2,474 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    5G Mobile Communications

    Get PDF
    This book provides a comprehensive overview of the emerging technologies for next-generation 5G mobile communications, with insights into the long-term future of 5G. Written by international leading experts on the subject, this contributed volume covers a wide range of technologies, research results, and networking methods. Key enabling technologies for 5G systems include, but are not limited to, millimeter-wave communications, massive MIMO technology and non-orthogonal multiple access. 5G will herald an even greater rise in the prominence of mobile access based upon both human-centric and machine-centric networks. Compared with existing 4G communications systems, unprecedented numbers of smart and heterogeneous wireless devices will be accessing future 5G mobile systems. As a result, a new paradigm shift is required to deal with challenges on explosively growing requirements in mobile data traffic volume (1000x), number of connected devices (10–100x), typical end-user data rate (10–100x), and device/network lifetime (10x). Achieving these ambitious goals calls for revolutionary candidate technologies in future 5G mobile systems. Designed for researchers and professionals involved with networks and communication systems, 5G Mobile Communications is a straightforward, easy-to-read analysis of the possibilities of 5G systems

    A Trust-Based Relay Selection Approach to the Multi-Hop Network Formation Problem in Cognitive Radio Networks

    Get PDF
    One of the major challenges for today’s wireless communications is to meet the growing demand for supporting an increasing diversity of wireless applications with limited spectrum resource. In cooperative communications and networking, users share resources and collaborate in a distributed approach, similar to entities of active social groups in self organizational communities. Users’ information may be shared by the user and also by the cooperative users, in distributed transmission. Cooperative communications and networking is a fairly new communication paradigm that promises significant capacity and multiplexing gain increase in wireless networks. This research will provide a cooperative relay selection framework that exploits the similarity of cognitive radio networks to social networks. It offers a multi-hop, reputation-based power control game for routing. In this dissertation, a social network model provides a humanistic approach to predicting relay selection and network analysis in cognitive radio networks

    Coding for Relay Networks with Parallel Gaussian Channels

    Get PDF
    A wireless relay network consists of multiple source nodes, multiple destination nodes, and possibly many relay nodes in between to facilitate its transmission. It is clear that the performance of such networks highly depends on information for- warding strategies adopted at the relay nodes. This dissertation studies a particular information forwarding strategy called compute-and-forward. Compute-and-forward is a novel paradigm that tries to incorporate the idea of network coding within the physical layer and hence is often referred to as physical layer network coding. The main idea is to exploit the superposition nature of the wireless medium to directly compute or decode functions of transmitted signals at intermediate relays in a net- work. Thus, the coding performed at the physical layer serves the purpose of error correction as well as permits recovery of functions of transmitted signals. For the bidirectional relaying problem with Gaussian channels, it has been shown by Wilson et al. and Nam et al. that the compute-and-forward paradigm is asymptotically optimal and achieves the capacity region to within 1 bit; however, similar results beyond the memoryless case are still lacking. This is mainly because channels with memory would destroy the lattice structure that is most crucial for the compute-and-forward paradigm. Hence, how to extend compute-and-forward to such channels has been a challenging issue. This motivates this study of the extension of compute-and-forward to channels with memory, such as inter-symbol interference. The bidirectional relaying problem with parallel Gaussian channels is also studied, which is a relevant model for the Gaussian bidirectional channel with inter-symbol interference and that with multiple-input multiple-output channels. Motivated by the recent success of linear finite-field deterministic model, we first investigate the corresponding deterministic parallel bidirectional relay channel and fully characterize its capacity region. Two compute-and-forward schemes are then proposed for the Gaussian model and the capacity region is approximately characterized to within a constant gap. The design of coding schemes for the compute-and-forward paradigm with low decoding complexity is then considered. Based on the separation-based framework proposed previously by Tunali et al., this study proposes a family of constellations that are suitable for the compute-and-forward paradigm. Moreover, by using Chinese remainder theorem, it is shown that the proposed constellations are isomorphic to product fields and therefore can be put into a multilevel coding framework. This study then proposes multilevel coding for the proposed constellations and uses multistage decoding to further reduce decoding complexity
    • …
    corecore