199 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
IRS-assisted UAV Communications: A Comprehensive Review
Intelligent reflecting surface (IRS) can smartly adjust the wavefronts in
terms of phase, frequency, amplitude and polarization via passive reflections
and without any need of radio frequency (RF) chains. It is envisaged as an
emerging technology which can change wireless communication to improve both
energy and spectrum efficiencies with low energy consumption and low cost. It
can intelligently configure the wireless channels through a massive number of
cost effective passive reflecting elements to improve the system performance.
Similarly, unmanned aerial vehicle (UAV) communication has gained a viable
attention due to flexible deployment, high mobility and ease of integration
with several technologies. However, UAV communication is prone to security
issues and obstructions in real-time applications. Recently, it is foreseen
that UAV and IRS both can integrate together to attain unparalleled
capabilities in difficult scenarios. Both technologies can ensure improved
performance through proactively altering the wireless propagation using smart
signal reflections and maneuver control in three dimensional (3D) space. IRS
can be integrated in both aerial and terrene environments to reap the benefits
of smart reflections. This study briefly discusses UAV communication, IRS and
focuses on IRS-assisted UAC communications. It surveys the existing literature
on this emerging research topic and highlights several promising technologies
which can be implemented in IRS-assisted UAV communication. This study also
presents several application scenarios and open research challenges. This study
goes one step further to elaborate research opportunities to design and
optimize wireless systems with low energy footprint and at low cost. Finally,
we shed some light on future research aspects for IRS-assisted UAV
communication
Resource allocation for NOMA wireless systems
Power-domain non-orthogonal multiple access (NOMA) has been widely recognized as
a promising candidate for the next generation of wireless communication systems. By
applying superposition coding at the transmitter and successive interference cancellation
at the receiver, NOMA allows multiple users to access the same time-frequency resource
in power domain. This way, NOMA not only increases the system’s spectral and energy
efficiencies, but also supports more users when compared with the conventional orthogonal
multiple access (OMA). Meanwhile, improved user fairness can be achieved by NOMA.
Nonetheless, the promised advantages of NOMA cannot be realized without proper
resource allocation. The main resources in wireless communication systems include time,
frequency, space, code and power. In NOMA systems, multiple users are accommodated
in each time/frequency/code resource block (RB), forming a NOMA cluster. As a result,
how to group the users into NOMA clusters and allocate the power is of significance. A
large number of studies have been carried out for developing efficient power allocation
(PA) algorithms in single-input single-output (SISO) scenarios with fixed user clustering.
To fully reap the gain of NOMA, the design of joint PA and user clustering is required.
Moreover, the study of PA under multiple-input multiple-output (MIMO) systems still
remains at an incipient stage. In this dissertation, we develop novel algorithms to allocate
resource for both SISO-NOMA and MIMO-NOMA systems.
More specifically, Chapter 2 compares the system capacity of MIMO-NOMA with
MIMO-OMA. It is proved analytically that MIMO-NOMA outperforms MIMO-OMA in terms of both sum channel capacity and ergodic sum capacity when there are multiple
users in a cluster. Furthermore, it is demonstrated that the more users are admitted to
a cluster, the lower is the achieved sum rate, which illustrates the tradeoff between the
sum rate and maximum number of admitted users.
Chapter 3 addresses the PA problem for a general multi-cluster multi-user MIMONOMA
system to maximize the system energy efficiency (EE). First, a closed-form solution
is derived for the corresponding sum rate (SE) maximization problem. Then, the EE
maximization problem is solved by applying non-convex fractional programming.
Chapter 4 investigates the energy-efficient joint user-RB association and PA problem
for an uplink hybrid NOMA-OMA system. The considered problem requires to jointly
optimize the user clustering, channel assignment and power allocation. To address this
hard problem, a many-to-one bipartite graph is first constructed considering the users
and RBs as the two sets of nodes. Based on swap matching, a joint user-RB association
and power allocation scheme is proposed, which converges within a limited number of
iterations. Moreover, for the power allocation under a given user-RB association, a low complexity
optimal PA algorithm is proposed.
Furthermore, Chapter 5 focuses on securing the confidential information of massive
MIMO-NOMA networks by exploiting artificial noise (AN). An uplink training scheme is
first proposed, and on this basis, the base station precodes the confidential information
and injects the AN. Following this, the ergodic secrecy rate is derived for downlink transmission.
Additionally, PA algorithms are proposed to maximize the SE and EE of the
system.
Finally, conclusions are drawn and possible extensions to resource allocation in NOMA
systems are discussed in Chapter 6
Security enhancement for NOMA-UAV networks
Owing to its distinctive merits, non-orthogonal multiple access (NOMA) techniques have been utilized in unmanned aerial vehicle (UAV) enabled wireless base stations to provide effective coverage for terrestrial users. However, the security of NOMA-UAV systems remains a challenge due to the line-of-sight air-to-ground channels and higher transmission power of weaker users in NOMA. In this paper, we propose two schemes to guarantee the secure transmission in UAV-NOMA networks. When only one user requires secure transmission, we derive the hovering position for the UAV and the power allocation to meet rate threshold of the secure user while maximizing the sum rate of remaining users. This disrupts the eavesdropping towards the secure user effectively. When multiple users require secure transmission, we further take the advantage of beamforming via multiple antennas at the UAV to guarantee their secure transmission. Due to the non-convexity of this problem, we convert it into a convex one for an iterative solution by using the second order cone programming. Finally, simulation results are provided to show the effectiveness of the proposed scheme
- …