Archive

  • November 2020 Vol. 17 No. 11
      

  • Select all
    |
  • Peiran Dong, Zhaolong Ning, Rong Ma, Xiaojie Wang, Xiping Hu, Bin Hu
    2020, 17(11): 1-11.
    Abstract ( )   Knowledge map   Save
    Mobile Edge Computing(MEC)is promising to alleviate the computation and storage burdens for terminals in wireless networks. The huge energy consumption of MEC servers challenges the establishment of smart cities and their service time powered by rechargeable batteries. In addition, Orthogonal Multiple Access(OMA)technique cannot utilize limited spectrum resources fully and efficiently. Therefore, Non-Orthogonal Multiple Access(NOMA)-based energy-efficient task scheduling among MEC servers for delay-constraint mobile applications is important, especially in highly-dynamic vehicular edge computing networks. The various movement patterns of vehicles lead to unbalanced offloading requirements and different load pressure for MEC servers. Self-Imitation Learning(SIL)-based Deep Reinforcement Learning(DRL)has emerged as a promising machine learning technique to break through obstacles in various research fields, especially in time-varying networks. In this paper, we first introduce related MEC technologies in vehicular networks. Then, we propose an energy-efficient approach for task scheduling in vehicular edge computing networks based on DRL, with the purpose of both guaranteeing the task latency requirement for multiple users and minimizing total energy consumption of MEC servers. Numerical results demonstrate that the proposed algorithm outperforms other methods.
  • Donghong Cai, Jinming Wen, Pingzhi Fan, Yanqing Xu, Lisu Yu
    2020, 17(11): 12-28.
    Abstract ( )   Knowledge map   Save
    This paper proposes some low complexity algorithms for active user detection(AUD), channel estimation(CE)and multi-user detection(MUD)in uplink non-orthogonal multiple access(NOMA)systems, including single-carrier and multi-carrier cases. In particular, we first propose a novel algorithm to estimate the active users and the channels for single-carrier based on complex alternating direction method of multipliers(ADMM), where fast decaying feature of non-zero components in sparse signal is considered. More importantly, the reliable estimated information is used for AUD, and the unreliable information will be further handled based on estimated symbol energy and total accurate or approximate number of active users. Then, the proposed algorithm for AUD in single-carrier model can be extended to multi-carrier case by exploiting the block sparse structure. Besides, we propose a low complexity MUD detection algorithm based on alternating minimization to estimate the active users’ data, which avoids the Hessian matrix inverse. The convergence and the complexity of proposed algorithms are analyzed and discussed finally. Simulation results show that the proposed algorithms have better performance in terms of AUD, CE and MUD. Moreover, we can detect active users perfectly for multi-carrier NOMA system.
  • Lai Wei, Yingyang Chen, Dongsheng Zheng, Bingli Jiao
    2020, 17(11): 29-41.
    Abstract ( )   Knowledge map   Save
    Vehicle-to-vehicle(V2V)communication appeals to increasing research interest as a result of its applications to provide safety information as well as infotainment services. The increasing demand of transmit rates and various requirements of quality of services(QoS)in vehicular communication scenarios call for the integration of V2V communication systems and potential techniques in the future wireless communications, such as full duplex(FD)and non-orthogonal multiple access(NOMA)which enhance spectral efficiency and provide massive connectivity. However, the large amount of data transmission and user connectivity give rise to the concern of security issues and personal privacy. In order to analyze the security performance of V2V communications, we introduce a cooperative NOMA V2V system model with an FD relay. This paper focuses on the security performance of the FD-NOMA based V2V system on the physical layer perspective. We first derive several analytical results of the ergodic secrecy capacity. Then, we propose a secrecy sum rate optimization scheme utilizing the instantaneous channel state information(CSI), which is formulated as a non-convex optimization problem. Based on the differential structure of the non-convex constraints, the original problem is approximated and solved by a series of convex optimization problems. Simulation results validate the analytical results and the effectiveness of the secrecy sum rate optimization algorithm.
  • Xiaodong Liu, Zezong Chen, Yuhao Wang, Fuhui Zhou, Shuai Ma
    2020, 17(11): 42-53.
    Abstract ( )   Knowledge map   Save
    Visible light communication(VLC)and non-orthogonal multiple access(NOMA)have been deemed two promising techniques in the next wireless communication networks. In this paper, secure communications in the presence of potential eavesdropper are investigated for a multiple-input single-output VLC system with NOMA. The artificial noise jamming and beamforming technologies are applied to improve secure performance. A robust resource allocation scheme is proposed to minimize the total transmit power taking into account the constraints on the quality of service requirement of the desired users and the maximum tolerable data rate of the eavesdropper, and the practical imperfect channel state information of both the desired users and the eavesdropper. The formulated non-convex optimization problem is tackled based on and semi-definite programming relaxation. Simulation results illustrate that our proposed resource allocation scheme can effectively guarantee communication security and achieve transmit power saving. Moreover, the height and number of LED can significantly affect system performance and the optimum LED height can be obtained for different LED numbers.
  • Wanmei Feng, Jie Tang, Nan Zhao, Yuli Fu, Xiuyin Zhang, Kanapathippillai Cumanan, Kai-Kit Wong
    2020, 17(11): 54-66.
    Abstract ( )   Knowledge map   Save
    High spectrum efficiency(SE)requirement and massive connections are the main challenges for the fifth generation(5G)and beyond 5G(B5G)wireless networks, especially for the case when Internet of Things(IoT)devices are located in a disaster area. Non-orthogonal multiple access(NOMA)-based unmanned aerial vehicle(UAV)-aided network is emerging as a promising technique to overcome the above challenges. In this paper, an emergency communications framework of NOMA-based UAV-aided networks is established, where the disasters scenarios can be divided into three broad categories that have named emergency areas, wide areas and dense areas. First, a UAV-enabled uplink NOMA system is established to gather information from IoT devices in emergency areas. Then, a joint UAV deployment and resource allocation scheme for a multi-UAV enabled NOMA system is developed to extend the UAV coverage for IoT devices in wide areas. Furthermore, a UAV equipped with an antenna array has been considered to provide wireless service for multiple devices that are densely distributed in disaster areas. Simulation results are provided to validate the effectiveness of the above three schemes. Finally, potential research directions and challenges are also highlighted and discussed.
  • Zhongwu Xiang, Xiaobing Tong, Yueming Cai
    2020, 17(11): 67-78.
    Abstract ( )   Knowledge map   Save
    This paper investigates secure transmission for non-orthogonal multiple access(NOMA)systems where the imperfect successive interference cancellation(SIC)is considered at both legitimate users and eavesdropper(Eve). A power allocation scheme is designed for the legitimate users to mitigate the effect of the SIC error caused by imperfect SIC. For characterizing the secrecy performance of the NOMA system, the closed-form expressions for connection outage probability(COP), secrecy outage probability(SOP), and effective secrecy throughput(EST)are derived over Nakagami-m fading channels in both NOMA and benchmark orthogonal multiple access(OMA)systems. We also provide security and reliability trade-off results(SRT)for the users in the NOMA and OMA systems. Simulation results verify our analysis and show that the strong users achieve better secrecy performance but worse reliability performance and NOMA outperforms OMA in terms of SRT.
  • Yanna Bai, Wei Chen, Bo Ai, Zhangdui Zhong
    2020, 17(11): 79-90.
    Abstract ( )   Knowledge map   Save
    The sporadic communication character of massive machine-type communication systems provides natural advantages to utilize the principle of compressive sensing(CS). However, due to the high computational complexity of CS algorithms, CS-based contention-free access schemes have limited scalability and high computational complexity for massive access with user-specific pilots. To address these problems, in this paper, we propose a new contention-based scheme for CS-based massive access, which can support the sporadic access of massive devices(more than one million devices)with limited resources. Furthermore, an advanced receiver algorithm is designed to solve the optimal solutions for the proposed scheme, which utilizes various prior information to enhance the performance. In specific, the joint sparsity between the channel and data is used to improve the accuracy of pilot detection, and the information of modulation and cyclic redundancy check is exploited for channel correction to improve the performance of data recovery. The simulation results show that the proposed scheme can achieve improved active user detection performance and data recovery accuracy than existing methods.
  • Yancheng Ji, Dan Sun, Xiaojun Zhu, Danfeng Dong
    2020, 17(11): 91-99.
    Abstract ( )   Knowledge map   Save
    To achieve the better system performance for cooperative communication in non-orthogonal cognitive radio vehicular ad-hoc networks(CR-VANETs), this paper investigates the power allocation considering the interference to the main system in a controllable range. We propose a three-slot one-way vehicle system model where the mobile vehicle nodes complete information interaction with the assistance of other independent nodes by borrowing the unused radio spectrum with the primary networks. The end-to-end SNR relationship in overlay and underlay cognitive communication system mode are analyzed by using two forwarding protocol, namely, decode-and-forward(DF)protocol and amplify-and-forward(AF)protocol, respectively. The system outage probability is derived and the optimal power allocation factor is obtained via seeking the minimum value of the approximation of system outage probability. The analytical results have been confirmed by means of Monte Carlo simulations. Simulation results show that the proposed system performance in terms of outage under the optimal power allocation is superior to that under the average power allocation, and is also better than that under other power allocation systems.
  • Sen Wang, Hanxiao Yu, Yifei Yuan, Guangyi Liu, Zesong Fei
    2020, 17(11): 100-110.
    Abstract ( )   Knowledge map   Save
    Grant-free Non-orthogonal Multiple Access(GF-NOMA)is a promising technology for massive access users and sporadic small-packet transmission for Beyond the 5th Generation mobile communication system(B5G)/ the 6th Generation mobile communication system(6G). One of the key aspects in GF-NOMA system is the signature/constellation design. However, due to the channel variation and random activation of users, conventional optimization approaches seem unsuitable for such complex models. In this paper, as an initial attempt, we propose a human intelligence(HI)-guided artificial intelligence(AI)-enhanced signature/constellation design method. By separate design of modulation and power allocation inspired by prior knowledge, the proposed deep neuron network(DNN)for NOMA signature/constellation design not only has smaller size of DNN and less training data, but also has stronger interpretability. In the last section, via simulations we demonstrate that in terms of bit error rate, the proposed scheme can achieve significant performance gain over the conventional NOMA schemes.
  • Ronglan Huang, Dehuan Wan, Fei Ji, Hua Qing, Jie Li, Hua Yu, Fangjiong Chen
    2020, 17(11): 111-119.
    Abstract ( )   Knowledge map   Save
    Non-orthogonal multiple access(NOMA)technique is an expert on channel differences exploiting. In this paper, a dual-hop NOMA-based cooperative relaying network where a best relay is selected as an active node to accomplish the communication between a source and a destination is discussed. We assume that both decode-and-forward(DF)and amplify-and-forward(AF)protocols are applied to the selected relay. The metrics that ergodic sum-rate and outage probability are investigated, and the closed-form expressions of the latter for DF and AF protocols are derived. Numerical and simulation results are conducted to verify the validity of the theoretical analysis, in which we can see that the NOMA based DF relaying is better than the NOMA based AF relaying and other existing NOMA-based cooperative communication schemes.
  • Jun Li, Jia Hou, Lisheng Fan, Yier Yan, Xue-Qin Jiang, Han Hai
    2020, 17(11): 120-130.
    Abstract ( )   Knowledge map   Save
    Generalised pre-coding quadrature spatial modulation(GPQSM)is recently proposed to increase the spectral efficiency(SE)of GPSM, which extends the transmitted symbols into in-phase/quadrature domains. In this paper, a novel scheme named non-orthogonal multiple access(NOMA)-aided GPQSM(NOMA-GPQSM), which incorporates the GPQSM scheme into the multi-user communication networks with assist of NOMA, is proposed to further improve the SE and system performance. In NOMA-GPQSM, one base station(BS)is set to serve users, where user 1 is closest to the BS, and user K is farthest from the BS. In addition, a low-complexity detection method is proposed to reduce the high detection complexity of the maximum-likelihood(ML)detection in successive interference cancellation(SIC)method for all users by NOMA-GPQSM. The theoretical analysis of the BER performance for all users is also derived. Simulation results show that near users achieve relatively good performance, and far users achieve acceptable performance by adjusting power factors for all users in NOMA-GPQSM.
  • Kangli Hao, Guorui Feng, Xinpeng Zhang
    2020, 17(11): 131-140.
    Abstract ( )   Knowledge map   Save
    Digital watermark embeds information bits into digital cover such as images and videos to prove the creator’s ownership of his work. In this paper, we propose a robust image watermark algorithm based on a generative adversarial network. This model includes two modules, generator and adversary. Generator is mainly used to generate images embedded with watermark, and decode the image damaged by noise to obtain the watermark. Adversary is used to discriminate whether the image is embedded with watermark and damage the image by noise. Based on the model Hidden(hiding data with deep networks), we add a high-pass filter in front of the discriminator, making the watermark tend to be embedded in the mid-frequency region of the image. Since the human visual system pays more attention to the central area of the image, we give a higher weight to the image center region, and a lower weight to the edge region when calculating the loss between cover and embedded image. The watermarked image obtained by this scheme has a better visual performance. Experimental results show that the proposed architecture is more robust against noise interference compared with the state-of-art schemes.
  • Raed Alhamad, Hatem Boujemaa
    2020, 17(11): 141-155.
    Abstract ( )   Knowledge map   Save
    In this paper, we derive the Symbol Error Probability(SEP)of cooperative systems with incremental relaying and Distributed Relay Selection(DRS). The relays remain idle when the Signal to Noise Ratio(SNR)between the source and destination is larger than T. Otherwise, we activate a relay using DRS. Relay nodes transmit only if their SNR is larger than threshold β. If the SNRs of more than two relays is larger than β, there is a collision and the destination uses only the received signal from the source. If all relays have SNR less than β, no relay is chosen. Threshold β is optimized to yield the lowest SEP at the destination. Our results are compared to centralized relay selection using opportunistic Amplify and Forward(OAF), Partial and Reactive Relay Selection(PRS and RRS). We compare our results to computer simulations for Rayleigh fading channels.
  • Peihong Lin, Zheng Hong, Lifa Wu, Yihao Li, Zhenji Zhou
    2020, 17(11): 156-180.
    Abstract ( )   Knowledge map   Save
    As the information technology rapidly develops, many network applications appear and their communication protocols are unknown. Although many protocol keyword recognition based protocol reverse engineering methods have been proposed, most of the keyword recognition algorithms are time consuming. This paper firstly uses the traffic clustering method F-DBSCAN to cluster the unknown protocol traffic. Then an improved CFSM(Closed Frequent Sequence Mining)algorithm is used to mine closed frequent sequences from the messages and identify protocol keywords. Finally, CFGM(Closed Frequent Group Mining)algorithm is proposed to explore the parallel, sequential and hierarchical relations between the protocol keywords and obtain accurate protocol message formats. Experimental results show that the proposed protocol formats extraction method is better than Apriori algorithm and Sequence alignment algorithm in terms of time complexity and it can achieve high keyword recognition accuracy. Additionally, based on the relations between the keywords, the method can obtain accurate protocol formats. Compared with the protocol formats obtained from the existing methods, our protocol format can better grasp the overall structure of target protocols and the results perform better in the application of protocol reverse engineering such as fuzzing test.
  • Peiliang Zuo, Tao Peng, Hao Wu, Kangyong You, Hanbo Jing, Wenbin Guo, Wenbo Wang
    2020, 17(11): 181-193.
    Abstract ( )   Knowledge map   Save
    Source localization plays an indispensable role in many applications. This paper addresses the directional source localization problem in a three-dimensional(3D)wireless sensor network using hybrid received-signal-strength(RSS)and angle-of-arrival(AOA)measurements. Both the position and transmission orientation of the source are to be estimated. In the considered positioning scenario, the angle and range measurements are respectively corresponding to the AOA model and RSS model that integrates the Gaussian-shaped radiation pattern. Given that the localization problem is non-convex and the unknown parameters therein are coupled together, this paper adopts the second-order cone relaxation and alternating optimization techniques in the proposed estimation algorithm. Moreover, to provide a performance benchmark for any localization method, the corresponding Cramer-Rao lower bounds(CRLB)of estimating the unknown position and transmission orientation of the source are derived. Numerical and simulation results demonstrate that the presented algorithm effectively resolves the problem, and its estimation performance is close to the CRLB for the localization with the hybrid measurements.
  • Zhijun Wu, Yun Zhang, Liang Liu, Meng Yue
    2020, 17(11): 194-218.
    Abstract ( )   Knowledge map   Save
    Due to the civil BeiDou navigation system is open, unauthenticated, and non-encrypted, civilian BeiDou navigation signals may have great security loopholes during transmission or reception. The main security loophole here is spoofing attacks. Spoofing attacks make the positioning or timing results of BeiDou civilian receivers wrong. Such errors may cause a series of security problems, which lays a serious hidden danger for BeiDou satellite information security. This article proposes an anti-spoofing method for BeiDou navigation system based on the combination of SM commercial cryptographic algorithm and Timed Efficient Stream Loss-tolerant Authentication(TESLA)for spoofing attacks. In this solution, we use the SM3 algorithm to generate a TESLA key chain with time information, and then use the key in the key chain to generate the message authentication code for the BeiDou D2 navigation message. The message authentication code is inserted into a reserved bit of the D2 navigation message. In addition, this solution uses the SM2 algorithm to protect and encrypt time information in the TESLA key chain to prevent key replay attacks in TESLA. The experimental results tested on the experimental platform built in this paper show that this scheme reduces the possibility of the BeiDou navigation system being deceived and enhances the safety of the BeiDou navigation system.
  • Yan Zhu, Min Sheng, Jiandong Li, Di Zhou
    2020, 17(11): 219-230.
    Abstract ( )   Knowledge map   Save
    The efficient antenna scheduling strategy for data relay satellites(DRSs)is essential to optimize the throughput or delay of the satellite data relay network. However, these two objectives conflict with each other since the user satellites(USs)with higher priorities take up more transmission time of DRSs’ antennas for greater throughput but the USs storing more packets cause a severer waiting delay to the whole network. To balance the conflicting metrics for meeting the delay-throughput integrated requirements, we formulate the antenna scheduling as a stochastic non-convex fractional programming, which is challenging to be solved. For the tractability, we equivalently transform the fractional programming to a parametric problem and implement the Lyapunov drift to guarantee the constraint of mean rate stability. By proposing a delay and throughput tradeoff based antenna scheduling algorithm, we further transform the parametric problem to a solvable weight matching problem. Simulation results reveal the feasible region of the preference control parameter for integrated QoS cases and its variation relationship with network delay and throughput.
  • Jiannan Guo
    2020, 17(11): 231-238.
    Abstract ( )   Knowledge map   Save
    With the emergence of digital transformation success stories, more and more enterprises are launching digital solutions to improve business efficiency or achieve optimal revenue growth. The traditional communication market tends to be saturated, and the digital transformation of telecom operators is imminent. This article combining the development trend of telecom operators’ product business and the application situation of the pilot summarizes the innovative application categories that telecom operators continue to launch based on their own advantages and in response to the needs of the industry. This article focuses on the transformation of security capabilities in communication services, big data, Internet of Things, artificial intelligence, unified authentication and network information security, and deeply analyzes the business characteristics and application modes from the aspects of resource integration, open platform construction, new connection construction, and innovative business development. This article puts forward suggestions for the security development of telecom operators, and provides basic research content for the subsequent research on the innovative application of telecom operators’ capability openness.