2,314 research outputs found
A Distributed Merge and Split Algorithm for Fair Cooperation in Wireless Networks
This paper introduces a novel concept from coalitional game theory which
allows the dynamic formation of coalitions among wireless nodes. A simple and
distributed merge and split algorithm for coalition formation is constructed.
This algorithm is applied to study the gains resulting from the cooperation
among single antenna transmitters for virtual MIMO formation. The aim is to
find an ultimate transmitters coalition structure that allows cooperating users
to maximize their utilities while accounting for the cost of coalition
formation. Through this novel game theoretical framework, the wireless network
transmitters are able to self-organize and form a structured network composed
of disjoint stable coalitions. Simulation results show that the proposed
algorithm can improve the average individual user utility by 26.4% as well as
cope with the mobility of the distributed users.Comment: This paper is accepted for publication at the IEEE ICC Workshop on
Cooperative Communications and Networkin
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Dynamic Resource Allocation in Cognitive Radio Networks: A Convex Optimization Perspective
This article provides an overview of the state-of-art results on
communication resource allocation over space, time, and frequency for emerging
cognitive radio (CR) wireless networks. Focusing on the
interference-power/interference-temperature (IT) constraint approach for CRs to
protect primary radio transmissions, many new and challenging problems
regarding the design of CR systems are formulated, and some of the
corresponding solutions are shown to be obtainable by restructuring some
classic results known for traditional (non-CR) wireless networks. It is
demonstrated that convex optimization plays an essential role in solving these
problems, in a both rigorous and efficient way. Promising research directions
on interference management for CR and other related multiuser communication
systems are discussed.Comment: to appear in IEEE Signal Processing Magazine, special issue on convex
optimization for signal processin
Scaling Laws for Infrastructure Single and Multihop Wireless Networks in Wideband Regimes
With millimeter wave bands emerging as a strong candidate for 5G cellular
networks, next-generation systems may be in a unique position where spectrum is
plentiful. To assess the potential value of this spectrum, this paper derives
scaling laws on the per mobile downlink feasible rate with large bandwidth and
number of nodes, for both Infrastructure Single Hop (ISH) and Infrastructure
Multi-Hop (IMH) architectures. It is shown that, for both cases, there exist
\emph{critical bandwidth scalings} above which increasing the bandwidth no
longer increases the feasible rate per node. These critical thresholds coincide
exactly with the bandwidths where, for each architecture, the network
transitions from being degrees-of-freedom-limited to power-limited. For ISH,
this critical bandwidth threshold is lower than IMH when the number of users
per base station grows with network size. This result suggests that multi-hop
transmissions may be necessary to fully exploit large bandwidth degrees of
freedom in deployments with growing number of users per cell.Comment: 5 pages, 3 figure
- …