{"title":"On minimizing retransmission times based on C-IDNC for wireless broadcasting","authors":"Teng Niu, Dongmei Zhang, Kui Xu, Fei Wang","doi":"10.1109/ICCS.2016.7833611","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833611","url":null,"abstract":"We are concerned with designing feedback-based adaptive Instantly Decodable Network Coding (IDNC) schemes with the aim of minimizing retransmission times in wireless multicast and broadcast scenarios. In this paper, we first analyze the multiple factors influencing the transmission times and give the quantitative formula. Meantime, we introduce the concept of Cache-based Instantly Decodable Network Coding (C-IDNC) that the correctly received undecodable retransmission packets are waited in the cache for a future network decoding opportunity rather than delete. Then, we formulate the retransmission times minimization problem as an max-weight search problem and propose efficient algorithms for finding its optimal solution. Further, we propose a heuristic algorithms with worst case linear execution complexity based on sorting and iteration. Simulation results show that our proposed algorithms significantly reduce the IDNC retransmission times compared to previous works.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure routing based on social trust in opportunistic networks","authors":"Li Li, Xiaoxiong Zhong, Yang Qin","doi":"10.1109/ICCS.2016.7833575","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833575","url":null,"abstract":"Routing plays an important role in opportunistic networks (OPPNETs). Many routing schemes in OPPNETs assume that data dissemination is not attacked by misbehavior nodes. However, in practice, OPPNETs may be susceptible to various kinds of attacks due to frequent disruption in communication links. In this paper, we propose a social trust model for secure routing in OPPNETs, which exploits the contact status, forwarding ability and common attributes to evaluate social trust. And then, we propose a novel trust based routing algorithm and buffer management algorithm for the secure routing strategy, considering network coding in data dissemination. This routing strategy not only ensures data dissemination via trusted nodes but also reduces delivery cost while traversing through trusted paths. Demonstrated by simulation results in ONE, the proposed secure routing can achieve better performance in terms of delivery ratio, delivery delay and delivery cost as compared to existing solutions.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep learning-based automated modulation classification for cognitive radio","authors":"G. Mendis, Jin Wei, A. Madanayake","doi":"10.1109/ICCS.2016.7833571","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833571","url":null,"abstract":"Automated Modulation Classification (AMC) has been applied in various emerging areas such as cognitive radio (CR). In our paper, we propose a deep learning-based AMC method that employs Spectral Correlation Function (SCF). In our proposed method, one deep learning technology, Deep Belief Network (DBN), is applied for pattern recognition and classification. By using noise-resilient SCF signatures and DBN that is effective in learning complex patterns, we achieve high accuracy in modulation detection and classification even in the presence of environment noise. Our simulation results illustrate the efficiency of our proposed method in classifying 4FSK, 16QAM, BPSK, QPSK, and OFDM modulation techniques in various environments.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129431325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A two-stage spectrum leasing optimization framework for virtual mobile network operators","authors":"Yingxiao Zhang, Suzhi Bi, Y. Zhang","doi":"10.1109/ICCS.2016.7833595","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833595","url":null,"abstract":"Wireless network visualization (WNV) allows mobile network operators (MNOs) to lease its network infrastructure or licensed spectrum to virtual mobile network operators (VMNOs). A VMNO in WNV pays the MNOs for leasing wireless resources and receives payments from its mobile subscribers (MSs) based on the qualities of communication services. In this paper, we propose a novel two-stage spectrum leasing framework to maximize the average profit of a VMNO. Specifically, a VMNO can first make long-term spectrum lease based on the prediction of the average user traffic intensity over a long time period. Besides, the VMNO can flexibly make additional short-term leases based on the actual realizations of MS locations. We adopt a general alpha-fairness utility function to evaluate the qualities of downlink services to MSs. Within the proposed framework, we derive a closed-form expression for the optimal short-term leasing strategy for the VMNO, based on which we then propose an efficient algorithm to calculate the optimal long-term lease strategy. Simulation results show that the proposed two-stage spectrum leasing strategies can effectively increase the profit of VMNOs.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132023305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mengli Wang, Xiaoyu Wan, Zheng-qiang Wang, Zi-fu Fan
{"title":"Robust power allocation in two-tier spectrum-sharing femtocell networks","authors":"Mengli Wang, Xiaoyu Wan, Zheng-qiang Wang, Zi-fu Fan","doi":"10.1109/ICCS.2016.7833555","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833555","url":null,"abstract":"This paper investigates the robust power allocation problem in spectrum-sharing femtocell networks, where there is one central macrocell and multiple femtocells. The problem aims to maximize the sum-rate of femtocell user equipments (FUEs) while guaranteeing the quality of service (QoS) of the macrocell user equipment (MUE) in the sparsely deployed scenario and densely deployed scenario of two-tier femtocell networks. Based on ellipsoid sets to describe channel uncertainties, we transform the formulated problem into a deterministic convex optimization problem adopting the worst-case optimization. We give the closed-form optimal robust power allocation of each FUE in the sparsely deployed scenario. In the densely deployed scenario, we obtain the lower bound on the sum-rate of FUEs. Simulation results demonstrate the effectiveness of the proposed robust power allocation algorithm.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128798018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A unified beamforming structure for wireless multicasting and power transfer in MIMO systems","authors":"Jie Chen, Ying-Chang Liang, Gang Yang","doi":"10.1109/ICCS.2016.7833600","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833600","url":null,"abstract":"This paper studies the downlink beamforming design problem in multi-user multi-input-multi-output (MIMO) systems. Specifically, two related scenarios are considered: max-min signal-to-noise ratios (SNR) in wireless multicasting and max-min power in wireless power transfer (WPT). The conventional approach recasts the original nonconvex problems into convex semidefinite programming (SDP) by applying semidefinite relaxation (SDR) technique. This approach directly optimizes the transmit beamforming vector, thus suffers from high computational complexity when the number of transmit antennas at the base station (BS) is large. In this paper, we propose a unified and optimal beamforming structure which is expressed as a linear combination of the channel vectors of all users. With this proposed structure, the problem of beamforming design is thus simplified to optimize the combining weight vector, the dimension of which equals the number of users. This indirect optimization can significantly reduce the computational complexity of the transmit beamforming design, especially for massive MIMO systems. Numerical results show that by using the proposed beamforming structure, the complexity of indirect optimization is significantly reduced without suffering performance degradation, compared to the conventional direct optimization.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"56 90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128840189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Max-min fair robust beamforming design for multi-user MISO SWIPT systems","authors":"Sha Zhang, H. Zhang, Luxi Yang","doi":"10.1109/ICCS.2016.7833634","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833634","url":null,"abstract":"This paper proposes a robust transmission design for simultaneous wireless information and power transfer (SWIPT) in a multiuser multiple-input single-output (MISO) broadcast system, under the assumption of imperfect channel state information (CSI) at the transmitter. Our design objective is to maximize the minimum harvested energy of all the receivers by jointly optimizing the transmit beamforming vectors and the power splitting ratios while guaranteeing the signal-to-interference-and-noise ratio (SINR) and total transmit power constraints. The aforementioned max-min problem is non-convex due to the existing of infinite number of constraints, and thus it is difficult to solve. To tackle it, we first convert it into an easier non-convex problem with finite constraints by using some certain transformation techniques. Then, with the aid of the semidefinite relaxation (SDR) technique, we further obtain a relaxed semidefinite programming (SDP) problem, which is convex and thus can be solved efficiently by using interior point methods. Finally, simulation results are provided to validate the robustness and effectiveness of the proposed scheme.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance improvement study and an asynchronous transmission WDMA protocol for various size internet packets MANs","authors":"P. Baziana","doi":"10.1109/ICCS.2016.7833584","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833584","url":null,"abstract":"The nature of the asynchronous transmission of variable size IP packets in a wavelength division multiplexing (WDM) ring MAN is studied in this paper. Especially, we introduce an asynchronous transmission WDMA protocol that takes provision to avoid both the data channels and the receiver collisions employing an effective transmission strategy at each node in a decentralized way. In this way, the proposed protocol achieves optimal fiber bandwidth exploitation, especially under high load conditions. The proposed network architecture uses all wavelengths for both transmission and reception, since each node is equipped with a tunable transmitter and a set of fixed tuned receivers. The strong advantage of the proposed WDMA protocol is that it achieves almost 290% throughput improvement as compared with another relative one. Finally, the performance measures evaluation is based on the simulation results of a Poisson traffic model that was properly developed.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"34 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120967799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joanna F. Laikin, M. Bradbury, Chen Gu, Matthew Leeke
{"title":"Towards fake sources for source location privacy in wireless sensor networks with multiple sources","authors":"Joanna F. Laikin, M. Bradbury, Chen Gu, Matthew Leeke","doi":"10.1109/ICCS.2016.7833572","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833572","url":null,"abstract":"Wireless sensor networks (WSNs) are regularly used in asset monitoring applications, where the location of an asset or assets must be kept private. Providing location privacy for such an asset is tantamount to protecting the location of a source node from an attacker who is attempting to locate it. Although no solution exists to provide source location privacy over an extended period, it has been shown that attackers can be sufficiently inhibited by prominent approaches that use either a phantom node, via which protocol messages are routed, or nodes assigned to be fake sources, each of which then broadcast fake messages. However, the applicability of fake source approaches to networks where location privacy must be maintained for multiple sources has yet to be considered. This paper addresses this issue by analysing a representative fake source algorithm in the context of multiple sources, presenting simulation results that demonstrate the shortcomings of the approach and identifying the underlying limitations to pave the way for the development of algorithms capable of accounting for multiple sources.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123030245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-complexity DGT-based GFDM receivers in broadband channels","authors":"Peng Wei, X. Xia, Yue Xiao, Shaoqian Li","doi":"10.1109/ICCS.2016.7833550","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833550","url":null,"abstract":"Recently, generalized frequency division multiplexing (GFDM) is a multicarrier 5G waveform candidate for flexibility of its pulse shaping filters. However, the flexible pulse shaping filters may result in inter carrier interference (ICI) and inter symbol interference (ISI), which become more severe in a broadband channel. In this paper, for the elimination of the ISI and ICI, based on discrete Gabor transform (DGT), a transmit GFDM signal is first treated as an inverse DGT (IDGT), and then a frequency-domain DGT is proposed to recover the GFDM signal at the receiver. Furthermore, for the complexity reduction, a suboptimal frequency-domain DGT called local DGT (LDGT) is developed. Theoretical analyses and simulation results show that the proposed DGT can obtain promising bit-to-error rate (BER) performance with low complexity.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133943506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}