36 research outputs found
IRS-aided UAV for Future Wireless Communications: A Survey and Research Opportunities
Both unmanned aerial vehicles (UAVs) and intelligent reflecting surfaces
(IRS) are gaining traction as transformative technologies for upcoming wireless
networks. The IRS-aided UAV communication, which introduces IRSs into UAV
communications, has emerged in an effort to improve the system performance
while also overcoming UAV communication constraints and issues. The purpose of
this paper is to provide a comprehensive overview of IRSassisted UAV
communications. First, we provide five examples of how IRSs and UAVs can be
combined to achieve unrivaled potential in difficult situations. The
technological features of the most recent relevant researches on IRS-aided UAV
communications from the perspective of the main performance criteria, i.e.,
energy efficiency, security, spectral efficiency, etc. Additionally, previous
research studies on technology adoption as machine learning algorithms. Lastly,
some promising research directions and open challenges for IRS-aided UAV
communication are presented
Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments
In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.Web of Science212art. no. 21
A Tutorial on Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions
IEEE Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area