-
Characterization of the Combined Effective Radiation Pattern of UAV-Mounted Antennas and Ground Station
Authors:
Mushfiqur Rahman,
Ismail Guvenc,
Jason A. Abrahamson,
Amitabh Mishra,
Arupjyoti Bhuyan
Abstract:
An Unmanned Aerial Vehicle (UAV)-based communication typically involves a link between a UAV-mounted antenna and a ground station. The radiation pattern of both antennas is influenced by nearby reflecting surfaces and scatterers, such as the UAV body and the ground. Experimentally characterizing the effective radiation patterns of both antennas is challenging, as the received power depends on thei…
▽ More
An Unmanned Aerial Vehicle (UAV)-based communication typically involves a link between a UAV-mounted antenna and a ground station. The radiation pattern of both antennas is influenced by nearby reflecting surfaces and scatterers, such as the UAV body and the ground. Experimentally characterizing the effective radiation patterns of both antennas is challenging, as the received power depends on their interaction. In this study, we learn a combined radiation pattern from experimental UAV flight data, assuming the UAV travels with a fixed orientation (constant yaw angle and zero pitch/roll). We validate the characterized radiation pattern by cross-referencing it with experiments involving different UAV trajectories, all conducted under identical ground station and UAV orientation conditions. Experimental results show that the learned combined radiation pattern reduces received power estimation error by up to 10 dB, compared to traditional anechoic chamber radiation patterns that neglect the effects of the UAV body and surrounding objects.
△ Less
Submitted 2 June, 2025;
originally announced June 2025.
-
Evaluation of strain and charge-transfer doping in wet-polymeric transferred monolayer MoS2: implications for field effect transistors
Authors:
C. Abinash Bhuyan,
Kishore K. Madapu,
K. Prabhakar,
Jagnaseni Pradhan,
Arup Dasgupta,
S R Polaki,
Sandip Dhara
Abstract:
Two-dimensional materials offer exceptional tunability of electronic and optical properties via strain and doping engineering. However, the unintentional introduction of polymeric residues during wet chemical 2D film transfer processes such as wet chemical etching and surface energy assisted methods remains critical, yet unexplored. This study systematically investigates the impact of such residue…
▽ More
Two-dimensional materials offer exceptional tunability of electronic and optical properties via strain and doping engineering. However, the unintentional introduction of polymeric residues during wet chemical 2D film transfer processes such as wet chemical etching and surface energy assisted methods remains critical, yet unexplored. This study systematically investigates the impact of such residues on the optical and electrical properties of monolayer MoS\textsubscript{2} using Raman and photoluminescence spectroscopy. We reveal that polymer residues in transferred films from wet chemical etching induce distinct strain and doping behaviors: PMMA-existed regions exhibit biaxial tensile strain and \textit{p}-type doping, while PMMA-free regions show compressive strain. In contrast, the surface energy assisted transfer method introduces compressive strain and \textit{n}-type doping in the transferred film due to residue interactions. Field-effect transistor measurements corroborate these findings, showing polymer residue-influenced modulation of charge transport. Notably, the surface energy assisted technique minimizes transfer-induced defects, highlighting its superiority for fabricating high-performance 2D optoelectronic devices. These results underscore the critical role of transfer methodologies in tailoring optoelectronic properties and provide practical insights for optimizing 2D material integration in advanced technologies.
△ Less
Submitted 4 April, 2025;
originally announced April 2025.
-
Towards Federated Multi-Armed Bandit Learning for Content Dissemination using Swarm of UAVs
Authors:
Amit Kumar Bhuyan,
Hrishikesh Dutta,
Subir Biswas
Abstract:
This paper introduces an Unmanned Aerial Vehicle - enabled content management architecture that is suitable for critical content access in communities of users that are communication-isolated during diverse types of disaster scenarios. The proposed architecture leverages a hybrid network of stationary anchor UAVs and mobile Micro-UAVs for ubiquitous content dissemination. The anchor UAVs are equip…
▽ More
This paper introduces an Unmanned Aerial Vehicle - enabled content management architecture that is suitable for critical content access in communities of users that are communication-isolated during diverse types of disaster scenarios. The proposed architecture leverages a hybrid network of stationary anchor UAVs and mobile Micro-UAVs for ubiquitous content dissemination. The anchor UAVs are equipped with both vertical and lateral communication links, and they serve local users, while the mobile micro-ferrying UAVs extend coverage across communities with increased mobility. The focus is on developing a content dissemination system that dynamically learns optimal caching policies to maximize content availability. The core innovation is an adaptive content dissemination framework based on distributed Federated Multi-Armed Bandit learning. The goal is to optimize UAV content caching decisions based on geo-temporal content popularity and user demand variations. A Selective Caching Algorithm is also introduced to reduce redundant content replication by incorporating inter-UAV information sharing. This method strategically preserves the uniqueness in user preferences while amalgamating the intelligence across a distributed learning system. This approach improves the learning algorithm's ability to adapt to diverse user preferences. Functional verification and performance evaluation confirm the proposed architecture's utility across different network sizes, UAV swarms, and content popularity patterns.
△ Less
Submitted 18 April, 2025; v1 submitted 15 January, 2025;
originally announced January 2025.
-
Harnessing Quantum Entanglement: Comprehensive Strategies for Enhanced Communication and Beyond in Quantum Networks
Authors:
Amit Kumar Bhuyan,
Hrishikesh Dutta
Abstract:
Quantum communication represents a revolutionary advancement over classical information theory, which leverages unique quantum mechanics properties like entanglement to achieve unprecedented capabilities in secure and efficient information transmission. Unlike bits in classical communication, quantum communication utilizes qubits in superposition states, allowing for novel information storage and…
▽ More
Quantum communication represents a revolutionary advancement over classical information theory, which leverages unique quantum mechanics properties like entanglement to achieve unprecedented capabilities in secure and efficient information transmission. Unlike bits in classical communication, quantum communication utilizes qubits in superposition states, allowing for novel information storage and processing. Entanglement, a key quantum phenomenon, enables advanced protocols with enhanced security and processing power. This paper provides a comprehensive overview of quantum communication, emphasizing the role of entanglement in theoretical foundations, practical protocols, experimental progress, and security implications. It contrasts quantum communications potential applications with classical networks, identifying areas where entanglement offers significant advantages. The paper explores the fundamentals of quantum mechanics in communication, the physical realization of quantum information, and the formation of secure quantum networks through entanglement-based strategies like Quantum Key Distribution (QKD) and teleportation. It addresses the challenges of long-distance quantum communication, the role of quantum repeaters in scaling networks, and the conceptualization of interconnected quantum networks. Additionally, it discusses strides towards the Quantum Internet, Quantum Error-Correcting codes, and quantum cryptographys role in ensuring secure communication. By highlighting the role of entanglement, this paper aims to inspire further research and innovation in secure and efficient information exchange within quantum networks.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Quantum Communication: From Fundamentals to Recent Trends, Challenges and Open Problems
Authors:
Hrishikesh Dutta,
Amit Kumar Bhuyan
Abstract:
With the recent advancements and developments in quantum technologies, the emerging field of quantum communication and networking has gained the attention of the researchers. Owing to the unique properties of quantum mechanics, viz., quantum superposition and entanglement, this new area of quantum communication has shown potential to replace modernday communication technologies. The enhanced secur…
▽ More
With the recent advancements and developments in quantum technologies, the emerging field of quantum communication and networking has gained the attention of the researchers. Owing to the unique properties of quantum mechanics, viz., quantum superposition and entanglement, this new area of quantum communication has shown potential to replace modernday communication technologies. The enhanced security and high information sharing ability using principles of quantum mechanics has encouraged networking engineers and physicists to develop this technology for next generation wireless systems. However, a conceptual bridge between the fundamentals of quantum mechanics, photonics and the deployability of a quantum communication infrastructure is not well founded in the current literature. This paper aims to fill this gap by merging the theoretical concepts from quantum physics to the engineering and computing perspectives of quantum technology. This paper builds the fundamental concepts required for understanding quantum communication, reviews the key concepts and demonstrates how these concepts can be leveraged for accomplishing successful communication. The paper delves into implementation advancements for executing quantum communication protocols, explaining how hardware implementation enables the achievement of all basic quantum computing operations. Finally, the paper provides a comprehensive and critical review of the state-of-the-art advancements in the field of quantum communication and quantum internet; and points out the recent trends, challenges and open problems for the real-world realization of next generation networking systems.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Top-k Multi-Armed Bandit Learning for Content Dissemination in Swarms of Micro-UAVs
Authors:
Amit Kumar Bhuyan,
Hrishikesh Dutta,
Subir Biswas
Abstract:
This paper presents a Micro-Unmanned Aerial Vehicle (UAV)-enhanced content management system for disaster scenarios where communication infrastructure is generally compromised. Utilizing a hybrid network of stationary and mobile Micro-UAVs, this system aims to provide crucial content access to isolated communities. In the developed architecture, stationary anchor UAVs, equipped with vertical and l…
▽ More
This paper presents a Micro-Unmanned Aerial Vehicle (UAV)-enhanced content management system for disaster scenarios where communication infrastructure is generally compromised. Utilizing a hybrid network of stationary and mobile Micro-UAVs, this system aims to provide crucial content access to isolated communities. In the developed architecture, stationary anchor UAVs, equipped with vertical and lateral links, serve users in individual disaster-affected communities. and mobile micro-ferrying UAVs, with enhanced mobility, extend coverage across multiple such communities. The primary goal is to devise a content dissemination system that dynamically learns caching policies to maximize content accessibility to users left without communication infrastructure. The core contribution is an adaptive content dissemination framework that employs a decentralized Top-k Multi-Armed Bandit learning approach for efficient UAV caching decisions. This approach accounts for geo-temporal variations in content popularity and diverse user demands. Additionally, a Selective Caching Algorithm is proposed to minimize redundant content copies by leveraging inter-UAV information sharing. Through functional verification and performance evaluation, the proposed framework demonstrates improved system performance and adaptability across varying network sizes, micro-UAV swarms, and content popularity distributions.
△ Less
Submitted 15 January, 2025; v1 submitted 16 April, 2024;
originally announced April 2024.
-
Unsupervised Speaker Diarization in Distributed IoT Networks Using Federated Learning
Authors:
Amit Kumar Bhuyan,
Hrishikesh Dutta,
Subir Biswas
Abstract:
This paper presents a computationally efficient and distributed speaker diarization framework for networked IoT-style audio devices. The work proposes a Federated Learning model which can identify the participants in a conversation without the requirement of a large audio database for training. An unsupervised online update mechanism is proposed for the Federated Learning model which depends on co…
▽ More
This paper presents a computationally efficient and distributed speaker diarization framework for networked IoT-style audio devices. The work proposes a Federated Learning model which can identify the participants in a conversation without the requirement of a large audio database for training. An unsupervised online update mechanism is proposed for the Federated Learning model which depends on cosine similarity of speaker embeddings. Moreover, the proposed diarization system solves the problem of speaker change detection via. unsupervised segmentation techniques using Hotelling's t-squared Statistic and Bayesian Information Criterion. In this new approach, speaker change detection is biased around detected quasi-silences, which reduces the severity of the trade-off between the missed detection and false detection rates. Additionally, the computational overhead due to frame-by-frame identification of speakers is reduced via. unsupervised clustering of speech segments. The results demonstrate the effectiveness of the proposed training method in the presence of non-IID speech data. It also shows a considerable improvement in the reduction of false and missed detection at the segmentation stage, while reducing the computational overhead. Improved accuracy and reduced computational cost makes the mechanism suitable for real-time speaker diarization across a distributed IoT audio network.
△ Less
Submitted 29 November, 2024; v1 submitted 16 April, 2024;
originally announced April 2024.
-
Fabrication of high electron mobility and high photoluminescence quantum yield nanoscrolled monolayer MoS2
Authors:
C. Abinash Bhuyan,
Kishore K. Madapu,
K. Prabakar,
K. Ganesan,
A. Pandian,
Sandip Dhara
Abstract:
We fabricated the 1D nanoscrolled monolayer MoS2 (1L-MoS2) with superior characteristics from 1L-MoS2 film in a facile route, using a suitable organic solvent with optimum surface tension, evaporation rate and dielectric constant, which facilitates the controlled scroll formation. These nanoscrolls behave as multilayers in morphology and monolayer electronically. The nanoscrolls exhibited a direct…
▽ More
We fabricated the 1D nanoscrolled monolayer MoS2 (1L-MoS2) with superior characteristics from 1L-MoS2 film in a facile route, using a suitable organic solvent with optimum surface tension, evaporation rate and dielectric constant, which facilitates the controlled scroll formation. These nanoscrolls behave as multilayers in morphology and monolayer electronically. The nanoscrolls exhibited a direct optical gap with enhanced photoluminescence quantum yield stemming from the weak interlayer coupling among constituent layers and were corroborated by low-frequency Raman measurements and Kelvin probe force microscopy measurements. Furthermore, enhanced photoluminescence emission after annealing uncovers the thermal stability of nanoscrolls. In addition, conducting atomic force microscopy results exhibit a significantly higher photocurrent in the nanoscrolled 1L-MoS2 compared to the 1L-MoS2. We also realized significantly improved field effect transistor device parameters in nanoscrolled 1L-MoS2 devices. In nanoscrolled devices, we report the highest mobility value of 2400 cm2V-1s-1 reported in any form of 1L-MoS2.
△ Less
Submitted 21 February, 2024;
originally announced February 2024.
-
Multi-Armed Bandit Learning for Content Provisioning in Network of UAVs
Authors:
Amit Kumar Bhuyan,
Hrishikesh Dutta,
Subir Biswas
Abstract:
This paper proposes an unmanned aerial vehicle (UAV) aided content management system in communication-challenged disaster scenarios. Without cellular infrastructure in such scenarios, community of stranded users can be provided access to situation-critical contents using a hybrid network of static and traveling UAVs. A set of relatively static anchor UAVs can download content from central servers…
▽ More
This paper proposes an unmanned aerial vehicle (UAV) aided content management system in communication-challenged disaster scenarios. Without cellular infrastructure in such scenarios, community of stranded users can be provided access to situation-critical contents using a hybrid network of static and traveling UAVs. A set of relatively static anchor UAVs can download content from central servers and provide content access to its local users. A set of ferrying UAVs with wider mobility can provision content to users by shuffling them across different anchor UAVs while visiting different communities of users. The objective is to design a content dissemination system that on-the-fly learns content caching policies for maximizing content availability to the stranded users. This paper proposes a decentralized Top-k Multi-Armed Bandit Learning model for UAV-caching decision-making that takes geo-temporal differences in content popularity and heterogeneity in content demands into consideration. The proposed paradigm is able to combine the expected reward maximization attribute and a proposed multi-dimensional reward structure of Top-k Multi-Armed Bandit, for caching decision at the UAVs. This study is done for different user-specified tolerable access delay, heterogeneous popularity distributions, and inter-community geographical characteristics. Functional verification and performance evaluation of the proposed caching framework is done for a wide range of network size, UAV distribution, and content popularity.
△ Less
Submitted 18 December, 2023;
originally announced December 2023.
-
Multi-armed Bandit Learning for TDMA Transmission Slot Scheduling and Defragmentation for Improved Bandwidth Usage
Authors:
Hrishikesh Dutta,
Amit Kumar Bhuyan,
Subir Biswas
Abstract:
This paper proposes a Time Division Multiple Access (TDMA) MAC slot allocation protocol with efficient bandwidth usage in wireless sensor networks and Internet of Things (IoTs). The developed protocol has two primary components: a Multi-Armed Bandits (MAB)-based slot allocation mechanism for collision free transmission, and a Decentralized Defragmented Slot Backshift (DDSB) operation for improving…
▽ More
This paper proposes a Time Division Multiple Access (TDMA) MAC slot allocation protocol with efficient bandwidth usage in wireless sensor networks and Internet of Things (IoTs). The developed protocol has two primary components: a Multi-Armed Bandits (MAB)-based slot allocation mechanism for collision free transmission, and a Decentralized Defragmented Slot Backshift (DDSB) operation for improving bandwidth usage efficiency. The proposed framework is decentralized in that each node finds its transmission schedule independently without the control of any centralized arbitrator. The developed mechanism is suitable for networks with or without time synchronization, thus, making it suitable for low-complexity wireless transceivers for wireless sensor and IoT nodes. This framework is able to manage the trade-off between learning convergence time and bandwidth. In addition, it allows the nodes to adapt to topological changes while maintaining efficient bandwidth usage. The developed logic is tested for both fully-connected and arbitrary mesh networks with extensive simulation experiments. It is shown how the nodes can learn to select collision-free transmission slots using MAB. Moreover, the nodes learn to self-adjust their transmission schedules using a novel DDSB framework in order to reduce bandwidth usage.
△ Less
Submitted 13 January, 2023;
originally announced February 2023.
-
Reinforcement Learning for Protocol Synthesis in Resource-Constrained Wireless Sensor and IoT Networks
Authors:
Hrishikesh Dutta,
Amit Kumar Bhuyan,
Subir Biswas
Abstract:
This article explores the concepts of online protocol synthesis using Reinforcement Learning (RL). The study is performed in the context of sensor and IoT networks with ultra low complexity wireless transceivers. The paper introduces the use of RL and Multi Armed Bandit (MAB), a specific type of RL, for Medium Access Control (MAC) under different network and traffic conditions. It then introduces…
▽ More
This article explores the concepts of online protocol synthesis using Reinforcement Learning (RL). The study is performed in the context of sensor and IoT networks with ultra low complexity wireless transceivers. The paper introduces the use of RL and Multi Armed Bandit (MAB), a specific type of RL, for Medium Access Control (MAC) under different network and traffic conditions. It then introduces a novel learning based protocol synthesis framework that addresses specific difficulties and limitations in medium access for both random access and time slotted networks. The mechanism does not rely on carrier sensing, network time-synchronization, collision detection, and other low level complex operations, thus making it ideal for ultra simple transceiver hardware used in resource constrained sensor and IoT networks. Additionally, the ability of independent protocol learning by the nodes makes the system robust and adaptive to the changes in network and traffic conditions. It is shown that the nodes can be trained to learn to avoid collisions, and to achieve network throughputs that are comparable to ALOHA based access protocols in sensor and IoT networks with simplest transceiver hardware. It is also shown that using RL, it is feasible to synthesize access protocols that can sustain network throughput at high traffic loads, which is not feasible in the ALOHA-based systems. The ability of the system to provide throughput fairness under network and traffic heterogeneities are also experimentally demonstrated.
△ Less
Submitted 13 January, 2023;
originally announced February 2023.
-
When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges
Authors:
Qun Wang,
Haijian Sun,
Rose Qingyang Hu,
Arupjyoti Bhuyan
Abstract:
The exponential growth of internet connected systems has generated numerous challenges, such as spectrum shortage issues, which require efficient spectrum sharing (SS) solutions. Complicated and dynamic SS systems can be exposed to different potential security and privacy issues, requiring protection mechanisms to be adaptive, reliable, and scalable. Machine learning (ML) based methods have freque…
▽ More
The exponential growth of internet connected systems has generated numerous challenges, such as spectrum shortage issues, which require efficient spectrum sharing (SS) solutions. Complicated and dynamic SS systems can be exposed to different potential security and privacy issues, requiring protection mechanisms to be adaptive, reliable, and scalable. Machine learning (ML) based methods have frequently been proposed to address those issues. In this article, we provide a comprehensive survey of the recent development of ML based SS methods, the most critical security issues, and corresponding defense mechanisms. In particular, we elaborate the state-of-the-art methodologies for improving the performance of SS communication systems for various vital aspects, including ML based cognitive radio networks (CRNs), ML based database assisted SS networks, ML based LTE-U networks, ML based ambient backscatter networks, and other ML based SS solutions. We also present security issues from the physical layer and corresponding defending strategies based on ML algorithms, including Primary User Emulation (PUE) attacks, Spectrum Sensing Data Falsification (SSDF) attacks, jamming attacks, eavesdropping attacks, and privacy issues. Finally, extensive discussions on open challenges for ML based SS are also given. This comprehensive review is intended to provide the foundation for and facilitate future studies on exploring the potential of emerging ML for coping with increasingly complex SS and their security problems.
△ Less
Submitted 12 January, 2022;
originally announced January 2022.
-
A Q-Learning-based Approach for Distributed Beam Scheduling in mmWave Networks
Authors:
Xiang Zhang,
Shamik Sarkar,
Arupjyoti Bhuyan,
Sneha Kumar Kasera,
Mingyue Ji
Abstract:
We consider the problem of distributed downlink beam scheduling and power allocation for millimeter-Wave (mmWave) cellular networks where multiple base stations (BSs) belonging to different service operators share the same unlicensed spectrum with no central coordination or cooperation among them. Our goal is to design efficient distributed beam scheduling and power allocation algorithms such that…
▽ More
We consider the problem of distributed downlink beam scheduling and power allocation for millimeter-Wave (mmWave) cellular networks where multiple base stations (BSs) belonging to different service operators share the same unlicensed spectrum with no central coordination or cooperation among them. Our goal is to design efficient distributed beam scheduling and power allocation algorithms such that the network-level payoff, defined as the weighted sum of the total throughput and a power penalization term, can be maximized. To this end, we propose a distributed scheduling approach to power allocation and adaptation for efficient interference management over the shared spectrum by modeling each BS as an independent Q-learning agent. As a baseline, we compare the proposed approach to the state-of-the-art non-cooperative game-based approach which was previously developed for the same problem. We conduct extensive experiments under various scenarios to verify the effect of multiple factors on the performance of both approaches. Experiment results show that the proposed approach adapts well to different interference situations by learning from experience and can achieve higher payoff than the game-based approach. The proposed approach can also be integrated into our previously developed Lyapunov stochastic optimization framework for the purpose of network utility maximization with optimality guarantee. As a result, the weights in the payoff function can be automatically and optimally determined by the virtual queue values from the sub-problems derived from the Lyapunov optimization framework.
△ Less
Submitted 16 October, 2021;
originally announced October 2021.
-
60 GHz Outdoor Propagation Measurements and Analysis Using Facebook Terragraph Radios
Authors:
Kairui Du,
Omkar Mujumdar,
Ozgur Ozdemir,
Ender Ozturk,
Ismail Guvenc,
Mihail L. Sichitiu,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
The high attenuation of millimeter-wave (mmWave) would significantly reduce the coverage areas, and hence it is critical to study the propagation characteristics of mmWave in multiple deployment scenarios. In this work, we investigated the propagation and scattering behavior of 60 GHz mmWave signals in outdoor environments at a travel distance of 98 m for an aerial link (rooftop to rooftop), and 1…
▽ More
The high attenuation of millimeter-wave (mmWave) would significantly reduce the coverage areas, and hence it is critical to study the propagation characteristics of mmWave in multiple deployment scenarios. In this work, we investigated the propagation and scattering behavior of 60 GHz mmWave signals in outdoor environments at a travel distance of 98 m for an aerial link (rooftop to rooftop), and 147 m for a ground link (light-pole to light-pole). Measurements were carried out using Facebook Terragraph (TG) radios. Results include received power, path loss, signal-to-noise ratio (SNR), and root mean square (RMS) delay spread for all beamforming directions supported by the antenna array. Strong line-of-sight (LOS) propagation exists in both links. We also observed rich multipath components (MPCs) due to edge scatterings in the aerial link, while only LOS and ground reflection MPCs in the other link.
△ Less
Submitted 1 September, 2021;
originally announced September 2021.
-
Ensuring Reliable Connectivity to Cellular-Connected UAVs with Up-tilted Antennas and Interference Coordination
Authors:
Md Moin Uddin Chowdhury,
Ismail Guvenc,
Walid Saad,
Arupjyoti Bhuyan
Abstract:
To integrate unmanned aerial vehicles (UAVs) in future large-scale deployments, a new wireless communication paradigm, namely, the cellular-connected UAV has recently attracted interest. However, the line-of-sight dominant air-to-ground channels along with the antenna pattern of the cellular ground base stations (GBSs) introduce critical interference issues in cellular-connected UAV communications…
▽ More
To integrate unmanned aerial vehicles (UAVs) in future large-scale deployments, a new wireless communication paradigm, namely, the cellular-connected UAV has recently attracted interest. However, the line-of-sight dominant air-to-ground channels along with the antenna pattern of the cellular ground base stations (GBSs) introduce critical interference issues in cellular-connected UAV communications. In particular, the complex antenna pattern and the ground reflection (GR) from the down-tilted antennas create both coverage holes and patchy coverage for the UAVs in the sky, which leads to unreliable connectivity from the underlying cellular network. To overcome these challenges, in this paper, we propose a new cellular architecture that employs an extra set of co-channel antennas oriented towards the sky to support UAVs on top of the existing down-tilted antennas for ground user equipment (GUE). To model the GR stemming from the down-tilted antennas, we propose a path-loss model, which takes both antenna radiation pattern and configuration into account. Next, we formulate an optimization problem to maximize the minimum signal-to-interference ratio (SIR) of the UAVs by tuning the up-tilt (UT) angles of the up-tilted antennas. Since this is an NP-hard problem, we propose a genetic algorithm (GA) based heuristic method to optimize the UT angles of these antennas. After obtaining the optimal UT angles, we integrate the 3GPP Release-10 specified enhanced inter-cell interference coordination (eICIC) to reduce the interference stemming from the down-tilted antennas. Our simulation results based on the hexagonal cell layout show that the proposed interference mitigation method can ensure higher minimum SIRs for the UAVs over baseline methods while creating minimal impact on the SIR of GUEs.
△ Less
Submitted 20 December, 2021; v1 submitted 11 August, 2021;
originally announced August 2021.
-
Channel Rank Improvement in Urban Drone Corridors Using Passive Intelligent Reflectors
Authors:
Ender Ozturk,
Chethan Kumar Anjinappa,
Fatih Erden,
Ismail Guvenc,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
Multiple-input multiple-output (MIMO) techniques can help in scaling the achievable air-to-ground (A2G) channel capacity while communicating with drones. However, spatial multiplexing with drones suffers from rank deficient channels due to the unobstructed line-of-sight (LoS), especially in millimeter-wave (mmWave) frequencies that use narrow beams. One possible solution is utilizing low-cost and…
▽ More
Multiple-input multiple-output (MIMO) techniques can help in scaling the achievable air-to-ground (A2G) channel capacity while communicating with drones. However, spatial multiplexing with drones suffers from rank deficient channels due to the unobstructed line-of-sight (LoS), especially in millimeter-wave (mmWave) frequencies that use narrow beams. One possible solution is utilizing low-cost and low-complexity metamaterial-based intelligent reflecting surfaces (IRS) to enrich the multipath environment, taking into account that the drones are restricted to fly only within well-defined drone corridors. A hurdle with this solution is placing the IRSs optimally. In this study, we propose an approach for IRS placement with a goal to improve the spatial multiplexing gains, and hence to maximize the average channel capacity in a predefined drone corridor. Our results at 6 GHz, 28 GHz and 60 GHz show that the proposed approach increases the average rates for all frequency bands for a given drone corridor, when compared with the environment where there are no IRSs present, and IRS-aided channels perform close to each other at sub-6 and mmWave bands.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
Base Station Antenna Uptilt Optimization for Cellular-Connected Drone Corridors
Authors:
Sung Joon Maeng,
Md Moin Uddin Chowdhury,
İsmail Güvenç,
Arupjyoti Bhuyan,
Huaiyu Dai
Abstract:
The concept of drone corridors is recently getting more attention to enable connected, safe, and secure flight zones in the national airspace. To support beyond visual line of sight (BVLOS) operations of aerial vehicles in a drone corridor, cellular base stations (BSs) serve as a convenient infrastructure, since such BSs are widely deployed to provide seamless wireless coverage. However, antennas…
▽ More
The concept of drone corridors is recently getting more attention to enable connected, safe, and secure flight zones in the national airspace. To support beyond visual line of sight (BVLOS) operations of aerial vehicles in a drone corridor, cellular base stations (BSs) serve as a convenient infrastructure, since such BSs are widely deployed to provide seamless wireless coverage. However, antennas in the existing cellular networks are down-tilted to optimally serve their ground users, which results in coverage holes if they are also used to serve drones. In this letter, we consider the use of additional uptilted antennas at cellular BSs and optimize the uptilt angle to minimize outage probability for a given drone corridor. Our numerical results show how the beamwidth and the maximum drone corridor height affect the optimal value of the antenna uptilt angle.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
Precoder Design for Physical-Layer Security and Authentication in Massive MIMO UAV Communications
Authors:
Sung Joon Maeng,
Yavuz Yapıcı,
İsmail Güvenç,
Arupjyoti Bhuyan,
Huaiyu Dai
Abstract:
Supporting reliable and seamless wireless connectivity for unmanned aerial vehicles (UAVs) has recently become a critical requirement to enable various different use cases of UAVs. Due to their widespread deployment footprint, cellular networks can support beyond visual line of sight (BVLOS) communications for UAVs. In this paper, we consider cellular connected UAVs (C-UAVs) that are served by mas…
▽ More
Supporting reliable and seamless wireless connectivity for unmanned aerial vehicles (UAVs) has recently become a critical requirement to enable various different use cases of UAVs. Due to their widespread deployment footprint, cellular networks can support beyond visual line of sight (BVLOS) communications for UAVs. In this paper, we consider cellular connected UAVs (C-UAVs) that are served by massive multiple-input-multiple-output (MIMO) links to extend coverage range, while also improving physical layer security and authentication. We consider Rician channel and propose a novel linear precoder design for transmitting data and artificial noise (AN). We derive the closed-form expression of the ergodic secrecy rate of C-UAVs for both conventional and proposed precoder designs. In addition, we obtain the optimal power splitting factor that divides the power between data and AN by asymptotic analysis. Then, we apply the proposed precoder design in the fingerprint embedding authentication framework, where the goal is to minimize the probability of detection of the authentication tag at an eavesdropper. In simulation results, we show the superiority of the proposed precoder in both secrecy rate and the authentication probability considering moderate and large number of antenna massive MIMO scenarios.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
Uncoordinated Spectrum Sharing in Millimeter Wave Networks Using Carrier Sensing
Authors:
Shamik Sarkar,
Xiang Zhang,
Arupjyoti Bhuyan,
Mingyue Ji,
Sneha Kumar Kasera
Abstract:
We propose using Carrier Sensing (CS) for distributed interference management in millimeter-wave (mmWave) cellular networks where spectrum is shared by multiple operators that do not coordinate among themselves. In addition, even the base station sites can be shared by the operators. We describe important challenges in using traditional CS in this setting and propose enhanced CS protocols to addre…
▽ More
We propose using Carrier Sensing (CS) for distributed interference management in millimeter-wave (mmWave) cellular networks where spectrum is shared by multiple operators that do not coordinate among themselves. In addition, even the base station sites can be shared by the operators. We describe important challenges in using traditional CS in this setting and propose enhanced CS protocols to address these challenges. Using stochastic geometry, we develop a general framework for downlink coverage probability analysis of our shared mmWave network in the presence of CS and derive the downlink coverage probability expressions for several CS protocols. To the best of our knowledge, our work is the first to investigate and analyze (using stochastic geometry) CS for mmWave networks with spectrum and BS sites shared among non-coordinating operators. We evaluate the downlink coverage probability of our shared mmWave network using simulations as well as numerical examples based on our analysis. Our evaluations show that our proposed enhancements lead to an improvement in downlink coverage probability, compared to the downlink coverage probability with no CS, for higher values of signal-to-interference and noise ratio (SINR). Interestingly, our evaluations also reveal that for lower values of SINR, not using any CS is the best strategy in terms of the downlink coverage probability.
△ Less
Submitted 24 February, 2021;
originally announced February 2021.
-
The comparative defect study on the polymeric transfer of MoS2 monolayers
Authors:
C. Abinash Bhuyan,
Kishore K. Madapu,
Sandip Dhara
Abstract:
The defect-free transfer of chemical vapour deposition (CVD) grown monolayer MoS2 is important for both fabrication of 2D devices and fundamental point of view for various studies where substrate effects need to be minimized. Among many transfer techniques, two well-known techniques that use the polymer as carriers are wet-transfer technique and the surface-energy-assisted transfer technique. In t…
▽ More
The defect-free transfer of chemical vapour deposition (CVD) grown monolayer MoS2 is important for both fabrication of 2D devices and fundamental point of view for various studies where substrate effects need to be minimized. Among many transfer techniques, two well-known techniques that use the polymer as carriers are wet-transfer technique and the surface-energy-assisted transfer technique. In this work, we transferred a single CVD grown monolayer MoS2 by these two transfer methods on a similar substrate, and the intervention of strain and defects in the transfer process is probed by Raman and photoluminescence (PL) spectroscopy, respectively. We found that the conventional and commonly used wet transfer technique degraded the monolayer due to KOH contamination. In contrast, monolayers transferred using the surface-energy-assisted transfer method possess structural integrity and optical quality on a par with the as-grown MoS2 layers. As compared to the wet process a strain-free transfer was recorded in the surface-energy-assisted technique using Raman spectroscopic studies.
△ Less
Submitted 18 January, 2021;
originally announced January 2021.
-
A Non-cooperative Game-based Distributed Beam Scheduling Framework for 5G Millimeter-Wave Cellular Networks
Authors:
Xiang Zhang,
Shamik Sarkar,
Arupjyoti Bhuyan,
Sneha Kumar Kasera,
Mingyue Ji
Abstract:
This paper studies the problem of distributed beam scheduling for 5G millimeter-Wave (mm-Wave) cellular networks where base stations (BSs) belonging to different operators share the same spectrum without centralized coordination among them. Our goal is to design efficient distributed scheduling algorithms to maximize the network utility, which is a function of the achieved throughput by the user e…
▽ More
This paper studies the problem of distributed beam scheduling for 5G millimeter-Wave (mm-Wave) cellular networks where base stations (BSs) belonging to different operators share the same spectrum without centralized coordination among them. Our goal is to design efficient distributed scheduling algorithms to maximize the network utility, which is a function of the achieved throughput by the user equipment (UEs), subject to the average and instantaneous power consumption constraints of the BSs. We propose a Media Access Control (MAC) and a power allocation/adaptation mechanism utilizing the Lyapunov stochastic optimization framework and non-cooperative games. In particular, we first decompose the original utility maximization problem into two sub-optimization problems for each time frame, which are a convex optimization problem and a non-convex optimization problem, respectively. By formulating the distributed scheduling problem as a non-cooperative game where each BS is a player attempting to optimize its own utility, we provide a distributed solution to the non-convex sub-optimization problem via finding the Nash Equilibrium (NE) of the game whose weights are determined optimally by the Lyapunov optimization framework. Finally, we conduct simulation under various network settings to show the effectiveness of the proposed game-based beam scheduling algorithm in comparison to that of several reference schemes.
△ Less
Submitted 22 July, 2021; v1 submitted 21 December, 2020;
originally announced December 2020.
-
Who is in Control? Practical Physical Layer Attack and Defense for mmWave based Sensing in Autonomous Vehicles
Authors:
Zhi Sun,
Sarankumar Balakrishnan,
Lu Su,
Arupjyoti Bhuyan,
Pu Wang,
Chunming Qiao
Abstract:
With the wide bandwidths in millimeter wave (mmWave) frequency band that results in unprecedented accuracy, mmWave sensing has become vital for many applications, especially in autonomous vehicles (AVs). In addition, mmWave sensing has superior reliability compared to other sensing counterparts such as camera and LiDAR, which is essential for safety-critical driving. Therefore, it is critical to u…
▽ More
With the wide bandwidths in millimeter wave (mmWave) frequency band that results in unprecedented accuracy, mmWave sensing has become vital for many applications, especially in autonomous vehicles (AVs). In addition, mmWave sensing has superior reliability compared to other sensing counterparts such as camera and LiDAR, which is essential for safety-critical driving. Therefore, it is critical to understand the security vulnerabilities and improve the security and reliability of mmWave sensing in AVs. To this end, we perform the end-to-end security analysis of a mmWave-based sensing system in AVs, by designing and implementing practical physical layer attack and defense strategies in a state-of-the-art mmWave testbed and an AV testbed in real-world settings. Various strategies are developed to take control of the victim AV by spoofing its mmWave sensing module, including adding fake obstacles at arbitrary locations and faking the locations of existing obstacles. Five real-world attack scenarios are constructed to spoof the victim AV and force it to make dangerous driving decisions leading to a fatal crash. Field experiments are conducted to study the impact of the various attack scenarios using a Lincoln MKZ-based AV testbed, which validate that the attacker can indeed assume control of the victim AV to compromise its security and safety. To defend the attacks, we design and implement a challenge-response authentication scheme and a RF fingerprinting scheme to reliably detect aforementioned spoofing attacks.
△ Less
Submitted 22 November, 2020;
originally announced November 2020.
-
Power Allocation for Fingerprint-Based PHY-Layer Authentication with mmWave UAV Networks
Authors:
Sung Joon Maeng,
Yavuz Yapıcı,
İsmail Güvenç,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
Physical layer security (PLS) techniques can help to protect wireless networks from eavesdropper attacks. In this paper, we consider the authentication technique that uses fingerprint embedding to defend 5G cellular networks with unmanned aerial vehicle (UAV) systems from eavesdroppers and intruders. Since the millimeter wave (mmWave) cellular networks use narrow and directional beams, PLS can tak…
▽ More
Physical layer security (PLS) techniques can help to protect wireless networks from eavesdropper attacks. In this paper, we consider the authentication technique that uses fingerprint embedding to defend 5G cellular networks with unmanned aerial vehicle (UAV) systems from eavesdroppers and intruders. Since the millimeter wave (mmWave) cellular networks use narrow and directional beams, PLS can take further advantage of the 3D spatial dimension for improving the authentication of UAV users. Considering a multi-user mmWave cellular network, we propose a power allocation technique that jointly takes into account splitting of the transmit power between the precoder and the authentication tag, which manages both the secrecy as well as the achievable rate. Our results show that we can obtain optimal achievable rate with expected secrecy.
△ Less
Submitted 1 November, 2020;
originally announced November 2020.
-
Lifetime Maximization for UAV-assisted Data Gathering Networks in the Presence of Jamming
Authors:
Ali Rahmati,
Seyyedali Hosseinalipour,
Ismail Guvenc,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
Deployment of unmanned aerial vehicles (UAVs) is recently getting significant attention due to a variety of practical use cases, such as surveillance, data gathering, and commodity delivery. Since UAVs are powered by batteries, energy efficient communication is of paramount importance. In this paper, we investigate the problem of lifetime maximization of a UAV-assisted network in the presence of m…
▽ More
Deployment of unmanned aerial vehicles (UAVs) is recently getting significant attention due to a variety of practical use cases, such as surveillance, data gathering, and commodity delivery. Since UAVs are powered by batteries, energy efficient communication is of paramount importance. In this paper, we investigate the problem of lifetime maximization of a UAV-assisted network in the presence of multiple sources of interference, where the UAVs are deployed to collect data from a set of wireless sensors. We demonstrate that the placement of the UAVs play a key role in prolonging the lifetime of the network since the required transmission powers of the UAVs are closely related to their locations in space. In the proposed scenario, the UAVs transmit the gathered data to a primary UAV called \textit{leader}, which is in charge of forwarding the data to the base station (BS) via a backhaul UAV network. We deploy tools from spectral graph theory to tackle the problem due to its high non-convexity. Simulation results demonstrate that our proposed method can significantly improve the lifetime of the UAV network.
△ Less
Submitted 10 May, 2020;
originally announced May 2020.
-
Precoder Design for mmWave UAV Communications with Physical Layer Security
Authors:
Sung Joon Maeng,
Yavuz Yapıcı,
İsmail Güvenç,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
The integration of unmanned aerial vehicles (UAVs) into the terrestrial cellular networks is envisioned as one key technology for next-generation wireless communications. In this work, we consider the physical layer security of the communications links in the millimeter-wave (mmWave) spectrum which are maintained by UAVs functioning as base stations (BS). In particular, we propose a new precoding…
▽ More
The integration of unmanned aerial vehicles (UAVs) into the terrestrial cellular networks is envisioned as one key technology for next-generation wireless communications. In this work, we consider the physical layer security of the communications links in the millimeter-wave (mmWave) spectrum which are maintained by UAVs functioning as base stations (BS). In particular, we propose a new precoding strategy which incorporates the channel state information (CSI) of the eavesdropper (Eve) compromising link security. We show that our proposed precoder strategy eliminates any need for artificial noise (AN) transmission in underloaded scenarios (fewer users than number of antennas). In addition, we demonstrate that our nonlinear precoding scheme provides promising secrecy-rate performance even for overloaded scenarios at the expense of transmitting low-power AN.
△ Less
Submitted 16 February, 2020;
originally announced February 2020.
-
Interference Analysis and Mitigation for Massive Access Aerial IoT Considering 3D Antenna Patterns
Authors:
Sung Joon Maeng,
Mrugen Deshmukh,
İsmail Güvenç,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
Due to dense deployments of Internet of things (IoT) networks, interference management becomes a critical challenge. With the proliferation of aerial IoT devices, such as unmanned aerial vehicles (UAVs), interference characteristics in 3D environments will be different than those in the existing terrestrial IoT networks. In this paper, we consider 3D topology IoT networks with a mixture of aerial…
▽ More
Due to dense deployments of Internet of things (IoT) networks, interference management becomes a critical challenge. With the proliferation of aerial IoT devices, such as unmanned aerial vehicles (UAVs), interference characteristics in 3D environments will be different than those in the existing terrestrial IoT networks. In this paper, we consider 3D topology IoT networks with a mixture of aerial and terrestrial links, with low-cost cross-dipole antennas at ground nodes and omni-directional antennas at aerial nodes. Considering a massive-access communication scenario, we first derive the statistics of the channel gain at IoT receivers in closed form while taking into account the radiation patterns of both ground and aerial nodes. These are then used to calculate the ergodic achievable rate as a function of the height of the aerial receiver. We propose an interference mitigation scheme that utilizes 3D antenna radiation pattern with different dipole antenna settings. Our results show that using the proposed scheme, the ergodic achievable rate improves as the height of aerial receivers increases. In addition, the ratio between the ground and aerial receivers that maximizes the peak rate also increases with the aerial IoT receiver height.
△ Less
Submitted 3 February, 2020;
originally announced February 2020.
-
Physical Layer Security for NOMA Transmission in mmWave Drone Networks
Authors:
Yavuz Yapici,
Nadisanka Rupasinghe,
Ismail Guvenc,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
The non-orthogonal multiple access (NOMA) and millimeter-wave (mmWave) transmission enable the unmanned aerial vehicle (UAV) assisted wireless networks to provide broadband connectivity over densely packed urban areas. The presence of malicious receivers, however, compromise the security of the UAV-to-ground communications link, thereby degrading secrecy rates. In this work, we consider a NOMA-bas…
▽ More
The non-orthogonal multiple access (NOMA) and millimeter-wave (mmWave) transmission enable the unmanned aerial vehicle (UAV) assisted wireless networks to provide broadband connectivity over densely packed urban areas. The presence of malicious receivers, however, compromise the security of the UAV-to-ground communications link, thereby degrading secrecy rates. In this work, we consider a NOMA-based transmission strategy in a mmWave UAV-assisted wireless network, and investigate the respective secrecy-rate performance rigorously. In particular, we propose a protected-zone approach to enhance the secrecy-rate performance by preventing the most vulnerable subregion (outside the user region) from the presence of malicious receivers. The respective secrecy rates are then derived analytically as a function of the protected zone, which verifies great secrecy rate improvements through optimizing shape of the protected zone in use. Furthermore, we show that the optimal protected zone shape for mmWave links appears as a compromise between protecting the angle versus distance dimension, which would otherwise form to protect solely the distance dimension for sub-6GHz links. We also numerically evaluate the impact of transmission power, protected-zone size, and UAV altitude on the secrecy-rate performance improvements as practical considerations.
△ Less
Submitted 3 December, 2020; v1 submitted 14 January, 2020;
originally announced January 2020.
-
Dynamic Interference Management for UAV-Assisted Wireless Networks
Authors:
Ali Rahmati,
Seyyedali Hosseinalipour,
Yavuz Yapici,
Xiaofan He,
Ismail Guvenc,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
The deployment of unmanned aerial vehicles (UAVs) is proliferating as they are effective, flexible and cost-efficient devices for a variety of applications ranging from natural disaster recovery to delivery of goods. We investigate a transmission mechanism aiming to improve the data rate between a base station (BS) and a user equipment through deploying multiple relaying UAVs. We consider the effe…
▽ More
The deployment of unmanned aerial vehicles (UAVs) is proliferating as they are effective, flexible and cost-efficient devices for a variety of applications ranging from natural disaster recovery to delivery of goods. We investigate a transmission mechanism aiming to improve the data rate between a base station (BS) and a user equipment through deploying multiple relaying UAVs. We consider the effect of interference, which is incurred by the nodes of another established communication network. Our primary goal is to design the 3D trajectories and power allocation for the UAVs to maximize the data flow while the interference constraint is met. The UAVs can reconfigure their locations to evade the unintended/intended interference caused by reckless/smart interferers. We also consider the scenario in which smart jammers chase the UAVs to degrade the communication quality. In this case, we investigate the problem from the perspective of both UAV network and smart jammers. An alternating-maximization approach is proposed to address the joint 3D trajectory design and power allocation problem. We handle the 3D trajectory design by resorting to spectral graph theory and subsequently address the power allocation through convex optimization techniques. Finally, we demonstrate the efficacy of our proposed method through simulations.
△ Less
Submitted 26 September, 2019;
originally announced September 2019.
-
Hybrid Precoding for mmWave Massive MIMO with One-Bit DAC
Authors:
Sung Joon Maeng,
Yavuz Yapıcı,
Ismail Guvenc,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
Hybrid beamforming is key to achieving energy-efficient 5G wireless networks equipped with massive amount of antennas. Low-resolution data converters bring yet another degree of freedom to energy efficiency for the state-of-the-art 5G transceivers. In this work, we consider the design of hybrid precoders for massive multiple-input multiple-output (MIMO) channels in millimeter-wave (mmWave) spectru…
▽ More
Hybrid beamforming is key to achieving energy-efficient 5G wireless networks equipped with massive amount of antennas. Low-resolution data converters bring yet another degree of freedom to energy efficiency for the state-of-the-art 5G transceivers. In this work, we consider the design of hybrid precoders for massive multiple-input multiple-output (MIMO) channels in millimeter-wave (mmWave) spectrum along with one-bit digital-to-analog converters (DACs) and finite-quantized phase shifters. In particular, we propose an alternating-optimization-based precoder design which recursively computes the covariance of the quantization distortion, and updates the precoders accordingly. Numerical results verify that the achievable rate improves quickly through iterations that involve updates to the weight matrix, distortion covariance of the quantization, and the respective precoders.
△ Less
Submitted 18 September, 2019;
originally announced September 2019.
-
Interference Mitigation Scheme in 3D Topology IoT Network with Antenna Radiation Pattern
Authors:
Sung Joon Maeng,
Mrugen Deshmukh,
Ismail Guvenc,
Arupjyoti Bhuyan
Abstract:
Internet of things (IoT) is one of main paradigms for 5G wireless systems. Due to high connection density, interference from other sources is a key problem in IoT networks. Especially, it is more difficult to find a solution to manage interference in uncoordinated networks than coordinated system. In this work, we consider 3D topology of uncoordinated IoT network and propose interference mitigatio…
▽ More
Internet of things (IoT) is one of main paradigms for 5G wireless systems. Due to high connection density, interference from other sources is a key problem in IoT networks. Especially, it is more difficult to find a solution to manage interference in uncoordinated networks than coordinated system. In this work, we consider 3D topology of uncoordinated IoT network and propose interference mitigation scheme with respect to 3D antenna radiation pattern. In 2D topology network, the radiation pattern of dipole antenna can be assumed as onmi-directional. We show the variance of antenna gain on dipole antenna in 3D topology, consider the simultaneous use of three orthogonal dipole antennas, and compare the system performance depending on different antenna configurations. Our simulation results show that proper altitude of IoT devices can extensively improve the system performance.
△ Less
Submitted 14 September, 2019;
originally announced September 2019.
-
Interference Avoidance in UAV-Assisted Networks: Joint 3D Trajectory Design and Power Allocation
Authors:
Ali Rahmati,
Seyyedali Hosseinalipour,
Yavuz Yapici,
Xiaofan He,
Ismail Guvenc,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
The use of the unmanned aerial vehicle (UAV) has been foreseen as a promising technology for the next generation communication networks. Since there are no regulations for UAVs deployment yet, most likely they form a network in coexistence with an already existed network. In this work, we consider a transmission mechanism that aims to improve the data rate between a terrestrial base station (BS) a…
▽ More
The use of the unmanned aerial vehicle (UAV) has been foreseen as a promising technology for the next generation communication networks. Since there are no regulations for UAVs deployment yet, most likely they form a network in coexistence with an already existed network. In this work, we consider a transmission mechanism that aims to improve the data rate between a terrestrial base station (BS) and user equipment (UE) through deploying multiple UAVs relaying the desired data flow. Considering the coexistence of this network with other established communication networks, we take into account the effect of interference, which is incurred by the existing nodes. Our primary goal is to optimize the three-dimensional (3D) trajectories and power allocation for the relaying UAVs to maximize the data flow while keeping the interference to existing nodes below a predefined threshold. An alternating-maximization strategy is proposed to solve the joint 3D trajectory design and power allocation for the relaying UAVs. To this end, we handle the information exchange within the network by resorting to spectral graph theory and subsequently address the power allocation through convex optimization techniques. Simulation results show that our approach can considerably improve the information flow while the interference threshold constraint is met.
△ Less
Submitted 16 April, 2019;
originally announced April 2019.
-
SLNR Based Precoding for One-Bit Quantized Massive MIMO in mmWave Communications
Authors:
Yavuz Yapıcı,
Sung Joon Maeng,
İsmail Güvenç,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
Massive multiple-input multiple-output (MIMO) is a key technology for 5G wireless communications with a promise of significant capacity increase. The use of low-resolution data converters is crucial for massive MIMO to make the overall transmission as cost- and energy-efficient as possible. In this work, we consider a downlink millimeter-wave (mmWave) transmission scenario, where multiple users ar…
▽ More
Massive multiple-input multiple-output (MIMO) is a key technology for 5G wireless communications with a promise of significant capacity increase. The use of low-resolution data converters is crucial for massive MIMO to make the overall transmission as cost- and energy-efficient as possible. In this work, we consider a downlink millimeter-wave (mmWave) transmission scenario, where multiple users are served simultaneously by massive MIMO with one-bit digital-to-analog (D/A) converters. In particular, we propose a novel precoder design based on signal-to-leakage-plus-noise ratio (SLNR), which minimizes energy leakage into undesired users while taking into account impairments due to nonlinear one-bit quantization. We show that well-known regularized zero-forcing (RZF) precoder is a particular version of the proposed SLNR-based precoder, which is obtained when quantization impairments are totally ignored. Numerical results underscore significant performance improvements along with the proposed SLNR-based precoder as compared to either RZF or zero-forcing (ZF) precoders.
△ Less
Submitted 12 February, 2019;
originally announced February 2019.
-
Physical Layer Identification based on Spatial-temporal Beam Features for Millimeter Wave Wireless Networks
Authors:
Sarankumar Balakrishnan,
Shreya Gupta,
Arupjyoti Bhuyan,
Pu Wang,
Dimitrios Koutsonikolas,
Zhi Sun
Abstract:
With millimeter wave (mmWave) wireless communication envisioned to be the key enabler of next generation high data rate wireless networks, security is of paramount importance. While conventional security measures in wireless networks operate at a higher layer of the protocol stack, physical layer security utilizes unique device dependent hardware features to identify and authenticate legitimate de…
▽ More
With millimeter wave (mmWave) wireless communication envisioned to be the key enabler of next generation high data rate wireless networks, security is of paramount importance. While conventional security measures in wireless networks operate at a higher layer of the protocol stack, physical layer security utilizes unique device dependent hardware features to identify and authenticate legitimate devices. In this work, we identify that the manufacturing tolerances in the antenna arrays used in mmWave devices contribute to a beam pattern that is unique to each device, and to that end we propose a novel device fingerprinting scheme based on the unique beam patterns used by the mmWave devices. Specifically, we propose a fingerprinting scheme with multiple access points (APs) to take advantage of the rich spatial-temporal information of the beam pattern. We perform comprehensive experiments with commercial off-the-shelf mmWave devices to validate the reliability performance of our proposed method under various scenarios. We also compare our beam pattern feature with a conventional physical layer feature namely power spectral density feature (PSD). To that end, we implement PSD feature based fingerprinting for mmWave devices. We show that the proposed multiple APs scheme is able to achieve over 99% identification accuracy for stationary LOS and NLOS scenarios and significantly outperform the PSD based method. For mobility scenarios, the overall identification accuracy is 96%. In addition, we perform security analysis of our proposed beam pattern fingerprinting system and PSD fingerprinting system by studying the feasibility of performing impersonation attacks. We design and implement an impersonation attack mechanism for mmWave wireless networks using state-of-the-art 60 GHz software defined radios. We discuss our findings and their implications on the security of the mmWave wireless networks.
△ Less
Submitted 10 February, 2019;
originally announced February 2019.
-
Theoretical and experimental studies of photomechanical materials
Authors:
Bojun Zhou,
Elizabeth Bernhardt,
Ankita Bhuyan,
Zoya Ghorbanishiadeh,
Nathan Rasmussen,
Joseph Lanska,
Mark G. Kuzyk
Abstract:
After a brief introduction to the field of light-responsive materials, this paper provides a general theory for modeling the photomechanical response of a material, applies it to the two best-known mechanisms of photothermal heating and photo-isomerization, and then describes an experimental apparatus for quantitative measurements of the stress response. Several different materials are characteriz…
▽ More
After a brief introduction to the field of light-responsive materials, this paper provides a general theory for modeling the photomechanical response of a material, applies it to the two best-known mechanisms of photothermal heating and photo-isomerization, and then describes an experimental apparatus for quantitative measurements of the stress response. Several different materials are characterized to illustrate how the experiments and theory can be used to isolate the contributing mechanisms both through photomechanical measurements and auxiliary measurements of laser heating and thermal expansion. The efficiency and figure of merit of the photomechanical response is defined on several scales form the molecule to the bulk, and the photomorphon -- the basic material element that determines the bulk response -- is introduced. The photomorphon provides a conceptual model that can be expressed in terms of viscoelastic elements such as springs in series and parallel with the photoactive molecule. The photomechanical response, figure of merit, and the deduced microscopic photomechanical properties are tabulated and proposals for new materials classes are made.
△ Less
Submitted 1 February, 2019;
originally announced February 2019.
-
Enhancing Physical Layer Security for NOMA Transmission in mmWave Drone Networks
Authors:
Nadisanka Rupasinghe,
Yavuz Yapici,
Ismail Guvenc,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
Physical layer security (PLS) is critically important for emerging wireless communication networks to maintain the confidentiality of the information of legitimate users. In this paper, we investigate enhancing PLS in an unmanned aerial vehicle (UAV) based communication network where a UAV acting as an aerial base station (BS) provides coverage in a densely packed user area (such as a stadium or a…
▽ More
Physical layer security (PLS) is critically important for emerging wireless communication networks to maintain the confidentiality of the information of legitimate users. In this paper, we investigate enhancing PLS in an unmanned aerial vehicle (UAV) based communication network where a UAV acting as an aerial base station (BS) provides coverage in a densely packed user area (such as a stadium or a concert area). In particular, non-orthogonal multiple access (NOMA) together with highly-directional multi-antenna transmission techniques in mmWave frequency bands are utilized for improving spectral efficiency. In order to achieve PLS against potential eavesdropper attacks, we introduce a protected zone around the user region. However, limited resource availability refrain protected zone being extended to cover the entire eavesdropper region. Hence, we propose an approach to optimize the protected zone shape (for fixed area) at each UAV-BS hovering altitude. The associated secrecy performance is evaluated considering the secrecy outage and sum secrecy rates. Numerical results reveal the importance of protected zone shape optimization at each altitude to maximize NOMA secrecy rates.
△ Less
Submitted 3 December, 2018;
originally announced December 2018.
-
Spectroscopic studies of the mechanism of reversible photodegradation of 1-substituted aminoanthraquinone-doped polymers
Authors:
Sheng-Ting Hung,
Ankita Bhuyan,
Kyle Schademan,
Joost Steverlynck,
Matthew D. McCluskey,
Guy Koeckelberghs,
Koen Clays,
Mark G. Kuzyk
Abstract:
The mechanism of reversible photodegradation of 1-substituted aminoanthraquinones doped into poly(methyl methacrylate) and polystyrene is investigated. Time-dependent density functional theory is employed to predict the transition energies and corresponding oscillator strengths of the proposed reversibly- and irreversibly-damaged dye species. Ultraviolet-visible and Fourier transform infrared (FTI…
▽ More
The mechanism of reversible photodegradation of 1-substituted aminoanthraquinones doped into poly(methyl methacrylate) and polystyrene is investigated. Time-dependent density functional theory is employed to predict the transition energies and corresponding oscillator strengths of the proposed reversibly- and irreversibly-damaged dye species. Ultraviolet-visible and Fourier transform infrared (FTIR) spectroscopy are used to characterize which species are present. FTIR spectroscopy indicates that both dye and polymer undergo reversible photodegradation when irradiated with a visible laser. These findings suggest that photodegradation of 1-substituted aminoanthraquinones doped in polymers originates from interactions between dyes and photoinduced thermally-degraded polymers, and the metastable product may recover or further degrade irreversibly.
△ Less
Submitted 9 November, 2015;
originally announced November 2015.