-
6G: The Intelligent Network of Everything -- A Comprehensive Vision, Survey, and Tutorial
Authors:
Harri Pennanen,
Tuomo Hänninen,
Oskari Tervo,
Antti Tölli,
Matti Latva-aho
Abstract:
The global 6G vision has taken its shape after years of international research and development efforts. This work culminated in ITU-R's Recommendation on "IMT-2030 Framework". While the definition phase of technological requirements is currently ongoing, 3GPP's standardization process on 6G networks is expected to start in 2025 and worldwide commercialization around 2030. This article serves as a…
▽ More
The global 6G vision has taken its shape after years of international research and development efforts. This work culminated in ITU-R's Recommendation on "IMT-2030 Framework". While the definition phase of technological requirements is currently ongoing, 3GPP's standardization process on 6G networks is expected to start in 2025 and worldwide commercialization around 2030. This article serves as a comprehensive guide to 6G by providing an overall vision, a contemporary survey of the main literature, and an informative tutorial-type presentation style. In our vision, 6G will be based on three fundamental elements: wireless, artificial intelligence (AI), and the Internet of Everything (IoE). Consequently, 6G can ultimately become the Intelligent Network of Everything while serving as an enabling platform for the next major disruption in mobile communication, called mobile intelligence. The potential of mobile intelligence is that anything can be made connected, intelligent, and aware of its environment. This will revolutionize the way how devices, systems, and applications are designed; how they operate and interact with humans and each other; and how they can be used for the benefit of people, society, and the world in general. After high-level visioning, the main details of 6G are discussed, including fundamental elements, disruptive applications, key use cases, main performance requirements, potential technologies, and defining features. A special focus is given to a comprehensive set of potential 6G technologies, each of which is introduced in a tutorial manner. Finally, we speculate on what comes after 6G and sketch the first high-level vision of 7G. All in all, the objective of this article is to provide a thorough guide to 6G in order to serve as a source of knowledge and inspiration for further research and development work in academia, industry, and standardization bodies.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
Machine Learning-Based Channel Prediction for RIS-assisted MIMO Systems With Channel Aging
Authors:
Nipuni Ginige,
Arthur Sousa de Sena,
Nurul Huda Mahmood,
Nandana Rajatheva,
Matti Latva-aho
Abstract:
Reconfigurable intelligent surfaces (RISs) have emerged as a promising technology to enhance the performance of sixth-generation (6G) and beyond communication systems. The passive nature of RISs and their large number of reflecting elements pose challenges to the channel estimation process. The associated complexity further escalates when the channel coefficients are fast-varying as in scenarios w…
▽ More
Reconfigurable intelligent surfaces (RISs) have emerged as a promising technology to enhance the performance of sixth-generation (6G) and beyond communication systems. The passive nature of RISs and their large number of reflecting elements pose challenges to the channel estimation process. The associated complexity further escalates when the channel coefficients are fast-varying as in scenarios with user mobility. In this paper, we propose an extended channel estimation framework for RIS-assisted multiple-input multiple-output (MIMO) systems based on a convolutional neural network (CNN) integrated with an autoregressive (AR) predictor. The implemented framework is designed for identifying the aging pattern and predicting enhanced estimates of the wireless channels in correlated fast-fading environments. Insightful simulation results demonstrate that our proposed CNN-AR approach is robust to channel aging, exhibiting a high-precision estimation accuracy. The results also show that our approach can achieve high spectral efficiency and low pilot overhead compared to traditional methods.
△ Less
Submitted 9 May, 2024;
originally announced June 2024.
-
Near-Field Spot Beamfocusing: A Correlation-Aware Transfer Learning Approach
Authors:
Mohammad Amir Fallah,
Mehdi Monemi,
Mehdi Rasti,
Matti Latva-Aho
Abstract:
3D spot beamfocusing (SBF), in contrast to conventional angular-domain beamforming, concentrates radiating power within very small volume in both radial and angular domains in the near-field zone. Recently the implementation of channel-state-information (CSI)-independent machine learning (ML)-based approaches have been developed for effective SBF using extremely-largescale-programable-metasurface…
▽ More
3D spot beamfocusing (SBF), in contrast to conventional angular-domain beamforming, concentrates radiating power within very small volume in both radial and angular domains in the near-field zone. Recently the implementation of channel-state-information (CSI)-independent machine learning (ML)-based approaches have been developed for effective SBF using extremely-largescale-programable-metasurface (ELPMs). These methods involve dividing the ELPMs into subarrays and independently training them with Deep Reinforcement Learning to jointly focus the beam at the Desired Focal Point (DFP). This paper explores near-field SBF using ELPMs, addressing challenges associated with lengthy training times resulting from independent training of subarrays. To achieve a faster CSIindependent solution, inspired by the correlation between the beamfocusing matrices of the subarrays, we leverage transfer learning techniques. First, we introduce a novel similarity criterion based on the Phase Distribution Image of subarray apertures. Then we devise a subarray policy propagation scheme that transfers the knowledge from trained to untrained subarrays. We further enhance learning by introducing Quasi-Liquid-Layers as a revised version of the adaptive policy reuse technique. We show through simulations that the proposed scheme improves the training speed about 5 times. Furthermore, for dynamic DFP management, we devised a DFP policy blending process, which augments the convergence rate up to 8-fold.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Assessment of the Sparsity-Diversity Trade-offs in Active Users Detection for mMTC
Authors:
Gabriel Martins de Jesus,
Onel Luis Alcaraz Lopez,
Richard Demo Souza,
Nurul Huda Mahmood,
Markku Juntti,
Matti Latva-Aho
Abstract:
Wireless communication systems must increasingly support a multitude of machine-type communications (MTC) devices, thus calling for advanced strategies for active user detection (AUD). Recent literature has delved into AUD techniques based on compressed sensing, highlighting the critical role of signal sparsity. This study investigates the relationship between frequency diversity and signal sparsi…
▽ More
Wireless communication systems must increasingly support a multitude of machine-type communications (MTC) devices, thus calling for advanced strategies for active user detection (AUD). Recent literature has delved into AUD techniques based on compressed sensing, highlighting the critical role of signal sparsity. This study investigates the relationship between frequency diversity and signal sparsity in the AUD problem. Single-antenna users transmit multiple copies of non-orthogonal pilots across multiple frequency channels and the base station independently performs AUD in each channel using the orthogonal matching pursuit algorithm. We note that, although frequency diversity may improve the likelihood of successful reception of the signals, it may also damage the channel sparsity level, leading to important trade-offs. We show that a sparser signal significantly benefits AUD, surpassing the advantages brought by frequency diversity in scenarios with limited temporal resources and/or high numbers of receive antennas. Conversely, with longer pilots and fewer receive antennas, investing in frequency diversity becomes more impactful, resulting in a tenfold AUD performance improvement.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Towards Near-Field 3D Spot Beamfocusing: Possibilities, Challenges, and Use-cases
Authors:
Mehdi Monemi,
Mohammad Amir Fallah,
Mehdi Rasti,
Matti Latva-Aho,
Merouane Debbah
Abstract:
Spot beamfocusing (SBF) is the process of focusing the signal power in a small spot-like region in the 3D space, which can be either hard-tuned (HT) using traditional tools like lenses and mirrors or electronically reconfigured (ER) using modern large-scale intelligent surface phased arrays. ER-SBF can be a key enabling technology (KET) for the next-generation 6G wireless networks offering benefit…
▽ More
Spot beamfocusing (SBF) is the process of focusing the signal power in a small spot-like region in the 3D space, which can be either hard-tuned (HT) using traditional tools like lenses and mirrors or electronically reconfigured (ER) using modern large-scale intelligent surface phased arrays. ER-SBF can be a key enabling technology (KET) for the next-generation 6G wireless networks offering benefits to many future wireless application areas such as wireless communication and security, mid-range wireless chargers, medical and health, physics, etc. Although near-field HT-SBF and ER-beamfocusing have been studied in the literature and applied in the industry, there is no comprehensive study of different aspects of ER-SBF and its future applications, especially for nonoptical (mmWave, sub-THz, and THz) electromagnetic waves in the next generation wireless technology, which is the aim of this paper. The theoretical concepts behind ER-SBF, different antenna technologies for implementing ER-SBF, employing machine learning (ML)-based schemes for enabling channel-state-information (CSI)-independent ER-SBF, and different practical application areas that can benefit from ER-SBF will be explored.
△ Less
Submitted 24 December, 2023;
originally announced January 2024.
-
A Bayesian Framework of Deep Reinforcement Learning for Joint O-RAN/MEC Orchestration
Authors:
Fahri Wisnu Murti,
Samad Ali,
Matti Latva-aho
Abstract:
Multi-access Edge Computing (MEC) can be implemented together with Open Radio Access Network (O-RAN) over commodity platforms to offer low-cost deployment and bring the services closer to end-users. In this paper, a joint O-RAN/MEC orchestration using a Bayesian deep reinforcement learning (RL)-based framework is proposed that jointly controls the O-RAN functional splits, the allocated resources a…
▽ More
Multi-access Edge Computing (MEC) can be implemented together with Open Radio Access Network (O-RAN) over commodity platforms to offer low-cost deployment and bring the services closer to end-users. In this paper, a joint O-RAN/MEC orchestration using a Bayesian deep reinforcement learning (RL)-based framework is proposed that jointly controls the O-RAN functional splits, the allocated resources and hosting locations of the O-RAN/MEC services across geo-distributed platforms, and the routing for each O-RAN/MEC data flow. The goal is to minimize the long-term overall network operation cost and maximize the MEC performance criterion while adapting possibly time-varying O-RAN/MEC demands and resource availability. This orchestration problem is formulated as Markov decision process (MDP). However, the system consists of multiple BSs that share the same resources and serve heterogeneous demands, where their parameters have non-trivial relations. Consequently, finding the exact model of the underlying system is impractical, and the formulated MDP renders in a large state space with multi-dimensional discrete action. To address such modeling and dimensionality issues, a novel model-free RL agent is proposed for our solution framework. The agent is built from Double Deep Q-network (DDQN) that tackles the large state space and is then incorporated with action branching, an action decomposition method that effectively addresses the multi-dimensional discrete action with linear increase complexity. Further, an efficient exploration-exploitation strategy under a Bayesian framework using Thomson sampling is proposed to improve the learning performance and expedite its convergence. Trace-driven simulations are performed using an O-RAN-compliant model. The results show that our approach is data-efficient (i.e., converges faster) and increases the returned reward by 32\% than its non-Bayesian version.
△ Less
Submitted 26 December, 2023;
originally announced December 2023.
-
Channel Scheduling for IoT Access with Spatial Correlation
Authors:
Prasoon Raghuwanshi,
Onel Luis Alcaraz López,
Petar Popovski,
Matti Latva-aho
Abstract:
Spatially correlated device activation is a typical feature of the Internet of Things (IoT). This motivates the development of channel scheduling (CS) methods that mitigate device collisions efficiently in such scenarios, which constitutes the scope of this work. Specifically, we present a quadratic program (QP) formulation for the CS problem considering the joint activation probabilities among de…
▽ More
Spatially correlated device activation is a typical feature of the Internet of Things (IoT). This motivates the development of channel scheduling (CS) methods that mitigate device collisions efficiently in such scenarios, which constitutes the scope of this work. Specifically, we present a quadratic program (QP) formulation for the CS problem considering the joint activation probabilities among devices. This formulation allows the devices to stochastically select the transmit channels, thus, leading to a soft-clustering approach. We prove that the optimal QP solution can only be attained when it is transformed into a hard-clustering problem, leading to a pure integer QP, which we transform into a pure integer linear program (PILP). We leverage the branch-and-cut (B&C) algorithm to solve PILP optimally. Due to the high computational cost of B&C, we resort to some sub-optimal clustering methods with low computational costs to tackle the clustering problem in CS. Our findings demonstrate that the CS strategy, sourced from B&C, significantly outperforms those derived from sub-optimal clustering methods, even amidst increased device correlation.
△ Less
Submitted 17 November, 2023;
originally announced December 2023.
-
High-Power and Safe RF Wireless Charging: Cautious Deployment and Operation
Authors:
Onel L. A. López,
Osmel M. Rosabal,
Amirhossein Azarbahram,
A. Basit Khattak,
Mehdi Monemi,
Richard D. Souza,
Petar Popovski,
Matti Latva-aho
Abstract:
The wired charging and the need for battery replacements are critical barriers to unlimited, scalable, and sustainable mobile connectivity, motivating the interest in radio frequency (RF) wireless power transfer (WPT) technology. However, the inherently low end-to-end power transfer efficiency (PTE) and health/safety-related apprehensions about the technology are critical obstacles. Indeed, RF-WPT…
▽ More
The wired charging and the need for battery replacements are critical barriers to unlimited, scalable, and sustainable mobile connectivity, motivating the interest in radio frequency (RF) wireless power transfer (WPT) technology. However, the inherently low end-to-end power transfer efficiency (PTE) and health/safety-related apprehensions about the technology are critical obstacles. Indeed, RF-WPT implementation and operation require efficient and cautious strategies and protocols, especially when targeting high-power charging, which constitutes the scope of this work. Herein, we overview the main factors affecting the end-to-end PTE of RF-WPT systems and their multiplicative effect and interdependencies. Moreover, we discuss key electromagnetic field (EMF) exposure metrics, safety limits, and approaches for efficient and EMF-aware deployment and operation. Quantitatively, we show that near-field RF charging may significantly reduce EMF exposure, and thus must be promoted. We also present our vision of a cyber-physical system for efficient and safe wireless charging, specify key components and their interrelation, and illustrate numerically the PTE attained by two modern low-power multi-antenna architectures in a simple setup. Throughout the paper, we highlight the need for high end-to-end PTE architectures and charging protocols transparently complying with EMF exposure regulations and outline relevant challenges and research directions. This work expands the vision and understanding of modern RF-WPT technology and constitutes a step towards making the technology attractive for worldwide commercial exploitation.
△ Less
Submitted 20 September, 2023;
originally announced November 2023.
-
Generative AI-Based Probabilistic Constellation Shaping With Diffusion Models
Authors:
Mehdi Letafati,
Samad Ali,
Matti Latva-aho
Abstract:
Diffusion models are at the vanguard of generative AI research with renowned solutions such as ImageGen by Google Brain and DALL.E 3 by OpenAI. Nevertheless, the potential merits of diffusion models for communication engineering applications are not fully understood yet. In this paper, we aim to unleash the power of generative AI for PHY design of constellation symbols in communication systems. Al…
▽ More
Diffusion models are at the vanguard of generative AI research with renowned solutions such as ImageGen by Google Brain and DALL.E 3 by OpenAI. Nevertheless, the potential merits of diffusion models for communication engineering applications are not fully understood yet. In this paper, we aim to unleash the power of generative AI for PHY design of constellation symbols in communication systems. Although the geometry of constellations is predetermined according to networking standards, e.g., quadrature amplitude modulation (QAM), probabilistic shaping can design the probability of occurrence (generation) of constellation symbols. This can help improve the information rate and decoding performance of communication systems. We exploit the ``denoise-and-generate'' characteristics of denoising diffusion probabilistic models (DDPM) for probabilistic constellation shaping. The key idea is to learn generating constellation symbols out of noise, ``mimicking'' the way the receiver performs symbol reconstruction. This way, we make the constellation symbols sent by the transmitter, and what is inferred (reconstructed) at the receiver become as similar as possible, resulting in as few mismatches as possible. Our results show that the generative AI-based scheme outperforms deep neural network (DNN)-based benchmark and uniform shaping, while providing network resilience as well as robust out-of-distribution performance under low-SNR regimes and non-Gaussian assumptions. Numerical evaluations highlight 30% improvement in terms of cosine similarity and a threefold improvement in terms of mutual information compared to DNN-based approach for 64-QAM geometry.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Conditional Denoising Diffusion Probabilistic Models for Data Reconstruction Enhancement in Wireless Communications
Authors:
Mehdi Letafati,
Samad Ali,
Matti Latva-aho
Abstract:
In this paper, conditional denoising diffusion probabilistic models (DDPMs) are proposed to enhance the data transmission and reconstruction over wireless channels. The underlying mechanism of DDPM is to decompose the data generation process over the so-called "denoising" steps. Inspired by this, the key idea is to leverage the generative prior of diffusion models in learning a "noisy-to-clean" tr…
▽ More
In this paper, conditional denoising diffusion probabilistic models (DDPMs) are proposed to enhance the data transmission and reconstruction over wireless channels. The underlying mechanism of DDPM is to decompose the data generation process over the so-called "denoising" steps. Inspired by this, the key idea is to leverage the generative prior of diffusion models in learning a "noisy-to-clean" transformation of the information signal to help enhance data reconstruction. The proposed scheme could be beneficial for communication scenarios in which a prior knowledge of the information content is available, e.g., in multimedia transmission. Hence, instead of employing complicated channel codes that reduce the information rate, one can exploit diffusion priors for reliable data reconstruction, especially under extreme channel conditions due to low signal-to-noise ratio (SNR), or hardware-impaired communications. The proposed DDPM-assisted receiver is tailored for the scenario of wireless image transmission using MNIST dataset. Our numerical results highlight the reconstruction performance of our scheme compared to the conventional digital communication, as well as the deep neural network (DNN)-based benchmark. It is also shown that more than 10 dB improvement in the reconstruction could be achieved in low SNR regimes, without the need to reduce the information rate for error correction.
△ Less
Submitted 3 June, 2024; v1 submitted 30 October, 2023;
originally announced October 2023.
-
Diffusion Models for Wireless Communications
Authors:
Mehdi Letafati,
Samad Ali,
Matti Latva-aho
Abstract:
Innovative foundation models, such as GPT-4 and stable diffusion models, have made a paradigm shift in the realm of artificial intelligence (AI) towards generative AI-based systems. AI and machine learning (AI/ML) algorithms are envisioned to be pervasively incorporated into the future wireless communications systems. In this article, we outline the applications of diffusion models in wireless com…
▽ More
Innovative foundation models, such as GPT-4 and stable diffusion models, have made a paradigm shift in the realm of artificial intelligence (AI) towards generative AI-based systems. AI and machine learning (AI/ML) algorithms are envisioned to be pervasively incorporated into the future wireless communications systems. In this article, we outline the applications of diffusion models in wireless communication systems, which are a new family of probabilistic generative models that have showcased state-of-the-art performance. The key idea is to decompose data generation process over "denoising" steps, gradually generating samples out of noise. Based on two case studies presented, we show how diffusion models can be employed for the development of resilient AI-native communication systems. Specifically, we propose denoising diffusion probabilistic models (DDPM) for a wireless communication scheme with non-ideal transceivers, where 30% improvement is achieved in terms of bit error rate. In the other example, DDPM is employed at the transmitter to shape the constellation symbols, highlighting a robust out-of-distribution performance.
△ Less
Submitted 1 December, 2023; v1 submitted 11 October, 2023;
originally announced October 2023.
-
Latency-Aware Radio Resource Optimization in Learning-Based Cloud-Aided Small Cell Wireless Networks
Authors:
Tamoor-ul-Hassan Syed,
Samarakoon Sumudu,
Bennis Mehdi,
Matti Latva-aho
Abstract:
Low latency communication is one of the fundamental requirements for 5G wireless networks and beyond. In this paper, a novel approach for joint caching, user scheduling and resource allocation is proposed for minimizing the queuing latency in serving user's requests in cloud-aided wireless networks. Due to the slow temporal variations in user requests, a time-scale separation technique is used to…
▽ More
Low latency communication is one of the fundamental requirements for 5G wireless networks and beyond. In this paper, a novel approach for joint caching, user scheduling and resource allocation is proposed for minimizing the queuing latency in serving user's requests in cloud-aided wireless networks. Due to the slow temporal variations in user requests, a time-scale separation technique is used to decouple the joint caching problem from user scheduling and radio resource allocation problems. To serve the spatio-temporal user requests under storage limitations, a Reinforcement Learning (RL) approach is used to optimize the caching strategy at the small cell base stations by minimizing the content fetching cost. A spectral clustering algorithm is proposed to speed-up the convergence of the RL algorithm for a large content caching problem by clustering contents based on user requests. Meanwhile, a dynamic mechanism is proposed to locally group coupled base stations based on user requests to collaboratively optimize the caching strategies. To further improve the latency in fetching and serving user requests, a dynamic matching algorithm is proposed to schedule users and to allocate users to radio resources based on user requests and queue lengths under probabilistic latency constraints. Simulation results show the proposed approach significantly reduces the average delay from 21% to 90% compared to random caching strategy, random resource allocation and random scheduling baselines.
△ Less
Submitted 21 September, 2023;
originally announced September 2023.
-
Probabilistic Constellation Shaping With Denoising Diffusion Probabilistic Models: A Novel Approach
Authors:
Mehdi Letafati,
Samad Ali,
Matti Latva-aho
Abstract:
With the incredible results achieved from generative pre-trained transformers (GPT) and diffusion models, generative AI (GenAI) is envisioned to yield remarkable breakthroughs in various industrial and academic domains. In this paper, we utilize denoising diffusion probabilistic models (DDPM), as one of the state-of-the-art generative models, for probabilistic constellation shaping in wireless com…
▽ More
With the incredible results achieved from generative pre-trained transformers (GPT) and diffusion models, generative AI (GenAI) is envisioned to yield remarkable breakthroughs in various industrial and academic domains. In this paper, we utilize denoising diffusion probabilistic models (DDPM), as one of the state-of-the-art generative models, for probabilistic constellation shaping in wireless communications. While the geometry of constellations is predetermined by the networking standards, probabilistic constellation shaping can help enhance the information rate and communication performance by designing the probability of occurrence (generation) of constellation symbols. Unlike conventional methods that deal with an optimization problem over the discrete distribution of constellations, we take a radically different approach. Exploiting the ``denoise-and-generate'' characteristic of DDPMs, the key idea is to learn how to generate constellation symbols out of noise, ``mimicking'' the way the receiver performs symbol reconstruction. By doing so, we make the constellation symbols sent by the transmitter, and what is inferred (reconstructed) at the receiver become as similar as possible. Our simulations show that the proposed scheme outperforms deep neural network (DNN)-based benchmark and uniform shaping, while providing network resilience as well as robust out-of-distribution performance under low-SNR regimes and non-Gaussian noise. Notably, a threefold improvement in terms of mutual information is achieved compared to DNN-based approach for 64-QAM geometry.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
Denoising Diffusion Probabilistic Models for Hardware-Impaired Communications
Authors:
Mehdi Letafati,
Samad Ali,
Matti Latva-aho
Abstract:
Generative AI has received significant attention among a spectrum of diverse industrial and academic domains, thanks to the magnificent results achieved from deep generative models such as generative pre-trained transformers (GPT) and diffusion models. In this paper, we explore the applications of denoising diffusion probabilistic models (DDPMs) in wireless communication systems under practical as…
▽ More
Generative AI has received significant attention among a spectrum of diverse industrial and academic domains, thanks to the magnificent results achieved from deep generative models such as generative pre-trained transformers (GPT) and diffusion models. In this paper, we explore the applications of denoising diffusion probabilistic models (DDPMs) in wireless communication systems under practical assumptions such as hardware impairments (HWI), low-SNR regime, and quantization error. Diffusion models are a new class of state-of-the-art generative models that have already showcased notable success with some of the popular examples by OpenAI1 and Google Brain2. The intuition behind DDPM is to decompose the data generation process over small ``denoising'' steps. Inspired by this, we propose using denoising diffusion model-based receiver for a practical wireless communication scheme, while providing network resilience in low-SNR regimes, non-Gaussian noise, different HWI levels, and quantization error. We evaluate the reconstruction performance of our scheme in terms of mean-squared error (MSE) metric. Our results show that more than 25 dB improvement in MSE is achieved compared to deep neural network (DNN)-based receivers. We also highlight robust out-of-distribution performance under non-Gaussian noise.
△ Less
Submitted 5 October, 2023; v1 submitted 15 September, 2023;
originally announced September 2023.
-
Sustainable RF Wireless Energy Transfer for Massive IoT: enablers and challenges
Authors:
Osmel Martínez Rosabal,
Onel L. Alcaraz López,
Hirley Alves,
Matti Latva-aho
Abstract:
Reliable energy supply remains a crucial challenge in the Internet of Things (IoT). Although relying on batteries is cost-effective for a few devices, it is neither a scalable nor a sustainable charging solution as the network grows massive. Besides, current energy-saving technologies alone cannot cope, for instance, with the vision of zero-energy devices and the deploy-and-forget paradigm which c…
▽ More
Reliable energy supply remains a crucial challenge in the Internet of Things (IoT). Although relying on batteries is cost-effective for a few devices, it is neither a scalable nor a sustainable charging solution as the network grows massive. Besides, current energy-saving technologies alone cannot cope, for instance, with the vision of zero-energy devices and the deploy-and-forget paradigm which can unlock a myriad of new use cases. In this context, sustainable radio frequency wireless energy transfer emerges as an attractive solution for efficiently charging the next generation of ultra low power IoT devices. Herein, we highlight that sustainable charging is broader than conventional green charging, as it focuses on balancing economy prosperity and social equity in addition to environmental health. We discuss the economic implications of powering energy transmitters with ambient energy sources, and reveal insights on their optimal deployment. Moreover, we overview different methods for modeling the energy arrival process of ambient energy sources and discuss their application in different use cases. We highlight the potential of integrating sustainable WET with energy harvesting from nearby transmitters and discuss enhancements in energy receiver design. We also illustrate the role of different technologies in enabling sustainable WET and exemplify various use cases. Besides, we reveal insights into low-complexity architectures designed at the energy transmitters. We highlight relevant research challenges and candidate solutions.
△ Less
Submitted 9 November, 2023; v1 submitted 26 June, 2023;
originally announced June 2023.
-
Unrolled Architectures for High-Throughput Encoding of Multi-Kernel Polar Codes
Authors:
Hossein Rezaei,
Elham Abbasi,
Nandana Rajatheva,
Matti Latva-aho
Abstract:
Over the past decade, polar codes have received significant traction and have been selected as the coding method for the control channel in fifth-generation (5G) wireless communication systems. However, conventional polar codes are reliant solely on binary (2x2) kernels, which restricts their block length to being only powers of 2. In response, multi-kernel (MK) polar codes have been proposed as a…
▽ More
Over the past decade, polar codes have received significant traction and have been selected as the coding method for the control channel in fifth-generation (5G) wireless communication systems. However, conventional polar codes are reliant solely on binary (2x2) kernels, which restricts their block length to being only powers of 2. In response, multi-kernel (MK) polar codes have been proposed as a viable solution to attain greater code length flexibility. This paper proposes an unrolled architecture for encoding both systematic and non-systematic MK polar codes, capable of high-throughput encoding of codes constructed with binary, ternary (3x3), or binary-ternary mixed kernels. The proposed scheme exhibits an unprecedented level of flexibility by supporting 83 different codes and offering various architectures that provide trade-offs between throughput and resource consumption. The FPGA implementation results demonstrate that a partially-pipelined polar encoder of size N=4096 operating at a frequency of 270 MHz gives a throughput of 1080 Gbps. Additionally, a new compiler implemented in Python is given to automatically generate HDL modules for the desired encoders. By inserting the desired parameters, a designer can simply obtain all the necessary VHDL files for FPGA implementation.
△ Less
Submitted 7 May, 2023;
originally announced May 2023.
-
High-Throughput Rate-Flexible Combinational Decoders for Multi-Kernel Polar Codes
Authors:
Hossein Rezaei,
Nandana Rajatheva,
Matti Latva-aho
Abstract:
Polar codes have received growing attention in the past decade and have been selected as the coding scheme for the control channel in the fifth generation (5G) wireless communication systems. However, the conventional polar codes have only been constructed by binary (2x2) kernel which poses block length limitation to powers of 2. To attain more flexible block lengths, multi-kernel polar codes are…
▽ More
Polar codes have received growing attention in the past decade and have been selected as the coding scheme for the control channel in the fifth generation (5G) wireless communication systems. However, the conventional polar codes have only been constructed by binary (2x2) kernel which poses block length limitation to powers of 2. To attain more flexible block lengths, multi-kernel polar codes are proposed. In this paper, a combinational architecture for multi-kernel polar codes with high throughput is proposed based on successive cancellation decoding algorithm. The proposed scheme can decode pure-binary, pure-ternary (3x3), and binary-ternary mixed polar codes. The decoder's architecture is rate-flexible meaning that a new code rate can be assigned to the decoder at every clock cycle. The proposed architecture is validated by FPGA implementation and the results reveal that a code of size N=81 gains the coded throughput of 1664.5 Mbps. A novel Python-based polar compiler is also proposed to automatically generate the HDL modules for target decoders. A designer can input the target block length and kernel ordering of a polar code, and get the required VHDL files automatically. Based on our simulations, the majority of the required HDL files can be generated in less than 0.4 seconds.
△ Less
Submitted 25 January, 2023;
originally announced January 2023.
-
Reconfigurable Intelligent Surfaces: The New Frontier of Next G Security
Authors:
Jacek Kibilda,
Nurul H. Mahmood,
André Gomes,
Matti Latva-aho,
Luiz A. DaSilva
Abstract:
RIS is one of the significant technological advancements that will mark next-generation wireless. RIS technology also opens up the possibility of new security threats, since the reflection of impinging signals can be used for malicious purposes. This article introduces the basic concept for a RIS-assisted attack that re-uses the legitimate signal towards a malicious objective. Specific attacks are…
▽ More
RIS is one of the significant technological advancements that will mark next-generation wireless. RIS technology also opens up the possibility of new security threats, since the reflection of impinging signals can be used for malicious purposes. This article introduces the basic concept for a RIS-assisted attack that re-uses the legitimate signal towards a malicious objective. Specific attacks are identified from this base scenario, and the RIS-assisted signal cancellation attack is selected for evaluation as an attack that inherently exploits RIS capabilities. The key takeaway from the evaluation is that an effective attack requires accurate channel information, a RIS deployed in a favorable location (from the point of view of the attacker), and it disproportionately affects legitimate links that already suffer from reduced path loss. These observations motivate specific security solutions and recommendations for future work.
△ Less
Submitted 9 December, 2022;
originally announced December 2022.
-
Statistical Tools and Methodologies for Ultrareliable Low-Latency Communications -- A Tutorial
Authors:
Onel López,
Nurul Mahmood,
Mohammad Shehab,
Hirley Alves,
Osmel Rosabal,
Leatile Marata,
Matti Latva-aho
Abstract:
Ultra-reliable low-latency communication (URLLC) constitutes a key service class of the fifth generation and beyond cellular networks. Notably, designing and supporting URLLC poses a herculean task due to the fundamental need to identify and accurately characterize the underlying statistical models in which the system operates, e.g., interference statistics, channel conditions, and the behavior of…
▽ More
Ultra-reliable low-latency communication (URLLC) constitutes a key service class of the fifth generation and beyond cellular networks. Notably, designing and supporting URLLC poses a herculean task due to the fundamental need to identify and accurately characterize the underlying statistical models in which the system operates, e.g., interference statistics, channel conditions, and the behavior of protocols. In general, multi-layer end-to-end approaches considering all the potential delay and error sources and proper statistical tools and methodologies are inevitably required for providing strong reliability and latency guarantees. This paper contributes to the body of knowledge in the latter aspect by providing a tutorial on several statistical tools and methodologies that are useful for designing and analyzing URLLC systems. Specifically, we overview the frameworks related to i) reliability theory, ii) short packet communications, iii) inequalities, distribution bounds, and tail approximations, iv) rare events simulation, vi) queuing theory and information freshness, and v) large-scale tools such as stochastic geometry, clustering, compressed sensing, and mean-field games. Moreover, we often refer to prominent data-driven algorithms within the scope of the discussed tools/methodologies. Throughout the paper, we briefly review the state-of-the-art works using the addressed tools and methodologies, and their link to URLLC systems. Moreover, we discuss novel application examples focused on physical and medium access control layers. Finally, key research challenges and directions are highlighted to elucidate how URLLC analysis/design research may evolve in the coming years.
△ Less
Submitted 21 November, 2023; v1 submitted 27 October, 2022;
originally announced December 2022.
-
Graph Representation Learning for Wireless Communications
Authors:
Maryam Mohsenivatani,
Samad Ali,
Vismika Ranasinghe,
Nandana Rajatheva,
Matti Latva-Aho
Abstract:
Wireless networks are inherently graph-structured, which can be utilized in graph representation learning to solve complex wireless network optimization problems. In graph representation learning, feature vectors for each entity in the network are calculated such that they capture spatial and temporal dependencies in their local and global neighbourhoods. Graph neural networks (GNNs) are powerful…
▽ More
Wireless networks are inherently graph-structured, which can be utilized in graph representation learning to solve complex wireless network optimization problems. In graph representation learning, feature vectors for each entity in the network are calculated such that they capture spatial and temporal dependencies in their local and global neighbourhoods. Graph neural networks (GNNs) are powerful tools to solve these complex problems because of their expressive representation and reasoning power. In this paper, the potential of graph representation learning and GNNs in wireless networks is presented. An overview of graph learning is provided which covers the fundamentals and concepts such as feature design over graphs, GNNs, and their design principles. Potential of graph representation learning in wireless networks is presented via few exemplary use cases and some initial results on the GNN-based access point selection for cell-free massive MIMO systems.
△ Less
Submitted 4 December, 2022;
originally announced December 2022.
-
A Combinational Multi-Kernel Decoder for Polar Codes
Authors:
Hossein Rezaei,
Nandana Rajatheva,
Matti Latva-aho
Abstract:
Polar codes have been selected as the channel coding scheme for control channel in the fifth generation (5G) communication system thanks to their capacity achieving characteristics. However, the traditional polar codes support only codes constructed by binary (2x2) kernel which limits the code lengths to powers of 2. Multi-kernel polar codes are proposed to achieve flexible block length. In this p…
▽ More
Polar codes have been selected as the channel coding scheme for control channel in the fifth generation (5G) communication system thanks to their capacity achieving characteristics. However, the traditional polar codes support only codes constructed by binary (2x2) kernel which limits the code lengths to powers of 2. Multi-kernel polar codes are proposed to achieve flexible block length. In this paper, the first combinational decoder for multi-kernel polar codes based on successive cancellation algorithm is proposed. The proposed decoder can decode pure-binary and binary-ternary (3x3) mixed polar codes. The architecture is rate-flexible with the capability of online rate assignment and supports any kernel sequences. The FPGA implementation results reveal that for a code of length N = 48, the coded throughput of 812.1 Mbps can be achieved.
△ Less
Submitted 13 May, 2023; v1 submitted 16 November, 2022;
originally announced November 2022.
-
A Learning-Based Trajectory Planning of Multiple UAVs for AoI Minimization in IoT Networks
Authors:
Eslam Eldeeb,
Dian Echevarría Pérez,
Jean Michel de Souza Sant'Ana,
Mohammad Shehab,
Nurul Huda Mahmood,
Hirley Alves,
Matti Latva-aho
Abstract:
Many emerging Internet of Things (IoT) applications rely on information collected by sensor nodes where the freshness of information is an important criterion. \textit{Age of Information} (AoI) is a metric that quantifies information timeliness, i.e., the freshness of the received information or status update. This work considers a setup of deployed sensors in an IoT network, where multiple unmann…
▽ More
Many emerging Internet of Things (IoT) applications rely on information collected by sensor nodes where the freshness of information is an important criterion. \textit{Age of Information} (AoI) is a metric that quantifies information timeliness, i.e., the freshness of the received information or status update. This work considers a setup of deployed sensors in an IoT network, where multiple unmanned aerial vehicles (UAVs) serve as mobile relay nodes between the sensors and the base station. We formulate an optimization problem to jointly plan the UAVs' trajectory, while minimizing the AoI of the received messages. This ensures that the received information at the base station is as fresh as possible. The complex optimization problem is efficiently solved using a deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network, which works as a function approximation to estimate the state-action value function. The proposed scheme is quick to converge and results in a lower AoI than the random walk scheme. Our proposed algorithm reduces the average age by approximately $25\%$ and requires down to $50\%$ less energy when compared to the baseline scheme.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Deep Reinforcement Learning for Orchestrating Cost-Aware Reconfigurations of vRANs
Authors:
Fahri Wisnu Murti,
Samad Ali,
George Iosifidis,
Matti Latva-aho
Abstract:
Virtualized Radio Access Networks (vRANs) are fully configurable and can be implemented at a low cost over commodity platforms to enable network management flexibility. In this paper, a novel vRAN reconfiguration problem is formulated to jointly reconfigure the functional splits of the base stations (BSs), locations of the virtualized central units (vCUs) and distributed units (vDUs), their resour…
▽ More
Virtualized Radio Access Networks (vRANs) are fully configurable and can be implemented at a low cost over commodity platforms to enable network management flexibility. In this paper, a novel vRAN reconfiguration problem is formulated to jointly reconfigure the functional splits of the base stations (BSs), locations of the virtualized central units (vCUs) and distributed units (vDUs), their resources, and the routing for each BS data flow. The objective is to minimize the long-term total network operation cost while adapting to the varying traffic demands and resource availability. Testbed measurements are performed to study the relationship between the traffic demands and computing resources, which reveals high variance and depends on the platform and its load. Consequently, finding the perfect model of the underlying system is non-trivial. Therefore, to solve the proposed problem, a deep reinforcement learning (RL)-based framework is proposed and developed using model-free RL approaches. Moreover, the problem consists of multiple BSs sharing the same resources, which results in a multi-dimensional discrete action space and leads to a combinatorial number of possible actions. To overcome this curse of dimensionality, action branching architecture, which is an action decomposition method with a shared decision module followed by neural network is combined with Dueling Double Deep Q-network (D3QN) algorithm. Simulations are carried out using an O-RAN compliant model and real traces of the testbed. Our numerical results show that the proposed framework successfully learns the optimal policy that adaptively selects the vRAN configurations, where its learning convergence can be further expedited through transfer learning even in different vRAN systems. It offers significant cost savings by up to 59\% of a static benchmark, 35\% of DDPG with discretization, and 76\% of non-branching D3QN.
△ Less
Submitted 3 July, 2023; v1 submitted 10 August, 2022;
originally announced August 2022.
-
A Functional Architecture for 6G Special Purpose Industrial IoT Networks
Authors:
{Nurul Huda Mahmood,
Gilberto Berardinelli,
Emil J. Khatib,
Ramin Hashemi,
Carlos de Lima,
Matti Latva-aho
Abstract:
Future industrial applications will encompass compelling new use cases requiring stringent performance guarantees over multiple key performance indicators (KPI) such as reliability, dependability, latency, time synchronization, security, etc. Achieving such stringent and diverse service requirements necessitates the design of a special-purpose Industrial Internet of Things (IIoT) network comprisin…
▽ More
Future industrial applications will encompass compelling new use cases requiring stringent performance guarantees over multiple key performance indicators (KPI) such as reliability, dependability, latency, time synchronization, security, etc. Achieving such stringent and diverse service requirements necessitates the design of a special-purpose Industrial Internet of Things (IIoT) network comprising a multitude of specialized functionalities and technological enablers. This article proposes an innovative architecture for such a special-purpose 6G IIoT network incorporating seven functional building blocks categorized into: special-purpose functionalities and enabling technologies. The former consists of Wireless Environment Control, Traffic/Channel Prediction, Proactive Resource Management and End-to-End Optimization functions; whereas the latter includes Synchronization and Coordination, Machine Learning and Artificial Intelligence Algorithms, and Auxiliary Functions. The proposed architecture aims at providing a resource-efficient and holistic solution for the complex and dynamically challenging requirements imposed by future 6G industrial use cases. Selected test scenarios are provided and assessed to illustrate cross-functional collaboration and demonstrate the applicability of the proposed architecture in a wireless IIoT network.
△ Less
Submitted 1 July, 2022;
originally announced July 2022.
-
Learning-Based Orchestration for Dynamic Functional Split and Resource Allocation in vRANs
Authors:
Fahri Wisnu Murti,
Samad Ali,
George Iosifidis,
Matti Latva-aho
Abstract:
One of the key benefits of virtualized radio access networks (vRANs) is network management flexibility. However, this versatility raises previously-unseen network management challenges. In this paper, a learning-based zero-touch vRAN orchestration framework (LOFV) is proposed to jointly select the functional splits and allocate the virtualized resources to minimize the long-term management cost. F…
▽ More
One of the key benefits of virtualized radio access networks (vRANs) is network management flexibility. However, this versatility raises previously-unseen network management challenges. In this paper, a learning-based zero-touch vRAN orchestration framework (LOFV) is proposed to jointly select the functional splits and allocate the virtualized resources to minimize the long-term management cost. First, testbed measurements of the behaviour between the users' demand and the virtualized resource utilization are collected using a centralized RAN system. The collected data reveals that there are non-linear and non-monotonic relationships between demand and resource utilization. Then, a comprehensive cost model is proposed that takes resource overprovisioning, declined demand, instantiation and reconfiguration into account. Moreover, the proposed cost model also captures different routing and computing costs for each split. Motivated by our measurement insights and cost model, LOFV is developed using a model-free reinforcement learning paradigm. The proposed solution is constructed from a combination of deep Q-learning and a regression-based neural network that maps the network state and users' demand into split and resource control decisions. Our numerical evaluations show that LOFV can offer cost savings by up to 69\% of the optimal static policy and 45\% of the optimal fully dynamic policy.
△ Less
Submitted 16 May, 2022;
originally announced May 2022.
-
Coordinated Pilot Transmissions for Detecting the Signal Sparsity Level in a Massive IoT Network under Rayleigh Fading
Authors:
Onel L. A. López,
Glauber Brante,
Richard D. Souza,
Markku Juntti,
Matti Latva-aho
Abstract:
Grant-free protocols exploiting compressed sensing (CS) multi-user detection (MUD) are appealing for solving the random access problem in massive machine-type communications (mMTC) with sporadic device activity. Such protocols would greatly benefit from a prior deterministic knowledge of the sparsity level, i.e., instantaneous number of simultaneously active devices $K$. Aiming at this, herein we…
▽ More
Grant-free protocols exploiting compressed sensing (CS) multi-user detection (MUD) are appealing for solving the random access problem in massive machine-type communications (mMTC) with sporadic device activity. Such protocols would greatly benefit from a prior deterministic knowledge of the sparsity level, i.e., instantaneous number of simultaneously active devices $K$. Aiming at this, herein we introduce a framework relying on coordinated pilot transmissions (CPT) over a short phase at the beginning of the transmission block for detecting $K$ in mMTC scenarios under Rayleigh fading. CPT can be implemented either as: i) U-CPT, which exploits only uplink transmissions, or A-CPT, which includes also downlink transmissions for channel state information (CSI) acquisition that resolve fading uncertainty. We discuss two specific implementations of A-CPT: ii) A-CPT-F, which implements CSI-based phase corrections while leveraging the same statistical inverse power control used by U-CPT, and iii) A-CPT-D, which implements a dynamic CSI-based inverse power control, although it requires some active devices to remain in silence if their corresponding channels are too faded. We derive a signal sparsity level detector for each CPT mechanism by relaxing the original integer detection/classification problem to an estimation problem in the continuous real domain followed by a rounding operation. We show that the variance of the relaxed estimator increases with $K^2$ and $K$ when operating with U-CPT and A-CPT mechanisms, respectively. The distribution of the estimators under U-CPT, A-CPT-F and A-CPT-D is found to follow an exponential, Gaussian, and Student's $t-$like distribution, respectively. Analyses evince the superiority of A-CPT-D, which is also corroborated via numerical results. We reveal several interesting trade-offs and highlight potential research directions.
△ Less
Submitted 1 May, 2022;
originally announced May 2022.
-
Joint Sum Rate and Blocklength Optimization in RIS-aided Short Packet URLLC Systems
Authors:
Ramin Hashemi,
Samad Ali,
Nurul Huda Mahmood,
Matti Latva-aho
Abstract:
In this paper, a multi-objective optimization problem (MOOP) is proposed for maximizing the achievable finite blocklength (FBL) rate while minimizing the utilized channel blocklengths (CBLs) in a reconfigurable intelligent surface (RIS)-assisted short packet communication system. The formulated MOOP has two objective functions namely maximizing the total FBL rate with a target error probability, a…
▽ More
In this paper, a multi-objective optimization problem (MOOP) is proposed for maximizing the achievable finite blocklength (FBL) rate while minimizing the utilized channel blocklengths (CBLs) in a reconfigurable intelligent surface (RIS)-assisted short packet communication system. The formulated MOOP has two objective functions namely maximizing the total FBL rate with a target error probability, and minimizing the total utilized CBLs which is directly proportional to the transmission duration. The considered MOOP variables are the base station (BS) transmit power, number of CBLs, and passive beamforming at the RIS. Since the proposed non-convex problem is intractable to solve, the Tchebyshev method is invoked to transform it into a single-objective OP, then the alternating optimization (AO) technique is employed to iteratively obtain optimized parameters in three main sub-problems. The numerical results show a fundamental trade-off between maximizing the achievable rate in the FBL regime and reducing the transmission duration. Also, the applicability of RIS technology is emphasized in reducing the utilized CBLs while increasing the achievable rate significantly.
△ Less
Submitted 2 June, 2022; v1 submitted 28 April, 2022;
originally announced April 2022.
-
Permutation Matrix Modulation
Authors:
Rahmat Faddli Siregar,
Nandana Rajatheva,
Matti Latva-Aho
Abstract:
We propose a novel scheme that allows MIMO system to modulate a set of permutation matrices to send more information bits, extending our initial work on the topic. This system is called Permutation Matrix Modulation (PMM). The basic idea is to employ a permutation matrix as a precoder and treat it as a modulated symbol. We continue the evolution of index modulation in MIMO by adopting all-antenna…
▽ More
We propose a novel scheme that allows MIMO system to modulate a set of permutation matrices to send more information bits, extending our initial work on the topic. This system is called Permutation Matrix Modulation (PMM). The basic idea is to employ a permutation matrix as a precoder and treat it as a modulated symbol. We continue the evolution of index modulation in MIMO by adopting all-antenna activation and obtaining a set of unique symbols from altering the positions of the antenna transmit power. We provide the analysis of the achievable rate of PMM under Gaussian Mixture Model (GMM) distribution \revv{and finite cardinality input (FCI). Numerical results are evaluated by comparing PMM with the other existing systems.} We also present a way to attain the optimal achievable rate of PMM by solving a maximization problem via interior-point method. A low complexity detection scheme based on zero-forcing (ZF) is proposed, and maximum likelihood (ML) detection is discussed. We demonstrate the trade-off between simulation of the symbol error rate (SER) and the computational complexity where ZF performs worse in the SER simulation but requires much less computational complexity than ML.
△ Less
Submitted 26 December, 2022; v1 submitted 27 December, 2021;
originally announced December 2021.
-
Self-energy recycling for low-power reliable networks: Half-duplex or Full-duplex?
Authors:
Dian Echevarría Pérez,
Onel L. Alcaraz López,
Hirley Alves,
Matti Latva-aho
Abstract:
Self-energy recycling (sER), which allows transmit energy re-utilization, has emerged as a viable option for improving the energy efficiency (EE) in low-power Internet of Things networks. In this work, we investigate its benefits also in terms of reliability improvements and compare the performance of full-duplex (FD) and half-duplex (HD) schemes when using multi-antenna techniques in a communicat…
▽ More
Self-energy recycling (sER), which allows transmit energy re-utilization, has emerged as a viable option for improving the energy efficiency (EE) in low-power Internet of Things networks. In this work, we investigate its benefits also in terms of reliability improvements and compare the performance of full-duplex (FD) and half-duplex (HD) schemes when using multi-antenna techniques in a communication system. We analyze the trade-offs when considering not only the energy spent on transmission but also the circuitry power consumption, thus making the analysis of much more practical interest. In addition to the well known spectral efficiency improvements, results show that FD also outperforms HD in terms of reliability. We show that sER introduces not only benefits in EE matters but also some modifications on how to achieve maximum reliability fairness between uplink and downlink transmissions, which is the main goal in this work. In order to achieve this objective, we propose the use of a dynamic FD scheme where the small base station (SBS) determines the optimal allocation of antennas for transmission and reception. We show the significant improvement gains of this strategy for the system outage probability when compared to the simple HD and FD schemes.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Deep Reinforcement Learning for Practical Phase Shift Optimization in RIS-aided MISO URLLC Systems
Authors:
Ramin Hashemi,
Samad Ali,
Nurul Huda Mahmood,
Matti Latva-aho
Abstract:
We study the joint active/passive beamforming and channel blocklength (CBL) allocation in a non-ideal reconfigurable intelligent surface (RIS)-aided ultra-reliable and low-latency communication (URLLC) system. The considered scenario is a finite blocklength (FBL) regime and the problem is solved by leveraging a novel deep reinforcement learning (DRL) algorithm named twin-delayed deep deterministic…
▽ More
We study the joint active/passive beamforming and channel blocklength (CBL) allocation in a non-ideal reconfigurable intelligent surface (RIS)-aided ultra-reliable and low-latency communication (URLLC) system. The considered scenario is a finite blocklength (FBL) regime and the problem is solved by leveraging a novel deep reinforcement learning (DRL) algorithm named twin-delayed deep deterministic policy gradient (TD3). First, assuming an industrial automation system with multiple actuators, the signal-to-interference-plus-noise ratio and achievable rate in the FBL regime are identified for each actuator in terms of the phase shift configuration matrix at the RIS. Next, the joint active/passive beamforming and CBL optimization problem is formulated where the objective is to maximize the total achievable FBL rate in all actuators, subject to non-linear amplitude response at the RIS elements, BS transmit power budget, and total available CBL. Since the amplitude response equality constraint is highly non-convex and non-linear, we resort to employing an actor-critic policy gradient DRL algorithm based on TD3. The considered method relies on interacting RIS with the industrial automation environment by taking actions which are the phase shifts at the RIS elements, CBL variables, and BS beamforming to maximize the expected observed reward, i.e., the total FBL rate. We assess the performance loss of the system when the RIS is non-ideal, i.e., with non-linear amplitude response, and compare it with ideal RIS without impairments. The numerical results show that optimizing the RIS phase shifts, BS beamforming, and CBL variables via the proposed TD3 method is highly beneficial to improving the network total FBL rate as the proposed method with deterministic policy outperforms conventional methods.
△ Less
Submitted 19 April, 2022; v1 submitted 16 October, 2021;
originally announced October 2021.
-
Distributed UAV-enabled zero-forcing cooperative jamming scheme for safeguarding future wireless networks
Authors:
X. A. Flores Cabezas,
D. P. Moya Osorio,
M. Latva-aho
Abstract:
In this work, we investigate the impact of two cooperative unmanned aerial vehicle (UAV)-based jammers on the secrecy performance of a ground wireless network in the presence of an eavesdropper. For that purpose, we investigate the secrecy-area related metrics, Jamming Coverage and Jamming Efficiency. Moreover, we propose a hybrid metric, the so-called Weighted Secrecy Coverage (WSC) and a virtual…
▽ More
In this work, we investigate the impact of two cooperative unmanned aerial vehicle (UAV)-based jammers on the secrecy performance of a ground wireless network in the presence of an eavesdropper. For that purpose, we investigate the secrecy-area related metrics, Jamming Coverage and Jamming Efficiency. Moreover, we propose a hybrid metric, the so-called Weighted Secrecy Coverage (WSC) and a virtual distributed multiple-input-multiple-output (MIMO)-based zero-forcing precoding scheme to avoid the jamming effects on the legitimate receiver. For evaluating these metrics, we derive a closed-form position-based metric, the secrecy improvement. Our mathematical derivations and comparative simulations show that the proposed zero-forcing scheme leads to an improvement on the secrecy performance in terms of the WSC, and provides conditions for improvement of Jamming Efficiency. They also show positioning trends on the UAVs over a fixed orbit around the legitimate transmitter as well as power allocation trends for optimal secrecy.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Weighted Secrecy Coverage Analysis and the Impact of Friendly Jamming over UAV-Enabled Networks
Authors:
X. A. Flores Cabezas,
D. P. Moya Osorio,
M. Latva-aho
Abstract:
In 5G and beyond networks, Unmanned Aerial Vehicles (UAV) are an attractive solution to enhance the secrecy of a wireless systems by exploiting their predominant LOS links and spacial manoeuvrability to introduce a friendly jamming. In this work, we investigate the impact of two cooperative UAV-based jammers on the secrecy performance of a ground wireless wiretap channel by considering secrecy-are…
▽ More
In 5G and beyond networks, Unmanned Aerial Vehicles (UAV) are an attractive solution to enhance the secrecy of a wireless systems by exploiting their predominant LOS links and spacial manoeuvrability to introduce a friendly jamming. In this work, we investigate the impact of two cooperative UAV-based jammers on the secrecy performance of a ground wireless wiretap channel by considering secrecy-area related metrics, the jamming coverage and jamming efficiency. Moreover, we propose a hybrid metric, the so-called Weighted Secrecy Coverage (WSC) that can be used as a metric for gaining insights on the optimal deployments of the UAV jammers to provide the best exploration of jamming signals. For evaluating these metrics, we derive a closed-form position-based metric, the secrecy improvement, and propose an analogous computationally simpler metric. Our simulations show that a balanced power allocation between the two UAVs leads to the best performances, as well as a symmetrical positioning behind the line of sight between the legitimate transmitter and receiver. Moreover, there exist an optimal UAV height for the jammers. Finally, we propose a sub-optimal and simpler problem for the maximisation of the WSC.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Dynamic RF Combining for Multi-Antenna Ambient Energy Harvesting
Authors:
Onel Luis Alcaraz López,
Bruno Clerckx,
Matti Latva-aho
Abstract:
Ambient radio frequency (RF) energy harvesting (EH) technology is key to realize self-sustainable, always-on, low-power, massive Internet of Things networks. Typically, rigid (non-adaptable to channel fluctuations) multi-antenna receive architectures are proposed to support reliable EH operation. Herein, we introduce a dynamic RF combining architecture for ambient RF EH use cases, and exemplify th…
▽ More
Ambient radio frequency (RF) energy harvesting (EH) technology is key to realize self-sustainable, always-on, low-power, massive Internet of Things networks. Typically, rigid (non-adaptable to channel fluctuations) multi-antenna receive architectures are proposed to support reliable EH operation. Herein, we introduce a dynamic RF combining architecture for ambient RF EH use cases, and exemplify the attainable performance gains via three simple phase shifts' exploration mechanisms, namely, brute force (BF), sequential testing (ST) and codebook based (CB). Among the proposed mechanisms, BF demands the highest power consumption, while CB requires the highest-resolution phase shifters, thus tipping the scales in favor of ST. Finally, we show that the performance gains of ST over a rigid RF combining scheme increase with the number of receive antennas and energy transmitters' deployment density.
△ Less
Submitted 6 December, 2021; v1 submitted 21 July, 2021;
originally announced July 2021.
-
Untrained DNN for Channel Estimation of RIS-Assisted Multi-User OFDM System with Hardware Impairments
Authors:
Nipuni Ginige,
K. B. Shashika Manosha,
Nandana Rajatheva,
Matti Latva-aho
Abstract:
Reconfigurable intelligent surface (RIS) is an emerging technology for improving performance in fifth-generation (5G) and beyond networks. Practically channel estimation of RIS-assisted systems is challenging due to the passive nature of the RIS. The purpose of this paper is to introduce a deep learning-based, low complexity channel estimator for the RIS-assisted multi-user single-input-multiple-o…
▽ More
Reconfigurable intelligent surface (RIS) is an emerging technology for improving performance in fifth-generation (5G) and beyond networks. Practically channel estimation of RIS-assisted systems is challenging due to the passive nature of the RIS. The purpose of this paper is to introduce a deep learning-based, low complexity channel estimator for the RIS-assisted multi-user single-input-multiple-output (SIMO) orthogonal frequency division multiplexing (OFDM) system with hardware impairments. We propose an untrained deep neural network (DNN) based on the deep image prior (DIP) network to denoise the effective channel of the system obtained from the conventional pilot-based least-square (LS) estimation and acquire a more accurate estimation. We have shown that our proposed method has high performance in terms of accuracy and low complexity compared to conventional methods. Further, we have shown that the proposed estimator is robust to interference caused by the hardware impairments at the transceiver and RIS.
△ Less
Submitted 13 July, 2021;
originally announced July 2021.
-
Graph Neural Network Based Access Point Selection for Cell-Free Massive MIMO Systems
Authors:
Vismika Ranasinghe,
Nandana Rajatheva,
Matti Latva-aho
Abstract:
A graph neural network (GNN) based access point (AP) selection algorithm for cell-free massive multiple-input multiple-output (MIMO) systems is proposed. Two graphs, a homogeneous graph which includes only AP nodes representing the structure of the APs in the network, and a heterogeneous graph which includes both AP nodes and user equipment (UE) nodes are constructed to represent a cell-free massi…
▽ More
A graph neural network (GNN) based access point (AP) selection algorithm for cell-free massive multiple-input multiple-output (MIMO) systems is proposed. Two graphs, a homogeneous graph which includes only AP nodes representing the structure of the APs in the network, and a heterogeneous graph which includes both AP nodes and user equipment (UE) nodes are constructed to represent a cell-free massive MIMO network. A GNN based on the inductive graph learning framework GraphSAGE is used to obtain the embeddings which are then used to predict the links between the nodes. The numerical results show that compared to the proximity-based AP selection algorithms, the proposed GNN based algorithm predicts the potential APs with more accuracy. Compared to the large scale fading coefficient based AP selection algorithms, the proposed algorithm does not require measured and sorted signal strengths of all the neighbouring APs. Furthermore, the proposed algorithm is scalable in terms of the number of users in the cell-free system.
△ Less
Submitted 27 September, 2021; v1 submitted 6 July, 2021;
originally announced July 2021.
-
Massive MIMO with Radio Stripes for Indoor Wireless Energy Transfer
Authors:
Onel L. A. López,
Dileep Kumar,
Richard Demo Souza,
Petar Popovski,
Antti Tölli,
Matti Latva-aho
Abstract:
Radio frequency wireless energy transfer (WET) is a promising solution for powering autonomous Internet of Things (IoT) deployments. In this work, we leverage energy beamforming for powering multiple user equipments (UEs) with stringent energy harvesting (EH) demands in an indoor distributed massive multiple-input multiple-output system. Based on semi-definite programming, successive convex approx…
▽ More
Radio frequency wireless energy transfer (WET) is a promising solution for powering autonomous Internet of Things (IoT) deployments. In this work, we leverage energy beamforming for powering multiple user equipments (UEs) with stringent energy harvesting (EH) demands in an indoor distributed massive multiple-input multiple-output system. Based on semi-definite programming, successive convex approximation (SCA), and maximum ratio transmission (MRT) techniques, we derive optimal and sub-optimal precoders aimed at minimizing the radio stripes' transmit power while exploiting information of the power transfer efficiency of the EH circuits at the UEs. Moreover, we propose an analytical framework to assess and control the electromagnetic field (EMF) radiation exposure in the considered indoor scenario. Numerical results show that i) the EMF radiation exposure can be more easily controlled at higher frequencies at the cost of a higher transmit power consumption, ii) training is not a very critical factor for the considered indoor system, iii) MRT/SCA-based precoders are particularly appealing when serving a small number of UEs, thus, especially suitable for implementation in a time domain multiple access (TDMA) scheduling framework, and iv) TDMA is more efficient than spatial domain multiple access (SDMA) when serving a relatively small number of UEs. Results suggest that additional boosting performance strategies are needed to increase the overall system efficiency, thus making the technology viable in practice.
△ Less
Submitted 28 February, 2022; v1 submitted 23 June, 2021;
originally announced June 2021.
-
Beyond 5G URLLC Evolution: New Service Modes and Practical Considerations
Authors:
Hirley Alves,
Gweon Do Jo,
JaeSheung Shin,
Choongil Yeh,
Nurul Huda Mahmood,
Carlos Lima,
Chanho Yoon,
Nandana Rahatheva,
Ok-Sun Park,
Seokki Kim,
Eunah Kim,
Ville Niemelä,
Hyeon Woo Lee,
Ari Pouttu,
Hyun Kyu Chung,
Matti Latva-aho
Abstract:
Ultra-reliable low latency communications (URLLC) arose to serve industrial IoT (IIoT) use cases within the 5G. Currently, it has inherent limitations to support future services. Based on state-of-the-art research and practical deployment experience, in this article, we introduce and advocate for three variants: broadband, scalable and extreme URLLC. We discuss use cases and key performance indica…
▽ More
Ultra-reliable low latency communications (URLLC) arose to serve industrial IoT (IIoT) use cases within the 5G. Currently, it has inherent limitations to support future services. Based on state-of-the-art research and practical deployment experience, in this article, we introduce and advocate for three variants: broadband, scalable and extreme URLLC. We discuss use cases and key performance indicators and identify technology enablers for the new service modes. We bring practical considerations from the IIoT testbed and provide an outlook toward some new research directions.
△ Less
Submitted 16 June, 2022; v1 submitted 7 June, 2021;
originally announced June 2021.
-
Deep Neural Network-Based Blind Multiple User Detection for Grant-free Multi-User Shared Access
Authors:
Thushan Sivalingam,
Samad Ali,
Nurul Huda Mahmood,
Nandana Rajatheva,
Matti Latva-Aho
Abstract:
Multi-user shared access (MUSA) is introduced as advanced code domain non-orthogonal complex spreading sequences to support a massive number of machine-type communications (MTC) devices. In this paper, we propose a novel deep neural network (DNN)-based multiple user detection (MUD) for grant-free MUSA systems. The DNN-based MUD model determines the structure of the sensing matrix, randomly distrib…
▽ More
Multi-user shared access (MUSA) is introduced as advanced code domain non-orthogonal complex spreading sequences to support a massive number of machine-type communications (MTC) devices. In this paper, we propose a novel deep neural network (DNN)-based multiple user detection (MUD) for grant-free MUSA systems. The DNN-based MUD model determines the structure of the sensing matrix, randomly distributed noise, and inter-device interference during the training phase of the model by several hidden nodes, neuron activation units, and a fit loss function. The thoroughly learned DNN model is capable of distinguishing the active devices of the received signal without any a priori knowledge of the device sparsity level and the channel state information. Our numerical evaluation shows that with a higher percentage of active devices, the DNN-MUD achieves a significantly increased probability of detection compared to the conventional approaches.
△ Less
Submitted 21 June, 2021;
originally announced June 2021.
-
Deep Learning-Based Active User Detection for Grant-free SCMA Systems
Authors:
Thushan Sivalingam,
Samad Ali,
Nurul Huda Mahmood,
Nandana Rajatheva,
Matti Latva-Aho
Abstract:
Grant-free random access and uplink non-orthogonal multiple access (NOMA) have been introduced to reduce transmission latency and signaling overhead in massive machine-type communication (mMTC). In this paper, we propose two novel group-based deep neural network active user detection (AUD) schemes for the grant-free sparse code multiple access (SCMA) system in mMTC uplink framework. The proposed A…
▽ More
Grant-free random access and uplink non-orthogonal multiple access (NOMA) have been introduced to reduce transmission latency and signaling overhead in massive machine-type communication (mMTC). In this paper, we propose two novel group-based deep neural network active user detection (AUD) schemes for the grant-free sparse code multiple access (SCMA) system in mMTC uplink framework. The proposed AUD schemes learn the nonlinear mapping, i.e., multi-dimensional codebook structure and the channel characteristic. This is accomplished through the received signal which incorporates the sparse structure of device activity with the training dataset. Moreover, the offline pre-trained model is able to detect the active devices without any channel state information and prior knowledge of the device sparsity level. Simulation results show that with several active devices, the proposed schemes obtain more than twice the probability of detection compared to the conventional AUD schemes over the signal to noise ratio range of interest.
△ Less
Submitted 21 June, 2021;
originally announced June 2021.
-
Constrained Deep Reinforcement Based Functional Split Optimization in Virtualized RANs
Authors:
Fahri Wisnu Murti,
Samad Ali,
Matti Latva-aho
Abstract:
In virtualized radio access network (vRAN), the base station (BS) functions are decomposed into virtualized components that can be hosted at the centralized unit or distributed units through functional splits. Such flexibility has many benefits; however, it also requires solving the problem of finding the optimal splits of functions of the BSs in such a way that minimizes the total network cost. T…
▽ More
In virtualized radio access network (vRAN), the base station (BS) functions are decomposed into virtualized components that can be hosted at the centralized unit or distributed units through functional splits. Such flexibility has many benefits; however, it also requires solving the problem of finding the optimal splits of functions of the BSs in such a way that minimizes the total network cost. The underlying vRAN system is complex and precise modelling of it is not trivial. Formulating the functional split problem to minimize the cost results in a combinatorial problem that is provably NP-hard, and solving it is computationally expensive. In this paper, a constrained deep reinforcement learning (RL) approach is proposed to solve the problem with minimal assumptions about the underlying system. Since in deep RL, the action selection is the outcome of inference of a neural network, it can be done in real-time while training to update the neural networks can be done in the background. However, since the problem is combinatorial, even for a small number of functions, the action space of the RL problem becomes large. Therefore, to deal with such a large action space, a chain rule-based stochastic policy is exploited in which a long short-term memory (LSTM) network-based sequence-to-sequence model is applied to estimate the policy that is selecting the functional split actions. However, the utilized policy is still limited to an unconstrained problem, and each split decision is bounded by vRAN's constraint requirements. Hence, a constrained policy gradient method is leveraged to train and guide the policy toward constraint satisfaction. Further, a search strategy by greedy decoding or temperature sampling is utilized to improve the optimality performance at the test time. Simulations are performed to evaluate the performance of the proposed solution using synthetic and real network datasets.
△ Less
Submitted 3 June, 2022; v1 submitted 31 May, 2021;
originally announced June 2021.
-
Deep Reinforcement Based Optimization of Function Splitting in Virtualized Radio Access Networks
Authors:
Fahri Wisnu Murti,
Samad Ali,
Matti Latva-aho
Abstract:
Virtualized Radio Access Network (vRAN) is one of the key enablers of future wireless networks as it brings the agility to the radio access network (RAN) architecture and offers degrees of design freedom. Yet, it also creates a challenging problem on how to design the functional split configuration. In this paper, a deep reinforcement learning approach is proposed to optimize function splitting in…
▽ More
Virtualized Radio Access Network (vRAN) is one of the key enablers of future wireless networks as it brings the agility to the radio access network (RAN) architecture and offers degrees of design freedom. Yet, it also creates a challenging problem on how to design the functional split configuration. In this paper, a deep reinforcement learning approach is proposed to optimize function splitting in vRAN. A learning paradigm is developed that optimizes the location of functions in the RAN. These functions can be placed either at a central/cloud unit (CU) or a distributed unit (DU). This problem is formulated as constrained neural combinatorial reinforcement learning to minimize the total network cost. In this solution, a policy gradient method with Lagrangian relaxation is applied that uses a stacked long short-term memory (LSTM) neural network architecture to approximate the policy. Then, a sampling technique with a temperature hyperparameter is applied for the inference process. The results show that our proposed solution can learn the optimal function split decision and solve the problem with a $0.4\%$ optimality gap. Moreover, our method can reduce the cost by up to $320\%$ compared to a distributed-RAN (D-RAN). We also conclude that altering the traffic load and routing cost does not significantly degrade the optimality performance.
△ Less
Submitted 31 May, 2021;
originally announced May 2021.
-
CSI-free Rotary Antenna Beamforming for Massive RF Wireless Energy Transfer
Authors:
Onel L. A. López,
Hirley Alves,
Samuel Montejo-Sánchez,
Richard D. Souza,
Matti Latva-aho
Abstract:
Radio frequency (RF) wireless energy transfer (WET) is a key technology that may allow seamlessly powering future massive low-energy Internet of Things (IoT) networks. To enable efficient massive WET, channel state information (CSI)-limited/free multi-antenna transmit schemes have been recently proposed in the literature. The idea is to reduce/null the energy costs to be paid by energy harvesting…
▽ More
Radio frequency (RF) wireless energy transfer (WET) is a key technology that may allow seamlessly powering future massive low-energy Internet of Things (IoT) networks. To enable efficient massive WET, channel state information (CSI)-limited/free multi-antenna transmit schemes have been recently proposed in the literature. The idea is to reduce/null the energy costs to be paid by energy harvesting (EH) IoT nodes from participating in large-scale time/power-consuming CSI training, but still enable some transmit spatial gains. In this paper, we take another step forward by proposing a novel CSI-free rotary antenna beamforming (RAB) WET scheme that outperforms all state-of-the-art CSI-free schemes in a scenario where a power beacon (PB) equipped with a uniform linear array (ULA) powers a large set of surrounding EH IoT devices. RAB uses a properly designed CSI-free beamformer combined with a continuous or periodic rotation of the ULA at the PB to provide average EH gains that scale as $0.85\sqrt{M}$, where $M$ is the number of PB's antenna elements. Moreover, a rotation-specific power control mechanism was proposed to i) fairly optimize the WET process if devices' positioning information is available, and/or ii) to avoid hazards to human health in terms of specific absorption rate (SAR). We show that RAB performance even approaches quickly (or surpasses, for scenarios with sufficiently large number of EH devices, or when using the proposed power control) the performance of a traditional full-CSI based transmit scheme, and it is also less sensitive to SAR constraints. Finally, we discuss important practicalities related to RAB such as its robustness against non line-of-sight conditions compared to other CSI-free WET schemes, and its generalizability to scenarios where the PB uses other than a ULA topology.
△ Less
Submitted 27 August, 2021; v1 submitted 26 April, 2021;
originally announced April 2021.
-
Average Rate Analysis of RIS-aided Short Packet Communication in URLLC Systems
Authors:
Ramin Hashemi,
Samad Ali,
Nurul Huda Mahmood,
Matti Latva-aho
Abstract:
In this paper, the average achievable rate of a re-configurable intelligent surface (RIS) aided factory automation is investigated in finite blocklength (FBL) regime. First, the composite channel containing the direct path plus the product of reflected paths through the RIS is characterized. Then, the distribution of the received signal-to-noise ratio (SNR) is matched to a Gamma random variable wh…
▽ More
In this paper, the average achievable rate of a re-configurable intelligent surface (RIS) aided factory automation is investigated in finite blocklength (FBL) regime. First, the composite channel containing the direct path plus the product of reflected paths through the RIS is characterized. Then, the distribution of the received signal-to-noise ratio (SNR) is matched to a Gamma random variable whose parameters depend on the total number of RIS elements as well as the channel pathloss. Next, by assuming FBL model, the achievable rate expression is identified and the corresponding average rate is elaborated based on the proposed SNR distribution. The phase error due to quantizing the phase shifts is considered in the simulation. The numerical results show that Monte Carlo simulations conform to the matched Gamma distribution for the received SNR for large number of RIS elements. In addition, the system reliability indicated by the tightness of the SNR distribution increases when RIS is leveraged particularly when only the reflected channel exists. This highlights the advantages of RIS-aided communications for ultra-reliable low-latency communications (URLLC) systems. The reduction of average achievable rate due to working in FBL regime with respect to Shannon capacity is also investigated as a function of total RIS elements.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Average Rate and Error Probability Analysis in Short Packet Communications over RIS-aided URLLC Systems
Authors:
Ramin Hashemi,
Samad Ali,
Nurul Huda Mahmood,
Matti Latva-aho
Abstract:
In this paper, the average achievable rate and error probability of a reconfigurable intelligent surface (RIS) aided systems is investigated for the finite blocklength (FBL) regime. The performance loss due to the presence of phase errors arising from limited quantization levels as well as hardware impairments at the RIS elements is also discussed. First, the composite channel containing the direc…
▽ More
In this paper, the average achievable rate and error probability of a reconfigurable intelligent surface (RIS) aided systems is investigated for the finite blocklength (FBL) regime. The performance loss due to the presence of phase errors arising from limited quantization levels as well as hardware impairments at the RIS elements is also discussed. First, the composite channel containing the direct path plus the product of reflected channels through the RIS is characterized. Then, the distribution of the received signal-to-noise ratio (SNR) is matched to a Gamma random variable whose parameters depend on the total number of RIS elements, phase errors and the channels' path loss. Next, by considering the FBL regime, the achievable rate expression and error probability are identified and the corresponding average rate and average error probability are elaborated based on the proposed SNR distribution. Furthermore, the impact of the presence of phase error due to either limited quantization levels or hardware impairments on the average rate and error probability is discussed. The numerical results show that Monte Carlo simulations conform to matched Gamma distribution to received SNR for sufficiently large number of RIS elements. In addition, the system reliability indicated by the tightness of the SNR distribution increases when RIS is leveraged particularly when only the reflected channel exists. This highlights the advantages of RIS-aided communications for ultra-reliable and low-latency systems. The difference between Shannon capacity and achievable rate in FBL regime is also discussed. Additionally, the required number of RIS elements to achieve a desired error probability in the FBL regime will be significantly reduced when the phase shifts are performed without error.
△ Less
Submitted 13 July, 2021; v1 submitted 26 February, 2021;
originally announced February 2021.
-
Deep Learning-based Power Control for Cell-Free Massive MIMO Networks
Authors:
Nuwanthika Rajapaksha,
K. B. Shashika Manosha,
Nandana Rajatheva,
Matti Latva-aho
Abstract:
A deep learning (DL)-based power control algorithm that solves the max-min user fairness problem in a cell-free massive multiple-input multiple-output (MIMO) system is proposed. Max-min rate optimization problem in a cell-free massive MIMO uplink setup is formulated, where user power allocations are optimized in order to maximize the minimum user rate. Instead of modeling the problem using mathema…
▽ More
A deep learning (DL)-based power control algorithm that solves the max-min user fairness problem in a cell-free massive multiple-input multiple-output (MIMO) system is proposed. Max-min rate optimization problem in a cell-free massive MIMO uplink setup is formulated, where user power allocations are optimized in order to maximize the minimum user rate. Instead of modeling the problem using mathematical optimization theory, and solving it with iterative algorithms, our proposed solution approach is using DL. Specifically, we model a deep neural network (DNN) and train it in an unsupervised manner to learn the optimum user power allocations which maximize the minimum user rate. This novel unsupervised learning-based approach does not require optimal power allocations to be known during model training as in previously used supervised learning techniques, hence it has a simpler and flexible model training stage. Numerical results show that the proposed DNN achieves a performance-complexity trade-off with around 400 times faster implementation and comparable performance to the optimization-based algorithm. An online learning stage is also introduced, which results in near-optimal performance with 4-6 times faster processing.
△ Less
Submitted 20 February, 2021;
originally announced February 2021.
-
Effective Energy Efficiency of Ultra-reliable Low Latency Communication
Authors:
Mohammad Shehab,
Hirley Alves,
Eduard A. Jorswieck,
Endrit Dosti,
Matti Latva-aho
Abstract:
Effective Capacity defines the maximum communication rate subject to a specific delay constraint, while effective energy efficiency (EEE) indicates the ratio between effective capacity and power consumption. We analyze the EEE of ultra-reliable networks operating in the finite blocklength regime. We obtain a closed form approximation for the EEE in quasi-static Nakagami-$m$ (and Rayleigh as sub-ca…
▽ More
Effective Capacity defines the maximum communication rate subject to a specific delay constraint, while effective energy efficiency (EEE) indicates the ratio between effective capacity and power consumption. We analyze the EEE of ultra-reliable networks operating in the finite blocklength regime. We obtain a closed form approximation for the EEE in quasi-static Nakagami-$m$ (and Rayleigh as sub-case) fading channels as a function of power, error probability, and latency. Furthermore, we characterize the QoS constrained EEE maximization problem for different power consumption models, which shows a significant difference between finite and infinite blocklength coding with respect to EEE and optimal power allocation strategy. As asserted in the literature, achieving ultra-reliability using one transmission consumes huge amount of power, which is not applicable for energy limited IoT devices. In this context, accounting for empty buffer probability in machine type communication (MTC) and extending the maximum delay tolerance jointly enhances the EEE and allows for adaptive retransmission of faulty packets. Our analysis reveals that obtaining the optimum error probability for each transmission by minimizing the non-empty buffer probability approaches EEE optimality, while being analytically tractable via Dinkelbach's algorithm. Furthermore, the results illustrate the power saving and the significant EEE gain attained by applying adaptive retransmission protocols, while sacrificing a limited increase in latency.
△ Less
Submitted 20 January, 2021;
originally announced January 2021.
-
A Predictive Interference Management Algorithm for URLLC in Beyond 5G Networks
Authors:
Nurul Huda Mahmood,
Onel Alcaraz Lopez,
Hirley Alves,
Matti Latva-aho
Abstract:
Interference mitigation is a major design challenge in wireless systems,especially in the context of ultra-reliable low-latency communication (URLLC) services. Conventional average-based interference management schemes are not suitable for URLLC as they do not accurately capture the tail information of the interference distribution. This letter proposes a novel interference prediction algorithm th…
▽ More
Interference mitigation is a major design challenge in wireless systems,especially in the context of ultra-reliable low-latency communication (URLLC) services. Conventional average-based interference management schemes are not suitable for URLLC as they do not accurately capture the tail information of the interference distribution. This letter proposes a novel interference prediction algorithm that considers the entire interference distribution instead of only the mean. The key idea is to model the interference variation as a discrete state space discrete-time Markov chain. The state transition probability matrix is then used to estimate the state evolution in time, and allocate radio resources accordingly. The proposed scheme is found to meet the target reliability requirements in a low-latency single-shot transmission system considering realistic system assumptions, while requiring only ~25% more resources than the optimum case with perfect interference knowledge.
△ Less
Submitted 21 September, 2020;
originally announced September 2020.
-
Ultra-low Latency, Low Energy and Massiveness in the 6G Era via Efficient CSIT-limited Schemes
Authors:
Onel L. A. López,
Nurul H. Mahmood,
Hirley Alves,
Carlos M. Lima,
Matti Latva-aho
Abstract:
Channel state information (CSI) has been a key component in traditional wireless communication systems. This might no longer hold in future networks supporting services with stringent quality of service constraints such as extremely low-latency, low-energy and/or large number of simultaneously connected devices, where acquiring CSI would become extremely costly or even impractical. We overview the…
▽ More
Channel state information (CSI) has been a key component in traditional wireless communication systems. This might no longer hold in future networks supporting services with stringent quality of service constraints such as extremely low-latency, low-energy and/or large number of simultaneously connected devices, where acquiring CSI would become extremely costly or even impractical. We overview the main limitations of CSI at transmitter side (CSIT)-based designs toward the 6G era, assess how to design and use efficient CSIT-limited schemes that allow meeting the new and stringent requirements, and highlight some key research directions. We delve into the ideas of efficiently allocating pilot sequences, relying on statistical CSIT and/or using location-based strategies, and demonstrate viability via a selected use case.
△ Less
Submitted 14 September, 2020;
originally announced September 2020.
-
A Low-Complexity Beamforming Design for Multiuser Wireless Energy Transfer
Authors:
Onel L. A. López,
Francisco A. Monteiro,
Hirley Alves,
Rui Zhang,
Matti Latva-aho
Abstract:
Wireless energy transfer (WET) is a green enabler of low-power Internet of Things (IoT). Therein, traditional optimization schemes relying on full channel state information (CSI) are often too costly to implement due to excessive energy consumption and high processing complexity. This letter proposes a simple, yet effective, energy beamforming scheme that allows a multi-antenna power beacon (PB) t…
▽ More
Wireless energy transfer (WET) is a green enabler of low-power Internet of Things (IoT). Therein, traditional optimization schemes relying on full channel state information (CSI) are often too costly to implement due to excessive energy consumption and high processing complexity. This letter proposes a simple, yet effective, energy beamforming scheme that allows a multi-antenna power beacon (PB) to fairly power a set of IoT devices by only relying on the first-order statistics of the channels. In addition to low complexity, the proposed scheme performs favorably as compared to benchmarking schemes and its performance improves as the number of PB's antennas increases. Finally, it is shown that further performance improvement can be achieved through proper angular rotations of the PB.
△ Less
Submitted 28 August, 2020;
originally announced August 2020.
-
CSI-free vs CSI-based multi-antenna WET for massive low-power Internet of Things
Authors:
Onel L. A. López,
Nurul Huda Mahmood,
Hirley Alves,
Matti Latva-aho
Abstract:
Wireless Energy Transfer (WET) is a promising solution for powering massive Internet of Things deployments. An important question is whether the costly Channel State Information (CSI) acquisition procedure is necessary for optimum performance. In this paper, we shed some light into this matter by evaluating CSI-based and CSI-free multi-antenna WET schemes in a setup with WET in the downlink, and p…
▽ More
Wireless Energy Transfer (WET) is a promising solution for powering massive Internet of Things deployments. An important question is whether the costly Channel State Information (CSI) acquisition procedure is necessary for optimum performance. In this paper, we shed some light into this matter by evaluating CSI-based and CSI-free multi-antenna WET schemes in a setup with WET in the downlink, and periodic or Poisson-traffic Wireless Information Transfer (WIT) in the uplink. When CSI is available, we show that a maximum ratio transmission beamformer is close to optimum whenever the farthest node experiences at least 3 dB of power attenuation more than the remaining devices. On the other hand, although the adopted CSI-free mechanism is not capable of providing average harvesting gains, it does provide greater WET/WIT diversity with lower energy requirements when compared with the CSI-based scheme. Our numerical results evidence that the CSI-free scheme performs favorably under periodic traffic conditions, but it may be deficient in case of Poisson traffic, specially if the setup is not optimally configured. Finally, we show the prominent performance results when the uplink transmissions are periodic, while highlighting the need of a minimum mean square error equalizer rather than zero-forcing for information decoding.
△ Less
Submitted 22 December, 2020; v1 submitted 29 May, 2020;
originally announced June 2020.