-
5G enabled Mobile Edge Computing security for Autonomous Vehicles
Authors:
Daryll Ralph D'Costa,
Dr. Robert Abbas
Abstract:
The world is moving into a new era with the deployment of 5G communication infrastructure. Many new developments are deployed centred around this technology. One such advancement is 5G Vehicle to Everything communication. This technology can be used for applications such as driverless delivery of goods, immediate response to emergencies and improving traffic efficiency. The concept of Intelligent…
▽ More
The world is moving into a new era with the deployment of 5G communication infrastructure. Many new developments are deployed centred around this technology. One such advancement is 5G Vehicle to Everything communication. This technology can be used for applications such as driverless delivery of goods, immediate response to emergencies and improving traffic efficiency. The concept of Intelligent Transport Systems (ITS) is built around this system which is completely autonomous. This paper studies the Distributed Denial of Service (DDoS) attack carried out over a 5G network and analyses security attacks, particularly the DDoS attack. The aim is to implement a machine learning model capable of classifying different types of DDoS attacks and predicting the quality of 5G latency. The initial steps of implementation involved the synthetic addition of 5G parameters into the dataset. Subsequently, the data was label encoded, and minority classes were oversampled to match the other classes. Finally, the data was split as training and testing, and machine learning models were applied. Although the paper resulted in a model that predicted DDoS attacks, the dataset acquired significantly lacked 5G related information. Furthermore, the 5G classification model needed more modification. The research was based on largely quantitative research methods in a simulated environment. Hence, the biggest limitation of this research has been the lack of resources for data collection and sole reliance on online data sets. Ideally, a Vehicle to Everything (V2X) project would greatly benefit from an autonomous 5G enabled vehicle connected to a mobile edge cloud. However, this project was conducted solely online on a single PC which further limits the outcomes. Although the model underperformed, this paper can be used as a framework for future research in Intelligent Transport System development.
△ Less
Submitted 30 January, 2022;
originally announced February 2022.
-
ARC: A Vision-based Automatic Retail Checkout System
Authors:
Syed Talha Bukhari,
Abdul Wahab Amin,
Muhammad Abdullah Naveed,
Muhammad Rzi Abbas
Abstract:
Retail checkout systems employed at supermarkets primarily rely on barcode scanners, with some utilizing QR codes, to identify the items being purchased. These methods are time-consuming in practice, require a certain level of human supervision, and involve waiting in long queues. In this regard, we propose a system, that we call ARC, which aims at making the process of check-out at retail store c…
▽ More
Retail checkout systems employed at supermarkets primarily rely on barcode scanners, with some utilizing QR codes, to identify the items being purchased. These methods are time-consuming in practice, require a certain level of human supervision, and involve waiting in long queues. In this regard, we propose a system, that we call ARC, which aims at making the process of check-out at retail store counters faster, autonomous, and more convenient, while reducing dependency on a human operator. The approach makes use of a computer vision-based system, with a Convolutional Neural Network at its core, which scans objects placed beneath a webcam for identification. To evaluate the proposed system, we curated an image dataset of one-hundred local retail items of various categories. Within the given assumptions and considerations, the system achieves a reasonable test-time accuracy, pointing towards an ambitious future for the proposed setup. The project code and the dataset are made publicly available.
△ Less
Submitted 17 May, 2021; v1 submitted 6 April, 2021;
originally announced April 2021.
-
IoT Security: Botnet detection in IoT using Machine learning
Authors:
Satish Pokhrel,
Robert Abbas,
Bhulok Aryal
Abstract:
The acceptance of Internet of Things (IoT) applications and services has seen an enormous rise of interest in IoT. Organizations have begun to create various IoT based gadgets ranging from small personal devices such as a smart watch to a whole network of smart grid, smart mining, smart manufacturing, and autonomous driver-less vehicles. The overwhelming amount and ubiquitous presence have attract…
▽ More
The acceptance of Internet of Things (IoT) applications and services has seen an enormous rise of interest in IoT. Organizations have begun to create various IoT based gadgets ranging from small personal devices such as a smart watch to a whole network of smart grid, smart mining, smart manufacturing, and autonomous driver-less vehicles. The overwhelming amount and ubiquitous presence have attracted potential hackers for cyber-attacks and data theft. Security is considered as one of the prominent challenges in IoT. The key scope of this research work is to propose an innovative model using machine learning algorithm to detect and mitigate botnet-based distributed denial of service (DDoS) attack in IoT network. Our proposed model tackles the security issue concerning the threats from bots. Different machine learning algorithms such as K- Nearest Neighbour (KNN), Naive Bayes model and Multi-layer Perception Artificial Neural Network (MLP ANN) were used to develop a model where data are trained by BoT-IoT dataset. The best algorithm was selected by a reference point based on accuracy percentage and area under the receiver operating characteristics curve (ROC AUC) score. Feature engineering and Synthetic minority oversampling technique (SMOTE) were combined with machine learning algorithms (MLAs). Performance comparison of three algorithms used was done in class imbalance dataset and on the class balanced dataset.
△ Less
Submitted 5 April, 2021;
originally announced April 2021.
-
A comprehensive survey on point cloud registration
Authors:
Xiaoshui Huang,
Guofeng Mei,
Jian Zhang,
Rana Abbas
Abstract:
Registration is a transformation estimation problem between two point clouds, which has a unique and critical role in numerous computer vision applications. The developments of optimization-based methods and deep learning methods have improved registration robustness and efficiency. Recently, the combinations of optimization-based and deep learning methods have further improved performance. Howeve…
▽ More
Registration is a transformation estimation problem between two point clouds, which has a unique and critical role in numerous computer vision applications. The developments of optimization-based methods and deep learning methods have improved registration robustness and efficiency. Recently, the combinations of optimization-based and deep learning methods have further improved performance. However, the connections between optimization-based and deep learning methods are still unclear. Moreover, with the recent development of 3D sensors and 3D reconstruction techniques, a new research direction emerges to align cross-source point clouds. This survey conducts a comprehensive survey, including both same-source and cross-source registration methods, and summarize the connections between optimization-based and deep learning methods, to provide further research insight. This survey also builds a new benchmark to evaluate the state-of-the-art registration algorithms in solving cross-source challenges. Besides, this survey summarizes the benchmark data sets and discusses point cloud registration applications across various domains. Finally, this survey proposes potential research directions in this rapidly growing field.
△ Less
Submitted 5 March, 2021; v1 submitted 3 March, 2021;
originally announced March 2021.
-
Analysis and Design of Analog Fountain Codes for Short Packet Communications
Authors:
Wen Jun Lim,
Rana Abbas,
Yonghui Li,
Branka Vucetic,
Mahyar Shirvanimoghaddam
Abstract:
In this paper, we focus on the design and analysis of the Analog Fountain Code (AFC) for short packet communications. We first propose a density evolution (DE) based framework, which tracks the evolution of the probability density function of the messages exchanged between variable and check nodes of AFC in the belief propagation decoder. Using the proposed DE framework, we formulate an optimisati…
▽ More
In this paper, we focus on the design and analysis of the Analog Fountain Code (AFC) for short packet communications. We first propose a density evolution (DE) based framework, which tracks the evolution of the probability density function of the messages exchanged between variable and check nodes of AFC in the belief propagation decoder. Using the proposed DE framework, we formulate an optimisation problem to find the optimal AFC code parameters, including the weight-set, which minimises the bit error rate at a given signal-to-noise ratio (SNR). Our results show the superiority of our AFC code design compared to existing designs of AFC in the literature and thus the validity of the proposed DE framework in the asymptotically long block length regime. We then focus on selecting the precoder to improve the performance of AFC at short block lengths. Simulation results show that lower precode rates obtain better realised rates over a wide SNR range for short information block lengths. We also discuss the complexity of the AFC decoder and propose a threshold-based decoder to reduce the complexity.
△ Less
Submitted 14 October, 2021; v1 submitted 3 February, 2021;
originally announced February 2021.
-
Ratio of Products of Mixture Gamma Variates with Applications to Wireless Communications
Authors:
Hussien Al-Hmood,
Rafed Sabbar Abbas,
H. S. Al-Raweshidy
Abstract:
In this paper, the statistical properties of the product of independent and non-identically distributed mixture Gamma (MG) random variables (RVs) are provided first. Specifically, simple exact closed-form expressions for the probability density function (PDF), cumulative distribution function (CDF), and moment generating function (MGF) are derived in terms of univariate Meijer's $G$-function. The…
▽ More
In this paper, the statistical properties of the product of independent and non-identically distributed mixture Gamma (MG) random variables (RVs) are provided first. Specifically, simple exact closed-form expressions for the probability density function (PDF), cumulative distribution function (CDF), and moment generating function (MGF) are derived in terms of univariate Meijer's $G$-function. The statistical characterisations of the distribution of the ratio of products of MG variates are then derived. These statistics are used to analyse the outage probability (OP), the average error probability for different modulation schemes, the effective rate (ER) of communications systems and the average area under the receiver operating characteristics (AUC) curve of energy detection over cascaded fading channels. Additionally, the lower bound of secure outage probability (SOP$^L$) and probability of non-zero secrecy capacity (PNSC) of the physical layer and the OP of the multihop communications systems with decode-and-forward (DF) relaying protocol and co-channel interference (CCI) are studied by utilising the statistics of the ratio of the products. The derived performance metrics are applied for the Beaulieu-Xie and $α-λ-η-μ$ shadowed fading channels that have not been yet investigated in the literature. Accordingly, the equivalent parameters of a MG distribution for the aforementioned channels are given. A comparison between the numerical results and the Monte Carlo simulations is presented to verify the validation of our analysis.
△ Less
Submitted 17 July, 2020;
originally announced July 2020.
-
6G White Paper on Machine Learning in Wireless Communication Networks
Authors:
Samad Ali,
Walid Saad,
Nandana Rajatheva,
Kapseok Chang,
Daniel Steinbach,
Benjamin Sliwa,
Christian Wietfeld,
Kai Mei,
Hamid Shiri,
Hans-Jürgen Zepernick,
Thi My Chinh Chu,
Ijaz Ahmad,
Jyrki Huusko,
Jaakko Suutala,
Shubhangi Bhadauria,
Vimal Bhatia,
Rangeet Mitra,
Saidhiraj Amuru,
Robert Abbas,
Baohua Shao,
Michele Capobianco,
Guanghui Yu,
Maelick Claes,
Teemu Karvonen,
Mingzhe Chen
, et al. (2 additional authors not shown)
Abstract:
The focus of this white paper is on machine learning (ML) in wireless communications. 6G wireless communication networks will be the backbone of the digital transformation of societies by providing ubiquitous, reliable, and near-instant wireless connectivity for humans and machines. Recent advances in ML research has led enable a wide range of novel technologies such as self-driving vehicles and v…
▽ More
The focus of this white paper is on machine learning (ML) in wireless communications. 6G wireless communication networks will be the backbone of the digital transformation of societies by providing ubiquitous, reliable, and near-instant wireless connectivity for humans and machines. Recent advances in ML research has led enable a wide range of novel technologies such as self-driving vehicles and voice assistants. Such innovation is possible as a result of the availability of advanced ML models, large datasets, and high computational power. On the other hand, the ever-increasing demand for connectivity will require a lot of innovation in 6G wireless networks, and ML tools will play a major role in solving problems in the wireless domain. In this paper, we provide an overview of the vision of how ML will impact the wireless communication systems. We first give an overview of the ML methods that have the highest potential to be used in wireless networks. Then, we discuss the problems that can be solved by using ML in various layers of the network such as the physical layer, medium access layer, and application layer. Zero-touch optimization of wireless networks using ML is another interesting aspect that is discussed in this paper. Finally, at the end of each section, important research questions that the section aims to answer are presented.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
6G White paper: Research challenges for Trust, Security and Privacy
Authors:
Mika Ylianttila,
Raimo Kantola,
Andrei Gurtov,
Lozenzo Mucchi,
Ian Oppermann,
Zheng Yan,
Tri Hong Nguyen,
Fei Liu,
Tharaka Hewa,
Madhusanka Liyanage,
Ahmad Ijaz,
Juha Partala,
Robert Abbas,
Artur Hecker,
Sara Jayousi,
Alessio Martinelli,
Stefano Caputo,
Jonathan Bechtold,
Ivan Morales,
Andrei Stoica,
Giuseppe Abreu,
Shahriar Shahabuddin,
Erdal Panayirci,
Harald Haas,
Tanesh Kumar
, et al. (2 additional authors not shown)
Abstract:
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the…
▽ More
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the telco cloud can be used for trust services only equally for all users. 6G network must support embedded trust for increased level of information security in 6G. Trust modeling, trust policies and trust mechanisms need to be defined. 6G interlinks physical and digital worlds making safety dependent on information security. Therefore, we need trustworthy 6G. Security: In 6G era, the dependence of the economy and societies on IT and the networks will deepen. The role of IT and the networks in national security keeps rising - a continuation of what we see in 5G. The development towards cloud and edge native infrastructures is expected to continue in 6G networks, and we need holistic 6G network security architecture planning. Security automation opens new questions: machine learning can be used to make safer systems, but also more dangerous attacks. Physical layer security techniques can also represent efficient solutions for securing less investigated network segments as first line of defense. Privacy: There is currently no way to unambiguously determine when linked, deidentified datasets cross the threshold to become personally identifiable. Courts in different parts of the world are making decisions about whether privacy is being infringed, while companies are seeking new ways to exploit private data to create new business revenues. As solution alternatives, we may consider blockchain, distributed ledger technologies and differential privacy approaches.
△ Less
Submitted 30 April, 2020; v1 submitted 24 April, 2020;
originally announced April 2020.
-
Campus Wi-Fi Coverage Map** and Analysis
Authors:
Farhana Binte Kamrul Easha,
Robert Abbas,
Matthew Daley
Abstract:
Wireless Local Area Networks (WLANs), known as Wi-Fi, have become an essential service in university environments that helps staff, students and guests to access connectivity to the Internet from their mobile devices. Apart from the Internet being a learning resource, students also submit their assignments online using web portals. Most campuses will have poor coverage areas for mobile networks an…
▽ More
Wireless Local Area Networks (WLANs), known as Wi-Fi, have become an essential service in university environments that helps staff, students and guests to access connectivity to the Internet from their mobile devices. Apart from the Internet being a learning resource, students also submit their assignments online using web portals. Most campuses will have poor coverage areas for mobile networks and, as a result, the ability of the wireless network to supplement Internet access for mobile devices in these areas becomes more important. Acquiring clear understanding of WLAN traffic patterns, network handover between access points and inter-network handover between the Wi-Fi and mobile networks, the optimal placement of networking equipment will help deliver a better wireless service. This paper presents data analyses and Wi-Fi signal coverage maps obtained by performing wireless radio surveys, coverage predictions and statistical analysis of data from the existing access points to show the current Wi-Fi performance in several locations of a large university campus. It them makes recommendations that should improve performance. These recommendations are derived from AP performance testing and made in the context of cabling length limitations and physical and aesthetic placement restrictions that are present at each location.
△ Less
Submitted 3 April, 2020;
originally announced April 2020.
-
Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT
Authors:
Rana Abbas,
Tao Huang,
Basit Shahab,
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
The proliferating number of devices with short payloads as well as low power budget has already driven researchers away from classical grant-based access schemes that are notorious for their large signalling overhead as well as power-consuming retransmissions. Instead, light-weight random access protocols have been re-investigated and their throughput has been improved in orders of magnitude with…
▽ More
The proliferating number of devices with short payloads as well as low power budget has already driven researchers away from classical grant-based access schemes that are notorious for their large signalling overhead as well as power-consuming retransmissions. Instead, light-weight random access protocols have been re-investigated and their throughput has been improved in orders of magnitude with sophisticated yet still low-complex transceiver algorithms. In fact, grant-free access has been identified as a key medium access control technique for providing massive connectivity in machine type communications in cellular networks. In this paper, we show that grant-free access combined with non-orthogonal transmission schemes is a promising solution for 6G Internet of Things (IoT). We present novel and promising results for deep learning (DL)-based techniques for joint user detection and decoding. Then, we propose a multi-layered model for GF-NOMA for power-efficient communications. We also discuss resource allocation issues to enable the co-existence of GF-NOMA with other orthogonal or even grant-based schemes. Finally, we conclude with proposed research directions for medium access towards enabling 6G-IoT.
△ Less
Submitted 23 March, 2020;
originally announced March 2020.
-
5G Coverage, Prediction, and Trial Measurements
Authors:
Tristan Curry,
Robert Abbas
Abstract:
When planning a 5G network in the sub-6GHz bands, similar cell planning techniques to LTE can be applied. Looking at the Australian environment, the n78 band (3.3-3.8GHz TDD) is approximately 1GHz higher than the 2.6GHz band used in existing LTE networks. As a result, the coverage footprint can be similar, and therefore co-locating 5G NR (New Radio) on existing LTE base stations is a common strate…
▽ More
When planning a 5G network in the sub-6GHz bands, similar cell planning techniques to LTE can be applied. Looking at the Australian environment, the n78 band (3.3-3.8GHz TDD) is approximately 1GHz higher than the 2.6GHz band used in existing LTE networks. As a result, the coverage footprint can be similar, and therefore co-locating 5G NR (New Radio) on existing LTE base stations is a common strategy for initial network rollout. Any difference in coverage can be compensated by beamforming gain, less downtilting, or increasing the gNodeB's transmit power. This paper presents an initial link budget for data services, provides a coverage prediction, and measurements for a 5G NR NSA (Non Stand Alone) trial radiating at 3.5GHz with 60 MHz bandwidth. The coverage prediction is generated using RF planning tool Atoll, which is then compared to coverage measurements from the trial. These findings can be used to help plan a future 5G network in the Sydney metro area or similar environment.
△ Less
Submitted 21 March, 2020;
originally announced March 2020.
-
Machine Learning based Anomaly Detection for 5G Networks
Authors:
Jordan Lam,
Robert Abbas
Abstract:
Protecting the networks of tomorrow is set to be a challenging domain due to increasing cyber security threats and widening attack surfaces created by the Internet of Things (IoT), increased network heterogeneity, increased use of virtualisation technologies and distributed architectures. This paper proposes SDS (Software Defined Security) as a means to provide an automated, flexible and scalable…
▽ More
Protecting the networks of tomorrow is set to be a challenging domain due to increasing cyber security threats and widening attack surfaces created by the Internet of Things (IoT), increased network heterogeneity, increased use of virtualisation technologies and distributed architectures. This paper proposes SDS (Software Defined Security) as a means to provide an automated, flexible and scalable network defence system. SDS will harness current advances in machine learning to design a CNN (Convolutional Neural Network) using NAS (Neural Architecture Search) to detect anomalous network traffic. SDS can be applied to an intrusion detection system to create a more proactive and end-to-end defence for a 5G network. To test this assumption, normal and anomalous network flows from a simulated environment have been collected and analyzed with a CNN. The results from this method are promising as the model has identified benign traffic with a 100% accuracy rate and anomalous traffic with a 96.4% detection rate. This demonstrates the effectiveness of network flow analysis for a variety of common malicious attacks and also provides a viable option for detection of encrypted malicious network traffic.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
Grant-free Non-orthogonal Multiple Access for IoT: A Survey
Authors:
Muhammad Basit Shahab,
Rana Abbas,
Mahyar Shirvanimoghaddam,
Sarah J. Johnson
Abstract:
Massive machine-type communications (mMTC) is one of the main three focus areas in the 5th generation (5G) of mobile standards to enable connectivity of a massive number of internet of things (IoT) devices with little or no human intervention. In conventional human-type communications (HTC), due to the limited number of available radio resources and orthogonal/non-overlap** nature of existing re…
▽ More
Massive machine-type communications (mMTC) is one of the main three focus areas in the 5th generation (5G) of mobile standards to enable connectivity of a massive number of internet of things (IoT) devices with little or no human intervention. In conventional human-type communications (HTC), due to the limited number of available radio resources and orthogonal/non-overlap** nature of existing resource allocation techniques, users need to compete for connectivity through a random access (RA) process, which may turn into a performance bottleneck in mMTC. In this context, non-orthogonal multiple access (NOMA) has emerged as a potential technology that allows overlap** of multiple users over a radio resource, thereby creating an opportunity to enable more autonomous and grant-free communication, where devices can transmit data whenever they need. The existing literature on NOMA schemes majorly considers centralized scheduling based HTC, where users are already connected, and various system parameters like spreading sequences, interleaving patterns, power control, etc., are predefined. Contrary to HTC, mMTC traffic is different with mostly uplink communication, small data size per device, diverse quality of service, autonomous nature, and massive number of devices. Hence, the signaling overhead and latency of centralized scheduling becomes a potential performance bottleneck. To tackle this, grant-free access is needed, where mMTC devices can autonomously transmit their data over randomly chosen radio resources. This article, in contrast to existing surveys, comprehensively discusses the recent advances in NOMA from a grant-free connectivity perspective. Moreover, related practical challenges and future directions are discussed.
△ Less
Submitted 15 October, 2019;
originally announced October 2019.
-
An Overview of Attacks and Defences on Intelligent Connected Vehicles
Authors:
Mahdi Dibaei,
Xi Zheng,
Kun Jiang,
Sasa Maric,
Robert Abbas,
Shigang Liu,
Yuexin Zhang,
Yao Deng,
Sheng Wen,
Jun Zhang,
Yang Xiang,
Shui Yu
Abstract:
Cyber security is one of the most significant challenges in connected vehicular systems and connected vehicles are prone to different cybersecurity attacks that endanger passengers' safety. Cyber security in intelligent connected vehicles is composed of in-vehicle security and security of inter-vehicle communications. Security of Electronic Control Units (ECUs) and the Control Area Network (CAN) b…
▽ More
Cyber security is one of the most significant challenges in connected vehicular systems and connected vehicles are prone to different cybersecurity attacks that endanger passengers' safety. Cyber security in intelligent connected vehicles is composed of in-vehicle security and security of inter-vehicle communications. Security of Electronic Control Units (ECUs) and the Control Area Network (CAN) bus are the most significant parts of in-vehicle security. Besides, with the development of 4G LTE and 5G remote communication technologies for vehicle-toeverything (V2X) communications, the security of inter-vehicle communications is another potential problem. After giving a short introduction to the architecture of next-generation vehicles including driverless and intelligent vehicles, this review paper identifies a few major security attacks on the intelligent connected vehicles. Based on these attacks, we provide a comprehensive survey of available defences against these attacks and classify them into four categories, i.e. cryptography, network security, software vulnerability detection, and malware detection. We also explore the future directions for preventing attacks on intelligent vehicle systems.
△ Less
Submitted 17 July, 2019;
originally announced July 2019.
-
Fast Channel Estimation and Beam Tracking for Millimeter Wave Vehicular Communications
Authors:
Sina Shaham,
Ming Ding,
Matthew Kokshoorn,
Zihuai Lin,
Shu** Dang,
Rana Abbas
Abstract:
Millimeter wave (mmWave) has been claimed to be the only viable solution for high-bandwidth vehicular communications. However, frequent channel estimation and beamforming required to provide a satisfactory quality of service limits mmWave for vehicular communications. In this paper, we propose a novel channel estimation and beam tracking framework for mmWave communications in a vehicular network s…
▽ More
Millimeter wave (mmWave) has been claimed to be the only viable solution for high-bandwidth vehicular communications. However, frequent channel estimation and beamforming required to provide a satisfactory quality of service limits mmWave for vehicular communications. In this paper, we propose a novel channel estimation and beam tracking framework for mmWave communications in a vehicular network setting. For channel estimation, we propose an algorithm termed robust adaptive multi-feedback (RAF) that achieves comparable estimation performance as existing channel estimation algorithms, with a significantly smaller number of feedback bits. We derive upper and lower bounds on the probability of estimation error (PEE) of the RAF algorithm, given a number of channel estimations, whose accuracy is verified through Monte Carlo simulations. For beam tracking, we propose a new practical model for mmWave vehicular communications. In contrast to the prior works, the model is based on position, velocity, and channel coefficient, which allows a significant improvement of the tracking performance. Focused on the new beam tracking model, we re-derive the equations for Jacobian matrices, reducing the complexity for vehicular communications. An extensive number of simulations is conducted to show the superiority of our proposed channel estimation method and beam tracking algorithm in comparison with the existing algorithms and models. Our simulations suggest that the RAF algorithm can achieve the desired PEE, while on average, reducing the feedback overhead by 75.5% and the total channel estimation time by 14%. The beam tracking algorithm is also shown to significantly improve beam tracking performance, allowing more room for data transmission.
△ Less
Submitted 25 September, 2019; v1 submitted 31 May, 2018;
originally announced June 2018.
-
Short Block-length Codes for Ultra-Reliable Low-Latency Communications
Authors:
Mahyar Shirvanimoghaddam,
Mohamad Sadegh Mohamadi,
Rana Abbas,
Aleksandar Minja,
Chentao Yue,
Balazs Matuz,
Guojun Han,
Zihuai Lin,
Yonghui Li,
Sarah Johnson,
Branka Vucetic
Abstract:
This paper reviews the state of the art channel coding techniques for ultra-reliable low latency communication (URLLC). The stringent requirements of URLLC services, such as ultra-high reliability and low latency, have made it the most challenging feature of the fifth generation (5G) mobile systems. The problem is even more challenging for the services beyond the 5G promise, such as tele-surgery a…
▽ More
This paper reviews the state of the art channel coding techniques for ultra-reliable low latency communication (URLLC). The stringent requirements of URLLC services, such as ultra-high reliability and low latency, have made it the most challenging feature of the fifth generation (5G) mobile systems. The problem is even more challenging for the services beyond the 5G promise, such as tele-surgery and factory automation, which require latencies less than 1ms and failure rate as low as $10^{-9}$. The very low latency requirements of URLLC do not allow traditional approaches such as re-transmission to be used to increase the reliability. On the other hand, to guarantee the delay requirements, the block length needs to be small, so conventional channel codes, originally designed and optimised for moderate-to-long block-lengths, show notable deficiencies for short blocks. This paper provides an overview on channel coding techniques for short block lengths and compares them in terms of performance and complexity. Several important research directions are identified and discussed in more detail with several possible solutions.
△ Less
Submitted 5 September, 2018; v1 submitted 26 February, 2018;
originally announced February 2018.
-
Ultra-Reliable Low Latency Cellular Networks: Use Cases, Challenges and Approaches
Authors:
He Chen,
Rana Abbas,
Peng Cheng,
Mahyar Shirvanimoghaddam,
Wibowo Hardjawana,
Wei Bao,
Yonghui Li,
Branka Vucetic
Abstract:
The fifth-generation cellular mobile networks are expected to support mission critical ultra-reliable low latency communication (URLLC) services in addition to the enhanced mobile broadband applications. This article first introduces three emerging mission critical applications of URLLC and identifies their requirements on end-to-end latency and reliability. We then investigate the various sources…
▽ More
The fifth-generation cellular mobile networks are expected to support mission critical ultra-reliable low latency communication (URLLC) services in addition to the enhanced mobile broadband applications. This article first introduces three emerging mission critical applications of URLLC and identifies their requirements on end-to-end latency and reliability. We then investigate the various sources of end-to-end delay of current wireless networks by taking the 4G Long Term Evolution (LTE) as an example. Subsequently, we propose and evaluate several techniques to reduce the end-to-end latency from the perspectives of error control coding, signal processing, and radio resource management. We also briefly discuss other network design approaches with the potential for further latency reduction.
△ Less
Submitted 7 August, 2018; v1 submitted 2 September, 2017;
originally announced September 2017.
-
Grant-Free Massive NOMA: Outage Probability and Throughput
Authors:
Rana Abbas,
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
In this paper, we consider a massive uncoordinated non-orthogonal multiple access (NOMA) scheme where devices have strict latency requirements and no retransmission opportunities are available. Each device chooses a pilot sequence from a predetermined set as its signature and transmits its selected pilot and data simultaneously. A collision occurs when two or more devices choose the same pilot seq…
▽ More
In this paper, we consider a massive uncoordinated non-orthogonal multiple access (NOMA) scheme where devices have strict latency requirements and no retransmission opportunities are available. Each device chooses a pilot sequence from a predetermined set as its signature and transmits its selected pilot and data simultaneously. A collision occurs when two or more devices choose the same pilot sequence. Collisions are treated as interference to the remaining received signals. We consider successive joint decoding (SJD) and successive interference cancellation (SIC) under a Rayleigh fading and path loss channel model. We first derive the expression for the outage probability for the case where devices transmit at the same fixed rate. Then, we derive the expression for the maximum achievable throughput for the case where devices transmit with rateless codes. Thus, their code rate is adaptive to the system conditions, i.e., load, received powers, and interference. Numerical results verify the accuracy of our analytical expressions. For low data rate transmissions, results show that SIC performs close to that of SJD in terms of outage probability for packet arrival rates up to 10 packets per slot. However, SJD can achieve almost double the throughput of SIC and is, thus, far more superior.
△ Less
Submitted 24 July, 2017;
originally announced July 2017.
-
Random Multiple Access for M2M Communications with QoS Guarantees
Authors:
Rana Abbas,
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
We propose a novel random multiple access (RMA) scheme with quality of service (QoS) guarantees for machine-to-machine (M2M) communications. We consider a slotted uncoordinated data transmission period during which machine type communication (MTC) devices transmit over the same radio channel. Based on the latency requirements, MTC devices are divided into groups of different sizes, and the transmi…
▽ More
We propose a novel random multiple access (RMA) scheme with quality of service (QoS) guarantees for machine-to-machine (M2M) communications. We consider a slotted uncoordinated data transmission period during which machine type communication (MTC) devices transmit over the same radio channel. Based on the latency requirements, MTC devices are divided into groups of different sizes, and the transmission frame is divided into subframes of different lengths. In each subframe, each group is assigned an access probability based on which an MTC device decides to transmit replicas of its packet or remain silent. The base station (BS) employs successive interference cancellation (SIC) to recover all the superposed packets. We derive the closed form expressions for the average probability of device resolution for each group, and we use these expressions to design the access probabilities. The accuracy of the expressions is validated through Monte Carlo simulations. We show that the designed access probabilities can guarantee the QoS requirements with high reliability and high energy efficiency. Finally, we show that RMA can outperform standard coordinated access schemes as well as some of the recently proposed M2M access schemes for cellular networks.
△ Less
Submitted 23 October, 2016;
originally announced October 2016.