{"title":"Improving Uplink Transmissions for URLLC Communication in 5G NR","authors":"Sujeet Kumar, Veerendra Kumar Gautam, Sangeeta Sharma, Mukesh Giluka","doi":"10.1109/COMSNETS59351.2024.10426891","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10426891","url":null,"abstract":"In the dynamic landscape of today's swiftly evolving industries, there exists a growing demand for cost-effective and time-efficient methodologies spanning diverse domains. This need is particularly pronounced when addressing the challenges of achieving low latency and ultra-reliable communication within the digital realm. The advancement of 5G and beyond networks is geared towards fulfilling these requirements. In the context of uplink transmissions, the implementation of dynamic scheduling introduces latency due to the associated signaling overhead between User Equipment (UE) and the Base Station (gNB). To counteract this challenge, 5G introduces the concept of Configured Grant (CG) for uplink transmissions. This entails pre-allocating radio resources to UEs, thereby obviating the necessity for resource requests for each individual transmission. However, the effective realization of CG hinges on the use of efficient scheduling algorithms. In this paper, we propose novel CG scheduling algorithms, namely Sorted-OFDMA and Best-MatchOFDMA, designed to enhance scheduling efficiency. Furthermore, we delve into an exploration of the impact that numerology and bandwidth exert on resource block allocation. This study also involves a comparative analysis of the performance exhibited by various scheduling algorithms.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"311 6","pages":"1160-1163"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepika Aggarwal, Sruthi Chennuri, Rajesh K. Krishnan, Dilip Singh
{"title":"Free Space Quantum Key Distribution using the Differential Phase Shift Protocol in Urban Daylight","authors":"Deepika Aggarwal, Sruthi Chennuri, Rajesh K. Krishnan, Dilip Singh","doi":"10.1109/COMSNETS59351.2024.10427062","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10427062","url":null,"abstract":"Quantum key distribution exploits the principles of quantum mechanics to create and distribute cryptographic keys. The quantum communication channel can be either fiber-based or free space-based. Fiber-based quantum key distribution has evolved from lab demonstrations to commercially available systems, but its infrastructure dependency and limitations on achievable distance, due to optical fiber loss, do not allow for the realization of a global-scale quantum communication network. Free space quantum key distribution addresses this problem with features such as low loss, high data rates, and ease of deployment. This paper presents an experimental demonstration of free space quantum key distribution using the differential phase shift protocol in an urban location during daylight hours. We established a secure link, achieving a key rate of 10 kbps.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"1 1","pages":"979-984"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Madhurima Ganguly, Suraj Kumar Mahato, A. Sau, Abhijan Bhattacharyya
{"title":"Sensing Best-Connected Future Path for Mobile Telerobot: A Radio-Source Location Agnostic Approach","authors":"Madhurima Ganguly, Suraj Kumar Mahato, A. Sau, Abhijan Bhattacharyya","doi":"10.1109/COMSNETS59351.2024.10426841","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10426841","url":null,"abstract":"Maintaining good last-mile connectivity across the trajectory of a mobile telerobot is critical for ensuring quality of service for multimedia, as well as kinematic commands and sensory feedbacks exchanged between the robot and the remote operator. Hence, the remote operator needs to know the possible radio coverage quality in different future directions. Existing systems claim to achieve this by trying to predict the channel model. The proposed methods require rigorous learning phases and either require prior knowledge of the radio-source location or need to start from the vicinity of the radio-source or need additional sensors in the environment for localization. Given the time-varying nature of the radio-environment and the typical set up in an enterprise, the existing solutions are practically infeasible for live deployment. We propose an in-situ radio-sensing based practically deployable solution with zero-knowledge prediction of the radio-source location and unsupervised prediction of the future connectivity across the periphery of the field of view which does not require any training phase. Deviating from the conventional channel modelling approach, we introduce a novel concept of ‘virtual source’ based prediction error minimization. It is deployed on Double robot in a typical enterprise. The efficacy is proven through objective measures on available data sets and on real enterprise floor and, also, through subjective measures in a typical operational scenario.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"192 1-2","pages":"524-532"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yekaterina Podiatchev, Ariel Orda, Ori Rottenstreich
{"title":"Survivable Payment Channel Networks","authors":"Yekaterina Podiatchev, Ariel Orda, Ori Rottenstreich","doi":"10.1109/COMSNETS59351.2024.10426906","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10426906","url":null,"abstract":"Payment channel networks (PCNs) are a leading method to scale the transaction throughput in cryptocurrencies. Two participants can use a bidirectional payment channel for making multiple mutual payments without committing them to the blockchain. Opening a payment channel is a slow operation that involves an on-chain transaction locking a certain amount of funds. These aspects limit the number of channels that can be opened or maintained. Users may route payments through a multi-hop path and thus avoid opening and maintaining a channel for each new destination. Unlike regular networks, in PCNs capacity depends on the usage patterns and, moreover, channels may become unidirectional. Since payments often fail due to channel depletion, a protection scheme to overcome failures is of interest. We define the stopping time of a payment channel as the time at which the channel becomes depleted. We analyze the mean stopping time of a channel as well as that of a network with a set of channels. We then propose a scheme for optimizing the capacity distribution among the channels in order to increase the minimal stopping time in the network. We conduct experiments and demonstrate the accuracy of our model and the efficiency of the proposed optimization scheme.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"62 3","pages":"479-487"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Supply Chain Management in Indian Agriculture Using SSI and Blockchain Leveraged by Digital Wallet","authors":"Ushasri Peddibhotla, Sobin Choodan Chandran, Prabhat Kumar, Randhir Kumar","doi":"10.1109/COMSNETS59351.2024.10427356","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10427356","url":null,"abstract":"The proliferation of agricultural supply chain encompasses participants such as farmers, intermediate silos, transformation plants, and clients. Managing this agro-supply chain involves various functions related to the flow of both materials and information. Before entering the market, crop protection products and inputs undergo rigorous testing and regulatory scrutiny. Despite these measures, counterfeit products reach end-users due to insufficient transparency and the sharing of outdated information among stakeholders. To address this issue, the paper suggests a three-tiered integrated solution: the Product layer, Blockchain layer, and SSI layer. This strategy involves attaching Near-Field Communication (NFC) tags to the packages at the product layer, with the blockchain monitoring each step of the supply chain. The NFC tags can be read to verify the authenticity and other details of the product. Certifications for products, inputs, and the identities of dealers and consumers are stored as self-sovereign IDs in digital wallets. The authenticity details of producers undergo auditing by the certification authority, which is then transferred to the verification authority. The Verifier confirms these details and generates a verifiable presentation received by the consumer, enabling them to make informed purchases. This approach eliminates product tampering and the involvement of unverified producers and dealers in the supply chain. The comprehensive explanation and investigation of proposed framework state adequate guidelines to make counterfeit resistance agricultural supply chain system.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"303 4","pages":"427-429"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Sampling Methodology Based Cost Effective Active Learning for Tabular Data","authors":"Sharath M. Shankaranarayana, Anubhab Samal, Chikka Veera Raghavendra, Vijay Sankar, Arindam Dey, Sangam Kumar Singh","doi":"10.1109/COMSNETS59351.2024.10427050","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10427050","url":null,"abstract":"Active learning (AL) is an attractive paradigm of machine learning that could be very useful in real-world machine learning for domains with high labelling costs. The main objective of AL is to efficiently acquire data for annotation from a typically large pool of unlabeled data, thereby reducing human experts' labelling effort. This helps them focus on the most informative data points that would improve machine learning model performance for the task at hand. Thus, given an unlabeled dataset and a fixed labelling budget, AL aims to select a subset of examples to be labelled such that they can result in improved model performance. The central component in an active learning workflow is the sampling process in which the most valuable samples to be labelled are identified. The most common type of sampling strategy employed is uncertainty sampling. In this sampling, each AL training iteration takes those points that the model is most uncertain about. Another important sampling strategy is diversity sampling. This sampling strategy selects a collection of samples that can well represent the entire data distribution. In this paper, we propose a hybrid sampling based active learning for the classification tasks employing tabular data, wherein we jointly sample uncertain as well as diverse points at every AL iteration. This hybrid sampling is achieved by jointly training a classification model along with an outlier detection model. In addition, we propose an improved cost-effective active learning (CEAL) method in which we automatically select high confidence data points and assign pseudo-labels based on not only the model's confidence but also the outlier detection module.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"40 1","pages":"147-152"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Twin Field QKD with 3-Pulse Differential Phase Encoding","authors":"Nilesh Sharma, Valliamai Ramanathan, Prabha Mandayam, Anil Prabhakar","doi":"10.1109/COMSNETS59351.2024.10427314","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10427314","url":null,"abstract":"Twin field quantum key distribution (TF-QKD) has attracted the attention of the research community thanks to its higher secure key rate which scales as square root of the channel transmittance. The twin field secure key rate thus crosses the repeaterless secure key rate distance bound, showing that the protocol can cater to large channel lengths. Here, we present a twin-field-like QKD protocol based on single photon interference of differential phase shift (DPS) encoded states and prove the security of the scheme. Our protocol builds upon an existing measurement device independent (MDI) QKD system that has a DPS encoding and modifies the sifting step to one based on single photon interference. We demonstrate security of our DPS-twin-field (DPS-TF) protocol against collective attacks and quantify the secure key rate. We find that with the current state-of-the-art technology, both TF-QKD and MDI-QKD protocols with the DPS encoding work almost identically in terms of the channel length, although the achievable secure key rate of the DPS-TF QKD is higher compared to MDI-QKD.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"33 1","pages":"1052-1057"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vincent Mageshkumar, Amit Baxi, Venkat Natarajan, Girish S. Murthy
{"title":"Adaptive Energy Optimization for Edge-Enabled Autonomous Mobile Robots","authors":"Vincent Mageshkumar, Amit Baxi, Venkat Natarajan, Girish S. Murthy","doi":"10.1109/COMSNETS59351.2024.10427411","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10427411","url":null,"abstract":"In this work, we propose an advanced energy consumption model for an Autonomous Mobile Robots and validate the model on a real-world robot testbed. We show how our model can enable intelligent offloading of computationally heavy functions from the robot to an Edge server, over a wireless network, to minimize robot's energy consumption and maximize operating time on battery. Furthermore, we also present practical scenarios to show how our energy model can enable real-time adaptation of the Edge robotics system to constraints such as compute availability on the Edge server, available wireless network bandwidth, robot-specific camera frame rate requirements, robot navigation speeds and thereby improve robot energy efficiency. We show the benefits of our approach by offloading computationally heavy SLAM function from robot to the Edge server in simulation and through experiments on a real-world hardware testbed.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"351 6","pages":"117-122"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A System Dynamics Model for Forecasting the Digital Mobility Platform Businesses Growth","authors":"C. R. Munigety","doi":"10.1109/COMSNETS59351.2024.10427256","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10427256","url":null,"abstract":"In this era of digitalization, mobility platforms that are of digital nature have taken the center stage in the marketplace. However, the inherently complex nature of these platforms poses many challenges in understanding their business dynamics. This paper presents a systems dynamics model which is capable of capturing the cross-side network effects that are at play on any digital platform and thereby predicting their market growth. As a real-world case study, the proposed model has been applied to Facebook, which is a well-known digital platform. The results show that the proposed model can be used to study and predict the dynamics of any digital platform, in general.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"16 1","pages":"195-197"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140533003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Allocation in Reconfigurable Intelligent Surfaces with Imperfect Phase Compensation","authors":"Swaraj Srivastava, Yoghitha Ramamoorthi, Abhinav Kumar, T. Murakami, Tomoki Ogawa, Yasushi Takatori","doi":"10.1109/COMSNETS59351.2024.10427188","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10427188","url":null,"abstract":"Reconfigurable Intelligent Surfaces (RISs) are acknowledged as key technologies for the upcoming sixth generation (6G) of mobile communication networks. The performance of the RIS systems heavily relies on the accuracy of phase compensation, which is often imperfect in practical scenarios. In this poster, we analyze the performance of RIS systems by allocating the fraction of total elements within the RIS used for a particular user, taking into account this imperfect phase compensation (IPC). We then derive a lower bound on the element allocation factor required for a user to achieve higher data rates when compared to benchmark scenario (without RIS). Additionally, we establish an upper bound on the IPC to assess in advance whether this system can provide higher spectral efficiency in comparison to the benchmark system. Furthermore, we demonstrate a trade-off between the IPC and the fraction of elements of RIS utilized by a user to obtain a specific data rate.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"174 1","pages":"594-597"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140533011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}