{"title":"Achieving Channel Reciprocity in Multi-Carrier System: SRS Carrier-Based Switching","authors":"Yiyan Zhang, He Wang, Xutao Zhou","doi":"10.1109/GLOCOMW.2018.8644114","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2018.8644114","url":null,"abstract":"In the context of approaching next generation cellular network where increasing antennas are installed, link quality largely depends on channel information acquired at transceivers. Sounding Reference Signal (SRS) carrier-based Switching, an emerging technique developed starting from 3GPP Release-14 standards, enables SRS transmitted on non-SRS carriers to provide base station reciprocity-aided channel information; therefore it accomplishes better precoding selection for beamforming and becomes a critical role in multi-carrier aggregation system. In this article, we look into SRS Switching and present a comprehensive analysis for this technique. A standard-compatible and high-efficiency SRS Switching algorithm is proposed, and then implemented into a system-level simulator to evaluate the network performance in terms of downlink throughput. We extract the design principle from analyzing its own characteristics. Also, the rationales behind why the technique works are identified from the numerical results. More than an implementation of standardized technique, out algorithm can serve as precious basis for its practical realization and further evolution of standards. Compared with conventional SRS cases, the remarkable performance enhancement has revealed significant superiority of our proposal which suggests a bright prospect of this technique in next generation mobile wireless network.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127478029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Resource Allocation in Multiuser DF Relay Interference Networks","authors":"Bartosz Bossy, P. Kryszkiewicz, H. Bogucka","doi":"10.1109/GLOCOMW.2018.8644258","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2018.8644258","url":null,"abstract":"In this paper, we develop a joint subcarrier (SC) pairing, subcarrier and power allocation algorithm for maximizing energy efficiency (EE) in the multiuser downlink decode-and-forward (DF) relay interference network. The energy efficiency of the network is maximized by adaptive selection of the transmission mode. Moreover, both direct- and relayed transmission from a base station (BS) and a relay node (RN) to an end-user is allowed to use the same subcarriers, simultaneously. The formulated optimization problem is the non-convex, fractional, mixed binary integer programming problem which is NP-hard to solve. Hence, a Successive Convex Approximation (SCA) method has been applied to approximate the problem by the series of equivalent convex problem. Finally, based on the Dinkelbach method, the iterative algorithm maximizing EE of the considered system has been proposed. Simulation results demonstrate the effectiveness of the proposed solution.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jia Ye, Chao Zhang, Gaofeng Pan, Yunfei Chen, Z. Ding
{"title":"Secrecy Analysis for Spatially Random UAV Systems","authors":"Jia Ye, Chao Zhang, Gaofeng Pan, Yunfei Chen, Z. Ding","doi":"10.1109/GLOCOMW.2018.8644132","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2018.8644132","url":null,"abstract":"In this paper, an unmanned aerial vehicle (UAV) to ground communication system with spatially random eavesdroppers account on both ground and airspace is considered. UAV tries to transmit information to a legitimate receiver on the ground while a group of eavesdroppers on the ground and another group of eavesdropping UAVs in the airspace try to overhear the delivered information. The locations of all terminals are randomly distributed in the coverage space of the source UAV. The statistical characteristics of the received signal-to-noise ratio at all terminals considering two kinds of communication environment are characterized. The analytical expressions for secrecy outage probability are derived. Finally, simulation is carried out to verify the correctness of our analytical model.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122219740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finite Horizon Throughput Maximization for a Wirelessly Powered Device Over a Time Varying Channel","authors":"Mehdi Salehi Heydar Abad, Özgür Erçetin","doi":"10.1109/GLOCOMW.2018.8644442","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2018.8644442","url":null,"abstract":"In this work, we consider an energy harvesting device (EHD) served by an access point with a single antenna that is used for both wireless power transfer (WPT) and data transfer. The objective is to maximize the expected throughput of the EHD over a finite horizon when the channel state information is only available causally. The EHD is energized by WPT for a certain duration, which is subject to optimization, and then, EHD transmits its information bits to the AP until the end of the time horizon by employing optimal dynamic power allocation. The joint optimization problem is modeled as a dynamic programming problem. Based on the characteristic of the problem, we prove that a time dependent threshold type structure exists for the optimal WPT duration, and we obtain closed form solution to the dynamic power allocation in the uplink period.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116705332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fred Aklamanu, S. Randriamasy, É. Renault, I. Latif, A. Hebbar
{"title":"Intent-Based Real-Time 5G Cloud Service Provisioning","authors":"Fred Aklamanu, S. Randriamasy, É. Renault, I. Latif, A. Hebbar","doi":"10.1109/GLOCOMW.2018.8644457","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2018.8644457","url":null,"abstract":"Software Defined Networking (SDN) and Network Function Virtualisation (NFV) have paved the way for programmability, flexibility and scalability of mobile networks. Both technologies offer significant advantages to the Network Operators (NOs) in terms of network management and service provisioning which widens their market to 3rd party providers such as Virtual Network Operators (VNOs) and Over-The-Top (OTT) Application Providers in domains such as Mobile BroadBand and Internet of Things (IoT). This paper, proposes an OTT Intent Based Network Framework for 5G Network Slice provisioning. The aim is to automate the task of network slicing through a declarative approach known as Intents while hiding network complexity from NOs, Mobile Infrastructure Tenants and VNOs. We provide an experimental validation of the Intent Framework with a scenario of a 5G IoT network slice deployment.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128416226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning to Schedule Resources in Software-Defined Radio Access Networks","authors":"Xianfu Chen","doi":"10.1109/GLOCOMW.2018.8644407","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2018.8644407","url":null,"abstract":"A software-defined control plane simplifies network operations in dense radio access networks (RANs) by abstracting the base stations as a logical centralized network controller (CNC). In a software-defined RAN, the CNC and the wireless service providers (WSPs) can thus be decoupled. The CNC allocates subbands to the mobile terminals (MTs) based on their submitted bids. Such an auction is repeated across time and regulated by the Vickrey-Clarke-Groves pricing mechanism. The objective of an MT subscribed to a particular WSP is to optimize the expected long-term transmit power in transmitting packets subject to a specific Quality-of-Service constraint. We formulate the problem as a multi-agent Markov decision process, where the subband allocation (SA) and packet scheduling decisions are a function of the global network state. To address the challenges of signalling overhead and computational complexity, we approximate the queue state-SA factor by the sum of per-MT queue state value functions, and derive an online localized algorithm to learn them. The presented experiments show significant performance gains from our proposed studies.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134222883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel Estimation and Symbol Detection for Communications on Overlapping Channels","authors":"M. Nguyen, L. Le","doi":"10.1109/GLOCOMW.2018.8644453","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2018.8644453","url":null,"abstract":"In this paper, we investigate the joint channel estimation, interference cancellation and data detection problem for a general setting in which a desired communication is interfered by another communication having a different symbol rate and being asynchronous with the considered communication. The fast fading channel gains of the desired communication and the effective interference coefficients (EIC) induced by filters of the interfering signal must be estimated to enable reliable detection of the desired data. However, the joint estimation of fast fading channel and EIC from communications with different bandwidths has not been studied in literature. Toward this end, we propose a two-phase strategy for channel estimation and data detection. In the first phase, we derive the closed-form maximum-likelihood estimator of the EIC. Then, the interference is subtracted and the desired channel gains corresponding to pilot symbols are estimated. In the second phase, with the knowledge of desired channel information obtained from the previous phase, we derive the posterior probability for data symbols for the soft data detection. Via numerical studies, we demonstrate that our design can effectively cancel the interference and the soft detection approach can achieve better symbol error rate compared to the existing message passing based detection approach. We show that our design can perform well for a wide range of interference power and frequency spacing and it has lower complexity than the existing technique.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124082248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When Blockchain Makes Ephemeral Keys Authentic: A Novel Key Agreement Mechanism in the IoT World","authors":"Pietro Tedeschi, G. Piro, G. Boggia","doi":"10.1109/GLOCOMW.2018.8644494","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2018.8644494","url":null,"abstract":"Conventional Key Management Protocols establish secure communication channels by using asymmetric cryptography based on “fixed” public keys. In the Internet of Things context, it is preferable to have a good level of freshness of the cryptographic material. But efficient solutions leveraging “ephemeral” public keys are not available yet. The work presented herein solves this problem by conceiving a novel key agreement methodology integrating the Blockchain technology. Specifically, Blockchain is used to store X.509 certificates related to the initial fixed public keys of devices, to publish new ephemeral public keys, and to help the verification of the authenticity of ephemeral public keys without sending signatures and additional X.509 certificates. A preliminary comparison against Transport Layer Security protocol and other customized key agreement schema presented in the literature demonstrates that the proposed approach registers low communication overhead, limited energy consumptions, and acceptable communication latencies while ensuring the lowest memory footprint.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124507173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed A. M. Abdullah, Gaojie Chen, Mahmoud Alageli, A. Ikhlef, J. Chambers
{"title":"Performance Analysis of Cognitive Clustered Machine-to-Machine Networks with Device Selection","authors":"Mohammed A. M. Abdullah, Gaojie Chen, Mahmoud Alageli, A. Ikhlef, J. Chambers","doi":"10.1109/GLOCOMW.2018.8644158","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2018.8644158","url":null,"abstract":"In this paper, we consider cluster-based underlay Machine-to-Machine (M2M) communications and propose a joint Cellular User Equipment (CUE) and M2M device selection scheme to reduce the outage probability of M2M communications. We derive an analytical closed-form expression for the outage probability of transmission from a selected M2M device to the Base Station (BS). Simulation results confirm that the proposed CUE and M2M selection scheme achieves the lowest outage probability for M2M communications with interference to the BS being limited by a pre-defined level. Hybrid duplex BS communication can be switched between half and full duplex according to different levels of residual self-interference to achieve the best performance. Numerical simulations are included to verify the accuracy of the theoretical analysis of the proposed scheme. The proposed model given in this paper and its related analysis pave the way for further work in this important area.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Matching Users to Specialised MNOs in Service Tailored Networks of the Future","authors":"Conor Sexton, M. Butt, N. Marchetti, L. Dasilva","doi":"10.1109/GLOCOMW.2018.8644257","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2018.8644257","url":null,"abstract":"In this paper, we investigate a network model in which entities called subscription brokers group service level agreements with multiple specialised mobile network operators (SMNOs) into a single subscription bundle, with a fixed data allowance that can be used by the subscriber as needed across any of the SMNOs included in the bundle. Each SMNO operates a network that is designed to meet the demands of a particular service area or vertical industry. We demonstrate the performance benefits of such a model, allowing users to choose SMNOs according to the needs of the service that they are using. In particular, we focus on how to perform the matching between users and SMNOs in a bundle, adopting the Gale-Shapley matching algorithm. We argue that a stable matching is needed to ensure that both SMNOs and users are incentivised to adopt the broker-based model. We outline a framework based on the concept of utility for devising the preference lists of users, while the approach we propose for building the preference lists of SMNOs can differentiate between different classes of users based on the price they pay for their subscription. We evaluate the performance cost in terms of utility of achieving stability compared to a sum utility maximisation matching approach, showing that this cost is largely borne by the lower priority users. Overall, the proposed broker-based model performs at least as well as any one SMNO for lower priority users, and outperforms any one SMNO for higher priority users.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127856757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}