Prof. Markku Juntti


Principal investigator at CWC for two EU FP7 Integrated projects:

DUPLO (Full-Duplex Radios for Local Access)
In the project technical solutions for efficient self-interference cancellation in wireless transceivers to enable the usage of full-duplex transmission in different nodes of wireless communications networks are developed. Attainable gains of full-duplex transmission and required system level solutions to accommodate the new transmission mode in wireless communications networks is investigated. Novel solutions for antenna, RF and baseband domain self-interference cancellation are analyzed and developed. The most promising concepts will be implemented in a test hardware circuitry.

BUTLER (uBiquitous, secUre inTernet-of-things with Location and contExt-awaReness)
Recent ICT advances are bringing to reality a world where sensors, actuators and smart portable devices are interconnected into an Internet-of-Things (IoT) ecosystem reaching 50 Billion devices by 2015. The IoT major challenges are, from a systemic viewpoint, smart resource management and digital security; and from a user/service perspective, the pervasiveness (uniformity of performance anytime and anywhere) and awareness (inversely proportional to the degree of knowledge required from users).
BUTLER will be the first European project to emphasise pervasiveness, context-awareness and security for IoT. Through a consortium of leading Industrial, Corporate R&D and Academic partners with extensive and complementary know-how, BUTLER will integrate current and develop new technologies to form a “bundle” of applications, platform features and services that will bring IoT to life.
For this purpose, BUTLER will focus on:
a) Improving/creating enabling technologies to implement a well-defined vision of secure, pervasive and context-aware IoT, where links are inherently secure (from PHY to APP layers) applications cut across different scenarios (Home, Office, Transportation, Health, etc.), and the network reactions to users are adjusted to their needs (learned and monitored in real time).
b) Integrating/developing a new flexible smartDevice-centric network architecture where platforms (devices) function according to three well-defined categories: smartObject (sensors, actuators, gateways), smartMobile (user’s personal device) and smartServers (providers of contents and services), interconnected over IPv6.
c) Building a series of field trials, which progressively integrate and enhance state-of-the-art technologies to showcase BUTLER’s secure, pervasive and context-aware vision of IoT.
In addition to these R&D innovations, BUTLER and its External Members Group will also aggregate and lead the European effort in the standardisation and exploitation of IoT technologies.

Principal Investigator for 2 national TEKES projects:

CoMIT (Cooperative MIMO Techniques for Cellular System Evolution)
CoMIT is a wireless cellular communication system research project covering the future development and evolution of cellular communication systems including 3GPP Long Tern Evolution Advanced (LTE-A) and other 4G systems like IMT-Advanced (IMT-A) as well as hybrid satellite-terrestrial systems. The main emphasis is on cooperative MIMO transmission schemes and the transceiver algorithms and architectures needed by them in multiuser systems. Both downlink and uplink communication problems are addressed. However, the key driver is the evolution of the cellular network topology from the legacy downlink-uplink paradigm to more heterogeneous mesh network topologies. The ultimate goal is to create practical transceiver and system technology to enable cost, power and energy efficient implementation of network nodes of future wireless networks.

NETS2020 (Networks of 2020)
The project is a strategic wireless communication system research project covering the future development and evolution of cellular communication systems including IMT-Advanced (IMT-A), its further evolution and its integration with other communication and data networks. The main emphasis is on evolving wireless network topologies, such as relay based and device-to-device connections, and on distributed algorithms performing automated network management tasks on networks with such novel topologies. The research is carried out in close cooperation with the best Chinese universities and research institutes in the field to enable smooth application of the technology in evolving standards.

Principal Investigator for Academy of Finland three projects:

BeCON (Beamforming and Radio Resource Management in Co-Operative Wireless Networks)
1.1.2009 - 31.12.2012
The project considers opportunistic co-operative wireless networks. Particular emphasis is on linear beamforming and radio resource management theory, analysis and solutions. Both base station or infrastructure and user co-operation are considered. The objectives of the project include achieving deep theoretical understanding on the capacity of the co-operative wireless cellular networks, linear transmit/receive beamforming design and optimization, estimates of transceiver complexity, and design guidelines of heterogeneous wireless networks based on the co-operation paradigm.

CoMuNet (Collaborative Multiuser MIMO Networks)
1.1.2012 - 31.12.2012
This project is a joint project with Beijing University of Posts and Telecommunications (BUPT) funded by Academy of Finland and National Science Foundation of China (NSFC). It considers opportunistic cooperative wireless networks. Particular emphasis is on interference mitigation and control as well as joint precoding and equalization optimization. The equalizers are not assumed to be linear which makes the optimization challenging and requires usage of advanced tools. Suboptimal solutions for practical computation architectures are also studied to enable practical implementation of the techniques.

SeCoFu (Sensing, Compression, Communications and Data Fusion in Wireless Sensor Networks)
The general goal of the project is to develop scientific knowledge on the techniques for the sensing (estimation and classification), compression, communication, networking and data fusion in sensor networks. Also node computation and implementations are addressed, but the emphasis is on statistical inference and related theoretical framework. The main target is to achieve deep theoretical understanding on the fundamental behavior to develop new scientific knowledge. The scientific knowledge is then applied to find guidelines to develop practically relevant solutions for future networks and their device implementation.

RoSeCoRN (Robust and Secure Cognitive Radio Networks)
Cognitive radio is a promising paradigm for dramatically increasing the utilization of wireless spectrum to support the continuing exponential growth in wireless traffic. Research on cognitive networks has mainly focused on sensing of spectrum opportunities and managing radio resources such that the primary users’ quality of service is not compromised. Much less attention has been paid to the coexistence of secondary users, which may be associated with different cognitive networks and seek to operate in the same frequency bands. Effective coexistence of such users is essential for the success of future cognitive networks, and is the main objective of this project. In addition, the particularly open nature of cognitive radio raises significant new issues for the security and privacy of the transmitted data, as well as new opportunities for malicious behavior among cognitive or outside entities. The project addresses all of these issues in a holistic framework. Coexistence requires effective allocation of radio resources in time, frequency, and space among multiple cognitive secondary users, while respecting primary interference constraints. The investigators are developing theoretical bounds for such radio resource management schemes and designing low-overhead distributed algorithms, which account for the incentives of competing secondary service providers as well as the stronger security and privacy measures needed in a cognitive environment. Information-theoretic physical-layer security techniques are being utilized to develop provably secure paradigms for secondary cognitive users and game-theoretic models are being adapted to study the robustness of these networks to various jamming attacks and other malicious behavior.