15,026 research outputs found
Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks
Future wireless networks have a substantial potential in terms of supporting
a broad range of complex compelling applications both in military and civilian
fields, where the users are able to enjoy high-rate, low-latency, low-cost and
reliable information services. Achieving this ambitious goal requires new radio
techniques for adaptive learning and intelligent decision making because of the
complex heterogeneous nature of the network structures and wireless services.
Machine learning (ML) algorithms have great success in supporting big data
analytics, efficient parameter estimation and interactive decision making.
Hence, in this article, we review the thirty-year history of ML by elaborating
on supervised learning, unsupervised learning, reinforcement learning and deep
learning. Furthermore, we investigate their employment in the compelling
applications of wireless networks, including heterogeneous networks (HetNets),
cognitive radios (CR), Internet of things (IoT), machine to machine networks
(M2M), and so on. This article aims for assisting the readers in clarifying the
motivation and methodology of the various ML algorithms, so as to invoke them
for hitherto unexplored services as well as scenarios of future wireless
networks.Comment: 46 pages, 22 fig
RF-Powered Cognitive Radio Networks: Technical Challenges and Limitations
The increasing demand for spectral and energy efficient communication
networks has spurred a great interest in energy harvesting (EH) cognitive radio
networks (CRNs). Such a revolutionary technology represents a paradigm shift in
the development of wireless networks, as it can simultaneously enable the
efficient use of the available spectrum and the exploitation of radio frequency
(RF) energy in order to reduce the reliance on traditional energy sources. This
is mainly triggered by the recent advancements in microelectronics that puts
forward RF energy harvesting as a plausible technique in the near future. On
the other hand, it is suggested that the operation of a network relying on
harvested energy needs to be redesigned to allow the network to reliably
function in the long term. To this end, the aim of this survey paper is to
provide a comprehensive overview of the recent development and the challenges
regarding the operation of CRNs powered by RF energy. In addition, the
potential open issues that might be considered for the future research are also
discussed in this paper.Comment: 8 pages, 2 figures, 1 table, Accepted in IEEE Communications Magazin
Cognitive Multihop Wireless Sensor Networks over Nakagami-m Fading Channels
This work is supported by the National Science Foundation of China (NSFC) under Grant 61372114, by the National 973 Program of China under Grant 2012CB316005, by the Joint Funds of NSFC-Guangdong under Grant U1035001, and by Beijing Higher Education Young Elite Teacher Project (no. YETP0434)
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …