1,581 research outputs found

    Separation Framework: An Enabler for Cooperative and D2D Communication for Future 5G Networks

    Get PDF
    Soaring capacity and coverage demands dictate that future cellular networks need to soon migrate towards ultra-dense networks. However, network densification comes with a host of challenges that include compromised energy efficiency, complex interference management, cumbersome mobility management, burdensome signaling overheads and higher backhaul costs. Interestingly, most of the problems, that beleaguer network densification, stem from legacy networks' one common feature i.e., tight coupling between the control and data planes regardless of their degree of heterogeneity and cell density. Consequently, in wake of 5G, control and data planes separation architecture (SARC) has recently been conceived as a promising paradigm that has potential to address most of aforementioned challenges. In this article, we review various proposals that have been presented in literature so far to enable SARC. More specifically, we analyze how and to what degree various SARC proposals address the four main challenges in network densification namely: energy efficiency, system level capacity maximization, interference management and mobility management. We then focus on two salient features of future cellular networks that have not yet been adapted in legacy networks at wide scale and thus remain a hallmark of 5G, i.e., coordinated multipoint (CoMP), and device-to-device (D2D) communications. After providing necessary background on CoMP and D2D, we analyze how SARC can particularly act as a major enabler for CoMP and D2D in context of 5G. This article thus serves as both a tutorial as well as an up to date survey on SARC, CoMP and D2D. Most importantly, the article provides an extensive outlook of challenges and opportunities that lie at the crossroads of these three mutually entangled emerging technologies.Comment: 28 pages, 11 figures, IEEE Communications Surveys & Tutorials 201

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Recent Advances in Cellular D2D Communications

    Get PDF
    Device-to-device (D2D) communications have attracted a great deal of attention from researchers in recent years. It is a promising technique for offloading local traffic from cellular base stations by allowing local devices, in physical proximity, to communicate directly with each other. Furthermore, through relaying, D2D is also a promising approach to enhancing service coverage at cell edges or in black spots. However, there are many challenges to realizing the full benefits of D2D. For one, minimizing the interference between legacy cellular and D2D users operating in underlay mode is still an active research issue. With the 5th generation (5G) communication systems expected to be the main data carrier for the Internet-of-Things (IoT) paradigm, the potential role of D2D and its scalability to support massive IoT devices and their machine-centric (as opposed to human-centric) communications need to be investigated. New challenges have also arisen from new enabling technologies for D2D communications, such as non-orthogonal multiple access (NOMA) and blockchain technologies, which call for new solutions to be proposed. This edited book presents a collection of ten chapters, including one review and nine original research works on addressing many of the aforementioned challenges and beyond

    Analytical characterization of inband and outband D2D Communications for network access

    Get PDF
    Mención Internacional en el título de doctorCooperative short-range communication schemes provide powerful tools to solve interference and resource shortage problems in wireless access networks. With such schemes, a mobile node with excellent cellular connectivity can momentarily accept to relay traffic for its neighbors experiencing poor radio conditions and use Device-to-Device (D2D) communications to accomplish the task. This thesis provides a novel and comprehensive analytical framework that allows evaluating the effects of D2D communications in access networks in terms of spectrum and energy efficiency. The analysis covers the cases in which D2D communications use the same bandwidth of legacy cellular users (in-band D2D) or a different one (out-band D2D) and leverages on the characterization of underlying queueing systems and protocols to capture the complex intertwining of short-range and legacy WiFi and cellular communications. The analysis also unveils how D2D affects the use and scope of other optimization techniques used for, e.g., interference coordination and fairness in resource distribution. Indeed, characterizing the performance of D2D-enabled wireless access networks plays an essential role in the optimization of system operation and, as a consequence, permits to assess the general applicability of D2D solutions. With such characterization, we were able to design several mechanisms that improve system capabilities. Specifically, we propose bandwidth resource management techniques for controlling interference when cellular users and D2D pairs share the same spectrum, we design advanced and energy-aware access selection mechanisms, we show how to adopt D2D communications in conjunction with interference coordination schemes to achieve high and fair throughputs, and we discuss on end-to-end fairness—beyond the use of access network resources—when D2D communications is adopted in C-RAN. The results reported in this thesis show that identifying performance bottlenecks is key to properly control network operation, and, interestingly, bottlenecks may not be represented just by wireless resources when end-to-end fairness is of concern.Programa Oficial de Doctorado en Ingeniería TelemáticaPresidente: Marco Ajmone Marsan.- Secretario: Miquel Payaró Llisterri.- Vocal: Omer Gurewit
    • …
    corecore