Project Details
Projekt Print View

FIBONACCI: Full-Duplex In-Band Multipoint-Unicast Communication und Cooperation

Subject Area Electronic Semiconductors, Components and Circuits, Integrated Systems, Sensor Technology, Theoretical Electrical Engineering
Term from 2017 to 2024
Project identifier Deutsche Forschungsgemeinschaft (DFG) - Project number 325440754
 
Final Report Year 2023

Final Report Abstract

Predictions show that the number of devices with communication capability will rise to 30 billions by 2025, leading to a new paradigm referred to as the Internet-of-Things (IoT). This new paradigm will lead to new and more sophisticated network topologies. As a consequence there is an increasing need for the understanding of the fundamental characteristics of such networks. The way those so called device-to-device (D2D) communication networks operate is that they have to establish either a connection through a direct link between each other or through helping parties such as additional nodes or/and servers. As those devices are utilizing the same scarce resources such as wireless frequency bandwidth, interference is a natural resultant in such a network, which one has to deal with. In particular, if one or more of the links between the devices are of intermittent character, due to, e.g., the deployment of unmanned aerial vehicles (UAV) to enable the communication, novel interference management strategies are needed. The aim of the project was thus to design novel interference management strategies to deal with intermittent node activity and take into account the statistical properties of channels associated with nodes operating at some altitude above the ground. Furthermore, those D2D networks are usually deployed in environments with exiting networks and thus the interaction, in particular the cooperation, between the D2D network and the existing cellular network was addressed. Here, the challenges of non-ideal hardware constraints and the efficiency of energy utilization and harvesting was considered. Last but not not least, assuming that some of the nodes within the system are malicious, here in particular the relays/servers, novel schemes have been proposed to ensure that tasks and the associated data offloaded by the nodes to the servers are kept confidential, while keeping the overall overhead for uploading and downloading the data to the minimum.

Publications

 
 

Additional Information

Textvergrößerung und Kontrastanpassung