2,666 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A survey of self organisation in future cellular networks
This article surveys the literature over the period of the last decade on the emerging field of self organisation as applied to wireless cellular communication networks. Self organisation has been extensively studied and applied in adhoc networks, wireless sensor networks and autonomic computer networks; however in the context of wireless cellular networks, this is the first attempt to put in perspective the various efforts in form of a tutorial/survey. We provide a comprehensive survey of the existing literature, projects and standards in self organising cellular networks. Additionally, we also aim to present a clear understanding of this active research area, identifying a clear taxonomy and guidelines for design of self organising mechanisms. We compare strength and weakness of existing solutions and highlight the key research areas for further development. This paper serves as a guide and a starting point for anyone willing to delve into research on self organisation in wireless cellular communication networks
Band Allocation for Cognitive Radios with Buffered Primary and Secondary Users
In this paper, we study band allocation of buffered secondary
users (SUs) to orthogonal primary licensed bands, where each
primary band is assigned to one primary user (PU). Each SU is assigned to one
of the available primary bands with a certain probability designed to satisfy
some specified quality of service (QoS) requirements for the SUs. In the
proposed system, only one SU is assigned to a particular band. The optimization
problem used to obtain the stability region's envelope (closure) is shown to be
a linear program. We compare the stability region of the proposed system with
that of a system where each SU chooses a band randomly with some assignment
probability. We also compare with a fixed (deterministic) assignment system,
where only one SU is assigned to one of the primary bands all the time. We
prove the advantage of the proposed system over the other systems.Comment: Accepted in WCNC 201
Price-Based Resource Allocation for Spectrum-Sharing Femtocell Networks: A Stackelberg Game Approach
This paper investigates the price-based resource allocation strategies for
the uplink transmission of a spectrum-sharing femtocell network, in which a
central macrocell is underlaid with distributed femtocells, all operating over
the same frequency band as the macrocell. Assuming that the macrocell base
station (MBS) protects itself by pricing the interference from the femtocell
users, a Stackelberg game is formulated to study the joint utility maximization
of the macrocell and the femtocells subject to a maximum tolerable interference
power constraint at the MBS. Especially, two practical femtocell channel
models: sparsely deployed scenario for rural areas and densely deployed
scenario for urban areas, are investigated. For each scenario, two pricing
schemes: uniform pricing and non-uniform pricing, are proposed. Then, the
Stackelberg equilibriums for these proposed games are studied, and an effective
distributed interference price bargaining algorithm with guaranteed convergence
is proposed for the uniform-pricing case. Finally, numerical examples are
presented to verify the proposed studies. It is shown that the proposed
algorithms are effective in resource allocation and macrocell protection
requiring minimal network overhead for spectrum-sharing-based two-tier
femtocell networks.Comment: 27 pages, 7 figures, Submitted to JSA
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
- …