392 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Research Issues, Challenges, and Opportunities of Wireless Power Transfer-Aided Full-Duplex Relay Systems

    Get PDF
    We present a comprehensive review for wireless power transfer (WPT)-aided full-duplex (FD) relay systems. Two critical challenges in implementing WPT-aided FD relay systems are presented, that is, pseudo FD realization and high power consumption. Existing time-splitting or power-splitting structure based-WPT-aided FD relay systems can only realize FD operation in one of the time slots or only forward part of the received signal to the destination, belonging to pseudo FD realization. Besides, self-interference is treated as noise and self-interference cancellation (SIC) operation incurs high power consumption at the FD relay node. To this end, a promising solution is outlined to address the two challenges, which realizes consecutive FD realization at all times and forwards all the desired signal to the destination for decoding. Also, active SIC, that is, analog/digital cancellation, is not required by the proposed solution, which effectively reduces the circuit complexity and releases high power consumption at the FD relay node. Specific classifications and performance metrics of WPT-aided FD relay systems are summarized. Some future research is also envisaged for WPT-aided FD systems

    A Tutorial on Nonorthogonal Multiple Access for 5G and Beyond

    Full text link
    Today's wireless networks allocate radio resources to users based on the orthogonal multiple access (OMA) principle. However, as the number of users increases, OMA based approaches may not meet the stringent emerging requirements including very high spectral efficiency, very low latency, and massive device connectivity. Nonorthogonal multiple access (NOMA) principle emerges as a solution to improve the spectral efficiency while allowing some degree of multiple access interference at receivers. In this tutorial style paper, we target providing a unified model for NOMA, including uplink and downlink transmissions, along with the extensions tomultiple inputmultiple output and cooperative communication scenarios. Through numerical examples, we compare the performances of OMA and NOMA networks. Implementation aspects and open issues are also detailed.Comment: 25 pages, 10 figure

    NOMA in Cooperative Communication Systems with Energy-Harvesting Nodes and Wireless Secure Transmission

    Get PDF
    In this paper, non-orthogonal multiple access (NOMA) in cooperative relay system is considered, where a source node communicates with a pair of energy harvesting (EH) user equipments through a multiple antennas relay node. A hybrid protocol is adopted at the relay, in which if the relay can successfully decode the signals, decode- and-forward (DF) protocol will be adopted to forward the signals to the users. Otherwise, amplify-and-forward (AF) protocol will be implemented. Assuming that the users adopt maximal ratio combining (MRC) to combine the received signals in the two cooperative phases, new explicit analytical expressions for the average sum-rate are derived when the relay works in, 1) AF mode, and 2) DF mode, in two scenarios when one user is the stronger in both cooperation phases, and when an alternative user is stronger in each phase. Then, the investigation is extended to the case where the relay is an untrusted node, and cooperative jamming technique is proposed to degrade the ability of the relay to decode the signals and enforce the relay to operate always in AF mode. For the untrusted relay scenario, new analytical expression for the average secrecy rate is derived. Monte Carlo simulations are provided to validate the analysis. The simulation results reveal that the location of the relay is the key parameter to achieve the best performance

    Performance gap of two users in downlink full-duplex cooperative NOMA

    Get PDF
    A full-duplex non-orthogonal multiple access (FD-NOMA) systems are expected to play a significant role in fifth generation (5G) networks, addressing spectrum efficiency and massive connections. In this regard, the feasibility of FD communications to improve spectrum utilization is main consideration in term of outage performance. Specifically, we derive exact formulas of outage probability for FD-NOMA, over Nakagami-m fading channels. Extensive analysis revealed that higher quality of channel leads to better performance. We verify expressions throughout Monte-Carlo simulations
    • …
    corecore