Device-to-Device Communication in 5G Cellular Networks: Challenges, Solutions, and Future Directions
|
|
|
- Ginger Wheeler
- 9 years ago
- Views:
Transcription
1 G WIRELESS COMMUNICATIONS SYSTEMS: PROSPECTS AND CHALLENGES Device-to-Device Communication in G Cellular Networks: Challenges, Solutions, and Future Directions Mohsen Nader Tehrani, Murat Uysal, and Halim Yanikomeroglu Mohsen Nader Tehrani is with the University of Waterloo. Murat Uysal is with Özyeğin University. Halim Yanikomeroglu is with Carleton University. ATRACT In a conventional cellular system, devices are not allowed to directly communicate with each other in the licensed cellular bandwidth and all communications take place through the base stations. In this article, we envision a two-tier cellular network that involves a macrocell tier (i.e., -to-device communications) and a device tier (i.e., device-to-device communications). Device terminal relaying makes it possible for devices in a network to function as transmission relays for each other and realize a massive ad hoc mesh network. This is obviously a dramatic departure from the conventional cellular architecture and brings unique technical challenges. In such a two-tier cellular system, since the user data is routed through other users devices, security must be maintained for privacy. To ensure minimal impact on the performance of existing macrocell s, the two-tier network needs to be designed with smart interference management strategies and appropriate resource allocation schemes. Furthermore, novel pricing models should be designed to tempt devices to participate in this type of communication. Our article provides an overview of these major challenges in two-tier networks and proposes some pricing schemes for different types of device relaying. INTRODUCTION With the introduction of a myriad of smart handheld devices, user demands for mobile broadband are undergoing an unprecedented rise. The drastic growth of bandwidth-hungry applications such as video streaming and multimedia file sharing are already pushing the limits of current cellular systems. In the next decade, envisioned media-rich mobile applications such as tele-presence and 3D holography will require data rates simply not possible with fourth generation (4G) networks. The ever growing demand for higher data rates and capacity require unconventional thinking for the next generation (G) cellular systems. Cooperative communications has such promise! Cooperative communications represent a new class of wireless communication techniques in which network nodes help each other in relaying information to realize spatial diversity advantages. This new transmission paradigm promises significant performance gains in terms of link reliability, spectral efficiency, system capacity, and transmission range. Cooperative communication has been extensively studied in the literature, and fixed terminal relaying (which involves the deployment of low-power base stations to assist the communication between the source and the destination) has already been included in the 4G Long Term Evolution (LTE)- Advanced standard [1]. Fixed terminal relaying brings improvements in cellular systems, but the full potential of cooperation can be realized only through the implementation of device relaying. The term device here refers to a cell phone or any other portable wireless device with cellular connectivity (tablet, laptop, etc) a user owns. Device relaying makes it possible for devices in a network to function as transmission relays for each other and realize a massive ad hoc mesh network. This, of course, is possible with device-to-device (D2D) communication functionality, which allows two nearby devices to communicate with each other in the licensed cellular bandwidth without a base station () involved or with limited involvement. This is obviously a dramatic departure from the conventional cellular architecture. In the first four generations of cellular networks, D2D communication functionality has not been considered. This is largely because it has mainly been envisioned as a tool to reduce the cost of local service provision, which used to be fractional in the past based on the cellular operators market statistics. The operators attitude toward D2D functionality has been changing recently because of several trends in the wireless market [2]. For example, the number of context-aware services and applications is growing rapidly. These applications require location discovery and communication with neighboring devices, and the availability of such a functionality would reduce the cost of communication /14/$ IEEE
2 among devices. D2D functionality can also play a vital role in mobile cloud computing and facilitate effective sharing of resources (spectrum, computational power, applications, social contents, etc.) for users who are spatially close to each other. Service providers can further take advantage of D2D functionality to take some load off of the network in a local area such as a stadium or a big mall by allowing direct transmission among cell phones and other devices. Furthermore, D2D communication can be of critical use in natural disasters. In an earthquake or hurricane, an urgent communication network can be set up using D2D functionality in a short time, replacing the damaged communication network and Internet infrastructure. In the current market, technologies such as WiFi or Bluetooth provide some D2D communication functionality. However, these work in unlicensed band, and the interference is uncontrollable. In addition, they cannot provide security and quality of service (QoS) guarantee as do cellular networks. Unwilling to lose the emerging D2D market, the cellular operators and vendors are exploring the possibilities of introducing the D2D communication capability into cellular networks, which has sparked interest in this topic. Some recent works on D2D in cellular systems have reported results on interference management issues and radio resource allocation [4 6] as well as on communication session setup and management procedures [3]. In this article, we first provide a categorization of D2D communication based on the degree of involvement of the cellular operator. Then we summarize some major challenges that need to be addressed before the introduction of D2D functionality. Specifically, we briefly discuss security, interference management, and resource allocation issues, and point out some directions for future research. In the rest of the article, we focus on pricing, another major challenge in the implementation of D2D in practice, and propose some pricing schemes tempting for both users and operators. OVERVIEW OF D2D COMMUNICATION TYPES AND MAIN TECHNICAL CHALLENGES In this article, we envision a two-tier G cellular network with so-called macrocell and device tiers. The macrocell tier involves base station ()-to-device communications as in a conventional cellular system. The device tier involves D2D communications. If a device connects the cellular network through a, this device is said to be operating in the macrocell tier. If a device connects directly to another device or realizes its transmission through the assistance of other devices, these devices are said to be in the device tier. In such a system, the s will continue to serve the devices as usual. However, at cell edges or congested areas, devices will be allowed to communicate with each other, creating an ad hoc mesh network. In the realization of device-tier communications, the operator might have different levels of Device relaying with operator controlled (DR-OC) Figure 1. Illustration of device relaying communication with operator controlled (DR-OC). A device communicates with the through relaying its information via other devices. control. Based on the business model, it either exercises full/partial control over the resource allocation among source, destination, and relaying devices, or prefers not to have any control. Therefore, we can define the following four main types of device-tier communications (Figs. 1 4): Device relaying with operator controlled link establishment (DR-OC): A device at the edge of a cell or in a poor coverage area can communicate with the through relaying its information via other devices. This allows for the device to achieve a higher QoS or more battery life. The operator communicates with the relaying devices for partial or full control. Direct D2D communication with operator controlled (DC-OC): The source and destination devices talk and exchange data with each other without the need for a, but they are assisted by the operator for link establishment. Device relaying with device controlled link establishment (DR-DC): The operator is not involved in the process of. Therefore, source and destination devices are responsible for coordinating communication using relays between each other. Direct D2D communication with device controlled (DC-DC): The source and destination devices have direct communication with each other without any operator control. Therefore, source and destination devices should use the resource in such a way as to ensure limited interference with other devices in the same tier and the macrocell tier. A two-tier cellular system, if carefully designed, can bring significant improvements over the classical cellular system architecture. Before the introduction of D2D functionality, several technical challenges, particularly in secu- Conventional communication Device relaying 87
3 Direct D2D communication with operator controlled (DC-OC) Figure 2. Illustration of direct D2D communication with operator controlled (DC-OC). The source and destination devices can talk and exchange data with each other without the need for a, but they are assisted by the through a control link. Device relaying Direct D2D communication Device relaying with device controlled (DR-DC) Figure 3. Illustration of device relaying communication with device controlled. (DR-DC). and destination devices directly talk each other and do not use any control link from the operator. rity and interference management issues, should be overcome. Since the user data is routed through other users devices, security must be maintained for privacy. One possible solution to ensure security is closed access for the devices that want to operate in the device tier. In closed access, a device has a list of trusted devices, and devices not on this list must use the macrocell tier to communicate with it. For example, the users in a neighborhood or workplace that know each other, or the users that have been authenticated via a trusted party such as an organization, can directly communicate with each other, satisfying a level of privacy. The devices in a group can set a proper encryption between each other to avoid divulging their information to other devices. In open access, on the other hand, each device can act as a relay for other devices without any restrictions. Since there is no type of supervision, security in such a case is a challenging open research problem. Security issues in D2D communication involve the identification of potential attacks, threats, and vulnerability of the system. Earlier works on the security issues of machineto-machine communication [7 11] can be exploited to address security issues in open access D2D. For example, the work in [7] proposes a trusted environment to establish trust relationships among M2M equipment, while secrecy-based access control is discussed in [8]. Secure routing, software-based symmetric key cryptography, and detection of potential attacks are further investigated in [9 11]. Another significant concern in a two-tier system is interference management. In DR-OC and DC-OC, resource allocation and call setup are performed by the. Therefore, the can alleviate the problem of interference management to some extent using centralized methods, a well-established research area in wireless communications. On the other hand, in DR-DC and DC-DC, there is no centralized entity to supervise the resource allocation between devices. Operating in the same licensed band, devices will inevitably impact macrocell users. To ensure minimal impact on the performance of existing macrocell s, a two-tier network needs to be designed with smart interference management strategies and appropriate resource allocation schemes. Besides the interference between the macrocell and device tiers, there is also interference among users in the device tier. To address resource allocation for this type of communication, different approaches such as resource pooling [4], non-cooperative game or bargaining game [12], admission control and power allocation [6], cluster partitioning, and relay selection [13] can be employed. In DR-OC, as illustrated in Fig.1, since the is one of the communicating parties, some of the aforementioned challenges can be addressed by the control of the using existing methods []. The can authenticate the relaying devices and use the appropriate encryption to maintain sufficient privacy for the information of the devices. The can also manage spectrum allocation between the relaying devices to prevent them from interfering with other devices. In DC-OC, shown in Fig.2, the devices communicate directly with each other with operator controlled. Specifically, the operator deals with access authentication, connection control, resource allocation, and monetary interaction between devices. It has full control over the D2D connections, including control plane functions (e.g., connection setup and maintenance), and data plane functions (e.g., resource allocation). The D2D connections 88
4 in the device tier share the cellular licensed band with the regular cellular connections in the macrocell tier. The network can either dynamically assign resources to each D2D connection in the same way as a regular cellular connection or semi-statically assign a dedicated resource pool to all D2D connections. In DR-DC and DC-DC, there is no or server to control the communication between devices. As shown in Figs. 3 and 4, multiple devices communicate with each other using cooperative or non-cooperative communication, and one or multiple devices can play the role of relays for the other devices. This type of communication is more challenging than the previous ones, since there is no centralized supervision of the relaying. Connection setup, interference management, and resource allocation should therefore be addressed using distributed methods. Before the data transmission phase, two devices need to find each other and the adjacent relays (i.e., peer discovery and D2D connection setup). The devices can periodically broadcast identity information so that other devices may be aware of their existence and decide whether or not they can start a D2D direct or device relaying communication [4]. PRICING Besides the technical challenges summarized in the previous section, a dilemma operators need to address is how they control and charge for D2D services. It is possible that some users, if charged for D2D services, may turn to traditional D2D technologies, which are free but have lower speed and less security. Therefore, the operators must answer the pay for what question before they can push forward the operator-controlled D2D technology, which requires extensive analysis of usage cases and business models. Devices that act as relays for other users use their own resources such as battery, data storage, and bandwidth. Therefore, pricing models should also be designed to tempt devices to participate in this type of communication. Furthermore, in direct D2D communication, the devices need to have a secure environment for the process of selling and buying resources among themselves. The operator can control and create this secure environment for this kind of process. Therefore, it can expect some payment from the devices for the security and QoS in D2D communication. In the following, we discuss pricing issues for each of the D2D communication types and propose some solutions using tools from game theory and auction theory. PRICING FOR DR-OC The main challenge in DR-OC is to provide sufficient incentives for relaying devices. Since they use their resources (e.g., battery, bandwidth) to relay the information of other devices, they need tempting monetary or other kinds of incentives to involve them in this type of communication. One possible option is that the operator can offer some discounts on monthly bills based on the amount of data they relay through their devices. Giving such discounts is reasonable Figure 4. Illustration of direct D2D communication with device controlled. (DC-DC). from the operator s point of view, because the operator benefits from providing service to devices with lack of coverage or demanding data rates higher than available in the macrocell tier. Another possible incentive for the relaying device is that instead of a discount on the monthly bill, the operator can offer some free services in exchange for the amount of data they have relayed. 1 For example, assume that the following utility function is defined [12]: U i = b i log 2 (1 + k i g i ) Mb i p i + ~ b i log 2 (1 + k i ~ g i ), (1) Direct D2D communication where b i is the channel bandwidth used by the ith device, and its revenue from this usage is b i log 1 (1 + k i g i ). Here, k i = 1./ln(0.2/BER tar ) denotes the spectrum efficiency [7], g i is the average signal-to-noise ratio (SNR) for the link between the ith device and the, BER tar is the target bit error rate, and M is the number of hops between the and the ith device in data transmission. As the middle term indicates, the ith device should pay b i p i to the operator for its usage, where p i is the unit price of spectrum. The last term in Eq. 1 is the revenue of the ith device from the awarded bandwidth ( ~ b i ) that is the incentive given by the operator to the device for acting as a relay. ~ g i denotes the average SNR for the link between the ith device and the during the transmission on awarded data. Assuming that there are N devices, the revenue for the operator can be calculated as N R= Mb ipi Mbip i. i= 1 (2) In Fig., we illustrate the revenues of the operator and the devices in DR-OC and com- Direct D2D communication with device controlled (DC-DC) 1 To implement this in real time, the can send some control signals to users and give them the option to use the award data instead of conventional data transmission. 89
5 Revenue for operator x 10 7 x Operator revenue (two-tier network, DR-OC) Operator revenue (conventional network) Device revenue (two-tier network, DR-OC) Device revenue (conventional network) Average SNR Figure. Comparison of device and operator revenues in conventional single-tier cellular system and proposed two-tier system with DR-OC. 2 If there is a single seller, it is called a monopoly market. On the other hand, if there is more than one seller, it is called an oligopoly market. 3 Nowadays, most cell phones are smart and have GPS. Each pair who wants to submit their bid to the can include their positions using GPS. Also, there are other methods for positioning of devices, such as handsetbased, SIM-based, WiFi, and hybrid, by which the can locate the position of the devices. Revenue for devices pare with conventional (non-cooperative) communication. In DR-OC, the operator uses fixed pricing for the spectrum and offers free spectrum to the devices in exchange for data relayed by them. We assume b i = MHz, k i = 0.2 and g i 2 db, and M = 1 (i.e., single-hop communication). The number of devices served by the operator is assumed to be 100 (N = 100). For awarded bandwidth of the devices, we assume ~ b i = 2. MHz and 2. g i 12. db. This indicates less throughput for the reward. Since in cooperative communication the devices experience better QoS, it can be expected that they will be charged more by the operator in comparison to the conventional single-tier cellular system. We assume that the unit price of spectrum is 1 (i.e., p i = 1) for the conventional (non-cooperative) case and p i = 1.2 for the DR-OC case. Under these assumptions, it is observed from Fig. that the revenues of the operator and devices in a two-tier network with DR-OC increase in comparison with those in a conventional single-tier cellular system. Specifically, for the given numerical values, the operator revenue doubled for high SNRs, while the revenue of the devices increases about 28 percent in the best case. Therefore, we can conclude that DR-OC is more beneficial for the operator. PRICING FOR DC-OC An important challenge in DC-OC is to have tempting pricing schemes to satisfy users with using this service rather than free WiFi or Bluetooth. Design of a pricing model can be considered as a spectrum trading problem. In spectrum trading, the objective of a seller is to maximize the revenue/profit, while that of a buyer is to maximize the utility of spectrum usage. However, these objectives generally conflict with each other. Therefore, an optimal and stable solution for spectrum trading in terms of price and allocated spectrum would be required so that the revenue and utility are maximized, while both the seller and buyer are satisfied and do not want to deviate from the solution. Auction theory provides a useful framework of mathematical tools for the design of pricing models. Since the device does not know the values bidders (other devices) attach to the resources, auctions provide an efficient mechanism for the device to get higher revenue than is obtainable via static pricing. Auctions are also beneficial for the bidders, since generally they assign commodities to the bidders who value them most. Another promising approach for designing effective resource allocation schemes in such an interference-limited environment is game theory. Game theory provides a set of powerful mathematical tools for the analysis of conflict and cooperation between intelligent, rational decision makers. Among different kinds of auction mechanisms, a sealed-bid-first-price auction can be used as a tempting pricing scheme for DC-OC in a monopoly market 2 [12]. In this type of auction, the pair of devices who want to talk each other submit their bids to the. The selects the highest bids and allocates the channels. The can set a reserved price for a certain channel for which devices should submit a bid higher than the threshold price to win it. The can also sell the same channel to more than two users, assuming sufficient distance 3 to avoid interference, and gain more revenue from a channel in comparison to the non-cooperative case. For an oligopoly market, when there are multiple sellers, one can use the Bertrand Game [12] for the design of pricing models. In this noncooperative game, there are two different utility functions, one for the sellers and another for the buyers. Sellers and buyers try to maximize their revenue through the maximization of their utility functions. In this game, the devices that want to sell their resources determine a price and announce it to the devices who want to buy the resources. This game can be modeled as a Nash equilibrium problem where the aim is to find an equilibrium point such that no seller can improve its objective given the strategies chosen by the other sellers and the reaction of the buyers. As an example to demonstrate the revenues of operators and devices in a two-tier cellular system with DC-OC, we consider the following scenario. Assume there is only one operator in the market that has 0 available channels, each with a bandwidth of MHz, and the number of devices varies between 100 and 800. In a conventional single-tier cellular system, at any one time only 100 devices can talk to each other under the assumption of 0 available channels. Now assume a two-tier cellular system with DC-OC and set a reserved price r for the submitted bids. Therefore, devices can submit any bid higher than the reserved price based on their valuation of spectrum. Let p C = 1 denote the unit price of spectrum in a single-tier cellular system. We further assume that the submitted bid for spectrum by the devices in a two-tier system can take values in the range of [r, p max ], where p max is the maximum value of bids. The operator collects all the bids and allocates the available channels to the highest bidders. The revenue of the operator 90
6 is the summation of all payments from the winning devices, while the revenue of the devices is the difference between their valuation and their payment to the operator [12]. In Fig. 6, we use the notation of currency unit (CU) instead of any particular currency, assume r = 0.1, p max = 2, and illustrate the revenues for both operator and devices. It is observed that the revenue of the operator in DC-OC increases with the increasing number of devices since the value of their bids increases. On the other hand, in the single-tier cellular system, the revenue of the operator remains constant since the operator is already using the full network capacity. The revenue of the operator in the two-tier network with DC-OC is 10 percent more than that of the single-tier cellular system. The revenue of the devices in both cases decreases with the increasing number of devices. However, the amount of revenue that can be gained for the devices in a two-tier network is more than the single-tier counterpart by 48 percent when the number of devices is 100. This gain reduces to 6 percent when the number of devices increases to 800. Since the value of bids increases with the increasing number of devices, the revenue of devices decreases. It should be further noted that in DC- OC, since there are more channels available, the devices can enjoy more throughput than those in the single-tier cellular system. PRICING FOR DR-DC AND DC-DC Since the operator does not have any control over this type of relaying, it should not expect to make any profit from it. In closed access DR-DC, since devices know each other via different ways such as a relationship or being a member of a group or association, they can agree on a pricing scheme or simply relay the information without expecting any payment from other devices, similar to when a user sends a file using Bluetooth or WiFi for his/her friend. In open access DR-DC, users can adopt different pricing approaches such as market equilibrium, cooperative game, bargaining game, or double auction [12]. For the pricing among devices in DC-DC, we can assume that the users are selfish and have a set of social relationships, and hence will not display the same behavior toward all other devices. Since the selfish device will also need to send messages using other devices at times, it is in the selfish device s interest not to ask for monetary payment from the devices in its work group/community. For example, a pricing method is proposed in [14], where each device records encounters with other devices. Whenever a selfish device receives a message from another device, it refers to these records and calculates the percentage of meeting days, and the standard deviation of the daily meetings. Based on this, the selfish devices display altruistic behavior toward devices they meet often, and it is shown that these devices are better off than the devices that are always selfish. Operator revenue x 10 8 x Number of devices Figure 6. Comparison of device and operator revenues in conventional single-tier cellular system and the proposed two-tier system with DC-OC. A monopoly market is assumed and sealed-bid-first-price auction is used. CONCLUSIONS In this article, we have envisioned a two-tier G cellular network with so-called macrocell and device tiers. In the realization of device-tier communications, the operator might have different levels of control based on the adopted business model. We have first provided a categorization of D2D communication considering the degree of involvement of the cellular operator. Then we have discussed some major technical challenges to be addressed for each type, such as security, interference management, and resource allocation issues. In the rest of the article, we have focused on pricing issues and proposed some pricing schemes for two-tier networks using tools from game theory and auction theory. Our numerical results have demonstrated that judiciously designed pricing schemes for a two-tier cellular network bring significant gains for both the operator and users in comparison to a conventional single-tier counterpart. REFERENCES [1] C. Hoymann et al., ing Operation in 3GPP LTE: Challenges and Solutions, IEEE Commun. Mag., vol. 0, no. 2, Feb. 2012, pp [2] D. Astely et al., LTE Release 12 and Beyond, IEEE Commun. Mag., vol. 1, no. 7, 2013, pp [3] K. Doppler et al., Device-to-Device Communication as an Underlay to LTE-Advanced Networks, IEEE Commun. Mag., vol. 47, no. 12, Dec. 2009, pp [4] G. Fodor et al., Design Aspects of Network Assisted Device-to-Device Communications, IEEE Commun. Mag., vol. 0, no. 3, Mar. 2012, pp [] L. Lei et al., Operator Controlled Device-to-Device Communications in LTE-Advanced Networks, IEEE Wireless Commun., vol. 19, no. 3, June 2012, pp [6] D. Feng et al., Device-to-Device Communications Underlaying Cellular Networks, IEEE Trans. Commun., vol. 61, no. 8, 2013, pp [7] I. Cha et al., Trust in M2M Communication, IEEE Vehic. Tech. Mag., vol. 4, no. 3, Sept. 2009, pp [8] J. Yue et al., Secrecy-Based Access Control for Deviceto-Device Communication Underlaying Cellular Networks, IEEE Commun. Letters, vol. 17, no. 11, 2013, pp [9] A. Perrig, J. Stankovic, and D. Wagner, Security in Wireless Sensor Networks, Commun. ACM, vol. 47, no. 6, June 2004, pp Operator revenue (two-tier network, DR-OC) Operator revenue (conventional network) Device revenue (two-tier network, DR-OC) Device revenue (conventional network) Device revenue 91
7 [10] Y. Zhou, Y. Fang, and Y. Zhang, Securing Wireless Sensor Networks: A Survey, IEEE Commun. Surveys Tutorials, vol. 10, no. 3, 2008, pp [11] R. Muraleedharan and L. A. Osadciw, Jamming Attack Detection and Countermeasures in Wireless Sensor Network Using Ant System, Defense and Security Symp., May 2006, p G. [12] E. Hossain, D. Niyato, and Z. Han, Dynamic Spectrum Access and Management in Cognitive Radio Networks, 1st ed., Cambridge Univ. Press, [13] B. Zhou et al., Intracluster Device-to-Device Algorithm with Optimal Resource Utilization, IEEE Trans. Vehic. Tech., vol. 62, no., 2013, pp [14] N. Fernando, S. W. Loke, and W. Rahayu, Mobile Cloud Computing: A Survey, Future Generation Computer Systems, vol. 29, no. 1, Jan. 2013, pp BIOGRAPHIES MOHSEN NADER TEHRANI ([email protected]) received his B.S. and M.Sc. degrees from Isfahan University of Technology, Iran, in 2006 and 2009, respectively, and his Ph.D. degree from the University of Waterloo, Canada, in 2013, all in electrical engineering. His current research interests are in the broad areas of resource allocation for wireless communication systems. He is currently a postdoctoral fellow in the Coding and Signal Transmission laboratory at the University of Waterloo. MURAT UYSAL ([email protected]) is a full professor at Ozyegin University, Istanbul, Turkey, where he leads the Communication Theory and Technologies (CT&T) Research Group. Prior to joining Ozyegin University, he was a tenured associate professor at the University of Waterloo, where he still holds an adjunct faculty position. His research interests are in the broad areas of communication theory and signal processing with a particular emphasis on the physical layer aspects of wireless communication systems in radio, acoustic, and optical frequency bands. He has authored more than 180 journal and conference papers on these topics, and received more than 3000 citations. HALIM YANIKOMEROGLU [M] ([email protected]) is a full professor in the Department of Systems and Computer Engineering at Carleton University, Ottawa, Canada. His research interests cover many aspects of wireless technologies with special emphasis on cellular networks. He has coauthored more than 60 IEEE journal papers on wireless technologies. His collaborative research with industry has resulted in about 1 patents (granted and applied). He is a Distinguished Lecturer for the IEEE Vehicular Technology Society. 92
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Smart Mobility Management for D2D Communications in 5G Networks
Smart Mobility Management for D2D Communications in 5G Networks Osman N. C. Yilmaz, Zexian Li, Kimmo Valkealahti, Mikko A. Uusitalo, Martti Moisio, Petteri Lundén, Carl Wijting Nokia Research Center Nokia
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:[email protected] Mr.Ketan
A Device to Device Communication with Trusted Node Mapping in Cellular Network
A Device to Device Communication with Trusted Node Mapping in Cellular Network Vivek Kumar Sinha 1, Kedarnath Singh 2 1 M. Tech Scholar, TIT College of Engineering & Technology, Bhopal-580 031, India 2
A! Aalto University Comnet
NETS2020 Project Task #2.3: Self-organization in Dynamic Networks Olav Tirkkonen, Jyri Hämäläinen 1 Content Subtask #2.3.1: Convergence of Distributed Network Algorithms: The project outcome Subtask #2.3.2:
MOBILE CONVERGED NETWORKS: FRAMEWORK, OPTIMIZATION, AND CHALLENGES
GE_LAYOUT_Layout 12/1/14 2:4 PM Page 2 MOBILE C O N V E RGED N E T W O RKS MOBILE CONVERGED NETWORKS: FRAMEWORK, OPTIMIZATION, AND CHALLENGES TAO HAN, YANG YANG, XIAOHU GE, AND GUOQIANG MAO Tao Han and
An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems
ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Inter-Cell Interference Coordination (ICIC) Technology
Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit
LTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: [email protected] Illsoo Sohn Email: [email protected] Kwang Bok Lee Email: [email protected] Abstract
5G radio access. ericsson White paper Uen 284 23-3204 Rev B February 2015
ericsson White paper Uen 284 23-3204 Rev B February 2015 5G radio access TECHNOLOGY AND CAPABILITIES To enable connectivity for a wide range of new applications and use cases, the capabilities of 5G wireless
Delivering 4x4 MIMO for LTE Mobile Devices. March 2014. SkyCross Dual imat 4x4 MIMO Technology for LTE. Introduction
Delivering 4x4 MIMO for LTE Mobile Devices SkyCross Dual imat 4x4 MIMO Technology for LTE March 2014 Introduction With the rise of low-cost smartphones on the horizon, creating differentiation by leveraging
Simple Channel-Change Games for Spectrum- Agile Wireless Networks
Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Seidenberg School of Computer Science and Information Systems Pace University White Plains, New York, USA
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
SURVEY OF LTE AND LTE ADVANCED SYSTEM
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 5, May 2014, 1-6 Impact Journals SURVEY OF LTE AND LTE ADVANCED
Design Aspects of Network Assisted Device-to-Device Communications
ACCEPTED FROM OPEN CALL Design Aspects of Network Assisted Device-to-Device Communications Gábor Fodor, Erik Dahlman, Gunnar Mildh, Stefan Parkvall, Norbert Reider, György Miklós, and Zoltán Turányi, Ericsson
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Maximizing Throughput and Coverage for Wi Fi and Cellular
Maximizing Throughput and Coverage for Wi Fi and Cellular A White Paper Prepared by Sebastian Rowson, Ph.D. Chief Scientist, Ethertronics, Inc. www.ethertronics.com March 2012 Introduction Ask consumers
A survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE
SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE
NSN White paper February 2014. Nokia Solutions and Networks Smart Scheduler
NSN White paper February 2014 Nokia Solutions and Networks Smart Scheduler CONTENTS 1. Introduction 3 2. Smart Scheduler Features and Benefits 4 3. Smart Scheduler wit Explicit Multi-Cell Coordination
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
OPERATOR CONTROLLED DEVICE-TO-DEVICE COMMUNICATIONS IN LTE-ADVANCED NETWORKS
ACCEPTED FROM OPEN CALL OPERATOR CONTROLLED DEVICE-TO-DEVICE COMMUNICATIONS IN LTE-ADVANCED NETWORKS LEI LEI AND ZHANGDUI ZHONG, BEIJING JIAOTONG UNIVERSITY CHUANG LIN, TSINGHUA UNIVERSITY XMIN (SHERMAN)
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme
A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme ANASTASIOS THANOS KTH Information and Communication Technology Master
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS
SECTION 2 TECHNICAL DESCRIPTION OF SYSTEMS 2.1 INTRODUCTION Access equipment consists of injectors (also known as concentrators), repeaters, and extractors. injectors are tied to the backbone via fiber
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
MIMO Antenna Systems in WinProp
MIMO Antenna Systems in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen [email protected] Issue Date Changes V1.0 Nov. 2010 First version of document V2.0 Feb. 2011
Inter-cell Interference Mitigation Reduction in LTE Using Frequency Reuse Scheme
International Journal of Scientific and Research Publications, Volume 5, Issue 8, August 2015 1 Inter-cell Interference Mitigation Reduction in LTE Using Frequency Reuse Scheme Rupali Patil 1, R.D.Patane
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 1, Volume 2 (January 2015)
Survey on Massive Multimedia Content Delivery in Push- Based Wireless Converged Network Saranya B, II M.E. Department of Computer Science and Engineering, Balasubramaniam C, Asst.Professor(Sr.G), Department
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Mobile Multimedia Meet Cloud: Challenges and Future Directions
Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud
Top Six Considerations
Top Six Considerations for Upgrading to table of contents + Section I: Introduction Understanding...2 + Section II: Uses Cases for... 3 + Section III: Top 6 considerations for...5 + Section IV: Conclusion...
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
The 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
Improving SCADA Operations Using Wireless Instrumentation
Improving SCADA Operations Using Wireless Instrumentation April 2010 / White paper by Hany Fouda Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 The Evolution of Wireless...
LTE Performance and Analysis using Atoll Simulation
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 6 Ver. III (Nov Dec. 2014), PP 68-72 LTE Performance and Analysis using Atoll Simulation
Full Duplex Device-to-Device Communication in Cellular Networks
Full Duplex Device-to-Device Communication in Cellular Networks Samad Ali Email: [email protected] Nandana Rajatheva Email: [email protected] Matti Latva-aho Email: [email protected] Abstract In this paper
System Design in Wireless Communication. Ali Khawaja
System Design in Wireless Communication Ali Khawaja University of Texas at Dallas December 6, 1999 1 Abstract This paper deals with the micro and macro aspects of a wireless system design. With the growing
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Introduction to Computer Networking: Trends and Issues
Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Indo-US Collaboration in Engineering Education (IUCEE) Webinar,
Wireless Technologies in Industrial Markets
SOLUTION PAPER Wireless Technologies in Industrial Markets An Examination of Mesh Technologies in Mining Executive Summary Consumers and enterprises around the globe use standards-based 802.11a/b/g/n WiFi
IEEE Proof Web Version
IEEE/ACM TRANSACTIONS ON NETWORKING 1 An Economic Framework for Dynamic Spectrum Access and Service Pricing Shamik Sengupta and Mainak Chatterjee Abstract The concept of dynamic spectrum access will allow
FemtoHaul: Using Femtocells with Relays to Increase Macrocell Backhaul Bandwidth
FemtoHaul: Using Femtocells with Relays to Increase Macrocell Backhaul Bandwidth Ayaskant Rath, Sha Hua and Shivendra S. Panwar Dept. of Electrical and Computer Engineering, Polytechnic Institute of NYU,
A Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
New System Security Model for a Mobile Operator s Meshed Access Network
New System Security Model for a Mobile Operator s Meshed Access Network Sharad Kumar Verma 1, Dr. D.B. Ojha 2 Research Scholar, Department of CSE, Mewar University, Chittorgarh, Rajasthan, India 1 Professor,
Technical and economical assessment of selected LTE-A schemes.
Technical and economical assessment of selected LTE-A schemes. Heinz Droste,, Darmstadt Project Field Intelligent Wireless Technologies & Networks 1 Mobile Networks enabler for connected life & work. Textbox
LTE-Advanced Carrier Aggregation Optimization
Nokia Networks LTE-Advanced Carrier Aggregation Optimization Nokia Networks white paper LTE-Advanced Carrier Aggregation Optimization Contents Introduction 3 Carrier Aggregation in live networks 4 Multi-band
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Defining the Smart Grid WAN
Defining the Smart Grid WAN WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform
End-to-end Cognitive Radio Testbed (EECRT ) current state and proposal for continuation TEKES TRIAL program
End-to-end Cognitive Radio Testbed (EECRT ) current state and proposal for continuation TEKES TRIAL program Department of Communications and Networking School of Electrical Engineering Aalto University
Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam
Cooperative Techniques in LTE- Advanced Networks Md Shamsul Alam Person-to-person communications Rich voice Video telephony, video conferencing SMS/MMS Content delivery Mobile TV High quality video streaming
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-
ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between
Telefonica s Journey to 5G_ Enrique Blanco - Global CTO You choose. We connect_
Telefonica s Journey to 5G_ Enrique Blanco - Global CTO You choose. We connect_ We want our Clients to enjoy all the Benefits of the Digital World New Services Demand Higher Speeds and Quality Assurance
Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing
Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing B.Sudhanantham 1, M.Shankar 2 PG Scholar, Dept. of CSE, Angel College of Engineering and Technology, Tirupur, India 1
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE Hung-yu Wei, Samrat Ganguly, Rauf Izmailov NEC Labs America, Princeton, USA 08852, {hungyu,samrat,rauf}@nec-labs.com Abstract Non-uniform
Wireless Technologies for the 450 MHz band
Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Bringing Mobile Broadband to Rural Areas. Ulrich Rehfuess Head of Spectrum Policy and Regulation Nokia Siemens Networks
Bringing Mobile Broadband to Rural Areas Ulrich Rehfuess Head of Spectrum Policy and Regulation Nokia Siemens Networks Agenda Drivers in Mobile Broadband Why LTE? Market Status, Networks and Devices Implementation
1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2015 1 Lecture Notes 1 Interference Limited System, Cellular Systems Introduction, Power and Path Loss Reading: Mol 1, 2, 3.3, Patwari
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
FutureWorks 5G use cases and requirements
Nokia Networks FutureWorks 5G use cases and requirements White paper - 5G Use Cases and Requirements CONTENTS 1. What 5G will be and why it will come 3 2. Use cases 6 2.1 Mobile broadband 6 2.2 Automotive
About the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
Interference in LTE Small Cells:
Interference in LTE Small Cells: Status, Solutions, Perspectives. Forum on small cells, 2012, December. IEEE Globecom 2012 Presenter: Dr Guillaume de la Roche Mindspeed France 1 Mindspeed: Short history
