1,217 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Energy-Efficient Power Control: A Look at 5G Wireless Technologies

    Get PDF
    This work develops power control algorithms for energy efficiency (EE) maximization (measured in bit/Joule) in wireless networks. Unlike previous related works, minimum-rate constraints are imposed and the signal-to-interference-plus-noise ratio takes a more general expression, which allows one to encompass some of the most promising 5G candidate technologies. Both network-centric and user-centric EE maximizations are considered. In the network-centric scenario, the maximization of the global EE and the minimum EE of the network are performed. Unlike previous contributions, we develop centralized algorithms that are guaranteed to converge, with affordable computational complexity, to a Karush-Kuhn-Tucker point of the considered non-convex optimization problems. Moreover, closed-form feasibility conditions are derived. In the user-centric scenario, game theory is used to study the equilibria of the network and to derive convergent power control algorithms, which can be implemented in a fully decentralized fashion. Both scenarios above are studied under the assumption that single or multiple resource blocks are employed for data transmission. Numerical results assess the performance of the proposed solutions, analyzing the impact of minimum-rate constraints, and comparing the network-centric and user-centric approaches.Comment: Accepted for Publication in the IEEE Transactions on Signal Processin

    An Efficient Requirement-Aware Attachment Policy for Future Millimeter Wave Vehicular Networks

    Full text link
    The automotive industry is rapidly evolving towards connected and autonomous vehicles, whose ever more stringent data traffic requirements might exceed the capacity of traditional technologies for vehicular networks. In this scenario, densely deploying millimeter wave (mmWave) base stations is a promising approach to provide very high transmission speeds to the vehicles. However, mmWave signals suffer from high path and penetration losses which might render the communication unreliable and discontinuous. Coexistence between mmWave and Long Term Evolution (LTE) communication systems has therefore been considered to guarantee increased capacity and robustness through heterogeneous networking. Following this rationale, we face the challenge of designing fair and efficient attachment policies in heterogeneous vehicular networks. Traditional methods based on received signal quality criteria lack consideration of the vehicle's individual requirements and traffic demands, and lead to suboptimal resource allocation across the network. In this paper we propose a Quality-of-Service (QoS) aware attachment scheme which biases the cell selection as a function of the vehicular service requirements, preventing the overload of transmission links. Our simulations demonstrate that the proposed strategy significantly improves the percentage of vehicles satisfying application requirements and delivers efficient and fair association compared to state-of-the-art schemes.Comment: 8 pages, 8 figures, 2 tables, accepted to the 30th IEEE Intelligent Vehicles Symposiu
    • …
    corecore