935 research outputs found
Zero-Forcing Based Downlink Virtual MIMO-NOMA Communications in IoT Networks
To support massive connectivity and boost spectral efficiency for internet of
things (IoT), a downlink scheme combining virtual multiple-input
multiple-output (MIMO) and nonorthogonal multiple access (NOMA) is proposed.
All the single-antenna IoT devices in each cluster cooperate with each other to
establish a virtual MIMO entity, and multiple independent data streams are
requested by each cluster. NOMA is employed to superimpose all the requested
data streams, and each cluster leverages zero-forcing detection to de-multiplex
the input data streams. Only statistical channel state information (CSI) is
available at base station to avoid the waste of the energy and bandwidth on
frequent CSI estimations. The outage probability and goodput of the virtual
MIMO-NOMA system are thoroughly investigated by considering Kronecker model,
which embraces both the transmit and receive correlations. Furthermore, the
asymptotic results facilitate not only the exploration of physical insights but
also the goodput maximization. In particular, the asymptotic outage expressions
provide quantitative impacts of various system parameters and enable the
investigation of diversity-multiplexing tradeoff (DMT). Moreover, power
allocation coefficients and/or transmission rates can be properly chosen to
achieve the maximal goodput. By favor of Karush-Kuhn-Tucker conditions, the
goodput maximization problems can be solved in closed-form, with which the
joint power and rate selection is realized by using alternately iterating
optimization.Besides, the optimization algorithms tend to allocate more power
to clusters under unfavorable channel conditions and support clusters with
higher transmission rate under benign channel conditions
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
- …