-
Large-scale Package Deliveries with Unmanned Aerial Vehicles using Collective Learning
Authors:
Arun Narayanan,
Evangelos Pournaras,
Pedro H. J. Nardelli
Abstract:
Unmanned aerial vehicles (UAVs) have significant practical advantages for delivering packages, and many logistics companies have begun deploying UAVs for commercial package deliveries. To deliver packages quickly and cost-effectively, the routes taken by UAVs from depots to customers must be optimized. This route optimization problem, a type of capacitated vehicle routing problem, has recently att…
▽ More
Unmanned aerial vehicles (UAVs) have significant practical advantages for delivering packages, and many logistics companies have begun deploying UAVs for commercial package deliveries. To deliver packages quickly and cost-effectively, the routes taken by UAVs from depots to customers must be optimized. This route optimization problem, a type of capacitated vehicle routing problem, has recently attracted considerable research interest. However, few papers have dealt with large-scale deliveries, where the number of customers exceed 1000. We present an innovative, practical package delivery model wherein multiple UAVs deliver multiple packages to customers who are compensated for late deliveries. Further, we propose an innovative methodology that combines a new plan-generation algorithm with a collective-learning heuristic to quickly determine cost-effective paths of UAVs even for large-scale deliveries up to 10000 customers. Specialized settings are applied to a collective-learning heuristic, the Iterative Economic Planning and Optimized Selections (I-EPOS) in order to coordinate collective actions of the UAVs. To demonstrate our methodology, we applied our highly flexible approach to a depot in Heathrow Airport, London. We show that a coordinated approach, in which the UAVs collectively determine their flight paths, leads to lower operational costs than an uncoordinated approach. Further, the coordinated approach enables large-scale package deliveries.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Low-Complexity Dynamic Directional Modulation: Vulnerability and Information Leakage
Authors:
Pedro E. Gória Silva,
Adam Narbudowicz,
Nicola Marchetti,
Pedro H. J. Nardelli,
Rausley A. A. de Souza,
Jules M. Moualeu
Abstract:
In this paper, the privacy of wireless transmissions is improved through the use of an efficient technique termed dynamic directional modulation (DDM), and is subsequently assessed in terms of the measure of information leakage. Recently, a variation of DDM termed low-power dynamic directional modulation (LPDDM) has attracted significant attention as a prominent secure transmission method due to i…
▽ More
In this paper, the privacy of wireless transmissions is improved through the use of an efficient technique termed dynamic directional modulation (DDM), and is subsequently assessed in terms of the measure of information leakage. Recently, a variation of DDM termed low-power dynamic directional modulation (LPDDM) has attracted significant attention as a prominent secure transmission method due to its ability to further improve the privacy of wireless communications. Roughly speaking, this modulation operates by randomly selecting the transmitting antenna from an antenna array whose radiation pattern is well known. Thereafter, the modulator adjusts the constellation phase so as to ensure that only the legitimate receiver recovers the information. To begin with, we highlight some privacy boundaries inherent to the underlying system. In addition, we propose features that the antenna array must meet in order to increase the privacy of a wireless communication system. Last, we adopt a uniform circular monopole antenna array with equiprobable transmitting antennas in order to assess the impact of DDM on the information leakage. It is shown that the bit error rate, while being a useful metric in the evaluation of wireless communication systems, does not provide the full information about the vulnerability of the underlying system.
△ Less
Submitted 31 May, 2023;
originally announced May 2023.
-
Semantic-Functional Communications in Cyber-Physical Systems
Authors:
Pedro E. Goria Silva,
Pedro H. J. Nardelli,
Arthur S. de Sena,
Harun Siljak,
Niko Nevaranta,
Nicola Marchetti,
Rausley A. A. de Souza
Abstract:
This paper explores the use of semantic knowledge inherent in the cyber-physical system (CPS) under study in order to minimize the use of explicit communication, which refers to the use of physical radio resources to transmit potentially informative data. It is assumed that the acquired data have a function in the system, usually related to its state estimation, which may trigger control actions.…
▽ More
This paper explores the use of semantic knowledge inherent in the cyber-physical system (CPS) under study in order to minimize the use of explicit communication, which refers to the use of physical radio resources to transmit potentially informative data. It is assumed that the acquired data have a function in the system, usually related to its state estimation, which may trigger control actions. We propose that a semantic-functional approach can leverage the semantic-enabled implicit communication while guaranteeing that the system maintains functionality under the required performance. We illustrate the potential of this proposal through simulations of a swarm of drones jointly performing remote sensing in a given area. Our numerical results demonstrate that the proposed method offers the best design option regarding the ability to accomplish a previously established task -- remote sensing in the addressed case -- while minimising the use of radio resources by controlling the trade-offs that jointly determine the CPS performance and its effectiveness in the use of resources. In this sense, we establish a fundamental relationship between energy, communication, and functionality considering a given end application.
△ Less
Submitted 31 May, 2023;
originally announced May 2023.
-
Optimizing a Digital Twin for Fault Diagnosis in Grid Connected Inverters -- A Bayesian Approach
Authors:
Pavol Mulinka,
Subham Sahoo,
Charalampos Kalalas,
Pedro H. J. Nardelli
Abstract:
In this paper, a hyperparameter tuning based Bayesian optimization of digital twins is carried out to diagnose various faults in grid connected inverters. As fault detection and diagnosis require very high precision, we channelize our efforts towards an online optimization of the digital twins, which, in turn, allows a flexible implementation with limited amount of data. As a result, the proposed…
▽ More
In this paper, a hyperparameter tuning based Bayesian optimization of digital twins is carried out to diagnose various faults in grid connected inverters. As fault detection and diagnosis require very high precision, we channelize our efforts towards an online optimization of the digital twins, which, in turn, allows a flexible implementation with limited amount of data. As a result, the proposed framework not only becomes a practical solution for model versioning and deployment of digital twins design with limited data, but also allows integration of deep learning tools to improve the hyperparameter tuning capabilities. For classification performance assessment, we consider different fault cases in virtual synchronous generator (VSG) controlled grid-forming converters and demonstrate the efficacy of our approach. Our research outcomes reveal the increased accuracy and fidelity levels achieved by our digital twin design, overcoming the shortcomings of traditional hyperparameter tuning methods.
△ Less
Submitted 7 December, 2022;
originally announced December 2022.
-
Indoor Positioning via Gradient Boosting Enhanced with Feature Augmentation using Deep Learning
Authors:
Ashkan Goharfar,
Jaber Babaki,
Mehdi Rasti,
Pedro H. J. Nardelli
Abstract:
With the emerge of the Internet of Things (IoT), localization within indoor environments has become inevitable and has attracted a great deal of attention in recent years. Several efforts have been made to cope with the challenges of accurate positioning systems in the presence of signal interference. In this paper, we propose a novel deep learning approach through Gradient Boosting Enhanced with…
▽ More
With the emerge of the Internet of Things (IoT), localization within indoor environments has become inevitable and has attracted a great deal of attention in recent years. Several efforts have been made to cope with the challenges of accurate positioning systems in the presence of signal interference. In this paper, we propose a novel deep learning approach through Gradient Boosting Enhanced with Step-Wise Feature Augmentation using Artificial Neural Network (AugBoost-ANN) for indoor localization applications as it trains over labeled data. For this purpose, we propose an IoT architecture using a star network topology to collect the Received Signal Strength Indicator (RSSI) of Bluetooth Low Energy (BLE) modules by means of a Raspberry Pi as an Access Point (AP) in an indoor environment. The dataset for the experiments is gathered in the real world in different periods to match the real environments. Next, we address the challenges of the AugBoost-ANN training which augments features in each iteration of making a decision tree using a deep neural network and the transfer learning technique. Experimental results show more than 8\% improvement in terms of accuracy in comparison with the existing gradient boosting and deep learning methods recently proposed in the literature, and our proposed model acquires a mean location accuracy of 0.77 m.
△ Less
Submitted 16 November, 2022;
originally announced November 2022.
-
A Robust and Explainable Data-Driven Anomaly Detection Approach For Power Electronics
Authors:
Alexander Beattie,
Pavol Mulinka,
Subham Sahoo,
Ioannis T. Christou,
Charalampos Kalalas,
Daniel Gutierrez-Rojas,
Pedro H. J. Nardelli
Abstract:
Timely and accurate detection of anomalies in power electronics is becoming increasingly critical for maintaining complex production systems. Robust and explainable strategies help decrease system downtime and preempt or mitigate infrastructure cyberattacks. This work begins by explaining the types of uncertainty present in current datasets and machine learning algorithm outputs. Three techniques…
▽ More
Timely and accurate detection of anomalies in power electronics is becoming increasingly critical for maintaining complex production systems. Robust and explainable strategies help decrease system downtime and preempt or mitigate infrastructure cyberattacks. This work begins by explaining the types of uncertainty present in current datasets and machine learning algorithm outputs. Three techniques for combating these uncertainties are then introduced and analyzed. We further present two anomaly detection and classification approaches, namely the Matrix Profile algorithm and anomaly transformer, which are applied in the context of a power electronic converter dataset. Specifically, the Matrix Profile algorithm is shown to be well suited as a generalizable approach for detecting real-time anomalies in streaming time-series data. The STUMPY python library implementation of the iterative Matrix Profile is used for the creation of the detector. A series of custom filters is created and added to the detector to tune its sensitivity, recall, and detection accuracy. Our numerical results show that, with simple parameter tuning, the detector provides high accuracy and performance in a variety of fault scenarios.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.
-
Spectrum Sharing Among Multiple-Seller and Multiple-Buyer Operators of A Mobile Network: A Stochastic Geometry Approach
Authors:
Elaheh Ataeebojd,
Mehdi Rasti,
Hossein Pedram,
Pedro H. J. Nardelli
Abstract:
Sharing the spectrum among mobile network operators (MNOs) is a promising approach to improve the spectrum utilization and to increase the monetary income of MNOs. In this paper, we model a nonorthogonal spectrum sharing system for a large-scale cellular network where multiple seller MNOs lease their licensed sub-bands to several buyer MNOs. We first analyze the per-user expected rate and the per-…
▽ More
Sharing the spectrum among mobile network operators (MNOs) is a promising approach to improve the spectrum utilization and to increase the monetary income of MNOs. In this paper, we model a nonorthogonal spectrum sharing system for a large-scale cellular network where multiple seller MNOs lease their licensed sub-bands to several buyer MNOs. We first analyze the per-user expected rate and the per-MNO expected profit using stochastic geometry. Then, we formulate the joint problem of power control and licensed sub-band sharing to maximize the expected profit of all MNOs as a multiobjective optimization problem (MOOP) under the users' quality of service requirement and the nonnegative return on investment constraints. To transform the MOOP into a single objective form, we use a combination of the $ε$-constraint and weighted sum methods. However, the transformed problem is nonconvex because of the presence of binary variables and nonconvex rate functions in the objective function and constraints. We address this problem by using a penalty function and approximating the nonconvex rate functions by a constrained stochastic successive convex approximation method. Finally, the numerical results show the correctness and performance of the proposed algorithm under various conditions.
△ Less
Submitted 26 June, 2022;
originally announced June 2022.
-
Blockchain Function Virtualization: A New Approach for Mobile Networks Beyond 5G
Authors:
Shiva Kazemi Taskou,
Mehdi Rasti,
Pedro H. J. Nardelli
Abstract:
Many of the key enabling technologies of the fifth-generation (5G), such as network slicing, spectrum sharing, and federated learning, rely on a centralized authority. This may lead to pitfalls in terms of security or single point of failure. Distributed ledger technology, specifically blockchain, is currently employed by different applications related to the Internet of Things (IoT) and 5G to add…
▽ More
Many of the key enabling technologies of the fifth-generation (5G), such as network slicing, spectrum sharing, and federated learning, rely on a centralized authority. This may lead to pitfalls in terms of security or single point of failure. Distributed ledger technology, specifically blockchain, is currently employed by different applications related to the Internet of Things (IoT) and 5G to address the drawbacks of centralized systems. For this reason, mobile blockchain networks (MBNs) have recently attracted a great deal of attention. To add a transaction to the blockchain in MBNs, mobile or IoT users must perform various tasks like encryption, decryption, and mining. These tasks require energy and processing power, which impose limitations on mobile and IoT users' performance because they are usually battery powered and have a low processing power. One possible solution is to perform the tasks virtually on commodity servers provided by mobile edge computing (MEC) or cloud computing. To do so, all tasks needed to add a transaction to the blockchain can be treated as virtual blockchain functions that can be executed on commodity servers. We introduce a blockchain virtualization framework called blockchain function virtualization (BFV), through which all blockchain functions can be performed virtually by MEC or cloud computing. Furthermore, we describe applications of the BFV framework and resource allocation challenges brought by the BFV framework in mobile networks. In addition, to illustrate the advantages of BFV, we define an optimization problem to simultaneously minimize the energy consumption cost and maximize miners' rewards. Finally, simulation results show the performance of the proposed framework in terms of total energy consumption, transaction confirmation rate, and miners' average profit.
△ Less
Submitted 19 May, 2022;
originally announced June 2022.
-
MIX-MAB: Reinforcement Learning-based Resource Allocation Algorithm for LoRaWAN
Authors:
Farzad Azizi,
Benyamin Teymuri,
Rojin Aslani,
Mehdi Rasti,
Jesse Tolvanen,
Pedro H. J. Nardelli
Abstract:
This paper focuses on improving the resource allocation algorithm in terms of packet delivery ratio (PDR), i.e., the number of successfully received packets sent by end devices (EDs) in a long-range wide-area network (LoRaWAN). Setting the transmission parameters significantly affects the PDR. Employing reinforcement learning (RL), we propose a resource allocation algorithm that enables the EDs to…
▽ More
This paper focuses on improving the resource allocation algorithm in terms of packet delivery ratio (PDR), i.e., the number of successfully received packets sent by end devices (EDs) in a long-range wide-area network (LoRaWAN). Setting the transmission parameters significantly affects the PDR. Employing reinforcement learning (RL), we propose a resource allocation algorithm that enables the EDs to configure their transmission parameters in a distributed manner. We model the resource allocation problem as a multi-armed bandit (MAB) and then address it by proposing a two-phase algorithm named MIX-MAB, which consists of the exponential weights for exploration and exploitation (EXP3) and successive elimination (SE) algorithms. We evaluate the MIX-MAB performance through simulation results and compare it with other existing approaches. Numerical results show that the proposed solution performs better than the existing schemes in terms of convergence time and PDR.
△ Less
Submitted 7 June, 2022;
originally announced June 2022.
-
Minimizing Energy Consumption for End-to-End Slicing in 5G Wireless Networks and Beyond
Authors:
Shiva Kazemi Taskou,
Mehdi Rasti,
Pedro H. J. Nardelli
Abstract:
End-to-End (E2E) network slicing enables wireless networks to provide diverse services on a common infrastructure. Each E2E slice, including resources of radio access network (RAN) and core network, is rented to mobile virtual network operators (MVNOs) to provide a specific service to end-users. RAN slicing, which is realized through wireless network virtualization, involves sharing the frequency…
▽ More
End-to-End (E2E) network slicing enables wireless networks to provide diverse services on a common infrastructure. Each E2E slice, including resources of radio access network (RAN) and core network, is rented to mobile virtual network operators (MVNOs) to provide a specific service to end-users. RAN slicing, which is realized through wireless network virtualization, involves sharing the frequency spectrum and base station antennas in RAN. Similarly, in core slicing, which is achieved by network function virtualization, data center resources such as commodity servers and physical links are shared between users of different MVNOs. In this paper, we study E2E slicing with the aim of minimizing the total energy consumption. The stated optimization problem is non-convex that is solved by a sub-optimal algorithm proposed here. The simulation results show that our proposed joint power control, server and link allocation (JPSLA) algorithm achieves 30% improvement compared to the disjoint scheme, where RAN and core are sliced separately.
△ Less
Submitted 7 June, 2022;
originally announced June 2022.
-
Stochastic Geometry Analysis of Spectrum Sharing Among Multiple Seller and Buyer Mobile Operators
Authors:
Elaheh Ataeebojd,
Mehdi Rasti,
Hossein Pedram,
Pedro H. J. Nardelli
Abstract:
Sharing the licensed frequency spectrum among multiple mobile network operators (MNOs) is a promising approach to improve licensed spectrum utilization. In this paper, we model and analyze a non-orthogonal spectrum sharing system consisting of multiple seller and multiple buyer MNOs where buyer MNOs lease several licensed sub-bands from different seller MNOs. All base stations (BSs) owned by a buy…
▽ More
Sharing the licensed frequency spectrum among multiple mobile network operators (MNOs) is a promising approach to improve licensed spectrum utilization. In this paper, we model and analyze a non-orthogonal spectrum sharing system consisting of multiple seller and multiple buyer MNOs where buyer MNOs lease several licensed sub-bands from different seller MNOs. All base stations (BSs) owned by a buyer MNO can also utilize various licensed sub-bands simultaneously, which are also used by other buyer MNOs. To reduce the interference that a buyer MNO imposes on one seller MNO sharing its licensed sub-band, this buyer MNO has a limitation on the maximum interference caused to the corresponding seller MNO's users. We assume each MNO owns its BSs and users whose locations are modeled as two independent homogeneous Poisson point processes. Applying stochastic geometry, we derive expressions for the downlink signal-to-interference-plus-noise ratio coverage probability and the average rate of both seller and buyer networks. The numerical results validate our analysis with simulation and illustrate the effect of the maximum interference threshold on the total sum-rate of the network.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
Rate-Splitting Multiple Access and its Interplay with Intelligent Reflecting Surfaces
Authors:
Arthur S. de Sena,
Pedro H. J. Nardelli,
Daniel B. da Costa,
Petar Popovski,
Constantinos B. Papadias
Abstract:
Rate-splitting multiple access (RSMA) has recently appeared as a powerful technique for improving the downlink performance of multiple-input multiple-output (MIMO) systems. By flexibly managing interference, RSMA can deliver high spectral and energy efficiency, as well as robustness to imperfect channel state information (CSI). In another development, an intelligent reflecting surface (IRS) has em…
▽ More
Rate-splitting multiple access (RSMA) has recently appeared as a powerful technique for improving the downlink performance of multiple-input multiple-output (MIMO) systems. By flexibly managing interference, RSMA can deliver high spectral and energy efficiency, as well as robustness to imperfect channel state information (CSI). In another development, an intelligent reflecting surface (IRS) has emerged as a method to control the wireless environment through software-configurable, near-passive, sub-wavelength reflecting elements. This article presents the potential of synergy between IRS and RSMA. Three important improvements achievable by IRS-RSMA schemes are identified, supported by insightful numerical examples, and mapped to beyond-5G use cases, along with future research directions.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
A novel semantic-functional approach for multiuser event-trigger communication
Authors:
Pedro E. Gória Silva,
Plínio S. Dester,
Harun Siljak,
Nicola Marchetti,
Pedro H. J. Nardelli,
Rausley A. A. de Souza
Abstract:
This work introduces a new perspective for physical media sharing in multiuser communication by jointly considering (i) the meaning of the transmitted message and (ii) its function at the end user. Specifically, we have defined a scenario where multiple users (sensors) are continuously transmitting their own states concerning a predetermined event. On the receiver side there is an alarm monitoring…
▽ More
This work introduces a new perspective for physical media sharing in multiuser communication by jointly considering (i) the meaning of the transmitted message and (ii) its function at the end user. Specifically, we have defined a scenario where multiple users (sensors) are continuously transmitting their own states concerning a predetermined event. On the receiver side there is an alarm monitoring system, whose function is to decide whether such a predetermined event has happened in a certain time period and, if yes, in which user. The media access control protocol proposed constitutes an alternative approach to the conventional physical layer methods, because the receiver does not decode the received waveform directly; rather, the relative position of the absence or presence of energy within a multidimensional resource space carries the (semantic) information. The protocol introduced here provides high efficiency in multiuser networks that operate with event-triggered sampling by enabling a constructive reconstruction of transmission collisions. We have demonstrated that the proposed method leads to a better event transmission efficiency than conventional methods like TDMA and slotted ALOHA. Remarkably, the proposed method achieves 100\% efficiency and 0\% error probability in almost all the studied cases, while consistently outperforming TDMA and slotted ALOHA.
△ Less
Submitted 3 May, 2023; v1 submitted 7 April, 2022;
originally announced April 2022.
-
Home Energy Management Systems: Operation and Resilience of Heuristics against Cyberattacks
Authors:
Hafiz Majid Hussain,
Arun Narayanan,
Subham Sahoo,
Yongheng Yang,
Pedro H. J. Nardelli,
Frede Blaabjerg
Abstract:
Internet of Things (IoT) and advanced communication technologies have demonstrated great potential to manage residential energy resources by enabling demand-side management (DSM). Home energy management systems (HEMSs) can automatically control electricity production and usage inside homes using DSM techniques. These HEMSs will wirelessly collect information from hardware installed in the power sy…
▽ More
Internet of Things (IoT) and advanced communication technologies have demonstrated great potential to manage residential energy resources by enabling demand-side management (DSM). Home energy management systems (HEMSs) can automatically control electricity production and usage inside homes using DSM techniques. These HEMSs will wirelessly collect information from hardware installed in the power system and in homes with the objective to intelligently and efficiently optimize electricity usage and minimize costs. However, HEMSs can be vulnerable to cyberattacks that target the electricity pricing model. The cyberattacker manipulates the pricing information collected by a customer's HEMS to misguide its algorithms toward non-optimal solutions. The customer's electricity bill increases, and additional peaks are created without being detected by the system operator. This article introduces demand-response (DR)-based DSM in HEMSs and discusses DR optimization using heuristic algorithms. Moreover, it discusses the possibilities and impacts of cyberattacks, their effectiveness, and the degree of resilience of heuristic algorithms against cyberattacks. This article also opens research questions and shows prospective directions.
△ Less
Submitted 21 September, 2021;
originally announced September 2021.
-
Distributed Joint Power and Rate Control for NOMA/OFDMA in 5G and Beyond
Authors:
Shiva Kazemi Taskou,
Mehdi Rasti,
Pedro H. J. Nardelli,
Arthur S. de Sena
Abstract:
In this paper, we study the problem of minimizing the uplink aggregate transmit power subject to the users' minimum data rate and peak power constraint on each sub-channel for multi-cell wireless networks. To address this problem, a distributed sub-optimal joint power and rate control algorithm called JPRC is proposed, which is applicable to both non-orthogonal frequency-division multiple access (…
▽ More
In this paper, we study the problem of minimizing the uplink aggregate transmit power subject to the users' minimum data rate and peak power constraint on each sub-channel for multi-cell wireless networks. To address this problem, a distributed sub-optimal joint power and rate control algorithm called JPRC is proposed, which is applicable to both non-orthogonal frequency-division multiple access (NOMA) and orthogonal frequency-division multiple access (OFDMA) schemes. Employing JPRC, each user updates its transmit power using only local information. Simulation results illustrate that the JPRC algorithm can reach a performance close to that obtained by the optimal solution via exhaustive search, with the NOMA scheme achieving a 59\% improvement on the aggregate transmit power over the OFDMA counterpart. It is also shown that the JPRC algorithm can outperform existing distributed power control algorithms.
△ Less
Submitted 18 September, 2021;
originally announced September 2021.
-
Incorporating Wireless Communication Parameters into the E-Model Algorithm
Authors:
Demóstenes Z. Rodríguez,
Dick Carrillo Melgarejo,
Miguel A. Ramírez,
Pedro H. J. Nardelli,
Sebastian Möller
Abstract:
Telecommunication service providers have to guarantee acceptable speech quality during a phone call to avoid a negative impact on the users' quality of experience. Currently, there are different speech quality assessment methods. ITU-T Recommendation G.107 describes the E-model algorithm, which is a computational model developed for network planning purposes focused on narrowband (NB) networks. La…
▽ More
Telecommunication service providers have to guarantee acceptable speech quality during a phone call to avoid a negative impact on the users' quality of experience. Currently, there are different speech quality assessment methods. ITU-T Recommendation G.107 describes the E-model algorithm, which is a computational model developed for network planning purposes focused on narrowband (NB) networks. Later, ITU-T Recommendations G.107.1 and G.107.2 were developed for wideband (WB) and fullband (FB) networks. These algorithms use different impairment factors, each one related to different speech communication steps. However, the NB, WB, and FB E-model algorithms do not consider wireless techniques used in these networks, such as Multiple-Input-Multiple-Output (MIMO) systems, which are used to improve the communication system robustness in the presence of different types of wireless channel degradation. In this context, the main objective of this study is to propose a general methodology to incorporate wireless network parameters into the NB and WB E-model algorithms. To accomplish this goal, MIMO and wireless channel parameters are incorporated into the E-model algorithms, specifically into the $I_{e,eff}$ and $I_{e,eff,WB}$ impairment factors. For performance validation, subjective tests were carried out, and the proposed methodology reached a Pearson correlation coefficient (PCC) and a root mean square error (RMSE) of $0.9732$ and $0.2351$, respectively. It is noteworthy that our proposed methodology does not affect the rest of the E-model input parameters, and it intends to be useful for wireless network planning in speech communication services.
△ Less
Submitted 5 March, 2021;
originally announced March 2021.
-
Energy and Cost Efficient Resource Allocation for Blockchain-Enabled NFV
Authors:
Shiva Kazemi Taskou,
Mehdi Rasti,
Pedro H. J. Nardelli
Abstract:
Network function virtualization (NFV) is a promising technology to make 5G networks flexible and agile. NFV decreases operators' OPEX and CAPEX by decoupling the physical hardware from the functions they perform. In NFV, users' service request can be viewed as a service function chain (SFC) consisting of several virtual network functions (VNFs) which are connected through virtual links. Resource a…
▽ More
Network function virtualization (NFV) is a promising technology to make 5G networks flexible and agile. NFV decreases operators' OPEX and CAPEX by decoupling the physical hardware from the functions they perform. In NFV, users' service request can be viewed as a service function chain (SFC) consisting of several virtual network functions (VNFs) which are connected through virtual links. Resource allocation in NFV is done through a centralized authority called NFV Orchestrator (NFVO). This centralized authority suffers from some drawbacks such as single point of failure and security. Blockchain (BC) technology is able to address these problems by decentralizing resource allocation. The drawbacks of NFVO in NFV architecture and the exceptional BC characteristics to address these problems motivate us to focus on NFV resource allocation to users' SFCs without the need for an NFVO based on BC technology. To this end, we assume there are two types of users: users who send SFC requests (SFC requesting users) and users who perform mining process (miner users). For SFC requesting users, we formulate NFV resource allocation (NFV-RA) problem as a multi-objective problem to minimize the energy consumption and utilized resource cost, simultaneously.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
Virtual Microgrid Management via Software-defined Energy Network for Electricity Sharing
Authors:
Pedro H. J. Nardelli,
Hafiz Majid Hussein,
Arun Narayanan,
Yongheng Yang
Abstract:
Digitalization has led to radical changes in the distribution of goods across various sectors. The tendency is to move from traditional buyer-seller markets to subscription-based on-demand "smart" matching platforms enabled by pervasive ICTs. The driving force behind this lies in the fact that assets, which were scarce in the past, are readily abundant, approaching a regime of zero marginal costs.…
▽ More
Digitalization has led to radical changes in the distribution of goods across various sectors. The tendency is to move from traditional buyer-seller markets to subscription-based on-demand "smart" matching platforms enabled by pervasive ICTs. The driving force behind this lies in the fact that assets, which were scarce in the past, are readily abundant, approaching a regime of zero marginal costs. This is also becoming a reality in electrified energy systems due to the substantial growth of distributed renewable energy sources such as solar and wind; the increasing number of small-scale storage units such as batteries and heat pumps; and the availability of flexible loads that enable demand-side management. In this context, this article proposes a system architecture based on a logical (cyber) association of spatially distributed (physical) elements as an approach to build a virtual microgrid operated as a software-defined energy network (SDEN) that is enabled by packetized energy management. The proposed cyber-physical system presumes that electrical energy is shared among its members and that the energy sharing is enabled in the cyber domain by handshakes inspired by resource allocation methods utilized in computer networks, wireless communications, and peer-to-peer Internet applications (e.g., BitTorrent). The proposal has twofold benefits: (i) reducing the complexity of current market-based solutions by removing unnecessary and costly mediations and (ii) guaranteeing energy access to all virtual microgrid members according to their individual needs. This article concludes that the proposed solution generally complies with the existing regulations but has highly disruptive potential to organize a dominantly electrified energy system in the mid- to long-term, being a technical counterpart to the recently developed social-oriented microgrid proposals.
△ Less
Submitted 2 March, 2021; v1 submitted 1 February, 2021;
originally announced February 2021.
-
Containing Future Epidemics with Trustworthy Federated Systems for Ubiquitous Warning and Response
Authors:
Dick Carrillo,
Lam Duc Nguyen,
Pedro H. J. Nardelli,
Evangelos Pournaras,
Plinio Morita,
Demóstenes Z. Rodríguez,
Merim Dzaferagic,
Harun Siljak,
Alexander Jung,
Laurent Hébert-Dufresne,
Irene Macaluso,
Mehar Ullah,
Gustavo Fraidenraich,
Petar Popovski
Abstract:
In this paper, we propose a global digital platform to avoid and combat epidemics by providing relevant real-time information to support selective lockdowns. It leverages the pervasiveness of wireless connectivity while being trustworthy and secure. The proposed system is conceptualized to be decentralized yet federated, based on ubiquitous public systems and active citizen participation. Its foun…
▽ More
In this paper, we propose a global digital platform to avoid and combat epidemics by providing relevant real-time information to support selective lockdowns. It leverages the pervasiveness of wireless connectivity while being trustworthy and secure. The proposed system is conceptualized to be decentralized yet federated, based on ubiquitous public systems and active citizen participation. Its foundations lie on the principle of informational self-determination. We argue that only in this way it can become a trustworthy and legitimate public good infrastructure for citizens by balancing the asymmetry of the different hierarchical levels within the federated organization while providing highly effective detection and guiding mitigation measures towards graceful lockdown of the society. To exemplify the proposed system, we choose the remote patient monitoring as use case. In which, the integration of distributed ledger technologies with narrowband IoT technology is evaluated considering different number of endorsed peers. An experimental proof of concept setup is used to evaluate the performance of this integration, in which the end-to-end latency is slightly increased when a new endorsed element is added. However, the system reliability, privacy, and interoperability are guaranteed. In this sense, we expect active participation of empowered citizens to supplement the more usual top-down management of epidemics.
△ Less
Submitted 25 March, 2021; v1 submitted 26 October, 2020;
originally announced October 2020.
-
From private to public governance: The case for reconfiguring energy systems as a commons
Authors:
Chris Giotitsas,
Pedro H. J. Nardelli,
Vasilis Kostakis,
Arun Narayanan
Abstract:
The discussions around the unsustainability of the dominant socio-economic structures have yet to produce solutions to address the escalating problems we face as a species. Such discussions, this paper argues, are hindered by the limited scope of the proposed solutions within a business-as-usual context as well as by the underlying technological rationale upon which these solutions are developed.…
▽ More
The discussions around the unsustainability of the dominant socio-economic structures have yet to produce solutions to address the escalating problems we face as a species. Such discussions, this paper argues, are hindered by the limited scope of the proposed solutions within a business-as-usual context as well as by the underlying technological rationale upon which these solutions are developed. In this paper, we conceptualize a radical sustainable alternative to the energy conundrum based on an emerging mode of production and a commons-based political economy. We propose a commons-oriented Energy Internet as a potential system for energy production and consumption, which may be better suited to tackle the current issues society faces. We conclude by referring to some of the challenges that the implementation of such a proposal would entail.
△ Less
Submitted 10 August, 2020;
originally announced August 2020.
-
Backscatter Cooperation in NOMA Communications Systems
Authors:
Weiyu Chen,
Haiyang Ding,
Shilian Wang,
Daniel Benevides da Costa,
Fengkui Gong,
Pedro Henrique Juliano Nardelli
Abstract:
In this paper, a backscatter cooperation (BC) scheme is proposed for non-orthogonal multiple access (NOMA) downlink transmission. The key idea is to enable one user to split and then backscatter part of its received signals to improve the reception at another user. To evaluate the performance of the proposed BC-NOMA scheme, three benchmark schemes are introduced. They are the non-cooperation (NC)-…
▽ More
In this paper, a backscatter cooperation (BC) scheme is proposed for non-orthogonal multiple access (NOMA) downlink transmission. The key idea is to enable one user to split and then backscatter part of its received signals to improve the reception at another user. To evaluate the performance of the proposed BC-NOMA scheme, three benchmark schemes are introduced. They are the non-cooperation (NC)-NOMA scheme, the conventional relaying (CR)-NOMA scheme, and the incremental relaying (IR)-NOMA scheme. For all these schemes, the analytical expressions of the minimum total power to avoid information outage are derived, based on which their respective outage performance, expected rates, and diversity-multiplexing trade-off (DMT) are investigated. Analytical results show that the proposed BC-NOMA scheme strictly outperforms the NC-NOMA scheme in terms of all the three metrics. Furthermore, theoretical analyses are validated via Monte-Carlo simulations. It is shown that unlike the CR-NOMA scheme and the IR-NOMA scheme, the proposed BC-NOMA scheme can enhance the transmission reliability without impairing the transmission rate, which makes backscattering an appealing solution to cooperative NOMA downlinks.
△ Less
Submitted 24 June, 2020;
originally announced June 2020.
-
Twenty-one key factors to choose an IoT platform: Theoretical framework and its applications
Authors:
Mehar Ullah,
Pedro H. J. Nardelli,
Annika Wolff,
Kari Smolander
Abstract:
Internet of Things (IoT) refers to the interconnection of physical objects via the Internet. It utilises complex back-end systems which need different capabilities depending on the requirements of the system. IoT has already been used in various applications, such as agriculture, smart home, health, automobiles, and smart grids. There are many IoT platforms, each of them capable of providing speci…
▽ More
Internet of Things (IoT) refers to the interconnection of physical objects via the Internet. It utilises complex back-end systems which need different capabilities depending on the requirements of the system. IoT has already been used in various applications, such as agriculture, smart home, health, automobiles, and smart grids. There are many IoT platforms, each of them capable of providing specific services for such applications. Finding the best match between application and platform is, however, a hard task as it can difficult to understand the implications of small differences between platforms. This paper builds on previous work that has identified twenty-one important factors of an IoT platform, which were verified by Delphi method. We demonstrate here how these factors can be used to discriminate between five well known IoT platforms, which are arbitrarily chosen based on their market share. These results illustrate how the proposed approach provides an objective methodology that can be used to select the most suitable IoT platform for different business applications based on their particular requirements.
△ Less
Submitted 10 April, 2020;
originally announced April 2020.
-
Neurosciences and 6G: Lessons from and Needs of Communicative Brains
Authors:
Renan C. Moioli,
Pedro H. J. Nardelli,
Michael Taynnan Barros,
Walid Saad,
Amin Hekmatmanesh,
Pedro Gória,
Arthur S. de Sena,
Merim Dzaferagic,
Harun Siljak,
Werner van Leekwijck,
Dick Carrillo,
Steven Latré
Abstract:
This paper presents the first comprehensive tutorial on a promising research field located at the frontier of two well-established domains: Neurosciences and wireless communications, motivated by the ongoing efforts to define how the sixth generation of mobile networks (6G) will be. In particular, this tutorial first provides a novel integrative approach that bridges the gap between these two, see…
▽ More
This paper presents the first comprehensive tutorial on a promising research field located at the frontier of two well-established domains: Neurosciences and wireless communications, motivated by the ongoing efforts to define how the sixth generation of mobile networks (6G) will be. In particular, this tutorial first provides a novel integrative approach that bridges the gap between these two, seemingly disparate fields. Then, we present the state-of-the-art and key challenges of these two topics. In particular, we propose a novel systematization that divides the contributions into two groups, one focused on what neurosciences will offer to 6G in terms of new applications and systems architecture (Neurosciences for Wireless), and the other focused on how wireless communication theory and 6G systems can provide new ways to study the brain (Wireless for Neurosciences). For the first group, we concretely explain how current scientific understanding of the brain would enable new application for 6G within the context of a new type of service that we dub braintype communications and that has more stringent requirements than human- and machine-type communication. In this regard, we expose the key requirements of brain-type communication services and we discuss how future wireless networks can be equipped to deal with such services. Meanwhile, for the second group, we thoroughly explore modern communication system paradigms, including Internet of Bio-nano Things and chaosbased communications, in addition to highlighting how complex systems tools can help bridging 6G and neuroscience applications. Brain-controlled vehicles are then presented as our case study. All in all, this tutorial is expected to provide a largely missing articulation between these two emerging fields while delineating concrete ways to move forward in such an interdisciplinary endeavor.
△ Less
Submitted 3 April, 2020;
originally announced April 2020.
-
An Information-Theoretic Approach to Personalized Explainable Machine Learning
Authors:
Alexander Jung,
Pedro H. J. Nardelli
Abstract:
Automated decision making is used routinely throughout our everyday life. Recommender systems decide which jobs, movies, or other user profiles might be interesting to us. Spell checkers help us to make good use of language. Fraud detection systems decide if a credit card transactions should be verified more closely. Many of these decision making systems use machine learning methods that fit compl…
▽ More
Automated decision making is used routinely throughout our everyday life. Recommender systems decide which jobs, movies, or other user profiles might be interesting to us. Spell checkers help us to make good use of language. Fraud detection systems decide if a credit card transactions should be verified more closely. Many of these decision making systems use machine learning methods that fit complex models to massive datasets. The successful deployment of machine learning (ML) methods to many (critical) application domains crucially depends on its explainability. Indeed, humans have a strong desire to get explanations that resolve the uncertainty about experienced phenomena like the predictions and decisions obtained from ML methods. Explainable ML is challenging since explanations must be tailored (personalized) to individual users with varying backgrounds. Some users might have received university-level education in ML, while other users might have no formal training in linear algebra. Linear regression with few features might be perfectly interpretable for the first group but might be considered a black-box by the latter. We propose a simple probabilistic model for the predictions and user knowledge. This model allows to study explainable ML using information theory. Explaining is here considered as the task of reducing the "surprise" incurred by a prediction. We quantify the effect of an explanation by the conditional mutual information between the explanation and prediction, given the user background.
△ Less
Submitted 15 March, 2020; v1 submitted 1 March, 2020;
originally announced March 2020.
-
Hybrid Resource Scheduling for Aggregation in Massive Machine-type Communication Networks
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Pedro H. J. Nardelli,
Matti Latva-aho
Abstract:
Data aggregation is a promising approach to enable massive machine-type communication (mMTC). Here, we first characterize the aggregation phase where a massive number of machine-type devices transmits to their respective aggregator. By using non-orthogonal multiple access (NOMA), we present a hybrid access scheme where several machine-type devices (MTDs) share the same orthogonal channel. Then, we…
▽ More
Data aggregation is a promising approach to enable massive machine-type communication (mMTC). Here, we first characterize the aggregation phase where a massive number of machine-type devices transmits to their respective aggregator. By using non-orthogonal multiple access (NOMA), we present a hybrid access scheme where several machine-type devices (MTDs) share the same orthogonal channel. Then, we assess the relaying phase where the aggregatted data is forwarded to the base station. The system performance is investigated in terms of average number of MTDs that are simultaneously served under imperfect successive interference cancellation (SIC) at the aggregator for two scheduling schemes, namely random resource scheduling (RRS) and channel-dependent resource scheduling (CRS), which is then used to assess the performance of data forwarding phase.
△ Less
Submitted 25 June, 2019;
originally announced June 2019.
-
Increasing the Throughput of an Unlicensed Wireless Network through Retransmissions
Authors:
Iran Ramezanipour,
Pedro H. J. Nardelli,
Hirley Alves,
Ari Pouttu
Abstract:
This paper analyzes the throughput of an unlicensed wireless network where messages decoded in outage may be retransmitted. We assume that some wireless devices such as sensors are the unlicensed users, which communicate in the licensed uplink channel. In this case, the licensed users that interfere with the unlicensed transmissions devices are mobile devices whose spatial distribution are assumed…
▽ More
This paper analyzes the throughput of an unlicensed wireless network where messages decoded in outage may be retransmitted. We assume that some wireless devices such as sensors are the unlicensed users, which communicate in the licensed uplink channel. In this case, the licensed users that interfere with the unlicensed transmissions devices are mobile devices whose spatial distribution are assumed to follow a Poisson point process with respect to a reference unlicensed link. We investigate how the number of allowed retransmissions and the spectrum efficiency jointly affect the throughput in [bits/s/Hz] of a reference unlicensed link for different licensed network densities, constrained by a given required error rate. The optimal throughput is derived for this case as a function of the network density. We also prove that the optimal constrained throughput can always reach the unconstrained optimal value. Our numerical results corroborate those of the analytical findings, also illustrating how the number of allowed retransmissions that leads to the optimal throughput changes with the error rate requirements.
△ Less
Submitted 6 March, 2018; v1 submitted 19 June, 2017;
originally announced June 2017.
-
Agent-based Model for Spot and Balancing Electricity Markets
Authors:
Florian Kühnlenz,
Pedro H. J. Nardelli
Abstract:
We present a simple, yet realistic, agent-based model of an electricity market. The proposed model combines the spot and balancing markets with a resolution of one minute, which enables a more accurate depiction of the physical properties of the power grid. As a test, we compare the results obtained from our simulation to data from Nord Pool.
We present a simple, yet realistic, agent-based model of an electricity market. The proposed model combines the spot and balancing markets with a resolution of one minute, which enables a more accurate depiction of the physical properties of the power grid. As a test, we compare the results obtained from our simulation to data from Nord Pool.
△ Less
Submitted 14 December, 2016;
originally announced December 2016.
-
Decision Error Probability in a Two-stage Communication Network for Smart Grids with Imperfect Data Links
Authors:
Iran Ramezanipour,
Mauricio C. Tomé,
Pedro H. J. Nardelli,
Hirley Alves
Abstract:
This paper analyzes a scenario where the distribution system operator needs to estimate whether the average power demand in a given period is above a predetermined threshold using an 1-bit memoryless scheme. Specifically, individual smart-meters periodically monitor the average power demand of their respective households to inform the system operator if it is above a predetermined level using only…
▽ More
This paper analyzes a scenario where the distribution system operator needs to estimate whether the average power demand in a given period is above a predetermined threshold using an 1-bit memoryless scheme. Specifically, individual smart-meters periodically monitor the average power demand of their respective households to inform the system operator if it is above a predetermined level using only a 1-bit signal. The communication link between the meters and the operator occurs in two hops and is modeled as binary symmetric channels. The first hop connects individual smart meters to their corresponding aggregator, while the second connects different aggregators to the system operator. A decision about the power demand also happens in two stages based on the received information bit. We consider here three decision rules: AND, OR and MAJORITY. Our analytical results indicate the circumstances (i.e. how frequent the meters experience the consumption above the defined threshold) and the design setting (i.e. decision rules) that a low error probability can be attained. We illustrate our approach with numerical results from actual daily consumption from 12 households and 3 aggregators.
△ Less
Submitted 4 August, 2016;
originally announced August 2016.
-
Demand Control Management in Micro-grids: The Impact of Different Policies and Communication Network Topologies
Authors:
Florian Kühnlenz,
Pedro H. J. Nardelli,
Hirley Alves
Abstract:
This work studies how the communication network between proactive consumers affects the power utilization and fairness in a simplified direct-current micro-grid model, composed by three coupled layers: physical (an electric circuit that represents a micro-grid), communication (a peer-to-peer network within the micro-grid) and regulatory (individual decision strategies). Our results show that, for…
▽ More
This work studies how the communication network between proactive consumers affects the power utilization and fairness in a simplified direct-current micro-grid model, composed by three coupled layers: physical (an electric circuit that represents a micro-grid), communication (a peer-to-peer network within the micro-grid) and regulatory (individual decision strategies). Our results show that, for optimal power utilization and fairness, a global knowledge about the system is needed, demonstrating the importance of a micro-grid aggregator to inform about the power consumption for different time periods.
△ Less
Submitted 12 February, 2018; v1 submitted 4 August, 2016;
originally announced August 2016.
-
Caching in Wireless Small Cell Networks: A Storage-Bandwidth Tradeoff
Authors:
Syed Tamoor-ul-Hassan,
Mehdi Bennis,
Pedro H. J. Nardelli,
Matti Latva-Aho
Abstract:
Caching contents at the network edge is an efficient mean for offloading traffic, reducing latency and improving users' quality-of-experience. In this letter, we focus on aspects of storage-bandwidth tradeoffs in which small cell base stations are distributed according to a homogeneous Poisson point process and cache contents according to a given content popularity distribution, subject to storage…
▽ More
Caching contents at the network edge is an efficient mean for offloading traffic, reducing latency and improving users' quality-of-experience. In this letter, we focus on aspects of storage-bandwidth tradeoffs in which small cell base stations are distributed according to a homogeneous Poisson point process and cache contents according to a given content popularity distribution, subject to storage constraints. We provide a closed-form expression of the cache-miss probability, defined as the probability of not satisfying users' requests over a given coverage area, as a function of signal-to-interference ratio, cache size, base stations density and content popularity. In particular, it is shown that for a given minimum cache size, the popularity based caching strategy achieves lower outage probability for a given base station density compared to uniform caching. Furthermore, we show that popularity based caching attains better performance in terms of cache-miss probability for the same amount of spectrum.
△ Less
Submitted 17 March, 2016; v1 submitted 15 March, 2016;
originally announced March 2016.
-
Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter and its Applications on Smart Grids
Authors:
Hirley Alves,
Mauricio Tomé,
Pedro H. J. Nardelli,
Carlos H. M. de Lima,
Matti Latva-aho
Abstract:
This paper addresses the establishment of secure communication links between smart-meters (Alice) and an aggregator (Bob) in the presence of an eavesdropper (Eve). The proposed scenario assumes: (i) MIMOME wiretap channel; (ii) transmit antenna selection at the Alice; (iii) no channel state information at the transmitter; (iv) fixed Wyner codes; and (v) guarantee of secure throughput by both quali…
▽ More
This paper addresses the establishment of secure communication links between smart-meters (Alice) and an aggregator (Bob) in the presence of an eavesdropper (Eve). The proposed scenario assumes: (i) MIMOME wiretap channel; (ii) transmit antenna selection at the Alice; (iii) no channel state information at the transmitter; (iv) fixed Wyner codes; and (v) guarantee of secure throughput by both quality of service and secrecy outage constraints. We propose a simple protocol to enhance security via transmit antenna selection, and then assess its performance in closed-form by means of secrecy outage and successful transmission probabilities. We assume these probabilities are our constraints and then maximize the secure throughput, establishing a security-reliability trade-off for the proposed scenario. Our numerical results illustrate the effect of this trade-off on the secure throughput as well as on the number of antennas at Alice, Bob and Eve. Interestingly, a small sacrifice in reliability allows secrecy enhancement in terms of secure bps/Hz. We apply this idea in our smart grid application to exemplify that, although Eve may acquire some samples of the average power demand of a household, it is not enough to properly reconstruct such curve.
△ Less
Submitted 20 November, 2015;
originally announced November 2015.
-
Average Error Probability in Wireless Sensor Networks with Imperfect Sensing and Communication for Different Decision Rules
Authors:
Pedro H. J. Nardelli,
Iran Ramezanipour,
Hirley Alves,
Carlos H. M. de Lima,
Matti Latva-aho
Abstract:
This paper presents a framework to evaluate the probability that a decision error event occurs in wireless sensor networks, including sensing and communication errors. We consider a scenario where sensors need to identify whether a given event has occurred based on its periodic, noisy, observations of a given signal. Such information about the signal needs to be sent to a fusion center that decide…
▽ More
This paper presents a framework to evaluate the probability that a decision error event occurs in wireless sensor networks, including sensing and communication errors. We consider a scenario where sensors need to identify whether a given event has occurred based on its periodic, noisy, observations of a given signal. Such information about the signal needs to be sent to a fusion center that decides about the actual state at that specific observation time. The communication links -- single- or multi-hop -- are modeled as binary symmetric channels, which may have different error probabilities. The decision at the fusion center is based on OR, AND, K-OUT-OF-N and MAJORITY Boolean operations on the received signals associated to individual sensor observations. We derive closed-form equations for the average decision error probability as a function of the system parameters (e.g. number of sensors and hops) and the input signal characterization. Our analyses show the best decision rule is closely related to the frequency that the observed events occur and the number of sensors. In our numerical example, we show that the AND rule outperforms MAJORITY if such an event is rare and there is only a handful number of sensors. Conversely, if there is a large number of sensors or more evenly distributed event occurrences, the MAJORITY is the best choice. We further show that, while the error probability using the MAJORITY rule asymptotically goes to 0 with increasing number of sensors, it is also more susceptible to higher channel error probabilities.
△ Less
Submitted 16 February, 2016; v1 submitted 10 August, 2015;
originally announced August 2015.
-
Effects of Relay Selection Strategies on the Spectral Efficiency of Wireless Systems with Half- and Full-duplex Nodes
Authors:
Carlos H. M. de Lima,
Hirley Alves,
Pedro. H. J. Nardelli,
Matti Latva-aho
Abstract:
This work proposes an analytical framework to study how relay selection strategies perform in half- and full-duplex deployments by combining renewal theory and stochastic geometry. Specifically, we assume that the network nodes -- operating in either half- or full-duplex mode -- are scattered according to a two-dimensional homogeneous Poisson point process to compute the relay selection cost by us…
▽ More
This work proposes an analytical framework to study how relay selection strategies perform in half- and full-duplex deployments by combining renewal theory and stochastic geometry. Specifically, we assume that the network nodes -- operating in either half- or full-duplex mode -- are scattered according to a two-dimensional homogeneous Poisson point process to compute the relay selection cost by using a semi-Markov process. Our results show: ($i$) fixed relay outperforms the reactive option in either cases, ($ii$) the performance of both reactive and fixed relay strategies depends on the self-interference attenuation in full-duplex scenarios, evincing when they outperform the half-duplex option, and ($iii$) the reactive relay selection suffers from selecting relays at hop basis, while the fixed relay selection benefits most from the full-duplex communication.
△ Less
Submitted 29 January, 2017; v1 submitted 14 July, 2015;
originally announced July 2015.
-
Contention-based Geographic Forwarding Strategies for Wireless Sensors Networks
Authors:
Carlos H. M. de Lima,
Pedro H. J. Nardelli,
Hirley Alves,
Matti Latva-aho
Abstract:
This paper studies combined relay selection and opportunistic geographic routing strategies for autonomous wireless sensor networks where transmissions occur over multiple hops. The proposed solution is built upon three constituent parts: (i) relay selection algorithm, (ii) contention resolution mechanism, and (iii) geographic forwarding strategy. Using probability generating function and spatial…
▽ More
This paper studies combined relay selection and opportunistic geographic routing strategies for autonomous wireless sensor networks where transmissions occur over multiple hops. The proposed solution is built upon three constituent parts: (i) relay selection algorithm, (ii) contention resolution mechanism, and (iii) geographic forwarding strategy. Using probability generating function and spatial point process as the theoretic background, we propose an auction-based algorithm for selecting the relay node that relies on the network topology as side-information. Our results show that geographic solutions that iteratively exploit the local knowledge of the topology to ponder the algorithm operation outperforms established random approaches.
△ Less
Submitted 14 July, 2015;
originally announced July 2015.
-
Modeling and Analysis of Content Caching in Wireless Small Cell Networks
Authors:
Syed Tamoor-ul-Hassan,
Mehdi Bennis,
Pedro H. J. Nardelli,
Matti Latva-Aho
Abstract:
Network densification with small cell base stations is a promising solution to satisfy future data traffic demands. However, increasing small cell base station density alone does not ensure better users quality-of-experience and incurs high operational expenditures. Therefore, content caching on different network elements has been proposed as a mean of offloading he backhaul by caching strategic c…
▽ More
Network densification with small cell base stations is a promising solution to satisfy future data traffic demands. However, increasing small cell base station density alone does not ensure better users quality-of-experience and incurs high operational expenditures. Therefore, content caching on different network elements has been proposed as a mean of offloading he backhaul by caching strategic contents at the network edge, thereby reducing latency. In this paper, we investigate cache-enabled small cells in which we model and characterize the outage probability, defined as the probability of not satisfying users requests over a given coverage area. We analytically derive a closed form expression of the outage probability as a function of signal-to-interference ratio, cache size, small cell base station density and threshold distance. By assuming the distribution of base stations as a Poisson point process, we derive the probability of finding a specific content within a threshold distance and the optimal small cell base station density that achieves a given target cache hit probability. Furthermore, simulation results are performed to validate the analytical model.
△ Less
Submitted 1 July, 2015;
originally announced July 2015.
-
Maximizing the Link Throughput between Smart-meters and Aggregators as Secondary Users under Power and Outage Constraints
Authors:
Pedro H. J. Nardelli,
Mauricio de Castro Tomé,
Hirley Alves,
Carlos H. M. de Lima,
Matti Latva-aho
Abstract:
This paper assesses the communication link from smart meters to aggregators as (unlicensed) secondary users that transmit their data over the (licensed) primary uplink channel. The proposed scenario assumes: (i) meters' and aggregators' positions are fixed so highly directional antennas are employed, (ii) secondary users transmit with limited power in relation to the primary, (iii) meters' transmi…
▽ More
This paper assesses the communication link from smart meters to aggregators as (unlicensed) secondary users that transmit their data over the (licensed) primary uplink channel. The proposed scenario assumes: (i) meters' and aggregators' positions are fixed so highly directional antennas are employed, (ii) secondary users transmit with limited power in relation to the primary, (iii) meters' transmissions are coordinated to avoid packet collisions, and (iv) the secondary links' robustness is guaranteed by an outage constraint. Under these assumptions, the interference caused by secondary users in both primary (base-stations) and other secondary users can be neglected. As unlicensed users, however, meter-aggregator links do experience interference from the mobile users of the primary network, whose positions and traffic activity are unknown. To cope with this uncertainty, we model the mobile users spatial distribution as a Poisson point process. We then derive a closed-form solution for the maximum achievable throughput with respect to a reference secondary link subject to transmit power and outage constraints. Our numerical results illustrate the effects of such constraints on the optimal throughput, evincing that more frequent outage events improve the system performance in the scenario under study. We also show that relatively high outage probabilities have little effect on the reconstruction of the average power demand curve that is transmitted from the smart-meter to the aggregator.
△ Less
Submitted 16 February, 2016; v1 submitted 16 June, 2015;
originally announced June 2015.
-
Throughput Maximization in Multi-Hop Wireless Networks under Secrecy Constraint
Authors:
Pedro H. J. Nardelli,
Hirley Alves,
Carlos H. M. de Lima,
Matti Latva-aho
Abstract:
This paper analyzes the throughput of industrial communication networks under a secrecy constraint. The proposed scenario is composed by sensors that measure some relevant information of the plant that is first processed by aggregator node and then sent to the control unit. The sensor measurements, their communication with the aggregetor and the information processing are all assumed perfect. To r…
▽ More
This paper analyzes the throughput of industrial communication networks under a secrecy constraint. The proposed scenario is composed by sensors that measure some relevant information of the plant that is first processed by aggregator node and then sent to the control unit. The sensor measurements, their communication with the aggregetor and the information processing are all assumed perfect. To reach the control unit, the message may travel through relay nodes, forming a multi-hop, wireless link. At every hop, eavesdropper nodes attempt to acquire the messages transmitted through the legitimate link. The communication design problem posed here is how to maximize the multi-hop throughput from the aggregator to the control unit by finding the best combination of relay positions (i.e. hop length: short or long) and coding rates (i.e. high or low spectral efficiency) so that the secrecy constraint is satisfied. Using a stochastic-geometry approach, we show that the optimal choice of coding rate depends only on the path- loss exponent and is normally high while greater number of shorter hops are preferable to smaller number of longer hops. For the scenarios of interest, we prove that the optimal throughput subject to the secrecy constraint achieves the unconstrained optimal performance if a feasible solution exists.
△ Less
Submitted 17 December, 2015; v1 submitted 16 April, 2015;
originally announced April 2015.
-
Dynamics of Complex Systems Built as Coupled Physical, Communication and Decision Layers
Authors:
Florian Kühnlenz,
Pedro H. J. Nardelli
Abstract:
This paper proposes a simple model to capture the complexity of multi-layer systems where their constituent layers affect, are affected by, each other. The physical layer is a circuit composed by a power source and resistors in parallel. Individual agents can add, remove or keep the resistors they have, and their decisions aiming at maximising the delivered power - a non-linear function dependent…
▽ More
This paper proposes a simple model to capture the complexity of multi-layer systems where their constituent layers affect, are affected by, each other. The physical layer is a circuit composed by a power source and resistors in parallel. Individual agents can add, remove or keep the resistors they have, and their decisions aiming at maximising the delivered power - a non-linear function dependent on the others' behaviour - based on their internal state, their global state perception, the information received from their neighbours in the communication network, and a randomised selfishness. We develop an agent-based simulation to analyse the effects of number of agents (size of the system), communication network topology, communication errors and the minimum power gain that triggers a behavioural change. Our results show that a wave-like behaviour at macro-level (caused by individual changes in the decision layer) can only emerge for a specific system size, the ratio between cooperators and defectors depends on minimum gain assumed - lower minimal gains lead to less cooperation and vice-versa, different communication network topologies lead to different levels of power utilisation and fairness at the physical layer, and a certain level of error in the communication layer leads to more cooperation.
△ Less
Submitted 17 April, 2015; v1 submitted 16 April, 2015;
originally announced April 2015.
-
On the Secrecy of Interference-Limited Networks under Composite Fading Channels
Authors:
Hirley Alves,
Carlos H. M. de Lima,
Pedro. H. J. Nardelli,
Richard Demo Souza,
Matti Latva-aho
Abstract:
This paper deals with the secrecy capacity of the radio channel in interference-limited regime. We assume that interferers are uniformly scattered over the network area according to a Point Poisson Process and the channel model consists of path-loss, log-normal shadowing and Nakagami-m fading. Both the probability of non-zero secrecy capacity and the secrecy outage probability are then derived in…
▽ More
This paper deals with the secrecy capacity of the radio channel in interference-limited regime. We assume that interferers are uniformly scattered over the network area according to a Point Poisson Process and the channel model consists of path-loss, log-normal shadowing and Nakagami-m fading. Both the probability of non-zero secrecy capacity and the secrecy outage probability are then derived in closed-form expressions using tools of stochastic geometry and higher-order statistics. Our numerical results show how the secrecy metrics are affected by the disposition of the desired receiver, the eavesdropper and the legitimate transmitter.
△ Less
Submitted 14 November, 2014;
originally announced November 2014.
-
On the Joint Impact of Beamwidth and Orientation Error on Throughput in Directional Wireless Poisson Networks
Authors:
Jeffrey Wildman,
Pedro H J Nardelli,
Matti Latva-aho,
Steven Weber
Abstract:
We introduce a model for capturing the effects of beam misdirection on coverage and throughput in a directional wireless network using stochastic geometry. In networks employing ideal sector antennas without sidelobes, we find that concavity of the orientation error distribution is sufficient to prove monotonicity and quasi-concavity (both with respect to antenna beamwidth) of spatial throughput a…
▽ More
We introduce a model for capturing the effects of beam misdirection on coverage and throughput in a directional wireless network using stochastic geometry. In networks employing ideal sector antennas without sidelobes, we find that concavity of the orientation error distribution is sufficient to prove monotonicity and quasi-concavity (both with respect to antenna beamwidth) of spatial throughput and transmission capacity, respectively. Additionally, we identify network conditions that produce opposite extremal choices in beamwidth (absolutely directed versus omni-directional) that maximize the two related throughput metrics. We conclude our paper with a numerical exploration of the relationship between mean orientation error, throughput-maximizing beamwidths, and maximum throughput, across radiation patterns of varied complexity.
△ Less
Submitted 12 June, 2014; v1 submitted 20 December, 2013;
originally announced December 2013.
-
Interference Networks: A Complex System View
Authors:
Pedro H. J. Nardelli,
Paulo Cardieri,
William A. Kretzschmar Jr.,
Matti Latva-aho
Abstract:
This paper presents an unusual view of interference wireless networks based on complex system thinking. To proceed with this analysis, a literature review of the different applications of complex systems is firstly presented to illustrate how such an approach can be used in a wide range of research topics, from economics to linguistics. Then the problem of quantifying the fundamental limits of wir…
▽ More
This paper presents an unusual view of interference wireless networks based on complex system thinking. To proceed with this analysis, a literature review of the different applications of complex systems is firstly presented to illustrate how such an approach can be used in a wide range of research topics, from economics to linguistics. Then the problem of quantifying the fundamental limits of wireless systems where the co-channel interference is the main limiting factor is described and hence contextualized in the perspective of complex systems. Specifically some possible internal and external pressures that the network elements may suffer are identified as, for example, queue stability, maximum packet loss rate and transmit power constraint. Besides, other important external factors such as mobility and incoming traffic are also pointed out. As a study case, a decentralized point-to-point interference network is described and several claims about the optimal design setting for different network states and under two mobility conditions, namely quasi-static and highly mobile, are stated based on results found in the literature. Using these claims as a background, the design of a robust adaptive algorithm that each network element should run is investigated.
△ Less
Submitted 9 March, 2013;
originally announced March 2013.
-
Throughput Analysis of Cognitive Wireless Networks with Poisson Distributed Nodes Based on Location Information
Authors:
Pedro H. J. Nardelli,
Carlos H. Morais de Lima,
Hirley Alves,
Paulo Cardieri,
Matti Latva-aho
Abstract:
This paper provides a statistical characterization of the individual achievable rates in bits/s/Hz and the spatial throughput of bipolar Poisson wireless networks in bits/s/Hz/m$^2$. We assume that all transmitters have a cognitive ability to know the distance to their receiver's closest interferers so they can individually tune their coding rates to avoid outage events for each spatial realizatio…
▽ More
This paper provides a statistical characterization of the individual achievable rates in bits/s/Hz and the spatial throughput of bipolar Poisson wireless networks in bits/s/Hz/m$^2$. We assume that all transmitters have a cognitive ability to know the distance to their receiver's closest interferers so they can individually tune their coding rates to avoid outage events for each spatial realization. Considering that the closest interferer approximates the aggregate interference of all transmitters treated as noise, we derive closed-form expressions for the probability density function of the achievable rates under two decoding rules: treating interference as noise, and jointly detecting the strongest interfering signals treating the others as noise. Based on these rules and the bipolar model, we approximate the expected maximum spatial throughput, showing the best performance of the latter decoding rule. These results are also compared to the reference scenario where the transmitters do not have cognitive ability, coding their messages at predetermined rates that are chosen to optimize the expected spatial throughput -- regardless of particular realizations -- which yields outages. We prove that, when the same decoding rule and network density are considered, the cognitive spatial throughput always outperforms the other option.
△ Less
Submitted 27 April, 2014; v1 submitted 9 March, 2013;
originally announced March 2013.