-
Joint Power and Spectrum Orchestration for D2D Semantic Communication Underlying Energy-Efficient Cellular Networks
Authors:
Le Xia,
Yao Sun,
Haijian Sun,
Rose Qingyang Hu,
Dusit Niyato,
Muhammad Ali Imran
Abstract:
Semantic communication (SemCom) has been recently deemed a promising next-generation wireless technique to enable efficient spectrum savings and information exchanges, thus naturally introducing a novel and practical network paradigm where cellular and device-to-device (D2D) SemCom approaches coexist. Nevertheless, the involved wireless resource management becomes complicated and challenging due t…
▽ More
Semantic communication (SemCom) has been recently deemed a promising next-generation wireless technique to enable efficient spectrum savings and information exchanges, thus naturally introducing a novel and practical network paradigm where cellular and device-to-device (D2D) SemCom approaches coexist. Nevertheless, the involved wireless resource management becomes complicated and challenging due to the unique semantic performance measurements and energy-consuming semantic coding mechanism. To this end, this paper jointly investigates power control and spectrum reuse problems for energy-efficient D2D SemCom cellular networks. Concretely, we first model the user preference-aware semantic triplet transmission and leverage a novel metric of semantic value to identify the semantic information importance conveyed in SemCom. Then, we define the additional power consumption from semantic encoding in conjunction with basic power amplifier dissipation to derive the overall system energy efficiency (semantics/Joule). Next, we formulate an energy efficiency maximization problem for joint power and spectrum allocation subject to several SemCom-related and practical constraints. Afterward, we propose an optimal resource management solution by employing the fractional-to-subtractive problem transformation and decomposition while developing a three-stage method with theoretical analysis of its optimality guarantee and computational complexity. Numerical results demonstrate the adequate performance superiority of our proposed solution compared with different benchmarks.
△ Less
Submitted 23 June, 2025; v1 submitted 30 January, 2025;
originally announced January 2025.
-
Fractional Fourier Domain PAPR Reduction
Authors:
Yewen Cao,
Yulin Shao,
Rose Qingyang Hu
Abstract:
High peak-to-average power ratio (PAPR) has long posed a challenge for multi-carrier systems, impacting amplifier efficiency and overall system performance. This paper introduces dynamic angle fractional Fourier division multiplexing (DA-FrFDM), an innovative multi-carrier system that effectively reduces PAPR for both QAM and Gaussian signals with minimal signaling overhead. DA-FrFDM leverages the…
▽ More
High peak-to-average power ratio (PAPR) has long posed a challenge for multi-carrier systems, impacting amplifier efficiency and overall system performance. This paper introduces dynamic angle fractional Fourier division multiplexing (DA-FrFDM), an innovative multi-carrier system that effectively reduces PAPR for both QAM and Gaussian signals with minimal signaling overhead. DA-FrFDM leverages the fractional Fourier domain to balance PAPR characteristics between the time and frequency domains, achieving significant PAPR reduction while preserving signal quality. Furthermore, DA-FrFDM refines signal processing and enables one-tap equalization in the fractional Fourier domain through the simple multiplication of time-domain signals by a quadratic phase sequence. Our results show that DA-FrFDM not only outperforms existing PAPR reduction techniques but also retains efficient inter-carrier interference (ICI) mitigation capabilities in doubly dispersive channels.
△ Less
Submitted 13 November, 2024;
originally announced November 2024.
-
Channel Knowledge Map for Cellular-Connected UAV via Binary Bayesian Filtering
Authors:
Yuhang Yang,
Xiaoli Xu,
Yong Zeng,
Haijian Sun,
Rose Qingyang Hu
Abstract:
Channel knowledge map (CKM) is a promising technology to enable environment-aware wireless communications and sensing. Link state map (LSM) is one particular type of CKM that aims to learn the location-specific line-of-sight (LoS) link probability between the transmitter and the receiver at all possible locations, which provides the prior information to enhance the communication quality of dynamic…
▽ More
Channel knowledge map (CKM) is a promising technology to enable environment-aware wireless communications and sensing. Link state map (LSM) is one particular type of CKM that aims to learn the location-specific line-of-sight (LoS) link probability between the transmitter and the receiver at all possible locations, which provides the prior information to enhance the communication quality of dynamic networks. This paper investigates the LSM construction for cellularconnected unmanned aerial vehicles (UAVs) by utilizing both the expert empirical mathematical model and the measurement data. Specifically, we first model the LSM as a binary spatial random field and its initial distribution is obtained by the empirical model. Then we propose an effective binary Bayesian filter to sequentially update the LSM by using the channel measurement. To efficiently update the LSM, we establish the spatial correlation models of LoS probability on the location pairs in both the distance and angular domains, which are adopted in the Bayesian filter for updating the probabilities at locations without measurements. Simulation results demonstrate the effectiveness of the proposed algorithm for LSM construction, which significantly outperforms the benchmark scheme, especially when the measurements are sparse.
△ Less
Submitted 16 August, 2024;
originally announced September 2024.
-
Backdoor Attacks and Defenses on Semantic-Symbol Reconstruction in Semantic Communications
Authors:
Yuan Zhou,
Rose Qingyang Hu,
Yi Qian
Abstract:
Semantic communication is of crucial importance for the next-generation wireless communication networks. The existing works have developed semantic communication frameworks based on deep learning. However, systems powered by deep learning are vulnerable to threats such as backdoor attacks and adversarial attacks. This paper delves into backdoor attacks targeting deep learning-enabled semantic comm…
▽ More
Semantic communication is of crucial importance for the next-generation wireless communication networks. The existing works have developed semantic communication frameworks based on deep learning. However, systems powered by deep learning are vulnerable to threats such as backdoor attacks and adversarial attacks. This paper delves into backdoor attacks targeting deep learning-enabled semantic communication systems. Since current works on backdoor attacks are not tailored for semantic communication scenarios, a new backdoor attack paradigm on semantic symbols (BASS) is introduced, based on which the corresponding defense measures are designed. Specifically, a training framework is proposed to prevent BASS. Additionally, reverse engineering-based and pruning-based defense strategies are designed to protect against backdoor attacks in semantic communication. Simulation results demonstrate the effectiveness of both the proposed attack paradigm and the defense strategies.
△ Less
Submitted 20 April, 2024;
originally announced April 2024.
-
Exploring Communication Technologies, Standards, and Challenges in Electrified Vehicle Charging
Authors:
Xiang Ma,
Yuan Zhou,
Hanwen Zhang,
Qun Wang,
Haijian Sun,
Hongjie Wang,
Rose Qingyang Hu
Abstract:
As public awareness of environmental protection continues to grow, the trend of integrating more electric vehicles (EVs) into the transportation sector is rising. Unlike conventional internal combustion engine (ICE) vehicles, EVs can minimize carbon emissions and potentially achieve autonomous driving. However, several obstacles hinder the widespread adoption of EVs, such as their constrained driv…
▽ More
As public awareness of environmental protection continues to grow, the trend of integrating more electric vehicles (EVs) into the transportation sector is rising. Unlike conventional internal combustion engine (ICE) vehicles, EVs can minimize carbon emissions and potentially achieve autonomous driving. However, several obstacles hinder the widespread adoption of EVs, such as their constrained driving range and the extended time required for charging. One alternative solution to address these challenges is implementing dynamic wireless power transfer (DWPT), charging EVs in motion on the road. Moreover, charging stations with static wireless power transfer (SWPT) infrastructure can replace existing gas stations, enabling users to charge EVs in parking lots or at home. This paper surveys the communication infrastructure for static and dynamic wireless charging in electric vehicles. It encompasses all communication aspects involved in the wireless charging process. The architecture and communication requirements for static and dynamic wireless charging are presented separately. Additionally, a comprehensive comparison of existing communication standards is provided. The communication with the grid is also explored in detail. The survey gives attention to security and privacy issues arising during communications. In summary, the paper addresses the challenges and outlines upcoming trends in communication for EV wireless charging.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial
Authors:
Lu Lv,
Dongyang Xu,
Rose Qingyang Hu,
Yinghui Ye,
Long Yang,
Xianfu Lei,
Xianbin Wang,
Dong In Kim,
Arumugam Nallanathan
Abstract:
Driven by the ever-increasing requirements of ultra-high spectral efficiency, ultra-low latency, and massive connectivity, the forefront of wireless research calls for the design of advanced next generation multiple access schemes to facilitate provisioning of these stringent demands. This inspires the embrace of non-orthogonal multiple access (NOMA) in future wireless communication networks. Neve…
▽ More
Driven by the ever-increasing requirements of ultra-high spectral efficiency, ultra-low latency, and massive connectivity, the forefront of wireless research calls for the design of advanced next generation multiple access schemes to facilitate provisioning of these stringent demands. This inspires the embrace of non-orthogonal multiple access (NOMA) in future wireless communication networks. Nevertheless, the support of massive access via NOMA leads to additional security threats, due to the open nature of the air interface, the broadcast characteristic of radio propagation as well as intertwined relationship among paired NOMA users. To address this specific challenge, the superimposed transmission of NOMA can be explored as new opportunities for security aware design, for example, multiuser interference inherent in NOMA can be constructively engineered to benefit communication secrecy and privacy. The purpose of this tutorial is to provide a comprehensive overview on the state-of-the-art physical layer security techniques that guarantee wireless security and privacy for NOMA networks, along with the opportunities, technical challenges, and future research trends.
△ Less
Submitted 21 May, 2024; v1 submitted 25 March, 2024;
originally announced March 2024.
-
Blockage-Aware Robust Beamforming in RIS-Aided Mobile Millimeter Wave MIMO Systems
Authors:
Yan Yang,
Shuping Dang,
Miaowen Wen,
Bo Ai,
Rose Qingyang Hu
Abstract:
Millimeter wave (mmWave) communications are sensitive to blockage over radio propagation paths. The emerging paradigm of reconfigurable intelligent surface (RIS) has the potential to overcome this issue by its ability to arbitrarily reflect the incident signals toward desired directions. This paper proposes a Neyman-Pearson (NP) criterion-based blockage-aware algorithm to improve communication res…
▽ More
Millimeter wave (mmWave) communications are sensitive to blockage over radio propagation paths. The emerging paradigm of reconfigurable intelligent surface (RIS) has the potential to overcome this issue by its ability to arbitrarily reflect the incident signals toward desired directions. This paper proposes a Neyman-Pearson (NP) criterion-based blockage-aware algorithm to improve communication resilience against blockage in mobile mmWave multiple input multiple output (MIMO) systems. By virtue of this pragmatic blockage-aware technique, we further propose an outage-constrained beamforming design for downlink mmWave MIMO transmission to achieve outage probability minimization and achievable rate maximization. To minimize the outage probability, a robust RIS beamformer with variant beamwidth is designed to combat uncertain channel state information (CSI). For the rate maximization problem, an accelerated projected gradient descent (PGD) algorithm is developed to solve the computational challenge of high-dimensional RIS phase-shift matrix (PSM) optimization. Particularly, we leverage a subspace constraint to reduce the scope of the projection operation and formulate a new Nesterov momentum acceleration scheme to speed up the convergence process of PGD. Extensive experiments confirm the effectiveness of the proposed blockage-aware approach, and the proposed accelerated PGD algorithm outperforms a number of representative baseline algorithms in terms of the achievable rate.
△ Less
Submitted 2 March, 2024;
originally announced March 2024.
-
Knowledge Graph Driven UAV Cognitive Semantic Communication Systems for Efficient Object Detection
Authors:
Xi Song,
Lu Yuan,
Zhibo Qu,
Fuhui Zhou,
Qihui Wu,
Tony Q. S. Quek,
Rose Qingyang Hu
Abstract:
Unmanned aerial vehicles (UAVs) are widely used for object detection. However, the existing UAV-based object detection systems are subject to the serious challenge, namely, the finite computation, energy and communication resources, which limits the achievable detection performance. In order to overcome this challenge, a UAV cognitive semantic communication system is proposed by exploiting knowled…
▽ More
Unmanned aerial vehicles (UAVs) are widely used for object detection. However, the existing UAV-based object detection systems are subject to the serious challenge, namely, the finite computation, energy and communication resources, which limits the achievable detection performance. In order to overcome this challenge, a UAV cognitive semantic communication system is proposed by exploiting knowledge graph. Moreover, a multi-scale compression network is designed for semantic compression to reduce data transmission volume while guaranteeing the detection performance. Furthermore, an object detection scheme is proposed by using the knowledge graph to overcome channel noise interference and compression distortion. Simulation results conducted on the practical aerial image dataset demonstrate that compared to the benchmark systems, our proposed system has superior detection accuracy, communication robustness and computation efficiency even under high compression rates and low signal-to-noise ratio (SNR) conditions.
△ Less
Submitted 21 February, 2024; v1 submitted 25 January, 2024;
originally announced January 2024.
-
Precise Coil Alignment for Dynamic Wireless Charging of Electric Vehicles with RFID Sensing
Authors:
Haijian Sun,
Xiang Ma,
Rose Qingyang Hu,
Randy Christensen
Abstract:
Electric vehicle (EV) has emerged as a transformative force for the sustainable and environmentally friendly future. To alleviate range anxiety caused by battery and charging facility, dynamic wireless power transfer (DWPT) is increasingly recognized as a key enabler for widespread EV adoption, yet it faces significant technical challenges, primarily in precise coil alignment. This article begins…
▽ More
Electric vehicle (EV) has emerged as a transformative force for the sustainable and environmentally friendly future. To alleviate range anxiety caused by battery and charging facility, dynamic wireless power transfer (DWPT) is increasingly recognized as a key enabler for widespread EV adoption, yet it faces significant technical challenges, primarily in precise coil alignment. This article begins by reviewing current alignment methodologies and evaluates their advantages and limitations. We observe that achieving the necessary alignment precision is challenging with these existing methods. To address this, we present an innovative RFID-based DWPT coil alignment system, utilizing coherent phase detection and a maximum likelihood estimation algorithm, capable of achieving sub-10 cm accuracy. This system's efficacy in providing both lateral and vertical misalignment estimates has been verified through laboratory and experimental tests. We also discuss potential challenges in broader system implementation and propose corresponding solutions. This research offers a viable and promising solution for enhancing DWPT efficiency.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Energy Efficient Robust Beamforming for Vehicular ISAC with Imperfect Channel Estimation
Authors:
Hanwen Zhang,
Haijian Sun,
Tianyi He,
Weiming Xiang,
Rose Qingyang Hu
Abstract:
This paper investigates robust beamforming for system-centric energy efficiency (EE) optimization in the vehicular integrated sensing and communication (ISAC) system, where the mobility of vehicles poses significant challenges to channel estimation. To obtain the optimal beamforming under channel uncertainty, we first formulate an optimization problem for maximizing the system EE under bounded cha…
▽ More
This paper investigates robust beamforming for system-centric energy efficiency (EE) optimization in the vehicular integrated sensing and communication (ISAC) system, where the mobility of vehicles poses significant challenges to channel estimation. To obtain the optimal beamforming under channel uncertainty, we first formulate an optimization problem for maximizing the system EE under bounded channel estimation errors. Next, fractional programming and semidefinite relaxation (SDR) are utilized to relax the rank-1 constraints. We further use Schur complement and S-Procedure to transform Cramer-Rao bound (CRB) and channel estimation error constraints into convex forms, respectively. Based on the Lagrangian dual function and Karush-Kuhn-Tucker (KKT) conditions, it is proved that the optimal beamforming solution is rank-1. Finally, we present comprehensive simulation results to demonstrate two key findings: 1) the proposed algorithm exhibits a favorable convergence rate, and 2) the approach effectively mitigates the impact of channel estimation errors.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
Map2Schedule: An End-to-End Link Scheduling Method for Urban V2V Communications
Authors:
Lihao Zhang,
Haijian Sun,
Jin Sun,
Ramviyas Parasuraman,
Yinghui Ye,
Rose Qingyang Hu
Abstract:
Urban vehicle-to-vehicle (V2V) link scheduling with shared spectrum is a challenging problem. Its main goal is to find the scheduling policy that can maximize system performance (usually the sum capacity of each link or their energy efficiency). Given that each link can experience interference from all other active links, the scheduling becomes a combinatorial integer programming problem and gener…
▽ More
Urban vehicle-to-vehicle (V2V) link scheduling with shared spectrum is a challenging problem. Its main goal is to find the scheduling policy that can maximize system performance (usually the sum capacity of each link or their energy efficiency). Given that each link can experience interference from all other active links, the scheduling becomes a combinatorial integer programming problem and generally does not scale well with the number of V2V pairs. Moreover, link scheduling requires accurate channel state information (CSI), which is very difficult to estimate with good accuracy under high vehicle mobility. In this paper, we propose an end-to-end urban V2V link scheduling method called Map2Schedule, which can directly generate V2V scheduling policy from the city map and vehicle locations. Map2Schedule delivers comparable performance to the physical-model-based methods in urban settings while maintaining low computation complexity. This enhanced performance is achieved by machine learning (ML) technologies. Specifically, we first deploy the convolutional neural network (CNN) model to estimate the CSI from street layout and vehicle locations and then apply the graph embedding model for optimal scheduling policy. The results show that the proposed method can achieve high accuracy with much lower overhead and latency.
△ Less
Submitted 12 October, 2023;
originally announced October 2023.
-
Is the Performance of NOMA-aided Integrated Sensing and Multicast-Unicast Communications Improved by IRS?
Authors:
Yang Gou,
Yinghui Ye,
Guangyue Lu,
Lu Lv,
Rose Qingyang Hu
Abstract:
In this paper, we consider intelligent reflecting surface (IRS) in a non-orthogonal multiple access (NOMA)-aided Integrated Sensing and Multicast-Unicast Communication (ISMUC) system, where the multicast signal is used for sensing and communications while the unicast signal is used only for communications. Our goal is to depict whether the IRS improves the performance of NOMA-ISMUC system or not u…
▽ More
In this paper, we consider intelligent reflecting surface (IRS) in a non-orthogonal multiple access (NOMA)-aided Integrated Sensing and Multicast-Unicast Communication (ISMUC) system, where the multicast signal is used for sensing and communications while the unicast signal is used only for communications. Our goal is to depict whether the IRS improves the performance of NOMA-ISMUC system or not under the imperfect/perfect successive interference cancellation (SIC) scenario. Towards this end, we formulate a non-convex problem to maximize the unicast rate while ensuring the minimum target illumination power and multicast rate. To settle this problem, we employ the Dinkelbach method to transform this original problem into an equivalent one, which is then solved via alternating optimization algorithm and semidefinite relaxation (SDR) with Sequential Rank-One Constraint Relaxation (SROCR). Based on this, an iterative algorithm is devised to obtain a near-optimal solution. Computer simulations verify the quick convergence of the devised iterative algorithm, and provide insightful results. Compared to NOMA-ISMUC without IRS, IRS-aided NOMA-ISMUC achieves a higher rate with perfect SIC but keeps the almost same rate in the case of imperfect SIC.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.
-
Approximate Wireless Communication for Federated Learning
Authors:
Xiang Ma,
Haijian Sun,
Rose Qingyang Hu,
Yi Qian
Abstract:
This paper presents an approximate wireless communication scheme for federated learning (FL) model aggregation in the uplink transmission. We consider a realistic channel that reveals bit errors during FL model exchange in wireless networks. Our study demonstrates that random bit errors during model transmission can significantly affect FL performance. To overcome this challenge, we propose an app…
▽ More
This paper presents an approximate wireless communication scheme for federated learning (FL) model aggregation in the uplink transmission. We consider a realistic channel that reveals bit errors during FL model exchange in wireless networks. Our study demonstrates that random bit errors during model transmission can significantly affect FL performance. To overcome this challenge, we propose an approximate communication scheme based on the mathematical and statistical proof that machine learning (ML) model gradients are bounded under certain constraints. This bound enables us to introduce a novel encoding scheme for float-to-binary representation of gradient values and their QAM constellation mapping. Besides, since FL gradients are error-resilient, the proposed scheme simply delivers gradients with errors when the channel quality is satisfactory, eliminating extensive error-correcting codes and/or retransmission. The direct benefits include less overhead and lower latency. The proposed scheme is well-suited for resource-constrained devices in wireless networks. Through simulations, we show that the proposed scheme is effective in reducing the impact of bit errors on FL performance and saves at least half the time than transmission with error correction and retransmission to achieve the same learning performance. In addition, we investigated the effectiveness of bit protection mechanisms in high-order modulation when gray coding is employed and found that this approach considerably enhances learning performance.
△ Less
Submitted 6 April, 2023;
originally announced April 2023.
-
Pricing for Reconfigurable Intelligent Surface Aided Wireless Networks: Models and Principles
Authors:
Yulan Gao,
Yue Xiao,
Xianfu Lei,
Qiaonan Zhu,
Dusit Niyato,
Kai-Kit Wong,
Pingzhi Fan,
Rose Qingyang Hu
Abstract:
Owing to the recent advancements of meta-materials and meta-surfaces, the concept of reconfigurable intelligent surface (RIS) has been embraced to meet the spectral- and energy-efficient, and yet cost-effective solutions for the sixth-generation (6G) wireless networks. From an operational standpoint, RISs can be easily deployed on the facades of buildings and indoor walls. Albeit promising, in the…
▽ More
Owing to the recent advancements of meta-materials and meta-surfaces, the concept of reconfigurable intelligent surface (RIS) has been embraced to meet the spectral- and energy-efficient, and yet cost-effective solutions for the sixth-generation (6G) wireless networks. From an operational standpoint, RISs can be easily deployed on the facades of buildings and indoor walls. Albeit promising, in the actual network operation, the deployment of RISs may face challenges because of the willingness and benefits of RIS holders from the aspect of installing RISs on their properties. Accordingly, RIS-aided wireless networks are faced with a formidable mission: how to balance the wireless service providers (WSPs) and RIS holders in terms of their respective interests. To alleviate this deadlock, we focus on the application of pricing models in RIS-aided wireless networks in pursuit of a win-win solution for both sides. Specifically, we commence with a comprehensive introduction of RIS pricing with its potential applications in RIS networks, meanwhile the fundamentals of pricing models are summarized in order to benefit both RIS holders and WSPs. In addition, a Stackelberg game-based model is exemplified to illustrate the operation of utility-maximization pricing. Finally, we highlight open issues and future research directions of applying pricing models to the RIS-aided wireless networks.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
Intelligent Resource Allocations for IRS-Assisted OFDM Communications: A Hybrid MDQN-DDPG Approach
Authors:
Wei Wu,
Fengchun Yang,
Fuhui Zhou,
Han Hu,
Qihui Wu,
Rose Qingyang Hu
Abstract:
In this paper, we study the resource allocation problem for an intelligent reflecting surface (IRS)-assisted OFDM system. The system sum rate maximization framework is formulated by jointly optimizing subcarrier allocation, base station transmit beamforming and IRS phase shift. Considering the continuous and discrete hybrid action space characteristics of the optimization variables, we propose an…
▽ More
In this paper, we study the resource allocation problem for an intelligent reflecting surface (IRS)-assisted OFDM system. The system sum rate maximization framework is formulated by jointly optimizing subcarrier allocation, base station transmit beamforming and IRS phase shift. Considering the continuous and discrete hybrid action space characteristics of the optimization variables, we propose an efficient resource allocation algorithm combining multiple deep Q networks (MDQN) and deep deterministic policy-gradient (DDPG) to deal with this issue. In our algorithm, MDQN are employed to solve the problem of large discrete action space, while DDPG is introduced to tackle the continuous action allocation. Compared with the traditional approaches, our proposed MDQN-DDPG based algorithm has the advantage of continuous behavior improvement through learning from the environment. Simulation results demonstrate superior performance of our design in terms of system sum rate compared with the benchmark schemes.
△ Less
Submitted 10 February, 2022;
originally announced February 2022.
-
Energy Efficiency and Delay Tradeoff in an MEC-Enabled Mobile IoT Network
Authors:
Han Hu,
Weiwei Song,
Qun Wang,
Rose Qingyang Hu,
Hongbo Zhu
Abstract:
Mobile Edge Computing (MEC) has recently emerged as a promising technology in the 5G era. It is deemed an effective paradigm to support computation-intensive and delay critical applications even at energy-constrained and computation-limited Internet of Things (IoT) devices. To effectively exploit the performance benefits enabled by MEC, it is imperative to jointly allocate radio and computational…
▽ More
Mobile Edge Computing (MEC) has recently emerged as a promising technology in the 5G era. It is deemed an effective paradigm to support computation-intensive and delay critical applications even at energy-constrained and computation-limited Internet of Things (IoT) devices. To effectively exploit the performance benefits enabled by MEC, it is imperative to jointly allocate radio and computational resources by considering non-stationary computation demands, user mobility, and wireless fading channels. This paper aims to study the tradeoff between energy efficiency (EE) and service delay for multi-user multi-server MEC-enabled IoT systems when provisioning offloading services in a user mobility scenario. Particularly, we formulate a stochastic optimization problem with the objective of minimizing the long-term average network EE with the constraints of the task queue stability, peak transmit power, maximum CPU-cycle frequency, and maximum user number. To tackle the problem, we propose an online offloading and resource allocation algorithm by transforming the original problem into several individual subproblems in each time slot based on Lyapunov optimization theory, which are then solved by convex decomposition and submodular methods. Theoretical analysis proves that the proposed algorithm can achieve a $[O(1/V), O(V)]$ tradeoff between EE and service delay. Simulation results verify the theoretical analysis and demonstrate our proposed algorithm can offer much better EE-delay performance in task offloading challenges, compared to several baselines.
△ Less
Submitted 8 February, 2022;
originally announced February 2022.
-
Unmanned Aerial Vehicle Swarm-Enabled Edge Computing: Potentials, Promising Technologies, and Challenges
Authors:
Wei Wu,
Fuhui Zhou,
Baoyun Wang,
Qihui Wu,
Chao Dong,
Rose Qingyang Hu
Abstract:
Unmanned aerial vehicle (UAV) swarm enabled edge computing is envisioned to be promising in the sixth generation wireless communication networks due to their wide application sensories and flexible deployment. However, most of the existing works focus on edge computing enabled by a single or a small scale UAVs, which are very different from UAV swarm-enabled edge computing. In order to facilitate…
▽ More
Unmanned aerial vehicle (UAV) swarm enabled edge computing is envisioned to be promising in the sixth generation wireless communication networks due to their wide application sensories and flexible deployment. However, most of the existing works focus on edge computing enabled by a single or a small scale UAVs, which are very different from UAV swarm-enabled edge computing. In order to facilitate the practical applications of UAV swarm-enabled edge computing, the state of the art research is presented in this article. The potential applications, architectures and implementation considerations are illustrated. Moreover, the promising enabling technologies for UAV swarm-enabled edge computing are discussed. Furthermore, we outline challenges and open issues in order to shed light on the future research directions.
△ Less
Submitted 20 January, 2022;
originally announced January 2022.
-
When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges
Authors:
Qun Wang,
Haijian Sun,
Rose Qingyang Hu,
Arupjyoti Bhuyan
Abstract:
The exponential growth of internet connected systems has generated numerous challenges, such as spectrum shortage issues, which require efficient spectrum sharing (SS) solutions. Complicated and dynamic SS systems can be exposed to different potential security and privacy issues, requiring protection mechanisms to be adaptive, reliable, and scalable. Machine learning (ML) based methods have freque…
▽ More
The exponential growth of internet connected systems has generated numerous challenges, such as spectrum shortage issues, which require efficient spectrum sharing (SS) solutions. Complicated and dynamic SS systems can be exposed to different potential security and privacy issues, requiring protection mechanisms to be adaptive, reliable, and scalable. Machine learning (ML) based methods have frequently been proposed to address those issues. In this article, we provide a comprehensive survey of the recent development of ML based SS methods, the most critical security issues, and corresponding defense mechanisms. In particular, we elaborate the state-of-the-art methodologies for improving the performance of SS communication systems for various vital aspects, including ML based cognitive radio networks (CRNs), ML based database assisted SS networks, ML based LTE-U networks, ML based ambient backscatter networks, and other ML based SS solutions. We also present security issues from the physical layer and corresponding defending strategies based on ML algorithms, including Primary User Emulation (PUE) attacks, Spectrum Sensing Data Falsification (SSDF) attacks, jamming attacks, eavesdropping attacks, and privacy issues. Finally, extensive discussions on open challenges for ML based SS are also given. This comprehensive review is intended to provide the foundation for and facilitate future studies on exploring the potential of emerging ML for coping with increasingly complex SS and their security problems.
△ Less
Submitted 12 January, 2022;
originally announced January 2022.
-
Energy-Efficient Design for IRS-Assisted MEC Networks with NOMA
Authors:
Qun Wang,
Fuhui Zhou,
Han Hu,
Rose Qingyang Hu
Abstract:
Energy-efficient design is of crucial importance in wireless internet of things (IoT) networks. In order to serve massive users while achieving an energy-efficient operation, an intelligent reflecting surface (IRS) assisted mobile edge computing (MEC) network with non-orthogonal multiple access (NOMA) is studied in this paper. The energy efficiency (EE) is maximized by jointly optimizing the offlo…
▽ More
Energy-efficient design is of crucial importance in wireless internet of things (IoT) networks. In order to serve massive users while achieving an energy-efficient operation, an intelligent reflecting surface (IRS) assisted mobile edge computing (MEC) network with non-orthogonal multiple access (NOMA) is studied in this paper. The energy efficiency (EE) is maximized by jointly optimizing the offloading power, local computing frequency, receiving beamforming, and IRS phase-shift matrix. The problem is challenging to solve due to the non-convex fractional objective functions and the coupling among the variables. A semidefinite programming relaxation (SDR) based alternating algorithm is developed. Simulation results demonstrate that the proposed design outperforms the benchmark schemes in terms of EE. Applying IRS and NOMA can effectively improve the performance of the MEC network.
△ Less
Submitted 20 September, 2021; v1 submitted 19 September, 2021;
originally announced September 2021.
-
User Scheduling for Federated Learning Through Over-the-Air Computation
Authors:
Xiang Ma,
Haijian Sun,
Qun Wang,
Rose Qingyang Hu
Abstract:
A new machine learning (ML) technique termed as federated learning (FL) aims to preserve data at the edge devices and to only exchange ML model parameters in the learning process. FL not only reduces the communication needs but also helps to protect the local privacy. Although FL has these advantages, it can still experience large communication latency when there are massive edge devices connected…
▽ More
A new machine learning (ML) technique termed as federated learning (FL) aims to preserve data at the edge devices and to only exchange ML model parameters in the learning process. FL not only reduces the communication needs but also helps to protect the local privacy. Although FL has these advantages, it can still experience large communication latency when there are massive edge devices connected to the central parameter server (PS) and/or millions of model parameters involved in the learning process. Over-the-air computation (AirComp) is capable of computing while transmitting data by allowing multiple devices to send data simultaneously by using analog modulation. To achieve good performance in FL through AirComp, user scheduling plays a critical role. In this paper, we investigate and compare different user scheduling policies, which are based on various criteria such as wireless channel conditions and the significance of model updates. Receiver beamforming is applied to minimize the mean-square-error (MSE) of the distortion of function aggregation result via AirComp. Simulation results show that scheduling based on the significance of model updates has smaller fluctuations in the training process while scheduling based on channel condition has the advantage on energy efficiency.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
A Novel Automatic Modulation Classification Scheme Based on Multi-Scale Networks
Authors:
Hao Zhang,
Fuhui Zhou,
Qihui Wu,
Wei Wu,
Rose Qingyang Hu
Abstract:
Automatic modulation classification enables intelligent communications and it is of crucial importance in today's and future wireless communication networks. Although many automatic modulation classification schemes have been proposed, they cannot tackle the intra-class diversity problem caused by the dynamic changes of the wireless communication environment. In order to overcome this problem, ins…
▽ More
Automatic modulation classification enables intelligent communications and it is of crucial importance in today's and future wireless communication networks. Although many automatic modulation classification schemes have been proposed, they cannot tackle the intra-class diversity problem caused by the dynamic changes of the wireless communication environment. In order to overcome this problem, inspired by face recognition, a novel automatic modulation classification scheme is proposed by using the multi-scale network in this paper. Moreover, a novel loss function that combines the center loss and the cross entropy loss is exploited to learn both discriminative and separable features in order to further improve the classification performance. Extensive simulation results demonstrate that our proposed automatic modulation classification scheme can achieve better performance than the benchmark schemes in terms of the classification accuracy. The influence of the network parameters and the loss function with the two-stage training strategy on the classification accuracy of our proposed scheme are investigated.
△ Less
Submitted 31 May, 2021;
originally announced May 2021.
-
Mobility-Aware Offloading and Resource Allocation in MEC-Enabled IoT Networks
Authors:
Han Hu,
Weiwei Song,
Qun Wang,
Fuhui Zhou,
Rose Qingyang Hu
Abstract:
Mobile edge computing (MEC)-enabled Internet of Things (IoT) networks have been deemed a promising paradigm to support massive energy-constrained and computation-limited IoT devices. IoT with mobility has found tremendous new services in the 5G era and the forthcoming 6G eras such as autonomous driving and vehicular communications. However, mobility of IoT devices has not been studied in the suffi…
▽ More
Mobile edge computing (MEC)-enabled Internet of Things (IoT) networks have been deemed a promising paradigm to support massive energy-constrained and computation-limited IoT devices. IoT with mobility has found tremendous new services in the 5G era and the forthcoming 6G eras such as autonomous driving and vehicular communications. However, mobility of IoT devices has not been studied in the sufficient level in the existing works. In this paper, the offloading decision and resource allocation problem is studied with mobility consideration. The long-term average sum service cost of all the mobile IoT devices (MIDs) is minimized by jointly optimizing the CPU-cycle frequencies, the transmit power, and the user association vector of MIDs. An online mobility-aware offloading and resource allocation (OMORA) algorithm is proposed based on Lyapunov optimization and Semi-Definite Programming (SDP). Simulation results demonstrate that our proposed scheme can balance the system service cost and the delay performance, and outperforms other offloading benchmark methods in terms of the system service cost.
△ Less
Submitted 16 March, 2021;
originally announced March 2021.
-
Secure and Energy-Efficient Offloading and Resource Allocation in a NOMA-Based MEC Network
Authors:
Qun Wang,
Han Hu,
Haijian Sun,
Rose Qingyang Hu
Abstract:
Energy efficiency and security are two critical issues for mobile edge computing (MEC) networks. With stochastic task arrivals, time-varying dynamic environment, and passive existing attackers, it is very challenging to offload computation tasks securely and efficiently. In this paper, we study the task offloading and resource allocation problem in a non-orthogonal multiple access (NOMA) assisted…
▽ More
Energy efficiency and security are two critical issues for mobile edge computing (MEC) networks. With stochastic task arrivals, time-varying dynamic environment, and passive existing attackers, it is very challenging to offload computation tasks securely and efficiently. In this paper, we study the task offloading and resource allocation problem in a non-orthogonal multiple access (NOMA) assisted MEC network with security and energy efficiency considerations. To tackle the problem, a dynamic secure task offloading and resource allocation algorithm is proposed based on Lyapunov optimization theory. A stochastic non-convex problem is formulated to jointly optimize the local-CPU frequency and transmit power, aiming at maximizing the network energy efficiency, which is defined as the ratio of the long-term average secure rate to the long-term average power consumption of all users. The formulated problem is decomposed into the deterministic sub-problems in each time slot. The optimal local CPU-cycle and the transmit power of each user can be given in the closed-from. Simulation results evaluate the impacts of different parameters on the efficiency metrics and demonstrate that the proposed method can achieve better performance compared with other benchmark methods in terms of energy efficiency.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
Energy Efficient Robust Beamforming and Cooperative Jamming Design for IRS-Assisted MISO Networks
Authors:
Qun Wang,
Fuhui Zhou,
Rose Qingyang Hu,
Yi Qian
Abstract:
Energy-efficient design and secure communications are of crucial importance in wireless communication networks. However, the energy efficiency achieved by using physical layer security can be limited by the channel conditions. In order to tackle this problem, an intelligent reflecting surface (IRS) assisted multiple input single output (MISO) network with independent cooperative jamming is studied…
▽ More
Energy-efficient design and secure communications are of crucial importance in wireless communication networks. However, the energy efficiency achieved by using physical layer security can be limited by the channel conditions. In order to tackle this problem, an intelligent reflecting surface (IRS) assisted multiple input single output (MISO) network with independent cooperative jamming is studied. The energy efficiency is maximized by jointly designing the transmit and jamming beamforming and IRS phase-shift matrix under both the perfect channel state information (CSI) and the imperfect CSI.
In order to tackle the challenging non-convex fractional problems, an algorithm based on semidefinite programming (SDP) relaxation is proposed for solving energy efficiency maximization problem under the perfect CSI case while an alternate optimization algorithm based on $\mathcal{S}$-procedure is used for solving the problem under the imperfect CSI case.
Simulation results demonstrate that the proposed design outperforms the benchmark schemes in term of energy efficiency. Moreover, the tradeoff between energy efficiency and the secrecy rate is found in the IRS-assisted MISO network. Furthermore, it is shown that IRS can help improve energy efficiency even with the uncertainty of the CSI.
△ Less
Submitted 8 December, 2020;
originally announced December 2020.
-
Scheduling Policy and Power Allocation for Federated Learning in NOMA Based MEC
Authors:
Xiang Ma,
Haijian Sun,
Rose Qingyang Hu
Abstract:
Federated learning (FL) is a highly pursued machine learning technique that can train a model centrally while keeping data distributed. Distributed computation makes FL attractive for bandwidth limited applications especially in wireless communications. There can be a large number of distributed edge devices connected to a central parameter server (PS) and iteratively download/upload data from/to…
▽ More
Federated learning (FL) is a highly pursued machine learning technique that can train a model centrally while keeping data distributed. Distributed computation makes FL attractive for bandwidth limited applications especially in wireless communications. There can be a large number of distributed edge devices connected to a central parameter server (PS) and iteratively download/upload data from/to the PS. Due to the limited bandwidth, only a subset of connected devices can be scheduled in each round. There are usually millions of parameters in the state-of-art machine learning models such as deep learning, resulting in a high computation complexity as well as a high communication burden on collecting/distributing data for training. To improve communication efficiency and make the training model converge faster, we propose a new scheduling policy and power allocation scheme using non-orthogonal multiple access (NOMA) settings to maximize the weighted sum data rate under practical constraints during the entire learning process. NOMA allows multiple users to transmit on the same channel simultaneously. The user scheduling problem is transformed into a maximum-weight independent set problem that can be solved using graph theory. Simulation results show that the proposed scheduling and power allocation scheme can help achieve a higher FL testing accuracy in NOMA based wireless networks than other existing schemes.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
User Preference Learning-Aided Collaborative Edge Caching for Small Cell Networks
Authors:
Md Ferdous Pervej,
Le Thanh Tan,
Rose Qingyang Hu
Abstract:
While next-generation wireless communication networks intend leveraging edge caching for enhanced spectral efficiency, quality of service, end-to-end latency, content sharing cost, etc., several aspects of it are yet to be addressed to make it a reality. One of the fundamental mysteries in a cache-enabled network is predicting what content to cache and where to cache so that high caching content a…
▽ More
While next-generation wireless communication networks intend leveraging edge caching for enhanced spectral efficiency, quality of service, end-to-end latency, content sharing cost, etc., several aspects of it are yet to be addressed to make it a reality. One of the fundamental mysteries in a cache-enabled network is predicting what content to cache and where to cache so that high caching content availability is accomplished. For simplicity, most of the legacy systems utilize a static estimation - based on Zipf distribution, which, in reality, may not be adequate to capture the dynamic behaviors of the contents popularities. Forecasting user's preferences can proactively allocate caching resources and cache the needed contents, which is especially important in a dynamic environment with real-time service needs. Motivated by this, we propose a long short-term memory (LSTM) based sequential model that is capable of capturing the temporal dynamics of the users' preferences for the available contents in the content library. Besides, for a more efficient edge caching solution, different nodes in proximity can collaborate to help each other. Based on the forecast, a non-convex optimization problem is formulated to minimize content sharing costs among these nodes. Moreover, a greedy algorithm is used to achieve a sub-optimal solution. By using mathematical analysis and simulation results, we validate that the proposed algorithm performs better than other existing schemes.
△ Less
Submitted 15 September, 2020; v1 submitted 16 May, 2020;
originally announced May 2020.
-
Artificial Intelligence Assisted Collaborative Edge Caching in Small Cell Networks
Authors:
Md Ferdous Pervej,
Le Thanh Tan,
Rose Qingyang Hu
Abstract:
Edge caching is a new paradigm that has been exploited over the past several years to reduce the load for the core network and to enhance the content delivery performance. Many existing caching solutions only consider homogeneous caching placement due to the immense complexity associated with the heterogeneous caching models. Unlike these legacy modeling paradigms, this paper considers heterogeneo…
▽ More
Edge caching is a new paradigm that has been exploited over the past several years to reduce the load for the core network and to enhance the content delivery performance. Many existing caching solutions only consider homogeneous caching placement due to the immense complexity associated with the heterogeneous caching models. Unlike these legacy modeling paradigms, this paper considers heterogeneous content preference of the users with heterogeneous caching models at the edge nodes. Besides, aiming to maximize the cache hit ratio (CHR) in a two-tier heterogeneous network, we let the edge nodes collaborate. However, due to complex combinatorial decision variables, the formulated problem is hard to solve in the polynomial time. Moreover, there does not even exist a ready-to-use tool or software to solve the problem. We propose a modified particle swarm optimization (M-PSO) algorithm that efficiently solves the complex constraint problem in a reasonable time. Using numerical analysis and simulation, we validate that the proposed algorithm significantly enhances the CHR performance when comparing to that of the existing baseline caching schemes.
△ Less
Submitted 15 September, 2020; v1 submitted 16 May, 2020;
originally announced May 2020.
-
Robust Trajectory and Transmit Power Optimization for Secure UAV-Enabled Cognitive Radio Networks
Authors:
Yifan Zhou,
Fuhui Zhou,
Huilin Zhou,
Derrick Wing Kwan Ng,
Rose Qingyang Hu
Abstract:
Cognitive radio is a promising technology to improve spectral efficiency. However, the secure performance of a secondary network achieved by using physical layer security techniques is limited by its transmit power and channel fading. In order to tackle this issue, a cognitive unmanned aerial vehicle (UAV) communication network is studied by exploiting the high flexibility of a UAV and the possibi…
▽ More
Cognitive radio is a promising technology to improve spectral efficiency. However, the secure performance of a secondary network achieved by using physical layer security techniques is limited by its transmit power and channel fading. In order to tackle this issue, a cognitive unmanned aerial vehicle (UAV) communication network is studied by exploiting the high flexibility of a UAV and the possibility of establishing line-of-sight links. The average secrecy rate of the secondary network is maximized by robustly optimizing the UAV's trajectory and transmit power. Our problem formulation takes into account two practical inaccurate location estimation cases, namely, the worst case and the outage-constrained case. In order to solve those challenging non-convex problems, an iterative algorithm based on $\mathcal{S}$-Procedure is proposed for the worst case while an iterative algorithm based on Bernstein-type inequalities is proposed for the outage-constrained case. The proposed algorithms can obtain effective suboptimal solutions of the corresponding problems. Our simulation results demonstrate that the algorithm under the outage-constrained case can achieve a higher average secrecy rate with a low computational complexity compared to that of the algorithm under the worst case. Moreover, the proposed schemes can improve the secure communication performance significantly compared to other benchmark schemes.
△ Less
Submitted 8 March, 2020;
originally announced May 2020.
-
Towards Green Mobile Edge Computing Offloading Systems with Security Enhancement
Authors:
Haijian Sun,
Qun Wang,
Xiang Ma,
Yongjun Xu,
Rose Qingyang Hu
Abstract:
Mobile edge computing (MEC) is an emerging communication scheme that aims at reducing latency. In this paper, we investigate a green MEC system under the existence of an eavesdropper. We use computation efficiency, which is defined as the total number of bits computed divided by the total energy consumption, as our main metric. To alleviate stringent latency requirement, a joint secure offloading…
▽ More
Mobile edge computing (MEC) is an emerging communication scheme that aims at reducing latency. In this paper, we investigate a green MEC system under the existence of an eavesdropper. We use computation efficiency, which is defined as the total number of bits computed divided by the total energy consumption, as our main metric. To alleviate stringent latency requirement, a joint secure offloading and computation model is proposed. Additionally, we formulate an optimization problem for maximizing computation efficiency, under several practical constraints. The non-convex problem is tackled by successive convex approximation and an iterative algorithm. Simulation results have verified the superiority of our proposed scheme, as well as the effectiveness of our problem solution.
△ Less
Submitted 10 April, 2020;
originally announced April 2020.
-
A Machine Learning Based Framework for the Smart Healthcare Monitoring
Authors:
Abrar Zahin,
Le Thanh Tan,
Rose Qingyang Hu
Abstract:
In this paper, we propose a novel framework for the smart healthcare system, where we employ the compressed sensing (CS) and the combination of the state-of-the-art machine learning based denoiser as well as the alternating direction of method of multipliers (ADMM) structure. This integration significantly simplifies the software implementation for the lowcomplexity encoder, thanks to the modular…
▽ More
In this paper, we propose a novel framework for the smart healthcare system, where we employ the compressed sensing (CS) and the combination of the state-of-the-art machine learning based denoiser as well as the alternating direction of method of multipliers (ADMM) structure. This integration significantly simplifies the software implementation for the lowcomplexity encoder, thanks to the modular structure of ADMM. Furthermore, we focus on detecting fall down actions from image streams. Thus, teh primary purpose of thus study is to reconstruct the image as visibly clear as possible and hence it helps the detection step at the trained classifier. For this efficient smart health monitoring framework, we employ the trained binary convolutional neural network (CNN) classifier for the fall-action classifier, because this scheme is a part of surveillance scenario. In this scenario, we deal with the fallimages, thus, we compress, transmit and reconstruct the fallimages. Experimental results demonstrate the impacts of network parameters and the significant performance gain of the proposal compared to traditional methods.
△ Less
Submitted 4 April, 2020;
originally announced April 2020.
-
Adaptive Federated Learning With Gradient Compression in Uplink NOMA
Authors:
Haijian Sun,
Xiang Ma,
Rose Qingyang Hu
Abstract:
Federated learning (FL) is an emerging machine learning technique that aggregates model attributes from a large number of distributed devices. Several unique features such as energy saving and privacy preserving make FL a highly promising learning approach for power-limited and privacy sensitive devices. Although distributed computing can lower down the information amount that needs to be uploaded…
▽ More
Federated learning (FL) is an emerging machine learning technique that aggregates model attributes from a large number of distributed devices. Several unique features such as energy saving and privacy preserving make FL a highly promising learning approach for power-limited and privacy sensitive devices. Although distributed computing can lower down the information amount that needs to be uploaded, model updates in FL can still experience performance bottleneck, especially for updates via wireless connections. In this work, we investigate the performance of FL update with mobile edge devices that are connected to the parameter server (PS) with practical wireless links, where uplink update from user to PS has very limited capacity. Different from the existing works, we apply non-orthogonal multiple access (NOMA) together with gradient compression in the wireless uplink. Simulation results show that our proposed scheme can significantly reduce aggregation latency while achieving similar accuracy.
△ Less
Submitted 3 March, 2020;
originally announced March 2020.
-
Computation Efficiency Maximization in Wireless-Powered Mobile Edge Computing Networks
Authors:
Fuhui Zhou,
Rose Qingyang Hu
Abstract:
Energy-efficient computation is an inevitable trend for mobile edge computing (MEC) networks. Resource allocation strategies for maximizing the computation efficiency are critically important. In this paper, computation efficiency maximization problems are formulated in wireless-powered MEC networks under both partial and binary computation offloading modes. A practical non-linear energy harvestin…
▽ More
Energy-efficient computation is an inevitable trend for mobile edge computing (MEC) networks. Resource allocation strategies for maximizing the computation efficiency are critically important. In this paper, computation efficiency maximization problems are formulated in wireless-powered MEC networks under both partial and binary computation offloading modes. A practical non-linear energy harvesting model is considered. Both time division multiple access (TDMA) and non-orthogonal multiple access (NOMA) are considered and evaluated for offloading. The energy harvesting time, the local computing frequency, and the offloading time and power are jointly optimized to maximize the computation efficiency under the max-min fairness criterion. Two iterative algorithms and two alternative optimization algorithms are respectively proposed to address the non-convex problems formulated in this paper. Simulation results show that the proposed resource allocation schemes outperform the benchmark schemes in terms of user fairness. Moreover, a tradeoff is elucidated between the achievable computation efficiency and the total number of computed bits. Furthermore, simulation results demonstrate that the partial computation offloading mode outperforms the binary computation offloading mode and NOMA outperforms TDMA in terms of computation efficiency.
△ Less
Submitted 11 February, 2020; v1 submitted 28 January, 2020;
originally announced January 2020.
-
Subcarrier Assignment Schemes Based on Q-Learning in Wideband Cognitive Radio Networks
Authors:
Yuan Zhou,
Fuhui Zhou,
Yongpeng Wu,
Rose Qingyang Hu,
Yuhao Wang
Abstract:
Subcarrier assignment is of crucial importance in wideband cognitive radio (CR) networks. In order to tackle the challenge that the traditional optimization-based methods are inappropriate in the dynamic spectrum access environment, an independent Q-learning-based scheme is proposed for the case that the secondary users (SUs) cannot exchange information while a collaborative Q-learning-based schem…
▽ More
Subcarrier assignment is of crucial importance in wideband cognitive radio (CR) networks. In order to tackle the challenge that the traditional optimization-based methods are inappropriate in the dynamic spectrum access environment, an independent Q-learning-based scheme is proposed for the case that the secondary users (SUs) cannot exchange information while a collaborative Q-learning-based scheme is proposed for the case that information can be exchange among SUs. Simulation results show that the performance achieved with the proposed collaborative Q-learning-based assignment is better than that obtained with the proposed independent Q-learning-based assignment at the cost of the computation cost.
△ Less
Submitted 16 November, 2019;
originally announced November 2019.
-
Energy-Efficient Beamforming and Cooperative Jamming in IRS-Assisted MISO Networks
Authors:
Qun Wang,
Fuhui Zhou,
Rose Qingyang Hu,
Yi Qian
Abstract:
The energy-efficient (EE) design problem is very important to design a good performance network. Besides this, the security of communication is also important. Based on the new IRS technology, the EE maximization problem is formed in this paper for secure communication. We proposed a solution that outperformed other methods.
The energy-efficient (EE) design problem is very important to design a good performance network. Besides this, the security of communication is also important. Based on the new IRS technology, the EE maximization problem is formed in this paper for secure communication. We proposed a solution that outperformed other methods.
△ Less
Submitted 14 December, 2019; v1 submitted 12 November, 2019;
originally announced November 2019.
-
Computation Efficiency Maximization in OFDMA-Based Mobile Edge Computing Networks
Authors:
Yuhang Wu,
Yuhao Wang,
Fuhui Zhou,
Rose Qingyang Hu
Abstract:
Computation-efficient resource allocation strategies are of crucial importance in mobile edge computing networks. However, few works have focused on this issue. In this letter, weighted sum computation efficiency (CE) maximization problems are formulated in a mobile edge computing (MEC) network with orthogonal frequency division multiple access (OFDMA). Both partial offloading mode and binary offl…
▽ More
Computation-efficient resource allocation strategies are of crucial importance in mobile edge computing networks. However, few works have focused on this issue. In this letter, weighted sum computation efficiency (CE) maximization problems are formulated in a mobile edge computing (MEC) network with orthogonal frequency division multiple access (OFDMA). Both partial offloading mode and binary offloading mode are considered. The closed-form expressions for the optimal subchannel and power allocation schemes are derived. In order to address the intractable non-convex weighted sum-of ratio problems, an efficiently iterative algorithm is proposed. Simulation results demonstrate that the CE achieved by our proposed resource allocation scheme is better than that obtained by the benchmark schemes.
△ Less
Submitted 24 October, 2019;
originally announced October 2019.
-
Mobile Edge Computing in Unmanned Aerial Vehicle Networks
Authors:
Fuhui Zhou,
Rose Qingyang Hu,
Zan Li,
Yuhao Wang
Abstract:
Unmanned aerial vehicle (UAV)-enabled communication networks are promising in the fifth and beyond wireless communication systems. In this paper, we shed light on three UAV-enabled mobile edge computing (MEC) architectures. Those architectures have been receiving ever increasing research attention for improving computation performance and decreasing execution latency by integrating UAV into MEC ne…
▽ More
Unmanned aerial vehicle (UAV)-enabled communication networks are promising in the fifth and beyond wireless communication systems. In this paper, we shed light on three UAV-enabled mobile edge computing (MEC) architectures. Those architectures have been receiving ever increasing research attention for improving computation performance and decreasing execution latency by integrating UAV into MEC networks. We present a comprehensive survey for the state-of-the-art research in this domain. Important implementation issues are clarified. Moreover, in order to provide an enlightening guidance for future research directions, key challenges and open issues are discussed.
△ Less
Submitted 12 October, 2019;
originally announced October 2019.
-
Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks
Authors:
Wei Wu,
Fuhui Zhou,
Rose Qingyang Hu,
Baoyun Wang
Abstract:
Mobile edge computing (MEC) has been envisaged as a promising technique in the next-generation wireless networks. In order to improve the security of computation tasks offloading and enhance user connectivity, physical layer security and non-orthogonal multiple access (NOMA) are studied in MEC-aware networks. The secrecy outage probability is adopted to measure the secrecy performance of computati…
▽ More
Mobile edge computing (MEC) has been envisaged as a promising technique in the next-generation wireless networks. In order to improve the security of computation tasks offloading and enhance user connectivity, physical layer security and non-orthogonal multiple access (NOMA) are studied in MEC-aware networks. The secrecy outage probability is adopted to measure the secrecy performance of computation offloading by considering a practically passive eavesdropping scenario. The weighted sum-energy consumption minimization problem is firstly investigated subject to the secrecy offloading rate constraints, the computation latency constraints and the secrecy outage probability constraints. The semi-closed form expression for the optimal solution is derived. We then investigate the secrecy outage probability minimization problem by taking the priority of two users into account, and characterize the optimal secrecy offloading rates and power allocations with closed-form expressions. Numerical results demonstrate that the performance of our proposed design are better than those of the alternative benchmark schemes.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
Performance Analysis on Visible Light Communications With Multi-Eavesdroppers and Practical Amplitude Constraint
Authors:
Xiaodong Liu,
Yuhao Wang,
Fuhui Zhou,
Zhenyu Deng,
Rose Qingyang Hu
Abstract:
In this paper the secure performance for the visible light communication (VLC) system with multiple eavesdroppers is studied. By considering the practical amplitude constraint instead of an average power constraint in the VLC system, the closed-form expressions for the upper and the lower bounds of the secrecy outage probability and the average secrecy capacity are derived. Since the locations for…
▽ More
In this paper the secure performance for the visible light communication (VLC) system with multiple eavesdroppers is studied. By considering the practical amplitude constraint instead of an average power constraint in the VLC system, the closed-form expressions for the upper and the lower bounds of the secrecy outage probability and the average secrecy capacity are derived. Since the locations for both legitimate receiver and eavesdroppers are unknown as well as random, the stochastic geometry method is introduced for problem formulation. Moreover, accurate expressions with a low computational complexity are obtained with the rigorous derivation. Simulation results verify the correctness of our theoretical analysis.
△ Less
Submitted 12 October, 2019;
originally announced October 2019.
-
Robust Beamforming Design in a NOMA Cognitive Radio Network Relying on SWIPT
Authors:
Haijian Sun,
Fuhui Zhou,
Rose Qingyang Hu,
Lajos Hanzo
Abstract:
This paper studies a multiple-input single-output non-orthogonal multiple access cognitive radio network relying on simultaneous wireless information and power transfer. A realistic non-linear energy harvesting model is applied and a power splitting architecture is adopted at each secondary user (SU). Since it is difficult to obtain perfect channel state information (CSI) in practice, instead eith…
▽ More
This paper studies a multiple-input single-output non-orthogonal multiple access cognitive radio network relying on simultaneous wireless information and power transfer. A realistic non-linear energy harvesting model is applied and a power splitting architecture is adopted at each secondary user (SU). Since it is difficult to obtain perfect channel state information (CSI) in practice, instead either a bounded or gaussian CSI error model is considered. Our robust beamforming and power splitting ratio are jointly designed for two problems with different objectives, namely that of minimizing the transmission power of the cognitive base station and that of maximizing the total harvested energy of the SUs, respectively. The optimization problems are challenging to solve, mainly because of the non-linear structure of the energy harvesting and CSI errors models. We converted them into convex forms by using semi-definite relaxation. For the minimum transmission power problem, we obtain the rank-2 solution under the bounded CSI error model, while for the maximum energy harvesting problem, a two-loop procedure using a one-dimensional search is proposed. Our simulation results show that the proposed scheme significantly outperforms its traditional orthogonal multiple access counterpart. Furthermore, the performance using the gaussian CSI error model is generally better than that using the bounded CSI error model.
△ Less
Submitted 10 July, 2018;
originally announced July 2018.
-
Computation Rate Maximization in UAV-Enabled Wireless Powered Mobile-Edge Computing Systems
Authors:
Fuhui Zhou,
Yongpeng Wu,
Rose Qingyang Hu,
Yi Qian
Abstract:
Mobile edge computing (MEC) and wireless power transfer (WPT) are two promising techniques to enhance the computation capability and to prolong the operational time of low-power wireless devices that are ubiquitous in Internet of Things. However, the computation performance and the harvested energy are significantly impacted by the severe propagation loss. In order to address this issue, an unmann…
▽ More
Mobile edge computing (MEC) and wireless power transfer (WPT) are two promising techniques to enhance the computation capability and to prolong the operational time of low-power wireless devices that are ubiquitous in Internet of Things. However, the computation performance and the harvested energy are significantly impacted by the severe propagation loss. In order to address this issue, an unmanned aerial vehicle (UAV)-enabled MEC wireless powered system is studied in this paper. The computation rate maximization problems in a UAV-enabled MEC wireless powered system are investigated under both partial and binary computation offloading modes, subject to the energy harvesting causal constraint and the UAV's speed constraint. These problems are non-convex and challenging to solve. A two-stage algorithm and a three-stage alternative algorithm are respectively proposed for solving the formulated problems. The closed-form expressions for the optimal central processing unit frequencies, user offloading time, and user transmit power are derived. The optimal selection scheme on whether users choose to locally compute or offload computation tasks is proposed for the binary computation offloading mode. Simulation results show that our proposed resource allocation schemes outperforms other benchmark schemes. The results also demonstrate that the proposed schemes converge fast and have low computational complexity.
△ Less
Submitted 17 July, 2018; v1 submitted 8 June, 2018;
originally announced June 2018.
-
Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT
Authors:
Fuhui Zhou,
Zheng Chu,
Haijian Sun,
Rose Qingyang Hu,
Lajos Hanzo
Abstract:
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) have been deemed two promising technologies due to their potential to achieve high spectral efficiency and massive connectivity. This paper studies a multiple-input single-output NOMA CR network relying on simultaneous wireless information and power transfer (SWIPT) conceived for supporting a massive population of power limited battery…
▽ More
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) have been deemed two promising technologies due to their potential to achieve high spectral efficiency and massive connectivity. This paper studies a multiple-input single-output NOMA CR network relying on simultaneous wireless information and power transfer (SWIPT) conceived for supporting a massive population of power limited battery-driven devices. In contrast to most of the existing works, which use an ideally linear energy harvesting model, this study applies a more practical non-linear energy harvesting model. In order to improve the security of the primary network, an artificial-noise-aided cooperative jamming scheme is proposed. The artificial-noise-aided beamforming design problems are investigated subject to the practical secrecy rate and energy harvesting constraints. Specifically, the transmission power minimization problems are formulated under both perfect channel state information (CSI) and the bounded CSI error model. The problems formulated are non-convex, hence they are challenging to solve. A pair of algorithms either using semidefinite relaxation (SDR) or a cost function are proposed for solving these problems. Our simulation results show that the proposed cooperative jamming scheme succeeds in establishing secure communications and NOMA is capable of outperforming the conventional orthogonal multiple access in terms of its power efficiency. Finally, we demonstrate that the cost function algorithm outperforms the SDR-based algorithm.
△ Less
Submitted 20 February, 2018;
originally announced February 2018.