145 research outputs found
Massive MIMO is a Reality -- What is Next? Five Promising Research Directions for Antenna Arrays
Massive MIMO (multiple-input multiple-output) is no longer a "wild" or
"promising" concept for future cellular networks - in 2018 it became a reality.
Base stations (BSs) with 64 fully digital transceiver chains were commercially
deployed in several countries, the key ingredients of Massive MIMO have made it
into the 5G standard, the signal processing methods required to achieve
unprecedented spectral efficiency have been developed, and the limitation due
to pilot contamination has been resolved. Even the development of fully digital
Massive MIMO arrays for mmWave frequencies - once viewed prohibitively
complicated and costly - is well underway. In a few years, Massive MIMO with
fully digital transceivers will be a mainstream feature at both sub-6 GHz and
mmWave frequencies. In this paper, we explain how the first chapter of the
Massive MIMO research saga has come to an end, while the story has just begun.
The coming wide-scale deployment of BSs with massive antenna arrays opens the
door to a brand new world where spatial processing capabilities are
omnipresent. In addition to mobile broadband services, the antennas can be used
for other communication applications, such as low-power machine-type or
ultra-reliable communications, as well as non-communication applications such
as radar, sensing and positioning. We outline five new Massive MIMO related
research directions: Extremely large aperture arrays, Holographic Massive MIMO,
Six-dimensional positioning, Large-scale MIMO radar, and Intelligent Massive
MIMO.Comment: 20 pages, 9 figures, submitted to Digital Signal Processin
Mission-Critical Communications from LMR to 5G: a Technology Assessment approach for Smart City scenarios
Radiocommunication networks are one of the main support tools of agencies that carry out
actions in Public Protection & Disaster Relief (PPDR), and it is necessary to update these
communications technologies from narrowband to broadband and integrated to information
technologies to have an effective action before society. Understanding that this problem
includes, besides the technical aspects, issues related to the social context to which these
systems are inserted, this study aims to construct scenarios, using several sources of
information, that helps the managers of the PPDR agencies in the technological decisionmaking
process of the Digital Transformation of Mission-Critical Communication considering
Smart City scenarios, guided by the methods and approaches of Technological Assessment
(TA).As redes de radiocomunicações são uma das principais ferramentas de apoio dos órgãos que
realizam ações de Proteção Pública e Socorro em desastres, sendo necessário atualizar essas
tecnologias de comunicação de banda estreita para banda larga, e integra- las às tecnologias
de informação, para se ter uma atuação efetiva perante a sociedade . Entendendo que esse
problema inclui, além dos aspectos técnicos, questões relacionadas ao contexto social ao qual
esses sistemas estão inseridos, este estudo tem por objetivo a construção de cenários,
utilizando diversas fontes de informação que auxiliem os gestores destas agências na tomada
de decisão tecnológica que envolve a transformação digital da Comunicação de Missão Crítica
considerando cenários de Cidades Inteligentes, guiado pelos métodos e abordagens de
Avaliação Tecnológica (TA)
A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer
In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A single-Antenna transmitter communicates with a half-duplex single-Antenna receiver in the presence of a sophisticated multiple-Antenna-Aided passive eavesdropper and a multiple-Antenna-Assisted hostile jammer (HJ). A low-complexity artificial noise (AN) injection scheme is proposed for drowning out the eavesdropper. Furthermore, for enhancing the resilience against HJ attacks, the legitimate nodes exploit their own local observations of the wireless channel as the source of randomness to agree on shared secret keys. The secret key is utilized for the frequency hopping (FH) sequence of the proposed communication system. We then proceed to derive a new closed-form expression for the achievable secret key rate (SKR) and the ergodic secrecy rate (ESR) for characterizing the secrecy benefits of our proposed scheme, in terms of both information secrecy and transmission resiliency. Moreover, the optimal power sharing between the AN and the message signal is investigated with the objective of enhancing the secrecy rate. Finally, through extensive simulations, we demonstrate that our proposed system model outperforms the state-of-The-Art transmission schemes in terms of secrecy and resiliency. Several numerical examples and discussions are also provided to offer further engineering insights
Resource allocation for NOMA wireless systems
Power-domain non-orthogonal multiple access (NOMA) has been widely recognized as
a promising candidate for the next generation of wireless communication systems. By
applying superposition coding at the transmitter and successive interference cancellation
at the receiver, NOMA allows multiple users to access the same time-frequency resource
in power domain. This way, NOMA not only increases the system’s spectral and energy
efficiencies, but also supports more users when compared with the conventional orthogonal
multiple access (OMA). Meanwhile, improved user fairness can be achieved by NOMA.
Nonetheless, the promised advantages of NOMA cannot be realized without proper
resource allocation. The main resources in wireless communication systems include time,
frequency, space, code and power. In NOMA systems, multiple users are accommodated
in each time/frequency/code resource block (RB), forming a NOMA cluster. As a result,
how to group the users into NOMA clusters and allocate the power is of significance. A
large number of studies have been carried out for developing efficient power allocation
(PA) algorithms in single-input single-output (SISO) scenarios with fixed user clustering.
To fully reap the gain of NOMA, the design of joint PA and user clustering is required.
Moreover, the study of PA under multiple-input multiple-output (MIMO) systems still
remains at an incipient stage. In this dissertation, we develop novel algorithms to allocate
resource for both SISO-NOMA and MIMO-NOMA systems.
More specifically, Chapter 2 compares the system capacity of MIMO-NOMA with
MIMO-OMA. It is proved analytically that MIMO-NOMA outperforms MIMO-OMA in terms of both sum channel capacity and ergodic sum capacity when there are multiple
users in a cluster. Furthermore, it is demonstrated that the more users are admitted to
a cluster, the lower is the achieved sum rate, which illustrates the tradeoff between the
sum rate and maximum number of admitted users.
Chapter 3 addresses the PA problem for a general multi-cluster multi-user MIMONOMA
system to maximize the system energy efficiency (EE). First, a closed-form solution
is derived for the corresponding sum rate (SE) maximization problem. Then, the EE
maximization problem is solved by applying non-convex fractional programming.
Chapter 4 investigates the energy-efficient joint user-RB association and PA problem
for an uplink hybrid NOMA-OMA system. The considered problem requires to jointly
optimize the user clustering, channel assignment and power allocation. To address this
hard problem, a many-to-one bipartite graph is first constructed considering the users
and RBs as the two sets of nodes. Based on swap matching, a joint user-RB association
and power allocation scheme is proposed, which converges within a limited number of
iterations. Moreover, for the power allocation under a given user-RB association, a low complexity
optimal PA algorithm is proposed.
Furthermore, Chapter 5 focuses on securing the confidential information of massive
MIMO-NOMA networks by exploiting artificial noise (AN). An uplink training scheme is
first proposed, and on this basis, the base station precodes the confidential information
and injects the AN. Following this, the ergodic secrecy rate is derived for downlink transmission.
Additionally, PA algorithms are proposed to maximize the SE and EE of the
system.
Finally, conclusions are drawn and possible extensions to resource allocation in NOMA
systems are discussed in Chapter 6
Unmanned Aircraft Systems in the Cyber Domain
Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.
This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp
- …