References of "An, Kang"
     in
Bookmark and Share    
Full Text
See detailNon-Geostationary Satellite Communications Systems
Lagunas, Eva UL; Chatzinotas, Symeon UL; An, Kang et al

Book published by The Institution of Engineering and Technology (IET) (2022)

Detailed reference viewed: 42 (5 UL)
Full Text
Peer Reviewed
See detailRIS-Assisted Robust Hybrid Beamforming AgainstSimultaneous Jamming and Eavesdropping Attacks
Sun, Yifu; An, Kang; Zhu, Yonggang et al

in IEEE Transactions on Wireless Communications (2022), 21(11), 9212-9231

Wireless communications are increasingly vulnera-ble to simultaneous jamming and eavesdropping attacks due tothe inherent broadcast nature of wireless channels. With thisfocus, due to the potential of ... [more ▼]

Wireless communications are increasingly vulnera-ble to simultaneous jamming and eavesdropping attacks due tothe inherent broadcast nature of wireless channels. With thisfocus, due to the potential of reconfigurable intelligent surface(RIS) in substantially saving power consumption and boostinginformation security, this paper is the first work to investigate theeffect of the RIS-assisted wireless transmitter in improving boththe spectrum efficiency and the security of multi-user cellularnetwork. Specifically, with the imperfect angular channel stateinformation (CSI), we aim to address the worst-case sum ratemaximization problem by jointly designing the receive decoder atthe users, both the digital precoder and the artificial noise (AN)at the base station (BS), and the analog precoder at the RIS, whilemeeting the minimum achievable rate constraint, the maximumwiretap rate requirement, and the maximum power constraint.To address the non-convexity of the formulated problem, we firstpropose an alternative optimization (AO) method to obtain anefficient solution. In particular, a heuristic scheme is proposedto convert the imperfect angular CSI into a robust one andfacilitate the developing a closed-form solution to the receivedecoder. Then, after reformulating the original problem into atractable one by exploiting the majorization-minimization (MM)method, the digital precoder and AN can be addressed by thequadratically constrained quadratic programming (QCQP), andthe RIS-aided analog precoder is solved by the proposed pricemechanism-based Riemannian manifold optimization (RMO).To further reduce the computational complexity of the pro-posed AO method and gain more insights, we develop a low-complexity monotonic optimization algorithm combined with thedual method (MO-dual) to identify the closed-form solution.Numerical simulations using realistic RIS and communicationmodels demonstrate the superiority and validity of our proposedschemes over the existing benchmark schemes. [less ▲]

Detailed reference viewed: 22 (2 UL)
Full Text
Peer Reviewed
See detailOutage Constrained Robust BeamformingOptimization for Multiuser IRS-AssistedAnti-Jamming Communications With Incomplete Information
Sun, Yifu; An, Kang; Luo, Junshan et al

in IEEE Internet of Things Journal (2022), 9(15), 13298-13314

Malicious jamming attacks have been regarded asa serious threat to Internet of Things (IoT) networks, which cansignificantly degrade the quality of service (QoS) of users. Thispaper utilizes an ... [more ▼]

Malicious jamming attacks have been regarded asa serious threat to Internet of Things (IoT) networks, which cansignificantly degrade the quality of service (QoS) of users. Thispaper utilizes an intelligent reflecting surface (IRS) to enhanceanti-jamming performance due to its capability in reconfiguringthe wireless propagation environment via dynamicly adjustingeach IRS reflecting elements. To enhance the communicationperformance against jamming attacks, a robust beamformingoptimization problem is formulated in a multiuser IRS-assistedanti-jamming communications scenario with or without imperfectjammer’s channel state information (CSI). In addition, we furtherconsider the fact that the jammer’s transmit beamforming cannot be known at BS. Specifically, with no knowledge of jammerstransmit beamforming, the total transmit power minimizationproblems are formulated subject to the outage probability re-quirements of legitimate users with the jammer’s statistical CSI,and signal-to-interference-plus-noise ratio (SINR) requirementsof legitimate users without the jammer’s CSI, respectively.By applying the Decomposition-based large deviation inequal-ity (DBLDI), Bernstein-type inequality (BTI), Cauchy-Schwarzinequality, and penalty non-smooth optimization method, weefficiently solve the initial intractable and non-convex problems.Numerical simulations demonstrate that the proposed anti-jamming approaches achieve superior anti-jamming performanceand lower power-consumption compared to the non-IRS schemeand reveal the impact of key parameters on the achievable systemperformance. [less ▲]

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailSLNR-based Secure Energy Efficient Beamforming in Multibeam Satellite Systems
Lin, Zhi; An, Kang; Niu, Hehao et al

in IEEE Transactions on Aerospace and Electronic Systems (2022)

Motivated by the fact that both security and energy efficiency are the fundamental requirements and design targets of future satellite communications, this letter investigates secure energy efficient ... [more ▼]

Motivated by the fact that both security and energy efficiency are the fundamental requirements and design targets of future satellite communications, this letter investigates secure energy efficient beamforming in multibeam satellite systems, where the satellite user in each beam is surrounded by an eavesdropper attempting to intercept the confidential information. To simul- taneously improve the transmission security and reduce power consumption, our design objective is to maximize the system secrecy energy efficiency (SEE) under the constraint of total transmit power budget. Different from the existing schemes with high complexity, we propose an alternating optimization scheme to address the SEE problem by decomposing the original nonconvex problem into subproblems. Specifically, we first utilize the signal- to-leakage-plus-noise ratio (SLNR) metric to obtain closed-form normalized beamforming weight vectors, while the successive convex approximation (SCA) method is used to efficiently solve the power allocation subproblem. Then, an iterative algorithm is proposed to obtain the suboptimal solutions. Finally, simulation results are provided to verify the superiority of the proposed scheme compared to the benchmark schemes [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailRobust Design for RIS-Assisted Anti-Jamming Communications withImperfect Angular Information: A Game-Theoretic Perspective
Sun, Yifu; Zhu, Yonggang; An, Kang et al

in IEEE Transactions on Vehicular Technology (2022), 71(7), 7967-7972

This paper utilizes a reconfigurable intelligent sur-face (RIS) to enhance the anti-jamming performance of wirelesscommunications, due to its powerful capability of constructingsmart and reconfigurable ... [more ▼]

This paper utilizes a reconfigurable intelligent sur-face (RIS) to enhance the anti-jamming performance of wirelesscommunications, due to its powerful capability of constructingsmart and reconfigurable radio environment. In order to establishthe practical interactions between the base station (BS) and thejammer, a Bayesian Stackelberg game is formulated, where theBS is the leader and the jammer acts as the follower. Specifically,with the help of a RIS-assisted transmitter, the BS attemptsto reliably convey information to users with maximum utilities,whereas the smart jammer tries to interfere the signal receptionof users with desired energy efficiency (EE) threshold. Since theBS and the jammer are not cooperative parties, the practicalassumption that neither side can obtain the other’s strategies isadopted in the proposed game, and the angular information basedimperfect channel state information (CSI) is also considered.After tackling the practical assumption by using Cauchy-Schwarzinequality and the imperfect angular information by using thediscretization method, the closed-form solution of both sidescan be obtained via the duality optimization theory, whichconstitutes the unique Stackelberg equilibrium (SE). Numericalresults demonstrate the superiority and validity of our proposedrobust schemes over the existing approaches. [less ▲]

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detail1 Energy-Efficient Hybrid Beamforming for Multi-Layer RIS-Assisted Secure Integrated Terrestrial-Aerial Network
Sun, Yifu; An, Kang; Zhu, Yonggang et al

in IEEE Transactions on Communications (2022), 70(6), 4189-4210

The integration of aerial platforms to provide ubiq- uitous coverage and connectivity for densely deployed terrestrial networks is expected to be a reality in emerging sixth-generation networks. Energy ... [more ▼]

The integration of aerial platforms to provide ubiq- uitous coverage and connectivity for densely deployed terrestrial networks is expected to be a reality in emerging sixth-generation networks. Energy-effificient design and secure transmission are two crucial issues for integrated terrestrial-aerial networks. With this focus, due to the potential of RIS in substantially saving power consumption and boosting the security of private information by enabling a smart radio environment, this paper investigates the energy-efficient hybrid beamforming for multi- layer reconfigurable intelligent surface (RIS)-assisted secure in- tegrated terrestrial-aerial network for defending against simul- taneous jamming and eavesdropping attacks. Specifically, with the available of angular information based imperfect channel state information (CSI), we propose a framework for the joint optimization of user’s received precoder, terrestrial BS’s and HAP’s digital precoder, and multi-layer RIS analog precoder to maximize the system energy efficiency (EE) performance. For the design of received precoder, a heuristic beamforming scheme is proposed to convert the worst-case problem into a min-max one such that a closed-form solution is derived. For the design of digital precoder, we propose an iterative sequential convex approximation approach via capitalizing the auxiliary variables and first-order Taylor series expansion. Finally, a monotonic vertex-update algorithm with penalty convex concave procedure is proposed to obtain analog precoder with low computational complexity. Numerical results show the superiority and effective- ness of proposed optimization framework and architecture [less ▲]

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailSatellite-assisted UAV Trajectory Control in HostileJamming Environments
Han, Chen; Liu, Aijun; An, Kang et al

in IEEE Transactions on Vehicular Technology (2022), 71(4), 3760-3775

Satellite and unmanned aerial vehicle (UAV) net-works have been introduced as enhanced approach to providedynamic control, massive connections and global coverage forfuture wireless communication systems ... [more ▼]

Satellite and unmanned aerial vehicle (UAV) net-works have been introduced as enhanced approach to providedynamic control, massive connections and global coverage forfuture wireless communication systems. This paper considersa coordinated satellite-UAV communication system, where theUAV performs the environmental reconnaissance task with theassistance of satellite in a hostile jamming environment. To fulfillthis task, the UAV needs to realize autonomous trajectory controland upload the collected data to the satellite. With the aid ofthe uploading data, the satellite builds the environment situationmap integrating the beam quality, jamming status, and trafficdistribution. Accordingly, we propose a closed-loop anti-jammingdynamic trajectory optimization approach, which is divided intothree stages. Firstly, a coarse trajectory planning is made accord-ing to the limited prior information and preset points. Secondly,the flight control between two adjacent preset points is formulatedas a Markov decision process, and reinforcement learning (RL)based automatic flying control algorithms are proposed to explorethe unknown hostile environment and realize autonomous andprecise trajectory control. Thirdly, based on the collected dataduring the UAV’s flight, the satellite utilizes an environmentsituation estimating algorithm to build an environment situationmap, which is used to reselect the preset points for the first stageand provide better initialization for the RL process in the secondstage. Simulation results verify the validity and superiority of theproposed approach. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailRefracting RIS-Aided Hybrid Satellite-Terrestrial Relay Networks: Joint Beamforming Design and Optimization
Lin, Zhi; Niu, Hehao; An, Kang et al

in IEEE Transactions on Aerospace and Electronic Systems (2022)

Reconfigurable intelligent surface (RIS) has been viewed as a promising solution in constructing reconfigurable radio environment of the propagation channel and boosting the received signal power by ... [more ▼]

Reconfigurable intelligent surface (RIS) has been viewed as a promising solution in constructing reconfigurable radio environment of the propagation channel and boosting the received signal power by smartly coordinating the passive elements’ phase shifts at the RIS. Inspired by this emerging technique, this article focuses on joint beamforming design and optimization for RIS-aided hybrid satellite-terrestrial relay networks, where the links from the satellite and base station (BS) to multiple users are blocked. Specifically, a refracting RIS cooperates with a BS, where the latter operates as a half-duplex decode-and-forward relay, in order to strengthen the desired satellite signals at the blocked users. Considering the limited onboard power resource, the design objective is to minimize the total transmit power of both the satellite and BS while guaranteeing the rate requirements of users. Since the optimized beamforming weight vectors at the satellite and BS, and phase shifters at the RIS are coupled, leading to a mathematically intractable optimization problem, we propose an alternating optimization scheme by utilizing singular value decomposition and uplink–downlink duality to optimize beamforming weight vectors, and using Taylor expansion and penalty function methods to optimize phase shifters iteratively. Finally, simulation results are provided to verify the superiority of the proposed scheme compared to the benchmark schemes [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailStochastic Geometry-Based Analysis of Cache-Enabled Hybrid Satellite-Aerial-Terrestrial Networks With Non-Orthogonal Multiple Access
Zhang, Xiaokai; Zhang, Bangning; An, Kang et al

in IEEE Transactions on Wireless Communications (2022), 21(2), 1272-1287

Due to the emergence of non-terrestrial platformswith extensive coverage, flexible deployment, and reconfigurablecharacteristics, the hybrid satellite-aerial-terrestrial networks(HSATNs) can accommodate a ... [more ▼]

Due to the emergence of non-terrestrial platformswith extensive coverage, flexible deployment, and reconfigurablecharacteristics, the hybrid satellite-aerial-terrestrial networks(HSATNs) can accommodate a great variety of wireless accessservices in different applications. To effectively reduce the trans-mission latency and facilitate the frequent update of files withimproved spectrum efficiency, we investigate the performanceof cache-enabled HSATN, where the user retrieves the requiredcontent files from the cache-enabled aerial relay or the satellitewith the non-orthogonal multiple access (NOMA) scheme. If therequired content files of the user are cached in the aerial relay,the cache-enabled relay would serve directly. Otherwise, the userwould retrieve the content file from the satellite system, where thesatellite system seeks opportunities for proactive content pushingto the relay during the user content delivery phase. Specifically,taking into account the uncertainty of the number and locationof aerial relays, along with the channel fading of terrestrialusers, the outage probability and hit probability of the considerednetwork are, respectively, derived based on stochastic geometry.Numerical results unveil the effectiveness of the cache-enabledHSATN with the NOMA scheme and proclaim the influence ofkey factors on the system performance. The realistic, tractable,and expandable framework, as well as associated methodology,provide both useful guidance and a solid foundation for evolvednetworks with advanced configurations in the performance ofcache-enabled HSATN. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailIntelligent Reflecting Surface Enhanced Secure Transmission Against Both Jamming and Eavesdropping Attacks
Sun, Yifu; An, Kang; Luo, Junshan et al

in IEEE Transactions on Vehicular Technology (2021), 70(10, Oct. 2021), 11017-11022

Both the jammer and the eavesdropper pose severe threat to wireless communications due to the broadcast nature of wireless channels. In this paper, an intelligent reflecting surface (IRS) assisted secure ... [more ▼]

Both the jammer and the eavesdropper pose severe threat to wireless communications due to the broadcast nature of wireless channels. In this paper, an intelligent reflecting surface (IRS) assisted secure communication system is considered, where a base station (BS) wishes to reliably convey information to a user, in the presence of both a jammer and an eavesdropper whose channel state information (CSI) is not perfectly known. Specifically, we aim to maximize the system achievable rate by jointly designing the BS’s transmit beamforming and the IRS’s reflect beamforming with imperfect CSI, while limiting the information leakage to the potential eavesdropper. Due to the non-convexity and intractability of the original problem induced by the CSI uncertainty, we utilize the auxiliary variables and General Sign-Definiteness transformation to convert the original optimization problem into a tractable convex optimization problem, and then obtain the high-quality optimal solution by using the successive convex approximation and penalty convex concave procedure. Numerical simulations demonstrate the superiority of our proposed optimization algorithm compared with existing approaches, and also reveal the impact of key parameters on the achievable system performance. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailSecure Transmission in Massive MIMO System with Specular Component-based Beamforming and Artificial Noise over Ricean Fading Channel
Qu, Aiyan; Zhang, Xianyu; An, Kang et al

in IEEE Wireless Communications Letters (2021), 10(11, Nov. 2021),

This paper investigates the secure transmission in a multi-user massive MIMO system over Ricean fading channel in the presence of a multi-antenna eavesdropper. In order to reduce the system complexity and ... [more ▼]

This paper investigates the secure transmission in a multi-user massive MIMO system over Ricean fading channel in the presence of a multi-antenna eavesdropper. In order to reduce the system complexity and the channel estimation overhead, a low-complexity beamforming (BF) scheme using only the specular component is presented. Moreover, the generation of artificial noise (AN) is employed at the base station (BS) for additional security enhancement. Specifically, a tractable closedform lower bound for the achievable ergodic secrecy rate is derived. Furthermore, the optimal power allocation factor is obtained based on the asymptotic analysis to maximize the achievable ergodic secrecy rate. The analytical results reveal that the ergodic secrecy rate improves with the increase of Ricean K- factor and converges to a specific constant when increasing the number of antennas. The performance of the proposed scheme is evaluated through comprehensive simulations. [less ▲]

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailSecure Transmission in Cell-Free Massive MIMO With RF Impairments and Low-Resolution ADCs/DACs
Zhang, Xianyu; Liang, Tao; An, Kang et al

in IEEE Transactions on Vehicular Technology (2021), 70(9, Sept. 2021), 8937-8949

This paper considers the secure transmission in a cell-free massive MIMO system with imperfect radio frequency (RF) chains and low-resolution analog-to-digital converters (ADCs) and digital-to-analog ... [more ▼]

This paper considers the secure transmission in a cell-free massive MIMO system with imperfect radio frequency (RF) chains and low-resolution analog-to-digital converters (ADCs) and digital-to-analog converters (DACs) at both access points (APs) and legitimate users, where an active eavesdropper attempts to wiretap the confidential data. The Gaussian RF impairment model (GRFIM) and additive quantization noise model (AQNM) are used to evaluate the impacts of the RF impairments and low resolution ADCs/DACs, respectively. The analytical results of the linear minimum mean square error (MMSE) channel estimation show that there is nonzero floor on the estimation error with respect to the RF impairments, ADC/DAC precision and the pilot power of the eavesdropper which is different from the conventional case with perfect transceiver. Then, a tractable closed-form expression for the ergodic secrecy rate is obtained with respect to key system parameters, such as the antenna number per AP, the AP number, user number, quality factors of the ADC/DAC and the RF chain, pilot signal power of the eavesdropper, etc. Moreover, a compensation algorithm between the imperfect RF components and the inexpensive coarse ADCs/DACs is also presented. Finally, numerical results are provided to illustrate the efficiency of the achieved expressions and the devised algorithm, and show the effects of RF impairments and low resolution ADC/DAC on the secrecy performance. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailSecure Energy Efficiency Maximization in Cognitive Satellite-Terrestrial Networks
Lu, Weixin; An, Kang; Liang, Tao et al

in IEEE Systems Journal (2021), 15(2), 2382-2385

This article investigates the secure energy efficiency (EE) optimization problem in a cognitive satellite-terrestrial network with a capable eavesdropper. The objective is to maximize the secure EE for ... [more ▼]

This article investigates the secure energy efficiency (EE) optimization problem in a cognitive satellite-terrestrial network with a capable eavesdropper. The objective is to maximize the secure EE for the primary satellite network while satisfying the allowable signal-to-interference-plus-noise ratio requirements of the secondary and primary users along within the transmit power limitation of both satellite and the terrestrial base station. Owing to the nonconvexity and intractability of the original optimization problem, a beamforming scheme and associated transformation algorithms are proposed by jointly applying the Taylor approximation, fraction programming, and alternating search to cope with the implementation difficulty. The key is to convert the original optimization problem into a simple convex framework and obtain the optimal solution step by step. Finally, numerical simulations are given to verify the feasibility and practicability of the proposed optimization algorithms. [less ▲]

Detailed reference viewed: 71 (7 UL)
Full Text
Peer Reviewed
See detailOn the Secrecy Performance of NOMA-Based Integrated Satellite Multiple-Terrestrial Relay Networks With Hardware Impairments
Guo, Kefeng; An, Kang; Zhou, Feng et al

in IEEE Transactions on Vehicular Technology (2021), 70

Integrated satellite terrestrial networks and non-orthogonal multiple access (NOMA) have been confirmed to be promising and effective approaches to achieve substantial performance gains for future ... [more ▼]

Integrated satellite terrestrial networks and non-orthogonal multiple access (NOMA) have been confirmed to be promising and effective approaches to achieve substantial performance gains for future wireless paradigms. This paper studies the effect of hardware impairments (HIs) on the secrecy performance of NOMA-based integrated satellite multiple-terrestrial relay networks (ISMTRNs). Particularly, we consider two important wiretapping cases: Case I, colluding case: all eavesdroppers cooperatively overhear the information; and Case II, non-colluding case: one eavesdropper with the best wiretapping quality is chosen to overhear the main channel information. Specially, the closed-form expressions for the secrecy outage probability (SOP) of the considered NOMA-based ISMTRNs in the presence of the above two eavesdropping cases and partial relay selection scheme are obtained. To obtain further insights in high signal-to-noise ratios (SNRs) regime, the asymptotic analysis of SOP with two considered cases are also derived, which give efficient means to evaluate the benefit of NOMA scheme and the impacts of HIs on the SOP. Moreover, we obtain Monte Carlo (MC) simulations for the secrecy energy efficiency (SEE). [less ▲]

Detailed reference viewed: 50 (4 UL)
Full Text
Peer Reviewed
See detailAuction-based Multiple Channel Cooperative Spectrum Sharing in Hybrid Satellite-Terrestrial IoT Networks
Zhang, Xiaokai; Guo, Daoxing; An, Kang et al

in IEEE Internet of Things Journal (2021), 8(8), 7009-7023

In this paper, we investigate the multiple-channel cooperative spectrum sharing in hybrid satellite-terrestrial internet of things (IoT) networks with auction mechanism, which is designed to reduce the ... [more ▼]

In this paper, we investigate the multiple-channel cooperative spectrum sharing in hybrid satellite-terrestrial internet of things (IoT) networks with auction mechanism, which is designed to reduce the operational expenditure of the satellitebased IoT (S-IoT) network while alleviating the spectrum scarcity issues of terrestrial-based IoT (T-IoT) network. The cluster heads of selected T-IoT networks assist the primary satellite users transmission through cooperative relaying techniques in exchange for spectrum access. We propose an auction-based optimization problem to maximize the sum transmission rate of all primary S-IoT receivers with the appropriate secondary network selection and corresponding radio resource allocation profile by the distributed implementation, while meeting the minimum transmission rate of secondary receivers of each T-IoT network. Specifically, the one-shot VCG auction is introduced to obtain the maximum social welfare, where the winner determination problem is transformed into an assignment problem and solved by the Hungarian algorithm. To further reduce the primary satellite network decision complexity, the sequential Vickrey auction is implemented by sequential fashion until all channels are auctioned. Due to incentive compatibility with those two auction mechanisms, the secondary T-IoT cluster yields the true bids of each channel, where both the non-orthogonal multiple access (NOMA) and time division multiple access (TDMA) schemes are implemented in cooperative communication. Finally, simulation results validate the effectiveness and fairness of the proposed auction-based approach as well as the superiority of the NOMA scheme in secondary relays selection. Moreover, the influence of key factors on the performance of the proposed scheme is analyzed in detail. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailAuction-based Multi-Channel Cooperative Spectrum Sharing in Hybrid Satellite-Terrestrial IoT Networks
Zhang, Xiaokai; Guo, Daoxing; An, Kang et al

in IEEE Internet of Things Journal (2020)

In this paper, we investigate the multi-channel cooperative spectrum sharing in hybrid satellite-terrestrial internet of things (IoT) networks with the auction mechanism, which is designed to reduce the ... [more ▼]

In this paper, we investigate the multi-channel cooperative spectrum sharing in hybrid satellite-terrestrial internet of things (IoT) networks with the auction mechanism, which is designed to reduce the operational expenditure of the satellitebased IoT (S-IoT) network while alleviating the spectrum scarcity issues of terrestrial-based IoT (T-IoT) network. The cluster heads of selected T-IoT networks assist the primary satellite users transmission through cooperative relaying techniques in exchange for spectrum access. We propose an auction-based optimization problem to maximize the sum transmission rate of all primary S-IoT receivers with the appropriate secondary network selection and corresponding radio resource allocation profile by the distributed implementation while meeting the minimum transmission rate of secondary receivers of each TIoT network. Specifically, the one-shot Vickrey-Clarke-Groves (VCG) auction is introduced to obtain the maximum social welfare, where the winner determination problem is transformed into an assignment problem and solved by the Hungarian algorithm. To further reduce the primary satellite network decision complexity, the sequential Vickrey auction is implemented by sequential fashion until all channels are auctioned. Due to incentive compatibility with those two auction mechanisms, the secondary T-IoT cluster yields the true bids of each channel, where both the non-orthogonal multiple access (NOMA) and time division multiple access (TDMA) schemes are implemented in cooperative communication. Finally, simulation results validate the effectiveness and fairness of the proposed auction-based approach as well as the superiority of the NOMA scheme in secondary relays selection. Moreover, the influence of key factors on the performance of the proposed scheme is analyzed in detail. [less ▲]

Detailed reference viewed: 47 (5 UL)
Full Text
Peer Reviewed
See detailErgodic Capapcity of NOMA-Based Satellite Networks with Randomly Deployed Users
Yan, Xiaojuan; Xiao, Hailin; An, Kang et al

in IEEE Systems Journal (2020), 14(3), 3343-3350

In this letter, we investigate the ergodic capacity of an uplink satellite network using a power-domain nonorthogonal multiple access (NOMA for simplicity) to serve users simultaneously in the ... [more ▼]

In this letter, we investigate the ergodic capacity of an uplink satellite network using a power-domain nonorthogonal multiple access (NOMA for simplicity) to serve users simultaneously in the consideration of random deployment of satellite users. Taking into account the deployed information of served users, we derive expression for the achievable ergodic capacity of the considered networks, where an entire link budget involving propagation loss, channel statistical prosperities, and location information is considered. Moreover, expression for ergodic capacity with OMA scheme is also derived to facilitate the performance comparison. Numerical simulation results are provided to attest the validity of theoretical results and show the vital effect of key parameters, such as the deployed information and link quality on the considered networks. [less ▲]

Detailed reference viewed: 41 (5 UL)
Full Text
Peer Reviewed
See detailDelay Constrained Resource Allocation for NOMA Enabled Satellite Internet of Things with Deep Reinforcement Learning
Yan, Xiaojuan; An, Kang; Zhang, Qianfeng et al

in IEEE Internet of Things Journal (2020)

With the ever increasing requirement of transferring data from/to smart users within a wide area, satellite internet of things (S-IoT) networks has emerged as a promising paradigm to provide cost ... [more ▼]

With the ever increasing requirement of transferring data from/to smart users within a wide area, satellite internet of things (S-IoT) networks has emerged as a promising paradigm to provide cost-effective solution for remote and disaster areas. Taking into account the diverse link qualities and delay qualityof- service (QoS) requirements of S-IoT devices, we introduce a power domain non-orthogonal multiple access (NOMA) scheme in the downlink S-IoT networks to enhance resource utilization efficiency and employ the concept of effective capacity to show delay-QoS requirements of S-IoT traffics. Firstly, resource allocation among NOMA users is formulated with the aim of maximizing sum effective capacity of the S-IoT while meeting the minimum capacity constraint of each user. Due to the intractability and non-convexity of the initial optimization problem, especially in the case of large-scale user-pair in NOMA enabled S-IoT. This paper employs a deep reinforcement learning (DRL) algorithm for dynamic resource allocation. Specifically, channel conditions and/or delay-QoS requirements of NOMA users are carefully selected as state according to exact closed-form expressions as well as low-SNR and high-SNR approximations, a deep Q network is first adopted to yet reward and output the optimum power allocation coefficients for all users, and then learn to adjust the allocation policy by updating the weights of neural networks using gained experiences. Simulation results are provided to demonstrate that with a proper discount factor, reward design, and training mechanism, the proposed DRL based power allocation scheme can output optimal/near-optimal action in each time slot, and thus, provide superior performance than that achieved with a fixed power allocation strategy and orthogonal multiple access (OMA) scheme. [less ▲]

Detailed reference viewed: 91 (9 UL)
Full Text
Peer Reviewed
See detailThe Application of Power-Domain Non-Orthogonal Multiple Access in Satellite Communication Networks
Yan, Xiaojuan; An, Kang; Liang, Tao et al

in IEEE Access (2019), 7

Satellite communication networks are expected to be indispensable as part of an integrated complement for the upcoming 5G networks since they can provide the most comprehensive coverage and reliable ... [more ▼]

Satellite communication networks are expected to be indispensable as part of an integrated complement for the upcoming 5G networks since they can provide the most comprehensive coverage and reliable connection for areas where are economically unviable and/or difficult to deploy terrestrial infrastructures. Meanwhile, the power-domain non-orthogonal multiple access (NOMA), which can serve multiple users simultaneously within the same time/frequency block, has been viewed as another promising strategy used in the 5G network to provide high spectral efficiency and resource utilization. In this paper, we introduce a general overview of the application of the NOMA to various satellite architectures for the benefits of meeting the availability, coverage, and efficiency requirements targeted by the 5G. The fundamental and ubiquitous features of satellite link budget are first reviewed. Then, the advantage and benefit of introducing the NOMA scheme in various satellite architectures, such as conventional downlink/uplink satellite networks, cognitive satellite terrestrial networks, and cooperative satellite networks with satellite/terrestrial relays, are provided, along with the motivation and research methodology for each scenario. Finally, this paper reviews the potential directions for future research. [less ▲]

Detailed reference viewed: 70 (0 UL)
Full Text
Peer Reviewed
See detailOn the Performance of the Uplink Satellite Multiterrestrial Relay Networks With Hardware Impairments and Interference
Guo, Kefeng; An, Kang; Zhang et al

in IEEE Systems Journal (2019), 13(3), 2297-2308

In this paper, we consider an uplink satellite multiterrestrial relay network, which employs a single-antenna user to communicate with a satellite via multiple decode-and-forward (DF) terrestrial relays ... [more ▼]

In this paper, we consider an uplink satellite multiterrestrial relay network, which employs a single-antenna user to communicate with a satellite via multiple decode-and-forward (DF) terrestrial relays. Due to the spectrum sharing policy, terrestrial relays are interfered by cochannel interference (CCI). For inevitable radio frequency (RF) front-end imperfections, the interconnected nodes of the whole network are always impaired by inherent hardware impairments (HIs). Specifically, in order to improve the overall system performance, a partial relay selection scheme is used to enhance the system performance by improving the spatial diversity. On this foundation, we have derived the closed-form expressions for the outage probability (OP) and throughput of the considered system, where both the satellite and terrestrial channels are under independent nonidentical distributions. To get better insights at high signal-to-noise-ratios (SNRs), the asymptotic behaviors for the system performance are also derived. From the asymptotic results, the impacts of CCI and the HIs on the system performance are quantitatively analyzed. Especially, the OP and throughput will have bounds when the system is under HIs. Monte Carlo (MC) simulation results corroborate the theoretical analysis and illustrate the joint effects of CCI and HIs on the considered system. [less ▲]

Detailed reference viewed: 46 (0 UL)