Archive

  • Select all
    |
    FEATURE TOPIC: SELECTED PAPERS FROM IEEE ICCT 2023
  • FEATURE TOPIC: SELECTED PAPERS FROM IEEE ICCT 2023
    Du Mingjun, Sun Xinghua, Zhang Yue, Wang Junyuan, Liu Pei
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In recent times, various power control and clustering approaches have been proposed to enhance overall performance for cell-free massive multiple-input multiple-output (CF-mMIMO) networks. With the emergence of deep reinforcement learning (DRL), significant progress has been made in the field of network optimization as DRL holds great promise for improving network performance and efficiency. In this work, our focus delves into the intricate challenge of joint cooperation clustering and downlink power control within CF-mMIMO networks. Leveraging the potent deep deterministic policy gradient (DDPG) algorithm, our objective is to maximize the proportional fairness (PF) for user rates, thereby aiming to achieve optimal network performance and resource utilization. Moreover, we harness the concept of “divide and conquer” strategy, introducing two innovative methods termed alternating DDPG (A-DDPG) and hierarchical DDPG (H-DDPG). These approaches aim to decompose the intricate joint optimization problem into more manageable sub-problems, thereby facilitating a more efficient resolution process. Our findings unequivocally showcase the superior efficacy of our proposed DDPG approach over the baseline schemes in both clustering and downlink power control. Furthermore, the A-DDPG and H-DDPG obtain higher performance gain than DDPG with lower computational complexity.

  • FEATURE TOPIC: SELECTED PAPERS FROM IEEE ICCT 2023
    Sun Hancun, Chen Xu, Luo Yantian, Ge Ning
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Link flooding attack (LFA) is a type of covert distributed denial of service (DDoS) attack. The attack mechanism of LFAs is to flood critical links within the network to cut off the target area from the Internet. Recently, the proliferation of Internet of Things (IoT) has increased the quantity of vulnerable devices connected to the network and has intensified the threat of LFAs. In LFAs, attackers typically utilize low-speed flows that do not reach the victims, making the attack difficult to detect. Traditional LFA defense methods mainly reroute the attack traffic around the congested link, which encounters high complexity and high computational overhead due to the aggregation of massive attack traffic. To address these challenges, we present an LFA defense framework which can mitigate the attack flows at the border switches when they are small in scale. This framework is lightweight and can be deployed at border switches of the network in a distributed manner, which ensures the scalability of our defense system. The performance of our framework is assessed in an experimental environment. The simulation results indicate that our method is effective in detecting and mitigating LFAs with low time complexity.

  • FEATURE TOPIC: SELECTED PAPERS FROM IEEE ICCT 2023
    Wang Gaifang, Li Bo, Yang Hongjuan, Jiang Xu
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The limited energy and high mobility of unmanned aerial vehicles (UAVs) lead to drastic topology changes in UAV formation. The existing routing protocols necessitate a large number of messages for route discovery and maintenance, greatly increasing network delay and control overhead. A energy-efficient routing method based on the discrete time-aggregated graph (TAG) theory is proposed since UAV formation is a defined time-varying network. The network is characterized using the TAG, which utilizes the prior knowledge in UAV formation. An energy-efficient routing algorithm is designed based on TAG, considering the link delay, relative mobility, and residual energy of UAVs. The routing path is determined with global network information before requesting communication. Simulation results demonstrate that the routing method can improve the end-to-end delay, packet delivery ratio, routing control overhead, and residual energy. Consequently, introducing time-varying graphs to design routing algorithms is more effective for UAV formation.

  • FEATURE TOPIC: SELECTED PAPERS FROM IEEE ICCT 2023
    Chen Fangfang, Tang Jianhua, Yin Zihang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Precise and low-latency information transmission through communication systems is essential in the Industrial Internet of Things (IIoT). However, in an industrial system, there is always a coupling relationship between the control and communication components. To improve the system's overall performance, exploring the co-design of communication and control systems is crucial. In this work, we propose a new metric - Age of Loop Information with Flexible Transmission (AoLI-FT), which dynamically adjusts the maximum number of uplink (UL) and downlink (DL) transmission rounds, thus enhancing reliability while ensuring timeliness. Our goal is to explore the relationship between AoLI-FT, reliability, and control convergence rate, and to design optimal blocklengths for UL and DL that achieve the desired control convergence rate. To address this issue, we first derive a closed-form expression for the upper bound of AoLI-FT. Subsequently, we establish a relationship between communication reliability and control convergence rates using a Lyapunov-like function. Finally, we introduce an iterative alternating algorithm to determine the optimal communication and control parameters. The numerical results demonstrate the significant performance advantagesof our proposed communication and control co-design strategy in terms of latency and control cost.

  • FEATURE TOPIC: SELECTED PAPERS FROM IEEE ICCT 2023
    Yang Jie, He Jingchao, Cheng Nan, Yin Zhisheng, Han Dairu, Zhou Conghao, Sun Ruijin
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    With the explosive growth of high-definition video streaming data, a substantial increase in network traffic has ensued. The emergency of mobile edge caching (MEC) can not only alleviate the burden on core network, but also significantly improve user experience. Integrating with the MEC and satellite networks, the network is empowered popular content ubiquitously and seamlessly. Addressing the research gap between multilayer satellite networks and MEC, we study the caching placement problem in this paper. Initially, we introduce a three-layer distributed network caching management architecture designed for efficient and flexible handling of large-scale networks. Considering the constraint on satellite capacity and content propagation delay, the cache placement problem is then formulated and transformed into a markov decision process (MDP), where the content coded caching mechanism is utilized to promote the efficiency of content delivery. Furthermore, a new generic metric, content delivery cost, is proposed to elaborate the performance of caching decision in large-scale networks. Then, we introduce a graph convolutional network (GCN)-based multi-agent advantage actor-critic (A2C) algorithm to optimize the caching decision. Finally, extensive simulations are conducted to evaluate the proposed algorithm in terms of content delivery cost and transferability.

  • COMMUNICATIONS THEORIES & SYSTEMS
  • COMMUNICATIONS THEORIES & SYSTEMS
    Li Jiamin, Fan Qingrui, Zhang Yu, Zhu Pengcheng, Wang Dongming, Wu Hao, You Xiaohu
    Abstract ( )   Knowledge map   Save
    In this paper, we investigate network-assisted full-duplex (NAFD) cell-free millimeter-wave (mmWave) massive multiple-input multiple-output (MIMO) systems with digital-to-analog converter (DAC) quantization and fronthaul compression. We propose to maximize the weighted uplink and downlink sum rate by jointly optimizing the power allocation of both the transmitting remote antenna units (T-RAUs) and uplink users and the variances of the downlink and uplink fronthaul compression noises. To deal with this challenging problem, we further apply a successive convex approximation (SCA) method to handle the non-convex bidirectional limited-capacity fronthaul constraints. The simulation results verify the convergence of the proposed SCA-based algorithm and analyze the impact of fronthaul capacity and DAC quantization on the spectral efficiency of the NAFD cell-free mmWave massive MIMO systems. Moreover, some insightful conclusions are obtained through the comparisons of spectral efficiency, which shows that NAFD achieves better performance gains than co-time co-frequency full-duplex cloud radio access network (CCFD C-RAN) in the cases of practical limited-resolution DACs. Specifically, their performance gaps with 8-bit DAC quantization are larger than that with 1-bit DAC quantization, which attains a 5.5-fold improvement.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Zhou Xiaoyu, Qi Peihan, Liu Qi, Ding Yuanlei, Zheng Shilian, Li Zan
    Abstract ( )   Knowledge map   Save
    With the successive application of deep learning (DL) in classification tasks, the DL-based modulation classification method has become the preference for its state-of-the-art performance. Nevertheless, once the DL recognition model is pre-trained with fixed classes, the pre-trained model tends to predict incorrect results when identifying incremental classes. Moreover, the incremental classes are usually emergent without label information or only a few labeled samples of incremental classes can be obtained. In this context, we propose a graph-based semi-supervised approach to address the few-shot classes-incremental (FSCI) modulation classification problem. Our proposed method is a two-stage learning method, specifically, a warm-up model is trained for classifying old classes and incremental classes, where the unlabeled samples of incremental classes are uniformly labeled with the same label to alleviate the damage of the class imbalance problem. Then the warm-up model is regarded as a feature extractor for constructing a similar graph to connect labeled samples and unlabeled samples, and the label propagation algorithm is adopted to propagate the label information from labeled nodes to unlabeled nodes in the graph to achieve the purpose of incremental classes recognition. Simulation results prove that the proposed method is superior to other finetuning methods and retrain methods.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Luo Junshan, Wang Fanggang, Wang Shilian
    Abstract ( )   Knowledge map   Save
    In spatial modulation systems, the reliability of the active antenna detection is of vital importance since the modulated symbols tend to be correctly demodulated when the active antennas are accurately identified. In this paper, we propose a spatial coded modulation (SCM) scheme, which improves the accuracy of the active antenna detection by coding over the transmit antennas. Specifically, the antenna activation pattern in the SCM corresponds to a codeword in a properly designed codebook with a larger minimum Hamming distance than the conventional spatial modulation. As the minimum Hamming distance increases, the reliability of the active antenna detection is directly enhanced, which yields a better system reliability. In addition to the reliability, the proposed SCM scheme also achieves a higher capacity with the identical antenna configuration compared to the conventional counterpart. The optimal maximum likelihood detector is first formulated. Then, a low-complexity suboptimal detector is proposed to reduce the computational complexity. Theoretical derivations of the channel capacity and the bit error rate are presented in various channel scenarios. Further derivation on performance bounding is also provided to reveal the insight of the benefit of increasing the minimum Hamming distance. Numerical results validate the analysis and demonstrate that the proposed SCM outperforms the conventional spatial modulation techniques in both channel capacity and system reliability.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Feng Yimeng, Jiang Yi, Qin Yajie, Jin Shi
    Abstract ( )   Knowledge map   Save
    In addition to conventional antenna-based array, the reconfigurable intelligent surface (RIS) holds promise as an alternative technology for manufacturing massive multi-input multi-output (MIMO) array for beyond 5G communications. This paper designs a fast algorithm to optimize the RIS-based MIMO precoder for maximizing the spectral efficiency, which includes the digital precoder and the RIS reflection phases. We evaluate the optimality of the algorithm by deriving an RIS channel capacity upper bound utilizing majorization theory. Our scheme can work for an RIS in both frequency flat and frequency selective channels, with either continuously or discretely tunable phases. The simulation results show that the proposed algorithm can achieve the capacity upper bound in some scenarios, which empirically proves its optimality. It is also shown that our algorithm is one-to-two orders of magnitude faster than the state-of-the-art methods in the literature.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Kang Weimin
    Abstract ( )   Knowledge map   Save
    Faster-than-Nyquist (FTN) signaling is a potential scheme for the sixth generation (6G) communication system to improve the spectral efficiency (SE). In this paper, we propose a joint optimization algorithm of precoding and constellation shaping for FTN signaling, which is based on simulated optimization via the bare bones particle swarm optimization (BBPSO). The information-theoretical analysis and simulated error performance show that the proposed method is efficient, which can get a significant improvement in terms of average mutual information (AMI) and bit error rate (BER) performance. The simulated BER results verify the theoretical AMI analysis. Compared with the conventional regular 16QAM FTN scheme, when BER is at $10^{-5}$, the joint optimized scheme can obtain 0.50 dB and 0.60 dB performance gain with SE at 3.077 bits/s/Hz and 3.282 bits/s/Hz, respectively. Therefore, the proposed scheme is reliable, and thus suitable for the 6G communication.
  • NETWORKS & SECURITY
  • NETWORKS & SECURITY
    Sun Gangcan, Jiwei Sun, Hao Wanming, Zhengyu Zhu, Xiang Ji, Yiqing Zhou
    Abstract ( )   Knowledge map   Save
    In this article, the secure computation efficiency (SCE) problem is studied in a massive multipleinput multiple-output (mMIMO)-assisted mobile edge computing (MEC) network. We first derive the secure transmission rate based on the mMIMO under imperfect channel state information. Based on this, the SCE maximization problem is formulated by jointly optimizing the local computation frequency, the offloading time, the downloading time, the users and the base station transmit power. Due to its difficulty to directly solve the formulated problem, we first transform the fractional objective function into the subtractive form one via the dinkelbach method. Next, the original problem is transformed into a convex one by applying the successive convex approximation technique, and an iteration algorithm is proposed to obtain the solutions. Finally, the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes.
  • NETWORKS & SECURITY
    Luo Yi, Zhou Lihua, Dong Jian, Sun Yang, Xu Jiahui, Xi Kaixin
    Abstract ( )   Knowledge map   Save
    This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network. In the network, energy-constrained secondary network (SN) nodes harvest energy from radio frequency signals of a multi-antenna power beacon. Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multi-antenna eavesdropper by using a four-phase time division broadcast protocol, and the hardware impairments of SN nodes and eavesdropper are modeled. To alleviate eavesdropping attacks, the artificial noise is applied by SN nodes. The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability (OP), intercept probability (IP), and OP+IP over quasi-static Rayleigh fading channel. Additionally, due to the complexity of OP+IP expression, a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor, which can achieve security-reliability tradeoff for SN. Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.
  • NETWORKS & SECURITY
    Wu Zhijun, Li Yuqi, Yue Meng
    Abstract ( )   Knowledge map   Save
    To solve the problem of poor detection and limited application range of current intrusion detection methods, this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method. Hence, we proposed an intrusion detection algorithm based on convolutional neural network (CNN) and AdaBoost algorithm. This algorithm uses CNN to extract the characteristics of network traffic data, which is particularly suitable for the analysis of continuous and classified attack data. The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification. We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment. The results show that the detection rate of algorithm is 99.27% and the false positive rate is lower than 0.98%. Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data.
  • NETWORKS & SECURITY
    Cao Yali, Teng Yinglei, Mei Song, Nan Wang
    Abstract ( )   Knowledge map   Save
    Effective control of time-sensitive industrial applications depends on the real-time transmission of data from underlying sensors. Quantifying the data freshness through age of information (AoI), in this paper, we jointly design sampling and non-slot based scheduling policies to minimize the maximum time-average age of information (MAoI) among sensors with the constraints of average energy cost and finite queue stability. To overcome the intractability involving high couplings of such a complex stochastic process, we first focus on the single-sensor time-average AoI optimization problem and convert the constrained Markov decision process (CMDP) into an unconstrained Markov decision process (MDP) by the Lagrangian method. With the infinite-time average energy and AoI expression expended as the Bellman equation, the single-sensor time-average AoI optimization problem can be approached through the steady-state distribution probability. Further, we propose a low-complexity sub-optimal sampling and semi-distributed scheduling scheme for the multi-sensor scenario. The simulation results show that the proposed scheme reduces the MAoI significantly while achieving a balance between the sampling rate and service rate for multiple sensors.
  • EMERGING TECHNOLOGIES & APPLICATIONS
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Qing Hua, Liu Yun, Shi Xiayang, Yu Hua, Ji Fei, Cui Yinming
    Abstract ( )   Knowledge map   Save
    The orthogonal time frequency space (OTFS) modulation proposed in recent years is considered to have superior performance than orthogonal frequency division multiplexing (OFDM) for the doubly selective (DS) channels. The works in the existing literature on OTFS mainly focus on the cases where the channels are underspread (i.e., the product of the delay spread and the Doppler spread is less than 1). In the scenario of overspread DS channel, which has large delay spread and severe Doppler spread, such as underwater acoustic (UWA) channel, the channel model in delay-Doppler (DD) Domain derived by existing work is no longer applicable. In this paper, we derive a more generalized expression of the channel model in delay-Doppler domain, which allows the product of the delay spread and Doppler spread to be larger than 1. The result shows that the existing channel model is just a special case of the one we proposed. Using the proposed channel matrix in DD domain, we build the OTFS detectors with the minimum mean square error (MMSE) and message passing (MP) algorithms on overspread doubly selective channel. Finally, simulation results are presented to verify the theoretical derivation and the effectiveness of the detectors.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Khursheed Ahmad Bhat, Shabir Ahmad Sofi
    Abstract ( )   Knowledge map   Save
    The study of machine learning has revealed that it can unleash new applications in a variety of disciplines. Many limitations limit their expressiveness, and researchers are working to overcome them to fully exploit the power of data-driven machine learning (ML) and deep learning (DL) techniques. The data imbalance presents major hurdles for classification and prediction problems in machine learning, restricting data analytics and acquiring relevant insights in practically all real-world research domains. In visual learning, network information security, failure prediction,digital marketing, healthcare, and a variety of other domains, raw data suffers from a biased data distribution of one class over the other. This article aims to present a taxonomy of the approaches for handling imbalanced data problems and their comparative study on the classification metrics and their application areas. We have explored very recent trends of techniques employed for solutions to class imbalance problems in datasets and have also discussed their limitations. This article has also identified open challenges for further research in the direction of class data imbalance.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Meng Deng, Zhou Huan, Jiang Kai, Zheng Hantong, Cao Yue, Chen Peng
    Abstract ( )   Knowledge map   Save
    Edge caching has emerged as a promising application paradigm in 5G networks, and by building edge networks to cache content, it can alleviate the traffic load brought about by the rapid growth of Internet of Things (IoT) services and applications. Due to the limitations of Edge Servers (ESs) and a large number of user demands, how to make the decision and utilize the resources of ESs are significant. In this paper, we aim to minimize the total system energy consumption in a heterogeneous network and formulate the content caching optimization problem as a Mixed Integer Non-Linear Programming (MINLP). To address the optimization problem, a Deep Q-Network (DQN)- based method is proposed to improve the overall performance of the system and reduce the backhaul traffic load. In addition, the DQN-based method can effectively solve the limitation of traditional reinforcement learning (RL) in complex scenarios. Simulation results show that the proposed DQN-based method can greatly outperform other benchmark methods, and significantly improve the cache hit rate and reduce the total system energy consumption in different scenarios.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Mu Yunping, Fan Dian, Wang Gongpu, Xu Yongjun, Kuang Lei
    Abstract ( )   Knowledge map   Save
    Circuit sensitivity of sensors or tags without battery is one practical constraint for ambient backscatter communication systems. This letter considers using beamforming to reduce the sensitivity constraint and evaluates the corresponding performance in terms of the tag activation distance and the system capacity. Specifically, we derive the activation probabilities of the tag in the case of single-antenna and multi-antenna transmitters. Besides, we obtain the capacity expressions for the ambient backscatter communication system with beamforming and illustrate the power allocation that maximizes the system capacity when the tag is activated. Finally, simulation results are provided to corroborate our proposed studies.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Xie Yinghai, Li Xianhuai, Zhao Haibo
    Abstract ( )   Knowledge map   Save
    A new selected mapping (SLM) scheme based on constellation rotation is proposed to reduce the peak-to-average power ratio (PAPR) of orthogonal frequency division multiplexing (OFDM) signals. Its core idea is to generate abundant candidate signals by rotating different sub-signals of the original frequency signal with different angles. This new signal generation method can simplify the calculation process of candidate time signals into the linear addition of some intermediate signals, which are generated by the inverse fast Fourier transform (IFFT) operation of the original frequency signal. This feature can effectively reduce the computational complexity of candidate signal generation process. And compared to the traditional SLM scheme, the number of complex multiplication and complex addition of new scheme can separately be decreased by about 99.99 % and 91.7 % with some specific parameters. Moreover, with the help of the constellation detection mechanism at the receiver, there is no need to carry any side information at the transmitter. The simulation results show that, with the same channel transmission performance, the PAPR reduction performance of new scheme can approach or even exceed the upper bound of the traditional SLM scheme, which uses all the vectors in Hadamard matrix as the phase sequences.