{"title":"Survey on OFDMA based MAC protocols for the next generation WLAN","authors":"Bo Li, Qiao Qu, Zhongjiang Yan, Mao Yang","doi":"10.1109/WCNCW.2015.7122542","DOIUrl":"https://doi.org/10.1109/WCNCW.2015.7122542","url":null,"abstract":"The physical (PHY) layer peak rate of the wireless local area network (WLAN) has been almost exponentially improved over the past 15 years since 1999. However, it is proved that the throughput is very low comparing to the PHY peak rate, and the media access control (MAC) efficiency is very low in the current WLANs specification, especially in dense deployment scenarios. Therefore, to achieve high MAC efficiency the IEEE Standards Association Standards Board (IEEE-SA) approves IEEE 802.11ax in March 2014, to draw up a brand new amendment for the next generation WLAN. One of the promising technologies to improve MAC efficiency is Orthogonal Frequency Division Multiple Access (OFDMA). In this paper, we firstly investigate the existing OFDMA based MAC protocols in the literature. Then, a framework of OFDMA based MAC protocol for the next generation WLAN is proposed. Finally, all of the existing OFDMA based MAC protocols listed in this paper are compared according to the proposed design issues. To the best of our knowledge this paper is the first survey focusing on OFDMA based MAC protocols for the next generation WLAN.","PeriodicalId":123586,"journal":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123595795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-jamming transmissions with learning in heterogenous cognitive radio networks","authors":"Tianhua Chen, Jinliang Liu, Liang Xiao, Lianfeng Huang","doi":"10.1109/WCNCW.2015.7122570","DOIUrl":"https://doi.org/10.1109/WCNCW.2015.7122570","url":null,"abstract":"This paper investigates the interactions between a secondary user (SU) with frequency hopping and a jammer with spectrum sensing in heterogenous cognitive radio networks. The power control interactions are formulated as a multi-stage anti-jamming game, in which the SU and jammer repeatedly choose their power allocation strategies over multiple channels simultaneously without interfering with primary users. We propose a power allocation strategy for the SU to achieve the optimal transmission power and channel with unaware parameters such as the channel gain of the opponent based on reinforcement learning algorithms including Q-learning for and WoLF-Q. Simulation results show that the proposed power allocation strategy can efficiently improve the SU's performance against both sweeping jammers and smart jammers with learning in heterogenous cognitive radio networks.","PeriodicalId":123586,"journal":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FEC driven network coding based pollution attack defense in cognitive radio networks","authors":"I. Demirdogen, Leiyuan Li, Chunxiao Chigan","doi":"10.1109/WCNCW.2015.7122564","DOIUrl":"https://doi.org/10.1109/WCNCW.2015.7122564","url":null,"abstract":"Relay featured cognitive radio network scenario is considered in the absence of direct link between secondary user (SU) and secondary base station (S-BS). Being a realistic deployment use case scenario, relay node can be subjected to pollution attacks. Forward error correction (FEC) driven network coding (NC) method is employed as a defense mechanism in this paper. By using the proposed methods, pollution attack is efficiently defended. Bit error rate (BER) measurements are used to quantify network reliability. Furthermore, in the absence of any attack, the proposed method can efficiently contribute to network performance by improving BER. Simulation results underline our mechanism is superior to existing FEC driven NC methods such as low density parity check (LDPC).","PeriodicalId":123586,"journal":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114540281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics of multipath network coding and multicasting in wireless P2P networks","authors":"Dapeng Li, Guanglin Zhang, Feng Tian, Haitao Zhao","doi":"10.1109/WCNCW.2015.7122577","DOIUrl":"https://doi.org/10.1109/WCNCW.2015.7122577","url":null,"abstract":"This paper considers the problem of delivering K different contents to D destinations from N sources in wireless networks. Traffic in opposite directions over two wireless hops can utilize the advantage of network coding (NC) in order to decrease the number of transmissions used. We call such coded hops as “NC-links”. On the other hand, the multicast (MC) links can transmit data to several nodes at the same time, also yielding the improvement of the transmissions efficiency. However, there exists a certain level of ambiguity regarding how to coordinate NC and MC to improve the file sharing performance in wireless P2P content distribution systems. Considering both NC and MC gains, we investigate the content traffic splitting using the theory of a potential game and show that there is competition among destinations in order to minimize the total system transmission cost. Subsequently, we identify the equilibrium solution to this game and develop a two-level distributed control algorithm that allows each destination to select the source and split the traffic so as to adjust the content traffic based on the potential function in a distributed way. Through theoretical analysis and simulation results, we show that the proposed scheme is stable and effective.","PeriodicalId":123586,"journal":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124148794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drone-assisted public safety wireless broadband network","authors":"Xu Li, Dongning Guo, Huarui Yin, Guo Wei","doi":"10.1109/WCNCW.2015.7122575","DOIUrl":"https://doi.org/10.1109/WCNCW.2015.7122575","url":null,"abstract":"A nationwide interoperable public safety wireless broadband network is being planned by the First Responder Network Authority (FirstNet) under the auspices of the United States government. The public safety network shall provide the needed wireless coverage in the wake of an incident or a disaster. This paper proposes a drone-assisted multi-hop device-to-device (D2D) communication scheme as a means to extend the network coverage over regions where it is difficult to deploy a landbased relay. The resource are shared using either time division or frequency division scheme. Efficient algorithms are developed to compute the optimal position of the drone for maximizing the data rate, which are shown to be highly effective via simulations.","PeriodicalId":123586,"journal":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132481771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Venkatasubramanian, F. Sanchez-Moya, Krystian Pawlak
{"title":"Centralized and decentralized multi-cell D2D resource allocation using flexible UL/DL TDD","authors":"V. Venkatasubramanian, F. Sanchez-Moya, Krystian Pawlak","doi":"10.1109/WCNCW.2015.7122572","DOIUrl":"https://doi.org/10.1109/WCNCW.2015.7122572","url":null,"abstract":"Device to device (D2D) communication is expected to be an important aspect in future 5G communication systems. To this end, D2D has been identified as an important topic in the EU flagship project METIS, wherein commercial D2D use cases are also considered. In principle, direct D2D communication offers the double benefit of low latency and high data rate at the same time. Interference mitigation and performance optimization alongside cellular users are however some of the key challenges to D2D communication. In this paper, we present a flexible D2D concept which is based on integration of D2D communication in flexible UL/DL TDD scheduling. We then compare multi-cell decentralized and centralized approaches for joint resource allocation for direct D2D and cellular links. Simulation based results are shown in a challenging indoor scenario where direct D2D users are placed among a high density of indoor cellular small cells and users. We find that centralized multi-cell resource allocation can improve overall system performance by 24 % for supporting D2D communications. Our results also show that substantial system level gains above 30% are achieved by enabling resource reuse between direct D2D and cellular users in both uplink and downlink cellular time slots. Furthermore, we see that flexible TDD provides overall better system performance as compared to fixed TDD even with a decentralized scheduler.","PeriodicalId":123586,"journal":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134576556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software defined network for multi-tenancy resource sharing in backhaul networks","authors":"J. Lun, D. Grace","doi":"10.1109/WCNCW.2015.7122519","DOIUrl":"https://doi.org/10.1109/WCNCW.2015.7122519","url":null,"abstract":"This paper introduces a Software Defined Network (SDN) architecture for 5G dense multi-infrastructure provider deployed wireless backhaul networks. The architecture contains a two-tier controller in a hierarchical setup aiming to offload some of the control functionalities from the central controller to a collection of logically distributed dynamically configured local controllers in order to balance the tradeoff between scalability and system performance. A multi-tenancy dynamic resource sharing algorithm, together with a backhaul link scheduling strategy based on the proposed SDN architecture are introduced as a case study. The results demonstrate the proposed architecture can deliver efficient resource utilization with marginal QoS compromises compared to an all centralized framework which requires on-the-fly control information exchange, high energy savings (up to 40%), and Quality of Service (QoS) guarantee for public safety service providers.","PeriodicalId":123586,"journal":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133515078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MIMO-enabling PHY layer enhancement for vehicular ad-hoc networks","authors":"Steffen Moser, Luis Behrendt, F. Slomka","doi":"10.1109/WCNCW.2015.7122544","DOIUrl":"https://doi.org/10.1109/WCNCW.2015.7122544","url":null,"abstract":"Depending on traffic density and environmental influences, the radio channel in Vehicular Ad-Hoc Networks (VANETs) can be a limited resource. The Shannon-Hartley theorem gives a theoretical maximum amount of data which can be transmitted per time unit under given channel conditions. This limitation can be exceeded by using multi-antenna approaches commonly known as multiple-input, multiple-output (MIMO) communication systems. While these systems are already common in both infrastructural Wireless LAN (i.e. IEEE 802.11n or IEEE 802.11ac) and in modern cellular mobile networks (i.e. Long Term Evolution), the IEEE 802.11p standard for vehicleto- vehicle communication still comes without any multi-antenna approaches. In this paper we show in a simulation study that compared to plain IEEE 802.11p a MIMO-extended PHY layer based on IEEE 802.11p offers a considerably higher robustness against short-term fading caused by the vehicles' mobility and other channel-caused adverseness. Therefore we implemented a MIMO-extended PHY model using Orthogonal Space-Time Block Codes (OSTBC) and linked the PHY model to a realistic MIMO radio channel model that is based on a large measurement campaign.","PeriodicalId":123586,"journal":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collision-free full-duplex UWB communication based on the Standard IEEE.802.15.4a","authors":"D. Kreiser, S. Olonbayar","doi":"10.1109/WCNCW.2015.7122533","DOIUrl":"https://doi.org/10.1109/WCNCW.2015.7122533","url":null,"abstract":"Using UWB for wireless short range, low rate communication is attracting growing interest due to its low power consumption and very high bandwidth. Regarding these qualities, it is comprehensible that there is an interest in the automation industry to use ultra-wideband-based wireless sensor nodes to replace wired systems, to save energy and to save costs without reducing the reliability of the whole system. For this reason optimizations of the standard IEEE.802.15.4a were investigated in this paper with particular emphasis on latency, data rate, energy efficiency, and reliability. This paper demonstrates the optimization potential of the official standard IEEE.802.15.4a for collision-free full-duplex communication.","PeriodicalId":123586,"journal":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123224323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Processing smart plug signals using machine learning","authors":"A. Ridi, Christophe Gisler, J. Hennebert","doi":"10.1109/WCNCW.2015.7122532","DOIUrl":"https://doi.org/10.1109/WCNCW.2015.7122532","url":null,"abstract":"The automatic identification of appliances through the analysis of their electricity consumption has several purposes in Smart Buildings including better understanding of the energy consumption, appliance maintenance and indirect observation of human activities. Electric signatures are typically acquired with IoT smart plugs integrated or added to wall sockets. We observe an increasing number of research teams working on this topic under the umbrella Intrusive Load Monitoring. This term is used as opposition to Non-Intrusive Load Monitoring that refers to the use of global smart meters. We first present the latest evolutions of the ACS-F database, a collections of signatures that we made available for the scientific community. The database contains different brands and/or models of appliances with up to 450 signatures. Two evaluation protocols are provided with the database to benchmark systems able to recognise appliances from their electric signature. We present in this paper two additional evaluation protocols intended to measure the impact of the analysis window length. Finally, we present our current best results using machine learning approaches on the 4 evaluation protocols.","PeriodicalId":123586,"journal":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127522674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}