Skip to main content

Showing 1–50 of 83 results for author: Stefanović, Č

Searching in archive cs. Search in all archives.
.
  1. Slotted Aloha for Optical Wireless Communications in Internet of Underwater Things

    Authors: Milica Petkovic, Sotiris A. Tegos, Panagiotis D. Diamantoulakis, Dejan Vukobratovic, Erdal Panayirci, Cedomir Stefanovic, George K. Karagiannidis

    Abstract: In this work, we design and analyse a Slotted ALOHA (SA) solution for Optical Wireless Communication (OWC)-based Internet of Underwater Things (IoUT). In the proposed system, user devices exchange data with an access point (AP) which exploits the capture effect. The space spanned by the IoUT nodes is three-dimensional, i.e., users are located in half-sphere centered at the AP placed at the bottom… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

    Comments: Published in: 2023 32nd Wireless and Optical Communications Conference (WOCC)

  2. arXiv:2311.13861  [pdf, other

    cs.NI eess.SP

    A Deep Reinforcement Learning Approach for Improving Age of Information in Mission-Critical IoT

    Authors: Hossam Farag, Mikael Gidlund, Cedomir Stefanovic

    Abstract: The emerging mission-critical Internet of Things (IoT) play a vital role in remote healthcare, haptic interaction, and industrial automation, where timely delivery of status updates is crucial. The Age of Information (AoI) is an effective metric to capture and evaluate information freshness at the destination. A system design based solely on the optimization of the average AoI might not be adequat… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

  3. arXiv:2311.13859  [pdf, other

    cs.NI

    A TETRA-based System for Remote-Health Monitoring of First Responders: Peak AoI Assessment in Direct and Trunked Mode

    Authors: Hossam Farag, Aleksandar Vujic, Milos Kostic, Goran Bijelic, Cedomir Stefanovic

    Abstract: In this paper, we study peak age of information (PAoI) performance of a novel IoT solution for remote health-monitoring of first responders over TErrestrial Trunked RAdio (TETRA) links. The solution features a set of sensors embedded in a smart garment that periodically record and send physiological parameters of first responders to a remote agent. The received data is analyzed by the remote agent… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

  4. arXiv:2311.13336  [pdf, other

    cs.NI

    On the Analysis of AoI-Reliability Tradeoff in Heterogeneous IIoT Networks

    Authors: Hossam Farag, Syed Muhammad Ali, Cedomir Stefanovic

    Abstract: Age of information (AoI) and reliability are two critical metrics to support real-time applications in Industrial Internet of Things (IIoT). These metrics reflect different concepts of timely delivery of sensor information. Monitoring traffic serves to maintain fresh status updates, expressed in a low AoI, which is important for proper control and actuation actions. On the other hand, safety-criti… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  5. arXiv:2311.13329  [pdf, other

    cs.NI eess.SP

    Timely and Efficient Information Delivery in Real-Time Industrial IoT Networks

    Authors: Hossam Farag, Dejan Vukobratovic, Andrea Munari, Cedomir Stefanovic

    Abstract: Enabling real-time communication in Industrial Internet of Things (IIoT) networks is crucial to support autonomous, self-organized and re-configurable industrial automation for Industry 4.0 and the forthcoming Industry 5.0. In this paper, we consider a SIC-assisted real-time IIoT network, in which sensor nodes generate reports according to an event-generation probability that is specific for the m… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  6. arXiv:2311.13325  [pdf, other

    cs.NI eess.SP

    AA-DL: AoI-Aware Deep Learning Approach for D2D-Assisted Industrial IoT

    Authors: Hossam Farag, Mohamed Ragab, Cedomir Stefanovic

    Abstract: In real-time Industrial Internet of Things (IIoT), e.g., monitoring and control scenarios, the freshness of data is crucial to maintain the system functionality and stability. In this paper, we propose an AoI-Aware Deep Learning (AA-DL) approach to minimize the Peak Age of Information (PAoI) in D2D-assisted IIoT networks. Particularly, we analyzed the success probability and the average PAoI via s… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  7. arXiv:2308.15158  [pdf, other

    cs.IT cs.NI

    An Advanced Tree Algorithm with Interference Cancellation in Uplink and Downlink

    Authors: Quirin Vogel, Yash Deshpande, Čedomir Stefanović, Wolfgang Kellerer

    Abstract: In this paper, we propose Advanced Tree-algorithm with Interference Cancellation (ATIC), a variant of binary tree-algorithm with successive interference cancellation (SICTA) introduced by Yu and Giannakis. ATIC assumes that Interference Cancellation (IC) can be performed both by the access point (AP), as in SICTA, but also by the users. Specifically, after every collision slot, the AP broadcasts t… ▽ More

    Submitted 22 November, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

    Comments: This paper was be presented at the ASILOMAR Conference on Signals, Systems, and Computers. Copyright IEEE 2023

  8. arXiv:2302.08145  [pdf, other

    math.PR cs.IT cs.NI

    Analysis of d-ary Tree Algorithms with Successive Interference Cancellation

    Authors: Quirin Vogel, Yash Deshpande, Cedomir Stefanović, Wolfgang Kellerer

    Abstract: In this article, we calculate the mean throughput, number of collisions, successes, and idle slots for random tree algorithms with successive interference cancellation. Except for the case of the throughput for the binary tree, all the results are new. We furthermore disprove the claim that only the binary tree maximises throughput. Our method works with many observables and can be used as a bluep… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

    Comments: 30 pages, 2 figures, comments welcome

    MSC Class: 68W40; 60J85 (Primary); 68W20; 60K20 (Secondary)

  9. arXiv:2208.04066  [pdf, other

    cs.IT

    On d-ary tree algorithms with successive interference cancellation

    Authors: Yash Deshpande, Cedomir Stefanovic, H. Murat Gürsu, Wolfgang Kellerer

    Abstract: In this paper, we outline the approach for the derivation of the length of the collision resolution interval for d-ary tree algorithms (TA) with gated access and successive interference cancellation (SIC), conditioned on the number of the contending users. This is the basic performance parameter for TA with gated access. We identify the deficiencies of the analysis performed in the seminal paper o… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

  10. arXiv:2207.13821  [pdf, other

    cs.NI cs.LG

    Multi-Objective Provisioning of Network Slices using Deep Reinforcement Learning

    Authors: Chien-Cheng Wu, Vasilis Friderikos, Cedomir Stefanovic

    Abstract: Network Slicing (NS) is crucial for efficiently enabling divergent network applications in next generation networks. Nonetheless, the complex Quality of Service (QoS) requirements and diverse heterogeneity in network services entails high computational time for Network Slice Provisioning (NSP) optimization. The legacy optimization methods are challenging to meet the low latency and high reliabilit… ▽ More

    Submitted 14 August, 2022; v1 submitted 27 July, 2022; originally announced July 2022.

  11. arXiv:2207.07703  [pdf, other

    cs.NI

    Distributed Backlog-Aware D2D Communication for Heterogeneous IIoT Applications

    Authors: Hossam Farag, Cedomir Stefanovic, Mikael Gidlund

    Abstract: Delay and Age-of-Information (AoI) are two crucial performance metrics for emerging time-sensitive applications in Industrial Internet of Things (IIoT). In order to achieve optimal performance, studying the inherent interplay between these two parameters in non-trivial task. In this work, we consider a Device-to-Device (D2D)-based heterogeneous IIoT network that supports two types of traffic flows… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  12. arXiv:2205.05314  [pdf, ps, other

    cs.NI

    Statistical Characterization of Closed-Loop Latency at the Mobile Edge

    Authors: Suraj Suman, Federico Chiariotti, Cedomir Stefanovic, Strahinja Dosen, Petar Popovski

    Abstract: The stringent timing and reliability requirements in mission-critical applications require a detailed statistical characterization of the latency. Teleoperation is a representative use case, in which a human operator (HO) remotely controls a robot by exchanging command and feedback signals. We present a framework to analyze the latency of a closed-loop teleoperation system consisting of three enti… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

    Comments: Submitted to IEEE Transactions on Communications

  13. arXiv:2205.02546  [pdf, other

    cs.NI cs.IT

    Slotted Aloha with Capture for OWC-based IoT: Finite Block-Length Performance Analysis

    Authors: Tijana Devaja, Milica Petkovic, Francisco J. Escribano, Cedomir Stefanovic, Dejan Vukobratovic

    Abstract: In this paper, we propose a Slotted ALOHA (SA)-inspired solution for an indoor optical wireless communication (OWC)-based Internet of Things (IoT) system. Assuming that the OWC receiver exploits the capture effect, we are interested in the derivation of error probability of decoding a short-length data packet originating from a randomly selected OWC IoT transmitter. The presented OWC system analys… ▽ More

    Submitted 16 November, 2022; v1 submitted 5 May, 2022; originally announced May 2022.

    Comments: Submitted

  14. arXiv:2202.09890  [pdf, ps, other

    cs.IT

    Deterministic Patterns for Multiple Access with Latency and Reliability Guarantees

    Authors: Radosław Kotaba, Roope Vehkalahti, Čedomir Stefanović, Olav Tirkkonen, Petar Popovski

    Abstract: We study a scenario in which multiple uncoordinated devices aim to achieve reliable transmissions within a given time frame. The devices are intermittently active and access a shared pool of channel resources in a grant-free manner by utilizing multiple transmissions (K-repetition coding). This allows them to achieve diversity and improve the reliability within a certain latency constraint. We foc… ▽ More

    Submitted 18 April, 2024; v1 submitted 20 February, 2022; originally announced February 2022.

  15. arXiv:2110.09995  [pdf, other

    cs.NI

    Design of AoI-Aware 5G Uplink Scheduler UsingReinforcement Learning

    Authors: Chien-Cheng Wu, Petar Popovski, Zheng-Hua Tan, Cedomir Stefanovic

    Abstract: Age of Information (AoI) reflects the time that is elapsed from the generation of a packet by a 5G user equipment(UE) to the reception of the packet by a controller. A design of an AoI-aware radio resource scheduler for UEs via reinforcement learning is proposed in this paper. In this paper, we consider a remote control environment in which a number of UEs are transmitting time-sensitive measureme… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

  16. arXiv:2108.13012  [pdf

    cs.NI cs.CY

    Arctic connectivity: A frugal approach to infrastructural development

    Authors: Mette Simonsen Abildgaard, Carina Ren, Israel Leyva-Mayorga, Cedomir Stefanovic, Beatriz Soret, Petar Popovski

    Abstract: As the Arctic is heating up, so are efforts to strengthen connectivity within the region, but also to enhance the connections from remote settlements to the global networks of trade as well as sociality. With global interest in the Arctic on the rise, it becomes increasingly relevant to ensure that investments in arctic infrastructure actually serve the people of the Arctic, while promoting indust… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: to be published in Arctic Journal, Arctic Institute of North America

  17. arXiv:2108.00906  [pdf, other

    cs.IT cs.NI

    Tree-Algorithms with Multi-Packet Reception and Successive Interference Cancellation

    Authors: Cedomir Stefanović, Yash Deshpande, H. Murat Gürsu, Wolfgang Kellerer

    Abstract: In this paper, we perform a thorough analysis of tree-algorithms with multi-packet reception (MPR) and successive interference cancellation (SIC), showing a number of novel results. We first derive the basic performance parameters, which are the expected length of the collision resolution interval and the normalized throughput, conditioned on the number of contending users. We then study their asy… ▽ More

    Submitted 10 August, 2022; v1 submitted 2 August, 2021; originally announced August 2021.

  18. arXiv:2107.07441  [pdf, other

    cs.IT cs.NI

    Reliability Analysis of Slotted Aloha with Capture for an OWC-based IoT system

    Authors: Milica Petkovic, Tijana Devaja, Dejan Vukobratovic, Francisco J. Escribano, Cedomir Stefanovic

    Abstract: In this article, we consider a random access scheme for an indoor Internet of Things (IoT) framework that uses optical wireless communication (OWC). We focus on a Slotted ALOHA (SA)-based solution where a number of OWC IoT users contend to send data to a central OWC receiver. In any given slot, and for a randomly selected active user, we consider the reliability of decoding the user's data packet… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

  19. arXiv:2106.09420  [pdf, other

    cs.NI

    Remote Health-Monitoring of First Responders over TETRA Links

    Authors: Hossam Farag, Aleksandar Vujic, Milos Kostic, Goran Bijelic, Cedomir Stefanovic

    Abstract: In this paper, we present a system for remote health-monitoring of first responders over TETRA radio links. The system features a smart garment that periodically records and sends physiological parameters of first responders to a remote agent, which processes the recordings and feeds back the health-status notifications and warnings in the form of electrotactile stimuli. The choice of TETRA as the… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

  20. arXiv:2105.09678  [pdf, other

    cs.NI

    Congestion-Aware Routing in Dynamic IoT Networks: A Reinforcement Learning Approach

    Authors: Hossam Farag, Cedomir Stefanovic

    Abstract: The innovative services empowered by the Internet of Things (IoT) require a seamless and reliable wireless infrastructure that enables communications within heterogeneous and dynamic low-power and lossy networks (LLNs). The Routing Protocol for LLNs (RPL) was designed to meet the communication requirements of a wide range of IoT application domains. However, a load balancing problem exists in RPL… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

  21. arXiv:2103.04092  [pdf, other

    cs.NI

    RAN Slicing Performance Trade-offs: Timing versus Throughput Requirements

    Authors: Federico Chiariotti, Israel Leyva-Mayorga, Čedomir Stefanović, Anders E. Kalør, Petar Popovski

    Abstract: The coexistence of diverse services with heterogeneous requirements is a fundamental feature of 5G. This necessitates efficient radio access network (RAN) slicing, defined as sharing of the wireless resources among diverse services while guaranteeing their respective throughput, timing, and/or reliability requirements. In this paper, we investigate RAN slicing for an uplink scenario in the form of… ▽ More

    Submitted 19 August, 2021; v1 submitted 6 March, 2021; originally announced March 2021.

    Comments: Submitted to IEEE Journal on Selected Areas in Communications

  22. arXiv:2010.15171  [pdf, other

    cs.IT cs.NI

    Slicing a single wireless collision channel among throughput- and timeliness-sensitive services

    Authors: Israel Leyva-Mayorga, Federico Chiariotti, Čedomir Stefanović, Anders E. Kalør, Petar Popovski

    Abstract: The fifth generation (5G) wireless system has a platform-driven approach, aiming to support heterogeneous connections with very diverse requirements. The shared wireless resources should be sliced in a way that each user perceives that its requirement has been met. Heterogeneity challenges the traditional notion of resource efficiency, as the resource usage has cater for, e.g. rate maximization fo… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Comments: Submitted to IEEE International Conference on Communications (ICC) 2021

  23. Analysis of Tree-Algorithms with Multi-Packet Reception

    Authors: Cedomir Stefanović, H. Murat Gürsu, Yash Deshpande, Wolfgang Kellerer

    Abstract: In this paper, we analyze binary-tree algorithms in a setup in which the receiver can perform multi-packet reception (MPR) of up to and including K packets simultaneously. The analysis addresses both traffic-independent performance as well as performance under Poisson arrivals. For the former case, we show that the throughput, when normalized with respect to the assumed linear increase in resource… ▽ More

    Submitted 4 February, 2021; v1 submitted 28 May, 2020; originally announced May 2020.

    Comments: Published in : GLOBECOM 2020 - 2020 IEEE Global Communications Conference

  24. arXiv:1907.06383  [pdf, other

    cs.IT

    Reliability-Latency Performance of Frameless ALOHA with and without Feedback

    Authors: Francisco Lázaro, Čedomir Stefanović, Petar Popovski

    Abstract: This paper presents a finite length analysis of multi-slot type frameless ALOHA based on a dynamic programming approach. The analysis is exact, but its evaluation is only feasible for moderate number of users due to the computational complexity. The analysis is then extended to derive continuous approximations of its key parameters, which, apart from providing an insight into the decoding process,… ▽ More

    Submitted 6 July, 2020; v1 submitted 15 July, 2019; originally announced July 2019.

    Comments: Accepted for publication in IEEE Transactions on Communications

  25. arXiv:1904.07069  [pdf, other

    cs.DC cs.NI

    Repeat-Authenticate Scheme for Multicasting of Blockchain Information in IoT Systems

    Authors: Pietro Danzi, Anders E. Kalør, Čedomir Stefanović, Petar Popovski

    Abstract: We study the problem of efficiently disseminating authenticated blockchain information from blockchain nodes (servers) to Internet of Things (IoT) devices, through a wireless base station (BS). In existing blockchain protocols, upon generation of a new block, each IoT device receives a copy of the block header, authenticated via digital signature by one or more trusted servers. Since it relies on… ▽ More

    Submitted 10 December, 2019; v1 submitted 15 April, 2019; originally announced April 2019.

    Comments: Paper submitted to IEEE Global Communications Conference 2019 - Workshop on Blockchain in Telecommunications

  26. arXiv:1903.01758  [pdf, other

    cs.DC cs.NI

    Communication Aspects of the Integration of Wireless IoT Devices with Distributed Ledger Technology

    Authors: Pietro Danzi, Anders E. Kalør, René B. Sørensen, Alexander K. Hagelskjær, Lam D. Nguyen, Čedomir Stefanović, Petar Popovski

    Abstract: The pervasive need to safely share and store information between devices calls for the replacement of centralized trust architectures with the decentralized ones. Distributed Ledger Technologies (DLTs) are seen as the most promising enabler of decentralized trust, but they still lack technological maturity and their successful adoption depends on the understanding of the fundamental design trade-o… ▽ More

    Submitted 5 March, 2019; originally announced March 2019.

  27. arXiv:1902.07933  [pdf, other

    cs.NI cs.IT

    On Throughput Maximization of Grant-Free Access with Reliability-Latency Constraints

    Authors: H. Murat Gürsu, Wolfgang Kellerer, Cedomir Stefanović

    Abstract: Enabling autonomous driving and industrial automation with wireless networks poses many challenges, which are typically abstracted through reliability and latency requirements. One of the main contributors to latency in cellular networks is the reservation-based access, which involves lengthy and resource-inefficient signaling exchanges. An alternative is to use grant-free access, in which there i… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

    Comments: Accepted for publication in ICC'2019

  28. arXiv:1810.06938  [pdf, other

    cs.IT cs.NI

    Wireless Access in Ultra-Reliable Low-Latency Communication (URLLC)

    Authors: Petar Popovski, Čedomir Stefanović, Jimmy J. Nielsen, Elisabeth de Carvalho, Marko Angjelichinoski, Kasper F. Trillingsgaard, Alexandru-Sabin Bana

    Abstract: The future connectivity landscape and, notably, the 5G wireless systems will feature Ultra-Reliable Low Latency Communication (URLLC). The coupling of high reliability and low latency requirements in URLLC use cases makes the wireless access design very challenging, in terms of both the protocol design and of the associated transmission techniques. This paper aims to provide a broad perspective on… ▽ More

    Submitted 16 October, 2018; originally announced October 2018.

    Comments: Invited paper, submitted for review

  29. arXiv:1807.07422  [pdf, other

    cs.DC cs.NI

    Delay and Communication Tradeoffs for Blockchain Systems with Lightweight IoT Clients

    Authors: Pietro Danzi, Anders E. Kalør, Čedomir Stefanović, Petar Popovski

    Abstract: The emerging blockchain protocols provide a decentralized architecture that is suitable of supporting Internet of Things (IoT) interactions. However, kee** a local copy of the blockchain ledger is infeasible for low-power and memory-constrained devices. For this reason, they are equipped with lightweight software implementations that only download the useful data structures, e.g. state of accoun… ▽ More

    Submitted 17 October, 2018; v1 submitted 19 July, 2018; originally announced July 2018.

    Comments: This paper has been submitted for publication

  30. arXiv:1807.05602  [pdf, other

    cs.IT

    Latency-Energy Tradeoff based on Channel Scheduling and Repetitions in NB-IoT Systems

    Authors: Amin Azari, Guowang Miao, Cedomir Stefanovic, Petar Popovski

    Abstract: Narrowband IoT (NB-IoT) is the latest IoT connectivity solution presented by the 3GPP. NB-IoT introduces coverage classes and introduces a significant link budget improvement by allowing repeated transmissions by nodes that experience high path loss. However, those repetitions necessarily increase the energy consumption and the latency in the whole NB-IoT system. The extent to which the whole syst… ▽ More

    Submitted 15 July, 2018; originally announced July 2018.

    Comments: IEEE Globecom 2018

  31. arXiv:1805.11482  [pdf, other

    cs.IT

    Enabling LTE RACH Collision Multiplicity Detection via Machine Learning

    Authors: Davide Magrin, Chiara Pielli, Cedomir Stefanovic, Michele Zorzi

    Abstract: The collision resolution mechanism in the Random Access Channel (RACH) procedure of the Long-Term Evolution (LTE) standard is known to represent a serious bottleneck in case of machine-type traffic. Its main drawbacks are seen in the facts that Base Stations (eNBs) typically cannot infer the number of collided User Equipments (UEs) and that collided UEs learn about the collision only implicitly, t… ▽ More

    Submitted 29 May, 2018; originally announced May 2018.

    Comments: Submitted to IEEE GLOBECOM 2018

  32. Sparse Signal Processing for Grant-Free Massive Connectivity: A Future Paradigm for Random Access Protocols in the Internet of Things

    Authors: Liang Liu, Erik G. Larsson, Wei Yu, Petar Popovski, Cedomir Stefanovic, Elisabeth De Carvalho

    Abstract: The next wave of wireless technologies will proliferate in connecting sensors, machines, and robots for myriad new applications, thereby creating the fabric for the Internet of Things (IoT). A generic scenario for IoT connectivity involves a massive number of machine-type connections. But in a typical application, only a small (unknown) subset of devices are active at any given instant, thus one o… ▽ More

    Submitted 18 July, 2018; v1 submitted 10 April, 2018; originally announced April 2018.

    Comments: to appear in IEEE Signal Processing Magazine, special issue on signal processing for Internet-of-Things

  33. arXiv:1804.01701  [pdf, other

    cs.IT

    Towards Massive Connectivity Support for Scalable mMTC Communications in 5G networks

    Authors: Carsten Bockelmann, Nuno K. Pratas, Gerhard Wunder, Stephan Saur, Monica Navarro, David Gregoratti, Guillaume Vivier, Elisabeth de Carvalho, Yalei Ji, Cedomir Stefanovic, Petar Popovski, Qi Wang, Malte Schellmann, Evangelos Kosmatos, Panagiotis Demestichas, Miruna Raceala-Motoc, Peter Jung, Slawomir Stanczak, Armin Dekorsy

    Abstract: The fifth generation of cellular communication systems is foreseen to enable a multitude of new applications and use cases with very different requirements. A new 5G multiservice air interface needs to enhance broadband performance as well as provide new levels of reliability, latency and supported number of users. In this paper we focus on the massive Machine Type Communications (mMTC) service wi… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  34. arXiv:1801.06357  [pdf, ps, other

    cs.IT

    On the Modeling and Performance Assessment of Random Access with SIC

    Authors: Alberto Mengali, Riccardo De Gaudenzi, Cedomir Stefanovic

    Abstract: In this paper, we review the key figures of merit to assess the performance of advanced random access (RA) schemes exploiting physical layer coding, repetitions and collision resolution techniques. We then investigate RA modeling aspects and their impact on the figures of merit for the exemplary advanced RA schemes: Contention Resolution Diversity Slotted ALOHA (CRDSA), Irregular Repetition Slotte… ▽ More

    Submitted 19 January, 2018; originally announced January 2018.

    Comments: To appear in IEEE Journal on Selected Areas in Communications - Special Issue on Advances in Satellite Communications

  35. Reliable Video Streaming over mmWave with Multi Connectivity and Network Coding

    Authors: Matteo Drago, Tommy Azzino, Michele Polese, Cedomir Stefanovic, Michele Zorzi

    Abstract: The next generation of multimedia applications will require the telecommunication networks to support a higher bitrate than today, in order to deliver virtual reality and ultra-high quality video content to the users. Most of the video content will be accessed from mobile devices, prompting the provision of very high data rates by next generation (5G) cellular networks. A possible enabler in this… ▽ More

    Submitted 5 February, 2018; v1 submitted 16 November, 2017; originally announced November 2017.

    Comments: To be presented at the 2018 IEEE International Conference on Computing, Networking and Communications (ICNC), March 2018, Maui, Hawaii, USA (invited paper). 6 pages, 4 figures

  36. arXiv:1711.00540  [pdf, ps, other

    cs.IT cs.CR

    Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices

    Authors: Pietro Danzi, Anders Ellersgaard Kalør, Čedomir Stefanović, Petar Popovski

    Abstract: Blockchain is a technology uniquely suited to support massive number of transactions and smart contracts within the Internet of Things (IoT) ecosystem, thanks to the decentralized accounting mechanism. In a blockchain network, the states of the accounts are stored and updated by the validator nodes, interconnected in a peer-to-peer fashion. IoT devices are characterized by relatively low computing… ▽ More

    Submitted 12 February, 2018; v1 submitted 1 November, 2017; originally announced November 2017.

    Comments: Paper accepted at IEEE International Conference on Communications (ICC) 2018

  37. arXiv:1710.02292  [pdf, ps, other

    cs.IT

    Asymptotic Performance of Coded Slotted ALOHA with Multi Packet Reception

    Authors: Cedomir Stefanovic, Enrico Paolini, Gianluigi Liva

    Abstract: In this letter, we develop a converse bound on the asymptotic load threshold of coded slotted ALOHA (CSA) schemes with K-multi packet reception capabilities at the receiver. Density evolution is used to track the average probability of packet segment loss and an area matching condition is applied to obtain the converse. For any given CSA rate, the converse normalized to K increases with K, which i… ▽ More

    Submitted 12 October, 2017; v1 submitted 6 October, 2017; originally announced October 2017.

    Comments: Accepted for publication in IEEE Communication Letters. Spotted typos corrected with respect to the previous version

  38. arXiv:1709.02179  [pdf, ps, other

    cs.IT

    Grant-Free Radio Access for Short-Packet Communications over 5G Networks

    Authors: Amin Azari, Petar Popovski, Guowang Miao, Cedomir Stefanovic

    Abstract: Radio access management plays a vital role in delay and energy consumption of connected devices. The radio access in existing cellular networks is unable to efficiently support massive connectivity, due to its signaling overhead. In this paper, we investigate an asynchronous grant-free narrowband data transmission protocol that aims to provide low energy consumption and delay, by relaxing the sync… ▽ More

    Submitted 7 September, 2017; originally announced September 2017.

    Comments: Accepted for presentation at IEEE Globecom 2017

  39. arXiv:1709.02177  [pdf, ps, other

    cs.IT

    Frameless ALOHA with Reliability-Latency Guarantees

    Authors: Cedomir Stefanovic, Francisco Lazaro, Petar Popovski

    Abstract: One of the novelties brought by 5G is that wireless system design has increasingly turned its focus on guaranteeing reliability and latency. This shifts the design objective of random access protocols from throughput optimization towards constraints based on reliability and latency. For this purpose, we use frameless ALOHA, which relies on successive interference cancellation (SIC), and derive its… ▽ More

    Submitted 7 September, 2017; originally announced September 2017.

    Comments: Accepted for presentation at IEEE Globecom 2017

  40. arXiv:1708.07862  [pdf, other

    cs.IT cs.NI

    Wireless Access for Ultra-Reliable Low-Latency Communication (URLLC): Principles and Building Blocks

    Authors: Petar Popovski, Jimmy J. Nielsen, Cedomir Stefanovic, Elisabeth de Carvalho, Erik Ström, Kasper F. Trillingsgaard, Alexandru-Sabin Bana, Dong Min Kim, Radoslaw Kotaba, Jihong Park, René B. Sørensen

    Abstract: Ultra-reliable low latency communication (URLLC) is an important new feature brought by 5G, with a potential to support a vast set of applications that rely on mission-critical links. In this article, we first discuss the principles for supporting URLLC from the perspective of the traditional assumptions and models applied in communication/information theory. We then discuss how these principles a… ▽ More

    Submitted 20 December, 2017; v1 submitted 25 August, 2017; originally announced August 2017.

    Comments: Submitted to IEEE Network; Revised after 1st round of review; Title changed after 2nd review

  41. arXiv:1707.00644  [pdf, other

    cs.IT

    Compressive Coded Random Access for Massive MTC Traffic in 5G Systems

    Authors: Gerhard Wunder, Cedomir Stefanovic, Petar Popovski, Lars Thiele

    Abstract: Massive MTC support is an important future market segment, but not yet efficiently supported in cellular systems. In this paper we follow-up on recent concepts combining advanced MAC protocols with Compressed Sensing (CS) based multiuser detection. Specifically, we introduce a concept for sparse joint activity, channel and data detection in the context of the Coded ALOHA (FDMA) protocol. We will a… ▽ More

    Submitted 29 June, 2017; originally announced July 2017.

    Comments: Presented at 49th Asilomar Conference on Signals, Systems and Computers 2015. arXiv admin note: text overlap with arXiv:1504.05318

  42. arXiv:1706.09948  [pdf, other

    cs.IT

    Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems

    Authors: German Corrales Madueno, Cedomir Stefanovic, Petar Popovski

    Abstract: EEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand We show that it is possible to both efficiently and rel… ▽ More

    Submitted 29 June, 2017; originally announced June 2017.

    Comments: Appeared in IEEE IoT Journal, October 2016

  43. arXiv:1706.09943  [pdf, other

    cs.IT

    Minimizing Data Distortion of Periodically Reporting IoT Devices with Energy Harvesting

    Authors: Chiara Pielli, Cedomir Stefanovic, Petar Popovski, Michele Zorzi

    Abstract: Energy harvesting is a promising technology for the Internet of Things (IoT) towards the goal of self-sustainability of the involved devices. However, the intermittent and unreliable nature of the harvested energy demands an intelligent management of devices' operation in order to ensure a sustained performance of the IoT application. In this work, we address the problem of maximizing the quality… ▽ More

    Submitted 29 June, 2017; originally announced June 2017.

    Comments: Presented at IEEE SECON 2017

  44. arXiv:1706.09930  [pdf, ps, other

    cs.IT

    A Pseudo-Bayesian Approach to Sign-Compute-Resolve Slotted ALOHA

    Authors: Jasper Goseling, Cedomir Stefanovic, Petar Popovski

    Abstract: Access reservation based on slotted ALOHA is commonly used in wireless cellular access. In this paper we investigate its enhancement based on the use of physical-layer network coding and signature coding, whose main feature is enabling simultaneous resolution of up to K users contending for access, where K >= 1. We optimise the slot access probability such that the expected throughput is maximised… ▽ More

    Submitted 29 June, 2017; originally announced June 2017.

    Comments: Presented at IEEE ICC 2014, Workshop on Massive Uncoordinated Access Protocols

  45. arXiv:1706.09927  [pdf, other

    cs.IT

    Irregular Repetition Slotted ALOHA over the Rayleigh Block Fading Channel with Capture

    Authors: Federico Clazzer, Enrico Paolini, Iacopo Mambelli, Cedomir Stefanovic

    Abstract: Random access protocols relying on the transmission of packet replicas in multiple slots and exploiting interference cancellation at the receiver have been shown to achieve per- formance competitive with that of orthogonal schemes. So far the optimization of the repetition degree profile, defining the probability for a user to transmit a given number of replicas, has mainly been performed targetin… ▽ More

    Submitted 29 June, 2017; originally announced June 2017.

    Comments: Presented at ICC 2017

  46. arXiv:1706.09918  [pdf, other

    cs.IT

    User Activity Detection in Massive Random Access: Compressed Sensing vs. Coded Slotted ALOHA

    Authors: Veljko Boljanovic, Dejan Vukobratovic, Petar Popovski, Cedomir Stefanovic

    Abstract: Machine-type communication services in mobile cel- lular systems are currently evolving with an aim to efficiently address a massive-scale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detect… ▽ More

    Submitted 29 June, 2017; originally announced June 2017.

    Comments: Accepted for presentation at IEEE SPAWC 2017

  47. arXiv:1706.09183  [pdf, other

    cs.IT

    Joint Retransmission, Compression and Channel Coding for Data Fidelity under Energy Constraints

    Authors: Chiara Pielli, Cedomir Stefanovic, Petar Popovski, Michele Zorzi

    Abstract: We consider a monitoring application where sensors periodically report data to a common receiver in a time division multiplex fashion. The sensors are constrained by the limited and unpredictable energy availability provided by Energy Harvesting (EH), and by the channel impairments. To maximize the quality of the reported data, the packets transmitted contain newly generated data blocks together w… ▽ More

    Submitted 28 June, 2017; originally announced June 2017.

    Comments: Submitted to IEEE Transactions on Communications

  48. arXiv:1705.01453  [pdf, other

    cs.MA

    Distributed Proportional-Fairness Control in MicroGrids via Blockchain Smart Contracts

    Authors: Pietro Danzi, Marko Angjelichinoski, Čedomir Stefanović, Petar Popovski

    Abstract: Residential microgrids (MGs) may host a large number of Distributed Energy Resources (DERs). The strategy that maximizes the revenue for each individual DER is the one in which the DER operates at capacity, injecting all available power into the grid. However, when the DER penetration is high and the consumption low, this strategy may lead to power surplus that causes voltage increase over recomme… ▽ More

    Submitted 16 May, 2017; v1 submitted 3 May, 2017; originally announced May 2017.

    Comments: Paper submitted to "IEEE Smartgridcomm 2017"

  49. arXiv:1612.07224  [pdf, other

    cs.IT eess.SY

    Anti-Jamming Strategy for Distributed Microgrid Control based on Power Talk Communication

    Authors: Pietro Danzi, Marko Angjelichinoski, Čedomir Stefanović, Petar Popovski

    Abstract: In standard implementations of distributed secondary control for DC MicroGrids (MGs), the exchange of local measurements among neighboring control agents is enabled via off-the-shelf wireless solutions, such as IEEE 802.11. However, Denial of Service (DoS) attacks on the wireless interface through jamming prevents the secondary control system from performing its main tasks, which might compromise… ▽ More

    Submitted 22 December, 2016; v1 submitted 21 December, 2016; originally announced December 2016.

    Comments: Paper submitted to IEEE ICC 2017 Conference Workshop on Integrating Communications, Control, and Computing Technologies for Smart Grid (ICT4SG)

  50. arXiv:1612.07213  [pdf, other

    eess.SY cs.IT

    Secure and Robust Authentication for DC MicroGrids based on Power Talk Communication

    Authors: Marko Angjelichinoski, Pietro Danzi, Čedomir Stefanović, Petar Popovski

    Abstract: We propose a novel framework for secure and reliable authentication of Distributed Energy Resources to the centralized secondary/tertiary control system of a DC MicroGrid (MG), networked using the IEEE 802.11 wireless interface. The key idea is to perform the authentication using power talk, which is a powerline communication technique executed by the primary control loops of the power electronic… ▽ More

    Submitted 22 December, 2016; v1 submitted 21 December, 2016; originally announced December 2016.

    Comments: Paper submitted to IEEE ICC 2017 Conference Symposium Communications for the Smart Grid