54 research outputs found

    NOMA-Based UAV-Aided Networks for Emergency Communications

    Get PDF
    High spectrum efficiency (SE) requirement and massive connections are the main challenges for the fifth generation (5G) and beyond 5G (B5G) wireless networks, especially for the case when Internet of Things (IoT) devices are located in a disaster area. Non-orthogonal multiple access (NOMA)-based unmanned aerial vehicle (UAV)-aided network is emerging as a promising technique to overcome the above challenges. In this paper, an emergency communications framework of NOMA-based UAV-aided networks is established, where the disasters scenarios can be divided into three broad categories that have named emergency areas, wide areas and dense areas. First, a UAV-enabled uplink NOMA system is established to gather information from IoT devices in emergency areas. Then, a joint UAV deployment and resource allocation scheme for a multi-UAV enabled NOMA system is developed to extend the UAV coverage for IoT devices in wide areas. Furthermore, a UAV equipped with an antenna array has been considered to provide wireless service for multiple devices that are densely distributed in disaster areas. Simulation results are provided to validate the effectiveness of the above three schemes. Finally, potential research directions and challenges are also highlighted and discussed

    Energy Minimization in D2D-Assisted Cache-Enabled Internet of Things: A Deep Reinforcement Learning Approach

    Get PDF
    Mobile edge caching (MEC) and device-to-device (D2D) communications are two potential technologies to resolve traffic overload problems in the Internet of Things. Previous works usually investigate them separately with MEC for traffic offloading and D2D for information transmission. In this article, a joint framework consisting of MEC and cache-enabled D2D communications is proposed to minimize the energy cost of systematic traffic transmission, where file popularity and user preference are the critical criteria for small base stations (SBSs) and user devices, respectively. Under this framework, we propose a novel caching strategy, where the Markov decision process is applied to model the requesting behaviors. A novel scheme based on reinforcement learning (RL) is proposed to reveal the popularity of files as well as users' preference. In particular, a Q-learning algorithm and a deep Q-network algorithm are, respectively, applied to user devices and the SBS due to different complexities of status. To save the energy cost of systematic traffic transmission, users acquire partial traffic through D2D communications based on the cached contents and user distribution. Taking the memory limits, D2D available files, and status changing into consideration, the proposed RL algorithm enables user devices and the SBS to prefetch the optimal files while learning, which can reduce the energy cost significantly. Simulation results demonstrate the superior energy saving performance of the proposed RL-based algorithm over other existing methods under various conditions

    Physical layer security jamming: Theoretical limits and practical designs in wireless networks

    Get PDF
    Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. In this approach, jamming plays a key role by generating noise signals to confuse the potential eavesdroppers, and significantly improves quality and reliability of secure communications between legitimate terminals. This article presents theoretical limits and practical designs of jamming approaches for physical layer security. In particular, the theoretical limits explore the achievable secrecy rates of user cooperation based jamming whilst the centralized, and game theoretic based precoding techniques are reviewed for practical implementations. In addition, the emerging wireless energy harvesting techniques are exploited to harvest the required energy to transmit jamming signals. Future directions of these approaches, and the associated research challenges are also briefly outlined

    A new design paradigm for MIMO cognitive radio with primary user rate constraint

    No full text
    10.1109/LCOMM.2012.030912.120319IEEE Communications Letters165706-709ICLE

    Optimal subcarrier and bit allocation techniques for cognitive radio networks using integer linear programming

    No full text
    We propose an adaptive radio resource allocation algorithm for cognitive radio underlay networks. The proposed algorithm optimally allocates power and the available subcarriers in an OFDMA environment while ensuring interference leaked to the primary users is below a specific value. We formulate the radio resource allocation problem for cognitive radio network into integer linear programming framework. This algorithm yields an optimal solution for the proposed resource allocation problem. Simulation results have been provided to validate the performance of the algorithm

    A new design paradigm for MIMO cognitive radio with primary user rate constraint

    No full text
    corecore