-
Nonlinear Power Amplifier-Resilient Cell-Free Massive MIMO: A Joint Optimization Approach
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
This letter analyzes the effects of power amplifiers (PAs) on the downlink of cell-free massive MIMO systems. We model signal transmission incorporating nonlinear PA distortion and derive a unified spectral efficiency (SE) expression applicable to arbitrary precoding schemes. To combat PA-induced performance degradation, a joint optimization approach for user association and max-min power control…
▽ More
This letter analyzes the effects of power amplifiers (PAs) on the downlink of cell-free massive MIMO systems. We model signal transmission incorporating nonlinear PA distortion and derive a unified spectral efficiency (SE) expression applicable to arbitrary precoding schemes. To combat PA-induced performance degradation, a joint optimization approach for user association and max-min power control is proposed. Furthermore, a low-complexity alternative is developed to approximate the joint optimization with reduced computational overhead. Simulations validate the analysis and demonstrate significant performance gains of the proposed approaches over conventional techniques.
△ Less
Submitted 27 June, 2025;
originally announced June 2025.
-
Heterogeneous Massive MIMO: A Cost-Efficient Technique for Uniform Service in Cellular Networks
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Massive multi-input multi-output (MIMO) has evolved along two tracks: cellular and cell-free, each with unique advantages and limitations. The cellular approach suffers from worse user spectral efficiency at cell edges, whereas the cell-free approach incurs high implementation costs due to a large-scale distributed infrastructure. This paper introduces a novel networking paradigm, termed heterogen…
▽ More
Massive multi-input multi-output (MIMO) has evolved along two tracks: cellular and cell-free, each with unique advantages and limitations. The cellular approach suffers from worse user spectral efficiency at cell edges, whereas the cell-free approach incurs high implementation costs due to a large-scale distributed infrastructure. This paper introduces a novel networking paradigm, termed heterogeneous massive MIMO (HmMIMO), which seamlessly integrates co-located and distributed antennas. Differing from two conventional paradigms, HmMIMO remains a base station with a large antenna array at the center of each cell, aided by distributed antennas deployed at cell edges. Our findings demonstrate that this paradigm achieves a favorable trade-off between performance and implementation complexity.
△ Less
Submitted 27 June, 2025;
originally announced June 2025.
-
A Survey on the Role of Artificial Intelligence and Machine Learning in 6G-V2X Applications
Authors:
Donglin Wang,
Anjie Qiu,
Qiuheng Zhou,
Hans D. Schotten
Abstract:
The rapid advancement of Vehicle-to-Everything (V2X) communication is transforming Intelligent Transportation Systems (ITS), with 6G networks expected to provide ultra-reliable, low-latency, and high-capacity connectivity for Connected and Autonomous Vehicles (CAVs). Artificial Intelligence (AI) and Machine Learning (ML) have emerged as key enablers in optimizing V2X communication by enhancing net…
▽ More
The rapid advancement of Vehicle-to-Everything (V2X) communication is transforming Intelligent Transportation Systems (ITS), with 6G networks expected to provide ultra-reliable, low-latency, and high-capacity connectivity for Connected and Autonomous Vehicles (CAVs). Artificial Intelligence (AI) and Machine Learning (ML) have emerged as key enablers in optimizing V2X communication by enhancing network management, predictive analytics, security, and cooperative driving due to their outstanding performance across various domains, such as natural language processing and computer vision. This survey comprehensively reviews recent advances in AI and ML models applied to 6G-V2X communication. It focuses on state-of-the-art techniques, including Deep Learning (DL), Reinforcement Learning (RL), Generative Learning (GL), and Federated Learning (FL), with particular emphasis on developments from the past two years. Notably, AI, especially GL, has shown remarkable progress and emerging potential in enhancing the performance, adaptability, and intelligence of 6G-V2X systems. Despite these advances, a systematic summary of recent research efforts in this area remains lacking, which this survey aims to address. We analyze their roles in 6G-V2X applications, such as intelligent resource allocation, beamforming, intelligent traffic management, and security management. Furthermore, we explore the technical challenges, including computational complexity, data privacy, and real-time decision-making constraints, while identifying future research directions for AI-driven 6G-V2X development. This study aims to provide valuable insights for researchers, engineers, and policymakers working towards realizing intelligent, AI-powered V2X ecosystems in 6G communication.
△ Less
Submitted 11 June, 2025;
originally announced June 2025.
-
FedAvgen: Metadata for Model Aggregation In Communication Systems
Authors:
Anthony Kiggundu,
Dennis Krummacker,
Hans D. Schotten
Abstract:
To improve business efficiency and minimize costs, Artificial Intelligence (AI) practitioners have adopted a shift from formulating models from scratch towards sharing pretrained models. The pretrained models are then aggregated into a global model with higher generalization capabilities, which is afterwards distributed to the client devices. This approach is known as federated learning and inhere…
▽ More
To improve business efficiency and minimize costs, Artificial Intelligence (AI) practitioners have adopted a shift from formulating models from scratch towards sharing pretrained models. The pretrained models are then aggregated into a global model with higher generalization capabilities, which is afterwards distributed to the client devices. This approach is known as federated learning and inherently utilizes different techniques to select the candidate client models averaged to obtain the global model. This approach, in the case of communication systems, faces challenges arising from the existential diversity in device profiles. The multiplicity in profiles motivates our conceptual assessment of a metaheuristic algorithm (FedAvgen), which relates each pretrained model with its weight space as metadata, to a phenotype and genotype, respectively. This parent-child genetic evolution characterizes the global averaging step in federated learning. We then compare the results of our approach to two widely adopted baseline federated learning algorithms like Federated Averaging (FedAvg) and Federated Stochastic Gradient Descent (FedSGD).
△ Less
Submitted 28 April, 2025;
originally announced May 2025.
-
Trajectory Planning with Model Predictive Control for Obstacle Avoidance Considering Prediction Uncertainty
Authors:
Eric Schöneberg,
Michael Schröder,
Daniel Görges,
Hans D. Schotten
Abstract:
This paper introduces a novel trajectory planner for autonomous robots, specifically designed to enhance navigation by incorporating dynamic obstacle avoidance within the Robot Operating System 2 (ROS2) and Navigation 2 (Nav2) framework. The proposed method utilizes Model Predictive Control (MPC) with a focus on handling the uncertainties associated with the movement prediction of dynamic obstacle…
▽ More
This paper introduces a novel trajectory planner for autonomous robots, specifically designed to enhance navigation by incorporating dynamic obstacle avoidance within the Robot Operating System 2 (ROS2) and Navigation 2 (Nav2) framework. The proposed method utilizes Model Predictive Control (MPC) with a focus on handling the uncertainties associated with the movement prediction of dynamic obstacles. Unlike existing Nav2 trajectory planners which primarily deal with static obstacles or react to the current position of dynamic obstacles, this planner predicts future obstacle positions using a stochastic Vector Auto-Regressive Model (VAR). The obstacles' future positions are represented by probability distributions, and collision avoidance is achieved through constraints based on the Mahalanobis distance, ensuring the robot avoids regions where obstacles are likely to be. This approach considers the robot's kinodynamic constraints, enabling it to track a reference path while adapting to real-time changes in the environment. The paper details the implementation, including obstacle prediction, tracking, and the construction of feasible sets for MPC. Simulation results in a Gazebo environment demonstrate the effectiveness of this method in scenarios where robots must navigate around each other, showing improved collision avoidance capabilities.
△ Less
Submitted 27 April, 2025;
originally announced April 2025.
-
Implementation Analysis of Collaborative Robot Digital Twins in Physics Engines
Authors:
Christian König,
Jan Petershans,
Jan Herbst,
Matthias Rüb,
Dennis Krummacker,
Eric Mittag,
Hans D. Schotten
Abstract:
This paper presents a Digital Twin (DT) of a 6G communications system testbed that integrates two robotic manipulators with a high-precision optical infrared tracking system in Unreal Engine 5. Practical details of the setup and implementation insights provide valuable guidance for users aiming to replicate such systems, an endeavor that is crucial to advancing DT applications within the scientifi…
▽ More
This paper presents a Digital Twin (DT) of a 6G communications system testbed that integrates two robotic manipulators with a high-precision optical infrared tracking system in Unreal Engine 5. Practical details of the setup and implementation insights provide valuable guidance for users aiming to replicate such systems, an endeavor that is crucial to advancing DT applications within the scientific community. Key topics discussed include video streaming, integration within the Robot Operating System 2 (ROS 2), and bidirectional communication. The insights provided are intended to support the development and deployment of DTs in robotics and automation research.
△ Less
Submitted 28 April, 2025; v1 submitted 25 April, 2025;
originally announced April 2025.
-
Hierarchical Cell-Free Massive MIMO: A Simplified Design for Uniform Service Quality
Authors:
Wei Jiang,
Hans Dieter Schotten
Abstract:
In traditional cellular networks, users at the cell edge often suffer from poor quality of service (QoS) due to large distance-dependent path loss and severe inter-cell interference. While cell-free (CF) massive multi-input multi-out (MIMO) mitigates this issue by distributing access points (APs) to ensure uniform QoS, the deployment of numerous distributed APs and a fronthaul network incurs high…
▽ More
In traditional cellular networks, users at the cell edge often suffer from poor quality of service (QoS) due to large distance-dependent path loss and severe inter-cell interference. While cell-free (CF) massive multi-input multi-out (MIMO) mitigates this issue by distributing access points (APs) to ensure uniform QoS, the deployment of numerous distributed APs and a fronthaul network incurs high infrastructure costs. To balance performance and cost efficiency, this article proposes a simplified design called hierarchical cell-free (HCF) massive MIMO. The key idea is to reduce the number of APs, thus minimizing the scale of the fronthaul network. The antennas from the decommissioned APs are aggregated at a central base station (cBS), which also serves as the coordinator for distributed APs. We derive closed-form expressions for uplink and downlink spectral efficiency (SE) for HCF, CF, and cellular massive MIMO under pilot contamination and correlated fading channels, considering the use of multi-antenna APs. Numerical results confirm that the hierarchical architecture achieves $95\%$-likely per-user SE comparable to CF, enhancing cell-edge user rates in cellular systems by over 100 times, while significantly reducing the complexity and cost of the fronthaul network in CF. We develop max-min fairness algorithms for joint power control of the cBS and APs in the downlink, and the users in the uplink. These algorithms not only boost fairness and system capacity but also dramatically lower transmission power, e.g., achieving over $70\%$ savings in uplink, particularly beneficial for battery-powered mobile devices.
△ Less
Submitted 25 April, 2025;
originally announced April 2025.
-
Improving QoS Prediction in Urban V2X Networks by Leveraging Data from Leading Vehicles and Historical Trends
Authors:
Sanket Partani,
Michael Zentarra,
Anthony Kiggundu,
Hans D. Schotten
Abstract:
With the evolution of Vehicle-to-Everything (V2X) technology and increased deployment of 5G networks and edge computing, Predictive Quality of Service (PQoS) is seen as an enabler for resilient and adaptive V2X communication systems. PQoS incorporates data-driven techniques, such as Machine Learning (ML), to forecast/predict Key Performing Indicators (KPIs) such as throughput, latency, etc. In thi…
▽ More
With the evolution of Vehicle-to-Everything (V2X) technology and increased deployment of 5G networks and edge computing, Predictive Quality of Service (PQoS) is seen as an enabler for resilient and adaptive V2X communication systems. PQoS incorporates data-driven techniques, such as Machine Learning (ML), to forecast/predict Key Performing Indicators (KPIs) such as throughput, latency, etc. In this paper, we aim to predict downlink throughput in an urban environment using the Berlin V2X cellular dataset. We select features from the ego and lead vehicles to train different ML models to help improve the predicted throughput for the ego vehicle. We identify these features based on an in-depth exploratory data analysis. Results show an improvement in model performance when adding features from the lead vehicle. Moreover, we show that the improvement in model performance is model-agnostic.
△ Less
Submitted 23 April, 2025;
originally announced April 2025.
-
A Novel Dynamic Epidemic Model for Successive Opinion Diffusion in Social Networks
Authors:
Bin Han,
Fabienne Renckens,
C. Clark Cao,
Hans D. Schotten
Abstract:
This paper proposes a dynamic epidemic model for successive opinion diffusion in social networks, extending the SHIMR model. It incorporates dynamic decision-making influenced by social distances and captures accumulative opinion diffusion caused by interrelated rumors. The model reflects the impact of rumor spread on social network structures. Simulations validate its effectiveness in explaining…
▽ More
This paper proposes a dynamic epidemic model for successive opinion diffusion in social networks, extending the SHIMR model. It incorporates dynamic decision-making influenced by social distances and captures accumulative opinion diffusion caused by interrelated rumors. The model reflects the impact of rumor spread on social network structures. Simulations validate its effectiveness in explaining phenomena like the echo chamber effect and provide insights into opinion diffusion dynamics, with implications for understanding social polarization and network evolution.
△ Less
Submitted 2 April, 2025;
originally announced April 2025.
-
Buyer-Initiated Auction Mechanism for Data Redemption in Machine Unlearning
Authors:
Bin Han,
Di Feng,
Jie Wang,
Hans D. Schotten
Abstract:
The rapid growth of artificial intelligence (AI) has raised privacy concerns over user data, leading to regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). With the essential toolbox provided by machine unlearning, AI service providers are now able to remove user data from their trained models as well as the training datasets, so as to com…
▽ More
The rapid growth of artificial intelligence (AI) has raised privacy concerns over user data, leading to regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). With the essential toolbox provided by machine unlearning, AI service providers are now able to remove user data from their trained models as well as the training datasets, so as to comply with such regulations. However, extensive data redemption can be costly and degrade model accuracy. To balance the cost of unlearning and the privacy protection, we propose a buyer-initiated auction mechanism for data redemption, enabling the service provider to purchase data from willing users with appropriate compensation. This approach does not require the server to have any a priori knowledge about the users' privacy preference, and provides an efficient solution for maximizing the social welfare in the investigated problem.
△ Less
Submitted 15 April, 2025; v1 submitted 29 March, 2025;
originally announced March 2025.
-
A Frequency-Domain Opportunistic Approach for Spectral-Efficient Cell-Free Massive MIMO
Authors:
Wei Jiang,
Hans Dieter Schotten
Abstract:
Constrained by weak signal strength and significant inter-cell interference, users located at the cell edge in a cellular network suffer from inferior service quality. Recently, cell-free massive MIMO (CFmMIMO) has gained considerable attention due to its capability to offer uniform quality of service, alleviating the cell-edge problem. In contrast to previous studies focused on narrow-band CFmMIM…
▽ More
Constrained by weak signal strength and significant inter-cell interference, users located at the cell edge in a cellular network suffer from inferior service quality. Recently, cell-free massive MIMO (CFmMIMO) has gained considerable attention due to its capability to offer uniform quality of service, alleviating the cell-edge problem. In contrast to previous studies focused on narrow-band CFmMIMO systems, this paper studies wideband CFmMIMO communications against channel frequency selectivity. By exploiting the frequency-domain flexibility offered by orthogonal frequency-division multiplexing (OFDM), and leveraging a particular spatial characteristic in the cell-free structure -- namely, the near-far effect among distributed access points (APs) -- we propose an opportunistic approach to boost spectral efficiency. The core concept lies in opportunistically activating nearby APs for certain users across their assigned OFDM subcarriers while deactivating distant APs to prevent power wastage and lower inter-user interference. Furthermore, this approach enables the use of downlink pilots by reducing the number of active APs per subcarrier to a small subset, thereby substantially improving downlink performance through coherent detection at the user receiver. Verified by numerical results, our proposed approach demonstrates considerable performance improvement compared to the two benchmark approaches.
△ Less
Submitted 24 February, 2025;
originally announced February 2025.
-
VENENA: A Deceptive Visual Encryption Framework for Wireless Semantic Secrecy
Authors:
Bin Han,
Ye Yuan,
Hans D. Schotten
Abstract:
Eavesdropping has been a long-standing threat to the security and privacy of wireless communications, since it is difficult to detect and costly to prevent. As networks evolve towards Sixth Generation (6G) and semantic communication becomes increasingly central to next-generation wireless systems, securing semantic information transmission emerges as a critical challenge. While classical physical…
▽ More
Eavesdropping has been a long-standing threat to the security and privacy of wireless communications, since it is difficult to detect and costly to prevent. As networks evolve towards Sixth Generation (6G) and semantic communication becomes increasingly central to next-generation wireless systems, securing semantic information transmission emerges as a critical challenge. While classical physical layer security (PLS) focuses on passive security, the recently proposed concept of physical layer deception (PLD) offers a semantic encryption measure to actively deceive eavesdroppers. Yet the existing studies of PLD have been dominantly information-theoretical and link-level oriented, lacking considerations of system-level design and practical implementation.
In this work we propose a novel artificial intelligence (AI)-enabled framework called Visual ENcryption for Eavesdropping NegAtion (VENENA), which combines the techniques of PLD, visual encryption, and image poisoning, into a comprehensive mechanism for deceptive secure semantic transmission in future wireless networks. By leveraging advanced vision transformers and semantic codecs, VENENA demonstrates how semantic security can be enhanced through the synergy of physical layer techniques and artificial intelligence, paving the way for secure semantic communication in 6G networks.
△ Less
Submitted 18 January, 2025;
originally announced January 2025.
-
Towards Beyond Communications 6G Networks Status and Challenges
Authors:
Vasileios Tsekenis,
Sokratis Barmpounakis,
Panagiotis Demestichas,
Stefan Wänstedt,
Mohammad Asif Habibi,
Hans D. Schotten,
Ozgur Umut Akgul,
Hamed Hellaoui,
Apostolos Kousaridas,
Milan Zivkovic,
Panagiotis Botsinis,
Sameh Eldessoki,
Milan Groshev,
Torgny Palenius
Abstract:
Wireless communication has profoundly transformed the way we experience the world. For instance, at most events, attendees commonly utilize their smartphones to document and share their experiences. This shift in user behavior largely stems from the cellular network s capacity for communication. However, as networks become increasingly sophisticated, new opportunities arise to leverage the network…
▽ More
Wireless communication has profoundly transformed the way we experience the world. For instance, at most events, attendees commonly utilize their smartphones to document and share their experiences. This shift in user behavior largely stems from the cellular network s capacity for communication. However, as networks become increasingly sophisticated, new opportunities arise to leverage the network for services beyond mere communication, collectively termed Beyond Communication Services (BCS). These services encompass joint communications and sensing, network as a service, and distributed computing. This paper presents examples of BCS and identifies the enablers necessary to facilitate their realization in sixth generation (6G). These enablers encompass exposing data and network capabilities, optimizing protocols and procedures for BCS, optimizing compute offloading protocols and signalling, and employing application and device-driven optimization strategies.
△ Less
Submitted 5 January, 2025;
originally announced January 2025.
-
Physical Layer Deception in OFDM Systems
Authors:
Wenwen Chen,
Bin Han,
Yao Zhu,
Anke Schmeink,
Hans D. Schotten
Abstract:
As a promising technology, physical layer security (PLS) enhances security by leveraging the physical characteristics of communication channels. However, it commonly takes the legitimate user more effort to secure its data, compared to that required by the eavesdropper to intercept the communication. To address this imbalance, we propose a physical layer deception (PLD) framework, which applies ra…
▽ More
As a promising technology, physical layer security (PLS) enhances security by leveraging the physical characteristics of communication channels. However, it commonly takes the legitimate user more effort to secure its data, compared to that required by the eavesdropper to intercept the communication. To address this imbalance, we propose a physical layer deception (PLD) framework, which applies random deceptive ciphering combined with orthogonal frequency-division multiplexing (OFDM) to deceive eavesdroppers with falsified information, preventing them from wiretapping. While ensuring the same level of confidentiality as traditional PLS methods, the PLD approach additionally introduces a deception mechanism, which remains effective even when the eavesdropper has the same knowledge about the transmitter as the legitimate receiver. Through detailed theoretical analysis and numerical simulations, we prove the superiority of our method over the conventional PLS approach.
△ Less
Submitted 12 February, 2025; v1 submitted 6 November, 2024;
originally announced November 2024.
-
OpenWiFiSync: Open Source Implementation of a Clock Synchronization Algorithm using Wi-Fi
Authors:
M. Gundall,
H. D. Schotten
Abstract:
Precise clock synchronization is an important requirement for distributed and networked industrial use cases. As more and more use cases contain mobile devices, clock synchronization has to be performed over wireless communication links. As wireless communication links are currently not as deterministic and reliable as wireline communication systems, novel clock synchronization algorithms have to…
▽ More
Precise clock synchronization is an important requirement for distributed and networked industrial use cases. As more and more use cases contain mobile devices, clock synchronization has to be performed over wireless communication links. As wireless communication links are currently not as deterministic and reliable as wireline communication systems, novel clock synchronization algorithms have to be investigated. Here, the so-called Reference Broadcast Infrastructure Synchronization Protocol is a well suited solution as it brings up multiple advantages. Most important is the non-invasiveness, meaning it can be used with commercially available components. As a considerably high amount of factories use Wi-Fi as wireless communication system for their mobile use cases, the aforementioned protocol is implemented using Wi-Fi. Furthermore, the usage of Open-Source Software can be seen as driver for highly efficient and interoperable applications. Consequently, the implementation is accessible under the GNU General Public License on GitHub under the designation OpenWiFiSync.
Besides the details on concept, its implementation, and the used testbed, first results are outlined within this paper. Additionally, future work and the estimated timeline are presented.
△ Less
Submitted 11 October, 2024;
originally announced October 2024.
-
Smart PRACH Jamming: A Serious Threat for 5G Campus Networks
Authors:
J. R. Stegmann,
M. Gundall,
H. D. Schotten
Abstract:
Smart jamming attacks on cellular campus networks represent an enormous potential threat, especially in the industrial environment. In complex production processes, the disruption of a single wireless connected Cyber-Physical System (CPS) is enough to cause a large-scale failure. In this paper, a smart jamming attack on the Physical Random Access Channel (PRACH) of a 5G system is modeled. This is…
▽ More
Smart jamming attacks on cellular campus networks represent an enormous potential threat, especially in the industrial environment. In complex production processes, the disruption of a single wireless connected Cyber-Physical System (CPS) is enough to cause a large-scale failure. In this paper, a smart jamming attack on the Physical Random Access Channel (PRACH) of a 5G system is modeled. This is followed by a practical implementation of the jammer on a testbed based on Open Air Interface (OAI) and Software Defined Radios (SDRs). It is shown that the designed jammer design can interfere a legitimate transmission of a PRACH preamble with a ratio of more than 99.9%. While less than one percent of the cell resources are interfered compared to broadband jamming. In addition, two different types of jamming signal spectra are compared in relation to their interference capacity. The developed attack can be re-implemented based on publicly available source code and Commercial Off-The-Shelf (COTS) hardware.
△ Less
Submitted 11 October, 2024;
originally announced October 2024.
-
5G as Enabler for Industrie 4.0 Use Cases: Challenges and Concepts
Authors:
M. Gundall,
J. Schneider,
H. D. Schotten,
M. Aleksy,
D. Schulz,
N. Franchi,
N. Schwarzenberg,
C. Markwart,
R. Halfmann,
P. Rost,
D. Wübben,
A. Neumann,
M. Düngen,
T. Neugebauer,
R. Blunk,
M. Kus,
J. Grießbach
Abstract:
The increasing demand for highly customized products, as well as flexible production lines, can be seen as trigger for the "fourth industrial revolution", referred to as "Industrie 4.0". Current systems usually rely on wire-line technologies to connect sensors and actuators. To enable a higher flexibility such as moving robots or drones, these connections need to be replaced by wireless technologi…
▽ More
The increasing demand for highly customized products, as well as flexible production lines, can be seen as trigger for the "fourth industrial revolution", referred to as "Industrie 4.0". Current systems usually rely on wire-line technologies to connect sensors and actuators. To enable a higher flexibility such as moving robots or drones, these connections need to be replaced by wireless technologies in the future. Furthermore, this facilitates the renewal of brownfield deployments to address Industrie 4.0 requirements. This paper proposes representative use cases, which have been examined in the German Tactile Internet 4.0 (TACNET 4.0) research project. In order to analyze these use cases, this paper identifies the main challenges and requirements of communication networks in Industrie 4.0 and discusses the applicability of 5th generation wireless communication systems (5G).
△ Less
Submitted 11 October, 2024;
originally announced October 2024.
-
A Semantic Model for Physical Layer Deception
Authors:
Bin Han,
Yao Zhu,
Anke Schmeink,
Giuseppe Caire,
Hans D. Schotten
Abstract:
Physical layer deception (PLD) is a novel security mechanism that combines physical layer security (PLS) with deception technologies to actively defend against eavesdroppers. In this paper, we establish a novel semantic model for PLD that evaluates its performance in terms of semantic distortion. By analyzing semantic distortion at varying levels of knowledge on the receiver's part regarding the k…
▽ More
Physical layer deception (PLD) is a novel security mechanism that combines physical layer security (PLS) with deception technologies to actively defend against eavesdroppers. In this paper, we establish a novel semantic model for PLD that evaluates its performance in terms of semantic distortion. By analyzing semantic distortion at varying levels of knowledge on the receiver's part regarding the key, we derive the receiver's optimal decryption strategy, and consequently, the transmitter's optimal deception strategy. The proposed semantic model provides a more generic understanding of the PLD approach independent from coding or multiplexing schemes, and allows for efficient real-time adaptation to fading channels.
△ Less
Submitted 7 October, 2024;
originally announced October 2024.
-
Architectural Challenges of Nomadic Networks in 6G
Authors:
Daniel Lindenschmitt,
Benedikt Veith,
Khurshid Alam,
Ainur Daurembekova,
Michael Gundall,
Mohammad Asif Habibi,
Bin Han,
Dennis Krummacker,
Philipp Rosemann,
Hans D. Schotten
Abstract:
This paper examines architectural challenges and opportunities arising from Nomadic Networks in the context of emerging 6G research. Nomadic networks are proposed as a solution to the limitations of stationary communication networks, providing enhanced connectivity for dynamic and mobile environments, such as large outdoor events, emergency situations and mobile industrial applications. The key re…
▽ More
This paper examines architectural challenges and opportunities arising from Nomadic Networks in the context of emerging 6G research. Nomadic networks are proposed as a solution to the limitations of stationary communication networks, providing enhanced connectivity for dynamic and mobile environments, such as large outdoor events, emergency situations and mobile industrial applications. The key requirements for nomadic networks are outlined, including functional split within the Radio Access Network and robust backhauling solutions. It also addresses the complexity of managing network components, ensuring interoperability with existing systems and maintaining stakeholder trust. A comprehensive architectural framework for Nomadic Networks in 6G is proposed. Different deployment scenarios for Nomadic Networks are investigated, including spawned, steered, and wandering Radio Access Networks as well as integrated, migrated and donated Core Networks. By introducing Nomadic-Network-as-a-Service and a related orchestration framework, the potential for flexible and scalable network management is emphasized. By addressing the architectural challenges, the paper provides a path for the successful implementation of Nomadic Networks towards more adaptable and flexible 6G networks that can meet the evolving needs of multiple sectors.
△ Less
Submitted 23 September, 2024;
originally announced September 2024.
-
Towards an AI/ML-driven SMO Framework in O-RAN: Scenarios, Solutions, and Challenges
Authors:
Mohammad Asif Habibi,
Bin Han,
Merve Saimler,
Ignacio Labrador Pavon,
Hans D. Schotten
Abstract:
The emergence of the open radio access network (O-RAN) architecture offers a paradigm shift in cellular network management and service orchestration, leveraging data-driven, intent-based, autonomous, and intelligent solutions. Within O-RAN, the service management and orchestration (SMO) framework plays a pivotal role in managing network functions (NFs), resource allocation, service provisioning, a…
▽ More
The emergence of the open radio access network (O-RAN) architecture offers a paradigm shift in cellular network management and service orchestration, leveraging data-driven, intent-based, autonomous, and intelligent solutions. Within O-RAN, the service management and orchestration (SMO) framework plays a pivotal role in managing network functions (NFs), resource allocation, service provisioning, and others. However, the increasing complexity and scale of O-RANs demand autonomous and intelligent models for optimizing SMO operations. To achieve this goal, it is essential to integrate intelligence and automation into the operations of SMO. In this manuscript, we propose three scenarios for integrating machine learning (ML) algorithms into SMO. We then focus on exploring one of the scenarios in which the non-real-time RAN intelligence controller (Non-RT RIC) plays a major role in data collection, as well as model training, deployment, and refinement, by proposing a centralized ML architecture. Finally, we identify potential challenges associated with implementing a centralized ML solution within SMO.
△ Less
Submitted 8 September, 2024;
originally announced September 2024.
-
Agricultural On-Demand Networks for 6G enabled by THz Communication
Authors:
Daniel Lindenschmitt,
Christoph Fischer,
Simon Haussmann,
Marc Kalter,
Ingmar Kallfass,
Hans D. Schotten
Abstract:
The transforming process in the scope of agriculture towards Smart Agriculture is an essential step to fulfill growing demands in respect to nourishment. Crucial challenges include establishing robust wireless communication in rural areas, enabling collaboration among agricultural machines, and integrating artificial intelligence into farming practices. Addressing these challenges necessitates a c…
▽ More
The transforming process in the scope of agriculture towards Smart Agriculture is an essential step to fulfill growing demands in respect to nourishment. Crucial challenges include establishing robust wireless communication in rural areas, enabling collaboration among agricultural machines, and integrating artificial intelligence into farming practices. Addressing these challenges necessitates a consistent communication system, with wireless communication emerging as a key enabler. Cellular technologies, as 5G and its successor 6G, can offer a comprehensive solution here. Leveraging technologies following the ITU-R M. 2160 recommendation like THz communication, low-latency wireless AI, and embedded sensing, can provide a flexible and energy-efficient infrastructure. This paper introduces on-demand networks based on the OpenRAN approach and a 7.2 functional split. By implementing THz front-hauling between components, a flexible application of 5G or future 6G networks can be realized. Experiments demonstrate that THz communication is suitable for data transmission over the eCPRI interface, particularly in terms of data rate, thereby reducing the need for wired alternatives such as fiber optic cables. Furthermore, limitations such as limited range are discussed, and possible initial solutions are presented. The integration of the OpenRAN standard further enhances flexibility, which is crucial in dynamic agricultural environments. This research contributes to the ongoing discourse on the transformative potential of 6G-enabled wireless communication in shaping the future of smart agriculture.
△ Less
Submitted 28 August, 2024;
originally announced August 2024.
-
Dynamic Spectrum Management for 6G Network-in-Network Concepts
Authors:
Daniel Lindenschmitt,
Paul Seehofer,
Marius Schmitz,
Jan Mertes,
Roland Bless,
Matthias Klar,
Martina Zitterbart,
Jan C. Aurich,
Hans D. Schotten
Abstract:
Flexible, self-organizing communication networks will be a key feature in the next mobile communication standard. Network-in-Network (NiN) is one important concept in 6G research, introducing sub-networks tailored to specific application requirements. These sub-networks may be dynamic, i.e., they may appear, disappear, or even move throughout the network. Moreover, sub-networks may operate within…
▽ More
Flexible, self-organizing communication networks will be a key feature in the next mobile communication standard. Network-in-Network (NiN) is one important concept in 6G research, introducing sub-networks tailored to specific application requirements. These sub-networks may be dynamic, i.e., they may appear, disappear, or even move throughout the network. Moreover, sub-networks may operate within a shared frequency spectrum, thereby requiring coordination among them. We demonstrate the concept of Dynamic Spectrum Management (DSM) for future 6G networks that dynamically (re-)allocates spectrum according to active sub-networks in the shared spectrum domain. Resilient control plane connectivity between sub-networks and the DSM is provided by the self-organizing routing protocol KIRA, enabling the aforementioned coordination. This demonstration presents an integrated solution of the DSM concept, providing increased flexibility to support diverse industrial applications and their individual performance requirements simultaneously within the context of a cyber-physical production system (CPPS). For the sub-networks, we use specifically designed hardware for wireless real-time communication and couple them with a network emulation. By switching sub-networks on and off, one can see that the DSM dynamically manages the spectrum allocations for them and that KIRA provides the required connectivity.
△ Less
Submitted 27 August, 2024;
originally announced August 2024.
-
Heterogeneous System Design for Cell-Free Massive MIMO in Wideband Communications
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Cell-free massive multi-input multi-output (CFmMIMO) offers uniform service quality through distributed access points (APs), yet unresolved issues remain. This paper proposes a heterogeneous system design that goes beyond the original CFmMIMO architecture by exploiting the synergy of a base station (BS) and distributed APs. Users are categorized as near users (NUs) and far users (FUs) depending on…
▽ More
Cell-free massive multi-input multi-output (CFmMIMO) offers uniform service quality through distributed access points (APs), yet unresolved issues remain. This paper proposes a heterogeneous system design that goes beyond the original CFmMIMO architecture by exploiting the synergy of a base station (BS) and distributed APs. Users are categorized as near users (NUs) and far users (FUs) depending on their proximity to the BS. The BS serves the NUs, while the APs cater to the FUs. Through activating only the closest AP of each FU, the use of downlink pilots is enabled, thereby enhancing performance. This heterogeneous design outperforms other homogeneous massive MIMO configurations, demonstrating superior sum capacity while maintaining comparable user-experienced rates. Moreover, it lowers the costs associated with AP installations and reduces signaling overhead for the fronthaul network.
△ Less
Submitted 15 August, 2024;
originally announced August 2024.
-
Nomadic Non-Public Networks for 6G: Use Cases and Key Performance Indicators
Authors:
Daniel Lindenschmitt,
Benedikt Veith,
Khurshid Alam,
Ainur Daurembekova,
Michael Gundall,
Mohammad Asif Habibi,
Bin Han,
Dennis Krummacker,
Philipp Rosemann,
Hans D. Schotten
Abstract:
The landscape of wireless communication systems is evolving rapidly, with a pivotal role envisioned for dynamic network structures and self-organizing networks in upcoming technologies like the 6G mobile communications standard. This evolution is fueled by the growing demand from diverse sectors, including industry, manufacturing, agriculture, and the public sector, each with increasingly specific…
▽ More
The landscape of wireless communication systems is evolving rapidly, with a pivotal role envisioned for dynamic network structures and self-organizing networks in upcoming technologies like the 6G mobile communications standard. This evolution is fueled by the growing demand from diverse sectors, including industry, manufacturing, agriculture, and the public sector, each with increasingly specific requirements. The establishment of non-public networks in the current 5G standard has laid a foundation, enabling independent operation within certain frequencies and local limitations, notably for Internet of Things applications. This paper explores the progression from non-public networks to nomadic non-public networks and their significance in the context of the forthcoming 6G era.
Building on existing work in dynamic network structures, non-public networks regulations, and alternative technological solutions, this paper introduces specific use cases enhanced by nomadic networks. In addition, relevant Key Performance Indicators are discussed on the basis of the presented use cases. These serve as a starting point for the definition of requirement clusters and thus for a evaluation metric of nomadic non-public networks. This work lays the groundwork for understanding the potential of nomadic non-public networks in the dynamic landscape of 6G wireless communication systems.
△ Less
Submitted 4 August, 2024; v1 submitted 29 July, 2024;
originally announced July 2024.
-
Latency optimized Deep Neural Networks (DNNs): An Artificial Intelligence approach at the Edge using Multiprocessor System on Chip (MPSoC)
Authors:
Seyed Nima Omidsajedi,
Rekha Reddy,
Jianming Yi,
Jan Herbst,
Christoph Lipps,
Hans Dieter Schotten
Abstract:
Almost in every heavily computation-dependent application, from 6G communication systems to autonomous driving platforms, a large portion of computing should be near to the client side. Edge computing (AI at Edge) in mobile devices is one of the optimized approaches for addressing this requirement. Therefore, in this work, the possibilities and challenges of implementing a low-latency and power-op…
▽ More
Almost in every heavily computation-dependent application, from 6G communication systems to autonomous driving platforms, a large portion of computing should be near to the client side. Edge computing (AI at Edge) in mobile devices is one of the optimized approaches for addressing this requirement. Therefore, in this work, the possibilities and challenges of implementing a low-latency and power-optimized smart mobile system are examined. Utilizing Field Programmable Gate Array (FPGA) based solutions at the edge will lead to bandwidth-optimized designs and as a consequence can boost the computational effectiveness at a system-level deadline. Moreover, various performance aspects and implementation feasibilities of Neural Networks (NNs) on both embedded FPGA edge devices (using Xilinx Multiprocessor System on Chip (MPSoC)) and Cloud are discussed throughout this research. The main goal of this work is to demonstrate a hybrid system that uses the deep learning programmable engine developed by Xilinx Inc. as the main component of the hardware accelerator. Then based on this design, an efficient system for mobile edge computing is represented by utilizing an embedded solution.
△ Less
Submitted 16 July, 2024;
originally announced July 2024.
-
Evaluation of Reinforcement Learning for Autonomous Penetration Testing using A3C, Q-learning and DQN
Authors:
Norman Becker,
Daniel Reti,
Evridiki V. Ntagiou,
Marcus Wallum,
Hans D. Schotten
Abstract:
Penetration testing is the process of searching for security weaknesses by simulating an attack. It is usually performed by experienced professionals, where scanning and attack tools are applied. By automating the execution of such tools, the need for human interaction and decision-making could be reduced. In this work, a Network Attack Simulator (NASim) was used as an environment to train reinfor…
▽ More
Penetration testing is the process of searching for security weaknesses by simulating an attack. It is usually performed by experienced professionals, where scanning and attack tools are applied. By automating the execution of such tools, the need for human interaction and decision-making could be reduced. In this work, a Network Attack Simulator (NASim) was used as an environment to train reinforcement learning agents to solve three predefined security scenarios. These scenarios cover techniques of exploitation, post-exploitation and wiretapping. A large hyperparameter grid search was performed to find the best hyperparameter combinations. The algorithms Q-learning, DQN and A3C were used, whereby A3C was able to solve all scenarios and achieve generalization. In addition, A3C could solve these scenarios with fewer actions than the baseline automated penetration testing. Although the training was performed on rather small scenarios and with small state and action spaces for the agents, the results show that a penetration test can successfully be performed by the RL agent.
△ Less
Submitted 22 July, 2024;
originally announced July 2024.
-
Physical Layer Deception with Non-Orthogonal Multiplexing
Authors:
Wenwen Chen,
Bin Han,
Yao Zhu,
Anke Schmeink,
Giuseppe Caire,
Hans D. Schotten
Abstract:
Physical layer security (PLS) is a promising technology to secure wireless communications by exploiting the physical properties of the wireless channel. However, the passive nature of PLS creates a significant imbalance between the effort required by eavesdroppers and legitimate users to secure data. To address this imbalance, in this article, we propose a novel framework of physical layer decepti…
▽ More
Physical layer security (PLS) is a promising technology to secure wireless communications by exploiting the physical properties of the wireless channel. However, the passive nature of PLS creates a significant imbalance between the effort required by eavesdroppers and legitimate users to secure data. To address this imbalance, in this article, we propose a novel framework of physical layer deception (PLD), which combines PLS with deception technologies to actively counteract wiretapping attempts. Combining a two-stage encoder with randomized ciphering and non-orthogonal multiplexing, the PLD approach enables the wireless communication system to proactively counter eavesdroppers with deceptive messages. Relying solely on the superiority of the legitimate channel over the eavesdropping channel, the PLD framework can effectively protect the confidentiality of the transmitted messages, even against eavesdroppers who possess knowledge equivalent to that of the legitimate receiver. We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches with comprehensive numerical benchmarks.
△ Less
Submitted 25 January, 2025; v1 submitted 30 June, 2024;
originally announced July 2024.
-
Exploring 6G Potential for Industrial Digital Twinning and Swarm Intelligence in Obstacle-Rich Environments
Authors:
Siyu Yuan,
Khurshid Alam,
Bin Han,
Dennis Krummacker,
Hans D. Schotten
Abstract:
With the advent of 6G technology, the demand for efficient and intelligent systems in industrial applications has surged, driving the need for advanced solutions in target localization. Utilizing swarm robots to locate unknown targets involves navigating increasingly complex environments. Digital Twinning (DT) offers a robust solution by creating a virtual replica of the physical world, which enha…
▽ More
With the advent of 6G technology, the demand for efficient and intelligent systems in industrial applications has surged, driving the need for advanced solutions in target localization. Utilizing swarm robots to locate unknown targets involves navigating increasingly complex environments. Digital Twinning (DT) offers a robust solution by creating a virtual replica of the physical world, which enhances the swarm's navigation capabilities. Our framework leverages DT and integrates Swarm Intelligence to store physical map information in the cloud, enabling robots to efficiently locate unknown targets. The simulation results demonstrate that the DT framework, augmented by Swarm Intelligence, significantly improves target location efficiency in obstacle-rich environments compared to traditional methods. This research underscores the potential of combining DT and Swarm Intelligence to advance the field of robotic navigation and target localization in complex industrial settings.
△ Less
Submitted 2 July, 2024; v1 submitted 28 June, 2024;
originally announced June 2024.
-
Cost-Effectiveness Analysis and Design of Cost-Efficient Cell-Free Massive MIMO Systems
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Cell-free massive multi-input multi-output (MIMO) has recently attracted much attention, attributed to its potential to deliver uniform service quality. However, the adoption of a cell-free architecture raises concerns about the high implementation costs associated with deploying numerous distributed access points (APs) and the need for fronthaul network installation. To ensure the sustainability…
▽ More
Cell-free massive multi-input multi-output (MIMO) has recently attracted much attention, attributed to its potential to deliver uniform service quality. However, the adoption of a cell-free architecture raises concerns about the high implementation costs associated with deploying numerous distributed access points (APs) and the need for fronthaul network installation. To ensure the sustainability of next-generation wireless networks, it is crucial to improve cost-effectiveness, alongside achieving high performance. To address this, we conduct a cost analysis of cell-free massive MIMO and build a unified model with varying numbers of antennas per AP. Our objective is to explore whether employing multi-antenna APs could reduce system costs while maintaining performance. The analysis and evaluation result in the identification of a cost-effective design for cell-free massive MIMO, providing valuable insights for practical implementation.
△ Less
Submitted 1 June, 2024;
originally announced June 2024.
-
GNN-based Anomaly Detection for Encoded Network Traffic
Authors:
Anasuya Chattopadhyay,
Daniel Reti,
Hans D. Schotten
Abstract:
The early research report explores the possibility of using Graph Neural Networks (GNNs) for anomaly detection in internet traffic data enriched with information. While recent studies have made significant progress in using GNNs for anomaly detection in finance, multivariate time-series, and biochemistry domains, there is limited research in the context of network flow data. In this report, we exp…
▽ More
The early research report explores the possibility of using Graph Neural Networks (GNNs) for anomaly detection in internet traffic data enriched with information. While recent studies have made significant progress in using GNNs for anomaly detection in finance, multivariate time-series, and biochemistry domains, there is limited research in the context of network flow data. In this report, we explore the idea that leverages information-enriched features extracted from network flow packet data to improve the performance of GNN in anomaly detection. The idea is to utilize feature encoding (binary, numerical, and string) to capture the relationships between the network components, allowing the GNN to learn latent relationships and better identify anomalies.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Unified Modeling and Performance Comparison for Cellular and Cell-Free Massive MIMO
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Cell-free massive multi-input multi-output (MIMO) has recently gained a lot of attention due to its high potential in sixth-generation (6G) wireless systems. The goal of this paper is to first present a unified modeling for massive MIMO, encompassing both cellular and cell-free architectures with a variable number of antennas per access point. We derive signal transmission models and achievable sp…
▽ More
Cell-free massive multi-input multi-output (MIMO) has recently gained a lot of attention due to its high potential in sixth-generation (6G) wireless systems. The goal of this paper is to first present a unified modeling for massive MIMO, encompassing both cellular and cell-free architectures with a variable number of antennas per access point. We derive signal transmission models and achievable spectral efficiency in both the downlink and uplink using zero-forcing and maximal-ratio schemes. We also provide performance comparisons in terms of per-user and sum spectral efficiency.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Cell-Free Terahertz Massive MIMO: A Novel Paradigm Beyond Ultra-Massive MIMO
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Terahertz (THz) frequencies have recently garnered considerable attention due to their potential to offer abundant spectral resources for communication, as well as distinct advantages in sensing, positioning, and imaging. Nevertheless, practical implementation encounters challenges stemming from the limited distances of signal transmission, primarily due to notable propagation, absorption, and blo…
▽ More
Terahertz (THz) frequencies have recently garnered considerable attention due to their potential to offer abundant spectral resources for communication, as well as distinct advantages in sensing, positioning, and imaging. Nevertheless, practical implementation encounters challenges stemming from the limited distances of signal transmission, primarily due to notable propagation, absorption, and blockage losses. To address this issue, the current strategy involves employing ultra-massive multi-input multi-output (UMMIMO) to generate high beamforming gains, thereby extending the transmission range. This paper introduces an alternative solution through the utilization of cell-free massive MIMO (CFmMIMO) architecture, wherein the closest access point is actively chosen to reduce the distance, rather than relying solely on a substantial number of antennas. We compare these two techniques through simulations and the numerical results justify that CFmMIMO is superior to UMMIMO in both spectral and energy efficiency at THz frequencies.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
A Comprehensive Tutorial and Survey of O-RAN: Exploring Slicing-aware Architecture, Deployment Options, Use Cases, and Challenges
Authors:
Khurshid Alam,
Mohammad Asif Habibi,
Matthias Tammen,
Dennis Krummacker,
Walid Saad,
Marco Di Renzo,
Tommaso Melodia,
Xavier Costa-Pérez,
Mérouane Debbah,
Ashutosh Dutta,
Hans D. Schotten
Abstract:
Open-radio access network (O-RAN) seeks to establish the principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable and standard-compliant interfaces. It advocates for multi-vendorism and multi-stakeholderism within a cloudified and virtualized wireless infrastructure, aimed at enhancing the deployment, operation, and management of RA…
▽ More
Open-radio access network (O-RAN) seeks to establish the principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable and standard-compliant interfaces. It advocates for multi-vendorism and multi-stakeholderism within a cloudified and virtualized wireless infrastructure, aimed at enhancing the deployment, operation, and management of RAN architecture. These enhancements promise increased flexibility, performance optimization, service innovation, energy efficiency, and cost effectiveness across fifth-generation (5G), sixth-generation (6G), and beyond networks. A silent feature of O-RAN architecture is its support for network slicing, which entails interaction with other domains of the cellular network, notably the transport network (TN) and the core network (CN), to realize end-to-end (E2E) network slicing. The study of this feature requires exploring the stances and contributions of diverse standards development organizations (SDOs). In this context, we note that despite the ongoing industrial deployments and standardization efforts, the research and standardization communities have yet to comprehensively address network slicing in O-RAN. To address this gap, this paper provides a comprehensive exploration of network slicing in O-RAN through an in-depth review of specification documents from O-RAN Alliance and research papers from leading industry and academic institutions. The paper commences with an overview of the relevant standardization and open source contributions, subsequently delving into the latest O-RAN architecture with an emphasis on its slicing aspects. Furthermore, the paper explores O-RAN deployment scenarios, examining options for the deployment and orchestration of RAN and TN slice subnets. It also discusses the slicing of the underlying infrastructure and provides an overview of various use cases related...
△ Less
Submitted 6 May, 2025; v1 submitted 6 May, 2024;
originally announced May 2024.
-
Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models
Authors:
Daniel Reti,
Norman Becker,
Tillmann Angeli,
Anasuya Chattopadhyay,
Daniel Schneider,
Sebastian Vollmer,
Hans D. Schotten
Abstract:
With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized…
▽ More
With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized for specific types of honeytokens, and heavily rely on suitable training datasets. To overcome these limitations, this work systematically investigates the approach of utilizing Large Language Models (LLMs) to create a variety of honeytokens. Out of the seven different honeytoken types created in this work, such as configuration files, databases, and log files, two were used to evaluate the optimal prompt. The generation of robots.txt files and honeywords was used to systematically test 210 different prompt structures, based on 16 prompt building blocks. Furthermore, all honeytokens were tested across different state-of-the-art LLMs to assess the varying performance of different models. Prompts performing optimally on one LLMs do not necessarily generalize well to another. Honeywords generated by GPT-3.5 were found to be less distinguishable from real passwords compared to previous methods of automated honeyword generation. Overall, the findings of this work demonstrate that generic LLMs are capable of creating a wide array of honeytokens using the presented prompt structures.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Robust Federated Learning for Wireless Networks: A Demonstration with Channel Estimation
Authors:
Zexin Fang,
Bin Han,
Hans D. Schotten
Abstract:
Federated learning (FL) offers a privacy-preserving collaborative approach for training models in wireless networks, with channel estimation emerging as a promising application. Despite extensive studies on FL-empowered channel estimation, the security concerns associated with FL require meticulous attention. In a scenario where small base stations (SBSs) serve as local models trained on cached da…
▽ More
Federated learning (FL) offers a privacy-preserving collaborative approach for training models in wireless networks, with channel estimation emerging as a promising application. Despite extensive studies on FL-empowered channel estimation, the security concerns associated with FL require meticulous attention. In a scenario where small base stations (SBSs) serve as local models trained on cached data, and a macro base station (MBS) functions as the global model setting, an attacker can exploit the vulnerability of FL, launching attacks with various adversarial attacks or deployment tactics. In this paper, we analyze such vulnerabilities, corresponding solutions were brought forth, and validated through simulation.
△ Less
Submitted 30 July, 2024; v1 submitted 3 April, 2024;
originally announced April 2024.
-
Chronicles of jockeying in queuing systems
Authors:
Anthony Kiggundu,
Bin Han,
Dennis Krummacker,
Hans D. Schotten
Abstract:
Trends in communication systems suggest gradual adjustments in the infrastructural landscape and application ecosystem. The dynamics arising from these changes, plus the expected service level requirements, present more challenges with regard to packet transmission, task offloading and impatient queueing. Generally, there are two types of common impatient queuing behavior that have been well studi…
▽ More
Trends in communication systems suggest gradual adjustments in the infrastructural landscape and application ecosystem. The dynamics arising from these changes, plus the expected service level requirements, present more challenges with regard to packet transmission, task offloading and impatient queueing. Generally, there are two types of common impatient queuing behavior that have been well studied, namely balking and reneging. In this survey, we are interested in the third type of impatience: jockeying, a phenomenon that draws origins from impatient customers switching from one queue to another. The problem is that there exists a plethora of literature that theoretically models for such impatience and all studies are diverse in the methodologies used. This raises questions about the practicality of some concepts from impatient queueing in dynamic environments. This survey chronicles those findings whose use case coverage includes information and communication systems, especially Multi-Access Edge Computing. We comparatively summarize the reviewed literature regarding the methodologies, invoked models and use cases. Furthermore, we discuss recently emerging paradigms and opens issues that are worth deeper study. This discussion is guided by the argument that the expected architectural transformations in these systems bring into question the applicability of existing impatience modeling schemes.
△ Less
Submitted 14 January, 2025; v1 submitted 16 February, 2024;
originally announced February 2024.
-
Resource Allocation in Mobile Networks: A Decision Model Of Jockeying in Queues
Authors:
Anthony Kiggundu,
Bin Han,
Dennis Krummacker,
Hans D. Schotten
Abstract:
Use-case-specific network slicing in decentralized multi-tenancy cloud environments is a promising approach to bridge the gap between the demand and supply of resources in next-generation communication networks. Our findings associate different slice profiles to queues in a multi-server setting, such that tenants continuously assess their preferences and make rational decisions to minimize the que…
▽ More
Use-case-specific network slicing in decentralized multi-tenancy cloud environments is a promising approach to bridge the gap between the demand and supply of resources in next-generation communication networks. Our findings associate different slice profiles to queues in a multi-server setting, such that tenants continuously assess their preferences and make rational decisions to minimize the queuing delay.
Deviated from classical approaches that statistically model the jockeying phenomena in queuing systems, our work pioneers to setup a behavioral model of jockeying impatient tenants. This will serve as a basis for decentralized management of multi-queue systems, where the decision to jockey is individually made by each tenant upon its up-to-date assessment of expected waiting time.
Additionally, we carry out numerical simulations to empirically unravel the parametric dependencies of the tenants' jockeying behavior.
△ Less
Submitted 17 May, 2024; v1 submitted 16 February, 2024;
originally announced February 2024.
-
Hierarchical Cell-Free Massive MIMO for High Capacity with Simple Implementation
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
Cell-free massive multi-input multi-output (MIMO) has recently gained much attention for its potential in shaping the landscape of sixth-generation (6G) wireless systems. This paper proposes a hierarchical network architecture tailored for cell-free massive MIMO, seamlessly integrating co-located and distributed antennas. A central base station (CBS), equipped with an antenna array, positions itse…
▽ More
Cell-free massive multi-input multi-output (MIMO) has recently gained much attention for its potential in shaping the landscape of sixth-generation (6G) wireless systems. This paper proposes a hierarchical network architecture tailored for cell-free massive MIMO, seamlessly integrating co-located and distributed antennas. A central base station (CBS), equipped with an antenna array, positions itself near the center of the coverage area, complemented by distributed access points spanning the periphery. The proposed architecture remarkably outperforms conventional cell-free networks, demonstrating superior sum throughput while maintaining a comparable worst-case per-user spectral efficiency. Meanwhile, the implementation cost associated with the fronthaul network is substantially diminished.
△ Less
Submitted 20 January, 2024;
originally announced January 2024.
-
Beam-Based Multiple Access for IRS-Aided Millimeter-Wave and Terahertz Communications
Authors:
Wei Jiang,
Hans Dieter Schotten
Abstract:
Recently, intelligent reflecting surface (IRS)-aided millimeter-wave (mmWave) and terahertz (THz) communications are considered in the wireless community. This paper aims to design a beam-based multiple-access strategy for this new paradigm. Its key idea is to make use of multiple sub-arrays over a hybrid digital-analog array to form independent beams, each of which is steered towards the desired…
▽ More
Recently, intelligent reflecting surface (IRS)-aided millimeter-wave (mmWave) and terahertz (THz) communications are considered in the wireless community. This paper aims to design a beam-based multiple-access strategy for this new paradigm. Its key idea is to make use of multiple sub-arrays over a hybrid digital-analog array to form independent beams, each of which is steered towards the desired direction to mitigate inter-user interference and suppress unwanted signal reflection. The proposed scheme combines the advantages of both orthogonal multiple access (i.e., no inter-user interference) and non-orthogonal multiple access (i.e., full time-frequency resource use). Consequently, it can substantially boost the system capacity, as verified by Monte-Carlo simulations.
△ Less
Submitted 2 January, 2024;
originally announced January 2024.
-
A Short Overview of 6G V2X Communication Standards
Authors:
Donglin Wang,
Yann Nana Nganso,
Hans D. Schotten
Abstract:
We are on the verge of a new age of linked autonomous cars with unheard-of user experiences, dramatically improved air quality and road safety, extremely varied transportation settings, and a plethora of cutting-edge apps. A substantially improved Vehicle-to-Everything (V2X) communication network that can simultaneously support massive hyper-fast, ultra-reliable, and low-latency information exchan…
▽ More
We are on the verge of a new age of linked autonomous cars with unheard-of user experiences, dramatically improved air quality and road safety, extremely varied transportation settings, and a plethora of cutting-edge apps. A substantially improved Vehicle-to-Everything (V2X) communication network that can simultaneously support massive hyper-fast, ultra-reliable, and low-latency information exchange is necessary to achieve this ambitious goal. These needs of the upcoming V2X are expected to be satisfied by the Sixth Generation (6G) communication system. In this article, we start by introducing the history of V2X communications by giving details on the current, developing, and future developments. We compare the applications of communication technologies such as Wi-Fi, LTE, 5G, and 6G. we focus on the new technologies for 6G V2X which are brain-vehicle interface, blocked-based V2X, and Machine Learning (ML). To achieve this, we provide a summary of the most recent ML developments in 6G vehicle networks. we discuss the security challenges of 6G V2X. We address the strengths, open challenges, development, and improving areas of further study in this field.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal
Authors:
Philipp Rosemann,
Sanket Partani,
Marc Miranda,
Jannik Mähn,
Michael Karrenbauer,
William Meli,
Rodrigo Hernangomez,
Maximilian Lübke,
Jacob Kochems,
Stefan Köpsell,
Anosch Aziz-Koch,
Julia Beuster,
Oliver Blume,
Norman Franchi,
Reiner Thomä,
Slawomir Stanczak,
Hans D. Schotten
Abstract:
Sensing plays a crucial role in autonomous and assisted vehicular driving, as well as in the operation of autonomous drones. The traditional segregation of communication and onboard sensing systems in mobility applications is due to be merged using Joint Communication and Sensing (JCAS) in the development of the 6G mobile radio standard. The integration of JCAS functions into the future road traff…
▽ More
Sensing plays a crucial role in autonomous and assisted vehicular driving, as well as in the operation of autonomous drones. The traditional segregation of communication and onboard sensing systems in mobility applications is due to be merged using Joint Communication and Sensing (JCAS) in the development of the 6G mobile radio standard. The integration of JCAS functions into the future road traffic landscape introduces novel challenges for the design of the 6G system architecture. Special emphasis will be placed on facilitating direct communication between road users and aerial drones. In various mobility scenarios, diverse levels of integration will be explored, ranging from leveraging communication capabilities to coordinate different radars to achieving deep integration through a unified waveform. In this paper, we have identified use cases and derive five higher-level Tech Cases (TCs). Technical and functional requirements for the 6G system architecture for a device-oriented JCAS approach will be extracted from the TCs and used to conceptualize the architectural views.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
Coverage Hole Elimination System in Industrial Environment
Authors:
Mervat Zarour,
Shreya Tayade,
Sergiy Melnyk,
Hans D. Schotten
Abstract:
The paper proposes a framework to identify and avoid the coverage hole in an indoor industry environment. We assume an edge cloud co-located controller that followers the Automated Guided Vehicle (AGV) movement on a factory floor over a wireless channel. The coverage holes are caused due to blockage, path-loss, and fading effects. An AGV in the coverage hole may lose connectivity to the edge-cloud…
▽ More
The paper proposes a framework to identify and avoid the coverage hole in an indoor industry environment. We assume an edge cloud co-located controller that followers the Automated Guided Vehicle (AGV) movement on a factory floor over a wireless channel. The coverage holes are caused due to blockage, path-loss, and fading effects. An AGV in the coverage hole may lose connectivity to the edge-cloud and become unstable. To avoid connectivity loss, we proposed a framework that identifies the position of coverage hole using a Support- Vector Machine (SVM) classifier model and constructs a binary coverage hole map incorporating the AGV trajectory re-planning to avoid the identified coverage hole. The AGV's re-planned trajectory is optimized and selected to avoid coverage hole the shortest coverage-hole-free trajectory. We further investigated the look-ahead time's impact on the AGV's re-planned trajectory performance. The results reveal that an AGV's re-planned trajectory can be shorter and further optimized if the coverage hole position is known ahead of time
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Adaptive Prediction Approach for 3D Geometry-based communication
Authors:
Mervat Zarour,
Qiuheng Zhou,
Sergiy Melnyk,
Hans D. Schotten
Abstract:
This paper addresses the challenges of mobile user requirements in shadowing and multi-fading environments, focusing on the Downlink (DL) radio node selection based on Uplink (UL) channel estimation. One of the key issues tackled in this research is the prediction performance in scenarios where estimated channels are integrated. An adaptive deep learning approach is proposed to improve performance…
▽ More
This paper addresses the challenges of mobile user requirements in shadowing and multi-fading environments, focusing on the Downlink (DL) radio node selection based on Uplink (UL) channel estimation. One of the key issues tackled in this research is the prediction performance in scenarios where estimated channels are integrated. An adaptive deep learning approach is proposed to improve performance, offering a compelling alternative to traditional interpolation techniques for air-to-ground link selection on demand. Moreover, our study considers a 3D channel model, which provides a more realistic and accurate representation than 2D models, particularly in the context of 3D network node distributions. This consideration becomes crucial in addressing the complex multipath fading effects within geometric stochastic 3D 3GPP channel models in urban environments. Furthermore, our research emphasises the need for adaptive prediction mechanisms that carefully balance the trade-off between DL link forecasted frequency response accuracy and the complexity requirements associated with estimation and prediction. This paper contributes to advancing 3D radio resource management by addressing these challenges, enabling more efficient and reliable communication for energy-constrained flying network nodes in dynamic environments.
△ Less
Submitted 7 August, 2024; v1 submitted 7 November, 2023;
originally announced November 2023.
-
Terahertz-Enpowered Communications and Sensing in 6G Systems: Opportunities and Challenges
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
The current focus of academia and the telecommunications industry has been shifted to the development of the six-generation (6G) cellular technology, also formally referred to as IMT-2030. Unprecedented applications that 6G aims to accommodate demand extreme communications performance and, in addition, disruptive capabilities such as network sensing. Recently, there has been a surge of interest in…
▽ More
The current focus of academia and the telecommunications industry has been shifted to the development of the six-generation (6G) cellular technology, also formally referred to as IMT-2030. Unprecedented applications that 6G aims to accommodate demand extreme communications performance and, in addition, disruptive capabilities such as network sensing. Recently, there has been a surge of interest in terahertz (THz) frequencies as it offers not only massive spectral resources for communication but also distinct advantages in sensing, positioning, and imaging. The aim of this paper is to provide a brief outlook on opportunities opened by this under-exploited band and challenges that must be addressed to materialize the potential of THz-based communications and sensing in 6G systems.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
6G Underlayer Network Concepts for Ultra Reliable and Low Latency Communication in Manufacturing
Authors:
Daniel Lindenschmitt,
Jan Mertes,
Christian Schellenberger,
Marius Schmitz,
Bin Han,
Jan C. Aurich,
Hans D. Schotten
Abstract:
Underlayer networks in the context of 6G for manufacturing are crucial. They address the evolving needs of highly interconnected and autonomous systems in industry. The digitalization of manufacturing processes, driven by the Internet of Things and increased data availability, enables more efficient and demand-driven production. However, wireless connectivity, which offers flexibility and easy int…
▽ More
Underlayer networks in the context of 6G for manufacturing are crucial. They address the evolving needs of highly interconnected and autonomous systems in industry. The digitalization of manufacturing processes, driven by the Internet of Things and increased data availability, enables more efficient and demand-driven production. However, wireless connectivity, which offers flexibility and easy integration of components, comes with challenges such as signal interference or high latency. A new management system is needed to coordinate and route traffic of multiple networks in a specific coverage area. This paper proposes underlayer networks designed for manufacturing, providing low latency, reliability, and security. These networks enable wireless connectivity and integration of wireless technologies into the manufacturing environment, enhancing flexibility and efficiency. The paper also discusses network slicing, spectrum sharing, and the limitations of current wireless networks in manufacturing. It introduces a network concept for underlayer networks and evaluates its application in closed-loop communication for machine tools. The study concludes with future research prospects in this area.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
Opportunistic Reflection in Reconfigurable Intelligent Surface-Assisted Wireless Networks
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
This paper focuses on multiple-access protocol design in a wireless network assisted by multiple reconfigurable intelligent surfaces (RISs). By extending the existing approaches in single-user or single-RIS cases, we present two benchmark schemes for this multi-user multi-RIS scenario. Inspecting their shortcomings, a simple but efficient method coined opportunistic multi-user reflection (OMUR) is…
▽ More
This paper focuses on multiple-access protocol design in a wireless network assisted by multiple reconfigurable intelligent surfaces (RISs). By extending the existing approaches in single-user or single-RIS cases, we present two benchmark schemes for this multi-user multi-RIS scenario. Inspecting their shortcomings, a simple but efficient method coined opportunistic multi-user reflection (OMUR) is proposed. The key idea is to opportunistically select the best user as the anchor for optimizing the RISs, and non-orthogonally transmitting all users' signals simultaneously. A simplified version of OMUR exploiting random phase shifts is also proposed to avoid the complexity of RIS channel estimation.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
A Simple Multiple-Access Design for Reconfigurable Intelligent Surface-Aided Systems
Authors:
Wei Jiang,
Hans D. Schotten
Abstract:
This paper focuses on the design of transmission methods and reflection optimization for a wireless system assisted by a single or multiple reconfigurable intelligent surfaces (RISs). The existing techniques are either too complex to implement in practical systems or too inefficient to achieve high performance. To overcome the shortcomings of the existing schemes, we propose a simple but efficient…
▽ More
This paper focuses on the design of transmission methods and reflection optimization for a wireless system assisted by a single or multiple reconfigurable intelligent surfaces (RISs). The existing techniques are either too complex to implement in practical systems or too inefficient to achieve high performance. To overcome the shortcomings of the existing schemes, we propose a simple but efficient approach based on \textit{opportunistic reflection} and \textit{non-orthogonal transmission}. The key idea is opportunistically selecting the best user that can reap the maximal gain from the optimally reflected signals via RIS. That is to say, only the channel state information of the best user is used for RIS reflection optimization, which can in turn lower complexity substantially. In addition, the second user is selected to superpose its signal on that of the primary user, where the benefits of non-orthogonal transmission, i.e., high system capacity and improved user fairness, are obtained. Additionally, a simplified variant exploiting random phase shifts is proposed to avoid the high overhead of RIS channel estimation.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
A Reliable and Resilient Framework for Multi-UAV Mutual Localization
Authors:
Zexin Fang,
Bin Han,
Hans D. Schotten
Abstract:
This paper presents a robust and secure framework for achieving accurate and reliable mutual localization in multiple unmanned aerial vehicle (UAV) systems. Challenges of accurate localization and security threats are addressed and corresponding solutions are brought forth and accessed in our paper with numerical simulations. The proposed solution incorporates two key components: the Mobility Adap…
▽ More
This paper presents a robust and secure framework for achieving accurate and reliable mutual localization in multiple unmanned aerial vehicle (UAV) systems. Challenges of accurate localization and security threats are addressed and corresponding solutions are brought forth and accessed in our paper with numerical simulations. The proposed solution incorporates two key components: the Mobility Adaptive Gradient Descent (MAGD) and Time-evolving Anomaly Detectio (TAD). The MAGD adapts the gradient descent algorithm to handle the configuration changes in the mutual localization system, ensuring accurate localization in dynamic scenarios. The TAD cooperates with reputation propagation (RP) scheme to detect and mitigate potential attacks by identifying UAVs with malicious data, enhancing the security and resilience of the mutual localization
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Considerations on the EMF Exposure Relating to the Next Generation Non-Terrestrial Networks
Authors:
Amina Fellan,
Ainur Daurembekova,
Hans D. Schotten
Abstract:
The emerging fifth generation (5G) and the upcoming sixth generation (6G) communication technologies introduce the use of space- and airborne networks in their architectures under the scope of non-terrestrial networks (NTNs). With this integration of satellite and aerial platform networks, better coverage, network flexibility and easier deployment can be achieved. Correspondingly, satellite broadb…
▽ More
The emerging fifth generation (5G) and the upcoming sixth generation (6G) communication technologies introduce the use of space- and airborne networks in their architectures under the scope of non-terrestrial networks (NTNs). With this integration of satellite and aerial platform networks, better coverage, network flexibility and easier deployment can be achieved. Correspondingly, satellite broadband internet providers have launched an increasing number of small satellites operating in low earth orbit (LEO). These recent developments imply an increased electromagnetic field (EMF) exposure to humans and the environment. In this work, we provide a short overview of the state of consumer-grade satellite networks including broadband satellites and future NTN services. We also consider the regulatory state governing their operation within the context of EMF exposure. Finally, we highlight the aspects that are relevant to the assessment of EMF exposure in relation to NTNs.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Investigating the Impact of Variables on Handover Performance in 5G Ultra-Dense Networks
Authors:
Donglin Wang,
Anjie Qiu,
Qiuheng Zhou,
Sanket Partani,
Hans D. Schotten
Abstract:
The advent of 5G New Radio (NR) technology has revolutionized the landscape of wireless communication, offering various enhancements such as elevated system capacity, improved spectrum efficiency, and higher data transmission rates. To achieve these benefits, 5G has implemented the Ultra-Dense Network (UDN) architecture, characterized by the deployment of numerous small general Node B (gNB) units.…
▽ More
The advent of 5G New Radio (NR) technology has revolutionized the landscape of wireless communication, offering various enhancements such as elevated system capacity, improved spectrum efficiency, and higher data transmission rates. To achieve these benefits, 5G has implemented the Ultra-Dense Network (UDN) architecture, characterized by the deployment of numerous small general Node B (gNB) units. While this approach boosts system capacity and frequency reuse, it also raises concerns such as increased signal interference, longer handover times, and higher handover failure rates. To address these challenges, the critical factor of Time to Trigger (TTT) in handover management must be accurately determined. Furthermore, the density of gNBs has a significant impact on handover performance. This study provides a comprehensive analysis of 5G handover management. Through the development and utilization of a downlink system-level simulator, the effects of various TTT values and gNB densities on 5G handover were evaluated, taking into consideration the movement of Traffic Users (TUs) with varying velocities. Simulation results showed that the handover performance can be optimized by adjusting the TTT under different gNB densities, providing valuable insights into the proper selection of TTT, UDN, and TU velocity to enhance 5G handover performance.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.