Abstract:We propose a framework to design integrated communication and computing (ICC) receivers capable of simultaneously detecting data symbols and performing over-the-air computing (AirComp) in a manner that: a) is systematically generalizable to any nomographic function, b) scales to a massive number of user equipments (UEs) and edge devices (EDs), c) supports the computation of multiple independent functions (streams), and d) operates in a multi-access fashion whereby each transmitter can choose to transmit either data symbols, computing signals or both. For the sake of illustration, we design the proposed multi-stream and multi-access method under an uplink setting, where multiple single-antenna UEs/EDs simultaneously transmit data and computing signals to a single multiple-antenna base station (BS)/access point (AP). Under the communication functionality, the receiver aims to detect all independent communication symbols while treating the computing streams as aggregate interference which it seeks to mitigate; and conversely, under the computing functionality, to minimize the distortion over the computing streams while minimizing their mutual interference as well as the interference due to data symbols. To that end, the design leverages the Gaussian belief propagation (GaBP) framework relying only on element-wise scalar operations coupled with closed-form combiners purpose-built for the AirComp operation, which allows for its use in massive settings, as demonstrated by simulation results incorporating up to 200 antennas and 300 UEs/EDs. The efficacy of the proposed method under different loading conditions is also evaluated, with the performance of the scheme shown to approach fundamental limiting bounds in the under/fully loaded cases.
Abstract:We propose a new waveform suitable for integrated sensing and communications (ISAC) systems facing doubly-dispersive (DD) channel conditions, as typically encountered in high mobility scenarios. Dubbed Affine Filter Bank Modulation (AFBM), this novel waveform is designed based on a filter-bank structure, known for its ability to suppress out-of-band emissions (OOBE), while integrating a discrete affine Fourier transform (DAFT) precoding stage which yields low peak-to-average power ratio (PAPR) and robustness to DD distortion, as well as other features desirable for ISAC. Analytical and simulation results demonstrate that AFBM maintains quasi-orthogonality similar to that of affine frequency division multiplexing (AFDM) in DD channels, while achieving PAPR levels 3 dB lower, in addition to OOBE as low as -100 dB when implemented with PHYDYAS prototype filters.
Abstract:We consider stacked intelligent metasurfaces (SIMs) as a tool to improve the performance of bistatic integrated sensing and communications (ISAC) schemes. To that end, we optimize the SIMs and design a radar parameter estimation (RPE) scheme aimed at enhancing radar sensing capabilities as well as communication performance under ISAC-enabling waveforms known to perform well in doubly-dispersive (DD) channels. The SIM optimization is done via a min-max problem formulation solved via steepest ascent with closed-form gradients, while the RPE is carried out via a compressed sensing-based probabilistic data association (PDA) algorithm. Our numerical results indicate that the design of waveforms suitable to mitigating the effects of DD channels is significantly impacted by the emerging SIM technology.
Abstract:We propose a novel low-complexity three-dimensional (3D) localization algorithm for wireless sensor networks, termed quaternion-domain super multidimensional scaling (QD-SMDS). This algorithm reformulates the conventional SMDS, which was originally developed in the real domain, into the quaternion domain. By representing 3D coordinates as quaternions, the method enables the construction of a rank-1 Gram edge kernel (GEK) matrix that integrates both relative distance and angular (phase) information between nodes, maximizing the noise reduction effect achieved through low-rank truncation via singular value decomposition (SVD). The simulation results indicate that the proposed method demonstrates a notable enhancement in localization accuracy relative to the conventional SMDS algorithm, particularly in scenarios characterized by substantial measurement errors.
Abstract:An undesirable consequence of the foreseeable proliferation of sophisticated integrated sensing and communications (ISAC) technologies is the enabling of spoofing, by malicious agents, of situational information (such as proximity, direction or location) of legitimate users of wireless systems. In order to mitigate this threat, we present a novel ISAC scheme that, aided by a reconfigurable intelligent surface (RIS), enables the occultation of the positions of user equipment (UE) from wiretappers, while maintaining both sensing and desired communication performance between the UEs and a legitimate base station (BS). To that end, we first formulate an RIS phase-shift optimization problem that jointly maximizes the sum-rate performance of the UEs (communication objective), while minimizing the projection of the wiretapper's effective channel onto the legitimate channel (hiding objective), thereby disrupting the attempts by a wiretapper of localizing the UEs. Then, in order to efficiently solve the resulting non-convex joint optimization problem, a novel manifold optimization algorithm is derived, whose effectiveness is validated by numerical results, which demonstrate that the proposed approach preserves legitimate ISAC performance while significantly degrading the wiretapper's sensing capability.
Abstract:We introduce a comprehensive approach to enhance the security, privacy, and sensing capabilities of integrated sensing and communications (ISAC) systems by leveraging random frequency agility (RFA) and random pulse repetition interval (PRI) agility (RPA) techniques. The combination of these techniques, which we refer to collectively as random frequency and PRI agility (RFPA), with channel reciprocity-based key generation (CRKG) obfuscates both Doppler frequency and PRIs, significantly hindering the chances that passive adversaries can successfully estimate radar parameters. In addition, a hybrid information embedding method integrating amplitude shift keying (ASK), phase shift keying (PSK), index modulation (IM), and spatial modulation (SM) is incorporated to increase the achievable bit rate of the system significantly. Next, a sparse-matched filter receiver design is proposed to efficiently decode the embedded information with a low bit error rate (BER). Finally, a novel RFPA-based secret generation scheme using CRKG ensures secure code creation without a coordinating authority. The improved range and velocity estimation and reduced clutter effects achieved with the method are demonstrated via the evaluation of the ambiguity function (AF) of the proposed waveforms.
Abstract:Inspired by recent developments in various areas of science relevant to quantum computing, we introduce quantum manifold optimization (QMO) as a promising framework for solving constrained optimization problems in next-generation wireless communication systems. We begin by showing how classical wireless design problems - such as pilot design in cell-free (CF)-massive MIMO (mMIMO), beamformer optimization in gigantic multiple input multiple output (MIMO), and reconfigurable intelligent surface (RIS) phase tuning - naturally reside on structured manifolds like the Stiefel, Grassmannian, and oblique manifolds, with the latter novelly formulated in this work. Then, we demonstrate how these problems can be reformulated as trace-based quantum expectation values over variationally-encoded quantum states. While theoretical in scope, the work lays a foundation for a new class of quantum optimization algorithms with broad application to the design of future beyond-sixth-generation (B6G) systems.
Abstract:We consider the problem of adapting a Post-Quantum cryptosystem to be used in resource-constrained devices, such as those typically used in Device-to-Device and Internet of Things systems. In particular, we propose leveraging the characteristics of wireless communications channels to minimize the complexity of implementation of a Post-Quantum public key encryption scheme, without diminishing its security. To that end, we focus on the adaptation of a well-known cryptosystem, namely CRYSTALS-Kyber, so as to enable its direct integration into the lowest layer of the communication stack, the physical layer, defining two new transport schemes for CRYSTALS-Kyber to be used in Device-to-Device communications, both of which are modeled under a wireless channel subject to Additive White Gaussian Noise, using a 4 Quadrature Amplitude Modulation constellation and a BCH-code to communicate CRYSTALSKyber's polynomial coefficients. Simulation results demonstrate the viability of the adapted Kyber algorithm due to its low key error probability, while maintaining the security reductions of the original Kyber by considering the error distribution imposed by the channel on the cipher.
Abstract:We consider a novel routing protocol suitable for ad-hoc networks with dynamically changing topologies, such as DECT 2020 NR (NR+) systems, which often lead to missing links between the nodes and thus, incomplete or inefficient routes. A key point of the proposed protocol is the combination of network discovery and matrix completion techniques, which allow the nodes to establish communication paths efficiently and reliably. Additionally, multihop localization is performed to estimate the location of the nodes without needing to broadcast each node's geographical position, thus preserving privacy during the routing process and enabling nodes in the network to independently find potentially missing paths in a decentralized manner instead of flooding the whole network. Simulation results illustrate the good performance of the proposed technique in terms of the average number of hops of the obtained routes in different scenarios, with different network densities and amounts of incompleteness.
Abstract:This article presents a novel physical-layer secure communications scheme based on the recently discovered chirp-permuted affine frequency division multiplexing (AFDM) waveform, which results in a completely different received signal to the eavesdropper with the incorrect chirp-permutation order, even under co-located eavesdropping with perfect channel information. The security of the proposed scheme is studied in terms of the complexity required to find the correct permutation via classical and quantum search algorithms, which are shown to be infeasible due the factorially-scaling search space, as well as theoretical and simulated analyses of a random-guess approach, indicating an infeasible probability of breach by chance.