361 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Secrecy Performance Analysis of Cooperative Nonorthogonal Multiple Access in IoT Networks

    Get PDF
    Different system models utilizing Non-orthogonal multiple access (NOMA) have been successfully studied to meet the growing capacity demands of the Internet of Things (IoT) devices for the next-generation networks. However, analyzing the anti-eavesdropping for NOMA systems under different scenarios and settings still needs further exploration before it can be practically deployed. Therefore, in this paper, we study the secrecy performance of a cooperative NOMA system in IoT networks where two source nodes communicate with their respective destination nodes via a common relay in the presence of an eavesdropper. Specifically, two source node sends their data in parallel over the same frequency band to the common relay node using uplink NOMA. Then, the relay node forwards the decoded symbols to the respective destination nodes using downlink NOMA in the presence of an eavesdropper. To enhance the security performance of the considered system, we study and propose an artificial noise (AN)-aided scheme in which the two destination nodes emit a jamming signal to confuse the eavesdropper while receiving the signal from the common relay node. We also study the effect of NOMA power allocation, perfect successive interference cancellation (pSIC), and imperfect SIC (ipSIC) on the considered system. Analytical expressions for the Ergodic capacity, Ergodic secrecy sum rate (ESSR), and secrecy outage probability (SOP) are mathematically derived and verified with the simulation results. Our results demonstrate that a significantly higher ESSR and lower SOP of the system can be attained compared to a conventional NOMA system without a destination-assisted jamming signal scheme.acceptedVersio

    Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks

    Get PDF
    Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be promising in the fifth generation (5G) wireless networks. H-CRANs enable users to enjoy diverse services with high energy efficiency, high spectral efficiency, and low-cost operation, which are achieved by using cloud computing and virtualization techniques. However, H-CRANs face many technical challenges due to massive user connectivity, increasingly severe spectrum scarcity and energy-constrained devices. These challenges may significantly decrease the quality of service of users if not properly tackled. Non-orthogonal multiple access (NOMA) schemes exploit non-orthogonal resources to provide services for multiple users and are receiving increasing attention for their potential of improving spectral and energy efficiency in 5G networks. In this article a framework for energy-efficient NOMA H-CRANs is presented. The enabling technologies for NOMA H-CRANs are surveyed. Challenges to implement these technologies and open issues are discussed. This article also presents the performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure

    Resource allocation for NOMA wireless systems

    Get PDF
    Power-domain non-orthogonal multiple access (NOMA) has been widely recognized as a promising candidate for the next generation of wireless communication systems. By applying superposition coding at the transmitter and successive interference cancellation at the receiver, NOMA allows multiple users to access the same time-frequency resource in power domain. This way, NOMA not only increases the system’s spectral and energy efficiencies, but also supports more users when compared with the conventional orthogonal multiple access (OMA). Meanwhile, improved user fairness can be achieved by NOMA. Nonetheless, the promised advantages of NOMA cannot be realized without proper resource allocation. The main resources in wireless communication systems include time, frequency, space, code and power. In NOMA systems, multiple users are accommodated in each time/frequency/code resource block (RB), forming a NOMA cluster. As a result, how to group the users into NOMA clusters and allocate the power is of significance. A large number of studies have been carried out for developing efficient power allocation (PA) algorithms in single-input single-output (SISO) scenarios with fixed user clustering. To fully reap the gain of NOMA, the design of joint PA and user clustering is required. Moreover, the study of PA under multiple-input multiple-output (MIMO) systems still remains at an incipient stage. In this dissertation, we develop novel algorithms to allocate resource for both SISO-NOMA and MIMO-NOMA systems. More specifically, Chapter 2 compares the system capacity of MIMO-NOMA with MIMO-OMA. It is proved analytically that MIMO-NOMA outperforms MIMO-OMA in terms of both sum channel capacity and ergodic sum capacity when there are multiple users in a cluster. Furthermore, it is demonstrated that the more users are admitted to a cluster, the lower is the achieved sum rate, which illustrates the tradeoff between the sum rate and maximum number of admitted users. Chapter 3 addresses the PA problem for a general multi-cluster multi-user MIMONOMA system to maximize the system energy efficiency (EE). First, a closed-form solution is derived for the corresponding sum rate (SE) maximization problem. Then, the EE maximization problem is solved by applying non-convex fractional programming. Chapter 4 investigates the energy-efficient joint user-RB association and PA problem for an uplink hybrid NOMA-OMA system. The considered problem requires to jointly optimize the user clustering, channel assignment and power allocation. To address this hard problem, a many-to-one bipartite graph is first constructed considering the users and RBs as the two sets of nodes. Based on swap matching, a joint user-RB association and power allocation scheme is proposed, which converges within a limited number of iterations. Moreover, for the power allocation under a given user-RB association, a low complexity optimal PA algorithm is proposed. Furthermore, Chapter 5 focuses on securing the confidential information of massive MIMO-NOMA networks by exploiting artificial noise (AN). An uplink training scheme is first proposed, and on this basis, the base station precodes the confidential information and injects the AN. Following this, the ergodic secrecy rate is derived for downlink transmission. Additionally, PA algorithms are proposed to maximize the SE and EE of the system. Finally, conclusions are drawn and possible extensions to resource allocation in NOMA systems are discussed in Chapter 6

    Relaying in the Internet of Things (IoT): A Survey

    Get PDF
    The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions
    • …
    corecore