155 research outputs found

    Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks

    Get PDF
    Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be promising in the fifth generation (5G) wireless networks. H-CRANs enable users to enjoy diverse services with high energy efficiency, high spectral efficiency, and low-cost operation, which are achieved by using cloud computing and virtualization techniques. However, H-CRANs face many technical challenges due to massive user connectivity, increasingly severe spectrum scarcity and energy-constrained devices. These challenges may significantly decrease the quality of service of users if not properly tackled. Non-orthogonal multiple access (NOMA) schemes exploit non-orthogonal resources to provide services for multiple users and are receiving increasing attention for their potential of improving spectral and energy efficiency in 5G networks. In this article a framework for energy-efficient NOMA H-CRANs is presented. The enabling technologies for NOMA H-CRANs are surveyed. Challenges to implement these technologies and open issues are discussed. This article also presents the performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure

    Physical Layer Security in Integrated Sensing and Communication Systems

    Get PDF
    The development of integrated sensing and communication (ISAC) systems has been spurred by the growing congestion of the wireless spectrum. The ISAC system detects targets and communicates with downlink cellular users simultaneously. Uniquely for such scenarios, radar targets are regarded as potential eavesdroppers which might surveil the information sent from the base station (BS) to communication users (CUs) via the radar probing signal. To address this issue, we propose security solutions for ISAC systems to prevent confidential information from being intercepted by radar targets. In this thesis, we firstly present a beamformer design algorithm assisted by artificial noise (AN), which aims to minimize the signal-to-noise ratio (SNR) at the target while ensuring the quality of service (QoS) of legitimate receivers. Furthermore, to reduce the power consumed by AN, we apply the directional modulation (DM) approach to exploit constructive interference (CI). In this case, the optimization problem is designed to maximize the SINR of the target reflected echoes with CI constraints for each CU, while constraining the received symbols at the target in the destructive region. Apart from the separate functionalities of radar and communication systems above, we investigate sensing-aided physical layer security (PLS), where the ISAC BS first emits an omnidirectional waveform to search for and estimate target directions. Then, we formulate a weighted optimization problem to simultaneously maximize the secrecy rate and minimize the Cram\'er-Rao bound (CRB) with the aid of the AN, designing a beampattern with a wide main beam covering all possible angles of targets. The main beam width of the next iteration depends on the optimal CRB. In this way, the sensing and security functionalities provide mutual benefits, resulting in the improvement of mutual performances with every iteration of the optimization, until convergence. Overall, numerical results show the effectiveness of the ISAC security designs through the deployment of AN-aided secrecy rate maximization and CI techniques. The sensing-assisted PLS scheme offers a new approach for obtaining channel information of eavesdroppers, which is treated as a limitation of conventional PLS studies. This design gains mutual benefits in both single and multi-target scenarios

    Multiple Access in Aerial Networks: From Orthogonal and Non-Orthogonal to Rate-Splitting

    Get PDF
    Recently, interest on the utilization of unmanned aerial vehicles (UAVs) has aroused. Specifically, UAVs can be used in cellular networks as aerial users for delivery, surveillance, rescue search, or as an aerial base station (aBS) for communication with ground users in remote uncovered areas or in dense environments requiring prompt high capacity. Aiming to satisfy the high requirements of wireless aerial networks, several multiple access techniques have been investigated. In particular, space-division multiple access(SDMA) and power-domain non-orthogonal multiple access (NOMA) present promising multiplexing gains for aerial downlink and uplink. Nevertheless, these gains are limited as they depend on the conditions of the environment. Hence, a generalized scheme has been recently proposed, called rate-splitting multiple access (RSMA), which is capable of achieving better spectral efficiency gains compared to SDMA and NOMA. In this paper, we present a comprehensive survey of key multiple access technologies adopted for aerial networks, where aBSs are deployed to serve ground users. Since there have been only sporadic results reported on the use of RSMA in aerial systems, we aim to extend the discussion on this topic by modelling and analyzing the weighted sum-rate performance of a two-user downlink network served by an RSMA-based aBS. Finally, related open issues and future research directions are exposed.Comment: 16 pages, 6 figures, submitted to IEEE Journa

    Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions

    Get PDF
    Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area

    Robust cell-free mmWave/sub-THz access using minimal coordination and coarse synchronization

    Full text link
    This study investigates simpler alternatives to coherent joint transmission for supporting robust connectivity against signal blockage in mmWave/sub-THz access networks. By taking an information-theoretic viewpoint, we demonstrate analytically that with a careful design, full macrodiversity gains and significant SNR gains can be achieved through canonical receivers and minimal coordination and synchronization requirements at the infrastructure side. Our proposed scheme extends non-coherent joint transmission by employing a special form of diversity to counteract artificially induced deep fades that would otherwise make this technique often compare unfavorably against standard transmitter selection schemes. Additionally, the inclusion of an Alamouti-like space-time coding layer is shown to recover a significant fraction of the optimal performance. Our conclusions are based on an insightful multi-point intermittent block fading channel model that enables rigorous ergodic and outage rate analysis, while also considering timing offsets due to imperfect delay compensation. Although simplified, our approach captures the essential features of modern mmWave/sub-THz communications, thereby providing practical design guidelines for realistic systems
    • …
    corecore