-
Reinforcenment Learning-Aided NOMA Random Access: An AoI-Based Timeliness Perspective
Authors:
Felippe Moraes Pereira,
Jamil de Araujo Farhat,
João Luiz Rebelatto,
Glauber Brante,
Richard Demo Souza
Abstract:
In this paper, we investigate the age-of-information (AoI) of a power domain non-orthogonal multiple access (NOMA) network, where multiple internet-of-things (IoT) devices transmit to a common gateway in a grant-free random fashion. More specifically, we consider a framed setup composed of multiple time slots, and resort to the $Q$-learning algorithm to properly define, in a distributed manner, th…
▽ More
In this paper, we investigate the age-of-information (AoI) of a power domain non-orthogonal multiple access (NOMA) network, where multiple internet-of-things (IoT) devices transmit to a common gateway in a grant-free random fashion. More specifically, we consider a framed setup composed of multiple time slots, and resort to the $Q$-learning algorithm to properly define, in a distributed manner, the time slot and the power level each IoT device transmits within a frame. In the proposed AoI-QL-NOMA scheme, the $Q$-learning reward is adapted with the aim of minimizing the average AoI of the network, while only requiring a single feedback bit per time slot, in a frame basis. Our results show that AoI-QL-NOMA significantly improves the AoI performance compared to some recently proposed schemes, without significantly reducing the network throughput.
△ Less
Submitted 7 October, 2024; v1 submitted 4 October, 2024;
originally announced October 2024.
-
Performance Analysis of 6TiSCH Networks Using Discrete Events Simulator
Authors:
Guilherme de Santi Peron,
Marcos Eduardo Pivaro Monteiro,
João Luís Verdegay de Barros,
Jamil Farhat,
Glauber Brante
Abstract:
The Internet of Things (IoT) empowers small devices to sense, react, and communicate, with applications ranging from smart ordinary household objects to complex industrial processes. To provide access to an increasing number of IoT devices, particularly in long-distance communication scenarios, a robust low-power wide area network (LPWAN) protocol becomes essential. A widely adopted protocol for t…
▽ More
The Internet of Things (IoT) empowers small devices to sense, react, and communicate, with applications ranging from smart ordinary household objects to complex industrial processes. To provide access to an increasing number of IoT devices, particularly in long-distance communication scenarios, a robust low-power wide area network (LPWAN) protocol becomes essential. A widely adopted protocol for this purpose is 6TiSCH, which builds upon the IEEE 802.15.4 standard. It introduces time-slotted channel hopping (TSCH) mode as a new medium access control (MAC) layer operating mode, in conjunction with IEEE 802.15.4g, which also defines both MAC and physical layer (PHY) layers and provides IPv6 connectivity for LPWAN. Notably, 6TiSCH has gained adoption in significant standards such as Wireless Intelligent Ubiquitous Networks (Wi-SUN). This study evaluates the scalability of 6TiSCH, with a focus on key parameters such as queue size, the maximum number of single-hop retries, and the slotframe length. Computational simulations were performed using an open-source simulator and obtained the following results: increasing the transmission queue size, along with adjusting the number of retries and slotframe length, leads to a reduction in the packet error rate (PER). Notably, the impact of the number of retries is particularly pronounced. Furthermore, the effect on latency varies based on the specific combination of these parameters as the network scales.
△ Less
Submitted 7 October, 2024; v1 submitted 4 October, 2024;
originally announced October 2024.
-
Decentralized RL-Based Data Transmission Scheme for Energy Efficient Harvesting
Authors:
Rafaela Scaciota,
Glauber Brante,
Richard Souza,
Onel Lopez,
Septimia Sarbu,
Mehdi Bennis,
Sumudu Samarakoon
Abstract:
The evolving landscape of the Internet of Things (IoT) has given rise to a pressing need for an efficient communication scheme. As the IoT user ecosystem continues to expand, traditional communication protocols grapple with substantial challenges in meeting its burgeoning demands, including energy consumption, scalability, data management, and interference. In response to this, the integration of…
▽ More
The evolving landscape of the Internet of Things (IoT) has given rise to a pressing need for an efficient communication scheme. As the IoT user ecosystem continues to expand, traditional communication protocols grapple with substantial challenges in meeting its burgeoning demands, including energy consumption, scalability, data management, and interference. In response to this, the integration of wireless power transfer and data transmission has emerged as a promising solution. This paper considers an energy harvesting (EH)-oriented data transmission scheme, where a set of users are charged by their own multi-antenna power beacon (PB) and subsequently transmits data to a base station (BS) using an irregular slotted aloha (IRSA) channel access protocol. We propose a closed-form expression to model energy consumption for the present scheme, employing average channel state information (A-CSI) beamforming in the wireless power channel. Subsequently, we employ the reinforcement learning (RL) methodology, wherein every user functions as an agent tasked with the goal of uncovering their most effective strategy for replicating transmissions. This strategy is devised while factoring in their energy constraints and the maximum number of packets they need to transmit. Our results underscore the viability of this solution, particularly when the PB can be strategically positioned to ensure a strong line-of-sight connection with the user, highlighting the potential benefits of optimal deployment.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Coordinated Pilot Transmissions for Detecting the Signal Sparsity Level in a Massive IoT Network under Rayleigh Fading
Authors:
Onel L. A. López,
Glauber Brante,
Richard D. Souza,
Markku Juntti,
Matti Latva-aho
Abstract:
Grant-free protocols exploiting compressed sensing (CS) multi-user detection (MUD) are appealing for solving the random access problem in massive machine-type communications (mMTC) with sporadic device activity. Such protocols would greatly benefit from a prior deterministic knowledge of the sparsity level, i.e., instantaneous number of simultaneously active devices $K$. Aiming at this, herein we…
▽ More
Grant-free protocols exploiting compressed sensing (CS) multi-user detection (MUD) are appealing for solving the random access problem in massive machine-type communications (mMTC) with sporadic device activity. Such protocols would greatly benefit from a prior deterministic knowledge of the sparsity level, i.e., instantaneous number of simultaneously active devices $K$. Aiming at this, herein we introduce a framework relying on coordinated pilot transmissions (CPT) over a short phase at the beginning of the transmission block for detecting $K$ in mMTC scenarios under Rayleigh fading. CPT can be implemented either as: i) U-CPT, which exploits only uplink transmissions, or A-CPT, which includes also downlink transmissions for channel state information (CSI) acquisition that resolve fading uncertainty. We discuss two specific implementations of A-CPT: ii) A-CPT-F, which implements CSI-based phase corrections while leveraging the same statistical inverse power control used by U-CPT, and iii) A-CPT-D, which implements a dynamic CSI-based inverse power control, although it requires some active devices to remain in silence if their corresponding channels are too faded. We derive a signal sparsity level detector for each CPT mechanism by relaxing the original integer detection/classification problem to an estimation problem in the continuous real domain followed by a rounding operation. We show that the variance of the relaxed estimator increases with $K^2$ and $K$ when operating with U-CPT and A-CPT mechanisms, respectively. The distribution of the estimators under U-CPT, A-CPT-F and A-CPT-D is found to follow an exponential, Gaussian, and Student's $t-$like distribution, respectively. Analyses evince the superiority of A-CPT-D, which is also corroborated via numerical results. We reveal several interesting trade-offs and highlight potential research directions.
△ Less
Submitted 1 May, 2022;
originally announced May 2022.
-
Exploring the Non-Overlapping Visibility Regions in XL-MIMO Random Access Protocol
Authors:
José Carlos Marinello Filho,
Glauber Brante,
Richard Demo Souza,
Taufik Abrão
Abstract:
The recent extra-large scale massive multiple-input multiple-output (XL-MIMO) systems are seen as a promising technology for providing very high data rates in increased user-density scenarios. Spatial non-stationarities and visibility regions (VRs) appear across the XL-MIMO array since its large dimension is of the same order as the distances to the user-equipments (UEs). Due to the increased dens…
▽ More
The recent extra-large scale massive multiple-input multiple-output (XL-MIMO) systems are seen as a promising technology for providing very high data rates in increased user-density scenarios. Spatial non-stationarities and visibility regions (VRs) appear across the XL-MIMO array since its large dimension is of the same order as the distances to the user-equipments (UEs). Due to the increased density of UEs in typical applications of XL-MIMO systems and the scarcity of pilots, the design of random access (RA) protocols and scheduling algorithms become challenging. In this paper, we propose a joint RA and scheduling protocol, namely non-overlapping VR XL- MIMO (NOVR-XL) RA protocol, which takes advantage of the different VRs of the UEs for improving RA performance, besides seeking UEs with non-overlapping VRs to be scheduled in the same payload data pilot resource. Our results reveal that the proposed scheme achieves significant gains in terms of sum rate compared with traditional RA schemes, as well as reducing access latency and improving connectivity performance as a whole.
△ Less
Submitted 19 July, 2021;
originally announced July 2021.
-
Two-Stage Channel Estimation for Hybrid RIS Assisted MIMO Systems
Authors:
Rafaela Schroeder,
Jiguang He,
Glauber Brante,
Markku Juntti
Abstract:
Reconfigurable intelligent surfaces (RISs) have been proposed as a key enabler to improve the coverage of the signals and mitigate the frequent blockages in millimeter wave (mmWave) multiple-input multiple-output (MIMO) communications. However, the channel state information (CSI) acquisition is one of the major challenges for the practical deployment of the RIS. The passive RIS without any baseban…
▽ More
Reconfigurable intelligent surfaces (RISs) have been proposed as a key enabler to improve the coverage of the signals and mitigate the frequent blockages in millimeter wave (mmWave) multiple-input multiple-output (MIMO) communications. However, the channel state information (CSI) acquisition is one of the major challenges for the practical deployment of the RIS. The passive RIS without any baseband processing capabilities brings difficulty on the channel estimation (CE), since the individual channels or the cascaded one can be estimated only at base station (BS) via uplink training or mobile station (MS) via downlink training. In order to facilitate the CSI acquisition, we focus on the hybrid RIS architecture, where a small number of elements are active and able to receive and process the pilot signals at the RIS. The CE is performed in two stages by following the atomic norm minimization to recover the channel parameters, i.e., angles of departure (AoDs), angles of arrival (AoAs), and propagation path gains. Simulation results show that the proposed scheme can outperform the passive RIS CE under the same training overhead. Furthermore, we also study the theoretical performance limits in terms of mean square error (MSE) via Cramér-Rao lower bound (CRLB) analyses.
△ Less
Submitted 15 July, 2021;
originally announced July 2021.
-
Network-Coded Cooperative LoRa Network with D2D Communication
Authors:
L. H. O. Alves,
J. L. Rebelatto,
R. D. Souza,
G. Brante
Abstract:
We evaluate the outage probability and the energy efficiency (EE) of a LoRa network when the end-devices (EDs) are capable of exchanging messages with a device-to-device (D2D) technology. Our proposal is to assess the performance of the network when operating under the concept of network-coded cooperation (NCC), where the EDs are capable of transmitting linear combinations of more than one frame (…
▽ More
We evaluate the outage probability and the energy efficiency (EE) of a LoRa network when the end-devices (EDs) are capable of exchanging messages with a device-to-device (D2D) technology. Our proposal is to assess the performance of the network when operating under the concept of network-coded cooperation (NCC), where the EDs are capable of transmitting linear combinations of more than one frame (including frames of another ED), performed over a non-binary finite field. We consider both connection and collision probabilities when modelling the outage probability of an ED, as well as a realistic power consumption model to evaluate the EE. Our results indicate that the proposed scheme, which we refer to as NCC-LoRa, provides considerable gains in terms of both outage probability and EE when compared to a regular LoRa network, even when considering the additional consumption of D2D communication.
△ Less
Submitted 7 December, 2021; v1 submitted 6 July, 2021;
originally announced July 2021.
-
Maximum Secrecy Throughput of MIMOME FSO Communications with Outage Constraints
Authors:
Marcos Eduardo Pivaro Monteiro,
João Luiz Rebelatto,
Glauber Brante,
Richard Demo Souza
Abstract:
In this work, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of Free-Space Optical (FSO) communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors. Two different schemes are considered depending on the availability of channel state information (CSI) at Alice: i) the adaptive scheme, where A…
▽ More
In this work, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of Free-Space Optical (FSO) communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors. Two different schemes are considered depending on the availability of channel state information (CSI) at Alice: i) the adaptive scheme, where Alice possesses the instantaneous CSI with respect to Bob; ii) the fixed-rate scheme, where such information is not available at Alice. The performance of the aforementioned schemes is evaluated in terms of a recently proposed metric named effective secrecy throughput (EST), which encompasses both the reliability and secrecy constraints. By constraining the system to operate below a given maximum allowed secrecy outage probability, we evaluate the EST analytically and through numerical results, showing that the use of multiple apertures at Alice is very important towards achieving the optimal EST.
△ Less
Submitted 7 March, 2018; v1 submitted 4 September, 2017;
originally announced September 2017.
-
On the Secure Energy Efficiency of TAS/MRC with Relaying and Jamming Strategies (Extended Version)
Authors:
Jamil Farhat,
Glauber Brante,
Richard Demo Souza
Abstract:
In this paper we investigate the secure energy efficiency (SEE) in a cooperative scenario where all nodes are equipped with multiple antennas. Moreover, we employ secrecy rate and power allocation at Alice and at the relay in order to maximize the SEE, subjected to a constraint in terms of a minimal required secrecy outage probability. Only the channel state information (CSI) with respect to the l…
▽ More
In this paper we investigate the secure energy efficiency (SEE) in a cooperative scenario where all nodes are equipped with multiple antennas. Moreover, we employ secrecy rate and power allocation at Alice and at the relay in order to maximize the SEE, subjected to a constraint in terms of a minimal required secrecy outage probability. Only the channel state information (CSI) with respect to the legitimate nodes is available. Then, we compare the Artificial-Noise (AN) scheme with CSI-Aided Decode-and-Forward (CSI-DF), which exploits the CSI to choose the best communication path (direct or cooperative). Our results show that CSI-DF outperforms AN in terms of SEE in most scenarios, except when Eve is closer to the relay or with the increase of antennas at Eve. Additionally, we also show that the maximization of SEE implies in an optimal number of antennas to be used at each node, which is due to the trade-off between secure throughput and power consumption.
△ Less
Submitted 12 June, 2017;
originally announced June 2017.
-
Employing Antenna Selection to Improve Energy-Efficiency in Massive MIMO Systems
Authors:
Masoud Arash,
Ehsan Yazdian,
Mohammad sadegh Fazel,
Glauber Brante,
Muhammad Imran
Abstract:
Massive MIMO systems promise high data rates by employing large number of antennas, which also increases the power usage of the system as a consequence. This creates an optimization problem which specifies how many antennas the system should employ in order to operate with maximal energy efficiency. Our main goal is to consider a base station with a fixed number of antennas, such that the system c…
▽ More
Massive MIMO systems promise high data rates by employing large number of antennas, which also increases the power usage of the system as a consequence. This creates an optimization problem which specifies how many antennas the system should employ in order to operate with maximal energy efficiency. Our main goal is to consider a base station with a fixed number of antennas, such that the system can operate with a smaller subset of antennas according to the number of active user terminals, which may vary over time. Thus, in this paper we propose an antenna selection algorithm which selects the best antennas according to the better channel conditions with respect to the users, aiming at improving the overall energy efficiency. Then, due to the complexity of the mathematical formulation, a tight approximation for the consumed power is presented, using the Wishart theorem, and it is used to find a deterministic formulation for the energy efficiency. Simulation results show that the approximation is quite tight and that there is significant improvement in terms of energy efficiency when antenna selection is employed.
△ Less
Submitted 14 June, 2017; v1 submitted 3 January, 2017;
originally announced January 2017.
-
On the Performance of Secure Full-Duplex Relaying under Composite Fading Channels
Authors:
Hirley Alves,
Glauber Brante,
Richard D. Souza,
Daniel B. da Costa,
Matti Latva-aho
Abstract:
We assume a full-duplex (FD) cooperative network subject to hostile attacks and undergoing composite fading channels. We focus on two scenarios: \textit{a)} the transmitter has full CSI, for which we derive closed-form expressions for the \textit{average secrecy rate}; and \textit{b)} the transmitter only knows the CSI of the legitimate nodes, for which we obtain closed-form expressions for the \t…
▽ More
We assume a full-duplex (FD) cooperative network subject to hostile attacks and undergoing composite fading channels. We focus on two scenarios: \textit{a)} the transmitter has full CSI, for which we derive closed-form expressions for the \textit{average secrecy rate}; and \textit{b)} the transmitter only knows the CSI of the legitimate nodes, for which we obtain closed-form expressions for the \textit{secrecy outage probability}. We show that secure FD relaying is feasible, even under strong self-interference and in the presence of sophisticated multiple antenna eavesdropper.
△ Less
Submitted 21 November, 2014; v1 submitted 14 November, 2014;
originally announced November 2014.