Results 21-40 of 517.
Bookmark and Share    
Full Text
Peer Reviewed
See detailUAV Relay-Assisted Emergency Communications in IoT Networks: Resource Allocation and Trajectory Optimization
Tran Dinh, Hieu UL; Nguyen, van Dinh UL; Chatzinotas, Symeon UL et al

in IEEE Transactions on Wireless Communications (2021)

Unmanned aerial vehicle (UAV) communication hasemerged as a prominent technology for emergency communi-cations (e.g., natural disaster) in the Internet of Things (IoT)networks to enhance the ability of ... [more ▼]

Unmanned aerial vehicle (UAV) communication hasemerged as a prominent technology for emergency communi-cations (e.g., natural disaster) in the Internet of Things (IoT)networks to enhance the ability of disaster prediction, damageassessment, and rescue operations promptly. A UAV can bedeployed as a flying base station (BS) to collect data from time-constrained IoT devices and then transfer it to a ground gateway(GW). In general, the latency constraint at IoT devices and UAV’slimited storage capacity highly hinder practical applicationsof UAV-assisted IoT networks. In this paper, full-duplex (FD)radio is adopted at the UAV to overcome these challenges. Inaddition, half-duplex (HD) scheme for UAV-based relaying isalso considered to provide a comparative study between twomodes (viz., FD and HD). Herein, a device is considered tobe successfully served iff its data is collected by the UAV andconveyed to GW timely during flight time. In this context,we aim to maximize the number of served IoT devices byjointly optimizing bandwidth, power allocation, and the UAVtrajectory while satisfying each device’s requirement and theUAV’s limited storage capacity. The formulated optimizationproblem is troublesome to solve due to its non-convexity andcombinatorial nature. Towards appealing applications, we firstrelax binary variables into continuous ones and transform theoriginal problem into a more computationally tractable form.By leveraging inner approximation framework, we derive newlyapproximated functions for non-convex parts and then develop asimple yet efficient iterative algorithm for its solutions. Next,we attempt to maximize the total throughput subject to thenumber of served IoT devices. Finally, numerical results showthat the proposed algorithms significantly outperform benchmarkapproaches in terms of the number of served IoT devices andsystem throughput. [less ▲]

Detailed reference viewed: 53 (11 UL)
Full Text
Peer Reviewed
See detailIntelligent Reflecting Surface Enhanced Secure Transmission Against Both Jamming and Eavesdropping Attacks
Sun, Yifu; An, Kang; Luo, Junshan et al

in IEEE Transactions on Vehicular Technology (2021), 70(10, Oct. 2021), 11017-11022

Both the jammer and the eavesdropper pose severe threat to wireless communications due to the broadcast nature of wireless channels. In this paper, an intelligent reflecting surface (IRS) assisted secure ... [more ▼]

Both the jammer and the eavesdropper pose severe threat to wireless communications due to the broadcast nature of wireless channels. In this paper, an intelligent reflecting surface (IRS) assisted secure communication system is considered, where a base station (BS) wishes to reliably convey information to a user, in the presence of both a jammer and an eavesdropper whose channel state information (CSI) is not perfectly known. Specifically, we aim to maximize the system achievable rate by jointly designing the BS’s transmit beamforming and the IRS’s reflect beamforming with imperfect CSI, while limiting the information leakage to the potential eavesdropper. Due to the non-convexity and intractability of the original problem induced by the CSI uncertainty, we utilize the auxiliary variables and General Sign-Definiteness transformation to convert the original optimization problem into a tractable convex optimization problem, and then obtain the high-quality optimal solution by using the successive convex approximation and penalty convex concave procedure. Numerical simulations demonstrate the superiority of our proposed optimization algorithm compared with existing approaches, and also reveal the impact of key parameters on the achievable system performance. [less ▲]

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailMassive MIMO under Double Scattering Channels: Power Minimization and Congestion Controls
Van Chien, Trinh; Ngo, Hien Quoc; Chatzinotas, Symeon UL et al

in IEEE Transactions on Wireless Communications (2021)

This paper considers a massive MIMO system under the double scattering channels. We derive a closed-form expression of the uplink ergodic spectral efficiency (SE) by exploiting the maximum-ratio combining ... [more ▼]

This paper considers a massive MIMO system under the double scattering channels. We derive a closed-form expression of the uplink ergodic spectral efficiency (SE) by exploiting the maximum-ratio combining technique with imperfect channel state information. We then formulate and solve a total uplink data power optimization problem that aims at simultaneously satisfying the required SEs from all the users with limited power resources. We further propose algorithms to cope with the congestion issue appearing when at least one user is served by lower SE than requested. Numerical results illustrate the effectiveness of our proposed power optimization. More importantly, our proposed congestion-handling algorithms can guarantee the required SEs to many users under congestion, even when the SE requirement is high. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailRadio Resource Management Techniques for Multibeam Satellite Systems
Kisseleff, Steven UL; Lagunas, Eva UL; Abdu, Tedros Salih UL et al

in IEEE Communications Letters (2021), 25(8), 2448-2452

Next–generation of satellite communication (SatCom) networks are expected to support extremely high data rates for a seamless integration into future large satellite-terrestrial networks. In view of the ... [more ▼]

Next–generation of satellite communication (SatCom) networks are expected to support extremely high data rates for a seamless integration into future large satellite-terrestrial networks. In view of the coming spectral limitations, the main challenge is to reduce the cost (satellite launch and operation) per bit, which can be achieved by enhancing the spectral efficiencies. In addition, the capability to quickly and flexibly assign radio resources according to the traffic demand distribution has become a must for future multibeam broadband satellite systems. This article presents the radio resource management problems encountered in the design of future broadband SatComs and provides a comprehensive overview of the available techniques to address such challenges. Firstly, we focus on the demand matching formulation of the power and bandwidth assignment. Secondly, we present the scheduling design in practical multibeam satellite systems. Finally, a number of future challenges and the respective open research topics are described. [less ▲]

Detailed reference viewed: 217 (70 UL)
Full Text
Peer Reviewed
See detailSecure Transmission in Massive MIMO System with Specular Component-based Beamforming and Artificial Noise over Ricean Fading Channel
Qu, Aiyan; Zhang, Xianyu; An, Kang et al

in IEEE Wireless Communications Letters (2021), 10(11, Nov. 2021),

This paper investigates the secure transmission in a multi-user massive MIMO system over Ricean fading channel in the presence of a multi-antenna eavesdropper. In order to reduce the system complexity and ... [more ▼]

This paper investigates the secure transmission in a multi-user massive MIMO system over Ricean fading channel in the presence of a multi-antenna eavesdropper. In order to reduce the system complexity and the channel estimation overhead, a low-complexity beamforming (BF) scheme using only the specular component is presented. Moreover, the generation of artificial noise (AN) is employed at the base station (BS) for additional security enhancement. Specifically, a tractable closedform lower bound for the achievable ergodic secrecy rate is derived. Furthermore, the optimal power allocation factor is obtained based on the asymptotic analysis to maximize the achievable ergodic secrecy rate. The analytical results reveal that the ergodic secrecy rate improves with the increase of Ricean K- factor and converges to a specific constant when increasing the number of antennas. The performance of the proposed scheme is evaluated through comprehensive simulations. [less ▲]

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailGuest Editorial: Space Information Networks: Technological Challenges, Design Issues, and Solutions
Xue, Kaiping; De Cola, Tomaso; Wei, David S.L. et al

in IEEE Network (2021), 35(4), 16-18

It has been expected that the space information networks (SIN), as an extension of the terrestrial network, would provide high-speed, high-capacity, global continuous communication, and data transmission ... [more ▼]

It has been expected that the space information networks (SIN), as an extension of the terrestrial network, would provide high-speed, high-capacity, global continuous communication, and data transmission services anywhere for anyone at any time. With rapid advances in relevant technologies (e.g., satellite miniaturization technology, reusable rocket launch technology, and semiconductor technology), low-orbit satellites, drones, and airships can be integrated into the SIN to supply more comprehensive network connectivity. The standard development organizations including 3GPP, ITU, and ETSI already starts corresponding standardization activities to support nonterrestrial networks in SIN. It can be foreseen that SIN will be expanded to provide not only telephone services but also various kinds of Internet services, and it is thus able to serve many more users with different demands. [less ▲]

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailLEO Satellite Constellations for 5G and Beyond: How Will They Reshape Vertical Domains?
Liu, Shicong; Gao, Zhen; Wu, Yongpeng et al

in IEEE Communications Magazine (2021), 59(7), 30-36

The rapid development of communication technologies in the past decades has provided immense vertical opportunities for individuals and enterprises. However, conventional terrestrial cellular networks ... [more ▼]

The rapid development of communication technologies in the past decades has provided immense vertical opportunities for individuals and enterprises. However, conventional terrestrial cellular networks have unfortunately neglected the huge geographical digital divide, s ince high-bandwidth wireless coverage is concentrated in urban areas. To meet the goal of “connecting the unconnected,” integrating low Earth orbit (LEO) satellites with the terrestrial cellular networks has been widely considered as a promising solution. In this article, we first introduce the development roadmap of LEO sa tellite constellations (SatCons), including early attempts in LEO satellites with the emerging LEO constellations. Further, we discuss the unique opportunities of employing LEO SatCons for the delivery of integrating 5G networks. Specifically, we present their key performance indicators, which offer important guidelines for the design of associated enabling techniques, and then discuss the potential impact of integrating LEO SatCons with typical 5G use cases, where we engrave our vision of various vertical domains reshaped by LEO SatCons. Technical challenges are finally provided to specify future research directions. [less ▲]

Detailed reference viewed: 19 (3 UL)
Full Text
Peer Reviewed
See detailA Cubesat-ready Phase Synchronization Digital Payload for Coherent Distributed Remote Sensing Missions
Querol, Jorge UL; Merlano Duncan, Juan Carlos UL; Martinez Marrero, Liz UL et al

Poster (2021, July 15)

Distributed antenna arrays, fractionated payloads and cooperative platforms can provide unprecedented performance in the next generation of spaceborne communications and remote sensing systems. Remote ... [more ▼]

Distributed antenna arrays, fractionated payloads and cooperative platforms can provide unprecedented performance in the next generation of spaceborne communications and remote sensing systems. Remote phase synchronization of physically separated oscillators is the first step towards a coherent operation of distributed systems. This work shows the preliminary results of a TDD remote phase synchronization algorithm with a master-follower architecture. Herein, we describe the implementation and validation of the proposed algorithm. The implementation has been conducted in a Cubesat-ready software defined radio and validated at the end-to-end satellite communications testbed available at the University of Luxembourg. [less ▲]

Detailed reference viewed: 65 (16 UL)
Full Text
Peer Reviewed
See detailHybrid Beamforming, User Scheduling, and Resource Allocation for Integrated Terrestrial-Satellite Communication
Peng, Deyi; Bandi, Ashok; Li, Yun et al

in IEEE Transactions on Vehicular Technology (2021), 70(9), 8868-8882

In this paper, we investigate hybrid beamforming, user scheduling, and resource allocation optimization based on spectrum coexisting forward transmission in integrated terrestrial-satellite network (ITSN ... [more ▼]

In this paper, we investigate hybrid beamforming, user scheduling, and resource allocation optimization based on spectrum coexisting forward transmission in integrated terrestrial-satellite network (ITSN) with the purpose of improving system sum rate and energy efficiency. Considering the limitation of on-board beamforming, a hybrid analog-digital beamforming scheme is designed under the scenario of millimeter wave (mmWave) coexisting in the ITSN framework. Besides, in order to further mitigate intra-beam and inter-beam interference, we propose an adaptive user scheduling scheme, which first determines the cluster center based on adaptive threshold, and then selects users with less channel correlation into a scheduling cluster. Moreover, we model system sum rate maximization problem that incorporates maximum power constrains and minimum data rate requirements. Combined with the aforementioned hybrid beamforming and user scheduling strategy, we formulate the sum rate maximizing problem to a pure power allocation issue. In view of the non-convexity and high complexity, we propose a feasible optimization method based on the minimum mean square error (MMSE) criterion and logarithmic linearization to optimize the power allocation for each user terminal (UT). Simulation results show that our proposed joint beamforming and resource allocation optimization scheduling scheme can achieve an attractive gain in system sum rate and energy efficiency compared with conservative beamforming and allocations. [less ▲]

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailSecure Transmission in Cell-Free Massive MIMO With RF Impairments and Low-Resolution ADCs/DACs
Zhang, Xianyu; Liang, Tao; An, Kang et al

in IEEE Transactions on Vehicular Technology (2021), 70(9, Sept. 2021), 8937-8949

This paper considers the secure transmission in a cell-free massive MIMO system with imperfect radio frequency (RF) chains and low-resolution analog-to-digital converters (ADCs) and digital-to-analog ... [more ▼]

This paper considers the secure transmission in a cell-free massive MIMO system with imperfect radio frequency (RF) chains and low-resolution analog-to-digital converters (ADCs) and digital-to-analog converters (DACs) at both access points (APs) and legitimate users, where an active eavesdropper attempts to wiretap the confidential data. The Gaussian RF impairment model (GRFIM) and additive quantization noise model (AQNM) are used to evaluate the impacts of the RF impairments and low resolution ADCs/DACs, respectively. The analytical results of the linear minimum mean square error (MMSE) channel estimation show that there is nonzero floor on the estimation error with respect to the RF impairments, ADC/DAC precision and the pilot power of the eavesdropper which is different from the conventional case with perfect transceiver. Then, a tractable closed-form expression for the ergodic secrecy rate is obtained with respect to key system parameters, such as the antenna number per AP, the AP number, user number, quality factors of the ADC/DAC and the RF chain, pilot signal power of the eavesdropper, etc. Moreover, a compensation algorithm between the imperfect RF components and the inexpensive coarse ADCs/DACs is also presented. Finally, numerical results are provided to illustrate the efficiency of the achieved expressions and the devised algorithm, and show the effects of RF impairments and low resolution ADC/DAC on the secrecy performance. [less ▲]

Detailed reference viewed: 14 (1 UL)
Full Text
Peer Reviewed
See detailMulti-Antenna Data-Driven Eavesdropping Attacks and Symbol-Level Precoding Countermeasures
Mayouche, Abderrahmane UL; Alves Martins, Wallace UL; Tsinos, Christos UL et al

Poster (2021, June 21)

In this work, we consider secure communications in wireless multi-user (MU) multiple-input single-output (MISO) systems with channel coding in the presence of a multi-antenna eavesdropper (Eve), who is a ... [more ▼]

In this work, we consider secure communications in wireless multi-user (MU) multiple-input single-output (MISO) systems with channel coding in the presence of a multi-antenna eavesdropper (Eve), who is a legit user trying to eavesdrop other users. In this setting, we exploit machine learning (ML) tools to design soft and hard decoding schemes by using precoded pilot symbols as training data. The proposed ML frameworks allow an Eve to determine the transmitted message with high accuracy. We thereby show that MU-MISO systems are vulnerable to such eavesdropping attacks even when relatively secure transmission techniques are employed, such as symbol-level precoding (SLP). To counteract this attack, we propose two novel SLP-based schemes that increase the bit-error rate at Eve by impeding the learning process. We design these two security-enhanced schemes to meet different requirements regarding runtime, security, and power consumption. Simulation results validate both the ML-based eavesdropping attacks as well as the countermeasures, and show that the gain in security is achieved without affecting the decoding performance at the intended users. [less ▲]

Detailed reference viewed: 49 (5 UL)
Full Text
Peer Reviewed
See detailMassive MIMO under Double Scattering Channels: Power Minimization and Congestion Controls
Trinh, van Chien UL; Ngo, Quoc Hien; Chatzinotas, Symeon UL et al

in Massive MIMO under Double Scattering Channels: Power Minimization and Congestion Controls (2021, June 14)

This paper considers a massive MIMO system under the double scattering channels. We derive a closed-form expression of the uplink ergodic spectral efficiency (SE) by exploiting the maximum-ratio combining ... [more ▼]

This paper considers a massive MIMO system under the double scattering channels. We derive a closed-form expression of the uplink ergodic spectral efficiency (SE) by exploiting the maximum-ratio combining technique with imperfect channel state information. We then formulate and solve a total uplink data power optimization problem that aims at simultaneously satisfying the required SEs from all the users with limited power resources. We further propose algorithms to cope with the congestion issue appearing when at least one user is served by lower SE than requested. Numerical results illustrate the effectiveness of our proposed power optimization. More importantly, our proposed congestion-handling algorithms can guarantee the required SEs to many users under congestion, even when the SE requirement is high. [less ▲]

Detailed reference viewed: 62 (10 UL)
Full Text
Peer Reviewed
See detailSecure Vehicular Communications Through Reconfigurable Intelligent Surfaces
Ai, Yun; De Figueiredo, Felipe A.P; Kong, Long et al

in IEEE Transactions on Vehicular Technology (2021), 70(7), 7272-7276

Reconfigurable intelligent surfaces (RIS) is considered as a revolutionary technique to improve the wireless system performance by reconfiguring the radio wave propagation environment artificially ... [more ▼]

Reconfigurable intelligent surfaces (RIS) is considered as a revolutionary technique to improve the wireless system performance by reconfiguring the radio wave propagation environment artificially. Motivated by the potential of RIS in vehicular networks, we analyze the secrecy outage performance of RIS-aided vehicular communications in this paper. More specifically, two vehicular communication scenarios are considered, i.e., a vehicular-to-vehicular (V2V) communication where the RIS acts as a relay and a vehicular-to-infrastructure (V2I) scenario where the RIS functions as the receiver. In both scenarios, a passive eavesdropper is present attempting to retrieve the transmitted information. Closed-form expressions for the secrecy outage probability (SOP) are derived and verified. The results demonstrate the potential of improving secrecy with the aid of RIS under both V2V and V2I communications. [less ▲]

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailExploiting Jamming Attacks for Energy Harvesting in Massive MIMO Systems
Al-Hraishawi, Hayder UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

Scientific Conference (2021, June)

In this paper, the performance of an RF energy harvesting scheme for multi-user massive multiple-input multiple-output (MIMO) is investigated in the presence of multiple active jammers. The key idea is to ... [more ▼]

In this paper, the performance of an RF energy harvesting scheme for multi-user massive multiple-input multiple-output (MIMO) is investigated in the presence of multiple active jammers. The key idea is to exploit the jamming transmissions as an energy source to be harvested at the legitimate users. To this end, the achievable uplink sum rate expressions are derived in closed-form for two different antenna configurations. An optimal time-switching policy is also proposed to ensure user-fairness in terms of both harvested energy and achievable rate. Besides, the essential trade-off between the harvested energy and achievable sum rate are quantified in closed-form. Our analysis reveals that the massive MIMO systems can make use of RF signals of the jamming attacks for boosting the amount of harvested energy at the served users. Numerical results illustrate the effectiveness of the derived closed-form expressions over Monte-Carlo simulations. [less ▲]

Detailed reference viewed: 35 (2 UL)
Full Text
Peer Reviewed
See detailBroadband Non-Geostationary Satellite Communication Systems: Research Challenges and Key Opportunities
Al-Hraishawi, Hayder UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

Scientific Conference (2021, June)

Besides conventional geostationary (GSO) satellite broadband communication services, non-geostationary (NGSO) satellites are envisioned to support various new communication use cases from countless ... [more ▼]

Besides conventional geostationary (GSO) satellite broadband communication services, non-geostationary (NGSO) satellites are envisioned to support various new communication use cases from countless industries. These new scenarios bring many unprecedented challenges that will be discussed in this paper alongside with several potential future research opportunities. NGSO systems are known for various advantages, including their important features of low cost, lower propagation delay, smaller size, and lower losses in comparison to GSO satellites. However, there are still many deployment challenges to be tackled to ensure seamless integration not only with GSO systems but also with terrestrial networks. In this paper, we discuss several key challenges including satellite constellation and architecture designs, coexistence with GSO systems in terms of spectrum access and regulatory issues, resource management algorithms, and NGSO networking requirements. Additionally, the latest progress in provisioning secure communication via NGSO systems is discussed. Finally, this paper identifies multiple important open issues and research directions to inspire further studies towards the next generation of satellite networks. [less ▲]

Detailed reference viewed: 39 (6 UL)
Full Text
Peer Reviewed
See detailEnergy Efficiency Optimization Technique for SWIPT-enabled Multi-Group Multicasting Systems with Heterogeneous Users
Gautam, Sumit UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

Poster (2021, June)

We consider a multi-group (MG) multicasting (MC) system wherein a multi-antenna transmitter serves heterogeneous users capable of either information decoding (ID) or energy harvesting (EH), or both. In ... [more ▼]

We consider a multi-group (MG) multicasting (MC) system wherein a multi-antenna transmitter serves heterogeneous users capable of either information decoding (ID) or energy harvesting (EH), or both. In this context, we investigate a precoder design framework to explicitly serve the ID and EH users categorized within certain MC and EH groups. Specifically, the ID users are categorized within multiple MC groups while the EH users are a part of single (last) group. We formulate a problem to optimize the energy efficiency in the considered scenario under a quality-of-service (QoS) constraint. An algorithm based on Dinkelback method, slack-variable replacement, and second-order conic programming (SOCP)/semi-definite relaxation (SDR) is proposed to obtain a suitable solution for the above-mentioned fractional-objective dependent non-convex problem. Simulation results illustrate the benefits of proposed algorithm under several operating conditions and parameter values, while drawing a comparison between the two proposed methods. [less ▲]

Detailed reference viewed: 69 (9 UL)
Full Text
Peer Reviewed
See detailChannel Modeling and Analysis of Reconfigurable Intelligent Surfaces Assisted Vehicular Networks
Kong, Long UL; He, Jiguang; Ai, Yun et al

Scientific Conference (2021, June)

Detailed reference viewed: 80 (8 UL)
Full Text
Peer Reviewed
See detailA design strategy for phase synchronization in Precoding-enabled DVB-S2X user terminals
Martinez Marrero, Liz UL; Merlano Duncan, Juan Carlos UL; Querol, Jorge UL et al

Scientific Conference (2021, June)

This paper address the design of a phase tracking block for the DVB-S2X user terminals in a satellite precoding system. The spectral characteristics of the phase noise introduced by the oscillator, the ... [more ▼]

This paper address the design of a phase tracking block for the DVB-S2X user terminals in a satellite precoding system. The spectral characteristics of the phase noise introduced by the oscillator, the channel, and the thermal noise at the receiver are taken into account. Using the expected phase noise mask, the optimal parameters for a second-order PLL intended to track channel variations from the pilots are calculated. To validate the results a Simulink model was implemented considering the characteristics of the hardware prototype. The performance of the design was evaluated in terms of the accuracy and stability for the frame structure of superframe Format 2, as described in Annex E of DVB-S2X. [less ▲]

Detailed reference viewed: 107 (8 UL)
Full Text
Peer Reviewed
See detailSecure Energy Efficiency Maximization in Cognitive Satellite-Terrestrial Networks
Lu, Weixin; An, Kang; Liang, Tao et al

in IEEE Systems Journal (2021), 15(2), 2382-2385

This article investigates the secure energy efficiency (EE) optimization problem in a cognitive satellite-terrestrial network with a capable eavesdropper. The objective is to maximize the secure EE for ... [more ▼]

This article investigates the secure energy efficiency (EE) optimization problem in a cognitive satellite-terrestrial network with a capable eavesdropper. The objective is to maximize the secure EE for the primary satellite network while satisfying the allowable signal-to-interference-plus-noise ratio requirements of the secondary and primary users along within the transmit power limitation of both satellite and the terrestrial base station. Owing to the nonconvexity and intractability of the original optimization problem, a beamforming scheme and associated transformation algorithms are proposed by jointly applying the Taylor approximation, fraction programming, and alternating search to cope with the implementation difficulty. The key is to convert the original optimization problem into a simple convex framework and obtain the optimal solution step by step. Finally, numerical simulations are given to verify the feasibility and practicability of the proposed optimization algorithms. [less ▲]

Detailed reference viewed: 47 (6 UL)
Full Text
Peer Reviewed
See detailOn the Secrecy-Reliability Performance Trade-off for NOMA-enabled 5G mmWave Networks
Solanki, Sourabh UL; Gurjar, Devendra S.; Sharma, Pankaj K. et al

in 2021 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2021) (2021)

The evolution of 5G wireless networks poses significant research challenges such as securing the user data, maintaining certain latency and reliability requirements etc. However, it can be challenging to ... [more ▼]

The evolution of 5G wireless networks poses significant research challenges such as securing the user data, maintaining certain latency and reliability requirements etc. However, it can be challenging to simultaneously meet these performance requisites, which may lead to resort to a trade-off among different metrics. This paper investigates the secrecy-reliability performance trade-off (SRPT) for non-orthogonal multiple access (NOMA)-based millimeter wave (mmWave) networks. Herein, we consider two end-users, namely primary and secondary, which are served by an mmWave base station using downlink NOMA. Besides, a passive eavesdropper lying in the vicinity of these end-users attempts to intercept their legitimate message signals. For this set-up, we derive the closed-form expressions of the outage probability (OP) of a targeted end-user and intercept probability (IP) of the eavesdropper to analyze the SRPT of the system. We further propose a low-complexity average channel state information (CSI)-based power allocation strategy to improve the reliability of a targeted user while maintaining its information secrecy. Moreover, we obtain the condition under which NOMA guarantees superior secrecy performance than that of orthogonal multiple access (OMA) scheme. We corroborate our theoretical analysis via simulation results presented in terms of IP and OP. [less ▲]

Detailed reference viewed: 76 (16 UL)