4,078 research outputs found
Performance evaluation of heterogeneous wireless information and power networks
In this study, the performance of downlink simultaneous wireless information and power transfer (SWIPT) networks over Nakagami-m fading is analysed. The SWIPT network is modelled as a two-tier heterogeneous network, where one tier is the information transmission network and the other is the power transmission network. The seamless integration enables both data and energy to be transferred from access points to the users. Using the stochastic geometry theory, the expressions for outage probability at the information receiver are derived in decoupled and integrated SWIPT networks. Also, the average harvested energy at the power receiver is derived assuming a non-linear energy harvesting model. Simulation results validate the analytical expressions and the impacts of various system parameters on the SWITP performance are investigated
Fast Authentication in Heterogeneous Wireless Networks
The growing diffusion of wireless devices is leading to an increasing demand for mobility and security. At the same time, most applications can only tolerate short breaks in the data flow, so that it is a challenge to find out mobility and authentication methods able to cope with these constraints. This paper aims to propose an authentication scheme which significantly shortens the authentication latency and that can be deployed in a variety of wireless environments ranging from common Wireless LANs (WLANs) to satellite-based access networks
Cyber Insurance for Heterogeneous Wireless Networks
Heterogeneous wireless networks (HWNs) composed of densely deployed base
stations of different types with various radio access technologies have become
a prevailing trend to accommodate ever-increasing traffic demand in enormous
volume. Nowadays, users rely heavily on HWNs for ubiquitous network access that
contains valuable and critical information such as financial transactions,
e-health, and public safety. Cyber risks, representing one of the most
significant threats to network security and reliability, are increasing in
severity. To address this problem, this article introduces the concept of cyber
insurance to transfer the cyber risk (i.e., service outage, as a consequence of
cyber risks in HWNs) to a third party insurer. Firstly, a review of the
enabling technologies for HWNs and their vulnerabilities to cyber risks is
presented. Then, the fundamentals of cyber insurance are introduced, and
subsequently, a cyber insurance framework for HWNs is presented. Finally, open
issues are discussed and the challenges are highlighted for integrating cyber
insurance as a service of next generation HWNs.Comment: IEEE Communications Magazine (Heterogeneous Ultra Dense Networks
Capacity and Stable Scheduling in Heterogeneous Wireless Networks
Heterogeneous wireless networks (HetNets) provide a means to increase network
capacity by introducing small cells and adopting a layered architecture.
HetNets allocate resources flexibly through time sharing and cell range
expansion/contraction allowing a wide range of possible schedulers. In this
paper we define the capacity of a HetNet down link in terms of the maximum
number of downloads per second which can be achieved for a given offered
traffic density. Given this definition we show that the capacity is determined
via the solution to a continuous linear program (LP). If the solution is
smaller than 1 then there is a scheduler such that the number of mobiles in the
network has ergodic properties with finite mean waiting time. If the solution
is greater than 1 then no such scheduler exists. The above results continue to
hold if a more general class of schedulers is considered.Comment: 30 pages, 6 figure
Content Caching and Delivery over Heterogeneous Wireless Networks
Emerging heterogeneous wireless architectures consist of a dense deployment
of local-coverage wireless access points (APs) with high data rates, along with
sparsely-distributed, large-coverage macro-cell base stations (BS). We design a
coded caching-and-delivery scheme for such architectures that equips APs with
storage, enabling content pre-fetching prior to knowing user demands. Users
requesting content are served by connecting to local APs with cached content,
as well as by listening to a BS broadcast transmission. For any given content
popularity profile, the goal is to design the caching-and-delivery scheme so as
to optimally trade off the transmission cost at the BS against the storage cost
at the APs and the user cost of connecting to multiple APs. We design a coded
caching scheme for non-uniform content popularity that dynamically allocates
user access to APs based on requested content. We demonstrate the approximate
optimality of our scheme with respect to information-theoretic bounds. We
numerically evaluate it on a YouTube dataset and quantify the trade-off between
transmission rate, storage, and access cost. Our numerical results also suggest
the intriguing possibility that, to gain most of the benefits of coded caching,
it suffices to divide the content into a small number of popularity classes.Comment: A shorter version is to appear in IEEE INFOCOM 201
Robust Heterogeneous Network to Support Multitasking
Due to emerging technology, efficient multitasking approach is highly demanded. But it is hard to accomplish in heterogeneous wireless networks, where diverse networks have dissimilar geometric features in service and traffic models. Multitasking loss examination based on Markov chain becomes inflexible in these networks owing to rigorous computations is obligatory. This paper emphases on the performance of heterogeneous wireless networks based on multitasking. A method based on multitasking of the interrelated traffic is used to attain an approximate performance in heterogeneous wireless networks with congested traffic. The accuracy of the robust heterogeneous network with multitasking is verified by using ns2 simulations.http://arxiv.org/abs/1309.451
Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks
This paper investigates the use of deep reinforcement learning (DRL) in a MAC
protocol for heterogeneous wireless networking referred to as
Deep-reinforcement Learning Multiple Access (DLMA). The thrust of this work is
partially inspired by the vision of DARPA SC2, a 3-year competition whereby
competitors are to come up with a clean-slate design that "best share spectrum
with any network(s), in any environment, without prior knowledge, leveraging on
machine-learning technique". Specifically, this paper considers the problem of
sharing time slots among a multiple of time-slotted networks that adopt
different MAC protocols. One of the MAC protocols is DLMA. The other two are
TDMA and ALOHA. The nodes operating DLMA do not know that the other two MAC
protocols are TDMA and ALOHA. Yet, by a series of observations of the
environment, its own actions, and the resulting rewards, a DLMA node can learn
an optimal MAC strategy to coexist harmoniously with the TDMA and ALOHA nodes
according to a specified objective (e.g., the objective could be the sum
throughput of all networks, or a general alpha-fairness objective)
- …