{"title":"An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems","authors":"Navid Pourjafari, Jalil Seifali Harsini","doi":"10.1016/j.dcan.2024.02.002","DOIUrl":"10.1016/j.dcan.2024.02.002","url":null,"abstract":"<div><div>Training-based cellular communication systems use orthogonal pilot sequences to limit pilot contamination. However, the orthogonality constraint imposes a certain pilot length, and therefore, in communication systems with a large number of users, time-frequency resources are wasted significantly in the training phase. In cellular massive MIMO systems, the time-frequency resources can be used more efficiently by replacing the orthogonal pilots with shorter non-orthogonal pilot sequences in such a way that more space is available for the transmission of additional data symbols, and thus achieving higher data rates. Of course, the use of non-orthogonal pilots introduces additional pilot contamination, so the performance improvement could be achieved under certain system conditions, which are thoroughly investigated in this paper. We first provide a performance analysis framework for the uplink of cellular massive MIMO systems in which the effect of user pilot non-orthogonality has been analytically modelled. In this framework, we derive analytical expressions for the channel estimation, user Signal-to-Interference-plus-Noise-Ratio (SINR), and the average channel capacity per cell. We then use the proposed framework to evaluate the achievable spectral efficiency gain obtained by replacing orthogonal pilots with non-orthogonal counterparts. In particular, the existing trade-off between pilot lengths and the additional data symbols that can be transmitted by reducing the number of pilot symbols, is numerically quantified over a wide range of system parameters.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1267-1279"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140470000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaqi Wang , Ning Lu , Ziyang Gong , Wenbo Shi , Chang Choi
{"title":"A secure double spectrum auction scheme","authors":"Jiaqi Wang , Ning Lu , Ziyang Gong , Wenbo Shi , Chang Choi","doi":"10.1016/j.dcan.2022.12.007","DOIUrl":"10.1016/j.dcan.2022.12.007","url":null,"abstract":"<div><div>With the arrival of the 5G era, wireless communication technologies and services are rapidly exhausting the limited spectrum resources. Spectrum auctions came into being, which can effectively utilize spectrum resources. Because of the complexity of the electronic spectrum auction network environment, the security of spectrum auction can not be guaranteed. Most scholars focus on researching the security of the single-sided auctions, while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and buyers. Researchers begin to design the secure double spectrum auction mechanisms, in which two semi-honest agents are introduced to finish the spectrum auction rules. But these two agents may collude with each other or be bribed by buyers and sellers, which may create security risks, therefore, a secure double spectrum auction is proposed in this paper. Unlike traditional secure double spectrum auctions, the spectrum auction server with Software Guard Extensions (SGX) component is used in this paper, which is an Ethereum blockchain platform that performs spectrum auctions. A secure double spectrum protocol is also designed, using SGX technology and cryptographic tools such as Paillier cryptosystem, stealth address technology and one-time ring signatures to well protect the private information of spectrum auctions. In addition, the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification, and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum auctions. Finally, security analysis and performance evaluation of our protocol are discussed.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1415-1427"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42368023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array","authors":"Fatemeh Asghari Azhiri , Behzad Mozaffari Tazehkand , Reza Abdolee","doi":"10.1016/j.dcan.2023.02.010","DOIUrl":"10.1016/j.dcan.2023.02.010","url":null,"abstract":"<div><div>Millimeter-wave (mmWave) Non-Orthogonal Multiple Access (NOMA) with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile networks. In this paper, we introduce a cost-effective and energy-efficient mmWave-NOMA system that exploits sparse antenna arrays in the transmitter. Our analysis shows that utilizing low-weight and small-sized sparse antennas in the Base Station (BS) leads to better outage probability performance. We also introduce an optimum low complexity Equilibrium Optimization (EO)-based algorithm to further improve the outage probability. The simulation and analysis results show that the systems equipped with sparse antenna arrays making use of optimum beamforming vectors outperform the conventional systems with uniform linear arrays in terms of outage probability and sum rates.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1313-1321"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46246302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Errong Pei , Chenkai Ren , Wei Li , Qimei Chen , Bingguang Deng , Jiarui Song
{"title":"Performance analysis for MU-MIMO enabled LTE-U networks coexisting with D2D and WiFi network","authors":"Errong Pei , Chenkai Ren , Wei Li , Qimei Chen , Bingguang Deng , Jiarui Song","doi":"10.1016/j.dcan.2023.07.005","DOIUrl":"10.1016/j.dcan.2023.07.005","url":null,"abstract":"<div><div>LTE-Unlicensed (LTE-U) network is a type of cellular communication network operating the unlicensed spectrum. Offloading cellular traffic to WiFi or Device-to-Device (D2D) network can lead to interference among them. Applying Multiple-Input Multiple-Output (MIMO) technology in Cellular Base Station (CBS) and WiFi Access Point (WAP) can effectively reduce interference among D2D, WiFi and cellular networks. To our best knowledge, there is still no literature to explicitly study the characteristics of the traffic offloading in the Multiple-User MIMO (MU-MIMO) enabled network coexisting with D2D and WiFi networks. In this article, we thoroughly investigate the impact of D2D communication and MU-MIMO enabled WAP and CBS on the performance of the LTE-U network. More specifically, we derive the expressions of the downlink rates for cellular users, D2D users, and WiFi users with incomplete Channel State Information (CSI) feedback, and we validate our analysis through Monte-Carlo simulation. Numerous results illustrate the following conclusions. (i) Increasing the number of WiFi users, the length of CSI feedback, and the quantity of D2D pairs that reuse the channel with a single cellular user can increase the total throughput of the heterogeneous network. (ii) The total throughput decreases when more than two users are offloaded to D2D pairs, and increases as the number of offloaded users increases when less than six users are offloaded to WiFi network. (iii) Simultaneously offloading traffic to D2D pairs and WiFi network can obtain higher total throughput than offloading traffic to only one of them.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1289-1296"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49333152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junhui Zhao , Lihua Yang , Xiaoting Ma , Ziyang Zhang
{"title":"Analytical modeling of cache-enabled heterogeneous networks using Poisson cluster processes","authors":"Junhui Zhao , Lihua Yang , Xiaoting Ma , Ziyang Zhang","doi":"10.1016/j.dcan.2023.01.003","DOIUrl":"10.1016/j.dcan.2023.01.003","url":null,"abstract":"<div><div>The dual frequency Heterogeneous Network (HetNet), including sub-6 GHz networks together with Millimeter Wave (mmWave), achieves the high data rates of user in the networks with hotspots. The cache-enabled HetNets with hotspots are investigated using an analytical framework in which Macro Base Stations (MBSs) and hotspot centers are treated as two independent homogeneous Poisson Point Processes (PPPs), and locations of Small Base Stations (SBSs) and users are modeled as two Poisson Cluster Processes (PCPs). Under the PCP-based modeling method and the Most Popular Caching (MPC) scheme, we propose a cache-enabled association strategy for HetNets with limited storage capacity. The performance of association probability and coverage probability is explicitly derived, and Monte Carlo simulation is utilized to verify that the results are correct. The outcomes of the simulation present the influence of antenna configuration and cache capacities of MBSs and SBSs on network performance. Numerical optimization of the standard deviation ratio of SBSs and users of association probability is enabled by our analysis.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1439-1447"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46573455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiqin Wang , Hui Liu , Lixia Xiao , Liuke Li , Guochao Song , Tao Jiang
{"title":"Index modulation aided generalized space-time block coding: A unified MIMO framework","authors":"Zhiqin Wang , Hui Liu , Lixia Xiao , Liuke Li , Guochao Song , Tao Jiang","doi":"10.1016/j.dcan.2023.02.008","DOIUrl":"10.1016/j.dcan.2023.02.008","url":null,"abstract":"<div><div>In this paper, Index Modulation (IM) aided Generalized Space-Time Block Coding (GSTBC) is proposed, which intrinsically exploits the benefits of IM concept, diversity gain and spatial multiplexing gain. Specifically, the information bits are partitioned into <em>U</em> groups, with each being modulated by IM symbols (i.e. Spatial Modulation (SM), Quadrature SM (QSM),etc). Next, the structure of GSTBC is invoked for each <em>K</em> IM symbol, and a total of <em>μ</em> = <em>U</em>/<em>K</em> GSTBC codes are transmitted via <em>T</em> time slots. A Block Expectation Propagation (B-EP) detector is designed for the proposed IM-GSTBC structure. Moreover, the theoretical Average Bit Error Probability (ABEP) is derived for our IM-GSTBC system, which is confirmed by the simulation results and helpful for performance evaluation. Simulation results show that our proposed IM-GSTBC system is capable of striking an efficient trade-off between spatial multiplexing gain, spatial diversity gain as well as implementation cost imposed for both small-scale and large-scale MIMO antenna configurations.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1459-1470"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42649593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yizhou Xu , Haidong Xie , Nan Ji , Yuanqing Chen , Naijin Liu , Xueshuang Xiang
{"title":"Dynamic adversarial jamming-based reinforcement learning for designing constellations","authors":"Yizhou Xu , Haidong Xie , Nan Ji , Yuanqing Chen , Naijin Liu , Xueshuang Xiang","doi":"10.1016/j.dcan.2023.05.012","DOIUrl":"10.1016/j.dcan.2023.05.012","url":null,"abstract":"<div><div>To resist various types of jamming in wireless channels, appropriate constellation modulation is used in wireless communication to ensure a low bit error rate. Due to the complexity and variability of the channel environment, a simple preset constellation is difficult to adapt to all scenarios, so the online constellation optimization method based on Reinforcement Learning (RL) shows its potential. However, the existing RL technology is difficult to ensure the optimal convergence efficiency. Therefore, in this paper, Dynamic Adversarial Interference (DAJ) waveforms are introduced and the DAJ-RL method is proposed by referring to adversarial training in Deep Learning (DL). The algorithm can converge to the optimal state quickly by self-adaptive power and probability direction of dynamic strong adversary of DAJ. In this paper, a rigorous theoretical proof of the symbol error rate is given and it is shown that the method approaches the mathematical limit. Also, numerical and hardware experiments show that the constellations generated by DAJ-RL have the best error rate at all noise levels. In the end, the proposed DAJ-RL method effectively improves the RL-based anti-jamming modulation for cognitive electronic warfare.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1471-1479"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42125794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Changyin Dong , Yujia Chen , Hao Wang , Leizhen Wang , Ye Li , Daiheng Ni , De Zhao , Xuedong Hua
{"title":"Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles","authors":"Changyin Dong , Yujia Chen , Hao Wang , Leizhen Wang , Ye Li , Daiheng Ni , De Zhao , Xuedong Hua","doi":"10.1016/j.dcan.2023.06.004","DOIUrl":"10.1016/j.dcan.2023.06.004","url":null,"abstract":"<div><div>Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication, it can cause significant damage to CAVs or passengers. The primary objective of this study is to model cyber-attacked traffic flow and evaluate the impacts of cyber-attack on the traffic system filled with CAVs in a connected environment. Based on the analysis on environmental perception system and possible cyber-attacks on sensors, a novel lane-changing model for CAVs is proposed and multiple traffic scenarios for cyber-attacks are designed. The impact of the proportion of cyber-attacked vehicles and the severity of the cyber-attack on the lane-changing process is then quantitatively analyzed. The evaluation indexes include spatio-temporal evolution of average speed, spatial distribution of selected lane-changing gaps, lane-changing rate distribution, lane-changing preparation search time, efficiency and safety. Finally, the numerical simulation results show that the freeway traffic near an off-ramp is more sensitive to the proportion of cyber-attacked vehicles than to the severity of the cyber-attack. Also, when the traffic system is under cyber-attack, more unsafe back gaps are chosen for lane-changing, especially in the center lane. Therefore, more lane-changing maneuvers are concentrated on approaching the off-ramp, causing severe congestions and potential rear-end collisions. In addition, as the number of cyber-attacked vehicles and the severity of cyber-attacks increase, the road capacity and safety level will rapidly decrease. The results of this study can provide a theoretical basis for accident avoidance and efficiency improvement for the design of CAVs and management of automated highway systems.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1480-1492"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43962154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boran Yang , Dapeng Wu , Ruyan Wang , Zhigang Yang , Yu Yang
{"title":"A fine-grained intrusion protection system for inter-edge trust transfer","authors":"Boran Yang , Dapeng Wu , Ruyan Wang , Zhigang Yang , Yu Yang","doi":"10.1016/j.dcan.2022.11.007","DOIUrl":"10.1016/j.dcan.2022.11.007","url":null,"abstract":"<div><div>The phenomenal popularity of smart mobile computing hardware is enabling pervasive edge intelligence and ushering us into a digital twin era. However, the natural barrier between edge equipment owned by different interested parties poses unique challenges for cross-domain trust management. In addition, the openness of radio access and the accessibility of edge services render edge intelligence systems vulnerable and put sensitive user data in jeopardy. This paper presents an intrusion protection mechanism for edge trust transfer to address the inter-edge trust management issue and the conundrum of detecting indistinguishable malevolent nodes launching weak attacks. First, an inter-edge reputation transfer framework is established to leverage the trust quality of different edges to retain the accumulated trust histories of users when they roam in multi-edge environments structurally. Second, a fine-grained intrusion protection system is proposed to reduce the negative impact of attacks on user interactions and improve the overall trust quality and system security of edge intelligence services. The experimental results validate the effectiveness and superior performance of the proposed intrusion protection for edge trust transfer in securing, enhancing, and consolidating edge intelligence services.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1365-1374"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49126241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Generalized-Fisher composite fading model for the next generation of mobile communication systems","authors":"Fereshteh Salimian Rizi, Abolfazl Falahati","doi":"10.1016/j.dcan.2023.02.007","DOIUrl":"10.1016/j.dcan.2023.02.007","url":null,"abstract":"<div><div>The new generation of communication systems is moving towards using a millimeter-wave spectrum. Since the shadowing effects are undeniable in this type of propagation, the proposed Generalized Fisher (GF) distribution can be useful in modeling shadowed fading channels, considering the non-linearity and the multi-cluster nature of the diffusion medium. After introducing the model, its main statistics, including Probability Density Function (PDF), Cumulative Distribution Function (CDF), Moment Generating Function (MGF), and the distribution of the sum of an arbitrary number of independent and non-identically distributed (i.n.i.d.) random variables with GF distribution are calculated. Subsequently, some wireless communication application criteria such as ergodic and outage capacities, are computed. Finally, considering the classic Wyner's wiretap model and passive eavesdropping scenario, specific security criteria, such as the probability of non-zero secrecy capacity and secrecy outage probability, are also determined. These expressions are measured in terms of either univariate or multivariate Fox's <em>H</em>-function.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1322-1331"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45932955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}