21 research outputs found
Coverage and Deployment Analysis of Narrowband Internet of Things in the Wild
Narrowband Internet of Things (NB-IoT) is gaining momentum as a promising
technology for massive Machine Type Communication (mMTC). Given that its
deployment is rapidly progressing worldwide, measurement campaigns and
performance analyses are needed to better understand the system and move toward
its enhancement. With this aim, this paper presents a large scale measurement
campaign and empirical analysis of NB-IoT on operational networks, and
discloses valuable insights in terms of deployment strategies and radio
coverage performance. The reported results also serve as examples showing the
potential usage of the collected dataset, which we make open-source along with
a lightweight data visualization platform.Comment: Accepted for publication in IEEE Communications Magazine (Internet of
Things and Sensor Networks Series
Ultra Reliable UAV Communication Using Altitude and Cooperation Diversity
The use of unmanned aerial vehicles (UAVs) that serve as aerial base stations
is expected to become predominant in the next decade. However, in order for
this technology to unfold its full potential it is necessary to develop a
fundamental understanding of the distinctive features of air-to-ground (A2G)
links. As a contribution in this direction, this paper proposes a generic
framework for the analysis and optimization of the A2G systems. In contrast to
the existing literature, this framework incorporates both height-dependent path
loss exponent and small-scale fading, and unifies a widely used
ground-to-ground channel model with that of A2G for analysis of large-scale
wireless networks. We derive analytical expressions for the optimal UAV height
that minimizes the outage probability of a given A2G link. Moreover, our
framework allows us to derive a height-dependent closed-form expression and a
tight lower bound for the outage probability of an \textit{A2G cooperative
communication} network. Our results suggest that the optimal location of the
UAVs with respect to the ground nodes does not change by the inclusion of
ground relays. This enables interesting insights in the deployment of future
A2G networks, as the system reliability could be adjusted dynamically by adding
relaying nodes without requiring changes in the position of the corresponding
UAVs
Unmanned Aerial Vehicle with Underlaid Device-to-Device Communications: Performance and Tradeoffs
In this paper, the deployment of an unmanned aerial vehicle (UAV) as a flying
base station used to provide on the fly wireless communications to a given
geographical area is analyzed. In particular, the co-existence between the UAV,
that is transmitting data in the downlink, and an underlaid device-todevice
(D2D) communication network is considered. For this model, a tractable
analytical framework for the coverage and rate analysis is derived. Two
scenarios are considered: a static UAV and a mobile UAV. In the first scenario,
the average coverage probability and the system sum-rate for the users in the
area are derived as a function of the UAV altitude and the number of D2D users.
In the second scenario, using the disk covering problem, the minimum number of
stop points that the UAV needs to visit in order to completely cover the area
is computed. Furthermore, considering multiple retransmissions for the UAV and
D2D users, the overall outage probability of the D2D users is derived.
Simulation and analytical results show that, depending on the density of D2D
users, optimal values for the UAV altitude exist for which the system sum-rate
and the coverage probability are maximized. Moreover, our results also show
that, by enabling the UAV to intelligently move over the target area, the total
required transmit power of UAV while covering the entire area, is minimized.
Finally, in order to provide a full coverage for the area of interest, the
tradeoff between the coverage and delay, in terms of the number of stop points,
is discussed.Comment: accepted in the IEEE Transactions on Wireless Communication
On the Role of Age of Information in the Internet of Things
In this article, we provide an accessible introduction to the emerging idea
of Age of Information (AoI) that quantifies freshness of information and
explore its possible role in the efficient design of freshness-aware Internet
of Things (IoT). We start by summarizing the concept of AoI and its variants
with emphasis on the differences between AoI and other well-known performance
metrics in the literature, such as throughput and delay. Building on this, we
explore freshness-aware IoT design for a network in which IoT devices sense
potentially different physical processes and are supposed to frequently update
the status of these processes at a destination node (such as a cellular base
station). Inspired by the recent interest, we also assume that these IoT
devices are powered by wireless energy transfer by the destination node. For
this setting, we investigate the optimal sampling policy that jointly optimizes
wireless energy transfer and scheduling of update packet transmissions from IoT
devices with the goal of minimizing long-term weighted sum-AoI. Using this, we
characterize the achievable AoI region. We also compare this AoI-optimal policy
with the one that maximizes average throughput (throughput-optimal policy), and
demonstrate the impact of system state on their structures. Several promising
directions for future research are also presented.Comment: To appear in IEEE Communications Magazin
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones
This paper studies the secrecy performance of a wireless network (primary
network) overlaid with an ambient RF energy harvesting IoT network (secondary
network). The nodes in the secondary network are assumed to be solely powered
by ambient RF energy harvested from the transmissions of the primary network.
We assume that the secondary nodes can eavesdrop on the primary transmissions
due to which the primary network uses secrecy guard zones. The primary
transmitter goes silent if any secondary receiver is detected within its guard
zone. Using tools from stochastic geometry, we derive the probability of
successful connection of the primary network as well as the probability of
secure communication. Two conditions must be jointly satisfied in order to
ensure successful connection: (i) the SINR at the primary receiver is above a
predefined threshold, and (ii) the primary transmitter is not silent. In order
to ensure secure communication, the SINR value at each of the secondary nodes
should be less than a predefined threshold. Clearly, when more secondary nodes
are deployed, more primary transmitters will remain silent for a given guard
zone radius, thus impacting the amount of energy harvested by the secondary
network. Our results concretely show the existence of an optimal deployment
density for the secondary network that maximizes the density of nodes that are
able to harvest sufficient amount of energy. Furthermore, we show the
dependence of this optimal deployment density on the guard zone radius of the
primary network. In addition, we show that the optimal guard zone radius
selected by the primary network is a function of the deployment density of the
secondary network. This interesting coupling between the two networks is
studied using tools from game theory. Overall, this work is one of the few
concrete works that symbiotically merge tools from stochastic geometry and game
theory