319 research outputs found

    Performance analysis of spatial modulation aided NOMA with full-duplex relay

    Get PDF
    A spatial modulation aided non-orthogonal multiple access with full-duplex relay (SM-NOMA-FDR) scheme is proposed for the coordinated direct and relay transmission in this paper. Specifically, the signal of the near user is mapped to an M-ary modulated symbol and the signal of the far user is mapped to an SM symbol. The base station first transmits signals to the near user and relay via SM-NOMA, and then the relay decodes and retransmits the signal of the far user. An SM-assisted FDR is used in this scheme to improve the spectral efficiency while reducing energy consumption and making full use of the antenna resources at the relay, since SM only activates one antenna in each transmission. We derive the ergodic capacity and bit error rate of the proposed scheme over independent Rayleigh fading channels. Numerical results validate the accuracy of the theoretical analysis and show the superior performance of the proposed SM-NOMA-FDR scheme

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Bit Error Rate Analysis of Physical Layer Network Coding Spatially Modulated Full-Duplex Nodes Based Bidirectional Wireless Relay Network

    Get PDF
    In this paper, Physical Layer Network coding (PLNC)-Spatially Modulated Full-Duplex (SMFD) nodes based two-way/bidirectional cooperative wireless relay network is proposed. The PLNC-SMFD-based system is a viable technology in the field of next-generation wireless networks to enhance spectral efficiency. In the proposed system model, both the source nodes and relay nodes are employed with 2 × 2 antenna configurations where 2 bits of information are exchanged between the source nodes through a relay node. Transmit antenna selection at the source nodes is based on the incoming bitstreams. For instance, the transmit antenna is selected at PLNC-SMFD nodes based on the data symbols of the Most Significant Bit (MSB). Whereas the selected transmit antenna sends the Least Significant Bit (LSB) bit of data symbol at any time instance. Further, the self-interference at the transmitting and receiving nodes is modeled as Gaussian with the thermal noise power as a variance. The Bit Error Rate (BER) analytical expressions for both the upper and lower bound are derived in a Rayleigh Fading channel background. It has been graphically shown that the BER performance of the proposed system analyzes the effect of self-interference

    IEEE Access Special Section Editorial: Secure Modulations for Future Wireless Communications and Mobile Networks

    Get PDF
    Security has become an extremely important research topic in wireless networks over the last decade, as it is intimately related to both individual privacy and national security. Directional modulation, as a conventional type of secure modulations, transmits confidential information along the desired directions of legitimate receivers, and artificial noise in other directions, to deliberately confuse eavesdroppers in line-of-sight channels. Recently, artificial noise is also introduced into spatial modulation, leading to a secure spatial modulation strategy. In this Special Section in IEEE A CCESS, secure modulation is defined broadly as any secure modulation method, which includes, but is not limited to, secure directional modulation, secure spatial modulation, and secure index modulation

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
    corecore