2,314 research outputs found

    A Distributed Merge and Split Algorithm for Fair Cooperation in Wireless Networks

    Full text link
    This paper introduces a novel concept from coalitional game theory which allows the dynamic formation of coalitions among wireless nodes. A simple and distributed merge and split algorithm for coalition formation is constructed. This algorithm is applied to study the gains resulting from the cooperation among single antenna transmitters for virtual MIMO formation. The aim is to find an ultimate transmitters coalition structure that allows cooperating users to maximize their utilities while accounting for the cost of coalition formation. Through this novel game theoretical framework, the wireless network transmitters are able to self-organize and form a structured network composed of disjoint stable coalitions. Simulation results show that the proposed algorithm can improve the average individual user utility by 26.4% as well as cope with the mobility of the distributed users.Comment: This paper is accepted for publication at the IEEE ICC Workshop on Cooperative Communications and Networkin

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Dynamic Resource Allocation in Cognitive Radio Networks: A Convex Optimization Perspective

    Full text link
    This article provides an overview of the state-of-art results on communication resource allocation over space, time, and frequency for emerging cognitive radio (CR) wireless networks. Focusing on the interference-power/interference-temperature (IT) constraint approach for CRs to protect primary radio transmissions, many new and challenging problems regarding the design of CR systems are formulated, and some of the corresponding solutions are shown to be obtainable by restructuring some classic results known for traditional (non-CR) wireless networks. It is demonstrated that convex optimization plays an essential role in solving these problems, in a both rigorous and efficient way. Promising research directions on interference management for CR and other related multiuser communication systems are discussed.Comment: to appear in IEEE Signal Processing Magazine, special issue on convex optimization for signal processin

    Scaling Laws for Infrastructure Single and Multihop Wireless Networks in Wideband Regimes

    Full text link
    With millimeter wave bands emerging as a strong candidate for 5G cellular networks, next-generation systems may be in a unique position where spectrum is plentiful. To assess the potential value of this spectrum, this paper derives scaling laws on the per mobile downlink feasible rate with large bandwidth and number of nodes, for both Infrastructure Single Hop (ISH) and Infrastructure Multi-Hop (IMH) architectures. It is shown that, for both cases, there exist \emph{critical bandwidth scalings} above which increasing the bandwidth no longer increases the feasible rate per node. These critical thresholds coincide exactly with the bandwidths where, for each architecture, the network transitions from being degrees-of-freedom-limited to power-limited. For ISH, this critical bandwidth threshold is lower than IMH when the number of users per base station grows with network size. This result suggests that multi-hop transmissions may be necessary to fully exploit large bandwidth degrees of freedom in deployments with growing number of users per cell.Comment: 5 pages, 3 figure
    corecore