Skip to main content

Showing 1–12 of 12 results for author: Szott, S

  1. arXiv:2405.12675  [pdf

    cs.NI

    Towards an AI/ML-defined Radio for Wi-Fi: Overview, Challenges, and Roadmap

    Authors: Boris Bellalta, Katarzyna Kosek-Szott, Szymon Szott, Francesc Wilhelmi

    Abstract: Will AI/ML-defined radios become a reality in the near future? In this paper, we introduce the concept of an AI/ML-defined radio - a radio architecture specifically designed to support AI/ML-based optimization and decision-making in communication functions - and depict its promised benefits and potential challenges. Additionally, we discuss a potential roadmap for the development and adoption of A… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  2. arXiv:2405.11504  [pdf, other

    cs.NI cs.AI

    Machine Learning & Wi-Fi: Unveiling the Path Towards AI/ML-Native IEEE 802.11 Networks

    Authors: Francesc Wilhelmi, Szymon Szott, Katarzyna Kosek-Szott, Boris Bellalta

    Abstract: Artificial intelligence (AI) and machine learning (ML) are nowadays mature technologies considered essential for driving the evolution of future communications systems. Simultaneously, Wi-Fi technology has constantly evolved over the past three decades and incorporated new features generation after generation, thus gaining in complexity. As such, researchers have observed that AI/ML functionalitie… ▽ More

    Submitted 30 August, 2024; v1 submitted 19 May, 2024; originally announced May 2024.

  3. FTMRate: Collision-Immune Distance-based Data Rate Selection for IEEE 802.11 Networks

    Authors: Wojciech Ciezobka, Maksymilian Wojnar, Katarzyna Kosek-Szott, Szymon Szott, Krzysztof Rusek

    Abstract: Data rate selection algorithms for Wi-Fi devices are an important area of research because they directly impact performance. Most of the proposals are based on measuring the transmission success probability for a given data rate. In dense scenarios, however, this probing approach will fail because frame collisions are misinterpreted as erroneous data rate selection. We propose FTMRate which uses t… ▽ More

    Submitted 9 August, 2023; v1 submitted 20 April, 2023; originally announced April 2023.

    Comments: 11 pages, 8 figures, 5 tables

    Journal ref: IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Boston, MA, USA, 2023, pp. 242-251

  4. Wi-Fi Meets ML: A Survey on Improving IEEE 802.11 Performance with Machine Learning

    Authors: Szymon Szott, Katarzyna Kosek-Szott, Piotr Gawłowicz, Jorge Torres Gómez, Boris Bellalta, Anatolij Zubow, Falko Dressler

    Abstract: Wireless local area networks (WLANs) empowered by IEEE 802.11 (Wi-Fi) hold a dominant position in providing Internet access thanks to their freedom of deployment and configuration as well as the existence of affordable and highly interoperable devices. The Wi-Fi community is currently deploying Wi-Fi 6 and developing Wi-Fi 7, which will bring higher data rates, better multi-user and multi-AP suppo… ▽ More

    Submitted 6 October, 2022; v1 submitted 10 September, 2021; originally announced September 2021.

    Comments: 54 pages, 23 figures, 384 references

    Journal ref: IEEE Communications Surveys & Tutorials, vol. 24, no. 3, pp. 1843-1893, thirdquarter 2022

  5. Downlink channel access performance of NR-U: Impact of numerology and mini-slots on coexistence with Wi-Fi in the 5 GHz band

    Authors: Katarzyna Kosek-Szott, Alice Lo Valvo, Szymon Szott, Pierluigi Gallo, Ilenia Tinnirello

    Abstract: Coexistence between cellular systems and Wi-Fi gained the attention of the research community when LTE License Assisted Access (LAA) entered the unlicensed band. The recent introduction of NR-U as part of 5G introduces new coexistence opportunities because it implements scalable numerology (flexible subcarrier spacing and OFDM symbol lengths), and non-slot based scheduling (mini-slots), which cons… ▽ More

    Submitted 2 December, 2021; v1 submitted 28 July, 2020; originally announced July 2020.

    Comments: 20 double-column single-spaced pages, 10 figures, 3 tables, 39 references, journal submission

    MSC Class: 91A06; 91A10; 91A80 ACM Class: C.2.0; C.2.5

    Journal ref: Computer Networks, Volume 195, 4 August 2021

  6. Contention Window Optimization in IEEE 802.11ax Networks with Deep Reinforcement Learning

    Authors: Witold Wydmański, Szymon Szott

    Abstract: The proper setting of contention window (CW) values has a significant impact on the efficiency of Wi-Fi networks. Unfortunately, the standard method used by 802.11 networks is not scalable enough to maintain stable throughput for an increasing number of stations, yet it remains the default method of channel access for 802.11ax single-user transmissions. Therefore, we propose a new method of CW con… ▽ More

    Submitted 4 February, 2022; v1 submitted 3 March, 2020; originally announced March 2020.

    Comments: 6 pages, 6 figures, published in 2021 IEEE Wireless Communications and Networking Conference (WCNC)

    MSC Class: 91A06; 91A10; 91A80 ACM Class: C.2.0; C.2.5

  7. Revisiting LTE LAA: Channel Access, QoS, and Coexistence with WiFi

    Authors: Jacek Wszołek, Szymon Ludyga, Wojciech Anzel, Szymon Szott

    Abstract: Network operators are looking towards LTE License Assisted Access (LAA) as a means of extending capacity by offloading traffic to unlicensed bands. However, operation in these bands requires abiding to certain coexistence rules in terms of channel access. The description of these rules in existing literature is not always in line with the latest standards. Therefore, in this paper, we clarify the… ▽ More

    Submitted 24 March, 2021; v1 submitted 24 October, 2019; originally announced October 2019.

    Comments: 7 pages, 4 figures, 2 tables

    MSC Class: 91A06; 91A10; 91A80 ACM Class: C.2.0; C.2.5

    Journal ref: IEEE Communications Magazine, vol. 59, no. 2, pp. 91-97, February 2021

  8. arXiv:1902.04561  [pdf, other

    cs.NI

    Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks

    Authors: Jerzy Konorski, Szymon Szott

    Abstract: Multi-hop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive unduly high quality of service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Reco… ▽ More

    Submitted 10 September, 2021; v1 submitted 11 February, 2019; originally announced February 2019.

    Comments: 16 pages, 11 figures, 3 tables, journal version of conference paper arXiv:1704.04053

    MSC Class: 91A06; 91A10; 91A80 ACM Class: C.2.0; C.2.5

  9. Impact of LTE's Periodic Interference on Heterogeneous Wi-Fi Transmissions

    Authors: Ilenia Tinnirello, Pierluigi Gallo, Szymon Szott, Katarzyna Kosek-Szott

    Abstract: The problem of Wi-Fi and LTE coexistence has been significantly debated in the last years, with the emergence of LTE extensions enabling the utilization of unlicensed spectrum for carrier aggregation. Rather than focusing on the problem of resource sharing between the two technologies, in this paper, we study the effects of LTE's structured transmissions on the Wi-Fi random access protocol. We sho… ▽ More

    Submitted 20 December, 2018; originally announced December 2018.

    Comments: 4 pages, 2 figures, 2 tables, 13 references, accepted for publication in IEEE Communications Letters

    MSC Class: 91A06; 91A10; 91A80 ACM Class: C.2.0; C.2.5

  10. arXiv:1804.10456  [pdf

    cs.NI

    A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks

    Authors: Jerzy Konorski, Szymon Szott

    Abstract: In wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate… ▽ More

    Submitted 31 July, 2018; v1 submitted 27 April, 2018; originally announced April 2018.

    Comments: 7 pages, 4 figures, 12 numbered equations

    MSC Class: 91A06; 91A10; 91A80 ACM Class: C.2.0; C.2.5

  11. Selfish Attacks in Two-hop IEEE 802.11 Relay Networks: Impact and Countermeasures

    Authors: Szymon Szott, Jerzy Konorski

    Abstract: In IEEE 802.11 networks, selfish stations can pursue a better quality of service (QoS) through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicabili… ▽ More

    Submitted 16 January, 2018; v1 submitted 3 October, 2017; originally announced October 2017.

    Comments: 4 pages, 3 figures, 1 table, letter

  12. Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Authors: Jerzy Konorski, Szymon Szott

    Abstract: In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis… ▽ More

    Submitted 5 September, 2017; v1 submitted 13 April, 2017; originally announced April 2017.

    Comments: Accepted for IEEE GLOBECOM 2017

    MSC Class: 91A06; 91A10; 91A80 ACM Class: C.2.0; C.2.5