123 research outputs found

    A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks

    Get PDF
    Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to the relative energy consumption costs, has to be pursued. This paper aims at proposing new analysis tools and investigating the relation between secrecy capacity and energy consumption in a 3rd Generation Partnership Project (3GPP) cellular network , by focusing on secure and energy efficient communications. New metrics that bind together the secure area in the Base Station (BS) sectors, the afforded date-rate and the power spent by the BS to obtain it, are proposed that permit evaluation of the tradeoff between these aspects. The results show that these metrics are useful in identifying the optimum transmit power level for the BS, so that the maximum secure area can be obtained while minimizing the energy consumption

    Self-Evolving Integrated Vertical Heterogeneous Networks

    Full text link
    6G and beyond networks tend towards fully intelligent and adaptive design in order to provide better operational agility in maintaining universal wireless access and supporting a wide range of services and use cases while dealing with network complexity efficiently. Such enhanced network agility will require developing a self-evolving capability in designing both the network architecture and resource management to intelligently utilize resources, reduce operational costs, and achieve the coveted quality of service (QoS). To enable this capability, the necessity of considering an integrated vertical heterogeneous network (VHetNet) architecture appears to be inevitable due to its high inherent agility. Moreover, employing an intelligent framework is another crucial requirement for self-evolving networks to deal with real-time network optimization problems. Hence, in this work, to provide a better insight on network architecture design in support of self-evolving networks, we highlight the merits of integrated VHetNet architecture while proposing an intelligent framework for self-evolving integrated vertical heterogeneous networks (SEI-VHetNets). The impact of the challenges associated with SEI-VHetNet architecture, on network management is also studied considering a generalized network model. Furthermore, the current literature on network management of integrated VHetNets along with the recent advancements in artificial intelligence (AI)/machine learning (ML) solutions are discussed. Accordingly, the core challenges of integrating AI/ML in SEI-VHetNets are identified. Finally, the potential future research directions for advancing the autonomous and self-evolving capabilities of SEI-VHetNets are discussed.Comment: 25 pages, 5 figures, 2 table

    Performance Evaluation of Ultra-Dense Networks with Applications in Internet-of-Things

    Get PDF
    The new wireless era in the next decade and beyond would be very different from our experience nowadays. The fast pace of introducing new technologies, services, and applications requires the researchers and practitioners in the field be ready by making paradigm shifts. The stringent requirements on 5G networks, in terms of throughput, latency, and connectivity, challenge traditional incremental improvement in the network performance. This urges the development of unconventional solutions such as network densification, massive multiple-input multiple-output (massive MIMO), cloud-based radio access network (C-RAN), millimeter Waves (mmWaves), non-orthogonal multiple access (NOMA), full-duplex communication, wireless network virtualization, and proactive content-caching to name a few. Ultra-Dense Network (UDN) is one of the preeminent technologies in the racetrack towards fulfilling the requirements of next generation mobile networks. Dense networks are featured by the deployment of abundant of small cells in hotspots where immense traffic is generated. In this context, the density of small cells surpasses the active users’ density providing a new wireless environment that has never been experienced in mobile communication networks. The high density of small cells brings the serving cells much closer to the end users providing a two-fold gain where better link quality is achieved and more spatial reuse is accomplished. In this thesis, we identified the distinguishing features of dense networks which include: close proximity of many cells to a given user, potential inactivity of most base stations (BSs) due to lack of users, drastic inter-cell interference in hot-spots, capacity limitation by virtue of the backhaul bottleneck, and fundamentally different propagation environments. With these features in mind, we recognized several problems associated with the performance evaluation of UDN which require a treatment different from traditional cellular networks. Using rigorous advanced mathematical techniques along with extensive Monte Carlo simulations, we modelled and analytically studied the problems in question. Consequently, we developed several mathematical frameworks providing closed-form and easy-computable mathematical instruments which network designers and operators can use to tune the networks in order to achieve the optimal performance. Moreover, the investigations performed in this thesis furnish a solid ground for addressing more problems to better understand and exploit the UDN technology for higher performance grades. In Chapter 3, we propose the multiple association in dense network environment where the BSs are equipped with idle mode capabilities. This provides the user with a “data-shower,” where the user’s traffic is split into multiple paths, which helps overcoming the capacity limitations imposed by the backhaul links. We evaluate the performance of the proposed association scheme considering general fading channel distributions. To this end, we develop a tractable framework for the computation of the average downlink rate. In Chapter 4, we study the downlink performance of UDNs considering Stretched Exponential Path-Loss (SEPL) to capture the short distances of the communication links. Considering the idle mode probability of small cells, we draw conclusions which better reflect the performance of network densification considering SEPL model. Our findings reveal that the idle mode capabilities of the BSs provide a very useful interference mitigation technique. Another interesting insight is that the system interference in idle mode capable UDNs is upper-bounded by the interference generated from the active BSs, and in turn, this is upper-bounded by the number of active users where more active users is translated to more interference in the system. This means that the interference becomes independent of the density of the small cells as this density increases. In Chapter 5, we provide the derivation of the average secrecy rate in UDNs considering their distinct traits, namely, idle mode BSs and LOS transmission. To this end, we exploit the standard moment generating function (MGF)-based approach to derive relatively simple and easily computable expressions for the average secrecy rate considering the idle mode probability and Rician fading channel. The result of this investigation avoids the system level simulations where the performance evaluation complexity can be greatly reduced with the aid of the derived analytical expressions. In Chapter 6, we model the uplink coverage of mMTC deployment scenario considering a UDN environment. The presented analysis reveals the significant and unexpected impact of the high density of small cells in UDNs on the maximum transmit power of the MTC nodes. This finding relaxes the requirements on the maximum transmit power which in turn allows for less complexity, brings more cost savings, and yields much longer battery life. This investigation provides accurate, simple, and insightful expressions which shows the impact of every single system parameter on the network performance allowing for guided tunability of the network. Moreover, the results signify the asymptotic limits of the impact of all system parameters on the network performance. This allows for the efficient operation of the network by designing the system parameters which maximizes the network performance. In Chapter 7, we address the impact of the coexistence of MTC and HTC communications on the network performance in UDNs. In this investigation, we study the downlink network performance in terms of the coverage probability and the cell load where we propose two association schemes for the MTC devices, namely, Connect-to-Closest (C2C) and Connect-to-Active (C2A). The network performance is then analyzed and compared in both association schemes. In Chapter 8, we model the uplink coverage of HTC users and MTC devices paired together in NOMA-based radio access. Closed-form and easy-computable analytical results are derived for the considered performance metrics, namely the uplink coverage and the uplink network throughput. The analytical results, which are validated by extensive Monte Carlo simulations, reveal that increasing the density of small cells and the available bandwidth significantly improves the network performance. On the other side, the power control parameters has to be tuned carefully to approach the optimal performance of both the uplink coverage and the uplink network throughput

    Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks

    Get PDF
    By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA) system, while the rest are equipped with a single antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming (DBCJ). Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP). We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency (RF) front ends of each node, the system's secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate.Comment: 29 pages, 7 figures, Submitted to IEEE Transactions on Wireless Communication

    A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From Communications to Sensing and Intelligence

    Full text link
    Due to the advancements in cellular technologies and the dense deployment of cellular infrastructure, integrating unmanned aerial vehicles (UAVs) into the fifth-generation (5G) and beyond cellular networks is a promising solution to achieve safe UAV operation as well as enabling diversified applications with mission-specific payload data delivery. In particular, 5G networks need to support three typical usage scenarios, namely, enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and massive machine-type communications (mMTC). On the one hand, UAVs can be leveraged as cost-effective aerial platforms to provide ground users with enhanced communication services by exploiting their high cruising altitude and controllable maneuverability in three-dimensional (3D) space. On the other hand, providing such communication services simultaneously for both UAV and ground users poses new challenges due to the need for ubiquitous 3D signal coverage as well as the strong air-ground network interference. Besides the requirement of high-performance wireless communications, the ability to support effective and efficient sensing as well as network intelligence is also essential for 5G-and-beyond 3D heterogeneous wireless networks with coexisting aerial and ground users. In this paper, we provide a comprehensive overview of the latest research efforts on integrating UAVs into cellular networks, with an emphasis on how to exploit advanced techniques (e.g., intelligent reflecting surface, short packet transmission, energy harvesting, joint communication and radar sensing, and edge intelligence) to meet the diversified service requirements of next-generation wireless systems. Moreover, we highlight important directions for further investigation in future work.Comment: Accepted by IEEE JSA

    IRS-aided UAV for Future Wireless Communications: A Survey and Research Opportunities

    Full text link
    Both unmanned aerial vehicles (UAVs) and intelligent reflecting surfaces (IRS) are gaining traction as transformative technologies for upcoming wireless networks. The IRS-aided UAV communication, which introduces IRSs into UAV communications, has emerged in an effort to improve the system performance while also overcoming UAV communication constraints and issues. The purpose of this paper is to provide a comprehensive overview of IRSassisted UAV communications. First, we provide five examples of how IRSs and UAVs can be combined to achieve unrivaled potential in difficult situations. The technological features of the most recent relevant researches on IRS-aided UAV communications from the perspective of the main performance criteria, i.e., energy efficiency, security, spectral efficiency, etc. Additionally, previous research studies on technology adoption as machine learning algorithms. Lastly, some promising research directions and open challenges for IRS-aided UAV communication are presented

    Reliable and Secure Drone-assisted MillimeterWave Communications

    Get PDF
    The next generation of mobile networks and wireless communication, including the fifth-generation (5G) and beyond, will provide a high data rate as one of its fundamental requirements. Providing high data rates can be accomplished through communication over high-frequency bands such as the Millimeter-Wave(mmWave) one. However, mmWave communication experiences short-range communication, which impacts the overall network connectivity. Improving network connectivity can be accomplished through deploying Unmanned Ariel Vehicles(UAVs), commonly known as drones, which serve as aerial small-cell base stations. Moreover, drone deployment is of special interest in recovering network connectivity in the aftermath of disasters. Despite the potential advantages, drone-assisted networks can be more vulnerable to security attacks, given their limited capabilities. This security vulnerability is especially true in the aftermath of a disaster where security measures could be at their lowest. This thesis focuses on drone-assisted mmWave communication networks with their potential to provide reliable communication in terms of higher network connectivity measures, higher total network data rate, and lower end-to-end delay. Equally important, this thesis focuses on proposing and developing security measures needed for drone-assisted networks’ secure operation. More specifically, we aim to employ a swarm of drones to have more connection, reliability, and secure communication over the mmWave band. Finally, we target both the cellular 5Gnetwork and Ad hoc IEEE802.11ad/ay in typical network deployments as well as in post-disaster circumstances
    corecore