9,572 research outputs found
Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks
Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be
promising in the fifth generation (5G) wireless networks. H-CRANs enable users
to enjoy diverse services with high energy efficiency, high spectral
efficiency, and low-cost operation, which are achieved by using cloud computing
and virtualization techniques. However, H-CRANs face many technical challenges
due to massive user connectivity, increasingly severe spectrum scarcity and
energy-constrained devices. These challenges may significantly decrease the
quality of service of users if not properly tackled. Non-orthogonal multiple
access (NOMA) schemes exploit non-orthogonal resources to provide services for
multiple users and are receiving increasing attention for their potential of
improving spectral and energy efficiency in 5G networks. In this article a
framework for energy-efficient NOMA H-CRANs is presented. The enabling
technologies for NOMA H-CRANs are surveyed. Challenges to implement these
technologies and open issues are discussed. This article also presents the
performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure
Resource Allocation in Wireless Networks with RF Energy Harvesting and Transfer
Radio frequency (RF) energy harvesting and transfer techniques have recently
become alternative methods to power the next generation of wireless networks.
As this emerging technology enables proactive replenishment of wireless
devices, it is advantageous in supporting applications with quality-of-service
(QoS) requirement. This article focuses on the resource allocation issues in
wireless networks with RF energy harvesting capability, referred to as RF
energy harvesting networks (RF-EHNs). First, we present an overview of the
RF-EHNs, followed by a review of a variety of issues regarding resource
allocation. Then, we present a case study of designing in the receiver
operation policy, which is of paramount importance in the RF-EHNs. We focus on
QoS support and service differentiation, which have not been addressed by
previous literatures. Furthermore, we outline some open research directions.Comment: To appear in IEEE Networ
Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users
In this paper, we consider simultaneous wireless information and power
transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA)
systems with the coexistence of information receivers (IRs) and energy
receivers (ERs). The IRs are served with best-effort secrecy data and the ERs
harvest energy with minimum required harvested power. To enhance physical-layer
security and yet satisfy energy harvesting requirements, we introduce a new
frequency-domain artificial noise based approach. We study the optimal resource
allocation for the weighted sum secrecy rate maximization via transmit power
and subcarrier allocation. The considered problem is non-convex, while we
propose an efficient algorithm for solving it based on Lagrange duality method.
Simulation results illustrate the effectiveness of the proposed algorithm as
compared against other heuristic schemes.Comment: To appear in Globecom 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Improving performance of far users in cognitive radio: Exploiting NOMA and wireless power transfer
In this paper, we examine non-orthogonal multiple access (NOMA) and relay selection strategy to benefit extra advantage from traditional cognitive radio (CR) relaying systems. The most important requirement to prolong lifetime of such network is employing energy harvesting in the relay to address network with limited power constraint. In particular, we study such energy harvesting CR-NOMA using amplify-and-forward (AF) scheme to improve performance far NOMA users. To further address such problem, two schemes are investigated in term of number of selected relays. To further examine system performance, the outage performance needs to be studied for such wireless powered CR-NOMA network over Rayleigh channels. The accurate expressions for the outage probability are derived to perform outage comparison of primary network and secondary network. The analytical results show clearly that position of these nodes, transmit signal to noise ratio (SNR) and power allocation coefficients result in varying outage performance. As main observation, performance gap between primary and secondary destination is decided by both power allocation factors and selection mode of single relay or multiple relays. Numerical studies were conducted to verify our derivations.Web of Science1211art. no. 220
Optimization of the overall success probability of the energy harvesting cognitive wireless sensor networks
Wireless energy harvesting can improve the performance of cognitive wireless sensor networks (WSNs). This paper considers radio frequency (RF) energy harvesting from transmissions in the primary spectrum for cognitive WSNs. The overall success probability of the energy harvesting cognitive WSN depends on the transmission success probability and energy success probability. Using the tools from stochastic geometry, we show that the overall success probability can be optimized with respect to: 1) transmit power of the sensors; 2) transmit power of the primary transmitters; and 3) spatial density of the primary transmitters. In this context, an optimization algorithm is proposed to maximize the overall success probability of the WSNs. Simulation results show that the overall success probability and the throughput of the WSN can be significantly improved by optimizing the aforementioned three parameters. As RF energy harvesting can also be performed indoors, hence, our solution can be directly applied to the cognitive WSNs that are installed in smart buildings
- …