{"title":"Adaptive forward link formation for terminal collaborative reception","authors":"S. Denno, H. Murata, D. Umehara","doi":"10.1109/WPMC.2017.8301826","DOIUrl":"https://doi.org/10.1109/WPMC.2017.8301826","url":null,"abstract":"Collaborative reception has been proposed to improve the frequency utilization efficiency in wireless networks. This paper proposes adaptive forward link formation that selects not only terminals to forward received signals to the destination but also higher frequency bands for the forward link. More-over, this paper proposes a complexity-reduced algorithm for the selection. The proposed formation achieves about 2-times higher frequency utilization efficiency than the fixed formation. While the proposed complexity-reduced algorithm attains similar frequency utilization efficiency as the exhaustive search, the proposed algorithm reduces the complexity of the selection to almost 1/200 of the exhaustive search.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"12 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133151214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ou Zhao, Lin Shan, Wei-Shun Liao, Huan-Bang Li, K. Ishizu, F. Kojima
{"title":"A user cooperation aided device-centric clustering approach for large-scale distributed antenna systems","authors":"Ou Zhao, Lin Shan, Wei-Shun Liao, Huan-Bang Li, K. Ishizu, F. Kojima","doi":"10.1109/WPMC.2017.8301824","DOIUrl":"https://doi.org/10.1109/WPMC.2017.8301824","url":null,"abstract":"Large-scale distributed antenna systems (LS-DASs) are gaining increasing momentum and emerging as highly promising candidates for future wireless communications. To improve the user's quality of service (QoS) in that systems, in the present study, we propose a user cooperation aided clustering approach based on device-centric architectures and enable the multi-user multiple-input multiple-output transmissions with non-reciprocal setups. We actively use device-to-device communication techniques to achieve the sharing of user information and try to form clusters on user side instead of the traditional way that performs clustering on base station (BS) side in data offloading. We further adopt a device-centric architecture to break the limits of the classical BS-centric cellular structure. Moreover, we derive an approximate expression to calculate the user rate for LS-DASs with employment of the zero-forcing precoding and consideration of inter-cluster interference. Simulated and numerical results indicate that the approximate expression predicts the user rate with a lower computational cost, and the proposed approach provides better user experience for, in particular, the users who have unacceptable QoS.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131528729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongyan Cui, Zunming Chen, Longfei Yu, Kun Xie, Zong-Guo Xia
{"title":"Authentication mechanism for network applications in SDN environments","authors":"Hongyan Cui, Zunming Chen, Longfei Yu, Kun Xie, Zong-Guo Xia","doi":"10.1109/WPMC.2017.8301788","DOIUrl":"https://doi.org/10.1109/WPMC.2017.8301788","url":null,"abstract":"Software-defined Networking, a new networking paradigm, provides network programming for third parties by separating control plane from data forwarding plane and opening network capabilities. SDN brings great flexibility and openness to the network, but the original design phase of SDN had not considered designing characteristics regarding security. For this reason, there are many potential vulnerabilities in SDN Environments. One of the most critical security threats arise from the vulnerability of trusting relationship due to the lack of authentication mechanism between the network application and the controller. A specific concern is whether an application can be trusted or not. This paper discusses the authentication mechanism of the network application. At the same time, it implements the application authentication system which addresses the key challenges: how to safely resolve conflicts between untrusted network applications and requests. The paper undergoes system testing in testbed constructed Floodlight architecture. The test results show that the system works well to effectively defend against unauthorized access and provide log history, which verifies the effectiveness of the proposed method to secure the northbound interface by introducing the application authentication system.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133979511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of polar codes with MIMO-OFDM under frequency selective fading channel","authors":"Koya Watanabe, Shoichi Higuchi, K. Maruta, C. Ahn","doi":"10.1109/WPMC.2017.8301790","DOIUrl":"https://doi.org/10.1109/WPMC.2017.8301790","url":null,"abstract":"This paper presents the BER performance analysis of polar codes with MIMO-OFDM under frequency selective channel, which has not been disclosed so far. Multiple-input multiple-output (MIMO) has been widely implemented or standardized to improve the throughput performance of wireless communications. Forward error correction (FEC) codes are also key techniques for stably improving bit error rate (BER) and have been studied as well as a demodulation scheme. FEC is required to be composed of simple encoder and decoder while achieving good BER performance as much as possible. Polar codes emerged as a promising FEC scheme. This code has a simple recursive encoder structure by using a phenomenon called \"channel polarization\". In addition, it has been reported that polar codes provably achieve the theoretical limit for communication systems with a successive cancellation decoder based on likelihood ratio. An calculation complexity of polar codes is less than that of low density parity check (LDPC) codes. Therefore, polar codes are an effective technique in realizing low electric power consumption to meet one of the demand conditions of 5G. Based on legacy detection schemes as zero forcing (ZF) and maximum likelihood detection (MLD), computer simulation results reveal the fundamental BER performance with controlling coding rate. Moreover, there is a problem that the log likelihood ratio (LLR) of MLD detection for soft-decision decoding can not be obtained. Therefore, in this paper, we investigate the likelihood function of MLD detection in the proposed system.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"1 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120927967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dan Huo, Zhi Zhang, Qian Zhou, Qixiang Tang, Zhibin Huo
{"title":"Ergodic secrecy sum rate maximization in downlink sparse code multiple access network","authors":"Dan Huo, Zhi Zhang, Qian Zhou, Qixiang Tang, Zhibin Huo","doi":"10.1109/WPMC.2017.8301791","DOIUrl":"https://doi.org/10.1109/WPMC.2017.8301791","url":null,"abstract":"Sparse code multiple access (SCMA) has been recognized as a promising candidate technique for fifth generation (5G) cellular network to improve spectral efficiency (SE). In this paper, physical layer security (PLS) in a downlink single-input single-output (SISO) SCMA system is investigated, which includes one base station (BS), multiple legitimate users and one eavesdropper. The aim of this paper is to maximize the ergodic secrecy sum rate (ESSR) of the SCMA system under the constraint of the transmit power of BS. A novel many-to-many two-side matching algorithm is then proposed. After a limited number of iterations, the algorithm converges to a pair-stable matching. Finally, simulation results indicate that the proposed algorithm outperforms the random scheme and the orthogonal multiple access (OMA) scheme.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121018107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. A. Cruz-Pérez, Jose Serrano-Chavez, S. L. Castellanos-Lopez, G. Hernández-Valdez
{"title":"Approximating log-normally distributed secondary service time by hyper-exponential distribution for the analytical performance evaluation of cognitive radio networks","authors":"F. A. Cruz-Pérez, Jose Serrano-Chavez, S. L. Castellanos-Lopez, G. Hernández-Valdez","doi":"10.1109/WPMC.2017.8301891","DOIUrl":"https://doi.org/10.1109/WPMC.2017.8301891","url":null,"abstract":"In this paper, hyper-exponential distribution is proposed to approximate log-normally distributed secondary service time in a cognitive radio network (CRN). Hyper-exponential distributions of different orders (i.e., number of phases) are considered. Both moment matching and expectation maximization algorithm are employed and evaluated to determine the parameters of the hyper-exponential distributions that provides the best fit to the corresponding log-normal ones. A general teletraffic analysis is developed for the performance evaluation of the CRN considering an arbitrary order of the hyper-exponential distribution. The performance of the CRN is evaluated in terms of the new call blocking and forced termination probabilities of secondary users. Numerical results are obtained for both different ratios (acceleration factor) of the mean service times of PUs and SUs and different values of the number of phases of the hyper-exponential distribution. Numerical results show that, except for small values of the acceleration factor, the values of the different performance metrics obtained considering an n-th order hyper-exponential distribution become closer to those obtained by discrete event computer simulation (where the log-normal distribution is used to model the secondary service time) as n increases. For small values of the acceleration factor, the different performance metrics are insensitive to the probability distribution beyond the mean of the secondary service time.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An artificial neural network-based distributed information-centric network service","authors":"Zheng Wen, Takuro Sato","doi":"10.1109/WPMC.2017.8301855","DOIUrl":"https://doi.org/10.1109/WPMC.2017.8301855","url":null,"abstract":"Artificial neural networks (ANN) have been widely used in various areas. As a bottleneck, hardware specification affects the efficiency of an ANN. With the development of distributed computing, distributed ANNs show advantages in dealing with huge data. The network bandwidth is a new bottleneck restricting the performance of distributed ANNs. Information-Centric Networking (ICN) [1], as the Next Generation Network (NGN) solution, has shown merits regarding mobility, security, power consumption and network traffic. In this paper, we remodel the architecture of network service using ANNs. We proposed an ANN-Based Distributed Information-Centric Network Service (ANN based DICNS). The distributed nodes are connected like a neural network. When a client utilizes the DICNS, the data flow from the source to the consumer node like the signal traveling from an input layer to an output layer in a neural network. By using an ICN, our proposal can significantly reduce network consumption, and the named data can help the DICNS effectively manage and classify the data.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"378 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115917152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Tomovic, W. Cerroni, F. Callegati, R. Verdone, I. Radusinović, M. Pejanovic, C. Buratti
{"title":"An architecture for QoS-aware service deployment in software-defined IoT networks","authors":"S. Tomovic, W. Cerroni, F. Callegati, R. Verdone, I. Radusinović, M. Pejanovic, C. Buratti","doi":"10.1109/WPMC.2017.8301875","DOIUrl":"https://doi.org/10.1109/WPMC.2017.8301875","url":null,"abstract":"One of the major challenges in Internet of Things (IoT) will be management and orchestration of multi-technology/multi-vendor network environments. According to many stakeholders, the adoption of software defined networking (SDN) principles in 5G (5-th Generation) wireless networks will allow the integration of mobile networks and the internet of things and will make it possible to manage billions of connected smart objects through intelligent orchestration and provisioning systems. The special value of SDN lies its ability to support network virtualization and to automate deployment of new services on top of the virtualized network infrastructure. To pave the way towards this novel approach, we present a SDN-based architecture for virtualization of IoT networks, including an intent-based north-bound interface and a virtualized infrastructure manager, allowing virtualization of IoT resources. The architecture exploits SDN controller to program different IoT networks in order to provide to users the intended service at the requested level of quality. A prototype of the architecture is presented and numerical results related to round trip time, measured at the different levels of the architecture, are reported.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115980364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Masato Katsuno, Shoichi Higuchi, K. Maruta, C. Ahn
{"title":"Improving scattered pilot channel estimation by sector selection on FDD MIMO/OFDM systems","authors":"Masato Katsuno, Shoichi Higuchi, K. Maruta, C. Ahn","doi":"10.1109/WPMC.2017.8301812","DOIUrl":"https://doi.org/10.1109/WPMC.2017.8301812","url":null,"abstract":"This paper proposes the combined scheme with the scattered pilot channel estimation and the sector antenna selection to improve throughput and BER performance. Even in the frequency division duplex (FDD) system, the optimal transmission sector can be selected by using up and down link correlation without the feedback information (FBI). Sector selection can alleviate a frequency selectivity by eliminating the number of incoming reflected paths and accordingly the coherence bandwidth can be enlarged. Exploiting this feature, channel estimation accuracy can be kept even though reducing the number of pilot symbols in frequency domain. This paper introduces the high time resolution carrier interferometry (HTRCI) and the simple linear interpolation (SLI) as the scattered pilot channel estimation and evaluates their achievable throughput performance. Computer simulation on 2×2 MIMO/OFDM sector selection system disclosed that HTRCI and SLI can improve BER and throughput performance. Particularly, maximum throughput is improved by 7.5% in the case of HTRCI.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127567430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust beamforming and power splitting ratio optimization in cognitive downlink multiuser MISO networks","authors":"Xueyan Chen, Li Guo, Jiaru Lin, Qian Deng, Guangqian Chu, Jingjing Huang","doi":"10.1109/WPMC.2017.8301866","DOIUrl":"https://doi.org/10.1109/WPMC.2017.8301866","url":null,"abstract":"In this paper, we investigate a robust beamforming and power splitting ratio (RBFPS) optimization problem with simultaneous wireless information and power transfer (SWIP-T) for the downlink multiuser multi-input-single-out (MISO) cognitive networks. Since the perfect channel state information (CSI) is difficult to obtain in practice, we consider the CSI errors follow a complex Gaussian distribution in this paper. We aim to minimize the average total transmit power at the cognitive base station (CBS) subject to the probabilistic signal-to-interference-plus-noise ratio (SINR) and energy harvesting (EH) constraints at each secondary user (SU) and probabilistic interference temperature constraint at primary receiver (PR), respectively. As the probabilistic constraints have no closed-form expression, the original optimization problem is difficult to be solved. As a solution, the probabilistic approach based on two kinds of Bernstein-type inequalities is proposed to reformulate the original non-convex problem to the form of semi-definite programming (SDP) after rank-one relaxation. We also propose the worst-case approach based on S-Procedure to solve the original problem. Simulation results are performed to demonstrate that the proposed RBFPS based on both probabilistic approach and the worst-case approach are robust to the CSI errors. In addition, the probabilistic approach is less conservative and more energy-saving.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128382900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}