899 research outputs found
Non-Orthogonal Multiple Access for Hybrid VLC-RF Networks with Imperfect Channel State Information
The present contribution proposes a general framework for the energy
efficiency analysis of a hybrid visible light communication (VLC) and Radio
Frequency (RF) wireless system, in which both VLC and RF subsystems utilize
nonorthogonal multiple access (NOMA) technology. The proposed framework is
based on realistic communication scenarios as it takes into account the
mobility of users, and assumes imperfect channel-state information (CSI). In
this context, tractable closed-form expressions are derived for the
corresponding average sum rate of NOMA-VLC and its orthogonal frequency
division multiple access (OFDMA)-VLC counterparts. It is shown extensively that
incurred CSI errors have a considerable impact on the average energy efficiency
of both NOMA-VLC and OFDMAVLC systems and hence, they should not be neglected
in practical designs and deployments. Interestingly, we further demonstrate
that the average energy efficiency of the hybrid NOMA-VLCRF system outperforms
NOMA-VLC system under imperfect CSI. Respective computer simulations
corroborate the derived analytic results and interesting theoretical and
practical insights are provided, which will be useful in the effective design
and deployment of conventional VLC and hybrid VLC-RF systems
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks
Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e1, e2 from the source node S to User 1 (U-1) and User 2 (U-2), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U-1 and U-2. The transmission's security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system's secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate cooperative relay R. The secrecy performance of U-1 was also compared to the secrecy performance of U-2. Finally, the simulation results matched the Monte Carlo simulations well.Web of Science203art. no. 89
- …