Ziheng Zhang, Yuchen Zhang, Sa Xiao, Jianquan Wang, Wanbin Tang
{"title":"Joint Deployment Design and Power Control for UAV-enabled Covert Communications","authors":"Ziheng Zhang, Yuchen Zhang, Sa Xiao, Jianquan Wang, Wanbin Tang","doi":"10.1109/GCWkshps52748.2021.9682010","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682010","url":null,"abstract":"Unmanned aerial vehicle (UAV) communications have become a promising technique to provide flexible and cost-effective connective service. However, due to its high chance of line-of-sight (LOS) links, UAV communications tend to be detected by the illegal adversaries, which degrades its safety level especially in military scenarios. In this paper, we investigate covert data transmission for UAV communications under the air-to-ground channel model with both LOS and non-line-of-sight components. We aim to maximize the transmit rate of UAV communications while prevent the existence of the transmission from being discovered by the adversary via joint the UAV deployment and transmit power control. We prove the transmit power control and the UAV deployment in the original optimization problem can be decoupled, and derive the closed-form optimal solutions to each sub-problem. Numerical results verify the effectiveness of the proposed algorithm.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"38 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72814901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Militano, Anastasios Zafeiropoulos, Eleni Fotopoulou, R. Bruschi, C. Lombardo, Andy Edmonds, S. Papavassiliou
{"title":"AI-powered Infrastructures for Intelligence and Automation in Beyond-5G Systems","authors":"L. Militano, Anastasios Zafeiropoulos, Eleni Fotopoulou, R. Bruschi, C. Lombardo, Andy Edmonds, S. Papavassiliou","doi":"10.1109/GCWkshps52748.2021.9682117","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682117","url":null,"abstract":"In this paper, a vision for beyond-5G systems is proposed where automation and intelligence in cloud-native infrastructures are in focus. Exploiting the convergence of cloud technologies at the edge and mobile communication networks, a set of technological solutions is discussed that will play a fundamental role on the path from 5G towards future 6G systems. Currently, a strong need is felt in the telecommunication world for greater automation to meet the extreme requirements expected for 6G applications. Artificial Intelligence (AI) is gaining momentum as one of the main enabling technologies for beyond-5G networks. Reinforcement Learning (RL) and Federated Learning (FL) are here proposed as technologies to enhance automation and improve the intelligence of orchestration mechanisms of both network services and applications. These technologies are brought together in a comprehensive cloud-native architectural vision to fill the gap between current 5G systems and AI-powered systems of the future.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"79 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83767096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"O-RAN AI/ML Workflow Implementation of Personalized Network Optimization via Reinforcement Learning","authors":"Hoejoo Lee, Youngcheol Jang, Juhwan Song, Hunje Yeon","doi":"10.1109/GCWkshps52748.2021.9681936","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681936","url":null,"abstract":"In this paper, we study AI-based RAN technology for 5G and 6G networks that are more complex and difficult to analyze than previous generations to make the network more intelligent. We implement a reference AI/ML workflow using RAN Intelligent Controller (RIC) by referring to the AI/ML workflow architecture of O-RAN. We focus on the establishment of an online training environment based on the RIC platform. We use various open-source platforms to serve the ML model as an inference service and to build a Machine Learning (ML) training pipeline for online training. We train our own Reinforcement Learning (RL) model which controls function parameters in Distributed Unit (DU) to maximize total cell throughput. After training the model with data from a specific cell, it is deployed in a different environment. We demonstrate the effectiveness of our proposal by optimizing the model performance and executing the training pipeline for retraining the model using online workflow. As compared to the model before retraining, the total cell throughput has increased by 19.4% when controlled using the retrained model.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"11 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87524124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Geometry of Elliptical Target Localization","authors":"Na Zhao, Yunlong Wang, Rico Mendrzik, Yuanpeng Liu, Qing Chang, Yuan Shen","doi":"10.1109/GCWkshps52748.2021.9682134","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682134","url":null,"abstract":"This letter unifies the optimal geometry analysis for elliptical target localization by a new notion called virtual agents (VAs), which allows the conversion of a bi-static time-of-arrival (TOA) measurement to a direct TOA measurement with equivalent Fisher information. Using the notion of VAs, we determine the optimal geometries with different types of measurements based on D-optimality. In particular, the optimal geometry is attained when the angles between transmitter-to-target and target-to-agent directions are ±π/3 for the TOA case, or the agents have an equal angular spacing around the target with equal ranging information intensity (RII) for the angle-of-arrival (AOA) case. Moreover, we also show that for the TOA/AOA fusion case, the optimal geometry occurs if the transmitter, agents, and target are collinear under both single-agent with arbitrary RII and multi-agent with identical RII between two measurements conditions. Finally, numerical results are given to validate our theoretical analysis.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"60 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87527930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI Based Algorithm-Hardware Separation for IoV Security","authors":"M. Aman, B. Sikdar","doi":"10.1109/GCWkshps52748.2021.9681992","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681992","url":null,"abstract":"The Internet of vehicles is emerging as an exciting application to improve safety and providing better services in the form of active road signs, pay-as-you-go insurance, electronic toll, and fleet management. Internet connected vehicles are exposed to new attack vectors in the form of cyber threats and with the increasing trend of cyber attacks, the success of autonomous vehicles depends on their security. Existing techniques for IoV security are based on the un-realistic assumption that all the vehicles are equipped with the same hardware (at least in terms of computational capabilities). However, the hardware platforms used by various vehicle manufacturers are highly heterogeneous. Therefore, a security protocol designed for IoVs should be able to detect the computational capabilities of the underlying platform and adjust the security primitives accordingly. To solve this issue, this paper presents a technique for algorithm-hardware separation for IoV security. The proposed technique uses an iterative routine and the corresponding execution time to detect the computational capabilities of a hardware platform using an artificial intelligence based inference engine. The results on three different commonly used micro-controllers show that the proposed technique can effectively detect the type of hardware platform with up to 100% accuracy.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"100 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85846087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Resource Allocation in NOMA-assisted D2D Communication with Imperfect Channel State","authors":"Rajesh Gupta, S. Tanwar","doi":"10.1109/GCWkshps52748.2021.9681954","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681954","url":null,"abstract":"Device-to-device communication (D2D) is a promising technology of fifth-generation (5G) networks to maximize spectral efficiency. It permits direct communication between the mobile devices if they are in proximity by ignoring the base station. Despite improving spectral efficiency, it also improves the system data rate, minimizes the communication latency, and reduces the burden on the base station (for data uplink and downlink). The existing communication majorly focused on orthogonal multiple access (OMA), which serves one user at a time for spectrum sharing. To improve the spectral efficiency, non-orthogonal multiple access (NOMA) schemes can be employed that serve multiple users for spectrum sharing. NOMA drastically improves the spectrum sharing, but the devices can cause more interference that degrades overall the network performance. But, successive interference cancellation (SIC) of NOMA mitigates the interference issues and improves the system’s signal to interference noise ratio (SINR). Further, the system’s sum rate and secrecy capacity can be improved with a matching-based algorithm for optimal power allocation. This improves the overall sum rate, which further improves the system’s secrecy capacity against the number of eavesdroppers. Finally, the performance, i.e., overall sum rate and average secrecy capacity of the proposed system is evaluated by considering varying numbers of cellular users, D2D groups, and eavesdroppers.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86993117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Minsuk Choi, Kyungrae Kim, Hongjun Jang, Hyokyung Woo, Joan S. Pujol Roig, Yue Wang, Hunje Yeon, Sunghyun Choi, Seowoo Jang
{"title":"Cell On/Off Parameter Optimization for Saving Energy via Reinforcement Learning","authors":"Minsuk Choi, Kyungrae Kim, Hongjun Jang, Hyokyung Woo, Joan S. Pujol Roig, Yue Wang, Hunje Yeon, Sunghyun Choi, Seowoo Jang","doi":"10.1109/GCWkshps52748.2021.9682160","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682160","url":null,"abstract":"Energy cost accounts for a large portion of expenses when operating a cellular mobile network, and it is expected to increase further to support advanced communication features and more base stations as the network evolves. In this work, we address energy saving by turning off cells while minimizing the impact on the performance of the network. However, the challenge here is to optimally and safely manage a cell on/off operation depending on the states of and demands to the networks as they may vary in a wide range in general. In order to be adaptive to the circumstances that a base station is posed and to requirements from its service provider, reinforcement learning-based approaches are used in this work to train personalized or customized neural policies, which operate the cell on/off algorithm. It is shown with a replicative simulator, which has the capability to reproduce the states and behaviors of real RANs (Radio Access Network) using the real data extracted from them, that our approach achieves maximum gain in energy saving while satisfying given constraints on the performance. Also, we propose a couple of operational modes to balance between the performance of energy saving and the cost for running the solution. Through training and evaluation on simple yet demonstrative scenarios, we demonstrate that our approach provides customized solutions and propose various operational options that a service provider can choose from.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"86 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84038340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuran Li, Hongning Dai, Jie Tian, Dehuan Wan, Dengwang Li
{"title":"Coverage Analysis of Blockchain-enabled Wireless IoMT Networks","authors":"Xuran Li, Hongning Dai, Jie Tian, Dehuan Wan, Dengwang Li","doi":"10.1109/GCWkshps52748.2021.9682144","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682144","url":null,"abstract":"The blockchain-enabled wireless Internet of medical things (IoMT) system has recently drawn extensive attention due to the provision of highly-secured healthcare services. However, multiple simultaneous transmissions in blockchain-enabled IoMT (BC-IoMT) networks can cause interference, consequently degrading the overall performance of the system. It is necessary to investigate the performance of BC-IoMT networks. In this paper, we propose a novel analytical framework for wireless BCIoMT networks with consideration of both the spatial model on geographical random distribution of IoMT users and the temporal model on stochastic nature of data block transmission. With this framework, we derive a closed-form expression of the coverage probability in the wireless BC-IoMT network. Our extensive simulation results verify the accuracy of our theoretical analysis. From the analytical framework, we find that the path loss effect, the number of interfering medical sensor devices, and the threshold of successful transmission have a significant impact on the coverage performance of wireless BC-IoMT networks.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"13 4 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91000497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Twin-empowered Network Slicing in B5G Networks: Experience-driven approach","authors":"F. Naeem, Georges Kaddoum, M. Tariq","doi":"10.1109/GCWkshps52748.2021.9682073","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682073","url":null,"abstract":"Network slicing is considered a promising networking pillar of efficient resource management in beyond 5G (B5G) networks. However, the dynamic and complex characteristics of future networks pose challenges in designing novel resource allocation techniques due to the stringent quality of service (QoS) requirements and virtualized network infrastructures. To solve this issue, we propose a digital twin (DT)-enabled deep distributional Q-network (DDQN) framework that constructs a digital mirror of the physical slicing-enabled network to simulate its complex environment and predict the dynamic characteristics of the network. The DT of network slicing is expressed as a graph, and a graph neural network (GNN) is developed to learn the complicated relationships of the network slice. The graph-based network states are forwarded to the DDQN agent to learn the optimal network slicing policy. Through simulations, it is demonstrated that the proposed technique can satisfy the stringent QoS requirements and achieve near-optimal performance in a dynamic B5G network.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"27 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81445613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Helin Yang, Kwok-Yan Lam, Jiangtian Nie, Jun Zhao, S. Garg, Liang Xiao, Zehui Xiong, M. Guizani
{"title":"3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks","authors":"Helin Yang, Kwok-Yan Lam, Jiangtian Nie, Jun Zhao, S. Garg, Liang Xiao, Zehui Xiong, M. Guizani","doi":"10.1109/GCWkshps52748.2021.9681960","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681960","url":null,"abstract":"Three-dimensional (3D) beamforming is a potential technique to enhance communication security of new generation networks such as 5G and beyond. However, it is difficult to achieve optimal beamforming due to the challenges of nonconvex optimization problem and imperfect channel state information (CSI). To tackle this problem, this paper proposes a novel deep learning-based 3D beamforming scheme, where a deep neural network (DNN) is trained to optimize the beamforming design for wireless signals in order to guard against eavesdropper under the imperfect CSI. With our approach, the system is capable of training the DNN model offline, and the trained model can then be adopted to instantaneously select the 3D secure beamforming matrix for achieving the maximum secrecy rate of the system, which is measured by the signal received by eavesdroppers outside the path of the beam. Simulation results demonstrate that the proposed solution outperforms the classical deep learning algorithm and 2D beamforming solution in terms of the secrecy rate and robust performance.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"80 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80026300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}