-
A Comprehensive Overview and Survey of O-RAN: Exploring Slicing-aware Architecture, Deployment Options, and Use Cases
Authors:
Khurshid Alam,
Mohammad Asif Habibi,
Matthias Tammen,
Dennis Krummacker,
Walid Saad,
Marco Di Renzo,
Tommaso Melodia,
Xavier Costa-Pérez,
Mérouane Debbah,
Ashutosh Dutta,
Hans D. Schotten
Abstract:
Open-radio access network (O-RAN) seeks to establish principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable interfaces. It advocates for multi-vendorism and multi-stakeholderism within a cloudified and virtualized wireless infrastructure, aimed at enhancing the deployment, operation, and maintenance of RAN architecture. This enhan…
▽ More
Open-radio access network (O-RAN) seeks to establish principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable interfaces. It advocates for multi-vendorism and multi-stakeholderism within a cloudified and virtualized wireless infrastructure, aimed at enhancing the deployment, operation, and maintenance of RAN architecture. This enhancement promises increased flexibility, performance optimization, service innovation, energy efficiency, and cost efficiency in fifth-generation (5G), sixth-generation (6G), and future networks. One of the key features of the O-RAN architecture is its support for network slicing, which entails interaction with other slicing domains within a mobile network, notably the transport network (TN) domain and the core network (CN) domain, to realize end-to-end (E2E) network slicing. The study of this feature requires exploring the stances and contributions of diverse standards development organizations (SDOs). In this context, we note that despite the ongoing industrial deployments and standardization efforts, the research and standardization communities have yet to comprehensively address network slicing in O-RAN. To address this gap, this survey paper provides a comprehensive exploration of network slicing in O-RAN through an in-depth review of specification documents from O-RAN Alliance and research papers from leading industry and academic institutions. The paper commences with an overview of the ongoing standardization efforts and open-source contributions associated with O-RAN, subsequently delving into the latest O-RAN architecture with an emphasis on its slicing aspects. Further, the paper explores deployment scenarios for network slicing within O-RAN, examining options for the deployment and orchestration of O-RAN and TN network slice subnets...
△ Less
Submitted 8 May, 2024; v1 submitted 6 May, 2024;
originally announced May 2024.
-
Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models
Authors:
Daniel Reti,
Norman Becker,
Tillmann Angeli,
Anasuya Chattopadhyay,
Daniel Schneider,
Sebastian Vollmer,
Hans D. Schotten
Abstract:
With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized…
▽ More
With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized for specific types of honeytokens, and heavily rely on suitable training datasets. To overcome these limitations, this work systematically investigates the approach of utilizing Large Language Models (LLMs) to create a variety of honeytokens. Out of the seven different honeytoken types created in this work, such as configuration files, databases, and log files, two were used to evaluate the optimal prompt. The generation of robots.txt files and honeywords was used to systematically test 210 different prompt structures, based on 16 prompt building blocks. Furthermore, all honeytokens were tested across different state-of-the-art LLMs to assess the varying performance of different models. Prompts performing optimally on one LLMs do not necessarily generalize well to another. Honeywords generated by GPT-3.5 were found to be less distinguishable from real passwords compared to previous methods of automated honeyword generation. Overall, the findings of this work demonstrate that generic LLMs are capable of creating a wide array of honeytokens using the presented prompt structures.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Robust Federated Learning for Wireless Networks: A Demonstration with Channel Estimation
Authors:
Zexin Fang,
Bin Han,
Hans D. Schotten
Abstract:
Federated learning (FL) offers a privacy-preserving collaborative approach for training models in wireless networks, with channel estimation emerging as a promising application. Despite extensive studies on FL-empowered channel estimation, the security concerns associated with FL require meticulous attention. In a scenario where small base stations (SBSs) serve as local models trained on cached da…
▽ More
Federated learning (FL) offers a privacy-preserving collaborative approach for training models in wireless networks, with channel estimation emerging as a promising application. Despite extensive studies on FL-empowered channel estimation, the security concerns associated with FL require meticulous attention. In a scenario where small base stations (SBSs) serve as local models trained on cached data, and a macro base station (MBS) functions as the global model setting, an attacker can exploit the vulnerability of FL, launching attacks with various adversarial attacks or deployment tactics. In this paper, we analyze such vulnerabilities, corresponding solutions were brought forth, and validated through simulation.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Chronicles of jockeying in queuing systems
Authors:
Anthony Kiggundu,
Bin Han,
Dennis Krummacker,
Hans D. Schotten
Abstract:
The relevance of studies in queuing theory in social systems has inspired its adoption in other mainstream technologies with its application in distributed and communication systems becoming an intense research domain. Considerable work has been done regarding the application of the impatient queuing phenomenon in distributed computing to achieve optimal resource sharing and allocation for perform…
▽ More
The relevance of studies in queuing theory in social systems has inspired its adoption in other mainstream technologies with its application in distributed and communication systems becoming an intense research domain. Considerable work has been done regarding the application of the impatient queuing phenomenon in distributed computing to achieve optimal resource sharing and allocation for performance improvement. Generally, there are two types of common impatient queuing behaviour that have been well studied, namely balking and reneging, respectively. In this survey, we are interested in the third type of impatience: jockeying, a phenomenon that draws origins from impatient customers switching from one queue to another.
This survey chronicles classical and latest efforts that labor to model and exploit the jockeying behaviour in queuing systems, with a special focus on those related to information and communication systems, especially in the context of Multi-Access Edge Computing. We comparatively summarize the reviewed literature regarding their methodologies, invoked models, and use cases.
△ Less
Submitted 16 February, 2024;
originally announced February 2024.
-
Resource Allocation in Mobile Networks: A Decision Model Of Jockeying in Queues
Authors:
Anthony Kiggundu,
Bin Han,
Dennis Krummacker,
Hans D. Schotten
Abstract:
Use-case-specific network slicing in decentralized multi-tenancy cloud environments is a promising approach to bridge the gap between the demand and supply of resources in next-generation communication networks. Our findings associate different slice profiles to queues in a multi-server setting, such that tenants continuously assess their preferences and make rational decisions to minimize the que…
▽ More
Use-case-specific network slicing in decentralized multi-tenancy cloud environments is a promising approach to bridge the gap between the demand and supply of resources in next-generation communication networks. Our findings associate different slice profiles to queues in a multi-server setting, such that tenants continuously assess their preferences and make rational decisions to minimize the queuing delay.
Deviated from classical approaches that statistically model the jockeying phenomena in queuing systems, our work pioneers to setup a behavioral model of jockeying impatient tenants. This will serve as a basis for decentralized management of multi-queue systems, where the decision to jockey is individually made by each tenant upon its up-to-date assessment of expected waiting time. Additionally, we carry out numerical simulations to empirically unravel the parametric dependencies of the tenants' jockeying behavior.
△ Less
Submitted 4 April, 2024; v1 submitted 16 February, 2024;
originally announced February 2024.
-
Hierarchical Cell-Free Massive MIMO for High Capacity with Simple Implementation
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Cell-free massive multi-input multi-output (MIMO) has recently gained much attention for its potential in shaping the landscape of sixth-generation (6G) wireless systems. This paper proposes a hierarchical network architecture tailored for cell-free massive MIMO, seamlessly integrating co-located and distributed antennas. A central base station (CBS), equipped with an antenna array, positions itse…
▽ More
Cell-free massive multi-input multi-output (MIMO) has recently gained much attention for its potential in shaping the landscape of sixth-generation (6G) wireless systems. This paper proposes a hierarchical network architecture tailored for cell-free massive MIMO, seamlessly integrating co-located and distributed antennas. A central base station (CBS), equipped with an antenna array, positions itself near the center of the coverage area, complemented by distributed access points spanning the periphery. The proposed architecture remarkably outperforms conventional cell-free networks, demonstrating superior sum throughput while maintaining a comparable worst-case per-user spectral efficiency. Meanwhile, the implementation cost associated with the fronthaul network is substantially diminished.
△ Less
Submitted 20 January, 2024;
originally announced January 2024.
-
Beam-Based Multiple Access for IRS-Aided Millimeter-Wave and Terahertz Communications
Authors:
Wei Jiang,
Hans Dieter Schotten
Abstract:
Recently, intelligent reflecting surface (IRS)-aided millimeter-wave (mmWave) and terahertz (THz) communications are considered in the wireless community. This paper aims to design a beam-based multiple-access strategy for this new paradigm. Its key idea is to make use of multiple sub-arrays over a hybrid digital-analog array to form independent beams, each of which is steered towards the desired…
▽ More
Recently, intelligent reflecting surface (IRS)-aided millimeter-wave (mmWave) and terahertz (THz) communications are considered in the wireless community. This paper aims to design a beam-based multiple-access strategy for this new paradigm. Its key idea is to make use of multiple sub-arrays over a hybrid digital-analog array to form independent beams, each of which is steered towards the desired direction to mitigate inter-user interference and suppress unwanted signal reflection. The proposed scheme combines the advantages of both orthogonal multiple access (i.e., no inter-user interference) and non-orthogonal multiple access (i.e., full time-frequency resource use). Consequently, it can substantially boost the system capacity, as verified by Monte-Carlo simulations.
△ Less
Submitted 2 January, 2024;
originally announced January 2024.
-
A Short Overview of 6G V2X Communication Standards
Authors:
Donglin Wang,
Yann Nana Nganso,
Hans D. Schotten
Abstract:
We are on the verge of a new age of linked autonomous cars with unheard-of user experiences, dramatically improved air quality and road safety, extremely varied transportation settings, and a plethora of cutting-edge apps. A substantially improved Vehicle-to-Everything (V2X) communication network that can simultaneously support massive hyper-fast, ultra-reliable, and low-latency information exchan…
▽ More
We are on the verge of a new age of linked autonomous cars with unheard-of user experiences, dramatically improved air quality and road safety, extremely varied transportation settings, and a plethora of cutting-edge apps. A substantially improved Vehicle-to-Everything (V2X) communication network that can simultaneously support massive hyper-fast, ultra-reliable, and low-latency information exchange is necessary to achieve this ambitious goal. These needs of the upcoming V2X are expected to be satisfied by the Sixth Generation (6G) communication system. In this article, we start by introducing the history of V2X communications by giving details on the current, developing, and future developments. We compare the applications of communication technologies such as Wi-Fi, LTE, 5G, and 6G. we focus on the new technologies for 6G V2X which are brain-vehicle interface, blocked-based V2X, and Machine Learning (ML). To achieve this, we provide a summary of the most recent ML developments in 6G vehicle networks. we discuss the security challenges of 6G V2X. We address the strengths, open challenges, development, and improving areas of further study in this field.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal
Authors:
Philipp Rosemann,
Sanket Partani,
Marc Miranda,
Jannik Mähn,
Michael Karrenbauer,
William Meli,
Rodrigo Hernangomez,
Maximilian Lübke,
Jacob Kochems,
Stefan Köpsell,
Anosch Aziz-Koch,
Julia Beuster,
Oliver Blume,
Norman Franchi,
Reiner Thomä,
Slawomir Stanczak,
Hans D. Schotten
Abstract:
Sensing plays a crucial role in autonomous and assisted vehicular driving, as well as in the operation of autonomous drones. The traditional segregation of communication and onboard sensing systems in mobility applications is due to be merged using Joint Communication and Sensing (JCAS) in the development of the 6G mobile radio standard. The integration of JCAS functions into the future road traff…
▽ More
Sensing plays a crucial role in autonomous and assisted vehicular driving, as well as in the operation of autonomous drones. The traditional segregation of communication and onboard sensing systems in mobility applications is due to be merged using Joint Communication and Sensing (JCAS) in the development of the 6G mobile radio standard. The integration of JCAS functions into the future road traffic landscape introduces novel challenges for the design of the 6G system architecture. Special emphasis will be placed on facilitating direct communication between road users and aerial drones. In various mobility scenarios, diverse levels of integration will be explored, ranging from leveraging communication capabilities to coordinate different radars to achieving deep integration through a unified waveform. In this paper, we have identified use cases and derive five higher-level Tech Cases (TCs). Technical and functional requirements for the 6G system architecture for a device-oriented JCAS approach will be extracted from the TCs and used to conceptualize the architectural views.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
Coverage Hole Elimination System in Industrial Environment
Authors:
Mervat Zarour,
Shreya Tayade,
Sergiy Melnyk,
Hans D. Schotten
Abstract:
The paper proposes a framework to identify and avoid the coverage hole in an indoor industry environment. We assume an edge cloud co-located controller that followers the Automated Guided Vehicle (AGV) movement on a factory floor over a wireless channel. The coverage holes are caused due to blockage, path-loss, and fading effects. An AGV in the coverage hole may lose connectivity to the edge-cloud…
▽ More
The paper proposes a framework to identify and avoid the coverage hole in an indoor industry environment. We assume an edge cloud co-located controller that followers the Automated Guided Vehicle (AGV) movement on a factory floor over a wireless channel. The coverage holes are caused due to blockage, path-loss, and fading effects. An AGV in the coverage hole may lose connectivity to the edge-cloud and become unstable. To avoid connectivity loss, we proposed a framework that identifies the position of coverage hole using a Support- Vector Machine (SVM) classifier model and constructs a binary coverage hole map incorporating the AGV trajectory re-planning to avoid the identified coverage hole. The AGV's re-planned trajectory is optimized and selected to avoid coverage hole the shortest coverage-hole-free trajectory. We further investigated the look-ahead time's impact on the AGV's re-planned trajectory performance. The results reveal that an AGV's re-planned trajectory can be shorter and further optimized if the coverage hole position is known ahead of time
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Adaptive 3D Geometry-based Stochastic Channel Prediction for 3D DL Selection
Authors:
Mervat Zarour,
Qiuheng Zhou,
Sergiy Melnyk,
Hans D. Schotten
Abstract:
This paper addresses the challenges of mobile user requirements in shadowing and multi-fading environments, focusing on the Downlink (DL) radio node selection based on Uplink (UL) channel estimation. One of the key issues tackled in this research is the prediction performance in scenarios where estimated channels are integrated. An adaptive deep learning approach is proposed to improve performance…
▽ More
This paper addresses the challenges of mobile user requirements in shadowing and multi-fading environments, focusing on the Downlink (DL) radio node selection based on Uplink (UL) channel estimation. One of the key issues tackled in this research is the prediction performance in scenarios where estimated channels are integrated. An adaptive deep learning approach is proposed to improve performance, offering a compelling alternative to traditional interpolation techniques for air-to-ground link selection on demand. Moreover, our study considers a 3D channel model, which provides a more realistic and accurate representation than 2D models, particularly in the context of 3D network node distributions. This consideration becomes crucial in addressing the complex multipath fading effects within geometric stochastic 3D 3GPP channel models in urban environments. Furthermore, our research emphasises the need for adaptive prediction mechanisms that carefully balance the trade-off between DL link forecasted frequency response accuracy and the complexity requirements associated with estimation and prediction. This paper contributes to advancing 3D radio resource management by addressing these challenges, enabling more efficient and reliable communication for energy-constrained flying network nodes in dynamic environments.
△ Less
Submitted 9 January, 2024; v1 submitted 7 November, 2023;
originally announced November 2023.
-
Terahertz-Enpowered Communications and Sensing in 6G Systems: Opportunities and Challenges
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
The current focus of academia and the telecommunications industry has been shifted to the development of the six-generation (6G) cellular technology, also formally referred to as IMT-2030. Unprecedented applications that 6G aims to accommodate demand extreme communications performance and, in addition, disruptive capabilities such as network sensing. Recently, there has been a surge of interest in…
▽ More
The current focus of academia and the telecommunications industry has been shifted to the development of the six-generation (6G) cellular technology, also formally referred to as IMT-2030. Unprecedented applications that 6G aims to accommodate demand extreme communications performance and, in addition, disruptive capabilities such as network sensing. Recently, there has been a surge of interest in terahertz (THz) frequencies as it offers not only massive spectral resources for communication but also distinct advantages in sensing, positioning, and imaging. The aim of this paper is to provide a brief outlook on opportunities opened by this under-exploited band and challenges that must be addressed to materialize the potential of THz-based communications and sensing in 6G systems.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
6G Underlayer Network Concepts for Ultra Reliable and Low Latency Communication in Manufacturing
Authors:
Daniel Lindenschmitt,
Jan Mertes,
Christian Schellenberger,
Marius Schmitz,
Bin Han,
Jan C. Aurich,
Hans D. Schotten
Abstract:
Underlayer networks in the context of 6G for manufacturing are crucial. They address the evolving needs of highly interconnected and autonomous systems in industry. The digitalization of manufacturing processes, driven by the Internet of Things and increased data availability, enables more efficient and demand-driven production. However, wireless connectivity, which offers flexibility and easy int…
▽ More
Underlayer networks in the context of 6G for manufacturing are crucial. They address the evolving needs of highly interconnected and autonomous systems in industry. The digitalization of manufacturing processes, driven by the Internet of Things and increased data availability, enables more efficient and demand-driven production. However, wireless connectivity, which offers flexibility and easy integration of components, comes with challenges such as signal interference or high latency. A new management system is needed to coordinate and route traffic of multiple networks in a specific coverage area. This paper proposes underlayer networks designed for manufacturing, providing low latency, reliability, and security. These networks enable wireless connectivity and integration of wireless technologies into the manufacturing environment, enhancing flexibility and efficiency. The paper also discusses network slicing, spectrum sharing, and the limitations of current wireless networks in manufacturing. It introduces a network concept for underlayer networks and evaluates its application in closed-loop communication for machine tools. The study concludes with future research prospects in this area.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
Opportunistic Reflection in Reconfigurable Intelligent Surface-Assisted Wireless Networks
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
This paper focuses on multiple-access protocol design in a wireless network assisted by multiple reconfigurable intelligent surfaces (RISs). By extending the existing approaches in single-user or single-RIS cases, we present two benchmark schemes for this multi-user multi-RIS scenario. Inspecting their shortcomings, a simple but efficient method coined opportunistic multi-user reflection (OMUR) is…
▽ More
This paper focuses on multiple-access protocol design in a wireless network assisted by multiple reconfigurable intelligent surfaces (RISs). By extending the existing approaches in single-user or single-RIS cases, we present two benchmark schemes for this multi-user multi-RIS scenario. Inspecting their shortcomings, a simple but efficient method coined opportunistic multi-user reflection (OMUR) is proposed. The key idea is to opportunistically select the best user as the anchor for optimizing the RISs, and non-orthogonally transmitting all users' signals simultaneously. A simplified version of OMUR exploiting random phase shifts is also proposed to avoid the complexity of RIS channel estimation.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
A Simple Multiple-Access Design for Reconfigurable Intelligent Surface-Aided Systems
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
This paper focuses on the design of transmission methods and reflection optimization for a wireless system assisted by a single or multiple reconfigurable intelligent surfaces (RISs). The existing techniques are either too complex to implement in practical systems or too inefficient to achieve high performance. To overcome the shortcomings of the existing schemes, we propose a simple but efficient…
▽ More
This paper focuses on the design of transmission methods and reflection optimization for a wireless system assisted by a single or multiple reconfigurable intelligent surfaces (RISs). The existing techniques are either too complex to implement in practical systems or too inefficient to achieve high performance. To overcome the shortcomings of the existing schemes, we propose a simple but efficient approach based on \textit{opportunistic reflection} and \textit{non-orthogonal transmission}. The key idea is opportunistically selecting the best user that can reap the maximal gain from the optimally reflected signals via RIS. That is to say, only the channel state information of the best user is used for RIS reflection optimization, which can in turn lower complexity substantially. In addition, the second user is selected to superpose its signal on that of the primary user, where the benefits of non-orthogonal transmission, i.e., high system capacity and improved user fairness, are obtained. Additionally, a simplified variant exploiting random phase shifts is proposed to avoid the high overhead of RIS channel estimation.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
A Reliable and Resilient Framework for Multi-UAV Mutual Localization
Authors:
Zexin Fang,
Bin Han,
Hans D. Schotten
Abstract:
This paper presents a robust and secure framework for achieving accurate and reliable mutual localization in multiple unmanned aerial vehicle (UAV) systems. Challenges of accurate localization and security threats are addressed and corresponding solutions are brought forth and accessed in our paper with numerical simulations. The proposed solution incorporates two key components: the Mobility Adap…
▽ More
This paper presents a robust and secure framework for achieving accurate and reliable mutual localization in multiple unmanned aerial vehicle (UAV) systems. Challenges of accurate localization and security threats are addressed and corresponding solutions are brought forth and accessed in our paper with numerical simulations. The proposed solution incorporates two key components: the Mobility Adaptive Gradient Descent (MAGD) and Time-evolving Anomaly Detectio (TAD). The MAGD adapts the gradient descent algorithm to handle the configuration changes in the mutual localization system, ensuring accurate localization in dynamic scenarios. The TAD cooperates with reputation propagation (RP) scheme to detect and mitigate potential attacks by identifying UAVs with malicious data, enhancing the security and resilience of the mutual localization
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Considerations on the EMF Exposure Relating to the Next Generation Non-Terrestrial Networks
Authors:
Amina Fellan,
Ainur Daurembekova,
Hans D. Schotten
Abstract:
The emerging fifth generation (5G) and the upcoming sixth generation (6G) communication technologies introduce the use of space- and airborne networks in their architectures under the scope of non-terrestrial networks (NTNs). With this integration of satellite and aerial platform networks, better coverage, network flexibility and easier deployment can be achieved. Correspondingly, satellite broadb…
▽ More
The emerging fifth generation (5G) and the upcoming sixth generation (6G) communication technologies introduce the use of space- and airborne networks in their architectures under the scope of non-terrestrial networks (NTNs). With this integration of satellite and aerial platform networks, better coverage, network flexibility and easier deployment can be achieved. Correspondingly, satellite broadband internet providers have launched an increasing number of small satellites operating in low earth orbit (LEO). These recent developments imply an increased electromagnetic field (EMF) exposure to humans and the environment. In this work, we provide a short overview of the state of consumer-grade satellite networks including broadband satellites and future NTN services. We also consider the regulatory state governing their operation within the context of EMF exposure. Finally, we highlight the aspects that are relevant to the assessment of EMF exposure in relation to NTNs.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Investigating the Impact of Variables on Handover Performance in 5G Ultra-Dense Networks
Authors:
Donglin Wang,
Anjie Qiu,
Qiuheng Zhou,
Sanket Partani,
Hans D. Schotten
Abstract:
The advent of 5G New Radio (NR) technology has revolutionized the landscape of wireless communication, offering various enhancements such as elevated system capacity, improved spectrum efficiency, and higher data transmission rates. To achieve these benefits, 5G has implemented the Ultra-Dense Network (UDN) architecture, characterized by the deployment of numerous small general Node B (gNB) units.…
▽ More
The advent of 5G New Radio (NR) technology has revolutionized the landscape of wireless communication, offering various enhancements such as elevated system capacity, improved spectrum efficiency, and higher data transmission rates. To achieve these benefits, 5G has implemented the Ultra-Dense Network (UDN) architecture, characterized by the deployment of numerous small general Node B (gNB) units. While this approach boosts system capacity and frequency reuse, it also raises concerns such as increased signal interference, longer handover times, and higher handover failure rates. To address these challenges, the critical factor of Time to Trigger (TTT) in handover management must be accurately determined. Furthermore, the density of gNBs has a significant impact on handover performance. This study provides a comprehensive analysis of 5G handover management. Through the development and utilization of a downlink system-level simulator, the effects of various TTT values and gNB densities on 5G handover were evaluated, taking into consideration the movement of Traffic Users (TUs) with varying velocities. Simulation results showed that the handover performance can be optimized by adjusting the TTT under different gNB densities, providing valuable insights into the proper selection of TTT, UDN, and TU velocity to enhance 5G handover performance.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.
-
JCAS-Enabled Sensing as a Service in 6th-Generation Mobile Communication Networks
Authors:
Christof A. O. Rauber,
Lukas Brechtel,
Hans D. Schotten
Abstract:
The introduction of new types of frequency spectrum in 6G technology facilitates the convergence of conventional mobile communications and radar functions. Thus, the mobile network itself becomes a versatile sensor system. This enables mobile network operators to offer a sensing service in addition to conventional data and telephony services. The potential benefits are expected to accrue to variou…
▽ More
The introduction of new types of frequency spectrum in 6G technology facilitates the convergence of conventional mobile communications and radar functions. Thus, the mobile network itself becomes a versatile sensor system. This enables mobile network operators to offer a sensing service in addition to conventional data and telephony services. The potential benefits are expected to accrue to various stakeholders, including individuals, the environment, and society in general. The paper discusses technological development, possible integration, and use cases, as well as future development areas.
△ Less
Submitted 21 July, 2023; v1 submitted 17 July, 2023;
originally announced July 2023.
-
A Secure and Robust Approach for Distance-Based Mutual Positioning of Unmanned Aerial Vehicles
Authors:
Bin Han,
Hans D. Schotten
Abstract:
Unmanned aerial vehicle (UAV) is becoming increasingly important in modern civilian and military applications. However, its novel use cases is bottlenecked by conventional satellite and terrestrial localization technologies, and calling for complementary solutions. Multi-UAV mutual positioning can be a potential answer, but its accuracy and security are challenged by inaccurate and/or malicious me…
▽ More
Unmanned aerial vehicle (UAV) is becoming increasingly important in modern civilian and military applications. However, its novel use cases is bottlenecked by conventional satellite and terrestrial localization technologies, and calling for complementary solutions. Multi-UAV mutual positioning can be a potential answer, but its accuracy and security are challenged by inaccurate and/or malicious measurements. This paper proposes a novel, robust, and secure approach to address these issues.
△ Less
Submitted 9 January, 2024; v1 submitted 19 May, 2023;
originally announced May 2023.
-
Full-Spectrum Wireless Communications for 6G and Beyond: From Microwave, Millimeter-Wave, Terahertz to Lightwave
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
As of today, 5G is rolling out across the world, but academia and industry have shifted their attention to the sixth generation (6G) cellular technology for a full-digitalized, intelligent society in 2030 and beyond. 6G demands far more bandwidth to support extreme performance, exacerbating the problem of spectrum shortage in mobile communications. In this context, this paper proposes a novel conc…
▽ More
As of today, 5G is rolling out across the world, but academia and industry have shifted their attention to the sixth generation (6G) cellular technology for a full-digitalized, intelligent society in 2030 and beyond. 6G demands far more bandwidth to support extreme performance, exacerbating the problem of spectrum shortage in mobile communications. In this context, this paper proposes a novel concept coined Full-Spectrum Wireless Communications (FSWC). It makes use of all communication-feasible spectral resources over the whole electromagnetic (EW) spectrum, from microwave, millimeter wave, terahertz (THz), infrared light, visible light, to ultraviolet light. FSWC not only provides sufficient bandwidth but also enables new paradigms taking advantage of peculiarities on different EW bands. This paper will define FSWC, justify its necessity for 6G, and then discuss the opportunities and challenges of exploiting THz and optical bands.
△ Less
Submitted 11 May, 2023;
originally announced May 2023.
-
Leveraging 5G private networks, UAVs and robots to detect and combat broad-leaved dock (Rumex obtusifolius) in feed production
Authors:
Christian Schellenberger,
Christopher Hobelsberger,
Bastian Kolb-Grunder,
Florian Herrmann,
Hans D. Schotten
Abstract:
In this paper an autonomous system to detect and combat Rumex obtusifolius leveraging autonomous unmanned aerial vehicles (UAV), small autonomous sprayer robots and 5G SA connectivity is presented. Rumex obtusifolius is a plant found on grassland that drains nutrients from surrounding plants and has lower nutritive value than the surrounding grass. High concentrations of it have to be combated in…
▽ More
In this paper an autonomous system to detect and combat Rumex obtusifolius leveraging autonomous unmanned aerial vehicles (UAV), small autonomous sprayer robots and 5G SA connectivity is presented. Rumex obtusifolius is a plant found on grassland that drains nutrients from surrounding plants and has lower nutritive value than the surrounding grass. High concentrations of it have to be combated in order to use the grass as feed for livestock. One or more UAV are controlled through 5G to survey the current working area and send back high-definition photos of the ground to an edge cloud server. There an AI algorithm using neural networks detects the Rumex obtusifolius and calculates its position using the UAVs position data. When plants are detected an optimal path is calculated and sent via 5G to the sprayer robot to get to them in minimal time. It will then move to the position of the broad-leafed dock and use an on-board camera and the edge cloud to verify the position of the plant and precisely spray crop protection only where the target plant is. The spraying robot and UAV are already operational, the training of the detection algorithm is still ongoing. The described system is being tested with a fixed private 5G SA network and a nomadic 5G SA network as public cellular networks are not performant enough in regards to low latency and upload bandwidth.
△ Less
Submitted 30 April, 2023;
originally announced May 2023.
-
Non-Orthogonal Multiplexing in the FBL Regime Enhances Physical Layer Security with Deception
Authors:
Bin Han,
Yao Zhu,
Anke Schmeink,
Hans D. Schotten
Abstract:
We propose a new security framework for physical layer security (PLS) in the finite blocklength (FBL) regime that incorporates deception technology, allowing for active countermeasures against potential eavesdroppers. Using a symmetric block cipher and power-domain non-orthogonal multiplexing (NOM), our approach is able to achieve high secured reliability while effectively deceiving the eavesdropp…
▽ More
We propose a new security framework for physical layer security (PLS) in the finite blocklength (FBL) regime that incorporates deception technology, allowing for active countermeasures against potential eavesdroppers. Using a symmetric block cipher and power-domain non-orthogonal multiplexing (NOM), our approach is able to achieve high secured reliability while effectively deceiving the eavesdropper, and can benefit from increased transmission power. This work represents a promising direction for future research in PLS with deception technology.
△ Less
Submitted 20 July, 2023; v1 submitted 13 April, 2023;
originally announced April 2023.
-
Cell-Edge Performance Booster in 6G: Cell-Free Massive MIMO vs. Reconfigurable Intelligent Surface
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
User experience in mobile communications is vulnerable to worse quality at the cell edge, which cannot be compensated by enjoying excellent service at the cell center, according to the principle of risk aversion in behavioral economics. Constrained by weak signal strength and substantial inter-cell interference, the cell edge is always a major bottleneck of any mobile network. Due to their possibi…
▽ More
User experience in mobile communications is vulnerable to worse quality at the cell edge, which cannot be compensated by enjoying excellent service at the cell center, according to the principle of risk aversion in behavioral economics. Constrained by weak signal strength and substantial inter-cell interference, the cell edge is always a major bottleneck of any mobile network. Due to their possibility for empowering the next-generation mobile system, reconfigurable intelligent surface (RIS) and cell-free massive MIMO (CFmMIMO) have recently attracted a lot of focus from academia and industry. In addition to a variety of technological advantages, both are highly potential to boost cell-edge performance. To the authors' best knowledge, a performance comparison of RIS and CFmMIMO, especially on the cell edge, is still missing in the literature. To fill this gap, this paper establishes a fair scenario and demonstrates extensive numerical results to clarify their behaviors at the cell edge.
△ Less
Submitted 7 April, 2023;
originally announced April 2023.
-
Effect of Variable Physical Numerologies on Link-Level Performance of 5G NR V2X
Authors:
Donglin Wang,
Oneza Saraci,
Raja R. Sattiraju,
Qiuheng Zhou,
Hans D. Schotten
Abstract:
With technology and societal development, the 5th generation wireless communication (5G) contributes significantly to different societies like industries or academies. Vehicle-to-Everything (V2X) communication technology has been one of the leading services for 5G which has been applied in vehicles. It is used to exchange their status information with other traffic and traffic participants to incr…
▽ More
With technology and societal development, the 5th generation wireless communication (5G) contributes significantly to different societies like industries or academies. Vehicle-to-Everything (V2X) communication technology has been one of the leading services for 5G which has been applied in vehicles. It is used to exchange their status information with other traffic and traffic participants to increase traffic safety and efficiency. Cellular-V2X (C-V2X) is one of the emerging technologies to enable V2X communications. The first Long-Term Evolution (LTE) based C-V2X was released on the 3rd Generation Partnership Project (3GPP) standard. 3GPP is working towards the development of New Radio (NR) systems that it is called 5G NR V2X. One single numerology in LTE cannot satisfy most performance requirements because of the variety of deployment options and scenarios. For this reason, in order to meet the diverse requirements, the 5G NR Physical Layer (PHY) is designed to provide a highly flexible framework. Scalable Orthogonal Frequency-Division Multiplexing (OFDM) numerologies make flexibility possible. The term numerology refers to the PHY waveform parametrization and allows different Subcarrier Spacings (SCSs), symbols, and slot duration. This paper implements the Link-Level (LL) simulations of LTE C-V2X communication and 5G NR V2X communication where simulation results are used to compare similarities and differences between LTE and 5G NR. We detect the effect of variable PHY Numerologies of 5G NR on the LL performance of V2X. The simulation results show that the performance of 5G NR improved by using variable numerologies.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
User Scheduling and Passive Beamforming for FDMA/OFDMA in Intelligent Reflection Surface
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Most prior works on intelligent reflecting surface (IRS) merely consider point-to-point communications, including a single user, for ease of analysis. Nevertheless, a practical wireless system needs to accommodate multiple users simultaneously. Due to the lack of frequency-selective reflection, namely the set of phase shifts cannot be different across frequency subchannels, the integration of IRS…
▽ More
Most prior works on intelligent reflecting surface (IRS) merely consider point-to-point communications, including a single user, for ease of analysis. Nevertheless, a practical wireless system needs to accommodate multiple users simultaneously. Due to the lack of frequency-selective reflection, namely the set of phase shifts cannot be different across frequency subchannels, the integration of IRS imposes a fundamental challenge to frequency-multiplexing approaches such as frequency-division multiple access (FDMA) and the widely adopted technique called orthogonal FDMA (OFDMA). It motivates us to study (O)FDMA-based multi-user IRS communications to clarify which user scheduling and passive beamforming are favorable under this non-frequency-selective reflection environment. Theoretical analysis and numerical evaluation reveal that (O)FDMA does not need user scheduling when there are a few users. If the number of users becomes large, neither user scheduling nor IRS reflection optimization is necessary. These findings help substantially simplify the design of (O)FDMA-based IRS communications.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
User Selection for Simple Passive Beamforming in Multi-RIS-Aided Multi-User Communications
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
This paper focuses on multi-user downlink signal transmission in a wireless system aided by multiple reconfigurable intelligent surfaces (RISs). In such a multi-RIS, multi-user, multi-antenna scenario, determining a set of RIS phase shifts to maximize the sum throughput becomes intractable. Hence, we propose a novel scheme that can substantially simplify the optimization of passive beamforming. By…
▽ More
This paper focuses on multi-user downlink signal transmission in a wireless system aided by multiple reconfigurable intelligent surfaces (RISs). In such a multi-RIS, multi-user, multi-antenna scenario, determining a set of RIS phase shifts to maximize the sum throughput becomes intractable. Hence, we propose a novel scheme that can substantially simplify the optimization of passive beamforming. By opportunistically selecting a user with the best channel condition as the only active transmitter in the system, it degrades to single-user passive beamforming, where two methods, i.e., joint optimization based on the semidefinite relaxation approach and alternating optimization, are applicable. The superiority of the proposed scheme is demonstrated through Monte-Carlo simulations.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Capacity Analysis and Rate Maximization Design in RIS-Aided Uplink Multi-User MIMO
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Reconfigurable intelligent surface (RIS) has recently drawn intensive attention due to its potential of simultaneously realizing high spectral and energy efficiency in a sustainable way. This paper focuses on the design of efficient transmission methods to maximize the uplink sum throughput in a RIS-aided multi-user multi-input multi-output (MU-MIMO) system. To provide an insightful basis, the cha…
▽ More
Reconfigurable intelligent surface (RIS) has recently drawn intensive attention due to its potential of simultaneously realizing high spectral and energy efficiency in a sustainable way. This paper focuses on the design of efficient transmission methods to maximize the uplink sum throughput in a RIS-aided multi-user multi-input multi-output (MU-MIMO) system. To provide an insightful basis, the channel capacity of RIS-aided MU-MIMO is theoretically analyzed. Then, the conventional transmission schemes based on orthogonal multiple access are presented as the baseline. From the information-theoretic perspective, we propose two novel schemes, i.e., \textit{joint transmission} based on the semidefinite relaxation of quadratic optimization problems and \textit{opportunistic transmission} relying on the best user selection. The superiority of the proposed schemes over the conventional ones in terms of achievable rates is justified through simulation results.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Intelligent reflecting surface (IRS) has recently received much attention from the research community due to its potential to achieve high spectral and power efficiency cost-effectively. In addition to traditional cellular networks, the use of IRS in vehicular networks is also considered. Prior works on IRS-aided vehicle-to-everything communications focus on deploying reflection surfaces on the fa…
▽ More
Intelligent reflecting surface (IRS) has recently received much attention from the research community due to its potential to achieve high spectral and power efficiency cost-effectively. In addition to traditional cellular networks, the use of IRS in vehicular networks is also considered. Prior works on IRS-aided vehicle-to-everything communications focus on deploying reflection surfaces on the facades of buildings along the road for sidelink performance enhancement. This paper goes beyond the state of the art by presenting a novel paradigm coined Intelligent Reflecting Vehicle Surface (IRVS). It embeds a massive number of reflection elements on vehicles' surfaces to aid moving vehicular networks in military and emergency communications. We propose an alternative optimization method to optimize jointly active beamforming at the base station and passive reflection across multiple randomly-distributed vehicle surfaces. Performance evaluation in terms of sum spectral efficiency under continuous, discrete, and random phase shifts is conducted. Numerical results reveal that IRVS can substantially improve the capacity of a moving vehicular network.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Multi-User Reconfigurable Intelligent Surface-Aided Communications Under Discrete Phase Shifts
Authors:
Wei Jiang,
Hans Dieter Schotten
Abstract:
This paper focuses on studying orthogonal and non-orthogonal multiple access in intelligent reflecting surface (IRS)-aided systems. Unlike most prior works assuming continuous phase shifts, we employ the practical setup where only a finite number of discrete phase shifts are available. To maximize the sum rate, active beamforming and discrete reflection need to be jointly optimized. We therefore p…
▽ More
This paper focuses on studying orthogonal and non-orthogonal multiple access in intelligent reflecting surface (IRS)-aided systems. Unlike most prior works assuming continuous phase shifts, we employ the practical setup where only a finite number of discrete phase shifts are available. To maximize the sum rate, active beamforming and discrete reflection need to be jointly optimized. We therefore propose an alternative optimization method to get the optimal continuous phase shifts iteratively, and then quantize each phase shift to its nearest discrete value. The sum-rate maximization of different schemes is theoretically analyzed and numerically evaluated with different numbers of phase-control bits.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Overview of the Evaluation Methods for the Maximum EMF Exposure in 5G Networks
Authors:
Amina Fellan,
Hans D. Schotten
Abstract:
Instantaneous measurements of the electromagnetic field (EMF) strength do not reflect the maximum exposure levels possible in a given location. An extrapolation factor needs to be applied to the measurements before comparing them against the local exposure guidelines or recommendations for compliance evaluation. For the fifth generation (5G) networks, a standardized approach for extrapolating EMF…
▽ More
Instantaneous measurements of the electromagnetic field (EMF) strength do not reflect the maximum exposure levels possible in a given location. An extrapolation factor needs to be applied to the measurements before comparing them against the local exposure guidelines or recommendations for compliance evaluation. For the fifth generation (5G) networks, a standardized approach for extrapolating EMF values is yet to be defined. This work provides an overview of the state-of-the-art research that focuses on estimating the maximum EMF exposure caused by radiation from 5G base stations. It also considers current efforts by national and international organizations to establish standardized methods for extrapolating the EMF measurements which is necessary in investigating conformance with the EMF guidelines and regulations.
△ Less
Submitted 7 March, 2023;
originally announced March 2023.
-
Machine Learning for QoS Prediction in Vehicular Communication: Challenges and Solution Approaches
Authors:
Alexandros Palaios,
Christian L. Vielhaus,
Daniel F. Külzer,
Cara Watermann,
Rodrigo Hernangomez,
Sanket Partani,
Philipp Geuer,
Anton Krause,
Raja Sattiraju,
Martin Kasparick,
Gerhard Fettweis,
Frank H. P. Fitzek,
Hans D. Schotten,
Slawomir Stanczak
Abstract:
As cellular networks evolve towards the 6th generation, machine learning is seen as a key enabling technology to improve the capabilities of the network. Machine learning provides a methodology for predictive systems, which can make networks become proactive. This proactive behavior of the network can be leveraged to sustain, for example, a specific quality of service requirement. With predictive…
▽ More
As cellular networks evolve towards the 6th generation, machine learning is seen as a key enabling technology to improve the capabilities of the network. Machine learning provides a methodology for predictive systems, which can make networks become proactive. This proactive behavior of the network can be leveraged to sustain, for example, a specific quality of service requirement. With predictive quality of service, a wide variety of new use cases, both safety- and entertainment-related, are emerging, especially in the automotive sector. Therefore, in this work, we consider maximum throughput prediction enhancing, for example, streaming or high-definition mapping applications. We discuss the entire machine learning workflow highlighting less regarded aspects such as the detailed sampling procedures, the in-depth analysis of the dataset characteristics, the effects of splits in the provided results, and the data availability. Reliable machine learning models need to face a lot of challenges during their lifecycle. We highlight how confidence can be built on machine learning technologies by better understanding the underlying characteristics of the collected data. We discuss feature engineering and the effects of different splits for the training processes, showcasing that random splits might overestimate performance by more than twofold. Moreover, we investigate diverse sets of input features, where network information proved to be most effective, cutting the error by half. Part of our contribution is the validation of multiple machine learning models within diverse scenarios. We also use explainable AI to show that machine learning can learn underlying principles of wireless networks without being explicitly programmed. Our data is collected from a deployed network that was under full control of the measurement team and covered different vehicular scenarios and radio environments.
△ Less
Submitted 22 August, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Mitigating Unnecessary Handovers in Ultra-Dense Networks through Machine Learning-based Mobility Prediction
Authors:
Donglin Wang,
Anjie Qiu,
Sanket Partani,
Qiuheng Zhou,
Hans D. Schotten
Abstract:
In 5G wireless communication, Intelligent Transportation Systems (ITS) and automobile applications, such as autonomous driving, are widely examined. These applications have strict requirements and often require high Quality of Service (QoS). In an urban setting, Ultra-Dense Networks (UDNs) have the potential to not only provide optimal QoS but also increase system capacity and frequency reuse. How…
▽ More
In 5G wireless communication, Intelligent Transportation Systems (ITS) and automobile applications, such as autonomous driving, are widely examined. These applications have strict requirements and often require high Quality of Service (QoS). In an urban setting, Ultra-Dense Networks (UDNs) have the potential to not only provide optimal QoS but also increase system capacity and frequency reuse. However, the current architecture of 5G UDN of dense Small Cell Nodes (SCNs) deployment prompts increased delay, handover times, and handover failures. In this paper, we propose a Machine Learning (ML) supported Mobility Prediction (MP) strategy to predict future Vehicle User Equipment (VUE) mobility and handover locations. The primary aim of the proposed methodology is to minimize Unnecessary Handover (UHO) while ensuring VUEs take full advantage of the deployed UDN. We evaluate and validate our approach on a downlink system-level simulator. We predict mobility using Support Vector Machine (SVM), Decision Tree Classifier (DTC), and Random Forest Classifier (RFC). The simulation results show an average reduction of 30% in handover times by utilizing ML-based MP, with RFC showing the most reduction up to 70% in some cases.
△ Less
Submitted 23 February, 2023;
originally announced February 2023.
-
SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation
Authors:
Daniel Reti,
Karina Elzer,
Hans Dieter Schotten
Abstract:
Every attack begins with gathering information about the target. The entry point for network breaches are often vulnerabilities in internet facing websites, which often rely on an off-the-shelf Content Management System (CMS). Bot networks and human attackers alike rely on automated scanners to gather information about the CMS software installed and potential vulnerabilities. To increase the secur…
▽ More
Every attack begins with gathering information about the target. The entry point for network breaches are often vulnerabilities in internet facing websites, which often rely on an off-the-shelf Content Management System (CMS). Bot networks and human attackers alike rely on automated scanners to gather information about the CMS software installed and potential vulnerabilities. To increase the security of websites using a CMS, it is desirable to make the use of CMS scanners less reliable. The aim of this work is to extend the current knowledge about cyber deception in regard to CMS. To demonstrate this, a WordPress Plugin called 'SCANTRAP' was created, which uses simulation and dissimulation in regards to plugins, themes, versions, and users. We found that the resulting plugin is capable of obfuscating real information and to a certain extent inject false information to the output of one of the most popular WordPress scanners, WPScan, without limiting the legitimate functionality of the WordPress installation.
△ Less
Submitted 25 January, 2023;
originally announced January 2023.
-
The Effect of Variable Factors on the Handover Performance for Ultra Dense Network
Authors:
Donglin Wang,
Anjie Qiu,
Qiuheng Zhou,
Sanket Partani,
Hans D. Schotten
Abstract:
With wireless communication technology development, the 5G New Radio (NR) has been proposed and developed for a decade. This advanced mobile communication technology has more advancements, such as higher system capacity, higher spectrum efficiency, higher data rates, and so on. In 5G, Ultra- Dense Network (UDN) is deployed for increasing the system capacity and frequency reuse to meet high applica…
▽ More
With wireless communication technology development, the 5G New Radio (NR) has been proposed and developed for a decade. This advanced mobile communication technology has more advancements, such as higher system capacity, higher spectrum efficiency, higher data rates, and so on. In 5G, Ultra- Dense Network (UDN) is deployed for increasing the system capacity and frequency reuse to meet high application requirements. The architecture of 5G UDN is to realize the dense and flexible deployment of smaller general Node B (gNB). However, the increased capacity of applying UDN in 5G is anticipated at the cost of increased signal interference, increased handover times, and increased handover failures. The Time to Trigger (TTT) is one of the most important factors in handover frequency which is deserved to be detected. Moreover, the density of the 5G gNBs influences the handover times and performance as well. In this work, we provide a compendium of 5G handover management. A downlink system-level simulator for 5G handover is built and utilized to evaluate the effect of different TTT values and densities of gNBs on the 5G handover. In addition, different velocities of Traffic Users (TUs) have been applied to the simulation system. From the simulation results, the handover performance has been analyzed and optimized by applying adjustable TTT under different densities of gNBs which will help people have a better understanding of the selection and effect of proper TTT, UDN, and different velocities of TUs on 5G handover performance.
△ Less
Submitted 19 January, 2023;
originally announced January 2023.
-
Berlin V2X: A Machine Learning Dataset from Multiple Vehicles and Radio Access Technologies
Authors:
Rodrigo Hernangómez,
Philipp Geuer,
Alexandros Palaios,
Daniel Schäufele,
Cara Watermann,
Khawla Taleb-Bouhemadi,
Mohammad Parvini,
Anton Krause,
Sanket Partani,
Christian Vielhaus,
Martin Kasparick,
Daniel F. Külzer,
Friedrich Burmeister,
Frank H. P. Fitzek,
Hans D. Schotten,
Gerhard Fettweis,
Sławomir Stańczak
Abstract:
The evolution of wireless communications into 6G and beyond is expected to rely on new machine learning (ML)-based capabilities. These can enable proactive decisions and actions from wireless-network components to sustain quality-of-service (QoS) and user experience. Moreover, new use cases in the area of vehicular and industrial communications will emerge. Specifically in the area of vehicle comm…
▽ More
The evolution of wireless communications into 6G and beyond is expected to rely on new machine learning (ML)-based capabilities. These can enable proactive decisions and actions from wireless-network components to sustain quality-of-service (QoS) and user experience. Moreover, new use cases in the area of vehicular and industrial communications will emerge. Specifically in the area of vehicle communication, vehicle-to-everything (V2X) schemes will benefit strongly from such advances. With this in mind, we have conducted a detailed measurement campaign that paves the way to a plethora of diverse ML-based studies. The resulting datasets offer GPS-located wireless measurements across diverse urban environments for both cellular (with two different operators) and sidelink radio access technologies, thus enabling a variety of different studies towards V2X. The datasets are labeled and sampled with a high time resolution. Furthermore, we make the data publicly available with all the necessary information to support the onboarding of new researchers. We provide an initial analysis of the data showing some of the challenges that ML needs to overcome and the features that ML can leverage, as well as some hints at potential research studies.
△ Less
Submitted 14 April, 2023; v1 submitted 20 December, 2022;
originally announced December 2022.
-
Implementation and Evaluation of the RBIS Protocol in 5G
Authors:
Michael Gundall,
Julius Raphael Stegmann,
Christopher Huber,
Rüdiger Halfmann,
Hans Dieter Schotten
Abstract:
5G and 6G wireless communications allow for novel and disruptive applications. While 5G was strongly focused on improvements on QoS and QoS guarantees that are necessary for industrial deployments, 6G will have a disruptive impact on possible use cases. Here, nearly each use case requires time synchronization of the involved systems. While PTP in its variations, e.g. IEEE 1588 v2.1 or IEEE 802.1AS…
▽ More
5G and 6G wireless communications allow for novel and disruptive applications. While 5G was strongly focused on improvements on QoS and QoS guarantees that are necessary for industrial deployments, 6G will have a disruptive impact on possible use cases. Here, nearly each use case requires time synchronization of the involved systems. While PTP in its variations, e.g. IEEE 1588 v2.1 or IEEE 802.1AS, has established as standard for wireline systems, time synchronization of wireless or hybrid systems is still subject to research. Thus, the so-called RBIS protocol, which was originally developed and investigated for Wi-Fi, is mapped to 5G. This is possible, because both systems are infrastructure based and a suitable broadcast that fits to the requirements of RBIS protocol can be found in the control layer of 5G NR. Even if the 1 microsecond requirement that is required by some applications is not yet cracked, the accuracy of 1.3 microseconds and precision of <4.3 microseconds for non-invasive extension of existing 5G deployments is highly promising.
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
Reliable O-RAN-inspired Latency-constrained Wireless Transport Networks in 6G
Authors:
Bin Han,
Muxia Sun,
Yao Zhu,
Vincenzo Sciancalepore,
Mohammad Asif Habibi,
Yulin Hu,
Anke Schmeink,
Yan-Fu Li,
Hans D. Schotten
Abstract:
The extreme requirements for high reliability and low latency in the upcoming Sixth Generation (6G) wireless networks are challenging the design of multi-hop relay networks. Inspired by the advent of the virtualization concept in the wireless networks design and openness paradigm as fostered by the O-RAN Alliance, we target a revolutionary resource scheduling scheme to improve the overall transmis…
▽ More
The extreme requirements for high reliability and low latency in the upcoming Sixth Generation (6G) wireless networks are challenging the design of multi-hop relay networks. Inspired by the advent of the virtualization concept in the wireless networks design and openness paradigm as fostered by the O-RAN Alliance, we target a revolutionary resource scheduling scheme to improve the overall transmission efficiency.
In this paper, we investigate the problem of multi-hop decode-and-forward (DF) relaying in the finite blocklength (FBL) regime, and propose a Dynamic Multi-Hop HARQ (DMH-HARQ) scheme, which maximizes the end-to-end (E2E) communication reliability in such systems. We also propose an integer dynamic programming (DP) algorithm to efficiently solve the optimal DMH-HARQ schedule. Constrained within a certain time frame to accomplish multi-hop relaying, our proposed
△ Less
Submitted 30 June, 2023; v1 submitted 7 December, 2022;
originally announced December 2022.
-
Trust-Awareness to Secure Swarm Intelligence from Data Injection Attack
Authors:
Bin Han,
Dennis Krummacker,
Qiuheng Zhou,
Hans D. Schotten
Abstract:
Enabled by the emerging industrial agent (IA) technology, swarm intelligence (SI) is envisaged to play an important role in future industrial Internet of Things (IIoT) that is shaped by Sixth Generation (6G) mobile communications and digital twin (DT). However, its fragility against data injection attack may halt it from practical deployment. In this paper we propose an efficient trust approach to…
▽ More
Enabled by the emerging industrial agent (IA) technology, swarm intelligence (SI) is envisaged to play an important role in future industrial Internet of Things (IIoT) that is shaped by Sixth Generation (6G) mobile communications and digital twin (DT). However, its fragility against data injection attack may halt it from practical deployment. In this paper we propose an efficient trust approach to address this security concern for SI.
△ Less
Submitted 10 May, 2023; v1 submitted 27 October, 2022;
originally announced November 2022.
-
Artificial ASMR: A Cyber-Psychological Approach
Authors:
Zexin Fang,
Bin Han,
C. Clark Cao,
Hans. D. Schotten
Abstract:
The popularity of Autonomous Sensory Meridian Response (ASMR) has skyrockted over the past decade, but scientific studies on what exactly triggered ASMR effect remain few and immature, one most commonly acknowledged trigger is that ASMR clips typically provide rich semantic information. With our attention caught by the common acoustic patterns in ASMR audios, we investigate the correlation between…
▽ More
The popularity of Autonomous Sensory Meridian Response (ASMR) has skyrockted over the past decade, but scientific studies on what exactly triggered ASMR effect remain few and immature, one most commonly acknowledged trigger is that ASMR clips typically provide rich semantic information. With our attention caught by the common acoustic patterns in ASMR audios, we investigate the correlation between the cyclic features of audio signals and their effectiveness in triggering ASMR effects. A cyber-psychological approach that combines signal processing, artificial intelligence, and experimental psychology is taken, with which we are able to quantize ASMR-related acoustic features, and therewith synthesize ASMR clips with random cyclic patterns but not delivering identifiably scenarios to the audience, which were proven to be effective in triggering ASMR effects.
△ Less
Submitted 5 July, 2023; v1 submitted 25 October, 2022;
originally announced October 2022.
-
Digital Twins for Industry 4.0 in the 6G Era
Authors:
Bin Han,
Mohammad Asif Habibi,
Bjoern Richerzhagen,
Kim Schindhelm,
Florian Zeiger,
Fabrizio Lamberti,
Filippo Gabriele Pratticò,
Karthik Upadhya,
Charalampos Korovesis,
Ioannis-Prodromos Belikaidis,
Panagiotis Demestichas,
Siyu Yuan,
Hans D. Schotten
Abstract:
Having the Fifth Generation (5G) mobile communication system recently rolled out in many countries, the wireless community is now setting its eyes on the next era of Sixth Generation (6G). Inheriting from 5G its focus on industrial use cases, 6G is envisaged to become the infrastructural backbone of future intelligent industry. Especially, a combination of 6G and the emerging technologies of Digit…
▽ More
Having the Fifth Generation (5G) mobile communication system recently rolled out in many countries, the wireless community is now setting its eyes on the next era of Sixth Generation (6G). Inheriting from 5G its focus on industrial use cases, 6G is envisaged to become the infrastructural backbone of future intelligent industry. Especially, a combination of 6G and the emerging technologies of Digital Twins (DT) will give impetus to the next evolution of Industry 4.0 (I4.0) systems. This article provides a survey in the research area of 6G-empowered industrial DT system. With a novel vision of 6G industrial DT ecosystem, this survey discusses the ambitions and potential applications of industrial DT in the 6G era, identifying the emerging challenges as well as the key enabling technologies. The introduced ecosystem is supposed to bridge the gaps between humans, machines, and the data infrastructure, and therewith enable numerous novel application scenarios.
△ Less
Submitted 15 October, 2023; v1 submitted 5 October, 2022;
originally announced October 2022.
-
Deep Learning-Aided Delay-Tolerant Zero-Forcing Precoding in Cell-Free Massive MIMO
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
In the context of cell-free massive multi-input multi-output (CFmMIMO), zero-forcing precoding (ZFP) is superior in terms of spectral efficiency. However, it suffers from channel aging owing to fronthaul and processing delays. In this paper, we propose a robust scheme coined delay-tolerant zero-forcing precoding (DT-ZFP), which exploits deep learning-aided channel prediction to alleviate the effec…
▽ More
In the context of cell-free massive multi-input multi-output (CFmMIMO), zero-forcing precoding (ZFP) is superior in terms of spectral efficiency. However, it suffers from channel aging owing to fronthaul and processing delays. In this paper, we propose a robust scheme coined delay-tolerant zero-forcing precoding (DT-ZFP), which exploits deep learning-aided channel prediction to alleviate the effect of outdated channel state information (CSI). A predictor consisting of a bank of user-specific predictive modules is specifically designed for such a multi-user scenario. Leveraging the degree of freedom brought by the prediction horizon, the delivery of CSI and precoded data through a fronthaul network and the transmission of user data and pilots over an air interface can be parallelized. Therefore, DT-ZFP not only effectively combats channel aging but also avoids the inefficient Stop-and-Wait mechanism of the canonical ZFP in CFmMIMO.
△ Less
Submitted 11 October, 2022;
originally announced October 2022.
-
On Explainability in AI-Solutions: A Cross-Domain Survey
Authors:
Simon Daniel Duque Anton,
Daniel Schneider,
Hans Dieter Schotten
Abstract:
Artificial Intelligence (AI) increasingly shows its potential to outperform predicate logic algorithms and human control alike. In automatically deriving a system model, AI algorithms learn relations in data that are not detectable for humans. This great strength, however, also makes use of AI methods dubious. The more complex a model, the more difficult it is for a human to understand the reasoni…
▽ More
Artificial Intelligence (AI) increasingly shows its potential to outperform predicate logic algorithms and human control alike. In automatically deriving a system model, AI algorithms learn relations in data that are not detectable for humans. This great strength, however, also makes use of AI methods dubious. The more complex a model, the more difficult it is for a human to understand the reasoning for the decisions. As currently, fully automated AI algorithms are sparse, every algorithm has to provide a reasoning for human operators. For data engineers, metrics such as accuracy and sensitivity are sufficient. However, if models are interacting with non-experts, explanations have to be understandable. This work provides an extensive survey of literature on this topic, which, to a large part, consists of other surveys. The findings are mapped to ways of explaining decisions and reasons for explaining decisions. It shows that the heterogeneity of reasons and methods of and for explainability lead to individual explanatory frameworks.
△ Less
Submitted 11 October, 2022;
originally announced October 2022.
-
Performance Impact of Channel Aging and Phase Noise on Intelligent Reflecting Surface
Authors:
Wei Jiang,
Hans Dieter Schotten
Abstract:
This letter aims to clarify the impact of channel aging and phase noise on the performance of intelligent reflecting surface-aided wireless systems. We first model mathematically the outdated channel state information (CSI) due to Doppler shifts and phase noise stemming from hardware impairment. Then, a closed-form expression of achievable spectral efficiency under noisy and aged CSI is theoretica…
▽ More
This letter aims to clarify the impact of channel aging and phase noise on the performance of intelligent reflecting surface-aided wireless systems. We first model mathematically the outdated channel state information (CSI) due to Doppler shifts and phase noise stemming from hardware impairment. Then, a closed-form expression of achievable spectral efficiency under noisy and aged CSI is theoretically derived. Some typical simulation results to numerically demonstrate the performance impact are illustrated.
△ Less
Submitted 21 September, 2022;
originally announced September 2022.
-
Modeling the System-Level Reliability towards a Convergence of Communication, Computing and Control
Authors:
Bin Han,
Hans D. Schotten
Abstract:
Enabled and driven by modern advances in wireless telecommunication and artificial intelligence, the convergence of communication, computing, and control is becoming inevitable in future industrial applications. Analytical and optimizing frameworks, however, are not yet readily developed for this new technical trend. In this work we discuss the necessity and typical scenarios of this convergence,…
▽ More
Enabled and driven by modern advances in wireless telecommunication and artificial intelligence, the convergence of communication, computing, and control is becoming inevitable in future industrial applications. Analytical and optimizing frameworks, however, are not yet readily developed for this new technical trend. In this work we discuss the necessity and typical scenarios of this convergence, and propose a new approach to model the system-level reliability across all involved domainss
△ Less
Submitted 23 June, 2022;
originally announced June 2022.
-
Initial Access for Millimeter-Wave and Terahertz Communications with Hybrid Beamforming
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
In order to achieve terabits-per-second (Tbps) data rates in the sixth-generation (6G) mobile system, wireless communications are required to exploit the abundant spectrum in the millimeter-wave (mmWave) and terahertz (THz) bands. However, high-frequency transmission heavily relies on high beamforming gain to compensate for severe propagation loss. A beam-based system faces a barrier in the proces…
▽ More
In order to achieve terabits-per-second (Tbps) data rates in the sixth-generation (6G) mobile system, wireless communications are required to exploit the abundant spectrum in the millimeter-wave (mmWave) and terahertz (THz) bands. However, high-frequency transmission heavily relies on high beamforming gain to compensate for severe propagation loss. A beam-based system faces a barrier in the process of initial access, where a base station must broadcast synchronization signals and system information to all users within its coverage. Hence, this paper proposes a novel omnidirectional broadcasting scheme for mmWave and THz systems with hybrid beamforming. It provides an instantaneously equal gain over all directions by forming complementary beams over sub-arrays. Numerical results verify that it can achieve omnidirectional coverage with a performance that remarkably outperforms the previous scheme.
△ Less
Submitted 2 May, 2022;
originally announced May 2022.
-
Initial Beamforming for Millimeter-Wave and Terahertz Communications in 6G Mobile Systems
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
To meet the demand of supreme data rates in terabits-per-second, the next-generation mobile system needs to exploit the abundant spectrum in the millimeter-wave and terahertz bands. However, high-frequency transmission heavily relies on large-scale antenna arrays to reap high beamforming gain, used to compensate for severe propagation loss. It raises a problem of omni-directional beamforming durin…
▽ More
To meet the demand of supreme data rates in terabits-per-second, the next-generation mobile system needs to exploit the abundant spectrum in the millimeter-wave and terahertz bands. However, high-frequency transmission heavily relies on large-scale antenna arrays to reap high beamforming gain, used to compensate for severe propagation loss. It raises a problem of omni-directional beamforming during the phase of initial access, where a base station is required to broadcast synchronization signals and system information to all users within its coverage. This paper proposes a novel initial beamforming scheme, which provides instantaneous gain equally in all directions by forming a pair of complementary beams. Numerical results verify that it can achieve omni-directional coverage with the optimal performance that remarkably outperforms the previous scheme called random beamforming. It is applicable for any form of large-scale arrays, and all three architecture, i.e., digital, analog, and hybrid beamforming.
△ Less
Submitted 2 May, 2022;
originally announced May 2022.
-
Opportunistic AP Selection in Cell-Free Massive MIMO-OFDM Systems
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Exploiting the degree of freedom in the frequency domain and the near-far effect among different access points (APs), this paper proposes an opportunistic transmission scheme in cell-free massive MIMO-OFDM systems. The key idea is to orthogonally assign subcarriers among different users, so that there is only one user on each subcarrier. Then, a user is only served by its near APs through opportun…
▽ More
Exploiting the degree of freedom in the frequency domain and the near-far effect among different access points (APs), this paper proposes an opportunistic transmission scheme in cell-free massive MIMO-OFDM systems. The key idea is to orthogonally assign subcarriers among different users, so that there is only one user on each subcarrier. Then, a user is only served by its near APs through opportunistic selection, while the far APs are deactivated to avoid wasting power over their channels with severe propagation losses. Moreover, the number of active APs per subcarrier becomes small due to the opportunistic selection, making the use of downlink pilots and coherent detection feasible. As corroborated by numerical results, the proposed scheme can bring a significant performance boost in terms of both power efficiency and spectral efficiency.
△ Less
Submitted 30 April, 2022;
originally announced May 2022.
-
Dual-Beam Intelligent Reflecting Surface for Millimeter and THz Communications
Authors:
Wei Jiang,
Hans Dieter Schotten
Abstract:
Intelligent reflecting surface (IRS) is a cost-efficient technique to improve power efficiency and spectral efficiency. However, IRS-aided multi-antenna transmission needs to jointly optimize the passive and active beamforming, imposing a high computational burden and high latency due to its iterative optimization process. Making use of hybrid analog-digital beamforming in high-frequency transmiss…
▽ More
Intelligent reflecting surface (IRS) is a cost-efficient technique to improve power efficiency and spectral efficiency. However, IRS-aided multi-antenna transmission needs to jointly optimize the passive and active beamforming, imposing a high computational burden and high latency due to its iterative optimization process. Making use of hybrid analog-digital beamforming in high-frequency transmission systems, a novel technique, coined dual-beam IRS, is proposed in this paper. The key idea is to form a pair of beams towards the IRS and user, respectively. Then, the optimization of passive and active beamforming can be decoupled, resulting in a simplified system design. Simulation results corroborate that it achieves a good balance between the cell-edge and cell-center performance. Compared with the performance bound, the gap is moderate, but it remarkably outperforms other sub-optimal schemes.
△ Less
Submitted 30 April, 2022;
originally announced May 2022.
-
Flexible and dependable manufacturing beyond xURLLC: A novel framework for communication-control co-design
Authors:
Bin Han,
Mu-Xia Sun,
Lai-Kan Muk,
Yan-Fu Li,
Hans D. Schotten
Abstract:
Future Industrial 4.0 applications in the 6G era is calling for high dependability that goes far beyond the current ultra-reliable low latency communication (URLLC), and therewith proposed critical challenges to the communication technology. Instead of struggling against the physical and technical limits towards an extreme URLLC (xURLLC), communication-control co-design (CoCoCo) appears a more pro…
▽ More
Future Industrial 4.0 applications in the 6G era is calling for high dependability that goes far beyond the current ultra-reliable low latency communication (URLLC), and therewith proposed critical challenges to the communication technology. Instead of struggling against the physical and technical limits towards an extreme URLLC (xURLLC), communication-control co-design (CoCoCo) appears a more promising solution. This work proposes a novel framework of CoCoCo, which is not only enhancing the dependability of 6G industrial applications such as remote control, but also exhibiting rich potential in revolutionizing the future industry per openness and flexibility of manufacturing systems.
△ Less
Submitted 5 December, 2022; v1 submitted 18 March, 2022;
originally announced April 2022.