-
Integrated Sensing, Communication, and Powering (ISCAP) for IoT: A Joint Beamforming Design
Authors:
Maryam Asadi Ahmadabadi,
S. Mohammad Razavizadeh,
Vahid Jamali
Abstract:
This paper studies Integrated Sensing, Communication, and Powering (ISCAP) as a novel framework designed to enhance Internet of Things (IoT) applications within sixth-generation wireless networks. In these applications, in addition to IoT devices requiring an energy supply and receiving information or control data to perform their tasks, the base station serving them must sense the devices and the…
▽ More
This paper studies Integrated Sensing, Communication, and Powering (ISCAP) as a novel framework designed to enhance Internet of Things (IoT) applications within sixth-generation wireless networks. In these applications, in addition to IoT devices requiring an energy supply and receiving information or control data to perform their tasks, the base station serving them must sense the devices and their environment to localize them, thereby improving data transmission and enabling simultaneous power delivery. In our multi-node ISCAP IoT system, we optimize base station beamforming alongside the receiver's power-splitting factor to maximize energy harvesting while adhering to strict communication and sensing constraints. To effectively tackle this non-convex optimization problem, we decompose it into three manageable subproblems and employ several techniques such as semidefinite relaxation and Rayleigh quotient methods to find an efficient solution. Simulation results demonstrate the effectiveness of the proposed design, highlighting performance trade-offs among sensing accuracy, communication reliability, and power transfer efficiency.
△ Less
Submitted 11 March, 2025;
originally announced March 2025.
-
DRL-Based Secure Spectrum-Reuse D2D Communications with RIS Assistance
Authors:
Maryam Asadi Ahmadabadi,
Farimehr Zohari,
S. Mohammad Razavizadeh
Abstract:
This study examines the secrecy performance of an uplink device-to-device (D2D) communication system enhanced by reconfigurable intelligent surfaces (RIS) while considering the presence of multiple eavesdroppers. RIS technology is employed to improve wireless communication environment by intelligently reflecting signals, thereby improving both capacity and security. We employ deep reinforcement le…
▽ More
This study examines the secrecy performance of an uplink device-to-device (D2D) communication system enhanced by reconfigurable intelligent surfaces (RIS) while considering the presence of multiple eavesdroppers. RIS technology is employed to improve wireless communication environment by intelligently reflecting signals, thereby improving both capacity and security. We employ deep reinforcement learning (DRL) to optimize resource allocation dynamically, addressing challenges in D2D pairs and optimizing RIS positioning and phase shifts in a changing wireless environment. Our simulations demonstrate that the developed DRL-based framework significantly maximizes the sum secrecy capacity of both D2D and cellular communications, achieving higher transmission secrecy rates compared to existing benchmarks. The results highlight the effectiveness of integrating RIS with D2D communications for improved security performance.
△ Less
Submitted 25 February, 2025;
originally announced February 2025.
-
Securing RIS-Aided Wireless Networks Against Full Duplex Active Eavesdropping
Authors:
Atefeh Zakeri,
S. Mohammad Razavizadeh
Abstract:
This paper investigates the physical layer security of a Reconfigurable Intelligent Surface (RIS)-aided wireless network in the presence of full-duplex active eavesdropping. In this scenario, the RIS cooperates with the Base Station (BS) to transfer information to the intended user while an active attacker attempts to intercept the information through a wiretap channel. In addition, the attacker s…
▽ More
This paper investigates the physical layer security of a Reconfigurable Intelligent Surface (RIS)-aided wireless network in the presence of full-duplex active eavesdropping. In this scenario, the RIS cooperates with the Base Station (BS) to transfer information to the intended user while an active attacker attempts to intercept the information through a wiretap channel. In addition, the attacker sends jamming signals to interfere with the legitimate user's reception of the signal and increase the eavesdropping rate. Our objective is to maximize the secrecy rate by jointly optimizing the active and passive beamformers at the BS and RIS, respectively. To solve the resulting non-convex optimization problem, we propose a solution that decomposes it into two disjoint beamforming design sub-problems solved iteratively using Alternating Optimization (AO) techniques. Numerical analysis is conducted to evaluate the impacts of varying the number of active attacking antennas and elements of the RIS on the secrecy performance of the considered systems under the presence of jamming signals sent by the attacker. The results demonstrate the importance of considering the impact of jamming signals on physical layer security in RIS-aided wireless networks. Overall, our work contributes to the growing body of literature on RIS-aided wireless networks and highlights the need to address the effects of jamming and active eavesdropping signals in such systems.
△ Less
Submitted 26 November, 2024;
originally announced November 2024.
-
Integrated Access and Backhaul (IAB) in Low Altitude Platforms
Authors:
Reza Ghasemi Alavicheh,
S. Mohammad Razavizadeh,
Halim Yanikomeroglu
Abstract:
In this paper, we explore the problem of utilizing Integrated Access and Backhaul (IAB) technology in Non-Terrestrial Networks (NTN), with a particular focus on aerial access networks. We consider an Uncrewed Aerial Vehicle (UAV)-based wireless network comprised of two layers of UAVs: (a) a lower layer consisting a number of flying users and a UAV Base Station (BS) that provides coverage for terre…
▽ More
In this paper, we explore the problem of utilizing Integrated Access and Backhaul (IAB) technology in Non-Terrestrial Networks (NTN), with a particular focus on aerial access networks. We consider an Uncrewed Aerial Vehicle (UAV)-based wireless network comprised of two layers of UAVs: (a) a lower layer consisting a number of flying users and a UAV Base Station (BS) that provides coverage for terrestrial users and, (b) an upper layer designated to provide both wireless access for flying users and backhaul connectivity for UAV BS. By adopting IAB technology, the backhaul and access links collaboratively share their resources, enabling aerial backhauling and the utilization of the same infrastructure and frequency resources for access links. A sum-rate maximization problem is formulated by considering aerial backhaul constraints to optimally allocate the frequency spectrum between aerial and terrestrial networks. We decompose the resulting non-convex optimization problem into two sub-problems of beamforming and spectrum allocation and then propose efficient solutions for each. Numerical results in different scenarios yield insightful findings about the effectiveness of using the IAB technique in aerial networks.
△ Less
Submitted 28 July, 2024; v1 submitted 22 July, 2024;
originally announced July 2024.
-
Integrated Access and Backhaul in Cell-free Massive MIMO Systems
Authors:
Ali Hosseinalipour Jazi,
S. Mohammad Razavizadeh,
Tommy Svensson
Abstract:
One of the major challenges with cell-free (CF) massive multiple-input multiple-output (MIMO) networks is providing backhaul links for a large number of distributed access points (APs). In general, providing fiber optics backhaul for these APs is not cost-effective and also reduces network scalability. Wireless backhauling can be a promising solution that can be integrated with wireless access lin…
▽ More
One of the major challenges with cell-free (CF) massive multiple-input multiple-output (MIMO) networks is providing backhaul links for a large number of distributed access points (APs). In general, providing fiber optics backhaul for these APs is not cost-effective and also reduces network scalability. Wireless backhauling can be a promising solution that can be integrated with wireless access links to increase spectrum efficiency. In this paper, the application of integrated access and backhaul (IAB) technique in millimeter-wave (mmWave) CF massive MIMO systems is investigated. The access and backhaul links share a frequency spectrum in the mmWave bands, and in both, hybrid beamforming techniques are adopted for signal transmission. The bandwidth allocation (division) parameter between the two link types as well as the beamforming matrices are optimized to maximize the end-to-end data-rate. This leads to a non-convex optimization problem for which an efficient solution method is proposed. The simulation results show the effectiveness of the IAB technique and our proposed scheme in CF massive MIMO systems. These simulations also compare the proposed hybrid beamforming method with a fully digital solution in terms of the number of radio frequency (RF) chains and the volume of backhaul traffic. Finally, the effect of increasing the number of APs on the users data rates in terms of wireless access and backhaul links constraints is also examined.
△ Less
Submitted 23 October, 2022;
originally announced October 2022.
-
Tunable Graphene-based Pulse Compressor for Terahertz Application
Authors:
Seyed Mohammadreza Razavizadeh
Abstract:
Pulse shaping is important for communications, spectroscopy, and other applications that require high peak power and pulsed operation, such as radar systems. Unfortunately, pulse shaping remains largely elusive for terahertz (THz) frequencies. To address this void, a comprehensive study on the dispersion tunability properties of THz chirped pulses traveling through a dielectric-lined hollow-core w…
▽ More
Pulse shaping is important for communications, spectroscopy, and other applications that require high peak power and pulsed operation, such as radar systems. Unfortunately, pulse shaping remains largely elusive for terahertz (THz) frequencies. To address this void, a comprehensive study on the dispersion tunability properties of THz chirped pulses traveling through a dielectric-lined hollow-core waveguide loaded with a helical graphene ribbon is presented.
△ Less
Submitted 22 June, 2021;
originally announced June 2021.
-
Vertical Beamforming in Reconfigurable Intelligent Surface-aided Cognitive Radio Networks
Authors:
S. Fatemeh Zamanian,
S. Mohammad Razavizadeh,
Qingqing Wu
Abstract:
In this letter, we investigate joint application of reconfigurable intelligent surface (RIS) and vertical beamforming in cognitive radio networks (CRN). After properly modeling the network, an optimization problem is formed to jointly design the beamforming vector and tilt angle at the secondary base station (BS) as well as the phase shifts at the RIS with the objective of maximizing spectral effi…
▽ More
In this letter, we investigate joint application of reconfigurable intelligent surface (RIS) and vertical beamforming in cognitive radio networks (CRN). After properly modeling the network, an optimization problem is formed to jointly design the beamforming vector and tilt angle at the secondary base station (BS) as well as the phase shifts at the RIS with the objective of maximizing spectral efficiency of the secondary network. The optimization problem is non-convex; thus, we propose an efficient solution method for it. Numerical results show that adding a RIS and optimizing the radiation orientation, can significantly improve performance of the CRNs.
△ Less
Submitted 16 March, 2021;
originally announced March 2021.
-
Deep Reinforcement Learning-based Anti-jamming Power Allocation in a Two-cell NOMA Network
Authors:
Sina Yousefzadeh Marandy,
Mohammad Ali Amirabadi,
Mohammad Hossein Kahaei,
Seyed Mohammad Razavizadeh
Abstract:
The performance of Non-orthogonal Multiple Access (NOMA) system dramatically decreases in the presence of inter-cell interference. This condition gets more challenging if a smart jammer is interacting in a network. In this paper, the NOMA power allocation of two independent Base Stations (BSs) against a smart jammer is, modeled as a sequential game. In this game, at first, each BS as a leader inde…
▽ More
The performance of Non-orthogonal Multiple Access (NOMA) system dramatically decreases in the presence of inter-cell interference. This condition gets more challenging if a smart jammer is interacting in a network. In this paper, the NOMA power allocation of two independent Base Stations (BSs) against a smart jammer is, modeled as a sequential game. In this game, at first, each BS as a leader independently chooses its power allocation strategy. Then, the smart jammer as the follower selects its optimal strategy based on the strategies of the BSs. The solutions of this game are, derived under different conditions. Based on the game-theoretical analysis, three new schemes are proposed for anti-jamming NOMA power allocation in a two-cell scenario called a) Q-Learning based Unselfish (QLU) NOMA power allocation scheme, b) Deep Q-Learning based Unselfish (DQLU) NOMA power allocation scheme, and c) Hot Booting Deep Q-Learning based Unselfish (HBDQLU) NOMA power allocation scheme. In these methods the BSs do not coordinate with each other. But our analysis theoretically predicts that with high probability, the proposed methods will converge to the optimal strategy from the total network point of view. Simulation results show the convergence of the proposed schemes and also their outperformance with respect to the Q-Learning-based Selfish (QLS) NOMA power allocation method.
△ Less
Submitted 1 January, 2021;
originally announced January 2021.
-
Secrecy Rate Maximization in Multi-IRS Millimeter Wave Networks
Authors:
Anahid Rafieifar,
S. Mohammad Razavizadeh
Abstract:
This paper investigates the problem of increasing the security at the physical layer of a Millimeter Wave (mmWave) network equipped with several Intelligent Reflecting Surfaces (IRSs). In this network, multiple IRSs help the Base Station (BS) to reach the signal to the desired user and at the same time maintain the security of the network i.e. securing the signal from receiving by the unallowable…
▽ More
This paper investigates the problem of increasing the security at the physical layer of a Millimeter Wave (mmWave) network equipped with several Intelligent Reflecting Surfaces (IRSs). In this network, multiple IRSs help the Base Station (BS) to reach the signal to the desired user and at the same time maintain the security of the network i.e. securing the signal from receiving by the unallowable eavesdropper. The target of the proposed scheme is to maximize the secrecy rate by jointly optimizing the active beamforming at the BS and passive beamforming at the IRSs. This leads to a non-convex optimization problem which we solve by decomposing into two sub-problems. The sub-problems alternatively solve the active and passive beamforming design problems using the Semi-Definite Relaxation (SDR) technique. Finally, simulations are done to assess the performance of the proposed algorithm. These results show the superiority of using multiple IRSs in the enhancement of the secrecy rate in the wireless networks that operate in the mmWave frequency bands.
△ Less
Submitted 21 May, 2021; v1 submitted 2 October, 2020;
originally announced October 2020.
-
Jamming-Robust Uplink Transmission for Spatially Correlated Massive MIMO Systems
Authors:
Hossein Akhlaghpasand,
Emil Björnson,
S. Mohammad Razavizadeh
Abstract:
In this paper, we consider how the uplink transmission of a spatially correlated massive multiple-input multiple-output (MIMO) system can be protected from a jamming attack. To suppress the jamming, we propose a novel framework including a new optimal linear estimator in the training phase and a bilinear equalizer in the data phase. The proposed estimator is optimal in the sense of maximizing the…
▽ More
In this paper, we consider how the uplink transmission of a spatially correlated massive multiple-input multiple-output (MIMO) system can be protected from a jamming attack. To suppress the jamming, we propose a novel framework including a new optimal linear estimator in the training phase and a bilinear equalizer in the data phase. The proposed estimator is optimal in the sense of maximizing the spectral efficiency of the legitimate system attacked by a jammer, and its implementation needs statistical knowledge about the jammer's channel. We derive an efficient algorithm to estimate the jamming information needed for the implementation of the proposed framework. Furthermore, we demonstrate that optimized power allocation at the legitimate users can improve the performance of the proposed framework regardless of the jamming power optimization. Our proposed framework can be exploited to combat jamming in scenarios with either ideal or non-ideal hardware at the legitimate users and the jammer. Numerical results reveal that using the proposed framework, the jammer cannot dramatically affect the performance of the legitimate system.
△ Less
Submitted 28 February, 2020;
originally announced February 2020.
-
Price of Anarchy in Multiuser Massive MIMO: Coordinated versus Uncoordinated Channel Tracking for High-Rate Internet of Things
Authors:
Hediyeh Soltanizadeh,
Shahrokh Farahmand,
S. Mohammad Razavizadeh
Abstract:
Incorporation of high-rate internet of things (IoT) service into a massive MIMO framework is investigated. It is revealed that massive MIMO possess the inherent potential to offer such service provided it knows the channels for all devices. Our proposed method is to jointly estimate and track the channels of all devices irrespective of their current activity. Using the dynamical model for devices'…
▽ More
Incorporation of high-rate internet of things (IoT) service into a massive MIMO framework is investigated. It is revealed that massive MIMO possess the inherent potential to offer such service provided it knows the channels for all devices. Our proposed method is to jointly estimate and track the channels of all devices irrespective of their current activity. Using the dynamical model for devices' channels evolution over time, optimal and sub-optimal trackers are developed for coordinated scenario. Furthermore, we introduce a new paradigm where the BS need not know the pilot access patterns of devices in advance which we refer to as uncoordinated setup. After motivating this scenario, we derive the optimal tracker which is intractable. Then, target tracking approaches are applied to address uncertainties in the measurements and derive sub-optimal trackers. Our proposed approaches explicitly address the channel aging problem and will not require downlink paging and uplink access request control channels which can become bottlenecks in crowded scenarios. The fundamental minimum mean square error (MMSE) gap between optimal coordinated and uncoordinated trackers which is defined as price of anarchy is evaluated and upper-bounded. Stability of optimal trackers is also investigated. Finally, performance of various proposed trackers are numerically compared.
△ Less
Submitted 2 February, 2020;
originally announced February 2020.
-
3D Beamforming in Reconfigurable Intelligent Surfaces-assisted Wireless Communication Networks
Authors:
S. Mohammad Razavizadeh,
Tommy Svensson
Abstract:
Reconfigurable Intelligent Surfaces (RIS) or Intelligent Reflecting Surfaces (IRS) are metasurfaces that can be deployed in various places in wireless environments to make these environments controllable and reconfigurable. In this paper, we investigate the problem of using 3D beamforming in RIS-empowered wireless networks and propose a new scheme that provides more degrees of freedom in designing…
▽ More
Reconfigurable Intelligent Surfaces (RIS) or Intelligent Reflecting Surfaces (IRS) are metasurfaces that can be deployed in various places in wireless environments to make these environments controllable and reconfigurable. In this paper, we investigate the problem of using 3D beamforming in RIS-empowered wireless networks and propose a new scheme that provides more degrees of freedom in designing and deploying the RIS-based networks. In the proposed scheme, a base station (BS) equipped with a full dimensional array of antennas optimizes its radiation pattern in the three-dimensional space to maximize the received signal to noise ratio at a target user. We also study the effect of angle of incidence of the received signal by the RIS on its reflecting properties and find a relation between this angle and the BS antenna array's tilt and elevation angles. The user receives the signal from a reflected path from the RIS as well as from a direct path from the BS which both depend on the BS antenna array's tilt and elevation angles. These angles and also the RIS element's phase shifts are jointly numerically optimized. Our simulation results show that using RIS-assisted 3D beamforming with optimized phase shifts and radiation angles can considerably improve the performance of wireless networks.
△ Less
Submitted 18 January, 2020;
originally announced January 2020.
-
Security Vulnerability of FDD Massive MIMO Systems in Downlink Training Phase
Authors:
Mohammad Amin Sheikhi,
S. Mohammad Razavizadeh
Abstract:
We consider downlink channel training of a frequency division duplex (FDD) massive multiple-input-multiple-output (MIMO) system when a multi-antenna jammer is present in the network. The jammer intends to degrade mean square error (MSE) of the downlink channel training by designing an attack based on second-order statistics of its channel. The channels are assumed to be spatially correlated. First…
▽ More
We consider downlink channel training of a frequency division duplex (FDD) massive multiple-input-multiple-output (MIMO) system when a multi-antenna jammer is present in the network. The jammer intends to degrade mean square error (MSE) of the downlink channel training by designing an attack based on second-order statistics of its channel. The channels are assumed to be spatially correlated. First, a closed-form expression for the channel estimation MSE is derived and then the jammer determines the conditions under which the MSE is maximized. Numerical results demonstrate that the proposed jamming can severely increase the estimation MSE even if the optimal training signals with a large number of pilot symbols are used by the legitimate system.
△ Less
Submitted 9 December, 2018;
originally announced December 2018.
-
QoE-Aware Beamforming Design for Massive MIMO Heterogeneous Networks
Authors:
Hadis Abarghouyi,
S. Mohammad Razavizadeh,
Emil Bjornson
Abstract:
One of the main goals of the future wireless networks is improving the users quality of experience (QoE). In this paper, we consider the problem of QoE-based resource allocation in the downlink of a massive multiple-input multiple-output (MIMO) heterogeneous network (HetNet). The network consists of a macro cell with a number of small cells embedded in it. The small cells base stations (BSs) are e…
▽ More
One of the main goals of the future wireless networks is improving the users quality of experience (QoE). In this paper, we consider the problem of QoE-based resource allocation in the downlink of a massive multiple-input multiple-output (MIMO) heterogeneous network (HetNet). The network consists of a macro cell with a number of small cells embedded in it. The small cells base stations (BSs) are equipped with a few antennas, while the macro BS is equipped with a massive number of antennas. We consider the two services Video and Web Browsing and design the beamforming vectors at the BSs. The objective is to maximize the aggregated Mean Opinion Score (MOS) of the users under constraints on the BSs powers and the required quality of service (QoS) of the users. We also consider extra constraints on the QoE of users to more strongly enforce the QoE in the beamforming design. To reduce the complexity of the optimization problem, we suggest suboptimal and computationally efficient solutions. Our results illustrate that increasing the number of antennas at the BSs and also increasing the number of small cells antennas in the network leads to a higher user satisfaction.
△ Less
Submitted 16 May, 2018;
originally announced May 2018.