose a framework for redundant block-based symbol-level precoders enabling the trade-off between constructive and destructive multi-user and interblock interference (IBI) effects at the single-antenna user terminals. Redundant elements are added as guard interval to handle IBI destructive effects. It is shown that, within this framework, accelerating the transmissions via FTN signaling improves the error-free spectral efficiency, up to a certain acceleration factor beyond which the transmitted information cannot be perfectly recovered by linear filtering followed by sampling. Simulation results corroborate that the proposed spatiotemporal symbol-level precoding can change the amount of added redundancy from zero (full IBI) to half (IBI-free) the equivalent channel order, so as to achieve a target balance between spectral and energy efficiencies. [less ▲] Detailed reference viewed: 146 (10 UL)![]() Lei, Lei ![]() ![]() ![]() in IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020, May) Detailed reference viewed: 217 (38 UL)![]() Mayouche, Abderrahmane ![]() ![]() ![]() in IEEE Open Journal of the Communications Society (2020), 1 In this work, we introduce a machine-learning (ML) based detection attack, where an eavesdropper (Eve) is able to learn the symbol detection function based on precoded pilots. With this ability, an Eve ... [more ▼] In this work, we introduce a machine-learning (ML) based detection attack, where an eavesdropper (Eve) is able to learn the symbol detection function based on precoded pilots. With this ability, an Eve can correctly detect symbols with a high probability. To counteract this attack, we propose a novel symbol-level precoding (SLP) scheme that enhances physical-layer security (PLS) while guaranteeing a constructive interference effect at the intended users. Contrary to conventional SLP schemes, the proposed scheme is robust to the ML-based attack. In particular, the proposed scheme enhances security by designing Eve's received signal to lie at the boundaries of the detection regions. This distinct design causes Eve's detection decisions to be based almost purely on noise. The proposed countermeasure is then extended to account for multi-antennas at the Eve and also for multi-level modulation schemes. In the numerical results, we validate both the detection attack and the countermeasures and show that this gain in security can be achieved at the expense of only a small additional power consumption at the transmitter, and more importantly, these benefits are obtained without affecting the performance at the intended user. [less ▲] Detailed reference viewed: 86 (6 UL)![]() ; ; et al in IEEE Communications Magazine (2020), 58(4), 81-87 IoT is emerging as the future evolution of the Internet, aiming to provide connectivity for everyone and everything. Since IoT is expected to carry important and private information, a high level of PHY ... [more ▼] IoT is emerging as the future evolution of the Internet, aiming to provide connectivity for everyone and everything. Since IoT is expected to carry important and private information, a high level of PHY security is critical for wireless communications in IoT, as a complement for traditional security techniques that are employed at high layers. In this overview, we examine the recent interest in energy-efficient and cost-efficient PHY solutions for securing downlink IoT transmission through interference exploitation. This exciting line of research departs from conventional interference cancellation, and judiciously employs the inherent interference as a useful element for LUs while obstructing the eavesdropping of information. We first discuss the concept of CI, and then elaborate the fundamental CI signal design that employs the traditionally undesired interference as a constructive element to LUs while ensuring they are destructive to potential Eves. Subsequently, we illustrate several low-hardware-cost techniques to inherit the advantage of CI in an energy- and cost-efficient manner, from the perspective of HBF and DM. This family of techniques brings a disruptive vision of interference management for securing wireless communications with an eye on low-cost and hardware-constrained devices tailored for IoT systems. [less ▲] Detailed reference viewed: 94 (4 UL)![]() Haqiqatnejad, Alireza ![]() ![]() ![]() in IEEE Transactions on Signal Processing (2020), 68(1), 1837-1852 In this paper, we address robust design of symbol-level precoding (SLP) for the downlink of multiuser multiple-input single-output wireless channels, when imperfect channel state information (CSI) is ... [more ▼] In this paper, we address robust design of symbol-level precoding (SLP) for the downlink of multiuser multiple-input single-output wireless channels, when imperfect channel state information (CSI) is available at the transmitter. In particular, we consider a well known model for the CSI imperfection, namely, stochastic Gaussian-distributed uncertainty. Our design objective is to minimize the total (per-symbol) transmission power subject to constructive interference (CI) constraints as well as the users’ quality-of-service requirements in terms of signal-to-interference-plus-noise ratio. Assuming stochastic channel uncertainties, we first define probabilistic CI constraints in order to achieve robustness to statistically known CSI errors. Since these probabilistic constraints are difficult to handle, we resort to their convex approximations in the form of tractable (deterministic) robust constraints. Three convex approximations are obtained based on different conservatism levels, among which one is introduced as a benchmark for comparison. We show that each of our proposed approximations is tighter than the other under specific robustness settings, while both of them always outperform the benchmark. Using the proposed CI constraints, we formulate the robust SLP optimization problem as a second-order cone program. Extensive simulation results are provided to validate our analytic discussions and to make comparisons with conventional block-level robust precoding schemes. We show that the robust design of symbol-level precoder leads to an improved performance in terms of energy efficiency at the cost of increasing the computational complexity by an order of the number of users in the large system limit, compared to its non-robust counterpart. [less ▲] Detailed reference viewed: 146 (22 UL)![]() Korrai, Praveenkumar ![]() ![]() ![]() in IEEE Access (2020) Enhanced mobile broadband (eMBB) and ultra-reliable and low-latency communications (URLLC) are the two main expected services in the next generation of wireless networks. Accommodation of these two ... [more ▼] Enhanced mobile broadband (eMBB) and ultra-reliable and low-latency communications (URLLC) are the two main expected services in the next generation of wireless networks. Accommodation of these two services on the same wireless infrastructure leads to a challenging resource allocation problem due to their heterogeneous specifications. To address this problem, slicing has emerged as an architecture that enables a logical network with specific radio access functionality to each of the supported services on the same network infrastructure. The allocation of radio resources to each slice according to their requirements is a fundamental part of the network slicing that is usually executed at the radio access network (RAN). In this work, we formulate the RAN resource allocation problem as a sum-rate maximization problem subject to the orthogonality constraint (i.e., service isolation), latency-related constraint and minimum rate constraint while maintaining the reliability constraint with the incorporation of adaptive modulation and coding (AMC). However, the formulated problem is not mathematically tractable due to the presence of a step-wise function associated with the AMC and a binary assignment variable. Therefore, to solve the proposed optimization problem, first, we relax the mathematical intractability of AMC by using an approximation of the non-linear AMC achievable throughput, and next, the binary constraint is relaxed to a box constraint by using the penalized reformulation of the problem. The result of the above two-step procedure provides a close-to-optimal solution to the original optimization problem. Furthermore, to ease the complexity of the optimization-based scheduling algorithm, a low-complexity heuristic scheduling scheme is proposed for the efficient multiplexing of URLLC and eMBB services. Finally, the effectiveness of the proposed optimization and heuristic schemes is illustrated through extensive numerical simulations. [less ▲] Detailed reference viewed: 257 (32 UL)![]() Oyedotun, Oyebade ![]() ![]() ![]() in IEEE 2020 Winter Conference on Applications of Computer Vision (WACV 20), Aspen, Colorado, US, March 2–5, 2020 (2020, March 01) Detailed reference viewed: 158 (16 UL)![]() Tsinos, Christos ![]() ![]() ![]() in IEEE Transactions on Cognitive Communications and Networking (2020) Detailed reference viewed: 125 (2 UL)![]() Tsinos, Christos ![]() ![]() ![]() in IEEE Access (2020) Detailed reference viewed: 139 (10 UL)![]() Mehrizi Rahmat Abadi, Sajad ![]() ![]() in IEEE Transactions on Communications (2020) Detailed reference viewed: 146 (8 UL)![]() Kisseleff, Steven ![]() ![]() ![]() in IEEE Transactions on Wireless Communications (2020) Large communication networks, e.g. Internet of Things (IoT), are known to be vulnerable to co-channel interference. One possibility to address this issue is the use of orthogonal multiple access (OMA ... [more ▼] Large communication networks, e.g. Internet of Things (IoT), are known to be vulnerable to co-channel interference. One possibility to address this issue is the use of orthogonal multiple access (OMA) techniques. However, due to a potentially very long duty cycle, OMA is not well suited for such schemes. Instead, random medium access (RMA) appears more promising. An RMA scheme is based on transmission of short data packets with random scheduling, which is typically unknown to the receiver. The received signal, which consists of the overlapping packets, can be used for energy harvesting and powering of a relay device. Such an energy harvesting relay may utilize the energy for further information processing and uplink transmission. In this paper, we address the design of a simultaneous information and power transfer scheme based on randomly scheduled packet transmissions and reliable symbol detection. We formulate a prediction problem with the goal to maximize the harvested power for an RMA scenario. In order to solve this problem, we propose a new prediction method, which shows a significant performance improvement compared to the straightforward baseline scheme. Furthermore, we investigate the complexity of the proposed method and its vulnerability to imperfect channel state information. [less ▲] Detailed reference viewed: 86 (10 UL)![]() Papadopoulos, Konstantinos ![]() ![]() ![]() in IEEE International Conference on Automatic Face and Gesture Recognition, Buenos Aires 18-22 May 2020 (2020) Detailed reference viewed: 150 (19 UL)![]() Kisseleff, Steven ![]() ![]() ![]() in Proceedings of IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications (2020) Ultrareliable uplink communication based on random access poses novel research challenges for the receiver design. Here, the uncertainty imposed by the random access and a large amount of interfering ... [more ▼] Ultrareliable uplink communication based on random access poses novel research challenges for the receiver design. Here, the uncertainty imposed by the random access and a large amount of interfering transmissions is the limiting factor for the system performance. Recently, this type of communication has been addressed in context of simultaneous wireless information and power transfer (SWIPT). The need to adapt the power splitting to the signal states according to the underlying random access has been tackled by introducing a predictor, which determines the valid states of the received signal based on the long-term observation. Hence, the power splitting factor is scaled accordingly in order to guarantee ultrareliable communication and maximized harvested energy.In this work, we extend the considered SWIPT scenario by introducing multiple antennas at the receiver side. Through this, the received energy can be substantially increased, if the energy harvesting parameters and the spatial filter coefficients are jointly optimized. Hence, we propose an optimization procedure, which aims at maximizing the harvested energy under the ultrareliability constraint. The mentioned prediction method is then combined with the optimization solution and the resulting system performance is numerically evaluated. [less ▲] Detailed reference viewed: 80 (1 UL)![]() ; Alves Martins, Wallace ![]() ![]() in IEEE Transactions on Signal and Information Processing over Networks (2020) We tackle the problem of forecasting network-signal snapshots using past signal measurements acquired by a subset of network nodes. This task can be seen as a combination of multivariate time-series ... [more ▼] We tackle the problem of forecasting network-signal snapshots using past signal measurements acquired by a subset of network nodes. This task can be seen as a combination of multivariate time-series forecasting (temporal prediction) and graph signal interpolation (spatial prediction). This is a fundamental problem for many applications wherein deploying a high granularity network is impractical. Our solution combines recurrent neural networks with frequency-analysis tools from graph signal processing, and assumes that data is sufficiently smooth with respect to the underlying graph. The proposed learning model outperforms state-of-the-art deep learning techniques, especially when predictions are made using a small subset of network nodes, considering two distinct real world datasets: temperatures in the US and speed flow in Seattle. The results also indicate that our method can handle noisy signals and missing data, making it suitable to many practical applications. [less ▲] Detailed reference viewed: 81 (4 UL)![]() ![]() Kong, Long ![]() ![]() E-print/Working paper (2020) An alternative or supplementary approach named as physical layer security has been proposed to afford an extra security layer on top of the conventional cryptography technique. In this paper, an overview ... [more ▼] An alternative or supplementary approach named as physical layer security has been proposed to afford an extra security layer on top of the conventional cryptography technique. In this paper, an overview of secrecy performance investigations over the classic Alice-Bob-Eve wiretap fading channels is conducted. On the basis of the classic wiretap channel model, we have comprehensively listed and thereafter compared the existing works on physical layer secrecy analysis considering the small-scale, large-scale, composite, and cascaded fading channel models. Exact secrecy metrics expressions, including secrecy outage probability (SOP), the probability of non-zero secrecy capacity (PNZ), average secrecy capacity (ASC), and secrecy bounds, including the lower bound of SOP and ergodic secrecy capacity, are presented. In order to encompass the aforementioned four kinds of fading channel models with a more \textit{generic} and \textit{flexible} distribution, the mixture gamma (MG), mixture of Gaussian (MoG), and Fox's $H$-function distributions are three useful candidates to largely include the above-mentioned four kinds of fading channel models. It is shown that they are flexible and general when assisting the secrecy analysis to obtain closed-form expressions. Their advantages and limitations are also highlighted. Conclusively, these three approaches are proven to provide a unified secrecy analysis framework and can cover all types of independent wiretap fading channel models. Apart from those, revisiting the existing secrecy enhancement techniques based on our system configuration, the on-off transmission scheme, jamming approach (including artificial noise (AN) & artificial fast fading (AFF)), antenna selection, and security region are presented. [less ▲] Detailed reference viewed: 55 (8 UL)![]() ![]() ; ; Kong, Long ![]() E-print/Working paper (2020) Detailed reference viewed: 66 (5 UL)![]() ![]() ; Kong, Long ![]() E-print/Working paper (2020) Detailed reference viewed: 56 (7 UL)![]() Kisseleff, Steven ![]() ![]() ![]() in IEEE Open Journal of the Communications Society (2020) The concept of Smart Cities has been introduced as a way to benefit from the digitization of various ecosystems at a city level. To support this concept, future communication networks need to be carefully ... [more ▼] The concept of Smart Cities has been introduced as a way to benefit from the digitization of various ecosystems at a city level. To support this concept, future communication networks need to be carefully designed with respect to the city infrastructure and utilization of resources. Recently, the idea of 'smart' environment, which takes advantage of the infrastructure in order to enable better performance of wireless networks, has been proposed. This idea is aligned with the recent advances in design of reconfigurable intelligent surfaces (RISs), which are planar structures with the capability to reflect impinging electromagnetic waves toward preferred directions. Thus, RISs are expected to provide the necessary flexibility for the design of the ‘smart’ communication environment, which can be optimally shaped to enable cost- and energy-efficient signal transmissions where needed. Upon deployment of RISs, the ecosystem of the Smart Cities would become even more controllable and adaptable, which would subsequently ease the implementation of future communication networks in urban areas and boost the interconnection among private households and public services. In this article, we provide our vision on RIS integration into future Smart Cities by pointing out some forward looking new application scenarios and use cases and by highlighting the potential advantages of RIS deployment. To this end, we identify the most promising research directions and opportunities. The respective design problems are formulated mathematically. Moreover, we focus the discussion on the key enabling aspects for RIS-assisted Smart Cities, which require substantial research efforts such as pilot decontamination, precoding for large multiuser networks, distributed operation and control of RISs. These contributions pave the road to a systematic design of RIS-assisted communication networks for Smart Cities in the years to come. [less ▲] Detailed reference viewed: 229 (41 UL) |
||