1,231 research outputs found

    Improving Link Reliability through Network Coding in Cooperative Cellular Networks

    Get PDF
    The paper proposes a XOR-based network coded cooperation protocol for the uplink transmission of relay assisted cellular networks and an algorithm for selection and assignment of the relay nodes. The performances of the cooperation protocol are expressed in terms of network decoder outage probability and Block Error Rate of the cooperating users. These performance indicators are analyzed theoretically and by computer simulations. The relay nodes assignment is based on the optimization, according to several criteria, of the graph that describes the cooperation cluster formed after an initial selection of the relay nodes. The graph optimization is performed using Genetic Algorithms adapted to the topology of the cooperation cluster and the optimization criteria considered

    Performance Analysis of NOMA-based Cooperative Relaying in {\alpha} - {\mu} Fading Channels

    Full text link
    Non-orthogonal multiple access (NOMA) is widely recognized as a potential multiple access technology for efficient radio spectrum utilization in the fifth-generation (5G) wireless communications standard. In this paper, we study the average achievable rate and outage probability of a cooperative relaying system (CRS) based on NOMA (CRS-NOMA) over wireless links governed by the α\alpha-μ\mu generalized fading model; here α\alpha and μ\mu designate the nonlinearity and clustering parameters, respectively, of each link. The average achievable rate is represented in closed-form using Meijer's G-function and the extended generalized bivariate Fox's H-function (EGBFHF), and the outage probability is represented using the lower incomplete Gamma function. Our results confirm that the CRS-NOMA outperforms the CRS with conventional orthogonal multiple access (CRS-OMA) in terms of spectral efficiency at high transmit signal-to-noise ratio (SNR). It is also evident from our results that with an increase in the value of the nonlinearity/clustering parameter, the SNR at which the CRS-NOMA outperforms its OMA based counterpart becomes higher. Furthermore, the asymptotic analysis of the outage probability reveals the dependency of the diversity order of each symbol in the CRS-NOMA system on the α\alpha and μ\mu parameters of the fading links.Comment: 16 pages, 7 figures, 1 table, accepted in IEEE International Conference on Communications (ICC) - 2019, Shangha

    Energy Harvesting Wireless Communications: A Review of Recent Advances

    Get PDF
    This article summarizes recent contributions in the broad area of energy harvesting wireless communications. In particular, we provide the current state of the art for wireless networks composed of energy harvesting nodes, starting from the information-theoretic performance limits to transmission scheduling policies and resource allocation, medium access and networking issues. The emerging related area of energy transfer for self-sustaining energy harvesting wireless networks is considered in detail covering both energy cooperation aspects and simultaneous energy and information transfer. Various potential models with energy harvesting nodes at different network scales are reviewed as well as models for energy consumption at the nodes.Comment: To appear in the IEEE Journal of Selected Areas in Communications (Special Issue: Wireless Communications Powered by Energy Harvesting and Wireless Energy Transfer

    On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks

    Full text link
    This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. We consider random networks where the legitimate nodes and the eavesdroppers are distributed according to independent two-dimensional Poisson point processes. The transmission capacity framework is used to characterize the area spectral efficiency of secure transmissions with constraints on both the quality of service (QoS) and the level of security. This framework illustrates the dependence of the network throughput on key system parameters, such as the densities of legitimate nodes and eavesdroppers, as well as the QoS and security constraints. One important finding is that the throughput cost of achieving a moderate level of security is quite low, while throughput must be significantly sacrificed to realize a highly secure network. We also study the use of a secrecy guard zone, which is shown to give a significant improvement on the throughput of networks with high security requirements.Comment: Accepted for publication in IEEE Transactions on Wireless Communication

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
    corecore