• ### Edge Caching in Dense Heterogeneous Cellular Networks with Massive MIMO Aided Self-backhaul(1709.00957)

July 10, 2018 cs.IT, math.IT, cs.NI
This paper focuses on edge caching in dense heterogeneous cellular networks (HetNets), in which small base stations (SBSs) with limited cache size store the popular contents, and massive multiple-input multiple-output (MIMO) aided macro base stations provide wireless self-backhaul when SBSs require the non-cached contents. Our aim is to address the effects of cell load and hit probability on the successful content delivery (SCD), and present the minimum required base station density for avoiding the access overload in an arbitrary small cell and backhaul overload in an arbitrary macrocell. The massive MIMO backhaul achievable rate without downlink channel estimation is derived to calculate the backhaul time, and the latency is also evaluated in such networks. The analytical results confirm that hit probability needs to be appropriately selected, in order to achieve SCD. The interplay between cache size and SCD is explicitly quantified. It is theoretically demonstrated that when non-cached contents are requested, the average delay of the non-cached content delivery could be comparable to the cached content delivery with the help of massive MIMO aided self-backhaul, if the average access rate of cached content delivery is lower than that of self-backhauled content delivery. Simulation results are presented to validate our analysis.
• ### Random Access Analysis for Massive IoT Networks under A New Spatio-Temporal Model: A Stochastic Geometry Approach(1704.01988)

July 4, 2018 cs.IT, math.IT
Massive Internet of Things (mIoT) has provided an auspicious opportunity to build powerful and ubiquitous connections that faces a plethora of new challenges, where cellular networks are potential solutions due to their high scalability, reliability, and efficiency. The Random Access CHannel (RACH) procedure is the first step of connection establishment between IoT devices and Base Stations (BSs) in the cellular-based mIoT network, where modelling the interactions between static properties of physical layer network and dynamic properties of queue evolving in each IoT device are challenging. To tackle this, we provide a novel traffic-aware spatio-temporal model to analyze RACH in cellular-based mIoT networks, where the physical layer network is modelled and analyzed based on stochastic geometry in the spatial domain, and the queue evolution is analyzed based on probability theory in the time domain. For performance evaluation, we derive the exact expressions for the preamble transmission success probabilities of a randomly chosen IoT device with different RACH schemes in each time slot, which offer insights into effectiveness of each RACH scheme. Our derived analytical results are verified by the realistic simulations capturing the evolution of packets in each IoT device. This mathematical model and analytical framework can be applied to evaluate the performance of other types of RACH schemes in the cellular-based networks by simply integrating its preamble transmission principle.
• ### Power-and Rate-Adaptation Improves the Effective Capacity of C-RAN for Nakagami-$m$ Fading Channels(1704.01924)

June 13, 2018 cs.IT, math.IT
We propose a power-and rate-adaptation scheme for cloud radio access networks (C-RANs), where each radio remote head (RRH) is connected to the baseband unit (BBU) pool through optical links. The RRHs jointly support the users by efficiently exploiting the enhanced spatial degrees of freedom. Our proposed scheme aims for maximizing the effective capacity (EC) of the user subject to both per-RRH average-and peak-power constraints, where the EC is defined as the maximum arrival rate that can be supported by the C-RAN under the statistical delay requirement. We first transform the EC maximization problem into an equivalent convex optimization problem. By using the Lagrange dual decomposition method and solving the Karush-Kuhn-Tucker (KKT) equations, the optimal transmission power of each RRH can be obtained in closed-form. Furthermore, an online tracking method is provided for approximating the average power of each RRH for the sake of updating the Lagrange dual variables. For the special case of two RRHs, the expression of the average power of each RRH can be calculated in explicit form. Hence, the Lagrange dual variables can be computed in advance in this special case. Furthermore, we derive the power allocation for two important extreme cases: 1) no delay constraint; 2) extremely stringent delay-requirements. Our simulation results show that the proposed scheme significantly outperforms the conventional algorithm without considering the delay requirements. Furthermore, when appropriately tuning the value of the delay exponent, our proposed algorithm is capable of guaranteeing a delay outage probability below $10^{-9}$ when the maximum tolerable delay is 1 ms. This is suitable for the future ultra-reliable low latency communications (URLLC).
• ### Stochastic Geometry Modeling of Cellular V2X Communication on Shared Uplink Channels(1804.08409)

April 12, 2018 cs.NI
To overcome the limitations of Dedicated Short Range Communications (DSRC) with short range, non-supportability of high density networks, unreliable broadcast services, signal congestion and connectivity disruptions, Vehicle-to-anything (V2X) communication networks, standardized in 3rd Generation Partnership Project (3GPP) Release 14, have been recently introduced to cover broader vehicular communication scenarios including vehicle-to-vehicle (V2V), vehicle-to-pedestrian (V2P) and vehicle-to-infrastructure/network (V2I/N). Motivated by the stringent connection reliability and coverage requirements in V2X , this paper presents the first comprehensive and tractable analytical framework for the uplink performance of cellular V2X networks, where the vehicles can deliver its information via vehicle-to-base station (V2B) communication or directly between vehicles in the sidelink, based on their distances and the bias factor. By practically modeling the vehicles on the roads using the doubly stochastic Cox process and the BSs, we derive new association probability of the V2B communication, new success probabilities of the V2B and V2V communications, and overall success probability of the V2X communication, which are validated by the simulations results. Our results reveal the benefits of V2X communication compared to V2V communication in terms of success probability.
• ### Robust Beamforming Design for Ultra-dense User-Centric C-RAN in the Face of Realistic Pilot Contamination and Limited Feedback(1804.03990)

April 6, 2018 eess.SP
The ultra-dense cloud radio access network (UD-CRAN), in which remote radio heads (RRHs) are densely deployed in the network, is considered. To reduce the channel estimation overhead, we focus on the design of robust transmit beamforming for user-centric frequency division duplex (FDD) UD-CRANs, where only limited channel state information (CSI) is available. Specifically, we conceive a complete procedure for acquiring the CSI that includes two key steps: channel estimation and channel quantization. The phase ambiguity (PA) is also quantized for coherent cooperative transmission. Based on the imperfect CSI, we aim for optimizing the beamforming vectors in order to minimize the total transmit power subject to users' rate requirements and fronthaul capacity constraints. We derive the closed-form expression of the achievable data rate by exploiting the statistical properties of multiple uncertain terms. Then, we propose a low-complexity iterative algorithm for solving this problem based on the successive convex approximation technique. In each iteration, the Lagrange dual decomposition method is employed for obtaining the optimal beamforming vector. Furthermore, a pair of low-complexity user selection algorithms are provided to guarantee the feasibility of the problem. Simulation results confirm the accuracy of our robust algorithm in terms of meeting the rate requirements. Finally, our simulation results verify that using a single bit for quantizing the PA is capable of achieving good performance.
• ### Analyzing Power Beacon Assisted Multi-Source Transmission Using Markov Chain(1804.01059)

April 3, 2018 eess.SP
Wireless power transmission (WPT) is envisioned to be a promising technology for prolonging the lifetime of wireless devices in energy-constrained networks. This paper presents a general power beacon (PB) assisted multi-source transmission, where a practical source selection scheme with information transmission (IT) mode or non-IT mode is developed to maximize the transmission reliability. In the IT mode, a zero-forcing (ZF) beamformed signal with no interference to the destination is transmitted at the multi-antenna PB to supply wireless energy for the sources, and bring non-negative effect to the destination. Among multiple sources, the energy-sufficient source with the best channel quality is selected for wireless information transmission (WIT), while the other sources remain for energy harvesting. In the non-IT mode, the equal power transmission is adopted at PB to focus on energy delivery. Using Markov chain theory, the energy arrival and departure of each finite-capacity storage at the source is characterized mathematically, and the comprehensive analytical expressions of the energy outage probability (EOP), the connection outage probability (COP), and the average transmission delay (ATD) are formulated and derived. Our results reveal that the EOP, COP, and ATD can be significantly improved via increasing the number of sources deployed in the proposed network with finite transmit power of PB. We also prove that the multi-source network will never experience energy outage with infinite transmit power of PB.
• ### A Machine Learning Approach for Power Allocation in HetNets Considering QoS(1803.06760)

March 18, 2018 cs.IT, math.IT
There is an increase in usage of smaller cells or femtocells to improve performance and coverage of next-generation heterogeneous wireless networks (HetNets). However, the interference caused by femtocells to neighboring cells is a limiting performance factor in dense HetNets. This interference is being managed via distributed resource allocation methods. However, as the density of the network increases so does the complexity of such resource allocation methods. Yet, unplanned deployment of femtocells requires an adaptable and self-organizing algorithm to make HetNets viable. As such, we propose to use a machine learning approach based on Q-learning to solve the resource allocation problem in such complex networks. By defining each base station as an agent, a cellular network is modelled as a multi-agent network. Subsequently, cooperative Q-learning can be applied as an efficient approach to manage the resources of a multi-agent network. Furthermore, the proposed approach considers the quality of service (QoS) for each user and fairness in the network. In comparison with prior work, the proposed approach can bring more than a four-fold increase in the number of supported femtocells while using cooperative Q-learning to reduce resource allocation overhead.

Feb. 22, 2018 cs.IT, math.IT, cs.NI
Recently, non-orthogonal multiple access (NOMA) has attracted considerable interest as one of the 5G-enabling techniques. However, users with better channel conditions in downlink communications intrinsically benefits from NOMA thanks to successive decoding, judicious designs are required to guarantee user fairness. In this paper, a two-user downlink NOMA system over fading channels is considered. For delay-tolerant transmission, the average sum-rate is maximized subject to both average and peak power constraints as well as a minimum average user rate constraint. The optimal resource allocation is obtained using Lagrangian dual decomposition under full channel state information at the transmitter (CSIT), while an effective power allocation policy under partial CSIT is also developed based on analytical results. In parallel, for delay-limited transmission, the sum of delay-limited throughput (DLT) is maximized subject to a maximum allowable user outage constraint under full CSIT, and the analysis for the sum of DLT is also performed under partial CSIT. Furthermore, an optimal orthogonal multiple access (OMA) scheme is also studied as a benchmark to prove the superiority of NOMA over OMA under full CSIT. Finally, the theoretical analysis is verified by simulations via different trade-offs for the average sum-rate (sum-DLT) versus the minimum (maximum) average user rate (outage) requirement.
• ### Joint Task Assignment and Wireless Resource Allocation for Cooperative Mobile-Edge Computing(1802.06862)

Feb. 7, 2018 cs.IT, math.IT, eess.SP
• ### Exploiting Multiple Access in Clustered Millimeter Wave Networks: NOMA or OMA?(1801.08797)

Jan. 26, 2018 cs.IT, math.IT
In this paper, we introduce a clustered millimeter wave network with non-orthogonal multiple access (NOMA), where the base station (BS) is located at the center of each cluster and all users follow a Poisson Cluster Process. To provide a realistic directional beamforming, an actual antenna pattern is deployed at all BSs. We provide a nearest-random scheme, in which near user is the closest node to the corresponding BS and far user is selected at random, to appraise the coverage performance and universal throughput of our system. Novel closed-form expressions are derived under a loose network assumption. Moreover, we present several Monte Carlo simulations and numerical results, which show that: 1) NOMA outperforms orthogonal multiple access regarding the system rate; 2) the coverage probability is proportional to the number of possible NOMA users and a negative relationship with the variance of intra-cluster receivers; and 3) an optimal number of the antenna elements is existed for maximizing the system throughput.
• ### Modeling and Analysis of MmWave Communications in Cache-enabled HetNets(1801.08801)

Jan. 26, 2018 cs.IT, math.IT
In this paper, we consider a novel cache-enabled heterogeneous network (HetNet), where macro base stations (BSs) with traditional sub-6 GHz are overlaid by dense millimeter wave (mmWave) pico BSs. These two-tier BSs, which are modeled as two independent homogeneous Poisson Point Processes, cache multimedia contents following the popularity rank. High-capacity backhauls are utilized between macro BSs and the core server. A maximum received power strategy is introduced for deducing novel algorithms of the success probability and area spectral efficiency (ASE). Moreover, Monte Carlo simulations are presented to verify the analytical conclusions and numerical results demonstrate that: 1) the proposed HetNet is an interference-limited system and it outperforms the traditional HetNets; 2) there exists an optimal pre-decided rate threshold that contributes to the maximum ASE; and 3) 73 GHz is the best mmWave carrier frequency regarding ASE due to the large antenna scale.
• ### Toward Cross-Layer Design for Non-Orthogonal Multiple Access: A Quality-of-Experience Perspective(1801.08291)

Jan. 25, 2018 cs.NI
Recent years have seen proliferation in versatile mobile devices and an upsurge in the growth of data-consuming application services. Orthogonal multiple access (OMA) technologies in today's mobile systems fall inefficient in the presence of such massive connectivity and traffic demands. In this regards, non-orthogonal multiple access (NOMA) has been advocated by the research community to embrace unprecedented requirements. Current NOMA designs have been demonstrated to largely improve conventional system performance in terms of throughput and latency, while their impact on the end users' perceived experience has not yet been comprehensively understood. We envision that quality-of-experience (QoE) awareness is a key pillar for NOMA designs to fulfill versatile user demands in the 5th generation (5G) wireless communication systems. This article systematically investigates QoE-aware NOMA designs that translate the physical-layer benefits of NOMA to the improvement of users' perceived experience in upper layers. We shed light on design principles and key challenges in realizing QoE-aware NOMA designs. With these principles and challenges in mind, we develop a general architecture with a dynamic network scheduling scheme. We provide some implications for future QoE-aware NOMA designs by conducting a case study in video streaming applications.
• ### Outage Performance of Two-Way Relay Non-Orthogonal Multiple Access Systems(1801.08177)

Jan. 24, 2018 cs.IT, math.IT
This paper investigates a two-way relay nonorthogonal multiple access (TWR-NOMA) system, where two groups of NOMA users exchange messages with the aid of one half-duplex (HD) decode-and-forward (DF) relay. Since the signal-plus-interference-to-noise ratios (SINRs) of NOMA signals mainly depend on effective successive interference cancellation (SIC) schemes, imperfect SIC (ipSIC) and perfect SIC (pSIC) are taken into consideration. To characterize the performance of TWR-NOMA systems, we derive closed-form expressions for both exact and asymptotic outage probabilities of NOMA users' signals with ipSIC/pSIC. Based on the results derived, the diversity order and throughput of the system are examined. Numerical simulations demonstrate that: 1) TWR-NOMA is superior to TWR-OMA in terms of outage probability in low SNR regimes; and 2) Due to the impact of interference signal (IS) at the relay, error floors and throughput ceilings exist in outage probabilities and ergodic rates for TWR-NOMA, respectively.
• ### Multiple Antenna Assisted Non-Orthogonal Multiple Access(1801.08170)

Jan. 24, 2018 cs.IT, math.IT, cs.NI
Non-orthogonal multiple access (NOMA) is potentially capable of circumventing the limitations of the classic orthogonal multiple access schemes, hence it has recently received significant research attention both in industry and academia. This article is focused on exploiting multiple antenna techniques in NOMA networks, with an emphasis on investigating the rate region of multiple-input multiple-output (MIMO)-NOMA, whist reviewing two popular multiple antennas aided NOMA structures, as well as underlining resource management problems of both single-carrier and multi-carrier MIMO-NOMA networks. This article also points out several effective methods of tackling the practical implementation constraints of multiple antenna NOMA networks. Finally, some promising open research directions are provided in context of multiple antenna aided NOMA.
• ### Analyzing Large-Scale Multiuser Molecular Communication via 3D Stochastic Geometry(1704.06929)

Sept. 3, 2017 cs.IT, math.IT
Information delivery using chemical molecules is an integral part of biology at multiple distance scales and has attracted recent interest in bioengineering and communication theory. Potential applications include cooperative networks with a large number of simple devices that could be randomly located (e.g., due to mobility). This paper presents the first tractable analytical model for the collective signal strength due to randomly-placed transmitters in a three-dimensional (3D) large-scale molecular communication system, either with or without degradation in the propagation environment. Transmitter locations in an unbounded and homogeneous fluid are modelled as a homogeneous Poisson point process. By applying stochastic geometry, analytical expressions are derived for the expected number of molecules absorbed by a fully-absorbing receiver or observed by a passive receiver. The bit error probability is derived under ON/OFF keying and either a constant or adaptive decision threshold. Results reveal that the combined signal strength increases proportionately with the transmitter density, and the minimum bit error probability can be improved by introducing molecule degradation. Furthermore, the analysis of the system can be generalized to other receiver designs and other performance characteristics in large-scale molecular communication systems.
• ### Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications(1707.02380)

July 8, 2017 cs.IT, math.IT
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselves from eavesdropping. The main objective of this work is to maximize the secrecy rate of the secondary system, while adhering to all individual primary users' secrecy rate constraints. In the case of active eavesdroppers and perfect channel state information (CSI) at the transceivers, the utility function of interest is nonconcave and the involved constraints are nonconvex, and thus, the optimal solutions are troublesome. To solve this problem, we propose an iterative algorithm to arrive at least to a local optimum of the original nonconvex problem. This algorithm is guaranteed to achieve a Karush-Kuhn-Tucker solution. Then, we extend the optimization approach to the case of passive eavesdroppers and imperfect CSI knowledge at the transceivers, where the constraints are transformed into a linear matrix inequality and convex constraints, in order to facilitate the optimal solution.
• ### Robust Sum Secrecy Rate Optimization for MIMO Two-way Full Duplex Systems(1705.06113)

May 17, 2017 cs.IT, math.IT
This paper considers multiple-input multiple-output (MIMO) full-duplex (FD) two-way secrecy systems. Specifically, both multi-antenna FD legitimate nodes exchange their own confidential message in the presence of an eavesdropper. Taking into account the imperfect channel state information (CSI) of the eavesdropper, we formulate a robust sum secrecy rate maximization (RSSRM) problem subject to the outage probability constraint of the achievable sum secrecy rate and the transmit power constraint. Unlike other existing channel uncertainty models, e.g., norm-bounded and Gaussian-distribution, we exploit a moment-based random distributed CSI channel uncertainty model to recast our formulate RSSRM problem into the convex optimization frameworks based on a Markov's inequality and robust conic reformulation, i.e., semidefinite programming (SDP). In addition, difference-of-concave (DC) approximation is employed to iteratively tackle the transmit covariance matrices of these legitimate nodes. Simulation results are provided to validate our proposed FD approaches.
• ### Non-orthogonal Multiple Access in Large-Scale Heterogeneous Networks(1705.03325)

May 9, 2017 cs.IT, math.IT
In this paper, the potential benefits of applying non-orthogonal multiple access (NOMA) technique in $K$-tier hybrid heterogeneous networks (HetNets) is explored. A promising new transmission framework is proposed, in which NOMA is adopted in small cells and massive multiple-input multiple-output (MIMO) is employed in macro cells. For maximizing the biased average received power for mobile users, a NOMA and massive MIMO based user association scheme is developed. To evaluate the performance of the proposed framework, we first derive the analytical expressions for the coverage probability of NOMA enhanced small cells. We then examine the spectrum efficiency of the whole network, by deriving exact analytical expressions for NOMA enhanced small cells and a tractable lower bound for massive MIMO enabled macro cells. Lastly, we investigate the energy efficiency of the hybrid HetNets. Our results demonstrate that: 1) The coverage probability of NOMA enhanced small cells is affected to a large extent by the targeted transmit rates and power sharing coefficients of two NOMA users; 2) Massive MIMO enabled macro cells are capable of significantly enhancing the spectrum efficiency by increasing the number of antennas; 3) The energy efficiency of the whole network can be greatly improved by densely deploying NOMA enhanced small cell base stations (BSs); and 4) The proposed NOMA enhanced HetNets transmission scheme has superior performance compared to the orthogonal multiple access~(OMA) based HetNets.
• ### Optimal User Scheduling and Power Allocation for Millimeter Wave NOMA Systems(1705.03064)

May 8, 2017 cs.IT, math.IT
This paper investigates the application of non-orthogonal multiple access (NOMA) in millimeter wave (mmWave) communications by exploiting beamforming, user scheduling and power allocation. Random beamforming is invoked for reducing the feedback overhead of considered systems. A nonconvex optimization problem for maximizing the sum rate is formulated, which is proved to be NP-hard. The branch and bound (BB) approach is invoked to obtain the optimal power allocation policy, which is proved to converge to a global optimal solution. To elaborate further, low complexity suboptimal approach is developed for striking a good computational complexity-optimality tradeoff, where matching theory and successive convex approximation (SCA) techniques are invoked for tackling the user scheduling and power allocation problems, respectively. Simulation results reveal that: i) the proposed low complexity solution achieves a near-optimal performance; and ii) the proposed mmWave NOMA systems is capable of outperforming conventional mmWave orthogonal multiple access (OMA) systems in terms of sum rate and the number of served users.
• ### Optimizing DF Cognitive Radio Networks with Full-Duplex-Enabled Energy Access Points(1611.05352)

March 28, 2017 cs.IT, math.IT
With the recent advances in radio frequency (RF) energy harvesting (EH) technologies, wireless powered cooperative cognitive radio network (CCRN) has drawn an upsurge of interest for improving the spectrum utilization with incentive to motivate joint information and energy cooperation between the primary and secondary systems. Dedicated energy beamforming (EB) is aimed for remedying the low efficiency of wireless power transfer (WPT), which nevertheless arouses out-of-band EH phases and thus low cooperation efficiency. To address this issue, in this paper, we consider a novel RF EH CCRN aided by full-duplex (FD)-enabled energy access points (EAPs) that can cooperate to wireless charge the secondary transmitter (ST) while concurrently receiving primary transmitter (PT)'s signal in the first transmission phase, and to perform decode-and-forward (DF) relaying in the second transmission phase. We investigate a weighted sum-rate maximization problem subject to the transmitting power constraints as well as a total cost constraint using successive convex approximation (SCA) techniques. A zero-forcing (ZF) based suboptimal scheme that requires only local CSIs for the EAPs to obtain their optimum receive beamforming is also derived. Various tradeoffs between the weighted sum-rate and other system parameters are provided in numerical results to corroborate the effectiveness of the proposed solutions against the benchmark ones.
• ### Robust Beamforming for Secrecy Rate in Cooperative Cognitive Radio Multicast Communications(1703.00147)

March 1, 2017 cs.IT, math.IT
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselves from eavesdropping. The main objective of this work is to maximize the secrecy rate of the secondary system, while adhering to all individual primary users' secrecy rate constraints. In the case of passive eavesdroppers and imperfect channel state information knowledge at the transceivers, the utility function of interest is nonconcave and involved constraints are nonconvex, and thus, the optimal solutions are troublesome. To address this problem, we propose an iterative algorithm to arrive at a local optimum of the considered problem. The proposed iterative algorithm is guaranteed to achieve a Karush-Kuhn-Tucker solution.
• ### Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks(1701.05764)

Jan. 20, 2017 cs.IT, math.IT
Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. In this approach, jamming plays a key role by generating noise signals to confuse the potential eavesdroppers, and significantly improves quality and reliability of secure communications between legitimate terminals. This article presents theoretical limits and practical designs of jamming approaches for physical layer security. In particular, the theoretical limits explore the achievable secrecy rates of user cooperation based jamming whilst the centralized, and game theoretic based precoding techniques are reviewed for practical implementations. In addition, the emerging wireless energy harvesting techniques are exploited to harvest the required energy to transmit jamming signals. Future directions of these approaches, and the associated research challenges are also briefly outlined.
• ### SMIET: Simultaneous Molecular Information and Energy Transfer(1605.09474)

Aug. 17, 2016 cs.IT, math.IT, cs.ET
The performance of communication systems is fundamentally limited by the loss of energy through propagation and circuit inefficiencies. In this article, we show that it is possible to achieve ultra low energy communications at the nano-scale, if diffusive molecules are used for carrying data. Whilst the energy of electromagnetic waves will inevitably decay as a function of transmission distance and time, the energy in individual molecules does not. Over time, the receiver has an opportunity to recover some, if not all of the molecular energy transmitted. The article demonstrates the potential of ultra-low energy simultaneous molecular information and energy transfer (SMIET) through the design of two different nano-relay systems, and the discusses how molecular communications can benefit more from crowd energy harvesting than traditional wave-based systems.
• ### 3D Stochastic Geometry Model for Large-Scale Molecular Communication Systems(1605.08311)

Aug. 3, 2016 cs.IT, math.IT
Information delivery using chemical molecules is an integral part of biology at multiple distance scales and has attracted recent interest in bioengineering and communication. The collective signal strength at the receiver (i.e., the expected number of observed molecules inside the receiver), resulting from a large number of transmitters at random distances (e.g., due to mobility), can have a major impact on the reliability and efficiency of the molecular communication system. Modeling the collective signal from multiple diffusion sources can be computationally and analytically challenging. In this paper, we present the first tractable analytical model for the collective signal strength due to randomly-placed transmitters, whose positions are modelled as a homogeneous Poisson point process in three-dimensional (3D) space. By applying stochastic geometry, we derive analytical expressions for the expected number of observed molecules at a fully absorbing receiver and a passive receiver. Our results reveal that the collective signal strength at both types of receivers increases proportionally with increasing transmitter density. The proposed framework dramatically simplifies the analysis of large-scale molecular systems in both communication and biological applications.
• ### Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference(1607.03344)

July 12, 2016 cs.IT, math.IT, cs.NI
In this paper, we investigate the potential benefits of the massive multiple-input multiple-output (MIMO) enabled heterogeneous cloud radio access network (C-RAN) in terms of the secrecy and energy efficiency (EE). In this network, both remote radio heads (RRHs) and massive MIMO macrocell base stations (BSs) are deployed and soft fractional frequency reuse (S-FFR) is adopted to mitigate the inter-tier interference. We first examine the physical layer security by deriving the area ergodic secrecy rate and secrecy outage probability. Our results reveal that the use of massive MIMO and C-RAN can greatly improve the secrecy performance. For C-RAN, a large number of RRHs achieves high area ergodic secrecy rate and low secrecy outage probability, due to its powerful interference management. We find that for massive MIMO aided macrocells, having more antennas and serving more users improves secrecy performance. Then we derive the EE of the heterogeneous C-RAN, illustrating that increasing the number of RRHs significantly enhances the network EE. Furthermore, it is indicated that allocating more radio resources to the RRHs can linearly increase the EE of RRH tier and improve the network EE without affecting the EE of the macrocells.