{"title":"Outage Constrained Robust Beamforming Design for SWIPT-Enabled Cooperative NOMA System","authors":"Binbin Su, Q. Ni, Wenjuan Yu, H. Pervaiz","doi":"10.1109/ICC.2019.8761158","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761158","url":null,"abstract":"We investigate the robust beamforming design for a simultaneous wireless information and power transfer (SWIPT) enabled system, with the cooperative non-orthogonal multiple access (NOMA) protocol applied. A novel cooperative NOMA scheme is proposed, where a strong user with better channel conditions adopts power splitting (PS) scheme and acts as an energy-harvesting relay to forward the decoded signal to the weak user. The presence of channel uncertainties is considered by introducing the outage-based constraints of signal to interference plus noise ratio (SINR). Specifically, it is assumed that only imperfect channel state information (CSI) is known at the base station (BS), due to the reason that the BS is far away from both users and suffers serious feedback delay. Our aim is to maximize the strong user's data rate, by optimally designing the robust transmit beamforming and PS ratio, while guaranteeing the correct decoding of the weak user. The proposed formulation yields to a challenging nonconvex optimization problem. To solve it, we first approximate the probabilistic constraints with the Bernstein-type inequalities, which can then be globally solved by two-dimensional exhaustive search. To further reduce the complexity, an efficient low-complexity algorithm is proposed with the aid of successive convex approximation (SCA). Numerical results show that the proposed algorithm converges quickly, and the proposed SWIPT-enabled robust cooperative NOMA system achieves better performance than existing protocols.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"156 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ting-Ting Yang, C. Foh, F. Héliot, C. Leow, P. Chatzimisios
{"title":"Self-Organization Drone-Based Unmanned Aerial Vehicles (UAV) Networks","authors":"Ting-Ting Yang, C. Foh, F. Héliot, C. Leow, P. Chatzimisios","doi":"10.1109/ICC.2019.8761876","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761876","url":null,"abstract":"Drone networks offer rapid network deployment to areas that can pose access difficulty. This paper investigates the deployment of multi-hop drone-based unmanned aerial vehicles networks with a focus on the self-organization aspect. When rescue drones carry out their rescue operations which may fly faraway from the gateway, relay drones are autonomously deployed to maintain connectivity. We study the multiple dedicated connections where each rescue drone is connected to the gateway via dedicated relay drones. We show that this approach lacks sharing of relay drones and thus requires more relay drones. We then propose a centralized greedy algorithm and a distributed solution to significantly reduce the number of relay drones. We show that while the distributed self-organized drones (DSOD) solution requires a slightly higher number of relay drones than the greedy algorithm, it eliminates the need for global message exchange which makes it attractive for practical use.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114955141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Watch Your Step! Detecting Stepping Stones in Programmable Networks","authors":"Debopam Bhattacherjee, A. Gurtov, T. Aura","doi":"10.1109/ICC.2019.8761731","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761731","url":null,"abstract":"Hackers hide behind compromised intermediate hosts and pose advanced persistent threats (APTs). The compromised hosts are used as stepping stones to launch real attacks, as is evident from an incident that shook the world in 2016 — Panama Papers Leak. The major attack would not go unnoticed if the compromised stepping stone, in this case an email server, could be identified in time. In this paper, we explore how today's programmable networks could be retrofitted with effective stepping stone detection mechanisms to correlate flows. We share initial results to prove that such a setup exists. Lastly, we analyze scalability issues associated with the setup and explore recent developments in network monitoring which have potential to address these issues.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Type-Spread Molecular Communications: Principles and Inter-Symbol Interference Mitigation","authors":"Weidong Gao, T. Mak, Lie-liang Yang","doi":"10.1109/ICC.2019.8761545","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761545","url":null,"abstract":"Diffusion-based Molecular Communication (DMC) is a feasible method for information transmission in some nano-networks operated in gas or liquid environments. In this paper, we first propose an information modulation scheme for DMC, which is referred to as the Type-Spread Molecular Shift Keying (TS-MoSK). Considering that DMC signals usually experience severe inter-symbol interference (ISI), our TS-MoSK is characterized by introducing extra types of molecules for ISI mitigation (ISIM). Furthermore, we introduce two ISIM methods to the TS-MoSK modulated DMC systems, which are the active ISIM and passive ISIM. We detail their operation principles, and investigate as well as compare their achievable performance. Our studies show that, aided by the extra types of molecules, TS-MoSK outperforms the MoSK without spreading. Both ISIM approaches are effective for further improving the performance of TS-MoSK.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Miao, Chunbo Luo, G. Min, Liang Wu, Tianxiao Zhao, Yang Mi
{"title":"Position-Based Beamforming Design for UAV Communications in LTE Networks","authors":"W. Miao, Chunbo Luo, G. Min, Liang Wu, Tianxiao Zhao, Yang Mi","doi":"10.1109/ICC.2019.8761505","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761505","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) have demonstrated exceptional capabilities in many real-world applications such as remote sensing, emergency medicine delivery and precision agriculture. LTE networks are regarded as key candidates to offer high performance broadband wireless services to support UAV applications and safe deployment. However, the unique features of aerial UAVs including high-altitude manipulation, three-dimension (3D) mobility and rapid velocity changes, pose challenging issues for optimising LTE wireless communications to support UAVs, especially under the severe inter-cell interference generated by UAVs in the sky. To deal with this issue, we propose a novel position-based robust beamforming algorithm to improve the performance of LTE networks to serve UAVs. For obtaining optimal weight vectors that could tolerate Direction-of-Arrival (DoA) estimation errors, we propose a hybrid method to integrate the channel information and UAV flight information to accurately estimate the DoA angle range. In order to validate the performance of the proposed robust beamforming algorithm, we conduct comprehensive simulation experiments under practical configurations. The results show that the proposed robust beamforming algorithm outperforms benchmark Linearly Constrained Minimum Variance (LCMV) beamforming and GPS-based beamforming algorithms.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BIDS: Bio-Inspired, Collaborative Intrusion Detection for Software Defined Networks","authors":"Qianru Zhou, D. Pezaros","doi":"10.1109/ICC.2019.8761410","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761410","url":null,"abstract":"With network attacks becoming more sophisticated and unpredictable, detecting their onset and mitigating their effects in an automated manner become increasingly challenging. Lightweight and agile detection mechanisms that are able to detect zero-day attacks are in great need. High true-negative rate and low false-positive rate are the most important indicators for a intrusion detection system. In this paper, we exploit the logically-centralised view of Software-Defined Networking (SDN) to increase true-negative rate and lower false-positive rate in a intrusion detection system based on the Artificial Immune System (AIS). We propose the use of an antibody fuser in the controller to merge and fuse the mature antibody sets trained in the individual switches and turn the real intrusion records each switch has seen into antibodies. Our results show that both the false-positive rate and true-negative rate experience significant improvement with the number of local antibody sets fused grows, consuming less cpu usage overhead. A peak improvement can reach over 80% when antibody sets from all switches are taken into consideration.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123269392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diversity-Multiplexing Tradeoff of the Two-User X-Channel with Two Antennas","authors":"Young-bin Kim, M. G. Kang, Wan Choi","doi":"10.1109/ICC.2019.8761972","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761972","url":null,"abstract":"Besides maximizing multiplexing gain, improving diversity is important for reliable communications in the presence of interference. In this context, on-off switched interference alignment (IA) is investigated, where IA is intermittently utilized by switching IA on/off in order to improve diversity gain in an interference channel and hence to maximize diversity multiplexing tradeoff (DMT). This paper adopts Alamouti coding based IA for the on-off switched IA, which requires only local channel state information at the transmitter. Optimizing the portion of IA utilization of the proposed scheme in closed form, we derive the achievable DMT and show that the intermittent utilization of IA with simultaneous non-unique decoding can improve DMT in the 2-user X-channel with two antennas. The proposed scheme, to the best of our knowledge, surpasses any other existing schemes for the 2-user X-channel with two antennas and is closed to the ideal DMT.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129427887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Caihong Kai, Tianyu Huang, Xinyue Hu, Lusheng Wang
{"title":"Energy Saving and Interference Cancellation in the WLAN with a Full-Duplex Access Point","authors":"Caihong Kai, Tianyu Huang, Xinyue Hu, Lusheng Wang","doi":"10.1109/ICC.2019.8761671","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761671","url":null,"abstract":"This paper investigates the problem of minimizing power consumption under the situation of eliminating the uplink-downlink interference (UDI) through the IC2 technique for a full-duplex WLAN where half-duplex users communicate with the full-duplex AP. In particular, the problem formulation is to minimize the power consumption of half-duplex users and the full-duplex AP in the system while guaranteeing the required data rate of both the uplink and downlink users. The formulated problem falls into a mixed integer nonlinear programming (MINLP) form, which is generally NP-hard to solve. To make the problem tractable, we divide it into user pairing and power allocation sub-problems. Specifically, we devise a user pairing criterion based on the signal-to-interference-plus-noise ratio (SINR) to reduce the interference at downlink users incurred by the uplink transmission, thus decreasing the power that used to eliminate the interference. After that, we adjust the transmit power of both users and the AP to minimize the total power consumption under the constraint of users' minimum data rate requirements. Simulation results are presented to evaluate the performance of our scheme and demonstrate the power consumption reduction compared to other schemes in full-duplex WLANs.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127243924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Sohaib Amjad, Claas Tebruegge, Agon Memedi, Stephan Kruse, C. Kress, C. Scheytt, F. Dressler
{"title":"An IEEE 802.11 Compliant SDR-Based System for Vehicular Visible Light Communications","authors":"Muhammad Sohaib Amjad, Claas Tebruegge, Agon Memedi, Stephan Kruse, C. Kress, C. Scheytt, F. Dressler","doi":"10.1109/ICC.2019.8761960","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761960","url":null,"abstract":"We present a complete Visible Light Communication (VLC) system for experimental Vehicular VLC (V-VLC) research activities. Visible light is becoming an important technology complementing existing Radio Frequency (RF) technologies such as Cellular V2X (C-V2X) and Dedicated Short Range Communication (DSRC). In this scope, first works helped introducing new simulation models to explore V-VLC capabilities, technologies, and algorithms. Yet, experimental prototypes are still in an early phase. We aim bridging this gap with our system, which integrates a custom-made driver hardware, commercial vehicle light modules, and an Open Source signal processing implementation in GNU Radio, which explicitly offers rapid prototyping. Our system supports OFDM with a variety of Modulation and Coding Schemes (MCS) and is compliant to IEEE 802.11; this is in line with the upcoming IEEE 802.11 LC standard as well. In an extensive series of experiments, we assessed the communication performance by looking at realistic inter vehicle distances. Our results clearly show that our system supports even higher order MCS with very low error rates over long distances.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127277909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SDN-Ti: A General Solution Based on SDN to Attacker Traceback and Identification in IPv6 Networks","authors":"Chunlei Li, Qian Wu, Hewu Li, Jiang Zhou","doi":"10.1109/ICC.2019.8761485","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761485","url":null,"abstract":"Network attacks have become a growing threat to the current Internet. For the enhancement of network security and accountability, it is urgent to find the origin and identity of the adversary who misbehaves in the network. Some studies focus on embedding users' identities into IPv6 addresses, but such design cannot support the Stateless Address Autoconfiguration (SLAAC) protocol which is widely deployed nowadays. In this paper, we propose SDN-Ti, a general solution to traceback and identification for attackers in IPv6 networks based on Software Defined Network (SDN). In our proposal, the SDN switch performs a translation between the source IPv6 address of the packet and its trusted ID-encoded address generated by the SDN controller. The network administrator can effectively identify the attacker by parsing the malicious packets when the attack incident happens. Our solution not only avoids the heavy storage overhead and time synchronism problems, but also supports multiple IPv6 address assignment scenarios. What's more, SDN-Ti does not require any modification on the end device, hence can be easily deployed. We implement SDN-Ti prototype and evaluate it in a real IPv6 testbed. Experiment results show that our solution only brings very little extra performance cost, and it shows considerable performance in terms of latency, CPU consumption and packet loss compared to the normal forwarding method. The results indicate that SDN-Ti is feasible to be deployed in practice with a large number of users.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122802398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}