2,098 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    A Stochastic Geometric Analysis of Device-to-Device Communications Operating over Generalized Fading Channels

    Get PDF
    Device-to-device (D2D) communications are now considered as an integral part of future 5G networks which will enable direct communication between user equipment (UE) without unnecessary routing via the network infrastructure. This architecture will result in higher throughputs than conventional cellular networks, but with the increased potential for co-channel interference induced by randomly located cellular and D2D UEs. The physical channels which constitute D2D communications can be expected to be complex in nature, experiencing both line-of-sight (LOS) and non-LOS (NLOS) conditions across closely located D2D pairs. As well as this, given the diverse range of operating environments, they may also be subject to clustering of the scattered multipath contribution, i.e., propagation characteristics which are quite dissimilar to conventional Rayeligh fading environments. To address these challenges, we consider two recently proposed generalized fading models, namely κ−μ\kappa-\mu and η−μ\eta-\mu, to characterize the fading behavior in D2D communications. Together, these models encompass many of the most widely encountered and utilized fading models in the literature such as Rayleigh, Rice (Nakagami-nn), Nakagami-mm, Hoyt (Nakagami-qq) and One-Sided Gaussian. Using stochastic geometry we evaluate the rate and bit error probability of D2D networks under generalized fading conditions. Based on the analytical results, we present new insights into the trade-offs between the reliability, rate, and mode selection under realistic operating conditions. Our results suggest that D2D mode achieves higher rates over cellular link at the expense of a higher bit error probability. Through numerical evaluations, we also investigate the performance gains of D2D networks and demonstrate their superiority over traditional cellular networks.Comment: Submitted to IEEE Transactions on Wireless Communication

    A Novel Network NOMA Scheme for Downlink Coordinated Three-Point Systems

    Full text link
    In this paper, we propose a network non-orthogonal multiple access (N-NOMA) technique for the downlink coordinated multipoint (CoMP) communication scenario of a cellular network, with randomly deployed users. In the considered N-NOMA scheme, superposition coding (SC) is employed to serve cell-edge users as well as users close to base stations (BSs) simultaneously, and distributed analog beamforming by the BSs to meet the cell-edge user's quality of service (QoS) requirements. The combination of SC and distributed analog beamforming significantly complicates the expressions for the signal-to-interference-plus-noise ratio (SINR) at the reveiver, which makes the performance analysis particularly challenging. However, by using rational approximations, insightful analytical results are obtained in order to characterize the outage performance of the considered N-NOMA scheme. Computer simulation results are provided to show the superior performance of the proposed scheme as well as to demonstrate the accuracy of the analytical results
    • …
    corecore