350 research outputs found
Secrecy outage analysis for Alamouti space-time block coded non-orthogonal multiple access
This letter proposed a novel transmission technique for physical layer security by applying the Alamouti Space-Time Block Coded Non-orthogonal Multiple Access (STBC-NOMA) scheme. The secure outage performance under both perfect successive interference cancellation (pSIC) and imperfect successive interference cancellation (ipSIC) are investigated. In particular, novel exact and asymptotic expressions of secrecy outage probability are derived. Numerical and theoretical results are presented to corroborate the derived expressions and to demonstrate the superiority of STBC-NOMA and its ability to enhance the secrecy outage performance compared to conventional NOMA
Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks
Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be
promising in the fifth generation (5G) wireless networks. H-CRANs enable users
to enjoy diverse services with high energy efficiency, high spectral
efficiency, and low-cost operation, which are achieved by using cloud computing
and virtualization techniques. However, H-CRANs face many technical challenges
due to massive user connectivity, increasingly severe spectrum scarcity and
energy-constrained devices. These challenges may significantly decrease the
quality of service of users if not properly tackled. Non-orthogonal multiple
access (NOMA) schemes exploit non-orthogonal resources to provide services for
multiple users and are receiving increasing attention for their potential of
improving spectral and energy efficiency in 5G networks. In this article a
framework for energy-efficient NOMA H-CRANs is presented. The enabling
technologies for NOMA H-CRANs are surveyed. Challenges to implement these
technologies and open issues are discussed. This article also presents the
performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure
Relaying in the Internet of Things (IoT): A Survey
The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions
Exploiting Secrecy Performance of Uplink NOMA in Cellular Networks
Funding Information: This work was supported in part by the Air Force Office of Scientific Research under Award FA9550-20-1-0090, and in part by the National Science Foundation under Grant CNS-2034218.Peer reviewedPublisher PD
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
IRS-assisted UAV Communications: A Comprehensive Review
Intelligent reflecting surface (IRS) can smartly adjust the wavefronts in
terms of phase, frequency, amplitude and polarization via passive reflections
and without any need of radio frequency (RF) chains. It is envisaged as an
emerging technology which can change wireless communication to improve both
energy and spectrum efficiencies with low energy consumption and low cost. It
can intelligently configure the wireless channels through a massive number of
cost effective passive reflecting elements to improve the system performance.
Similarly, unmanned aerial vehicle (UAV) communication has gained a viable
attention due to flexible deployment, high mobility and ease of integration
with several technologies. However, UAV communication is prone to security
issues and obstructions in real-time applications. Recently, it is foreseen
that UAV and IRS both can integrate together to attain unparalleled
capabilities in difficult scenarios. Both technologies can ensure improved
performance through proactively altering the wireless propagation using smart
signal reflections and maneuver control in three dimensional (3D) space. IRS
can be integrated in both aerial and terrene environments to reap the benefits
of smart reflections. This study briefly discusses UAV communication, IRS and
focuses on IRS-assisted UAC communications. It surveys the existing literature
on this emerging research topic and highlights several promising technologies
which can be implemented in IRS-assisted UAV communication. This study also
presents several application scenarios and open research challenges. This study
goes one step further to elaborate research opportunities to design and
optimize wireless systems with low energy footprint and at low cost. Finally,
we shed some light on future research aspects for IRS-assisted UAV
communication
- …