Special Section on Position Papers Exploring Innovative Intelligence and Technologies in Communications
-
Kenichi HIGUCHI, Anass BENJEBBOUR
Article type: Invited Survey Paper
Subject area: Wireless Communication Technologies
2015 Volume E98.B Issue 3 Pages
403-414
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
FREE ACCESS
This paper presents our investigation of non-orthogonal multiple access (NOMA) as a novel and promising power-domain user multiplexing scheme for future radio access. Based on information theory, we can expect that NOMA with a successive interference canceller (SIC) applied to the receiver side will offer a better tradeoff between system efficiency and user fairness than orthogonal multiple access (OMA), which is widely used in 3.9 and 4G mobile communication systems. This improvement becomes especially significant when the channel conditions among the non-orthogonally multiplexed users are significantly different. Thus, NOMA can be expected to efficiently exploit the near-far effect experienced in cellular environments. In this paper, we describe the basic principle of NOMA in both the downlink and uplink and then present our proposed NOMA scheme for the scenario where the base station is equipped with multiple antennas. Simulation results show the potential system-level throughput gains of NOMA relative to OMA.
View full abstract
-
Ji-Youp KIM, Chang-Min CHO, Wijik LEE, Jong-Seon NO
Article type: PAPER
Subject area: Fundamental Theories for Communications
2015 Volume E98.B Issue 3 Pages
415-421
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
Based on the work by Helleseth [1], for an odd prime
p and an even integer
n=2
m, the cross-correlation values between two decimated m-sequences by the decimation factors 2 and 4
pn/2-2 are derived. Their cross-correlation function is at most 4-valued, that is, $\bigg \{\frac{-1 \pm p^{n/2}}{2}, \frac{-1 + 3p^{n/2}}{2}, \frac{-1 + 5p^{n/2}}{2} \bigg \}$. From this result, for
pm ≠ 2 mod 3, a new sequence family with family size 4
N and the maximum correlation magnitude upper bounded by $\frac{-1 + 5p^{n/2}}{2} \simeq \frac{5}{\sqrt{2}}\sqrt{N}$ is constructed, where $N = \frac{p^n-1}{2}$ is the period of sequences in the family.
View full abstract
-
Firoz AHMED, Seokhoon YOON, Hoon OH
Article type: PAPER
Subject area: Network
2015 Volume E98.B Issue 3 Pages
422-436
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
In mobile ad hoc networks, a malicious node can respond with a faked route reply (RREP) message to a source that explores a route in order to make the source establish a false route leading to the malicious node. Then, the malicious node can absorb all transmitted packets like
a black hole. This paper proposes a totally secure defense against the black hole attack with low control overhead and high reliability. The proposed approach, named a bullet-proof verification (BPV) method, consists of a detection phase, in which a node detects a suspicious node by analyzing the data routing information of its neighbors and a verification phase, in which a node initiates the verification of a suspicious node conditionally only if it receives RREP from the suspicious node. The crux of this approach lies in using an encrypted verification message that goes straight to the destination through the path that may include some malicious nodes and also in using both destination sequence number and hop distance for verification. In addition, a distributed watchdog mechanism is employed to track down any malicious nodes. Simulation results show that the BPV approach reduces control overhead significantly and defends against black hole attack reliably.
View full abstract
-
Toru MANO, Takeru INOUE, Kimihiro MIZUTANI, Osamu AKASHI
Article type: PAPER
Subject area: Network
2015 Volume E98.B Issue 3 Pages
437-448
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
Network virtualization is one of the promising technologies that can increase flexibility, diversity, and manageability of networks. Building optimal virtual networks across multiple domains is getting much attention, but existing studies were based on an unrealistic assumption, that is, providers' private information can be disclosed; as is well known, providers never actually do that. In this paper, we propose a new method that solves this multi-domain problem without revealing providers' private information. Our method uses an advanced secure computation technique called multi-party computation (MPC). Although MPC enables existing unsecured methods to optimize virtual networks securely, it requires very large time to finish the optimization due to the MPC's complex distributed protocols. Our method, in contrast, is designed to involve only a small number of MPC operations to find the optimal solution, and it allows providers to execute a large part of the optimization process independently without heavy distributed protocols. Evaluation results show that our method is faster than an existing method enhanced with MPC by several orders of magnitude. We also unveil that our method has the same level of embedding cost.
View full abstract
-
Ou ZHAO, Hidekazu MURATA
Article type: PAPER
Subject area: Wireless Communication Technologies
2015 Volume E98.B Issue 3 Pages
449-455
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
In order to verify the channel sum-rate improvement by multi-user multiple-input multiple-output (MU-MIMO) transmission in distributed antenna systems (DASs), we investigate and compare the characteristics of channel sum-rates in both centralized antenna systems (CASs) and DASs under the effects of path loss, spatially correlated shadowing, correlated multi-path fading, and inter-cell interference. In this paper, we introduce two different types of functions to model the shadowing, auto-correlation and cross-correlation, and a typical exponential decay function to model the multi-path fading correlation. Thus, we obtain the distribution of the channel sum-rate and investigate its characteristics. Computer simulation results indicate that DAS can improve the performance of the channel sum-rate compared to CAS, even in the case under consideration. However, this improvement decreases as interference power increases. Moreover, the decrease in the channel sum-rate due to the increase in the interference power becomes slow under the effect of shadowing correlation. In addition, some other analyses on the shadowing correlation that occurs on both the transmit and receiver sides are provided. These analysis results show that the average channel sum-rate in a DAS without inter-cell interference considerably decreases because of the shadowing correlation. In contrast, there appears to be no change in the CAS. Furthermore, there are two different types of sum-rate changes in a DAS because of the difference in shadowing auto-correlation and cross-correlation.
View full abstract
-
Rothna PEC, Joo Hyung CHOI, Yong Soo CHO
Article type: PAPER
Subject area: Wireless Communication Technologies
2015 Volume E98.B Issue 3 Pages
456-466
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
In this paper, two receive beamforming techniques (Method 1 and Method 2) are proposed for a mobile station (MS) with multiple antenna arrays in an OFDM-based millimeter-wave (mm-wave) cellular communication system. Since the MS in mm-wave cellular communication requires fast processing due to its frequent movement and rotation, a receive beamforming technique with reduced computation complexity and processing time is proposed in Method 2. Of particular interest, estimation techniques for 2-dimensional (2D) direction-of-arrivals (DoAs) corresponding to each cell ID are proposed for uniform circular arrays (UCAs) and uniform rectangular arrays (URAs). Also, a cell selection technique for MSs with multiple antenna arrays is described that use the candidate cell IDs and parameters estimated for all antenna arrays to provide combining gain in addition to array gain in multipath channels. The proposed beamforming techniques are evaluated by computer simulation using a simple model of amm-wave cellular communication system with 3-dimensional spatial channel model (3D SCM).
View full abstract
-
Mohamed RIHAN, Maha ELSABROUTY, Osamu MUTA, Hiroshi FURUKAWA
Article type: PAPER
Subject area: Wireless Communication Technologies
2015 Volume E98.B Issue 3 Pages
467-476
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
This paper presents a downlink interference mitigation framework for two-tier heterogeneous networks, that consist of spectrum-sharing macrocells and femtocells
*. This framework establishes cooperation between the two tiers through two algorithms, namely, the restricted waterfilling (RWF) algorithm and iterative reweighted least squares interference alignment (IRLS-IA) algorithm. The proposed framework models the macrocell-femtocell two-tier cellular system as an overlay cognitive radio system in which the macrocell system plays the role of the primary user (PU) while the femtocell networks play the role of the cognitive secondary users (SUs). Through the RWF algorithm, the macrocell basestation (MBS) cooperates with the femtocell basestations (FBSs) by releasing some of its eigenmodes to the FBSs to do their transmissions even if the traffic is heavy and the MBS's signal to noise power ratio (SNR) is high. Then, the FBSs are expected to achieve a near optimum sum rate through employing the IRLS-IA algorithm to mitigate both the co-tier and cross-tier interference at the femtocell users' (FUs) receivers. Simulation results show that the proposed IRLS-IA approach provides an improved sum rate for the femtocell users compared to the conventional IA techniques, such as the leakage minimization approach and the nuclear norm based rank constraint rank minimization approach. Additionally, the proposed framework involving both IRLS-IA and RWF algorithms provides an improved total system sum rate compared with the legacy approaches for the case of multiple femtocell networks.
View full abstract
-
ChaoYi ZHANG, YanDong ZHAO, DongYang WANG
Article type: PAPER
Subject area: Wireless Communication Technologies
2015 Volume E98.B Issue 3 Pages
477-484
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
Multi-antenna relay transport protocols are analysed, the transmitting matrix of relay node can split into a forward and a backward filters, and these two filters are cascade connection. Based on the zero-forcing relaying protocol, a spatial channel mapping matrix is added between these two filters, and a unified framework of spatial channel mapping matrix is proposed. Then, various linear system designs are summarized, the spatial channel mapping matrix is used to reduce destination noise, so that the relaying noise is suppressed in destination node, and the transmitting power of relay is efficiently utilized. Meanwhile, source node preprocessing operation and destination node equalizer are considered. Simulation results show that the spatial channel mapping matrix has an advantage in terms of system outage probability and capacity performance, and the result is consistent with theoretical analysis.
View full abstract
-
Ryo TAKAI, Shoya UCHIDA, Yukitoshi SANADA
Article type: PAPER
Subject area: Terrestrial Wireless Communication/Broadcasting Technologies
2015 Volume E98.B Issue 3 Pages
485-493
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
Overlapped FFT based energy detection has been proposed as a signal detection scheme in dynamic spectrum access. The overlapped FFT scheme increases the number of FFT frames to reduce the variance of squared noise and improves the detection performance. As the FFT frames are overlapped, correlation values between the frames affect to the detection performance. This paper proposes the window functions which decrease the correlation values between adjacent FFT bins. Numerical results obtained through computer simulation show that novel window functions generated by upsampling a Hamming window improves the detection performance by 0.09. However, this window function suffers more from adjacent channel interference than a conventional window. Therefore, this paper also proposes a two step detection scheme to achieve higher detection performance and to avoid the influence of the adjacent channel signal. Numerical results also indicate that the proposed scheme improves the detection performance and reduces the effect from the adjacent channel signal.
View full abstract
-
Changqing XU, Fan YANG, Jin TENG, Sumxin JIANG
Article type: PAPER
Subject area: Terrestrial Wireless Communication/Broadcasting Technologies
2015 Volume E98.B Issue 3 Pages
494-501
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
In this paper, we design a stealthy GSM phone identity catcher. As the GSM protocols do not mandate the authentication of BSes (Base Stations) to MSes (Mobile Stations), fake BSes can be implemented to lure victims to register with and thereby intercept crucial information of the user, including their identities. However, the straightforward implementation of GSM phone identity catcher can be easily perceived by users employing detection software due to such phenomena as phone interface changes and service interruptions. In this paper, we propose several effective mechanisms, such as smart configuration of the fake BSes, quick attachment/detachment and service relay, to make the catching process invisible to users and software. Real world experiments have been conducted and the results prove the efficiency and stealth of our proposed GSM phone identity catcher. We hope our work could help to enhance the effectiveness of IMSI catching attack and thereby alert the industry to design stronger authentication protocol in communication systems.
View full abstract
-
Genming DING, Zhenhui TAN, Jinsong WU, Jinshan ZENG, Lingwen ZHANG
Article type: PAPER
Subject area: Sensing
2015 Volume E98.B Issue 3 Pages
502-514
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
The indoor fingerprinting localization technology has received more attention in recent years due to the increasing demand of the indoor location based services (LBSs). However, a high quality of the LBS requires a positioning solution with high accuracy and low computational complexity. The particle swarm optimization (PSO) technique, which emulates the social behavior of a flock of birds to search for the optimal solution of a special problem, can provide attractive performance in terms of accuracy, computational efficiency and convergence rate. In this paper, we adopt the PSO algorithm to estimate the location information. First, our system establishes a Bayesian-rule based objective function. It then applies PSO to identify the optimal solution. We also propose a hybrid access point (AP) selection method to improve the accuracy, and analyze the effects of the number and the initial positions of particles on the localization performance. In order to mitigate the estimation error, we use the Kalman Filter to update the initial estimated location via the PSO algorithm to track the trail of the mobile user. Our analysis indicates that our method can reduce the computational complexity and improve the real-time performance. Numerous experiments also demonstrate that our proposed localization and tracking system achieve higher localization accuracy than existing systems.
View full abstract
-
Toshiro NUNOME, Shuji TASAKA
Article type: PAPER
Subject area: Multimedia Systems for Communications
2015 Volume E98.B Issue 3 Pages
515-524
Published: 2015
Released on J-STAGE: March 01, 2015
JOURNAL
RESTRICTED ACCESS
In this paper, we propose a framework for the real-time estimation of a multidimensional QoE of Multi-View Video and Audio (MVV-A) IP transmission. The framework utilizes linear multiple regression analysis with application-level and transport-level QoS parameters which can be measured in real time. In order to cope with a variety of MVV-A usage-situations, we introduce the concept of usage-situation type for grouping usage-situations with similar features to apply a representative regression line. We deal with two contents, two camera arrangements, and two user interfaces for viewpoint change as representative examples of the usage-situations. We assess multidimensional QoE of MVV-A with various types of average load, playout buffering time, and delay in the network. We then conduct the multiple regression analysis for the multidimensional QoE values represented by a psychological scale. From the comparison of measured values and estimated ones, we notice that real-time estimation of QoE is feasible in MVV-A IP transmission.
View full abstract