IEICE Transactions on Communications
Online ISSN : 1745-1345
Print ISSN : 0916-8516
Volume E98.B, Issue 3
Displaying 1-14 of 14 articles from this issue
Special Section on Position Papers Exploring Innovative Intelligence and Technologies in Communications
  • Hisato IWAI
    2015 Volume E98.B Issue 3 Pages 387
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL FREE ACCESS
    Download PDF (90K)
  • Kei SAKAGUCHI, Gia Khanh TRAN, Hidekazu SHIMODAIRA, Shinobu NANBA, Tos ...
    Article type: PAPER
    2015 Volume E98.B Issue 3 Pages 388-402
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL FREE ACCESS
    Triggered by the explosion of mobile traffic, 5G (5th Generation) cellular network requires evolution to increase the system rate 1000 times higher than the current systems in 10 years. Motivated by this common problem, there are several studies to integrate mm-wave access into current cellular networks as multi-band heterogeneous networks to exploit the ultra-wideband aspect of the mm-wave band. The authors of this paper have proposed comprehensive architecture of cellular networks with mm-wave access, where mm-wave small cell basestations and a conventional macro basestation are connected to Centralized-RAN (C-RAN) to effectively operate the system by enabling power efficient seamless handover as well as centralized resource control including dynamic cell structuring to match the limited coverage of mm-wave access with high traffic user locations via user-plane/control-plane splitting. In this paper, to prove the effectiveness of the proposed 5G cellular networks with mm-wave access, system level simulation is conducted by introducing an expected future traffic model, a measurement based mm-wave propagation model, and a centralized cell association algorithm by exploiting the C-RAN architecture. The numerical results show the effectiveness of the proposed network to realize 1000 times higher system rate than the current network in 10 years which is not achieved by the small cells using commonly considered 3.5GHz band. Furthermore, the paper also gives latest status of mm-wave devices and regulations to show the feasibility of using mm-wave in the 5G systems.
    Download PDF (3892K)
Regular Section
  • Kenichi HIGUCHI, Anass BENJEBBOUR
    Article type: Invited Survey Paper
    Subject area: Wireless Communication Technologies
    2015 Volume E98.B Issue 3 Pages 403-414
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL FREE ACCESS
    This paper presents our investigation of non-orthogonal multiple access (NOMA) as a novel and promising power-domain user multiplexing scheme for future radio access. Based on information theory, we can expect that NOMA with a successive interference canceller (SIC) applied to the receiver side will offer a better tradeoff between system efficiency and user fairness than orthogonal multiple access (OMA), which is widely used in 3.9 and 4G mobile communication systems. This improvement becomes especially significant when the channel conditions among the non-orthogonally multiplexed users are significantly different. Thus, NOMA can be expected to efficiently exploit the near-far effect experienced in cellular environments. In this paper, we describe the basic principle of NOMA in both the downlink and uplink and then present our proposed NOMA scheme for the scenario where the base station is equipped with multiple antennas. Simulation results show the potential system-level throughput gains of NOMA relative to OMA.
    Download PDF (2299K)
  • Ji-Youp KIM, Chang-Min CHO, Wijik LEE, Jong-Seon NO
    Article type: PAPER
    Subject area: Fundamental Theories for Communications
    2015 Volume E98.B Issue 3 Pages 415-421
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    Based on the work by Helleseth [1], for an odd prime p and an even integer n=2m, the cross-correlation values between two decimated m-sequences by the decimation factors 2 and 4pn/2-2 are derived. Their cross-correlation function is at most 4-valued, that is, $\bigg \{\frac{-1 \pm p^{n/2}}{2}, \frac{-1 + 3p^{n/2}}{2}, \frac{-1 + 5p^{n/2}}{2} \bigg \}$. From this result, for pm ≠ 2 mod 3, a new sequence family with family size 4N and the maximum correlation magnitude upper bounded by $\frac{-1 + 5p^{n/2}}{2} \simeq \frac{5}{\sqrt{2}}\sqrt{N}$ is constructed, where $N = \frac{p^n-1}{2}$ is the period of sequences in the family.
    Download PDF (931K)
  • Firoz AHMED, Seokhoon YOON, Hoon OH
    Article type: PAPER
    Subject area: Network
    2015 Volume E98.B Issue 3 Pages 422-436
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    In mobile ad hoc networks, a malicious node can respond with a faked route reply (RREP) message to a source that explores a route in order to make the source establish a false route leading to the malicious node. Then, the malicious node can absorb all transmitted packets like a black hole. This paper proposes a totally secure defense against the black hole attack with low control overhead and high reliability. The proposed approach, named a bullet-proof verification (BPV) method, consists of a detection phase, in which a node detects a suspicious node by analyzing the data routing information of its neighbors and a verification phase, in which a node initiates the verification of a suspicious node conditionally only if it receives RREP from the suspicious node. The crux of this approach lies in using an encrypted verification message that goes straight to the destination through the path that may include some malicious nodes and also in using both destination sequence number and hop distance for verification. In addition, a distributed watchdog mechanism is employed to track down any malicious nodes. Simulation results show that the BPV approach reduces control overhead significantly and defends against black hole attack reliably.
    Download PDF (2414K)
  • Toru MANO, Takeru INOUE, Kimihiro MIZUTANI, Osamu AKASHI
    Article type: PAPER
    Subject area: Network
    2015 Volume E98.B Issue 3 Pages 437-448
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    Network virtualization is one of the promising technologies that can increase flexibility, diversity, and manageability of networks. Building optimal virtual networks across multiple domains is getting much attention, but existing studies were based on an unrealistic assumption, that is, providers' private information can be disclosed; as is well known, providers never actually do that. In this paper, we propose a new method that solves this multi-domain problem without revealing providers' private information. Our method uses an advanced secure computation technique called multi-party computation (MPC). Although MPC enables existing unsecured methods to optimize virtual networks securely, it requires very large time to finish the optimization due to the MPC's complex distributed protocols. Our method, in contrast, is designed to involve only a small number of MPC operations to find the optimal solution, and it allows providers to execute a large part of the optimization process independently without heavy distributed protocols. Evaluation results show that our method is faster than an existing method enhanced with MPC by several orders of magnitude. We also unveil that our method has the same level of embedding cost.
    Download PDF (1799K)
  • Ou ZHAO, Hidekazu MURATA
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2015 Volume E98.B Issue 3 Pages 449-455
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    In order to verify the channel sum-rate improvement by multi-user multiple-input multiple-output (MU-MIMO) transmission in distributed antenna systems (DASs), we investigate and compare the characteristics of channel sum-rates in both centralized antenna systems (CASs) and DASs under the effects of path loss, spatially correlated shadowing, correlated multi-path fading, and inter-cell interference. In this paper, we introduce two different types of functions to model the shadowing, auto-correlation and cross-correlation, and a typical exponential decay function to model the multi-path fading correlation. Thus, we obtain the distribution of the channel sum-rate and investigate its characteristics. Computer simulation results indicate that DAS can improve the performance of the channel sum-rate compared to CAS, even in the case under consideration. However, this improvement decreases as interference power increases. Moreover, the decrease in the channel sum-rate due to the increase in the interference power becomes slow under the effect of shadowing correlation. In addition, some other analyses on the shadowing correlation that occurs on both the transmit and receiver sides are provided. These analysis results show that the average channel sum-rate in a DAS without inter-cell interference considerably decreases because of the shadowing correlation. In contrast, there appears to be no change in the CAS. Furthermore, there are two different types of sum-rate changes in a DAS because of the difference in shadowing auto-correlation and cross-correlation.
    Download PDF (796K)
  • Rothna PEC, Joo Hyung CHOI, Yong Soo CHO
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2015 Volume E98.B Issue 3 Pages 456-466
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    In this paper, two receive beamforming techniques (Method 1 and Method 2) are proposed for a mobile station (MS) with multiple antenna arrays in an OFDM-based millimeter-wave (mm-wave) cellular communication system. Since the MS in mm-wave cellular communication requires fast processing due to its frequent movement and rotation, a receive beamforming technique with reduced computation complexity and processing time is proposed in Method 2. Of particular interest, estimation techniques for 2-dimensional (2D) direction-of-arrivals (DoAs) corresponding to each cell ID are proposed for uniform circular arrays (UCAs) and uniform rectangular arrays (URAs). Also, a cell selection technique for MSs with multiple antenna arrays is described that use the candidate cell IDs and parameters estimated for all antenna arrays to provide combining gain in addition to array gain in multipath channels. The proposed beamforming techniques are evaluated by computer simulation using a simple model of amm-wave cellular communication system with 3-dimensional spatial channel model (3D SCM).
    Download PDF (2250K)
  • Mohamed RIHAN, Maha ELSABROUTY, Osamu MUTA, Hiroshi FURUKAWA
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2015 Volume E98.B Issue 3 Pages 467-476
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    This paper presents a downlink interference mitigation framework for two-tier heterogeneous networks, that consist of spectrum-sharing macrocells and femtocells*. This framework establishes cooperation between the two tiers through two algorithms, namely, the restricted waterfilling (RWF) algorithm and iterative reweighted least squares interference alignment (IRLS-IA) algorithm. The proposed framework models the macrocell-femtocell two-tier cellular system as an overlay cognitive radio system in which the macrocell system plays the role of the primary user (PU) while the femtocell networks play the role of the cognitive secondary users (SUs). Through the RWF algorithm, the macrocell basestation (MBS) cooperates with the femtocell basestations (FBSs) by releasing some of its eigenmodes to the FBSs to do their transmissions even if the traffic is heavy and the MBS's signal to noise power ratio (SNR) is high. Then, the FBSs are expected to achieve a near optimum sum rate through employing the IRLS-IA algorithm to mitigate both the co-tier and cross-tier interference at the femtocell users' (FUs) receivers. Simulation results show that the proposed IRLS-IA approach provides an improved sum rate for the femtocell users compared to the conventional IA techniques, such as the leakage minimization approach and the nuclear norm based rank constraint rank minimization approach. Additionally, the proposed framework involving both IRLS-IA and RWF algorithms provides an improved total system sum rate compared with the legacy approaches for the case of multiple femtocell networks.
    Download PDF (2480K)
  • ChaoYi ZHANG, YanDong ZHAO, DongYang WANG
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2015 Volume E98.B Issue 3 Pages 477-484
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    Multi-antenna relay transport protocols are analysed, the transmitting matrix of relay node can split into a forward and a backward filters, and these two filters are cascade connection. Based on the zero-forcing relaying protocol, a spatial channel mapping matrix is added between these two filters, and a unified framework of spatial channel mapping matrix is proposed. Then, various linear system designs are summarized, the spatial channel mapping matrix is used to reduce destination noise, so that the relaying noise is suppressed in destination node, and the transmitting power of relay is efficiently utilized. Meanwhile, source node preprocessing operation and destination node equalizer are considered. Simulation results show that the spatial channel mapping matrix has an advantage in terms of system outage probability and capacity performance, and the result is consistent with theoretical analysis.
    Download PDF (1214K)
  • Ryo TAKAI, Shoya UCHIDA, Yukitoshi SANADA
    Article type: PAPER
    Subject area: Terrestrial Wireless Communication/Broadcasting Technologies
    2015 Volume E98.B Issue 3 Pages 485-493
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    Overlapped FFT based energy detection has been proposed as a signal detection scheme in dynamic spectrum access. The overlapped FFT scheme increases the number of FFT frames to reduce the variance of squared noise and improves the detection performance. As the FFT frames are overlapped, correlation values between the frames affect to the detection performance. This paper proposes the window functions which decrease the correlation values between adjacent FFT bins. Numerical results obtained through computer simulation show that novel window functions generated by upsampling a Hamming window improves the detection performance by 0.09. However, this window function suffers more from adjacent channel interference than a conventional window. Therefore, this paper also proposes a two step detection scheme to achieve higher detection performance and to avoid the influence of the adjacent channel signal. Numerical results also indicate that the proposed scheme improves the detection performance and reduces the effect from the adjacent channel signal.
    Download PDF (2644K)
  • Changqing XU, Fan YANG, Jin TENG, Sumxin JIANG
    Article type: PAPER
    Subject area: Terrestrial Wireless Communication/Broadcasting Technologies
    2015 Volume E98.B Issue 3 Pages 494-501
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    In this paper, we design a stealthy GSM phone identity catcher. As the GSM protocols do not mandate the authentication of BSes (Base Stations) to MSes (Mobile Stations), fake BSes can be implemented to lure victims to register with and thereby intercept crucial information of the user, including their identities. However, the straightforward implementation of GSM phone identity catcher can be easily perceived by users employing detection software due to such phenomena as phone interface changes and service interruptions. In this paper, we propose several effective mechanisms, such as smart configuration of the fake BSes, quick attachment/detachment and service relay, to make the catching process invisible to users and software. Real world experiments have been conducted and the results prove the efficiency and stealth of our proposed GSM phone identity catcher. We hope our work could help to enhance the effectiveness of IMSI catching attack and thereby alert the industry to design stronger authentication protocol in communication systems.
    Download PDF (1747K)
  • Genming DING, Zhenhui TAN, Jinsong WU, Jinshan ZENG, Lingwen ZHANG
    Article type: PAPER
    Subject area: Sensing
    2015 Volume E98.B Issue 3 Pages 502-514
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    The indoor fingerprinting localization technology has received more attention in recent years due to the increasing demand of the indoor location based services (LBSs). However, a high quality of the LBS requires a positioning solution with high accuracy and low computational complexity. The particle swarm optimization (PSO) technique, which emulates the social behavior of a flock of birds to search for the optimal solution of a special problem, can provide attractive performance in terms of accuracy, computational efficiency and convergence rate. In this paper, we adopt the PSO algorithm to estimate the location information. First, our system establishes a Bayesian-rule based objective function. It then applies PSO to identify the optimal solution. We also propose a hybrid access point (AP) selection method to improve the accuracy, and analyze the effects of the number and the initial positions of particles on the localization performance. In order to mitigate the estimation error, we use the Kalman Filter to update the initial estimated location via the PSO algorithm to track the trail of the mobile user. Our analysis indicates that our method can reduce the computational complexity and improve the real-time performance. Numerous experiments also demonstrate that our proposed localization and tracking system achieve higher localization accuracy than existing systems.
    Download PDF (2144K)
  • Toshiro NUNOME, Shuji TASAKA
    Article type: PAPER
    Subject area: Multimedia Systems for Communications
    2015 Volume E98.B Issue 3 Pages 515-524
    Published: 2015
    Released on J-STAGE: March 01, 2015
    JOURNAL RESTRICTED ACCESS
    In this paper, we propose a framework for the real-time estimation of a multidimensional QoE of Multi-View Video and Audio (MVV-A) IP transmission. The framework utilizes linear multiple regression analysis with application-level and transport-level QoS parameters which can be measured in real time. In order to cope with a variety of MVV-A usage-situations, we introduce the concept of usage-situation type for grouping usage-situations with similar features to apply a representative regression line. We deal with two contents, two camera arrangements, and two user interfaces for viewpoint change as representative examples of the usage-situations. We assess multidimensional QoE of MVV-A with various types of average load, playout buffering time, and delay in the network. We then conduct the multiple regression analysis for the multidimensional QoE values represented by a psychological scale. From the comparison of measured values and estimated ones, we notice that real-time estimation of QoE is feasible in MVV-A IP transmission.
    Download PDF (1822K)
feedback
Top