Recent Submissions

  • Everyone deserves the information

    Cui, Xiangyu (2023-01-30) [Poster]
    One of the main aims of 6G is to solve the communication problem in rural areas. By using satellite technology, people at those areas can also get information and learn knowledge. I attempt to convey this great wish of wireless communication researchers by this poster.
  • Enhancement of Rural Connectivity by Recycling TV Towers with Massive MIMO Techniques

    El Falou, Ammar (2023-01-30) [Poster]
    Nowadays, the digital divide is one of the major issues facing the global community. Around 3 billion people worldwide are still not-connected or underconnected. In this article, we investigate the use of TV towers with multi user (MU) massive multiple input multiple output (mMIMO) techniques to offer connectivity in rural areas. Specifically, the coverage range is assessed for a MU mMIMO base station (BS) mounted on a high tower as a TV tower, and compared with a legacy mMIMO BS. The obtained results show that one high-tower BS can cover an area at least 25 times larger than the area covered by a legacy BS. This is of high interest as recycling TV towers can enhance rural connectivity with low expenditures. We apply the proposed solution to a realistic case study in an Ethiopian rural area, based on population densities and locations of current BS and TV towers. Our study shows that a high number of people can be covered by existing TV towers. Non-technological challenges and additional possible solutions to enhance rural connectivity are also discussed.
  • SmartNIC-offloaded and real-time anomaly detection for 6G edge applications

    Cornacchia, Alessandro (2023-01-30) [Poster]
    Future 6G networks are expected to unceasingly push AI frontiers towards the network edge to deliver human-centric network services and receive cyber-physical data in the user-edge-cloud continuum. To support dynamic workloads that strongly correlate with user mobility, edge servers will massively rely on serverless computing. With edge tasks being distributed to thousands of stateless components, continuous real-time anomaly detection is of utmost importance. We propose a system architecture that analyzes in real-time monitored metrics with no impact on the running applications. We leverage an unsupervised matrix sketching tool to learn steady-state conditions and detect abnormal behaviors. We entirely offload the monitoring agent to novel programmable SmartNICs, which are becoming prevalent in edge and core data centers. Therefore, (1) we do not harvest additional server computing resources and (2) we reduce the time-to-reaction when facing anomalies, as monitored metrics are analyzed locally whilst on a central controller.
  • IRS-Aided Visible Light Communication for Outdoor Applications

    Abdeljabar, Salah (2023-01-30) [Poster]
    Visible-light communication (VLC) has been receiving increasing interest, particularly for outdoor scenarios, as it offers efficient resource utilization while befitting from the large unlicensed spectrum. On the other hand, as line-of-sight components have the largest contribution to the received signals in VLC, the performance of VLC systems is sensitive to link blockage and transceiver misalignment. Recently, intelligent reflecting surfaces (IRSs) were proposed to improve the VLC system performance, with advantages that include relaxing the need for LOS links between transmitters and receivers. This work presents state-of-the-art developments in IRS-aided VLC systems for outdoor applications.
  • AERIAL RIS-AIDED PHYSICAL LAYER SECURITY: OPTIMAL DEPLOYMENT AND PARTITIONING

    Arzykulov, Sultangali (2023-01-30) [Poster]
    We propose a novel approach for enhancing physical layer security (PLS) in wireless networks by utilizing a combination of reconfigurable intelligent surfaces (RIS) and artificial noise (AN). The proposed aerial RIS (A-RIS) concept utilizes a RIS-attached unmanned aerial vehicle (UAV) that hovers over the network area to improve the signal quality for legitimate users and jam that of illegitimate ones. We propose a method of virtually partitioning the RIS, such that the partition phase shifts are configured to improve the intended signal at a legitimate user while simultaneously increasing the impact of AN on illegitimate users. Closed-form expressions for both legitimate and illegitimate users’ ergodic secrecy capacity (ESC) are derived and validated. Then, optimization problems are formulated to maximize network ESC by optimizing the 3D deployment of the A-RIS and RIS portions for users subject to predefined quality-of-service constraints. Simulation results validate closed-form solutions and demonstrate that the proposed joint A-RIS deployment and partitioning framework can significantly improve network security compared to benchmarks where RIS and AN are separately used without deployment optimization. Additionally, thanks to the availability of closed-form optimal RIS portions, the proposed deployment approaches converge in less than a second, making it suitable for dynamic A-RIS deployment.

View more