-
Theoretical and Experimental Assessment of Large Beam Codebook at mmWave Devices: How Much is Enough?
Authors:
Bora Bozkurt,
Hasan Atalay Gunel,
Mohaned Chraiti,
Ibrahim Hokelek,
Ali Gorcin,
Ali Ghrayeb
Abstract:
Modern millimeter wave (mmWave) transceivers come with a large number of antennas, each of which can support thousands of phase shifter configurations. This capability enables beam sweeping with fine angular resolution, but results in large codebook sizes that can span more than six orders of magnitude. On the other hand, the mobility of user terminals and their randomly changing orientations requ…
▽ More
Modern millimeter wave (mmWave) transceivers come with a large number of antennas, each of which can support thousands of phase shifter configurations. This capability enables beam sweeping with fine angular resolution, but results in large codebook sizes that can span more than six orders of magnitude. On the other hand, the mobility of user terminals and their randomly changing orientations require constantly adjusting the beam direction. A key focus of recent research has been on the design of beam sweeping codebooks that balance a trade-off between the achievable gain and the beam search time, governed by the codebook size. In this paper, we investigate the extent to which a large codebook can be reduced to fewer steering vectors while covering the entire angular space and maintaining performance close to the maximum array gain. We derive a closed-form expression for the angular coverage range of a steering vector, subject to maintaining a gain loss within \(γ\) dB (e.g., 2\, dB) with respect to the maximum gain achieved by an infinitely large codebook. We demonstrate, both theoretically and experimentally, that a large beam-steering codebooks (such as the \(1024^{16}\) set considered in our experiment) can be reduced to just a few steering vectors. This framework serves as a proof that only a few steering vectors are sufficient to achieve near-maximum gain, challenging the common belief that a large codebook with fine angular resolution is essential to fully reap the benefits of an antenna array.
△ Less
Submitted 14 May, 2025;
originally announced May 2025.
-
On the Secrecy-Sensing Optimization of RIS-assisted Full-Duplex Integrated Sensing and Communication Network
Authors:
Elmehdi Illi,
Ahmad Bazzi,
Marwa Qaraqe,
Ali Ghrayeb
Abstract:
Integrated sensing and communication (ISAC) has recently emerged as a viable technique for establishing sensing and communication using the same resources. Nonetheless, the operation of ISAC networks is often challenged by the absence of a direct link between the sensing node and the targets, and by the risk of disclosing confidential data to malicious targets when using the same signal for both t…
▽ More
Integrated sensing and communication (ISAC) has recently emerged as a viable technique for establishing sensing and communication using the same resources. Nonetheless, the operation of ISAC networks is often challenged by the absence of a direct link between the sensing node and the targets, and by the risk of disclosing confidential data to malicious targets when using the same signal for both tasks. In this paper, a robust reconfigurable intelligent surface (RIS)-aided scheme for securing a full-duplex (FD) ISAC network is proposed. The considered network consists of uplink and downlink users served in FD through a multi-antenna dual-functional radar communication base station (BS), which employs co-located multi-antenna communication-radar arrays to detect multiple malicious targets while preserving communication secrecy in their presence. Additionally, the BS utilizes an optimized artificial noise (AN) that serves to disrupt the malicious targets' reception and increase the sensing power. By optimally designing the RIS phase shifts, transmit beamforming, AN covariance, and uplink users' transmit power and combining vectors using an alternating optimization-based algorithm, the network's sensing performance is maximized under secrecy and total power constraints. Numerical results present the proposed scheme's efficacy, particularly when a direct link between the BS and the various nodes/targets is absent.
△ Less
Submitted 29 April, 2025;
originally announced April 2025.
-
VMGuard: Reputation-Based Incentive Mechanism for Poisoning Attack Detection in Vehicular Metaverse
Authors:
Ismail Lotfi,
Marwa Qaraqe,
Ali Ghrayeb,
Dusit Niyato
Abstract:
The vehicular Metaverse represents an emerging paradigm that merges vehicular communications with virtual environments, integrating real-world data to enhance in-vehicle services. However, this integration faces critical security challenges, particularly in the data collection layer where malicious sensing IoT (SIoT) devices can compromise service quality through data poisoning attacks. The securi…
▽ More
The vehicular Metaverse represents an emerging paradigm that merges vehicular communications with virtual environments, integrating real-world data to enhance in-vehicle services. However, this integration faces critical security challenges, particularly in the data collection layer where malicious sensing IoT (SIoT) devices can compromise service quality through data poisoning attacks. The security aspects of the Metaverse services should be well addressed both when creating the digital twins of the physical systems and when delivering the virtual service to the vehicular Metaverse users (VMUs). This paper introduces vehicular Metaverse guard (VMGuard), a novel four-layer security framework that protects vehicular Metaverse systems from data poisoning attacks. Specifically, when the virtual service providers (VSPs) collect data about physical environment through SIoT devices in the field, the delivered content might be tampered. Malicious SIoT devices with moral hazard might have private incentives to provide poisoned data to the VSP to degrade the service quality (QoS) and user experience (QoE) of the VMUs. The proposed framework implements a reputation-based incentive mechanism that leverages user feedback and subjective logic modeling to assess the trustworthiness of participating SIoT devices. More precisely, the framework entails the use of reputation scores assigned to participating SIoT devices based on their historical engagements with the VSPs. Ultimately, we validate our proposed model using comprehensive simulations. Our key findings indicate that our mechanism effectively prevents the initiation of poisoning attacks by malicious SIoT devices. Additionally, our system ensures that reliable SIoT devices, previously missclassified, are not barred from participating in future rounds of the market.
△ Less
Submitted 5 December, 2024;
originally announced December 2024.
-
Enhancing Trust and Security in the Vehicular Metaverse: A Reputation-Based Mechanism for Participants with Moral Hazard
Authors:
Ismail Lotfi,
Marwa Qaraqe,
Ali Ghrayeb,
Niyato Dusit
Abstract:
In this paper, we tackle the issue of moral hazard within the realm of the vehicular Metaverse. A pivotal facilitator of the vehicular Metaverse is the effective orchestration of its market elements, primarily comprised of sensing internet of things (SIoT) devices. These SIoT devices play a critical role by furnishing the virtual service provider (VSP) with real-time sensing data, allowing for the…
▽ More
In this paper, we tackle the issue of moral hazard within the realm of the vehicular Metaverse. A pivotal facilitator of the vehicular Metaverse is the effective orchestration of its market elements, primarily comprised of sensing internet of things (SIoT) devices. These SIoT devices play a critical role by furnishing the virtual service provider (VSP) with real-time sensing data, allowing for the faithful replication of the physical environment within the virtual realm. However, SIoT devices with intentional misbehavior can identify a loophole in the system post-payment and proceeds to deliver falsified content, which cause the whole vehicular Metaverse to collapse. To combat this significant problem, we propose an incentive mechanism centered around a reputation-based strategy. Specifically, the concept involves maintaining reputation scores for participants based on their interactions with the VSP. These scores are derived from feedback received by the VSP from Metaverse users regarding the content delivered by the VSP and are managed using a subjective logic model. Nevertheless, to prevent ``good" SIoT devices with false positive ratings to leave the Metaverse market, we build a vanishing-like system of previous ratings so that the VSP can make informed decisions based on the most recent and accurate data available. Finally, we validate our proposed model through extensive simulations. Our primary results show that our mechanism can efficiently prevent malicious devices from starting their poisoning attacks. At the same time, trustworthy SIoT devices that had a previous miss-classification are not banned from the market.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
On Optimizing the Power Allocation and the Decoding Order in Uplink Cooperative NOMA
Authors:
Mohamed Elhattab,
Mohamed Amine Arfaoui,
Chadi Assi,
Ali Ghrayeb,
Marwa Qaraqe
Abstract:
In this paper, we investigate for the first time the dynamic power allocation and decoding order at the base station (BS) of two-user uplink (UL) cooperative non-orthogonal multiple access (C-NOMA)-based cellular networks. In doing so, we formulate a joint optimization problem aiming at maximizing the minimum user achievable rate, which is a non-convex optimization problem and hard to be directly…
▽ More
In this paper, we investigate for the first time the dynamic power allocation and decoding order at the base station (BS) of two-user uplink (UL) cooperative non-orthogonal multiple access (C-NOMA)-based cellular networks. In doing so, we formulate a joint optimization problem aiming at maximizing the minimum user achievable rate, which is a non-convex optimization problem and hard to be directly solved. To tackle this issue, an iterative algorithm based on successive convex approximation (SCA) is proposed. The numerical results reveal that the proposed scheme provides superior performance in comparison with the traditional UL NOMA. In addition, we demonstrated that in UL C-NOMA, decoding the far NOMA user first at the BS provides the best performance.
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
A Low-Complexity Framework for Joint User Pairing and Power Control for Cooperative NOMA in 5G and Beyond Cellular Networks
Authors:
Phuc Dinh,
Mohamed Amine Arfaoui,
Sanaa Sharafeddine,
Chadi Assi,
Ali Ghrayeb
Abstract:
This paper investigates the performance of cooperative non-orthogonal multiple access (C-NOMA) in a cellular downlink system. The system model consists of a base station (BS) serving multiple users, where users with good channel quality can assist the transmissions between the BS and users with poor channel quality through either half-duplex (HD) or full-duplex (FD) device-to-device (D2D) communic…
▽ More
This paper investigates the performance of cooperative non-orthogonal multiple access (C-NOMA) in a cellular downlink system. The system model consists of a base station (BS) serving multiple users, where users with good channel quality can assist the transmissions between the BS and users with poor channel quality through either half-duplex (HD) or full-duplex (FD) device-to-device (D2D) communications. We formulate and solve a novel optimization problem that jointly determines the optimal D2D user pairing and the optimal power control scheme, where the objective is maximizing the achievable sum rate of the whole system while guaranteeing a certain quality of service (QoS) for all users. The formulated problem is a mixed-integer non-linear program (MINLP) which is generally NPhard. To overcome this issue, we reconstruct the original problem into a bi-level optimization problem that can be decomposed into two sub-problems to be solved independently. The outer problem is a linear assignment problem which can be efficiently handled by the well-known Hungarian method. The inner problem is still a non-convex optimization problem for which finding the optimal solution is challenging. However, we derive the optimal power control policies for both the HD and the FD schemes in closedform expressions, which makes the computational complexity of the inner problems polynomial for every possible pairing configurations. These findings solve ultimately the original MILNP in a timely manner that makes it suitable for real-time and low latency applications. Our simulation results show that the proposed framework outperforms a variety of proposed schemes in the literature and that it can obtain the optimal pairing and power control policies for a network with 100 users in a negligible computational time.
△ Less
Submitted 14 February, 2020;
originally announced February 2020.
-
Beamforming Learning for mmWave Communication: Theory and Experimental Validation
Authors:
ohaned Chraiti,
Dmitry Chizhik,
Jinfeng Du,
Reinaldo A. Valenzuela,
Ali Ghrayeb,
Chadi Assi
Abstract:
To establish reliable and long-range millimeter-wave (mmWave) communication, beamforming is deemed to be a promising solution. Although beamforming can be done in the digital and analog domains, both approaches are hindered by several constraints when it comes to mmWave communications. For example, performing fully digital beamforming in mmWave systems involves using many radio frequency (RF) chai…
▽ More
To establish reliable and long-range millimeter-wave (mmWave) communication, beamforming is deemed to be a promising solution. Although beamforming can be done in the digital and analog domains, both approaches are hindered by several constraints when it comes to mmWave communications. For example, performing fully digital beamforming in mmWave systems involves using many radio frequency (RF) chains, which are expensive and consume high power. This necessitates finding more efficient ways for using fewer RF chains while taking advantage of the large antenna arrays. One way to overcome this challenge is to employ (partially or fully) analog beamforming through proper configuration of phase-shifters. Existing works on mmWave analog beam design either rely on the knowledge of the channel state information (CSI) per antenna within the array, require a large search time (e.g., exhaustive search) or do not guarantee a minimum beamforming gain (e.g., codebook based beamforming). In this paper, we propose a beam design technique that reduces the search time and does not require CSI while guaranteeing a minimum beamforming gain. The key idea derives from observations drawn from real-life measurements. It was observed that for a given propagation environment (e.g., coverage area of a mmWave BS) the azimuthal angles of dominant signals could be more probable from certain angles than others. Thus, pre-collected measurements could used to build a beamforming codebook that regroups the most probable beam designs. We invoke Bayesian learning for measurements clustering. We evaluate the efficacy of the proposed scheme in terms of building the codebook and assessing its performance through real-life measurements. We demonstrate that the training time required by the proposed scheme is only 5% of that of exhaustive search. This crucial gain is obtained while achieving a minimum targeted beamforming gain.
△ Less
Submitted 28 December, 2019;
originally announced December 2019.
-
On the Achievable Secrecy Diversity of Cooperative Networks with Untrusted Relays
Authors:
Mohaned Chraiti,
Ali Ghrayeb,
Chadi Assi,
Mazen O. Hasna
Abstract:
Cooperative relaying is often deployed to enhance the communication reliability (i.e., diversity order) and consequently the end-to-end achievable rate. However, this raises several security concerns when the relays are untrusted since they may have access to the relayed message. In this paper, we study the achievable secrecy diversity order of cooperative networks with untrusted relays. In partic…
▽ More
Cooperative relaying is often deployed to enhance the communication reliability (i.e., diversity order) and consequently the end-to-end achievable rate. However, this raises several security concerns when the relays are untrusted since they may have access to the relayed message. In this paper, we study the achievable secrecy diversity order of cooperative networks with untrusted relays. In particular, we consider a network with an N-antenna transmitter (Alice), K single-antenna relays, and a single-antenna destination (Bob). We consider the general scenario where there is no relation between N and K, and therefore K can be larger than N. Alice and Bob are assumed to be far away from each other, and all communication is done through the relays, i.e., there is no direct link. Providing secure communication while enhancing the diversity order has been shown to be very challenging. In fact, it has been shown in the literature that the maximum achievable secrecy diversity order for the adopted system model is one (while using artificial noise jamming). In this paper, we adopt a nonlinear interference alignment scheme that we have proposed recently to transmit the signals from Alice to Bob. We analyze the proposed scheme in terms of the achievable secrecy rate and secrecy diversity order. Assuming Gaussian inputs, we derive an explicit expression for the achievable secrecy rate and show analytically that a secrecy diversity order of up to min(N,K)-1 can be achieved using the proposed technique. We provide several numerical examples to validate the obtained analytical results and demonstrate the superiority of the proposed technique to its counterparts that exist in the literature.
△ Less
Submitted 12 January, 2017;
originally announced January 2017.
-
Nonlinear Interference Alignment in a One-dimensional Space
Authors:
Mohaned Chraiti,
Ali Ghrayeb,
Chadi Assi
Abstract:
Real interference alignment is efficient in breaking-up a one-dimensional space over time-invariant channels into fractional dimensions. As such, multiple symbols can be simultaneously transmitted with fractional degrees-of-freedom (DoF). Of particular interest is when the one dimensional space is partitioned into two fractional dimensions. In such scenario, the interfering signals are confined to…
▽ More
Real interference alignment is efficient in breaking-up a one-dimensional space over time-invariant channels into fractional dimensions. As such, multiple symbols can be simultaneously transmitted with fractional degrees-of-freedom (DoF). Of particular interest is when the one dimensional space is partitioned into two fractional dimensions. In such scenario, the interfering signals are confined to one sub-space and the intended signal is confined to the other sub-space. Existing real interference alignment schemes achieve near-capacity performance at high SNR for time-invariant channels. However, such techniques yield poor achievable rate at finite SNR, which is of interest from a practical point of view. In this paper, we propose a radically novel nonlinear interference alignment technique, which we refer to as Interference Dissolution (ID). ID allows to break-up a one-dimensional space into two fractional dimensions while achieving near-capacity performance for the entire SNR range. This is achieved by aligning signals by signals, as opposed to aligning signals by the channel. We introduce ID by considering a time-invariant MISO channel. This channel has a one-dimensional space and offers one DoF. We show that, by breaking-up the one dimensional space into two sub-spaces, ID achieves a rate of two symbols per channel use while providing $\frac{1}{2}$ DoF for each symbol. We analyze the performance of the proposed ID scheme in terms of the achievable rate and the symbol error rate. In characterizing the achievable rate of ID for the entire SNR range, we prove that, assuming Gaussian signals, the sum achievable rate is at most one bit away from the capacity. We present numerical examples to validate the theoretical analysis. We also compare the performance of ID in terms of the achievable rate performance to that of existing schemes and demonstrate ID's superiority.
△ Less
Submitted 5 August, 2016; v1 submitted 20 June, 2016;
originally announced June 2016.
-
A Stochastic Geometric Analysis of Device-to-Device Communications Operating over Generalized Fading Channels
Authors:
Young Jin Chun,
Simon L. Cotton,
Harpreet S. Dhillon,
Ali Ghrayeb,
Mazen O. Hasna
Abstract:
Device-to-device (D2D) communications are now considered as an integral part of future 5G networks which will enable direct communication between user equipment (UE) without unnecessary routing via the network infrastructure. This architecture will result in higher throughputs than conventional cellular networks, but with the increased potential for co-channel interference induced by randomly loca…
▽ More
Device-to-device (D2D) communications are now considered as an integral part of future 5G networks which will enable direct communication between user equipment (UE) without unnecessary routing via the network infrastructure. This architecture will result in higher throughputs than conventional cellular networks, but with the increased potential for co-channel interference induced by randomly located cellular and D2D UEs. The physical channels which constitute D2D communications can be expected to be complex in nature, experiencing both line-of-sight (LOS) and non-LOS (NLOS) conditions across closely located D2D pairs. As well as this, given the diverse range of operating environments, they may also be subject to clustering of the scattered multipath contribution, i.e., propagation characteristics which are quite dissimilar to conventional Rayeligh fading environments. To address these challenges, we consider two recently proposed generalized fading models, namely $κ-μ$ and $η-μ$, to characterize the fading behavior in D2D communications. Together, these models encompass many of the most widely encountered and utilized fading models in the literature such as Rayleigh, Rice (Nakagami-$n$), Nakagami-$m$, Hoyt (Nakagami-$q$) and One-Sided Gaussian. Using stochastic geometry we evaluate the rate and bit error probability of D2D networks under generalized fading conditions. Based on the analytical results, we present new insights into the trade-offs between the reliability, rate, and mode selection under realistic operating conditions. Our results suggest that D2D mode achieves higher rates over cellular link at the expense of a higher bit error probability. Through numerical evaluations, we also investigate the performance gains of D2D networks and demonstrate their superiority over traditional cellular networks.
△ Less
Submitted 10 May, 2016;
originally announced May 2016.
-
A Stochastic Geometry Based Approach to Modeling Interference Correlation in Cooperative Relay Networks
Authors:
Young Jin Chun,
Simon L. Cotton,
Mazen O. Hasna,
Ali Ghrayeb
Abstract:
Future wireless networks are expected to be a convergence of many diverse network technologies and architectures, such as cellular networks, wireless local area networks, sensor networks, and device to device communications. Through cooperation between dissimilar wireless devices, this new combined network topology promises to unlock ever larger data rates and provide truly ubiquitous coverage for…
▽ More
Future wireless networks are expected to be a convergence of many diverse network technologies and architectures, such as cellular networks, wireless local area networks, sensor networks, and device to device communications. Through cooperation between dissimilar wireless devices, this new combined network topology promises to unlock ever larger data rates and provide truly ubiquitous coverage for end users, as well as enabling higher spectral efficiency. However, it also increases the risk of co-channel interference and introduces the possibility of correlation in the aggregated interference that not only impacts the communication performance, but also makes the associated mathematical analysis much more complex. To address this problem and evaluate the communication performance of cooperative relay networks, we adopt a stochastic geometry based approach by assuming that the interfering nodes are randomly distributed according to a Poisson point process (PPP). We also use a random medium access protocol to counteract the effects of interference correlation. Using this approach, we derive novel closed-form expressions for the successful transmission probability and local delay of a relay network with correlated interference. As well as this, we find the optimal transmission probability $p$ that jointly maximizes the successful transmission probability and minimizes the local delay. Finally numerical results are provided to confirm that the proposed joint optimization strategy achieves a significant performance gain compared to a conventional scheme.
△ Less
Submitted 2 July, 2015;
originally announced July 2015.
-
On Modeling Heterogeneous Wireless Networks Using Non-Poisson Point Processes
Authors:
Young Jin Chun,
Mazen Omar Hasna,
Ali Ghrayeb,
Marco Di Renzo
Abstract:
Future wireless networks are required to support 1000 times higher data rate, than the current LTE standard. In order to meet the ever increasing demand, it is inevitable that, future wireless networks will have to develop seamless interconnection between multiple technologies. A manifestation of this idea is the collaboration among different types of network tiers such as macro and small cells, l…
▽ More
Future wireless networks are required to support 1000 times higher data rate, than the current LTE standard. In order to meet the ever increasing demand, it is inevitable that, future wireless networks will have to develop seamless interconnection between multiple technologies. A manifestation of this idea is the collaboration among different types of network tiers such as macro and small cells, leading to the so-called heterogeneous networks (HetNets). Researchers have used stochastic geometry to analyze such networks and understand their real potential. Unsurprisingly, it has been revealed that interference has a detrimental effect on performance, especially if not modeled properly. Interference can be correlated in space and/or time, which has been overlooked in the past. For instance, it is normally assumed that the nodes are located completely independent of each other and follow a homogeneous Poisson point process (PPP), which is not necessarily true in real networks since the node locations are spatially dependent. In addition, the interference correlation created by correlated stochastic processes has mostly been ignored. To this end, we take a different approach in modeling the interference where we use non-PPP, as well as we study the impact of spatial and temporal correlation on the performance of HetNets. To illustrate the impact of correlation on performance, we consider three case studies from real-life scenarios. Specifically, we use massive multiple-input multiple-output (MIMO) to understand the impact of spatial correlation; we use the random medium access protocol to examine the temporal correlation; and we use cooperative relay networks to illustrate the spatial-temporal correlation. We present several numerical examples through which we demonstrate the impact of various correlation types on the performance of HetNets.
△ Less
Submitted 20 June, 2015;
originally announced June 2015.
-
On the Construction of Skew Quasi-Cyclic Codes
Authors:
Taher Abualrub,
Ali Ghrayeb,
Nuh Aydin,
Irfan Siap
Abstract:
In this paper we study a special type of quasi-cyclic (QC) codes called skew QC codes. This set of codes is constructed using a non-commutative ring called the skew polynomial rings $F[x;θ]$. After a brief description of the skew polynomial ring $F[x;θ]$ it is shown that skew QC codes are left submodules of the ring $R_{s}^{l}=(F[x;θ]/(x^{s}-1))^{l}.$ The notions of generator and parity-check po…
▽ More
In this paper we study a special type of quasi-cyclic (QC) codes called skew QC codes. This set of codes is constructed using a non-commutative ring called the skew polynomial rings $F[x;θ]$. After a brief description of the skew polynomial ring $F[x;θ]$ it is shown that skew QC codes are left submodules of the ring $R_{s}^{l}=(F[x;θ]/(x^{s}-1))^{l}.$ The notions of generator and parity-check polynomials are given. We also introduce the notion of similar polynomials in the ring $F[x;θ]$ and show that parity-check polynomials for skew QC codes are unique up to similarity. Our search results lead to the construction of several new codes with Hamming distances exceeding the Hamming distances of the previously best known linear codes with comparable parameters.
△ Less
Submitted 13 September, 2008;
originally announced September 2008.