25 research outputs found

    Interference mitigation in D2D communication underlaying LTE-A network

    Get PDF
    The mobile data traffic has risen exponentially in recent days due to the emergence of data intensive applications, such as online gaming and video sharing. It is driving the telecommunication industry as well as the research community to come up with new paradigms that will support such high data rate requirements within the existing wireless access network, in an efficient and effective manner. To respond to this challenge, device-to-device (D2D) communication in cellular networks is viewed as a promising solution, which is expected to operate, either within the coverage area of the existing eNB and under the same cellular spectrum (in-band) or separate spectrum (out-band). D2D provides the opportunity for users located in close proximity of each other to communicate directly, without traversing data traffic through the eNB. It results in several transmission gains, such as improved throughput, energy gain, hop gain, and reuse gain. However, integration of D2D communication in cellular systems at the same time introduces new technical challenges that need to be addressed. Containment of the interference among D2D nodes and cellular users is one of the major problems. D2D transmission radiates in all directions, generating undesirable interference to primary cellular users and other D2D users sharing the same radio resources resulting in severe performance degradation. Efficient interference mitigation schemes are a principal requirement in order to optimize the system performance. This paper presents a comprehensive review of the existing interference mitigation schemes present in the open literature. Based on the subjective and objective analysis of the work available to date, it is also envisaged that adopting a multi-antenna beamforming mechanism with power control, such that the transmit power is maximized toward the direction of the intended D2D receiver node and limited in all other directions will minimize the interference in the network. This could maximize the sum throughput and hence, guarantees the reliability of both the D2D and cellular connections

    Interference mitigation scheme by antenna selection in device-to-device communication underlaying cellular networks

    Get PDF
    In this paper, we investigate an interference mitigation scheme by antenna selection in device-to- device (D2D) communication underlaying downlink cellular networks. We first present the closed-form expression of the system achievable rate and its asymptotic behaviors at high signal-to-noise ratio (SNR) and the large antenna number scenarios. It is shown that the high SNR approximation increases with more antennas and higher ratio between the transmit SNR at the BS and the D2D transmitter. In addition, a tight approximation is derived for the rate and we reveal two thresholds for both the distance of the D2D link and the transmit SNR at the BS above which the underlaid D2D communication will degrade the system rate. We then particularize on the small cell setting where all users are closely located. In the small cell scenario, we show that the relationship between the distance of the D2D transmitting link and that of the D2D interfering link to the cellular user determines whether the D2D communication can enhance the system achievable rate. Numerical results are provided to verify these results

    Robust transmission design for multicell D2D underlaid cellular networks

    Get PDF
    This paper investigates the robust transmission design (RTD) of a multicell device-to-device (D2D) underlaid cellular network with imperfect channel state information (CSI). The bounded model is adopted to characterize the CSI impairment and the aim is to maximize the worst-case sum rate of the system. To protect cellular communications, it is assumed that the interference from all D2D transmitters to each base station (BS) is power-limited. It is first shown that the worst-case signal-to-interference-plus-noise ratio (SINR) of each D2D link can be obtained directly, while that of cellular links cannot be similarly found since the channel estimation error vectors of cellular links are coupled in the SINR expressions. To solve the nonconvex problem, the objective function of the original problem is replaced with its lower bound, and the resulted problem is decomposed into multiple semidefinite programming (SDP) subproblems, which are convex and have computationally efficient solutions. An iterative RTD algorithm is then proposed to obtain a suboptimal solution. Simulation results show that D2D communication can significantly increase the performance of the conventional cellular systems while causing tolerable interference to cellular users. In addition, the proposed RTD algorithm outperforms the conventional nonrobust transmission design greatly in terms of network spectral efficiency

    Secure wireless powered and cooperative jamming D2D communications

    Get PDF
    This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for the energy service released by the hybrid BS to guarantee secure D2D communication. In order to exploit the hierarchical interaction between the BS and the D2D transmitter, we first formulate a Stackelberg game based energy trading scheme, where the quadratic energy cost model is considered. Then, a non-energy trading based Stackelberg game is investigated to study the reversed roles of the BS and the D2D users. For comparison, we also formulate and resolve the social welfare optimization problem. We derive the closed-form Stackelberg equilibriums of the formulated games and the optimal solutions for the social welfare optimization problem. Simulation results are provided to validate our proposed schemes to highlight the importance of energy trading interaction between cellular and D2D networks

    Secure wireless powered and cooperative jamming D2D communications

    Get PDF
    This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for the energy service released by the hybrid BS to guarantee secure D2D communication. In order to exploit the hierarchical interaction between the BS and the D2D transmitter, we first formulate a Stackelberg game based energy trading scheme, where the quadratic energy cost model is considered. Then, a non-energy trading based Stackelberg game is investigated to study the reversed roles of the BS and the D2D users. For comparison, we also formulate and resolve the social welfare optimization problem. We derive the closed-form Stackelberg equilibriums of the formulated games and the optimal solutions for the social welfare optimization problem. Simulation results are provided to validate our proposed schemes to highlight the importance of energy trading interaction between cellular and D2D networks

    Cooperative Uplink Inter-Cell Interference (ICI) Mitigation in 5G Networks

    Get PDF
    In order to support the new paradigm shift in fifth generation (5G) mobile communication, radically different network architectures, associated technologies and network operation algorithms, need to be developed compared to existing fourth generation (4G) cellular solutions. The evolution toward 5G mobile networks will be characterized by an increasing number of wireless devices, increasing device and service complexity, and the requirement to access mobile services ubiquitously. To realise the dramatic increase in data rates in particular, research is focused on improving the capacity of current, Long Term Evolution (LTE)-based, 4G network standards, before radical changes are exploited which could include acquiring additional spectrum. The LTE network has a reuse factor of one; hence neighbouring cells/sectors use the same spectrum, therefore making the cell-edge users vulnerable to heavy inter cell interference in addition to the other factors such as fading and path-loss. In this direction, this thesis focuses on improving the performance of cell-edge users in LTE and LTE-Advanced networks by initially implementing a new Coordinated Multi-Point (CoMP) technique to support future 5G networks using smart antennas to mitigate cell-edge user interference in uplink. Successively a novel cooperative uplink inter-cell interference mitigation algorithm based on joint reception at the base station using receiver adaptive beamforming is investigated. Subsequently interference mitigation in a heterogeneous environment for inter Device-to-Device (D2D) communication underlaying cellular network is investigated as the enabling technology for maximising resource block (RB) utilisation in emerging 5G networks. The proximity of users in a network, achieving higher data rates with maximum RB utilisation (as the technology reuses the cellular RB simultaneously), while taking some load off the evolved Node B (eNodeB) i.e. by direct communication between User Equipment (UE), has been explored. Simulation results show that the proximity and transmission power of D2D transmission yields high performance gains for D2D receivers, which was demonstrated to be better than that of cellular UEs with better channel conditions or in close proximity to the eNodeB in the network. It is finally demonstrated that the application, as an extension to the above, of a novel receiver beamforming technique to reduce interference from D2D users, can further enhance network performance. To be able to develop the aforementioned technologies and evaluate the performance of new algorithms in emerging network scenarios, a beyond the-state-of-the-art LTE system-level-simulator (SLS) was implemented. The new simulator includes Multiple-Input Multiple-Output (MIMO) antenna functionalities, comprehensive channel models (such as Wireless World initiative New Radio II i.e. WINNER II) and adaptive modulation and coding schemes to accurately emulate the LTE and LTE-A network standards

    Interference Management Techniques for Cellular Wireless Communication Systems

    Get PDF
    The growing demand for higher capacity wireless networks can be met by increasing the frequency bandwidth, spectral efficiency, and base station density. Flexible spectrum access, multiantenna, and multicarrier techniques are key enablers in satisfying the demand. In addition, automation of tasks related to network planning, optimization, interference management, and maintenance are needed in order to ensure cost-efficiency. Effective, dynamic, and automated interference management tailored for bursty and local data traffic plays a central role in the task. Adjacent channel interference (ACI) management is an enabler for flexible spectrum use and uncoordinated network deployments. In this thesis the impact of ACI in local area time division duplex (TDD) cellular systems is demonstrated. A method is proposed where the transmitters optimize their transmitted spectral shape on-line, such that constraints on ACI induced by power amplifier non-linearity are met. The proposed method increases the fairness among spectrum sharing transceivers when ACI is a limiting factor. A novel interference-aware scheduling technique is proposed and analyzed. The technique manages co-channel interference (CCI) in a decentralized fashion, relying on beacon messages sent by data receivers. It is demonstrated that the proposed technique is an enabler for fair spectrum sharing among operators, independent adaptation of uplink/downlink switching points in TDD networks, and it provides overall more fair and spectrally efficient wireless access. Especially, the technique is able to improve the cell-edge throughput tremendously. New services are emerging that generate local traffic among the users in addition to the data traffic between the users and the network. Such device-to-device (D2D) traffic is effectively served by direct transmissions. The thesis demonstrates the possibilities for allowing such direct D2D transmissions on a shared band together with the cellular communication. It is shown that interference management is needed in order to facilitate reliable and efficient shared band operation. For this purpose, three methods are proposed that provide interference aware power control, interference aware multiuser and multiband resource allocation, and interference avoiding spatial precoding. It is shown that enabling direct transmission itself provides most of the gains in system capacity, while the interference management schemes are more important in promoting fairness and reliability.Langattomien tietoliikenneverkkojen käyttö kasvaa erittäin nopeasti mobiilien internet-palvelujen ja älykkäiden päätelaitteiden suosion myötä. Järjestelmien tiedonsiirtokapasiteettiä voidaan lisätä kasvattamalla kaistanleveyttä, spektritehokkuutta ja tukiasemaverkon tiheyttä. Kehityksen mahdollistaa mm. joustava taajuuksien käyttö ja moniantenni- ja monikantoaaltotekniikat. Lisäksi radioverkkojen suunnitteluun, optimointiin, ylläpitoon ja interferenssinhallintaan liittyvien tehtävien automatisoinnilla voidaan pienentää verkko-operaattoreiden kustannuksia. Tässä hetkellisen ja paikallisen tietoliikenteen tehokas, dynaaminen ja automatisoitu interferenssinhallinta on keskeisessä asemassa. Viereisen kanavan interferenssin hallinta mahdollistaa osaltaan joustavan spektrinkäytön ja koordinoimattoman verkkojen asennuksen. Väitöskirjassa on analysoitu viereisen kanavan interferenssin vaikutusta aikajakoiseen dupleksilähetykseen perustuvien paikallisten radioverkkojen toimintaan. Lisäksi väitöskirjassa on kehitetty menetelmä, jolla voidaan hallita interferenssiä reaaliaikaisesti. Menetelmä maksimoi lähetetyn signaalin spektritehokkuuden siten, että tehovahvistimen epälineaarisuuden aiheuttama viereisen kanavan interferenssi on rajoitettu. Väitöskirjassa on kehitetty ja analysoitu uudenlainen interferenssitietoinen lähetysten ajoitustekniikka. Tekniikka hallitsee reaaliaikaisesti ja hajautetusti saman kanavan interferenssiä vastaanottimien lähettämien majakkasignaalien avulla. Esitetyt simulaatiot osoittavat, että tämä mahdollistaa operaattoreiden välisen taajuuskaistojen jaon, ja alas- ja yloslinkkien aikajaon joustavan säädön. Tämän lisäksi on mahdollista saavuttaa korkeampi yleinen spektritehokkuus. Erityisesti tiedonsiirtonopeus solujen reunoille kasvaa esitetyn tekniikan avulla huomattavasti. Uudenlaiset tietoliikennepalvelut lisäävät laitteidenvälisen paikallisen tietoliikenteen määrää. Spektrinkäytön kannalta tämä liikenne on tehokkainta lähettää suoraan laitteesta toiseen. Väitöskirjassa on tutkittu joustavaa spektrinkäyttöä suorien laitteidenvälisten lähetysten ja soluverkon välillä. Interferenssin hallinta takaa luotettavan ja tehokkaan spektrin yhteiskäytön. Tätä varten väitöskirjassa on kehitetty kolme menetelmää, jotka perustuvat tehonsäätöön, lähetysten ajoitukseen ja moniantennilähetykseen

    Energy Efficiency and Privacy Protection in Cellular Networks

    Get PDF
    Smartphones have become an essential part of our society. The benefits of having an always present, highly capable device cannot be overstated. As more aspects of our life depend on our smartphones, it is more important than ever to ensure the availability of those devices. However, their big advantages also come with big risks. The fact that we have our smartphones with us all the time means that it is easier than ever to collect our information, sometimes without our consent. In this dissertation, we study the two pressing concerns in cellular communications: energy efficiency and privacy protection. We focus on LTE networks, the current most advanced global standard for cellular communications. In the first part of the dissertation, we study the energy efficiency problem from both device and network perspectives. From the device point of view, we introduce a new angle to address the battery life concern. We recognize that the value of battery for the users is not always the same, and that it depends on the user usage. We also identify, and show in real network, diversity of usage, the phenomenon that at any instant, there is a diverse distribution of smartphone usage among cellular users. We propose ``Battery Deposit Service'' (BDS), a cooperative system which makes use of device-to-device (D2D) communications underlaying cellular networks to provide energy sharing in the form of load sharing. We design BDS to take advantage of diversity of usage to maximize the utility of smartphone battery. We show that our system increases battery life of cellular users, at almost no cost to the rest of the network. BDS is designed to be compatible to LTE architecture. From the network point of view, we design an energy efficient D2D relay system underlaying LTE networks. We minimize transmission power of smartphones by considering relay selection, resource allocation and power control. The overall problem is prohibited due to its exponential search space. We develop a divide-and-conquer strategy which splits the overall problem into small sub-problems. We relate these sub-problems to well-studied graph theoretic problems, and take advantage of existing fast algorithms. We show that our algorithms meet the runtime requirement of real-time LTE operations. In the second part of the dissertation, we address a privacy concern in LTE networks. In particular, we show that user location can be leaked in current LTE paging architecture. We propose a mechanism based on signal processing to remedy this vulnerability. Our method makes use of physical layer identification, which are low-power tags embedded on the wireless waveform, to signal paging messages to user devices. We show that our method is stealthy and robust, and that it mitigates the aforementioned privacy issue

    Performance Analysis and Mitigation Techniques for I/Q-Corrupted OFDM Systems

    Get PDF
    Orthogonal Frequency Division Multiplexing (OFDM) has become a widely adopted modulation technique in modern communications systems due to its multipath resilience and low implementation complexity. The direct conversion architecture is a popular candidate for low-cost, low-power, fully integrated transceiver designs. One of the inevitable problems associated with analog signal processing in direct conversion involves the mismatches in the gain and phases of In-phase (I) and Quadrature-phase (Q) branches. Ideally, the I and Q branches of the quadrature mixer will have perfectly matched gains and are orthogonal in phase. Due to imperfect implementation of the electronics, so called I/Q imbalance emerges and creates interference between subcarriers which are symmetrically apart from the central subcarrier. With practical imbalance levels, basic transceivers fail to maintain the sufficient image rejection, which in turn can cause interference with the desired transmission. Such an I/Q distortion degrades the systems performance if left uncompensated. Moreover, the coexistence of I/Q imbalance and other analog RF imperfections with digital baseband and higher layer functionalities such as multiantenna transmission and radio resource management, reduce the probability of successful transmission. Therefore, mitigation of I/Q imbalance is an essential substance in designing and implementing modern communications systems, while meeting required performance targets and quality of service. This thesis considers techniques to compensate and mitigate I/Q imbalance, when combined with channel estimation, multiantenna transmission, transmission power control, adaptive modulation and multiuser scheduling. The awareness of the quantitative relationship between transceiver parameters and system parameters is crucial in designing and dimensioning of modern communications systems. For this purpose, analytical models to evaluate the performance of an I/Q distorted system are considered
    corecore