thesis

Efficient resource allocation for 5G hybrid wireless networks

Abstract

This thesis explores three directions of energy-efficiency(EE) and spectral efficiency(SE) under 5G wireless networks. Firstly, we study the optimization of power control for the small (two-user) interference channel in which the terminals are time-switched between the signal-processing and energy-harvesting phases. Both energy harvesting and signal-processing processes are during the downlink. The objective is to maximize the sum-rate, subject to the minimum data and harvested energy constraints at the receivers, assuming a fixed time-switching coefficient. The key contribution is using a geometric approach that analyzes the feasible region governed by the constraints, which gives rise to the optimal power control solution. Another topic focuses on the performance analysis of two user association schemes for wireless power transfer (WPT) in heterogeneous networks (HetNets) massive multiple-input multiple-output (MIMO) antennas, downlink for the WPT in the first phase and uplink for wireless information transfer (WIT) in the second phase. The two user association schemes considered in the analysis are the Downlink received signal power (DRSP) based approach for maximizing the harvested energy; and the uplink received signal power (URSP) based approach for minimizing the uplink path loss. In the downlink, we adopt a low-complexity approach for massive MIMO power transfer to recharge users. Then we derive the average uplink achievable rate with the harvested energy. The last topic analyses a large-scale mmWave ad hoc network in the randomly located eavesdroppers area, where eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This chapter explores the potential of physical layer security in mmWave ad hoc networks. Specifically, we characterize the impact of mmWave channel characteristics, random blockages, and antenna gains on the secrecy performance. For the special case of the uniform linear array (ULA), a tractable approach is proposed to evaluate the average achievable secrecy rate

    Similar works