438 research outputs found

    Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model

    Get PDF
    In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) cooperative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected, and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte-carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain, 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power, and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy- performance to that of BPB but with a lower complexity

    Combining Code-Domain and Power-Domain NOMA for Supporting Higher Number of Users

    Get PDF

    Mission-Critical Mobile Broadband Communications in Open Pit Mines

    Get PDF
    The need for continuous safety improvements and increased operational efficiency is driving the mining industry through a transition toward automated operations. From a communications perspective, this transition introduces a new set of high-bandwidth business-critical and mission-critical applications that need to be met by the wireless network. This article introduces fundamental concepts behind open-pit mining and discusses why this ever-changing environment and strict industrial reliability requirements pose unique challenges to traditional broadband network planning and optimization techniques. On the other hand, unlike unpredictable disaster scenarios, mining is a carefully planned activity. Taking advantage of this predictability element, we propose a framework that integrates mine and radio network planning so that continuous and automated adaptation of the radio network becomes possible. The potential benefits of this framework are evaluated by means of an illustrative example

    Physical-layer Security of Uplink mmWave Transmissions in Cellular V2X Networks

    Get PDF
    In this paper, we investigate physical-layer security of the uplink millimeter wave communications for a cellular vehicle-to-everything (C-V2X) network comprised of a large number of base stations (BSs) and different categories of V2X nodes, including vehicles, pedestrians, and road side units. Considering the dynamic change and randomness of the topology of the C-V2X network, we model the roadways, the V2X nodes on each roadway, and the BSs by a Poisson line process, a 1D Poisson point process (PPP), and a 2D PPP, respectively. We propose two uplink association schemes for a typical vehicle, namely, the smallest-distance association (SDA) scheme and the largest-power association (LPA) scheme, and we establish a tractable analytical framework to comprehensively assess the security performance of the uplink transmission, by leveraging the stochastic geometry theory. Specifically, for each association scheme, we first obtain new expressions for the association probability of the typical vehicle, and then derive the overall connection outage probability and secrecy outage probability by calculating the Laplace transform of the aggregate interference power. Numerical results are presented to validate our theoretical analysis, and we also provide interesting insights into how the security performance is influenced by various system parameters, including the densities of V2X nodes and BSs. Moreover, we show that the LPA scheme outperforms the SDA scheme in terms of secrecy throughput
    • …
    corecore