318 research outputs found
Secure Full-Duplex Device-to-Device Communication
This paper considers full-duplex (FD) device-to-device (D2D) communications
in a downlink MISO cellular system in the presence of multiple eavesdroppers.
The D2D pair communicate sharing the same frequency band allocated to the
cellular users (CUs). Since the D2D users share the same frequency as the CUs,
both the base station (BS) and D2D transmissions interfere each other. In
addition, due to limited processing capability, D2D users are susceptible to
external attacks. Our aim is to design optimal beamforming and power control
mechanism to guarantee secure communication while delivering the required
quality-of-service (QoS) for the D2D link. In order to improve security,
artificial noise (AN) is transmitted by the BS. We design robust beamforming
for secure message as well as the AN in the worst-case sense for minimizing
total transmit power with imperfect channel state information (CSI) of all
links available at the BS. The problem is strictly non-convex with infinitely
many constraints. By discovering the hidden convexity of the problem, we derive
a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201
Secure Full-Duplex Device-to-Device Communication
This paper considers full-duplex (FD) device-to-device (D2D) communications
in a downlink MISO cellular system in the presence of multiple eavesdroppers.
The D2D pair communicate sharing the same frequency band allocated to the
cellular users (CUs). Since the D2D users share the same frequency as the CUs,
both the base station (BS) and D2D transmissions interfere each other. In
addition, due to limited processing capability, D2D users are susceptible to
external attacks. Our aim is to design optimal beamforming and power control
mechanism to guarantee secure communication while delivering the required
quality-of-service (QoS) for the D2D link. In order to improve security,
artificial noise (AN) is transmitted by the BS. We design robust beamforming
for secure message as well as the AN in the worst-case sense for minimizing
total transmit power with imperfect channel state information (CSI) of all
links available at the BS. The problem is strictly non-convex with infinitely
many constraints. By discovering the hidden convexity of the problem, we derive
a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201
Wireless powered D2D communications underlying cellular networks: design and performance of the extended coverage
Because of the short battery life of user equipments (UEs), and the requirements for better quality of service have been more demanding, energy efficiency (EE) has emerged to be important in device-to-device (D2D) communications. In this paper, we consider a scenario, in which D2D UEs in a half-duplex decode-and-forward cognitive D2D communication underlying a traditional cellular network harvest energy and communicate with each other by using the spectrum allocated by the base station (BS). In order to develop a practical design, we achieve the optimal time switching (TS) ratio for energy harvesting. Besides that, we derive closed-form expressions for outage probability, sum-bit error rate, average EE and instantaneous rate by considering the scenario when installing the BS near UEs or far from the UEs. Two communication types are enabled by TS-based protocol. Our numerical and simulation results prove that the data rate of the D2D communication can be significantly enhanced.Web of Science58439939
Security for 5G Mobile Wireless Networks
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key management and privacy. The paper further discusses the new security features involving different technologies applied to 5G such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software defined networks and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantage of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized
Resource Allocation for Device-to-Device Communications in Multi-Cell Multi-Band Heterogeneous Cellular Networks
Heterogeneous cellular networks (HCNs) with millimeter wave (mm-wave)
communications are considered as a promising technology for the fifth
generation mobile networks. Mm-wave has the potential to provide multiple
gigabit data rate due to the broad spectrum. Unfortunately, additional free
space path loss is also caused by the high carrier frequency. On the other
hand, mm-wave signals are sensitive to obstacles and more vulnerable to
blocking effects. To address this issue, highly directional narrow beams are
utilized in mm-wave networks. Additionally, device-to-device (D2D) users make
full use of their proximity and share uplink spectrum resources in HCNs to
increase the spectrum efficiency and network capacity. Towards the caused
complex interferences, the combination of D2D-enabled HCNs with small cells
densely deployed and mm-wave communications poses a big challenge to the
resource allocation problems. In this paper, we formulate the optimization
problem of D2D communication spectrum resource allocation among multiple
micro-wave bands and multiple mm-wave bands in HCNs. Then, considering the
totally different propagation conditions on the two bands, a heuristic
algorithm is proposed to maximize the system transmission rate and approximate
the solutions with sufficient accuracies. Compared with other practical
schemes, we carry out extensive simulations with different system parameters,
and demonstrate the superior performance of the proposed scheme. In addition,
the optimality and complexity are simulated to further verify effectiveness and
efficiency.Comment: 13 pages, 11 figures, IEEE Transactions on Vehicular Technolog
Resource Allocation for Device-to-Device Communications Underlaying Heterogeneous Cellular Networks Using Coalitional Games
Heterogeneous cellular networks (HCNs) with millimeter wave (mmWave)
communications included are emerging as a promising candidate for the fifth
generation mobile network. With highly directional antenna arrays, mmWave links
are able to provide several-Gbps transmission rate. However, mmWave links are
easily blocked without line of sight. On the other hand, D2D communications
have been proposed to support many content based applications, and need to
share resources with users in HCNs to improve spectral reuse and enhance system
capacity. Consequently, an efficient resource allocation scheme for D2D pairs
among both mmWave and the cellular carrier band is needed. In this paper, we
first formulate the problem of the resource allocation among mmWave and the
cellular band for multiple D2D pairs from the view point of game theory. Then,
with the characteristics of cellular and mmWave communications considered, we
propose a coalition formation game to maximize the system sum rate in
statistical average sense. We also theoretically prove that our proposed game
converges to a Nash-stable equilibrium and further reaches the near-optimal
solution with fast convergence rate. Through extensive simulations under
various system parameters, we demonstrate the superior performance of our
scheme in terms of the system sum rate compared with several other practical
schemes.Comment: 13 pages, 12 figure
Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks
Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be
promising in the fifth generation (5G) wireless networks. H-CRANs enable users
to enjoy diverse services with high energy efficiency, high spectral
efficiency, and low-cost operation, which are achieved by using cloud computing
and virtualization techniques. However, H-CRANs face many technical challenges
due to massive user connectivity, increasingly severe spectrum scarcity and
energy-constrained devices. These challenges may significantly decrease the
quality of service of users if not properly tackled. Non-orthogonal multiple
access (NOMA) schemes exploit non-orthogonal resources to provide services for
multiple users and are receiving increasing attention for their potential of
improving spectral and energy efficiency in 5G networks. In this article a
framework for energy-efficient NOMA H-CRANs is presented. The enabling
technologies for NOMA H-CRANs are surveyed. Challenges to implement these
technologies and open issues are discussed. This article also presents the
performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure
- …