350 research outputs found

    Secrecy outage analysis for Alamouti space-time block coded non-orthogonal multiple access

    Get PDF
    This letter proposed a novel transmission technique for physical layer security by applying the Alamouti Space-Time Block Coded Non-orthogonal Multiple Access (STBC-NOMA) scheme. The secure outage performance under both perfect successive interference cancellation (pSIC) and imperfect successive interference cancellation (ipSIC) are investigated. In particular, novel exact and asymptotic expressions of secrecy outage probability are derived. Numerical and theoretical results are presented to corroborate the derived expressions and to demonstrate the superiority of STBC-NOMA and its ability to enhance the secrecy outage performance compared to conventional NOMA

    Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks

    Get PDF
    Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be promising in the fifth generation (5G) wireless networks. H-CRANs enable users to enjoy diverse services with high energy efficiency, high spectral efficiency, and low-cost operation, which are achieved by using cloud computing and virtualization techniques. However, H-CRANs face many technical challenges due to massive user connectivity, increasingly severe spectrum scarcity and energy-constrained devices. These challenges may significantly decrease the quality of service of users if not properly tackled. Non-orthogonal multiple access (NOMA) schemes exploit non-orthogonal resources to provide services for multiple users and are receiving increasing attention for their potential of improving spectral and energy efficiency in 5G networks. In this article a framework for energy-efficient NOMA H-CRANs is presented. The enabling technologies for NOMA H-CRANs are surveyed. Challenges to implement these technologies and open issues are discussed. This article also presents the performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure

    Relaying in the Internet of Things (IoT): A Survey

    Get PDF
    The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions

    Exploiting Secrecy Performance of Uplink NOMA in Cellular Networks

    Get PDF
    Funding Information: This work was supported in part by the Air Force Office of Scientific Research under Award FA9550-20-1-0090, and in part by the National Science Foundation under Grant CNS-2034218.Peer reviewedPublisher PD

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    IRS-assisted UAV Communications: A Comprehensive Review

    Full text link
    Intelligent reflecting surface (IRS) can smartly adjust the wavefronts in terms of phase, frequency, amplitude and polarization via passive reflections and without any need of radio frequency (RF) chains. It is envisaged as an emerging technology which can change wireless communication to improve both energy and spectrum efficiencies with low energy consumption and low cost. It can intelligently configure the wireless channels through a massive number of cost effective passive reflecting elements to improve the system performance. Similarly, unmanned aerial vehicle (UAV) communication has gained a viable attention due to flexible deployment, high mobility and ease of integration with several technologies. However, UAV communication is prone to security issues and obstructions in real-time applications. Recently, it is foreseen that UAV and IRS both can integrate together to attain unparalleled capabilities in difficult scenarios. Both technologies can ensure improved performance through proactively altering the wireless propagation using smart signal reflections and maneuver control in three dimensional (3D) space. IRS can be integrated in both aerial and terrene environments to reap the benefits of smart reflections. This study briefly discusses UAV communication, IRS and focuses on IRS-assisted UAC communications. It surveys the existing literature on this emerging research topic and highlights several promising technologies which can be implemented in IRS-assisted UAV communication. This study also presents several application scenarios and open research challenges. This study goes one step further to elaborate research opportunities to design and optimize wireless systems with low energy footprint and at low cost. Finally, we shed some light on future research aspects for IRS-assisted UAV communication
    corecore