15 research outputs found

    Relay assisted device-to-device communication with channel uncertainty

    Get PDF
    The gains of direct communication between user equipment in a network may not be fully realised due to the separation between the user equipment and due to the fading that the channel between these user equipment experiences. In order to fully realise the gains that direct (device-to-device) communication promises, idle user equipment can be exploited to serve as relays to enforce device-to-device communication. The availability of potential relay user equipment creates a problem: a way to select the relay user equipment. Moreover, unlike infrastructure relays, user equipment are carried around by people and these users are self-interested. Thus the problem of relay selection goes beyond choosing which device to assist in relayed communication but catering for user self-interest. Another problem in wireless communication is the unavailability of perfect channel state information. This reality creates uncertainty in the channel and so in designing selection algorithms, channel uncertainty awareness needs to be a consideration. Therefore the work in this thesis considers the design of relay user equipment selection algorithms that are not only device centric but that are relay user equipment centric. Furthermore, the designed algorithms are channel uncertainty aware. Firstly, a stable matching based relay user equipment selection algorithm is put forward for underlay device-to-device communication. A channel uncertainty aware approach is proposed to cater to imperfect channel state information at the devices. The algorithm is combined with a rate based mode selection algorithm. Next, to cater to the queue state at the relay user equipment, a cross-layer selection algorithm is proposed for a twoway decode and forward relay set up. The algorithm proposed employs deterministic uncertainty constraint in the interference channel, solving the selection algorithm in a heuristic fashion. Then a cluster head selection algorithm is proposed for device-to-device group communication constrained by channel uncertainty in the interference channel. The formulated rate maximization problem is solved for deterministic and probabilistic constraint scenarios, and the problem extended to a multiple-input single-out scenario for which robust beamforming was designed. Finally, relay utility and social distance based selection algorithms are proposed for full duplex decode and forward device-to-device communication set up. A worst-case approach is proposed for a full channel uncertainty scenario. The results from computer simulations indicate that the proposed algorithms offer spectral efficiency, fairness and energy efficiency gains. The results also showed clearly the deterioration in the performance of networks when perfect channel state information is assumed

    A survey on intelligent computation offloading and pricing strategy in UAV-Enabled MEC network: Challenges and research directions

    Get PDF
    The lack of resource constraints for edge servers makes it difficult to simultaneously perform a large number of Mobile Devices’ (MDs) requests. The Mobile Network Operator (MNO) must then select how to delegate MD queries to its Mobile Edge Computing (MEC) server in order to maximize the overall benefit of admitted requests with varying latency needs. Unmanned Aerial Vehicles (UAVs) and Artificial Intelligent (AI) can increase MNO performance because of their flexibility in deployment, high mobility of UAV, and efficiency of AI algorithms. There is a trade-off between the cost incurred by the MD and the profit received by the MNO. Intelligent computing offloading to UAV-enabled MEC, on the other hand, is a promising way to bridge the gap between MDs' limited processing resources, as well as the intelligent algorithms that are utilized for computation offloading in the UAV-MEC network and the high computing demands of upcoming applications. This study looks at some of the research on the benefits of computation offloading process in the UAV-MEC network, as well as the intelligent models that are utilized for computation offloading in the UAV-MEC network. In addition, this article examines several intelligent pricing techniques in different structures in the UAV-MEC network. Finally, this work highlights some important open research issues and future research directions of Artificial Intelligent (AI) in computation offloading and applying intelligent pricing strategies in the UAV-MEC network

    Game theory for cooperation in multi-access edge computing

    Get PDF
    Cooperative strategies amongst network players can improve network performance and spectrum utilization in future networking environments. Game Theory is very suitable for these emerging scenarios, since it models high-complex interactions among distributed decision makers. It also finds the more convenient management policies for the diverse players (e.g., content providers, cloud providers, edge providers, brokers, network providers, or users). These management policies optimize the performance of the overall network infrastructure with a fair utilization of their resources. This chapter discusses relevant theoretical models that enable cooperation amongst the players in distinct ways through, namely, pricing or reputation. In addition, the authors highlight open problems, such as the lack of proper models for dynamic and incomplete information scenarios. These upcoming scenarios are associated to computing and storage at the network edge, as well as, the deployment of large-scale IoT systems. The chapter finalizes by discussing a business model for future networks.info:eu-repo/semantics/acceptedVersio

    Enable Reliable and Secure Data Transmission in Resource-Constrained Emerging Networks

    Get PDF
    The increasing deployment of wireless devices has connected humans and objects all around the world, benefiting our daily life and the entire society in many aspects. Achieving those connectivity motivates the emergence of different types of paradigms, such as cellular networks, large-scale Internet of Things (IoT), cognitive networks, etc. Among these networks, enabling reliable and secure data transmission requires various resources including spectrum, energy, and computational capability. However, these resources are usually limited in many scenarios, especially when the number of devices is considerably large, bringing catastrophic consequences to data transmission. For example, given the fact that most of IoT devices have limited computational abilities and inadequate security protocols, data transmission is vulnerable to various attacks such as eavesdropping and replay attacks, for which traditional security approaches are unable to address. On the other hand, in the cellular network, the ever-increasing data traffic has exacerbated the depletion of spectrum along with the energy consumption. As a result, mobile users experience significant congestion and delays when they request data from the cellular service provider, especially in many crowded areas. In this dissertation, we target on reliable and secure data transmission in resource-constrained emerging networks. The first two works investigate new security challenges in the current heterogeneous IoT environment, and then provide certain countermeasures for reliable data communication. To be specific, we identify a new physical-layer attack, the signal emulation attack, in the heterogeneous environment, such as smart home IoT. To defend against the attack, we propose two defense strategies with the help of a commonly found wireless device. In addition, to enable secure data transmission in large-scale IoT network, e.g., the industrial IoT, we apply the amply-and-forward cooperative communication to increase the secrecy capacity by incentivizing relay IoT devices. Besides security concerns in IoT network, we seek data traffic alleviation approaches to achieve reliable and energy-efficient data transmission for a group of users in the cellular network. The concept of mobile participation is introduced to assist data offloading from the base station to users in the group by leveraging the mobility of users and the social features among a group of users. Following with that, we deploy device-to-device data offloading within the group to achieve the energy efficiency at the user side while adapting to their increasing traffic demands. In the end, we consider a perpendicular topic - dynamic spectrum access (DSA) - to alleviate the spectrum scarcity issue in cognitive radio network, where the spectrum resource is limited to users. Specifically, we focus on the security concerns and further propose two physical-layer schemes to prevent spectrum misuse in DSA in both additive white Gaussian noise and fading environments

    Federated Learning with Privacy-Preserving Incentives for Aerial Computing Networks

    Get PDF
    With the help of artificial intelligence (AI) model, aerial computing can help analyze and predict the network dynamics and support intelligent decision-making to improve the performance of 6G space-air-ground integrated networks. Federated learning has been proposed to tackle the challenges of limited energy and data shortage for the application of AI models in aerial computing networks. A critical problem of FL for aerial computing is the lack of incentives due to privacy concerns. On the one hand, the information needed to measure users’ learning quality may be eavesdropped. On the other hand, users’ real costs for determining payments may also undertake inference attacks. In this paper, we design a privacy-preserving and learning quality-aware incentive mechanism for federated learning in aerial computing networks. We propose differential privacy based scheme to protect the privacy of the real cost. In addition, utilize Combinatorial Multi-Armed Bandit (CMAB) algorithm to evaluate the user learning quality without any participant information. Simulation results demonstrate that our scheme can significantly motivate high-quality participants with guaranteed privacy preservation and achieve effective federated learning under the constraint of the limited budget

    Auction-Based Efficient Online Incentive Mechanism Designs in Wireless Networks

    Get PDF
    Recently, wide use of mobile devices and applications, such as YouTube and Twitter, has facilitated every aspect of our daily lives. Meanwhile, it has also posed great challenges to enable resource-demanding users to successfully access networks. Thus, in order to enlarge network capacity and fully make use of vacant resources, new communication architectures emerge, such as D2D communications, edge computing, and crowdsourcing, all of which ask for involvement of end mobile users in assisting transmission, computation, or network management. However, end mobile users are not always willing to actively provide such sharing services if no reimbursements are provided as they need to consume their own computation and communication resources. Besides, since mobile users are not always stationary, they can opt-in and opt-out the network for their own convenience. Thus, an important practical characteristic of wireless networks, i.e., the mobility of mobile users cannot be ignored, which means that the demands of mobile users span over a period of time. As one of promising solutions, the online incentive mechanism design has been introduced in wireless networks in order to motivate the participation of more mobile users under a dynamic environment. In this thesis, with the analyses of each stakeholder's economic payoffs in wireless networks, the auction-based online incentive mechanisms are proposed to achieve resource allocations, participant selections, and payment determinations in two wireless networks, i.e., Crowdsensing and mobile edge computing. In particular, i) an online incentive mechanism is designed to guarantee Quality of Information of each arriving task in mobile crowdsensing networks, followed by an enhanced online strategy which could further improves the competitive ratio; ii) an online incentive mechanism jointly considering communication and computation resource allocations in collaborative edge computing networks is proposed based on the primal-dual theory; iii) to deal with the nonlinear issue in edge computing networks, an nonlinear online incentive mechanism under energy budget constraints of mobile users is designed based on the Maximal-in-Distributional Range framework; and iv) inspired by the recent development of deep learning techniques, a deep incentive mechanism with the budget balance of each mobile user is proposed to maximize the net revenue of service providers by leveraging the multi-task machine learning model. Both theoretical analyses and numerical results demonstrate the effectiveness of the designed mechanisms

    Distributed radio resource allocation in wireless heterogeneous networks

    Get PDF
    This dissertation studies the problem of resource allocation in the radio access network of heterogeneous small-cell networks (HetSNets). A HetSNet is constructed by introducing smallcells(SCs) to a geographical area that is served by a well-structured macrocell network. These SCs reuse the frequency bands of the macro-network and operate in the interference-limited region. Thus, complex radio resource allocation schemes are required to manage interference and improve spectral efficiency. Both centralized and distributed approaches have been suggested by researchers to solve this problem. This dissertation follows the distributed approach under the self-organizing networks (SONs) paradigm. In particular, it develops game-theoretic and learning-theoretic modeling, analysis, and algorithms. Even though SONs may perform subpar to a centralized optimal controller, they are highly scalable and fault-tolerant. There are many facets to the problem of wireless resource allocation. They vary by the application, solution, methodology, and resource type. Therefore, this thesis restricts the treatment to four subproblems that were chosen due to their significant impact on network performance and suitability to our interests and expertise. Game theory and mechanism design are the main tools used since they provide a sufficiently rich environment to model the SON problem. Firstly, this thesis takes into consideration the problem of uplink orthogonal channel access in a dense cluster of SCs that is deployed in a macrocell service area. Two variations of this problem are modeled as noncooperative Bayesian games and the existence of pure-Bayesian Nash symmetric equilibria are demonstrated. Secondly, this thesis presents the generalized satisfaction equilibrium (GSE) for games in satisfaction-form. Each wireless agent has a constraint to satisfy and the GSE is a mixed-strategy profile from which no unsatisfied agent can unilaterally deviate to satisfaction. The objective of the GSE is to propose an alternative equilibrium that is designed specifically to model wireless users. The existence of the GSE, its computational complexity, and its performance compared to the Nash equilibrium are discussed. Thirdly, this thesis introduces verification mechanisms for dynamic self-organization of Wireless access networks. The main focus of verification mechanisms is to replace monetary transfers that are prevalent in current research. In the wireless environment particular private information of the wireless agents, such as block error rate and application class, can be verified at the access points. This verification capability can be used to threaten false reports with backhaul throttling. The agents then learn the truthful equilibrium over time by observing the rewards and punishments. Finally, the problem of admission control in the interfering-multiple access channel with rate constraints is addressed. In the incomplete information setting, with compact convex channel power gains, the resulting Bayesian game possesses at least one pureBayesian Nash equilibrium in on-off threshold strategies. The above-summarized results of this thesis demonstrate that the HetSNets are amenable to self-organization, albeit with adapted incentives and equilibria to fit the wireless environment. Further research problems to expand these results are identified at the end of this document
    corecore