Even correlation and odd correlation of sequences are two kinds of measures for their similarities. Both kinds of correlation have important applications in communication and radar. Compared with vast knowledge on sequences with good even correlation, relatively little is known on sequences with preferable odd correlation. In this paper, a generic construction of sequences with low odd correlation is proposed via interleaving technique. Notably, it can generate new sets of binary sequences with optimal odd correlation asymptotically meeting the Sarwate bound.
Yu ZHOU Jianyong HU Xudong MIAO Xiaoni DU
Low confusion coefficient values can make side-channel attacks harder for vector Boolean functions in Block cipher. In this paper, we give new results of confusion coefficient for f ⊞ g, f ⊡ g, f ⊕ g and fg for different Boolean functions f and g, respectively. And we deduce a relationship on the sum-of-squares of the confusion coefficient between one n-variable function and two (n - 1)-variable decomposition functions. Finally, we find that the confusion coefficient of vector Boolean functions is affine invariant.
A group signature scheme allows us to anonymously sign a message on behalf of a group. One of important issues in the group signatures is user revocation, and thus lots of revocable group signature (RGS) schemes have been proposed so far. One of the applications suitable to the group signature is privacy-enhancing crowdsensing, where the group signature allows mobile sensing users to be anonymously authenticated to hide the location. In the mobile environment, verifier-local revocation (VLR) type of RGS schemes are suitable, since revocation list (RL) is not needed in the user side. However, in the conventional VLR-RGS schemes, the revocation check in the verifier needs O(R) cryptographic operations for the number R of revoked users. On this background, VLR-RGS schemes with efficient revocation check have been recently proposed, where the revocation check is just (bit-string) matching. However, in the existing schemes, signatures are linkable in the same interval or in the same application-independent task with a public index. The linkability is useful in some scenarios, but users want the unlinkability for the stronger anonymity. In this paper, by introducing a property that at most K unlinkable signatures can be issued by a signer during each interval for a fixed integer K, we propose a VLR-RGS scheme with the revocation token matching. In our scheme, even the signatures during the same interval are unlinkable. Furthermore, since used indexes are hidden, the strong anonymity remains. The overheads are the computational costs of the revocation algorithm and the RL size. We show that the overheads are practical in use cases of crowdsensing.
The robust recursive identification method of ARX models is proposed using the beta divergence. The proposed parameter update law suppresses the effect of outliers using a weight function that is automatically determined by minimizing the beta divergence. A numerical example illustrates the efficacy of the proposed method.
This paper shows that upper bounds on the coefficients of the shortest vector of a lattice can be represented using the smallest eigenvalue of the Gram matrix for the lattice, obtains its distribution for high-dimensional random Goldstein-Mayer lattice, and applies it to determine the percentage of zeros of coefficient vector.
Atsushi TAGAMI Takuya MIYASAKA Masaki SUZUKI Chikara SASAKI
Recently, there has been a surge of interest in Artificial Intelligence (AI) and its applications have been considered in various fields. Mobile networks are becoming an indispensable part of our society, and are considered as one of the promising applications of AI. In the Beyond 5G/6G era, AI will continue to penetrate networks and AI will become an integral part of mobile networks. This paper provides an overview of the collaborations between networks and AI from two categories, “AI for Network” and “Network for AI,” and predicts mobile networks in the B5G/6G era. It is expected that the future mobile network will be an integrated infrastructure, which will not only be a mere application of AI, but also provide as the process infrastructure for AI applications. This integration requires a driving application, and the network operation is one of the leading candidates. Furthermore, the paper describes the latest research and standardization trends in the autonomous networks, which aims to fully automate network operation, as a future network operation concept with AI, and discusses research issues in the future mobile networks.
Yoshiaki NISHIKAWA Shohei MARUYAMA Takeo ONISHI Eiji TAKAHASHI
It has become increasingly important for industries to promote digital transformation by utilizing 5G and industrial internet of things (IIoT) to improve productivity. To protect IIoT application performance (work speed, productivity, etc.), it is often necessary to satisfy quality of service (QoS) requirements precisely. For this purpose, there is an increasing need to automatically identify the root causes of radio-quality deterioration in order to take prompt measures when the QoS deteriorates. In this paper, a method for identifying the root cause of 5G radio-quality deterioration is proposed that uses machine learning. This Random Forest based method detects the root cause, such as distance attenuation, shielding, fading, or their combination, by analyzing the coefficients of a quadratic polynomial approximation in addition to the mean values of time-series data of radio quality indicators. The detection accuracy of the proposed method was evaluated in a simulation using the MATLAB 5G Toolbox. The detection accuracy of the proposed method was found to be 98.30% when any of the root causes occurs independently, and 83.13% when the multiple root causes occur simultaneously. The proposed method was compared with deep-learning methods, including bidirectional long short-term memory (bidirectional-LSTM) or one-dimensional convolutional neural network (1D-CNN), that directly analyze the time-series data of the radio quality, and the proposed method was found to be more accurate than those methods.
Javier Jose DIAZ RIVERA Waleed AKBAR Talha AHMED KHAN Afaq MUHAMMAD Wang-Cheol SONG
Zero Trust Networking (ZTN) is a security model where no default trust is given to entities in a network infrastructure. The first bastion of security for achieving ZTN is strong identity verification. Several standard methods for assuring a robust identity exist (E.g., OAuth2.0, OpenID Connect). These standards employ JSON Web Tokens (JWT) during the authentication process. However, the use of JWT for One Time Token (OTT) enrollment has a latent security issue. A third party can intercept a JWT, and the payload information can be exposed, revealing the details of the enrollment server. Furthermore, an intercepted JWT could be used for enrollment by an impersonator as long as the JWT remains active. Our proposed mechanism aims to secure the ownership of the OTT by including the JWT as encrypted metadata into a Non-Fungible Token (NFT). The mechanism uses the blockchain Public Key of the intended owner for encrypting the JWT. The blockchain assures the JWT ownership by mapping it to the intended owner's blockchain public address. Our proposed mechanism is applied to an emerging Zero Trust framework (OpenZiti) alongside a permissioned Ethereum blockchain using Hyperledger Besu. The Zero Trust Framework provides enrollment functionality. At the same time, our proposed mechanism based on blockchain and NFT assures the secure distribution of OTTs that is used for the enrollment of identities.
Kentaro ISHIZU Mitsuhiro AZUMA Hiroaki YAMAGUCHI Akihito KATO Iwao HOSAKO
Beyond 5G is the next generation mobile communication system expected to be used from around 2030. Services in the 2030s will be composed of multiple systems provided by not only the conventional networking industry but also a wide range of industries. However, the current mobile communication system architecture is designed with a focus on networking performance and not oriented to accommodate and optimize potential systems including service management and applications, though total resource optimizations and service level performance enhancement among the systems are required. In this paper, a new concept of the Beyond 5G cross-industry service platform (B5G-XISP) is presented on which multiple systems from different industries are appropriately organized and optimized for service providers. Then, an architecture of the B5G-XISP is proposed based on requirements revealed from issues of current mobile communication systems. The proposed architecture is compared with other architectures along with use cases of an assumed future supply chain business.
Satoru KUROKAWA Michitaka AMEYA Yui OTAGAKI Hiroshi MURATA Masatoshi ONIZAWA Masahiro SATO Masanobu HIROSE
We have developed an all-optical fiber link antenna measurement system for a millimeter wave 5th generation mobile communication frequency band around 28 GHz. Our developed system consists of an optical fiber link an electrical signal transmission system, an antenna-coupled-electrode electric-field (EO) sensor system for 28GHz-band as an electrical signal receiving system, and a 6-axis vertically articulated robot with an arm length of 1m. Our developed optical fiber link electrical signal transmission system can transmit the electrical signal of more than 40GHz with more than -30dBm output level. Our developed EO sensor can receive the electrical signal from 27GHz to 30GHz. In addition, we have estimated a far field antenna factor of the EO sensor system for the 28GHz-band using an amplitude center modified antenna factor estimation equation. The estimated far field antenna factor of the sensor system is 83.2dB/m at 28GHz.
Ryunosuke MUROFUSHI Nobuhiro KUGA Eiji HANAYAMA
In this paper, a concept of non-contact PIM evaluation method using balanced transmission lines is proposed for impedance-matched PIM measurement systems. In order to evaluate the PIM characteristics of a MSL by using its image model, measurement system using balanced transmission line is introduced. In non-contact PIM measurement, to reduce undesirable PIM generation by metallic contact and the PIM-degradation in repeated measurements, a non-contact connector which is applicable without any design changes in DUT is introduce. The three-dimensional balun composed of U-balun and balanced transmission line is also proposed so that it can be applicable to conventional unbalanced PIM measurement systems. In order to validate the concept of the proposed system, a sample using nickel producing high PIM is introduced. In order to avoid the effect of the non-contact connection part on observed PIM, a sample-configuration that PIM-source exists outside of the non-contact connection part is introduced. It is also shown using a sample using copper that, nickel-sample can be clearly differentiated in PIM characteristics while it is equivalent to low-PIM sample in scattering-parameter characteristics. Finally, by introducing the TRL-calibration and by extracting inherent DUT-characteristics from whole-system characteristics, a method to estimate the PIM characteristics of DUT which cannot be taken directly in measurement is proposed.
Ryuji MIYAMOTO Osamu TAKYU Hiroshi FUJIWARA Koichi ADACHI Mai OHTA Takeo FUJII
With the rapid developments in the Internet of Things (IoT), low power wide area networks (LPWAN) framework, which is a low-power, long-distance communication method, is attracting attention. However, in LPWAN, the access time is limited by Duty Cycle (DC) to avoid mutual interference. Packet-level index modulation (PLIM) is a modulation scheme that uses a combination of the transmission time and frequency channel of a packet as an index, enabling throughput expansion even under DC constraints. The indexes used in PLIM are transmitted according to the mapping. However, when many sensors access the same index, packet collisions occur owing to selecting the same index. Therefore, we propose a mapping design for PLIM using mathematical optimization. The mapping was designed and modeled as a quadratic integer programming problem. The results of the computer simulation evaluations were used to realize the design of PLIM, which achieved excellent sensor information aggregation in terms of environmental monitoring accuracy.
Synthetic aperture radar (SAR) is a device for observing the ground surface and is one of the important technologies in the field of microwave remote sensing. In SAR observation, a platform equipped with a small-aperture antenna flies in a straight line and continuously radiates pulse waves to the ground during the flight. After that, by synthesizing the series of observation data obtained during the flight, one realize high-resolution ground surface observation. In SAR observation, there are two spatial resolutions defined in the range and azimuth directions and they are limited by the bandwidth of the SAR system. The purpose of this study is to improve the resolution of SAR by sparse reconstruction. In particular, we aim to improve the resolution of SAR without changing the frequency parameters. In this paper, we propose to improve the resolution of SAR using the deconvolution iterative shrinkage-thresholding algorithm (ISTA) and verify the proposed method by carrying out an experimental analysis using an actual SAR dataset. Experimental results show that the proposed method can improve the resolution of SAR with low computational complexity.
Daisuke AMAYA Takuji TACHIBANA
Network function virtualization (NFV) technology significantly changes the traditional communication network environments by providing network functions as virtual network functions (VNFs) on commercial off-the-shelf (COTS) servers. Moreover, for using VNFs in a pre-determined sequence to provide each network service, service chaining is essential. A VNF can provide multiple service chains with the corresponding network function, reducing the number of VNFs. However, VNFs might be the source or the target of a cyberattack. If the node where the VNF is installed is attacked, the VNF would also be easily attacked because of its security vulnerabilities. Contrarily, a malicious VNF may attack the node where it is installed, and other VNFs installed on the node may also be attacked. Few studies have been done on the security of VNFs and nodes for service chaining. This study proposes a service chain construction with security-level management. The security-level management concept is introduced to built many service chains. Moreover, the cost optimization problem for service chaining is formulated and the heuristic algorithm is proposed. We demonstrate the effectiveness of the proposed method under certain network topologies using numerical examples.
Weisen LUO Xiuqin WEI Hiroo SEKIYA
This paper presents an analysis-based design method for designing the class-Φ22 wireless power transfer (WPT) system, taking its subsystems as a whole into account. By using the proposed design method, it is possible to derive accurate design values which can make sure the class-E Zero-Voltage-Switching/Zero-Derivative-Switching (ZVS/ZDS) to obtain without applying any tuning processes. Additionally, it is possible to take the effects of the switch on resistance, diode forward voltage drop, and equivalent series resistances (ESRs) of all passive elements on the system operations into account. Furthermore, design curves for a wide range of parameters are developed and organized as basic data for various applications. The validities of the proposed design procedure and derived design curves are confirmed by LTspice simulation and circuit experiment. In the experimental measurements, the class-Φ22 WPT system achieves 78.8% power-transmission efficiency at 6.78MHz operating frequency and 7.96W output power. Additionally, the results obtained from the LTspice simulation and laboratory experiment show quantitative agreements with the analytical predictions, which indicates the accuracy and validity of the proposed analytical method and design curves given in this paper.
Non-orthogonal multipe access based multiple-input multiple-output system (MIMO-NOMA) has been widely used in improving user's achievable rate of millimeter wave (mmWave) communication. To meet different requirements of each user in multi-user beams, this paper proposes a power allocation algorithm to satisfy the quality of service (QoS) of head user while maximizing the minimum rate of edge users from the perspective of max-min fairness. Suppose that the user who is closest to the base station (BS) is the head user and the other users are the edge users in each beam in this paper. Then, an optimization problem model of max-min fairness criterion is developed under the constraints of users' minimum rate requirements and the total transmitting power of the BS. The bisection method and Karush-Kuhn-Tucher (KKT) conditions are used to solve this complex non-convex problem, and simulation results show that both the minimum achievable rates of edge users and the average rate of all users are greatly improved significantly compared with the traditional MIMO-NOMA, which only consider max-min fairness of users.
This paper introduces heuristic approaches and a deep reinforcement learning approach to solve a joint virtual network function deployment and scheduling problem in a dynamic scenario. We formulate the problem as an optimization problem. Based on the mathematical description of the optimization problem, we introduce three heuristic approaches and a deep reinforcement learning approach to solve the problem. We define an objective to maximize the ratio of delay-satisfied requests while minimizing the average resource cost for a dynamic scenario. Our introduced two greedy approaches are named finish time greedy and computational resource greedy, respectively. In the finish time greedy approach, we make each request be finished as soon as possible despite its resource cost; in the computational resource greedy approach, we make each request occupy as few resources as possible despite its finish time. Our introduced simulated annealing approach generates feasible solutions randomly and converges to an approximate solution. In our learning-based approach, neural networks are trained to make decisions. We use a simulated environment to evaluate the performances of our introduced approaches. Numerical results show that the introduced deep reinforcement learning approach has the best performance in terms of benefit in our examined cases.
Yanming CHEN Bin LYU Zhen YANG Fei LI
In this paper, we investigate a wireless-powered relays assisted batteryless IoT network based on the non-linear energy harvesting model, where there exists an energy service provider constituted by the hybrid access point (HAP) and an IoT service provider constituted by multiple clusters. The HAP provides energy signals to the batteryless devices for information backscattering and the wireless-powered relays for energy harvesting. The relays are deployed to assist the batteryless devices with the information transmission to the HAP by using the harvested energy. To model the energy interactions between the energy service provider and IoT service provider, we propose a Stackelberg game based framework. We aim to maximize the respective utility values of the two providers. Since the utility maximization problem of the IoT service provider is non-convex, we employ the fractional programming theory and propose a block coordinate descent (BCD) based algorithm with successive convex approximation (SCA) and semi-definite relaxation (SDR) techniques to solve it. Numerical simulation results confirm that compared to the benchmark schemes, our proposed scheme can achieve larger utility values for both the energy service provider and IoT service provider.
Shinichi MURATA Takahiro MATSUDA
To localize an unknown wave source in non-line-of-sight environments, a wave source localization scheme using multiple unmanned-aerial-vehicles (UAVs) is proposed. In this scheme, each UAV estimates the direction-of-arrivals (DoAs) of received signals and the wave source is localized from the estimated DoAs by means of maximum likelihood estimation. In this study, by extending the concept of this scheme, we propose a novel wave source localization scheme using a single UAV. In the proposed scheme, the UAV moves on the path comprising multiple measurement points and the wave source is sequentially localized from DoA distributions estimated at these measurement points. At each measurement point, with a moving path planning algorithm, the UAV determines the next measurement point from the estimated DoA distributions and measurement points that the UAV has already visited. We consider two moving path planning algorithms, and validate the proposed scheme through simulation experiments.
Guojin LIAO Yongpeng ZUO Qiao LIAO Xiaofeng TIAN
Frame synchronization detection before data transmission is an important module which directly affects the lifetime and coexistence of underwater acoustic communication (UAC) networks, where linear frequency modulation (LFM) is a frame preamble signal commonly used for synchronization. Unlike terrestrial wireless communications, strong bursty noise frequently appears in UAC. Due to the long transmission distance and the low signal-to-noise ratio, strong short-distance bursty noise will greatly reduce the accuracy of conventional fractional fourier transform (FrFT) detection. We propose a multi-segment verification fractional fourier transform (MFrFT) preamble detection algorithm to address this challenge. In the proposed algorithm, 4 times of adjacent FrFT operations are carried out. And the LFM signal identifies by observing the linear correlation between two lines connected in pair among three adjacent peak points, called ‘dual-line-correlation mechanism’. The accurate starting time of the LFM signal can be found according to the peak frequency of the adjacent FrFT. More importantly, MFrFT do not result in an increase in computational complexity. Compared with the conventional FrFT detection method, experimental results show that the proposed algorithm can effectively distinguish between signal starting points and bursty noise with much lower error detection rate, which in turn minimizes the cost of retransmission.