-
Dominance of Smartphone Exposure in 5G Mobile Networks
Authors:
Luca Chiaraviglio,
Chiara Lodovisi,
Stefania Bartoletti,
Ahmed Elzanaty,
Mohamed-Slim Alouini
Abstract:
The deployment of 5G networks is sometimes questioned due to the impact of ElectroMagnetic Field (EMF) generated by Radio Base Station (RBS) on users. The goal of this work is to analyze such issue from a novel perspective, by comparing RBS EMF against exposure generated by 5G smartphones in commercial deployments. The measurement of exposure from 5G is hampered by several implementation aspects,…
▽ More
The deployment of 5G networks is sometimes questioned due to the impact of ElectroMagnetic Field (EMF) generated by Radio Base Station (RBS) on users. The goal of this work is to analyze such issue from a novel perspective, by comparing RBS EMF against exposure generated by 5G smartphones in commercial deployments. The measurement of exposure from 5G is hampered by several implementation aspects, such as dual connectivity between 4G and 5G, spectrum fragmentation, and carrier aggregation. To face such issues, we deploy a novel framework, called 5G-EA, tailored to the assessment of smartphone and RBS exposure through an innovative measurement algorithm, able to remotely control a programmable spectrum analyzer. Results, obtained in both outdoor and indoor locations, reveal that smartphone exposure (upon generation of uplink traffic) dominates over the RBS one. Moreover, Line-of-Sight locations experience a reduction of around one order of magnitude on the overall exposure compared to Non-Line-of-Sight ones. In addition, 5G exposure always represents a small share (up to 38%) compared to the total one radiated by the smartphone.
△ Less
Submitted 2 March, 2023; v1 submitted 2 November, 2022;
originally announced November 2022.
-
Adaptive Repetitions Strategies in IEEE 802.11bd
Authors:
Wu Zhuofei,
Stefania Bartoletti,
Vincent Martinez,
Alessandro Bazzi
Abstract:
A new backward compatible WiFi amendment is under development by the IEEE bd Task Group towards the so-called IEEE 802.11bd, which includes the possibility to transmit up to three repetitions of the same packet. This feature increases time diversity and enables the use of maximum ratio combining (MRC) at the receiver to improve the probability of correct decoding. In this work, we first investigat…
▽ More
A new backward compatible WiFi amendment is under development by the IEEE bd Task Group towards the so-called IEEE 802.11bd, which includes the possibility to transmit up to three repetitions of the same packet. This feature increases time diversity and enables the use of maximum ratio combining (MRC) at the receiver to improve the probability of correct decoding. In this work, we first investigate the packet repetition feature and analyze how it looses its efficacy increasing the traffic as an higher number of transmissions may augment the channel load and collision probability. Then, we propose two strategies for adaptively selecting the number of transmissions leveraging on an adapted version of the channel busy ratio (CBR), which is measured at the transmitter and is an indicator of the channel load. The proposed strategies are validated through network-level simulations that account for both the acquisition and decoding processes. Results show that the proposed strategies ensure that devices use optimal settings under variable traffic conditions.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
A Methodology for Abstracting the Physical Layer of Direct V2X Communications Technologies
Authors:
Wu Zhuofei,
Stefania Bartoletti,
Vincent Martinez,
Alessandro Bazzi
Abstract:
Recent advancements in V2X communications have greatly increased the flexibility of the physical and medium access control (MAC) layers. This increases the complexity when investigating the system from a network perspective to evaluate the performance of the supported applications. Such flexibility needs in fact to be taken into account through a cross-layer approach, which might lead to challengi…
▽ More
Recent advancements in V2X communications have greatly increased the flexibility of the physical and medium access control (MAC) layers. This increases the complexity when investigating the system from a network perspective to evaluate the performance of the supported applications. Such flexibility needs in fact to be taken into account through a cross-layer approach, which might lead to challenging evaluation processes. As an accurate simulation of the signals appears unfeasible, a typical solution is to rely on simple models for incorporating the physical layer of the supported technologies, based on off-line measurements or accurate link-level simulations. Such data is however limited to a subset of possible configurations and extending them to others is costly when not even impossible. The goal of this paper is to develop a new approach for modelling the physical layer of vehicle-to-everything (V2X) communications that can be extended to a wide range of configurations without leading to extensive measurement or simulation campaign at the link layer. In particular, given a scenario and starting from results in terms of packet error rate (PER) vs. signal-to-interference-plus-noise ratio (SINR) related to a subset of possible configurations, we derive one parameter, called implementation loss, that is then used to evaluate the network performance under any configuration in the same scenario. The proposed methodology, leading to a good trade-off among complexity, generality, and accuracy of the performance evaluation process, has been validated through extensive simulations with both IEEE 802.11p and LTE-V2X sidelink technologies in various scenarios.
△ Less
Submitted 24 October, 2022; v1 submitted 31 March, 2022;
originally announced March 2022.
-
Performance Analysis of IEEE 802.11p Preamble Insertion in C-V2X Sidelink Signals for Co-Channel Coexistence
Authors:
Alessandro Bazzi,
Stefania Bartoletti,
Alberto Zanella,
Vincent Martinez
Abstract:
Spectrum scarcity is one of the main challenges of future wireless technologies. When looking at vehicle-to-everything (V2X), this is amplified as spectrum sharing could impact road safety and traffic efficiency. It is therefore of particular importance to study solutions that allow the coexistence, in the same geographical area and in the same channels, of what are today the main V2X access techn…
▽ More
Spectrum scarcity is one of the main challenges of future wireless technologies. When looking at vehicle-to-everything (V2X), this is amplified as spectrum sharing could impact road safety and traffic efficiency. It is therefore of particular importance to study solutions that allow the coexistence, in the same geographical area and in the same channels, of what are today the main V2X access technologies, namely IEEE 802.11p and sidelink LTE-V2X Mode 4. In this work, in addition to investigating the impact of the reciprocal interference, which we demonstrate to have a strong impact especially on the first and in congested channel conditions, a mitigation solution is extensively studied, which is based on the insertion of the IEEE 802.11p preamble at the beginning of the LTE-V2X sidelink transmission. The proposal, which is also under discussion within the standardization bodies, requires no modifications to the IEEE 802.11p protocol stack and minor changes to LTE-V2X sidelink. This solution is directly applicable to upcoming IEEE 802.11bd and extendable to NR-V2X sidelink. The paper shows, through analysis and simulations in free-flow and dense scenarios, that the proposal allows for a mitigation of collisions caused by co-channel coexistence under low to high-load channel conditions and that the improvement is also granted in congested cases when combined with additional countermeasures. Regarding the latter aspect, in particular, different approaches are compared, demonstrating that acting on the congestion control mechanisms is a simple but effective solution.
△ Less
Submitted 6 April, 2022; v1 submitted 18 January, 2022;
originally announced January 2022.
-
Design and Experimental Assessment of Detection Schemes for Air Interface Attacks in Adverse Scenarios
Authors:
Danilo Orlando,
Ivan Palamà ,
Stefania Bartoletti,
Giuseppe Bianchi,
Nicola Blefari Melazzi
Abstract:
In this letter, we propose three schemes designed to detect attacks over the air interface in cellular networks. These decision rules rely on the generalized likelihood ratio test, and are fed by data that can be acquired using common off-the-shelf receivers. In addition to more classical (barrage/smart) noise jamming attacks, we further assess the capability of the proposed schemes to detect the…
▽ More
In this letter, we propose three schemes designed to detect attacks over the air interface in cellular networks. These decision rules rely on the generalized likelihood ratio test, and are fed by data that can be acquired using common off-the-shelf receivers. In addition to more classical (barrage/smart) noise jamming attacks, we further assess the capability of the proposed schemes to detect the stealthy activation of a rogue base station. The evaluation is carried out through an experimentation of a LTE system concretely reproduced using Software-Defined Radios. Illustrative examples confirm that the proposed schemes can effectively detect air interface threats with high probability.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
Anomaly Detection Algorithms for Location Security in 5G Scenarios
Authors:
Stefania Bartoletti,
Ivan Palamà ,
Danilo Orlando,
Giuseppe Bianchi,
Nicola Blefari Melazzi
Abstract:
Location based services are expected to play a major role in future generation cellular networks, starting from the incoming 5G systems. At the same time, localization technologies may be severely affected by attackers capable to deploy low cost fake base stations and use them to alter localization signals. In this paper, we concretely focus on two classes of threats: noise-like jammers, whose obj…
▽ More
Location based services are expected to play a major role in future generation cellular networks, starting from the incoming 5G systems. At the same time, localization technologies may be severely affected by attackers capable to deploy low cost fake base stations and use them to alter localization signals. In this paper, we concretely focus on two classes of threats: noise-like jammers, whose objective is to reduce the signal-to-noise ratio, and spoofing/meaconing attacks, whose objective is to inject false or erroneous information into the receiver. Then, we formulate the detection problems as binary hypothesis tests and solve them resorting to the generalized likelihood ratio test design procedure as well as the Latent Variable Models, which involves the expectation-maximization algorithm to estimate the unknown data distribution parameters. The proposed techniques can be applied to a large class of location data regardless the subsumed network architecture. The performance analysis is conducted over simulated data generated by using measurement models from the literature and highlights the effectiveness of the proposed approaches in detecting the aforementioned classes of attacks.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Pencil Beamforming Increases Human Exposure to ElectroMagnetic Fields: True or False?
Authors:
Luca Chiaraviglio,
Simone Rossetti,
Sara Saida,
Stefania Bartoletti,
Nicola Blefari-Melazzi
Abstract:
According to a very popular belief - very widespread among non-scientific communities - the exploitation of narrow beams, a.k.a. "pencil beamforming", results in a prompt increase of exposure levels radiated by 5G Base Stations (BSs). To face such concern with a scientific approach, in this work we propose a novel localization-enhanced pencil beamforming technique, in which the traffic beams are t…
▽ More
According to a very popular belief - very widespread among non-scientific communities - the exploitation of narrow beams, a.k.a. "pencil beamforming", results in a prompt increase of exposure levels radiated by 5G Base Stations (BSs). To face such concern with a scientific approach, in this work we propose a novel localization-enhanced pencil beamforming technique, in which the traffic beams are tuned in accordance with the uncertainty localization levels of User Equipment (UE). Compared to currently deployed beamforming techniques, which generally employ beams of fixed width, we exploit the localization functionality made available by the 5G architecture to synthesize the direction and the width of each pencil beam towards each served UE. We then evaluate the effectiveness of pencil beamforming in terms of ElectroMagnetic Field (EMF) exposure and UE throughput levels over different realistic case-studies. Results, obtained from a publicly released open-source simulator, dispel the myth: the adoption of localization-enhanced pencil beamforming triggers a prompt reduction of exposure w.r.t. other alternative techniques, which include e.g., beams of fixed width and cellular coverage not exploiting beamforming. The EMF reduction is achieved not only for the UE that are served by the pencil beams, but also over the whole territory (including the locations in proximity to the 5G BS). In addition, large throughput levels - adequate for most of 5G services - can be guaranteed when each UE is individually served by one dedicated beam.
△ Less
Submitted 21 January, 2021; v1 submitted 30 October, 2020;
originally announced October 2020.