2017 IEEE Symposium on Communications and Vehicular Technology (SCVT)最新文献

筛选
英文 中文
Comparison of LoRaWAN classes and their power consumption LoRaWAN类及其功耗的比较
2017 IEEE Symposium on Communications and Vehicular Technology (SCVT) Pub Date : 2017-11-01 DOI: 10.1109/SCVT.2017.8240313
Phui San Cheong, J. Bergs, Chris Hawinkel, J. Famaey
{"title":"Comparison of LoRaWAN classes and their power consumption","authors":"Phui San Cheong, J. Bergs, Chris Hawinkel, J. Famaey","doi":"10.1109/SCVT.2017.8240313","DOIUrl":"https://doi.org/10.1109/SCVT.2017.8240313","url":null,"abstract":"Many Internet of Things (IoT) applications benefit greatly from low-power long-range connectivity. A promising technology to achieve the low-power and long-range requirements is seen in LoRaWAN, a media access control (MAC) protocol maintained by the LoRa Alliance and leveraging Semtech's patented LoRa radio modulation technology. LoRaWAN provides three different device classes (A, B and C), which provide a tradeoff between performance (i.e., throughput and latency) and energy consumption. This paper offers a theoretical and experimental comparison of these classes. The objective of the quantitative experiment was twofold: to verify the published current levels of different operating modes in a LoRa chip's datasheet and to compare the battery lifetime for the LoRa class A and C modes of operation. We used a high-end current sensing circuit to gather the voltage levels and temporal variation with increasing payload sizes and spreading factors. Using the Ohmic Law, the energy drain can be calculated and compared across the different spreading factors (SF) and classes.","PeriodicalId":226008,"journal":{"name":"2017 IEEE Symposium on Communications and Vehicular Technology (SCVT)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115012980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Link adaptation in massive MIMO: Throughput-fairness trade-off 大规模MIMO中的链路自适应:吞吐量-公平性权衡
2017 IEEE Symposium on Communications and Vehicular Technology (SCVT) Pub Date : 2017-11-01 DOI: 10.1109/SCVT.2017.8240314
Steve Blandino, C. Desset, A. Chiumento, A. Bourdoux, L. Perre, S. Pollin
{"title":"Link adaptation in massive MIMO: Throughput-fairness trade-off","authors":"Steve Blandino, C. Desset, A. Chiumento, A. Bourdoux, L. Perre, S. Pollin","doi":"10.1109/SCVT.2017.8240314","DOIUrl":"https://doi.org/10.1109/SCVT.2017.8240314","url":null,"abstract":"The fifth-generation cellular networks aim to provide uniform and very high throughput. Massive MIMO is widely seen as the most promising 5G radio technology as it promises very high throughput to many users while also guaranteeing fairness, thanks to the channel hardening effect limiting the small-scale fading. A key question though is to what extent this achieved throughput is homogeneous among users, and what degrees of freedom exist to improve fairness. A promising option to provide uniform throughput using Massive MIMO would be a proper power control, based on long-term channel statistics. This paper studies the trade-off between throughput and fairness and it compares different power-allocation schemes. Assuming users affected by log-normal large-scale fading, simulations show that the trade-off is critical. as user-dependent differences caused by large-scale fading are causing unfairness in the system and fairness is achieved at the price of throughput reduction. In a limited large-scale fading scenario, throughput or fairness optimization is possible without incurring huge losses on the other dimension. For heavy large-scale fading scenarios the cost of enforcing fairness is very large: more than 50% of throughput reduction is observed. Despite the critical trade-off, Massive MIMO is shown to be less sensitive to throughput losses when enforcing fairness, compared with traditional communication systems.","PeriodicalId":226008,"journal":{"name":"2017 IEEE Symposium on Communications and Vehicular Technology (SCVT)","volume":"426 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115998822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RAT selection based on association probability in 5G heterogeneous networks 5G异构网络中基于关联概率的RAT选择
2017 IEEE Symposium on Communications and Vehicular Technology (SCVT) Pub Date : 2017-11-01 DOI: 10.1109/SCVT.2017.8240310
Behrad Soleyman, Amirreza Zaman, Seyed Hamed Rastegar, V. Shah-Mansouri
{"title":"RAT selection based on association probability in 5G heterogeneous networks","authors":"Behrad Soleyman, Amirreza Zaman, Seyed Hamed Rastegar, V. Shah-Mansouri","doi":"10.1109/SCVT.2017.8240310","DOIUrl":"https://doi.org/10.1109/SCVT.2017.8240310","url":null,"abstract":"The use of multiple radio access technologies (RATs) is inevitable in future heterogeneous cellular networks. Various RATs can offer different throughputs, and thus RAT selection plays an important role in quality of service provisioning. In this paper, considering a heterogeneous network with two throughput classes, we introduce a new practical probabilistic RAT selection approach. In contrary to the common deterministic approaches, in this scheme, each user performs the RAT selection periodically in a random manner using an association probability determined by a central unit in the network. The user remains connected to the selected RAT for a specific amount of time and then again performs the selection. To find the association probabilities, the network throughput maximization is formulated. Since the resulting problem is not convex, we propose two alternatives, one with sub-optimal solution but lower complexity and one with the use of change of variables with optimal solution. Finally, numerical simulations demonstrate the superior performance of our proposed schemes in comparison to several possible approaches. Also, these numerical investigations indicate that our sub-optimal method works very close to the optimal one.","PeriodicalId":226008,"journal":{"name":"2017 IEEE Symposium on Communications and Vehicular Technology (SCVT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117008231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Comparison of coding strategies for a combined multi-Gbps fiber and twisted-pair link 多gbps组合光纤与双绞线链路编码策略比较
2017 IEEE Symposium on Communications and Vehicular Technology (SCVT) Pub Date : 2017-11-01 DOI: 10.1109/SCVT.2017.8240308
Adriaan Suls, Yannick Lefevre, M. Guenach, M. Moeneclaey
{"title":"Comparison of coding strategies for a combined multi-Gbps fiber and twisted-pair link","authors":"Adriaan Suls, Yannick Lefevre, M. Guenach, M. Moeneclaey","doi":"10.1109/SCVT.2017.8240308","DOIUrl":"https://doi.org/10.1109/SCVT.2017.8240308","url":null,"abstract":"In this contribution we consider a communication system consisting of a cascade of a passive optical network (PON) link with on/off keying, and a short twisted pair (TP) link with discrete multitone modulation (DMT). Three coding configurations are investigated. In the first configuration (C1), the PON link and the TP link are protected by a Reed-Solomon (RS) code and trellis-coded modulation (TCM), respectively. In the second configuration (C2), the PON link is the same as with C1, but the TP link is now protected by the concatenation of an outer RS code and inner TCM. We compare these conventional coding configurations C1 and C2 with an alternative configuration (C3), in which an outer RS code protects the cascade of the uncoded PON and the TCM-encoded TP. Whereas the configuration C3 has the same complexity as the configuration C1, we show that the former is able to achieve approximately the same information bitrate as the (more complex) configuration C2, at the expense of a slightly (about 1 dB) higher optical power. Our numerical results for a typical setting indicate that the configurations C2 and C3 can provide information bitrates beyond 10 Gbps, which are about 20–25% larger than for configuration C1.","PeriodicalId":226008,"journal":{"name":"2017 IEEE Symposium on Communications and Vehicular Technology (SCVT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129201853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices 符号聚合近似算法(SAX)在物联网设备射频指纹识别中的应用
2017 IEEE Symposium on Communications and Vehicular Technology (SCVT) Pub Date : 2017-11-01 DOI: 10.1109/SCVT.2017.8240312
G. Baldini, Raimondo Giuliani, G. Steri, Ignacio Sanchez, C. Gentile
{"title":"The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices","authors":"G. Baldini, Raimondo Giuliani, G. Steri, Ignacio Sanchez, C. Gentile","doi":"10.1109/SCVT.2017.8240312","DOIUrl":"https://doi.org/10.1109/SCVT.2017.8240312","url":null,"abstract":"Radio Frequency (RF) fingerprinting is the problem of identifying and authenticating an electronic device through its radio frequency emissions. These emissions contain intrinsic features of the device itself. RF fingerprinting can be used to enhance the security of wireless networks since the fingerprints provide a form of authentication complementing other measures. RF-based authentication turns out to be of practical use in security applications as long as the RF fingerprinting delivers high identification and verification accuracy, and the whole process is computationally efficient. In this paper, we investigate a novel approach to RF fingerprinting based on the application to time series of the Symbolic Aggregate Approximation algorithm (SAX). This is a compression scheme known to be time efficient and, although it has been applied to many domains, it has so far never been investigated in the problem of RF fingerprinting. We demonstrate that a SAX-based approach provides a very high identification accuracy (over 99%), and turns out to be attractive, as compared to classification without SAX, from both a computational standpoint and its robustness to noise.","PeriodicalId":226008,"journal":{"name":"2017 IEEE Symposium on Communications and Vehicular Technology (SCVT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134033977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance analysis of WMN routing protocols for disaster networks 灾害网WMN路由协议性能分析
2017 IEEE Symposium on Communications and Vehicular Technology (SCVT) Pub Date : 2017-11-01 DOI: 10.1109/SCVT.2017.8240309
A. Tchinda, Gregor Frick, U. Trick, A. Lehmann, B. Ghita
{"title":"Performance analysis of WMN routing protocols for disaster networks","authors":"A. Tchinda, Gregor Frick, U. Trick, A. Lehmann, B. Ghita","doi":"10.1109/SCVT.2017.8240309","DOIUrl":"https://doi.org/10.1109/SCVT.2017.8240309","url":null,"abstract":"This paper evaluates the performance of the routing protocols HWMP, Babel and B.A.T.M.A.N. advanced for disaster networks. The evaluation is performed using a virtual environment so that the obtained results are similar to the expectations of a real world testbed. According to the specific requirements in disaster situations, three different scenario categories are implemented. The focus of the scenarios defined in the first category is to evaluate the behavior of the protocols inside a static network. The focus in the second category is to test their performance after dynamic processes. The focus in the last category is to predict the behavior of the routing protocols inside a large network expected after a disaster. The obtained results can be interpreted as follows: in the first category, the results obtained by HWMP and B.A.T.M.A.N. advanced are similar. Both protocols take the variations in the link throughput into consideration for their routing operations. In the second category, the protocol HWMP shows the most promising results concerning dynamic processes inside the network. The results obtained in the last category show that none of the examined protocols is appropriate for large networks, with the exception of Babel, which can be modified to support a large number of clients and routers. Because none of the examined routing protocols can fulfil the requirements in disaster situation, a new network architecture is proposed, which combines the advantages of two routing protocols to address the existing routing challenges.","PeriodicalId":226008,"journal":{"name":"2017 IEEE Symposium on Communications and Vehicular Technology (SCVT)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133384826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic BLE-based fingerprinting for location-aware smart homes 用于位置感知智能家居的动态基于ble的指纹识别
2017 IEEE Symposium on Communications and Vehicular Technology (SCVT) Pub Date : 2017-11-01 DOI: 10.1109/SCVT.2017.8240316
Tom De Schepper, A. Vanhulle, Steven Latré
{"title":"Dynamic BLE-based fingerprinting for location-aware smart homes","authors":"Tom De Schepper, A. Vanhulle, Steven Latré","doi":"10.1109/SCVT.2017.8240316","DOIUrl":"https://doi.org/10.1109/SCVT.2017.8240316","url":null,"abstract":"We have seen an ever-expanding set of location-aware services and devices become broadly available over the past years. Despite these promising applications and thorough research, indoor localization remains a very challenging topic and (near) perfect accuracy continues to be an open research challenge. In this paper, we acknowledge the growth and potential of smart home environments and focus on the usage of Bluetooth Low Energy (BLE) for wireless indoor positioning in such cases. This is in contrast with existing work around BLE that more focuses on use-cases in large public areas or buildings. In particular, we compare the applicability of different distance functions for the fingerprinting localization method and propose a dynamic approach of selecting the most suited distance function. Furthermore, we investigate the impact on the quality of the fingerprints by looking at directional fingerprints and search space restrictions. Finally, we discuss the design and usage of a real-life location-aware smart home application, where a user controls the lights in a room through gestures.","PeriodicalId":226008,"journal":{"name":"2017 IEEE Symposium on Communications and Vehicular Technology (SCVT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127864511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Stochastic modeling of IEEE 802.11p output process for efficient V2X large-scale interworking 面向高效V2X大规模互联的IEEE 802.11p输出过程随机建模
2017 IEEE Symposium on Communications and Vehicular Technology (SCVT) Pub Date : 2017-11-01 DOI: 10.1109/SCVT.2017.8240315
F. Salem, Y. Elhillali, S. Niar
{"title":"Stochastic modeling of IEEE 802.11p output process for efficient V2X large-scale interworking","authors":"F. Salem, Y. Elhillali, S. Niar","doi":"10.1109/SCVT.2017.8240315","DOIUrl":"https://doi.org/10.1109/SCVT.2017.8240315","url":null,"abstract":"Vehicle-to-anything (V2X) is a promising communication technology to support operability in large-scale vehicular networks. The future deployment of V2X necessitates interworking between different access technologies, i.e., Dedicated Short-Range Communications (DSRC) and Cellular networks. However to achieve an efficient V2X interworking, we need to resolve the multi-hop issue, mainly originating from the V2X hybrid architecture. To resolve this issue and consequently to analyze the interconnected system, characterizing the output process of IEEE 802.11p-based DSRC protocol is of a fundamental importance. This paper proposes stochastic Regenerative Model to provide a complete description of IEEE 802.11p output process. The accuracy of the model is verified through extensive simulations. As a case study, the proposed model is compared with the Poisson model in the performance evaluation of V2X interworking. Numerical and simulation results verify the ability of the Regenerative Model to capture the deviations of the actual output process of IEEE 802.11p under different traffic intensity as compared to the Poisson model.","PeriodicalId":226008,"journal":{"name":"2017 IEEE Symposium on Communications and Vehicular Technology (SCVT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115479883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
From multipoint relaying to chain-branch-leaf: Improving the clustering in OLSR for vehicular ad hoc networks 从多点中继到链-枝-叶:改进车载自组织网络OLSR的聚类
2017 IEEE Symposium on Communications and Vehicular Technology (SCVT) Pub Date : 2017-11-01 DOI: 10.1109/SCVT.2017.8240311
Lucas Rivoirard, M. Wahl, Patrick Sondi, M. Berbineau, D. Gruyer
{"title":"From multipoint relaying to chain-branch-leaf: Improving the clustering in OLSR for vehicular ad hoc networks","authors":"Lucas Rivoirard, M. Wahl, Patrick Sondi, M. Berbineau, D. Gruyer","doi":"10.1109/SCVT.2017.8240311","DOIUrl":"https://doi.org/10.1109/SCVT.2017.8240311","url":null,"abstract":"The Optimized Link State Routing (OLSR) protocol, early designed for Mobile Ad hoc Networks (MANET), has been customized and evaluated for various Vehicular Ad hoc Network (VANET) scenarios. Most of the related work focus on changing OLSR parameters in order to adapt it to the high dynamicity of VANET due to high velocity of its nodes. However, they keep using OLSR with its native clustering scheme, the Multipoint Relaying (MPR). Recently, the chain-branch-leaf (CBL) clustering scheme has been proposed for road traffic configuration. This work presents a comparative analysis of CBL with MPR clustering in OLSR. The results show that CBL reduces significantly the routing traffic overhead in OLSR by reducing the number of relays, without degrading the performance for the application traffic.","PeriodicalId":226008,"journal":{"name":"2017 IEEE Symposium on Communications and Vehicular Technology (SCVT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132925729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信