-
Towards an AI/ML-defined Radio for Wi-Fi: Overview, Challenges, and Roadmap
Authors:
Boris Bellalta,
Katarzyna Kosek-Szott,
Szymon Szott,
Francesc Wilhelmi
Abstract:
Will AI/ML-defined radios become a reality in the near future? In this paper, we introduce the concept of an AI/ML-defined radio - a radio architecture specifically designed to support AI/ML-based optimization and decision-making in communication functions - and depict its promised benefits and potential challenges. Additionally, we discuss a potential roadmap for the development and adoption of A…
▽ More
Will AI/ML-defined radios become a reality in the near future? In this paper, we introduce the concept of an AI/ML-defined radio - a radio architecture specifically designed to support AI/ML-based optimization and decision-making in communication functions - and depict its promised benefits and potential challenges. Additionally, we discuss a potential roadmap for the development and adoption of AI/ML-defined radios, and highlight the enablers for addressing their associated challenges. While we offer a general overview of the AI/ML-defined radio concept, our focus throughout the paper remains on Wi-Fi, a wireless technology that may significantly benefit from the integration of AI/ML-defined radios, owing to its inherent decentralized management and operation within unlicensed frequency bands.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Machine Learning & Wi-Fi: Unveiling the Path Towards AI/ML-Native IEEE 802.11 Networks
Authors:
Francesc Wilhelmi,
Szymon Szott,
Katarzyna Kosek-Szott,
Boris Bellalta
Abstract:
Artificial intelligence (AI) and machine learning (ML) are nowadays mature technologies considered essential for driving the evolution of future communications systems. Simultaneously, Wi-Fi technology has constantly evolved over the past three decades and incorporated new features generation after generation, thus gaining in complexity. As such, researchers have observed that AI/ML functionalitie…
▽ More
Artificial intelligence (AI) and machine learning (ML) are nowadays mature technologies considered essential for driving the evolution of future communications systems. Simultaneously, Wi-Fi technology has constantly evolved over the past three decades and incorporated new features generation after generation, thus gaining in complexity. As such, researchers have observed that AI/ML functionalities may be required to address the upcoming Wi-Fi challenges that will be otherwise difficult to solve with traditional approaches. This paper discusses the role of AI/ML in current and future Wi-Fi networks and depicts the ways forward. A roadmap towards AI/ML-native Wi-Fi, key challenges, standardization efforts, and major enablers are also discussed. An exemplary use case is provided to showcase the potential of AI/ML in Wi-Fi at different adoption stages.
△ Less
Submitted 30 August, 2024; v1 submitted 19 May, 2024;
originally announced May 2024.
-
FTMRate: Collision-Immune Distance-based Data Rate Selection for IEEE 802.11 Networks
Authors:
Wojciech Ciezobka,
Maksymilian Wojnar,
Katarzyna Kosek-Szott,
Szymon Szott,
Krzysztof Rusek
Abstract:
Data rate selection algorithms for Wi-Fi devices are an important area of research because they directly impact performance. Most of the proposals are based on measuring the transmission success probability for a given data rate. In dense scenarios, however, this probing approach will fail because frame collisions are misinterpreted as erroneous data rate selection. We propose FTMRate which uses t…
▽ More
Data rate selection algorithms for Wi-Fi devices are an important area of research because they directly impact performance. Most of the proposals are based on measuring the transmission success probability for a given data rate. In dense scenarios, however, this probing approach will fail because frame collisions are misinterpreted as erroneous data rate selection. We propose FTMRate which uses the fine timing measurement (FTM) feature, recently introduced in IEEE 802.11. FTM allows stations to measure their distance from the AP. We argue that knowledge of the distance from the receiver can be useful in determining which data rate to use. We apply statistical learning (a form of machine learning) to estimate the distance based on measurements, estimate channel quality from the distance, and select data rates based on channel quality. We evaluate three distinct estimation approaches: exponential smoothing, Kalman filter, and particle filter. We present a performance evaluation of the three variants of FTMRate and show, in several dense and mobile (though line-of-sight only) scenarios, that it can outperform two benchmarks and provide close to optimal results in IEEE 802.11ax networks.
△ Less
Submitted 9 August, 2023; v1 submitted 20 April, 2023;
originally announced April 2023.
-
Wi-Fi Meets ML: A Survey on Improving IEEE 802.11 Performance with Machine Learning
Authors:
Szymon Szott,
Katarzyna Kosek-Szott,
Piotr Gawłowicz,
Jorge Torres Gómez,
Boris Bellalta,
Anatolij Zubow,
Falko Dressler
Abstract:
Wireless local area networks (WLANs) empowered by IEEE 802.11 (Wi-Fi) hold a dominant position in providing Internet access thanks to their freedom of deployment and configuration as well as the existence of affordable and highly interoperable devices. The Wi-Fi community is currently deploying Wi-Fi 6 and developing Wi-Fi 7, which will bring higher data rates, better multi-user and multi-AP suppo…
▽ More
Wireless local area networks (WLANs) empowered by IEEE 802.11 (Wi-Fi) hold a dominant position in providing Internet access thanks to their freedom of deployment and configuration as well as the existence of affordable and highly interoperable devices. The Wi-Fi community is currently deploying Wi-Fi 6 and developing Wi-Fi 7, which will bring higher data rates, better multi-user and multi-AP support, and, most importantly, improved configuration flexibility. These technical innovations, including the plethora of configuration parameters, are making next-generation WLANs exceedingly complex as the dependencies between parameters and their joint optimization usually have a non-linear impact on network performance. The complexity is further increased in the case of dense deployments and coexistence in shared bands. While classical optimization approaches fail in such conditions, machine learning (ML) is able to handle complexity. Much research has been published on using ML to improve Wi-Fi performance and solutions are slowly being adopted in existing deployments. In this survey, we adopt a structured approach to describe the various Wi-Fi areas where ML is applied. To this end, we analyze over 250 papers in the field, providing readers with an overview of the main trends. Based on this review, we identify specific open challenges and provide general future research directions.
△ Less
Submitted 6 October, 2022; v1 submitted 10 September, 2021;
originally announced September 2021.
-
Downlink channel access performance of NR-U: Impact of numerology and mini-slots on coexistence with Wi-Fi in the 5 GHz band
Authors:
Katarzyna Kosek-Szott,
Alice Lo Valvo,
Szymon Szott,
Pierluigi Gallo,
Ilenia Tinnirello
Abstract:
Coexistence between cellular systems and Wi-Fi gained the attention of the research community when LTE License Assisted Access (LAA) entered the unlicensed band. The recent introduction of NR-U as part of 5G introduces new coexistence opportunities because it implements scalable numerology (flexible subcarrier spacing and OFDM symbol lengths), and non-slot based scheduling (mini-slots), which cons…
▽ More
Coexistence between cellular systems and Wi-Fi gained the attention of the research community when LTE License Assisted Access (LAA) entered the unlicensed band. The recent introduction of NR-U as part of 5G introduces new coexistence opportunities because it implements scalable numerology (flexible subcarrier spacing and OFDM symbol lengths), and non-slot based scheduling (mini-slots), which considerably impact channel access. This paper analyzes the impact of NR-U settings on its coexistence with Wi-Fi networks and compares it with LAA operation using simulations and experiments. First, we propose a downlink channel access simulation model, which addresses the problem of the dependency and non-uniformity of transmission attempts of different nodes, as a result of the synchronization mechanism introduced by NR-U. Second, we validate the accuracy of the proposed model using FPGA-based LAA, NR-U, and Wi-Fi prototypes with over-the-air transmissions. Additionally, we show that replacing LAA with NR-U would not only allow to overcome the problem of bandwidth wastage caused by reservation signals but also, in some cases, to preserve fairness in channel access for both scheduled and random-access systems. Finally, we conclude that fair coexistence of the aforementioned systems in unlicensed bands is not guaranteed in general, and novel mechanisms are necessary for improving the sharing of resources between scheduled and contention-based technologies.
△ Less
Submitted 2 December, 2021; v1 submitted 28 July, 2020;
originally announced July 2020.
-
Contention Window Optimization in IEEE 802.11ax Networks with Deep Reinforcement Learning
Authors:
Witold Wydmański,
Szymon Szott
Abstract:
The proper setting of contention window (CW) values has a significant impact on the efficiency of Wi-Fi networks. Unfortunately, the standard method used by 802.11 networks is not scalable enough to maintain stable throughput for an increasing number of stations, yet it remains the default method of channel access for 802.11ax single-user transmissions. Therefore, we propose a new method of CW con…
▽ More
The proper setting of contention window (CW) values has a significant impact on the efficiency of Wi-Fi networks. Unfortunately, the standard method used by 802.11 networks is not scalable enough to maintain stable throughput for an increasing number of stations, yet it remains the default method of channel access for 802.11ax single-user transmissions. Therefore, we propose a new method of CW control, which leverages deep reinforcement learning (DRL) principles to learn the correct settings under different network conditions. Our method, called centralized contention window optimization with DRL (CCOD), supports two trainable control algorithms: deep Q-network (DQN) and deep deterministic policy gradient (DDPG). We demonstrate through simulations that it offers efficiency close to optimal (even in dynamic topologies) while keeping computational cost low.
△ Less
Submitted 4 February, 2022; v1 submitted 3 March, 2020;
originally announced March 2020.
-
Revisiting LTE LAA: Channel Access, QoS, and Coexistence with WiFi
Authors:
Jacek Wszołek,
Szymon Ludyga,
Wojciech Anzel,
Szymon Szott
Abstract:
Network operators are looking towards LTE License Assisted Access (LAA) as a means of extending capacity by offloading traffic to unlicensed bands. However, operation in these bands requires abiding to certain coexistence rules in terms of channel access. The description of these rules in existing literature is not always in line with the latest standards. Therefore, in this paper, we clarify the…
▽ More
Network operators are looking towards LTE License Assisted Access (LAA) as a means of extending capacity by offloading traffic to unlicensed bands. However, operation in these bands requires abiding to certain coexistence rules in terms of channel access. The description of these rules in existing literature is not always in line with the latest standards. Therefore, in this paper, we clarify the operation of LAA, focusing on channel access and methods of providing Quality of Service (QoS) support. In terms of coexistence, we evaluate the impact of LAA under its various QoS settings on Wi-Fi performance in an experimental testbed. Finally, we describe the upcoming research challenges for LTE-based technologies in unlicensed bands considering the latest developments.
△ Less
Submitted 24 March, 2021; v1 submitted 24 October, 2019;
originally announced October 2019.
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
Authors:
Jerzy Konorski,
Szymon Szott
Abstract:
Multi-hop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive unduly high quality of service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Reco…
▽ More
Multi-hop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive unduly high quality of service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing QoS security, we use a novel network-oriented QoS metric to propose a self-enforcing game-theoretic mitigation approach. By switching between TRA and honest behavior, selfish nodes engage in a noncooperative multistage game in pursuit of high QoS. We analyze feasible node strategies and design a distributed signaling mechanism called DISTRESS, under which, given certain conditions, the game produces a desirable outcome: after an upper-bounded play time, honesty tends to become a selfish node's best-reply behavior, while yielding acceptable QoS to most or all nodes. We verify these findings by Monte Carlo and ns-3 simulations of static and mobile nodes.
△ Less
Submitted 10 September, 2021; v1 submitted 11 February, 2019;
originally announced February 2019.
-
Impact of LTE's Periodic Interference on Heterogeneous Wi-Fi Transmissions
Authors:
Ilenia Tinnirello,
Pierluigi Gallo,
Szymon Szott,
Katarzyna Kosek-Szott
Abstract:
The problem of Wi-Fi and LTE coexistence has been significantly debated in the last years, with the emergence of LTE extensions enabling the utilization of unlicensed spectrum for carrier aggregation. Rather than focusing on the problem of resource sharing between the two technologies, in this paper, we study the effects of LTE's structured transmissions on the Wi-Fi random access protocol. We sho…
▽ More
The problem of Wi-Fi and LTE coexistence has been significantly debated in the last years, with the emergence of LTE extensions enabling the utilization of unlicensed spectrum for carrier aggregation. Rather than focusing on the problem of resource sharing between the two technologies, in this paper, we study the effects of LTE's structured transmissions on the Wi-Fi random access protocol. We show how the scheduling of periodic LTE transmissions modifies the behavior of 802.11's distributed coordination function (DCF), leading to a degradation of Wi-Fi performance, both in terms of channel utilization efficiency and in terms of channel access fairness. We also discuss the applicability and limitations of a persistent DCF model in analyzing Wi-Fi performance under periodic LTE interference.
△ Less
Submitted 20 December, 2018;
originally announced December 2018.
-
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
Authors:
Jerzy Konorski,
Szymon Szott
Abstract:
In wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate…
▽ More
In wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme called RISC2WIN, whereby a trusted third party (e.g., an access point) can limit selfish behavior and preserve appropriate QoS for both stations.
△ Less
Submitted 31 July, 2018; v1 submitted 27 April, 2018;
originally announced April 2018.
-
Selfish Attacks in Two-hop IEEE 802.11 Relay Networks: Impact and Countermeasures
Authors:
Szymon Szott,
Jerzy Konorski
Abstract:
In IEEE 802.11 networks, selfish stations can pursue a better quality of service (QoS) through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicabili…
▽ More
In IEEE 802.11 networks, selfish stations can pursue a better quality of service (QoS) through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants in the two-hop relay topology, quantify their impact, and study defense measures.
△ Less
Submitted 16 January, 2018; v1 submitted 3 October, 2017;
originally announced October 2017.
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
Authors:
Jerzy Konorski,
Szymon Szott
Abstract:
In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis…
▽ More
In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper we offer a game-theoretic approach: we derive a formal model of opportunistic TRAs, define a TRA game with a heuristic rank-based payoff function, and propose a boundedly rational multistage attack strategy that both selfish and non-selfish nodes are free to use. Thus non-selfish nodes are allowed to respond in kind to selfish ones. We characterize the form of equilibrium that the multistage play reaches and verify via simulation that it often coincides with a Nash equilibrium in which harmful TRAs are curbed in the first place, whereas harmless ones need not be.
△ Less
Submitted 5 September, 2017; v1 submitted 13 April, 2017;
originally announced April 2017.