Inosha Sugathapala, S. Glisic, M. Juntti, Le-Nam Tran
{"title":"Joint optimization of power consumption and load balancing in wireless dynamic network architecture","authors":"Inosha Sugathapala, S. Glisic, M. Juntti, Le-Nam Tran","doi":"10.1109/ICCW.2017.7962644","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962644","url":null,"abstract":"The concept of the wireless dynamic network architecture (DNA) stands for a system design, which allows terminals to convert into temporary access points (APs) when necessary. In this paper, we propose a framework to solve the problem of load balancing in DNA. Particularly, the user association in DNAs is optimized to minimize the number of active APs and the network cost in terms of tradeoff between power and load, while ensuring users' quality of service (QoS). In general, such a problem is a non-convex mixed integer nonlinear program in the sense that its continuous relaxation is a non-convex problem. To solve this optimization, we use the standard continuous relaxation method and approximate the relaxed problem by a series of second order cone programs with the aid of successive convex approximation (SCA) framework. Numerical results show that the proposed algorithm converges within a few iterations and jointly minimizes the network cost and the number of APs in the network.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"30 1","pages":"121-125"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89634538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy harvesting in delay-aware cognitive shared access networks","authors":"Zheng Chen, N. Pappas, M. Kountouris","doi":"10.1109/ICCW.2017.7962652","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962652","url":null,"abstract":"In this work, we study the effect of energy harvesting in a cognitive shared access network with delay constraints on the primary user. We model the distribution of secondary nodes by a homogeneous Poisson point process (PPP), while the primary user is located at fixed location. The secondary users are assumed to have always packets to transmit whilst the primary transmitter has bursty traffic. We assume an energy harvesting zone around the primary transmitter and a guard zone around the primary receiver. The secondary users are transmitting in a random access manner, however, transmissions of secondary nodes are restricted by their battery status and location. Targeting at achieving the maximum secondary throughput under primary delay constraints, we analyze the impact of various parameters on the performance of the considered network. Our results provide insights into the optimization of access protocol parameters for the energy harvesting-based cognitive shared access network with delay constraints.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"50 1","pages":"168-173"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86624113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Polar modulation based reduction of communications energy consumption","authors":"E. McCune","doi":"10.1109/ICCW.2017.7962666","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962666","url":null,"abstract":"Power consumption of the communications infrastructure, particularly that which is LTE-based, is driven by the efficiency of the transmitter. Lower efficiency in the transmitter scales to needs for both larger power supplies and greater resources needed to remove the power dissipated by both the transmitter and its power supply. Improvement in transmitter efficiency therefore leverages, through these other functions, to provide a significant drop of input power draw while maintaining the same quality of service through the network. This corresponds worldwide to more than a million ton reduction of CO2 from electric generation per year at present levels of LTE network buildout.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"114 1","pages":"253-258"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88068118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. S. Bedi, Md. Waseem Ahmad, K. Rajawat, S. Anand
{"title":"Optimal utilization of storage systems under real-time pricing","authors":"A. S. Bedi, Md. Waseem Ahmad, K. Rajawat, S. Anand","doi":"10.1109/ICCW.2017.7962812","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962812","url":null,"abstract":"This paper considers the problem of optimal battery usage under real-time pricing scenarios. The problem is formulated as a finite-horizon optimization problem, and solved via an incremental algorithm that is provably optimal in the long run. The proposed approach gives rise to a class of algorithms that utilize the battery state-of-charge to make usage decisions in real-time. The proposed algorithm is simple to implement, easy to modify for a variety use cases, and outperform the state-of-the-art technique such as Markov Decision Process (MDP) based. The robustness and flexibility of the proposed algorithm is tested extensively via numerical studies.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"73 1","pages":"1141-1146"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86806163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uplink Adaptive Multimedia Delivery (UAMD) scheme for Video Sensor Network","authors":"B. Trinh, L. Murphy, Gabriel-Miro Muntean","doi":"10.1109/ICCW.2017.7962638","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962638","url":null,"abstract":"Lately Video Sensor Networks (VSN) are increasingly being used in the context of smart cities, smart homes, for environment monitoring, surveillance, etc. In such systems, due to limitations in the video sensor node resources, the most important factor is energy efficiency. Sensing, processing and transmitting are the main contributors to energy consumption in a video sensor node. Among these, wireless transmissions play a dominant role. An effective way for reducing energy consumption is to adjust the active time duration of node's radio transmission. However, this method has the main drawback that affects streaming quality in terms of throughput and delay. So, one of the big challenges when designing an energy-aware VSN is the trade-off between energy consumption and video streaming quality. This paper proposes an Uplink Adaptive Multimedia Delivery (UAMD) scheme that dynamically adjusts the wakeup/ sleep duration of video sensor nodes based on the node remaining battery levels and network traffic conditions. The UAMD algorithm employs a utility function in the decision on duty cycle adjustment process. Simulation results show how UAMD achieves good balance between energy consumption and throughput in comparison with other duty-cycle-based schemes.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"28 1","pages":"85-90"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83632313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal deployment for roadside wireless charger with bounded detouring cost","authors":"Xunpeng Rao, Panlong Yang, Yubo Yan, Gang Liu, Maotian Zhang, Wanru Xu","doi":"10.1109/ICCW.2017.7962706","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962706","url":null,"abstract":"Wireless energy transfer technologies have played an important role in the development of Internet of Things (IoTs). Most of previous studies focus on scheduling mobile chargers efficiently for rechargeable sensor nodes. In this paper, we consider optimizing the deployment for Wireless Charging Stations (WCSs) in urban area. We respect the users detouring cost, when they need move to the candidate WCSs. Given a number of WCSs and users trajectories, we aim at optimizing the WCSs deployment to maximize the number of users for recharging with guaranteed probability. We convert our deployment problem into the weighted maximum coverage problem, which has been proved to be NP-hard. We have also proved that our objective function is a maximum submodular set function. Then a simple but efficient greedy algorithm could be applied with guaranteed approximation ratio (1−1/e ). Finally, we evaluate the performance of our algorithm by comparing with two effective algorithms, and the impacts of different parameters on our algorithm. The evaluation results show that our algorithm improves the number of covered users with 30% comparing with two aforementioned algorithms.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"150 1","pages":"493-497"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72688301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability analysis of the random access channel of LTE with access class barring for smart grid monitoring traffic","authors":"Charalampos Kalalas, J. Alonso-Zarate","doi":"10.1109/ICCW.2017.7962744","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962744","url":null,"abstract":"The efficient and reliable handling of numerous communicating devices responsible for the monitoring and control of the distribution grid constitutes one of the key challenges for the realization of the smart grid. Cellular technology relying on LTE-based standards has been identified as a promising option to support advanced distribution-grid operations with stringent communication requirements. In this paper, a reliability analysis of wide-area monitoring systems in cellular-enabled distribution grids is presented. The LTE random access channel (RACH) procedure enhanced with an access class barring (ACB) scheme is modeled via a Markov chain taking into account a realistic model of the varying traffic behavior of monitoring devices. Based on the proposed analytical framework, we derive the reliability expression which depends on various RACH and ACB parameters and the monitoring traffic characteristics. With the aid of extensive simulations, we validate the accuracy of our analytical model. Finally, a performance evaluation in terms of reliability is carried out under different network and traffic configurations and several insights can be drawn for the reliable support of monitoring traffic.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"65 1","pages":"724-730"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76425266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint power and beam optimization in a multi-carrier MIMO wiretap channel with Full-Duplex jammer","authors":"Omid Taghizadeh, Tianyu Yang, R. Mathar","doi":"10.1109/ICCW.2017.7962841","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962841","url":null,"abstract":"In this paper we address a sum secrecy rate maximization problem for a multi-carrier and MIMO communication system. We consider the case that the receiver is capable of full-duplex (FD) operation and simultaneously sends jamming signal to a potential eavesdropper. In particular, we simultaneously take advantage of the spatial and frequency diversity in the system in order to obtain a higher level of security in the physical layer. Due to the non-convex nature of the resulting mathematical problem, we propose an iterative solution with a guaranteed convergence, based on block coordinate descent method, by re-structuring our problem as a separately convex program. Moreover, for the special case that the transmitter is equipped with a single antenna, an optimal transmit power allocation strategy is obtained analytically, assuming a known jamming strategy. The performance of the proposed design is then numerically evaluated compared to the other design strategies, and under different system assumptions.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"106 1","pages":"1316-1322"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81191134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synchronization of carrierless amplitude and phase modulation in visible light communication","authors":"Kabiru O. Akande, W. Popoola","doi":"10.1109/ICCW.2017.7962650","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962650","url":null,"abstract":"Carrierless amplitude and phase modulation (CAP) has been widely employed in visible light communication (VLC) as a result of its implementation simplicity. While the simplicity of CAP receiver results in the elimination of carrier recovery, it also leads to significant increase in CAP sensitivity to timing jitter. In this paper, a novel correlation-based synchronization algorithm whose synchronization sequence is obtained from the CAP pulse shaping filter has been proposed for a joint bit and frame synchronization at the CAP receiver. The proposed ‘CAP-filter’ synchronization sequence is particularly suitable for optical wireless communication. The performance of the ‘CAP-filter’ synchronization technique is evaluated with both theoretical and simulation analysis. It is shown that while a timing jitter of 0.15T results in failure of communication for unsynchronized CAP at a BER of 0.5, the proposed ‘CAP-filter’ algorithm achieved perfect synchronization with a BER performance matching that of CAP with no jitter. This performance is reported for both low and high constellation order and in all the SNR regimes considered. Finally, the viability of the ‘CAP-filter’ synchronization algorithm in VLC systems is demonstrated through laboratory experiment.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"31 1","pages":"156-161"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81246613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sicari, A. Rizzardi, L. Grieco, A. Coen-Porisini
{"title":"A secure ICN-IoT architecture","authors":"S. Sicari, A. Rizzardi, L. Grieco, A. Coen-Porisini","doi":"10.1109/ICCW.2017.7962667","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962667","url":null,"abstract":"Security, interoperability, scalability, and mobility support are key challenges for the Internet of Things (IoT). Information Centric Networking (ICN) is an emerging paradigm for the Future Internet design that brings all the potential to face these challenges thanks to name-driven networking primitives. As a matter of fact, ICN natively supports multicast, mobility, content oriented security, and can be effectively used to design de-verticalizing middlewares for the IoT. In this context, the so called ICN-IoT middleware has been proposed within an initiative of the ICNRG (Information Centric Networking Research Group) of the Internet Research Task Force (IRTF) to encompass the key requirements of IoT systems. An important issue to be addressed is how to guarantee the security and the privacy of the information transmitted over the network, which may include sensitive data. Herein, the current security functionalities of ICN-IoT are analyzed and enriched in order to strengthen its resilience to violation attempts. The proposed approach is validated, at a design level, by means of a running example.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"10 1","pages":"259-264"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89334949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}