392 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Research Issues, Challenges, and Opportunities of Wireless Power Transfer-Aided Full-Duplex Relay Systems
We present a comprehensive review for wireless power transfer (WPT)-aided full-duplex (FD) relay systems. Two critical challenges in implementing WPT-aided FD relay systems are presented, that is, pseudo FD realization and high power consumption. Existing time-splitting or power-splitting structure based-WPT-aided FD relay systems can only realize FD operation in one of the time slots or only forward part of the received signal to the destination, belonging to pseudo FD realization. Besides, self-interference is treated as noise and self-interference cancellation (SIC) operation incurs high power consumption at the FD relay node. To this end, a promising solution is outlined to address the two challenges, which realizes consecutive FD realization at all times and forwards all the desired signal to the destination for decoding. Also, active SIC, that is, analog/digital cancellation, is not required by the proposed solution, which effectively reduces the circuit complexity and releases high power consumption at the FD relay node. Specific classifications and performance metrics of WPT-aided FD relay systems are summarized. Some future research is also envisaged for WPT-aided FD systems
A Tutorial on Nonorthogonal Multiple Access for 5G and Beyond
Today's wireless networks allocate radio resources to users based on the
orthogonal multiple access (OMA) principle. However, as the number of users
increases, OMA based approaches may not meet the stringent emerging
requirements including very high spectral efficiency, very low latency, and
massive device connectivity. Nonorthogonal multiple access (NOMA) principle
emerges as a solution to improve the spectral efficiency while allowing some
degree of multiple access interference at receivers. In this tutorial style
paper, we target providing a unified model for NOMA, including uplink and
downlink transmissions, along with the extensions tomultiple inputmultiple
output and cooperative communication scenarios. Through numerical examples, we
compare the performances of OMA and NOMA networks. Implementation aspects and
open issues are also detailed.Comment: 25 pages, 10 figure
NOMA in Cooperative Communication Systems with Energy-Harvesting Nodes and Wireless Secure Transmission
In this paper, non-orthogonal multiple access (NOMA) in cooperative relay system is considered, where a source node communicates with a pair of energy harvesting (EH) user equipments through a multiple antennas relay node. A hybrid protocol is adopted at the relay, in which if the relay can successfully decode the signals, decode- and-forward (DF) protocol will be adopted to forward the signals to the users. Otherwise, amplify-and-forward (AF) protocol will be implemented. Assuming that the users adopt maximal ratio combining (MRC) to combine the received signals in the two cooperative phases, new explicit analytical expressions for the average sum-rate are derived when the relay works in, 1) AF mode, and 2) DF mode, in two scenarios when one user is the stronger in both cooperation phases, and when an alternative user is stronger in each phase. Then, the investigation is extended to the case where the relay is an untrusted node, and cooperative jamming technique is proposed to degrade the ability of the relay to decode the signals and enforce the relay to operate always in AF mode. For the untrusted relay scenario, new analytical expression for the average secrecy rate is derived. Monte Carlo simulations are provided to validate the analysis. The simulation results reveal that the location of the relay is the key parameter to achieve the best performance
Performance gap of two users in downlink full-duplex cooperative NOMA
A full-duplex non-orthogonal multiple access (FD-NOMA) systems are expected to play a significant role in fifth generation (5G) networks, addressing spectrum efficiency and massive connections. In this regard, the feasibility of FD communications to improve spectrum utilization is main consideration in term of outage performance. Specifically, we derive exact formulas of outage probability for FD-NOMA, over Nakagami-m fading channels. Extensive analysis revealed that higher quality of channel leads to better performance. We verify expressions throughout Monte-Carlo simulations
- …