1,231 research outputs found
Improving Link Reliability through Network Coding in Cooperative Cellular Networks
The paper proposes a XOR-based network coded cooperation protocol for the uplink transmission of relay assisted cellular networks and an algorithm for selection and assignment of the relay nodes. The performances of the cooperation protocol are expressed in terms of network decoder outage probability and Block Error Rate of the cooperating users. These performance indicators are analyzed theoretically and by computer simulations. The relay nodes assignment is based on the optimization, according to several criteria, of the graph that describes the cooperation cluster formed after an initial selection of the relay nodes. The graph optimization is performed using Genetic Algorithms adapted to the topology of the cooperation cluster and the optimization criteria considered
Performance Analysis of NOMA-based Cooperative Relaying in {\alpha} - {\mu} Fading Channels
Non-orthogonal multiple access (NOMA) is widely recognized as a potential
multiple access technology for efficient radio spectrum utilization in the
fifth-generation (5G) wireless communications standard. In this paper, we study
the average achievable rate and outage probability of a cooperative relaying
system (CRS) based on NOMA (CRS-NOMA) over wireless links governed by the
- generalized fading model; here and designate the
nonlinearity and clustering parameters, respectively, of each link. The average
achievable rate is represented in closed-form using Meijer's G-function and the
extended generalized bivariate Fox's H-function (EGBFHF), and the outage
probability is represented using the lower incomplete Gamma function. Our
results confirm that the CRS-NOMA outperforms the CRS with conventional
orthogonal multiple access (CRS-OMA) in terms of spectral efficiency at high
transmit signal-to-noise ratio (SNR). It is also evident from our results that
with an increase in the value of the nonlinearity/clustering parameter, the SNR
at which the CRS-NOMA outperforms its OMA based counterpart becomes higher.
Furthermore, the asymptotic analysis of the outage probability reveals the
dependency of the diversity order of each symbol in the CRS-NOMA system on the
and parameters of the fading links.Comment: 16 pages, 7 figures, 1 table, accepted in IEEE International
Conference on Communications (ICC) - 2019, Shangha
Energy Harvesting Wireless Communications: A Review of Recent Advances
This article summarizes recent contributions in the broad area of energy
harvesting wireless communications. In particular, we provide the current state
of the art for wireless networks composed of energy harvesting nodes, starting
from the information-theoretic performance limits to transmission scheduling
policies and resource allocation, medium access and networking issues. The
emerging related area of energy transfer for self-sustaining energy harvesting
wireless networks is considered in detail covering both energy cooperation
aspects and simultaneous energy and information transfer. Various potential
models with energy harvesting nodes at different network scales are reviewed as
well as models for energy consumption at the nodes.Comment: To appear in the IEEE Journal of Selected Areas in Communications
(Special Issue: Wireless Communications Powered by Energy Harvesting and
Wireless Energy Transfer
On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks
This paper studies the throughput of large-scale decentralized wireless
networks with physical layer security constraints. In particular, we are
interested in the question of how much throughput needs to be sacrificed for
achieving a certain level of security. We consider random networks where the
legitimate nodes and the eavesdroppers are distributed according to independent
two-dimensional Poisson point processes. The transmission capacity framework is
used to characterize the area spectral efficiency of secure transmissions with
constraints on both the quality of service (QoS) and the level of security.
This framework illustrates the dependence of the network throughput on key
system parameters, such as the densities of legitimate nodes and eavesdroppers,
as well as the QoS and security constraints. One important finding is that the
throughput cost of achieving a moderate level of security is quite low, while
throughput must be significantly sacrificed to realize a highly secure network.
We also study the use of a secrecy guard zone, which is shown to give a
significant improvement on the throughput of networks with high security
requirements.Comment: Accepted for publication in IEEE Transactions on Wireless
Communication
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
- …