361 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Secrecy Performance Analysis of Cooperative Nonorthogonal Multiple Access in IoT Networks
Different system models utilizing Non-orthogonal multiple access (NOMA) have been successfully studied to meet the growing capacity demands of the Internet of Things (IoT) devices for the next-generation networks. However, analyzing the anti-eavesdropping for NOMA systems under different scenarios and settings still needs further exploration before it can be practically deployed. Therefore, in this paper, we study the secrecy performance of a cooperative NOMA system in IoT networks where two source nodes communicate with their respective destination nodes via a common relay in the presence of an eavesdropper. Specifically, two source node sends their data in parallel over the same frequency band to the common relay node using uplink NOMA. Then, the relay node forwards the decoded symbols to the respective destination nodes using downlink NOMA in the presence of an eavesdropper. To enhance the security performance of the considered system, we study and propose an artificial noise (AN)-aided scheme in which the two destination nodes emit a jamming signal to confuse the eavesdropper while receiving the signal from the common relay node. We also study the effect of NOMA power allocation, perfect successive interference cancellation (pSIC), and imperfect SIC (ipSIC) on the considered system. Analytical expressions for the Ergodic capacity, Ergodic secrecy sum rate (ESSR), and secrecy outage probability (SOP) are mathematically derived and verified with the simulation results. Our results demonstrate that a significantly higher ESSR and lower SOP of the system can be attained compared to a conventional NOMA system without a destination-assisted jamming signal scheme.acceptedVersio
Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks
Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be
promising in the fifth generation (5G) wireless networks. H-CRANs enable users
to enjoy diverse services with high energy efficiency, high spectral
efficiency, and low-cost operation, which are achieved by using cloud computing
and virtualization techniques. However, H-CRANs face many technical challenges
due to massive user connectivity, increasingly severe spectrum scarcity and
energy-constrained devices. These challenges may significantly decrease the
quality of service of users if not properly tackled. Non-orthogonal multiple
access (NOMA) schemes exploit non-orthogonal resources to provide services for
multiple users and are receiving increasing attention for their potential of
improving spectral and energy efficiency in 5G networks. In this article a
framework for energy-efficient NOMA H-CRANs is presented. The enabling
technologies for NOMA H-CRANs are surveyed. Challenges to implement these
technologies and open issues are discussed. This article also presents the
performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure
Resource allocation for NOMA wireless systems
Power-domain non-orthogonal multiple access (NOMA) has been widely recognized as
a promising candidate for the next generation of wireless communication systems. By
applying superposition coding at the transmitter and successive interference cancellation
at the receiver, NOMA allows multiple users to access the same time-frequency resource
in power domain. This way, NOMA not only increases the system’s spectral and energy
efficiencies, but also supports more users when compared with the conventional orthogonal
multiple access (OMA). Meanwhile, improved user fairness can be achieved by NOMA.
Nonetheless, the promised advantages of NOMA cannot be realized without proper
resource allocation. The main resources in wireless communication systems include time,
frequency, space, code and power. In NOMA systems, multiple users are accommodated
in each time/frequency/code resource block (RB), forming a NOMA cluster. As a result,
how to group the users into NOMA clusters and allocate the power is of significance. A
large number of studies have been carried out for developing efficient power allocation
(PA) algorithms in single-input single-output (SISO) scenarios with fixed user clustering.
To fully reap the gain of NOMA, the design of joint PA and user clustering is required.
Moreover, the study of PA under multiple-input multiple-output (MIMO) systems still
remains at an incipient stage. In this dissertation, we develop novel algorithms to allocate
resource for both SISO-NOMA and MIMO-NOMA systems.
More specifically, Chapter 2 compares the system capacity of MIMO-NOMA with
MIMO-OMA. It is proved analytically that MIMO-NOMA outperforms MIMO-OMA in terms of both sum channel capacity and ergodic sum capacity when there are multiple
users in a cluster. Furthermore, it is demonstrated that the more users are admitted to
a cluster, the lower is the achieved sum rate, which illustrates the tradeoff between the
sum rate and maximum number of admitted users.
Chapter 3 addresses the PA problem for a general multi-cluster multi-user MIMONOMA
system to maximize the system energy efficiency (EE). First, a closed-form solution
is derived for the corresponding sum rate (SE) maximization problem. Then, the EE
maximization problem is solved by applying non-convex fractional programming.
Chapter 4 investigates the energy-efficient joint user-RB association and PA problem
for an uplink hybrid NOMA-OMA system. The considered problem requires to jointly
optimize the user clustering, channel assignment and power allocation. To address this
hard problem, a many-to-one bipartite graph is first constructed considering the users
and RBs as the two sets of nodes. Based on swap matching, a joint user-RB association
and power allocation scheme is proposed, which converges within a limited number of
iterations. Moreover, for the power allocation under a given user-RB association, a low complexity
optimal PA algorithm is proposed.
Furthermore, Chapter 5 focuses on securing the confidential information of massive
MIMO-NOMA networks by exploiting artificial noise (AN). An uplink training scheme is
first proposed, and on this basis, the base station precodes the confidential information
and injects the AN. Following this, the ergodic secrecy rate is derived for downlink transmission.
Additionally, PA algorithms are proposed to maximize the SE and EE of the
system.
Finally, conclusions are drawn and possible extensions to resource allocation in NOMA
systems are discussed in Chapter 6
Relaying in the Internet of Things (IoT): A Survey
The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions
- …