65 research outputs found

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Get PDF
    Massive multiple antenna systems in conjunction with millimeter (mmWave) communication have gained tremendous attention in the recent years owing to their high speed data delivery. However, security in these networks has been overlooked; thereby necessitating a comprehensive study. This paper analyzes the physical layer security performance of the downlink of a massive multiple-input multiple-output (MIMO)-based hybrid heterogeneous network (HetNet) where both mmWave and sub-6 GHz small cells coexist. Specifically, a tractable approach using stochastic geometry is proposed to analyze the secrecy outage probability, secrecy energy efficiency (SEE) and secrecy spectrum efficiency (SSE) of the hybrid HetNets. Our study further characterizes the impact of large antenna arrays, directional beamforming gains, transmit power, and cell density on the above mentioned secrecy performance measures. The results show that at low transmit power operation, the secrecy performance enhances for higher small cell density. It has also been observed that the higher directivity gains at mmWave cells lead to a drop in secrecy performance of the network; thus a tradeoff exists between better coverage or secrecy

    Ultra-Dense Networks in 5G and Beyond: Challenges and Promising Solutions

    Get PDF
    Ultra-Dense Network (UDN) is one of the promising and leading directions in Fifth Generation and beyond (5GB) networks. In UDNs, Small Cells (SCs) or Small Base Stations (SBSs) such as microcells, picocells, or femtocells are deployed in high densities where inter-site distances are within the range of few or tens of meters. UDNs also require that SCs are typically deployed in relatively large densities compared to the Human-Type Communication Users (HTCUs) such as smartphones, tablets, and/or laptops. Such SCs are characterized by their low transmission powers, small coverage areas, and low cost. Hence, the deployment of the SCs can be done either by the cellular network operators or by the customers themselves within their premises to maintain certain levels of Quality of Service (QoS). However, the randomness of the deployment of the SCs along with the small inter-site distances may degrade the achievable performance due to the uncontrolled Inter-Cell Interference (ICI). Therefore, idle mode capability is an inevitable feature in the high-density regime of SCs. In idle mode, a SC is switched off to prevent ICI when no user is associated to it. In doing so, we can imagine the UDN as a mobile network that keeps following the users to remain as close as possible to them. In 5G, different use cases are required to be supported such as enhanced Mobile Broad-Band (eMBB), Ultra-Reliable and Low-Latency Communication (URLLC), and massive Machine-Type Communication (mMTC). On one hand, the inevitable upcoming era of smart living requires unprecedented advances in enabling technologies to support the main building blocks of this era which are Internet of Things (IoT) devices. Machine-Type Communication (MTC), the cellular version of Machine-to-Machine (M2M) communication, constitutes the main enabling technology to support communications among such devices with minimal or even without human intervention. The massive number of these devices, Machine-Type Communication Devices (MTCDs), and the immense amount of traffic generated by them require a paramount shift in cellular and non-cellular wireless technologies to achieve the required connectivity. On the other hand, the sky-rocketing number of data hungry applications installed on human-held devices, or HTCUs, such as video conferencing and virtual reality applications require their own advances in the wireless infrastructure in terms of high capacity, enhanced reliability, and reduced latency. Throughout this thesis, we exploit the UDN infrastructure integrated with other 5G resources and enabling technologies to explore the possible opportunities in supporting both HTC and MTC, either solely or simultaneously. Given the shorter distances between transmitters and receivers encountered in UDNs, more realistic models of the path loss must be adopted such as the Stretched Exponential Path Loss (SEPL) model. We use tools from stochastic geometry to formulate novel mathematical frameworks that can be used to investigate the achievable performance without having to rely on extensive time-consuming Monte-Carlo simulations. Besides, the derived analytical expressions can be used to tune some system parameters or to propose some approaches/techniques that can be followed to optimize the performance of the system under certain circumstances. Tackling practical scenarios, the complexity, or sometimes in-feasibility, of providing unlimited backhaul capacity for the massive number of SCs must be considered. In this regard, we adopt multiple-association where each HTCU is allowed to associate with multiple SCs. By doing so, we carefully split the targeted traffic among several backhaul links to mitigate the bottleneck forced by limited backhaul capacities. It is noteworthy that for coexisting MTCDs with the HTCUs, activating more SCs would allow more MTCDs to be supported without introducing additional ICI towards the HTCUs. Targeting different application, multiple-association can be also adopted to tackle computation-intensive applications of HTCUs. In particular, for applications such as augmented reality and environment recognition that require heavy computations, a task is split and partially offloaded to multiple SCs with integrated Edge Computing Servers (ECSs). Then, the task partitions are processed in parallel to reduce the end-to-end processing delay. Based on relative densities between HTCUs and SCs, we use tools from stochastic geometry to develop an offline adaptive task division technique that further reduces the average end-to-end processing delay per user. With the frequent serious data breaches experienced in recent years, securing data has become more of a business risk rather than an information technology (IT) issue. Hence, we exploit the dense number of SCs found in UDN along with Physical Layer Security (PLS) protocols to secure data transfer. In particular, we again adopt multiple-association and split the data of HTCUs into multiple streams originating from different SCs to prevent illegitimate receivers from eavesdropping. To support massive number of MTCDs, we deploy the Non-Orthogonal Multiple-Access (NOMA) technique. Using power NOMA, more than one device can be supported over the same frequency/time resource and their signals are distinguished at the receiver using Successive Interference Cancellation (SIC). In the same scope, exploiting the available resources in 5G and beyond networks, we investigate a mMTC scenario in an UDN operating in the Millimeter Wave (mmWave) band and supported by wireless backhauling. In doing so, we shed lights on the possible gains of utilizing the mmWave band where the severe penetration losses of mmWave can be exploited to mitigate the significant ICI in UDNs. Also, the vast bandwidth available in the mmWave band helps to allocate more Resource Blocks (RBs) per SCs which corresponds to supporting more MTCDs

    Intelligent-Reflecting-Surface-Assisted UAV Communications for 6G Networks

    Full text link
    In 6th-Generation (6G) mobile networks, Intelligent Reflective Surfaces (IRSs) and Unmanned Aerial Vehicles (UAVs) have emerged as promising technologies to address the coverage difficulties and resource constraints faced by terrestrial networks. UAVs, with their mobility and low costs, offer diverse connectivity options for mobile users and a novel deployment paradigm for 6G networks. However, the limited battery capacity of UAVs, dynamic and unpredictable channel environments, and communication resource constraints result in poor performance of traditional UAV-based networks. IRSs can not only reconstruct the wireless environment in a unique way, but also achieve wireless network relay in a cost-effective manner. Hence, it receives significant attention as a promising solution to solve the above challenges. In this article, we conduct a comprehensive survey on IRS-assisted UAV communications for 6G networks. First, primary issues, key technologies, and application scenarios of IRS-assisted UAV communications for 6G networks are introduced. Then, we put forward specific solutions to the issues of IRS-assisted UAV communications. Finally, we discuss some open issues and future research directions to guide researchers in related fields

    Enabling Cyber-Physical Communication in 5G Cellular Networks: Challenges, Solutions and Applications

    Get PDF
    Cyber-physical systems (CPS) are expected to revolutionize the world through a myriad of applications in health-care, disaster event applications, environmental management, vehicular networks, industrial automation, and so on. The continuous explosive increase in wireless data traffic, driven by the global rise of smartphones, tablets, video streaming, and online social networking applications along with the anticipated wide massive sensors deployments, will create a set of challenges to network providers, especially that future fifth generation (5G) cellular networks will help facilitate the enabling of CPS communications over current network infrastructure. In this dissertation, we first provide an overview of CPS taxonomy along with its challenges from energy efficiency, security, and reliability. Then we present different tractable analytical solutions through different 5G technologies, such as device-to-device (D2D) communications, cell shrinking and offloading, in order to enable CPS traffic over cellular networks. These technologies also provide CPS with several benefits such as ubiquitous coverage, global connectivity, reliability and security. By tuning specific network parameters, the proposed solutions allow the achievement of balance and fairness in spectral efficiency and minimum achievable throughout among cellular users and CPS devices. To conclude, we present a CPS mobile-health application as a case study where security of the medical health cyber-physical space is discussed in details

    Unmanned Aerial Vehicle (UAV)-Enabled Wireless Communications and Networking

    Get PDF
    The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out

    Efficient and Secure Resource Allocation in Mobile Edge Computing Enabled Wireless Networks

    Get PDF
    To support emerging applications such as autonomous vehicles and smart homes and to build an intelligent society, the next-generation internet of things (IoT) is calling for up to 50 billion devices connected world wide. Massive devices connection, explosive data circulation, and colossal data processing demand are driving both the industry and academia to explore new solutions. Uploading this vast amount of data to the cloud center for processing will significantly increase the load on backbone networks and cause relatively long latency to time-sensitive applications. A practical solution is to deploy the computing resource closer to end-users to process the distributed data. Hence, Mobile Edge Computing (MEC) emerged as a promising solution to providing high-speed data processing service with low latency. However, the implementation of MEC networks is handicapped by various challenges. For one thing, to serve massive IoT devices, dense deployment of edge servers will consume much more energy. For another, uploading sensitive user data through a wireless link intro-duces potential risks, especially for those size-limited IoT devices that cannot implement complicated encryption techniques. This dissertation investigates problems related to Energy Efficiency (EE) and Physical Layer Security (PLS) in MEC-enabled IoT networks and how Non-Orthogonal Multiple Access (NOMA), prediction-based server coordination, and Intelligent Reflecting Surface (IRS) can be used to mitigate them. Employing a new spectrum access method can help achieve greater speed with less power consumption, therefore increasing system EE. We first investigated NOMA-assisted MEC networks and verified that the EE performance could be significantly improved. Idle servers can consume unnecessary power. Proactive server coordination can help relieve the tension of increased energy consumption in MEC systems. Our next step was to employ advanced machine learning algorithms to predict data workload at the server end and adaptively adjust the system configuration over time, thus reducing the accumulated system cost. We then introduced the PLS to our system and investigated the long-term secure EE performance of the MEC-enabled IoT network with NOMA assistance. It has shown that NOMA can improve both EE and PLS for the network. Finally, we switch from the single antenna scenario to a multiple-input single-output (MISO) system to exploit space diversity and beam forming techniques in mmWave communication. IRS can be used simultaneously to help relieve the pathloss and reconfigure multi-path links. In the final part, we first investigated the secure EE performance of IRS-assisted MISO networks and introduced a friendly jammer to block the eavesdroppers and improve the PLS rate. We then combined the IRS with the NOMA in the MEC network and showed that the IRS can further enhance the system EE
    • …
    corecore