59 research outputs found

    An Accurate Approximation of Resource Request Distributions in Millimeter Wave 3GPP New Radio Systems

    Get PDF
    The recently standardized millimeter wave-based 3GPP New Radio technology is expected to become an enabler for both enhanced Mobile Broadband (eMBB) and ultra-reliable low latency communication (URLLC) services specified to future 5G systems. One of the first steps in mathematical modeling of such systems is the characterization of the session resource request probability mass function (pmf) as a function of the channel conditions, cell size, application demands, user location and system parameters including modulation and coding schemes employed at the air interface. Unfortunately, this pmf cannot be expressed via elementary functions. In this paper, we develop an accurate approximation of the sought pmf. First, we show that Normal distribution provides a fairly accurate approximation to the cumulative distribution function (CDF) of the signal-to-noise ratio for communication systems operating in the millimeter frequency band, further allowing evaluating the resource request pmf via error function. We also investigate the impact of shadow fading on the resource request pmf.Comment: The 19th International Conference on Next Generation Wired/Wireless Networks and Systems (New2An 2019

    Modeling the NB-IoT transmission process with intermittent network availability

    Get PDF
    Standardized by 3GPP, Narrowband Internet-of-Thing (NB-IoT) technology operating in licensed bands is nowadays widely deployed and utilized for static deployments of IoT communications services. The recent trend to equip large complex inherently nomadic systems such as trains and ships with advanced sensory capabilities call for mobility support in NB-IoT technology. Such systems entering and leaving the NB-IoT coverage periodically could lead to synchronized behavior of sensor nodes resulting in occasional spikes in the number of sensors simultaneously accessing the NB-IoT random access channel. In this study, we develop a model capturing behavior of nomadic systems roaming between coverage of NB-IoT technology. The metrics of interest are mean message transmission delay as well as the message loss probability. Our numerical results illustrate that these metrics are mainly affected by the duration of the outage interval and fraction of time systems spends in outage conditions. At the same time, the loss and delay performance only insignificantly affected by the number of sensors implying that NB-IoT random access procedure may efficiently handle sporadic loads.acceptedVersionPeer reviewe

    Multi-factor authentication: A survey and challenges in V2X applications

    Get PDF
    Today, the digitalization strides tremendously on all the sides of the modern society. One of the enablers to keep this process secure is the authentication. It touches many different areas of the connected world including payments, communications, and access right management. This manuscript attempts to shed the light on the authentication systems' evolution towards Multi-factor Authentication (MFA) from Singlefactor Authentication (SFA) and through Two-factor Authentication (2FA). Particularly, MFA is expected to be utilized for the user and vehicle-to-everything (V2X) interaction which is selected as descriptive scenario. The manuscript is focused on already available and potentially integrated sensors (factor providers) to authenticate the occupant from inside the vehicle. The survey on existing vehicular systems suitable for MFA is given. Finally, the MFA system based on reversed Lagrange polynomial, utilized in Shamir's Secret Sharing (SSS), was proposed to enable flexible in-car authentication. The solution was further extended covering the cases of authenticating the user even if some of the factors are mismatched or absent. The framework allows to qualify the missing factor and authenticate the user without providing the sensitive biometric data to the verification entity. The proposed is finally compared to conventional SSS.acceptedVersionPeer reviewe

    Multi-factor Authentication: A Survey and Challenges in V2X Applications

    No full text
    Today, the digitalization strides tremendously on all the sides of the modern society. One of the enablers to keep this process secure is the authentication. It touches many different areas of the connected world including payments, communications, and access right management. This manuscript attempts to shed the light on the authentication systems' evolution towards Multi-factor Authentication (MFA) from Single factor Authentication (SFA) and through Two-factor Authentication (2FA). Particularly, MFA is expected to be utilized for the user and vehicle-to-everything (V2X) interaction which is selected as descriptive scenario. The manuscript is focused on already available and potentially integrated sensors (factor providers) to authenticate the occupant from inside the vehicle. The survey on existing vehicular systems suitable for MFA is given. Finally, the MFA system based on reversed Lagrange polynomial, utilized in Shamir's Secret Sharing (SSS), was proposed to enable flexible in-car authentication. The solution was further extended covering the cases of authenticating the user even if some of the factors are mismatched or absent. The framework allows to quality the missing factor and authenticate the user without providing the sensitive biometric data to the verification entity. The proposed is finally compared to conventional SSS

    Multi-factor Authentication: A Survey and Challenges in V2X Applications

    No full text
    Today, the digitalization strides tremendously on all the sides of the modern society. One of the enablers to keep this process secure is the authentication. It touches many different areas of the connected world including payments, communications, and access right management. This manuscript attempts to shed the light on the authentication systems' evolution towards Multi-factor Authentication (MFA) from Single factor Authentication (SFA) and through Two-factor Authentication (2FA). Particularly, MFA is expected to be utilized for the user and vehicle-to-everything (V2X) interaction which is selected as descriptive scenario. The manuscript is focused on already available and potentially integrated sensors (factor providers) to authenticate the occupant from inside the vehicle. The survey on existing vehicular systems suitable for MFA is given. Finally, the MFA system based on reversed Lagrange polynomial, utilized in Shamir's Secret Sharing (SSS), was proposed to enable flexible in-car authentication. The solution was further extended covering the cases of authenticating the user even if some of the factors are mismatched or absent. The framework allows to quality the missing factor and authenticate the user without providing the sensitive biometric data to the verification entity. The proposed is finally compared to conventional SSS

    Post-silicon verification of high-speed interconnections in Elbrus-8CB microprocessor

    Get PDF
    The article describes the experiments carried out during the post-silicone verification of Elbrus-8CB microprocessor – one of the important stages of the verification process, which mostly determines the possibility of creating high-performance computing systems consisting of several microprocessors of this series. The interprocessor communication channels of the Elbrus-8CB microprocessor were investigated and some hypotheses were put forward about the reasons for their low operating speed. Experiments conducted to validate these hypotheses are made with intermediate conclusions based on their results. The built-in testing mechanism of CEI-6G and PCIe 2.0 physical levels was described alongside with its operating modes and testing algorithm. Several studies were carried out to ensure the correctness of the testing mechanism. This led to modifications of the initial testing method. The final conclusions about the reasons for the incorrect operation of interprocessor communications were made, and recommendations were given to improve the high-speed communications signals attenuation parameters and the level of their interference immunity. The relevance of this study for the production of modern high-performance computing systems can be traced not only in the growing interest of designers to this problem, but also in tightening of the requirements of the physical layers manufacturers

    Ray-Based Modeling of Unlicensed-Band mmWave Propagation Inside a City Bus

    No full text
    In the wake of recent hardware developments, augmented, mixed, and virtual reality applications – grouped under an umbrella term of eXtended reality (XR) – are believed to have a transformative effect on customer experience. Among many XR use cases, of particular interest are crowded commuting scenarios, in which passengers are involved in in-bus/in-train entertainment, e.g., high-quality video or 3D hologram streaming and AR/VR gaming. In the case of a city bus, the number of commuting users during the busy hours may exceed forty, and, hence, could pose far higher traffic demands than the existing microwave technologies can support. Consequently, the carrier candidate for XR hardware should be sought in the millimeter-wave (mmWave) spectrum; however, the use of mmWave cellular frequencies may appear impractical due to the severe attenuation or blockage by the modern metal coating of the glass. As a result, intra-vehicle deployment of unlicensed mmWave access points becomes the most promising solution for bandwidth-hungry XR devices. In this paper, we present the calibrated results of shooting-and-bouncing ray simulation at 60 GHz for the bus interior. We analyze the delay and angular spread, estimate the parameters of the Saleh-Valenzuela channel model, and draw important practical conclusions regarding the intra-vehicle propagation at 60 GHz. © 2019, Springer Nature Switzerland AG

    Analyzing the impact of ITS mobile node antenna HPBW on primary network SINR

    No full text
    The development of communication systems worldwide provides an additional load on both licensed and unlicensed spectrum. One of the biggest segments influencing the unlicensed one is Intelligent Transportation Systems (ITS) as part of the Smart City paradigm. One of the potential solutions to reduce the interference picture is by improving the spatial reuse of the system, i.e., by utilizing directional antennas on the vehicle side. This work aims to analyze the radiation pattern spatial characteristics of the antenna installed on the vehicle to be developed for cases when static ITS infrastructure nodes are located on the roadside light poles and primary network operating in the same frequency range is located in different locations: same light pole; roadside unit; or building. As a result, the recommendations regarding the antenna parameters are given for each case. Copyright © 2018 for the individual papers by the papers' authors

    3D folded loop UAV antenna design

    No full text
    Utilization of Unmanned Aerial Vehicles (UAVs), also known as “drones”, has a great potential for many emerging applications, such as delivering the connectivity on-demand, providing services for public safety, or recovering after damage to the communication infrastructure. Notably, nearly any application of drones requires a stable link to the ground control center, yet this functionality is commonly added at the last moment in the design, necessitating compact antenna designs. In this work, we propose a novel electrically small antenna element based on the 3D folded loop topology, which could be easily located inside the UAV airframe, yet still delivering good isolation from the drones own noise sources. The complete manufacturing technique along with corresponding simulations/measurements are presented. Measurements and evaluations show that the proposed antenna design is an option to achieve genuinely isotropic radiation in a small size without sacrificing efficiency. © IFIP International Federation for Information Processing 2018

    Evaluating multi-connectivity in 5G NR systems with mixture of unicast and multicast traffic

    No full text
    The future 5G New Radio (NR) systems are expected to support both multicast and unicast traffic. However, these traffic types require principally different NR system parameters. Particularly, the area covered by a single antenna configuration needs to be maximized when serving multicast traffic to efficiently use system resources. This prevents the system from using the maximum allowed number of antenna elements decreasing the inter-site distance between NR base stations. In this paper, we formulate a model of NR system with multi-connectivity capability serving a mixture of unicast and multicast traffic types. We show that multi-connectivity enables a trade-off between new and ongoing session drop probabilities for both unicast and multicast traffic types. Furthermore, supporting just two simultaneously active links allows to exploit most of the gains and the value of adding additional links is negligible. We also show that the service specifics implicitly prioritize multicast sessions over unicast ones. If one needs to achieve a balance between unicast and multicast session drop probabilities, explicit prioritization mechanism is needed at NR base stations. © IFIP International Federation for Information Processing 2019
    • …
    corecore