466 research outputs found

    Improving performance of far users in cognitive radio: Exploiting NOMA and wireless power transfer

    Get PDF
    In this paper, we examine non-orthogonal multiple access (NOMA) and relay selection strategy to benefit extra advantage from traditional cognitive radio (CR) relaying systems. The most important requirement to prolong lifetime of such network is employing energy harvesting in the relay to address network with limited power constraint. In particular, we study such energy harvesting CR-NOMA using amplify-and-forward (AF) scheme to improve performance far NOMA users. To further address such problem, two schemes are investigated in term of number of selected relays. To further examine system performance, the outage performance needs to be studied for such wireless powered CR-NOMA network over Rayleigh channels. The accurate expressions for the outage probability are derived to perform outage comparison of primary network and secondary network. The analytical results show clearly that position of these nodes, transmit signal to noise ratio (SNR) and power allocation coefficients result in varying outage performance. As main observation, performance gap between primary and secondary destination is decided by both power allocation factors and selection mode of single relay or multiple relays. Numerical studies were conducted to verify our derivations.Web of Science1211art. no. 220

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Performance Analysis in Full-Duplex Relaying Systems withWireless Power Transfer

    Get PDF
    Energy harvesting (EH) technology has become increasingly attractive as an appealing solution to provide long-lasting power for energy-constrained wireless cooperative sensor networks. EH in such networks is particularly important as it can enable information relaying. Different from absorbing energy from intermittent and unpredictable nature, such as solar, wind, and vibration, harvesting from radio frequency (RF) radiated by ambient transmitters has received tremendous attention. The RF signal can convey both information and energy at the same time, which facilitates the development of simultaneous wireless information and power transfer. Besides, ambient RF is widely available from the base station, WIFI, and mobile phone in the current information era. However, some open issues associated with EH are existing in the state-of-art. One of the key challenges is rapid energy loss during the transferring process, especially for long-distance transmission. The other challenge is the design of protocols to optimally coordinate between information and power transmission. Meanwhile, in-band full-duplex (IBFD) communication have gained considerable attraction by researchers, which has the ability to improve system spectral efficiency. IBFD can receive information and forward information at the same time on the same frequency. Since the RF signal can be superimposed, the antenna of the IBFD system receives the RF signal from both desired transmitter and local transmitter. Due to the short distance of the local transmission signals, the received signal power is much larger than the desired transmission signals, which results in faulty receiving of the desired signals. Therefore, it is of great significance to study the local self-interference cancellation method of the IBFD system. In the recent state-of-art, three main types of self-interference cancellations are researched, which are passive cancellations, digital cancellations, and analog cancellations. In this thesis, we study polarization-enabled digital self-interference cancellation (PDC) scheme in IBFD EH systems which cancels self-interference by antenna polarization (propagation domain) and digital processing (digital domain). The theme of this thesis is to address the following two questions: how the selfinterference would be canceled in the IBFD EH system and how to optimize key performances of the system to optimal system performances. This thesis makes five research contributions in the important area of IBFD relaying systems with wireless power transfer. Their applications are primarily in the domains of the Internet of Things (IoT) and 5G-and-beyond wireless networks. The overarching objective of the thesis is to construct analytical system models and evaluate system performance (outage probability, throughput, error) in various scenarios. In all five contributions, system models and analytical expressions of the performance metrics are derived, followed by computer simulations for performance analysis

    A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From Communications to Sensing and Intelligence

    Full text link
    Due to the advancements in cellular technologies and the dense deployment of cellular infrastructure, integrating unmanned aerial vehicles (UAVs) into the fifth-generation (5G) and beyond cellular networks is a promising solution to achieve safe UAV operation as well as enabling diversified applications with mission-specific payload data delivery. In particular, 5G networks need to support three typical usage scenarios, namely, enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and massive machine-type communications (mMTC). On the one hand, UAVs can be leveraged as cost-effective aerial platforms to provide ground users with enhanced communication services by exploiting their high cruising altitude and controllable maneuverability in three-dimensional (3D) space. On the other hand, providing such communication services simultaneously for both UAV and ground users poses new challenges due to the need for ubiquitous 3D signal coverage as well as the strong air-ground network interference. Besides the requirement of high-performance wireless communications, the ability to support effective and efficient sensing as well as network intelligence is also essential for 5G-and-beyond 3D heterogeneous wireless networks with coexisting aerial and ground users. In this paper, we provide a comprehensive overview of the latest research efforts on integrating UAVs into cellular networks, with an emphasis on how to exploit advanced techniques (e.g., intelligent reflecting surface, short packet transmission, energy harvesting, joint communication and radar sensing, and edge intelligence) to meet the diversified service requirements of next-generation wireless systems. Moreover, we highlight important directions for further investigation in future work.Comment: Accepted by IEEE JSA

    Separation Framework: An Enabler for Cooperative and D2D Communication for Future 5G Networks

    Get PDF
    Soaring capacity and coverage demands dictate that future cellular networks need to soon migrate towards ultra-dense networks. However, network densification comes with a host of challenges that include compromised energy efficiency, complex interference management, cumbersome mobility management, burdensome signaling overheads and higher backhaul costs. Interestingly, most of the problems, that beleaguer network densification, stem from legacy networks' one common feature i.e., tight coupling between the control and data planes regardless of their degree of heterogeneity and cell density. Consequently, in wake of 5G, control and data planes separation architecture (SARC) has recently been conceived as a promising paradigm that has potential to address most of aforementioned challenges. In this article, we review various proposals that have been presented in literature so far to enable SARC. More specifically, we analyze how and to what degree various SARC proposals address the four main challenges in network densification namely: energy efficiency, system level capacity maximization, interference management and mobility management. We then focus on two salient features of future cellular networks that have not yet been adapted in legacy networks at wide scale and thus remain a hallmark of 5G, i.e., coordinated multipoint (CoMP), and device-to-device (D2D) communications. After providing necessary background on CoMP and D2D, we analyze how SARC can particularly act as a major enabler for CoMP and D2D in context of 5G. This article thus serves as both a tutorial as well as an up to date survey on SARC, CoMP and D2D. Most importantly, the article provides an extensive outlook of challenges and opportunities that lie at the crossroads of these three mutually entangled emerging technologies.Comment: 28 pages, 11 figures, IEEE Communications Surveys & Tutorials 201
    • …
    corecore