53 research outputs found

    Optimization of Mixed Numerology Profiles for 5G Wireless Communication Scenarios

    Get PDF
    The management of 5G resources is a demanding task, requiring proper planning of operating numerology indexes and spectrum allocation according to current traffic needs. In addition, any reconfigurations to adapt to the current traffic pattern should be minimized to reduce signaling overhead. In this article, the pre-planning of numerology profiles is proposed to address this problem, and a mathematical optimization model for their planning is developed. The idea is to explore requirements and impairments usually present in a given wireless communication scenario to build numerology profiles and then adopt one of the profiles according to the current users/traffic pattern. The model allows the optimization of mixed numerologies in future 5G systems under any wireless communication scenario, with specific service requirements and impairments, and under any traffic scenario. Results show that, depending on the granularity of the profiles, the proposed optimization model is able to provide satisfaction levels of 60–100%, whereas a non-optimized approach provides 40–65%, while minimizing the total number of numerology indexes in operation.Competitiveness and Internationalization Operational Programme (COMPETE 2020), the Regional Operational Program of the Algarve (2020), and Fundação para a Ciência e Tecnologia; i-Five: Extensão do acesso de espectro dinâmico para rádio 5G, POCI-01-0145-FEDER-030500. This work is also supported by Fundação para a ciência e Tecnologia within CEOT (Center for Electronic, Optoelectronic and Telecommunications) and the UID/MULTI/00631/2020 projectinfo:eu-repo/semantics/publishedVersio

    Modeling and Analysis of Data Trading on Blockchain-based Market in IoT Networks

    Get PDF

    Blockchain systems, technologies and applications: a methodology perspective

    Get PDF
    In the past decade, blockchain has shown a promising vision to build trust without any powerful third party in a secure, decentralized and scalable manner. However, due to the wide application and future development from cryptocurrency to the Internet of things, blockchain is an extremely complex system enabling integration with mathematics, computer science, communication and network engineering, etc. By revealing the intrinsic relationship between blockchain and communication, networking and computing from a methodological perspective, it provided a view to the challenge that engineers, experts and researchers hardly fully understand the blockchain process in a systematic view from top to bottom. In this article we first introduce how blockchain works, the research activities and challenges, and illustrate the roadmap involving the classic methodologies with typical blockchain use cases and topics. Second, in blockchain systems, how to adopt stochastic process, game theory, optimization theory, and machine learning to study the blockchain running processes and design the blockchain protocols/algorithms are discussed in details. Moreover, the advantages and limitations using these methods are also summarized as the guide of future work to be further considered. Finally, some remaining problems from technical, commercial and political views are discussed as the open issues. The main findings of this article will provide a survey from a methodological perspective to study theoretical model for blockchain fundamentals understanding, design network service for blockchain-based mechanisms and algorithms, as well as apply blockchain for the Internet of things, etc

    Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain

    Get PDF
    Vehicular Ad Hoc Network (VANET) is a mobile network formed by vehicles, roadside units, and other infrastructures that enable communication between the nodes to improve road safety and traffic control. While this technology promises great benefits to drivers, it has many security concerns that are critical to road safety. It is essential to ensure that only authenticated vehicles transmit data and revoked vehicles do not interfere in this communication. Many current VANET technologies also depend on a central trusted authority that can cost computation and communication overhead and be a single point of failure for the network. By using blockchain technology in VANET, we can take advantage of the decentralized and distributed framework and thereby avoid a single point of trust. Moreover, blockchain technology ensures the immutability of the data strengthening the integrity of the system. In the proposed framework, Hyperledger Fabric, a permissioned blockchain technology, is used for identity management in VANET. All the vehicles with their pseudo IDs are registered, validated, and revoked using the blockchain technology. The vehicles in the network check the validity of the safety messages received from the neighboring nodes, using the services provided by the road side units that have access to the blockchain. This framework works on looking-up the pseudo IDs and public keys on the blockchain for their validity, thus promising a light-weight authentication and reduced computation and communication overhead for vehicles to access the safety messages in the network

    A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack Surface

    Get PDF
    There is a growing interest in using social robots in public spaces for indoor and outdoor applications. The threat landscape is an important research area being investigated and debated by various stakeholders. Objectives: This study aims to identify and synthesize empirical research on the complete threat landscape of social robots in public spaces. Specifically, this paper identifies the potential threat actors, their motives for attacks, vulnerabilities, attack vectors, potential impacts of attacks, possible attack scenarios, and mitigations to these threats. Methods: This systematic literature review follows the guidelines by Kitchenham and Charters. The search was conducted in five digital databases, and 1469 studies were retrieved. This study analyzed 21 studies that satisfied the selection criteria. Results: Main findings reveal four threat categories: cybersecurity, social, physical, and public space. Conclusion: This study completely grasped the complexity of the transdisciplinary problem of social robot security and privacy while accommodating the diversity of stakeholders’ perspectives. Findings give researchers and other stakeholders a comprehensive view by highlighting current developments and new research directions in this field. This study also proposed a taxonomy for threat actors and the threat landscape of social robots in public spaces.publishedVersio

    An Error Rate Comparison of Power Domain Non-orthogonal Multiple Access and Sparse Code Multiple Access

    Get PDF
    Non-orthogonal Multiple Access (NOMA) has been envisioned as one of the key enabling techniques to fulfill the requirements of future wireless networks. The primary benefit of NOMA is higher spectrum efficiency compared to Orthogonal Multiple Access (OMA). This paper presents an error rate comparison of two distinct NOMA schemes, i.e., power domain NOMA (PD-NOMA) and Sparse Code Multiple Access (SCMA). In a typical PD-NOMA system, successive interference cancellation (SIC) is utilized at the receiver, which however may lead to error propagation. In comparison, message passing decoding is employed in SCMA. To attain the best error rate performance of PD-NOMA, we optimize the power allocation with the aid of pairwise error probability and then carry out the decoding using generalized sphere decoder (GSD). Our extensive simulation results show that SCMA system with “5×10” setting (i.e., ten users communicate over five subcarriers, each active over two subcarriers) achieves better uncoded BER and coded BER performance than both typical “1×2” and “2×4” PD-NOMA systems in uplink Rayleigh fading channel. Finally, the impacts of channel estimation error on SCMA , SIC and GSD based PD-NOMA and the complexity of multiuser detection schemes are also discussed

    Deep Learning Techniques for Radar-Based Continuous Human Activity Recognition

    Get PDF
    Human capability to perform routine tasks declines with age and age-related problems. Remote human activity recognition (HAR) is beneficial for regular monitoring of the elderly population. This paper addresses the problem of the continuous detection of daily human activities using a mm-wave Doppler radar. In this study, two strategies have been employed: the first method uses un-equalized series of activities, whereas the second method utilizes a gradient-based strategy for equalization of the series of activities. The dynamic time warping (DTW) algorithm and Long Short-term Memory (LSTM) techniques have been implemented for the classification of un-equalized and equalized series of activities, respectively. The input for DTW was provided using three strategies. The first approach uses the pixel-level data of frames (UnSup-PLevel). In the other two strategies, a convolutional variational autoencoder (CVAE) is used to extract Un-Supervised Encoded features (UnSup-EnLevel) and Supervised Encoded features (Sup-EnLevel) from the series of Doppler frames. The second approach for equalized data series involves the application of four distinct feature extraction methods: i.e., convolutional neural networks (CNN), supervised and unsupervised CVAE, and principal component Analysis (PCA). The extracted features were considered as an input to the LSTM. This paper presents a comparative analysis of a novel supervised feature extraction pipeline, employing Sup-ENLevel-DTW and Sup-EnLevel-LSTM, against several state-of-the-art unsupervised methods, including UnSUp-EnLevel-DTW, UnSup-EnLevel-LSTM, CNN-LSTM, and PCA-LSTM. The results demonstrate the superiority of the Sup-EnLevel-LSTM strategy. However, the UnSup-PLevel strategy worked surprisingly well without using annotations and frame equalization
    corecore