130 research outputs found

    Reinforcement Learning Empowered Unmanned Aerial Vehicle Assisted Internet of Things Networks

    Get PDF
    This thesis aims towards performance enhancement for unmanned aerial vehicles (UAVs) assisted internet of things network (IoT). In this realm, novel reinforcement learning (RL) frameworks have been proposed for solving intricate joint optimisation scenarios. These scenarios include, uplink, downlink and combined. The multi-access technique utilised is non-orthogonal multiple access (NOMA), as key enabler in this regime. The outcomes of this research entail, enhancement in key performance metrics, such as sum-rate, energy efficiency and consequent reduction in outage. For the scenarios involving uplink transmissions by IoT devices, adaptive and tandem rein forcement learning frameworks have been developed. The aim is to maximise capacity over fixed UAV trajectory. The adaptive framework is utilised in a scenario wherein channel suitability is ascertained for uplink transmissions utilising a fixed clustering regime in NOMA. Tandem framework is utilised in a scenario wherein multiple-channel resource suitability is ascertained along with, power allocation, dynamic clustering and IoT node associations to NOMA clusters and channels. In scenarios involving downlink transmission to IoT devices, an ensemble RL (ERL) frame work is proposed for sum-rate enhancement over fixed UAV trajectory. For dynamic UAV trajec tory, hybrid decision framework (HDF) is proposed for energy efficiency optimisation. Downlink transmission power and bandwidth is managed for NOMA transmissions over fixed and dynamic UAV trajectories, facilitating IoT networks. In UAV enabled relaying scenario, for control system plants and their respective remotely deployed sensors, a head start reinforcement learning framework based on deep learning is de veloped and implemented. NOMA is invoked, in both uplink and downlink transmissions for IoT network. Dynamic NOMA clustering, power management and nodes association along with UAV height control is jointly managed. The primary aim is the, enhancement of net sum-rate and its subsequent manifestation in facilitating the IoT assisted use case. The simulation results relating to aforesaid scenarios indicate, enhanced sum-rate, energy efficiency and reduced outage for UAV-assisted IoT networks. The proposed RL frameworks surpass in performance in comparison to existing frameworks as benchmarks for the same sce narios. The simulation platforms utilised are MATLAB and Python, for network modeling, RL framework design and validation

    Physical layer security in 5G and beyond wireless networks enabling technologies

    Get PDF
    Information security has always been a critical concern for wireless communications due to the broadcast nature of the open wireless medium. Commonly, security relies on cryptographic encryption techniques at higher layers to ensure information security. However, traditional cryptographic methods may be inadequate or inappropriate due to novel improvements in the computational power of devices and optimization approaches. Therefore, supplementary techniques are required to secure the transmission data. Physical layer security (PLS) can improve the security of wireless communications by exploiting the characteristics of wireless channels. Therefore, we study the PLS performance in the fifth generation (5G) and beyond wireless networks enabling technologies in this thesis. The thesis consists of three main parts. In the first part, the PLS design and analysis for Device-to-Device (D2D) communication is carried out for several scenarios. More specifically, in this part, we study the underlay relay-aided D2D communications to improve the PLS of the cellular network. We propose a cooperative scheme, whereby the D2D pair, in return for being allowed to share the spectrum band of the cellular network, serves as a friendly jammer using full-duplex (FD) and half-duplex (HD) transmissions and relay selection to degrade the wiretapped signal at an eavesdropper. This part aims to show that spectrum sharing is advantageous for both D2D communications and cellular networks concerning reliability and robustness for the former and PLS enhancement for the latter. Closed-form expressions for the D2D outage probability, the secrecy outage probability (SOP), and the probability of non-zero secrecy capacity (PNSC) are derived to assess the proposed cooperative system model. The results show enhancing the robustness and reliability of D2D communication while simultaneously improving the cellular network’s PLS by generating jamming signals towards the eavesdropper. Furthermore, intensive Monte-Carlo simulations and numerical results are provided to verify the efficiency of the proposed schemes and validate the derived expressions’ accuracy. In the second part, we consider a secure underlay cognitive radio (CR) network in the presence of a primary passive eavesdropper. Herein, a secondary multi-antenna full-duplex destination node acts as a jammer to the primary eavesdropper to improve the PLS of the primary network. In return for this favor, the energy-constrained secondary source gets access to the primary network to transmit its information so long as the interference to the latter is below a certain level. As revealed in our analysis and simulation, the reliability and robustness of the CR network are improved, while the security level of the primary network is enhanced concurrently. Finally, we investigate the PLS design and analysis of reconfigurable intelligent surface (RIS)-aided wireless communication systems in an inband underlay D2D communication and the CR network. An RIS is used to adjust its reflecting elements to enhance the data transmission while improving the PLS concurrently. Furthermore, we investigate the design of active elements in RIS to overcome the double-fading problem introduced in the RISaided link in a wireless communications system. Towards this end, each active RIS element amplifies the reflected incident signal rather than only reflecting it as done in passive RIS modules. As revealed in our analysis and simulation, the use of active elements leads to a drastic reduction in the size of RIS to achieve a given performance level. Furthermore, a practical design for active RIS is proposed

    IoT and Sensor Networks in Industry and Society

    Get PDF
    The exponential progress of Information and Communication Technology (ICT) is one of the main elements that fueled the acceleration of the globalization pace. Internet of Things (IoT), Artificial Intelligence (AI) and big data analytics are some of the key players of the digital transformation that is affecting every aspect of human's daily life, from environmental monitoring to healthcare systems, from production processes to social interactions. In less than 20 years, people's everyday life has been revolutionized, and concepts such as Smart Home, Smart Grid and Smart City have become familiar also to non-technical users. The integration of embedded systems, ubiquitous Internet access, and Machine-to-Machine (M2M) communications have paved the way for paradigms such as IoT and Cyber Physical Systems (CPS) to be also introduced in high-requirement environments such as those related to industrial processes, under the forms of Industrial Internet of Things (IIoT or I2oT) and Cyber-Physical Production Systems (CPPS). As a consequence, in 2011 the German High-Tech Strategy 2020 Action Plan for Germany first envisioned the concept of Industry 4.0, which is rapidly reshaping traditional industrial processes. The term refers to the promise to be the fourth industrial revolution. Indeed, the first industrial revolution was triggered by water and steam power. Electricity and assembly lines enabled mass production in the second industrial revolution. In the third industrial revolution, the introduction of control automation and Programmable Logic Controllers (PLCs) gave a boost to factory production. As opposed to the previous revolutions, Industry 4.0 takes advantage of Internet access, M2M communications, and deep learning not only to improve production efficiency but also to enable the so-called mass customization, i.e. the mass production of personalized products by means of modularized product design and flexible processes. Less than five years later, in January 2016, the Japanese 5th Science and Technology Basic Plan took a further step by introducing the concept of Super Smart Society or Society 5.0. According to this vision, in the upcoming future, scientific and technological innovation will guide our society into the next social revolution after the hunter-gatherer, agrarian, industrial, and information eras, which respectively represented the previous social revolutions. Society 5.0 is a human-centered society that fosters the simultaneous achievement of economic, environmental and social objectives, to ensure a high quality of life to all citizens. This information-enabled revolution aims to tackle today’s major challenges such as an ageing population, social inequalities, depopulation and constraints related to energy and the environment. Accordingly, the citizens will be experiencing impressive transformations into every aspect of their daily lives. This book offers an insight into the key technologies that are going to shape the future of industry and society. It is subdivided into five parts: the I Part presents a horizontal view of the main enabling technologies, whereas the II-V Parts offer a vertical perspective on four different environments. The I Part, dedicated to IoT and Sensor Network architectures, encompasses three Chapters. In Chapter 1, Peruzzi and Pozzebon analyse the literature on the subject of energy harvesting solutions for IoT monitoring systems and architectures based on Low-Power Wireless Area Networks (LPWAN). The Chapter does not limit the discussion to Long Range Wise Area Network (LoRaWAN), SigFox and Narrowband-IoT (NB-IoT) communication protocols, but it also includes other relevant solutions such as DASH7 and Long Term Evolution MAchine Type Communication (LTE-M). In Chapter 2, Hussein et al. discuss the development of an Internet of Things message protocol that supports multi-topic messaging. The Chapter further presents the implementation of a platform, which integrates the proposed communication protocol, based on Real Time Operating System. In Chapter 3, Li et al. investigate the heterogeneous task scheduling problem for data-intensive scenarios, to reduce the global task execution time, and consequently reducing data centers' energy consumption. The proposed approach aims to maximize the efficiency by comparing the cost between remote task execution and data migration. The II Part is dedicated to Industry 4.0, and includes two Chapters. In Chapter 4, Grecuccio et al. propose a solution to integrate IoT devices by leveraging a blockchain-enabled gateway based on Ethereum, so that they do not need to rely on centralized intermediaries and third-party services. As it is better explained in the paper, where the performance is evaluated in a food-chain traceability application, this solution is particularly beneficial in Industry 4.0 domains. Chapter 5, by De Fazio et al., addresses the issue of safety in workplaces by presenting a smart garment that integrates several low-power sensors to monitor environmental and biophysical parameters. This enables the detection of dangerous situations, so as to prevent or at least reduce the consequences of workers accidents. The III Part is made of two Chapters based on the topic of Smart Buildings. In Chapter 6, Petroșanu et al. review the literature about recent developments in the smart building sector, related to the use of supervised and unsupervised machine learning models of sensory data. The Chapter poses particular attention on enhanced sensing, energy efficiency, and optimal building management. In Chapter 7, Oh examines how much the education of prosumers about their energy consumption habits affects power consumption reduction and encourages energy conservation, sustainable living, and behavioral change, in residential environments. In this Chapter, energy consumption monitoring is made possible thanks to the use of smart plugs. Smart Transport is the subject of the IV Part, including three Chapters. In Chapter 8, Roveri et al. propose an approach that leverages the small world theory to control swarms of vehicles connected through Vehicle-to-Vehicle (V2V) communication protocols. Indeed, considering a queue dominated by short-range car-following dynamics, the Chapter demonstrates that safety and security are increased by the introduction of a few selected random long-range communications. In Chapter 9, Nitti et al. present a real time system to observe and analyze public transport passengers' mobility by tracking them throughout their journey on public transport vehicles. The system is based on the detection of the active Wi-Fi interfaces, through the analysis of Wi-Fi probe requests. In Chapter 10, Miler et al. discuss the development of a tool for the analysis and comparison of efficiency indicated by the integrated IT systems in the operational activities undertaken by Road Transport Enterprises (RTEs). The authors of this Chapter further provide a holistic evaluation of efficiency of telematics systems in RTE operational management. The book ends with the two Chapters of the V Part on Smart Environmental Monitoring. In Chapter 11, He et al. propose a Sea Surface Temperature Prediction (SSTP) model based on time-series similarity measure, multiple pattern learning and parameter optimization. In this strategy, the optimal parameters are determined by means of an improved Particle Swarm Optimization method. In Chapter 12, Tsipis et al. present a low-cost, WSN-based IoT system that seamlessly embeds a three-layered cloud/fog computing architecture, suitable for facilitating smart agricultural applications, especially those related to wildfire monitoring. We wish to thank all the authors that contributed to this book for their efforts. We express our gratitude to all reviewers for the volunteering support and precious feedback during the review process. We hope that this book provides valuable information and spurs meaningful discussion among researchers, engineers, businesspeople, and other experts about the role of new technologies into industry and society

    Unmanned Aerial Vehicle (UAV)-Enabled Wireless Communications and Networking

    Get PDF
    The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out

    Challenges and Opportunities in Applied System Innovation

    Get PDF
    This book introduces and provides solutions to a variety of problems faced by society, companies and individuals in a quickly changing and technology-dependent world. The wide acceptance of artificial intelligence, the upcoming fourth industrial revolution and newly designed 6G technologies are seen as the main enablers and game changers in this environment. The book considers these issues not only from a technological viewpoint but also on how society, labor and the economy are affected, leading to a circular economy that affects the way people design, function and deploy complex systems

    Flexible Automation and Intelligent Manufacturing: The Human-Data-Technology Nexus

    Get PDF
    This is an open access book. It gathers the first volume of the proceedings of the 31st edition of the International Conference on Flexible Automation and Intelligent Manufacturing, FAIM 2022, held on June 19 – 23, 2022, in Detroit, Michigan, USA. Covering four thematic areas including Manufacturing Processes, Machine Tools, Manufacturing Systems, and Enabling Technologies, it reports on advanced manufacturing processes, and innovative materials for 3D printing, applications of machine learning, artificial intelligence and mixed reality in various production sectors, as well as important issues in human-robot collaboration, including methods for improving safety. Contributions also cover strategies to improve quality control, supply chain management and training in the manufacturing industry, and methods supporting circular supply chain and sustainable manufacturing. All in all, this book provides academicians, engineers and professionals with extensive information on both scientific and industrial advances in the converging fields of manufacturing, production, and automation

    Smart Sensor Technologies for IoT

    Get PDF
    The recent development in wireless networks and devices has led to novel services that will utilize wireless communication on a new level. Much effort and resources have been dedicated to establishing new communication networks that will support machine-to-machine communication and the Internet of Things (IoT). In these systems, various smart and sensory devices are deployed and connected, enabling large amounts of data to be streamed. Smart services represent new trends in mobile services, i.e., a completely new spectrum of context-aware, personalized, and intelligent services and applications. A variety of existing services utilize information about the position of the user or mobile device. The position of mobile devices is often achieved using the Global Navigation Satellite System (GNSS) chips that are integrated into all modern mobile devices (smartphones). However, GNSS is not always a reliable source of position estimates due to multipath propagation and signal blockage. Moreover, integrating GNSS chips into all devices might have a negative impact on the battery life of future IoT applications. Therefore, alternative solutions to position estimation should be investigated and implemented in IoT applications. This Special Issue, “Smart Sensor Technologies for IoT” aims to report on some of the recent research efforts on this increasingly important topic. The twelve accepted papers in this issue cover various aspects of Smart Sensor Technologies for IoT

    Integrated Access and Backhaul for 5G and Beyond (6G)

    Get PDF
    Enabling network densification to support coverage-limited millimeter wave (mmWave) frequencies is one of the main requirements for 5G and beyond. It is challenging to connect a high number of base stations (BSs) to the core network via a transport network. Although fiber provides high-rate reliable backhaul links, it requires a noteworthy investment for trenching and installation, and could also take a considerable deployment time. Wireless backhaul, on the other hand, enables fast installation and flexibility, at the cost of data rate and sensitivity to environmental effects. For these reasons, fiber and wireless backhaul have been the dominant backhaul technologies for decades. Integrated access and backhaul (IAB), where along with celluar access services a part of the spectrum available is used to backhaul, is a promising wireless solution for backhauling in 5G and beyond. To this end, in this thesis we evaluate, analyze and optimize IAB networks from various perspectives. Specifically, we analyze IAB networks and develop effective algorithms to improve service coverage probability. In contrast to fiber-connected setups, an IAB network may be affected by, e.g., blockage, tree foliage, and rain loss. Thus, a variety of aspects such as the effects of tree foliage, rain loss, and blocking are evaluated and the network performance when part of the network being non-IAB backhauled is analysed. Furthermore, we evaluate the effect of deployment optimization on the performance of IAB networks.First, in Paper A, we introduce and analyze IAB as an enabler for network densification. Then, we study the IAB network from different aspects of mmWave-based communications: We study the network performance for both urban and rural areas considering the impacts of blockage, tree foliage, and rain. Furthermore, performance comparisons are made between IAB and networks of which all or part of small BSs are fiber-connected. Following the analysis, it is observed that IAB may be a good backhauling solution with high flexibility and low time-to-market. The second part of the thesis focuses on improving the service coverage probability by carrying out topology optimization in IAB networks focusing on mmWave communication for different parameters, such as blockage, tree foliage, and antenna gain. In Paper B, we study topology optimization and routing in IAB networks in different perspectives. Thereby, we design efficient Genetic algorithm (GA)-based methods for IAB node distribution and non-IAB backhaul link placement. Furthermore, we study the effect of routing in the cases with temporal blockages. Finally, we briefly study the recent standardization developments, i.e., 3GPP Rel-16 as well as the\ua0Rel-17 discussions on routing. As the results show, with a proper planning on network deployment, IAB is an attractive solution to densify the networks for 5G and beyond. Finally, we focus on improving the performance of IAB networks with constrained deployment optimization. In Paper C, we consider various IAB network models while presenting different algorithms for constrained deployment optimization. Here, the constraints are coming from either inter-IAB distance limitations or geographical restrictions. As we show, proper network planning can considerably improve service coverage probability of IAB networks with deployment constraints

    Radio Access for Ultra-Reliable Communication in 5G Systems and Beyond

    Get PDF
    corecore