IEICE Transactions on Communications
Online ISSN : 1745-1345
Print ISSN : 0916-8516
Volume E105.B, Issue 2
Displaying 1-16 of 16 articles from this issue
Special Section on Emerging Communication Technologies in Conjunction with Main Topics of ICETC2020
  • Tomoaki OHTSUKI
    2022 Volume E105.B Issue 2 Pages 97
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    JOURNAL FREE ACCESS
    Download PDF (132K)
  • Takuji TACHIBANA
    Article type: INVITED PAPER
    2022 Volume E105.B Issue 2 Pages 98-115
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: August 17, 2021
    JOURNAL FREE ACCESS

    The 2020 International Conference on Emerging Technologies for Communications (ICETC2020) was held online on December 2nd—4th, 2020, and 213 research papers were accepted and presented in each session. It is expected that the accepted papers will contribute to the development and extension of research in multiple research areas. In this survey paper, all accepted research papers are classified into four research areas: Physical & Fundamental, Communications, Network, and Information Technology & Application, and then research papers are classified into each research topic. For each research area and topic, this survey paper briefly introduces the presented technologies and methods.

    Download PDF (1060K)
  • Abbas JAMALIPOUR, Forough SHIRIN ABKENAR
    Article type: INVITED PAPER
    2022 Volume E105.B Issue 2 Pages 116-130
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: August 17, 2021
    JOURNAL FREE ACCESS

    In this paper, we propose a novel Hybrid-Hierarchical spatial-aerial-Terrestrial Edge-Centric (H2TEC) for the space-air integrated Internet of Things (IoT) networks. (H2TEC) comprises unmanned aerial vehicles (UAVs) that act as mobile fog nodes to provide the required services for terminal nodes (TNs) in cooperation with the satellites. TNs in (H2TEC) offload their generated tasks to the UAVs for further processing. Due to the limited energy budget of TNs, a novel task allocation protocol, named TOP, is proposed to minimize the energy consumption of TNs while guaranteeing the outage probability and network reliability for which the transmission rate of TNs is optimized. TOP also takes advantage of the energy harvesting by which the low earth orbit satellites transfer energy to the UAVs when the remaining energy of the UAVs is below a predefined threshold. To this end, the harvested power of the UAVs is optimized alongside the corresponding harvesting time so that the UAVs can improve the network throughput via processing more bits. Numerical results reveal that TOP outperforms the baseline method in critical situations that more power is required to process the task. It is also found that even in such situations, the energy harvesting mechanism provided in the TOP yields a more efficient network throughput.

    Download PDF (3983K)
  • Jingzhou SUN, Yuxuan SUN, Sheng ZHOU, Zhisheng NIU
    Article type: INVITED PAPER
    2022 Volume E105.B Issue 2 Pages 131-139
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: August 17, 2021
    JOURNAL FREE ACCESS

    In this work, we consider a remote estimation system where a remote controller estimates the status of heterogeneous sensing devices with the information delivered over wireless channels. Status of heterogeneous devices changes at different speeds. With limited wireless resources, estimating as accurately as possible requires careful design of status update schemes. Status update schemes can be divided into two classes: centralized and decentralized. In centralized schemes, a central scheduler coordinates devices to avoid potential collisions. However, in decentralized schemes where each device updates on its own, update decisions can be made by using the current status which is unavailable in centralized schemes. The relation between these two schemes under the heterogeneous devices case is unclear, and thus we study these two schemes in terms of the mean square error (MSE) of the estimation. For centralized schemes, since the scheduler does not have the current status of each device, we study policies where the scheduling decisions are based on age of information (AoI), which measures the staleness of the status information held in the controller. The optimal scheduling policy is provided, along with the corresponding MSE. For decentralized schemes, we consider deviation-based policies with which only devices with estimation deviations larger than prescribed thresholds may update, and the others stay idle. We derive an approximation of the minimum MSE under the deviation-based policies and show that it is e/3 of the minimum MSE under the AoI-based policies. Simulation results further show that the actual minimum MSEs of these two policies are even closer than that shown by the approximation, which indicates that the cost of collision in the deviation-based policy cancels out the gain from exploiting status deviations.

    Download PDF (1903K)
  • Takanori HARA, Masahiro SASABE, Shoji KASAHARA
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 140-150
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: August 05, 2021
    JOURNAL RESTRICTED ACCESS

    Traffic congestion in road networks has been studied as the congestion game in game theory. In the existing work, the road usage by each agent was assumed to be static during the whole time horizon of the agent's travel, as in the classical congestion game. This assumption, however, should be reconsidered because each agent sequentially uses roads composing the route. In this paper, we propose a multi-agent distributed route selection scheme based on a gradient descent method considering the time-dependency among agents' road usage for vehicular networks. The proposed scheme first estimates the time-dependent flow on each road by considering the agents' probabilistic occupation under the first-in-first-out (FIFO) policy. Then, it calculates the optimal route choice probability of each route candidate using the gradient descent method and the estimated time-dependent flow. Each agent finally selects one route according to the optimal route choice probabilities. We first prove that the proposed scheme can exponentially converge to the steady-state at the convergence rate inversely proportional to the product of the number of agents and that of individual route candidates. Through simulations under a grid-like network and a real road network, we show that the proposed scheme can improve the actual travel time by 5.1% and 2.5% compared with the conventional static-flow based approach, respectively. In addition, we demonstrate that the proposed scheme is robust against incomplete information sharing among agents, which would be caused by its low penetration ratio or limited transmission range of wireless communications.

    Download PDF (2666K)
  • Masato YOSHIDA, Kozo SATO, Toshihiko HIROOKA, Keisuke KASAI, Masataka ...
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 151-158
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: August 02, 2021
    JOURNAL RESTRICTED ACCESS

    We present detailed measurements and analysis of the guided acoustic wave Brillouin scattering (GAWBS)-induced depolarization noise in a multi-core fiber (MCF) used for a digital coherent optical transmission. We first describe the GAWBS-induced depolarization noise in an uncoupled four-core fiber (4CF) with a 125μm cladding and compare the depolarization noise spectrum with that of a standard single-mode fiber (SSMF). We found that off-center cores in the 4CF are dominantly affected by higher-order TRn,m modes rather than the TR2,m mode unlike in the center core, and the total power of the depolarization noise in the 4CF was almost the same as that in the SSMF. We also report measurement results for the GAWBS-induced depolarization noise in an uncoupled 19-core fiber with a 240μm cladding. The results indicate that the amounts of depolarization noise generated in the cores are almost identical. Finally, we evaluate the influence of GAWBS-induced polarization crosstalk (XT) on a coherent QAM transmission. We found that the XT limits the achievable multiplicity of the QAM signal to 64 in a transoceanic transmission with an MCF.

    Download PDF (3047K)
  • Yaokun HU, Takeshi TODA
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 159-167
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: August 02, 2021
    JOURNAL FREE ACCESS

    Heart rate measurement for mm-wave FMCW radar based on phase analysis comprises a variety of noise. Furthermore, because the breathing and heart frequencies are so close, the harmonic of the breathing signal interferes with the heart rate, and the band-pass filter cannot solve it. On the other hand, because heart rates vary from person to person, it is difficult to choose the basic function of WT (Wavelet Transform). To solve the aforementioned difficulties, we consider performing time-frequency domain analysis on human skin surface displacement data. The PA-LI (Phase Accumulation-Linear Interpolation) joint ICEEMDAN (Improved Complete Ensemble Empirical Mode Decomposition with Adaptive Noise) approach is proposed in this paper, which effectively enhances the signal's SNR, estimates the heart rate, and reconstructs the heartbeat signal. The experimental findings demonstrate that the proposed method can not only extract heartbeat signals with high SNR from the front direction, but it can also detect heart rate from other directions (e.g., back, left, oblique front, and ceiling).

    Download PDF (5025K)
  • Shota MORI, Keiichi MIZUTANI, Hiroshi HARADA
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 168-176
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: September 02, 2021
    JOURNAL RESTRICTED ACCESS

    In-band full-duplex (IBFD) has been an attractive technology, which can theoretically double the spectral efficiency. However, when performing IBFD in the dynamic-duplex cellular (DDC) system, inter-user interference (IUI) deteriorates transmission performance in downlink (DL) communication and limits IBFD-applicable area and IBFD application ratio. In this paper, to expand the IBFD-applicable area and improve the IBFD application ratio, we propose an IUI reduction scheme using successive interference cancellation (SIC) for the DDC system. SIC can utilize the power difference and reduce the signal with the higher power. The effectiveness of the proposed scheme is evaluated by the computer simulation. The IUI reducing effect on the IBFD-inapplicable area is confirmed when the received power of the IUI is stronger than that of the desired signal at the user equipment for DL (DL-UE). The IBFD-inapplicable area within 95m from the DL-UE, where the IBFD does not work without the proposed scheme, can reduce by 43.6% from 52.8% to 9.2% by applying the proposed scheme. Moreover, the IBFD application ratio can improve by 24.6% from 69.5% to 94.1%.

    Download PDF (1656K)
  • Kazuma YAMAMOTO, Hiroyuki YOMO
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 177-185
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: August 20, 2021
    JOURNAL RESTRICTED ACCESS

    In this paper, we propose rate adaptation mechanisms for robust and low-latency video transmissions exploiting multiple access points (Multi-AP) wireless local area networks (WLANs). The Multi-AP video transmissions employ link-level broadcast and packet-level forward error correction (FEC) in order to realize robust and low-latency video transmissions from a WLAN station (STA) to a gateway (GW). The PHY (physical layer) rate and FEC rate play a key role to control trade-off between the achieved reliability and airtime (i.e., occupancy period of the shared channel) for Multi-AP WLANs. In order to finely control this trade-off while improving the transmitted video quality, the proposed rate adaptation controls PHY rate and FEC rate to be employed for Multi-AP transmissions based on the link quality and frame format of conveyed video traffic. With computer simulations, we evaluate and investigate the effectiveness of the proposed rate adaptation in terms of packet delivery rate (PDR), airtime, delay, and peak signal to noise ratio (PSNR). Furthermore, the quality of video is assessed by using the traffic encoded/decoded by the actual video encoder/decoder. All these results show that the proposed rate adaptation controls trade-off between the reliability and airtime well while offering the high-quality and low-latency video transmissions.

    Download PDF (3847K)
  • Toshiro NAKAHIRA, Koichi ISHIHARA, Motoharu SASAKI, Hirantha ABEYSEKER ...
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 186-195
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: September 01, 2021
    JOURNAL RESTRICTED ACCESS

    In this paper, we propose a novel centralized control method to handle multi-radio and terminal connections in an 802.11ax wireless LAN (802.11ax) mixed environment. The proposed control method can improve the throughput by applying 802.11ax Spatial Reuse in an environment hosting different terminal standards and mixed terminal communication quality. We evaluate the proposed control method by computer simulations assuming environments with mixed terminal standards, mixed communication quality, and both.

    Download PDF (3397K)
  • Kazuya SUZUKI
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 196-204
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: August 05, 2021
    JOURNAL FREE ACCESS

    Recently, segment routing, which is a modern forwarding mechanism, and Topology Independent Loop-free Alternate, which is an IP fast-reroute method using segment routing, have been proposed and have begun to be applied to real networks. When a failure occurs in a network, TI-LFA quickly restores packet forwarding without waiting for other nodes to update their routing tables. It does so by using segment routing to forward sections that may cause loops in the rerouting path. However, determining the segment routing sections has a high computational cost because it requires computation for each destination. This paper therefore proposes an algorithm to determine the egress node that is the exit of the segment routing section for all destination nodes with only three shortest-path tree calculations. The evaluation results of the proposed algorithm showed that the average tunnel lengths are at most 2.0 to 2.2 hops regardless of the size of the network. I also showed that the computational complexity of the proposed algorithm is O(Nlog N).

    Download PDF (1027K)
  • Yuuki FUJITA, Akihiro FUJIMOTO, Hideki TODE
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 205-214
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: September 01, 2021
    JOURNAL RESTRICTED ACCESS

    With the increase of IoT devices, P2P-based IoT platforms have been attracting attention because of their capabilities of building and maintaining their networks autonomously in a decentralized way. In particular, Skip Graph, which has a low network rebuilding cost and allows range search, is suitable for the platform. However, when data observed at geographically close points have similar values (i.e. when data have strong spatial autocorrelation), existing types of Skip Graph degrade their search performances. In this paper, we propose a query transfer method that enables efficient search even for spatially autocorrelated data by adaptively using two-types of Skip Graph depending on the key-distance to the target key. Simulation results demonstrate that the proposed method can reduce the query transfer distance compared to the existing method even for spatially autocorrelated data.

    Download PDF (2474K)
  • Hiroki WATANABE, Fumio TERAOKA
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 215-227
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: September 01, 2021
    JOURNAL RESTRICTED ACCESS

    TCP/IP, the foundation of the current Internet, assumes a sufficiently low packet loss rate for links in communication path. On the other hand, for communication services such as mobile and wireless communications, communication link tends to be disruptive. In this paper, we propose Layer-5 temporally-spliced path protocol (L5-TSPP), which provides disruption-tolerance in the L5 temporally-spliced path (L5-TSP), as one of the communication paths provided by Layer-5 (L5-paths). We design and implement an API for using L5-paths (L5 API). The L5 API is designed and implemented to support not only POSIX systems but also non-POSIX systems. L5 API and L5-TSPP are implemented in the user space in Go language. The measurement results show that L5-TSP achieves lower and more stable connection establishment time and better end-to-end throughput in the presence of disruption than conventional communication paths.

    Download PDF (2959K)
  • Takeaki MATSUNAGA, Yuanyu ZHANG, Masahiro SASABE, Shoji KASAHARA
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 228-239
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: August 05, 2021
    JOURNAL FREE ACCESS

    The Proof of Stake (PoS) protocol is one of the consensus algorithms for blockchain, in which the integrity of a new block is validated according to voting by nodes called validators. However, due to validator-oriented voting, voting results are likely to be false when the number of validators with wrong votes increases. In the PoS protocol, validators are motivated to vote correctly by reward and penalty mechanisms. With such mechanisms, validators who contribute to correct consensuses are rewarded, while those who vote incorrectly are penalized. In this paper, we consider an incentivization mechanism based on the voting profile of a validator, which is estimated from the voting history of the validator. In this mechanism, the stake collected due to the penalties are redistributed to validators who vote correctly, improving the incentive of validators to contribute to the system. We evaluate the performance of the proposed mechanism by computer simulations, investigating the impacts of system parameters on the estimation accuracy of the validator profile and the amount of validator's stake. Numerical results show that the proposed mechanism can estimate the voting profile of a validator accurately even when the voting profile dynamically changes. It is also shown that the proposed mechanism gives more reward to validators who vote correctly with high voting profile.

    Download PDF (1857K)
  • Shinichi KIKUCHI, Chisa TAKANO, Masaki AIDA
    Article type: PAPER
    2022 Volume E105.B Issue 2 Pages 240-249
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: September 01, 2021
    JOURNAL FREE ACCESS

    As online social networks (OSNs) have become remarkably active, we often experience explosive user dynamics such as online flaming, which can significantly impact the real world. Since the rapidity with which online user dynamics propagates, countermeasures based on social analyses of the individuals who cause online flaming take too much time that timely measures cannot be taken. To consider immediate solutions without individuals' social analyses, a countermeasure technology for flaming phenomena based on the oscillation model, which describes online user dynamics, has been proposed. In this framework, the strength of damping to prevent online flaming was derived based on the wave equation of networks. However, the assumed damping strength was to be a constant independent of the frequency of user dynamics. Since damping strength may generally depend on frequency, it is necessary to consider such frequency dependence in user dynamics. In this paper, we derive the strength of damping required to prevent online flaming under the general condition that damping strength depends on the frequency of user dynamics. We also investigate the existence range of the Laplacian matrix's eigenvalues representing the OSN structure assumed from the real data of OSNs, and apply it to the countermeasure technology for online flaming.

    Download PDF (3933K)
Regular Section
  • MyeongJi KO, Hyogon KIM, Sung-Gi MIN
    Article type: PAPER
    Subject area: Multimedia Systems for Communications
    2022 Volume E105.B Issue 2 Pages 250-258
    Published: February 01, 2022
    Released on J-STAGE: February 01, 2022
    Advance online publication: September 01, 2021
    JOURNAL FREE ACCESS

    To access Internet services supported in a home network, a mobile node must obtain the right to use an access network, and it must be able to contact a home network gateway to access the Internet in the home network. This means that the device must be authenticated by an AP to use the access network, and it must additionally be authenticated by the home network gateway to access its home network. EAP-PEAP is currently the most commonly used authentication protocol in access networks, and IKEv2 is common security protocol for mutual authentication on the Internet. As the procedures in EAP-PEAP and IKEv2 are quite similar, EAP-PEAP can be replaced by IKEv2. If the access network authentication uses IKEv2-based protocols and the home network authentication also uses IKEv2, the IKEv2 messages exchanged in each authentication become duplicated. However, it should be noted that EAP-IKEv2 is not able to carry EAP exchanges. We propose a hybrid authentication mechanism that can be used to authenticate a mobile node for both networks simultaneously. The proposed mechanism is based on the IKEv2-EAP exchanges instead of the EAP exchanges currently used to authenticate the access network, but our scheme adopts the encapsulation method defined by EAP-IKEv2 to transport the IKEv2 message over IEEE 802.11 so as not to change the current access network authentication architecture and the message format used by the authentication protocols. The scheme authenticates both networks through a single IKEv2 authentication, rather than two authentication procedures - one for the access network and one for the home network. This reduces the number of exchanged messages and authentication time.

    Download PDF (2496K)
feedback
Top