-
Applications of Generative AI (GAI) for Mobile and Wireless Networking: A Survey
Authors:
Thai-Hoc Vu,
Senthil Kumar Jagatheesaperumal,
Minh-Duong Nguyen,
Nguyen Van Huynh,
Sunghwan Kim,
Quoc-Viet Pham
Abstract:
The success of Artificial Intelligence (AI) in multiple disciplines and vertical domains in recent years has promoted the evolution of mobile networking and the future Internet toward an AI-integrated Internet-of-Things (IoT) era. Nevertheless, most AI techniques rely on data generated by physical devices (e.g., mobile devices and network nodes) or specific applications (e.g., fitness trackers and…
▽ More
The success of Artificial Intelligence (AI) in multiple disciplines and vertical domains in recent years has promoted the evolution of mobile networking and the future Internet toward an AI-integrated Internet-of-Things (IoT) era. Nevertheless, most AI techniques rely on data generated by physical devices (e.g., mobile devices and network nodes) or specific applications (e.g., fitness trackers and mobile gaming). To bypass this circumvent, Generative AI (GAI), a.k.a. AI-generated content (AIGC), has emerged as a powerful AI paradigm; thanks to its ability to efficiently learn complex data distributions and generate synthetic data to represent the original data in various forms. This impressive feature is projected to transform the management of mobile networking and diversify the current services and applications provided. On this basis, this work presents a concise tutorial on the role of GAIs in mobile and wireless networking. In particular, this survey first provides the fundamentals of GAI and representative GAI models, serving as an essential preliminary to the understanding of the applications of GAI in mobile and wireless networking. Then, this work provides a comprehensive review of state-of-the-art studies and GAI applications in network management, wireless security, semantic communication, and lessons learned from the open literature. Finally, this work summarizes the current research on GAI for mobile and wireless networking by outlining important challenges that need to be resolved to facilitate the development and applicability of GAI in this edge-cutting area.
△ Less
Submitted 30 May, 2024;
originally announced May 2024.
-
DDPG-E2E: A Novel Policy Gradient Approach for End-to-End Communication Systems
Authors:
Bolun Zhang,
Nguyen Van Huynh,
Dinh Thai Hoang,
Diep N. Nguyen,
Quoc-Viet Pham
Abstract:
The End-to-end (E2E) learning-based approach has great potential to reshape the existing communication systems by replacing the transceivers with deep neural networks. To this end, the E2E learning approach needs to assume the availability of prior channel information to mathematically formulate a differentiable channel layer for the backpropagation (BP) of the error gradients, thereby jointly opt…
▽ More
The End-to-end (E2E) learning-based approach has great potential to reshape the existing communication systems by replacing the transceivers with deep neural networks. To this end, the E2E learning approach needs to assume the availability of prior channel information to mathematically formulate a differentiable channel layer for the backpropagation (BP) of the error gradients, thereby jointly optimizing the transmitter and the receiver. However, accurate and instantaneous channel state information is hardly obtained in practical wireless communication scenarios. Moreover, the existing E2E learning-based solutions exhibit limited performance in data transmissions with large block lengths. In this article, these practical issues are addressed by our proposed deep deterministic policy gradient-based E2E communication system. In particular, the proposed solution utilizes a reward feedback mechanism to train both the transmitter and the receiver, which alleviates the information loss of error gradients during BP. In addition, a convolutional neural network (CNN)-based architecture is developed to mitigate the curse of dimensionality problem when transmitting messages with large block lengths. Extensive simulations then demonstrate that our proposed solution can not only jointly train the transmitter and the receiver simultaneously without requiring the prior channel knowledge but also can obtain significant performance improvement on block error rate compared to state-of-the-art solutions.
△ Less
Submitted 9 April, 2024;
originally announced April 2024.
-
A Universal Deep Neural Network for Signal Detection in Wireless Communication Systems
Authors:
Khalid Albagami,
Nguyen Van Huynh,
Geoffrey Ye Li
Abstract:
Recently, deep learning (DL) has been emerging as a promising approach for channel estimation and signal detection in wireless communications. The majority of the existing studies investigating the use of DL techniques in this domain focus on analysing channel impulse responses that are generated from only one channel distribution such as additive white Gaussian channel noise and Rayleigh channels…
▽ More
Recently, deep learning (DL) has been emerging as a promising approach for channel estimation and signal detection in wireless communications. The majority of the existing studies investigating the use of DL techniques in this domain focus on analysing channel impulse responses that are generated from only one channel distribution such as additive white Gaussian channel noise and Rayleigh channels. In practice, to cope with the dynamic nature of the wireless channel, DL methods must be re-trained on newly non-aged collected data which is costly, inefficient, and impractical. To tackle this challenge, this paper proposes a novel universal deep neural network (Uni-DNN) that can achieve high detection performance in various wireless environments without retraining the model. In particular, our proposed Uni-DNN model consists of a wireless channel classifier and a signal detector which are constructed by using DNNs. The wireless channel classifier enables the signal detector to generalise and perform optimally for multiple wireless channel distributions. In addition, to further improve the signal detection performance of the proposed model, convolutional neural network is employed. Extensive simulations using the orthogonal frequency division multiplexing scheme demonstrate that the bit error rate performance of our proposed solution can outperform conventional DL-based approaches as well as least square and minimum mean square error channel estimators in practical low pilot density scenarios.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Emerging Technologies for 6G Non-Terrestrial-Networks: From Academia to Industrial Applications
Authors:
Cong T. Nguyen,
Yuris Mulya Saputra,
Nguyen Van Huynh,
Tan N. Nguyen,
Dinh Thai Hoang,
Diep N Nguyen,
Van-Quan Pham,
Miroslav Voznak,
Symeon Chatzinotas,
Dinh-Hieu Tran
Abstract:
Terrestrial networks form the fundamental infrastructure of modern communication systems, serving more than 4 billion users globally. However, terrestrial networks are facing a wide range of challenges, from coverage and reliability to interference and congestion. As the demands of the 6G era are expected to be much higher, it is crucial to address these challenges to ensure a robust and efficient…
▽ More
Terrestrial networks form the fundamental infrastructure of modern communication systems, serving more than 4 billion users globally. However, terrestrial networks are facing a wide range of challenges, from coverage and reliability to interference and congestion. As the demands of the 6G era are expected to be much higher, it is crucial to address these challenges to ensure a robust and efficient communication infrastructure for the future. To address these problems, Non-terrestrial Network (NTN) has emerged to be a promising solution. NTNs are communication networks that leverage airborne (e.g., unmanned aerial vehicles) and spaceborne vehicles (e.g., satellites) to facilitate ultra-reliable communications and connectivity with high data rates and low latency over expansive regions. This article aims to provide a comprehensive survey on the utilization of network slicing, Artificial Intelligence/Machine Learning (AI/ML), and Open Radio Access Network (ORAN) to address diverse challenges of NTNs from the perspectives of both academia and industry. Particularly, we first provide an in-depth tutorial on NTN and the key enabling technologies including network slicing, AI/ML, and ORAN. Then, we provide a comprehensive survey on how network slicing and AI/ML have been leveraged to overcome the challenges that NTNs are facing. Moreover, we present how ORAN can be utilized for NTNs. Finally, we highlight important challenges, open issues, and future research directions of NTN in the 6G era.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Generative AI for Unmanned Vehicle Swarms: Challenges, Applications and Opportunities
Authors:
Guangyuan Liu,
Nguyen Van Huynh,
Hongyang Du,
Dinh Thai Hoang,
Dusit Niyato,
Kun Zhu,
Jiawen Kang,
Zehui Xiong,
Abbas Jamalipour,
Dong In Kim
Abstract:
With recent advances in artificial intelligence (AI) and robotics, unmanned vehicle swarms have received great attention from both academia and industry due to their potential to provide services that are difficult and dangerous to perform by humans. However, learning and coordinating movements and actions for a large number of unmanned vehicles in complex and dynamic environments introduce signif…
▽ More
With recent advances in artificial intelligence (AI) and robotics, unmanned vehicle swarms have received great attention from both academia and industry due to their potential to provide services that are difficult and dangerous to perform by humans. However, learning and coordinating movements and actions for a large number of unmanned vehicles in complex and dynamic environments introduce significant challenges to conventional AI methods. Generative AI (GAI), with its capabilities in complex data feature extraction, transformation, and enhancement, offers great potential in solving these challenges of unmanned vehicle swarms. For that, this paper aims to provide a comprehensive survey on applications, challenges, and opportunities of GAI in unmanned vehicle swarms. Specifically, we first present an overview of unmanned vehicles and unmanned vehicle swarms as well as their use cases and existing issues. Then, an in-depth background of various GAI techniques together with their capabilities in enhancing unmanned vehicle swarms are provided. After that, we present a comprehensive review on the applications and challenges of GAI in unmanned vehicle swarms with various insights and discussions. Finally, we highlight open issues of GAI in unmanned vehicle swarms and discuss potential research directions.
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
Enabling Technologies for Web 3.0: A Comprehensive Survey
Authors:
Md Arif Hassan,
Mohammad Behdad Jamshidi,
Bui Duc Manh,
Nam H. Chu,
Chi-Hieu Nguyen,
Nguyen Quang Hieu,
Cong T. Nguyen,
Dinh Thai Hoang,
Diep N. Nguyen,
Nguyen Van Huynh,
Mohammad Abu Alsheikh,
Eryk Dutkiewicz
Abstract:
Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain, semantic web…
▽ More
Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain, semantic web, 3D interactive web, Metaverse, Virtual reality/Augmented reality, Internet of Things technology, and their roles in sha** Web 3.0. We commence by providing a comprehensive background of Web 3.0, including its concept, basic architecture, potential applications, and industry adoption. Subsequently, we examine recent breakthroughs in IoT, 5G, and blockchain technologies that are pivotal to Web 3.0 development. Following that, other enabling technologies, including AI, semantic web, and 3D interactive web, are discussed. Utilizing these technologies can effectively address the critical challenges in realizing Web 3.0, such as ensuring decentralized identity, platform interoperability, data transparency, reducing latency, and enhancing the system's scalability. Finally, we highlight significant challenges associated with Web 3.0 implementation, emphasizing potential solutions and providing insights into future research directions in this field.
△ Less
Submitted 29 December, 2023;
originally announced January 2024.
-
Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Authors:
Bui Minh Tuan,
Diep N. Nguyen,
Nguyen Linh Trung,
Van-Dinh Nguyen,
Nguyen Van Huynh,
Dinh Thai Hoang,
Marwan Krunz,
Eryk Dutkiewicz
Abstract:
Wireless communications are particularly vulnerable to eavesdrop** attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for friendly jamming (FJ), and/or additional computing resources at transceivers, e.g., cryptography-based solutions, which unfortunately may not be feasible i…
▽ More
Wireless communications are particularly vulnerable to eavesdrop** attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for friendly jamming (FJ), and/or additional computing resources at transceivers, e.g., cryptography-based solutions, which unfortunately may not be feasible in practice. This challenge is even more acute in low-end IoT devices. We thus introduce a novel deep learning-based FJ framework that can effectively defeat eavesdrop** attacks with imperfect CSI and even without CSI of legitimate channels. In particular, we first develop an autoencoder-based communication architecture with FJ, namely AEFJ, to jointly maximize the secrecy rate and minimize the block error rate at the receiver without requiring perfect CSI of the legitimate channels. In addition, to deal with the case without CSI, we leverage the mutual information neural estimation (MINE) concept and design a MINE-based FJ scheme that can achieve comparable security performance to the conventional FJ methods that require perfect CSI. Extensive simulations in a multiple-input multiple-output (MIMO) system demonstrate that our proposed solution can effectively deal with eavesdrop** attacks in various settings. Moreover, the proposed framework can seamlessly integrate MIMO security and detection tasks into a unified end-to-end learning process. This integrated approach can significantly maximize the throughput and minimize the block error rate, offering a good solution for enhancing communication security in wireless communication systems.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Generative AI for Physical Layer Communications: A Survey
Authors:
Nguyen Van Huynh,
Jiacheng Wang,
Hongyang Du,
Dinh Thai Hoang,
Dusit Niyato,
Diep N. Nguyen,
Dong In Kim,
Khaled B. Letaief
Abstract:
The recent evolution of generative artificial intelligence (GAI) leads to the emergence of groundbreaking applications such as ChatGPT, which not only enhances the efficiency of digital content production, such as text, audio, video, or even network traffic data, but also enriches its diversity. Beyond digital content creation, GAI's capability in analyzing complex data distributions offers great…
▽ More
The recent evolution of generative artificial intelligence (GAI) leads to the emergence of groundbreaking applications such as ChatGPT, which not only enhances the efficiency of digital content production, such as text, audio, video, or even network traffic data, but also enriches its diversity. Beyond digital content creation, GAI's capability in analyzing complex data distributions offers great potential for wireless communications, particularly amidst a rapid expansion of new physical layer communication technologies. For example, the diffusion model can learn input signal distributions and use them to improve the channel estimation accuracy, while the variational autoencoder can model channel distribution and infer latent variables for blind channel equalization. Therefore, this paper presents a comprehensive investigation of GAI's applications for communications at the physical layer, ranging from traditional issues, including signal classification, channel estimation, and equalization, to emerging topics, such as intelligent reflecting surfaces and joint source channel coding. We also compare GAI-enabled physical layer communications with those supported by traditional AI, highlighting GAI's inherent capabilities and unique contributions in these areas. Finally, the paper discusses open issues and proposes several future research directions, laying a foundation for further exploration and advancement of GAI in physical layer communications.
△ Less
Submitted 9 December, 2023;
originally announced December 2023.
-
Countering Eavesdroppers with Meta-learning-based Cooperative Ambient Backscatter Communications
Authors:
Nam H. Chu,
Nguyen Van Huynh,
Diep N. Nguyen,
Dinh Thai Hoang,
Shimin Gong,
Tao Shu,
Eryk Dutkiewicz,
Khoa T. Phan
Abstract:
This article introduces a novel lightweight framework using ambient backscattering communications to counter eavesdroppers. In particular, our framework divides an original message into two parts: (i) the active-transmit message transmitted by the transmitter using conventional RF signals and (ii) the backscatter message transmitted by an ambient backscatter tag that backscatters upon the active s…
▽ More
This article introduces a novel lightweight framework using ambient backscattering communications to counter eavesdroppers. In particular, our framework divides an original message into two parts: (i) the active-transmit message transmitted by the transmitter using conventional RF signals and (ii) the backscatter message transmitted by an ambient backscatter tag that backscatters upon the active signals emitted by the transmitter. Notably, the backscatter tag does not generate its own signal, making it difficult for an eavesdropper to detect the backscattered signals unless they have prior knowledge of the system. Here, we assume that without decoding/knowing the backscatter message, the eavesdropper is unable to decode the original message. Even in scenarios where the eavesdropper can capture both messages, reconstructing the original message is a complex task without understanding the intricacies of the message-splitting mechanism. A challenge in our proposed framework is to effectively decode the backscattered signals at the receiver, often accomplished using the maximum likelihood (MLK) approach. However, such a method may require a complex mathematical model together with perfect channel state information (CSI). To address this issue, we develop a novel deep meta-learning-based signal detector that can not only effectively decode the weak backscattered signals without requiring perfect CSI but also quickly adapt to a new wireless environment with very little knowledge. Simulation results show that our proposed learning approach, without requiring perfect CSI and complex mathematical model, can achieve a bit error ratio close to that of the MLK-based approach. They also clearly show the efficiency of the proposed approach in dealing with eavesdrop** attacks and the lack of training data for deep learning models in practical scenarios.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
Deep Deterministic Policy Gradient for End-to-End Communication Systems without Prior Channel Knowledge
Authors:
Bolun Zhang,
Nguyen Van Huynh
Abstract:
End-to-End (E2E) learning-based concept has been recently introduced to jointly optimize both the transmitter and the receiver in wireless communication systems. Unfortunately, this E2E learning architecture requires a prior differentiable channel model to jointly train the deep neural networks (DNNs) at the transceivers, which is hardly obtained in practice. This paper aims to solve this issue by…
▽ More
End-to-End (E2E) learning-based concept has been recently introduced to jointly optimize both the transmitter and the receiver in wireless communication systems. Unfortunately, this E2E learning architecture requires a prior differentiable channel model to jointly train the deep neural networks (DNNs) at the transceivers, which is hardly obtained in practice. This paper aims to solve this issue by develo** a deep deterministic policy gradient (DDPG)-based framework. In particular, the proposed solution uses the loss value of the receiver DNN as the reward to train the transmitter DNN. The simulation results then show that our proposed solution can jointly train the transmitter and the receiver without requiring the prior channel model. In addition, we demonstrate that the proposed DDPG-based solution can achieve better detection performance compared to the state-of-the-art solutions.
△ Less
Submitted 7 August, 2023; v1 submitted 12 May, 2023;
originally announced May 2023.
-
Distributed-Training-and-Execution Multi-Agent Reinforcement Learning for Power Control in HetNet
Authors:
Kaidi Xu,
Nguyen Van Huynh,
Geoffrey Ye Li
Abstract:
In heterogeneous networks (HetNets), the overlap of small cells and the macro cell causes severe cross-tier interference. Although there exist some approaches to address this problem, they usually require global channel state information, which is hard to obtain in practice, and get the sub-optimal power allocation policy with high computational complexity. To overcome these limitations, we propos…
▽ More
In heterogeneous networks (HetNets), the overlap of small cells and the macro cell causes severe cross-tier interference. Although there exist some approaches to address this problem, they usually require global channel state information, which is hard to obtain in practice, and get the sub-optimal power allocation policy with high computational complexity. To overcome these limitations, we propose a multi-agent deep reinforcement learning (MADRL) based power control scheme for the HetNet, where each access point makes power control decisions independently based on local information. To promote cooperation among agents, we develop a penalty-based Q learning (PQL) algorithm for MADRL systems. By introducing regularization terms in the loss function, each agent tends to choose an experienced action with high reward when revisiting a state, and thus the policy updating speed slows down. In this way, an agent's policy can be learned by other agents more easily, resulting in a more efficient collaboration process. We then implement the proposed PQL in the considered HetNet and compare it with other distributed-training-and-execution (DTE) algorithms. Simulation results show that our proposed PQL can learn the desired power control policy from a dynamic environment where the locations of users change episodically and outperform existing DTE MADRL algorithms.
△ Less
Submitted 15 December, 2022;
originally announced December 2022.
-
Defeating Eavesdroppers with Ambient Backscatter Communications
Authors:
Nguyen Van Huynh,
Nguyen Quang Hieu,
Nam H. Chu,
Diep N. Nguyen,
Dinh Thai Hoang,
Eryk Dutkiewicz
Abstract:
Unlike conventional anti-eavesdrop** methods that always require additional energy or computing resources (e.g., in friendly jamming and cryptography-based solutions), this work proposes a novel anti-eavesdrop** solution that comes with mostly no extra power nor computing resource requirement. This is achieved by leveraging the ambient backscatter communications in which secret information can…
▽ More
Unlike conventional anti-eavesdrop** methods that always require additional energy or computing resources (e.g., in friendly jamming and cryptography-based solutions), this work proposes a novel anti-eavesdrop** solution that comes with mostly no extra power nor computing resource requirement. This is achieved by leveraging the ambient backscatter communications in which secret information can be transmitted by backscattering it over ambient radio signals. Specifically, the original message at the transmitter is first encoded into two parts: (i) active transmit message and (ii) backscatter message. The active transmit message is then transmitted by using the conventional wireless transmission method while the backscatter message is transmitted by backscattering it on the active transmit signals via an ambient backscatter tag. As the backscatter tag does not generate any active RF signals, it is intractable for the eavesdropper to detect the backscatter message. Therefore, secret information, e.g., secret key for decryption, can be carried by the backscattered message, making the adversary unable to decode the original message. Simulation results demonstrate that our proposed solution can significantly enhance security protection for communication systems.
△ Less
Submitted 1 June, 2023; v1 submitted 16 January, 2022;
originally announced January 2022.
-
Joint Speed Control and Energy Replenishment Optimization for UAV-assisted IoT Data Collection with Deep Reinforcement Transfer Learning
Authors:
Nam H. Chu,
Dinh Thai Hoang,
Diep N. Nguyen,
Nguyen Van Huynh,
Eryk Dutkiewicz
Abstract:
Unmanned aerial vehicle (UAV)-assisted data collection has been emerging as a prominent application due to its flexibility, mobility, and low operational cost. However, under the dynamic and uncertainty of IoT data collection and energy replenishment processes, optimizing the performance for UAV collectors is a very challenging task. Thus, this paper introduces a novel framework that jointly optim…
▽ More
Unmanned aerial vehicle (UAV)-assisted data collection has been emerging as a prominent application due to its flexibility, mobility, and low operational cost. However, under the dynamic and uncertainty of IoT data collection and energy replenishment processes, optimizing the performance for UAV collectors is a very challenging task. Thus, this paper introduces a novel framework that jointly optimizes the flying speed and energy replenishment for each UAV to significantly improve the data collection performance. Specifically, we first develop a Markov decision process to help the UAV automatically and dynamically make optimal decisions under the dynamics and uncertainties of the environment. We then propose a highly-effective reinforcement learning algorithm leveraging deep Q-learning, double deep Q-learning, and a deep dueling neural network architecture to quickly obtain the UAV's optimal policy. The core ideas of this algorithm are to estimate the state values and action advantages separately and simultaneously and to employ double estimators for estimating the action values. Thus, these proposed techniques can stabilize the learning process and effectively address the overestimation problem of conventional Q-learning algorithms. To further reduce the learning time as well as significantly improve learning quality, we develop advanced transfer learning techniques to allow UAVs to ``share'' and ``transfer'' learning knowledge. Extensive simulations demonstrate that our proposed solution can improve the average data collection performance of the system up to 200% compared with those of current methods.
△ Less
Submitted 19 June, 2021;
originally announced June 2021.
-
Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis
Authors:
Nguyen Van Huynh,
Diep N. Nguyen,
Dinh Thai Hoang,
Thang X. Vu,
Eryk Dutkiewicz,
Symeon Chatzinotas
Abstract:
This paper develops a novel framework to defeat a super-reactive jammer, one of the most difficult jamming attacks to deal with in practice. Specifically, the jammer has an unlimited power budget and is equipped with the self-interference suppression capability to simultaneously attack and listen to the transmitter's activities. Consequently, dealing with super-reactive jammers is very challenging…
▽ More
This paper develops a novel framework to defeat a super-reactive jammer, one of the most difficult jamming attacks to deal with in practice. Specifically, the jammer has an unlimited power budget and is equipped with the self-interference suppression capability to simultaneously attack and listen to the transmitter's activities. Consequently, dealing with super-reactive jammers is very challenging. Thus, we introduce a smart deception mechanism to attract the jammer to continuously attack the channel and then leverage jamming signals to transmit data based on the ambient backscatter communication technology. To detect the backscattered signals, the maximum likelihood detector can be adopted. However, this method is notorious for its high computational complexity and requires the model of the current propagation environment as well as channel state information. Hence, we propose a deep learning-based detector that can dynamically adapt to any channels and noise distributions. With a Long Short-Term Memory network, our detector can learn the received signals' dependencies to achieve a performance close to that of the optimal maximum likelihood detector. Through simulation and theoretical results, we demonstrate that with our approaches, the more power the jammer uses to attack the channel, the better bit error rate performance the transmitter can achieve.
△ Less
Submitted 27 October, 2021; v1 submitted 4 May, 2021;
originally announced May 2021.
-
Joint Coding and Scheduling Optimization for Distributed Learning over Wireless Edge Networks
Authors:
Nguyen Van Huynh,
Dinh Thai Hoang,
Diep N. Nguyen,
Eryk Dutkiewicz
Abstract:
Unlike theoretical distributed learning (DL), DL over wireless edge networks faces the inherent dynamics/uncertainty of wireless connections and edge nodes, making DL less efficient or even inapplicable under the highly dynamic wireless edge networks (e.g., using mmW interfaces). This article addresses these problems by leveraging recent advances in coded computing and the deep dueling neural netw…
▽ More
Unlike theoretical distributed learning (DL), DL over wireless edge networks faces the inherent dynamics/uncertainty of wireless connections and edge nodes, making DL less efficient or even inapplicable under the highly dynamic wireless edge networks (e.g., using mmW interfaces). This article addresses these problems by leveraging recent advances in coded computing and the deep dueling neural network architecture. By introducing coded structures/redundancy, a distributed learning task can be completed without waiting for straggling nodes. Unlike conventional coded computing that only optimizes the code structure, coded distributed learning over the wireless edge also requires to optimize the selection/scheduling of wireless edge nodes with heterogeneous connections, computing capability, and straggling effects. However, even neglecting the aforementioned dynamics/uncertainty, the resulting joint optimization of coding and scheduling to minimize the distributed learning time turns out to be NP-hard. To tackle this and to account for the dynamics and uncertainty of wireless connections and edge nodes, we reformulate the problem as a Markov Decision Process and then design a novel deep reinforcement learning algorithm that employs the deep dueling neural network architecture to find the jointly optimal coding scheme and the best set of edge nodes for different learning tasks without explicit information about the wireless environment and edge nodes' straggling parameters. Simulations show that the proposed framework reduces the average learning delay in wireless edge computing up to 66% compared with other DL approaches. The jointly optimal framework in this article is also applicable to any distributed learning scheme with heterogeneous and uncertain computing nodes.
△ Less
Submitted 8 March, 2021; v1 submitted 7 March, 2021;
originally announced March 2021.
-
Transfer Learning for Future Wireless Networks: A Comprehensive Survey
Authors:
Cong T. Nguyen,
Nguyen Van Huynh,
Nam H. Chu,
Yuris Mulya Saputra,
Dinh Thai Hoang,
Diep N. Nguyen,
Quoc-Viet Pham,
Dusit Niyato,
Eryk Dutkiewicz,
Won-Joo Hwang
Abstract:
With outstanding features, Machine Learning (ML) has been the backbone of numerous applications in wireless networks. However, the conventional ML approaches have been facing many challenges in practical implementation, such as the lack of labeled data, the constantly changing wireless environments, the long training process, and the limited capacity of wireless devices. These challenges, if not a…
▽ More
With outstanding features, Machine Learning (ML) has been the backbone of numerous applications in wireless networks. However, the conventional ML approaches have been facing many challenges in practical implementation, such as the lack of labeled data, the constantly changing wireless environments, the long training process, and the limited capacity of wireless devices. These challenges, if not addressed, will impede the effectiveness and applicability of ML in future wireless networks. To address these problems, Transfer Learning (TL) has recently emerged to be a very promising solution. The core idea of TL is to leverage and synthesize distilled knowledge from similar tasks as well as from valuable experiences accumulated from the past to facilitate the learning of new problems. Doing so, TL techniques can reduce the dependence on labeled data, improve the learning speed, and enhance the ML methods' robustness to different wireless environments. This article aims to provide a comprehensive survey on applications of TL in wireless networks. Particularly, we first provide an overview of TL including formal definitions, classification, and various types of TL techniques. We then discuss diverse TL approaches proposed to address emerging issues in wireless networks. The issues include spectrum management, localization, signal recognition, security, human activity recognition and caching, which are all important to next-generation networks such as 5G and beyond. Finally, we highlight important challenges, open issues, and future research directions of TL in future wireless networks.
△ Less
Submitted 8 August, 2021; v1 submitted 15 February, 2021;
originally announced February 2021.
-
Fast or Slow: An Autonomous Speed Control Approach for UAV-assisted IoT Data Collection Networks
Authors:
Nam H. Chu,
Dinh Thai Hoang,
Diep N. Nguyen,
Nguyen Van Huynh,
Eryk Dutkiewicz
Abstract:
Unmanned Aerial Vehicles (UAVs) have been emerging as an effective solution for IoT data collection networks thanks to their outstanding flexibility, mobility, and low operation costs. However, due to the limited energy and uncertainty from the data collection process, speed control is one of the most important factors to optimize the energy usage efficiency and performance for UAV collectors. Thi…
▽ More
Unmanned Aerial Vehicles (UAVs) have been emerging as an effective solution for IoT data collection networks thanks to their outstanding flexibility, mobility, and low operation costs. However, due to the limited energy and uncertainty from the data collection process, speed control is one of the most important factors to optimize the energy usage efficiency and performance for UAV collectors. This work aims to develop a novel autonomous speed control approach to address this issue. To that end, we first formulate the dynamic speed control task of a UAV as a Markov decision process taking into account its energy status and location. In this way, the Q-learning algorithm can be adopted to obtain the optimal speed control policy for the UAV. To further improve the system performance, we develop an highly-effective deep dueling double Q-learning algorithm utilizing outstanding features of the deep neural networks as well as advanced dueling architecture to quickly stabilize the learning process and obtain the optimal policy. Through simulation results, we show that our proposed solution can achieve up to 40% greater performance compared with other conventional methods. Importantly, the simulation results also reveal significant impacts of UAV's energy and charging time on the system performance.
△ Less
Submitted 11 November, 2020;
originally announced November 2020.
-
Time Scheduling and Energy Trading for Heterogeneous Wireless-Powered and Backscattering-based IoT Networks
Authors:
Ngoc-Tan Nguyen,
Diep N. Nguyen,
Dinh Thai Hoang,
Nguyen Van Huynh,
Nam-Hoang Nguyen,
Quoc-Tuan Nguyen,
Eryk Dutkiewicz
Abstract:
Future IoT networks consist of heterogeneous types of IoT devices (with various communication types and energy constraints) which are assumed to belong to an IoT service provider (ISP). To power backscattering-based and wireless-powered devices, the ISP has to contract with an energy service provider (ESP). This article studies the strategic interactions between the ISP and its ESP and their impli…
▽ More
Future IoT networks consist of heterogeneous types of IoT devices (with various communication types and energy constraints) which are assumed to belong to an IoT service provider (ISP). To power backscattering-based and wireless-powered devices, the ISP has to contract with an energy service provider (ESP). This article studies the strategic interactions between the ISP and its ESP and their implications on the joint optimal time scheduling and energy trading for heterogeneous devices. To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the ISP and ESP. Specifically, the ISP leads the game by sending its optimal service time and energy price request (that maximizes its profit) to the ESP. The ESP then optimizes and supplies the transmission power which satisfies the ISP's request (while maximizing ESP's utility). To obtain the Stackelberg equilibrium (SE), we apply a backward induction technique which first derives a closed-form solution for the ESP. Then, to tackle the non-convex optimization problem for the ISP, we leverage the block coordinate descent and convex-concave procedure techniques to design two partitioning schemes (i.e., partial adjustment (PA) and joint adjustment (JA)) to find the optimal energy price and service time that constitute local SEs. Numerical results reveal that by jointly optimizing the energy trading and the time allocation for heterogeneous IoT devices, one can achieve significant improvements in terms of the ISP's profit compared with those of conventional transmission methods. Different tradeoffs between the ESP's and ISP's profits and complexities of the PA/JA schemes can also be numerically tuned. Simulations also show that the obtained local SEs approach the socially optimal welfare when the ISP's benefit per transmitted bit is higher than a given threshold.
△ Less
Submitted 31 August, 2020; v1 submitted 29 May, 2020;
originally announced May 2020.
-
DeepFake: Deep Dueling-based Deception Strategy to Defeat Reactive Jammers
Authors:
Nguyen Van Huynh,
Dinh Thai Hoang,
Diep N. Nguyen,
Eryk Dutkiewicz
Abstract:
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy to deal with reactive jamming attacks. In particular, for a smart and reactive jamming attack, the jammer is able to sense the channel and attack the channel if it detects communications from the legitimate transmitter. To deal with such attacks, we propose an intelligent deception strategy which all…
▽ More
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy to deal with reactive jamming attacks. In particular, for a smart and reactive jamming attack, the jammer is able to sense the channel and attack the channel if it detects communications from the legitimate transmitter. To deal with such attacks, we propose an intelligent deception strategy which allows the legitimate transmitter to transmit "fake" signals to attract the jammer. Then, if the jammer attacks the channel, the transmitter can leverage the strong jamming signals to transmit data by using ambient backscatter communication technology or harvest energy from the strong jamming signals for future use. By doing so, we can not only undermine the attack ability of the jammer, but also utilize jamming signals to improve the system performance. To effectively learn from and adapt to the dynamic and uncertainty of jamming attacks, we develop a novel deep reinforcement learning algorithm using the deep dueling neural network architecture to obtain the optimal policy with thousand times faster than those of the conventional reinforcement algorithms. Extensive simulation results reveal that our proposed DeepFake framework is superior to other anti-jamming strategies in terms of throughput, packet loss, and learning rate.
△ Less
Submitted 4 May, 2021; v1 submitted 12 May, 2020;
originally announced May 2020.
-
Optimal Beam Association for High Mobility mmWave Vehicular Networks: Lightweight Parallel Reinforcement Learning Approach
Authors:
Nguyen Van Huynh,
Diep N. Nguyen,
Dinh Thai Hoang,
Eryk Dutkiewicz
Abstract:
In intelligent transportation systems (ITS), vehicles are expected to feature with advanced applications and services which demand ultra-high data rates and low-latency communications. For that, the millimeter wave (mmWave) communication has been emerging as a very promising solution. However, incorporating the mmWave into ITS is particularly challenging due to the high mobility of vehicles and th…
▽ More
In intelligent transportation systems (ITS), vehicles are expected to feature with advanced applications and services which demand ultra-high data rates and low-latency communications. For that, the millimeter wave (mmWave) communication has been emerging as a very promising solution. However, incorporating the mmWave into ITS is particularly challenging due to the high mobility of vehicles and the inherent sensitivity of mmWave beams to dynamic blockages. This article addresses these problems by develo** an optimal beam association framework for mmWave vehicular networks under high mobility. Specifically, we use the semi-Markov decision process to capture the dynamics and uncertainty of the environment. The Q-learning algorithm is then often used to find the optimal policy. However, Q-learning is notorious for its slow-convergence. Instead of adopting deep reinforcement learning structures (like most works in the literature), we leverage the fact that there are usually multiple vehicles on the road to speed up the learning process. To that end, we develop a lightweight yet very effective parallel Q-learning algorithm to quickly obtain the optimal policy by simultaneously learning from various vehicles. Extensive simulations demonstrate that our proposed solution can increase the data rate by 47% and reduce the disconnection probability by 29% compared to other solutions.
△ Less
Submitted 7 June, 2021; v1 submitted 2 May, 2020;
originally announced May 2020.
-
"Jam Me If You Can'': Defeating Jammer with Deep Dueling Neural Network Architecture and Ambient Backscattering Augmented Communications
Authors:
Nguyen Van Huynh,
Diep N. Nguyen,
Dinh Thai Hoang,
Eryk Dutkiewicz
Abstract:
With conventional anti-jamming solutions like frequency hop** or spread spectrum, legitimate transceivers often tend to "escape" or "hide" themselves from jammers. These reactive anti-jamming approaches are constrained by the lack of timely knowledge of jamming attacks. Bringing together the latest advances in neural network architectures and ambient backscattering communications, this work allo…
▽ More
With conventional anti-jamming solutions like frequency hop** or spread spectrum, legitimate transceivers often tend to "escape" or "hide" themselves from jammers. These reactive anti-jamming approaches are constrained by the lack of timely knowledge of jamming attacks. Bringing together the latest advances in neural network architectures and ambient backscattering communications, this work allows wireless nodes to effectively "face" the jammer by first learning its jamming strategy, then adapting the rate or transmitting information right on the jamming signal. Specifically, to deal with unknown jamming attacks, existing work often relies on reinforcement learning algorithms, e.g., Q-learning. However, the Q-learning algorithm is notorious for its slow convergence to the optimal policy, especially when the system state and action spaces are large. This makes the Q-learning algorithm pragmatically inapplicable. To overcome this problem, we design a novel deep reinforcement learning algorithm using the recent dueling neural network architecture. Our proposed algorithm allows the transmitter to effectively learn about the jammer and attain the optimal countermeasures thousand times faster than that of the conventional Q-learning algorithm. Through extensive simulation results, we show that our design (using ambient backscattering and the deep dueling neural network architecture) can improve the average throughput by up to 426% and reduce the packet loss by 24%. By augmenting the ambient backscattering capability on devices and using our algorithm, it is interesting to observe that the (successful) transmission rate increases with the jamming power. Our proposed solution can find its applications in both civil (e.g., ultra-reliable and low-latency communications or URLLC) and military scenarios (to combat both inadvertent and deliberate jamming).
△ Less
Submitted 8 April, 2019;
originally announced April 2019.
-
Optimal and Fast Real-time Resources Slicing with Deep Dueling Neural Networks
Authors:
Nguyen Van Huynh,
Dinh Thai Hoang,
Diep N. Nguyen,
Eryk Dutkiewicz
Abstract:
Effective network slicing requires an infrastructure/network provider to deal with the uncertain demand and real-time dynamics of network resource requests. Another challenge is the combinatorial optimization of numerous resources, e.g., radio, computing, and storage. This article develops an optimal and fast real-time resource slicing framework that maximizes the long-term return of the network p…
▽ More
Effective network slicing requires an infrastructure/network provider to deal with the uncertain demand and real-time dynamics of network resource requests. Another challenge is the combinatorial optimization of numerous resources, e.g., radio, computing, and storage. This article develops an optimal and fast real-time resource slicing framework that maximizes the long-term return of the network provider while taking into account the uncertainty of resource demand from tenants. Specifically, we first propose a novel system model which enables the network provider to effectively slice various types of resources to different classes of users under separate virtual slices. We then capture the real-time arrival of slice requests by a semi-Markov decision process. To obtain the optimal resource allocation policy under the dynamics of slicing requests, e.g., uncertain service time and resource demands, a Q-learning algorithm is often adopted in the literature. However, such an algorithm is notorious for its slow convergence, especially for problems with large state/action spaces. This makes Q-learning practically inapplicable to our case in which multiple resources are simultaneously optimized. To tackle it, we propose a novel network slicing approach with an advanced deep learning architecture, called deep dueling that attains the optimal average reward much faster than the conventional Q-learning algorithm. This property is especially desirable to cope with real-time resource requests and the dynamic demands of users. Extensive simulations show that the proposed framework yields up to 40% higher long-term average return while being few thousand times faster, compared with state of the art network slicing approaches.
△ Less
Submitted 25 February, 2019;
originally announced February 2019.
-
Offloading Energy Efficiency with Delay Constraint for Cooperative Mobile Edge Computing Networks
Authors:
Thai T. Vu,
Nguyen Van Huynh,
Dinh Thai Hoang,
Diep N. Nguyen,
Eryk Dutkiewicz
Abstract:
We propose a novel edge computing network architecture that enables edge nodes to cooperate in sharing computing and radio resources to minimize the total energy consumption of mobile users while meeting their delay requirements. To find the optimal task offloading decisions for mobile users, we first formulate the joint task offloading and resource allocation optimization problem as a mixed integ…
▽ More
We propose a novel edge computing network architecture that enables edge nodes to cooperate in sharing computing and radio resources to minimize the total energy consumption of mobile users while meeting their delay requirements. To find the optimal task offloading decisions for mobile users, we first formulate the joint task offloading and resource allocation optimization problem as a mixed integer non-linear programming (MINLP). The optimization involves both binary (offloading decisions) and real variables (resource allocations), making it an NP-hard and computational intractable problem. To circumvent, we relax the binary decision variables to transform the MINLP to a relaxed optimization problem with real variables. After proving that the relaxed problem is a convex one, we propose two solutions namely ROP and IBBA. ROP is adopted from the interior point method and IBBA is developed from the branch and bound algorithm. Through the numerical results, we show that our proposed approaches allow minimizing the total energy consumption and meet all delay requirements for mobile users.
△ Less
Submitted 30 November, 2018;
originally announced November 2018.
-
Optimal and Low-Complexity Dynamic Spectrum Access for RF-Powered Ambient Backscatter System with Online Reinforcement Learning
Authors:
Nguyen Van Huynh,
Dinh Thai Hoang,
Diep N. Nguyen,
Eryk Dutkiewicz,
Dusit Niyato,
** Wang
Abstract:
Ambient backscatter has been introduced with a wide range of applications for low power wireless communications. In this article, we propose an optimal and low-complexity dynamic spectrum access framework for RF-powered ambient backscatter system. In this system, the secondary transmitter not only harvests energy from ambient signals (from incumbent users), but also backscatters these signals to i…
▽ More
Ambient backscatter has been introduced with a wide range of applications for low power wireless communications. In this article, we propose an optimal and low-complexity dynamic spectrum access framework for RF-powered ambient backscatter system. In this system, the secondary transmitter not only harvests energy from ambient signals (from incumbent users), but also backscatters these signals to its receiver for data transmission. Under the dynamics of the ambient signals, we first adopt the Markov decision process (MDP) framework to obtain the optimal policy for the secondary transmitter, aiming to maximize the system throughput. However, the MDP-based optimization requires complete knowledge of environment parameters, e.g., the probability of a channel to be idle and the probability of a successful packet transmission, that may not be practical to obtain. To cope with such incomplete knowledge of the environment, we develop a low-complexity online reinforcement learning algorithm that allows the secondary transmitter to "learn" from its decisions and then attain the optimal policy. Simulation results show that the proposed learning algorithm not only efficiently deals with the dynamics of the environment, but also improves the average throughput up to 50% and reduces the blocking probability and delay up to 80% compared with conventional methods.
△ Less
Submitted 8 September, 2018;
originally announced September 2018.
-
Reinforcement Learning Approach for RF-Powered Cognitive Radio Network with Ambient Backscatter
Authors:
Nguyen Van Huynh,
Dinh Thai Hoang,
Diep N. Nguyen,
Eryk Dutkiewicz,
Dusit Niyato,
** Wang
Abstract:
For an RF-powered cognitive radio network with ambient backscattering capability, while the primary channel is busy, the RF-powered secondary user (RSU) can either backscatter the primary signal to transmit its own data or harvest energy from the primary signal (and store in its battery). The harvested energy then can be used to transmit data when the primary channel becomes idle. To maximize the…
▽ More
For an RF-powered cognitive radio network with ambient backscattering capability, while the primary channel is busy, the RF-powered secondary user (RSU) can either backscatter the primary signal to transmit its own data or harvest energy from the primary signal (and store in its battery). The harvested energy then can be used to transmit data when the primary channel becomes idle. To maximize the throughput for the secondary system, it is critical for the RSU to decide when to backscatter and when to harvest energy. This optimal decision has to account for the dynamics of the primary channel, energy storage capability, and data to be sent. To tackle that problem, we propose a Markov decision process (MDP)-based framework to optimize RSU's decisions based on its current states, e.g., energy, data as well as the primary channel state. As the state information may not be readily available at the RSU, we then design a low-complexity online reinforcement learning algorithm that guides the RSU to find the optimal solution without requiring prior- and complete-information from the environment. The extensive simulation results then clearly show that the proposed solution achieves higher throughputs, i.e., up to 50%, than that of conventional methods.
△ Less
Submitted 22 August, 2018;
originally announced August 2018.
-
Optimal Time Scheduling for Wireless-Powered Backscatter Communication Networks
Authors:
Nguyen Van Huynh,
Dinh Thai Hoang,
Dusit Niyato,
** Wang,
Dong In Kim
Abstract:
This letter introduces a novel wireless-powered backscatter communication system which allows sensors to utilize RF signals transmitted from a dedicated RF energy source to transmit data. In the proposed system, when the RF energy source transmits RF signals, the sensors are able to backscatter the RF signals to transmit date to the gateway and/or harvest energy from the RF signals for their opera…
▽ More
This letter introduces a novel wireless-powered backscatter communication system which allows sensors to utilize RF signals transmitted from a dedicated RF energy source to transmit data. In the proposed system, when the RF energy source transmits RF signals, the sensors are able to backscatter the RF signals to transmit date to the gateway and/or harvest energy from the RF signals for their operations. By integrating backscattering and energy harvesting techniques, we can optimize the network throughput of the system. In particular, we first formulate the time scheduling problem for the system, and then propose an optimal solution using convex optimization to maximize the overall network throughput. Numerical results show a significant throughput gain achieved by our proposed design over two other baseline schemes.
△ Less
Submitted 8 January, 2018;
originally announced January 2018.
-
Ambient Backscatter Communications: A Contemporary Survey
Authors:
Nguyen Van Huynh,
Dinh Thai Hoang,
Xiao Lu,
Dusit Niyato,
** Wang,
Dong In Kim
Abstract:
Recently, ambient backscatter communications has been introduced as a cutting-edge technology which enables smart devices to communicate by utilizing ambient radio frequency (RF) signals without requiring active RF transmission. This technology is especially effective in addressing communication and energy efficiency problems for low-power communications systems such as sensor networks. It is expe…
▽ More
Recently, ambient backscatter communications has been introduced as a cutting-edge technology which enables smart devices to communicate by utilizing ambient radio frequency (RF) signals without requiring active RF transmission. This technology is especially effective in addressing communication and energy efficiency problems for low-power communications systems such as sensor networks. It is expected to realize numerous Internet-of-Things (IoT) applications. Therefore, this paper aims to provide a contemporary and comprehensive literature review on fundamentals, applications, challenges, and research efforts/progress of ambient backscatter communications. In particular, we first present fundamentals of backscatter communications and briefly review bistatic backscatter communications systems. Then, the general architecture, advantages, and solutions to address existing issues and limitations of ambient backscatter communications systems are discussed. Additionally, emerging applications of ambient backscatter communications are highlighted. Finally, we outline some open issues and future research directions.
△ Less
Submitted 13 December, 2017;
originally announced December 2017.