-
Physical Layer Deception with Non-Orthogonal Multiplexing
Authors:
Wenwen Chen,
Bin Han,
Yao Zhu,
Anke Schmeink,
Giuseppe Caire,
Hans D. Schotten
Abstract:
Physical layer security (PLS) is a promising technology to secure wireless communications by exploiting the physical properties of the wireless channel. However, the passive nature of PLS creates a significant imbalance between the effort required by eavesdroppers and legitimate users to secure data. To address this imbalance, in this article, we propose a novel framework of physical layer decepti…
▽ More
Physical layer security (PLS) is a promising technology to secure wireless communications by exploiting the physical properties of the wireless channel. However, the passive nature of PLS creates a significant imbalance between the effort required by eavesdroppers and legitimate users to secure data. To address this imbalance, in this article, we propose a novel framework of physical layer deception (PLD), which combines PLS with deception technologies to actively counteract wiretap** attempts. Combining a two-stage encoder with randomized ciphering and non-orthogonal multiplexing, the PLD approach enables the wireless communication system to proactively counter eavesdroppers with deceptive messages. Relying solely on the superiority of the legitimate channel over the eavesdrop** channel, the PLD framework can effectively protect the confidentiality of the transmitted messages, even against eavesdroppers who possess knowledge equivalent to that of the legitimate receiver. We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches with comprehensive numerical benchmarks.
△ Less
Submitted 30 June, 2024;
originally announced July 2024.
-
Exploring 6G Potential for Industrial Digital Twinning and Swarm Intelligence in Obstacle-Rich Environments
Authors:
Siyu Yuan,
Khurshid Alam,
Bin Han,
Dennis Krummacker,
Hans D. Schotten
Abstract:
With the advent of 6G technology, the demand for efficient and intelligent systems in industrial applications has surged, driving the need for advanced solutions in target localization. Utilizing swarm robots to locate unknown targets involves navigating increasingly complex environments. Digital Twinning (DT) offers a robust solution by creating a virtual replica of the physical world, which enha…
▽ More
With the advent of 6G technology, the demand for efficient and intelligent systems in industrial applications has surged, driving the need for advanced solutions in target localization. Utilizing swarm robots to locate unknown targets involves navigating increasingly complex environments. Digital Twinning (DT) offers a robust solution by creating a virtual replica of the physical world, which enhances the swarm's navigation capabilities. Our framework leverages DT and integrates Swarm Intelligence to store physical map information in the cloud, enabling robots to efficiently locate unknown targets. The simulation results demonstrate that the DT framework, augmented by Swarm Intelligence, significantly improves target location efficiency in obstacle-rich environments compared to traditional methods. This research underscores the potential of combining DT and Swarm Intelligence to advance the field of robotic navigation and target localization in complex industrial settings.
△ Less
Submitted 2 July, 2024; v1 submitted 28 June, 2024;
originally announced June 2024.
-
Bridging Simulation and Measurements through Ray-Launching Analysis: A Study in a Complex Urban Scenario Environment
Authors:
Xueyun Long,
Amina Fellan,
Mario Pauli,
Hans D. Schotten,
Thomas Zwick
Abstract:
With the rapid increase in mobile subscribers, there is a drive towards achieving higher data rates, prompting the use of higher frequencies in future wireless communication technologies. Wave propagation channel modeling for these frequencies must be considered in conjunction with measurement results. This paper presents a ray-launching (RL)-based simulation in a complex urban scenario characteri…
▽ More
With the rapid increase in mobile subscribers, there is a drive towards achieving higher data rates, prompting the use of higher frequencies in future wireless communication technologies. Wave propagation channel modeling for these frequencies must be considered in conjunction with measurement results. This paper presents a ray-launching (RL)-based simulation in a complex urban scenario characterized by an undulating terrain with a high density of trees. The simulation results tend to closely match the reported measurements when more details are considered. This underscores the benefits of using the RL method, which provides detailed space-time and angle-delay results.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Cost-Effectiveness Analysis and Design of Cost-Efficient Cell-Free Massive MIMO Systems
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Cell-free massive multi-input multi-output (MIMO) has recently attracted much attention, attributed to its potential to deliver uniform service quality. However, the adoption of a cell-free architecture raises concerns about the high implementation costs associated with deploying numerous distributed access points (APs) and the need for fronthaul network installation. To ensure the sustainability…
▽ More
Cell-free massive multi-input multi-output (MIMO) has recently attracted much attention, attributed to its potential to deliver uniform service quality. However, the adoption of a cell-free architecture raises concerns about the high implementation costs associated with deploying numerous distributed access points (APs) and the need for fronthaul network installation. To ensure the sustainability of next-generation wireless networks, it is crucial to improve cost-effectiveness, alongside achieving high performance. To address this, we conduct a cost analysis of cell-free massive MIMO and build a unified model with varying numbers of antennas per AP. Our objective is to explore whether employing multi-antenna APs could reduce system costs while maintaining performance. The analysis and evaluation result in the identification of a cost-effective design for cell-free massive MIMO, providing valuable insights for practical implementation.
△ Less
Submitted 1 June, 2024;
originally announced June 2024.
-
GNN-based Anomaly Detection for Encoded Network Traffic
Authors:
Anasuya Chattopadhyay,
Daniel Reti,
Hans D. Schotten
Abstract:
The early research report explores the possibility of using Graph Neural Networks (GNNs) for anomaly detection in internet traffic data enriched with information. While recent studies have made significant progress in using GNNs for anomaly detection in finance, multivariate time-series, and biochemistry domains, there is limited research in the context of network flow data. In this report, we exp…
▽ More
The early research report explores the possibility of using Graph Neural Networks (GNNs) for anomaly detection in internet traffic data enriched with information. While recent studies have made significant progress in using GNNs for anomaly detection in finance, multivariate time-series, and biochemistry domains, there is limited research in the context of network flow data. In this report, we explore the idea that leverages information-enriched features extracted from network flow packet data to improve the performance of GNN in anomaly detection. The idea is to utilize feature encoding (binary, numerical, and string) to capture the relationships between the network components, allowing the GNN to learn latent relationships and better identify anomalies.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
A Review of Multiple Access Techniques for Intelligent Reflecting Surface-Assisted Systems
Authors:
Wei Jiang,
Hans Schotten
Abstract:
Intelligent Reflecting Surface (IRS) is envisioned to be a technical enabler for the sixth-generation (6G) wireless system. Its potential lies in delivering high performance while maintaining both power efficiency and cost-effectiveness. Previous studies have primarily focused on point-to-point IRS communications involving a single user. Nevertheless, a practical system must serve multiple users s…
▽ More
Intelligent Reflecting Surface (IRS) is envisioned to be a technical enabler for the sixth-generation (6G) wireless system. Its potential lies in delivering high performance while maintaining both power efficiency and cost-effectiveness. Previous studies have primarily focused on point-to-point IRS communications involving a single user. Nevertheless, a practical system must serve multiple users simultaneously. The unique characteristics of IRS, such as non-frequency-selective reflection and the necessity for joint active/passive beamforming, create obstacles to the use of conventional multiple access (MA) techniques. This motivates us to review various MA techniques to make clear their functionalities in the presence of IRS. Through this paper, our aim is to provide researchers with a comprehensive understanding of challenges and available solutions, offering insights to foster their design of efficient multiple access for IRS-aided systems.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Unified Modeling and Performance Comparison for Cellular and Cell-Free Massive MIMO
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Cell-free massive multi-input multi-output (MIMO) has recently gained a lot of attention due to its high potential in sixth-generation (6G) wireless systems. The goal of this paper is to first present a unified modeling for massive MIMO, encompassing both cellular and cell-free architectures with a variable number of antennas per access point. We derive signal transmission models and achievable sp…
▽ More
Cell-free massive multi-input multi-output (MIMO) has recently gained a lot of attention due to its high potential in sixth-generation (6G) wireless systems. The goal of this paper is to first present a unified modeling for massive MIMO, encompassing both cellular and cell-free architectures with a variable number of antennas per access point. We derive signal transmission models and achievable spectral efficiency in both the downlink and uplink using zero-forcing and maximal-ratio schemes. We also provide performance comparisons in terms of per-user and sum spectral efficiency.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Cell-Free Terahertz Massive MIMO: A Novel Paradigm Beyond Ultra-Massive MIMO
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Terahertz (THz) frequencies have recently garnered considerable attention due to their potential to offer abundant spectral resources for communication, as well as distinct advantages in sensing, positioning, and imaging. Nevertheless, practical implementation encounters challenges stemming from the limited distances of signal transmission, primarily due to notable propagation, absorption, and blo…
▽ More
Terahertz (THz) frequencies have recently garnered considerable attention due to their potential to offer abundant spectral resources for communication, as well as distinct advantages in sensing, positioning, and imaging. Nevertheless, practical implementation encounters challenges stemming from the limited distances of signal transmission, primarily due to notable propagation, absorption, and blockage losses. To address this issue, the current strategy involves employing ultra-massive multi-input multi-output (UMMIMO) to generate high beamforming gains, thereby extending the transmission range. This paper introduces an alternative solution through the utilization of cell-free massive MIMO (CFmMIMO) architecture, wherein the closest access point is actively chosen to reduce the distance, rather than relying solely on a substantial number of antennas. We compare these two techniques through simulations and the numerical results justify that CFmMIMO is superior to UMMIMO in both spectral and energy efficiency at THz frequencies.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
A Robust UAV-Based Approach for Power-Modulated Jammer Localization Using DoA
Authors:
Zexin Fang,
Bin Han,
Hans D. Schotten
Abstract:
Unmanned aerial vehicles (UAVs) are well-suited to localize jammers, particularly when jammers are at non-terrestrial locations, where conventional detection methods face challenges. In this work we propose a novel localization method, sample pruning gradient descend (SPGD), which offers robust performance against multiple power-modulated jammers with low computational complexity.
Unmanned aerial vehicles (UAVs) are well-suited to localize jammers, particularly when jammers are at non-terrestrial locations, where conventional detection methods face challenges. In this work we propose a novel localization method, sample pruning gradient descend (SPGD), which offers robust performance against multiple power-modulated jammers with low computational complexity.
△ Less
Submitted 21 May, 2024; v1 submitted 15 May, 2024;
originally announced May 2024.
-
A Comprehensive Overview and Survey of O-RAN: Exploring Slicing-aware Architecture, Deployment Options, and Use Cases
Authors:
Khurshid Alam,
Mohammad Asif Habibi,
Matthias Tammen,
Dennis Krummacker,
Walid Saad,
Marco Di Renzo,
Tommaso Melodia,
Xavier Costa-Pérez,
Mérouane Debbah,
Ashutosh Dutta,
Hans D. Schotten
Abstract:
Open-radio access network (O-RAN) seeks to establish principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable interfaces. It advocates for multi-vendorism and multi-stakeholderism within a cloudified and virtualized wireless infrastructure, aimed at enhancing the deployment, operation, and maintenance of RAN architecture. This enhan…
▽ More
Open-radio access network (O-RAN) seeks to establish principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable interfaces. It advocates for multi-vendorism and multi-stakeholderism within a cloudified and virtualized wireless infrastructure, aimed at enhancing the deployment, operation, and maintenance of RAN architecture. This enhancement promises increased flexibility, performance optimization, service innovation, energy efficiency, and cost efficiency in fifth-generation (5G), sixth-generation (6G), and future networks. One of the key features of the O-RAN architecture is its support for network slicing, which entails interaction with other slicing domains within a mobile network, notably the transport network (TN) domain and the core network (CN) domain, to realize end-to-end (E2E) network slicing. The study of this feature requires exploring the stances and contributions of diverse standards development organizations (SDOs). In this context, we note that despite the ongoing industrial deployments and standardization efforts, the research and standardization communities have yet to comprehensively address network slicing in O-RAN. To address this gap, this survey paper provides a comprehensive exploration of network slicing in O-RAN through an in-depth review of specification documents from O-RAN Alliance and research papers from leading industry and academic institutions. The paper commences with an overview of the ongoing standardization efforts and open-source contributions associated with O-RAN, subsequently delving into the latest O-RAN architecture with an emphasis on its slicing aspects. Further, the paper explores deployment scenarios for network slicing within O-RAN, examining options for the deployment and orchestration of O-RAN and TN network slice subnets...
△ Less
Submitted 8 May, 2024; v1 submitted 6 May, 2024;
originally announced May 2024.
-
Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models
Authors:
Daniel Reti,
Norman Becker,
Tillmann Angeli,
Anasuya Chattopadhyay,
Daniel Schneider,
Sebastian Vollmer,
Hans D. Schotten
Abstract:
With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized…
▽ More
With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized for specific types of honeytokens, and heavily rely on suitable training datasets. To overcome these limitations, this work systematically investigates the approach of utilizing Large Language Models (LLMs) to create a variety of honeytokens. Out of the seven different honeytoken types created in this work, such as configuration files, databases, and log files, two were used to evaluate the optimal prompt. The generation of robots.txt files and honeywords was used to systematically test 210 different prompt structures, based on 16 prompt building blocks. Furthermore, all honeytokens were tested across different state-of-the-art LLMs to assess the varying performance of different models. Prompts performing optimally on one LLMs do not necessarily generalize well to another. Honeywords generated by GPT-3.5 were found to be less distinguishable from real passwords compared to previous methods of automated honeyword generation. Overall, the findings of this work demonstrate that generic LLMs are capable of creating a wide array of honeytokens using the presented prompt structures.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Robust Federated Learning for Wireless Networks: A Demonstration with Channel Estimation
Authors:
Zexin Fang,
Bin Han,
Hans D. Schotten
Abstract:
Federated learning (FL) offers a privacy-preserving collaborative approach for training models in wireless networks, with channel estimation emerging as a promising application. Despite extensive studies on FL-empowered channel estimation, the security concerns associated with FL require meticulous attention. In a scenario where small base stations (SBSs) serve as local models trained on cached da…
▽ More
Federated learning (FL) offers a privacy-preserving collaborative approach for training models in wireless networks, with channel estimation emerging as a promising application. Despite extensive studies on FL-empowered channel estimation, the security concerns associated with FL require meticulous attention. In a scenario where small base stations (SBSs) serve as local models trained on cached data, and a macro base station (MBS) functions as the global model setting, an attacker can exploit the vulnerability of FL, launching attacks with various adversarial attacks or deployment tactics. In this paper, we analyze such vulnerabilities, corresponding solutions were brought forth, and validated through simulation.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Chronicles of jockeying in queuing systems
Authors:
Anthony Kiggundu,
Bin Han,
Dennis Krummacker,
Hans D. Schotten
Abstract:
The relevance of studies in queuing theory in social systems has inspired its adoption in other mainstream technologies with its application in distributed and communication systems becoming an intense research domain. Considerable work has been done regarding the application of the impatient queuing phenomenon in distributed computing to achieve optimal resource sharing and allocation for perform…
▽ More
The relevance of studies in queuing theory in social systems has inspired its adoption in other mainstream technologies with its application in distributed and communication systems becoming an intense research domain. Considerable work has been done regarding the application of the impatient queuing phenomenon in distributed computing to achieve optimal resource sharing and allocation for performance improvement. Generally, there are two types of common impatient queuing behaviour that have been well studied, namely balking and reneging, respectively. In this survey, we are interested in the third type of impatience: jockeying, a phenomenon that draws origins from impatient customers switching from one queue to another.
This survey chronicles classical and latest efforts that labor to model and exploit the jockeying behaviour in queuing systems, with a special focus on those related to information and communication systems, especially in the context of Multi-Access Edge Computing. We comparatively summarize the reviewed literature regarding their methodologies, invoked models, and use cases.
△ Less
Submitted 28 June, 2024; v1 submitted 16 February, 2024;
originally announced February 2024.
-
Resource Allocation in Mobile Networks: A Decision Model Of Jockeying in Queues
Authors:
Anthony Kiggundu,
Bin Han,
Dennis Krummacker,
Hans D. Schotten
Abstract:
Use-case-specific network slicing in decentralized multi-tenancy cloud environments is a promising approach to bridge the gap between the demand and supply of resources in next-generation communication networks. Our findings associate different slice profiles to queues in a multi-server setting, such that tenants continuously assess their preferences and make rational decisions to minimize the que…
▽ More
Use-case-specific network slicing in decentralized multi-tenancy cloud environments is a promising approach to bridge the gap between the demand and supply of resources in next-generation communication networks. Our findings associate different slice profiles to queues in a multi-server setting, such that tenants continuously assess their preferences and make rational decisions to minimize the queuing delay.
Deviated from classical approaches that statistically model the jockeying phenomena in queuing systems, our work pioneers to setup a behavioral model of jockeying impatient tenants. This will serve as a basis for decentralized management of multi-queue systems, where the decision to jockey is individually made by each tenant upon its up-to-date assessment of expected waiting time.
Additionally, we carry out numerical simulations to empirically unravel the parametric dependencies of the tenants' jockeying behavior.
△ Less
Submitted 17 May, 2024; v1 submitted 16 February, 2024;
originally announced February 2024.
-
3D Cooperative Localization in UAV Systems: CRLB Analysis and Security Solutions
Authors:
Zexin Fang,
Bin Han,
Hans D. Schotten
Abstract:
This paper presents a robust and secure framework for achieving accurate and reliable cooperative localization in multiple unmanned aerial vehicle (UAV) systems. The Cramer-Rao low bound (CRLB) for the three-dimensional (3D) cooperative localization network is derived, with particular attention given to the non-uniform spatial distribution of anchor nodes. Challenges of mobility and security threa…
▽ More
This paper presents a robust and secure framework for achieving accurate and reliable cooperative localization in multiple unmanned aerial vehicle (UAV) systems. The Cramer-Rao low bound (CRLB) for the three-dimensional (3D) cooperative localization network is derived, with particular attention given to the non-uniform spatial distribution of anchor nodes. Challenges of mobility and security threats are addressed, corresponding solutions are brought forth and numerically assessed . The proposed solution incorporates two key components: the Mobility Adaptive Gradient Descent (MAGD) and Time-evolving Anomaly Detection (TAD). The MAGD adapts the gradient descent algorithm to handle the configuration changes in cooperative localization systems, ensuring accurate localization in dynamic scenarios. The TAD cooperates with reputation propagation (RP) scheme to detect and mitigate potential attacks by identifying malicious data, enhancing the security and resilience of the cooperative localization.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
Hierarchical Cell-Free Massive MIMO for High Capacity with Simple Implementation
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Cell-free massive multi-input multi-output (MIMO) has recently gained much attention for its potential in sha** the landscape of sixth-generation (6G) wireless systems. This paper proposes a hierarchical network architecture tailored for cell-free massive MIMO, seamlessly integrating co-located and distributed antennas. A central base station (CBS), equipped with an antenna array, positions itse…
▽ More
Cell-free massive multi-input multi-output (MIMO) has recently gained much attention for its potential in sha** the landscape of sixth-generation (6G) wireless systems. This paper proposes a hierarchical network architecture tailored for cell-free massive MIMO, seamlessly integrating co-located and distributed antennas. A central base station (CBS), equipped with an antenna array, positions itself near the center of the coverage area, complemented by distributed access points spanning the periphery. The proposed architecture remarkably outperforms conventional cell-free networks, demonstrating superior sum throughput while maintaining a comparable worst-case per-user spectral efficiency. Meanwhile, the implementation cost associated with the fronthaul network is substantially diminished.
△ Less
Submitted 20 January, 2024;
originally announced January 2024.
-
Beam-Based Multiple Access for IRS-Aided Millimeter-Wave and Terahertz Communications
Authors:
Wei Jiang,
Hans Dieter Schotten
Abstract:
Recently, intelligent reflecting surface (IRS)-aided millimeter-wave (mmWave) and terahertz (THz) communications are considered in the wireless community. This paper aims to design a beam-based multiple-access strategy for this new paradigm. Its key idea is to make use of multiple sub-arrays over a hybrid digital-analog array to form independent beams, each of which is steered towards the desired…
▽ More
Recently, intelligent reflecting surface (IRS)-aided millimeter-wave (mmWave) and terahertz (THz) communications are considered in the wireless community. This paper aims to design a beam-based multiple-access strategy for this new paradigm. Its key idea is to make use of multiple sub-arrays over a hybrid digital-analog array to form independent beams, each of which is steered towards the desired direction to mitigate inter-user interference and suppress unwanted signal reflection. The proposed scheme combines the advantages of both orthogonal multiple access (i.e., no inter-user interference) and non-orthogonal multiple access (i.e., full time-frequency resource use). Consequently, it can substantially boost the system capacity, as verified by Monte-Carlo simulations.
△ Less
Submitted 2 January, 2024;
originally announced January 2024.
-
A Short Overview of 6G V2X Communication Standards
Authors:
Donglin Wang,
Yann Nana Nganso,
Hans D. Schotten
Abstract:
We are on the verge of a new age of linked autonomous cars with unheard-of user experiences, dramatically improved air quality and road safety, extremely varied transportation settings, and a plethora of cutting-edge apps. A substantially improved Vehicle-to-Everything (V2X) communication network that can simultaneously support massive hyper-fast, ultra-reliable, and low-latency information exchan…
▽ More
We are on the verge of a new age of linked autonomous cars with unheard-of user experiences, dramatically improved air quality and road safety, extremely varied transportation settings, and a plethora of cutting-edge apps. A substantially improved Vehicle-to-Everything (V2X) communication network that can simultaneously support massive hyper-fast, ultra-reliable, and low-latency information exchange is necessary to achieve this ambitious goal. These needs of the upcoming V2X are expected to be satisfied by the Sixth Generation (6G) communication system. In this article, we start by introducing the history of V2X communications by giving details on the current, develo**, and future developments. We compare the applications of communication technologies such as Wi-Fi, LTE, 5G, and 6G. we focus on the new technologies for 6G V2X which are brain-vehicle interface, blocked-based V2X, and Machine Learning (ML). To achieve this, we provide a summary of the most recent ML developments in 6G vehicle networks. we discuss the security challenges of 6G V2X. We address the strengths, open challenges, development, and improving areas of further study in this field.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal
Authors:
Philipp Rosemann,
Sanket Partani,
Marc Miranda,
Jannik Mähn,
Michael Karrenbauer,
William Meli,
Rodrigo Hernangomez,
Maximilian Lübke,
Jacob Kochems,
Stefan Köpsell,
Anosch Aziz-Koch,
Julia Beuster,
Oliver Blume,
Norman Franchi,
Reiner Thomä,
Slawomir Stanczak,
Hans D. Schotten
Abstract:
Sensing plays a crucial role in autonomous and assisted vehicular driving, as well as in the operation of autonomous drones. The traditional segregation of communication and onboard sensing systems in mobility applications is due to be merged using Joint Communication and Sensing (JCAS) in the development of the 6G mobile radio standard. The integration of JCAS functions into the future road traff…
▽ More
Sensing plays a crucial role in autonomous and assisted vehicular driving, as well as in the operation of autonomous drones. The traditional segregation of communication and onboard sensing systems in mobility applications is due to be merged using Joint Communication and Sensing (JCAS) in the development of the 6G mobile radio standard. The integration of JCAS functions into the future road traffic landscape introduces novel challenges for the design of the 6G system architecture. Special emphasis will be placed on facilitating direct communication between road users and aerial drones. In various mobility scenarios, diverse levels of integration will be explored, ranging from leveraging communication capabilities to coordinate different radars to achieving deep integration through a unified waveform. In this paper, we have identified use cases and derive five higher-level Tech Cases (TCs). Technical and functional requirements for the 6G system architecture for a device-oriented JCAS approach will be extracted from the TCs and used to conceptualize the architectural views.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
Coverage Hole Elimination System in Industrial Environment
Authors:
Mervat Zarour,
Shreya Tayade,
Sergiy Melnyk,
Hans D. Schotten
Abstract:
The paper proposes a framework to identify and avoid the coverage hole in an indoor industry environment. We assume an edge cloud co-located controller that followers the Automated Guided Vehicle (AGV) movement on a factory floor over a wireless channel. The coverage holes are caused due to blockage, path-loss, and fading effects. An AGV in the coverage hole may lose connectivity to the edge-cloud…
▽ More
The paper proposes a framework to identify and avoid the coverage hole in an indoor industry environment. We assume an edge cloud co-located controller that followers the Automated Guided Vehicle (AGV) movement on a factory floor over a wireless channel. The coverage holes are caused due to blockage, path-loss, and fading effects. An AGV in the coverage hole may lose connectivity to the edge-cloud and become unstable. To avoid connectivity loss, we proposed a framework that identifies the position of coverage hole using a Support- Vector Machine (SVM) classifier model and constructs a binary coverage hole map incorporating the AGV trajectory re-planning to avoid the identified coverage hole. The AGV's re-planned trajectory is optimized and selected to avoid coverage hole the shortest coverage-hole-free trajectory. We further investigated the look-ahead time's impact on the AGV's re-planned trajectory performance. The results reveal that an AGV's re-planned trajectory can be shorter and further optimized if the coverage hole position is known ahead of time
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Adaptive 3D Geometry-based Stochastic Channel Prediction for 3D DL Selection
Authors:
Mervat Zarour,
Qiuheng Zhou,
Sergiy Melnyk,
Hans D. Schotten
Abstract:
This paper addresses the challenges of mobile user requirements in shadowing and multi-fading environments, focusing on the Downlink (DL) radio node selection based on Uplink (UL) channel estimation. One of the key issues tackled in this research is the prediction performance in scenarios where estimated channels are integrated. An adaptive deep learning approach is proposed to improve performance…
▽ More
This paper addresses the challenges of mobile user requirements in shadowing and multi-fading environments, focusing on the Downlink (DL) radio node selection based on Uplink (UL) channel estimation. One of the key issues tackled in this research is the prediction performance in scenarios where estimated channels are integrated. An adaptive deep learning approach is proposed to improve performance, offering a compelling alternative to traditional interpolation techniques for air-to-ground link selection on demand. Moreover, our study considers a 3D channel model, which provides a more realistic and accurate representation than 2D models, particularly in the context of 3D network node distributions. This consideration becomes crucial in addressing the complex multipath fading effects within geometric stochastic 3D 3GPP channel models in urban environments. Furthermore, our research emphasises the need for adaptive prediction mechanisms that carefully balance the trade-off between DL link forecasted frequency response accuracy and the complexity requirements associated with estimation and prediction. This paper contributes to advancing 3D radio resource management by addressing these challenges, enabling more efficient and reliable communication for energy-constrained flying network nodes in dynamic environments.
△ Less
Submitted 9 January, 2024; v1 submitted 7 November, 2023;
originally announced November 2023.
-
Terahertz-Enpowered Communications and Sensing in 6G Systems: Opportunities and Challenges
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
The current focus of academia and the telecommunications industry has been shifted to the development of the six-generation (6G) cellular technology, also formally referred to as IMT-2030. Unprecedented applications that 6G aims to accommodate demand extreme communications performance and, in addition, disruptive capabilities such as network sensing. Recently, there has been a surge of interest in…
▽ More
The current focus of academia and the telecommunications industry has been shifted to the development of the six-generation (6G) cellular technology, also formally referred to as IMT-2030. Unprecedented applications that 6G aims to accommodate demand extreme communications performance and, in addition, disruptive capabilities such as network sensing. Recently, there has been a surge of interest in terahertz (THz) frequencies as it offers not only massive spectral resources for communication but also distinct advantages in sensing, positioning, and imaging. The aim of this paper is to provide a brief outlook on opportunities opened by this under-exploited band and challenges that must be addressed to materialize the potential of THz-based communications and sensing in 6G systems.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
6G Underlayer Network Concepts for Ultra Reliable and Low Latency Communication in Manufacturing
Authors:
Daniel Lindenschmitt,
Jan Mertes,
Christian Schellenberger,
Marius Schmitz,
Bin Han,
Jan C. Aurich,
Hans D. Schotten
Abstract:
Underlayer networks in the context of 6G for manufacturing are crucial. They address the evolving needs of highly interconnected and autonomous systems in industry. The digitalization of manufacturing processes, driven by the Internet of Things and increased data availability, enables more efficient and demand-driven production. However, wireless connectivity, which offers flexibility and easy int…
▽ More
Underlayer networks in the context of 6G for manufacturing are crucial. They address the evolving needs of highly interconnected and autonomous systems in industry. The digitalization of manufacturing processes, driven by the Internet of Things and increased data availability, enables more efficient and demand-driven production. However, wireless connectivity, which offers flexibility and easy integration of components, comes with challenges such as signal interference or high latency. A new management system is needed to coordinate and route traffic of multiple networks in a specific coverage area. This paper proposes underlayer networks designed for manufacturing, providing low latency, reliability, and security. These networks enable wireless connectivity and integration of wireless technologies into the manufacturing environment, enhancing flexibility and efficiency. The paper also discusses network slicing, spectrum sharing, and the limitations of current wireless networks in manufacturing. It introduces a network concept for underlayer networks and evaluates its application in closed-loop communication for machine tools. The study concludes with future research prospects in this area.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
Opportunistic Reflection in Reconfigurable Intelligent Surface-Assisted Wireless Networks
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
This paper focuses on multiple-access protocol design in a wireless network assisted by multiple reconfigurable intelligent surfaces (RISs). By extending the existing approaches in single-user or single-RIS cases, we present two benchmark schemes for this multi-user multi-RIS scenario. Inspecting their shortcomings, a simple but efficient method coined opportunistic multi-user reflection (OMUR) is…
▽ More
This paper focuses on multiple-access protocol design in a wireless network assisted by multiple reconfigurable intelligent surfaces (RISs). By extending the existing approaches in single-user or single-RIS cases, we present two benchmark schemes for this multi-user multi-RIS scenario. Inspecting their shortcomings, a simple but efficient method coined opportunistic multi-user reflection (OMUR) is proposed. The key idea is to opportunistically select the best user as the anchor for optimizing the RISs, and non-orthogonally transmitting all users' signals simultaneously. A simplified version of OMUR exploiting random phase shifts is also proposed to avoid the complexity of RIS channel estimation.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
A Simple Multiple-Access Design for Reconfigurable Intelligent Surface-Aided Systems
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
This paper focuses on the design of transmission methods and reflection optimization for a wireless system assisted by a single or multiple reconfigurable intelligent surfaces (RISs). The existing techniques are either too complex to implement in practical systems or too inefficient to achieve high performance. To overcome the shortcomings of the existing schemes, we propose a simple but efficient…
▽ More
This paper focuses on the design of transmission methods and reflection optimization for a wireless system assisted by a single or multiple reconfigurable intelligent surfaces (RISs). The existing techniques are either too complex to implement in practical systems or too inefficient to achieve high performance. To overcome the shortcomings of the existing schemes, we propose a simple but efficient approach based on \textit{opportunistic reflection} and \textit{non-orthogonal transmission}. The key idea is opportunistically selecting the best user that can reap the maximal gain from the optimally reflected signals via RIS. That is to say, only the channel state information of the best user is used for RIS reflection optimization, which can in turn lower complexity substantially. In addition, the second user is selected to superpose its signal on that of the primary user, where the benefits of non-orthogonal transmission, i.e., high system capacity and improved user fairness, are obtained. Additionally, a simplified variant exploiting random phase shifts is proposed to avoid the high overhead of RIS channel estimation.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
A Reliable and Resilient Framework for Multi-UAV Mutual Localization
Authors:
Zexin Fang,
Bin Han,
Hans D. Schotten
Abstract:
This paper presents a robust and secure framework for achieving accurate and reliable mutual localization in multiple unmanned aerial vehicle (UAV) systems. Challenges of accurate localization and security threats are addressed and corresponding solutions are brought forth and accessed in our paper with numerical simulations. The proposed solution incorporates two key components: the Mobility Adap…
▽ More
This paper presents a robust and secure framework for achieving accurate and reliable mutual localization in multiple unmanned aerial vehicle (UAV) systems. Challenges of accurate localization and security threats are addressed and corresponding solutions are brought forth and accessed in our paper with numerical simulations. The proposed solution incorporates two key components: the Mobility Adaptive Gradient Descent (MAGD) and Time-evolving Anomaly Detectio (TAD). The MAGD adapts the gradient descent algorithm to handle the configuration changes in the mutual localization system, ensuring accurate localization in dynamic scenarios. The TAD cooperates with reputation propagation (RP) scheme to detect and mitigate potential attacks by identifying UAVs with malicious data, enhancing the security and resilience of the mutual localization
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Considerations on the EMF Exposure Relating to the Next Generation Non-Terrestrial Networks
Authors:
Amina Fellan,
Ainur Daurembekova,
Hans D. Schotten
Abstract:
The emerging fifth generation (5G) and the upcoming sixth generation (6G) communication technologies introduce the use of space- and airborne networks in their architectures under the scope of non-terrestrial networks (NTNs). With this integration of satellite and aerial platform networks, better coverage, network flexibility and easier deployment can be achieved. Correspondingly, satellite broadb…
▽ More
The emerging fifth generation (5G) and the upcoming sixth generation (6G) communication technologies introduce the use of space- and airborne networks in their architectures under the scope of non-terrestrial networks (NTNs). With this integration of satellite and aerial platform networks, better coverage, network flexibility and easier deployment can be achieved. Correspondingly, satellite broadband internet providers have launched an increasing number of small satellites operating in low earth orbit (LEO). These recent developments imply an increased electromagnetic field (EMF) exposure to humans and the environment. In this work, we provide a short overview of the state of consumer-grade satellite networks including broadband satellites and future NTN services. We also consider the regulatory state governing their operation within the context of EMF exposure. Finally, we highlight the aspects that are relevant to the assessment of EMF exposure in relation to NTNs.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Evaluating the Impact of Numerology and Retransmission on 5G NR V2X Communication at A System-Level Simulation
Authors:
Donglin Wang,
Pranav Balasaheb Mohite,
Qiuheng Zhou,
Anjie Qiu,
Hans D. Schotten
Abstract:
In recent years, Vehicle-to-Everything (V2X) communication opens an ample amount of opportunities to increase the safety of drivers and passengers and improve traffic efficiency which enables direct communication between vehicles. The Third Generation Partnership Project (3GPP) has specified a 5G New Radio (NR) Sidelink (SL) PC5 interface for supporting Cellular V2X (C-V2X) communication in Releas…
▽ More
In recent years, Vehicle-to-Everything (V2X) communication opens an ample amount of opportunities to increase the safety of drivers and passengers and improve traffic efficiency which enables direct communication between vehicles. The Third Generation Partnership Project (3GPP) has specified a 5G New Radio (NR) Sidelink (SL) PC5 interface for supporting Cellular V2X (C-V2X) communication in Release 16 in 2017. 5G NR V2X communication is expected to provide high reliability, extra-low latency, and a high data rate for vehicular networks. In this paper, the newly introduced features of 5G NR standards like flexible numerology, variable Subcarrier Spacing (SCS), and allocated Physical Resource Blocks (PRBs) have been inspected in 5G NR V2X communications. Moreover, the 5G NR V2X data packet will be distributed to all nearby User Equipment (UE) by the Transmitter (Tx). However, there may be instances where certain UEs fail to receive the data packets in a single transmission. Unfortunately, the SL Tx lacks a feedback channel to verify if the Receivers (Rxs) have received the information. To meet the stringent reliability and latency requirements of C-V2X communication, we suggest and assess a retransmission scheme along with a scheme that incorporates varying resource allocations for retransmission in NR V2X communication. The effect of retransmission schemes on NR V2X communication systems has been detected.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.
-
Investigating the Impact of Variables on Handover Performance in 5G Ultra-Dense Networks
Authors:
Donglin Wang,
Anjie Qiu,
Qiuheng Zhou,
Sanket Partani,
Hans D. Schotten
Abstract:
The advent of 5G New Radio (NR) technology has revolutionized the landscape of wireless communication, offering various enhancements such as elevated system capacity, improved spectrum efficiency, and higher data transmission rates. To achieve these benefits, 5G has implemented the Ultra-Dense Network (UDN) architecture, characterized by the deployment of numerous small general Node B (gNB) units.…
▽ More
The advent of 5G New Radio (NR) technology has revolutionized the landscape of wireless communication, offering various enhancements such as elevated system capacity, improved spectrum efficiency, and higher data transmission rates. To achieve these benefits, 5G has implemented the Ultra-Dense Network (UDN) architecture, characterized by the deployment of numerous small general Node B (gNB) units. While this approach boosts system capacity and frequency reuse, it also raises concerns such as increased signal interference, longer handover times, and higher handover failure rates. To address these challenges, the critical factor of Time to Trigger (TTT) in handover management must be accurately determined. Furthermore, the density of gNBs has a significant impact on handover performance. This study provides a comprehensive analysis of 5G handover management. Through the development and utilization of a downlink system-level simulator, the effects of various TTT values and gNB densities on 5G handover were evaluated, taking into consideration the movement of Traffic Users (TUs) with varying velocities. Simulation results showed that the handover performance can be optimized by adjusting the TTT under different gNB densities, providing valuable insights into the proper selection of TTT, UDN, and TU velocity to enhance 5G handover performance.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.
-
Terahertz Communications and Sensing for 6G and Beyond: A Comprehensive Review
Authors:
Wei Jiang,
Qiuheng Zhou,
Jiguang He,
Mohammad Asif Habibi,
Sergiy Melnyk,
Mohammed El Absi,
Bin Han,
Marco Di Renzo,
Hans Dieter Schotten,
Fa-Long Luo,
Tarek S. El-Bawab,
Markku Juntti,
Merouane Debbah,
Victor C. M. Leung
Abstract:
Next-generation cellular technologies, commonly referred to as the 6G, are envisioned to support a higher system capacity, better performance, and network sensing capabilities. The THz band is one potential enabler to this end due to the large unused frequency bands and the high spatial resolution enabled by the short signal wavelength and large bandwidth. Different from earlier surveys, this pape…
▽ More
Next-generation cellular technologies, commonly referred to as the 6G, are envisioned to support a higher system capacity, better performance, and network sensing capabilities. The THz band is one potential enabler to this end due to the large unused frequency bands and the high spatial resolution enabled by the short signal wavelength and large bandwidth. Different from earlier surveys, this paper presents a comprehensive treatment and technology survey on THz communications and sensing in terms of advantages, applications, propagation characterization, channel modeling, measurement campaigns, antennas, transceiver devices, beamforming, networking, the integration of communications and sensing, and experimental testbeds. Starting from the motivation and use cases, we survey the development and historical perspective of THz communications and sensing with the anticipated 6G requirements. We explore the radio propagation, channel modeling, and measurement for the THz band. The transceiver requirements, architectures, technological challenges, and state-of-the-art approaches to compensate for the high propagation losses, including appropriate antenna design and beamforming solutions. We overview several related technologies that either are required by or are beneficial for THz systems and networks. The synergistic design of sensing and communications is explored in depth. Practical trials, demonstrations, and experiments are also summarized. The paper gives a holistic view of the current state of the art and highlights the open research challenges towards 6G and beyond.
△ Less
Submitted 6 May, 2024; v1 submitted 19 July, 2023;
originally announced July 2023.
-
JCAS-Enabled Sensing as a Service in 6th-Generation Mobile Communication Networks
Authors:
Christof A. O. Rauber,
Lukas Brechtel,
Hans D. Schotten
Abstract:
The introduction of new types of frequency spectrum in 6G technology facilitates the convergence of conventional mobile communications and radar functions. Thus, the mobile network itself becomes a versatile sensor system. This enables mobile network operators to offer a sensing service in addition to conventional data and telephony services. The potential benefits are expected to accrue to variou…
▽ More
The introduction of new types of frequency spectrum in 6G technology facilitates the convergence of conventional mobile communications and radar functions. Thus, the mobile network itself becomes a versatile sensor system. This enables mobile network operators to offer a sensing service in addition to conventional data and telephony services. The potential benefits are expected to accrue to various stakeholders, including individuals, the environment, and society in general. The paper discusses technological development, possible integration, and use cases, as well as future development areas.
△ Less
Submitted 21 July, 2023; v1 submitted 17 July, 2023;
originally announced July 2023.
-
A Secure and Robust Approach for Distance-Based Mutual Positioning of Unmanned Aerial Vehicles
Authors:
Bin Han,
Hans D. Schotten
Abstract:
Unmanned aerial vehicle (UAV) is becoming increasingly important in modern civilian and military applications. However, its novel use cases is bottlenecked by conventional satellite and terrestrial localization technologies, and calling for complementary solutions. Multi-UAV mutual positioning can be a potential answer, but its accuracy and security are challenged by inaccurate and/or malicious me…
▽ More
Unmanned aerial vehicle (UAV) is becoming increasingly important in modern civilian and military applications. However, its novel use cases is bottlenecked by conventional satellite and terrestrial localization technologies, and calling for complementary solutions. Multi-UAV mutual positioning can be a potential answer, but its accuracy and security are challenged by inaccurate and/or malicious measurements. This paper proposes a novel, robust, and secure approach to address these issues.
△ Less
Submitted 9 January, 2024; v1 submitted 19 May, 2023;
originally announced May 2023.
-
Full-Spectrum Wireless Communications for 6G and Beyond: From Microwave, Millimeter-Wave, Terahertz to Lightwave
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
As of today, 5G is rolling out across the world, but academia and industry have shifted their attention to the sixth generation (6G) cellular technology for a full-digitalized, intelligent society in 2030 and beyond. 6G demands far more bandwidth to support extreme performance, exacerbating the problem of spectrum shortage in mobile communications. In this context, this paper proposes a novel conc…
▽ More
As of today, 5G is rolling out across the world, but academia and industry have shifted their attention to the sixth generation (6G) cellular technology for a full-digitalized, intelligent society in 2030 and beyond. 6G demands far more bandwidth to support extreme performance, exacerbating the problem of spectrum shortage in mobile communications. In this context, this paper proposes a novel concept coined Full-Spectrum Wireless Communications (FSWC). It makes use of all communication-feasible spectral resources over the whole electromagnetic (EW) spectrum, from microwave, millimeter wave, terahertz (THz), infrared light, visible light, to ultraviolet light. FSWC not only provides sufficient bandwidth but also enables new paradigms taking advantage of peculiarities on different EW bands. This paper will define FSWC, justify its necessity for 6G, and then discuss the opportunities and challenges of exploiting THz and optical bands.
△ Less
Submitted 11 May, 2023;
originally announced May 2023.
-
Leveraging 5G private networks, UAVs and robots to detect and combat broad-leaved dock (Rumex obtusifolius) in feed production
Authors:
Christian Schellenberger,
Christopher Hobelsberger,
Bastian Kolb-Grunder,
Florian Herrmann,
Hans D. Schotten
Abstract:
In this paper an autonomous system to detect and combat Rumex obtusifolius leveraging autonomous unmanned aerial vehicles (UAV), small autonomous sprayer robots and 5G SA connectivity is presented. Rumex obtusifolius is a plant found on grassland that drains nutrients from surrounding plants and has lower nutritive value than the surrounding grass. High concentrations of it have to be combated in…
▽ More
In this paper an autonomous system to detect and combat Rumex obtusifolius leveraging autonomous unmanned aerial vehicles (UAV), small autonomous sprayer robots and 5G SA connectivity is presented. Rumex obtusifolius is a plant found on grassland that drains nutrients from surrounding plants and has lower nutritive value than the surrounding grass. High concentrations of it have to be combated in order to use the grass as feed for livestock. One or more UAV are controlled through 5G to survey the current working area and send back high-definition photos of the ground to an edge cloud server. There an AI algorithm using neural networks detects the Rumex obtusifolius and calculates its position using the UAVs position data. When plants are detected an optimal path is calculated and sent via 5G to the sprayer robot to get to them in minimal time. It will then move to the position of the broad-leafed dock and use an on-board camera and the edge cloud to verify the position of the plant and precisely spray crop protection only where the target plant is. The spraying robot and UAV are already operational, the training of the detection algorithm is still ongoing. The described system is being tested with a fixed private 5G SA network and a nomadic 5G SA network as public cellular networks are not performant enough in regards to low latency and upload bandwidth.
△ Less
Submitted 30 April, 2023;
originally announced May 2023.
-
Non-Orthogonal Multiplexing in the FBL Regime Enhances Physical Layer Security with Deception
Authors:
Bin Han,
Yao Zhu,
Anke Schmeink,
Hans D. Schotten
Abstract:
We propose a new security framework for physical layer security (PLS) in the finite blocklength (FBL) regime that incorporates deception technology, allowing for active countermeasures against potential eavesdroppers. Using a symmetric block cipher and power-domain non-orthogonal multiplexing (NOM), our approach is able to achieve high secured reliability while effectively deceiving the eavesdropp…
▽ More
We propose a new security framework for physical layer security (PLS) in the finite blocklength (FBL) regime that incorporates deception technology, allowing for active countermeasures against potential eavesdroppers. Using a symmetric block cipher and power-domain non-orthogonal multiplexing (NOM), our approach is able to achieve high secured reliability while effectively deceiving the eavesdropper, and can benefit from increased transmission power. This work represents a promising direction for future research in PLS with deception technology.
△ Less
Submitted 20 July, 2023; v1 submitted 13 April, 2023;
originally announced April 2023.
-
Cell-Edge Performance Booster in 6G: Cell-Free Massive MIMO vs. Reconfigurable Intelligent Surface
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
User experience in mobile communications is vulnerable to worse quality at the cell edge, which cannot be compensated by enjoying excellent service at the cell center, according to the principle of risk aversion in behavioral economics. Constrained by weak signal strength and substantial inter-cell interference, the cell edge is always a major bottleneck of any mobile network. Due to their possibi…
▽ More
User experience in mobile communications is vulnerable to worse quality at the cell edge, which cannot be compensated by enjoying excellent service at the cell center, according to the principle of risk aversion in behavioral economics. Constrained by weak signal strength and substantial inter-cell interference, the cell edge is always a major bottleneck of any mobile network. Due to their possibility for empowering the next-generation mobile system, reconfigurable intelligent surface (RIS) and cell-free massive MIMO (CFmMIMO) have recently attracted a lot of focus from academia and industry. In addition to a variety of technological advantages, both are highly potential to boost cell-edge performance. To the authors' best knowledge, a performance comparison of RIS and CFmMIMO, especially on the cell edge, is still missing in the literature. To fill this gap, this paper establishes a fair scenario and demonstrates extensive numerical results to clarify their behaviors at the cell edge.
△ Less
Submitted 7 April, 2023;
originally announced April 2023.
-
Effect of Variable Physical Numerologies on Link-Level Performance of 5G NR V2X
Authors:
Donglin Wang,
Oneza Saraci,
Raja R. Sattiraju,
Qiuheng Zhou,
Hans D. Schotten
Abstract:
With technology and societal development, the 5th generation wireless communication (5G) contributes significantly to different societies like industries or academies. Vehicle-to-Everything (V2X) communication technology has been one of the leading services for 5G which has been applied in vehicles. It is used to exchange their status information with other traffic and traffic participants to incr…
▽ More
With technology and societal development, the 5th generation wireless communication (5G) contributes significantly to different societies like industries or academies. Vehicle-to-Everything (V2X) communication technology has been one of the leading services for 5G which has been applied in vehicles. It is used to exchange their status information with other traffic and traffic participants to increase traffic safety and efficiency. Cellular-V2X (C-V2X) is one of the emerging technologies to enable V2X communications. The first Long-Term Evolution (LTE) based C-V2X was released on the 3rd Generation Partnership Project (3GPP) standard. 3GPP is working towards the development of New Radio (NR) systems that it is called 5G NR V2X. One single numerology in LTE cannot satisfy most performance requirements because of the variety of deployment options and scenarios. For this reason, in order to meet the diverse requirements, the 5G NR Physical Layer (PHY) is designed to provide a highly flexible framework. Scalable Orthogonal Frequency-Division Multiplexing (OFDM) numerologies make flexibility possible. The term numerology refers to the PHY waveform parametrization and allows different Subcarrier Spacings (SCSs), symbols, and slot duration. This paper implements the Link-Level (LL) simulations of LTE C-V2X communication and 5G NR V2X communication where simulation results are used to compare similarities and differences between LTE and 5G NR. We detect the effect of variable PHY Numerologies of 5G NR on the LL performance of V2X. The simulation results show that the performance of 5G NR improved by using variable numerologies.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
User Scheduling and Passive Beamforming for FDMA/OFDMA in Intelligent Reflection Surface
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Most prior works on intelligent reflecting surface (IRS) merely consider point-to-point communications, including a single user, for ease of analysis. Nevertheless, a practical wireless system needs to accommodate multiple users simultaneously. Due to the lack of frequency-selective reflection, namely the set of phase shifts cannot be different across frequency subchannels, the integration of IRS…
▽ More
Most prior works on intelligent reflecting surface (IRS) merely consider point-to-point communications, including a single user, for ease of analysis. Nevertheless, a practical wireless system needs to accommodate multiple users simultaneously. Due to the lack of frequency-selective reflection, namely the set of phase shifts cannot be different across frequency subchannels, the integration of IRS imposes a fundamental challenge to frequency-multiplexing approaches such as frequency-division multiple access (FDMA) and the widely adopted technique called orthogonal FDMA (OFDMA). It motivates us to study (O)FDMA-based multi-user IRS communications to clarify which user scheduling and passive beamforming are favorable under this non-frequency-selective reflection environment. Theoretical analysis and numerical evaluation reveal that (O)FDMA does not need user scheduling when there are a few users. If the number of users becomes large, neither user scheduling nor IRS reflection optimization is necessary. These findings help substantially simplify the design of (O)FDMA-based IRS communications.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
User Selection for Simple Passive Beamforming in Multi-RIS-Aided Multi-User Communications
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
This paper focuses on multi-user downlink signal transmission in a wireless system aided by multiple reconfigurable intelligent surfaces (RISs). In such a multi-RIS, multi-user, multi-antenna scenario, determining a set of RIS phase shifts to maximize the sum throughput becomes intractable. Hence, we propose a novel scheme that can substantially simplify the optimization of passive beamforming. By…
▽ More
This paper focuses on multi-user downlink signal transmission in a wireless system aided by multiple reconfigurable intelligent surfaces (RISs). In such a multi-RIS, multi-user, multi-antenna scenario, determining a set of RIS phase shifts to maximize the sum throughput becomes intractable. Hence, we propose a novel scheme that can substantially simplify the optimization of passive beamforming. By opportunistically selecting a user with the best channel condition as the only active transmitter in the system, it degrades to single-user passive beamforming, where two methods, i.e., joint optimization based on the semidefinite relaxation approach and alternating optimization, are applicable. The superiority of the proposed scheme is demonstrated through Monte-Carlo simulations.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Capacity Analysis and Rate Maximization Design in RIS-Aided Uplink Multi-User MIMO
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Reconfigurable intelligent surface (RIS) has recently drawn intensive attention due to its potential of simultaneously realizing high spectral and energy efficiency in a sustainable way. This paper focuses on the design of efficient transmission methods to maximize the uplink sum throughput in a RIS-aided multi-user multi-input multi-output (MU-MIMO) system. To provide an insightful basis, the cha…
▽ More
Reconfigurable intelligent surface (RIS) has recently drawn intensive attention due to its potential of simultaneously realizing high spectral and energy efficiency in a sustainable way. This paper focuses on the design of efficient transmission methods to maximize the uplink sum throughput in a RIS-aided multi-user multi-input multi-output (MU-MIMO) system. To provide an insightful basis, the channel capacity of RIS-aided MU-MIMO is theoretically analyzed. Then, the conventional transmission schemes based on orthogonal multiple access are presented as the baseline. From the information-theoretic perspective, we propose two novel schemes, i.e., \textit{joint transmission} based on the semidefinite relaxation of quadratic optimization problems and \textit{opportunistic transmission} relying on the best user selection. The superiority of the proposed schemes over the conventional ones in terms of achievable rates is justified through simulation results.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Orthogonal and Non-Orthogonal Multiple Access for Intelligent Reflection Surface in 6G Systems
Authors:
Wei Jiang,
Hans Schotten
Abstract:
Intelligent reflecting surface (IRS) is envisioned to become a key technology for the upcoming six-generation (6G) wireless system due to its potential of rea** high performance in a power-efficient and cost-efficient way. With its disruptive capability and hardware constraint, the integration of IRS imposes some fundamental particularities on the coordination of multi-user signal transmission.…
▽ More
Intelligent reflecting surface (IRS) is envisioned to become a key technology for the upcoming six-generation (6G) wireless system due to its potential of rea** high performance in a power-efficient and cost-efficient way. With its disruptive capability and hardware constraint, the integration of IRS imposes some fundamental particularities on the coordination of multi-user signal transmission. Consequently, the conventional orthogonal and non-orthogonal multiple-access schemes are hard to directly apply because of the joint optimization of active beamforming at the base station and passive reflection at the IRS. Relying on an alternating optimization method, we develop novel schemes for efficient multiple access in IRS-aided multi-user multi-antenna systems in this paper. Achievable performance in terms of the sum spectral efficiency is theoretically analyzed. A comprehensive comparison of different schemes and configurations is conducted through Monte-Carlo simulations to clarify which scheme is favorable for this emerging 6G paradigm.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Intelligent reflecting surface (IRS) has recently received much attention from the research community due to its potential to achieve high spectral and power efficiency cost-effectively. In addition to traditional cellular networks, the use of IRS in vehicular networks is also considered. Prior works on IRS-aided vehicle-to-everything communications focus on deploying reflection surfaces on the fa…
▽ More
Intelligent reflecting surface (IRS) has recently received much attention from the research community due to its potential to achieve high spectral and power efficiency cost-effectively. In addition to traditional cellular networks, the use of IRS in vehicular networks is also considered. Prior works on IRS-aided vehicle-to-everything communications focus on deploying reflection surfaces on the facades of buildings along the road for sidelink performance enhancement. This paper goes beyond the state of the art by presenting a novel paradigm coined Intelligent Reflecting Vehicle Surface (IRVS). It embeds a massive number of reflection elements on vehicles' surfaces to aid moving vehicular networks in military and emergency communications. We propose an alternative optimization method to optimize jointly active beamforming at the base station and passive reflection across multiple randomly-distributed vehicle surfaces. Performance evaluation in terms of sum spectral efficiency under continuous, discrete, and random phase shifts is conducted. Numerical results reveal that IRVS can substantially improve the capacity of a moving vehicular network.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Multi-User Reconfigurable Intelligent Surface-Aided Communications Under Discrete Phase Shifts
Authors:
Wei Jiang,
Hans Dieter Schotten
Abstract:
This paper focuses on studying orthogonal and non-orthogonal multiple access in intelligent reflecting surface (IRS)-aided systems. Unlike most prior works assuming continuous phase shifts, we employ the practical setup where only a finite number of discrete phase shifts are available. To maximize the sum rate, active beamforming and discrete reflection need to be jointly optimized. We therefore p…
▽ More
This paper focuses on studying orthogonal and non-orthogonal multiple access in intelligent reflecting surface (IRS)-aided systems. Unlike most prior works assuming continuous phase shifts, we employ the practical setup where only a finite number of discrete phase shifts are available. To maximize the sum rate, active beamforming and discrete reflection need to be jointly optimized. We therefore propose an alternative optimization method to get the optimal continuous phase shifts iteratively, and then quantize each phase shift to its nearest discrete value. The sum-rate maximization of different schemes is theoretically analyzed and numerically evaluated with different numbers of phase-control bits.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Overview of the Evaluation Methods for the Maximum EMF Exposure in 5G Networks
Authors:
Amina Fellan,
Hans D. Schotten
Abstract:
Instantaneous measurements of the electromagnetic field (EMF) strength do not reflect the maximum exposure levels possible in a given location. An extrapolation factor needs to be applied to the measurements before comparing them against the local exposure guidelines or recommendations for compliance evaluation. For the fifth generation (5G) networks, a standardized approach for extrapolating EMF…
▽ More
Instantaneous measurements of the electromagnetic field (EMF) strength do not reflect the maximum exposure levels possible in a given location. An extrapolation factor needs to be applied to the measurements before comparing them against the local exposure guidelines or recommendations for compliance evaluation. For the fifth generation (5G) networks, a standardized approach for extrapolating EMF values is yet to be defined. This work provides an overview of the state-of-the-art research that focuses on estimating the maximum EMF exposure caused by radiation from 5G base stations. It also considers current efforts by national and international organizations to establish standardized methods for extrapolating the EMF measurements which is necessary in investigating conformance with the EMF guidelines and regulations.
△ Less
Submitted 7 March, 2023;
originally announced March 2023.
-
Machine Learning for QoS Prediction in Vehicular Communication: Challenges and Solution Approaches
Authors:
Alexandros Palaios,
Christian L. Vielhaus,
Daniel F. Külzer,
Cara Watermann,
Rodrigo Hernangomez,
Sanket Partani,
Philipp Geuer,
Anton Krause,
Raja Sattiraju,
Martin Kasparick,
Gerhard Fettweis,
Frank H. P. Fitzek,
Hans D. Schotten,
Slawomir Stanczak
Abstract:
As cellular networks evolve towards the 6th generation, machine learning is seen as a key enabling technology to improve the capabilities of the network. Machine learning provides a methodology for predictive systems, which can make networks become proactive. This proactive behavior of the network can be leveraged to sustain, for example, a specific quality of service requirement. With predictive…
▽ More
As cellular networks evolve towards the 6th generation, machine learning is seen as a key enabling technology to improve the capabilities of the network. Machine learning provides a methodology for predictive systems, which can make networks become proactive. This proactive behavior of the network can be leveraged to sustain, for example, a specific quality of service requirement. With predictive quality of service, a wide variety of new use cases, both safety- and entertainment-related, are emerging, especially in the automotive sector. Therefore, in this work, we consider maximum throughput prediction enhancing, for example, streaming or high-definition map** applications. We discuss the entire machine learning workflow highlighting less regarded aspects such as the detailed sampling procedures, the in-depth analysis of the dataset characteristics, the effects of splits in the provided results, and the data availability. Reliable machine learning models need to face a lot of challenges during their lifecycle. We highlight how confidence can be built on machine learning technologies by better understanding the underlying characteristics of the collected data. We discuss feature engineering and the effects of different splits for the training processes, showcasing that random splits might overestimate performance by more than twofold. Moreover, we investigate diverse sets of input features, where network information proved to be most effective, cutting the error by half. Part of our contribution is the validation of multiple machine learning models within diverse scenarios. We also use explainable AI to show that machine learning can learn underlying principles of wireless networks without being explicitly programmed. Our data is collected from a deployed network that was under full control of the measurement team and covered different vehicular scenarios and radio environments.
△ Less
Submitted 22 August, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Mitigating Unnecessary Handovers in Ultra-Dense Networks through Machine Learning-based Mobility Prediction
Authors:
Donglin Wang,
Anjie Qiu,
Sanket Partani,
Qiuheng Zhou,
Hans D. Schotten
Abstract:
In 5G wireless communication, Intelligent Transportation Systems (ITS) and automobile applications, such as autonomous driving, are widely examined. These applications have strict requirements and often require high Quality of Service (QoS). In an urban setting, Ultra-Dense Networks (UDNs) have the potential to not only provide optimal QoS but also increase system capacity and frequency reuse. How…
▽ More
In 5G wireless communication, Intelligent Transportation Systems (ITS) and automobile applications, such as autonomous driving, are widely examined. These applications have strict requirements and often require high Quality of Service (QoS). In an urban setting, Ultra-Dense Networks (UDNs) have the potential to not only provide optimal QoS but also increase system capacity and frequency reuse. However, the current architecture of 5G UDN of dense Small Cell Nodes (SCNs) deployment prompts increased delay, handover times, and handover failures. In this paper, we propose a Machine Learning (ML) supported Mobility Prediction (MP) strategy to predict future Vehicle User Equipment (VUE) mobility and handover locations. The primary aim of the proposed methodology is to minimize Unnecessary Handover (UHO) while ensuring VUEs take full advantage of the deployed UDN. We evaluate and validate our approach on a downlink system-level simulator. We predict mobility using Support Vector Machine (SVM), Decision Tree Classifier (DTC), and Random Forest Classifier (RFC). The simulation results show an average reduction of 30% in handover times by utilizing ML-based MP, with RFC showing the most reduction up to 70% in some cases.
△ Less
Submitted 23 February, 2023;
originally announced February 2023.
-
Evaluating Deception and Moving Target Defense with Network Attack Simulation
Authors:
Daniel Reti,
Karina Elzer,
Daniel Fraunholz,
Daniel Schneider,
Hans-Dieter Schotten
Abstract:
In the field of network security, with the ongoing arms race between attackers, seeking new vulnerabilities to bypass defense mechanisms and defenders reinforcing their prevention, detection and response strategies, the novel concept of cyber deception has emerged. Starting from the well-known example of honeypots, many other deception strategies have been developed such as honeytokens and moving…
▽ More
In the field of network security, with the ongoing arms race between attackers, seeking new vulnerabilities to bypass defense mechanisms and defenders reinforcing their prevention, detection and response strategies, the novel concept of cyber deception has emerged. Starting from the well-known example of honeypots, many other deception strategies have been developed such as honeytokens and moving target defense, all sharing the objective of creating uncertainty for attackers and increasing the chance for the attacker of making mistakes. In this paper a methodology to evaluate the effectiveness of honeypots and moving target defense in a network is presented. This methodology allows to quantitatively measure the effectiveness in a simulation environment, allowing to make recommendations on how many honeypots to deploy and on how quickly network addresses have to be mutated to effectively disrupt an attack in multiple network and attacker configurations. With this optimum, attacks can be detected and slowed down with a minimal resource and configuration overhead. With the provided methodology, the optimal number of honeypots to be deployed and the optimal network address mutation interval can be determined. Furthermore, this work provides guidance on how to optimally deploy and configure them with respect to the attacker model and several network parameters.
△ Less
Submitted 25 January, 2023;
originally announced January 2023.
-
SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation
Authors:
Daniel Reti,
Karina Elzer,
Hans Dieter Schotten
Abstract:
Every attack begins with gathering information about the target. The entry point for network breaches are often vulnerabilities in internet facing websites, which often rely on an off-the-shelf Content Management System (CMS). Bot networks and human attackers alike rely on automated scanners to gather information about the CMS software installed and potential vulnerabilities. To increase the secur…
▽ More
Every attack begins with gathering information about the target. The entry point for network breaches are often vulnerabilities in internet facing websites, which often rely on an off-the-shelf Content Management System (CMS). Bot networks and human attackers alike rely on automated scanners to gather information about the CMS software installed and potential vulnerabilities. To increase the security of websites using a CMS, it is desirable to make the use of CMS scanners less reliable. The aim of this work is to extend the current knowledge about cyber deception in regard to CMS. To demonstrate this, a WordPress Plugin called 'SCANTRAP' was created, which uses simulation and dissimulation in regards to plugins, themes, versions, and users. We found that the resulting plugin is capable of obfuscating real information and to a certain extent inject false information to the output of one of the most popular WordPress scanners, WPScan, without limiting the legitimate functionality of the WordPress installation.
△ Less
Submitted 25 January, 2023;
originally announced January 2023.
-
Resource Allocation with Stability Constraints of an Edge-cloud controlled AGV
Authors:
Shreya Tayade,
Peter Rost,
Andreas Maeder,
Hans Schotten
Abstract:
The paper proposes Resource Allocation (RA) schemes for a closed loop feedback control system by analysing the control-communication dependencies. We consider an Automated Guided Vehicle (AGV) that communicates with a controller located in an edge-cloud over a wireless fading channel. The control commands are transmitted to an AGV and the position state is feedback to the controller at every time-…
▽ More
The paper proposes Resource Allocation (RA) schemes for a closed loop feedback control system by analysing the control-communication dependencies. We consider an Automated Guided Vehicle (AGV) that communicates with a controller located in an edge-cloud over a wireless fading channel. The control commands are transmitted to an AGV and the position state is feedback to the controller at every time-instant. A control stability based scheduling metric 'Probability of Instability' is evaluated for the resource allocation. The performance of stability based RA scheme is compared with the maximum SNR based RA scheme and control error first approach in an overloaded and non-overloaded scenario. The RA scheme with the stability constraints significantly reduces the resource utilization and is able to schedule more number of AGVs while maintaining its stability. Moreover, the proposed RA scheme is independent of control state and depends upon consecutive packet errors, the control parameters like sampling time and AGV velocity. Furthermore, we also analyse the impact of RA schemes on the AGV's stability and error performance, and evaluated the number of unstable AGVs.
△ Less
Submitted 23 January, 2023;
originally announced January 2023.
-
The Effect of Variable Factors on the Handover Performance for Ultra Dense Network
Authors:
Donglin Wang,
Anjie Qiu,
Qiuheng Zhou,
Sanket Partani,
Hans D. Schotten
Abstract:
With wireless communication technology development, the 5G New Radio (NR) has been proposed and developed for a decade. This advanced mobile communication technology has more advancements, such as higher system capacity, higher spectrum efficiency, higher data rates, and so on. In 5G, Ultra- Dense Network (UDN) is deployed for increasing the system capacity and frequency reuse to meet high applica…
▽ More
With wireless communication technology development, the 5G New Radio (NR) has been proposed and developed for a decade. This advanced mobile communication technology has more advancements, such as higher system capacity, higher spectrum efficiency, higher data rates, and so on. In 5G, Ultra- Dense Network (UDN) is deployed for increasing the system capacity and frequency reuse to meet high application requirements. The architecture of 5G UDN is to realize the dense and flexible deployment of smaller general Node B (gNB). However, the increased capacity of applying UDN in 5G is anticipated at the cost of increased signal interference, increased handover times, and increased handover failures. The Time to Trigger (TTT) is one of the most important factors in handover frequency which is deserved to be detected. Moreover, the density of the 5G gNBs influences the handover times and performance as well. In this work, we provide a compendium of 5G handover management. A downlink system-level simulator for 5G handover is built and utilized to evaluate the effect of different TTT values and densities of gNBs on the 5G handover. In addition, different velocities of Traffic Users (TUs) have been applied to the simulation system. From the simulation results, the handover performance has been analyzed and optimized by applying adjustable TTT under different densities of gNBs which will help people have a better understanding of the selection and effect of proper TTT, UDN, and different velocities of TUs on 5G handover performance.
△ Less
Submitted 19 January, 2023;
originally announced January 2023.