3,311 research outputs found
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV),
aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In
this case, the management of multiple UAVs is important. This paper considers
the power allocation strategy for a UAV swarm-enabled aerial network to enhance
the physical layer security of the downlink transmission, where an eavesdropper
moves following the trajectory of the swarm for better eavesdropping. Unlike
existing works, we use only the large-scale channel state information (CSI) and
maximize the secrecy throughput in a whole-trajectory-oriented manner. The
overall transmission energy constraint on each UAV and the total transmission
duration for all the legitimate users are considered. The non-convexity of the
formulated problem is solved by using max-min optimization with iteration. Both
the transmission power of desired signals and artificial noise (AN) are derived
iteratively. Simulation results are presented to validate the effectiveness of
our proposed power allocation algorithm and to show the advantage of aerial
CoMP by using only the large-scale CSI
- …