899 research outputs found

    Non-Orthogonal Multiple Access for Hybrid VLC-RF Networks with Imperfect Channel State Information

    Get PDF
    The present contribution proposes a general framework for the energy efficiency analysis of a hybrid visible light communication (VLC) and Radio Frequency (RF) wireless system, in which both VLC and RF subsystems utilize nonorthogonal multiple access (NOMA) technology. The proposed framework is based on realistic communication scenarios as it takes into account the mobility of users, and assumes imperfect channel-state information (CSI). In this context, tractable closed-form expressions are derived for the corresponding average sum rate of NOMA-VLC and its orthogonal frequency division multiple access (OFDMA)-VLC counterparts. It is shown extensively that incurred CSI errors have a considerable impact on the average energy efficiency of both NOMA-VLC and OFDMAVLC systems and hence, they should not be neglected in practical designs and deployments. Interestingly, we further demonstrate that the average energy efficiency of the hybrid NOMA-VLCRF system outperforms NOMA-VLC system under imperfect CSI. Respective computer simulations corroborate the derived analytic results and interesting theoretical and practical insights are provided, which will be useful in the effective design and deployment of conventional VLC and hybrid VLC-RF systems

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks

    Get PDF
    Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e1, e2 from the source node S to User 1 (U-1) and User 2 (U-2), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U-1 and U-2. The transmission's security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system's secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate cooperative relay R. The secrecy performance of U-1 was also compared to the secrecy performance of U-2. Finally, the simulation results matched the Monte Carlo simulations well.Web of Science203art. no. 89
    • …
    corecore