Abdullateef Almohamad, S. Althunibat, M. Qaraqe, R. Mesleh, M. Hasna
{"title":"Performance Analysis of Index Modulation Based Multiple Access Under Imperfect Channel Estimation","authors":"Abdullateef Almohamad, S. Althunibat, M. Qaraqe, R. Mesleh, M. Hasna","doi":"10.1109/ComNet47917.2020.9306091","DOIUrl":"https://doi.org/10.1109/ComNet47917.2020.9306091","url":null,"abstract":"Future generations of wireless communication systems are expected to serve a large number of users with different quality of service requirements. Given the limited spectrum resources, the current multiple access schemes will not be able to fulfill these requirements. The recently proposed Index Modulation based Multiple Access (IMMA) has shown a significant improvement in the performance of uplink transmission as compared to other conventional multiple access schemes in terms of the achievable bit error rate (BER) and the number of served users. As such, it holds great potential in replacing the current multiple access schemes. In this paper, the performance of the IMMA scheme is analyzed under the assumption of the imperfect channel estimation. The average BER is derived in a closed form expression where the impact of the channel estimation error is included. Analytical results are provided to validate the Monte Carlo simulations where a close match is shown over a pragmatic range of signal-to-noise-ratio.","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134191655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liang Manman, Qin Xin, Pratik Goswami, A. Mukherjee, Lixia Yang
{"title":"Energy-Efficient Dynamic Clustering for IoT Applications: A Neural Network Approach","authors":"Liang Manman, Qin Xin, Pratik Goswami, A. Mukherjee, Lixia Yang","doi":"10.1109/ComNet47917.2020.9306092","DOIUrl":"https://doi.org/10.1109/ComNet47917.2020.9306092","url":null,"abstract":"The Internet of Things (IoT) realizes the interconnection of different paradigms in information technologies along with their connectivity. With its evolution, the cost and energy efficiency along with ease of life stands as a challenge towards its deployments. Advances in Artificial Intelligence coupled with IoT connectivity provide lots of potentials for real-time communication applications. To address the issue of energy-efficient computing for these applications, we propose an improved dynamic clustering algorithm which can be implemented in IoT applications which comprises of heterogeneous Wireless Sensor Networks (WSNs). Initially, we use neural network and Copula theory to process the information quantity based on power demand by individual clusters. This avoids the information redundancy and the waste of resources caused by repeated construction of similar type of clusters (as in conventional methods). According to the power requirement, the nodes based on the applications are divided into two initial clusters, and compared with the set thresholds. These are then used to assign logical values to the nodes in the cluster. Since, the amounts of observation information of the nodes are not always useful due to random energy consumption; the Back Propagation Neural Network (BPNN) is used to optimize the amount of information to form the final dynamic cluster efficiently. The simulation results showed that the proposed method can effectively utilize the information in the cluster and balance the inter-cluster cooperative communication energy efficiently for IoT applications. The effectiveness of the proposed approach and the superiority compared with the traditional methods had also been demonstrated through the simulation results. We hope our work can further stimulate the investigations on energy and cost efficient methodologies for smart IoT applications.","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Parham Kazemi, H. Al-Tous, Christoph Studer, O. Tirkkonen
{"title":"SNR Prediction in Cellular Systems based on Channel Charting","authors":"Parham Kazemi, H. Al-Tous, Christoph Studer, O. Tirkkonen","doi":"10.1109/ComNet47917.2020.9306087","DOIUrl":"https://doi.org/10.1109/ComNet47917.2020.9306087","url":null,"abstract":"We consider a machine learning algorithm to predict the Signal-to-Noise-Ratio (SNR) of a user transmission at a neighboring base station in a massive MIMO (mMIMO) cellular system. This information is needed for Handover (HO) decisions for mobile users. For SNR prediction, only uplink channel characteristics of users, measured in a serving cell, are used. Measuring the signal quality from the downlink signals of neighboring Base Stations (BSs) at the User Equipment (UE) becomes increasingly problematic in forthcoming mMIMO Millimeter-Wave (mmWave) 5G cellular systems, due to the high degree of directivity required from transmissions, and vulnerability of mm Wave signals to blocking. Channel Charting (CC) is a machine learning technique for creating a radio map based on radio measurements only, which can be used for radio-resource-management problems. A CC is a two-dimensional representation of the space of received radio signals. Here, we learn an annotation of the CC in terms of neighboring BS signal qualities. Such an annotated CC can be used by a BS serving a UE to first localize the UE in the CC, and then to predict the signal quality from neighboring BSs. Each BS first constructs a CC from a number of samples, determining similarity of radio signals transmitted from different locations in the network based on covariance matrices. Then, the BS learns a continuous function for predicting the vector of neighboring BS SNRs as a function of a 2D coordinate in the chart. The considered algorithm provides information for handover decisions without UE assistance. UE-power consuming neighbor measurements are not needed, and the protocol overhead for HO is reduced.","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Smart Homes using a Behavior Analysis based Authentication Approach","authors":"Noureddine Houcine Amraoui, Amine Besrour, Riadh Ksantini, Belhassen Zouari","doi":"10.1109/ComNet47917.2020.9306081","DOIUrl":"https://doi.org/10.1109/ComNet47917.2020.9306081","url":null,"abstract":"This paper presents TRICA, a security framework for smart homes. When using controlling apps (e.g., smartphone app), TRICA makes sure that only legitimate users are allowed to control their Internet of Things (IoT) devices. Leveraging User Behavior Analytics (UBA) and Anomaly Detection (AD) techniques, TRI CA collects and processes the historical cyber and physical activities of the user in addition to the historical states of the smart home system to build a One Class Support Vector Machines (OCSVM) model. This model is then used as a baseline from which anomalous commands (i.e., outliers) should be detected and rejected, while normal commands (i.e., targets) should be considered as legitimate and allowed to be executed. Experiments conducted on adapted real-world data properly show the feasibility of such user behavior-based authentication approach. TRICA exhibits low false accept and false reject rates ensuring both security and user convenience, respectively.","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"259 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133488599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/comnet47917.2020.9306100","DOIUrl":"https://doi.org/10.1109/comnet47917.2020.9306100","url":null,"abstract":"","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131878915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Improvement of Positioning Accuracy in Wireless Sensor Network using Smart Antennas","authors":"T. Loh, Haoyu Lin","doi":"10.1109/ComNet47917.2020.9306083","DOIUrl":"https://doi.org/10.1109/ComNet47917.2020.9306083","url":null,"abstract":"Location awareness wireless sensor network (WSN) plays an important role in fifth generation (5G) and Internet of Things (IoT) communication networks. Standard WSN devices usually employ monopole antenna, which exhibits a very poor performance in indoor multipath scenarios, and this can severely limit their link performance. In contrast to monopoles, smart antennas can steer their main beam towards a desired signal while forming a null in the direction of an interference signal. This would enable reduction on multipath fading effects, while at the same time allowing energy to be directed to where it is required to increase signal-to-noise ratio (SNR). This paper presents an assessment on positioning accuracy improvement gained by the incorporation of smart antennas to a location-awareness wireless sensor network in an indoor office environment. Both line-of-sight (LOS) and non-line-of-sight (NLOS) scenarios were considered. The results show that the positioning accuracy could be improved by using smart antenna as compared with monopole antenna.","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121602623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunities and Challenges of Bridging the Digital Divide using 5G enabled High Altitude Platforms and TVWS spectrum","authors":"K. Katzis, L. Mfupe, H. M. Hussien","doi":"10.1109/ComNet47917.2020.9306090","DOIUrl":"https://doi.org/10.1109/ComNet47917.2020.9306090","url":null,"abstract":"Like with the past generations of mobile cellular networks, deployment of 5G services in rural areas are expected to be financially and technically challenging. Currently, researchers around the globe explore the possibility of employing the underutilized/unused portion of TV spectrum referred to as TV White Spaces (TVWS) as a low-cost alternative to traditional licensed type of wired/wireless broadband networks and possibly as a way to bridge the gap of broadband service availability between rural and urban areas. Delivering TVWS services from High Altitude Platforms (HAPs) is an option that many developed /developing countries can use to provide broadband services over many of their rural and low-income population. This work presents the advantages of employing TVWS spectrum from HAPs as well as the challenges of this type of communication architecture. More specifically, this work proposes a novel communication type of architecture where HAPs are delivering broadband services using the TVWS spectrum. Taking advantage of their position in the sky and the centralized nature of the communication system, they deliver communications over a wide area while monitoring and optimizing radio resource allocation. The paper evaluates the performance of such a system based on the IEEE 802.22 standard and the free space path-loss model ITV - R P.452.","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117253385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inès Raïssa Djouela Kamgang, Ghayet El Mouna Zhioua, N. Tabbane
{"title":"Resource Allocation Steps for an Efficient End-to-End Service Delivery in Network Function Virtualization: A Survey","authors":"Inès Raïssa Djouela Kamgang, Ghayet El Mouna Zhioua, N. Tabbane","doi":"10.1109/ComNet47917.2020.9306074","DOIUrl":"https://doi.org/10.1109/ComNet47917.2020.9306074","url":null,"abstract":"Network Function Virtualization (NFV) is a new concept that has recently merged to cope with problems relative to high Capital and Operational expenditures (CAPEX and OPEX) generated by telecommunication hardware equipments. ETSI has proposed an architectural framework for the implementation of the concept. However, before coming to fruition, many challenges are to address. Those challenges include service management and orchestration, privacy and security, trust, and resource allocation. This paper focuses on resource allocation, by bringing an overview of what has been done in the domain and challenges that still need to be addressed. An experimental comparison of two approaches proposed in the coordinated chaining/mapping step of the resource allocation process is made and some orientations are suggested as a future field of research.","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128147593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient SDN Controller for Safety Applications in SDN-Based Vehicular Networks: POX, Floodlight, ONOS or OpenDaylight?","authors":"K. Smida, H. Tounsi, M. Frikha, Yeqiong Song","doi":"10.1109/ComNet47917.2020.9306095","DOIUrl":"https://doi.org/10.1109/ComNet47917.2020.9306095","url":null,"abstract":"Thanks to its open programmability and logically centralized control, the software-defined networking (SDN) paradigm presents new potentials for communication and networking management in vehicular networks and promises improved performances. The variety of applications delivered on the road like safety, traffic efficiency and infotainment, in addition to the diversity of developed SDN controllers, triggered the challenge to determine which controller can act better in which service. In this paper we conduct a performance comparison of four open source controllers (POX, Floodlight, ONOS and OpenDaylight) in terms of e2e delay in the context of safety applications in variable vehicular density environment. Experimental study done with advanced tools such as Iperf and Mininet-wifi indicates that ODL is the best in this context.","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125540414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joe Frederick Samuel, Zied Bouida, Pooria Shafia, Mohamed Hozayen, L. Kassab, Lama Kassab, M. Ibnkahla
{"title":"Diabetes Analytics and Recommendation Engine (DARE)","authors":"Joe Frederick Samuel, Zied Bouida, Pooria Shafia, Mohamed Hozayen, L. Kassab, Lama Kassab, M. Ibnkahla","doi":"10.1109/ComNet47917.2020.9306071","DOIUrl":"https://doi.org/10.1109/ComNet47917.2020.9306071","url":null,"abstract":"Diabetes is a chronic disease affecting over 415 million people worldwide. Effectively managing glucose levels on a daily routine is crucial to maintaining a healthy and threat-free lifestyle. In this paper, we propose the Diabetes Analytic and Recommendation Engine (DARE) Architecture to harness personal technologies in assisting type two diabetic patients to manage their glucose levels through a rule-based system coupled with anomaly detection and threat forecasting in a context-driven environment. To this end, the proposed DARE Architecture takes a modular approach in applying machine learning techniques to predict glucose levels and provide context-driven recommendations effectively.","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"101 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120865673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}