336 research outputs found

    Wireless Communications in the Era of Big Data

    Full text link
    The rapidly growing wave of wireless data service is pushing against the boundary of our communication network's processing power. The pervasive and exponentially increasing data traffic present imminent challenges to all the aspects of the wireless system design, such as spectrum efficiency, computing capabilities and fronthaul/backhaul link capacity. In this article, we discuss the challenges and opportunities in the design of scalable wireless systems to embrace such a "bigdata" era. On one hand, we review the state-of-the-art networking architectures and signal processing techniques adaptable for managing the bigdata traffic in wireless networks. On the other hand, instead of viewing mobile bigdata as a unwanted burden, we introduce methods to capitalize from the vast data traffic, for building a bigdata-aware wireless network with better wireless service quality and new mobile applications. We highlight several promising future research directions for wireless communications in the mobile bigdata era.Comment: This article is accepted and to appear in IEEE Communications Magazin

    Price-Based Optimal Resource Allocation in Multi-Hop Wireless Networks

    Get PDF
    Recent advances in wireless communications and digital electronics have enabled rapid development of a variety of wireless network technologies. The undeniable popularity of wireless network is due to its ubiquity and convenience, which is appreciated by the users. In this dissertation, we study the problem of resource allocation in multihop wireless networks (so called ad hoc networks). A wireless ad hoc network consists of a collection of wireless nodes without a fixed infrastructure. Two wireless nodes communicate with each other directly, if they are within the transmission range of each other. Otherwise, the communication is achieved through the relays of intermediate nodes. Compared with traditional wireline networks, the unique characteristics of wireless networks pose fundamental challenges to the design of effective resource allocation algorithms that are optimal with respect to resource utilization and fair across different network flows. Particularly, the following issues of wireless networks need fresh treatment: (1) Interference of wireless communication. Flows not only contend at the same node (contention in the time domain), but also compete for shared channel if they are within the interference ranges of each other (contention in the spatial domain). (2) Multiple resource usage. Sending data from one wireless node to another needs to consume multiple resources, most notably wireless bandwidth and battery energy. (3) Autonomous communication entities. The wireless nodes usually belong to different autonomous entities. They may lack the incentive to contribute to the network functionality in a cooperative way. (4) Rate diversity. Wireless nodes can adaptively change the transmission bit rate based on perceived channel conditions. This leads to a wireless network with rate diversity, where competing flows within the interference range transmit at different rates. None of the existing resource allocation algorithms in wireless ad hoc networks have realistically considered end-to-end flows spanning multiple hops. Moreover, strategies proposed for wireline networks are not applicable in the context of wireless ad hoc network, due to its unique characteristics. In this dissertation, we propose a new price-based resource allocation framework in wireless ad hoc networks to achieve optimal resource utilization and fairness among competing end-to-end flows. We build our pricing framework on the notion of maximal cliques in wireless ad hoc networks, as compared to individual links in traditional wide-area wireline networks. Based on such a price-based theoretical framework, we present a two-tier iterative algorithm. Distributed across wireless nodes, the algorithm converges to a global network optimum with respect to resource allocations. Further, we present a price pair mechanism to coordinate multiple resource allocations, and to provide incentives simultaneously such that cooperation is promoted and the desired global optimal network operating point is reached by convergence with a fully decentralized self-optimizing algorithm. Such desired network-wide global optimum is characterized with the concept of Nash bargaining solution, which not only provides the Pareto optimal point for the network, but is also consistent with the fairness axioms of game theory. Finally, we present a channel aware price generation scheme to decompose the bit rate adjustment and the flow rate allocation. The allocation result achieves channel time fairness where user fairness and channel utilization is balanced. The major achievements of this dissertation are outlined as follows. It models a system-wide optimal operation point of a wireless network, and outlines the solution space of resource allocation in a multihop wireless network; It presents a price-based distributed resource allocation algorithm to achieve this global optimal point; It presents a low overhead implementation of the price-based resource allocation algorithm; It presents an incentive mechanism that enables the resource allocation algorithm when users are selfish

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Cooperative Compute-and-Forward

    Full text link
    We examine the benefits of user cooperation under compute-and-forward. Much like in network coding, receivers in a compute-and-forward network recover finite-field linear combinations of transmitters' messages. Recovery is enabled by linear codes: transmitters map messages to a linear codebook, and receivers attempt to decode the incoming superposition of signals to an integer combination of codewords. However, the achievable computation rates are low if channel gains do not correspond to a suitable linear combination. In response to this challenge, we propose a cooperative approach to compute-and-forward. We devise a lattice-coding approach to block Markov encoding with which we construct a decode-and-forward style computation strategy. Transmitters broadcast lattice codewords, decode each other's messages, and then cooperatively transmit resolution information to aid receivers in decoding the integer combinations. Using our strategy, we show that cooperation offers a significant improvement both in the achievable computation rate and in the diversity-multiplexing tradeoff.Comment: submitted to IEEE Transactions on Information Theor

    Throughput, stability and fairness of carrier-sense multiple access with cooperative diversity

    Get PDF
    Cooperative diversity has been identified as a potential candidate for boosting the physical (PHY) layer performance of future wireless networks. However, several issues remain open today in the design of an appropriate medium access control (MAC) layer for this type of system. This paper attempts to partially fill this gap by addressing the MAC-PHY cross-layer design of a class of carrier-sense multiple access protocols where collision-free transmissions are assisted by the potential cooperative retransmission of the remaining silent terminals in the network. Unlike previous works, the analysis is focused on full asymmetrical settings, where terminals experience different channel and queuing statistics. To achieve this goal, a packet reception model is here proposed for cooperative schemes where the relaying phase is activated only when the reception of previous (re)transmissions has failed. Closed-form expressions of correct reception probability are derived for Rayleigh fading channels assuming that correct reception occurs only when the instantaneous signal-to-noise ratio (SNR) exceeds a reception threshold. This reception model allows for a MAC-layer design aware of PHY-layer information, and vice versa, PHY-layer enhancement and activation using MAC-layer information. The boundary of the throughput region (i.e., the set of all achievable throughput values) is derived in a parametric closed-form expression using a multi-objective optimization approach. A method for deriving a non-parametric form was further proposed, which allows for a geometric interpretation of the two-user case. Stability features such as backlog user distribution and backlog delay are evaluated by using a novel Markov model for asymmetrical systems. Fairness is evaluated by means of the Gini index, which is a metric commonly used in the field of economics to measure income inequality. The protocol is shown to outperform its non-cooperative counterparts under diverse network conditions that are here discussed

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Fundamentals of Large Sensor Networks: Connectivity, Capacity, Clocks and Computation

    Full text link
    Sensor networks potentially feature large numbers of nodes that can sense their environment over time, communicate with each other over a wireless network, and process information. They differ from data networks in that the network as a whole may be designed for a specific application. We study the theoretical foundations of such large scale sensor networks, addressing four fundamental issues- connectivity, capacity, clocks and function computation. To begin with, a sensor network must be connected so that information can indeed be exchanged between nodes. The connectivity graph of an ad-hoc network is modeled as a random graph and the critical range for asymptotic connectivity is determined, as well as the critical number of neighbors that a node needs to connect to. Next, given connectivity, we address the issue of how much data can be transported over the sensor network. We present fundamental bounds on capacity under several models, as well as architectural implications for how wireless communication should be organized. Temporal information is important both for the applications of sensor networks as well as their operation.We present fundamental bounds on the synchronizability of clocks in networks, and also present and analyze algorithms for clock synchronization. Finally we turn to the issue of gathering relevant information, that sensor networks are designed to do. One needs to study optimal strategies for in-network aggregation of data, in order to reliably compute a composite function of sensor measurements, as well as the complexity of doing so. We address the issue of how such computation can be performed efficiently in a sensor network and the algorithms for doing so, for some classes of functions.Comment: 10 pages, 3 figures, Submitted to the Proceedings of the IEE
    • …
    corecore