9 research outputs found
Stochastic Analysis of Non-slotted Aloha in Wireless Ad-Hoc Networks
In this paper we propose two analytically tractable stochastic models of
non-slotted Aloha for Mobile Ad-hoc NETworks (MANETs): one model assumes a
static pattern of nodes while the other assumes that the pattern of nodes
varies over time. Both models feature transmitters randomly located in the
Euclidean plane, according to a Poisson point process with the receivers
randomly located at a fixed distance from the emitters. We concentrate on the
so-called outage scenario, where a successful transmission requires a
Signal-to-Interference-and-Noise Ratio (SINR) larger than a given threshold.
With Rayleigh fading and the SINR averaged over the duration of the packet
transmission, both models lead to closed form expressions for the probability
of successful transmission. We show an excellent matching of these results with
simulations. Using our models we compare the performances of non-slotted Aloha
to previously studied slotted Aloha. We observe that when the path loss is not
very strong both models, when appropriately optimized, exhibit similar
performance. For stronger path loss non-slotted Aloha performs worse than
slotted Aloha, however when the path loss exponent is equal to 4 its density of
successfully received packets is still 75% of that in the slotted scheme. This
is still much more than the 50% predicted by the well-known analysis where
simultaneous transmissions are never successful. Moreover, in any path loss
scenario, both schemes exhibit the same energy efficiency.Comment: accepted for IEEE Infocom 201
Achieving Max-Min Throughput in LoRa Networks
With growing popularity, LoRa networks are pivotally enabling Long Range
connectivity to low-cost and power-constrained user equipments (UEs). Due to
its wide coverage area, a critical issue is to effectively allocate wireless
resources to support potentially massive UEs in the cell while resolving the
prominent near-far fairness problem for cell-edge UEs, which is challenging to
address due to the lack of tractable analytical model for the LoRa network and
its practical requirement for low-complexity and low-overhead design. To
achieve massive connectivity with fairness, we investigate the problem of
maximizing the minimum throughput of all UEs in the LoRa network, by jointly
designing high-level policies of spreading factor (SF) allocation, power
control, and duty cycle adjustment based only on average channel statistics and
spatial UE distribution. By leveraging on the Poisson rain model along with
tailored modifications to our considered LoRa network, we are able to account
for channel fading, aggregate interference and accurate packet overlapping, and
still obtain a tractable and yet accurate closed-form formula for the packet
success probability and hence throughput. We further propose an iterative
balancing (IB) method to allocate the SFs in the cell such that the overall
max-min throughput can be achieved within the considered time period and cell
area. Numerical results show that the proposed scheme with optimized design
greatly alleviates the near-far fairness issue, and significantly improves the
cell-edge throughput.Comment: 6 pages, 4 figures, published in Proc. International Conference on
Computing, Networking and Communications (ICNC), 2020. This paper proposes
stochastic-geometry based analytical framework for a single-cell LoRa
network, with joint optimization to achieve max-min throughput for the users.
Extended journal version for large-scale multi-cell LoRa network:
arXiv:2008.0743
Stochastic Analysis of Aloha in Vehicular Ad-hoc Networks
International audienceThe aim of this paper is to study the Aloha medium access (MAC) scheme in one-dimensional, {\em linear} networks, which might be an appropriate assumption for Vehicular Ad-hoc NETworks (VANETs). We study performance metrics based on the signal-over-interference and noise ratio (SINR) assuming power-law mean path-loss and independent point-to-point fading. We derive closed formulas for the capture probability. We consider the presence or the absence of noise and we study performance with outage or with adaptive coding. We carry out the joint optimization of the density of packet progress (in bit meters) both in the transmission probability and in the transmission range. We also compare the performance of slotted and non-slotted Aloha. We show that in contrast to planar networks the density of packet progress per unit of length does not increase with the network node density
Enhancing Secrecy with Multi-Antenna Transmission in Wireless Ad Hoc Networks
We study physical-layer security in wireless ad hoc networks and investigate
two types of multi-antenna transmission schemes for providing secrecy
enhancements. To establish secure transmission against malicious eavesdroppers,
we consider the generation of artificial noise with either sectoring or
beamforming. For both approaches, we provide a statistical characterization and
tradeoff analysis of the outage performance of the legitimate communication and
the eavesdropping links. We then investigate the networkwide secrecy throughput
performance of both schemes in terms of the secrecy transmission capacity, and
study the optimal power allocation between the information signal and the
artificial noise. Our analysis indicates that, under transmit power
optimization, the beamforming scheme outperforms the sectoring scheme, except
for the case where the number of transmit antennas are sufficiently large. Our
study also reveals some interesting differences between the optimal power
allocation for the sectoring and beamforming schemes.Comment: to appear in IEEE Transactions on Information Forensics and Securit
Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks
We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements. To establish secure transmission against malicious eavesdroppers, we consider the generation of artificial noise with either sectoring or beamforming. For both approaches, we provide a statistical characterization and tradeoff analysis of the outage performance of the legitimate communication and the eavesdropping links. We then investigate the network-wide secrecy throughput performance of both schemes in terms of the secrecy transmission capacity, and study the optimal power allocation between the information signal and the artificial noise. Our analysis indicates that, under transmit power optimization, the beamforming scheme outperforms the sectoring scheme, except for the case where the number of transmit antennas are sufficiently large. Our study also reveals some interesting differences between the optimal power allocation for the sectoring and beamforming schemes.The work of X. Zhang andM. R.McKay was supported by the Hong Kong Research Grants Council under Grant 616312. The work of X. Zhou was supported by the Australian Research Council's Discovery Projects funding scheme under Project DP11010254
Interference in spatial non-slotted Aloha networks
In this paper we propose two analytically tractable stochastic-geometric models of interference in ad-hoc networks using pure (non-slotted) Aloha as the medium access. In contrast to the slotted model, the interference in pure Aloha may vary during the transmission of a tagged packet. We develop closed form expressions for the Laplace transform of the empirical average of the interference experienced during the transmission of a typical packet. Both models assume a power-law path-loss function with arbitrarily distributed fading and feature configurations of transmitters randomly located in the Euclidean plane according to a Poisson point process. Depending on the model, these configurations vary over time or are static. We apply our analysis of the interference to study the Signal-to-Interference-and-Noise Ratio (SINR) outage probability for a typical transmission in pure Aloha. The results are used to compare the performance of non-slotted Aloha to slotted Aloha, which has almost exclusively been previously studied in the same context of mobile ad-hoc networks
Solutions for large scale, efficient, and secure Internet of Things
The design of a general architecture for the Internet of Things (IoT) is a complex task, due to the heterogeneity of devices, communication technologies, and applications that are part of such systems. Therefore, there are significant opportunities to improve the state of the art, whether to better the performance of the system, or to solve actual issues in current systems. This thesis focuses, in particular, on three aspects of the IoT. First, issues of cyber-physical systems are analysed. In these systems, IoT technologies are widely used to monitor, control, and act on physical entities. One of the most important issue in these scenarios are related to the communication layer, which must be characterized by high reliability, low latency, and high energy efficiency. Some solutions for the channel access scheme of such systems are proposed, each tailored to different specific scenarios. These solutions, which exploit the capabilities of state of the art radio transceivers, prove effective in improving the performance of the considered systems. Positioning services for cyber-physical systems are also investigated, in order to improve the accuracy of such services. Next, the focus moves to network and service optimization for traffic intensive applications, such as video streaming. This type of traffic is common amongst non-constrained devices, like smartphones and augmented/virtual reality headsets, which form an integral part of the IoT ecosystem. The proposed solutions are able to increase the video Quality of Experience while wasting less bandwidth than state of the art strategies. Finally, the security of IoT systems is investigated. While often overlooked, this aspect is fundamental to enable the ubiquitous deployment of IoT. Therefore, security issues of commonly used IoT protocols are presented, together with a proposal for an authentication mechanism based on physical channel features. This authentication strategy proved to be effective as a standalone mechanism or as an additional security layer to improve the security level of legacy systems