Qiaoyang Ye, Joonyoung Cho, Jeongho Jeon, S. Abu-Surra, Kitaek Bae, Jianzhong Zhang
{"title":"Fractionally Spaced Equalizer for Next Generation Terahertz Wireless Communication Systems","authors":"Qiaoyang Ye, Joonyoung Cho, Jeongho Jeon, S. Abu-Surra, Kitaek Bae, Jianzhong Zhang","doi":"10.1109/ICCWorkshops50388.2021.9473698","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473698","url":null,"abstract":"Higher data rates are required to support exponential growth in wireless traffic, motivating an expansion of the transmission bandwidth for sixth generation (6G) communications. The available bandwidth in the terahertz (THz) band significantly exceeds the available bandwidth in the mmWave band that has been adopted in fifth generation (5G) systems; thus, the THz band is envisioned as a pillar for 6G systems that can support data rates on the order of terabits per second (Tb/s). However, wireless communications in the THz band poses several new challenges. One of these challenges involves the practical constraint of employing a limited oversampling factor to process wideband THz signals, even while leveraging state-of-the-art analog/digital converter techniques. This limited oversampling factor – which can lead to an increased sampling timing offset – degrades the demodulation performance when it is employed in conjunction with a conventional symbol-spaced equalizer. Thus, we employ a fractionally spaced equalizer (FSE) in a THz communication system to overcome the impact of the increased sampling timing offset for a practical system that utilizes a limited sampling rate. Analysis and simulations demonstrate that the FSE can perfectly compensate the timing offset by optimally combining the available samples. Also, an approximation to the noise covariance matrix is proposed to reduce the computational complexity of the frequency-domain FSE.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aryan Sharma, Junye Li, Deepak Mishra, G. Batista, Aruna Seneviratne
{"title":"Passive WiFi CSI Sensing Based Machine Learning Framework for COVID-Safe Occupancy Monitoring","authors":"Aryan Sharma, Junye Li, Deepak Mishra, G. Batista, Aruna Seneviratne","doi":"10.1109/ICCWorkshops50388.2021.9473673","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473673","url":null,"abstract":"The COVID-19 pandemic requires social distancing to prevent transmission of the virus. Monitoring social distancing is difficult and expensive, especially in \"travel corridors\" such as elevators and commercial spaces. This paper describes a low-cost and non-intrusive method to monitor social distancing within a given space, using Channel State Information (CSI) from passive WiFi sensing. By exploiting the frequency selective behaviour of CSI with a cubic SVM classifier, we count the number of people in an elevator with an accuracy of 92%, and count the occupancy of an office to 97%. As opposed to using a multi-class counting approach, this paper aggregates CSI for the occupancies below and above a COVID-Safe limit. We show that this binary classification approach to the COVID safe decision problem has similar or better accuracy outcomes with much lower computational complexity, allowing for real-world implementation on IoT embedded devices. Robustness and scalability is demonstrated through experimental validation in practical scenarios with varying occupants, different environment settings and interference from other WiFi devices.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Block-D2D: Blockchain-enabled Cooperative D2D-assisted Fog Computing Scheme under Imperfect CSI","authors":"Rajesh Gupta, Tejal Rathod, S. Tanwar","doi":"10.1109/ICCWorkshops50388.2021.9473524","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473524","url":null,"abstract":"Fog computing (FC) supports cloud computing services at the edge of the device for more secure and reliable access and processing of the stored data. However, it is beneficial for time-sensitive applications, where the required delay is minimum, but not well suited for mission-critical applications, where the required delay is negligible. To fulfill this requirement, the authors worldwide started integrating FC with device-to-device (D2D) communication. But it was potentially affected by massive interference, which does not improve the total sum rate and secrecy capacity of the wireless channel. Motivated from these gaps, in this paper, we propose a blockchain-enabled cooperative D2D-assisted FC scheme under imperfect CSI in the presence of an eavesdropper called Block-D2D to enhance the total sum rate and secrecy capacity. We used non-orthogonal multiple access (NOMA) scheme for D2D pairs to improve the aforementioned characteristics. Still, the data on the device is not fully secure, which can be modified by any malicious user. This can be protected using blockchain technology, which is immutable, secure, and trusted. To improve the secrecy capacity of the network and spectral efficiency, we used a cooperative game theory. Simulation results show that the elevated performance of the NOMA-based Block-D2D scheme compared to the conventional OFDMA scheme in terms of sum rate, secrecy capacity, and system throughput.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"46 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125900771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Sensitive Overlay Routing via Segment Routing with Failure Correction","authors":"Zengwei Zheng, Chenwei Zhao, Jianwei Zhang","doi":"10.1109/ICCWorkshops50388.2021.9473766","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473766","url":null,"abstract":"Due to the overlay technologies, service providers have a logical view of the underlay network and can optimize quality of experience without modifying the physical network. However, the cross-layer interaction inevitably causes network fluctuation due to their inconsistent optimization objectives. Besides, network failures that occur in the underlay not only cause network performance degradation, but also significantly increase the frequency of cross-layer interaction. These problems make the network fluctuate for a long time, reduce the network performance and influence the user experience, especially for time-sensitive applications. In this paper, we propose a failure correction method based on segment routing to deal with the control plane failures and the data plane failures that occur in the underlay. We propose a cross-layer structure with failure correction mechanism, investigate the cross-layer interaction and design two strategies to eliminate fluctuations and make the network converge quickly.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126778609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Scalable Authentication Protocol for Access Network Communications using ECC","authors":"S. Patel, Amit Dua, Neeraj Kumar","doi":"10.1109/ICCWorkshops50388.2021.9473557","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473557","url":null,"abstract":"The secure message exchange is instrumental in the success of device-to-device communication. Any malicious activity has the potential to compromise the confidentiality or integrity of the messages exchanged between different user equipment. To address the aforementioned issue, this study proposes a novel elliptic curve cryptography based key-exchange protocol for authentication of two user equipment in network-assisted D2D communication. The proposed protocol is based on standard elliptic curve Diffie-Hellman key exchange and hash-based message authentication code. Subsequently, elaborate threat analysis of the proposed protocol against several adversarial attacks is presented to prove its resilience. The observed low computational time and communication overhead associated with this protocol and its resilience against known attacks advance its strong candidature for implementation of D2D communication in 5G cellular networks.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lanier A Watkins, Nick Sarfaraz, S. Zanlongo, Joshua Silbermann, T. Young, Randall Sleight
{"title":"An Investigative Study Into An Autonomous UAS Traffic Management System For Congested Airspace Safety","authors":"Lanier A Watkins, Nick Sarfaraz, S. Zanlongo, Joshua Silbermann, T. Young, Randall Sleight","doi":"10.1109/ICCWorkshops50388.2021.9473838","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473838","url":null,"abstract":"Currently, Unmanned Aircraft System (UAS) Traffic Management (UTM) is the Federal Aviation Administration’s (FAA) vision for air traffic management below 400 feet. Production UTM systems tend to reside only at specialized test sites and operational centers. UTM has been articulated as a concept of operation (ConOps) by the FAA. The UTM ConOps describes a complex interaction between UAS, UAS Operators, and the UTM system itself. These interactions may involve human operators, or be fully automated. Currently, most UTM studies and experimental prototypes do not look at the UTM concept from end-to-end; instead, they focus on specific aspects of UTM and thus cannot explore and test the holistic performance of a UTM ecosystem. Equally important is ensuring that production UTM can scale to meet the demands of future airspace, which is estimated to be 65,000 UAS operations (takeoffs and landings) per hour by 2035. The busiest US airports currently handle 300 operations per hour.In this paper, we evaluate a portion of the UTM system using a set of autonomous algorithms for flight plan de-confliction. Preliminary results suggest that the autonomy algorithms used for path planning, strategic de-confliction, and detect and avoid (DAA) are capable of scaling to high-congestion scenarios while drastically reducing collisions between UAS, even with almost all UAS deviating from de-conflicted plans (i.e., rogue UAS). We also observed that de-confliction algorithms represent a dominating safety layer in the separation hierarchy, since the strategic de-confliction algorithms manage airspace density, albeit at the cost of longer mission completion times. Our testing was done using a MATLAB simulator, which used the RRT* algorithm for flight planning, two different schedulers (Genetic Algorithm and the NASA Stratway Strategic Conflict Resolution algorithm) for strategic de-confliction, and the Airborne Collision Avoidance System for small unmanned aircraft systems (ACAS sXu) for DAA.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Edge Federated MARL Approach for Timeliness Maintenance in MEC Collaboration","authors":"Zheqi Zhu, Shuo Wan, Pingyi Fan, K. Letaief","doi":"10.1109/ICCWorkshops50388.2021.9473729","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473729","url":null,"abstract":"Mobile edge computing (MEC) has been widely studied to provide new schemes for communication-computing systems such as industrial Internet of Things (IoTs), vehicular networks, smart city applications, etc. In this work, we mainly investigate on the timeliness maintenance of the MEC systems where the freshness of the data and computation tasks plays a significant role. We firstly formulate the average age of information (AoI) minimization problem of the UAV-assisted MEC systems. To maintain the system timeliness, we propose a novel multi-agent reinforcement learning (MARL) approach, called edge federated multi-agent actor-critic (MAAC), for joint trajectory planning, data scheduling and resource management in the investigated MEC systems. Through the proposed online learning method, edge devices and center controller learn the interactive policies through local observations and carry out the model-wise communication. We build up a simulation platform for time sensitive MEC systems as a gym environment module and implement the proposed algorithm. Furthermore, the comparisons with a popular MARL solution, MADDPG, show that the proposed approach achieves better performance in terms of data freshness and system stability.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduced-Feedback Scheduling Policies for Energy-efficient MAC","authors":"Priyadarshi Mukherjee, S. De","doi":"10.1109/ICCWorkshops50388.2021.9473845","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473845","url":null,"abstract":"Energy efficiency is a critical requirement in low-power wireless sensor networks. In this work, energy-efficient scheduling policies that exploit the temporal variation of wireless channel are presented. The proposed policies avoid regular feedback from the sensor nodes in order to decide on the channel access opportunity and the access duration. The policies cater to delay-tolerant as well as delay-constrained scenarios. The numerical results demonstrate that the proposed policies simultaneously offer a gain of about 20% in data throughput and about 58% in energy efficiency over the nearest competitive approaches. It is also shown that the performance of the scheduling policy corresponding to the delay-constrained scenario is bounded by the policy corresponding to the delay-unconstrained scenario.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hinako Ochi, S. Shimamoto, Jiang Liu, Yukino Yamaoka
{"title":"Non-contact Blood Pressure Estimation with Pulse Wave employing Microwave Reflection","authors":"Hinako Ochi, S. Shimamoto, Jiang Liu, Yukino Yamaoka","doi":"10.1109/ICCWorkshops50388.2021.9473654","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473654","url":null,"abstract":"Nowadays it is recommended to do blood pressure measurements on a daily basis at home to prevent diseases caused by high blood pressure. Blood pressure measurements methods using a cuff is most commonly used. However, it is a burden for hypertensive patients and the elderly to put on a blood pressure cuff repeatedly for the multi-metering of blood pressure. Non-contact measurement will provide a comfortable and easy method to monitor blood pressure and pulse rates continuously. This paper proposes a non-contact method to measure both pulse rates and blood pressure simultaneously. In the experiment, microwave signals were transmitted to the body and the reception intensity was measured. The microwave frequencies used in this experiment were 2.4GHz and 5.6GHz. The pulse rates and the blood pressure can be estimated by processing the data obtained from microwave reflection. The experiment results show that the 2.4GHz microwave signals have better estimation accuracy. It indicates that our proposed system is practical and has great potential for the future smart health monitoring system.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Complexity Rate Splitting Using Hierarchical User Grouping","authors":"Elaheh Sadeghabadi, S. Blostein","doi":"10.1109/ICCWorkshops50388.2021.9473715","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473715","url":null,"abstract":"Rate splitting multiple access (RSMA) is a powerful multiple access technique that exploits the advantages of both space-division multiple access (SDMA) and nonorthogonal multiple access (NOMA), making it suitable for heterogeneity of quality of service and high throughput requirements of future networks. RSMA is based on rate splitting at the transmitter and successive interference cancellation (SIC) at the receiver. The number of transmitted streams and the number of possible decoding orders grows exponentially with the number of users. In this paper, a low-complexity rate splitting approach is proposed that finds a subset of all possible common streams by hierarchical user grouping and assigning a common stream to each group. Since the hierarchical user grouping approach creates groups of users of the same size that do not have a user in common, this approach does not require user ordering. To implement this low-complexity RSMA, alternating max-min precoding design and power allocation is used. The beamforming vectors are designed to cancel the multiuser interference. As a result, the beamforming vectors can be designed in multiple levels. Simulation results show that the proposed scheme is able to achieve attractive performance vs. complexity tradeoffs compared to several others in the literature.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}