Thilina N. Weerasinghe, Indika A. M. Balapuwaduge, F. Li, V. Giner
{"title":"MDP-based Resource Allocation for Uplink Grant-free Transmissions in 5G New Radio","authors":"Thilina N. Weerasinghe, Indika A. M. Balapuwaduge, F. Li, V. Giner","doi":"10.1109/WCNC45663.2020.9120656","DOIUrl":"https://doi.org/10.1109/WCNC45663.2020.9120656","url":null,"abstract":"The diversity of application scenarios in 5G mobile communication networks calls for innovative initial access schemes beyond traditional grant-based approaches. As a novel concept for facilitating small packet transmission and achieving ultra-low latency, grant-free communication is attracting lots of interests in the research community and standardization bodies. However, when a network consists of both grant based and grant-free based end devices, how to allocate slot resources properly between these two categories of devices remains as an unanswered question. In this paper, we propose a Markov decision process based scheme which dynamically allocates grant-free resources based on a specific reliability or priority requirement. The performance of the proposed scheme is evaluated via both analysis and simulations under various traffic arrival conditions.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132337673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hedi Bouattour, Y. B. Slimen, Marouane Mechteri, Hanane Biallach
{"title":"Root Cause Analysis of Noisy Neighbors in a Virtualized Infrastructure","authors":"Hedi Bouattour, Y. B. Slimen, Marouane Mechteri, Hanane Biallach","doi":"10.1109/WCNC45663.2020.9120635","DOIUrl":"https://doi.org/10.1109/WCNC45663.2020.9120635","url":null,"abstract":"This paper proposes a model to identify the noise source in a virtualized infrastructure. This phenomenon appears when network functions running under virtual machines that are deployed on the same physical server compete for physical resources. First, an anomaly detection model is proposed to identify the machines that are in an abnormal state in the infrastructure by performing an unsupervised learning. An investigation of the root cause is later achieved by searching how anomalies are propagated in the system. To do this, a supervised learning of the anomaly propagation paths is proposed. A propagation graph is automatically created with a score assigned to its components. With a testbed created using Openstack, an experimentation study with real data is held giving promising results.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Bluetooth Device to Device Connection Shift","authors":"Praneeth Juturu, Veerabhadrappa Chilakanti, Gowtham Anandha Babu","doi":"10.1109/WCNC45663.2020.9120548","DOIUrl":"https://doi.org/10.1109/WCNC45663.2020.9120548","url":null,"abstract":"Bluetooth Low Energy (BLE) is a wireless technology designed to provide reduced power consumption while maintaining similar communication range as compared to Classic Bluetooth [1]. Bluetooth (BT) and BLE are predominantly available in smartphones and are very useful for device-to-device communication. Most Bluetooth accessory (BTA) devices like BT headset, BT speaker and BT car-kit support only single connection. This behavior of BTA devices will hinder today’s expectation of seamless continuity across multiple devices. User will encounter a connection failure, when user tries to connect a Smartphone to BTA device, which is already connected to other device. However, the reported reason for connection failure is “connection failed to be established” and is different from the exact reason, which is, “remote device is already connected”. This is because BT device cannot differentiate between non-availability and the case where device is not responding. This will leave the user confused on which steps can ensure a successful connection. Device to device (D2D) communication can solve this connection issue and avoid confusion. To the best of our knowledge, this paper for the first time proposes a new concept that uses BLE’s advertisement and scanning features to solve this connection issue by providing a connection shift from an already connected device, to the device that is trying to connect with the same BTA device. We have developed a prototype of our concept to present the results of connection shift and to provide analysis on difference in the time taken for connection shift during multiple attempts.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130436944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Framework for Beam Feature-based Physical Layer Identification in 802.11 ad/ay Networks","authors":"Shreya Gupta, Zhi Sun, Pu Wang, Arupjyoti Bhuyan","doi":"10.1109/WCNC45663.2020.9120593","DOIUrl":"https://doi.org/10.1109/WCNC45663.2020.9120593","url":null,"abstract":"The millimeter wave (mmWave) technologies can significantly increase the throughput and user capacity in the future wireless networks. In term of device authentication, due to the usage of highly directional communication link, new physical layer identification (PLI) mechanism based on the spatial-temporal beam features becomes available. However, it is not known how to implement the new PLI mechanism using commodity devices in multiple client scenario in wireless networks. To this end, this paper presents a practical operational framework for the new beam feature-based PLI that is compatible with 802.11ad/ay standards. The low cost of these commodity devices leads to much wider beams, multiple main lobes, and high side lobes which in turn results in frequent sector level sweep (SLS) even for a minimal level of the transmitter-receiver misalignment. The high mobility sensitivity also triggers SLS. The key idea is to utilize the mobility of the mmWave device to collect enough measurements, the beam pattern feature values, from different observation angles where the beam features are extracted. This mobility effect takes advantage of the rich spatial-temporal information of the feature to prevent the system from spoofing. We also propose a novel feature database refinement algorithm to strengthen the database against false accept/reject rates and increase the identification accuracy. The algorithm filters the noisy data collected in the presence of multiple-clients. The proposed operational framework is implemented in commodity 802.11ad/ay devices. We show that the proposed scheme can reach near 100% accuracy even with a minimal feature vector database in real-time scenarios.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134233543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microscopic Traffic Monitoring and Data Collection Cloud Platform Based on Aerial Video","authors":"Guan-Wen Chen, Tzu-Chuan Yeh, Ching-Yu Liu, Tsì-Uí İk","doi":"10.1109/WCNC45663.2020.9120623","DOIUrl":"https://doi.org/10.1109/WCNC45663.2020.9120623","url":null,"abstract":"Real-time traffic video streaming, such as roadside surveillance and aerial video, has been widely used in traffic monitoring nowadays. However, most of the traditional traffic data collection methods lack mobility that can only collect macroscopic data. In this paper, an intelligent traffic monitoring system based on an open source cooperative platform called SAGE2 was developed. Based on the integrated big screen TV wall of SAGE2, a map-based aerial traffic video streaming management interface was designed. In the image pre-processing section, it provides functions such as lens distortion removal, top view projection transforms, and video stabilization; simulate video streaming to provide instant and long-term micro-flow data collection. Micro-traffic flow data provides high-resolution information both in time and space which can be used to analyze the driving behavior of individuals and the public. Combined with the lane level map, it can provide a variety of visual vehicle flow presentations, such as intersection traffic distribution that can also be used to develop an innovative application in the future.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132616485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks","authors":"A. Agarkar, M. Karyakarte, H. Agrawal","doi":"10.1109/WCNC45663.2020.9120843","DOIUrl":"https://doi.org/10.1109/WCNC45663.2020.9120843","url":null,"abstract":"Data aggregation has been one of the most widely researched topics for Wireless Sensor Network (WSN) as it helps in increasing the effective life time of the network and reduces the packet transmission overhead. Besides other challenges, security is one of the serious challenges during data aggregation. Numerous solutions on security for data aggregation for WSN are based on homomorphic encryption technique or Elliptic Curve Cryptography (ECC) based solutions and thus are vulnerable to attacks by quantum machines. This paper presents a post-quantum security solution using lattice cryptography. The proposed solution is applying Learning with Errors over Rings (R-LWE) for encryption of data in the data aggregation process at the gateway module of WSN. Security analysis shows that the proposed scheme provides confidentiality, integrity and authenticity during communication. Performance analysis shows that the proposed scheme is lightweight and shows better performance compared to Elliptic Curve Elgamal (ECEG) cryptography based scheme and symmetric homomorphic based scheme.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yijing Liu, G. Feng, Guanqun Zhao, Zhuo Chen, Shuang Qin
{"title":"Virtual Network Function Deployment Strategy in Clustered Multi-Mobile Edge Clouds","authors":"Yijing Liu, G. Feng, Guanqun Zhao, Zhuo Chen, Shuang Qin","doi":"10.1109/WCNC45663.2020.9120702","DOIUrl":"https://doi.org/10.1109/WCNC45663.2020.9120702","url":null,"abstract":"Software Defined Networking (SDN) and Network Function Virtualization (NFV) have been widely acknowledged as the fundamental architectural technologies for 5G and beyond networks by consolidating network functions into general-purpose hardware. Meanwhile, emerging Mobile Edge Computing (MEC) technology provides a promising solution to fulfill service requirements on high reliability and low latency, by extending cloud computing to the edge of networks. To provision a specific type of service, a virtualized network topology, such as Service Function Chain or Service Function Graph is constructed by logically connecting a set of virtual network functions (VNFs). In SDN/NFV-based mobile networks with the MEC cluster, it is imperative to develop an effective VNF deployment strategy to support various services with diverse Quality of Service requirements. In this paper, we propose a VNF deployment strategy for clustered MEC, including VNF placement and routing schemes, with the aim to minimize the average delay of service flows. We first formulate the problem as a two-dimensional knapsack problem, which is NP-Hard. To provide an efficient solution, we develop an improved genetic simulated annealing algorithm. Numerical results show that the proposed strategy can significantly reduce the end-to-end service delay in comparison with the state-of-the-art solutions.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NIHR: Name/ID Hybrid Routing in Information-centric VANET","authors":"Wenquan Xu, Xuefeng Ji, Chuwen Zhang, Bin Liu","doi":"10.1109/WCNC45663.2020.9120459","DOIUrl":"https://doi.org/10.1109/WCNC45663.2020.9120459","url":null,"abstract":"Vehicular Ad hoc network (VANET) has received great attention in recent research, but many challenges still lie in innovating efficient routing protocols to support the highly dynamic environment. Existing ID-based routing protocols cannot fundamentally tackle the dynamic topology problem in VANET. The recent emerging Information-Centric Networking (ICN) makes routing decisions based on data itself instead of a particular host, seeming to have the potential to handle the dynamic topology, but problems (e.g., severe flooding overhead) still remain. Therefore, inspired by the idea of ICN, we propose a name/ID hybrid routing (NIHR) protocol that combines the data-namebased routing and host-ID-based routing to address the above two issues simultaneously. In particular, we develop an announce strategy to improve the efficiency of the in-network cache, and we design a bloom filter based structure to achieve fast content lookup. Simulation results show NIHR's high performance in terms of Packet Delivery Ratio (PDR), Roundtrip time (RTT) and roundtrip hop count. Especially, to verify NIHR’s performance in real-world scenarios, we have implemented a vehicular real-time video conference system based on MK5 OBU [1] (On-Board Unit).","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130778219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overlay Coded Multicast for Edge Caching in 5G-Satellite Integrated Networks","authors":"Xinmu Wang, Hewu Li, Tianming Lan, Qian Wu","doi":"10.1109/WCNC45663.2020.9120827","DOIUrl":"https://doi.org/10.1109/WCNC45663.2020.9120827","url":null,"abstract":"Edge caching in 5G networks shortens latency and alleviates the backhaul. Bringing content from the core network to the caches is a critical issue. When the satellite is integrated with the terrestrial 5G system, an overlay can be formed for cost-efficient content delivery. Multicast delivery over satellite is a promising scheme due to the broadcast nature of the wireless medium and wide coverage. Requests for popular content at nearby times can be aggregated through a multicast stream for bandwidth efficiency. However, directly multicast to a large audience from the satellite suffers from the problems led by fading channels and the flat topologies. The overlay architecture provides new solutions to handle the drawbacks of satellite multicast, e.g., channel and reception diversity, the difficulty of loss recovery and feedback explosion. We explicitly introduce the overlay architecture based on the configuration of multiple multicast groups and the merging of base station clusters for each communication session. The operation of this overlay is further explained. Besides, we also apply network coding to the multicast and cache networks to improve data recovery and bandwidth efficiency. Both theoretical analysis and numerical experiments demonstrate the optimization of network performance.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130871318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mengyuan Li, Yu Han, Xiao Li, Chao-Kai Wen, Shi Jin
{"title":"Deep Learning Based Fast Downlink Channel Reconstruction For FDD Massive MIMO Systems","authors":"Mengyuan Li, Yu Han, Xiao Li, Chao-Kai Wen, Shi Jin","doi":"10.1109/WCNC45663.2020.9120709","DOIUrl":"https://doi.org/10.1109/WCNC45663.2020.9120709","url":null,"abstract":"The spatial reciprocity enables the downlink channel reconstruction in frequency division duplex (FDD) massive multi-input multi-output (MIMO) systems by obtaining the frequency-independent parameters in the uplink. However, the algorithms to estimate these parameters are typically complex and time-consuming. In this paper, we regard the channel as an image and utilize you only look once (YOLO), an advanced deep learning-based object detection network, to locate the bright spots in the channel image, then the frequency-independent parameters can be estimated rapidly. Superior to the traditional algorithm that iteratively extracts the paths, YOLO can detect all the path simultaneously. Experimental results show that YOLO can greatly deplete the running time to obtain the frequency-independent parameters and reconstruct the FDD massive MIMO downlink channel with satisfactory accuracy.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}