Federated Learning Driven Sparse Code Multiple Access in V2X Communications

Zhen Chen, Xiu Yin Zhang*, Daniel K. C. So, Kai-Kit Wong, Chan-Byoung Chae, Jiangzhou Wang

*Corresponding author for this work

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

2 Citations (Scopus)

Abstract

Sparse code multiple access (SCMA) is one of the competitive non-orthogonal multiple access techniques for the next generation multiple access systems. One of the main challenges is high computational complexity and the SCMA-aided codewords, that is, each terminal device maintains its local data and codewords, which provides no incentive for model updating to accommodate rapidly changing vehicle communication environment. Federated learning (FL) proves its effectiveness by enabling terminals to collaboratively train their local neural network models with private data while protecting the individual SCMA-aided codewords. To select reliable and trusted codewords, this article provides an overview of the salient characteristics of the application of federated learning-driven SCMA for vehicular communication and discusses its fundamental research challenges. Furthermore, we outline the advancement of federated learning-driven SCMA schemes and present a general framework with potential solutions to the challenges. Finally, several future research directions and open issues are discussed regarding federated learning-driven SCMA schemes. © 2024 IEEE.
Original languageEnglish
Pages (from-to)267-274
JournalIEEE Network
Volume38
Issue number6
Online published19 Mar 2024
DOIs
Publication statusPublished - Nov 2024

Research Keywords

  • 6G mobile communication
  • Codes
  • Data models
  • Decoding
  • Federated learning
  • Real-time systems
  • reconfigurable intelligent surfaces
  • Reliability
  • sparse code multiple access (SCMA)
  • Vehicle-to-everything
  • vehicular communication

Fingerprint

Dive into the research topics of 'Federated Learning Driven Sparse Code Multiple Access in V2X Communications'. Together they form a unique fingerprint.

Cite this