199 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    IRS-assisted UAV Communications: A Comprehensive Review

    Full text link
    Intelligent reflecting surface (IRS) can smartly adjust the wavefronts in terms of phase, frequency, amplitude and polarization via passive reflections and without any need of radio frequency (RF) chains. It is envisaged as an emerging technology which can change wireless communication to improve both energy and spectrum efficiencies with low energy consumption and low cost. It can intelligently configure the wireless channels through a massive number of cost effective passive reflecting elements to improve the system performance. Similarly, unmanned aerial vehicle (UAV) communication has gained a viable attention due to flexible deployment, high mobility and ease of integration with several technologies. However, UAV communication is prone to security issues and obstructions in real-time applications. Recently, it is foreseen that UAV and IRS both can integrate together to attain unparalleled capabilities in difficult scenarios. Both technologies can ensure improved performance through proactively altering the wireless propagation using smart signal reflections and maneuver control in three dimensional (3D) space. IRS can be integrated in both aerial and terrene environments to reap the benefits of smart reflections. This study briefly discusses UAV communication, IRS and focuses on IRS-assisted UAC communications. It surveys the existing literature on this emerging research topic and highlights several promising technologies which can be implemented in IRS-assisted UAV communication. This study also presents several application scenarios and open research challenges. This study goes one step further to elaborate research opportunities to design and optimize wireless systems with low energy footprint and at low cost. Finally, we shed some light on future research aspects for IRS-assisted UAV communication

    Resource allocation for NOMA wireless systems

    Get PDF
    Power-domain non-orthogonal multiple access (NOMA) has been widely recognized as a promising candidate for the next generation of wireless communication systems. By applying superposition coding at the transmitter and successive interference cancellation at the receiver, NOMA allows multiple users to access the same time-frequency resource in power domain. This way, NOMA not only increases the system’s spectral and energy efficiencies, but also supports more users when compared with the conventional orthogonal multiple access (OMA). Meanwhile, improved user fairness can be achieved by NOMA. Nonetheless, the promised advantages of NOMA cannot be realized without proper resource allocation. The main resources in wireless communication systems include time, frequency, space, code and power. In NOMA systems, multiple users are accommodated in each time/frequency/code resource block (RB), forming a NOMA cluster. As a result, how to group the users into NOMA clusters and allocate the power is of significance. A large number of studies have been carried out for developing efficient power allocation (PA) algorithms in single-input single-output (SISO) scenarios with fixed user clustering. To fully reap the gain of NOMA, the design of joint PA and user clustering is required. Moreover, the study of PA under multiple-input multiple-output (MIMO) systems still remains at an incipient stage. In this dissertation, we develop novel algorithms to allocate resource for both SISO-NOMA and MIMO-NOMA systems. More specifically, Chapter 2 compares the system capacity of MIMO-NOMA with MIMO-OMA. It is proved analytically that MIMO-NOMA outperforms MIMO-OMA in terms of both sum channel capacity and ergodic sum capacity when there are multiple users in a cluster. Furthermore, it is demonstrated that the more users are admitted to a cluster, the lower is the achieved sum rate, which illustrates the tradeoff between the sum rate and maximum number of admitted users. Chapter 3 addresses the PA problem for a general multi-cluster multi-user MIMONOMA system to maximize the system energy efficiency (EE). First, a closed-form solution is derived for the corresponding sum rate (SE) maximization problem. Then, the EE maximization problem is solved by applying non-convex fractional programming. Chapter 4 investigates the energy-efficient joint user-RB association and PA problem for an uplink hybrid NOMA-OMA system. The considered problem requires to jointly optimize the user clustering, channel assignment and power allocation. To address this hard problem, a many-to-one bipartite graph is first constructed considering the users and RBs as the two sets of nodes. Based on swap matching, a joint user-RB association and power allocation scheme is proposed, which converges within a limited number of iterations. Moreover, for the power allocation under a given user-RB association, a low complexity optimal PA algorithm is proposed. Furthermore, Chapter 5 focuses on securing the confidential information of massive MIMO-NOMA networks by exploiting artificial noise (AN). An uplink training scheme is first proposed, and on this basis, the base station precodes the confidential information and injects the AN. Following this, the ergodic secrecy rate is derived for downlink transmission. Additionally, PA algorithms are proposed to maximize the SE and EE of the system. Finally, conclusions are drawn and possible extensions to resource allocation in NOMA systems are discussed in Chapter 6

    Security enhancement for NOMA-UAV networks

    Get PDF
    Owing to its distinctive merits, non-orthogonal multiple access (NOMA) techniques have been utilized in unmanned aerial vehicle (UAV) enabled wireless base stations to provide effective coverage for terrestrial users. However, the security of NOMA-UAV systems remains a challenge due to the line-of-sight air-to-ground channels and higher transmission power of weaker users in NOMA. In this paper, we propose two schemes to guarantee the secure transmission in UAV-NOMA networks. When only one user requires secure transmission, we derive the hovering position for the UAV and the power allocation to meet rate threshold of the secure user while maximizing the sum rate of remaining users. This disrupts the eavesdropping towards the secure user effectively. When multiple users require secure transmission, we further take the advantage of beamforming via multiple antennas at the UAV to guarantee their secure transmission. Due to the non-convexity of this problem, we convert it into a convex one for an iterative solution by using the second order cone programming. Finally, simulation results are provided to show the effectiveness of the proposed scheme
    • …
    corecore