-
SANSee: A Physical-layer Semantic-aware Networking Framework for Distributed Wireless Sensing
Authors:
Huixiang Zhu,
Yong Xiao,
Yingyu Li,
Guangming Shi,
Marwan Krunz
Abstract:
Contactless device-free wireless sensing has recently attracted significant interest due to its potential to support a wide range of immersive human-machine interactive applications using ubiquitously available radio frequency (RF) signals. Traditional approaches focus on developing a single global model based on a combined dataset collected from different locations. However, wireless signals are…
▽ More
Contactless device-free wireless sensing has recently attracted significant interest due to its potential to support a wide range of immersive human-machine interactive applications using ubiquitously available radio frequency (RF) signals. Traditional approaches focus on developing a single global model based on a combined dataset collected from different locations. However, wireless signals are known to be location and environment specific. Thus, a global model results in inconsistent and unreliable sensing results. It is also unrealistic to construct individual models for all the possible locations and environmental scenarios. Motivated by the observation that signals recorded at different locations are closely related to a set of physical-layer semantic features, in this paper we propose SANSee, a semantic-aware networking-based framework for distributed wireless sensing. SANSee allows models constructed in one or a limited number of locations to be transferred to new locations without requiring any locally labeled data or model training. SANSee is built on the concept of physical-layer semantic-aware network (pSAN), which characterizes the semantic similarity and the correlations of sensed data across different locations. A pSAN-based zero-shot transfer learning solution is introduced to allow receivers in new locations to obtain location-specific models by directly aggregating the models trained by other receivers. We theoretically prove that models obtained by SANSee can approach the locally optimal models. Experimental results based on real-world datasets are used to verify that the accuracy of the transferred models obtained by SANSee matches that of the models trained by the locally labeled data based on supervised learning approaches.
△ Less
Submitted 15 October, 2024;
originally announced October 2024.
-
Filtered Randomized Smoothing: A New Defense for Robust Modulation Classification
Authors:
Wenhan Zhang,
Meiyu Zhong,
Ravi Tandon,
Marwan Krunz
Abstract:
Deep Neural Network (DNN) based classifiers have recently been used for the modulation classification of RF signals. These classifiers have shown impressive performance gains relative to conventional methods, however, they are vulnerable to imperceptible (low-power) adversarial attacks. Some of the prominent defense approaches include adversarial training (AT) and randomized smoothing (RS). While…
▽ More
Deep Neural Network (DNN) based classifiers have recently been used for the modulation classification of RF signals. These classifiers have shown impressive performance gains relative to conventional methods, however, they are vulnerable to imperceptible (low-power) adversarial attacks. Some of the prominent defense approaches include adversarial training (AT) and randomized smoothing (RS). While AT increases robustness in general, it fails to provide resilience against previously unseen adaptive attacks. Other approaches, such as Randomized Smoothing (RS), which injects noise into the input, address this shortcoming by providing provable certified guarantees against arbitrary attacks, however, they tend to sacrifice accuracy.
In this paper, we study the problem of designing robust DNN-based modulation classifiers that can provide provable defense against arbitrary attacks without significantly sacrificing accuracy. To this end, we first analyze the spectral content of commonly studied attacks on modulation classifiers for the benchmark RadioML dataset. We observe that spectral signatures of un-perturbed RF signals are highly localized, whereas attack signals tend to be spread out in frequency. To exploit this spectral heterogeneity, we propose Filtered Randomized Smoothing (FRS), a novel defense which combines spectral filtering together with randomized smoothing. FRS can be viewed as a strengthening of RS by leveraging the specificity (spectral Heterogeneity) inherent to the modulation classification problem. In addition to providing an approach to compute the certified accuracy of FRS, we also provide a comprehensive set of simulations on the RadioML dataset to show the effectiveness of FRS and show that it significantly outperforms existing defenses including AT and RS in terms of accuracy on both attacked and benign signals.
△ Less
Submitted 8 October, 2024;
originally announced October 2024.
-
Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Authors:
Bui Minh Tuan,
Diep N. Nguyen,
Nguyen Linh Trung,
Van-Dinh Nguyen,
Nguyen Van Huynh,
Dinh Thai Hoang,
Marwan Krunz,
Eryk Dutkiewicz
Abstract:
Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for friendly jamming (FJ), and/or additional computing resources at transceivers, e.g., cryptography-based solutions, which unfortunately may not be feasible i…
▽ More
Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for friendly jamming (FJ), and/or additional computing resources at transceivers, e.g., cryptography-based solutions, which unfortunately may not be feasible in practice. This challenge is even more acute in low-end IoT devices. We thus introduce a novel deep learning-based FJ framework that can effectively defeat eavesdropping attacks with imperfect CSI and even without CSI of legitimate channels. In particular, we first develop an autoencoder-based communication architecture with FJ, namely AEFJ, to jointly maximize the secrecy rate and minimize the block error rate at the receiver without requiring perfect CSI of the legitimate channels. In addition, to deal with the case without CSI, we leverage the mutual information neural estimation (MINE) concept and design a MINE-based FJ scheme that can achieve comparable security performance to the conventional FJ methods that require perfect CSI. Extensive simulations in a multiple-input multiple-output (MIMO) system demonstrate that our proposed solution can effectively deal with eavesdropping attacks in various settings. Moreover, the proposed framework can seamlessly integrate MIMO security and detection tasks into a unified end-to-end learning process. This integrated approach can significantly maximize the throughput and minimize the block error rate, offering a good solution for enhancing communication security in wireless communication systems.
△ Less
Submitted 27 October, 2024; v1 submitted 12 December, 2023;
originally announced December 2023.
-
RADIANCE: Radio-Frequency Adversarial Deep-learning Inference for Automated Network Coverage Estimation
Authors:
Sopan Sarkar,
Mohammad Hossein Manshaei,
Marwan Krunz
Abstract:
Radio-frequency coverage maps (RF maps) are extensively utilized in wireless networks for capacity planning, placement of access points and base stations, localization, and coverage estimation. Conducting site surveys to obtain RF maps is labor-intensive and sometimes not feasible. In this paper, we propose radio-frequency adversarial deep-learning inference for automated network coverage estimati…
▽ More
Radio-frequency coverage maps (RF maps) are extensively utilized in wireless networks for capacity planning, placement of access points and base stations, localization, and coverage estimation. Conducting site surveys to obtain RF maps is labor-intensive and sometimes not feasible. In this paper, we propose radio-frequency adversarial deep-learning inference for automated network coverage estimation (RADIANCE), a generative adversarial network (GAN) based approach for synthesizing RF maps in indoor scenarios. RADIANCE utilizes a semantic map, a high-level representation of the indoor environment to encode spatial relationships and attributes of objects within the environment and guide the RF map generation process. We introduce a new gradient-based loss function that computes the magnitude and direction of change in received signal strength (RSS) values from a point within the environment. RADIANCE incorporates this loss function along with the antenna pattern to capture signal propagation within a given indoor configuration and generate new patterns under new configuration, antenna (beam) pattern, and center frequency. Extensive simulations are conducted to compare RADIANCE with ray-tracing simulations of RF maps. Our results show that RADIANCE achieves a mean average error (MAE) of 0.09, root-mean-squared error (RMSE) of 0.29, peak signal-to-noise ratio (PSNR) of 10.78, and multi-scale structural similarity index (MS-SSIM) of 0.80.
△ Less
Submitted 21 August, 2023;
originally announced August 2023.
-
Distributed Traffic Synthesis and Classification in Edge Networks: A Federated Self-supervised Learning Approach
Authors:
Yong Xiao,
Rong Xia,
Yingyu Li,
Guangming Shi,
Diep N. Nguyen,
Dinh Thai Hoang,
Dusit Niyato,
Marwan Krunz
Abstract:
With the rising demand for wireless services and increased awareness of the need for data protection, existing network traffic analysis and management architectures are facing unprecedented challenges in classifying and synthesizing the increasingly diverse services and applications. This paper proposes FS-GAN, a federated self-supervised learning framework to support automatic traffic analysis an…
▽ More
With the rising demand for wireless services and increased awareness of the need for data protection, existing network traffic analysis and management architectures are facing unprecedented challenges in classifying and synthesizing the increasingly diverse services and applications. This paper proposes FS-GAN, a federated self-supervised learning framework to support automatic traffic analysis and synthesis over a large number of heterogeneous datasets. FS-GAN is composed of multiple distributed Generative Adversarial Networks (GANs), with a set of generators, each being designed to generate synthesized data samples following the distribution of an individual service traffic, and each discriminator being trained to differentiate the synthesized data samples and the real data samples of a local dataset. A federated learning-based framework is adopted to coordinate local model training processes of different GANs across different datasets. FS-GAN can classify data of unknown types of service and create synthetic samples that capture the traffic distribution of the unknown types. We prove that FS-GAN can minimize the Jensen-Shannon Divergence (JSD) between the distribution of real data across all the datasets and that of the synthesized data samples. FS-GAN also maximizes the JSD among the distributions of data samples created by different generators, resulting in each generator producing synthetic data samples that follow the same distribution as one particular service type. Extensive simulation results show that the classification accuracy of FS-GAN achieves over 20% improvement in average compared to the state-of-the-art clustering-based traffic analysis algorithms. FS-GAN also has the capability to synthesize highly complex mixtures of traffic types without requiring any human-labeled data samples.
△ Less
Submitted 31 January, 2023;
originally announced February 2023.
-
Time-sensitive Learning for Heterogeneous Federated Edge Intelligence
Authors:
Yong Xiao,
Xiaohan Zhang,
Guangming Shi,
Marwan Krunz,
Diep N. Nguyen,
Dinh Thai Hoang
Abstract:
Real-time machine learning has recently attracted significant interest due to its potential to support instantaneous learning, adaptation, and decision making in a wide range of application domains, including self-driving vehicles, intelligent transportation, and industry automation. We investigate real-time ML in a federated edge intelligence (FEI) system, an edge computing system that implements…
▽ More
Real-time machine learning has recently attracted significant interest due to its potential to support instantaneous learning, adaptation, and decision making in a wide range of application domains, including self-driving vehicles, intelligent transportation, and industry automation. We investigate real-time ML in a federated edge intelligence (FEI) system, an edge computing system that implements federated learning (FL) solutions based on data samples collected and uploaded from decentralized data networks. FEI systems often exhibit heterogenous communication and computational resource distribution, as well as non-i.i.d. data samples, resulting in long model training time and inefficient resource utilization. Motivated by this fact, we propose a time-sensitive federated learning (TS-FL) framework to minimize the overall run-time for collaboratively training a shared ML model. Training acceleration solutions for both TS-FL with synchronous coordination (TS-FL-SC) and asynchronous coordination (TS-FL-ASC) are investigated. To address straggler effect in TS-FL-SC, we develop an analytical solution to characterize the impact of selecting different subsets of edge servers on the overall model training time. A server dropping-based solution is proposed to allow slow-performance edge servers to be removed from participating in model training if their impact on the resulting model accuracy is limited. A joint optimization algorithm is proposed to minimize the overall time consumption of model training by selecting participating edge servers, local epoch number. We develop an analytical expression to characterize the impact of staleness effect of asynchronous coordination and straggler effect of FL on the time consumption of TS-FL-ASC. Experimental results show that TS-FL-SC and TS-FL-ASC can provide up to 63% and 28% of reduction, in the overall model training time, respectively.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
Optimal Privacy Preserving for Federated Learning in Mobile Edge Computing
Authors:
Hai M. Nguyen,
Nam H. Chu,
Diep N. Nguyen,
Dinh Thai Hoang,
Van-Dinh Nguyen,
Minh Hoang Ha,
Eryk Dutkiewicz,
Marwan Krunz
Abstract:
Federated Learning (FL) with quantization and deliberately added noise over wireless networks is a promising approach to preserve user differential privacy (DP) while reducing wireless resources. Specifically, an FL process can be fused with quantized Binomial mechanism-based updates contributed by multiple users. However, optimizing quantization parameters, communication resources (e.g., transmit…
▽ More
Federated Learning (FL) with quantization and deliberately added noise over wireless networks is a promising approach to preserve user differential privacy (DP) while reducing wireless resources. Specifically, an FL process can be fused with quantized Binomial mechanism-based updates contributed by multiple users. However, optimizing quantization parameters, communication resources (e.g., transmit power, bandwidth, and quantization bits), and the added noise to guarantee the DP requirement and performance of the learned FL model remains an open and challenging problem. This article aims to jointly optimize the quantization and Binomial mechanism parameters and communication resources to maximize the convergence rate under the constraints of the wireless network and DP requirement. To that end, we first derive a novel DP budget estimation of the FL with quantization/noise that is tighter than the state-of-the-art bound. We then provide a theoretical bound on the convergence rate. This theoretical bound is decomposed into two components, including the variance of the global gradient and the quadratic bias that can be minimized by optimizing the communication resources, and quantization/noise parameters. The resulting optimization turns out to be a Mixed-Integer Non-linear Programming (MINLP) problem. To tackle it, we first transform this MINLP problem into a new problem whose solutions are proved to be the optimal solutions of the original one. We then propose an approximate algorithm to solve the transformed problem with an arbitrary relative error guarantee. Extensive simulations show that under the same wireless resource constraints and DP protection requirements, the proposed approximate algorithm achieves an accuracy close to the accuracy of the conventional FL without quantization/noise. The results can achieve a higher convergence rate while preserving users' privacy.
△ Less
Submitted 20 May, 2023; v1 submitted 14 November, 2022;
originally announced November 2022.
-
Automatic Machine Learning for Multi-Receiver CNN Technology Classifiers
Authors:
Amir-Hossein Yazdani-Abyaneh,
Marwan Krunz
Abstract:
Convolutional Neural Networks (CNNs) are one of the most studied family of deep learning models for signal classification, including modulation, technology, detection, and identification. In this work, we focus on technology classification based on raw I/Q samples collected from multiple synchronized receivers. As an example use case, we study protocol identification of Wi-Fi, LTE-LAA, and 5G NR-U…
▽ More
Convolutional Neural Networks (CNNs) are one of the most studied family of deep learning models for signal classification, including modulation, technology, detection, and identification. In this work, we focus on technology classification based on raw I/Q samples collected from multiple synchronized receivers. As an example use case, we study protocol identification of Wi-Fi, LTE-LAA, and 5G NR-U technologies that coexist over the 5 GHz Unlicensed National Information Infrastructure (U-NII) bands. Designing and training accurate CNN classifiers involve significant time and effort that goes into fine-tuning a model's architectural settings and determining the appropriate hyperparameter configurations, such as learning rate and batch size. We tackle the former by defining architectural settings themselves as hyperparameters. We attempt to automatically optimize these architectural parameters, along with other preprocessing (e.g., number of I/Q samples within each classifier input) and learning hyperparameters, by forming a Hyperparameter Optimization (HyperOpt) problem, which we solve in a near-optimal fashion using the Hyperband algorithm. The resulting near-optimal CNN (OCNN) classifier is then used to study classification accuracy for OTA as well as simulations datasets, considering various SNR values. We show that the number of receivers to construct multi-channel inputs for CNNs should be defined as a preprocessing hyperparameter to be optimized via Hyperband. OTA results reveal that our OCNN classifiers improve classification accuracy by 24.58% compared to manually tuned CNNs. We also study the effect of min-max normalization of I/Q samples within each classifier's input on generalization accuracy over simulated datasets with SNRs other than training set's SNR and show an average of 108.05% improvement when I/Q samples are normalized.
△ Less
Submitted 28 April, 2022;
originally announced April 2022.
-
CWmin Estimation and Collision Identification in Wi-Fi Systems
Authors:
Amir-Hossein Yazdani-Abyaneh,
Marwan Krunz
Abstract:
Wi-Fi networks are susceptible to aggressive behavior caused by selfish or malicious devices that reduce their minimum contention window size (CWmin) to below the standard CWmin. In this paper, we propose a scheme called Minimum Contention Window Estimation (CWE) to detect aggressive stations with low CWmin's, where the AP estimates the CWmin value of all stations transmitting uplink by monitoring…
▽ More
Wi-Fi networks are susceptible to aggressive behavior caused by selfish or malicious devices that reduce their minimum contention window size (CWmin) to below the standard CWmin. In this paper, we propose a scheme called Minimum Contention Window Estimation (CWE) to detect aggressive stations with low CWmin's, where the AP estimates the CWmin value of all stations transmitting uplink by monitoring their backoff values over a period of time and keeping track of the idle time each station spends during backoff. To correctly estimate each backoff value, we present a cross-correlation-based technique that uses the frequency offset between the AP and each station to identify stations involved in uplink collisions. The AP constructs empirical distributions for the monitored backoff values and compares them with a set of nominal PMF's, created via Markov analysis of the DCF protocol to estimate CWmin of various stations. After detecting the aggressive stations, the AP can choose to stop serving those stations. Simulation results show that the accuracy of our collision detection technique is 96%, 94%, and 88% when there are 3, 6, and 9 stations in the WLAN, respectively. For the former WLAN settings, the estimation accuracy of CWE scheme is 100%, 98.81%, and 96.3%, respectively.
△ Less
Submitted 30 August, 2021;
originally announced August 2021.
-
AdaptiveFog: A Modelling and Optimization Framework for Fog Computing in Intelligent Transportation Systems
Authors:
Yong Xiao,
Marwan Krunz
Abstract:
Fog computing has been advocated as an enabling technology for computationally intensive services in smart connected vehicles. Most existing works focus on analyzing the queueing and workload processing latencies associated with fog computing, ignoring the fact that wireless access latency can sometimes dominate the overall latency. This motivates the work in this paper, where we report on a five-…
▽ More
Fog computing has been advocated as an enabling technology for computationally intensive services in smart connected vehicles. Most existing works focus on analyzing the queueing and workload processing latencies associated with fog computing, ignoring the fact that wireless access latency can sometimes dominate the overall latency. This motivates the work in this paper, where we report on a five-month measurement study of the wireless access latency between connected vehicles and a fog/cloud computing system supported by commercially available LTE networks. We propose AdaptiveFog, a novel framework for autonomous and dynamic switching between different LTE networks that implement a fog/cloud infrastructure. AdaptiveFog's main objective is to maximize the service confidence level, defined as the probability that the latency of a given service type is below some threshold. To quantify the performance gap between different LTE networks, we introduce a novel statistical distance metric, called weighted Kantorovich-Rubinstein (K-R) distance. Two scenarios based on finite- and infinite-horizon optimization of short-term and long-term confidence are investigated. For each scenario, a simple threshold policy based on weighted K-R distance is proposed and proved to maximize the latency confidence for smart vehicles. Extensive analysis and simulations are performed based on our latency measurements. Our results show that AdaptiveFog achieves around 30% to 50% improvement in the confidence levels of fog and cloud latencies, respectively.
△ Less
Submitted 29 June, 2021;
originally announced June 2021.
-
Game of GANs: Game-Theoretical Models for Generative Adversarial Networks
Authors:
Monireh Mohebbi Moghadam,
Bahar Boroomand,
Mohammad Jalali,
Arman Zareian,
Alireza DaeiJavad,
Mohammad Hossein Manshaei,
Marwan Krunz
Abstract:
Generative Adversarial Networks (GANs) have recently attracted considerable attention in the AI community due to its ability to generate high-quality data of significant statistical resemblance to real data. Fundamentally, GAN is a game between two neural networks trained in an adversarial manner to reach a zero-sum Nash equilibrium profile. Despite the improvement accomplished in GANs in the last…
▽ More
Generative Adversarial Networks (GANs) have recently attracted considerable attention in the AI community due to its ability to generate high-quality data of significant statistical resemblance to real data. Fundamentally, GAN is a game between two neural networks trained in an adversarial manner to reach a zero-sum Nash equilibrium profile. Despite the improvement accomplished in GANs in the last few years, several issues remain to be solved. This paper reviews the literature on the game theoretic aspects of GANs and addresses how game theory models can address specific challenges of generative model and improve the GAN's performance. We first present some preliminaries, including the basic GAN model and some game theory background. We then present taxonomy to classify state-of-the-art solutions into three main categories: modified game models, modified architectures, and modified learning methods. The classification is based on modifications made to the basic GAN model by proposed game-theoretic approaches in the literature. We then explore the objectives of each category and discuss recent works in each category. Finally, we discuss the remaining challenges in this field and present future research directions.
△ Less
Submitted 3 January, 2022; v1 submitted 13 June, 2021;
originally announced June 2021.
-
Sense-Bandits: AI-based Adaptation of Sensing Thresholds for Heterogeneous-technology Coexistence Over Unlicensed Bands
Authors:
Mohammed Hirzallah,
Marwan Krunz
Abstract:
In this paper, we present Sense-Bandits, an AI-based framework for distributed adaptation of the sensing thresholds (STs) over shared spectrum. This framework specifically targets the coexistence of heterogenous technologies, e.g., Wi-Fi, 4G Licensed-Assisted Access (LAA), and 5G New Radio Unlicensed (NR-U), over unlicensed channels. To access the channel, a device compares the measured power with…
▽ More
In this paper, we present Sense-Bandits, an AI-based framework for distributed adaptation of the sensing thresholds (STs) over shared spectrum. This framework specifically targets the coexistence of heterogenous technologies, e.g., Wi-Fi, 4G Licensed-Assisted Access (LAA), and 5G New Radio Unlicensed (NR-U), over unlicensed channels. To access the channel, a device compares the measured power with a predefined ST value and accordingly decides if the channel is idle or not. Improper setting of the ST values creates asymmetric sensing floors, resulting in collisions due to hidden terminals and/or reduction in the spatial reuse due to exposed terminals. Optimal ST setting is challenging because it requires global knowledge of mobility, traffic loads, and channel access behavior of all contending devices. Sense- Bandits tackles this problem by employing a clustering-based multi-armed bandit (MAB) algorithm, which adapts its learning behavior based on network dynamics. Clustering allows the algorithm to track network changes in real-time, ensuring fast learning of the best ST values by classifying the state and dynamics of coexisting networks. We develop a C++-based network simulator that implements Sense-Bandits and we apply it to evaluate the coexistence of Wi-Fi and 5G NR-U systems over the unlicensed 5 GHz U NII bands. Our simulation results indicate that ST-adaptive devices employing Sense-Bandits do not harm neighboring devices that adopt a fixed ST value.
△ Less
Submitted 10 May, 2021;
originally announced May 2021.
-
Misbehavior Detection in Wi-Fi/LTE Coexistence over Unlicensed Bands
Authors:
Islam Samy,
Xiao Han,
Loukas Lazos,
Ming Li,
Yong Xiao,
Marwan Krunz
Abstract:
We consider the problem of fair coexistence between LTE and Wi-Fi systems in the unlicensed 5 GHz U-NII bands. We focus on the misbehavior opportunities due to the heterogeneity in channel access mechanism and the lack of a common control plane. We define selfish misbehavior strategies for the LTE that yield an unfair share of the spectrum resources. Such strategies are based on manipulating the o…
▽ More
We consider the problem of fair coexistence between LTE and Wi-Fi systems in the unlicensed 5 GHz U-NII bands. We focus on the misbehavior opportunities due to the heterogeneity in channel access mechanism and the lack of a common control plane. We define selfish misbehavior strategies for the LTE that yield an unfair share of the spectrum resources. Such strategies are based on manipulating the operational parameters of the LTE-LAA standard, namely the backoff mechanism, the traffic class parameters, the clear channel access (CCA) threshold, and others. Prior methods for detecting misbehavior in homogeneous settings are not applicable in a spectrum sharing scenario because the devices of one system cannot decode the transmissions of another. We develop implicit sensing techniques that can accurately estimate the operational parameters of LTE transmissions under various topological scenarios and {\em without decoding.} These techniques apply correlation-based signal detection to infer the required information. Our techniques are validated through experiments on a USRP testbed. We further apply a statistical inference framework for determining deviations of the LTE behavior from the coexistence etiquette. By characterizing the detection and false alarm probabilities, we show that our framework yields high detection accuracy at a very low false alarm rate. Although our methods focus on detecting misbehavior of the LTE system, they can be generalized to other coexistence scenarios.
△ Less
Submitted 6 April, 2021;
originally announced April 2021.
-
5G New Radio Unlicensed: Challenges and Evaluation
Authors:
Mohammed Hirzallah,
Marwan Krunz,
Balkan Kecicioglu,
Belal Hamzeh
Abstract:
To meet the high demand for mobile data, the Third Generation Partnership Project (3GPP) established a set of standards known as 5G New Radio (5G NR). The architecture of 5G NR includes a flexible radio access network and a core network. 3GPP has also been working on a new radio access technology, called 5G NR Unlicensed (5G NR-U), which aims at extending 5G NR to unlicensed bands. In this paper,…
▽ More
To meet the high demand for mobile data, the Third Generation Partnership Project (3GPP) established a set of standards known as 5G New Radio (5G NR). The architecture of 5G NR includes a flexible radio access network and a core network. 3GPP has also been working on a new radio access technology, called 5G NR Unlicensed (5G NR-U), which aims at extending 5G NR to unlicensed bands. In this paper, we give an overview of the most recent 5G NR-U design elements and discuss potential concerns, including fair coexistence with other unlicensed technologies such as Wi-Fi. We use simulations to study coexistence between Wi-Fi and 5G NR-U systems. Our evaluation indicates that NR-U often achieves higher throughput and lower delay than Wi-Fi (802.11ac). The two systems experience different buffer occupancies and spectrum utilization statistics. We also discuss the improvements that NR-U offers over LTE Licensed Assisted Access (LTE-LAA).
△ Less
Submitted 20 December, 2020;
originally announced December 2020.
-
Towards Ubiquitous AI in 6G with Federated Learning
Authors:
Yong Xiao,
Guangming Shi,
Marwan Krunz
Abstract:
With 5G cellular systems being actively deployed worldwide, the research community has started to explore novel technological advances for the subsequent generation, i.e., 6G. It is commonly believed that 6G will be built on a new vision of ubiquitous AI, an hyper-flexible architecture that brings human-like intelligence into every aspect of networking systems. Despite its great promise, there are…
▽ More
With 5G cellular systems being actively deployed worldwide, the research community has started to explore novel technological advances for the subsequent generation, i.e., 6G. It is commonly believed that 6G will be built on a new vision of ubiquitous AI, an hyper-flexible architecture that brings human-like intelligence into every aspect of networking systems. Despite its great promise, there are several novel challenges expected to arise in ubiquitous AI-based 6G. Although numerous attempts have been made to apply AI to wireless networks, these attempts have not yet seen any large-scale implementation in practical systems. One of the key challenges is the difficulty to implement distributed AI across a massive number of heterogeneous devices. Federated learning (FL) is an emerging distributed AI solution that enables data-driven AI solutions in heterogeneous and potentially massive-scale networks. Although it still in an early stage of development, FL-inspired architecture has been recognized as one of the most promising solutions to fulfill ubiquitous AI in 6G. In this article, we identify the requirements that will drive convergence between 6G and AI. We propose an FL-based network architecture and discuss its potential for addressing some of the novel challenges expected in 6G. Future trends and key research problems for FL-enabled 6G are also discussed.
△ Less
Submitted 26 April, 2020;
originally announced April 2020.
-
A Generative Learning Approach for Spatio-temporal Modeling in Connected Vehicular Network
Authors:
Rong Xia,
Yong Xiao,
Yingyu Li,
Marwan Krunz,
Dusit Niyato
Abstract:
Spatio-temporal modeling of wireless access latency is of great importance for connected-vehicular systems. The quality of the molded results rely heavily on the number and quality of samples which can vary significantly due to the sensor deployment density as well as traffic volume and density. This paper proposes LaMI (Latency Model Inpainting), a novel framework to generate a comprehensive spat…
▽ More
Spatio-temporal modeling of wireless access latency is of great importance for connected-vehicular systems. The quality of the molded results rely heavily on the number and quality of samples which can vary significantly due to the sensor deployment density as well as traffic volume and density. This paper proposes LaMI (Latency Model Inpainting), a novel framework to generate a comprehensive spatio-temporal of wireless access latency of a connected vehicles across a wide geographical area. LaMI adopts the idea from image inpainting and synthesizing and can reconstruct the missing latency samples by a two-step procedure. In particular, it first discovers the spatial correlation between samples collected in various regions using a patching-based approach and then feeds the original and highly correlated samples into a Variational Autoencoder (VAE), a deep generative model, to create latency samples with similar probability distribution with the original samples. Finally, LaMI establishes the empirical PDF of latency performance and maps the PDFs into the confidence levels of different vehicular service requirements. Extensive performance evaluation has been conducted using the real traces collected in a commercial LTE network in a university campus. Simulation results show that our proposed model can significantly improve the accuracy of latency modeling especially compared to existing popular solutions such as interpolation and nearest neighbor-based methods.
△ Less
Submitted 15 March, 2020;
originally announced March 2020.
-
Dynamic Network Slicing for Scalable Fog Computing Systems with Energy Harvesting
Authors:
Yong Xiao,
Marwan Krunz
Abstract:
This paper studies fog computing systems, in which cloud data centers can be supplemented by a large number of fog nodes deployed in a wide geographical area. Each node relies on harvested energy from the surrounding environment to provide computational services to local users. We propose the concept of dynamic network slicing in which a regional orchestrator coordinates workload distribution amon…
▽ More
This paper studies fog computing systems, in which cloud data centers can be supplemented by a large number of fog nodes deployed in a wide geographical area. Each node relies on harvested energy from the surrounding environment to provide computational services to local users. We propose the concept of dynamic network slicing in which a regional orchestrator coordinates workload distribution among local fog nodes, providing partitions/slices of energy and computational resources to support a specific type of service with certain quality-of-service (QoS) guarantees. The resources allocated to each slice can be dynamically adjusted according to service demands and energy availability. A stochastic overlapping coalition-formation game is developed to investigate distributed cooperation and joint network slicing between fog nodes under randomly fluctuating energy harvesting and workload arrival processes. We observe that the overall processing capacity of the fog computing network can be improved by allowing fog nodes to maintain a belief function about the unknown state and the private information of other nodes. An algorithm based on a belief-state partially observable Markov decision process (B-POMDP) is proposed to achieve the optimal resource slicing structure among all fog nodes. We describe how to implement our proposed dynamic network slicing within the 3GPP network sharing architecture, and evaluate the performance of our proposed framework using the real BS location data of a real cellular system with over 200 BSs deployed in the city of Dublin. Our numerical results show that our framework can significantly improve the workload processing capability of fog computing networks. In particular, even when each fog node can coordinate only with its closest neighbor, the total amount of workload processed by fog nodes can be almost doubled under certain scenarios.
△ Less
Submitted 28 January, 2020;
originally announced January 2020.
-
Distributed Resource Allocation for Network Slicing over Licensed and Unlicensed Bands
Authors:
Yong Xiao,
Mohammed Hirzallah,
Marwan Krunz
Abstract:
Network slicing is considered one of the key enabling technologies for 5G due to its ability to customize and "slice" a common resource to support diverse services and verticals.This paper introduces a novel inter-operator network slicing framework in which multiple mobile network operators (MNOs) can coordinate and jointly slice their accessible spectrum resources in both licensed and unlicensed…
▽ More
Network slicing is considered one of the key enabling technologies for 5G due to its ability to customize and "slice" a common resource to support diverse services and verticals.This paper introduces a novel inter-operator network slicing framework in which multiple mobile network operators (MNOs) can coordinate and jointly slice their accessible spectrum resources in both licensed and unlicensed bands. For licensed band slicing, we propose an inter-operator spectrum aggregation method that allows two or more MNOs to cooperate and share their licensed bands to support a common set of service types. We then consider the sharing of unlicensed bands. Because all MNOs enjoy equal rights to accessing these bands, we introduce the concept of right sharing for MNOs to share and trade their spectrum access rights. We develop a {\em modified back-of-the-envelope (mBoE) method} for MNOs to evaluate their {\em Value-of-Rights (VoR)} when coexisting with other wireless technologies. A {\em network slicing game} based on the overlapping coalition formation game is formulated to investigate cooperation between MNOs. We prove that our proposed game always has at least one stable slicing structure that maximizes the social welfare. To implement our proposed framework without requiring MNOs to reveal private information to other MNOs, we develop a distributed algorithm called D-ADMM-PVS. Performance evaluation of our proposed framework is provided using a discrete-event simulator that is driven by real MNO deployment scenarios based on over 400 base station locations deployed by two primary cellular operators in the city of Dublin.Numerical results show that our proposed framework can almost double the capacity for all supported services for each MNO in an urban setting.
△ Less
Submitted 28 January, 2020;
originally announced January 2020.
-
Distributed Optimization for Energy-efficient Fog Computing in the Tactile Internet
Authors:
Yong Xiao,
Marwan Krunz
Abstract:
Tactile Internet is an emerging concept that focuses on supporting high-fidelity, ultra-responsive, and widely available human-to-machine interactions. To reduce the transmission latency and alleviate Internet congestion, fog computing has been advocated as an important component of the Tactile Internet. In this paper, we focus on energy-efficient design of fog computing networks that support low-…
▽ More
Tactile Internet is an emerging concept that focuses on supporting high-fidelity, ultra-responsive, and widely available human-to-machine interactions. To reduce the transmission latency and alleviate Internet congestion, fog computing has been advocated as an important component of the Tactile Internet. In this paper, we focus on energy-efficient design of fog computing networks that support low-latency Tactile Internet applications. We investigate two performance metrics: Service response time of end-users and power usage efficiency of fog nodes. We quantify the fundamental tradeoff between these two metrics and then extend our analysis to fog computing networks involving cooperation between fog nodes. We introduce a novel cooperative fog computing concept, referred to as offload forwarding, in which a set of fog nodes with different computing and energy resources can cooperate with each other. The objective of this cooperation is to balance the workload processed by different fog nodes, further reduce the service response time, and improve the efficiency of power usage. We develop a distributed optimization framework based on dual decomposition to achieve the optimal tradeoff. Our framework does not require fog nodes to disclose their private information nor conduct back-and-forth negotiations with each other. Two distributed optimization algorithms are proposed. One is based on the subgradient method with dual decomposition and the other is based on distributed ADMM-VS. We prove that both algorithms can achieve the optimal workload allocation that minimizes the response time under the given power efficiency constraints of fog nodes.
△ Less
Submitted 28 January, 2020;
originally announced January 2020.
-
Multi-operator Network Sharing for Massive IoT
Authors:
Yong Xiao,
Marwan Krunz,
Tao Shu
Abstract:
Recent study predicts that by 2020 up to 50 billion IoT devices will be connected to the Internet, straining the capacity of wireless network that has already been overloaded with data-hungry mobile applications, such as high-definition video streaming and virtual reality(VR)/augmented reality(AR). How to accommodate the demand for both massive scale of IoT devices and high-speed cellular services…
▽ More
Recent study predicts that by 2020 up to 50 billion IoT devices will be connected to the Internet, straining the capacity of wireless network that has already been overloaded with data-hungry mobile applications, such as high-definition video streaming and virtual reality(VR)/augmented reality(AR). How to accommodate the demand for both massive scale of IoT devices and high-speed cellular services in the physically limited spectrum without significantly increasing the operational and infrastructure costs is one of the main challenges for operators. In this article, we introduce a new multi-operator network sharing framework that supports the coexistence of IoT and high-speed cellular services. Our framework is based on the radio access network (RAN) sharing architecture recently introduced by 3GPP as a promising solution for operators to improve their resource utilization and reduce the system roll-out cost. We evaluate the performance of our proposed framework using the real base station location data in the city of Dublin collected from two major operators in Ireland. Numerical results show that our proposed framework can almost double the total number of IoT devices that can be supported and coexist with other cellular services compared with the case without network sharing.
△ Less
Submitted 25 January, 2020;
originally announced January 2020.
-
Vulnerabilities of Massive MIMO Systems Against Pilot Contamination Attacks
Authors:
Berk Akgun,
Marwan Krunz,
O. Ozan Koyluoglu
Abstract:
We consider a single-cell massive MIMO system in which a base station (BS) with a large number of antennas transmits simultaneously to several single-antenna users in the presence of an attacker.The BS acquires the channel state information (CSI) based on uplink pilot transmissions. In this work, we demonstrate the vulnerability of CSI estimation phase to malicious attacks. For that purpose, we st…
▽ More
We consider a single-cell massive MIMO system in which a base station (BS) with a large number of antennas transmits simultaneously to several single-antenna users in the presence of an attacker.The BS acquires the channel state information (CSI) based on uplink pilot transmissions. In this work, we demonstrate the vulnerability of CSI estimation phase to malicious attacks. For that purpose, we study two attack models. In the first model, the attacker aims at minimizing the sum-rate of downlink transmissions by contaminating the uplink pilots. In the second model, the attacker exploits its in-band full-duplex capabilities to generate jamming signals in both the CSI estimation and data transmission phases. We study these attacks under two downlink power allocation strategies when the attacker knows and does not know the locations of the BS and users. The formulated problems are solved using stochastic optimization, Lagrangian minimization, and game-theoretic methods. A closed-form solution for a special case of the problem is obtained. Furthermore, we analyze the achievable individual secrecy rates under a pilot contamination attack, and provide an upper bound on these rates. Our results indicate that the proposed attacks degrade the throughput of a massive MIMO system by more than half.
△ Less
Submitted 8 October, 2017;
originally announced October 2017.
-
Secure Transmissions Using Artificial Noise in MIMO Wiretap Interference Channel: A Game Theoretic Approach
Authors:
Peyman Siyari,
Marwan Krunz,
Diep N. Nguyen
Abstract:
We consider joint optimization of artificial noise (AN) and information signals in a MIMO wiretap interference network, wherein the transmission of each link may be overheard by several MIMO-capable eavesdroppers. Each information signal is accompanied with AN, generated by the same user to confuse nearby eavesdroppers. Using a noncooperative game, a distributed optimization mechanism is proposed…
▽ More
We consider joint optimization of artificial noise (AN) and information signals in a MIMO wiretap interference network, wherein the transmission of each link may be overheard by several MIMO-capable eavesdroppers. Each information signal is accompanied with AN, generated by the same user to confuse nearby eavesdroppers. Using a noncooperative game, a distributed optimization mechanism is proposed to maximize the secrecy rate of each link. The decision variables here are the covariance matrices for the information signals and ANs. However, the nonconvexity of each link's optimization problem (i.e., best response) makes conventional convex games inapplicable, even to find whether a Nash Equilibrium (NE) exists. To tackle this issue, we analyze the proposed game using a relaxed equilibrium concept, called quasi-Nash equilibrium (QNE). Under a constraint qualification condition for each player's problem, the set of QNEs includes the NE of the proposed game. We also derive the conditions for the existence and uniqueness of the resulting QNE. It turns out that the uniqueness conditions are too restrictive, and do not always hold in typical network scenarios. Thus, the proposed game often has multiple QNEs, and convergence to a QNE is not always guaranteed. To overcome these issues, we modify the utility functions of the players by adding several specific terms to each utility function. The modified game converges to a QNE even when multiple QNEs exist. Furthermore, players have the ability to select a desired QNE that optimizes a given social objective (e.g., sum-rate or secrecy sum-rate). Depending on the chosen objective, the amount of signaling overhead as well as the performance of resulting QNE can be controlled. Simulations show that due to the QNE selection mechanism, we can achieve a significant improvement in terms of secrecy sum-rate and power efficiency.
△ Less
Submitted 23 December, 2016;
originally announced December 2016.
-
Exploiting Full-duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks
Authors:
Berk Akgun,
O. Ozan Koyluoglu,
Marwan Krunz
Abstract:
We consider a broadcast channel, in which a multi-antenna transmitter (Alice) sends $K$ confidential information signals to $K$ legitimate users (Bobs) in the presence of $L$ eavesdroppers (Eves). Alice uses MIMO precoding to generate the information signals along with her own (Tx-based) friendly jamming. Interference at each Bob is removed by MIMO zero-forcing. This, however, leaves a "vulnerabil…
▽ More
We consider a broadcast channel, in which a multi-antenna transmitter (Alice) sends $K$ confidential information signals to $K$ legitimate users (Bobs) in the presence of $L$ eavesdroppers (Eves). Alice uses MIMO precoding to generate the information signals along with her own (Tx-based) friendly jamming. Interference at each Bob is removed by MIMO zero-forcing. This, however, leaves a "vulnerability region" around each Bob, which can be exploited by a nearby Eve. We address this problem by augmenting Tx-based friendly jamming (TxFJ) with Rx-based friendly jamming (RxFJ), generated by each Bob. Specifically, each Bob uses self-interference suppression (SIS) to transmit a friendly jamming signal while simultaneously receiving an information signal over the same channel. We minimize the powers allocated to the information, TxFJ, and RxFJ signals under given guarantees on the individual secrecy rate for each Bob. The problem is solved for the cases when the eavesdropper's channel state information is known/unknown. Simulations show the effectiveness of the proposed solution. Furthermore, we discuss how to schedule transmissions when the rate requirements need to be satisfied on average rather than instantaneously. Under special cases, a scheduling algorithm that serves only the strongest receivers is shown to outperform the one that schedules all receivers.
△ Less
Submitted 9 January, 2017; v1 submitted 6 April, 2016;
originally announced April 2016.
-
Energy-Aware Cooperative Wireless Networks with Multiple Cognitive Users
Authors:
Mahmoud Ashour,
M. Majid Butt,
Amr Mohamed,
Tamer ElBatt,
Marwan Krunz
Abstract:
In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data transmission demand. We consider a multi-packet transmission framework which allows multiple SUs to transmit simultaneously thanks to dirty-paper coding. We propose power allocation a…
▽ More
In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data transmission demand. We consider a multi-packet transmission framework which allows multiple SUs to transmit simultaneously thanks to dirty-paper coding. We propose power allocation and scheduling policies that optimize the throughput for both PU and SU with minimum energy expenditure. The performance of the system is evaluated in terms of throughput and delay under different opportunistic relay selection policies. Towards this objective, we present a mathematical framework for deriving stability conditions for all queues in the system. Consequently, the throughput of both primary and secondary links is quantified. Furthermore, a moment generating function (MGF) approach is employed to derive a closed-form expression for the average delay encountered by the PU packets. Results reveal that we achieve better performance in terms of throughput and delay at lower energy cost as compared to equal power allocation schemes proposed earlier in literature. Extensive simulations are conducted to validate our theoretical findings.
△ Less
Submitted 21 March, 2016;
originally announced March 2016.
-
Exploiting Self-Interference Suppression for Improved Spectrum Awareness/Efficiency in Cognitive Radio Systems
Authors:
Wessam Afifi,
Marwan Krunz
Abstract:
Inspired by recent developments in full-duplex communications, we propose and study new modes of operation for cognitive radios with the goal of achieving improved primary user (PU) detection and/or secondary user (SU) throughput. Specifically, we consider an opportunistic PU/SU setting in which the SU is equipped with partial/complete self-interference suppression (SIS), enabling it to transmit a…
▽ More
Inspired by recent developments in full-duplex communications, we propose and study new modes of operation for cognitive radios with the goal of achieving improved primary user (PU) detection and/or secondary user (SU) throughput. Specifically, we consider an opportunistic PU/SU setting in which the SU is equipped with partial/complete self-interference suppression (SIS), enabling it to transmit and receive/sense at the same time. Following a brief sensing period, the SU can operate in either simultaneous transmit-and-sense (TS) mode or simultaneous transmit-and-receive (TR) mode. We analytically study the performance metrics for the two modes, namely the detection and false-alarm probabilities, the PU outage probability, and the SU throughput. From this analysis, we evaluate the sensing-throughput tradeoff for both modes. Our objective is to find the optimal sensing and transmission durations for the SU that maximize its throughput subject to a given outage probability. We also explore the spectrum awareness/efficiency tradeoff that arises from the two modes by determining an efficient adaptive strategy for the SU link. This strategy has a threshold structure, which depends on the PU traffic load. Our study considers both perfect and imperfect sensing as well as perfect/imperfect SIS.
△ Less
Submitted 26 May, 2013;
originally announced May 2013.