M. T. Kabir, Muhammad R. A. Khandaker, C. Masouros
{"title":"A Scalable Performance-Complexity Trade-off for Full Duplex Beamforming","authors":"M. T. Kabir, Muhammad R. A. Khandaker, C. Masouros","doi":"10.1109/WCNC.2019.8885674","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885674","url":null,"abstract":"In this paper, we consider a multiuser single-cell transmission facilitated by a full duplex (FD) base station (BS). We formulate two multi-objective optimization problems (MOOPs) via the weighted Tchebycheff method to jointly minimize the two desirable system design objectives namely the total downlink and uplink transmit power. In the first MOOP, multiuser interference is suppressed while in the second MOOP, multiuser interference is rather exploited. In order to solve the non-convex MOOPs, we propose a two-step iterative algorithm to optimize jointly the receive beamformer, transmit beamformer and uplink transmit power, respectively. Simulation results show the proposed scheme achieves a scalable performance-complexity trade-off that allows performance improvements compared to existing solutions.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125886973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed SIP DDoS Defense with P4","authors":"Aldo Febro, Hannan Xiao, Joseph Spring","doi":"10.1109/WCNC.2019.8885926","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885926","url":null,"abstract":"SIP DDoS attack is growing and has a real threat to crippling public communication infrastructure. The standard approach to building the defense is at or near the attack destination (i.e. victim's location). This approach is struggling to keep up with the growing volume and attack sophistication. To be better prepared for future attacks, the workload needs to be distributed, and the attack needs to be mitigated as close to the attack source as possible. This paper experiments with data plane programming (P4) and control plane programming of Ethernet switches to provide first-hop detection and mitigation capability for SIP INVITE DDoS attack at every switchport. This approach creates a distributed or source-based defense component which could be added to the existing destination-based components to create a more comprehensive overall solution that is extensible, economical, and scalable against SIP DDoS attack of the future.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"25 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131520229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Transmission in Multi-user Relay Networks with Node Clustering and Network Coding","authors":"Xun Li, Chao Wang, Ping Wang, Fuqiang Liu","doi":"10.1109/WCNC.2019.8885629","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885629","url":null,"abstract":"This paper investigates the communication problem in a class of multi-user dual-hop networks in which multiple source terminals desire to distribute their independent messages to multiple destinations through the assistance of multiple relay terminals. We consider an efficient transmission strategy that combines network coding and non-orthogonal transmission techniques to balance the achievability of spatial diversity and channel utilization. Specifically, in addition to applying a class of finite-field network codes in the relays, we divide the sources and the relays into clusters such that terminals within each cluster can access the same channel resource. The achievable error performance under Nakagami-m fading environment is derived and is shown to significantly outperform the conventional transmission methods.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Offset Tolerant Demodulator for Frequency/Phase Modulation in Time-Varying Channel","authors":"Siavash Safapourhajari, A. Kokkeler","doi":"10.1109/WCNC.2019.8886086","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8886086","url":null,"abstract":"Carrier frequency offset (CFO) and time-varying fading channels are two problems that emerging ultra-narrowband solutions for Internet of Things and Wireless Sensor Networks need to tackle. Previously, an offset tolerant demodulator for Double Differential PSK (DDPSK) has been proposed to overcome CFO. To combat channel distortion, time or frequency diversity together with coding techniques can be utilized. However, these necessitate transmitting extra bits and leads to an increase in packet time. A longer packet time corresponds to longer on-time of the RF front-end and more power consumption. To avoid longer packet for the same symbol rate, a higher order modulation is required which considerably degrades BER performance. In this work, instead of higher order DDPSK, hybrid frequency/phase modulation is used. An offset tolerant demodulator for hybrid modulation is proposed which provides the same robustness against CFO as DDPSK. Besides, it provides higher order of modulation with less performance loss compared to higher order DDPSK. Simulation results show that a combination of BFSK and QPSK using the proposed demodulator can achieve almost 4 dB improvement at BER=0.001 in a Rayleigh channel compared to Double Differential 8PSK (DD8PSK) which can provide the same modulation order.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115732605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sridharan, J. Bigham, Paul Michael Campbell, E. Bodanese
{"title":"Evaluation of Factors Affecting Inverse Beacon Fingerprinting Using Route Prediction Algorithm","authors":"M. Sridharan, J. Bigham, Paul Michael Campbell, E. Bodanese","doi":"10.1109/WCNC.2019.8885945","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885945","url":null,"abstract":"Conventional Radio Frequency (RF) based fingerprinting still remains one of the most popular methods amongst other indoor positioning techniques due to its inherent accuracy and reliability. However, not much prominence has been shown in analyzing certain factors that may affect the outcome of the fingerprinting method while designing the localization system. In this paper, we conduct a study to infer if a reduced number of receivers equipped with higher gain antennas can provide improved Bluetooth Low Energy (BLE) fingerprinting performance in a complex indoor environment. The evaluation is performed in a standard domestic apartment with an activity centric approach using a single wearable beacon and multiple receivers. A rank based route selection algorithm is used to list the candidate positions or routes that indicate the most likely path on which the subject was travelling. Furthermore, we discuss the benefits of implementing the inverse fingerprinting method with a trajectory based prediction model and also examine the effect of surrounding electrical interference. Experimental results indicate that an increased antenna gain in addition to deploying an adequate number of receivers have a positive effect on the overall ranking accuracy.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130884747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Iaad Ben Dhia, M. Bouhtou, T. En-Najjary, S. Lahoud, X. Lagrange
{"title":"Dynamic Access Point Selection and Resource Allocation in Multi-Technology Wireless Network","authors":"Iaad Ben Dhia, M. Bouhtou, T. En-Najjary, S. Lahoud, X. Lagrange","doi":"10.1109/WCNC.2019.8885438","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885438","url":null,"abstract":"Heterogeneous Network (HetNet) is among the most important challenges for the upcoming cellular wireless networks. In this paper, we propose a method to optimize the Radio Access Technologies (RATs) selection and resource allocation in multitechnology wireless networks during a time period. We optimized on a realistic topology of Base Stations (BS) with overlaps of the cellular coverage and dynamic users traffic (arrival and departure). The optimization takes into account the requested services, different users' contract, and user satisfaction. Furthermore, in the proposed approach, we add constraints to ban the session drops and handovers for static users. For each instance, we formulate the problem as a linear optimization problem and we optimize it successively. The aim of the optimization is to jointly maximize the overall user satisfaction and the number of users connected. Compared with a legacy approach, numerical results show that our solution outperforms in terms of user satisfaction.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124817026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis","authors":"Nizar Msadek, R. Soua, T. Engel","doi":"10.1109/WCNC.2019.8885429","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885429","url":null,"abstract":"Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users' privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type, by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic. Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133420361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. H. Song, Seung-Chan Lim, Girim Kwon, Hyuncheol Park
{"title":"CRC-Aided Soft-Output Detection for Uplink Multi-User MIMO Systems With One-Bit ADCs","authors":"S. H. Song, Seung-Chan Lim, Girim Kwon, Hyuncheol Park","doi":"10.1109/WCNC.2019.8885762","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885762","url":null,"abstract":"In this paper, we propose a CRC-aided soft-output (CASO) detection for uplink multi-user multiple-input multiple-output systems with one-bit ADCs to improve the error rate while maintaining low latency. After CRC checking, the CASO detection constructs a refined subcode of a spatial-domain code by exploiting successfully decoded messages from the previous iteration. Based on the refined subcode, more reliable soft messages can be extracted to utilize in the rest decoding process. Since multiple messages can be successfully canceled with the aid of CRC checking, the CASO detection can prevent error propagation and suppress increment of latency. Simulation results demonstrate that the CASO detection can provide improved error rate compared to the conventional detections though increment of latency is insignificant for high SNR.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125195522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on User Activity in Compressed Sensing based Random Access","authors":"Hyowoon Seo, Wan Choi","doi":"10.1109/WCNC.2019.8886126","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8886126","url":null,"abstract":"In Compressed Sensing based Random Access CHannel (CS-RACH) protocol, a base station leverages compressed sensing technique to detect the active users in the cell coverage and estimate the channel gain between the users and the base station. In a real communication scenario, activity of a specific user usually varies time to time and thus can be seen as a random variable following ON/OFF distribution. Meanwhile, the performance of compressed sensing technique is dependent on the sparsity of the estimating vector, which is closely related to the user activity in CS-RACH scenario. In this perspective, we analyze the condition of the user activity for the stable operation of the protocol. Particularly, we use the least absolute shrinkage and selection operator (LASSO) approach, which gives a closed form expressions of the sparsity condition for the successful active user detection in an asymptotic manner. As a result, we obtain the condition of the user activity for stable operation of CS-RACH and verify the result with numerical simulations.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khadija Bouraqia, Essaid Sabir, H. E. Biaze, M. Sadik
{"title":"A Volunteer Dilemma Framework for Mobile Live Streaming","authors":"Khadija Bouraqia, Essaid Sabir, H. E. Biaze, M. Sadik","doi":"10.1109/WCNC.2019.8886088","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8886088","url":null,"abstract":"Streaming service is continuously growing, which makes it the killer application of current 4G networks, as it demands more resources from mobile networks. The cellular network receives a large number of requests, most times for the same content, consuming the spectrum, energy, in addition to monetary costs inefficiently. In order to optimize spectrum utilization and reduce the induced costs, we propose a noncooperative game framework allowing to understand the user's behaviors. We observed a volunteer Dilemma-like situation when a mobile user could stream the requested video to its neighbors over a D2D link. Afterward, we provide a full description of both pure and mixed Nash equilibria (NE). Furthermore, to ensure convergence to NE points, we use linear reward-inaction and Gibbs Boltzmann learning algorithms. Finally, we show how our scheme could be exploited through extensive numerical simulation. Our framework capture the user's selfish behavior and provides a solution regarding setting and parameters allowing to reach high performance in terms of spectrum utilization, energy efficiency, and overall cost.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}