111 research outputs found

    Optimal Power Allocation Scheme for Non-Orthogonal Multiple Access with α-Fairness

    Get PDF
    This paper investigates the optimal power allocation scheme for sum throughput maximization of non-orthogonal multiple access (NOMA) system with α-fairness. In contrast to the existing fairness NOMA models, α-fairness can only utilize a single scalar to achieve different user fairness levels. Two different channel state information at the transmitter (CSIT) assumptions are considered, namely, statistical and perfect CSIT. For statistical CSIT, fixed target data rates are predefined, and the power allocation problem is solved for sum throughput maximization with α-fairness, through characterizing several properties of the optimal power allocation solution. For perfect CSIT, the optimal power allocation is determined to maximize the instantaneous sum rate with α-fairness, where user rates are adapted according to the instantaneous channel state information (CSI). In particular, a simple alternate optimization algorithm is proposed, which is demonstrated to yield the optimal solution. Numerical results reveal that, at the same fairness level, NOMA significantly outperforms the conventional orthogonal multiple access for both the scenarios with statistical and perfect CSIT

    Beamforming Techniques for Non-Orthogonal Multiple Access in 5G Cellular Networks

    Full text link
    In this paper, we develop various beamforming techniques for downlink transmission for multiple-input single-output (MISO) non-orthogonal multiple access (NOMA) systems. First, a beamforming approach with perfect channel state information (CSI) is investigated to provide the required quality of service (QoS) for all users. Taylor series approximation and semidefinite relaxation (SDR) techniques are employed to reformulate the original non-convex power minimization problem to a tractable one. Further, a fairness-based beamforming approach is proposed through a max-min formulation to maintain fairness between users. Next, we consider a robust scheme by incorporating channel uncertainties, where the transmit power is minimized while satisfying the outage probability requirement at each user. Through exploiting the SDR approach, the original non-convex problem is reformulated in a linear matrix inequality (LMI) form to obtain the optimal solution. Numerical results demonstrate that the robust scheme can achieve better performance compared to the non-robust scheme in terms of the rate satisfaction ratio. Further, simulation results confirm that NOMA consumes a little over half transmit power needed by OMA for the same data rate requirements. Hence, NOMA has the potential to significantly improve the system performance in terms of transmit power consumption in future 5G networks and beyond.Comment: accepted to publish in IEEE Transactions on Vehicular Technolog

    Structural health monitoring of wind turbine blades: acoustic source localization using wireless sensor networks

    Get PDF
    Structural health monitoring (SHM) is important for reducing the maintenance and operation cost of safety-critical components and systems in offshore wind turbines. This paper proposes an in situ wireless SHM system based on an acoustic emission (AE) technique. By using this technique a number of challenges are introduced due to high sampling rate requirements, limitations in the communication bandwidth, memory space, and power resources. To overcome these challenges, this paper focused on two elements: (1) the use of an in situ wireless SHM technique in conjunction with the utilization of low sampling rates; (2) localization of acoustic sources which could emulate impact damage or audible cracks caused by different objects, such as tools, bird strikes, or strong hail, all of which represent abrupt AE events and could affect the structural health of a monitored wind turbine blade. The localization process is performed using features extracted from aliased AE signals based on a developed constraint localization model. To validate the performance of these elements, the proposed system was tested by testing the localization of the emulated AE sources acquired in the field

    Limited Feedback Scheme for Device to Device Communications in 5G cellular networks with Reliability and Cellular Secrecy Outage Constraints

    Get PDF
    In this paper, we propose a device to device (D2D) communication scenario underlaying a cellular network where both D2D and cellular users (CUs) are discrete power-rate systems with limited feedback from the receivers. It is assumed that there exists an adversary which wants to eavesdrop on the information transmission from the base station (BS) to CUs. Since D2D communication shares the same spectrum with cellular network, cross interference must be considered. However, when secrecy capacity is considered, the interference caused by D2D communication can help to improve the secrecy communications by confusing the eavesdroppers. Since both systems share the same spectrum, cross interference must be considered. We formulate the proposed resource allocation into an optimization problem whose objective is to maximize the average transmission rate of D2D pair in the presence of the cellular communications under average transmission power constraint. For the cellular network, we require a minimum average achievable secrecy rate in the absence of D2D communication as well as a maximum secrecy outage probability in the presence of D2D communication which should be satisfied. Due to high complexity convex optimization methods, to solve the proposed optimization problem, we apply Particle Swarm Optimization (PSO) which is an evolutionary approach. Moreover, we model and study the error in the feedback channel and the imperfectness of channel distribution information (CDI) using parametric and nonparametric methods. Finally, the impact of different system parameters on the performance of the proposed scheme is investigated through simulations. The performance of the proposed scheme is evaluated using numerical results for different scenarios.Comment: IEEE Transactions on Vehicular Technology, 201

    Secrecy rate optimization for secure multicast communications

    Get PDF
    Recently, physical layer security has been recognized as a new design paradigm to provide security in wireless networks. In contrast to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance security of wireless communications. This paper studies optimization frameworks for a multicasting network in which a transmitter broadcasts the same information to a group of legitimate users in the presence of multiple eavesdroppers. In particular, power minimization and secrecy rate maximization problems are investigated for a multicasting secrecy network. First, the power minimization problem is solved for different numbers of legitimate users and eavesdroppers. Next, the secrecy rate maximization problem is investigated with the help of private jammers to improve the achievable secrecy rates through a game theoretic approach. These jammers charge the transmitter for their jamming services based on the amount of interference caused to the eavesdroppers. For a fixed interference price scenario, a closed-form solution for the optimal interference requirement to maximize the revenue of the transmitter is derived. This rate maximization problem for a nonfixed interference price scenario is formulated as a Stackelberg game in which the jammers and transmitter are the leaders and follower, respectively. For the proposed game, a Stackelberg equilibrium is derived to maximize the revenues of both the transmitter and the private jammers. To support the derived theoretical results, simulation results are provided with different numbers of legitimate users and eavesdroppers. In addition, these results show that physical layer security based jamming schemes could be incorporated in emerging and future wireless networks to enhance the quality of secure communications

    Secure communications with cooperative jamming : optimal power allocation and secrecy outage analysis

    Get PDF
    This paper studies the secrecy rate maximization problem of a secure wireless communication system in the presence of multiple eavesdroppers. The security of the communication link is enhanced through cooperative jamming with the help of multiple jammers. First, a feasibility condition is derived to achieve a positive secrecy rate at the destination. Then, we solve the original secrecy rate maximization problem, which is not convex in terms of power allocation at the jammers. To circumvent this nonconvexity, the achievable secrecy rate is approximated for a given power allocation at the jammers, and the approximated problem is formulated into a geometric programming one. Based on this approximation, an iterative algorithm has been developed to obtain the optimal power allocation at the jammers. Next, we provide a bisection approach, based on 1-D search, to validate the optimality of the proposed algorithm. In addition, by assuming Rayleigh fading, the secrecy outage probability (SOP) of the proposed cooperative jamming scheme is analyzed. More specifically, a single-integral form expression for the SOP is derived for the most general case, as well as a closed-form expression for the special case of two cooperative jammers and one eavesdropper. Simulation results have been provided to validate the convergence and the optimality of the proposed algorithm, as well as the theoretical derivations of the presented SOP analysis
    • …
    corecore