200 research outputs found

    Tracking Infected Covid-19 Persons and their Proximity Users Using D2D in 5G Networks

    Get PDF
    The world witnessed a pandemic that needs to be limited. COVID-19 is a disease that spreads among people when an infected person is in close contact with another. To decrease the virus spreading, World Health Organization (WHO) imposed precautionary measures and suggested some rules to be followed such as social distancing and quarantining the infected people. We propose a model, using D2D and IoT technology, for tracking infected persons with COVID-19 and its proximity. If a person (mobile device) gets close to an infected person, he will also get infected, so by continuous moving, the infection will be transmitted. Thus, identifying the infected persons and their contacts will limit the spread of the disease. In each scenario, it is possible to distinguish the number of infected people and know from whom they are infected, and the location of the infection. The simulation shows the tracking of a mobile device when proximate infected person at a distance of 3 meters. As a result, our proposed D2D model is effective, especially in the scenario which found the infected person with COVID-19, tracks them, determines minimum distances, and recognizes the source of the infection. Thus, the model can limit the rapid spread of COVID-19 as it determines the 3meters distance from infected person and send precaution messages to the network

    A survey of 5G technologies: regulatory, standardization and industrial perspectives

    Get PDF
    In recent years, there have been significant developments in the research on 5th Generation (5G) networks. Several enabling technologies are being explored for the 5G mobile system era. The aim is to evolve a cellular network that is intrinsically flexible and remarkably pushes forward the limits of legacy mobile systems across all dimensions of performance metrics. All the stakeholders, such as regulatory bodies, standardization authorities, industrial fora, mobile operators and vendors, must work in unison to bring 5G to fruition. In this paper, we aggregate the 5G-related information coming from the various stakeholders, in order to i) have a comprehensive overview of 5G and ii) to provide a survey of the envisioned 5G technologies; their development thus far from the perspective of those stakeholders will open up new frontiers of services and applications for next-generation wireless networks. Keywords: 5G, ITU, Next-generation wireless network

    Device discovery in D2D communication: A survey

    Get PDF
    Device to Device (D2D) communication was first considered in out-band to manage energy issues in the wireless sensor networks. The primary target was to secure information about system topology for successive communication. Now the D2D communication has been legitimated in in-band by the 3rd Generation Partnership Project (3GPP). To initiate D2D communication, Device Discovery (DD) is a primary task and every D2D application benefits from DD as an end to end link maintenance and data relay when the direct path is obstructed. The DD is facing new difficulties because of the mobility of the devices over static systems, and the mobility makes it more challenging for D2D communication. For in-band D2D, DD in a single cell and multi-cell, and dense area is not legitimated properly, causing latency, inaccuracy, and energy consumption. Among extensive studies on limiting energy consumption and latency, DD is one of the essential parts concentrating on access and communication. In this paper, a comprehensive survey on DD challenges, for example single cell/multi-cell and dense area DD, energy consumption during discovery, discovery delay, and discovery security, etc., has been presented to accomplish an effective paradigm of D2D networks. In order to undertake the device (user) needs, an architecture has been projected, which promises to overwhelm the various implementation challenges of DD. The paper mainly focuses on DD taxonomy and classification with an emphasis on discovery procedures and algorithms, a summary of advances and issues, and ways for potential enhancements. For ensuring a secure DD and D2D, auspicious research directions have been proposed, based on taxonomy

    Security for 5G Mobile Wireless Networks

    Get PDF
    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key management and privacy. The paper further discusses the new security features involving different technologies applied to 5G such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software defined networks and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantage of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized

    Enabling Technologies for Ultra-Reliable and Low Latency Communications: From PHY and MAC Layer Perspectives

    Full text link
    © 1998-2012 IEEE. Future 5th generation networks are expected to enable three key services-enhanced mobile broadband, massive machine type communications and ultra-reliable and low latency communications (URLLC). As per the 3rd generation partnership project URLLC requirements, it is expected that the reliability of one transmission of a 32 byte packet will be at least 99.999% and the latency will be at most 1 ms. This unprecedented level of reliability and latency will yield various new applications, such as smart grids, industrial automation and intelligent transport systems. In this survey we present potential future URLLC applications, and summarize the corresponding reliability and latency requirements. We provide a comprehensive discussion on physical (PHY) and medium access control (MAC) layer techniques that enable URLLC, addressing both licensed and unlicensed bands. This paper evaluates the relevant PHY and MAC techniques for their ability to improve the reliability and reduce the latency. We identify that enabling long-term evolution to coexist in the unlicensed spectrum is also a potential enabler of URLLC in the unlicensed band, and provide numerical evaluations. Lastly, this paper discusses the potential future research directions and challenges in achieving the URLLC requirements

    D4.2 Final report on trade-off investigations

    Full text link
    Research activities in METIS WP4 include several as pects related to the network-level of future wireless communication networks. Thereby, a large variety of scenarios is considered and solutions are proposed to serve the needs envis ioned for the year 2020 and beyond. This document provides vital findings about several trade-offs that need to be leveraged when designing future network-level solutions. In more detail, it elaborates on the following trade- offs: • Complexity vs. Performance improvement • Centralized vs. Decentralized • Long time-scale vs. Short time-scale • Information Interflow vs. Throughput/Mobility enha ncement • Energy Efficiency vs. Network Coverage and Capacity Outlining the advantages and disadvantages in each trade-off, this document serves as a guideline for the application of different network-level solutions in different situations and therefore greatly assists in the design of future communication network architectures.Aydin, O.; Ren, Z.; Bostov, M.; Lakshmana, TR.; Sui, Y.; Svensson, T.; Sun, W.... (2014). D4.2 Final report on trade-off investigations. http://hdl.handle.net/10251/7676

    Proximity as a Service via Cellular Network-Assisted Mobile Device-to-Device

    Get PDF
    PhD ThesisThe research progress of communication has brought a lot of novel technologies to meet the multi-dimensional demands such as pervasive connection, low delay and high bandwidth. Device-to-Device (D2D) communication is a way to no longer treat the User Equipment (UEs) as a terminal, but rather as a part of the network for service provisioning. This thesis decouples UEs into service providers (helpers) and service requesters. By collaboration among proximal devices, with the coordination of cellular networks, some local tasks can be achieved, such as coverage extension, computation o oading, mobile crowdsourcing and mobile crowdsensing. This thesis proposes a generic framework Proximity as a Service (PaaS) for increasing the coverage with demands of service continuity. As one of the use cases, the optimal helper selection algorithm of PaaS for increasing the service coverage with demands of service continuity is called ContAct based Proximity (CAP). Mainly, fruitful contact information (e.g., contact duration, frequency, and interval) is captured, and is used to handle ubiquitous proximal services through the optimal selection of helpers. The nature of PaaS is evaluated under the Helsinki city scenario, with movement model of Points Of Interest (POI) and with critical factors in uencing the service demands (e.g., success ratio, disruption duration and frequency). Simulation results show the advantage of CAP, in both success ratio and continuity of the service (outputs). Based on this perspective, metrics such as service success ratio and continuity as a service evaluation of the PaaS are evaluated using the statistical theory of the Design Of Experiments (DOE). DOE is used as there are many dimensions to the state space (access tolerance, selected helper number, helper access limit, and transmit range) that can in uence the results. A key contribution of this work is that it brings rigorous statistical experiment design methods into the research into mobile computing. Results further reveal the influence of four factors (inputs), e.g., service tolerance, number of helpers allocated, the number of concurrent devices supported by each helper and transmit range. Based on this perspective, metrics such as service success ratio and continuity are evaluated using DOE. The results show that transmit range is the most dominant factor. The number of selected helpers is the second most dominant factor. Since di erent factors have di erent regression levels, a uni ed 4 level full factorial experiment and a cubic multiple regression analysis have been carried out. All the interactions and the corresponding coe cients have been found. This work is the rst one to evaluate LTE-Direct and WiFi-Direct in an opportunistic proximity service. The contribution of the results for industry is to guide how many users need to cooperate to enable mobile computing and for academia. This reveals the facts that: 1, in some cases, the improvement of spectrum e ciency brought by D2D is not important; 2, nodal density and the resources used in D2D air-interfaces are important in the eld of mobile computing. This work built a methodology to study the D2D networks with a di erent perspective (PaaS)

    Performance analysis of MC-CDMA detection schemes for D2D communication

    Get PDF
    The wireless communication standard has gone to the era of Long Term Evolution which is also known as LTE. The requirements for transmission speed and communication quality become more and more rigorous and the number of wireless communication devices is increasing rapidly. The available spectrum for mobile wireless communication is getting congested. Therefore, more efficient spectrum utilization should be taken into consideration within the future development. New methods need to be implemented to increase the efficiency of spectrum utilization. To confront this obstacle, orthogonal frequency division multiplexing (OFDM) was developed in 1990’s and has been widely deployed in the LTE networks. Multicarrier code division multiple access technique (MC-CDMA) combines code division multiple access (CDMA) with OFDM to acquire advantages from both sides. With the continuous increase of mobile applications, the power consumption of mobile terminals is also increasing significantly. Then device-to-device (D2D) communication, which is a short distance communication technique from one device directly to another one, was invented. The data of users will be transmitted between devices directly without relying on the base station. D2D communication decreases the load of the base station, reduces the terminal power consumption, and improves the spectral efficiency. Due to these merits, D2D has become a significant research topic and various new related applications for D2D have been developed and tested in realistic circumstances. This thesis applies MC-CDMA into D2D communication and studies different detection schemes for MC-CDMA. The OFDMA cellular user signals appear as significant sources of interference to D2D communication. Three alternative detection schemes are investigated: equal gain combining (EGC), maximum ratio combining (MRC) and linear minimum mean square (LMMSE) equalization. MC-CDMA performance with these detection methods is evaluated based on MATLAB simulations using relevant channel and interference models to find out the best alternative for different D2D scenarios. At the end of this thesis, a conclusion is drawn of which MC-CDMA detection scheme will be a better choice for D2D communication according to the BER performances based on the simulation results on MATLAB
    • …
    corecore