References of "Kong, Long 50037137"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailChannel Modeling and Analysis of Reconfigurable Intelligent Surfaces Assisted Vehicular Networks
Kong, Long UL; He, Jiguang; Ai, Yun et al

Scientific Conference (2021, June)

Detailed reference viewed: 47 (1 UL)
Full Text
Peer Reviewed
See detailHybrid automatic repeat request‐based intelligent reflecting surface‐assisted communication system
Ai, Yun; Mohamed, M.; Kong, Long UL et al

in Electronics Letters (2021)

The intelligent reflecting surface (IRS) is an emerging technique to extend wireless coverage. In this letter, the performance of the hybrid automatic repeat request (hybrid ARQ) for an IRS‐assisted ... [more ▼]

The intelligent reflecting surface (IRS) is an emerging technique to extend wireless coverage. In this letter, the performance of the hybrid automatic repeat request (hybrid ARQ) for an IRS‐assisted system is analysed. More specifically, the outage performance of the IRS‐aided system using hybrid ARQ protocol with chase combining is studied. The asymptotic analysis also shows that the outage performance is better and improves linearly by increasing the number of reflectors of the IRS‐aided system. The results also verify the potential of combining the ARQ scheme in the link layer of the IRS‐aided system and demonstrate that a very small change of path loss condition can impact the performance largely. [less ▲]

Detailed reference viewed: 32 (6 UL)
Full Text
Peer Reviewed
See detailComprehensive Physical Layer Security Analysis of FSO Communications over Malaga Channels
Ai, Yun; Mathur, Aashish; Verma, Gyan Deep et al

in IEEE Photonics Journal (2020)

In this paper, we study the physical layer security of free-space optical (FSO) communications under different eavesdropping scenarios. More specifically, the secrecy performance of FSO communication ... [more ▼]

In this paper, we study the physical layer security of free-space optical (FSO) communications under different eavesdropping scenarios. More specifically, the secrecy performance of FSO communication employing intensity modulation/direct detection detection is analyzed for the well-established Mlaga channels. Three different realistic scenarios of eavesdropping are considered by assuming different placement locations for the eavesdropper in the paper. Novel expressions for the average secrecy capacity (ASC) and secrecy outage probability (SOP) are derived for the considered scenarios, and useful insights are also provided through asymptotic analysis. The results show: (i) When the eavesdropper is placed near the transmitter, atmospheric condition imposes a less significant impact on secrecy performance; (ii) Certain level of correlation can potentially enhance the secrecy performance for FSO communications; (iii) The correlation imposes opposite impacts on the ASC and SOP of FSO communications; and the secrecy performance metrics exhibit a non-monotonic impact with the increase of correlation; (v) When the correlation of the FSO links is too small or too large (i.e., the correlation parameter around 0 or 1), the correlation plays a more significant impact on secrecy performance; and (vi) The asymptotic slope of the SOP is 0.5 for all eavesdropping scenarios under practical FSO channels. [less ▲]

Detailed reference viewed: 115 (8 UL)
Full Text
Peer Reviewed
See detailDecision Triggered Data Transmission and Collection in Industrial Internet of Things
He, Jiguang; Kong, Long UL; Frondelius, Tero et al

in 2020 IEEE Wireless Communications and Networking Conference (WCNC) (2020, June 19)

We propose a decision triggered data transmission and collection (DTDTC) protocol for condition monitoring and anomaly detection in the industrial Internet of things (IIoT). In the IIoT, the collection ... [more ▼]

We propose a decision triggered data transmission and collection (DTDTC) protocol for condition monitoring and anomaly detection in the industrial Internet of things (IIoT). In the IIoT, the collection, processing, encoding, and transmission of the sensor readings are usually not for the reconstruction of the original data but for decision making at the fusion center. By moving the decision making process to the local end devices, the amount of data transmission can be significantly reduced, especially when normal signals with positive decisions dominate in the whole life cycle and the fusion center is only interested in collecting the abnormal data. The proposed concept combines compressive sensing, machine learning, data transmission, and joint decision making. The sensor readings are encoded and transmitted to the fusion center only when abnormal signals with negative decisions are detected. All the abnormal signals from the end devices are gathered at the fusion center for a joint decision with feedback messages forwarded to the local actuators. The advantage of such an approach lies in that it can significantly reduce the volume of data to be transmitted through wireless links. Moreover, the introduction of compressive sensing can further reduce the dimension of data tremendously. An exemplary case, i.e., diesel engine condition monitoring, is provided to validate the effectiveness and efficiency of the proposed scheme compared to the conventional ones. [less ▲]

Detailed reference viewed: 27 (1 UL)
Full Text
Peer Reviewed
See detailUnified Framework for Secrecy Characteristics with Mixture of Gaussian (MoG) Distribution
Kong, Long UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in IEEE Wireless Communications Letters (2020)

The mixture of Gaussian (MoG) distribution was proposed to model the wireless channels by implementing the completely unsupervised expectation-maximization (EM) learning algorithm. With the high ... [more ▼]

The mixture of Gaussian (MoG) distribution was proposed to model the wireless channels by implementing the completely unsupervised expectation-maximization (EM) learning algorithm. With the high convenience for density estimation applications, the focus of this letter is supposed to investigate the secrecy metrics, including secrecy outage probability (SOP), the lower bound of SOP, the probability of non-zero secrecy capacity (PNZ), and the average secrecy capacity (ASC) from the information-theoretic perspective. The above-mentioned metrics are derived with simple and unified closed-form expressions. The effectiveness of our obtained analytical expressions are successfully examined and compared with Monte-Carlo simulations. One can conclude that this letter provides a simple but effective closed-form secrecy analysis solution exploiting the MoG distribution. [less ▲]

Detailed reference viewed: 93 (4 UL)
Full Text
Peer Reviewed
See detailEffective Throughput Analysis of α-η-κ-μ Fading Channels
Ai, Yun; Mathur, Aashish; Kong, Long UL et al

in IEEE Access (2020)

The α-η-κ-µ fading model is a very useful instrument to accurately describe various radio wave propagation scenarios. In this paper, we study the effective throughput performance of communication systems ... [more ▼]

The α-η-κ-µ fading model is a very useful instrument to accurately describe various radio wave propagation scenarios. In this paper, we study the effective throughput performance of communication systems over the α-η-κ-µ fading channels. Novel and exact expressions for the effective throughput over α-η-κ-µ channels are derived, and the effective throughput of multiple-input single-output (MISO) and multiple-input multiple-output (MIMO) systems over some widely used small-scale fading models are presented based on the derived results. To obtain more understandings on the impact of physical channel characteristics and system configuration on the effective throughput, closed-form expressions for the asymptotic effective throughput at high signal-to-noise ratio (SNR) regimes are also obtained. The results reveal the underlying connections between different physical channel parameters (e.g., scattering level, phase correlation, channel nonlinearity, multipath clustering, and channel imbalance) and the effective throughput. It is found that the effective throughput improves with the increase of channel nonlinearity and number of multipath clusters, and the high-SNR slope is only dependent on the channel nonlinearity and the number of multipath clusters present in the physical channel. [less ▲]

Detailed reference viewed: 65 (4 UL)
Peer Reviewed
See detailAn Overview of Generic Tools for Information-Theoretic Secrecy Performance Analysis over Wiretap Fading Channels
Kong, Long UL; Ai, Yun; Lei, Lei UL et al

E-print/Working paper (2020)

An alternative or supplementary approach named as physical layer security has been proposed to afford an extra security layer on top of the conventional cryptography technique. In this paper, an overview ... [more ▼]

An alternative or supplementary approach named as physical layer security has been proposed to afford an extra security layer on top of the conventional cryptography technique. In this paper, an overview of secrecy performance investigations over the classic Alice-Bob-Eve wiretap fading channels is conducted. On the basis of the classic wiretap channel model, we have comprehensively listed and thereafter compared the existing works on physical layer secrecy analysis considering the small-scale, large-scale, composite, and cascaded fading channel models. Exact secrecy metrics expressions, including secrecy outage probability (SOP), the probability of non-zero secrecy capacity (PNZ), average secrecy capacity (ASC), and secrecy bounds, including the lower bound of SOP and ergodic secrecy capacity, are presented. In order to encompass the aforementioned four kinds of fading channel models with a more \textit{generic} and \textit{flexible} distribution, the mixture gamma (MG), mixture of Gaussian (MoG), and Fox's $H$-function distributions are three useful candidates to largely include the above-mentioned four kinds of fading channel models. It is shown that they are flexible and general when assisting the secrecy analysis to obtain closed-form expressions. Their advantages and limitations are also highlighted. Conclusively, these three approaches are proven to provide a unified secrecy analysis framework and can cover all types of independent wiretap fading channel models. Apart from those, revisiting the existing secrecy enhancement techniques based on our system configuration, the on-off transmission scheme, jamming approach (including artificial noise (AN) & artificial fast fading (AFF)), antenna selection, and security region are presented. [less ▲]

Detailed reference viewed: 8 (2 UL)
Peer Reviewed
See detailSecure Vehicular Communications through Reconfigurable Intelligent Surfaces
Ai, Yun; Figueiredo, Felipe A. P. de; Kong, Long UL et al

E-print/Working paper (2020)

Detailed reference viewed: 16 (3 UL)
Peer Reviewed
See detailOn Performance Characterization of Cascaded Multiwire-PLC/MIMO-RF Communication System
Ai, Yun; Kong, Long UL; Cheffena, Michael et al

E-print/Working paper (2020)

Detailed reference viewed: 15 (2 UL)
Full Text
Peer Reviewed
See detailLarge Intelligent Surface for Positioning in Millimeter Wave MIMO Systems
He, Jiguang; Wymeersch, Henk; Kong, Long UL et al

in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020)

Millimeter-wave (mmWave) multiple-input multiple-output (MIMO) system for the fifth generation (5G) cellular communications can also enable single-anchor positioning and object tracking due to its large ... [more ▼]

Millimeter-wave (mmWave) multiple-input multiple-output (MIMO) system for the fifth generation (5G) cellular communications can also enable single-anchor positioning and object tracking due to its large bandwidth and inherently high angular resolution. In this paper, we introduce the newly invented concept, large intelligent surface (LIS), to mmWave positioning systems, study the theoretical performance bounds (i.e., Cramér-Rao lower bounds) for positioning, and evaluate the impact of the number of LIS elements and the value of phase shifters on the position estimation accuracy compared to the conventional scheme with one direct link and one non-line-of-sight path. It is verified that better performance can be achieved with a LIS from the theoretical analyses and numerical study. [less ▲]

Detailed reference viewed: 31 (1 UL)