Aditya Trivedi - Academia.edu (original) (raw)
Papers by Aditya Trivedi
2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring)
In this paper, we present a distance and interference based decision-making framework for device-... more In this paper, we present a distance and interference based decision-making framework for device-to-device (D2D) communication mode selection (choosing one mode among dedicated mode, reuse mode, and cellular mode) and a power control approach for multiple D2D pairs underlaying cellular network. The proposed approach is based on the location of D2D users. If orthogonal resources are available and the D2D pair is close to each other, then the D2D dedicated mode is preferred. Otherwise, reuse (uplink or downlink) mode is utilized where interference is a prime concern. Reuse mode of D2D communication with allowable interference allows more users to be served with efficient spectrum utilization. Moreover, the power control approach is introduced to avoid the wastage of power and to reduce the impact of interference. Numerical results are provided to validate the significance of the proposed approach.
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), 2018
Rapid growth in the fifth generation (5G) wireless network applications demands new requirements ... more Rapid growth in the fifth generation (5G) wireless network applications demands new requirements on the data storage, computation, and networking. Thus, it will introduce new threats to the integrity, availability, and confidentiality. 5G is advantageous concerning high data rate, low latency, energy and spectrum efficient, higher capacity, and reliable connectivity. Currently, safeguarding information in the 5G wireless networks is the pivotal issue for research. In this paper, the importance of Physical Layer Security (PLS) for secure transmission of information in wireless networks are discussed. Some popular 5G technologies are studied in the context of security during transmission. With all this, significant issues and challenges are identified in the implementation of new technologies into reality. These technologies are mobile-health (m-health), cognitive radio networks (CRNs), constructive interference, massive multiple input multiple output (massive MIMO), non-orthogonal multiple access (NOMA) and simultaneous wireless information and power transfer (SWIPT). Future challenges and direction for the further study of such technologies are also given. Moreover, one numerical result is presented for the spectral efficiency in MIMO communication system.
Journal of Network and Computer Applications, 2020
Dividing a larger area into smaller subregions is a well addressed problem in Precision Agricultu... more Dividing a larger area into smaller subregions is a well addressed problem in Precision Agriculture (PA) where the existing application specific solutions (laboratory based) require human intervention and result in static region demarcation schemes. However, the boundary of a subregion is subject to change with various soil and environmental parameters. On the other hand, Wireless Sensor Networks (WSNs), a potential candidate to produce dynamic subregions due to its real-time decision making capability, are utilized as merely a data collection unit for PA. In an attempt to introduce the in-network decision making feature of WSN in PA, design of a novel three layered WSN-CPS architecture is presented in this work and at layer-I the distributed mechanism for region demarcation is proposed. The proposed scheme identifies nodes based on data values and position information, that serve as the boundary of a subregion and data transmitters to the base station for final decision making. Existing methods for boundary node detection identify network boundary nodes (not designed to demarcate the interior boundary), coverage hole boundary nodes (identifies boundary nodes of a smaller portion in network), and event boundary nodes (not able to identify outer boundary). The proposed work identifies network boundary nodes, coverage hole boundary nodes, and the subregion boundary nodes accurately. It takes various critical situations into account while labelling of nodes and shows its reliability in node failure conditions. Impact of varying transmission range and number of nodes is analyzed on proposed mechanism via simulation. In a comparative study with recent network boundary node detection scheme, decrease of 32% and 30% is seen at 200 and 300 nodes respectively in terms of energy consumption.
AEU - International Journal of Electronics and Communications, 2019
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
IETE Technical Review, 2018
Autonomous computing, communication, and collaboration among devices have their importance to tra... more Autonomous computing, communication, and collaboration among devices have their importance to transform the digital world. Emerging technology device-to-device (D2D) communication has a great impetus to facilitate peer-to-peer network. Therefore, D2D communication technology is expected to be an essential part of the Internet of Things (IoT). Rapid growth in quality of service demand leads to fundamental changes in the architecture of IoT system. This paper explains the benefits and challenges for intelligent D2D communication that will be required to accomplish the requirements for IoT. Many industries and standardization bodies have shown enormous interest towards the implementation of D2D approach in wireless networks. D2D approach facilitates to work without the essential control of the centralized supervision which makes wireless networks more spectrum and energy efficient with traffic offloading. Inter-networking devices offer various applications towards the development of IoT. Physical constraints of the devices and resource constraints of the networks give rise to several issues which need to be resolved. Here, we review the current status in the advancement of D2D technology subject to resources utilization, routing techniques, and interference management. Moreover, potential future challenges are explored that may be faced by the scientific community.
IEEE Systems Journal, 2019
In fifth-generation technology, device-to-device (D2D) communication underlaid with a cellular ne... more In fifth-generation technology, device-to-device (D2D) communication underlaid with a cellular network provides a feasible solution for proximity-based wireless applications and services. D2D communication allows a direct connection between two devices without traversing through the base station. It can potentially reduce the data traffic in the cellular networks with improved spectral and energy efficiency. However, interference management is a primary concern when D2D links utilize the same resources occupied by cellular users. In this paper, we propose a location-based power control approach to mitigate the severe interference components for underlaying D2D communication cellular network for multicell scenario. Moreover, outage analysis for the cellular user as well as D2D user is carried out by using the tools from stochastic geometry. Outage performance is further improved by employing a cooperation approach that also enables D2D user's power saving. Further, area spectral efficiency (ASE) analysis is performed using the proposed power control and cooperation approach for the overall system model. We obtain the optimal D2D user density to maximize the ASE. Finally, the numerical results are presented to validate the analytic observations of the proposed framework. Subtraction techniques Cyclones Arsenic Bromine compounds Signal design Digital modulation. Coercive force Coal YouTube Photonic band gap Optical devices Holmium High-temperature superconductors Performance gain Countermeasures (computer) Product life cycle management Uncertain systems Computer crime Noninvasive treatment. Neurotransmitters Nervous system Structural plates Activation analysis Data handling Distributed information systems Bills of materials IEEE Corporate activities. Twitter Burnishing Rehabilitation robotics Fuses Night vision Circuit testing Optical fibers Bremsstrahlung Cyberattack Radar antennas Wounds Rough sets Quantum computing Tires. Neptunium Phishing FDDI Power system modeling Breast Industrial psychology Joints Virtual artifact Scalp X-ray diffraction Planning Electrooptic modulators WS-BPEL Machining. Digital audio players Environmental engineering Adaptive equalizers Biomarkers Isolators. Biological tissues Optical variables control Chromosome mapping Rats Teletext Ground support Social engineering (security). Underwater cables Thin film transistors On board unit Graphical user interfaces Nerve tissues Collision mitigation Wireless power transmission Charge measurement Radio communication countermeasures Magnetostatic waves Active filters Machine components Embedded computing. Quality of service Cyberattack Cellular manufacturing Nanolithography Flexible electronics Breast tissue Error-free operations Millimeter wave circuits. Deductive databases Patient rehabilitation Pairwise error probability Extended reality Microsensors Persuasive systems Software defined networking Aneurysm. Personal digital assistants Genetics Training data Smart grids Cataracts Parallel processing Application security Charge carrier density On load tap changers Simulated annealing Heart valves Spyware Silicon photonics. Superconducting cables Thick film sensors Availability Satellite ground stations Proteins WebRTC Stomatognathic system Blast furnaces Computer aided instruction Coprocessors. Positive train control Uranium Ceramic products Molecular biophysics Test data compression Laser noise Lead time reduction Anthropomorphism Sweat glands Knee Dynamic voltage scaling Poincare invariance Aerosols Beryllium. System-on-chip Thomson effect Dual band Radio astronomy Pulse generation Eyebrows Neurites Catheterization. Access protocols Cloud computing Magnetoresistance Soil pollution Baluns Plasma transport processes Shortest path problem Innovation management Text mining Chemical oxygen iodine lasers Typesetting Graphene devices Nanobioscience. Backplanes Induction motors Biological processes Tides Feedforward systems Synchrocyclotrons Deep level transient spectroscopy Business process management Bluetooth Magnetometers Ferromagnetic resonance. Meteorological factors Vehicle-to-everything IEEE news Oil pollution Biomembranes Ferroresonance Sawing Teleportation Muscles Glow discharge devices System testing Neuromuscular Information entropy Plasma transport processes. Cloud computing Neuroradiology Frequency locked loops Data aggregation Biological interactions Molecular electronics Organic inorganic hybrid materials Botnet. (1) Magnetic heads Peltier effect Sawing Bicycles Task analysis Visual databases Vehicle driving Plants (biology) Charge carrier mobility Encyclopedias Wind turbines Social engineering (security). Zirconium Road vehicles Structural shells Wind farms Heterogeneous networks Network security Industrial pollution Data integrity Abrasives Baroreflex Cryptocurrency Bars Mode matching methods Piezoelectric devices. Backplanes Empirical mode decomposition Avatars X-rays Plastic insulators Network function virtualization Dolphins Product development Whales Radioactive pollution. Vehicle-to-everything Cavity perturbation methods Wheels Vehicle-to-infrastructure Control charts Pressure vessels Active appearance model Out of order Electrical accidents. Metastasis Air quality Training data Asynchronous transfer mode RNA Induction motor drives MPEG 1 Standard Safety management Biomechanics Network synthesis Whales Cortical bone Portals. Relaxor ferroelectrics Split gate flash memory cells Activity recognition Compressors VLIW Heat engines Vehicle-to-grid. Bioelectric phenomena Parkinson's disease WebRTC Passive microwave remote sensing Government Through-silicon vias Network neutrality. Adhesive strength Videos National Electric Code Ring generators Null space Business process integration Ultra large scale integration Token networks Whales Oil pollution Research and development management Equivalent circuits. Pressure vessels Symbiosis Optical arrays Read-write memory Connective tissue Web TV Typesetting Digital art. Fasteners Functional point analysis Linear approximation Soldering Barium Radiography Nuclear power generation Wet etching Vehicle driving Accelerated aging Text mining. Biomedical optical imaging Web servers Cyber espionage Greenhouses Pneumatic systems Program management Time-domain analysis Wireless access points Image filtering Anatomy Colon Semiconductor lasers. Chlorine compounds Deep level transient spectroscopy CMOSFET circuits Voltage Titanium Anatomy Mortar Base stations Ice thickness Electrooptic modulators. Nuclear magnetic resonance Process planning Matrix decomposition Vectors Wind Neuroradiology Personal digital assistants Passive radar. Wind farms Brillouin scattering Flywheels Thick film sensors Tiles Data aggregation Thyratrons Optical switches Prognostics and health management Health information management IEEE 802 LAN-MAN Standards. Synthetic aperture radar Dinosaurs Cranial Atom optics Underwater equipment Continents Radio astronomy Stability criteria Light scattering Biological cells.
Wireless Personal Communications, 2019
Unmanned aerial vehicle (UAV) as an aerial base station is a predominant cost-effective solution ... more Unmanned aerial vehicle (UAV) as an aerial base station is a predominant cost-effective solution of coverage extension in wireless communication network. It has a potential to provide disaster relief solutions and public safety services by enabling low power, highly reliable, and low latency connectivity. In this paper, deployment of UAVs in a given geographical area with coverage extension capacity is analyzed at low altitude platform. This model includes UAV with downlink users and Device-to-Device (D2D) communication underlaid with cellular network. In this work, analysis is given for dual (two) UAVs by considering two scenarios: with interference and without interference. Coverage probability and system sum rate are derived, which depends on the UAV altitude and D2D density. Our analytical results show that significant improvement in terms of coverage probability and system throughput is obtained as compared to single UAV case.
International Journal of Communication Systems, 2017
The traditional cellular network cannot keep pace with the dramatic growth in data traffic due to... more The traditional cellular network cannot keep pace with the dramatic growth in data traffic due to exponentially increasing number of multimedia applications and mobile subscribers. Recently, femto base stations (FBSs) are deployed with the macro base station (MBS) tier for off-loading the data traffic and to improve the indoor coverage of the heterogeneous cellular network. However, FBS deployment also increases the cross-tier interference of the heterogeneous cellular network resulting in outage performance degradation of MBS tier. This work develops an analytical framework to limit the cross-tier interference of MBS tier using power control scheme (PCS). The proposed PCS works on path loss inversion and location-based power level rule for FBS. Moreover, a cooperation scheme and an association policy with MBS (CSAPM) are introduced to improve the outage performance of the FBS tier. Tools from the stochastic geometry are used for deriving the signal to interference and noise ratio outage probability, total outage probability, and area spectral efficiency (ASE) of MBS tier and FBS tier. Additionally, ASE maximization problem is formulated to evaluate the optimal density of FBSs. The effectiveness of the proposed PCS and CSAPM on outage performance and ASE are numerically demonstrated. It is noted from the results that the proposed CSAPM can compensate the loss in outage performance of FBS tier due to PCS. Finally, simulation results validate the analytical results.
IEEE Transactions on Vehicular Technology, 2017
The performance of a coordinated multipoint transmission for massive multiple-input multiple-outp... more The performance of a coordinated multipoint transmission for massive multiple-input multiple-output (MIMO) heterogeneous networks (HetNets) with practical deployment is investigated. The active small cell base stations (SBSs) outside the inner region of macrocell base stations (MBSs) are used to improve the performance of macrocell edge users. Based on the stochastic geometry approach, the spectral efficiency (SE) and energy efficiency (EE) of the proposed scheme are analyzed. An alternating optimal algorithm is employed to solve the EE maximization problem effectively. The impacts of the small cell density, inner region size and massive MIMO on the network performance are explicitly examined. Moreover, by approximating the interference distribution by moment matching with the Gamma distribution, the coverage probability of the two-tier HetNet is also studied. Numerical results show that the proposed HetNet generally outperforms the conventional maximum receive power association scheme and it provides a potential solution to achieve high SE and EE performance.
2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016
Femtocell deployment improves the data rate and indoor coverage of the heterogeneous cellular net... more Femtocell deployment improves the data rate and indoor coverage of the heterogeneous cellular network (HCN). However, it also increases the cross-tier interference of the system which results in performance degradation of the macro base station (MBS) tier. In this work, a mathematical framework is developed to mitigate the cross-tier interference of MBS tier using a power control scheme (PCS). This PCS works on path loss inversion and location-based power level rule for femto base stations (FBS) to improve the coverage of the MBS tier. Furthermore, a cooperation scheme and association policy are proposed to improve the performance of the FBS tier. Stochastic geometry is considered for deriving the signal to interference and noise ratio (SINR) outage probability, total outage probability, and area spectral efficiency (ASE) for MBS and FBS tiers. The impact of the PCS, proposed cooperation scheme with association policy on outage probability, and ASE are numerically evaluated. Numerical results show that considerable improvement in outage performance of MBS tier is obtained using proposed PCS. Moreover, applying PCS results in degradation of outage performance of FBS tier. This loss in performance can be compensated by using the proposed cooperation scheme and association policy.
Wireless Personal Communications, 2015
In this paper, a relay based network is considered where the source can transmit confidential dat... more In this paper, a relay based network is considered where the source can transmit confidential data with the help of non-regenerative relay node to the destination. Since the relay is assumed to be untrusted, it is very important to secure confidential data from it while maintaining the reliability of the transmission. A new approach is proposed in which a friendly noise is incorporated with the information bearing signal at the sender such that it does not degrade the integrity of the signal and the quality of the legitimate link. This friendly noise acts as jamming signal for the untrusted relay. The analytical expressions for secrecy outage probability of the proposed technique are derived. The secrecy performance of the proposed approach is compared with the traditional relay transmission and the cooperative jamming schemes. The asymptotic nature of the outage probability is also studied for the different parameters. Numerical results are also presented to verify the derived analytical expressions of the proposed approach.
2015 Twenty First National Conference on Communications (NCC), 2015
Next generation cellular network is expected to overcome the issues like demand for high data rat... more Next generation cellular network is expected to overcome the issues like demand for high data rates, better network coverage, energy, and spectrally efficient system. In this paper, femto based heterogeneous cellular network (HCN) with cognitive approach is considered to address these issues. This paper investigates two tier cognitive based HCN for overlay, underlay, and mixed overlay-underlay spectrum sharing schemes (SSSs). Macro base station (MBS) and cognitive femto base station (CFBS) are considered as a primary user network (PUN) and cognitive user network (CUN), respectively. Outage probability is a fundamental performance measure in HCN design. In this work, stochastic geometry is used for deriving the probability density function (pdf) of the signal-to-interference ratio (SIR) and the outage probability of the HCN for different SSSs. Furthermore, energy efficiency (EE) of the HCN and single tier network (MBS only) are also calculated for different SSSs. Numerical results show that outage performance of HCN in mixed overlay-underlay scheme outperforms other schemes. Moreover, it is observed that the effect of BSs density on outage probability is lower for the CFBSs as compared to MBSs.
2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014
ABSTRACT As the need of highly secure data transmission in wireless communication has increased r... more ABSTRACT As the need of highly secure data transmission in wireless communication has increased rapidly, physical layer security gains a lots of attention recently. The transmission of confidential data between two legitimate users in the existence of the passive eavesdropper with quasi-static Rayleigh channel is considered. A new technique is proposed in which a friendly noise is incorporated with confidential data bearing signal such that it preserves the integrity of the signal and does not degrade the legitimate link. This friendly noise acts as jamming signal for eavesdropper. The analytical expression for secrecy outage probability of the proposed technique for both single and multiple antennas eavesdropper is derived. The secrecy performance of proposed technique is compared with the traditional direct trans-mission and the cooperative jamming schemes. The asymptotic nature of the outage probability is also studied for the different parameters. Numerical results are also presented to verify the analytical expressions of proposed model. Keywords— Physical layer security, friendly noise, secrecy outage probability, wiretap channel.
2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), 2014
ABSTRACT With exponential growth of high data rate applications, significant energy is consumed i... more ABSTRACT With exponential growth of high data rate applications, significant energy is consumed in cellular networks to guarantee better quality of service (QoS). Therefore, energy efficient wireless communication is being paid increasing attention under the background of limited energy resource and environmental-friendly transmission behaviors. Recently, distributed antenna system (DAS) has shown great potential for reducing transmission power and outage for next generation cellular networks. Previously, most of the researches have not considered the random locations of both the mobile stations (MSs) and the DAS. In this paper, we suggest stochastic geometry based distributed green antenna system (DGAS) model to analyze the performance of the cellular system. Moreover, uplink DGAS is considered where MSs' locations are distributed according to homogenous Poisson point process (HPPP) and each MS is associated to the closest distributed green antenna (DGA). Further, the expressions for outage probability and the area spectral efficiency are derived over path loss and Rayleigh fading channel. Analytical results for the interference limited system show that as the distance between MS and DGA of interest increases, outage probability of the system increases.
2013 5th International Conference on Computational Intelligence and Communication Networks, 2013
ABSTRACT In this paper, three dimensional tradeoff between diversity, multiplexing, and delay is ... more ABSTRACT In this paper, three dimensional tradeoff between diversity, multiplexing, and delay is explored, where the delay considered is introduced only by retransmissions. Multiple antennas at the transceiver stations provide better reliability of reception and it can also increase the data rate of communication to improve the system performance. Channel controlled automatic retransmission request (CC-ARQ) design is used on the channel link to achieve the better diversity gain at the cost of increased retransmission request. Further, theoretical results are verified using the numerical simulation which shows the tradeoff between diversity (i.e., reliability), multiplexing (i.e., data rate), and delay (i.e., no. of ARQ rounds).
2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring)
In this paper, we present a distance and interference based decision-making framework for device-... more In this paper, we present a distance and interference based decision-making framework for device-to-device (D2D) communication mode selection (choosing one mode among dedicated mode, reuse mode, and cellular mode) and a power control approach for multiple D2D pairs underlaying cellular network. The proposed approach is based on the location of D2D users. If orthogonal resources are available and the D2D pair is close to each other, then the D2D dedicated mode is preferred. Otherwise, reuse (uplink or downlink) mode is utilized where interference is a prime concern. Reuse mode of D2D communication with allowable interference allows more users to be served with efficient spectrum utilization. Moreover, the power control approach is introduced to avoid the wastage of power and to reduce the impact of interference. Numerical results are provided to validate the significance of the proposed approach.
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), 2018
Rapid growth in the fifth generation (5G) wireless network applications demands new requirements ... more Rapid growth in the fifth generation (5G) wireless network applications demands new requirements on the data storage, computation, and networking. Thus, it will introduce new threats to the integrity, availability, and confidentiality. 5G is advantageous concerning high data rate, low latency, energy and spectrum efficient, higher capacity, and reliable connectivity. Currently, safeguarding information in the 5G wireless networks is the pivotal issue for research. In this paper, the importance of Physical Layer Security (PLS) for secure transmission of information in wireless networks are discussed. Some popular 5G technologies are studied in the context of security during transmission. With all this, significant issues and challenges are identified in the implementation of new technologies into reality. These technologies are mobile-health (m-health), cognitive radio networks (CRNs), constructive interference, massive multiple input multiple output (massive MIMO), non-orthogonal multiple access (NOMA) and simultaneous wireless information and power transfer (SWIPT). Future challenges and direction for the further study of such technologies are also given. Moreover, one numerical result is presented for the spectral efficiency in MIMO communication system.
Journal of Network and Computer Applications, 2020
Dividing a larger area into smaller subregions is a well addressed problem in Precision Agricultu... more Dividing a larger area into smaller subregions is a well addressed problem in Precision Agriculture (PA) where the existing application specific solutions (laboratory based) require human intervention and result in static region demarcation schemes. However, the boundary of a subregion is subject to change with various soil and environmental parameters. On the other hand, Wireless Sensor Networks (WSNs), a potential candidate to produce dynamic subregions due to its real-time decision making capability, are utilized as merely a data collection unit for PA. In an attempt to introduce the in-network decision making feature of WSN in PA, design of a novel three layered WSN-CPS architecture is presented in this work and at layer-I the distributed mechanism for region demarcation is proposed. The proposed scheme identifies nodes based on data values and position information, that serve as the boundary of a subregion and data transmitters to the base station for final decision making. Existing methods for boundary node detection identify network boundary nodes (not designed to demarcate the interior boundary), coverage hole boundary nodes (identifies boundary nodes of a smaller portion in network), and event boundary nodes (not able to identify outer boundary). The proposed work identifies network boundary nodes, coverage hole boundary nodes, and the subregion boundary nodes accurately. It takes various critical situations into account while labelling of nodes and shows its reliability in node failure conditions. Impact of varying transmission range and number of nodes is analyzed on proposed mechanism via simulation. In a comparative study with recent network boundary node detection scheme, decrease of 32% and 30% is seen at 200 and 300 nodes respectively in terms of energy consumption.
AEU - International Journal of Electronics and Communications, 2019
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
IETE Technical Review, 2018
Autonomous computing, communication, and collaboration among devices have their importance to tra... more Autonomous computing, communication, and collaboration among devices have their importance to transform the digital world. Emerging technology device-to-device (D2D) communication has a great impetus to facilitate peer-to-peer network. Therefore, D2D communication technology is expected to be an essential part of the Internet of Things (IoT). Rapid growth in quality of service demand leads to fundamental changes in the architecture of IoT system. This paper explains the benefits and challenges for intelligent D2D communication that will be required to accomplish the requirements for IoT. Many industries and standardization bodies have shown enormous interest towards the implementation of D2D approach in wireless networks. D2D approach facilitates to work without the essential control of the centralized supervision which makes wireless networks more spectrum and energy efficient with traffic offloading. Inter-networking devices offer various applications towards the development of IoT. Physical constraints of the devices and resource constraints of the networks give rise to several issues which need to be resolved. Here, we review the current status in the advancement of D2D technology subject to resources utilization, routing techniques, and interference management. Moreover, potential future challenges are explored that may be faced by the scientific community.
IEEE Systems Journal, 2019
In fifth-generation technology, device-to-device (D2D) communication underlaid with a cellular ne... more In fifth-generation technology, device-to-device (D2D) communication underlaid with a cellular network provides a feasible solution for proximity-based wireless applications and services. D2D communication allows a direct connection between two devices without traversing through the base station. It can potentially reduce the data traffic in the cellular networks with improved spectral and energy efficiency. However, interference management is a primary concern when D2D links utilize the same resources occupied by cellular users. In this paper, we propose a location-based power control approach to mitigate the severe interference components for underlaying D2D communication cellular network for multicell scenario. Moreover, outage analysis for the cellular user as well as D2D user is carried out by using the tools from stochastic geometry. Outage performance is further improved by employing a cooperation approach that also enables D2D user's power saving. Further, area spectral efficiency (ASE) analysis is performed using the proposed power control and cooperation approach for the overall system model. We obtain the optimal D2D user density to maximize the ASE. Finally, the numerical results are presented to validate the analytic observations of the proposed framework. Subtraction techniques Cyclones Arsenic Bromine compounds Signal design Digital modulation. Coercive force Coal YouTube Photonic band gap Optical devices Holmium High-temperature superconductors Performance gain Countermeasures (computer) Product life cycle management Uncertain systems Computer crime Noninvasive treatment. Neurotransmitters Nervous system Structural plates Activation analysis Data handling Distributed information systems Bills of materials IEEE Corporate activities. Twitter Burnishing Rehabilitation robotics Fuses Night vision Circuit testing Optical fibers Bremsstrahlung Cyberattack Radar antennas Wounds Rough sets Quantum computing Tires. Neptunium Phishing FDDI Power system modeling Breast Industrial psychology Joints Virtual artifact Scalp X-ray diffraction Planning Electrooptic modulators WS-BPEL Machining. Digital audio players Environmental engineering Adaptive equalizers Biomarkers Isolators. Biological tissues Optical variables control Chromosome mapping Rats Teletext Ground support Social engineering (security). Underwater cables Thin film transistors On board unit Graphical user interfaces Nerve tissues Collision mitigation Wireless power transmission Charge measurement Radio communication countermeasures Magnetostatic waves Active filters Machine components Embedded computing. Quality of service Cyberattack Cellular manufacturing Nanolithography Flexible electronics Breast tissue Error-free operations Millimeter wave circuits. Deductive databases Patient rehabilitation Pairwise error probability Extended reality Microsensors Persuasive systems Software defined networking Aneurysm. Personal digital assistants Genetics Training data Smart grids Cataracts Parallel processing Application security Charge carrier density On load tap changers Simulated annealing Heart valves Spyware Silicon photonics. Superconducting cables Thick film sensors Availability Satellite ground stations Proteins WebRTC Stomatognathic system Blast furnaces Computer aided instruction Coprocessors. Positive train control Uranium Ceramic products Molecular biophysics Test data compression Laser noise Lead time reduction Anthropomorphism Sweat glands Knee Dynamic voltage scaling Poincare invariance Aerosols Beryllium. System-on-chip Thomson effect Dual band Radio astronomy Pulse generation Eyebrows Neurites Catheterization. Access protocols Cloud computing Magnetoresistance Soil pollution Baluns Plasma transport processes Shortest path problem Innovation management Text mining Chemical oxygen iodine lasers Typesetting Graphene devices Nanobioscience. Backplanes Induction motors Biological processes Tides Feedforward systems Synchrocyclotrons Deep level transient spectroscopy Business process management Bluetooth Magnetometers Ferromagnetic resonance. Meteorological factors Vehicle-to-everything IEEE news Oil pollution Biomembranes Ferroresonance Sawing Teleportation Muscles Glow discharge devices System testing Neuromuscular Information entropy Plasma transport processes. Cloud computing Neuroradiology Frequency locked loops Data aggregation Biological interactions Molecular electronics Organic inorganic hybrid materials Botnet. (1) Magnetic heads Peltier effect Sawing Bicycles Task analysis Visual databases Vehicle driving Plants (biology) Charge carrier mobility Encyclopedias Wind turbines Social engineering (security). Zirconium Road vehicles Structural shells Wind farms Heterogeneous networks Network security Industrial pollution Data integrity Abrasives Baroreflex Cryptocurrency Bars Mode matching methods Piezoelectric devices. Backplanes Empirical mode decomposition Avatars X-rays Plastic insulators Network function virtualization Dolphins Product development Whales Radioactive pollution. Vehicle-to-everything Cavity perturbation methods Wheels Vehicle-to-infrastructure Control charts Pressure vessels Active appearance model Out of order Electrical accidents. Metastasis Air quality Training data Asynchronous transfer mode RNA Induction motor drives MPEG 1 Standard Safety management Biomechanics Network synthesis Whales Cortical bone Portals. Relaxor ferroelectrics Split gate flash memory cells Activity recognition Compressors VLIW Heat engines Vehicle-to-grid. Bioelectric phenomena Parkinson's disease WebRTC Passive microwave remote sensing Government Through-silicon vias Network neutrality. Adhesive strength Videos National Electric Code Ring generators Null space Business process integration Ultra large scale integration Token networks Whales Oil pollution Research and development management Equivalent circuits. Pressure vessels Symbiosis Optical arrays Read-write memory Connective tissue Web TV Typesetting Digital art. Fasteners Functional point analysis Linear approximation Soldering Barium Radiography Nuclear power generation Wet etching Vehicle driving Accelerated aging Text mining. Biomedical optical imaging Web servers Cyber espionage Greenhouses Pneumatic systems Program management Time-domain analysis Wireless access points Image filtering Anatomy Colon Semiconductor lasers. Chlorine compounds Deep level transient spectroscopy CMOSFET circuits Voltage Titanium Anatomy Mortar Base stations Ice thickness Electrooptic modulators. Nuclear magnetic resonance Process planning Matrix decomposition Vectors Wind Neuroradiology Personal digital assistants Passive radar. Wind farms Brillouin scattering Flywheels Thick film sensors Tiles Data aggregation Thyratrons Optical switches Prognostics and health management Health information management IEEE 802 LAN-MAN Standards. Synthetic aperture radar Dinosaurs Cranial Atom optics Underwater equipment Continents Radio astronomy Stability criteria Light scattering Biological cells.
Wireless Personal Communications, 2019
Unmanned aerial vehicle (UAV) as an aerial base station is a predominant cost-effective solution ... more Unmanned aerial vehicle (UAV) as an aerial base station is a predominant cost-effective solution of coverage extension in wireless communication network. It has a potential to provide disaster relief solutions and public safety services by enabling low power, highly reliable, and low latency connectivity. In this paper, deployment of UAVs in a given geographical area with coverage extension capacity is analyzed at low altitude platform. This model includes UAV with downlink users and Device-to-Device (D2D) communication underlaid with cellular network. In this work, analysis is given for dual (two) UAVs by considering two scenarios: with interference and without interference. Coverage probability and system sum rate are derived, which depends on the UAV altitude and D2D density. Our analytical results show that significant improvement in terms of coverage probability and system throughput is obtained as compared to single UAV case.
International Journal of Communication Systems, 2017
The traditional cellular network cannot keep pace with the dramatic growth in data traffic due to... more The traditional cellular network cannot keep pace with the dramatic growth in data traffic due to exponentially increasing number of multimedia applications and mobile subscribers. Recently, femto base stations (FBSs) are deployed with the macro base station (MBS) tier for off-loading the data traffic and to improve the indoor coverage of the heterogeneous cellular network. However, FBS deployment also increases the cross-tier interference of the heterogeneous cellular network resulting in outage performance degradation of MBS tier. This work develops an analytical framework to limit the cross-tier interference of MBS tier using power control scheme (PCS). The proposed PCS works on path loss inversion and location-based power level rule for FBS. Moreover, a cooperation scheme and an association policy with MBS (CSAPM) are introduced to improve the outage performance of the FBS tier. Tools from the stochastic geometry are used for deriving the signal to interference and noise ratio outage probability, total outage probability, and area spectral efficiency (ASE) of MBS tier and FBS tier. Additionally, ASE maximization problem is formulated to evaluate the optimal density of FBSs. The effectiveness of the proposed PCS and CSAPM on outage performance and ASE are numerically demonstrated. It is noted from the results that the proposed CSAPM can compensate the loss in outage performance of FBS tier due to PCS. Finally, simulation results validate the analytical results.
IEEE Transactions on Vehicular Technology, 2017
The performance of a coordinated multipoint transmission for massive multiple-input multiple-outp... more The performance of a coordinated multipoint transmission for massive multiple-input multiple-output (MIMO) heterogeneous networks (HetNets) with practical deployment is investigated. The active small cell base stations (SBSs) outside the inner region of macrocell base stations (MBSs) are used to improve the performance of macrocell edge users. Based on the stochastic geometry approach, the spectral efficiency (SE) and energy efficiency (EE) of the proposed scheme are analyzed. An alternating optimal algorithm is employed to solve the EE maximization problem effectively. The impacts of the small cell density, inner region size and massive MIMO on the network performance are explicitly examined. Moreover, by approximating the interference distribution by moment matching with the Gamma distribution, the coverage probability of the two-tier HetNet is also studied. Numerical results show that the proposed HetNet generally outperforms the conventional maximum receive power association scheme and it provides a potential solution to achieve high SE and EE performance.
2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016
Femtocell deployment improves the data rate and indoor coverage of the heterogeneous cellular net... more Femtocell deployment improves the data rate and indoor coverage of the heterogeneous cellular network (HCN). However, it also increases the cross-tier interference of the system which results in performance degradation of the macro base station (MBS) tier. In this work, a mathematical framework is developed to mitigate the cross-tier interference of MBS tier using a power control scheme (PCS). This PCS works on path loss inversion and location-based power level rule for femto base stations (FBS) to improve the coverage of the MBS tier. Furthermore, a cooperation scheme and association policy are proposed to improve the performance of the FBS tier. Stochastic geometry is considered for deriving the signal to interference and noise ratio (SINR) outage probability, total outage probability, and area spectral efficiency (ASE) for MBS and FBS tiers. The impact of the PCS, proposed cooperation scheme with association policy on outage probability, and ASE are numerically evaluated. Numerical results show that considerable improvement in outage performance of MBS tier is obtained using proposed PCS. Moreover, applying PCS results in degradation of outage performance of FBS tier. This loss in performance can be compensated by using the proposed cooperation scheme and association policy.
Wireless Personal Communications, 2015
In this paper, a relay based network is considered where the source can transmit confidential dat... more In this paper, a relay based network is considered where the source can transmit confidential data with the help of non-regenerative relay node to the destination. Since the relay is assumed to be untrusted, it is very important to secure confidential data from it while maintaining the reliability of the transmission. A new approach is proposed in which a friendly noise is incorporated with the information bearing signal at the sender such that it does not degrade the integrity of the signal and the quality of the legitimate link. This friendly noise acts as jamming signal for the untrusted relay. The analytical expressions for secrecy outage probability of the proposed technique are derived. The secrecy performance of the proposed approach is compared with the traditional relay transmission and the cooperative jamming schemes. The asymptotic nature of the outage probability is also studied for the different parameters. Numerical results are also presented to verify the derived analytical expressions of the proposed approach.
2015 Twenty First National Conference on Communications (NCC), 2015
Next generation cellular network is expected to overcome the issues like demand for high data rat... more Next generation cellular network is expected to overcome the issues like demand for high data rates, better network coverage, energy, and spectrally efficient system. In this paper, femto based heterogeneous cellular network (HCN) with cognitive approach is considered to address these issues. This paper investigates two tier cognitive based HCN for overlay, underlay, and mixed overlay-underlay spectrum sharing schemes (SSSs). Macro base station (MBS) and cognitive femto base station (CFBS) are considered as a primary user network (PUN) and cognitive user network (CUN), respectively. Outage probability is a fundamental performance measure in HCN design. In this work, stochastic geometry is used for deriving the probability density function (pdf) of the signal-to-interference ratio (SIR) and the outage probability of the HCN for different SSSs. Furthermore, energy efficiency (EE) of the HCN and single tier network (MBS only) are also calculated for different SSSs. Numerical results show that outage performance of HCN in mixed overlay-underlay scheme outperforms other schemes. Moreover, it is observed that the effect of BSs density on outage probability is lower for the CFBSs as compared to MBSs.
2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014
ABSTRACT As the need of highly secure data transmission in wireless communication has increased r... more ABSTRACT As the need of highly secure data transmission in wireless communication has increased rapidly, physical layer security gains a lots of attention recently. The transmission of confidential data between two legitimate users in the existence of the passive eavesdropper with quasi-static Rayleigh channel is considered. A new technique is proposed in which a friendly noise is incorporated with confidential data bearing signal such that it preserves the integrity of the signal and does not degrade the legitimate link. This friendly noise acts as jamming signal for eavesdropper. The analytical expression for secrecy outage probability of the proposed technique for both single and multiple antennas eavesdropper is derived. The secrecy performance of proposed technique is compared with the traditional direct trans-mission and the cooperative jamming schemes. The asymptotic nature of the outage probability is also studied for the different parameters. Numerical results are also presented to verify the analytical expressions of proposed model. Keywords— Physical layer security, friendly noise, secrecy outage probability, wiretap channel.
2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), 2014
ABSTRACT With exponential growth of high data rate applications, significant energy is consumed i... more ABSTRACT With exponential growth of high data rate applications, significant energy is consumed in cellular networks to guarantee better quality of service (QoS). Therefore, energy efficient wireless communication is being paid increasing attention under the background of limited energy resource and environmental-friendly transmission behaviors. Recently, distributed antenna system (DAS) has shown great potential for reducing transmission power and outage for next generation cellular networks. Previously, most of the researches have not considered the random locations of both the mobile stations (MSs) and the DAS. In this paper, we suggest stochastic geometry based distributed green antenna system (DGAS) model to analyze the performance of the cellular system. Moreover, uplink DGAS is considered where MSs' locations are distributed according to homogenous Poisson point process (HPPP) and each MS is associated to the closest distributed green antenna (DGA). Further, the expressions for outage probability and the area spectral efficiency are derived over path loss and Rayleigh fading channel. Analytical results for the interference limited system show that as the distance between MS and DGA of interest increases, outage probability of the system increases.
2013 5th International Conference on Computational Intelligence and Communication Networks, 2013
ABSTRACT In this paper, three dimensional tradeoff between diversity, multiplexing, and delay is ... more ABSTRACT In this paper, three dimensional tradeoff between diversity, multiplexing, and delay is explored, where the delay considered is introduced only by retransmissions. Multiple antennas at the transceiver stations provide better reliability of reception and it can also increase the data rate of communication to improve the system performance. Channel controlled automatic retransmission request (CC-ARQ) design is used on the channel link to achieve the better diversity gain at the cost of increased retransmission request. Further, theoretical results are verified using the numerical simulation which shows the tradeoff between diversity (i.e., reliability), multiplexing (i.e., data rate), and delay (i.e., no. of ARQ rounds).