181 research outputs found

    Impact of NOMA on Age of Information: A Grant-Free Transmission Perspective

    Full text link
    The aim of this paper is to characterize the impact of non-orthogonal multiple access (NOMA) on the age of information (AoI) of grant-free transmission. In particular, a low-complexity form of NOMA, termed NOMA-assisted random access, is applied to grant-free transmission in order to illustrate the two benefits of NOMA for AoI reduction, namely increasing channel access and reducing user collisions. Closed-form analytical expressions for the AoI achieved by NOMA assisted grant-free transmission are obtained, and asymptotic studies are carried out to demonstrate that the use of the simplest form of NOMA is already sufficient to reduce the AoI of orthogonal multiple access (OMA) by more than 40%. In addition, the developed analytical expressions are also shown to be useful for optimizing the users' transmission attempt probabilities, which are key parameters for grant-free transmission

    On the tradeoffs between network state knowledge and secrecy

    Get PDF
    In this paper, the impact of network-state knowledge on the feasibility of secrecy is studied in the context of non-colluding active eavesdropping. The main contribution is the investigation of several scenarios in which increasing the available knowledge at each of the network components leads to some paradoxical observations in terms of the average secrecy capacity and average information leakage. These observations are in the context of a broadcast channel similar to the time-division downlink of a single-cell cellular system. Here, providing more knowledge to the eavesdroppers makes them more conservative in their attacks, and thus, less harmful in terms of average information leakage. Similarly, providing more knowledge to the transmitter makes it more careful and less willing to transmit, which reduces the expected secrecy capacity. These findings are illustrated with a numerical analysis that shows the impact of most of the network parameters in the feasibility of secrecy. © 2013 NICT

    Joint Power Allocation and Beamforming for Energy-Efficient Two-Way Multi-Relay Communications

    Full text link
    © 2017 IEEE. This paper considers the joint design of user power allocation and relay beamforming in relaying communications, in which multiple pairs of single-antenna users exchange information with each other via multiple-antenna relays in two time slots. All users transmit their signals to the relays in the first time slot while the relays broadcast the beamformed signals to all users in the second time slot. The aim is to maximize the system's energy efficiency (EE) subject to quality-of-service (QoS) constraints in terms of exchange throughput requirements. The QoS constraints are nonconvex with many nonlinear cross-terms, so finding a feasible point is already computationally challenging. The sum throughput appears in the numerator while the total consumption power appears in the denominator of the EE objective function. The former is a nonconcave function and the latter is a nonconvex function, making fractional programming useless for EE optimization. Nevertheless, efficient iterations of low complexity to obtain its optimized solutions are developed. The performance of the multiple-user and multiple-relay networks under various scenarios is evaluated to show the merit of the proposed method

    Fundamentals of Physical Layer Anonymous Communications: Sender Detection and Anonymous Precoding

    Get PDF
    In the era of big data, anonymity is recognized as an important attribute in privacy-preserving communications. The existing anonymous authentication and routing designs are applied at higher layers of networks, ignoring the fact that physical layer (PHY) also contains privacy-critical information. In this paper, we introduce the concept of PHY anonymity, and reveal that the receiver can unmask the sender’s identity by only analyzing the PHY information, i.e., the signaling patterns and the characteristics of the channel. We investigate two scenarios, where the receiver has more antennas than the sender in the strong receiver case, and vice versa in the strong sender case. For each scenario, we first investigate sender detection strategies at the receiver, and then we develop anonymous precoding to address anonymity while guaranteeing high signal-to-interference-plus-noise-ratio (SINR) for communications. In particular, an interference suppression anonymous precoder is first proposed, assisted by a dedicated transmitter-side phase equalizer for removing phase ambiguity. Afterwards, a constructive interference anonymous precoder is investigated to utilize inter-antenna interference as a beneficial element without loss of the sender’s anonymity. Simulations demonstrate that the anonymous precoders are able to preserve the sender’s anonymity and simultaneously guarantee high SINR, opening a new dimension on PHY anonymous designs

    Federated Learning for 6G: Applications, Challenges, and Opportunities

    Get PDF
    Standard machine-learning approaches involve the centralization of training data in a data center, where centralized machine-learning algorithms can be applied for data analysis and inference. However, due to privacy restrictions and limited communication resources in wireless networks, it is often undesirable or impractical for the devices to transmit data to parameter sever. One approach to mitigate these problems is federated learning (FL), which enables the devices to train a common machine learning model without data sharing and transmission. This paper provides a comprehensive overview of FL applications for envisioned sixth generation (6G) wireless networks. In particular, the essential requirements for applying FL to wireless communications are first described. Then potential FL applications in wireless communications are detailed. The main problems and challenges associated with such applications are discussed. Finally, a comprehensive FL implementation for wireless communications is described

    Performance Optimization for Intelligent Reflecting Surface Assisted Multicast MIMO Networks

    Get PDF
    In this paper, the problem of maximizing the sum rate of all users in an intelligent reflecting surface (IRS)-assisted millimeter wave multicast multiple-input multiple-output communication system is studied. In the considered model, one IRS is deployed to assist the communication from a multi-antenna base station (BS) to the multi-antenna users that are clustered into several groups. Our goal is to maximize the sum rate of all users by jointly optimizing the transmit beamforming matrices of the BS, the receive beamforming matrices of the users, and the phase shifts of the IRS. To solve this non-convex problem, we first use a block diagonalization method to represent the beamforming matrices of the BS and the users by the phase shifts of the IRS. Then, substituting the expressions of the beamforming matrices of the BS and the users, the original sum-rate maximization problem can be transformed into a problem that only needs to optimize the phase shifts of the IRS. To solve the transformed problem, a manifold method is used. Simulation results show that the proposed scheme can achieve up to 13.3 % gain in terms of the sum rate of all users compared to the algorithm that optimizes the hybrid beamforming matrices of the BS and the users using our proposed scheme and randomly determines the phase shifts of the IRS
    • …
    corecore