-
Age of Information in a SWIPT and URLLC enabled Wireless Communications System
Authors:
Chathuranga M. Wijerathna Basnayaka,
Dushantha Nalin K. Jayakody,
Tharindu D. Ponnimbaduge Perera,
Mário Marques da Silva
Abstract:
This paper estimates the freshness of the information in a wireless relay communication system that employs simultaneous wireless information and power transfer (SWIPT) operating under ultra-reliable low-latency communication (URLLC) constraints. The Age of Information (AoI) metric calculates the time difference between the current time and the timestamp of the most recent update received by the r…
▽ More
This paper estimates the freshness of the information in a wireless relay communication system that employs simultaneous wireless information and power transfer (SWIPT) operating under ultra-reliable low-latency communication (URLLC) constraints. The Age of Information (AoI) metric calculates the time difference between the current time and the timestamp of the most recent update received by the receiver is used here to estimate the freshness of information. The short packet communication scheme is used to fulfil the reliability and latency requirements of the proposed wireless network and its performance is analysed using finite block length theory. In addition, by utilising novel approximation approaches, expressions for the average AoI (AAoI) of the proposed system are derived. Finally, numerical analysis is used to evaluate and validate derived results.
△ Less
Submitted 18 November, 2022;
originally announced November 2022.
-
Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communication System
Authors:
Chathuranga M. Wijerathna Basnayaka,
Dushantha Nalin K. Jayakody,
Tharindu D. Ponnimbaduge Perera,
Moises Vidal Ribeiro
Abstract:
Age of Information (AoI) measures the freshness of data in mission critical Internet-of-Things (IoT) applications i.e., industrial internet, intelligent transportation systems etc. In this paper, a new system model is proposed to estimate the average AoI (AAoI) in an ultra-reliable low latency communication (URLLC) enabled wireless communication system with decodeand-forward relay scheme over the…
▽ More
Age of Information (AoI) measures the freshness of data in mission critical Internet-of-Things (IoT) applications i.e., industrial internet, intelligent transportation systems etc. In this paper, a new system model is proposed to estimate the average AoI (AAoI) in an ultra-reliable low latency communication (URLLC) enabled wireless communication system with decodeand-forward relay scheme over the quasi-static Rayleigh block fading channels. Short packet communication scheme is used to meet both reliability and latency requirements of the proposed wireless network. By resorting finite block length information theory, queuing theory and stochastic processes, a closed-form expression for AAoI is obtained. Finally, the impact of the system parameters, such as update generation rate, block length and block length allocation factor on the AAoI are investigated. All results are validated by the numerical results.
△ Less
Submitted 19 April, 2021;
originally announced May 2021.
-
Communication and networking technologies for UAVs: A survey
Authors:
Abhishek Sharma,
Pankhuri Vanjani,
Nikhil Paliwal,
Chathuranga M. Wijerathna Basnayaka,
Dushantha Nalin K. Jayakody,
Hwang-Cheng Wang,
P. Muthuchidambaranathane
Abstract:
With the advancement in drone technology, in just a few years, drones will be assisting humans in every domain. But there are many challenges to be tackled, communication being the chief one. This paper aims at providing insights into the latest UAV (Unmanned Aerial Vehicle) communication technologies through investigation of suitable task modules, antennas, resource handling platforms, and networ…
▽ More
With the advancement in drone technology, in just a few years, drones will be assisting humans in every domain. But there are many challenges to be tackled, communication being the chief one. This paper aims at providing insights into the latest UAV (Unmanned Aerial Vehicle) communication technologies through investigation of suitable task modules, antennas, resource handling platforms, and network architectures. Additionally, we explore techniques such as machine learning and path planning to enhance existing drone communication methods. Encryption and optimization techniques for ensuring long lasting and secure communications, as well as for power management, are discussed. Moreover, applications of UAV networks for different contextual uses ranging from navigation to surveillance, URLLC (Ultra reliable and low latency communications), edge computing and work related to artificial intelligence are examined. In particular, the intricate interplay between UAV, advanced cellular communication, and internet of things constitutes one of the focal points of this paper. The survey encompasses lessons learned, insights, challenges, open issues, and future directions in UAV communications. Our literature review reveals the need for more research work on drone to drone and drone to device communications.
△ Less
Submitted 2 September, 2020;
originally announced September 2020.
-
Coverage Analysis and Scaling Laws of Ultra-Dense Networks
Authors:
Imene Trigui,
Sofiene Affes,
Marco Di Renzo,
Dushantha Nalin K. Jayakody
Abstract:
In this paper, we develop an innovative approach to quantitatively characterize the performance of ultra-dense wireless networks in a plethora of propagation environments. The proposed framework has the potential of significantly simplifying the cumbersome procedure of analyzing the coverage probability and allowing the remarkable unification of single- and multi-antenna networks through compact r…
▽ More
In this paper, we develop an innovative approach to quantitatively characterize the performance of ultra-dense wireless networks in a plethora of propagation environments. The proposed framework has the potential of significantly simplifying the cumbersome procedure of analyzing the coverage probability and allowing the remarkable unification of single- and multi-antenna networks through compact representations. By harnessing this key feature, we develop a novel statistical machinery to study the scaling laws of wireless network densification considering general channel power distributions including the entire space of multipath and shadowing models as well as associated beamforming gain due to the use of multiple antenna. We further formulate the relationship between network density, antenna height, antenna array seize and carrier frequency showing how the coverage probability can be maintained with ultra-densification. From a system design perspective, we present a new innovative theoretical discovery stipulating that if multiple antenna BS are deployed and moved to higher frequencies, then monotonically increasing the coverage probability by means of ultra-densification is possible, and this without lowering the antenna height. Such findings are completely different from the conclusions in existing works, who suggest to lower the BS height as to leverage the potential of network densification. Simulation results substantiate performance trends leveraging network densification and antenna deployment and configuration against path loss models and signal-to-noise plus interference (SINR) thresholds.
△ Less
Submitted 13 July, 2020; v1 submitted 30 June, 2020;
originally announced July 2020.
-
Performance Study of Strongly Coupled Magnetic Resonance
Authors:
Chathuranga M. Wijerathna Basnayaka,
Dushantha Nalin K. Jayakody,
Abhishek Sharma,
Hwang-Cheng Wang,
P Muthuchidambaranathan
Abstract:
Strongly Coupled Magnetic Resonance (SCMR) uses electromagnetic resonance in order to efficiently transfer power wirelessly over mid-range distances. Since the energy exchange capability of resonant objects higher than non-resonant objects, strongly coupled systems are able to achieve more efficient energy transfer than other wireless power transfer systems. The paper presents detailed experimenta…
▽ More
Strongly Coupled Magnetic Resonance (SCMR) uses electromagnetic resonance in order to efficiently transfer power wirelessly over mid-range distances. Since the energy exchange capability of resonant objects higher than non-resonant objects, strongly coupled systems are able to achieve more efficient energy transfer than other wireless power transfer systems. The paper presents detailed experimental and simulated analysis of the performance of the SCMR system. A prototype of the SCMR system was implemented and experiments were conducted to analyze the performance of the system. Finally, the resonant frequency of the system was experimentally verified and the factors influencing the wireless power transfer were also studied
△ Less
Submitted 18 April, 2023; v1 submitted 7 August, 2019;
originally announced August 2019.
-
LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering Infrastructure
Authors:
Sahil Garg,
Kuljeet Kaur,
Georges Kaddoum,
François Gagnon,
Syed Hassan Ahmed,
Dushantha Nalin K. Jayakody
Abstract:
Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to their dependency on public communication networks.…
▽ More
Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to their dependency on public communication networks. Therefore, the security of SMI communications raises the need for robust authentication and key agreement primitives that can satisfy the security requirements of the SG. Thus, in order to realize the aforementioned issues, this paper introduces a lightweight and secure authentication protocol, "LiSA", primarily to secure SMIs in SG setups. The protocol employs Elliptic Curve Cryptography at its core to provide various security features such as mutual authentication, anonymity, replay protection, session key security, and resistance against various attacks. Precisely, LiSA exploits the hardness of the Elliptic Curve Qu Vanstone (EVQV) certificate mechanism along with Elliptic Curve Diffie Hellman Problem (ECDHP) and Elliptic Curve Discrete Logarithm Problem (ECDLP). Additionally, LiSA is designed to provide the highest level of security relative to the existing schemes with least computational and communicational overheads. For instance, LiSA incurred barely 11.826 ms and 0.992 ms for executing different passes across the smart meter and the service providers. Further, it required a total of 544 bits for message transmission during each session.
△ Less
Submitted 20 July, 2019;
originally announced July 2019.
-
A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
Authors:
Kuljeet Kaur,
Sahil Garg,
Georges Kaddoum,
Mohsen Guizani,
Dushantha Nalin K. Jayakody
Abstract:
With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Co…
▽ More
With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Computing, it inherited numerous security and privacy issues from the latter. Further, decentralized architectures and diversified deployment environments used in MEC platforms also aggravate the problem; causing great concerns for the research fraternity. Thus, in this paper, we propose an efficient and lightweight mutual authentication protocol for MEC environments; based on Elliptic Curve Cryptography (ECC), one-way hash functions and concatenation operations. The designed protocol also leverages the advantages of discrete logarithm problems, computational Diffie-Hellman, random numbers and time-stamps to resist various attacks namely-impersonation attacks, replay attacks, man-in-the-middle attacks, etc. The paper also presents a comparative assessment of the proposed scheme relative to the current state-of-the-art schemes. The obtained results demonstrate that the proposed scheme incurs relatively less communication and computational overheads, and is appropriate to be adopted in resource constraint MEC environments.
△ Less
Submitted 20 July, 2019;
originally announced July 2019.
-
Shared Secret Key Generation via Carrier Frequency Offsets
Authors:
Waqas Aman,
Aneeqa Ijaz,
M. Mahboob Ur Rahman,
Dushanta Nalin K. Jayakody,
Haris Pervaiz
Abstract:
This work presents a novel method to generate secret keys shared between a legitimate node pair (Alice and Bob) to safeguard the communication between them from an unauthorized node (Eve). To this end, we exploit the {\it reciprocal carrier frequency offset} (CFO) between the legitimate node pair to extract common randomness out of it to generate shared secret keys. The proposed key generation alg…
▽ More
This work presents a novel method to generate secret keys shared between a legitimate node pair (Alice and Bob) to safeguard the communication between them from an unauthorized node (Eve). To this end, we exploit the {\it reciprocal carrier frequency offset} (CFO) between the legitimate node pair to extract common randomness out of it to generate shared secret keys. The proposed key generation algorithm involves standard steps: the legitimate nodes exchange binary phase-shift keying (BPSK) signals to perform blind CFO estimation on the received signals, and do equi-probable quantization of the noisy CFO estimates followed by information reconciliation--to distil a shared secret key. Furthermore, guided by the Allan deviation curve, we distinguish between the two frequency-stability regimes---when the randomly time-varying CFO process i) has memory, ii) is memoryless; thereafter, we compute the key generation rate for both regimes. Simulation results show that the key disagreement rate decreases exponentially with increase in the signal to noise ratio of the link between Alice and Bob. Additionally, the decipher probability of Eve decreases as soon as either of the two links observed by the Eve becomes more degraded compared to the link between Alice and Bob.
△ Less
Submitted 28 February, 2019;
originally announced February 2019.
-
Sum-MSE performance gain of DFT-based channel estimator over frequency-domain LS one in full-duplex OFDM systems with colored interference
Authors:
Jin Wang,
Feng Shu,
Jinhui Lu,
Hai Yu,
Riqing Chen,
Jun Li,
Dushantha Nalin K. Jayakody
Abstract:
In this paper, we make an investigation on the sum-mean-square-error (sum-MSE) performance gain achieved by DFT-based least-square (LS) channel estimator over frequency-domain LS one in full-duplex OFDM system in the presence of colored interference and noise. The closed-form expression of the sum-MSE performance gain is given. Its simple upper and lower bounds are derived by using inequalities of…
▽ More
In this paper, we make an investigation on the sum-mean-square-error (sum-MSE) performance gain achieved by DFT-based least-square (LS) channel estimator over frequency-domain LS one in full-duplex OFDM system in the presence of colored interference and noise. The closed-form expression of the sum-MSE performance gain is given. Its simple upper and lower bounds are derived by using inequalities of matrix eigen-values. By simulation and analysis, the upper lower bound is shown to be close to the exact value of MSE gain as the ratio of the number N of total subcarriers to the cyclic prefix length L grows and the correlation factor of colored interference increases. More importantly, we also find that the MSE gain varies from one to N/L as the correlation among colored interferences decreases gradually. According to theoretical analysis, we also find the MSE gain has very simple forms in two extreme scenarios. In the first extreme case that the colored interferences over all subchannels are fully correlated, i.e., their covariance matrix is a matrix of all-ones, the sum-MSE gain reduces to 1. In other words, there is no performance gain. In the second extreme case that the colored-interference covariance matrix is an identity matrix, i.e, they are mutually independent, the achievable sum-MSE performance gain is N/L. A large ratio N/L will achieve a significant sum-MSE gain.
△ Less
Submitted 1 May, 2017;
originally announced May 2017.
-
Managing Service-Heterogeneity using Osmotic Computing
Authors:
Vishal Sharma,
Kathiravan Srinivasan,
Dushantha Nalin K. Jayakody,
Omer Rana,
Ravinder Kumar
Abstract:
Computational resource provisioning that is closer to a user is becoming increasingly important, with a rise in the number of devices making continuous service requests and with the significant recent take up of latency-sensitive applications, such as streaming and real-time data processing. Fog computing provides a solution to such types of applications by bridging the gap between the user and pu…
▽ More
Computational resource provisioning that is closer to a user is becoming increasingly important, with a rise in the number of devices making continuous service requests and with the significant recent take up of latency-sensitive applications, such as streaming and real-time data processing. Fog computing provides a solution to such types of applications by bridging the gap between the user and public/private cloud infrastructure via the inclusion of a "fog" layer. Such approach is capable of reducing the overall processing latency, but the issues of redundancy, cost-effectiveness in utilizing such computing infrastructure and handling services on the basis of a difference in their characteristics remain. This difference in characteristics of services because of variations in the requirement of computational resources and processes is termed as service heterogeneity. A potential solution to these issues is the use of Osmotic Computing -- a recently introduced paradigm that allows division of services on the basis of their resource usage, based on parameters such as energy, load, processing time on a data center vs. a network edge resource. Service provisioning can then be divided across different layers of a computational infrastructure, from edge devices, in-transit nodes, and a data center, and supported through an Osmotic software layer. In this paper, a fitness-based Osmosis algorithm is proposed to provide support for osmotic computing by making more effective use of existing Fog server resources. The proposed approach is capable of efficiently distributing and allocating services by following the principle of osmosis. The results are presented using numerical simulations demonstrating gains in terms of lower allocation time and a higher probability of services being handled with high resource utilization.
△ Less
Submitted 13 April, 2017;
originally announced April 2017.