Conference PaperPDF Available

Inter-cell interference coordination in LTE-A HetNets: A survey on self organizing approaches

Authors:

Abstract and Figures

Heterogeneous Networks (HetNet) are multi-mode, multi-layer, and multi-band structured and utilize cells of varying sizes. The goal behind the implementation of HetNets involves incrementing the capacity of the established network, modifying spectrum use, lowering the capital and operating costs, and offering steady user-based experience of network architecture. However, these random small cell deployments cause severe problems and results interference in the network. Therefore, the ultimate is the total system performance degradation and this interference becomes a key challenge in HetNet. This article investigates the performances of the current trends and approaches of interference in self organizingnetwork for LTE-A.
Content may be subject to copyright.
2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)
978-1-4673-6232-0/13/$31.00 ©2013 IEEE 196
Inter-cell Interference Coordination in LTE-A
HetNets: A Survey on Self Organizing Approaches
M. K. Hasan, A.F. Ismail, Aisha H. Abdalla,
Khaizuran Abdullah, HAM. Ramli, Shayla Islam
Department of Electrical and Computer Engineering,.
International Islamic University Malaysia
hasankamrul@msn.com
Rashid A. Saeed
Department of Electronics Engineering
Sudan University of Science and technology
Faculty of Engineering
eng_rashid@ieee.org
AbstractHeterogeneous Networks (HetNet) are multi-mode,
multi-layer, and multi-band structured and utilize cells of
varying sizes. The goal behind the implementation of HetNets
involves incrementing the capacity of the established network,
modifying spectrum use, lowering the capital and operating
costs, and offering steady user-based experience of network
architecture. However, these random small cell deployments
cause severe problems and results interference in the network.
Therefore, the ultimate is the total system performance
degradation and this interference becomes a key challenge in
HetNet. This article investigates the performances of the current
trends and approaches of interference in self organizingnetwork
for LTE-A.
Key Wordsinter-cell interference;cognitive radio; LTE-A;
femtocell.
I. INTRODUCTION
The number of wireless subscribers have increased
exponentially with time and telecommunication companies
are perennially challenged to meet the customers’
requirements for increased coverage and faster data transfer
rates.The release 8/9 standard provides major benefits in High
Speed Packet Access (HSPA) which includes better spectral
efficiency, reduced latency on account of its Internet Protocol
(IP) architecture, and greater throughputs[1]. Nevertheless,
inspite of its enhanced performance, Release 8/9 is not up to
the par in terms of the advanced standards set by the
International Mobile Telecommunications (IMT) for fourth
generation mobile networks. Such networks were defined by
the International Telecommunication Union (ITU).
Accordingly, to meet such necessities which is for downlink
data rates of up to 500 Mb/s and 1 Gb/s for mobile and
nomadic users, respectively, LTE Release 10 is now under
standardization. In HetNet radio link quality can be enhanced
due to the reduced distance between transmitter and receiver,
and the larger number of cells allows for more efficient
spectrum reuse and therefore larger data rates. As a result,
HetNets are expected to be one of the major performance
enhancement enablers. Among the low-power nodes in a
HetNet, Pico-eNodeBs and HeNodeBs are very important part
for capacity enhancement and coverage extension within the
coverage areas of eNodeB. In Figure. 1 HetNet network
scenario is decomposed. LTE-A HeNodeBs are observed as a
promising alternative for mobile operators to develop
coverage and provide high-data-rate services in a cost-
effective manner by decreasing the macro-eNodeB traffic load
and offloading it over public broadband connections to core
network. In order to evade interferences, HeNodeBs
synchronization is veritably important. The co-channel
deployment in macro-eNodeB and HeNodeBs could increase
the capacity of the network manifold through high spatial
frequency reuse. However, co-channel deployment in macro-
eNodeB and HeNodeBs results interference in the network
which becomes a key challenge in HetNet.
The rest of the paper is organized as follows. Section 2 the
architecture, Section 3 related works, Section 4 Interference
approaches and performance analysis, and in section 5
summarizes the paper.
Fig. 1: Network structure of HetNet Scenario in LTE-A
II. LTE-A SYSTEM ARCHITECTURE
LTE-A is set with forceful performance requirements that
depend on physical layer technologies such as Orthogonal
Frequency Division Multiplexing (OFDM), Multiple-Input
Multiple-Output (MIMO) systems, and Smart Antennas for
accomplishing these targets. In Figure. 2 displays an OFDM
signal [2] with 5 MHz bandwidth. It is significant that the data
197
symbols are individually modulated and transmitted over a
densed spaced orthogonal sub-carriers.
Fig. 2: Frequency-time illustration of an OFDM Signal [2]
In downlink, the subcarriers are divided into resource
blocks which empower the system to be capable of arranging
the data across standard numbers of subcarriers compartment
wise. Resource blocks comprise of 12 subcarriers, one slot in
the time frame irrespective of the general LTE-A femtocell
signal bandwidth (See in Figure. 3). It can be understood that
dissimilar LTE-A signal bandwidths will have diverse
numbers of resource blocks. Furthermore, the subframes are
assembled in 10 msradio frames, which holds two 5 ms halves
containing the signals essential to acquire the physical identity
of the cell. The signals are the primary and secondary
synchronization signals for acquisition channels, also called
the physical cell identity (PCI) of the cell, and the physical
broadcast channel (PBCH), be responsible for some critical
system information such as the DL transmission bandwidth
and the number of DL antenna ports. The acquisition channels
share the property of spanning the middle six RBs of the
system band-width [3].
For the LTE uplink, a different perception uses of the
access technique while still using OFDMA technology, the
implementation is known as Single Carrier Frequency
Division Multiple Access (SC-FDMA). With the RF power
amplifier that transmits the radio frequency signal through the
antenna to the base station being the maximum power item
inside the mobile, it is essential that it functions as competent
mode as possible [4]. However, it can be meaningfully
affected by the procedure of radio frequency modulation and
signal format. Signals containing a large peak to average ratio
and necessitate linear amplification do not lend themselves to
the usage of efficient RF power amplifiers. Consequently the
implication of a transmission mode has a continuous power
level while in function. However, OFDM contains a high peak
to average ratio. While this is not a difficulty for the base
station where power is an imprecise problem, it is unsuitable
for the mobile. Thus, LTE-A makes use of a modulation
method addressed as SC-FDMA- Single Carrier Frequency
Division Multiplex. This is hybrid format and integrates the
low peak to average ratio offered by single-carrier systems
along with the multipath interference resilience as well as
flexible subcarrier frequency allocation offered by OFDM. In
LTE-A the guard interval is a cyclic prefix (CP) which is
inserted prior to each OFDM symbol.
Fig. 3: illustration of for OFDMA DL Physical layer arrangement [3]
In the time domain, adding a CP to each symbol can be
useful to mitigate inter-OFDM-symbol-interference due to
channel delay spread. The data throughput capacity will be
reduced once the CP length is too long. For LTE-A, the
standard length of the cyclic prefix has been chosen to be 4.69
µs . This enables the system to accommodate path variations
of up to 1.4 km. With the symbol length in LTE set to 66.7 µs
[2]. In Figure. 4 demonstrated the CP adding in a single
carrier transmission.
However, the block-wise single carrier generation
equalization need to most accurate and the channel should be
constant over time span corresponding to the size of the
processing block.
This constraint provides an upper limit on the block size N
that fully depends on the rate of the channel variations.
Additionally, The OFDM subcarrier spacing depending on the
rate of the channel variations [2].
Fig. 4: CP adding in a single carrier transmission[2]
III. LITERATURE REVIEW
In order to achieve a solution, researchers have considered
various types of industrial challenges towards large
deployment of HeNodeB, The interference occurs vastly in
macro-eNodeB-to-macro-eNodeB, HeNodeB-to-HeNodeB,
and macro-eNodeB-to-HeNodeB, thus aggravating the
performance of the system. The cell edges users suffer from
198
low throughput, with the increasing number of cells, which is
caused by interference [5].The authors in [6][7], studied open
vs. closed access for uplink of HeNodeB OFDMA based
networks. Open access reduces interference and endow witha
reasonable way to increase the capacity of the operator’s
network. Moreover, authors showed numerically and by
simulations that the certainty is more problematical and be
subject to dense cellular user. For instance, closed access is
characteristically superior at sky-scraping user concentrations
in orthogonal multiple access. The authors inspected the
impacts of access modes and directional antenna on link
consistency and ability for the OFDMA-based HeNodeB [8].
However, under the link steadfastnesscondition of in building
and outdoor users, the enhancement in femtocell capacity due
to open access mode is minor. The interference can be
categorized in to two section which is discussed as below:
A. Co-tier Interference
Co-tier interference is consigned based on the undesirable
signals received by UEs from the HeNodeB adjacent co-
channel. Co-tier refers to interfering signal that is received
from the similar network tier in close access mode. The
interference can be handled effectively with the ICIC
techniques standardized by 3GPP in LTE/LTE-A. HeNodeBs
are usually deployed by end users and has a lack of influential
backhauls, henceforth fast reacting ICIC techniques are
impervious [9][10]. Thereby, co-tier interference is formed by
HeNodeBs owing to the low isolation of walls or windows.
The avoidance of co-tier interference is achievable by
OFDMA HeNodeBs by properly assigning frequency
resources among users in a bigger time scale or by self-
organizing methods.
B. Cross-tier Interference
Conceptually, cross-tier interference is significant for
macro-eNodeB users near Closed Subscriber Group (CSG)
HeNodeBs, as they are not permitted to connect for closing
HeNodeBs with reduced path losses than their operating
macro-eNodeBs, which occurs due to the connectivity rights.
Thus, the macro-eNodeB users may experience outage due to
this reason and the general communication, which usually
takes place, may not be continued since there will be no
competent backhaul connection between macro-eNodeBs and
HeNodeBs [9]. The DL/UL cross-tier interference scenarios
has been shown in Figure. 5.
Fig. 5. DL/UL cross-tier interference scenarios in HetNet
Consequently the equipment becomes used to its ‘nature to the
local context. The authors presented access control
techniques[12][13][14][15][16], Sensing Approaches
[17],Hardware approach [18], interweave techniques[19] in
self organizing networks. The performance along with the
algorithm is described in the next sections.
IV. PERFORMANCE ANALYSIS OF CR BASED
APPROACHES
A. Access control Techniques
A prodigious compact of power allocation polices and
interference control approaches have been proposed for
spectrum sharing CRNs [12]. For instance, the optimal power
allocation schemes to maximize the capacity of the secondary
user with an effective protection of the primary user (PU) for
spectrum-sharing CRNs. wavelet energy entropy
basedspectrum sensing algorithm was proposed to sense the
spectrum in presence of PU comparing with signals to a
threshold [11][13]. However, in this algorithm sensing delay is
observed which is not applicable in the HetNets. To sense the
spectrum in CRN SNR based adaptive spectrum sensing
algorithm was proposed which was the mix techniques of
energy detector and cyclostationary detection. The algorithm
shows that it is working as like OR function with this two
detection [14].However, it can be seen that the lower SNR rate
this technique is not suitable for HetNets. In Figure.6(a) and
6(b) shows the block diagram of energy detector and
cyclostationary detection.
(a)
(b)
Fig. 6. Block diagram of (a) energy detector. (b) cyclostationarydetector[14]
A power controlled based spectrum sensing techniques
was proposed[15] using interference level threshold to
coordinate the interference. The technique was able to bind
the interference limit. However, the technique was proposed
for TV white space reuse which is imperfect for the licensed
spectrum such as HeNodeBs neighbor networks. The
calculated probability density ofentire cell throughput for
closed and open access at a home environment where
considered a largely deployment HeNodeB and macro-
eNodeB [16]. As a result of the critical interference produced
by HeNodeB to users which are in to the macro-eNodeB
coverage. It is found that open access performance satisfactory
than closed access. The closed access technique be inclined
tohave the whole cell throughput to 15% lower than open
199
access method. In hybrid access, the accessibility of HeNodeB
can be precise and it can be constructed to assurance a
leastrecital. Additionally, the allocation of HeNodeB resources
between subscribers and non-subscribers should be highly
tuned. However, the hybrid access techniquerequired for
adjustment to the HeNodeB arrangement developments.
B. Neighbour Network Sensing Approach
HeNodeB neighbour networks sensing approach comprises
of constructing the sensing capability into the HeNodeB
neighbour networks which are proficient of sensing the users
in range. Hence, it may accurately and proficientlyemploy its
spectrum by means of the channel sensing, which is alike to a
user terminal working in idle mode [17]. In Figure. 7, a
depiction of adjacent HeNodeBs sensing is shown.
Fig. 7. Neighbor Network sensing approach[17]
C. HeNodeB-HeNodeB interoperability Approach
HeNodeB-HeNodeB interoperability is an approach where
the neighboring HeNodeB require interlink with each other for
the aim of checking the user information and the mode of
operation. For this type of communication between neighbor
HeNodeBs can occur through a direct link between HeNodeB
namely HeNodeB gateways, or with the use of the UE (Figure.
3)[17]. Therefore, a caution is given by HeNodeBs before
there is an arrival of the current and any other future
movements of their neighboring cells. These messages can be
replaced through the HeNodeB gateway, by utilizing the X2
interface between cells. The broadcasting messages can also
be interchanged via the mobile terminals. Nonetheless, there is
not much competition present between them to operate in
certain circumstances where the HeNodeBs are out of range of
coverage with another HeNodeBs. In Figure. 8, user 3 has
been positioned at the cell edge of two overlapping HeNodeBs
in which they are unseen to each other. Such a user is likely to
suffer from this circumstance due to the interference, as
HeNodeBs are unable to coordinate their resource allocation
due to the vacancy of information acquired in the sensing
D. UE supported Sensing Approach
This kind of approach is capable of performing a side -step
HeNodeB range difficulties by the utilization of measurement
report that may be functioned by UEs and acknowledged by
the HeNodeBs. The UEs requires sending the information to
the HeNodeB regarding the current positioning, receive signal
strength as well as active sub channels of the operating and the
toughest adjacent cells (both macro-eNodeB and HeNodeB),
in order to function and self-optimize HeNodeB more
efficiently. This approach gives an opportunity to UEs for
further their information about their instantaneous radio
environment (user location) to their FAPs and aid in
diminishing interference according to Figure. 9 scenario[17].
.
Fig. 8. HeNodeB-HeNodeB interoperability [17]
Fig. 9. UE supported sensing [17]
E. Hardware Centric Approaches
A presentation of a hardware centric approach for interference
cancellation techniques employed in layer1 in order to
coordinate interference[18]. Practically, in the cellular system
the downlink and uplink characteristics are very different for
increasing the capacity of cellular systems. And from the
downlink, each receiver requires the decode of a single desired
signal from the K of intra-cell signals, while suppressing other
cell interference from a few dominant neighbour cells,
according to Figure.10. Due to the origin of K user signal is
from the base station, the link is synchronous and the K-1
intra-cell interference is able to be orthogonalized at the base
station transmitter [18]. However, some quadration is lost in
the channel. Besides that, the base station receiver must
decode all K desired users in the uplink, while suppressing
other cell interference from independent sources, as shown in
Figure. 11.
Fig. 10. Downlink interference scenario [18]
Fig. 11: Uplink interference scenarios [18]
200
F. Interweave Technique
In [19][20], authors have detailed models for cognitive radios
on the basis of the overlay technique through two switch
cognitive radio model. In where, HeNodeBs approves various
allocation methods to attain diverse spatial reuse levels.
Figure. 12 illustrated diverse standpoints on switch model in
cognitive radio with transmitter ST and receiver SR where
nodes are noted as A, B and C signifying the PU of the
spectrum. It can be observe when the transmitter and receiver
are far away, the PU actions are more distributed and lower
correlation. For capacity of the two switch model, authors
provided tight upper and lower bounds of cognitive radio
channel which is expressed in equation 1 [19].
Fig. 12. Two switch model cognitive radio transmitter and receiver [19]
(1)
In a lower bound capacity, a genie argument is used to attain a
lower bound capacity while considering the cognitive
transmitter receiver pair. Assumption is made on a genie
which offers side information to the receiver with the use of
every channel in a variable G. The genie bound result
demonstrates that the capacity increasing because of the genie
information G given to the receiver are not allowed to surpass
the entropy genie information rate. This is specified in
equation 2 and 3 [19].
(2)
(3)
where, is the entropy rate of the genie information G
specified the receiver state . When rises, equation 3 shows
that the genie lower bound swiftly approaches the capacity
with whole information at the receiver. Hence it is assumed
that the capacity of the two switch channel model equation
1.The positioning of the primary users in the system are
apprehended by a poisson point process with density of
primary nodes per unit area where the probability of finding k
primary in the area can be stated in equation 4 and the
capacity of the secondary link can be foundthrough using the
equation 5[19]. Where, P is noted as the power constraint at
the secondary transmitter.
(4)
(5)
Figure. 13 illustrated the secondary user throughput
against the radius of the sensing regions Rsfor various primary
user densities λ. At the same time with the increase of sensing
region the sensitivity of detection keeps increasing, the
average number of communication opportunities reduce
causing a little throughput according to the expected level.
Furthermore, in these methods HeNodeB behave as secondary
user with resource level information that can look for
provisional frequency holes for ingenious allocation. So,
HeNodeB-UEs and macro-eNodeB UEs function on
orthogonal bands, and less cross-tier interference has
observed. Nevertheless, this approach limits the system
capacity as no spatial reuse is adopted.
Fig. 13. Throughput vs. sensing radius for different values of [19]
Fig. 14. Illustration of transmission radius on transmission capacities [20]
201
V. CONCLUSION
Coordination of inter-cell interference in LTE-A HetNet is
urge for the operators in order to mitigate interferences as well
as channel capacity increase. In this paper, we presented the
architecture of the OFDMA techniques and investigated the
current proposed approaches and techniques with pros and
cons. However, it can be summarized that self organinzing
techniques are promising in terms of lessen interferences than
the other techniques.
REFERENCES
[1] Lopez-Perez, David, Ismail Guvenc, Guillaume de la Roche,
MariosKountouris, Tony Quek, and Jie Zhang. Enhanced
intercell interference coordination challenges in heterogeneous
networks, IEEE Wireless Communications, 2011.
[2] Erik D., S. Parkvall, J. Skold, 2011. 4G: LTE/LTE-Advanced for
Mobile Broadband: LTE/LTE-Advanced for Mobile Broadband,
Published by Elsevier.
[3] Aleksandar D., J. Montojo, Y. Wei, T. Ji, T. Luo, M.
Vajapeyam, T. Yoo, O. Song, and D. Malladi, A Survey
On3GPP Heterogeneousnetworks, IEEE Wireless
Communications, 8(3), pp.10-21, Jun. 2011,doi:
10.1109/MWC.2011.5876496.
[4] Holma H. and A. Toskala, 2011. LTE for UMTS Evolution to
LTE-Advanced. John Wiley & Sons, 2 edition.
[5] Mehmet Y., M. Farhad, N. Sanjiv, P. Akhilesh, J. Nick, R.
Balaji and R. Andy, 2009. Interference Management and
Performance Analysis of UMTS/HSPA+ Femtocells, IEEE
Communications Magazine, IEEE Journal and Magazine,
47(9),pp. 102 109, doi:10.1109/MCOM.2009.5277462
[6] Mhiri, F., K. Sethom, and R. Bouallegue. A survey on
interference management techniques in femtocell self-organizing
networks, Journal of Network and Computer Applications, 2013.
[7] Xia P., Chandrasekhar V, Andrews JG. , Open vs. closed access
femtocells in the uplink. IEEE Trans Wireless Commun
2010;9(12):3798809
[8] Huang J., W. Li-Chun, C. Chung-Ju, S. Wen-Shan, Design of
optimal relay locations in two-hop cellular systems.
ACM/Springer Wireless Networks 2010;16(8)
[9] Jun Z., Hui T., Peng T.,Y. H., Liqi G., 2012. Dynamic
Frequency Reservation Scheme for Interference Coordination in
LTE-Advanced Heterogeneous Networks,IEEE Vehicular
Technology Conference (VTC Spring), pp. 1-5, doi:
10.1109/VETECS.2012.6239915.
[10] M. K. H., R. A. Saeed, A. A. Hashim, S. Islam, R.A. Alsaqour
and T. A. Alahdal, Femtocell Network Time Synchronization
Protocols and Schemes. Research Journal of Applied Sciences,
Engineering and Technology, 4(23): 5136-5143. 2012
[11] Feng G., R. Rangnekar, A. Radhakrishnan, S. Nair, A. Fayez, Q.
Chen, A. Young,Y. Wang, M. D. Silvius, T. Brisebois, G.
Marballie, X. Cheng, N. He, B. Li,C. W. Bostian, and M. Hsiao,
A heterogeneous cognitive radio network enabling dissimilar
cooperative spectrum sensing, dynamic spectrum access,
interoperability, IEEE ComSoc, DySPAN, 2008.
[12] Kang X, Zhang R, Liang Y-C, Garg HK., Optimal power
allocation strategies for fading cognitive radio channels with
primary users outage constraint. IEEE Journal of Selected
Areas Communication 2011;29(2):37483.
[13] Z. Jiang, Q. Zhang ; Y. Wang, X. Shang, Wavelet packet
entropy based spectrum sensing in cognitive radio, IEEE
Conference on Communication Software and Networks, pp.
293-298, 2011, doi: 10.1109/ICCSN.2011.6014054
[14] E. Waleed, Najam H. and Hyung S. K., SNR-BASED
ADAPTIVE SPECTRUM SENSING FOR COGNITIVE,
International Journal of Innovative Computing, Information and
Control, 8(9), pp. 6095-6105, 2012
[15] R. Harish Kumar, T. SyamaSundara, Dr. N. Padmaja,
Department of Electronics and Communication Engineering,
Power Control Mechanism for Cognitive Radios via Spectrum
Sensing with Interference Management,International Journal of
Engineering Trends and Technology (IJETT) - 4(9), April 2013.
[16] Lopez-Perez D., Valcarce A., De La Roche G., Enjie L., Jie Z.,
Access methods to WiMAX femtocells: a downlink system-
level case study. In: Proceedings of the 11th IEEE Singapore
international conference on communication systems, 2008
[17] Lopez-Perez, D., Valcarce, A. , De la Roche, G.,
JieZhang,OFDMA Femtocells: A Roadmap on Interference
Avoidance. IEEE Communications Magazine , pp.41-48,
September 2009
[18] W. Yuanye, and I. P. Klaus, Performance Analysis of Enhanced
Inter-cell Interference Coordination in LTE-Advanced
Heterogeneous Networks, IEEE 75th Vehicular Technology
Conference (VTC Spring), pp. 1-5, Jul. 2012,
doi:: 10.1109/VETECS.2012.6240233
[19] Srinivasa S., SA. Jafar, The throughput potential of cognitive
radio: a theoretical perspective. IEEE Communication
Magazine,45(5), 2007pp.739.
[20] Shin-Ming C., Weng A. Chon, F. Tseng and K. Chen, Design
And Analysis Of Downlink Spectrum Sharing In Two-Tier
Cognitive Femtocell Networks, IEEE Transaction On Vehicular
Technology, Vol. 61, No. 5, pp. 2194-2207, 2012.
... Interference issue arises when different BS types, such as MCs and SCs (i.e. microcells, picocells, and femtocells) coexist in the same network [3]. Inter-layer interference and intra-layer interference are two different ways that interference can arise [4]. ...
Article
The increasing demand for data, driven by advancements in technology, requires expanding coverage and enhancing network capacity. This expansion presents certain challenges, such as unnecessary Handover (HO) and interference, which can lead to a degradation in Quality of Service (QoS). To provide better QoS, it is vital to precisely model the HO decision-making process with optimal cell selection ensuring service continuity with minimal disruption. This paper investigates the performance of Analytic Hierarchy Process (AHP), Entropy, Standard Deviation (STD), and Weighted Sum Model (WSM) comparatively, while considering attributes such as Reference Signal Received Power (RSRP), Signal-to-Interference-Plus-Noise Ratio (SINR), channel capacity, and cell capacity. Additionally, the Technique for Order Performance by Similarity to Ideal Solution (TOPSIS) is utilized to rank candidate cells for HO decisions. The performance of the considered weighting methods has been analyzed in a dense Small Cell (SC) Long-Term Evolution-Advanced (LTE-A) Heterogeneous Network (HetNet) environment based on system Key Performance Indicators (KPIs) such as HO Rate (HOR), HO Failure (HOF), Radio Link Failure (RLF), and HO Ping-Pong (HOPP). The evaluations have shown a trade-off between the methods in different KPIs. The findings highlight the importance of the weighting methods on HO decision, considering the significance of the specific KPIs.
... The probability of error (8) The CCRN examines the channel state and the potential for using such a spectrum for communication when a primary communication system is in operation and the channel status is unstable or communication is weak, in which case there is only one condition that the CCRN channel is available (high priority), and the NOMA users can use it [35][36][37][38]. ...
... Therefore, an attacker getting a chance to impersonate a domain for just a limited duration can manage to get a domain authentication certificate. In recent times there is ample evidence that even a single CA can result in a successful impersonation attack [3][4][5][6][7][8][9][10][11]. One of the initial researches suggests preventing such an attack can be done using a new notary system [12]. ...
Article
Full-text available
The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility of cloud service providers to protect user data from unauthorized access. Historically, a third-party auditor (TPA) is used to provide security services over the cloud. With the tremendous growth of demand for cloud-based services, regulatory requirements, there is a need for a semi to fully automated self sovereign identity (SSI) implementation to reduce cost. It's critical to manage cloud data strategically and extend the required protection. At each stage of the data migration process, such as data discovery, classification, and cataloguing of the access to the mission-critical data, need to be secured. Cloud storage services are centralized, which requires users must place trust in a TPA. With the SSI, this can become decentralized, reducing the dependency and cost. Our current work involves replacing TPA with SSI. A cryptographic technique for secure data migration to and from the cloud using SSI implemented. SSI facilitate peer-to-peer transactions, meaning that the in-between presence of TPA needs no longer be involved. The C2C migration performance is recorded and found the background or foreground replication scenario is achievable. Mathematically computed encrypted and decrypted ASCII values for a word matched with the output by the algorithm. The keys generated by the algorithm are validated with an online validator to ensure the correctness of the generated keys. RSA based mutual TLS algorithm is a good option for SSI based C2C migration. SSI is beneficial because of the low maintenance cost, and users are more and more using a cloud platform. The result of the implemented algorithm shows that the SSI based implementation can provide a 13.32 Kbps encryption/decryption rate which is significantly higher than the TPA method of 1 Kbps.
... Therefore, an attacker getting a chance to impersonate a domain for just a limited duration can manage to get a domain authentication certificate. In recent times there is ample evidence that even a single CA can result in a successful impersonation attack [3][4][5][6][7][8][9][10][11]. One of the initial researches suggests preventing such an attack can be done using a new notary system [12]. ...
Article
Full-text available
The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility of cloud service providers to protect user data from unauthorized access. Historically, a third-party auditor (TPA) is used to provide security services over the cloud. With the tremendous growth of demand for cloud-based services, regulatory requirements, there is a need for a semi to fully automated self sovereign identity (SSI) implementation to reduce cost. It’s critical to manage cloud data strategically and extend the required protection. At each stage of the data migration process, such as data discovery, classification, and cataloguing of the access to the mission-critical data, need to be secured. Cloud storage services are centralized, which requires users must place trust in a TPA. With the SSI, this can become decentralized, reducing the dependency and cost. Our current work involves replacing TPA with SSI. A cryptographic technique for secure data migration to and from the cloud using SSI implemented. SSI facilitate peer-to-peer transactions, meaning that the in-between presence of TPA needs no longer be involved. The C2C migration performance is recorded and found the background or foreground replication scenario is achievable. Mathematically computed encrypted and decrypted ASCII values for a word matched with the output by the algorithm. The keys generated by the algorithm are validated with an online validator to ensure the correctness of the generated keys. RSA based mutual TLS algorithm is a good option for SSI based C2C migration. SSI is beneficial because of the low maintenance cost, and users are more and more using a cloud platform. The result of the implemented algorithm shows that the SSI based implementation can provide a 13.32 Kbps encryption/decryption rate which is significantly higher than the TPA method of 1 Kbps.
Conference Paper
The ever-increasing growth in wireless applications and services indicates the importance of effective use of the limited radio spectrum. Cognitive Radio enables unauthorized secondary users opportunistic access to channels not used by primary users if interference with primary users (PUs) does not exceed pre-defined limits. System modules may be removed according to different Quality of Service (QoS) and SINR required for the base station (BS). This paper is proposing a joint admission and power control scheme (JAPC) as a self-organizing algorithm (SOA) to solve the problem of the fairness related to secondary users (SUs) in cognitive cell. Results show that the proposed scheme obtains more fairness and bitrate compared to previous work.KeywordsPower controlCognitive radio (CR)FairnessAdmission controlQuality of service (QoS)Self-organizing algorithm (SOA)Joint admission and power control scheme (JAPC)
Article
We propose a distance-based inter-cell interference coordination (ICIC) scheme in small cell networks (SCNs). While most of the previous works focus on a randomly selected user called a typical user, we focus on an edge user because the main purpose of ICIC is to improve the performance of an edge user. Since there are many inactive small cell base stations (SBSs) in SCNs, a simple criterion for an edge user such as being located near a cell boundary is not appropriate for SCNs. To accurately detect edge users experiencing severe performance degradation, we newly define an edge user in SCNs based on the nearest active neighbor SBS. We then apply our scheme only to edge users where SBSs within so-called the cooperation radius from each edge user cooperate. With the help of the stochastic geometry we obtain a semi-closed expression for the coverage probability of an edge user with our scheme. We investigate two tradeoffs on the resource efficiency of a network and the coverage probability of an interior user. We then determine the optimal cooperation radius that maximizes the coverage probability of an edge user considering the two tradeoffs. Our analytical results are validated through simulations.
Chapter
Wide-area measurement systems in the smart grid are how to reply securely and consistently to several disturbances in the smart grid applications. The enthusiasm for that type of application arises from the fact that with the support of communication, synchronized measurements from various remote substations in a grid network can greatly enhance the accuracy and timeliness of detecting the source of uncertainties. Therefore, proper signal processing using the right window function can mitigate such uncertainties. Hence, this paper provides an overview of window functions and then presents and compares the window functions to scrutinize the best window function in designing the right FIR filter, so that measurement and fault detection as well as protection can be ensured by the WAMS in smart grid Internet of Things systems. FIR filter is the ideal filter when using windows methods, which is designed to have an exact linear phase and is great in shaping their magnitude response. Three types of windows are discussed in the window function’s project, that is, Hanning window (HNNW), HMMW, and Blackman window (BW). Matlab simulation used to generate the frequency and time domain for the magnitude of three windows with N is set to 4, 8, 16, 32, 64, and 1028. The Hanning, Hamming, and Blackman windows used the same source code but have different general numerical equations. For the HNNW, the peak of the bell-shaped waveform in the time domain getting closer to 1 and the number of lobes per cycle increase as the number of samples, N, increase. Hamming window shows a similar characteristic wave as HNNW, but the starting and ending points do not touch the 0 or are known as the origin. For BW’s general numerical equation, an extra cosine is included which helps to reduce the side lobe. The time-domain graph of the Blackman signal touches the 0-axis, HNNW signal slightly touches the 0-axis, and Hamming signal does not touch the 0-axis at all. Hamming has a discontinuity in the signal and thus better in canceling the nearest side lobe. The frequency-domain graph of Blackman window has the widest main lobe width, has the lowest side lobe with approximately -60dB, lesser side lobe, and the largest side lobe roll-off rate compared to Hamming and Hanning. HNNW is useful for analyzing transients longer than the time duration of the window and for general-purpose applications. HNNW is suitable to be used in most engineering cases due to good frequency resolution and reduced spectral leakage, which is satisfactory in 95% of cases. Blackman window is applicable for single-tone measurement because it has a low maximum side lobe level and a high side lobe roll-off rate.KeywordsWindow functionHamming windowHanning windowBlackman windowsWAM
Conference Paper
Full-text available
Low Power Wide Area Network (LPWAN) is one of the fastest growing network techniques provides efficient communciations for smart cities, e-Health, industry 4.0 and other applications. LPWAN enables long-rang communcaitons for M2M and cellular IoT networks. Narrowband-IoT (NB-IoT) is a type of LPWAN developed by 3GPP to connect a wide stream of IoT services and devices. NB-IoT systems rely on the mechanism of repeating the same signal every specified period of time in order to improve radio coverage better than it is in LTE systems. Repetition process is used to enhance the coverage of NB-IoT and for upgrade throughput as well. However, increasing the repetition of the signal significantly may give a negative result relative to the bandwidth limits. A cooperative relay (CoR) can be used beside repetition mechanism to helps reduce bandwidth stress. Moreover, the use of CoR for NB-IoT in physical uplink shared channel with repetitions will enhance the throughput. This paper will evaluate the performance of the CoR to enhance physical uplink shared channel in NB-IoT. The NB-IoT system model is simulated bu MATLAB to demonstrate the use of Cooperative relay (CoR) scheme in NPUSCH for NB-IoT for performance evaluation and comparison of using CoR scheme by considering metrics like data rate, throughput, and delay. The results conclude that in using CoR in NB-IoT gives high performance in overall NoT network throughput.
Article
Full-text available
The femtocell network allows connecting to cellular network through broadband connection. In femtocell, time with network synchronization becomes a critical issue at present. Synchronization is a process which is required in the femtocell network due to the shortcomings of centralized coordination between a number of femtocell Base Station (fBS) and clock synchronization server. Time synchronization procedure allows exchanging message that contains timestamp and delay measurement. There are several time synchronization protocols and algorithms based on precision which are Network Time Protocol (NTP), Simple Network Time Protocol (SNTP), IEEE 1588 Timing Protocol, enhancement of IEEE 1588 timing and receiverreceiver synchronization scheme. In this study, we investigated some of the time synchronization protocols and schemes for femtocell network. In addition, we proposed intra-cluster synchronization scheme to minimize the clock offset and skew for better synchronization accuracy. The proposed scheme is able to perform precise synchronization for clock offset and clock skew than the existing receiver-receiver synchronization scheme.
Article
Full-text available
Cognitive radios are indispensable to shift paradigm from conventional ex-clusive spectrum assignment to dynamic spectrum access. They can boost up spectrum utilization significantly, by dynamically accessing unused primary spectrum while bring-ing no harm to primary users. The envisioned radio calls for fast and accurate spectrum sensing. Researchers are focusing on cooperative spectrum sensing to improve reliability but still there is room for improvement in local spectrum sensing. In cooperative spectrum sensing, it will be hard to cooperate with local network nodes in a short time as cogni-tive radio has to operate in heterogeneous wireless networks. Most of the renowned local spectrum sensing technique in the literature up to now is cyclostationary feature detec-tion, although it is reliable but computationally complex. Other well-known local sensing techniques are energy detection and matched filter detection. This paper proposes an adaptive local spectrum sensing scheme, in which cognitive radio can adopt one-order cyclostationary or energy detector for spectrum sensing on the basis of estimated SNR, which is calculated in advance for available channels. Simulation results indicate that we can achieve reliable results equal to one-order cyclostationary detection with less mean detection time.
Article
Full-text available
In two-tier networks consisting of a macrocell overlaid with femtocells in cochannel deployment and closed-access policy, spatial reuse is achieved at the price of severe intratier and cross-tier interference from concurrent transmissions. The interference causes significant performance degradation, particularly when coordination among base stations (BSs) is infeasible. Cognitive radio (CR) is a promising technique for interference mitigation, where femto-BSs with cognitive information accomplish concurrent transmissions while meeting a per-tier outage constraint. This paper studies the role of information sensed at femto-BSs on the transmission capacity. By exploiting different cognitive information, we propose spectrum-sharing schemes between macrocell and femtocell, as well as among femtocells, to improve spatial reuse gain. Bounds on the maximum intensity of simultaneously transmitting femtocells that satisfy a given per-tier outage constraint in these schemes are theoretically derived via a stochastic geometry model. We conduct simulations to evaluate the performance of the proposed schemes in terms of transmission capacity. The results confirm that, when femto-BSs acquire the knowledge of user channel statistics or user location information, significant spatial reuse gain can be achieved by exploiting the avoidance region and multiuser diversity.
Book
Written by experts actively involved in the 3GPP standards and product development, LTE for UMTS, Second Edition gives a complete and up-to-date overview of Long Term Evolution (LTE) in a systematic and clear manner. Building upon on the success of the first edition, LTE for UMTS, Second Edition has been revised to now contain improved coverage of the Release 8 LTE details, including field performance results, transport network, self optimized networks and also covering the enhancements done in 3GPP Release 9. This new edition also provides an outlook to Release 10, including the overview of Release 10 LTE-Advanced technology components which enable reaching data rates beyond 1 Gbps. Key updates for the second edition of LTE for UMTS are focused on the new topics from Release 9 & 10, and include: LTE-Advanced; Self optimized networks (SON); Transport network dimensioning; Measurement results.
Conference Paper
The performance of enhanced Inter-Cell Interference Coordination (eICIC) for Long Term Evolution (LTE)- Advanced with co-channel deployment of both macro and pico is analyzed. The use of pico-cell Range Extension (RE) and time domain eICIC (TDM muting) is combined. The performance is evaluated in the downlink by means of extensive system level simulations that follow the 3GPP guidelines. The overall network performance is analyzed for different number of pico-eNBs, transmit power levels, User Equipment (UE) distributions, and packet schedulers. Recommended settings of the RE offset and TDM muting ratio in different scenarios are identified. The presented performance results and findings can serve as input to guidelines for co-channel deployment of macro and pico-eNBs with eICIC.
Conference Paper
Heterogeneous networks are employed in the next generation communication systems to enhance area spectral efficiency (ASE) and reduce system cost. However, the cell splitting gain can only be achieved when both co-tier interference and cross-tier interference are properly handled. To reduce cross-tier interference on the low SINR and interference limited UEs, a dynamic scheme of frequency reservation for interference coordination (DFR-IC) is proposed in this paper. Two factors to model the co-tier and cross-tier interference ratio of user equipments (UEs), namely RImacro and RIpico, are introduced. Proper numbers of resource blocks (RBs) in each tier are reserved for these UEs to enhance their SINRs. Simulation results show that the proposed scheme can greatly improve the performance of the UEs at cell edge, but it decreases marginal throughput compared to full-reuse and non-reuse scheme.
Article
Cognitive radios are promising solutions to the problem of overcrowded spectrum. In this article we explore the throughput potential of cognitive communication. Different interpretations of cognitive radio that underlay, overlay, and interweave the transmissions of the cognitive user with those of licensed users are described. Considering opportunistic communication as a baseline, we investigate the throughput improvements offered by the overlay methods. Channel selection techniques for opportunistic access such as frequency hopping, frequency tracking, and frequency coding are presented. The trade-off between regulation and autonomy inherent in the design and performance of cognitive networks is examined through a simple example, which shows that the optimal amount of licensing is equal to the duty cycle of the traffic arrivals
Book
This book focuses on LTE with full updates including LTE-Advanced (Release-11) to provide a complete picture of the LTE system. Detailed explanations are given for the latest LTE standards for radio interface architecture, the physical layer, access procedures, broadcast, relaying, spectrum and RF characteristics, and system performance. Key technologies presented include multi-carrier transmission, advanced single-carrier transmission, advanced receivers, OFDM, MIMO and adaptive antenna solutions, radio resource management and protocols, and different radio network architectures. Their role and use in the context of mobile broadband access in general is explained, giving both a high-level overview and more detailed step-by-step explanations. This book is a must-have resource for engineers and other professionals in the telecommunications industry, working with cellular or wireless broadband technologies, giving an understanding of how to utilize the new technology in order to stay ahead of the competition. New to this edition: In-depth description of CoMP and enhanced multi-antenna transmission including new reference-signal structures and feedback mechanisms. Detailed description of the support for heterogeneous deployments provided by the latest 3GPP release. Detailed description of new enhanced downlink control-channel structure (EPDDCH). New RF configurations including operation in non-contiguous spectrum, multi-bands base stations and new frequency bands. Overview of 5G as a set of well-integrated radio-access technologies, including support for higher frequency bands and flexible spectrum management, massive antenna configurations, and ultra-dense deployments. Covers a complete update to the latest 3GPP Release-11. Two new chapters on HetNet, covering small cells/heterogeneous deployments, and CoMP, including Inter-site coordination. Overview of current status of LTE release 12 including further enhancements of local-area, CoMP and multi-antenna transmission, Machine-type-communication, Device-to-device communication