-
Self-Tuning Spectral Clustering for Adaptive Tracking Areas Design in 5G Ultra-Dense Networks
Authors:
Brahim Aamer,
Hatim Chergui,
Nouamane Chergui,
Kamel Tourki,
Mustapha Benjillali,
Christos Verikoukis,
Mérouane Debbah
Abstract:
In this paper, we address the issue of automatic tracking areas (TAs) planning in fifth generation (5G) ultra-dense networks (UDNs). By invoking handover (HO) attempts and measurement reports (MRs) statistics of a 4G live network, we first introduce a new kernel function map** HO attempts, MRs and inter-site distances (ISDs) into the so-called similarity weight. The corresponding matrix is then…
▽ More
In this paper, we address the issue of automatic tracking areas (TAs) planning in fifth generation (5G) ultra-dense networks (UDNs). By invoking handover (HO) attempts and measurement reports (MRs) statistics of a 4G live network, we first introduce a new kernel function map** HO attempts, MRs and inter-site distances (ISDs) into the so-called similarity weight. The corresponding matrix is then fed to a self-tuning spectral clustering (STSC) algorithm to automatically define the TAs number and borders. After evaluating its performance in terms of the $Q$-metric as well as the silhouette score for various kernel parameters, we show that the clustering scheme yields a significant reduction of tracking area updates and average paging requests per TA; optimizing thereby network resources.
△ Less
Submitted 4 February, 2019;
originally announced February 2019.
-
Classification Algorithms for Semi-Blind Uplink/Downlink Decoupling in sub-6 GHz/mmWave 5G Networks
Authors:
Hatim Chergui,
Kamel Tourki,
Redouane Lguensat,
Mustapha Benjillali,
Christos Verikoukis,
Mérouane Debbah
Abstract:
Reliability and latency challenges in future mixed sub-6 GHz/millimeter wave (mmWave) fifth generation (5G) cell-free massive multiple-input multiple-output (MIMO) networks is to guarantee a fast radio resource management in both uplink (UL) and downlink (DL), while tackling the corresponding propagation imbalance that may arise in blockage situations. In this context, we introduce a semi-blind UL…
▽ More
Reliability and latency challenges in future mixed sub-6 GHz/millimeter wave (mmWave) fifth generation (5G) cell-free massive multiple-input multiple-output (MIMO) networks is to guarantee a fast radio resource management in both uplink (UL) and downlink (DL), while tackling the corresponding propagation imbalance that may arise in blockage situations. In this context, we introduce a semi-blind UL/DL decoupling concept where, after its initial activation, the central processing unit (CPU) gathers measurements of the Rician $K$-factor---reflecting the line-of-sight (LOS) condition of the user equipment (UE)---as well as the DL reference signal receive power (RSRP) for both 2.6 GHz and 28 GHz frequency bands, and then train a non-linear support vector machine (SVM) algorithm. The CPU finally stops the measurements of mmWave definitely, and apply the trained SVM algorithm on the 2.6 GHz data to blindly predict the target frequencies and access points (APs) that can be independently used for the UL and DL. The accuracy score of the proposed classifier reaches $95\%$ for few training samples.
△ Less
Submitted 5 September, 2018;
originally announced September 2018.
-
Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers
Authors:
Ahmed El Shafie,
Asma Mabrouk,
Kamel Tourki,
Naofal Al-Dhahir,
Mazen O. Hasna
Abstract:
This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdrop** setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdrop** cluster…
▽ More
This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdrop** setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdrop** clusters, we consider artificial-noise-aided beamforming at the source node. Moreover, FD relay jamming is adopted to improve the system's security. To maintain secure communications against the untrusted relay node, a FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. Numerical results show that the optimal power allocation factor between data and artificial noise depends on the total number of antennas of the different colluding eavesdrop** clusters.
△ Less
Submitted 6 March, 2018;
originally announced March 2018.
-
Probabilistic Jamming/Eavesdrop** Attacks to Confuse a Buffer-Aided Transmitter-Receiver Pair
Authors:
Ahmed El Shafie,
Kamel Tourki,
Zhiguo Ding,
Naofal Al-Dhahir
Abstract:
We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper. We show that even without the need for an external energy source, the attacker can still degrade the security of the legitimate system. We show that the…
▽ More
We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper. We show that even without the need for an external energy source, the attacker can still degrade the security of the legitimate system. We show that the random data arrival behavior at the transmitter and the channel randomness of the legitimate link can improve the system's security. Moreover, we design a jamming scheme for the attacker and investigate its impact on the secure throughput of the legitimate system. The attacker designs his power splitting parameter and jamming/eavesdrop** probability based on the energy state of the attacker's battery to minimize the secure throughput of the legitimate system.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks
Authors:
Ahmed El Shafie,
Ahmed Sultan,
Asma Mabrouk,
Kamel Tourki,
Naofal Al-Dhahir
Abstract:
This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been…
▽ More
This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.
△ Less
Submitted 11 June, 2017;
originally announced June 2017.
-
Energy Efficiency in Cell-Free Massive MIMO with Zero-Forcing Precoding Design
Authors:
L. D. Nguyen,
T. Q. Duong,
H. Q. Ngo,
K. Tourki
Abstract:
We consider the downlink of a cell-free massive multiple-input multiple-output (MIMO) network where numerous distributed access points (APs) serve a smaller number of users under time division duplex operation. An important issue in deploying cell-free networks is high power consumption, which is proportional to the number of APs. This issue has raised the question as to their suitability for gree…
▽ More
We consider the downlink of a cell-free massive multiple-input multiple-output (MIMO) network where numerous distributed access points (APs) serve a smaller number of users under time division duplex operation. An important issue in deploying cell-free networks is high power consumption, which is proportional to the number of APs. This issue has raised the question as to their suitability for green communications in terms of the total energy efficiency (bits/Joule). To tackle this, we develop a novel low-complexity power control technique with zero-forcing precoding design to maximize the energy efficiency of cell-free massive MIMO taking into account the backhaul power consumption and the imperfect channel state information.
△ Less
Submitted 11 April, 2017;
originally announced April 2017.
-
An Artificial-Noise-Aided Hybrid TS/PS Scheme for OFDM-Based SWIPT Systems
Authors:
Ahmed El Shafie,
Kamel Tourki,
Naofal Al-Dhahir
Abstract:
We propose a new artificial-noise aided hybrid time-switching/power-splitting scheme for orthogonal frequency-division multiplexing (OFDM) systems to securely transmit data and transfer energy to a legitimate receiving node. In our proposed scheme, the cyclic prefix has two more benefits in addition to the cancellation of the inter-symbol interference between the OFDM blocks. Firstly, it enables t…
▽ More
We propose a new artificial-noise aided hybrid time-switching/power-splitting scheme for orthogonal frequency-division multiplexing (OFDM) systems to securely transmit data and transfer energy to a legitimate receiving node. In our proposed scheme, the cyclic prefix has two more benefits in addition to the cancellation of the inter-symbol interference between the OFDM blocks. Firstly, it enables the legitimate transmitter to send artificial-noise (AN) vectors in a way such that the interference can be canceled at the legitimate receiver prior to information decoding. Secondly, its power is used to energize the legitimate receiver. We optimize the cyclic prefix length, the time-switching and power-splitting parameters, and the power allocation ratio between the data and AN signals at the legitimate transmitter to maximize the average secrecy rate subject to a constraint on the average energy transfer rate at the legitimate receiver. Our numerical results demonstrate that our proposed scheme can achieve up to 23% average secrecy rate gain relative to a pure power-splitting scheme.
△ Less
Submitted 19 December, 2016;
originally announced December 2016.
-
Performance of Opportunistic Fixed Gain Bidirectional Relaying With Outdated CSI
Authors:
Fahd Ahmed Khan,
Kamel Tourki,
Mohamed-Slim Alouini,
Khalid A. Qaraqe
Abstract:
This paper studies the impact of using outdated channel state information for relay selection on the performance of a network where two sources communicate with each other via fixed-gain amplifyand- forward relays. For a Rayleigh faded channel, closed-form expressions for the outage probability, moment generating function and symbol error rate are derived. Simulations results are also presented to…
▽ More
This paper studies the impact of using outdated channel state information for relay selection on the performance of a network where two sources communicate with each other via fixed-gain amplifyand- forward relays. For a Rayleigh faded channel, closed-form expressions for the outage probability, moment generating function and symbol error rate are derived. Simulations results are also presented to corroborate the derived analytical results. It is shown that adding relays does not improve the performance if the channel is substantially outdated. Furthermore, relay location is also taken into consideration and it is shown that the performance can be improved by placing the relay closer to the source whose channel is more outdated.
△ Less
Submitted 25 May, 2013;
originally announced May 2013.
-
Accurate Performance Analysis of Opportunistic Decode-and-Forward Relaying
Authors:
Kamel Tourki,
Hong-Chuan Yang,
Mohamed-Slim Alouni
Abstract:
In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path can be considered unusable, and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We first derive statis…
▽ More
In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path can be considered unusable, and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We first derive statistics based on exact probability density function (PDF) of each hop. Then, the PDFs are used to determine accurate closed form expressions for end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation. Furthermore, we evaluate the asymptotical performance analysis and the diversity order is deduced. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures.
△ Less
Submitted 10 January, 2011;
originally announced January 2011.