-
Average Age of Information Minimization in Reliable Covert Communication on Time-Varying Channels
Authors:
Shima Salar Hosseini,
Paeiz Azmi,
Nader Mokari
Abstract:
In this letter, we propose reliable covert communications with the aim of minimizing age of information (AoI) in the time-varying channels. We named the time duration that channel state information (CSI) is valid as a new metric, as age of channel variation (AoC). To find reliable covert communication in a fresh manner in dynamic environments, this work considers a new constraint that shows a rela…
▽ More
In this letter, we propose reliable covert communications with the aim of minimizing age of information (AoI) in the time-varying channels. We named the time duration that channel state information (CSI) is valid as a new metric, as age of channel variation (AoC). To find reliable covert communication in a fresh manner in dynamic environments, this work considers a new constraint that shows a relation between AoI and AoC. With the aid of the proposed constraint, this paper addresses two main challenges of reliable covert communication with the aim of minimizing AoI: 1) users packets with desirable size; 2) guaranteeing the negligible probability of Willies detection, in time-varying networks. In the simulation results, we compare the performance of the proposed constraint in reliable covert communication with the aim of minimizing AoI with conventional optimization of the requirement of information freshness in covert communications.
△ Less
Submitted 3 May, 2022;
originally announced May 2022.
-
AI-based Robust Resource Allocation in End-to-End Network Slicing under Demand and CSI Uncertainties
Authors:
Amir Gharehgoli,
Ali Nouruzi,
Nader Mokari,
Paeiz Azmi,
Mohamad Reza Javan,
Eduard A. Jorswieck
Abstract:
Network slicing (NwS) is one of the main technologies in the fifth-generation of mobile communication and beyond (5G+). One of the important challenges in the NwS is information uncertainty which mainly involves demand and channel state information (CSI). Demand uncertainty is divided into three types: number of users requests, amount of bandwidth, and requested virtual network functions workloads…
▽ More
Network slicing (NwS) is one of the main technologies in the fifth-generation of mobile communication and beyond (5G+). One of the important challenges in the NwS is information uncertainty which mainly involves demand and channel state information (CSI). Demand uncertainty is divided into three types: number of users requests, amount of bandwidth, and requested virtual network functions workloads. Moreover, the CSI uncertainty is modeled by three methods: worst-case, probabilistic, and hybrid. In this paper, our goal is to maximize the utility of the infrastructure provider by exploiting deep reinforcement learning algorithms in end-to-end NwS resource allocation under demand and CSI uncertainties. The proposed formulation is a nonconvex mixed-integer non-linear programming problem. To perform robust resource allocation in problems that involve uncertainty, we need a history of previous information. To this end, we use a recurrent deterministic policy gradient (RDPG) algorithm, a recurrent and memory-based approach in deep reinforcement learning. Then, we compare the RDPG method in different scenarios with soft actor-critic (SAC), deep deterministic policy gradient (DDPG), distributed, and greedy algorithms. The simulation results show that the SAC method is better than the DDPG, distributed, and greedy methods, respectively. Moreover, the RDPG method out performs the SAC approach on average by 70%.
△ Less
Submitted 10 February, 2022;
originally announced February 2022.
-
AoI Minimization in Energy Harvesting and Spectrum Sharing Enabled 6G Networks
Authors:
Amir Hossein Zarif,
Paeiz Azmi,
Nader Mokari,
Mohammad Reza Javan,
Eduard Jorswieck
Abstract:
Spectrum sharing is a method to solve the problem of frequency spectrum deficiency. This paper studies a novel AI based spectrum sharing and energy harvesting system in which the freshness of information (AoI) is guaranteed. The system includes a primary user with access rights to the spectrum and a secondary user. The secondary user is an energy harvesting sensor that intends to use the primary u…
▽ More
Spectrum sharing is a method to solve the problem of frequency spectrum deficiency. This paper studies a novel AI based spectrum sharing and energy harvesting system in which the freshness of information (AoI) is guaranteed. The system includes a primary user with access rights to the spectrum and a secondary user. The secondary user is an energy harvesting sensor that intends to use the primary user spectrum opportunistically. The problem is formulated as partially observable Markov decision processes (POMDPs) and solved using two methods: a deep Q-network (DQN) and dueling double deep Q-Network (D3QN) to achieve the optimal policy. The purpose is to choose the best action adaptively in every time slot based on its situation in both overlay and underlay modes to minimize the average AoI of the secondary user. Finally, simulation experiments are performed to evaluate the effectiveness of the proposed scheme compared to the overlay mode. According to the results, the average AoI in the proposed system is less than that of the existing models, including only overlay mode. The average user access improved from 30% in the overlay mode to 45% in the DQN and 48% in the D3QN.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
Blind Modulation Classification via Combined Machine Learning and Signal Feature Extraction
Authors:
Jafar Norolahi,
Paeiz Azmi
Abstract:
In this study, an algorithm to blind and automatic modulation classification has been proposed. It well benefits combined machine leaning and signal feature extraction to recognize diverse range of modulation in low signal power to noise ratio (SNR). The presented algorithm contains four. First, it advantages spectrum analyzing to branching modulated signal based on regular and irregular spectrum…
▽ More
In this study, an algorithm to blind and automatic modulation classification has been proposed. It well benefits combined machine leaning and signal feature extraction to recognize diverse range of modulation in low signal power to noise ratio (SNR). The presented algorithm contains four. First, it advantages spectrum analyzing to branching modulated signal based on regular and irregular spectrum character. Seconds, a nonlinear soft margin support vector (NS SVM) problem is applied to received signal, and its symbols are classified to correct and incorrect (support vectors) symbols. The NS SVM employment leads to discounting in physical layer noise effect on modulated signal. After that, a k-center clustering can find center of each class. finally, in correlation function estimation of scatter diagram is correlated with pre-saved ideal scatter diagram of modulations. The correlation outcome is classification result. For more evaluation, success rate, performance, and complexity in compare to many published methods are provided. The simulation prove that the proposed algorithm can classified the modulated signal in less SNR. For example, it can recognize 4-QAM in SNR=-4.2 dB, and 4-FSK in SNR=2.1 dB with %99 success rate. Moreover, due to using of kernel function in dual problem of NS SVM and feature base function, the proposed algorithm has low complexity and simple implementation in practical issues.
△ Less
Submitted 12 January, 2021;
originally announced January 2021.
-
Theoretical Accuracy Analysis of RSS-Based Range Estimation for Visible Light Communication
Authors:
Changeez Amini,
Paeiz Azmi,
Seyed Sadra Kashef
Abstract:
In this paper, an improved channel model of visible light communication (VLC) for ranging in presented. For indoor channel model of VLC, distance is estimated based on received signal strength. In this model, received shot noise as a distance-dependent parameter is considered in range estimation accuracy. Moreover, based on this model, the Cramer-Rao lower bound is computed as the theoretical limi…
▽ More
In this paper, an improved channel model of visible light communication (VLC) for ranging in presented. For indoor channel model of VLC, distance is estimated based on received signal strength. In this model, received shot noise as a distance-dependent parameter is considered in range estimation accuracy. Moreover, based on this model, the Cramer-Rao lower bound is computed as the theoretical limits on the performance and accuracy of any unbiased estimator. In this way, the effects of horizontal and vertical distances are investigated. In addition, the transmitted power effect on RSN and accordingly on CRLB is demonstrated.
△ Less
Submitted 28 November, 2020;
originally announced November 2020.
-
Cross Layer Resource Allocation in H-CRAN with Spectrum and Energy Cooperation
Authors:
Nazanin Moosavi,
Mahnaz Sinaie,
Paeiz Azmi,
Pin-Hsun Lin,
Eduard Jorswieck
Abstract:
5G and beyond wireless networks are the upcoming evolution for the current cellular networks to provide the essential requirement of future demands such as high data rate, low energy consumption, and low latency to provide seamless communication for the emerging applications. Heterogeneous cloud radio access network (H-CRAN) is envisioned as a new trend of 5G that uses the advantages of heterogene…
▽ More
5G and beyond wireless networks are the upcoming evolution for the current cellular networks to provide the essential requirement of future demands such as high data rate, low energy consumption, and low latency to provide seamless communication for the emerging applications. Heterogeneous cloud radio access network (H-CRAN) is envisioned as a new trend of 5G that uses the advantages of heterogeneous and cloud radio access networks to enhance both the spectral and energy efficiency. In this paper, building on the notion of effective capacity (EC), we propose a framework in non-orthogonal multiple access (NOMA)-based H-CRAN to meet these demands simultaneously. Our proposed approach is to maximize the effective energy efficiency (EEE) while considering spectrum and power cooperation between macro base station (MBS) and radio remote heads (RRHs). To solve the formulated problem and to make it more tractable, we transform the original problem into an equivalent subtractive form via Dinkelbach algorithm. Afterwards, the combinational framework of distributed stable matching and successive convex algorithm (SCA) is then adopted to obtain the solution of the equivalent problem. Hereby, we propose an efficient resource allocation scheme to maximize energy efficiency while maintaining the delay quality of service (QoS) requirements for the all users. The simulation results show that the proposed algorithm can provide a non-trivial trade-off between delay and energy efficiency in NOMA H-CRAN systems in terms of EC and EEE and the spectrum and power cooperation improves EEE of the proposed network. Moreover, our proposed solution complexity is much lower than the optimal solution and it suffers a very limited gap compared to the optimal method.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
Joint Information Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
Authors:
Moslem Forouzesh,
Paeiz Azmi,
Ali Kuhestani,
Phee Lep Yeoh
Abstract:
In this paper, we investigate joint information theoretic secrecy and covert communication in a single-input multi-output (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. S…
▽ More
In this paper, we investigate joint information theoretic secrecy and covert communication in a single-input multi-output (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. Specifically, Bob requires secure communications such that his messages from Alice are not decoded by the untrusted user, while Carol requires covert communications such that her messages from Alice are not detected by the warden.
To do so, we consider that Alice transmits Carol's messages during selected time slots to hide them from the warden while also transmitting Bob's messages in each time slot contentiously.
We formulate an optimization problem with the aim of maximizing the average rate subject to a covert communication requirement and a secure communications constraint.
Since the proposed optimization problem is non-convex, we utilize successive convex approximation to obtain a tractable solution. We consider practical assumptions that Alice has imperfect knowledge of the warden's location and imperfect channel state information (CSI) of Bob and Carol.
Our numerical examples highlight that the imperfect CSI at Carol has a more detrimental impact on the average rate compared to imperfect CSI at Bob.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
Covert Communication Using Null Space and 3D Beamforming
Authors:
Moslem Forouzesh,
Paeiz Azmi,
Nader Mokari,
Dennis Goeckel
Abstract:
Covert communication is often limited in rate because it is difficult to hide the signal in the background noise. Recent work has shown that jamming can significantly improve the rate at which covert communications can be conducted; however, the rate could be improved further if the jamming incident on the intended receiver can be mitigated. Here, we consider a multiple-antenna jammer that employs…
▽ More
Covert communication is often limited in rate because it is difficult to hide the signal in the background noise. Recent work has shown that jamming can significantly improve the rate at which covert communications can be conducted; however, the rate could be improved further if the jamming incident on the intended receiver can be mitigated. Here, we consider a multiple-antenna jammer that employs beamforming to place the intended receiver in the null space of the jamming and a multi-antenna transmitter equipped with three-dimensional (3D) antennas that is able to beamform toward its intended recipient. To evaluate this design, we formulate an optimization problem and present an iterative algorithm to solve it. Numerical results consider both the rate of covert communications with the proposed architecture and the gap between the result from our optimization and that obtained from exhaustive search.
△ Less
Submitted 3 July, 2019; v1 submitted 2 July, 2019;
originally announced July 2019.
-
Bit Error Probability Instead of Secrecy Rate Criterion to Enhance Performance for Secure Wireless Communication Systems
Authors:
Javad Taghipour,
Paeiz Azmi,
Nader Mokari,
Moslem Forouzesh,
Hossein Pishro-Nik
Abstract:
In this paper, we propose a new practical power allocation technique based on bit error probability (BEP) for physical layer security systems. It is shown that the secrecy rate that is the most commonly used in physical layer security systems, cannot be a suitable criterion lonely. Large positive values are suitable for the secrecy rate in physical layer security, but it does not consider the perf…
▽ More
In this paper, we propose a new practical power allocation technique based on bit error probability (BEP) for physical layer security systems. It is shown that the secrecy rate that is the most commonly used in physical layer security systems, cannot be a suitable criterion lonely. Large positive values are suitable for the secrecy rate in physical layer security, but it does not consider the performance of the legitimate and adversary users. In this paper, we consider and analyze BEP for physical layer security systems because based on it, the performance of the legitimate and adversary users are guaranteed and it is needed to use lower power. BEP is calculated for the legitimate and adversary users and it is shown that BEP can be better criterion for performance evaluation of the physical layer security systems. Based on BEP, the optimum transmit power is obtained and a new definition for outage probability is proposed and obtained theoretically. Also, the proposed approach is applied for adversary users with unknown mode and the cooperative adversary users. Simulation results show that the proposed method needs more than 5dB lower power for different scenarios.
△ Less
Submitted 2 July, 2019;
originally announced July 2019.
-
Robust Resource Allocation for PD-NOMA-Based MISO Heterogeneous Networks with CoMP Technology
Authors:
Atefeh Rezaei,
Paeiz Azmi,
Nader Mokari,
Mohammad Reza Javan
Abstract:
In this paper, we consider a hybrid scheme of coordinated multi-point (CoMP) technology in MISO heterogeneous communication networks based on power domain non-orthogonal multiple access (PD-NOMA). We propose a novel method based on matching game with externalities to realize the hybrid scheme where the number of the cooperative nodes are variable. Moreover, we propose a new matching utility functi…
▽ More
In this paper, we consider a hybrid scheme of coordinated multi-point (CoMP) technology in MISO heterogeneous communication networks based on power domain non-orthogonal multiple access (PD-NOMA). We propose a novel method based on matching game with externalities to realize the hybrid scheme where the number of the cooperative nodes are variable. Moreover, we propose a new matching utility function to manage the interference caused by CoMP and NOMA techniques.
We also devise robust beamforming to cope with the channel uncertainty. In this regard, we focus on both no CSI and partial CSI cases to increase the achievable data rate.
We provide the complexity analysis of both schemes which shows that the complexity of the partial CSI approach is more than that of the no CSI method.
Results evaluate the performance of proposed CoMP scheme and the sensibility of our methods, Index Terms, CoMP technology, hybrid scheme, matching game with externalities, PD-NOMA, robust beamforming, probabilistic constraint, no CSI, partial CSI.
△ Less
Submitted 19 September, 2019; v1 submitted 26 February, 2019;
originally announced February 2019.
-
Fading Model Deviation in The NLOS Communication Channel in Limited Reflection
Authors:
Zabihollah Hasanshahi,
Paeiz Azmi,
Mohammad Khajezadeh
Abstract:
Statistical models are employed to characterize the clutter in the radar and the reflective signals of the telecommunication receivers. End to this, Rayliegh distribution is the simplest fading models in NLOS channels possessing low-accuracy in the high-resolution radars and distant telecommunication receivers. At present, high accuracy models such as the m-type Nakagami and hybrid GG distribution…
▽ More
Statistical models are employed to characterize the clutter in the radar and the reflective signals of the telecommunication receivers. End to this, Rayliegh distribution is the simplest fading models in NLOS channels possessing low-accuracy in the high-resolution radars and distant telecommunication receivers. At present, high accuracy models such as the m-type Nakagami and hybrid GG distributions are utilized in order to model fading. However, despite the Non-Rayliegh models have better precision in the NLOS relative to the Rayliegh models, the accuracy of these models decreases when the radiation angle in the transmitter and the reflection angle in the receiver are different. In this paper, the K distribution function is analytically introduced and deployed to model the fading using practical data. Although this model was previously introduced to describe the clutter properties of the radar
△ Less
Submitted 20 January, 2019;
originally announced January 2019.
-
Robust Power Allocation in Covert Communication: Imperfect CDI
Authors:
Moslem Forouzesh,
Paeiz Azmi,
Nader Mokari,
Dennis Goeckel
Abstract:
The study of the fundamental limits of covert communications, where a transmitter Alice wants to send information to a desired recipient Bob without detection of that transmission by an attentive and capable warden Willie, has emerged recently as a topic of great research interest. Critical to these analyses is a characterization of the detection problem that is presented to Willie. Previous work…
▽ More
The study of the fundamental limits of covert communications, where a transmitter Alice wants to send information to a desired recipient Bob without detection of that transmission by an attentive and capable warden Willie, has emerged recently as a topic of great research interest. Critical to these analyses is a characterization of the detection problem that is presented to Willie. Previous work has assumed that the channel distribution information (CDI) is known to Alice, hence facilitating her characterization of Willie's capabilities to detect the signal. However, in practice, Willie tends to be passive and the environment heterogeneous, implying a lack of signaling interchange between the transmitter and Willie makes it difficult if not impossible for Alice to estimate the CDI exactly and provide covertness guarantees. In this paper, we address this issue by develo** covert communication schemes for various assumptions on Alice's imperfect knowledge of the CDI: 1) when the transmitter knows the channel distribution is within some distance of a nominal channel distribution; 2) when only the mean and variance of the channel distribution are available at Alice; 3) when Alice knows the channel distribution is complex Gaussian but the variance is unknown. In each case, we formulate new optimization problems to find the power allocations that maximize covert rate subject to a covertness requirement under uncertain CDI. Moreover, since Willie faces similar challenges as Alice in estimating the CDI, we investigate two possible assumptions on the knowledge of the CDI at Willie: 1) CDI is known at Willie, 2) CDI is unknown at Willie. Numerical results are presented to compare the proposed schemes from various aspects, in particular the accuracy and efficiency of the proposed solutions for attaining desirable covert system performance.
△ Less
Submitted 15 January, 2019;
originally announced January 2019.
-
Covert Transmission with Antenna Selection and Using an External Jammer
Authors:
Morteza Sarkheil,
Paeiz Azmi,
Moslem Forouzesh,
Ali Kuhestani
Abstract:
This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination , an external jammer and an eavesdropper. In the covert communication, the level of transmit power is low and hence a source with multiple antennas can be adopted to send the information toward the single antenna destination while concurrently, the j…
▽ More
This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination , an external jammer and an eavesdropper. In the covert communication, the level of transmit power is low and hence a source with multiple antennas can be adopted to send the information toward the single antenna destination while concurrently, the jammer transmits an artificial noise signal. For this system model, we consider a scenario where the source is forced to select one or several of its antennas to transmit its confidential information due to its limited RF chains. Furthermore, we consider two different jamming scenarios to support our covert communication: 1) The destination is unable to cancel the jamming signal, 2) The destination can subtract the jamming signal. For such a communication network, our aim is to maximize the covert rate subject to power constraint and covert communication requirement. In the first scenario, the optimization problem is non-convex, and hence, it can be solved through using Difference of Convex function (DC) method while the optimization problem of the second scenario is intrinsically convex. Our numerical results show that the higher the number of selected antennas at the transmitter, the higher the covert rate will be achieved.
△ Less
Submitted 26 December, 2018;
originally announced December 2018.
-
Robust Physical Layer Security for Power Domain Non-orthogonal Multiple Access-Based HetNets and HUDNs, SIC Avoidance at Eavesdroppers
Authors:
Moslem Forouzesh,
Paeiz Azmi,
Nader Mokari,
Kai Kit Wong
Abstract:
In this paper, we investigate the physical layer security in downlink of Power Domain Non Orthogonal Multiple Access based heterogeneous cellular network in presence of multiple eavesdroppers. Our aim is to maximize the sum secrecy rate of the network. To this end, we formulate joint subcarrier and power allocation optimization problems to increase sum secrecy rate. Moreover, we propose a novel sc…
▽ More
In this paper, we investigate the physical layer security in downlink of Power Domain Non Orthogonal Multiple Access based heterogeneous cellular network in presence of multiple eavesdroppers. Our aim is to maximize the sum secrecy rate of the network. To this end, we formulate joint subcarrier and power allocation optimization problems to increase sum secrecy rate. Moreover, we propose a novel scheme at which the eavesdroppers are prevented from doing Successive Interference Cancellation, while legitimate users are able to do it. In practical systems, availability of eavesdroppers Channel State Information is impractical, hence we consider two scenarios: 1 Perfect CSI of the eavesdroppers, 2 imperfect CSI of the eavesdroppers. Since the proposed optimization problems are nonconvex, we adopt the well known iterative algorithm called Alternative Search Method. In this algorithm, the optimization problems are converted to two subproblems, power allocation and subcarrier allocation. We solve the power allocation problem by the Successive Convex Approximation approach and solve the subcarrier allocation subproblem, by exploiting the Mesh Adaptive Direct Search algorithm. Moreover, in order to study the optimality gap of the proposed solution method, we apply the monotonic optimization method. Moreover, we evaluate the proposed scheme for secure massive connectivity in 5G networks. Numerical results highlight that the proposed scheme significantly improves the sum secrecy rate compared with the conventional case at which the eavesdroppers are able to apply SIC.
△ Less
Submitted 6 June, 2018;
originally announced June 2018.
-
Cross-Layer Energy Efficient Resource Allocation in PD-NOMA based H-CRANs: Implementation via GPU
Authors:
Ali Mokdad,
Paeiz Azmi,
Nader Mokari,
Mohammad Moltafet,
Mohsen Ghaffari-Miab
Abstract:
In this paper, we propose a cross layer energy efficient resource allocation and remote radio head (RRH) selection algorithm for heterogeneous traffic in power domain - non-orthogonal multiple access (PD-NOMA) based heterogeneous cloud radio access networks (H-CRANs). The main aim is to maximize the EE of the elastic users subject to the average delay constraint of the streaming users and the cons…
▽ More
In this paper, we propose a cross layer energy efficient resource allocation and remote radio head (RRH) selection algorithm for heterogeneous traffic in power domain - non-orthogonal multiple access (PD-NOMA) based heterogeneous cloud radio access networks (H-CRANs). The main aim is to maximize the EE of the elastic users subject to the average delay constraint of the streaming users and the constraints, RRH selection, subcarrier, transmit power and successive interference cancellation. The considered optimization problem is non-convex, NP-hard and intractable. To solve this problem, we transform the fractional objective function into a subtractive form. Then, we utilize successive convex approximation approach. Moreover, in order to increase the processing speed, we introduce a framework for accelerating the successive convex approximation for low complexity with the Lagrangian method on graphics processing unit. Furthermore, in order to show the optimality gap of the proposed successive convex approximation approach, we solve the proposed optimization problem by applying an optimal method based on the monotonic optimization. Studying different scenarios show that by using both PD-NOMA technique and H-CRAN, the system energy efficiency is improved.
△ Less
Submitted 21 March, 2018;
originally announced March 2018.