• ### Device-to-Device Load Balancing for Cellular Networks(1710.02636)

Dec. 12, 2018 cs.NI
• ### Load Balancing for 5G Ultra-Dense Networks using Device-to-Device Communications(1803.06082)

March 29, 2018 cs.IT, math.IT
Load balancing is an effective approach to address the spatial-temporal fluctuation problem of mobile data traffic for cellular networks. The existing schemes that focus on channel borrowing from neighboring cells cannot be directly applied to future 5G wireless networks, because the neighboring cells will reuse the same spectrum band in 5G systems. In this paper, we consider an orthogonal frequency division multiple access~(OFDMA) ultra-dense small cell network, where Device-to-Device~(D2D) communication is advocated to facilitate load balancing without extra spectrum. Specifically, the data traffic can be effectively offloaded from a congested small cell to other underutilized small cells by D2D communications. The problem is naturally formulated as a joint resource allocation and D2D routing problem that maximizes the system sum-rate. To efficiently solve the problem, we decouple the problem into a resource allocation subproblem and a D2D routing subproblem. The two subproblems are solved iteratively as a monotonic optimization problem and a complementary geometric programming problem, respectively. Simulation results show that the data sum-rate in the neighboring small cells increases 20\% on average by offloading the data traffic in the congested small cell to the neighboring small cell base stations~(SBSs).
• ### Electrical Vehicle Charging Station Profit Maximization: Admission, Pricing, and Online Scheduling(1705.02116)

Sept. 7, 2017 cs.SY
The rapid emergence of electric vehicles (EVs) demands an advanced infrastructure of publicly accessible charging stations that provide efficient charging services. In this paper, we propose a new charging station operation mechanism, the JoAP, which jointly optimizes the EV admission control, pricing, and charging scheduling to maximize the charging station's profit. More specifically, by introducing a tandem queueing network model, we analytically characterize the average charging station profit as a function of the admission control and pricing policies. Based on the analysis, we characterize the optimal JoAP algorithm. Through extensive simulations, we demonstrate that the proposed JoAP algorithm on average can achieve 330% and 531% higher profit than a widely adopted benchmark method under two representative waiting-time penalty rates.
• ### Blind Signal Detection in Massive MIMO: Exploiting the Channel Sparsity(1704.00949)

Aug. 30, 2017 cs.IT, math.IT
In practical massive MIMO systems, a substantial portion of system resources are consumed to acquire channel state information (CSI), leading to a drastically lower system capacity compared with the ideal case where perfect CSI is available. In this paper, we show that the overhead for CSI acquisition can be largely compensated by the potential gain due to the sparsity of the massive MIMO channel in a certain transformed domain. To this end, we propose a novel blind detection scheme that simultaneously estimates the channel and data by factorizing the received signal matrix. We show that by exploiting the channel sparsity, our proposed scheme can achieve a DoF very close to the ideal case, provided that the channel is sufficiently sparse. Specifically, the achievable degree of freedom (DoF) has a fractional gap of only $1/T$ from the ideal DoF, where $T$ is the channel coherence time. This is a remarkable advance for understanding the performance limit of the massive MIMO system. We further show that the performance advantage of our proposed scheme in the asymptotic SNR regime carries over to the practical SNR regime. Numerical results demonstrate that our proposed scheme significantly outperforms its counterpart schemes in the practical SNR regime under various system configurations.
• ### Optimal Relaying in Energy Harvesting Wireless Networks with Wireless-Powered Relays(1706.01057)

June 4, 2017 cs.NI
In this paper, we consider a wireless cooperative network with an energy harvesting relay which is powered by the energy harvested from ambient RF waves, such as that of a data packet. At any given time, the relay operates either in the energy harvesting (EH) mode or the data decoding (DD) mode, but not both. Separate energy and data buffers are kept at the relay to store the harvested energy and decoded data packets, respectively. In this paper, we optimize a time switching policy that switches between the EH mode and DD mode to maximize the system throughput or minimize the average transmission delay. Both static and dynamic time switching policies are derived. In particular, static policies are the ones where EH or DD mode is selected with a pre-determined probability. In contrast, in a dynamic policy, the mode is selected dynamically according to the states of data and energy buffers. We prove that the throughput-optimal static and dynamic policies keep the relay data buffer at the boundary of stability. More specifically, we show that the throughput-optimal dynamic policy has a threshold-based structure. Moreover, we prove that the delay-optimal dynamic policy also has a threshold-based structure and keeps at most one packet at the relay. We notice that the delay-optimal and throughput-optimal dynamic policies coincide in most cases. However, it is not true for optimal static policies. Finally, through extensive numerical results, we show the efficiency of optimal dynamic policies compared with the static ones in different conditions.
• ### Scalable Uplink Signal Detection in C-RANs via Randomized Gaussian Message Passing(1511.09024)

May 26, 2017 cs.IT, math.IT
Cloud Radio Access Network (C-RAN) is a promising architecture for unprecedented capacity enhancement in next-generation wireless networks thanks to the centralization and virtualization of base station processing. However, centralized signal processing in C-RANs involves high computational complexity that quickly becomes unaffordable when the network grows to a huge size. Among the first, this paper endeavours to design a scalable uplink signal detection algorithm, in the sense that both the complexity per unit network area and the total computation time remain constant when the network size grows. To this end, we formulate the signal detection in C-RAN as an inference problem over a bipartite random geometric graph. By passing messages among neighboring nodes, message passing (a.k.a. belief propagation) provides an efficient way to solve the inference problem over a sparse graph. However, the traditional message-passing algorithm is not guaranteed to converge, because the corresponding bipartite random geometric graph is locally dense and contains many short loops. As a major contribution of this paper, we propose a randomized Gaussian message passing (RGMP) algorithm to improve the convergence. Instead of exchanging messages simultaneously or in a fixed order, we propose to exchange messages asynchronously in a random order. The proposed RGMP algorithm demonstrates significantly better convergence performance than conventional message passing. The randomness of the message update schedule also simplifies the analysis, and allows the derivation of the convergence conditions for the RGMP algorithm. In addition, we propose a blockwise RGMP (B-RGMP) algorithm for practical implementation. The average computation time of B-RGMP remains constant when the network size increases.
• ### Distributed Scheduling in Wireless Powered Communication Network: Protocol Design and Performance Analysis(1703.05859)

March 17, 2017 cs.NI
Wireless powered communication network (WPCN) is a novel networking paradigm that uses radio frequency (RF) wireless energy transfer (WET) technology to power the information transmissions of wireless devices (WDs). When energy and information are transferred in the same frequency band, a major design issue is transmission scheduling to avoid interference and achieve high communication performance. Commonly used centralized scheduling methods in WPCN may result in high control signaling overhead and thus are not suitable for wireless networks constituting a large number of WDs with random locations and dynamic operations. To tackle this issue, we propose in this paper a distributed scheduling protocol for energy and information transmissions in WPCN. Specifically, we allow a WD that is about to deplete its battery to broadcast an energy request buzz (ERB), which triggers WET from its associated hybrid access point (HAP) to recharge the battery. If no ERB is sent, the WDs contend to transmit data to the HAP using the conventional $p$-persistent CSMA (carrier sensing multiple access). In particular, we propose an energy queueing model based on an energy decoupling property to derive the throughput performance. Our analysis is verified through simulations under practical network parameters, which demonstrate good throughput performance of the distributed scheduling protocol and reveal some interesting design insights that are different from conventional contention-based communication network assuming the WDs are powered with unlimited energy supplies.
• ### Graph-based Cyber Security Analysis of State Estimation in Smart Power Grid(1612.05878)

Dec. 18, 2016 cs.CR, cs.SY
Smart power grid enables intelligent automation at all levels of power system operation, from electricity generation at power plants to power usage at households. The key enabling factor of an efficient smart grid is its built-in information and communication technology (ICT) that monitors the real-time system operating state and makes control decisions accordingly. As an important building block of the ICT system, power system state estimation is of critical importance to maintain normal operation of the smart grid, which, however, is under mounting threat from potential cyber attacks. In this article, we introduce a graph-based framework for performing cyber-security analysis in power system state estimation. Compared to conventional arithmetic-based security analysis, the graphical characterization of state estimation security provides intuitive visualization of some complex problem structures and enables efficient graphical solution algorithms, which are useful for both defending and attacking the ICT system of smart grid. We also highlight several promising future research directions on graph-based security analysis and its applications in smart power grid.
• ### Online Charging Scheduling Algorithms of Electric Vehicles in Smart Grid: An Overview(1609.02791)

Aug. 26, 2016 cs.OH, cs.SY
As an environment-friendly substitute for conventional fuel-powered vehicles, electric vehicles (EVs) and their components have been widely developed and deployed worldwide. The large-scale integration of EVs into power grid brings both challenges and opportunities to the system performance. On one hand, the load demand from EV charging imposes large impact on the stability and efficiency of power grid. On the other hand, EVs could potentially act as mobile energy storage systems to improve the power network performance, such as load flattening, fast frequency control, and facilitating renewable energy integration. Evidently, uncontrolled EV charging could lead to inefficient power network operation or even security issues. This spurs enormous research interests in designing charging coordination mechanisms. A key design challenge here lies in the lack of complete knowledge of events that occur in the future. Indeed, the amount of knowledge of future events significantly impacts the design of efficient charging control algorithms. This article focuses on introducing online EV charging scheduling techniques that deal with different degrees of uncertainty and randomness of future knowledge. Besides, we highlight the promising future research directions for EV charging control.
• ### Locally Orthogonal Training Design for Cloud-RANs Based on Graph Coloring(1604.03344)

May 6, 2016 cs.IT, math.IT
We consider training-based channel estimation for a cloud radio access network (CRAN), in which a large amount of remote radio heads (RRHs) and users are randomly scattered over the service area. In this model, assigning orthogonal training sequences to all users will incur a substantial overhead to the overall network, and is even impossible when the number of users is large. Therefore, in this paper, we introduce the notion of local orthogonality, under which the training sequence of a user is orthogonal to those of the other users in its neighborhood. We model the design of locally orthogonal training sequences as a graph coloring problem. Then, based on the theory of random geometric graph, we show that the minimum training length scales in the order of $\ln K$, where $K$ is the number of users covered by a CRAN. This indicates that the proposed training design yields a scalable solution to sustain the need of large-scale cooperation in CRANs. Numerical results show that the proposed scheme outperforms other reference schemes.
• ### Profit-Maximizing Planning and Control of Battery Energy Storage Systems for Primary Frequency Control(1604.00952)

April 1, 2016 cs.SY
We consider a two-level profit-maximizing strategy, including planning and control, for battery energy storage system (BESS) owners that participate in the primary frequency control (PFC) market. Specifically, the optimal BESS control minimizes the operating cost by keeping the state of charge (SoC) in an optimal range. Through rigorous analysis, we prove that the optimal BESS control is a "state-invariant" strategy in the sense that the optimal SoC range does not vary with the state of the system. As such, the optimal control strategy can be computed offline once and for all with very low complexity. Regarding the BESS planning, we prove that the the minimum operating cost is a decreasing convex function of the BESS energy capacity. This leads to the optimal BESS sizing that strikes a balance between the capital investment and operating cost. Our work here provides a useful theoretical framework for understanding the planning and control strategies that maximize the economic benefits of BESSs in ancillary service markets.
• ### A Model Predictive Control Approach for Low-Complexity Electric Vehicle Charging Scheduling: Optimality and Scalability(1502.01456)

April 1, 2016 cs.PF, math.OC, cs.SY
With the increasing adoption of plug-in electric vehicles (PEVs), it is critical to develop efficient charging coordination mechanisms that minimize the cost and impact of PEV integration to the power grid. In this paper, we consider the optimal PEV charging scheduling, where the non-causal information about future PEV arrivals is not known in advance, but its statistical information can be estimated. This leads to an "online" charging scheduling problem that is naturally formulated as a finite-horizon dynamic programming with continuous state space and action space. To avoid the prohibitively high complexity of solving such a dynamic programming problem, we provide a Model Predictive Control (MPC) based algorithm with computational complexity $O(T^3)$, where $T$ is the total number of time stages. We rigorously analyze the performance gap between the near-optimal solution of the MPC-based approach and the optimal solution for any distributions of exogenous random variables. Furthermore, our rigorous analysis shows that when the random process describing the arrival of charging demands is first-order periodic, the complexity of proposed algorithm can be reduced to $O(1)$, which is independent of $T$. Extensive simulations show that the proposed online algorithm performs very closely to the optimal online algorithm. The performance gap is smaller than $0.4\%$ in most cases.
• ### Fundamental Limits of Training-Based Multiuser MIMO Systems(1511.08977)

Feb. 24, 2016 cs.IT, math.IT
In this paper, we endeavour to seek a fundamental understanding of the potentials and limitations of training-based multiuser multiple-input multiple-output (MIMO) systems. In a multiuser MIMO system, users are geographically separated. So, the near-far effect plays an indispensable role in channel fading. The existing optimal training design for conventional MIMO does not take the near-far effect into account, and thus is not applicable to a multiuser MIMO system. In this work, we use the majorization theory as a basic tool to study the tradeoff between the channel estimation quality and the information throughput. We establish tight upper and lower bounds of the throughput, and prove that the derived lower bound is asymptotically optimal for throughput maximization at high signal-to-noise ratio. Our analysis shows that the optimal training sequences for throughput maximization in a multiuser MIMO system are in general not orthogonal to each other. Furthermore, due to the near-far effect, the optimal training design for throughput maximization is to deactivate a portion of users with the weakest channels in transmission. These observations shed light on the practical design of training-based multiuser MIMO systems.
• ### Competitive Charging Station Pricing for Plug-in Electric Vehicles(1511.07907)

Nov. 28, 2015 cs.GT, math.OC, cs.SY
This paper considers the problem of charging station pricing and plug-in electric vehicles (PEVs) station selection. When a PEV needs to be charged, it selects a charging station by considering the charging prices, waiting times, and travel distances. Each charging station optimizes its charging price based on the prediction of the PEVs' charging station selection decisions and the other station's pricing decision, in order to maximize its profit. To obtain insights of such a highly coupled system, we consider a one-dimensional system with two competing charging stations and Poisson arriving PEVs. We propose a multi-leader-multi-follower Stackelberg game model, in which the charging stations (leaders) announce their charging prices in Stage I, and the PEVs (followers) make their charging station selections in Stage II. We show that there always exists a unique charging station selection equilibrium in Stage II, and such equilibrium depends on the charging stations' service capacities and the price difference between them. We then characterize the sufficient conditions for the existence and uniqueness of the pricing equilibrium in Stage I. We also develop a low complexity algorithm that efficiently computes the pricing equilibrium and the subgame perfect equilibrium of the two-stage Stackelberg game.
• ### Dynamic Nested Clustering for Parallel PHY-Layer Processing in Cloud-RANs(1408.0876)

Dec. 27, 2014 cs.IT, math.IT, cs.DC
Featured by centralized processing and cloud based infrastructure, Cloud Radio Access Network (C-RAN) is a promising solution to achieve an unprecedented system capacity in future wireless cellular networks. The huge capacity gain mainly comes from the centralized and coordinated signal processing at the cloud server. However, full-scale coordination in a large-scale C-RAN requires the processing of very large channel matrices, leading to high computational complexity and channel estimation overhead. To resolve this challenge, we exploit the near-sparsity of large C-RAN channel matrices, and derive a unified theoretical framework for clustering and parallel processing. Based on the framework, we propose a dynamic nested clustering (DNC) algorithm that not only greatly improves the system scalability in terms of baseband-processing and channel-estimation complexity, but also is amenable to various parallel processing strategies for different data center architectures. With the proposed algorithm, we show that the computation time for the optimal linear detector is greatly reduced from $O(N^3)$ to no higher than $O(N^{\frac{42}{23}})$, where $N$ is the number of RRHs in C-RAN.
• ### A Guard Zone Based Scalable Mode Selection Scheme in D2D Underlaid Cellular Networks(1406.7395)

Aug. 20, 2014 cs.IT, math.IT, cs.NI
Underlaying the cellular networks, Device to Device (D2D) communication brings the possibility to significantly improve the spectral efficiency in cellular networks and offload the traffic relayed by the base station. However, it creates new challenge for interference management as well. In this paper, we consider the multi-cell D2D underlaid cellular network in which many D2D links reuse the uplink resource simultaneously. The infeasibility of interference cancellation/alignment motivates us to force the D2D users near the base stations to work in cellular mode. Based on that, we present a distributed and scalable mode selection scheme based on guard zone to make a good tradeoff between decreasing interference penalty to base stations and improving spectrum utilization. With the help of stochastic geometry, we develop an analytically tractable framework to analyze the interference and then throughput for the two kinds of users in the considered scenario. The results obtained by the framework reveal that enabling D2D communication does improve the per user throughput and that a proper guard zone can further significantly increase the average throughput of both kinds of users. Thanks to the tractability of our model, the optimal guard zone, which is the key parameter in our scheme, can be efficiently obtained by finding the root of the first order derivative of the throughput expression. Through extensive numerical analysis, we show insights of the system and give some guidelines in system design aspect.
• ### Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation(1404.5029)

April 20, 2014 cs.CR
Accurate state estimation is of paramount importance to maintain the power system operating in a secure and efficient state. The recently identified coordinated data injection attacks to meter measurements can bypass the current security system and introduce errors to the state estimates. The conventional wisdom to mitigate such attacks is by securing meter measurements to evade malicious injections. In this paper, we provide a novel alternative to defend against false-data injection attacks using covert power network topological information. By keeping the exact reactance of a set of transmission lines from attackers, no false data injection attack can be launched to compromise any set of state variables. We first investigate from the attackers' perspective the necessary condition to perform injection attack. Based on the arguments, we characterize the optimal protection problem, which protects the state variables with minimum cost, as a well-studied Steiner tree problem in a graph. Besides, we also propose a mixed defending strategy that jointly considers the use of covert topological information and secure meter measurements when either method alone is costly or unable to achieve the protection objective. A mixed integer linear programming (MILP) formulation is introduced to obtain the optimal mixed defending strategy. To tackle the NP-hardness of the problem, a tree pruning-based heuristic is further presented to produce an approximate solution in polynomial time. The advantageous performance of the proposed defending mechanisms is verified in IEEE standard power system testcases.
• ### Graphical Methods for Defense Against False-data Injection Attacks on Power System State Estimation(1304.4151)

April 9, 2014 cs.OH
The normal operation of power system relies on accurate state estimation that faithfully reflects the physical aspects of the electrical power grids. However, recent research shows that carefully synthesized false-data injection attacks can bypass the security system and introduce arbitrary errors to state estimates. In this paper, we use graphical methods to study defending mechanisms against false-data injection attacks on power system state estimation. By securing carefully selected meter measurements, no false data injection attack can be launched to compromise any set of state variables. We characterize the optimal protection problem, which protects the state variables with minimum number of measurements, as a variant Steiner tree problem in a graph. Based on the graphical characterization, we propose both exact and reduced-complexity approximation algorithms. In particular, we show that the proposed tree-pruning based approximation algorithm significantly reduces computational complexity, while yielding negligible performance degradation compared with the optimal algorithms. The advantageous performance of the proposed defending mechanisms is verified in IEEE standard power system testcases.
• ### Online Coordinated Charging Decision Algorithm for Electric Vehicles without Future Information(1310.3580)

Nov. 28, 2013 cs.DS
The large-scale integration of plug-in electric vehicles (PEVs) to the power grid spurs the need for efficient charging coordination mechanisms. It can be shown that the optimal charging schedule smooths out the energy consumption over time so as to minimize the total energy cost. In practice, however, it is hard to smooth out the energy consumption perfectly, because the future PEV charging demand is unknown at the moment when the charging rate of an existing PEV needs to be determined. In this paper, we propose an Online cooRdinated CHARging Decision (ORCHARD) algorithm, which minimizes the energy cost without knowing the future information. Through rigorous proof, we show that ORCHARD is strictly feasible in the sense that it guarantees to fulfill all charging demands before due time. Meanwhile, it achieves the best known competitive ratio of 2.39. To further reduce the computational complexity of the algorithm, we propose a novel reduced-complexity algorithm to replace the standard convex optimization techniques used in ORCHARD. Through extensive simulations, we show that the average performance gap between ORCHARD and the offline optimal solution, which utilizes the complete future information, is as small as 14%. By setting a proper speeding factor, the average performance gap can be further reduced to less than 6%.
• ### Robust power allocation for energy-efficient location aware networks(1305.6091)

May 27, 2013 cs.IT, math.IT
In wireless location-aware networks, mobile nodes (agents) typically obtain their positions through ranging with respect to nodes with known positions (anchors). Transmit power allocation not only affects network lifetime, throughput, and interference, but also determines localization accuracy. In this paper, we present an optimization framework for robust power allocation in network localization to tackle imperfect knowledge of network parameters. In particular, we formulate power allocation problems to minimize the squared position error bound (SPEB) and the maximum directional position error bound (mDPEB), respectively, for a given power budget. We show that such formulations can be efficiently solved via conic programming. Moreover, we design an efficient power allocation scheme that allows distributed computations among agents. The simulation results show that the proposed schemes significantly outperform uniform power allocation, and the robust schemes outperform their non-robust counterparts when the network parameters are subject to uncertainty.
• ### The Cost of Mitigating Power Law Delay in Random Access Networks(1206.0641)

Feb. 22, 2013 cs.NI
Exponential backoff (EB) is a widely adopted collision resolution mechanism in many popular random-access networks including Ethernet and wireless LAN (WLAN). The prominence of EB is primarily attributed to its asymptotic throughput stability, which ensures a non-zero throughput even when the number of users in the network goes to infinity. Recent studies, however, show that EB is fundamentally unsuitable for applications that are sensitive to large delay and delay jitters, as it induces divergent second- and higher-order moments of medium access delay. Essentially, the medium access delay follows a power law distribution, a subclass of heavy-tailed distribution. To understand and alleviate the issue, this paper systematically analyzes the tail delay distribution of general backoff functions, with EB being a special case. In particular, we establish a tradeoff between the tail decaying rate of medium access delay distribution and the stability of throughput. To be more specific, convergent delay moments are attainable only when the backoff functions $g(k)$ grows slower than exponential functions, i.e., when $g(k)\in o(r^k)$ for all $r>1$. On the other hand, non-zero asymptotic throughput is attainable only when backoff functions grow at least as fast as an exponential function, i.e., $g(k)\in\Omega(r^k)$ for some $r>1$. This implies that bounded delay moments and stable throughput cannot be achieved at the same time. For practical implementation, we show that polynomial backoff (PB), where $g(k)$ is a polynomial that grows slower than exponential functions, obtains finite delay moments and good throughput performance at the same time within a practical range of user population. This makes PB a better alternative than EB for multimedia applications with stringent delay requirements.
• ### Pragmatic Physical Layer Encryption for Achieving Perfect Secrecy(1210.5599)

Oct. 29, 2012 cs.CR
Conventionally, secrecy is achieved using cryptographic techniques beyond the physical layer. Recent studies raise the interest of performing encryption within the physical layer by exploiting some unique features of the physical wireless channel. Following this spirit, we present a novel physical layer encryption (PLE) scheme that randomizes the radio signal using a secret key extracted from the wireless channel under the assumption of channel reciprocity. Specifically, we propose to jointly design the encryption function and the secret-key generation method. On one hand, we establish a sufficient and necessary condition for the encryption function to achieve perfect secrecy. Based on that, several candidate encryption functions are proposed and compared. We show that, given the secret key available to the legitimate users, perfect secrecy can be achieved without compromising the capability of the communication channel. On the other hand, we study the practical design of the secret-key generation method based on the channel reciprocity. We show that, by introducing marginal system overhead, the key agreement between the legitimate users can be done with a high success probability. The performance advantages of the proposed PLE method is verified through comparisons against other existing PLE methods.
• ### Globally Optimal Distributed Power Control for Nonconcave Utility Maximization(1101.0204)

Nov. 3, 2011 cs.NI