Wei Feng’s research while affiliated with Tsinghua University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (49)


FIGURE 1. Illustration of the EIH-based non-terrestrial network.
FIGURE 3. Overall latency comparison among different algorithms with different maximum data size.
Edge Information Hub-Empowered 6G NTN: Latency-Oriented Resource Orchestration and Configuration
  • Article
  • Full-text available

January 2024

·

1 Read

·

1 Citation

IEEE Open Journal of the Communications Society

Yueshan Lin

·

Wei Feng

·

Yunfei Chen

·

[...]

·

Yue Gao

Quick response to disasters is crucial for saving lives and reducing loss. This requires low-latency uploading of situation information to the remote command center. Since terrestrial infrastructures are often damaged in disaster areas, non-terrestrial networks (NTNs) are preferable to provide network coverage, and mobile edge computing (MEC) could be integrated to improve the latency performance. Nevertheless, the communications and computing in MEC-enabled NTNs are strongly coupled, which complicates the system design. In this paper, an edge information hub (EIH) that incorporates communication, computing and storage capabilities is proposed to synergize communication and computing and enable systematic design. We first address the joint data scheduling and resource orchestration problem to minimize the latency for uploading sensing data. The problem is solved using an optimal resource orchestration algorithm. On that basis, we propose the principles for resource configuration of the EIH considering payload constraints on size, weight and energy supply. Simulation results demonstrate the superiority of our proposed scheme in reducing the overall upload latency, thus enabling quick emergency rescue.

Download

Fig. 2. ML and magnitude detectors for coherent detection with Gaussian ambient signals when N = 20, 40.
Novel Signal Detectors for Ambient Backscatter Communications in Internet of Things Applications

January 2023

·

19 Reads

·

8 Citations

IEEE Internet of Things Journal

Ambient backscatter communication enables low-cost low-rate wireless interconnections for Internet of Things (IoT) applications. In this work, new signal detectors for different cases of ambient backscatter communications are derived. Specifically, both coherent and partially coherent detectors are obtained for Gaussian ambient signals and phase shift keying (PSK) ambient signals. Maximum likelihood detection method and improved energy detection method (including energy detection and magnitude detection as special cases) are adopted. Numerical results show that the energy detection method has the best performance when the ambient signals are Gaussian, while the magnitude detection method has the best performance when the ambient signals are PSK modulated. Both are comparable to the optimum maximum likelihood detection. Numerical results also show that the improved energy detection method is very flexible and that detectors for PSK ambient signals are slightly better than those for Gaussian ambient signals.


Secrecy rate maximization for 6G cognitive satellite-UAV networks

January 2023

·

18 Reads

·

3 Citations

China Communications

To cover remote areas where terrestrial cellular networks may not be available, non-terrestrial infrastructures such as satellites and unmanned aerial vehicles (UAVs) can be utilized in the upcoming sixth-generation (6G) era. Considering the spectrum scarcity problem, satellites and UAVs need to share the spectrum to save costs, leading to a cognitive satellite-UAV network. Due to the openness of both satellite links and UAV links, communication security has become a major concern in cognitive satellite-UAV networks. In this paper, we safeguard a cognitive satellite-UAV network from a physical layer security (PLS) perspective. Using only the slowly-varying large-scale channel state information (CSI), we jointly allocate the transmission power and subchannels to maximize the secrecy sum rate of UAV users. The optimization problem is a mixed integer nonlinear programming (MINLP) problem with coupling constraints. We propose a heuristic algorithm which relaxes the coupling constraints by the penalty method and obtains a sub-optimal low-complexity solution by utilizing random matrix theory, the max-min optimization tool, and the bipartite graph matching algorithm. The simulation results corroborate the superiority of our proposed scheme.


UAV Jitter May Have Merit: A Fading Analysis in Air-to-Sea Two Ray Channels

November 2022

·

25 Reads

·

6 Citations

IEEE Wireless Communications Letters

Jitter effects caused by airflow and vibrations could be harmful to UAV communications, e.g., it may cause mismatch between the transmit beam and actual user direction. However, jitter introduces additional randomness to the channel, which may have merit in sparse channels that are relatively static and deep faded. For this consideration, we pick the commonly used air-to-sea two ray propagation model and investigate the impact of UAV jitter on the channel fading statistics. Assuming a Gaussian random model for the jitter angle, we derive analytical expressions for the jitter-beneficial probability (the probability that UAV jitter increases the receive power), and the average receive power under jitter, respectively. Accordingly, the jitter-beneficial conditions are analyzed and verified via simulations.


Guest editorial: Maritime communications in 5G and beyond networks

September 2022

·

20 Reads

·

1 Citation

China Communications

With the rapid development of marine activities, there has been an increasing use of Internet-of-Things (IoT) devices for maritime applications. This leads to a growing demand for high-speed and ultra-reliable maritime communications. Current maritime communication networks (MCNs) mainly rely on satellites and on-shore base stations (BSs). The former generally provides limited transmission rate while the latter lacks wide-area coverage capability. As a result, the development of current MCN lags far behind the terrestrial fifth-generation (5G) network.



Double QoS Guarantee for NOMA-Enabled Massive MTC Networks

June 2022

·

29 Reads

·

3 Citations

IEEE Internet of Things Journal

Massive connections and diverse quality of service (QoS) requirements pose a major challenge for machine-type communication (MTC) networks. In this paper, to satisfy various QoS requirements of a massive number of MTC devices (MTCD-s), the devices are divided into multiple clusters based on the QoS characteristics. The cluster access control and intra-cluster resource allocation problems are studied to satisfy the double delay requirements in the access and data transmission phases in a cross-layer approach. Specifically, we formulate an access control problem to maximize the access efficiency with constraints on access and transmission delays. An efficient algorithm is proposed to adaptively adjust the access time intervals and back-off factors of the clusters for different numbers of active MTCDs and transmission rates. Given the access parameters, non-orthogonal multiple access is adopted in resource allocation to maximize the system utility function while guaranteeing the delay requirements for each accessed MTCD. An efficient sequential convex programming iterative algorithm is proposed to solve the NP-hard nonconvex problem with two typical utility objectives: total throughput and consumed power. Simulation results show that the proposed scheme can achieve better performance in terms of access efficiency, delay, throughput, and consumed power than other schemes. The impacts of various parameters, including delay and traffic rate, on the performance are disclosed.


Zero Trust Architecture for 6G Security

March 2022

·

322 Reads

·

1 Citation

The upcoming sixth generation (6G) network is envisioned to be more open and heterogeneous than earlier generations. This challenges conventional security architectures, which typically rely on the construction of a security perimeter at network boundaries. In this article, we propose a software-defined zero trust architecture (ZTA) for 6G networks, which is promising for establishing an elastic and scalable security regime. This architecture achieves secure access control through adaptive collaborations among the involved control domains, and can effectively prevent malicious access behaviors such as distributed denial of service (DDoS) attacks, malware spread, and zero-day exploits. We also introduce key design aspects of this architecture and show the simulation results of a case study, which shows the effectiveness and robustness of ZTA for 6G. Furthermore, we discuss open issues to further promote this new architecture.


Reinforcement Learning-Empowered Mobile Edge Computing for 6G Edge Intelligence

January 2022

·

102 Reads

Mobile edge computing (MEC) is considered a novel paradigm for computation-intensive and delay-sensitive tasks in fifth generation (5G) networks and beyond. However, its uncertainty, referred to as dynamic and randomness, from the mobile device, wireless channel, and edge network sides, results in high-dimensional, nonconvex, nonlinear, and NP-hard optimization problems. Thanks to the evolved reinforcement learning (RL), upon iteratively interacting with the dynamic and random environment, its trained agent can intelligently obtain the optimal policy in MEC. Furthermore, its evolved versions, such as deep RL (DRL), can achieve higher convergence speed efficiency and learning accuracy based on the parametric approximation for the large-scale state-action space. This paper provides a comprehensive research review on RL-enabled MEC and offers insight for development in this area. More importantly, associated with free mobility, dynamic channels, and distributed services, the MEC challenges that can be solved by different kinds of RL algorithms are identified, followed by how they can be solved by RL solutions in diverse mobile applications. Finally, the open challenges are discussed to provide helpful guidance for future research in RL training and learning MEC.


Truthful Transaction Protocol for E-Commerce Networks Based on Double Auction

January 2022

·

9 Reads

·

2 Citations

IEEE Transactions on Network Science and Engineering

With the prosperous development of e-commerce, customized products have gradually become an important part of online transactions, opening up a new promising market for traditional e-commerce. However, mainstream transaction networks do not provide efficient support to transactions of customized products, thus failing to meet the personalized needs of customers, and pricing strategies are usually dominated by sellers, leading to loss of customers' interests. To overcome these problems, we propose an efficient truthful transaction protocol for e-commerce networks, called ETTP. First, we design a screening algorithm to achieve on-demand selection of transaction participants in hierarchical network domains before transaction initiation. This screening algorithm is customer-oriented and offers personalized commodities by preventing unqualified sellers from participating in the transaction. Furthermore, we develop the ETTP-Auction algorithm based on double auction to improve the transaction efficiency. ETTP-Auction inherently ensures the participation of buyers in pricing and protects their interests. Finally, we prove theoretically that ETTP-Auction satisfies the four economic properties (individual rationality, incentive compatibility, budget balance, and computational efficiency) and verify the performance of the proposed method through simulations. Our ETTP protocol achieves significantly higher system performance, reduces communication overhead, and features better scalability compared with benchmark methods.


Citations (37)


... While BFED offers a practical solution for constantenvelope signal detection in resource-constrained environments, it raises an important theoretical question: is the energy detector truly the optimal noncoherent detection statistic, or could better decision metrics be derived? Traditional approaches often assume that the optimal noncoherent detector reduces to a simple energy detector, based on the structure of IQ demodulators, without a rigorous formal proof [10], [15], [22], [24]. This creates a critical gap in the theory, as it remains unclear whether more effective detection strategies can be formulated from first principles. ...

Reference:

Optimum Noncoherent Detection of Constant-Envelope Signals using Received Signal Magnitudes -Energy Detection and Amplitude Detection
Novel Signal Detectors for Ambient Backscatter Communications in Internet of Things Applications

IEEE Internet of Things Journal

... The design target becomes, for the terrestrial link, to maximize the achievable secrecy rate for the secondary user, under the constraint of a limited interference on the primary satellite users. The same design can be applied to fully non-terrestrial cognitive networks, where the secondary links are provided by several UAVs [43] with the target of maximizing the secrecy sum rate over all the secondary transmissions. ...

Secrecy rate maximization for 6G cognitive satellite-UAV networks
  • Citing Article
  • January 2023

China Communications

... Correspondingly, e-commerce is attracting the attention of more and more users, so the scale of transactions and the number of users have significantly expanded. The frequency of users' online transactions and the use of personal information have increased substantially [5]. ...

Truthful Transaction Protocol for E-Commerce Networks Based on Double Auction
  • Citing Article
  • January 2022

IEEE Transactions on Network Science and Engineering

... Meanwhile, non-orthogonal multiple access (NOMA) can be applied in mobile communications. NOMA potentially outperforms orthogonal multiple access [6][7][8][9] by allocating asymmetric transmission power to users and adopting successive decoding. In [10], a comprehensive study for current advanced NOMA was performed, where applications such an exhaustive search was performed to find the optimal energy allocation after designing the caching placement and Lagrange dual method was applied to solve the optimization problem [25]. ...

Double QoS Guarantee for NOMA-Enabled Massive MTC Networks
  • Citing Article
  • June 2022

IEEE Internet of Things Journal

... This architecture offers flexible and scalable security mechanisms, effectively mitigating threats such as Distributed Denial of Service (DDoS) attacks and zero-day exploits. However, unresolved issues still need to be addressed, such as more thorough simulation studies and real-world validations to enhance and optimize ZTA implementations for future networks [14]. ...

Zero Trust Architecture for 6G Security

... Ref. [17] specifies use cases for positioning services in 5G, such as accurate positioning to support augmented reality, emergency services, or UAV missions and operations, that can be simultaneously used with radar sensing or provided by it. The authors in [18] provided a complex and detailed overview of radio sensing using 5G signals, first presenting basic theories and concepts, continuing with state-of-the-art and exemplary applications, and ending with an analysis of open challenges. They also characterized the 5G OFDMbased radar. ...

Radio Sensing Using 5G Signals: Concepts, State-of-the-art and Challenges
  • Citing Article
  • December 2021

IEEE Internet of Things Journal

... Consequently, OTFS is specifically tailored to mitigate high-speed channel fading due to the Doppler effect, and offers a novel modulation for wireless transmission systems encountering high-mobility networking scenarios [20]. Over time, further research findings identified additional benefits of OTFS, including a lower peak-to-average power ratio [21], [22] compared to traditional OFDM, which simplifies the power amplifier design and improves transmit power efficiency. Efforts to design more practical OTFS implementations have led to significant advances, including the integration of OTFS with multiple-input multiple-output (MIMO) system by Kollengode et al. [23], effective receiver designs by Raviteja et al. [24], channel estimation algorithm proposed by Raviteja et al. [25], and uplink synchronization method by Alok et al. [26], among others. ...

Charactering the Peak-to-Average Power Ratio of OTFS Signals: A Large System Analysis
  • Citing Article
  • November 2021

IEEE Transactions on Wireless Communications

... By simultaneously serving multiple users within the same frequency, time and spatial resource, non-orthogonal multiple access (NOMA) provides a flexible access dimension for exploiting the limited resources [8][9][10]. Encouraged by the potential advantages of NOMA schemes, they have been investigated in diverse terrestrial networks [11][12][13][14] as well as in SMINs [15][16][17]. However, there is a paucity of related NOMA-based studies in the satellite uplink (UL), because the hostile fading inevitably degrades the performance of the user to satellite direct link. ...

NOMA-based UAV communications for maritime coverage enhancement
  • Citing Article
  • April 2021

China Communications

... UAVs are effectively used in maritime and offshore services, to gather data for inspection process, security and surveillance, maritime search and rescue, autonomous deliveries, and autonomous ships. 6,7,21-23 Wang et al., 24 Campos et al., 25 Wei et al., 26 Zhou et al., 27 and Saarnisaari et al. 28 proposed different system models to achieve high-speed connectivity by incorporating UAVs with on-board BSs. Signal strength experienced by the devices on vessels is relatively weaker compared to offshore communication network. ...

Joint Link Scheduling and Rate Adaptation for Energy-Efficient Internet of Vessels
  • Citing Conference Paper
  • June 2021

... Many works in the open literature targeted mixed FSO/RF relaying systems as well. For example, Ref. [5] derived that can be either a RF link [23][24][25][26][27] or an optical link [28]. In this context, the amount of harvested energy dictates the achievable performance levels along the relay-destination link that, in its turn, directly contributes to fixing the end-to-end performance that is limited by the weakest of the two hops. ...

Practical Non-Linear Responsivity Model and Outage Analysis for SLIPT/RF Networks
  • Citing Article
  • May 2021

IEEE Transactions on Vehicular Technology