-
On the Performance of Handover Mechanisms for Non-Terrestrial Networks
Authors:
Yusuf Islam Demir,
Muhammad Sohaib J. Solaija,
Huseyin Arslan
Abstract:
Next-generation wireless networks require massive connectivity and ubiquitous coverage, for which non-terrestrial networks (NTNs) are a promising enabler. However, NTNs, especially non-geostationary satellites bring about challenges such as increased handovers (HOs) due to the moving coverage area of the satellite on the ground. Accordingly, in this work, we compare the conventional measurement-ba…
▽ More
Next-generation wireless networks require massive connectivity and ubiquitous coverage, for which non-terrestrial networks (NTNs) are a promising enabler. However, NTNs, especially non-geostationary satellites bring about challenges such as increased handovers (HOs) due to the moving coverage area of the satellite on the ground. Accordingly, in this work, we compare the conventional measurement-based HO triggering mechanism with other alternatives such as distance, elevation angle, and timer-based methods in terms of the numbers of HOs, **-pong HOs, and radio link failures. The system-level simulations, carried out in accordance with the 3GPP model, show that the measurement-based approach can outperform the other alternatives provided that appropriate values of hysteresis/offset margins and time-to-trigger parameters are used. Moreover, future directions regarding this work are also provided at the end.
△ Less
Submitted 13 January, 2022;
originally announced January 2022.
-
Cyclic Prefix (CP) Jamming Against Eavesdrop** Relays in OFDM Systems
Authors:
Muhammad Sohaib J. Solaija,
Haji M. Furqan,
Zekeriyya Esat Ankaralı,
Hüseyin Arslan
Abstract:
Cooperative communication has been widely used to provide spatial diversity benefits for low-end user equipments, especially in ad hoc and wireless sensor networks. However, the lack of strong authentication mechanisms in these networks leaves them prone to eavesdrop** relays. In this paper, we propose a secure orthogonal frequency division multiplexing (OFDM) transmission scheme, where the dest…
▽ More
Cooperative communication has been widely used to provide spatial diversity benefits for low-end user equipments, especially in ad hoc and wireless sensor networks. However, the lack of strong authentication mechanisms in these networks leaves them prone to eavesdrop** relays. In this paper, we propose a secure orthogonal frequency division multiplexing (OFDM) transmission scheme, where the destination node transmits a jamming signal over the cyclic prefix (CP) duration of the received signal. Simulation results verify that as long as at least a part of the jamming signal falls to the actual data portion of the eavesdrop** relay, it spreads through all the data symbols due to the fast Fourier transformation (FFT) operation, resulting in degraded interception at the eavesdropper.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
Enhancing Channel Shortening Based Physical Layer Security Using Coordinated Multipoint
Authors:
Muhammad Sohaib J. Solaija,
Hanadi Salman,
Huseyin Arslan
Abstract:
Wireless networks have become imperative in all areas of human life. As such, one of the most critical concerns in next-generation networks is ensuring the security and privacy of user data/communication. Cryptography has been conventionally used to tackle this, but it may not be scalable (in terms of key exchange and management) with the increasingly heterogeneous network deployments. Physical la…
▽ More
Wireless networks have become imperative in all areas of human life. As such, one of the most critical concerns in next-generation networks is ensuring the security and privacy of user data/communication. Cryptography has been conventionally used to tackle this, but it may not be scalable (in terms of key exchange and management) with the increasingly heterogeneous network deployments. Physical layer security (PLS) provides a promising alternative, but struggles when an attacker boasts a better wireless channel as compared to the legitimate user. This work leverages the coordinated multipoint concept and its distributed transmission points, in conjunction with channel shortening, to address this problem. Results show significant degradation of the bit-error-rate experienced at the eavesdropper as compared to state-of-the-art channel shortening-based PLS methods.
△ Less
Submitted 29 September, 2021;
originally announced September 2021.
-
Generalized Coordinated Multipoint Framework for 5G and Beyond
Authors:
Muhammad Sohaib J. Solaija,
Hanadi Salman,
Abuu B. Kihero,
Mehmet Izzet Saglam,
Huseyin Arslan
Abstract:
The characteristic feature of 5G is the diversity of its services for different user needs. However, the requirements for these services are competing in nature, which impresses the necessity of a coordinated and flexible network architecture. Although coordinated multipoint (CoMP) systems were primarily proposed to improve the cell edge performance in 4G, their collaborative nature can be leverag…
▽ More
The characteristic feature of 5G is the diversity of its services for different user needs. However, the requirements for these services are competing in nature, which impresses the necessity of a coordinated and flexible network architecture. Although coordinated multipoint (CoMP) systems were primarily proposed to improve the cell edge performance in 4G, their collaborative nature can be leveraged to support the diverse requirements and enabling technologies of 5G and beyond networks. To this end, we propose generalization of CoMP to a proactive and efficient resource utilization framework capable of supporting different user requirements such as reliability, latency, throughput, and security while considering network constraints. This article elaborates on the multiple aspects, inputs, and outputs of the generalized CoMP (GCoMP) framework. Apart from user requirements, the GCoMP decision mechanism also considers the CoMP scenario and network architecture to decide upon outputs such as CoMP technique or appropriate coordinating clusters. To enable easier understanding of the concept, popular use cases, such as vehicle-to-everything (V2X) communication and eHealth, are studied. Additionally, interesting challenges and open areas in GCoMP are discussed.
△ Less
Submitted 14 August, 2020;
originally announced August 2020.
-
Generalized Radio Environment Monitoring for Next Generation Wireless Networks
Authors:
Halise Turkmen,
Muhammad Sohaib J. Solaija,
Haji M. Furqan,
Huseyin Arslan
Abstract:
Enabling technologies of 5G and beyond wireless communication networks, such as millimeter-wave communication, beamforming, and multiple-input multiple-output (MIMO) antenna systems, are becoming increasingly dependent on accurate information of the physical environment for optimized communication performance. The acquisition of this information is a significant challenge, which can be eased by kn…
▽ More
Enabling technologies of 5G and beyond wireless communication networks, such as millimeter-wave communication, beamforming, and multiple-input multiple-output (MIMO) antenna systems, are becoming increasingly dependent on accurate information of the physical environment for optimized communication performance. The acquisition of this information is a significant challenge, which can be eased by knowledge of the radio environment. Radio environment map** (REM) has long been considered an enabler of cognitive radios (CRs). However, the limitations of radios effectively confined the application of REM to spectrum sensing and interference map**. With the advent of more capable software-defined radios and advanced networks, the idea of a truly intelligent communication system empowered by enhanced REM can be realized. To this effect, we propose the generalized radio environment monitoring (G-REM) concept to include all aspects of the radio environment. We outline a general, self contained framework which enables radio environment monitoring in standalone devices. The presented G-REM framework comprises of different information sources, sensing methods, sensing modes, and map** techniques to enable the realization of more reliable, secure, efficient, and faster future wireless networks. The accompanying challenges and future research direction are also provided.
△ Less
Submitted 27 August, 2020; v1 submitted 14 August, 2020;
originally announced August 2020.
-
Multi-Numerology Multiplexing and Inter-Numerology Interference Analysis for 5G
Authors:
Abuu B. Kihero,
Muhammad Sohaib J. Solaija,
Huseyin Arslan
Abstract:
Fifth generation (5G) radio access technology (RAT) is expected to flexibly serve multiple services with extremely diverse requirements. One of the steps taken toward fulfilling this vision of the 5G-RAT is an introduction of the multi-numerology concept, where multiple frame structures with different subcarrier spacings coexist in one frequency band. Though efficient in providing the required fle…
▽ More
Fifth generation (5G) radio access technology (RAT) is expected to flexibly serve multiple services with extremely diverse requirements. One of the steps taken toward fulfilling this vision of the 5G-RAT is an introduction of the multi-numerology concept, where multiple frame structures with different subcarrier spacings coexist in one frequency band. Though efficient in providing the required flexibility, this approach introduces a new kind of interference into the system known as inter numerology interference (INI). This study is geared toward analyzing the INI problem considering a cyclic prefix orthogonal frequency domain multiplexing (CP-OFDM) system and exposing the factors contributing to it through mathematical analyses. In-depth discussion of various critical issues concerning multi-numerology system such as frequency domain multiplexing and time domain symbol alignment for mixed numerologies is presented. Based on the findings of the conducted analyses, the paper highlights some approaches for minimizing INI in the system. The developed mathematical analysis is finally verified by Monte-Carlo simulations.
△ Less
Submitted 29 May, 2019;
originally announced May 2019.
-
Intelligent Physical Layer Security Approach for V2X Communication
Authors:
Haji M. Furqan,
Muhammad Sohaib J. Solaija,
Jehad M. Hamamreh,
Huseyin Arslan
Abstract:
Intelligent transportation systems (ITS) with advanced sensing and computing technologies are expected to support a whole new set of services including pedestrian and vehicular safety, internet access for vehicles, and eventually, driverless cars. Wireless communication is a major driving factor behind ITS, enabling reliable communication between vehicles, infrastructure, pedestrians and network,…
▽ More
Intelligent transportation systems (ITS) with advanced sensing and computing technologies are expected to support a whole new set of services including pedestrian and vehicular safety, internet access for vehicles, and eventually, driverless cars. Wireless communication is a major driving factor behind ITS, enabling reliable communication between vehicles, infrastructure, pedestrians and network, generally referred to as vehicle to everything (V2X) communication. However, the broadcast nature of wireless communication renders it prone to jamming, eavesdrop** and spoofing attacks which can adversely affect ITS. Kee** in view this issue, we suggest the use of an intelligent security framework for V2X communication security, referred to as intelligent V2X security (IV2XS), to provide a reliable and robust solution capable of adapting to different conditions, scenarios and user requirements. We also identify the conditions that impact the security and describe the open challenges in achieving a realistic IV2XS system.
△ Less
Submitted 8 August, 2020; v1 submitted 13 May, 2019;
originally announced May 2019.
-
Inter-Numerology Interference Analysis for 5G and Beyond
Authors:
Abuu B. Kihero,
Muhammad Sohaib J. Solaija,
Ahmet Yazar,
Huseyin Arslan
Abstract:
One of the defining characteristics of 5G is the flexibility it offers for supporting different services and communication scenarios. For this purpose, usage of multiple numerologies has been proposed by the 3rd Generation Partnership Project (3GPP). The flexibility provided by multi-numerology system comes at the cost of additional interference, known as inter-numerology interference (INI). This…
▽ More
One of the defining characteristics of 5G is the flexibility it offers for supporting different services and communication scenarios. For this purpose, usage of multiple numerologies has been proposed by the 3rd Generation Partnership Project (3GPP). The flexibility provided by multi-numerology system comes at the cost of additional interference, known as inter-numerology interference (INI). This paper comprehensively explains the primary cause of INI, and then identifies and describes the factors affecting the amount of INI experienced by each numerology in the system. These factors include subcarrier spacing, number of used subcarriers, power offset, windowing operations and guard bands.
△ Less
Submitted 26 July, 2018;
originally announced July 2018.