521 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Computationally Intelligent Techniques for Resource Management in MmWave Small Cell Networks

    Get PDF
    Ultra densification in HetNets and the advent of mmWave technology for 5G networks have led researchers to redesign the existing resource management techniques. A salient feature of this activity is to accentuate the importance of CI resource allocation schemes offering less complexity and overhead. This article overviews the existing literature on resource management in mmWave-based Het- Nets with a special emphasis on CI techniques and further proposes frameworks that ensure quality of service requirements for all network entities. More specifically, HetNets with mmWave-based small cells pose different challenges compared to an all-microwave- based system. Similarly, various modes of small cell access policies and operations of base stations in dual mode, that is, operating both mmWave and microwave links simultaneously, offer unique challenges to resource allocation. Furthermore, the use of multi-slope path loss models becomes inevitable for analysis due to irregular cell patterns and blocking characteristics of mmWave communications. This article amalgamates the unique challenges posed because of the aforementioned recent developments and proposes various CI-based techniques, including game theory and optimization routines, to perform efficient resource management

    Recent Advances in Acquiring Channel State Information in Cellular MIMO Systems

    Get PDF
    In cellular multi-user multiple input multiple output (MU-MIMO) systems the quality of the available channel state information (CSI) has a large impact on the system performance. Specifically, reliable CSI at the transmitter is required to determine the appropriate modulation and coding scheme, transmit power and the precoder vector, while CSI at the receiver is needed to decode the received data symbols. Therefore, cellular MUMIMO systems employ predefined pilot sequences and configure associated time, frequency, code and power resources to facilitate the acquisition of high quality CSI for data transmission and reception. Although the trade-off between the resources used user data transmission has been known for long, the near-optimal configuration of the vailable system resources for pilot and data transmission is a topic of current research efforts. Indeed, since the fifth generation of cellular systems utilizes heterogeneous networks in which base stations are equipped with a large number of transmit and receive antennas, the appropriate configuration of pilot-data resources becomes a critical design aspect. In this article, we review recent advances in system design approaches that are designed for the acquisition of CSI and discuss some of the recent results that help to dimension the pilot and data resources specifically in cellular MU-MIMO systems

    Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks

    Get PDF
    Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be promising in the fifth generation (5G) wireless networks. H-CRANs enable users to enjoy diverse services with high energy efficiency, high spectral efficiency, and low-cost operation, which are achieved by using cloud computing and virtualization techniques. However, H-CRANs face many technical challenges due to massive user connectivity, increasingly severe spectrum scarcity and energy-constrained devices. These challenges may significantly decrease the quality of service of users if not properly tackled. Non-orthogonal multiple access (NOMA) schemes exploit non-orthogonal resources to provide services for multiple users and are receiving increasing attention for their potential of improving spectral and energy efficiency in 5G networks. In this article a framework for energy-efficient NOMA H-CRANs is presented. The enabling technologies for NOMA H-CRANs are surveyed. Challenges to implement these technologies and open issues are discussed. This article also presents the performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure

    Optimal association of mobile users to multi-access edge computing resources

    Get PDF
    Multi-access edge computing (MEC) plays a key role in fifth-generation (5G) networks in bringing cloud functionalities at the edge of the radio access network, in close proximity to mobile users. In this paper we focus on mobile-edge computation offloading, a way to transfer heavy demanding, and latency-critical applications from mobile handsets to close-located MEC servers, in order to reduce latency and/or energy consumption. Our goal is to provide an optimal strategy to associate mobile users to access points (AP) and MEC hosts, while contextually optimizing the allocation of radio and computational resources to each user, with the objective of minimizing the overall user transmit power under latency constraints incorporating both communication and computation times. The overall problem is a mixed-binary problem. To overcome its inherent computational complexity, we propose two alternative strategies: i) a method based on successive convex approximation (SCA) techniques, proven to converge to local optimal solutions; ii) an approach hinging on matching theory, based on formulating the assignment problem as a matching game
    corecore