1,217 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Energy-Efficient Power Control: A Look at 5G Wireless Technologies
This work develops power control algorithms for energy efficiency (EE)
maximization (measured in bit/Joule) in wireless networks. Unlike previous
related works, minimum-rate constraints are imposed and the
signal-to-interference-plus-noise ratio takes a more general expression, which
allows one to encompass some of the most promising 5G candidate technologies.
Both network-centric and user-centric EE maximizations are considered. In the
network-centric scenario, the maximization of the global EE and the minimum EE
of the network are performed. Unlike previous contributions, we develop
centralized algorithms that are guaranteed to converge, with affordable
computational complexity, to a Karush-Kuhn-Tucker point of the considered
non-convex optimization problems. Moreover, closed-form feasibility conditions
are derived. In the user-centric scenario, game theory is used to study the
equilibria of the network and to derive convergent power control algorithms,
which can be implemented in a fully decentralized fashion. Both scenarios above
are studied under the assumption that single or multiple resource blocks are
employed for data transmission. Numerical results assess the performance of the
proposed solutions, analyzing the impact of minimum-rate constraints, and
comparing the network-centric and user-centric approaches.Comment: Accepted for Publication in the IEEE Transactions on Signal
Processin
An Efficient Requirement-Aware Attachment Policy for Future Millimeter Wave Vehicular Networks
The automotive industry is rapidly evolving towards connected and autonomous
vehicles, whose ever more stringent data traffic requirements might exceed the
capacity of traditional technologies for vehicular networks. In this scenario,
densely deploying millimeter wave (mmWave) base stations is a promising
approach to provide very high transmission speeds to the vehicles. However,
mmWave signals suffer from high path and penetration losses which might render
the communication unreliable and discontinuous. Coexistence between mmWave and
Long Term Evolution (LTE) communication systems has therefore been considered
to guarantee increased capacity and robustness through heterogeneous
networking. Following this rationale, we face the challenge of designing fair
and efficient attachment policies in heterogeneous vehicular networks.
Traditional methods based on received signal quality criteria lack
consideration of the vehicle's individual requirements and traffic demands, and
lead to suboptimal resource allocation across the network. In this paper we
propose a Quality-of-Service (QoS) aware attachment scheme which biases the
cell selection as a function of the vehicular service requirements, preventing
the overload of transmission links. Our simulations demonstrate that the
proposed strategy significantly improves the percentage of vehicles satisfying
application requirements and delivers efficient and fair association compared
to state-of-the-art schemes.Comment: 8 pages, 8 figures, 2 tables, accepted to the 30th IEEE Intelligent
Vehicles Symposiu
- …