33 research outputs found
On the Distribution of Random Geometric Graphs
Random geometric graphs (RGGs) are commonly used to model networked systems
that depend on the underlying spatial embedding. We concern ourselves with the
probability distribution of an RGG, which is crucial for studying its random
topology, properties (e.g., connectedness), or Shannon entropy as a measure of
the graph's topological uncertainty (or information content). Moreover, the
distribution is also relevant for determining average network performance or
designing protocols. However, a major impediment in deducing the graph
distribution is that it requires the joint probability distribution of the
distances between nodes randomly distributed in a bounded
domain. As no such result exists in the literature, we make progress by
obtaining the joint distribution of the distances between three nodes confined
in a disk in . This enables the calculation of the probability
distribution and entropy of a three-node graph. For arbitrary , we derive a
series of upper bounds on the graph entropy; in particular, the bound involving
the entropy of a three-node graph is tighter than the existing bound which
assumes distances are independent. Finally, we provide numerical results on
graph connectedness and the tightness of the derived entropy bounds.Comment: submitted to the IEEE International Symposium on Information Theory
201
Low-complexity Location-aware Multi-user Massive MIMO Beamforming for High Speed Train Communications
Massive Multiple-input Multiple-output (MIMO) adaption is one of the primary
evolving objectives for the next generation high speed train (HST)
communication system. In this paper, we consider how to design an efficient
low-complexity location-aware beamforming for the multi-user (MU) massive MIMO
system in HST scenario. We first put forward a low-complexity beamforming based
on location information, where multiple users are considered. Then, without
considering inter-beam interference, a closed-form solution to maximize the
total service competence of base station (BS) is proposed in this MU HST
scenario. Finally, we present a location-aid searching-based suboptimal
solution to eliminate the inter-beam interference and maximize the BS service
competence. Various simulations are given to exhibit the advantages of our
proposed massive MIMO beamforming method.Comment: This paper has been accepted for future publication by VTC2017-Sprin
Energy Efficiency Analysis of Heterogeneous Cache-enabled 5G Hyper Cellular Networks
The emerging 5G wireless networks will pose extreme requirements such as high throughput and low latency. Caching as a promising technology can effectively decrease latency and provide customized services based on group users behaviour (GUB). In this paper, we carry out the energy efficiency analysis in the cache-enabled hyper cellular networks (HCNs), where the macro cells and small cells (SCs) are deployed heterogeneously with the control and user plane (C/U) split. Benefiting from the assistance of macro cells, a novel access scheme is proposed according to both user interest and fairness of service, where the SCs can turn into semi- sleep mode. Expressions of coverage probability, throughput and energy efficiency (EE) are derived analytically as the functions of key parameters, including the cache ability, search radius and backhaul limitation. Numerical results show that the proposed scheme in HCNs can increase the network coverage probability by more than 200% compared with the single- tier networks. The network EE can be improved by 54% than the nearest access scheme, with larger research radius and higher SC cache capacity under lower traffic load. Our performance study provides insights into the efficient use of cache in the 5G software defined networking (SDN)
Security for the Industrial IoT: The Case for Information-Centric Networking
Industrial production plants traditionally include sensors for monitoring or
documenting processes, and actuators for enabling corrective actions in cases
of misconfigurations, failures, or dangerous events. With the advent of the
IoT, embedded controllers link these `things' to local networks that often are
of low power wireless kind, and are interconnected via gateways to some cloud
from the global Internet. Inter-networked sensors and actuators in the
industrial IoT form a critical subsystem while frequently operating under harsh
conditions. It is currently under debate how to approach inter-networking of
critical industrial components in a safe and secure manner.
In this paper, we analyze the potentials of ICN for providing a secure and
robust networking solution for constrained controllers in industrial safety
systems. We showcase hazardous gas sensing in widespread industrial
environments, such as refineries, and compare with IP-based approaches such as
CoAP and MQTT. Our findings indicate that the content-centric security model,
as well as enhanced DoS resistance are important arguments for deploying
Information Centric Networking in a safety-critical industrial IoT. Evaluation
of the crypto efforts on the RIOT operating system for content security reveal
its feasibility for common deployment scenarios.Comment: To be published at IEEE WF-IoT 201
Enhancing Physical Layer Security in AF Relay Assisted Multi-Carrier Wireless Transmission
In this paper, we study the physical layer security (PLS) problem in the dual
hop orthogonal frequency division multiplexing (OFDM) based wireless
communication system. First, we consider a single user single relay system and
study a joint power optimization problem at the source and relay subject to
individual power constraint at the two nodes. The aim is to maximize the end to
end secrecy rate with optimal power allocation over different sub-carriers.
Later, we consider a more general multi-user multi-relay scenario. Under high
SNR approximation for end to end secrecy rate, an optimization problem is
formulated to jointly optimize power allocation at the BS, the relay selection,
sub-carrier assignment to users and the power loading at each of the relaying
node. The target is to maximize the overall security of the system subject to
independent power budget limits at each transmitting node and the OFDMA based
exclusive sub-carrier allocation constraints. A joint optimization solution is
obtained through duality theory. Dual decomposition allows to exploit convex
optimization techniques to find the power loading at the source and relay
nodes. Further, an optimization for power loading at relaying nodes along with
relay selection and sub carrier assignment for the fixed power allocation at
the BS is also studied. Lastly, a sub-optimal scheme that explores joint power
allocation at all transmitting nodes for the fixed subcarrier allocation and
relay assignment is investigated. Finally, simulation results are presented to
validate the performance of the proposed schemes.Comment: 10 pages, 7 figures, accepted in Transactions on Emerging
Telecommunications Technologies (ETT), formerly known as European
Transactions on Telecommunications (ETT
Impact of Virtualization Technologies on Virtualized RAN Midhaul Latency Budget: A Quantitative Experimental Evaluation
In the Next Generation Radio Access Network (NGRAN)
defined by 3GPP for the fifth generation of mobile
communications (5G), the next generation NodeB (gNB) is split
into a Radio Unit (RU), a Distributed Unit (DU), and a Central
Unit (CU). RU, DU, and CU are connected through the fronthaul
(RU-DU) and midhaul (DU-CU) segments. If the RAN is also
virtualised RAN (VRAN), DU and CU are deployed in virtual
machines or containers. Different latency and jitter requirements
are demanded on the midhaul according to the distribution of
the protocol functions between DU and CU.
This study shows that, in VRAN, the virtualisation technologies,
the functional split option, and the number of elements
deployed in the same computational resource affect the latency
budget available for the midhaul. Moreover, it provides an
expression for the midhaul allowable latency as a function of the
aforementioned parameters. Finally, it shows that, the virtualised
DUs featuring a lower layer split option shall be deployed not
in the sameThis work has been partially funded by the EC
H2020 “5G-Transformer” Project (grant no. 761536)
HoPP: Robust and Resilient Publish-Subscribe for an Information-Centric Internet of Things
This paper revisits NDN deployment in the IoT with a special focus on the
interaction of sensors and actuators. Such scenarios require high
responsiveness and limited control state at the constrained nodes. We argue
that the NDN request-response pattern which prevents data push is vital for IoT
networks. We contribute HoP-and-Pull (HoPP), a robust publish-subscribe scheme
for typical IoT scenarios that targets IoT networks consisting of hundreds of
resource constrained devices at intermittent connectivity. Our approach limits
the FIB tables to a minimum and naturally supports mobility, temporary network
partitioning, data aggregation and near real-time reactivity. We experimentally
evaluate the protocol in a real-world deployment using the IoT-Lab testbed with
varying numbers of constrained devices, each wirelessly interconnected via IEEE
802.15.4 LowPANs. Implementations are built on CCN-lite with RIOT and support
experiments using various single- and multi-hop scenarios