560 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks

    Get PDF
    Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be promising in the fifth generation (5G) wireless networks. H-CRANs enable users to enjoy diverse services with high energy efficiency, high spectral efficiency, and low-cost operation, which are achieved by using cloud computing and virtualization techniques. However, H-CRANs face many technical challenges due to massive user connectivity, increasingly severe spectrum scarcity and energy-constrained devices. These challenges may significantly decrease the quality of service of users if not properly tackled. Non-orthogonal multiple access (NOMA) schemes exploit non-orthogonal resources to provide services for multiple users and are receiving increasing attention for their potential of improving spectral and energy efficiency in 5G networks. In this article a framework for energy-efficient NOMA H-CRANs is presented. The enabling technologies for NOMA H-CRANs are surveyed. Challenges to implement these technologies and open issues are discussed. This article also presents the performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure

    A Survey of Downlink Non-orthogonal Multiple Access for 5G Wireless Communication Networks

    Get PDF
    Accepted by ZTE CommunicationsAccepted by ZTE CommunicationsAccepted by ZTE CommunicationsAccepted by ZTE CommunicationsAccepted by ZTE CommunicationsNon-orthogonal multiple access (NOMA) has been recognized as a promising multiple access technique for the next generation cellular communication networks. In this paper, we first discuss a simple NOMA model with two users served by a single-carrier simultaneously to illustrate its basic principles. Then, a more general model with multicarrier serving an arbitrary number of users on each subcarrier is also discussed. An overview of existing works on performance analysis, resource allocation, and multiple-input multiple-output NOMA are summarized and discussed. Furthermore, we discuss the key features of NOMA and its potential research challenges

    Outage-constrained resource allocation in uplink NOMA for critical applications

    Get PDF
    In this work, we consider the resource allocation problem for uplink non-orthogonal multiple access (NOMA) networks whose users represent power-restricted but high priority devices, such as those used in sensor networks supporting health and public safety applications. Such systems require high reliability and robust resource allocation techniques are needed to ensure performance. We examine the impact on system and user performance due to residual cancellation errors resulting from imperfect successive interference cancellation (SIC) and apply the chance-constrained robust optimization approach to tackle this type of error. In particular, we derive an expression for the user outage probability as a function of SIC error variance. This result is used to formulate a robust joint resource allocation problem that minimizes user transmit power subject to rate and outage constraints of critical applications. As the proposed optimization problem is inherently non-convex and NP-hard, we apply the techniques of variable relaxation and complementary geometric programming to develop a computationally tractable two-step iterative algorithm based on successive convex approximation. Simulation results demonstrate that, even for high levels of SIC error, the proposed robust algorithm for NOMA outperforms the traditional orthogonal multiple access case in terms of user transmit power and overall system density, i.e., serving more users over fewer sub-carriers. The chance-constrained approach necessitates a power-robustness trade-off compared to non-robust NOMA but effectively enforces maximum user outage and can result in transmit power savings when users can accept a higher probability of outage

    Optimal Throughput Fairness Trade-offs for Downlink Non-Orthogonal Multiple Access over Fading Channels

    Full text link
    Recently, non-orthogonal multiple access (NOMA) has attracted considerable interest as one of the 5G-enabling techniques. However, users with better channel conditions in downlink communications intrinsically benefits from NOMA thanks to successive decoding, judicious designs are required to guarantee user fairness. In this paper, a two-user downlink NOMA system over fading channels is considered. For delay-tolerant transmission, the average sum-rate is maximized subject to both average and peak power constraints as well as a minimum average user rate constraint. The optimal resource allocation is obtained using Lagrangian dual decomposition under full channel state information at the transmitter (CSIT), while an effective power allocation policy under partial CSIT is also developed based on analytical results. In parallel, for delay-limited transmission, the sum of delay-limited throughput (DLT) is maximized subject to a maximum allowable user outage constraint under full CSIT, and the analysis for the sum of DLT is also performed under partial CSIT. Furthermore, an optimal orthogonal multiple access (OMA) scheme is also studied as a benchmark to prove the superiority of NOMA over OMA under full CSIT. Finally, the theoretical analysis is verified by simulations via different trade-offs for the average sum-rate (sum-DLT) versus the minimum (maximum) average user rate (outage) requirement.Comment: 35 pages, 10 figures, 3 tables, the longer version of the paper with the same titl

    A Survey on Applications of Cache-Aided NOMA

    Get PDF
    Contrary to orthogonal multiple-access (OMA), non-orthogonal multiple-access (NOMA) schemes can serve a pool of users without exploiting the scarce frequency or time domain resources. This is useful in meeting the future network requirements (5G and beyond systems), such as, low latency, massive connectivity, users' fairness, and high spectral efficiency. On the other hand, content caching restricts duplicate data transmission by storing popular contents in advance at the network edge which reduces data traffic. In this survey, we focus on cache-aided NOMA-based wireless networks which can reap the benefits of both cache and NOMA; switching to NOMA from OMA enables cache-aided networks to push additional files to content servers in parallel and improve the cache hit probability. Beginning with fundamentals of the cache-aided NOMA technology, we summarize the performance goals of cache-aided NOMA systems, present the associated design challenges, and categorize the recent related literature based on their application verticals. Concomitant standardization activities and open research challenges are highlighted as well
    corecore