296 research outputs found
Energy and bursty packet loss tradeoff over fading channels: a system-level model
Energy efficiency and quality of service (QoS) guarantees are the key design goals for the 5G wireless communication systems. In this context, we discuss a multiuser scheduling scheme over fading channels for loss tolerant applications. The loss tolerance of the application is characterized in terms of different parameters that contribute to quality of experience (QoE) for the application. The mobile users are scheduled opportunistically such that a minimum QoS is guaranteed. We propose an opportunistic scheduling scheme and address the cross-layer design framework when channel state information (CSI) is not perfectly available at the transmitter and the receiver. We characterize the system energy as a function of different QoS and channel state estimation error parameters. The optimization problem is formulated using Markov chain framework and solved using stochastic optimization techniques. The results demonstrate that the parameters characterizing the packet loss are tightly coupled and relaxation of one parameter does not benefit the system much if the other constraints are tight. We evaluate the energy-performance tradeoff numerically and show the effect of channel uncertainty on the packet scheduler design
Green Networking in Cellular HetNets: A Unified Radio Resource Management Framework with Base Station ON/OFF Switching
In this paper, the problem of energy efficiency in cellular heterogeneous
networks (HetNets) is investigated using radio resource and power management
combined with the base station (BS) ON/OFF switching. The objective is to
minimize the total power consumption of the network while satisfying the
quality of service (QoS) requirements of each connected user. We consider the
case of co-existing macrocell BS, small cell BSs, and private femtocell access
points (FAPs). Three different network scenarios are investigated, depending on
the status of the FAPs, i.e., HetNets without FAPs, HetNets with closed FAPs,
and HetNets with semi-closed FAPs. A unified framework is proposed to
simultaneously allocate spectrum resources to users in an energy efficient
manner and switch off redundant small cell BSs. The high complexity dual
decomposition technique is employed to achieve optimal solutions for the
problem. A low complexity iterative algorithm is also proposed and its
performances are compared to those of the optimal technique. The particularly
interesting case of semi-closed FAPs, in which the FAPs accept to serve
external users, achieves the highest energy efficiency due to increased degrees
of freedom. In this paper, a cooperation scheme between FAPs and mobile
operator is also investigated. The incentives for FAPs, e.g., renewable energy
sharing and roaming prices, enabling cooperation are discussed to be considered
as a useful guideline for inter-operator agreements.Comment: 15 pages, 9 Figures, IEEE Transactions on Vehicular Technology 201
Location privacy preservation in secure crowdsourcing-based cooperative spectrum sensing
Spectrum sensing is one of the most essential components of cognitive radio since it detects whether the spectrum is available or not. However, spectrum sensing accuracy is often degraded due to path loss, interference, and shadowing. Cooperative spectrum sensing (CSS) is one of the proposed solutions to overcome these challenges. It is a key function for dynamic spectrum access that can increase largely the reliability in cognitive radio networks. In fact, several users cooperate to detect the availability of a wireless channel by exploiting spatial diversity. However, cooperative sensing is also facing some series of security threats. In this paper, we focus on two major problems. The first problem is the localization preservation of the secondary users. In fact, malicious users can exploit spatial diversity to localize a secondary user by linking his location-dependent sensing report to his physical position. The existing solutions present a high level of complexity which decreases the performance of the systems. The second problem is the data injection attack, in which malicious CR users may affect the decisions taken by the cognitive users by providing false information, introducing spectrum sensing data falsification (SSDF). In fact, they can submit false sensing reports containing power measurements much larger (or smaller) than the true value to inflate (or deflate) the final average, in which case the fusion center may falsely determine that the channel is busy (or vacant) which increases the false alarm and miss detection probabilities. In this paper, we propose a novel scheme to overcome these problems: iterative per cluster malicious detection (IPCMD). It utilizes applied cryptographic techniques to allow the fusion center (FC) to securely obtain the aggregated result from various secondary users without learning each individual report. IPCMD combines the aggregated sensing reports with their reputation scores during data fusion. The proposed scheme is based on a new algorithm for key generation which can significantly reduce the key management complexity and consequently increase the system performance. Therefore, it can enable secure cooperative spectrum sensing and improve the secondary user location privacy.Ooreedoo, Doha, QatarScopu
Channel modelling of human tissues at terahertz band
In this paper, the channel model is proposed to compute the path loss, delay and noise at THz band of interest (0.5 THz ~ 1.5 THz). The results shows that THz band channel is strongly dependent on both the type of the medium and the distance while the concentration of water have a lot of influence because it not only causes attenuation to the THz wave but also introduces non-white noise. Therefore, the proposed model paves the way to the further studies considering more body structures and tissue properties
Resource allocation for licensed/unlicensed carrier aggregation MIMO systems
In this paper a novel Carrier Aggregation (CA) scheme is proposed for downlink MIMO LTE-A Systems. The proposed approach achieves increased transmission rates by establishing the communication links via both licensed and unlicensed bands without generating or experiencing interference to/from the users of the latter bands. To that end, a rate optimization problem is defined and solved subject to the previous zero interference constraints, a total power constraint and a maximum number of aggregated bands constraint
Technologies and solutions for location-based services in smart cities: past, present, and future
Location-based services (LBS) in smart cities have drastically altered the way cities operate, giving a new dimension to the life of citizens. LBS rely on location of a device, where proximity estimation remains at its core. The applications of LBS range from social networking and marketing to vehicle-toeverything communications. In many of these applications, there is an increasing need and trend to learn the physical distance between nearby devices. This paper elaborates upon the current needs of proximity estimation in LBS and compares them against the available Localization and Proximity (LP) finding technologies (LP technologies in short). These technologies are compared for their accuracies and performance based on various different parameters, including latency, energy consumption, security, complexity, and throughput. Hereafter, a classification of these technologies, based on various different smart city applications, is presented. Finally, we discuss some emerging LP technologies that enable proximity estimation in LBS and present some future research areas
Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks
Chaminda Alocious, Hannan Xiao, B. Christianson, 'Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks' paper presented at the 2016 IEEE Wireless Communications and Networking Conference (IEEE WCNC). Doha, Qatar. 3-6 April 2016Wireless network security requirements are becoming more important and critical. The modern network security architectures require more attention to provide security in each network layer. This will require understanding of protocol vulnerabilities in existing protocol architectures. However, providing security requirements are not just limited to confidentiality and integrity, also availability and fairness are important security elements. IEEE 802.11 MAC protocol is one of the most common standard in modern day networks and has been designed without a consideration for providing security protection at MAC layer. IEEE 802.11 assumes all the nodes in the network are cooperative. However, nodes may purposefully misbehave in order to obtain extra bandwidth, conserve resources and disrupt network performance. This research proposes a Misbehaviour Detection MAC protocol (MD-MAC) to address the problematic scenarios of MAC layer misbehaviours, which takes a novel approach to detect misbehaviours in Mobile Adhoc Networks (MANETs). The MD-MAC modifies the CSMA/CA protocol message exchange and uses verifiable backoff value generation mechanism with an incorporated trust model which is suitable for distributed networks. The MD-MAC protocol has been implemented and evaluated in ns2, simulation results suggest that the protocol is able to detect misbehaving wireless nodes in a distributed network environment
- …