-
Max-Min Fairness for IRS-Assisted Secure Two-Way Communications
Authors:
Harindu Jayarathne,
Tharindu Wickremasinghe,
Kasun T. Hemachandra,
Tharaka Samarasinghe,
Saman Atapattu
Abstract:
This paper investigates an intelligent reflective surface (IRS) assisted secure multi-user two-way communication system. The aim of this paper is to enhance the physical layer security by optimizing the minimum secrecy-rate among all user-pairs in the presence of a malicious user. The optimization problem is converted into an alternating optimization problem consisting of two sub-problems. Transmi…
▽ More
This paper investigates an intelligent reflective surface (IRS) assisted secure multi-user two-way communication system. The aim of this paper is to enhance the physical layer security by optimizing the minimum secrecy-rate among all user-pairs in the presence of a malicious user. The optimization problem is converted into an alternating optimization problem consisting of two sub-problems. Transmit power optimization is handled using a fractional programming method, whereas IRS phase shift optimization is handled with semi-definite programming. The convergence of the proposed algorithm is investigated numerically. The performance gain in minimum secrecy-rate is quantified for four different user configurations in comparison to the baseline scheme. Results indicate a 3.6-fold gain in minimum secrecy rate over the baseline scheme when the IRS is positioned near a legitimate user, even when the malicious user is located close to the same legitimate user.
△ Less
Submitted 24 January, 2025;
originally announced January 2025.
-
The Effect of Multiple Access Categories on the MAC Layer Performance of IEEE 802.11p
Authors:
Geeth P. Wijesiri,
Jussi Haapola,
Tharaka Samarasinghe
Abstract:
The enhanced distributed channel access (EDCA) mechanism enables IEEE 802.11p to accommodate differential quality of service (QoS) levels in vehicle-to-vehicle (V2V) communications, through four access categories (ACs). This paper presents multi-dimensional discrete-time Markov chain (DTMC) based model to study the effect of parallel operation of the ACs on the medium access control (MAC) layer pe…
▽ More
The enhanced distributed channel access (EDCA) mechanism enables IEEE 802.11p to accommodate differential quality of service (QoS) levels in vehicle-to-vehicle (V2V) communications, through four access categories (ACs). This paper presents multi-dimensional discrete-time Markov chain (DTMC) based model to study the effect of parallel operation of the ACs on the medium access control (MAC) layer performance of ITS-G5 IEEE 802.11p. The overall model consists of four queue models with their respective traffic generators, which are appropriately linked with the DTMCs modeling the operation of each AC. Closed-form solutions for the steady-state probabilities of the models are obtained, which are then utilized to derive expressions for key performance indicators at the MAC layer. An application for a highway scenario is presented to draw insights on the performance. The results show how the performance measures vary among ACs according to their priority levels, and emphasize the importance of analytical modeling of the parallel operation of all four ACs.
△ Less
Submitted 17 July, 2020;
originally announced July 2020.
-
Device-Free User Authentication, Activity Classification and Tracking using Passive Wi-Fi Sensing: A Deep Learning Based Approach
Authors:
Vinoj Jayasundara,
Hirunima Jayasekara,
Tharaka Samarasinghe,
Kasun T. Hemachandra
Abstract:
Privacy issues related to video camera feeds have led to a growing need for suitable alternatives that provide functionalities such as user authentication, activity classification and tracking in a noninvasive manner. Existing infrastructure makes Wi-Fi a possible candidate, yet, utilizing traditional signal processing methods to extract information necessary to fully characterize an event by sens…
▽ More
Privacy issues related to video camera feeds have led to a growing need for suitable alternatives that provide functionalities such as user authentication, activity classification and tracking in a noninvasive manner. Existing infrastructure makes Wi-Fi a possible candidate, yet, utilizing traditional signal processing methods to extract information necessary to fully characterize an event by sensing weak ambient Wi-Fi signals is deemed to be challenging. This paper introduces a novel end to-end deep learning framework that simultaneously predicts the identity, activity and the location of a user to create user profiles similar to the information provided through a video camera. The system is fully autonomous and requires zero user intervention unlike systems that require user-initiated initialization, or a user held transmitting device to facilitate the prediction. The system can also predict the trajectory of the user by predicting the location of a user over consecutive time steps. The performance of the system is evaluated through experiments.
△ Less
Submitted 26 November, 2019;
originally announced November 2019.
-
A Discrete-Time Markov Chain Based Comparison of the MAC Layer Performance of C-V2X Mode 4 and IEEE 802.11p
Authors:
Geeth P. Wijesiri,
Jussi Haapola,
Tharaka Samarasinghe
Abstract:
Vehicle-to-vehicle (V2V) communication plays a pivotal role in intelligent transport systems (ITS) with cellular-vehicle to everything (C-V2X) and IEEE 802.11p being the two competing enabling technologies. This paper presents multi-dimensional discrete-time Markov chain (DTMC) based models to study the medium access control (MAC) layer performance of the IEEE 802.11p standard and C-V2X Mode 4. Th…
▽ More
Vehicle-to-vehicle (V2V) communication plays a pivotal role in intelligent transport systems (ITS) with cellular-vehicle to everything (C-V2X) and IEEE 802.11p being the two competing enabling technologies. This paper presents multi-dimensional discrete-time Markov chain (DTMC) based models to study the medium access control (MAC) layer performance of the IEEE 802.11p standard and C-V2X Mode 4. These models are coupled with an appropriate DTMC based queuing model, and traffic generators for periodic cooperative awareness messages (CAMs) and event-driven decentralized environmental notification messages (DENMs). Closed-form solutions for the steady-state probabilities of the models are obtained, which are then utilized to derive expressions for several key performance metrics. An application for a highway scenario is presented to provide numerical results and to draw insights on the performance. In particular, a performance comparison between IEEE 802.11p and C-V2X Mode 4 in terms of the average delay, the collision probability, and the channel utilization is presented. The results show that IEEE 802.11p is superior in terms of average delay, whereas C-V2X Mode 4 excels in collision resolution. The paper also includes design insights on possible future MAC layer performance enhancements of both standards.
△ Less
Submitted 17 August, 2020; v1 submitted 24 October, 2019;
originally announced November 2019.
-
A Novel Content Caching and Delivery Scheme for Millimeter Wave Device-to-Device Communications
Authors:
Theshani Nuradha,
Tharaka Samarasinghe,
Kasun T. Hemachandra
Abstract:
A novel content caching strategy is proposed for a cache enabled device-to-device (D2D) network where the user devices are allowed to communicate using millimeter wave (mmWave) D2D links (> 6 GHz) as well as conventional sub 6 GHz cellular links. The proposed content placement strategy maximizes the successful content delivery probability of a line of sight D2D link. Furthermore, a heuristic algor…
▽ More
A novel content caching strategy is proposed for a cache enabled device-to-device (D2D) network where the user devices are allowed to communicate using millimeter wave (mmWave) D2D links (> 6 GHz) as well as conventional sub 6 GHz cellular links. The proposed content placement strategy maximizes the successful content delivery probability of a line of sight D2D link. Furthermore, a heuristic algorithm is proposed for efficient content delivery. The overall scheme improves the successful traffic offloading gain of the network compared to conventional cache-hit maximizing content placement and delivery strategies. Significant energy efficiency improvements can also be achieved in ultra-dense networks.
△ Less
Submitted 15 November, 2019;
originally announced November 2019.
-
Temporal Convolutional Memory Networks for Remaining Useful Life Estimation of Industrial Machinery
Authors:
Lahiru Jayasinghe,
Tharaka Samarasinghe,
Chau Yuen,
Jenny Chen Ni Low,
Shuzhi Sam Ge
Abstract:
Accurately estimating the remaining useful life (RUL) of industrial machinery is beneficial in many real-world applications. Estimation techniques have mainly utilized linear models or neural network based approaches with a focus on short term time dependencies. This paper, introduces a system model that incorporates temporal convolutions with both long term and short term time dependencies. The p…
▽ More
Accurately estimating the remaining useful life (RUL) of industrial machinery is beneficial in many real-world applications. Estimation techniques have mainly utilized linear models or neural network based approaches with a focus on short term time dependencies. This paper, introduces a system model that incorporates temporal convolutions with both long term and short term time dependencies. The proposed network learns salient features and complex temporal variations in sensor values, and predicts the RUL. A data augmentation method is used for increased accuracy. The proposed method is compared with several state-of-the-art algorithms on publicly available datasets. It demonstrates promising results, with superior results for datasets obtained from complex environments.
△ Less
Submitted 10 December, 2018; v1 submitted 12 October, 2018;
originally announced October 2018.
-
Cluster-based Wireless Energy Transfer for Low Complex Energy Receivers
Authors:
Samith Abeywickrama,
Tharaka Samarasinghe,
Chau Yuen,
Rui Zhang
Abstract:
This paper proposes a novel channel estimation method and a cluster-based opportunistic scheduling policy, for a wireless energy transfer (WET) system consisting of multiple low-complex energy receivers (ERs) with limited processing capabilities. Firstly, in the training stage, the energy transmitter (ET) obtains a set of Received Signal Strength Indicator (RSSI) feedback values from all ERs, and…
▽ More
This paper proposes a novel channel estimation method and a cluster-based opportunistic scheduling policy, for a wireless energy transfer (WET) system consisting of multiple low-complex energy receivers (ERs) with limited processing capabilities. Firstly, in the training stage, the energy transmitter (ET) obtains a set of Received Signal Strength Indicator (RSSI) feedback values from all ERs, and these values are used to estimate the channels between the ET and all ERs. Next, based on the channel estimates, the ERs are grouped into clusters, and the cluster that has its members closest to its centroid in phase is selected for dedicated WET. The beamformer that maximizes the minimum harvested energy among all ERs in the selected cluster is found by solving a convex optimization problem. All ERs have the same chance of being selected regardless of their distances from the ET, and hence, this scheduling policy can be considered to be opportunistic as well as fair. It is shown that the proposed method achieves significant performance gains over benchmark schemes.
△ Less
Submitted 20 March, 2018;
originally announced March 2018.
-
Wireless Energy Transfer to a Pair of Energy Receivers using Signal Strength Feedback
Authors:
Chanaka Singhabahu,
Tharaka Samarasinghe,
Samith Abeywickrama,
Chau Yuen
Abstract:
This paper focuses on wireless energy transfer (WET) to a pair of low complex energy receivers (ER), by only utilizing received signal strength indicator (RSSI) values that are fed back from the ERs to the energy transmitter (ET). Selecting the beamformer that maximizes the total average energy transfer between the ET and the ERs, while satisfying a minimum harvested energy criterion at each ER, i…
▽ More
This paper focuses on wireless energy transfer (WET) to a pair of low complex energy receivers (ER), by only utilizing received signal strength indicator (RSSI) values that are fed back from the ERs to the energy transmitter (ET). Selecting the beamformer that maximizes the total average energy transfer between the ET and the ERs, while satisfying a minimum harvested energy criterion at each ER, is studied. This is a nonconvex constrained optimization problem which is difficult to solve analytically. Also, any analytical solution to the problem should only consists of parameters that the ET knows, or the ET can estimate, as utilizing only RSSI feedback values for channel estimation prohibits estimating some channel parameters. Thus, the paper focuses on obtaining a suboptimal solution analytically. It is proven that if the channels between the ET and the ERs satisfy a certain sufficient condition, this solution is in fact optimal. Simulations show that the optimality gap is negligibly small as well. Insights into a system with more than two ERs are also presented. To this end, it is highlighted that if the number of ERs is large enough, it is possible to always find a pair of ERs satisfying the sufficient condition, and hence, a pairwise scheduling policy that does not violate optimality can be used for the WET.
△ Less
Submitted 12 March, 2018;
originally announced March 2018.
-
Wireless Energy Beamforming Using Signal Strength Feedback
Authors:
Samith Abeywickrama,
Tharaka Samarasinghe,
Chin Keong Ho
Abstract:
Multiple antenna techniques, that allow energy beamforming, have been looked upon as a possible candidate for increasing the efficiency of the transfer process between the energy transmitter (ET) and the energy receiver (ER) in wireless energy transfer. This paper introduces a novel scheme that facilitates energy beamforming by utilizing Received Signal Strength Indicator (RSSI) values to estimate…
▽ More
Multiple antenna techniques, that allow energy beamforming, have been looked upon as a possible candidate for increasing the efficiency of the transfer process between the energy transmitter (ET) and the energy receiver (ER) in wireless energy transfer. This paper introduces a novel scheme that facilitates energy beamforming by utilizing Received Signal Strength Indicator (RSSI) values to estimate the channel. Firstly, in the training stage, the ET will transmit sequentially using each beamforming vector in a codebook, which is pre-defined using a Cramer-Rao lower bound analysis. The RSSI value corresponding to each beamforming vector is fed back to the ET, and these values are used to estimate the channel through a maximum likelihood analysis. The results that are obtained are remarkably simple, requires minimal processing, and can be easily implemented. Also, the results are general and hold for all well known fading models. The paper also validates the analytical results numerically, as well as experimentally, and it is shown that the proposed method achieves impressive results in wireless energy transfer.
△ Less
Submitted 10 December, 2017;
originally announced December 2017.
-
Wireless Energy Beamforming using Received Signal Strength Indicator Feedback
Authors:
Samith Abeywickrama,
Tharaka Samarasinghe,
Chin Keong Ho,
Chau Yuen
Abstract:
Multiple antenna techniques that allow energy beamforming have been looked upon as a possible candidate for increasing the transfer efficiency between the energy transmitter (ET) and the energy receiver (ER) in wireless power transfer. This paper introduces a novel scheme that facilitates energy beamforming by utilizing Received Signal Strength Indicator (RSSI) values to estimate the channel. Firs…
▽ More
Multiple antenna techniques that allow energy beamforming have been looked upon as a possible candidate for increasing the transfer efficiency between the energy transmitter (ET) and the energy receiver (ER) in wireless power transfer. This paper introduces a novel scheme that facilitates energy beamforming by utilizing Received Signal Strength Indicator (RSSI) values to estimate the channel. Firstly, in the training stage, the ET will transmit using each beamforming vector in a codebook, which is pre-defined using a Cramer-Rao lower bound analysis. RSSI value corresponding to each beamforming vector is fed back to the ET, and these values are used to estimate the channel through a maximum likelihood analysis. The results that are obtained are remarkably simple, requires minimal processing, and can be easily implemented. The paper also validates the analytical results numerically, as well as experimentally, and it is shown that the proposed method achieves impressive results.
△ Less
Submitted 30 November, 2017; v1 submitted 4 April, 2017;
originally announced May 2017.
-
Optimizing user selection schemes in vector broadcast channels
Authors:
Meng Wang,
Tharaka Samarasinghe,
Jamie S. Evans
Abstract:
In this paper, we focus on the ergodic downlink sum-rate performance of a system consisting of a set of heterogeneous users. We study three user selection schemes to group near-orthogonal users for simultaneous transmission. The first scheme is a random selection policy that achieves fairness, but does not exploit multi-user diversity. The second scheme is a greedy selection policy that fully expl…
▽ More
In this paper, we focus on the ergodic downlink sum-rate performance of a system consisting of a set of heterogeneous users. We study three user selection schemes to group near-orthogonal users for simultaneous transmission. The first scheme is a random selection policy that achieves fairness, but does not exploit multi-user diversity. The second scheme is a greedy selection policy that fully exploits multi-user diversity, but does not achieve fairness, and the third scheme achieves fairness while partially exploiting multi-user diversity. We also consider two beamforming methods for data transmission, namely, maximum-ratio transmission and zero-forcing beamforming. In all scheduling schemes studied in the paper, there is a key parameter that controls the degrees of orthogonality of channel directions between co-scheduled users. We focus on optimally setting this parameter for each scheduling scheme such that the ergodic downlink sum-rate is maximized. To this end, we derive analytical expressions for the ergodic downlink sum-rate considering each scheduling scheme. Numerical results are also presented to provide further insights.
△ Less
Submitted 2 December, 2014;
originally announced December 2014.
-
Transmission Rank Selection for Opportunistic Beamforming with Quality of Service Constraints
Authors:
Meng Wang,
Tharaka Samarasinghe,
Jamie Evans
Abstract:
In this paper, we consider a multi-cell multi-user MISO broadcast channel. The system operates according to the opportunistic beamforming framework in a multi-cell environment with variable number of transmit beams (may alternatively be referred as the transmission rank) at each base station. The maximum number of co-scheduled users in a cell is equal to its transmission rank, thus increasing it w…
▽ More
In this paper, we consider a multi-cell multi-user MISO broadcast channel. The system operates according to the opportunistic beamforming framework in a multi-cell environment with variable number of transmit beams (may alternatively be referred as the transmission rank) at each base station. The maximum number of co-scheduled users in a cell is equal to its transmission rank, thus increasing it will have the effect of increasing the multiplexing gain. However, this will simultaneously increase the amount of interference in the network, which will decrease the rate of communication. This paper focuses on optimally setting the transmission rank at each base station such that a set of Quality of Service (QoS) constraints, that will ensure a guaranteed minimum rate per beam at each base station, is not violated. Expressions representing the achievable region of transmission ranks are obtained considering different network settings. The achievable transmission rank region consists of all achievable transmission rank tuples that satisfy the QoS constraints. Numerical results are also presented to provide further insights on the feasibility problem.
△ Less
Submitted 10 May, 2014;
originally announced May 2014.
-
Outage Capacity of Opportunistic Beamforming with Random User Locations
Authors:
Tharaka Samarasinghe,
Hazer Inaltekin,
Jamie Evans
Abstract:
This paper studies the outage capacity of a network consisting of a multitude of heterogenous mobile users, and operating according to the classical opportunistic beamforming framework. The base station is located at the center of the cell, which is modeled as a disk of finite radius. The random user locations are modeled using a homogenous spatial Poisson point process. The received signals are i…
▽ More
This paper studies the outage capacity of a network consisting of a multitude of heterogenous mobile users, and operating according to the classical opportunistic beamforming framework. The base station is located at the center of the cell, which is modeled as a disk of finite radius. The random user locations are modeled using a homogenous spatial Poisson point process. The received signals are impaired by both fading and location dependent path loss. For this system, we first derive an expression for the beam outage probability. This expression holds for all path loss models that satisfy some mild conditions. Then, we focus on two specific path loss models (i.e., an unbounded model and a more realistic bounded one) to illustrate the applications of our results. In the large system limit where the cell radius tends to infinity, the beam outage capacity and its scaling behavior are derived for the selected specific path loss models. It is shown that the beam outage capacity scales logarithmically for the unbounded model. On the other hand, this scaling behavior becomes double logarithmic for the bounded model. Intuitive explanations are provided as to why we observe different scaling behavior for different path loss models. Numerical evaluations are performed to give further insights, and to illustrate the applicability of the outage capacity results even to a cell having a small finite radius.
△ Less
Submitted 26 September, 2013;
originally announced September 2013.
-
Optimal Selective Feedback Policies for Opportunistic Beamforming
Authors:
Tharaka Samarasinghe,
Hazer Inaltekin,
Jamie S. Evans
Abstract:
This paper studies the structure of downlink sum-rate maximizing selective decentralized feedback policies for opportunistic beamforming under finite feedback constraints on the average number of mobile users feeding back. Firstly, it is shown that any sum-rate maximizing selective decentralized feedback policy must be a threshold feedback policy. This result holds for all fading channel models wi…
▽ More
This paper studies the structure of downlink sum-rate maximizing selective decentralized feedback policies for opportunistic beamforming under finite feedback constraints on the average number of mobile users feeding back. Firstly, it is shown that any sum-rate maximizing selective decentralized feedback policy must be a threshold feedback policy. This result holds for all fading channel models with continuous distribution functions. Secondly, the resulting optimum threshold selection problem is analyzed in detail. This is a non-convex optimization problem over finite dimensional Euclidean spaces. By utilizing the theory of majorization, an underlying Schur-concave structure in the sum-rate function is identified, and the sufficient conditions for the optimality of homogenous threshold feedback policies are obtained. Applications of these results are illustrated for well known fading channel models such as Rayleigh, Nakagami and Rician fading channels, along with various engineering and design insights. Rather surprisingly, it is shown that using the same threshold value at all mobile users is not always a rate-wise optimal feedback strategy, even for a network with identical mobile users experiencing statistically the same channel conditions. For the Rayleigh fading channel model, on the other hand, homogenous threshold feedback policies are proven to be rate-wise optimal if multiple orthonormal data carrying beams are used to communicate with multiple mobile users simultaneously.
△ Less
Submitted 24 July, 2011;
originally announced July 2011.
-
Vector Broadcast Channels: Optimal Threshold Selection Problem
Authors:
Tharaka Samarasinghe,
Hazer Inaltekin,
Jamie Evans
Abstract:
Threshold feedback policies are well known and provably rate-wise optimal selective feedback techniques for communication systems requiring partial channel state information (CSI). However, optimal selection of thresholds at mobile users to maximize information theoretic data rates subject to feedback constraints is an open problem. In this paper, we focus on the optimal threshold selection proble…
▽ More
Threshold feedback policies are well known and provably rate-wise optimal selective feedback techniques for communication systems requiring partial channel state information (CSI). However, optimal selection of thresholds at mobile users to maximize information theoretic data rates subject to feedback constraints is an open problem. In this paper, we focus on the optimal threshold selection problem, and provide a solution for this problem for finite feedback systems. Rather surprisingly, we show that using the same threshold values at all mobile users is not always a rate-wise optimal feedback strategy, even for a system with identical users experiencing statistically the same channel conditions. By utilizing the theory of majorization, we identify an underlying Schur-concave structure in the rate function and obtain sufficient conditions for a homogenous threshold feedback policy to be optimal. Our results hold for most fading channel models, and we illustrate an application of our results to familiar Rayleigh fading channels.
△ Less
Submitted 24 March, 2011;
originally announced March 2011.
-
Vector Broadcast Channels: Optimality of Threshold Feedback Policies
Authors:
Tharaka Samarasinghe,
Hazer Inaltekin,
Jamie Evans
Abstract:
Beamforming techniques utilizing only partial channel state information (CSI) has gained popularity over other communication strategies requiring perfect CSI thanks to their lower feedback requirements. The amount of feedback in beamforming based communication systems can be further reduced through selective feedback techniques in which only the users with channels good enough are allowed to feed…
▽ More
Beamforming techniques utilizing only partial channel state information (CSI) has gained popularity over other communication strategies requiring perfect CSI thanks to their lower feedback requirements. The amount of feedback in beamforming based communication systems can be further reduced through selective feedback techniques in which only the users with channels good enough are allowed to feed back by means of a decentralized feedback policy. In this paper, we prove that thresholding at the receiver is the rate-wise optimal decentralized feedback policy for feedback limited systems with prescribed feedback constraints. This result is highly adaptable due to its distribution independent nature, provides an analytical justification for the use of threshold feedback policies in practical systems, and reinforces previous work analyzing threshold feedback policies as a selective feedback technique without proving its optimality. It is robust to selfish unilateral deviations. Finally, it reduces the search for rate-wise optimal feedback policies subject to feedback constraints from function spaces to a finite dimensional Euclidean space.
△ Less
Submitted 24 March, 2011;
originally announced March 2011.