1,730 research outputs found

    Bio-Inspired Resource Allocation for Relay-Aided Device-to-Device Communications

    Full text link
    The Device-to-Device (D2D) communication principle is a key enabler of direct localized communication between mobile nodes and is expected to propel a plethora of novel multimedia services. However, even though it offers a wide set of capabilities mainly due to the proximity and resource reuse gains, interference must be carefully controlled to maximize the achievable rate for coexisting cellular and D2D users. The scope of this work is to provide an interference-aware real-time resource allocation (RA) framework for relay-aided D2D communications that underlay cellular networks. The main objective is to maximize the overall network throughput by guaranteeing a minimum rate threshold for cellular and D2D links. To this direction, genetic algorithms (GAs) are proven to be powerful and versatile methodologies that account for not only enhanced performance but also reduced computational complexity in emerging wireless networks. Numerical investigations highlight the performance gains compared to baseline RA methods and especially in highly dense scenarios which will be the case in future 5G networks.Comment: 6 pages, 6 figure

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
    • …
    corecore