-
Overlay Space-Air-Ground Integrated Networks with SWIPT-Empowered Aerial Communications
Authors:
Anuradha Verma,
Pankaj Kumar Sharma,
Pawan Kumar,
Dong In Kim
Abstract:
In this article, we consider overlay space-air-ground integrated networks (OSAGINs) where a low earth orbit (LEO) satellite communicates with ground users (GUs) with the assistance of an energy-constrained coexisting air-to-air (A2A) network. Particularly, a non-linear energy harvester with a hybrid SWIPT utilizing both power-splitting and time-switching energy harvesting (EH) techniques is employ…
▽ More
In this article, we consider overlay space-air-ground integrated networks (OSAGINs) where a low earth orbit (LEO) satellite communicates with ground users (GUs) with the assistance of an energy-constrained coexisting air-to-air (A2A) network. Particularly, a non-linear energy harvester with a hybrid SWIPT utilizing both power-splitting and time-switching energy harvesting (EH) techniques is employed at the aerial transmitter. Specifically, we take the random locations of the satellite, ground and aerial receivers to investigate the outage performance of both the satellite-to-ground and aerial networks leveraging the stochastic tools. By taking into account the Shadowed-Rician fading for satellite link, the Nakagami-\emph{m} for ground link, and the Rician fading for aerial link, we derive analytical expressions for the outage probability of these networks. For a comprehensive analysis of aerial network, we consider both the perfect and imperfect successive interference cancellation (SIC) scenarios. Through our analysis, we illustrate that, unlike linear EH, the implementation of non-linear EH provides accurate figures for any target rate, underscoring the significance of using non-linear EH models. Additionally, the influence of key parameters is emphasized, providing guidelines for the practical design of an energy-efficient as well as spectrum-efficient future non-terrestrial networks. Monte Carlo simulations validate the accuracy of our theoretical developments.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Wireless Information and Energy Transfer in the Era of 6G Communications
Authors:
Constantinos Psomas,
Konstantinos Ntougias,
Nikita Shanin,
Dongfang Xu,
Kenneth MacSporran Mayer,
Nguyen Minh Tran,
Laura Cottatellucci,
Kae Won Choi,
Dong In Kim,
Robert Schober,
Ioannis Krikidis
Abstract:
Wireless information and energy transfer (WIET) represents an emerging paradigm which employs controllable transmission of radio-frequency signals for the dual purpose of data communication and wireless charging. As such, WIET is widely regarded as an enabler of envisioned 6G use cases that rely on energy-sustainable Internet-of-Things (IoT) networks, such as smart cities and smart grids. Meeting…
▽ More
Wireless information and energy transfer (WIET) represents an emerging paradigm which employs controllable transmission of radio-frequency signals for the dual purpose of data communication and wireless charging. As such, WIET is widely regarded as an enabler of envisioned 6G use cases that rely on energy-sustainable Internet-of-Things (IoT) networks, such as smart cities and smart grids. Meeting the quality-of-service demands of WIET, in terms of both data transfer and power delivery, requires effective co-design of the information and energy signals. In this article, we present the main principles and design aspects of WIET, focusing on its integration in 6G networks. First, we discuss how conventional communication notions such as resource allocation and waveform design need to be revisited in the context of WIET. Next, we consider various candidate 6G technologies that can boost WIET efficiency, namely, holographic multiple-input multiple-output, near-field beamforming, terahertz communication, intelligent reflecting surfaces (IRSs), and reconfigurable (fluid) antenna arrays. We introduce respective WIET design methods, analyze the promising performance gains of these WIET systems, and discuss challenges, open issues, and future research directions. Finally, a near-field energy beamforming scheme and a power-based IRS beamforming algorithm are experimentally validated using a wireless energy transfer testbed. The vision of WIET in communication systems has been gaining momentum in recent years, with constant progress with respect to theoretical but also practical aspects. The comprehensive overview of the state of the art of WIET presented in this paper highlights the potentials of WIET systems as well as their overall benefits in 6G networks.
△ Less
Submitted 16 May, 2024; v1 submitted 29 April, 2024;
originally announced April 2024.
-
Generative Artificial Intelligence Assisted Wireless Sensing: Human Flow Detection in Practical Communication Environments
Authors:
Jiacheng Wang,
Hongyang Du,
Dusit Niyato,
Zehui Xiong,
Jiawen Kang,
Bo Ai,
Zhu Han,
Dong In Kim
Abstract:
Groundbreaking applications such as ChatGPT have heightened research interest in generative artificial intelligence (GAI). Essentially, GAI excels not only in content generation but also in signal processing, offering support for wireless sensing. Hence, we introduce a novel GAI-assisted human flow detection system (G-HFD). Rigorously, G-HFD first uses channel state information (CSI) to estimate t…
▽ More
Groundbreaking applications such as ChatGPT have heightened research interest in generative artificial intelligence (GAI). Essentially, GAI excels not only in content generation but also in signal processing, offering support for wireless sensing. Hence, we introduce a novel GAI-assisted human flow detection system (G-HFD). Rigorously, G-HFD first uses channel state information (CSI) to estimate the velocity and acceleration of propagation path length change of the human-induced reflection (HIR). Then, given the strong inference ability of the diffusion model, we propose a unified weighted conditional diffusion model (UW-CDM) to denoise the estimation results, enabling the detection of the number of targets. Next, we use the CSI obtained by a uniform linear array with wavelength spacing to estimate the HIR's time of flight and direction of arrival (DoA). In this process, UW-CDM solves the problem of ambiguous DoA spectrum, ensuring accurate DoA estimation. Finally, through clustering, G-HFD determines the number of subflows and the number of targets in each subflow, i.e., the subflow size. The evaluation based on practical downlink communication signals shows G-HFD's accuracy of subflow size detection can reach 91%. This validates its effectiveness and underscores the significant potential of GAI in the context of wireless sensing.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial
Authors:
Lu Lv,
Dongyang Xu,
Rose Qingyang Hu,
Yinghui Ye,
Long Yang,
Xianfu Lei,
Xianbin Wang,
Dong In Kim,
Arumugam Nallanathan
Abstract:
Driven by the ever-increasing requirements of ultra-high spectral efficiency, ultra-low latency, and massive connectivity, the forefront of wireless research calls for the design of advanced next generation multiple access schemes to facilitate provisioning of these stringent demands. This inspires the embrace of non-orthogonal multiple access (NOMA) in future wireless communication networks. Neve…
▽ More
Driven by the ever-increasing requirements of ultra-high spectral efficiency, ultra-low latency, and massive connectivity, the forefront of wireless research calls for the design of advanced next generation multiple access schemes to facilitate provisioning of these stringent demands. This inspires the embrace of non-orthogonal multiple access (NOMA) in future wireless communication networks. Nevertheless, the support of massive access via NOMA leads to additional security threats, due to the open nature of the air interface, the broadcast characteristic of radio propagation as well as intertwined relationship among paired NOMA users. To address this specific challenge, the superimposed transmission of NOMA can be explored as new opportunities for security aware design, for example, multiuser interference inherent in NOMA can be constructively engineered to benefit communication secrecy and privacy. The purpose of this tutorial is to provide a comprehensive overview on the state-of-the-art physical layer security techniques that guarantee wireless security and privacy for NOMA networks, along with the opportunities, technical challenges, and future research trends.
△ Less
Submitted 21 May, 2024; v1 submitted 25 March, 2024;
originally announced March 2024.
-
Near Field Communications for DMA-NOMA Networks
Authors:
Zheng Zhang,
Yuanwei Liu,
Zhaolin Wang,
Jian Chen,
Dong In Kim
Abstract:
A novel near-field transmission framework is proposed for dynamic metasurface antenna (DMA)-enabled non-orthogonal multiple access (NOMA) networks. The base station (BS) exploits the hybrid beamforming to communicate with multiple near users (NUs) and far users (FUs) using the NOMA principle. Based on this framework, two novel beamforming schemes are proposed. 1) For the case of the grouped users…
▽ More
A novel near-field transmission framework is proposed for dynamic metasurface antenna (DMA)-enabled non-orthogonal multiple access (NOMA) networks. The base station (BS) exploits the hybrid beamforming to communicate with multiple near users (NUs) and far users (FUs) using the NOMA principle. Based on this framework, two novel beamforming schemes are proposed. 1) For the case of the grouped users distributed in the same direction, a beam-steering scheme is developed. The metric of beam pattern error (BPE) is introduced for the characterization of the gap between the hybrid beamformers and the desired ideal beamformers, where a two-layer algorithm is proposed to minimize BPE by optimizing hybrid beamformers. Then, the optimal power allocation strategy is obtained to maximize the sum achievable rate of the network. 2) For the case of users randomly distributed, a beam-splitting scheme is proposed, where two sub-beamformers are extracted from the single beamformer to serve different users in the same group. An alternating optimization (AO) algorithm is proposed for hybrid beamformer optimization, and the optimal power allocation is also derived. Numerical results validate that: 1) the proposed beamforming schemes exhibit superior performance compared with the existing imperfect-resolution-based beamforming scheme; 2) the communication rate of the proposed transmission framework is sensitive to the imperfect distance knowledge of NUs but not to that of FUs.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
Mixture of Experts for Network Optimization: A Large Language Model-enabled Approach
Authors:
Hongyang Du,
Guangyuan Liu,
Yi**g Lin,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Dong In Kim
Abstract:
Optimizing various wireless user tasks poses a significant challenge for networking systems because of the expanding range of user requirements. Despite advancements in Deep Reinforcement Learning (DRL), the need for customized optimization tasks for individual users complicates develo** and applying numerous DRL models, leading to substantial computation resource and energy consumption and can…
▽ More
Optimizing various wireless user tasks poses a significant challenge for networking systems because of the expanding range of user requirements. Despite advancements in Deep Reinforcement Learning (DRL), the need for customized optimization tasks for individual users complicates develo** and applying numerous DRL models, leading to substantial computation resource and energy consumption and can lead to inconsistent outcomes. To address this issue, we propose a novel approach utilizing a Mixture of Experts (MoE) framework, augmented with Large Language Models (LLMs), to analyze user objectives and constraints effectively, select specialized DRL experts, and weigh each decision from the participating experts. Specifically, we develop a gate network to oversee the expert models, allowing a collective of experts to tackle a wide array of new tasks. Furthermore, we innovatively substitute the traditional gate network with an LLM, leveraging its advanced reasoning capabilities to manage expert model selection for joint decisions. Our proposed method reduces the need to train new DRL models for each unique optimization problem, decreasing energy consumption and AI model implementation costs. The LLM-enabled MoE approach is validated through a general maze navigation task and a specific network service provider utility maximization task, demonstrating its effectiveness and practical applicability in optimizing complex networking systems.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
Generative AI for Space-Air-Ground Integrated Networks (SAGIN)
Authors:
Ruichen Zhang,
Hongyang Du,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Abbas Jamalipour,
** Zhang,
Dong In Kim
Abstract:
Recently, generative AI technologies have emerged as a significant advancement in artificial intelligence field, renowned for their language and image generation capabilities. Meantime, space-air-ground integrated network (SAGIN) is an integral part of future B5G/6G for achieving ubiquitous connectivity. Inspired by this, this article explores an integration of generative AI in SAGIN, focusing on…
▽ More
Recently, generative AI technologies have emerged as a significant advancement in artificial intelligence field, renowned for their language and image generation capabilities. Meantime, space-air-ground integrated network (SAGIN) is an integral part of future B5G/6G for achieving ubiquitous connectivity. Inspired by this, this article explores an integration of generative AI in SAGIN, focusing on potential applications and case study. We first provide a comprehensive review of SAGIN and generative AI models, highlighting their capabilities and opportunities of their integration. Benefiting from generative AI's ability to generate useful data and facilitate advanced decision-making processes, it can be applied to various scenarios of SAGIN. Accordingly, we present a concise survey on their integration, including channel modeling and channel state information (CSI) estimation, joint air-space-ground resource allocation, intelligent network deployment, semantic communications, image extraction and processing, security and privacy enhancement. Next, we propose a framework that utilizes a Generative Diffusion Model (GDM) to construct channel information map to enhance quality of service for SAGIN. Simulation results demonstrate the effectiveness of the proposed framework. Finally, we discuss potential research directions for generative AI-enabled SAGIN.
△ Less
Submitted 11 November, 2023;
originally announced November 2023.
-
Generative AI-aided Joint Training-free Secure Semantic Communications via Multi-modal Prompts
Authors:
Hongyang Du,
Guangyuan Liu,
Dusit Niyato,
Jiayi Zhang,
Jiawen Kang,
Zehui Xiong,
Bo Ai,
Dong In Kim
Abstract:
Semantic communication (SemCom) holds promise for reducing network resource consumption while achieving the communications goal. However, the computational overheads in jointly training semantic encoders and decoders-and the subsequent deployment in network devices-are overlooked. Recent advances in Generative artificial intelligence (GAI) offer a potential solution. The robust learning abilities…
▽ More
Semantic communication (SemCom) holds promise for reducing network resource consumption while achieving the communications goal. However, the computational overheads in jointly training semantic encoders and decoders-and the subsequent deployment in network devices-are overlooked. Recent advances in Generative artificial intelligence (GAI) offer a potential solution. The robust learning abilities of GAI models indicate that semantic decoders can reconstruct source messages using a limited amount of semantic information, e.g., prompts, without joint training with the semantic encoder. A notable challenge, however, is the instability introduced by GAI's diverse generation ability. This instability, evident in outputs like text-generated images, limits the direct application of GAI in scenarios demanding accurate message recovery, such as face image transmission. To solve the above problems, this paper proposes a GAI-aided SemCom system with multi-model prompts for accurate content decoding. Moreover, in response to security concerns, we introduce the application of covert communications aided by a friendly jammer. The system jointly optimizes the diffusion step, jamming, and transmitting power with the aid of the generative diffusion models, enabling successful and secure transmission of the source messages.
△ Less
Submitted 5 September, 2023;
originally announced September 2023.
-
Enhancing Deep Reinforcement Learning: A Tutorial on Generative Diffusion Models in Network Optimization
Authors:
Hongyang Du,
Ruichen Zhang,
Yinqiu Liu,
Jiacheng Wang,
Yi**g Lin,
Zonghang Li,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Shuguang Cui,
Bo Ai,
Haibo Zhou,
Dong In Kim
Abstract:
Generative Diffusion Models (GDMs) have emerged as a transformative force in the realm of Generative Artificial Intelligence (GenAI), demonstrating their versatility and efficacy across various applications. The ability to model complex data distributions and generate high-quality samples has made GDMs particularly effective in tasks such as image generation and reinforcement learning. Furthermore…
▽ More
Generative Diffusion Models (GDMs) have emerged as a transformative force in the realm of Generative Artificial Intelligence (GenAI), demonstrating their versatility and efficacy across various applications. The ability to model complex data distributions and generate high-quality samples has made GDMs particularly effective in tasks such as image generation and reinforcement learning. Furthermore, their iterative nature, which involves a series of noise addition and denoising steps, is a powerful and unique approach to learning and generating data. This paper serves as a comprehensive tutorial on applying GDMs in network optimization tasks. We delve into the strengths of GDMs, emphasizing their wide applicability across various domains, such as vision, text, and audio generation. We detail how GDMs can be effectively harnessed to solve complex optimization problems inherent in networks. The paper first provides a basic background of GDMs and their applications in network optimization. This is followed by a series of case studies, showcasing the integration of GDMs with Deep Reinforcement Learning (DRL), incentive mechanism design, Semantic Communications (SemCom), Internet of Vehicles (IoV) networks, etc. These case studies underscore the practicality and efficacy of GDMs in real-world scenarios, offering insights into network design. We conclude with a discussion on potential future directions for GDM research and applications, providing major insights into how they can continue to shape the future of network optimization.
△ Less
Submitted 8 May, 2024; v1 submitted 10 August, 2023;
originally announced August 2023.
-
Semantic Communication-Empowered Vehicle Count Prediction for Traffic Management
Authors:
Sachin Kadam,
Dong In Kim
Abstract:
Vehicle count prediction is an important aspect of smart city traffic management. Most major roads are monitored by cameras with computing and transmitting capabilities. These cameras provide data to the central traffic controller (CTC), which is in charge of traffic control management. In this paper, we propose a joint CNN-LSTM-based semantic communication (SemCom) model in which the semantic enc…
▽ More
Vehicle count prediction is an important aspect of smart city traffic management. Most major roads are monitored by cameras with computing and transmitting capabilities. These cameras provide data to the central traffic controller (CTC), which is in charge of traffic control management. In this paper, we propose a joint CNN-LSTM-based semantic communication (SemCom) model in which the semantic encoder of a camera extracts the relevant semantics from raw images. The encoded semantics are then sent to the CTC by the transmitter in the form of symbols. The semantic decoder of the CTC predicts the vehicle count on each road based on the sequence of received symbols and develops a traffic management strategy accordingly. Using numerical results, we show that the proposed SemCom model reduces overhead by $54.42\%$ when compared to source encoder/decoder methods. Also, we demonstrate through simulations that the proposed model outperforms state-of-the-art models in terms of mean absolute error (MAE) and mean-squared error (MSE).
△ Less
Submitted 2 January, 2024; v1 submitted 23 July, 2023;
originally announced July 2023.
-
AI-Generated Incentive Mechanism and Full-Duplex Semantic Communications for Information Sharing
Authors:
Hongyang Du,
Jiacheng Wang,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Dong In Kim
Abstract:
The next generation of Internet services, such as Metaverse, rely on mixed reality (MR) technology to provide immersive user experiences. However, the limited computation power of MR headset-mounted devices (HMDs) hinders the deployment of such services. Therefore, we propose an efficient information sharing scheme based on full-duplex device-to-device (D2D) semantic communications to address this…
▽ More
The next generation of Internet services, such as Metaverse, rely on mixed reality (MR) technology to provide immersive user experiences. However, the limited computation power of MR headset-mounted devices (HMDs) hinders the deployment of such services. Therefore, we propose an efficient information sharing scheme based on full-duplex device-to-device (D2D) semantic communications to address this issue. Our approach enables users to avoid heavy and repetitive computational tasks, such as artificial intelligence-generated content (AIGC) in the view images of all MR users. Specifically, a user can transmit the generated content and semantic information extracted from their view image to nearby users, who can then use this information to obtain the spatial matching of computation results under their view images. We analyze the performance of full-duplex D2D communications, including the achievable rate and bit error probability, by using generalized small-scale fading models. To facilitate semantic information sharing among users, we design a contract theoretic AI-generated incentive mechanism. The proposed diffusion model generates the optimal contract design, outperforming two deep reinforcement learning algorithms, i.e., proximal policy optimization and soft actor-critic algorithms. Our numerical analysis experiment proves the effectiveness of our proposed methods. The code for this paper is available at https://github.com/HongyangDu/SemSharing
△ Less
Submitted 28 June, 2023; v1 submitted 3 March, 2023;
originally announced March 2023.
-
Knowledge-Aware Semantic Communication System Design
Authors:
Sachin Kadam,
Dong In Kim
Abstract:
The recent emergence of 6G raises the challenge of increasing the transmission data rate even further in order to break the barrier set by the Shannon limit. Traditional communication methods fall short of the 6G goals, paving the way for Semantic Communication (SemCom) systems. These systems find applications in wide range of fields such as economics, metaverse, autonomous transportation systems,…
▽ More
The recent emergence of 6G raises the challenge of increasing the transmission data rate even further in order to break the barrier set by the Shannon limit. Traditional communication methods fall short of the 6G goals, paving the way for Semantic Communication (SemCom) systems. These systems find applications in wide range of fields such as economics, metaverse, autonomous transportation systems, healthcare, smart factories, etc. In SemCom systems, only the relevant information from the data, known as semantic data, is extracted to eliminate unwanted overheads in the raw data and then transmitted after encoding. In this paper, we first use the shared knowledge base to extract the keywords from the dataset. Then, we design an auto-encoder and auto-decoder that only transmit these keywords and, respectively, recover the data using the received keywords and the shared knowledge. We show analytically that the overall semantic distortion function has an upper bound, which is shown in the literature to converge. We numerically compute the accuracy of the reconstructed sentences at the receiver. Using simulations, we show that the proposed methods outperform a state-of-the-art method in terms of the average number of words per sentence.
△ Less
Submitted 28 January, 2023;
originally announced January 2023.
-
Knowledge-Aware Semantic Communication System Design and Data Allocation
Authors:
Sachin Kadam,
Dong In Kim
Abstract:
The recent emergence of 6G raises the challenge of increasing the transmission data rate even further in order to overcome the Shannon limit. Traditional communication methods fall short of the 6G goals, paving the way for Semantic Communication (SemCom) systems that have applications in the metaverse, healthcare, economics, etc. In SemCom systems, only the relevant keywords from the data are extr…
▽ More
The recent emergence of 6G raises the challenge of increasing the transmission data rate even further in order to overcome the Shannon limit. Traditional communication methods fall short of the 6G goals, paving the way for Semantic Communication (SemCom) systems that have applications in the metaverse, healthcare, economics, etc. In SemCom systems, only the relevant keywords from the data are extracted and used for transmission. In this paper, we design an auto-encoder and auto-decoder that only transmit these keywords and, respectively, recover the data using the received keywords and the shared knowledge. This SemCom system is used in a setup in which the receiver allocates various categories of the same dataset collected from the transmitter, which differ in size and accuracy, to a number of users. This scenario is formulated using an optimization problem called the data allocation problem (DAP). We show that it is NP-complete and propose a greedy algorithm to solve it. Using simulations, we show that the proposed methods for SemCom system design outperform state-of-the-art methods in terms of average number of words per sentence for a given accuracy, and that the proposed greedy algorithm solution of the DAP performs significantly close to the optimal solution.
△ Less
Submitted 13 November, 2023; v1 submitted 30 December, 2022;
originally announced January 2023.
-
Enabling AI-Generated Content (AIGC) Services in Wireless Edge Networks
Authors:
Hongyang Du,
Zonghang Li,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Xuemin,
Shen,
Dong In Kim
Abstract:
Artificial Intelligence-Generated Content (AIGC) refers to the use of AI to automate the information creation process while fulfilling the personalized requirements of users. However, due to the instability of AIGC models, e.g., the stochastic nature of diffusion models, the quality and accuracy of the generated content can vary significantly. In wireless edge networks, the transmission of incorre…
▽ More
Artificial Intelligence-Generated Content (AIGC) refers to the use of AI to automate the information creation process while fulfilling the personalized requirements of users. However, due to the instability of AIGC models, e.g., the stochastic nature of diffusion models, the quality and accuracy of the generated content can vary significantly. In wireless edge networks, the transmission of incorrectly generated content may unnecessarily consume network resources. Thus, a dynamic AIGC service provider (ASP) selection scheme is required to enable users to connect to the most suited ASP, improving the users' satisfaction and quality of generated content. In this article, we first review the AIGC techniques and their applications in wireless networks. We then present the AIGC-as-a-service (AaaS) concept and discuss the challenges in deploying AaaS at the edge networks. Yet, it is essential to have performance metrics to evaluate the accuracy of AIGC services. Thus, we introduce several image-based perceived quality evaluation metrics. Then, we propose a general and effective model to illustrate the relationship between computational resources and user-perceived quality evaluation metrics. To achieve efficient AaaS and maximize the quality of generated content in wireless edge networks, we propose a deep reinforcement learning-enabled algorithm for optimal ASP selection. Simulation results show that the proposed algorithm can provide a higher quality of generated content to users and achieve fewer crashed tasks by comparing with four benchmarks, i.e., overloading-avoidance, random, round-robin policies, and the upper-bound schemes.
△ Less
Submitted 9 January, 2023;
originally announced January 2023.
-
Performance Analysis of Free-Space Information Sharing in Full-Duplex Semantic Communications
Authors:
Hongyang Du,
Jiacheng Wang,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Dong In Kim,
Boon Hee Soong
Abstract:
In next-generation Internet services, such as Metaverse, the mixed reality (MR) technique plays a vital role. Yet the limited computing capacity of the user-side MR headset-mounted device (HMD) prevents its further application, especially in scenarios that require a lot of computation. One way out of this dilemma is to design an efficient information sharing scheme among users to replace the heavy…
▽ More
In next-generation Internet services, such as Metaverse, the mixed reality (MR) technique plays a vital role. Yet the limited computing capacity of the user-side MR headset-mounted device (HMD) prevents its further application, especially in scenarios that require a lot of computation. One way out of this dilemma is to design an efficient information sharing scheme among users to replace the heavy and repetitive computation. In this paper, we propose a free-space information sharing mechanism based on full-duplex device-to-device (D2D) semantic communications. Specifically, the view images of MR users in the same real-world scenario may be analogous. Therefore, when one user (i.e., a device) completes some computation tasks, the user can send his own calculation results and the semantic features extracted from the user's own view image to nearby users (i.e., other devices). On this basis, other users can use the received semantic features to obtain the spatial matching of the computational results under their own view images without repeating the computation. Using generalized small-scale fading models, we analyze the key performance indicators of full-duplex D2D communications, including channel capacity and bit error probability, which directly affect the transmission of semantic information. Finally, the numerical analysis experiment proves the effectiveness of our proposed methods.
△ Less
Submitted 27 November, 2022;
originally announced November 2022.
-
Privacy-preserving Intelligent Resource Allocation for Federated Edge Learning in Quantum Internet
Authors:
Minrui Xu,
Dusit Niyato,
Zhaohui Yang,
Zehui Xiong,
Jiawen Kang,
Dong In Kim,
Xuemin,
Shen
Abstract:
Federated edge learning (FEL) is a promising paradigm of distributed machine learning that can preserve data privacy while training the global model collaboratively. However, FEL is still facing model confidentiality issues due to eavesdrop** risks of exchanging cryptographic keys through traditional encryption schemes. Therefore, in this paper, we propose a hierarchical architecture for quantum…
▽ More
Federated edge learning (FEL) is a promising paradigm of distributed machine learning that can preserve data privacy while training the global model collaboratively. However, FEL is still facing model confidentiality issues due to eavesdrop** risks of exchanging cryptographic keys through traditional encryption schemes. Therefore, in this paper, we propose a hierarchical architecture for quantum-secured FEL systems with ideal security based on the quantum key distribution (QKD) to facilitate public key and model encryption against eavesdrop** attacks. Specifically, we propose a stochastic resource allocation model for efficient QKD to encrypt FEL keys and models. In FEL systems, remote FEL workers are connected to cluster heads via quantum-secured channels to train an aggregated global model collaboratively. However, due to the unpredictable number of workers at each location, the demand for secret-key rates to support secure model transmission to the server is unpredictable. The proposed systems need to efficiently allocate limited QKD resources (i.e., wavelengths) such that the total cost is minimized in the presence of stochastic demand by formulating the optimization problem for the proposed architecture as a stochastic programming model. To this end, we propose a federated reinforcement learning-based resource allocation scheme to solve the proposed model without complete state information. The proposed scheme enables QKD managers and controllers to train a global QKD resource allocation policy while kee** their private experiences local. Numerical results demonstrate that the proposed schemes can successfully achieve the cost-minimizing objective under uncertain demand while improving the training efficiency by about 50\% compared to state-of-the-art schemes.
△ Less
Submitted 9 October, 2022;
originally announced October 2022.
-
Foundations of Wireless Information and Power Transfer: Theory, Prototypes, and Experiments
Authors:
Bruno Clerckx,
Junghoon Kim,
Kae Won Choi,
Dong In Kim
Abstract:
As wireless has disrupted communications, wireless will also disrupt the delivery of energy. Future wireless networks will be equipped with (radiative) wireless power transfer (WPT) capability and exploit radio waves to carry both energy and information through a unified wireless information and power transfer (WIPT). Such networks will make the best use of the RF spectrum and radiation as well as…
▽ More
As wireless has disrupted communications, wireless will also disrupt the delivery of energy. Future wireless networks will be equipped with (radiative) wireless power transfer (WPT) capability and exploit radio waves to carry both energy and information through a unified wireless information and power transfer (WIPT). Such networks will make the best use of the RF spectrum and radiation as well as the network infrastructure for the dual purpose of communicating and energizing. Consequently those networks will enable trillions of future low-power devices to sense, compute, connect, and energize anywhere, anytime, and on the move. In this paper, we review the foundations of such future system. We first give an overview of the fundamental theoretical building blocks of WPT and WIPT. Then we discuss some state-of-the-art experimental setups and prototypes of both WPT and WIPT and contrast theoretical and experimental results. We draw a special attention to how the integration of RF, signal and system designs in WPT and WIPT leads to new theoretical and experimental design challenges for both microwave and communication engineers and highlight some promising solutions. Topics and experimental testbeds discussed include closed-loop WPT and WIPT architectures with beamforming, waveform, channel acquisition, and single/multi-antenna energy harvester, centralized and distributed WPT, reconfigurable metasurfaces and intelligent surfaces for WPT, transmitter and receiver architecture for WIPT, modulation, rate-energy trade-off. Moreover, we highlight important theoretical and experimental research directions to be addressed for WPT and WIPT to become a foundational technology of future wireless networks.
△ Less
Submitted 8 September, 2022;
originally announced September 2022.
-
A Dynamic Hierarchical Framework for IoT-assisted Metaverse Synchronization
Authors:
Yue Han,
Dusit Niyato,
Cyril Leung,
Dong In Kim,
Kun Zhu,
Shaohan Feng,
Sherman Xuemin Shen,
Chunyan Miao
Abstract:
Metaverse has recently attracted much attention from both academia and industry. Virtual services, ranging from virtual driver training to online route optimization for smart goods delivery, are emerging in the Metaverse. To make the human experience of virtual life more real, digital twins (DTs), namely digital replicas of physical objects, are key enablers. However, DT status may not always accu…
▽ More
Metaverse has recently attracted much attention from both academia and industry. Virtual services, ranging from virtual driver training to online route optimization for smart goods delivery, are emerging in the Metaverse. To make the human experience of virtual life more real, digital twins (DTs), namely digital replicas of physical objects, are key enablers. However, DT status may not always accurately reflect that of its real-world twin because the latter may be subject to changes with time. As such, it is necessary to synchronize a DT with its physical counterpart to ensure that its status is accurate for virtual businesses in the Metaverse. In this paper, we propose a dynamic hierarchical framework in which a group of IoT devices is incentivized to sense and collect physical objects' status information collectively so as to assists virtual service providers (VSPs) in synchronizing DTs. Based on the collected sensing data and the value decay rate of the DTs, the VSPs can determine synchronization intensities to maximize their payoffs. In our proposed dynamic hierarchical framework, the lower-level evolutionary game captures the VSPs selection by the IoT device population, and the upper-level differential game captures the VSPs payoffs, which are affected by the synchronization strategy, IoT devices selections, and the DTs value status, given VSPs are simultaneous decision makers. We further consider the case in which some VSPs are first movers and extend it as a Stackelberg differential game. We theoretically and experimentally show that the equilibrium to the lower-level game exists and is evolutionarily robust, and provide a sensitivity analysis with respect to various system parameters. Experiments show that the proposed dynamic hierarchical game outperform the baseline.
△ Less
Submitted 14 March, 2022; v1 submitted 8 March, 2022;
originally announced March 2022.
-
Reconfigurable Intelligent Surface-Aided Joint Radar and Covert Communications: Fundamentals, Optimization, and Challenges
Authors:
Hongyang Du,
Jiawen Kang,
Dusit Niyato,
Jiayi Zhang,
Dong In Kim
Abstract:
Future wireless communication systems will evolve toward multi-functional integrated systems to improve spectrum utilization and reduce equipment sizes. A joint radar and communication (JRC) system, which can support simultaneous information transmission and target detection, has been regarded as a promising solution for emerging applications such as autonomous vehicles. In JRC, data security and…
▽ More
Future wireless communication systems will evolve toward multi-functional integrated systems to improve spectrum utilization and reduce equipment sizes. A joint radar and communication (JRC) system, which can support simultaneous information transmission and target detection, has been regarded as a promising solution for emerging applications such as autonomous vehicles. In JRC, data security and privacy protection are critical issues. Thus, we first apply covert communication into JRC and propose a joint radar and covert communication (JRCC) system to achieve high spectrum utilization and secure data transmission simultaneously. In the JRCC system, an existence of sensitive data transmission is hidden from a maliciously observant warden. However, the performance of JRCC is restricted by severe signal propagation environment and hardware devices. Fortunately, reconfigurable intelligent surfaces (RISs) can change the signal propagation smartly to improve the networks performance with low cost. We first overview fundamental concepts of JRCC and RIS and then propose the RIS-aided JRCC system design. Furthermore, both covert communication and radar performance metrics are investigated and a game theory-based covert rate optimization scheme is designed to achieve secure communication. Finally, we present several promising applications and future directions of RIS-aided JRCC systems.
△ Less
Submitted 7 March, 2022; v1 submitted 5 March, 2022;
originally announced March 2022.
-
Design and Implementation of 5.8GHz RF Wireless PowerTransfer System
Authors:
Je Hyeon Park,
Nguyen Minh Tran,
Sa Il Hwang,
Dong In Kim,
Kae Won Choi
Abstract:
In this paper, we present a 5.8 GHz radio-frequency (RF) wireless power transfer (WPT) system that consists of 64 transmit antennas and 16 receive antennas. Unlike the inductive or resonant coupling-based near-field WPT, RF WPT has a great advantage in powering low-power internet of things (IoT) devices with its capability of long-range wireless power transfer. We also propose a beam scanning algo…
▽ More
In this paper, we present a 5.8 GHz radio-frequency (RF) wireless power transfer (WPT) system that consists of 64 transmit antennas and 16 receive antennas. Unlike the inductive or resonant coupling-based near-field WPT, RF WPT has a great advantage in powering low-power internet of things (IoT) devices with its capability of long-range wireless power transfer. We also propose a beam scanning algorithm that can effectively transfer the power no matter whether the receiver is located in the radiative near-field zone or far-field zone. The proposed beam scanning algorithm is verified with a real-life WPT testbed implemented by ourselves. By experiments, we confirm that the implemented 5.8 GHz RF WPT system is able to transfer 3.67 mW at a distance of 25 meters with the proposed beam scanning algorithm. Moreover, the results show that the proposed algorithm can effectively cover radiative near-field region differently from the conventional scanning schemes which are designed under the assumption of the far-field WPT.
△ Less
Submitted 6 October, 2021;
originally announced October 2021.
-
Unified Simultaneous Wireless Information and Power Transfer for IoT: Signaling and Architecture with Deep Learning Adaptive Control
Authors:
Jong ** Park,
Jong Ho Moon,
Hyeon Ho Jang,
Dong In Kim
Abstract:
In this paper, we propose a unified SWIPT signal and its architecture design in order to take advantage of both single tone and multi-tone signaling by adjusting only the power allocation ratio of a unified signal. For this, we design a novel unified and integrated receiver architecture for the proposed unified SWIPT signaling, which consumes low power with an envelope detection. To relieve the co…
▽ More
In this paper, we propose a unified SWIPT signal and its architecture design in order to take advantage of both single tone and multi-tone signaling by adjusting only the power allocation ratio of a unified signal. For this, we design a novel unified and integrated receiver architecture for the proposed unified SWIPT signaling, which consumes low power with an envelope detection. To relieve the computational complexity of the receiver, we propose an adaptive control algorithm by which the transmitter adjusts the communication mode through temporal convolutional network (TCN) based asymmetric processing. To this end, the transmitter optimizes the modulation index and power allocation ratio in short-term scale while updating the mode switching threshold in long-term scale. We demonstrate that the proposed unified SWIPT system improves the achievable rate under the self-powering condition of low-power IoT devices. Consequently it is foreseen to effectively deploy low-power IoT networks that concurrently supply both information and energy wirelessly to the devices by using the proposed unified SWIPT and adaptive control algorithm in place at the transmitter side.
△ Less
Submitted 25 June, 2021;
originally announced June 2021.
-
Reconfigurable Intelligent Surface-Aided Wireless Power Transfer Systems: Analysis and Implementation
Authors:
Nguyen Minh Tran,
Muhammad Miftahul Amri,
Je Hyeon Park,
Dong In Kim,
Kae Won Choi
Abstract:
Reconfigurable intelligent surface (RIS) is a promising technology for RF wireless power transfer (WPT) as it is capable of beamforming and beam focusing without using active and power-hungry components. In this paper, we propose a multi-tile RIS beam scanning (MTBS) algorithm for powering up internet-of-things (IoT) devices. Considering the hardware limitations of the IoT devices, the proposed al…
▽ More
Reconfigurable intelligent surface (RIS) is a promising technology for RF wireless power transfer (WPT) as it is capable of beamforming and beam focusing without using active and power-hungry components. In this paper, we propose a multi-tile RIS beam scanning (MTBS) algorithm for powering up internet-of-things (IoT) devices. Considering the hardware limitations of the IoT devices, the proposed algorithm requires only power information to enable the beam focusing capability of the RIS. Specifically, we first divide the RIS into smaller RIS tiles. Then, all RIS tiles and the phased array transmitter are iteratively scanned and optimized to maximize the receive power. We elaborately analyze the proposed algorithm and build a simulator to verify it. Furthermore, we have built a real-life testbed of RIS-aided WPT systems to validate the algorithm. The experimental results show that the proposed MTBS algorithm can properly control the transmission phase of the transmitter and the reflection phase of the RIS to focus the power at the receiver. Consequently, after executing the algorithm, about 20 dB improvement of the receive power is achieved compared to the case that all unit cells of the RIS are in OFF state. By experiments, we confirm that the RIS with the MTBS algorithm can greatly enhance the power transfer efficiency.
△ Less
Submitted 13 March, 2022; v1 submitted 12 June, 2021;
originally announced June 2021.
-
Outage Performance of $3$D Mobile UAV Caching for Hybrid Satellite-Terrestrial Networks
Authors:
Pankaj K. Sharma,
Deepika Gupta,
Dong In Kim
Abstract:
In this paper, we consider a hybrid satellite-terrestrial network (HSTN) where a multiantenna satellite communicates with a ground user equipment (UE) with the help of multiple cache-enabled amplify-and-forward (AF) three-dimensional ($3$D) mobile unmanned aerial vehicle (UAV) relays. Herein, we employ the two fundamental most popular content (MPC) and uniform content (UC) caching schemes for two…
▽ More
In this paper, we consider a hybrid satellite-terrestrial network (HSTN) where a multiantenna satellite communicates with a ground user equipment (UE) with the help of multiple cache-enabled amplify-and-forward (AF) three-dimensional ($3$D) mobile unmanned aerial vehicle (UAV) relays. Herein, we employ the two fundamental most popular content (MPC) and uniform content (UC) caching schemes for two types of mobile UAV relays, namely fully $3$D and fixed height. Taking into account the multiantenna satellite links and the random $3$D distances between UAV relays and UE, we analyze the outage probability (OP) of considered system with MPC and UC caching schemes. We further carry out the corresponding asymptotic OP analysis to present the insights on achievable performance gains of two schemes for both types of $3$D mobile UAV relaying. Specifically, we show the following: (a) MPC caching dominates the UC and no caching schemes; (b) fully $3$D mobile UAV relaying outperforms its fixed height counterpart. We finally corroborate the theoretic analysis by simulations.
△ Less
Submitted 10 June, 2021;
originally announced June 2021.
-
Optimization-driven Machine Learning for Intelligent Reflecting Surfaces Assisted Wireless Networks
Authors:
Shimin Gong,
Jiaye Lin,
**bei Zhang,
Dusit Niyato,
Dong In Kim,
Mohsen Guizani
Abstract:
Intelligent reflecting surface (IRS) has been recently employed to reshape the wireless channels by controlling individual scattering elements' phase shifts, namely, passive beamforming. Due to the large size of scattering elements, the passive beamforming is typically challenged by the high computational complexity and inexact channel information. In this article, we focus on machine learning (ML…
▽ More
Intelligent reflecting surface (IRS) has been recently employed to reshape the wireless channels by controlling individual scattering elements' phase shifts, namely, passive beamforming. Due to the large size of scattering elements, the passive beamforming is typically challenged by the high computational complexity and inexact channel information. In this article, we focus on machine learning (ML) approaches for performance maximization in IRS-assisted wireless networks. In general, ML approaches provide enhanced flexibility and robustness against uncertain information and imprecise modeling. Practical challenges still remain mainly due to the demand for a large dataset in offline training and slow convergence in online learning. These observations motivate us to design a novel optimization-driven ML framework for IRS-assisted wireless networks, which takes both advantages of the efficiency in model-based optimization and the robustness in model-free ML approaches. By splitting the decision variables into two parts, one part is obtained by the outer-loop ML approach, while the other part is optimized efficiently by solving an approximate problem. Numerical results verify that the optimization-driven ML approach can improve both the convergence and the reward performance compared to conventional model-free learning approaches.
△ Less
Submitted 29 August, 2020;
originally announced August 2020.
-
Radio Resource Management in Joint Radar and Communication: A Comprehensive Survey
Authors:
Nguyen Cong Luong,
Xiao Lu,
Dinh Thai Hoang,
Dusit Niyato,
Dong In Kim
Abstract:
Joint radar and communication (JRC) has recently attracted substantial attention. The first reason is that JRC allows individual radar and communication systems to share spectrum bands and thus improves the spectrum utilization. The second reason is that JRC enables a single hardware platform, e.g., an autonomous vehicle or a UAV, to simultaneously perform the communication function and the radar…
▽ More
Joint radar and communication (JRC) has recently attracted substantial attention. The first reason is that JRC allows individual radar and communication systems to share spectrum bands and thus improves the spectrum utilization. The second reason is that JRC enables a single hardware platform, e.g., an autonomous vehicle or a UAV, to simultaneously perform the communication function and the radar function. As a result, JRC is able to improve the efficiency of resources, i.e., spectrum and energy, reduce the system size, and minimize the system cost. However, there are several challenges to be solved for the JRC design. In particular, sharing the spectrum imposes the interference caused by the systems, and sharing the hardware platform and energy resource complicates the design of the JRC transmitter and compromises the performance of each function. To address the challenges, several resource management approaches have been recently proposed, and this paper presents a comprehensive literature review on resource management for JRC. First, we give fundamental concepts of JRC, important performance metrics used in JRC systems, and applications of the JRC systems. Then, we review and analyze resource management approaches, i.e., spectrum sharing, power allocation, and interference management, for JRC. In addition, we present security issues to JRC and provide a discussion of countermeasures to the security issues. Finally, we highlight important challenges in the JRC design and discuss future research directions related to JRC.
△ Less
Submitted 28 January, 2021; v1 submitted 26 July, 2020;
originally announced July 2020.
-
Overlay Satellite-Terrestrial Networks for IoT under Hybrid Interference Environments
Authors:
Pankaj K. Sharma,
Budharam Yogesh,
Deepika Gupta,
Dong In Kim
Abstract:
In this paper, we consider an overlay satellite-terrestrial network (OSTN) where an opportunistically selected terrestrial internet-of-things (IoT) network assists the primary satellite communications as well as accesses the spectrum for its own communications under hybrid interference received from extra-terrestrial sources (ETSs) and terrestrial sources (TSs). Herein, the IoT network adopts powe…
▽ More
In this paper, we consider an overlay satellite-terrestrial network (OSTN) where an opportunistically selected terrestrial internet-of-things (IoT) network assists the primary satellite communications as well as accesses the spectrum for its own communications under hybrid interference received from extra-terrestrial sources (ETSs) and terrestrial sources (TSs). Herein, the IoT network adopts power-domain multiplexing to amplify-and-forward the superposed satellite and IoT signals. Considering a unified analytical framework for shadowed-Rician fading with integer/non-integer Nakagami-\emph{m} parameter for satellite and interfering ETSs links along with the integer/non-integer Nakagami-\emph{m} fading for terrestrial IoT and interfering TSs links, we derive the outage probability (OP) of both satellite and IoT networks. Further, we derive the respective asymptotic OP expressions to reveal the diversity order of both satellite and IoT networks under the two conditions, namely when the transmit power of interferers: $(a)$ remains fixed; and $(b)$ varies proportional to the transmit powers of main satellite and IoT users. We show that the proposed OSTN with adaptive power-splitting factor benefits the IoT network while guaranteeing certain quality-of-service (QoS) of satellite network. We verify the numerical results by simulations.
△ Less
Submitted 29 March, 2020;
originally announced March 2020.
-
Mechanism Design for Wireless Powered Spatial Crowdsourcing Networks
Authors:
Yutao Jiao,
** Wang,
Dusit Niyato,
Bin Lin,
Dong In Kim
Abstract:
Wireless power transfer (WPT) is a promising technology to prolong the lifetime of the sensors and communication devices, i.e., workers, in completing crowdsourcing tasks by providing continuous and cost-effective energy supplies. In this paper, we propose a wireless powered spatial crowdsourcing framework which consists of two mutually dependent phases: task allocation phase and data crowdsourcin…
▽ More
Wireless power transfer (WPT) is a promising technology to prolong the lifetime of the sensors and communication devices, i.e., workers, in completing crowdsourcing tasks by providing continuous and cost-effective energy supplies. In this paper, we propose a wireless powered spatial crowdsourcing framework which consists of two mutually dependent phases: task allocation phase and data crowdsourcing phase. In the task allocation phase, we propose a Stackelberg game based mechanism for the spatial crowdsourcing platform to efficiently allocate spatial tasks and wireless charging power to each worker. In the data crowdsourcing phase, the workers may have an incentive to misreport its real working location to improve its utility, which causes adverse effects to the spatial crowdsourcing platform. To address this issue, we present three strategyproof deployment mechanisms for the spatial crowdsourcing platform to place a mobile base station, e.g., vehicle or robot, which is responsible for transferring the wireless power and collecting the crowdsourced data. As the benchmark, we first apply the classical median mechanism and evaluate its worst-case performance. Then, we design a conventional strategyproof deployment mechanism to improve the expected utility of the spatial crowdsourcing platform under the condition that the workers' locations follow a known geographical distribution. For a more general case with only the historical location data available, we propose a deep learning based strategyproof deployment mechanism to maximize the spatial crowdsourcing platform's utility. Extensive experimental results based on synthetic and real-world datasets reveal the effectiveness of the proposed framework in allocating tasks and charging power to workers while avoiding the dishonest worker's manipulation.
△ Less
Submitted 27 March, 2020;
originally announced March 2020.
-
Joint Time Scheduling and Transaction Fee Selection in Blockchain-based RF-Powered Backscatter Cognitive Radio Network
Authors:
Tran The Anh,
Nguyen Cong Luong,
Zehui Xiong,
Dusit Niyato,
Dong In Kim
Abstract:
In this paper, we develop a new framework called blockchain-based Radio Frequency (RF)-powered backscatter cognitive radio network. In the framework, IoT devices as secondary transmitters transmit their sensing data to a secondary gateway by using the RF-powered backscatter cognitive radio technology. The data collected at the gateway is then sent to a blockchain network for further verification,…
▽ More
In this paper, we develop a new framework called blockchain-based Radio Frequency (RF)-powered backscatter cognitive radio network. In the framework, IoT devices as secondary transmitters transmit their sensing data to a secondary gateway by using the RF-powered backscatter cognitive radio technology. The data collected at the gateway is then sent to a blockchain network for further verification, storage and processing. As such, the framework enables the IoT system to simultaneously optimize the spectrum usage and maximize the energy efficiency. Moreover, the framework ensures that the data collected from the IoT devices is verified, stored and processed in a decentralized but in a trusted manner. To achieve the goal, we formulate a stochastic optimization problem for the gateway under the dynamics of the primary channel, the uncertainty of the IoT devices, and the unpredictability of the blockchain environment. In the problem, the gateway jointly decides (i) the time scheduling, i.e., the energy harvesting time, backscatter time, and transmission time, among the IoT devices, (ii) the blockchain network, and (iii) the transaction fee rate to maximize the network throughput while minimizing the cost. To solve the stochastic optimization problem, we then propose to employ, evaluate, and assess the Deep Reinforcement Learning (DRL) with Dueling Double Deep Q-Networks (D3QN) to derive the optimal policy for the gateway. The simulation results clearly show that the proposed solution outperforms the conventional baseline approaches such as the conventional Q-Learning algorithm and non-learning algorithms in terms of network throughput and convergence speed. Furthermore, the proposed solution guarantees that the data is stored in the blockchain network at a reasonable cost.
△ Less
Submitted 10 January, 2020;
originally announced January 2020.
-
IRS-based Wireless Jamming Attacks: When Jammers can Attack without Power
Authors:
Bin Lyu,
Dinh Thai Hoang,
Shimin Gong,
Dusit Niyato,
Dong In Kim
Abstract:
This paper proposes to use Intelligent Reflecting Surface (IRS) as a green jammer to attack a legitimate communication without using any internal energy to generate jamming signals. In particular, the IRS is used to intelligently reflect the signals from the legitimate transmitter to the legitimate receiver (LR) to guarantee that the received signals from direct and reflecting links can be added d…
▽ More
This paper proposes to use Intelligent Reflecting Surface (IRS) as a green jammer to attack a legitimate communication without using any internal energy to generate jamming signals. In particular, the IRS is used to intelligently reflect the signals from the legitimate transmitter to the legitimate receiver (LR) to guarantee that the received signals from direct and reflecting links can be added destructively, which thus diminishes the Signal-to-Interference-plus-Noise Ratio (SINR) at the LR. To minimize the received signal power at the LR, we consider the joint optimization of magnitudes of reflection coefficients and discrete phase shifts at the IRS. Based on the block coordinate descent, semidefinite relaxation, and Gaussian randomization techniques, the solution can be obtained efficiently. Through simulation results, we show that by using the IRS-based jammer, we can reduce the signal power received at the LR by up to 99\%. Interestingly, the performance of the proposed IRS-based jammer is even better than that of the conventional active jamming attacks in some scenarios.
△ Less
Submitted 29 May, 2020; v1 submitted 6 January, 2020;
originally announced January 2020.
-
Dynamic Model for Network Selection in Next Generation HetNets with Memory-affecting Rational Users
Authors:
Shaohan Feng,
Dusit Niyato,
Xiao Lu,
** Wang,
Dong In Kim
Abstract:
Recently, due to the staggering growth of wireless data traffic, heterogeneous networks have drawn tremendous attention due to the capabilities of enhancing the capacity/coverage and to save energy consumption for the next generation wireless networks. In this paper, we study a long-run user-centric network selection problem in the 5G heterogeneous network, where the network selection strategies o…
▽ More
Recently, due to the staggering growth of wireless data traffic, heterogeneous networks have drawn tremendous attention due to the capabilities of enhancing the capacity/coverage and to save energy consumption for the next generation wireless networks. In this paper, we study a long-run user-centric network selection problem in the 5G heterogeneous network, where the network selection strategies of the users can be investigated dynamically. Unlike the conventional studies on the long-run model, we incorporate the memory effect and consider the fact that the decision-making of the users is affected by their memory, i.e., their past service experience. Namely, the users select the network based on not only their instantaneous achievable service experience but also their past service experience within their memory. Specifically, we model and study the interaction among the users in the framework of fractional evolutionary game based on the classical evolutionary game theory and the concept of the power-law memory. We analytically prove that the equilibrium of the fractional evolutionary game exists, is unique and uniformly stable. We also numerically demonstrate the stability of the fractional evolutionary equilibrium. Extensive numerical results have been conducted to evaluate the performance of the fractional evolutionary game. The numerical results have revealed some insightful findings. For example, the user in the fractional evolutionary game with positive memory effect can achieve a higher cumulative utility compared with the user in the fractional evolutionary game with negative memory effect. Moreover, the fractional evolutionary game with positive memory effect can reduce the loss in the user's cumulative utility caused by the small-scale fading.
△ Less
Submitted 11 November, 2019;
originally announced November 2019.
-
Deep Reinforcement Learning for Time Scheduling in RF-Powered Backscatter Cognitive Radio Networks
Authors:
Tran The Anh,
Nguyen Cong Luong,
Dusit Niyato,
Ying-Chang Liang,
Dong In Kim
Abstract:
In an RF-powered backscatter cognitive radio network, multiple secondary users communicate with a secondary gateway by backscattering or harvesting energy and actively transmitting their data depending on the primary channel state. To coordinate the transmission of multiple secondary transmitters, the secondary gateway needs to schedule the backscattering time, energy harvesting time, and transmis…
▽ More
In an RF-powered backscatter cognitive radio network, multiple secondary users communicate with a secondary gateway by backscattering or harvesting energy and actively transmitting their data depending on the primary channel state. To coordinate the transmission of multiple secondary transmitters, the secondary gateway needs to schedule the backscattering time, energy harvesting time, and transmission time among them. However, under the dynamics of the primary channel and the uncertainty of the energy state of the secondary transmitters, it is challenging for the gateway to find a time scheduling mechanism which maximizes the total throughput. In this paper, we propose to use the deep reinforcement learning algorithm to derive an optimal time scheduling policy for the gateway. Specifically, to deal with the problem with large state and action spaces, we adopt a Double Deep-Q Network (DDQN) that enables the gateway to learn the optimal policy. The simulation results clearly show that the proposed deep reinforcement learning algorithm outperforms non-learning schemes in terms of network throughput.
△ Less
Submitted 3 October, 2018;
originally announced October 2018.
-
Fundamentals of Wireless Information and Power Transfer: From RF Energy Harvester Models to Signal and System Designs
Authors:
Bruno Clerckx,
Rui Zhang,
Robert Schober,
Derrick Wing Kwan Ng,
Dong In Kim,
H. Vincent Poor
Abstract:
Radio waves carry both energy and information simultaneously. Nevertheless, Radio-Frequency (RF) transmission of these quantities have traditionally been treated separately. Currently, we are experiencing a paradigm shift in wireless network design, namely unifying wireless transmission of information and power so as to make the best use of the RF spectrum and radiations as well as the network inf…
▽ More
Radio waves carry both energy and information simultaneously. Nevertheless, Radio-Frequency (RF) transmission of these quantities have traditionally been treated separately. Currently, we are experiencing a paradigm shift in wireless network design, namely unifying wireless transmission of information and power so as to make the best use of the RF spectrum and radiations as well as the network infrastructure for the dual purpose of communicating and energizing. In this paper, we review and discuss recent progress on laying the foundations of the envisioned dual purpose networks by establishing a signal theory and design for Wireless Information and Power Transmission (WIPT) and identifying the fundamental tradeoff between conveying information and power wirelessly. We start with an overview of WIPT challenges and technologies, namely Simultaneous Wireless Information and Power Transfer (SWIPT),Wirelessly Powered Communication Network (WPCN), and Wirelessly Powered Backscatter Communication (WPBC). We then characterize energy harvesters and show how WIPT signal and system designs crucially revolve around the underlying energy harvester model. To that end, we highlight three different energy harvester models, namely one linear model and two nonlinear models, and show how WIPT designs differ for each of them in single-user and multi-user deployments. Topics discussed include rate-energy region characterization, transmitter and receiver architecture, waveform design, modulation, beamforming and input distribution optimizations, resource allocation, and RF spectrum use. We discuss and check the validity of the different energy harvester models and the resulting signal theory and design based on circuit simulations, prototy** and experimentation. We also point out numerous directions that are promising for future research.
△ Less
Submitted 19 March, 2018;
originally announced March 2018.
-
Downlink Power Allocation for CoMP-NOMA in Multi-Cell Networks
Authors:
Md Shipon Ali,
Ekram Hossain,
Arafat Al-Dweik,
Dong In Kim
Abstract:
This work considers the problem of dynamic power allocation in the downlink of multi-cell networks, where each cell utilizes non-orthogonal multiple access (NOMA)-based resource allocation. Also, coordinated multi-point (CoMP) transmission is utilized among multiple cells to serve users experiencing severe inter-cell interference (ICI). More specifically, we consider a two-tier heterogeneous netwo…
▽ More
This work considers the problem of dynamic power allocation in the downlink of multi-cell networks, where each cell utilizes non-orthogonal multiple access (NOMA)-based resource allocation. Also, coordinated multi-point (CoMP) transmission is utilized among multiple cells to serve users experiencing severe inter-cell interference (ICI). More specifically, we consider a two-tier heterogeneous network (HetNet) consisting of a high-power macro cell underlaid with multiple low-power small cells each of which uses the same resource block. Under this {\em CoMP-NOMA framework}, CoMP transmission is applied to a user experiencing high channel gain with multiple base stations (BSs)/cells, while NOMA is utilized to schedule CoMP and non-CoMP users over the same transmission resources, i.e., time, spectrum and space. Different CoMP-NOMA models are discussed, but focus is primarily on the joint transmission CoMP-NOMA (JT-CoMP-NOMA) model. For the JT-CoMP-NOMA model, an optimal joint power allocation problem is formulated and the solution is derived for each CoMP-set consisting of multiple cooperating BSs (i.e., CoMP BSs). To overcome the substantial computational complexity of the joint power optimization approach, we propose a distributed power optimization problem at each cooperating BS whose optimal solution is independent of the solution of other coordinating BSs. The validity of the distributed solution for the joint power optimization problem is provided and numerical performance evaluation is carried out for the proposed CoMP-NOMA models including JT-CoMP-NOMA and coordinated scheduling CoMP-NOMA (CS-CoMP-NOMA). The obtained results reveal significant gains in spectral and energy efficiency in comparison with conventional CoMP-orthogonal multiple access (CoMP-OMA) systems.
△ Less
Submitted 16 December, 2017;
originally announced January 2018.