-
Two-Stage Resource Allocation in Reconfigurable Intelligent Surface Assisted Hybrid Networks via Multi-Player Bandits
Authors:
**gwen Tong,
Hongliang Zhang,
Liqun Fu,
Amir Leshem,
Zhu Han
Abstract:
This paper considers a resource allocation problem where several Internet-of-Things (IoT) devices send data to a base station (BS) with or without the help of the reconfigurable intelligent surface (RIS) assisted cellular network. The objective is to maximize the sum rate of all IoT devices by finding the optimal RIS and spreading factor (SF) for each device. Since these IoT devices lack prior inf…
▽ More
This paper considers a resource allocation problem where several Internet-of-Things (IoT) devices send data to a base station (BS) with or without the help of the reconfigurable intelligent surface (RIS) assisted cellular network. The objective is to maximize the sum rate of all IoT devices by finding the optimal RIS and spreading factor (SF) for each device. Since these IoT devices lack prior information on the RISs or the channel state information (CSI), a distributed resource allocation framework with low complexity and learning features is required to achieve this goal. Therefore, we model this problem as a two-stage multi-player multi-armed bandit (MPMAB) framework to learn the optimal RIS and SF sequentially. Then, we put forth an exploration and exploitation boosting (E2Boost) algorithm to solve this two-stage MPMAB problem by combining the $ε$-greedy algorithm, Thompson sampling (TS) algorithm, and non-cooperation game method. We derive an upper regret bound for the proposed algorithm, i.e., $\mathcal{O}(\log^{1+δ}_2 T)$, increasing logarithmically with the time horizon $T$. Numerical results show that the E2Boost algorithm has the best performance among the existing methods and exhibits a fast convergence rate. More importantly, the proposed algorithm is not sensitive to the number of combinations of the RISs and SFs thanks to the two-stage allocation mechanism, which can benefit high-density networks.
△ Less
Submitted 9 June, 2024;
originally announced June 2024.
-
Mitigating Data Injection Attacks on Federated Learning
Authors:
Or Shalom,
Amir Leshem,
Waheed U. Bajwa
Abstract:
Federated learning is a technique that allows multiple entities to collaboratively train models using their data without compromising data privacy. However, despite its advantages, federated learning can be susceptible to false data injection attacks. In these scenarios, a malicious entity with control over specific agents in the network can manipulate the learning process, leading to a suboptimal…
▽ More
Federated learning is a technique that allows multiple entities to collaboratively train models using their data without compromising data privacy. However, despite its advantages, federated learning can be susceptible to false data injection attacks. In these scenarios, a malicious entity with control over specific agents in the network can manipulate the learning process, leading to a suboptimal model. Consequently, addressing these data injection attacks presents a significant research challenge in federated learning systems. In this paper, we propose a novel technique to detect and mitigate data injection attacks on federated learning systems. Our mitigation method is a local scheme, performed during a single instance of training by the coordinating node, allowing the mitigation during the convergence of the algorithm. Whenever an agent is suspected to be an attacker, its data will be ignored for a certain period, this decision will often be re-evaluated. We prove that with probability 1, after a finite time, all attackers will be ignored while the probability of ignoring a trustful agent becomes 0, provided that there is a majority of truthful agents. Simulations show that when the coordinating node detects and isolates all the attackers, the model recovers and converges to the truthful model.
△ Less
Submitted 14 January, 2024; v1 submitted 4 December, 2023;
originally announced December 2023.
-
Random Access Protocols for Cell-Free Wireless Network Exploiting Statistical Behavior of THz Signal Propagation
Authors:
Pranay Bhardwaj,
S. M. Zafaruddin,
Amir Leshem
Abstract:
The current body of research on terahertz (THz) wireless communications predominantly focuses on its application for single-user backhaul/fronthaul connectivity at sub-THz frequencies. First, we develop a generalized statistical model for signal propagation at THz frequencies encompassing physical layer impairments, including random path-loss with Gamma distribution for the molecular absorption co…
▽ More
The current body of research on terahertz (THz) wireless communications predominantly focuses on its application for single-user backhaul/fronthaul connectivity at sub-THz frequencies. First, we develop a generalized statistical model for signal propagation at THz frequencies encompassing physical layer impairments, including random path-loss with Gamma distribution for the molecular absorption coefficient, short-term fading characterized by the $α$-$η$-$κ$-$μ$ distribution, antenna misalignment errors, and transceiver hardware impairments. Next, we propose random access protocols for a cell-free wireless network, ensuring successful transmission for multiple users with limited delay and energy loss, exploiting the combined effect of random atmospheric absorption, non-linearity of fading, hardware impairments, and antenna misalignment errors. We consider two schemes: a fixed transmission probability (FTP) scheme where the transmission probability (TP) of each user is updated at the beginning of the data transmission and an adaptive transmission probability (ATP) scheme where the TP is updated with each successful reception of the data. We analyze the performance of both protocols using delay, energy consumption, and outage probability with scaling laws for the transmission of a data frame consisting of a single packet from users at a predefined quality of service (QoS).
△ Less
Submitted 10 November, 2023;
originally announced November 2023.
-
Joint Scheduling and Resource Allocation for Packets with Deadlines and Priorities
Authors:
Li-on Raviv,
Amir Leshem
Abstract:
Cellular networks provide communication for different applications. Some applications have strict and very short latency requirements, while others require high bandwidth with varying priorities. The challenge of satisfying the requirements grows in congested traffic where some packets might miss their deadlines. Unfortunately, we prove that the problem is NP-Hard. To overcome this, we propose a n…
▽ More
Cellular networks provide communication for different applications. Some applications have strict and very short latency requirements, while others require high bandwidth with varying priorities. The challenge of satisfying the requirements grows in congested traffic where some packets might miss their deadlines. Unfortunately, we prove that the problem is NP-Hard. To overcome this, we propose a new scheduling policy for packets with multiple priorities, latency requirements, and strict deadlines. To alleviate the complexity, our solution incorporates a novel time domain relaxation solved by linear programming. Simulation results show that this method outperforms existing scheduling strategies.
△ Less
Submitted 30 September, 2022;
originally announced September 2022.
-
Distributed Deep Reinforcement Learning for Collaborative Spectrum Sharing
Authors:
Pranav M. Pawar,
Amir Leshem
Abstract:
Spectrum sharing among users is a fundamental problem in the management of any wireless network. In this paper, we discuss the problem of distributed spectrum collaboration without central management under general unknown channels. Since the cost of communication, coordination and control is rapidly increasing with the number of devices and the expanding bandwidth used there is an obvious need to…
▽ More
Spectrum sharing among users is a fundamental problem in the management of any wireless network. In this paper, we discuss the problem of distributed spectrum collaboration without central management under general unknown channels. Since the cost of communication, coordination and control is rapidly increasing with the number of devices and the expanding bandwidth used there is an obvious need to develop distributed techniques for spectrum collaboration where no explicit signaling is used. In this paper, we combine game-theoretic insights with deep Q-learning to provide a novel asymptotically optimal solution to the spectrum collaboration problem. We propose a deterministic distributed deep reinforcement learning(D3RL) mechanism using a deep Q-network (DQN). It chooses the channels using the Q-values and the channel loads while limiting the options available to the user to a few channels with the highest Q-values and among those, it selects the least loaded channel. Using insights from both game theory and combinatorial optimization we show that this technique is asymptotically optimal for large overloaded networks. The selected channel and the outcome of the successful transmission are fed back into the learning of the deep Q-network to incorporate it into the learning of the Q-values. We also analyzed performance to understand the behavior of D3RL in differ
△ Less
Submitted 6 April, 2021;
originally announced April 2021.
-
Multi-Gigabit Wireline Systems over Copper: An Interference Cancellation Perspective
Authors:
S. M. Zafaruddin,
Amir Leshem
Abstract:
Interference cancellation is the main driving technology in enhancing the transmission rates over telephone lines above 100 Mbps. Still, crosstalk interference in multi-pair digital subscriber line (DSL) systems at higher frequencies has not been dealt with sufficiently. The upcoming G.(mg) fast DSL system envisions the use of extremely high bandwidth and full-duplex transmissions generating signi…
▽ More
Interference cancellation is the main driving technology in enhancing the transmission rates over telephone lines above 100 Mbps. Still, crosstalk interference in multi-pair digital subscriber line (DSL) systems at higher frequencies has not been dealt with sufficiently. The upcoming G.(mg) fast DSL system envisions the use of extremely high bandwidth and full-duplex transmissions generating significantly higher crosstalk and self-interference signals. More powerful interference cancellation techniques are required to enable multi-gigabit per second data rate transmission over copper lines. In this article, we analyze the performance of interference cancellation techniques, with a focus on novel research approaches and design considerations for efficient interference mitigation for multi-gigabit transmission over standard copper lines. We also detail novel approaches for interference cancellation in the upcoming technologies.
△ Less
Submitted 17 May, 2020;
originally announced May 2020.
-
The Restless Hidden Markov Bandit with Linear Rewards and Side Information
Authors:
Michal Yemini,
Amir Leshem,
Anelia Somekh-Baruch
Abstract:
In this paper we present a model for the hidden Markovian bandit problem with linear rewards. As opposed to current work on Markovian bandits, we do not assume that the state is known to the decision maker before making the decision. Furthermore, we assume structural side information where the decision maker knows in advance that there are two types of hidden states; one is common to all arms and…
▽ More
In this paper we present a model for the hidden Markovian bandit problem with linear rewards. As opposed to current work on Markovian bandits, we do not assume that the state is known to the decision maker before making the decision. Furthermore, we assume structural side information where the decision maker knows in advance that there are two types of hidden states; one is common to all arms and evolves according to a Markovian distribution, and the other is unique to each arm and is distributed according to an i.i.d. process that is unique to each arm. We present an algorithm and regret analysis to this problem. Surprisingly, we can recover the hidden states and maintain logarithmic regret in the case of a convex polytope action set. Furthermore, we show that the structural side information leads to expected regret that does not depend on the number of extreme points in the action space. Therefore, we obtain practical solutions even in high dimensional problems.
△ Less
Submitted 21 January, 2021; v1 submitted 22 October, 2019;
originally announced October 2019.
-
Eliminating Interference in LOS Massive Multi-User MIMO with a Few Transceivers
Authors:
Uri Erez,
Amir Leshem
Abstract:
Wireless cellular communication networks are bandwidth and interference limited. An important means to overcome these resource limitations is the use of multiple antennas. Base stations equipped with a very large (massive) number of antennas have been the focus of recent research. A bottleneck in such systems is the limited number of transmit/receive chains. In this work, a line-of-sight (LOS) cha…
▽ More
Wireless cellular communication networks are bandwidth and interference limited. An important means to overcome these resource limitations is the use of multiple antennas. Base stations equipped with a very large (massive) number of antennas have been the focus of recent research. A bottleneck in such systems is the limited number of transmit/receive chains. In this work, a line-of-sight (LOS) channel model is considered. It is shown that for a given number of interferers, it suffices that the number of transmit/receive chains exceeds the number of desired users by one, assuming a sufficiently large antenna array. From a theoretical point of view, this is the first result proving the near-optimal performance of antenna selection, even when the total number of signals (desired and interfering) is larger than the number of receive chains. Specifically, a single additional chain suffices to reduce the interference to any desired level. We prove that using the proposed selection, a simple linear receiver/transmitter for the uplink/downlink provides near-optimal rates. In particular, in the downlink direction, there is no need for complicated dirty paper coding; each user can use an optimal code for a single user interference-free channel. In the uplink direction, there is almost no gain in implementing joint decoding. The proposed approach is also a significant improvement both from system and computational perspectives. Simulation results demonstrating the performance of the proposed method are provided.
△ Less
Submitted 4 March, 2019;
originally announced March 2019.
-
Distributed Learning for Channel Allocation Over a Shared Spectrum
Authors:
S. M. Zafaruddin,
Ilai Bistritz,
Amir Leshem,
Dusit Niyato
Abstract:
Channel allocation is the task of assigning channels to users such that some objective (e.g., sum-rate) is maximized. In centralized networks such as cellular networks, this task is carried by the base station which gathers the channel state information (CSI) from the users and computes the optimal solution. In distributed networks such as ad-hoc and device-to-device (D2D) networks, no base statio…
▽ More
Channel allocation is the task of assigning channels to users such that some objective (e.g., sum-rate) is maximized. In centralized networks such as cellular networks, this task is carried by the base station which gathers the channel state information (CSI) from the users and computes the optimal solution. In distributed networks such as ad-hoc and device-to-device (D2D) networks, no base station exists and conveying global CSI between users is costly or simply impractical. When the CSI is time varying and unknown to the users, the users face the challenge of both learning the channel statistics online and converge to a good channel allocation. This introduces a multi-armed bandit (MAB) scenario with multiple decision makers. If two users or more choose the same channel, a collision occurs and they all receive zero reward. We propose a distributed channel allocation algorithm that each user runs and converges to the optimal allocation while achieving an order optimal regret of O\left(\log T\right). The algorithm is based on a carrier sensing multiple access (CSMA) implementation of the distributed auction algorithm. It does not require any exchange of information between users. Users need only to observe a single channel at a time and sense if there is a transmission on that channel, without decoding the transmissions or identifying the transmitting users. We demonstrate the performance of our algorithm using simulated LTE and 5G channels.
△ Less
Submitted 18 February, 2019; v1 submitted 17 February, 2019;
originally announced February 2019.
-
The Interference Channel Revisited: Aligning Interference by Adjusting Receive Antenna Separation
Authors:
Amir Leshem,
Uri Erez
Abstract:
It is shown that a receiver equipped with two antennas may null an arbitrary large number of spatial directions to any desired accuracy, while maintaining the interference-free signal-to-noise ratio, by judiciously adjusting the distance between the antenna elements. The main theoretical result builds on ergodic theory. The practicality of the scheme in moderate signal-to-noise systems is demonstr…
▽ More
It is shown that a receiver equipped with two antennas may null an arbitrary large number of spatial directions to any desired accuracy, while maintaining the interference-free signal-to-noise ratio, by judiciously adjusting the distance between the antenna elements. The main theoretical result builds on ergodic theory. The practicality of the scheme in moderate signal-to-noise systems is demonstrated for a scenario where each transmitter is equipped with a single antenna and each receiver has two receive chains and where the desired spacing between antenna elements is achieved by selecting the appropriate antennas from a large linear antenna array. We further extend the proposed scheme to show that interference can be eliminated also in specular multipath channels as well as multiple-input multiple-output interference channels where a single extra receiver suffices to align all interferers into a one-dimensional subspace. To demonstrate the performance of the scheme, we show significant gains for interference channels with four as well as six users, at low to moderate signal-to-noise ratios (0-20 dB). The robustness of the proposed technique to small channel estimation errors is also explored.
△ Less
Submitted 30 May, 2019; v1 submitted 31 January, 2019;
originally announced January 2019.
-
Finite sample performance of linear least squares estimation
Authors:
Michael Krikheli,
Amir Leshem
Abstract:
Linear Least Squares is a very well known technique for parameter estimation, which is used even when sub-optimal, because of its very low computational requirements and the fact that exact knowledge of the noise statistics is not required. Surprisingly, bounding the probability of large errors with finitely many samples has been left open, especially when dealing with correlated noise with unknow…
▽ More
Linear Least Squares is a very well known technique for parameter estimation, which is used even when sub-optimal, because of its very low computational requirements and the fact that exact knowledge of the noise statistics is not required. Surprisingly, bounding the probability of large errors with finitely many samples has been left open, especially when dealing with correlated noise with unknown covariance. In this paper we analyze the finite sample performance of the linear least squares estimator. Using these bounds we obtain accurate bounds on the tail of the estimator's distribution. We show the fast exponential convergence of the number of samples required to ensure a given accuracy with high probability. We analyze a sub-Gaussian setting with a fixed or random design matrix of the linear least squares problem. We also extend the results to the case of a martingale difference noise sequence. Our analysis method is simple and uses simple $L_{\infty}$ type bounds on the estimation error. We also provide probabilistic finite sample bounds on the estimation error $L_2$ norm. The tightness of the bounds is tested through simulation. We demonstrate that our results are tighter than previously proposed bounds for $L_{\infty}$ norm of the error. The proposed bounds make it possible to predict the number of samples required for least squares estimation even when the least squares is sub-optimal and is used for computational simplicity.
△ Less
Submitted 12 October, 2018;
originally announced October 2018.
-
Large Matrix Asymptotic Analysis of ZF and MMSE Crosstalk Cancelers for Wireline Channels
Authors:
Itsik Bergel,
S. M. Zafaruddin,
Amir Leshem
Abstract:
We present asymptotic expressions for user throughput in a multi-user wireline system with a linear decoder, in increasingly large system sizes. This analysis can be seen as a generalization of results obtained for wireless communication. The features of the diagonal elements of the wireline channel matrices make wireless asymptotic analyses inapplicable for wireline systems. Further, direct appli…
▽ More
We present asymptotic expressions for user throughput in a multi-user wireline system with a linear decoder, in increasingly large system sizes. This analysis can be seen as a generalization of results obtained for wireless communication. The features of the diagonal elements of the wireline channel matrices make wireless asymptotic analyses inapplicable for wireline systems. Further, direct application of results from random matrix theory (RMT) yields a trivial lower bound. This paper presents a novel approach to asymptotic analysis, where an alternative sequence of systems is constructed that includes the system of interest in order to approximate the spectral efficiency of the linear zero-forcing (ZF) and minimum mean squared error (MMSE) crosstalk cancelers. Using works in the field of large dimensional random matrices, we show that the user rate in this sequence converges to a non-zero rate. The approximation of the user rate for both the ZF and MMSE cancelers are very simple to evaluate and does not need to take specific channel realizations into account. The analysis reveals the intricate behavior of the throughput as a function of the transmission power and the channel crosstalk. This unique behavior has not been observed for linear decoders in other systems. The approximation presented here is much more useful for the next generation G.fast wireline system than earlier digital subscriber line (DSL) systems as previously computed performance bounds, which are strictly larger than zero only at low frequencies. We also provide a numerical performance analysis over measured and simulated DSL channels which show that the approximation is accurate even for relatively low dimensional systems and is useful for many scenarios in practical DSL systems.
△ Less
Submitted 15 March, 2018;
originally announced March 2018.
-
Energy Efficiency of Opportunistic Device-to-Device Relaying Under Lognormal Shadowing
Authors:
S. M. Zafaruddin,
Jan Plachy,
Zdenek Becvar,
Amir Leshem
Abstract:
Energy consumption is a major limitation of low power and mobile devices. Efficient transmission protocols are required to minimize an energy consumption of the mobile devices for ubiquitous connectivity in the next generation wireless networks. Opportunistic schemes select a single relay using the criteria of the best channel and achieve a near-optimal diversity performance in a cooperative wirel…
▽ More
Energy consumption is a major limitation of low power and mobile devices. Efficient transmission protocols are required to minimize an energy consumption of the mobile devices for ubiquitous connectivity in the next generation wireless networks. Opportunistic schemes select a single relay using the criteria of the best channel and achieve a near-optimal diversity performance in a cooperative wireless system. In this paper, we study the energy efficiency of the opportunistic schemes for device-to-device communication. In the opportunistic approach, an energy consumed by devices is minimized by selecting a single neighboring device as a relay using the criteria of minimum consumed energy in each transmission in the uplink of a wireless network. We derive analytical bounds and scaling laws on the expected energy consumption when the devices experience log-normal shadowing with respect to a base station considering both the transmission as well as circuit energy consumptions. We show that the protocol improves the energy efficiency of the network comparing to the direct transmission even if only a few devices are considered for relaying. We also demonstrate the effectiveness of the protocol by means of simulations in realistic scenarios of the wireless network.
△ Less
Submitted 2 March, 2018;
originally announced March 2018.
-
Finite sample performance of linear least squares estimators under sub-Gaussian martingale difference noise
Authors:
Michael Krikheli,
Amir Leshem
Abstract:
Linear Least Squares is a very well known technique for parameter estimation, which is used even when sub-optimal, because of its very low computational requirements and the fact that exact knowledge of the noise statistics is not required. Surprisingly, bounding the probability of large errors with finitely many samples has been left open, especially when dealing with correlated noise with unknow…
▽ More
Linear Least Squares is a very well known technique for parameter estimation, which is used even when sub-optimal, because of its very low computational requirements and the fact that exact knowledge of the noise statistics is not required. Surprisingly, bounding the probability of large errors with finitely many samples has been left open, especially when dealing with correlated noise with unknown covariance. In this paper we analyze the finite sample performance of the linear least squares estimator under sub-Gaussian martingale difference noise. In order to analyze this important question we used concentration of measure bounds. When applying these bounds we obtained tight bounds on the tail of the estimator's distribution. We show the fast exponential convergence of the number of samples required to ensure a given accuracy with high probability. We provide probability tail bounds on the estimation error's norm. Our analysis method is simple and uses simple $L_{\infty}$ type bounds on the estimation error. The tightness of the bounds is tested through simulation. The proposed bounds make it possible to predict the number of samples required for least squares estimation even when least squares is sub-optimal and used for computational simplicity. The finite sample analysis of least squares models with this general noise model is novel.
△ Less
Submitted 31 October, 2017;
originally announced October 2017.