• ### Low-cost Cognitive Radios against Spectrum Scarcity(1803.10536)

March 28, 2018 cs.NI
The next generation wireless networks are envisioned to deal with the expected thousand-fold increase in total mobile broadband data and the hundred-fold increase in connected devices. In order to provide higher data rates, improved end-to-end performance, low latency, and low energy consumption at a low cost per transmission, the fifth generation (5G) systems are required to overcome various handicaps of current cellular networks and wireless links. One of the key handicaps of 5G systems is the performance degradation of the communication link, due to the use of low-cost transceiver in high data rate. Motivated by this in this paper, we discuss the impact of transceiver front-end hardware imperfections on the spectrum sensing performance of cognitive radios.
• ### Spectrum Sensing with Multiple Primary Users over Fading Channels(1803.09085)

March 24, 2018 cs.IT, math.IT
We investigate the impact of multiple primary users (PUs) and fading on the spectrum sensing of a classical energy detector (ED). Specifically, we present novel closed-form expressions for the false-alarm and detection probabilities in a multiple PUs environment, assuming Nakagami-m fading and complex Gaussian PUs transmitted signals. The results reveal the importance of taking into consideration the wireless environment, when evaluating the ED spectrum sensing performance and selecting the ED threshold.
• ### Physical Layer Security in the Presence of Interference(1803.09090)

March 24, 2018 cs.IT, math.IT
We evaluate and quantify the joint effect of fading and multiple interferers on the physical-layer (PHY) security of a system consisted of a base-station (BS), a legitimate user, and an eavesdropper. To this end, we present a novel closed-form expression for the secrecy outage probability, which takes into account the fading characteristics of the wireless environment, the location and the number of interferers, as well as the transmission power of the BS and the interference. The results reveal that the impact of interference should be seriously taken into account in the design and deployment of a wireless system with PHY security.
• ### Dynamic Spectrum Sensing Through Accelerated Particle Swarm Optimization(1510.03840)

March 10, 2018 cs.IT, math.IT, stat.AP, math.OC
In this paper, a novel optimization algorithm, called the acceleration-aided particle swarm optimization (AAPSO), is proposed for reliable dynamic spectrum sensing in cognitive radio networks. In A-APSO, the acceleration variable of the particles in the swarm is also considered in the search space of the optimization problem. We show that the proposed A-APSO based spectrum sensing technique is more efficient in terms of performance than the corresponding one based on the standard particle swarm optimization algorithm.
• ### NOMA Assisted Wireless Caching: Strategies and Performance Analysis(1709.06951)

Jan. 19, 2018 cs.IT, math.IT
Conventional wireless caching assumes that content can be pushed to local caching infrastructure during off-peak hours in an error-free manner; however, this assumption is not applicable if local caches need to be frequently updated via wireless transmission. This paper investigates a new approach to wireless caching for the case when cache content has to be updated during on-peak hours. Two non-orthogonal multiple access (NOMA) assisted caching strategies are developed, namely the push-then-deliver strategy and the push-and-deliver strategy. In the push-then-deliver strategy, the NOMA principle is applied to push more content files to the content servers during a short time interval reserved for content pushing in on-peak hours and to provide more connectivity for content delivery, compared to the conventional orthogonal multiple access (OMA) strategy. The push-and-deliver strategy is motivated by the fact that some users' requests cannot be accommodated locally and the base station has to serve them directly. These events during the content delivery phase are exploited as opportunities for content pushing, which further facilitates the frequent update of the files cached at the content servers. It is also shown that this strategy can be straightforwardly extended to device-to-device caching, and various analytical results are developed to illustrate the superiority of the proposed caching strategies compared to OMA based schemes.
• ### Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation(1801.04441)

Jan. 13, 2018 cs.IT, math.IT
Secure communication is a promising technology for wireless networks because it ensures secure transmission of information. In this paper, we investigate the joint subcarrier (SC) assignment and power allocation problem for non-orthogonal multiple access (NOMA) amplify-and-forward two-way relay wireless networks, in the presence of eavesdroppers. By exploiting cooperative jamming (CJ) to enhance the security of the communication link, we aim to maximize the achievable secrecy energy efficiency by jointly designing the SC assignment, user pair scheduling and power allocation. Assuming the perfect knowledge of the channel state information (CSI) at the relay station, we propose a low-complexity subcarrier assignment scheme (SCAS-1), which is equivalent to many-to-many matching games, and then SCAS-2 is formulated as a secrecy energy efficiency maximization problem. The secure power allocation problem is modeled as a convex geometric programming problem, and then solved by interior point methods. Simulation results demonstrate that the effectiveness of the proposed SSPA algorithms under scenarios of using and not using CJ, respectively.
• ### Non-Orthogonal Multiple Access for FSO Backhauling(1710.05702)

Sept. 30, 2017 eess.SP
We consider a free space optical (FSO) backhauling system which consists of two base stations (BSs) and one central unit (CU). We propose to employ non-orthogonal multiple access (NOMA) for FSO backhauling where both BSs transmit at the same time and in the same frequency band to the same photodetector at the CU. We develop a dynamic NOMA scheme which determines the optimal decoding order as a function of the channel state information at the CU and the quality of service requirements of the BSs, such that the outage probabilities of both BSs are jointly minimized. Moreover, we analyze the performance of the proposed NOMA scheme in terms of the outage probability over Gamma-Gamma FSO turbulence channels. We further derive closed-form expressions for the outage probability for the high signal-to-noise ratio regime. Our simulation results confirm the analytical derivations and reveal that the proposed dynamic NOMA scheme significantly outperforms orthogonal transmission and existing NOMA schemes.
• ### Performance Analysis of Coherent and Noncoherent Modulation under I/Q Imbalance(1710.00777)

Aug. 30, 2017 eess.SP
In-phase/quadrature-phase Imbalance (IQI) is considered a major performance-limiting impairment in direct-conversion transceivers. Its effects become even more pronounced at higher carrier frequencies such as the millimeter-wave frequency bands being considered for 5G systems. In this paper, we quantify the effects of IQI on the performance of different modulation schemes under multipath fading channels. This is realized by developing a general framework for the symbol error rate (SER) analysis of coherent phase shift keying, noncoherent differential phase shift keying and noncoherent frequency shift keying under IQI effects. In this context, the moment generating function of the signal-to-interference-plus-noise-ratio is first derived for both single-carrier and multi-carrier systems suffering from transmitter (TX) IQI only, receiver (RX) IQI only and joint TX/RX IQI. Capitalizing on this, we derive analytic expressions for the SER of the different modulation schemes. These expressions are corroborated by comparisons with corresponding results from computer simulations and they provide insights into the dependence of IQI on the system parameters. We demonstrate that the effects of IQI differ considerably depending on the considered system as some cases of single-carrier transmission appear robust to IQI, whereas multi-carrier systems experiencing IQI at the RX require compensation in order to achieve a reliable communication link.
• ### A Novel Network NOMA Scheme for Downlink Coordinated Three-Point Systems(1708.06498)

Aug. 22, 2017 cs.IT, math.IT
In this paper, we propose a network non-orthogonal multiple access (N-NOMA) technique for the downlink coordinated multipoint (CoMP) communication scenario of a cellular network, with randomly deployed users. In the considered N-NOMA scheme, superposition coding (SC) is employed to serve cell-edge users as well as users close to base stations (BSs) simultaneously, and distributed analog beamforming by the BSs to meet the cell-edge user's quality of service (QoS) requirements. The combination of SC and distributed analog beamforming significantly complicates the expressions for the signal-to-interference-plus-noise ratio (SINR) at the reveiver, which makes the performance analysis particularly challenging. However, by using rational approximations, insightful analytical results are obtained in order to characterize the outage performance of the considered N-NOMA scheme. Computer simulation results are provided to show the superior performance of the proposed scheme as well as to demonstrate the accuracy of the analytical results.
• ### Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications(1707.02380)

July 8, 2017 cs.IT, math.IT
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselves from eavesdropping. The main objective of this work is to maximize the secrecy rate of the secondary system, while adhering to all individual primary users' secrecy rate constraints. In the case of active eavesdroppers and perfect channel state information (CSI) at the transceivers, the utility function of interest is nonconcave and the involved constraints are nonconvex, and thus, the optimal solutions are troublesome. To solve this problem, we propose an iterative algorithm to arrive at least to a local optimum of the original nonconvex problem. This algorithm is guaranteed to achieve a Karush-Kuhn-Tucker solution. Then, we extend the optimization approach to the case of passive eavesdroppers and imperfect CSI knowledge at the transceivers, where the constraints are transformed into a linear matrix inequality and convex constraints, in order to facilitate the optimal solution.
• ### Simultaneous Lightwave Information and Power Transfer (SLIPT) for Indoor IoT Applications(1706.09624)

June 29, 2017 cs.IT, math.IT
We present the concept of Simultaneous Lightwave Information and Power Transfer (SLIPT) for indoor Internet-of-Things (IoT) applications. Specifically, we propose novel and fundamental SLIPT strategies, which can be implemented through Visible Light or Infrared communication systems, equipped with a simple solar panel-based receiver. These strategies are performed at the transmitter or at the receiver, or at both sides, named Adjusting transmission, Adjusting reception and Coordinated adjustment of transmission and reception, correspondingly. Furthermore, we deal with the fundamental trade-off between harvested energy and quality-of-service (QoS), by maximizing the harvested energy, while achieving the required user's QoS. To this end, two optimization problems are formulated and optimally solved. Computer simulations validate the optimum solutions and reveal that the proposed strategies considerably increase the harvested energy, compared to SLIPT with fixed policies.
• ### A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends(1706.05347)

June 16, 2017 cs.IT, math.IT
Non-orthogonal multiple access (NOMA) is an essential enabling technology for the fifth generation (5G) wireless networks to meet the heterogeneous demands on low latency, high reliability, massive connectivity, improved fairness, and high throughput. The key idea behind NOMA is to serve multiple users in the same resource block, such as a time slot, subcarrier, or spreading code. The NOMA principle is a general framework, and several recently proposed 5G multiple access schemes can be viewed as special cases. This survey provides an overview of the latest NOMA research and innovations as well as their applications. Thereby, the papers published in this special issue are put into the content of the existing literature. Future research challenges regarding NOMA in 5G and beyond are also discussed.
• ### Millimeter Wave Communications for Future Mobile Networks(1705.06072)

May 17, 2017 cs.IT, math.IT
Millimeter wave (mmWave) communications have recently attracted large research interest, since the huge available bandwidth can potentially lead to rates of multiple Gbps (gigabit per second) per user. Though mmWave can be readily used in stationary scenarios such as indoor hotspots or backhaul, it is challenging to use mmWave in mobile networks, where the transmitting/receiving nodes may be moving, channels may have a complicated structure, and the coordination among multiple nodes is difficult. To fully exploit the high potential rates of mmWave in mobile networks, lots of technical problems must be addressed. This paper presents a comprehensive survey of mmWave communications for future mobile networks (5G and beyond). We first summarize the recent channel measurement campaigns and modeling results. Then, we discuss in detail recent progresses in multiple input multiple output (MIMO) transceiver design for mmWave communications. After that, we provide an overview of the solution for multiple access and backhauling, followed by analysis of coverage and connectivity. Finally, the progresses in the standardization and deployment of mmWave for mobile networks are discussed.
• ### Beamforming Optimization for Full-Duplex Wireless-powered MIMO Systems(1705.04014)

May 11, 2017 cs.IT, math.IT
We propose techniques for optimizing transmit beamforming in a full-duplex multiple-input-multiple-output (MIMO) wireless-powered communication system, which consists of two phases. In the first phase, the wireless-powered mobile station (MS) harvests energy using signals from the base station (BS), whereas in the second phase, both MS and BS communicate to each other in a full-duplex mode. When complete instantaneous channel state information (CSI) is available, the BS beamformer and the time-splitting (TS) parameter of energy harvesting are jointly optimized in order to obtain the BS-MS rate region. The joint optimization problem is non-convex, however, a computationally efficient optimum technique, based upon semidefinite relaxation and line-search, is proposed to solve the problem. A sub-optimum zero-forcing approach is also proposed, in which a closed-form solution of TS parameter is obtained. When only second-order statistics of transmit CSI is available, we propose to maximize the ergodic information rate at the MS, while maintaining the outage probability at the BS below a certain threshold. An upper bound for the outage probability is also derived and an approximate convex optimization framework is proposed for efficiently solving the underlying non-convex problem. Simulations demonstrate the advantages of the proposed methods over the sub-optimum and half-duplex ones.
• ### Robust Beamforming for Secrecy Rate in Cooperative Cognitive Radio Multicast Communications(1703.00147)

March 1, 2017 cs.IT, math.IT
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselves from eavesdropping. The main objective of this work is to maximize the secrecy rate of the secondary system, while adhering to all individual primary users' secrecy rate constraints. In the case of passive eavesdroppers and imperfect channel state information knowledge at the transceivers, the utility function of interest is nonconcave and involved constraints are nonconvex, and thus, the optimal solutions are troublesome. To address this problem, we propose an iterative algorithm to arrive at a local optimum of the considered problem. The proposed iterative algorithm is guaranteed to achieve a Karush-Kuhn-Tucker solution.
• ### Optical Adaptive Precoding for Visible Light Communications(1612.04937)

Feb. 6, 2017 cs.IT, math.IT
Multiple-input multiple-output (MIMO) techniques have recently demonstrated significant potentials in visible light communications (VLC), as they can overcome the modulation bandwidth limitation and provide substantial improvement in terms of spectral efficiency and link reliability. However, MIMO systems typically suffer from inter-channel interference, which causes severe degradation to the system performance. In this context, we propose a novel optical adaptive precoding (OAP) scheme for the downlink of MIMO VLC systems, which exploits the knowledge of transmitted symbols to enhance the effective signal-to-interference-plus-noise ratio. We also derive bit-error-rate expressions for the OAP under perfect and outdated channel state information (CSI). Our results demonstrate that the proposed scheme is more robust to both CSI error and channel correlation, compared to conventional channel inversion precoding.
• ### Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks(1701.05764)

Jan. 20, 2017 cs.IT, math.IT
Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. In this approach, jamming plays a key role by generating noise signals to confuse the potential eavesdroppers, and significantly improves quality and reliability of secure communications between legitimate terminals. This article presents theoretical limits and practical designs of jamming approaches for physical layer security. In particular, the theoretical limits explore the achievable secrecy rates of user cooperation based jamming whilst the centralized, and game theoretic based precoding techniques are reviewed for practical implementations. In addition, the emerging wireless energy harvesting techniques are exploited to harvest the required energy to transmit jamming signals. Future directions of these approaches, and the associated research challenges are also briefly outlined.
• ### Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis(1701.03383)

Jan. 12, 2017 cs.IT, math.IT
This paper studies the secrecy rate maximization problem of a secure wireless communication system, in the presence of multiple eavesdroppers. The security of the communication link is enhanced through cooperative jamming, with the help of multiple jammers. First, a feasibility condition is derived to achieve a positive secrecy rate at the destination. Then, we solve the original secrecy rate maximization problem, which is not convex in terms of power allocation at the jammers. To circumvent this non-convexity, the achievable secrecy rate is approximated for a given power allocation at the jammers and the approximated problem is formulated into a geometric programming one. Based on this approximation, an iterative algorithm has been developed to obtain the optimal power allocation at the jammers. Next, we provide a bisection approach, based on one-dimensional search, to validate the optimality of the proposed algorithm. In addition, by assuming Rayleigh fading, the secrecy outage probability (SOP) of the proposed cooperative jamming scheme is analyzed. More specifically, a single-integral form expression for SOP is derived for the most general case as well as a closed-form expression for the special case of two cooperative jammers and one eavesdropper. Simulation results have been provided to validate the convergence and the optimality of the proposed algorithm as well as the theoretical derivations of the presented SOP analysis.
• ### Entropy and Channel Capacity under Optimum Power and Rate Adaptation over Generalized Fading Conditions(1507.08111)

Dec. 29, 2016 cs.IT, math.IT
Accurate fading characterization and channel capacity determination are of paramount importance in both conventional and emerging communication systems. The present work addresses the nonlinearity of the propagation medium and its effects on the channel capacity. Such fading conditions are first characterized using information theoretic measures, namely, Shannon entropy, cross entropy and relative entropy. The corresponding effects on the channel capacity with and without power adaptation are then analyzed. Closed-form expressions are derived and validated through comparisons with respective results from computer simulations. It is shown that the effects of fading nonlinearities are significantly larger than those of fading parameters such as the scattered-wave power ratio, and the correlation coefficient between the in-phase and quadrature components in each cluster of multipath components.
• ### The Area Under a Receiver Operating Characteristic Curve Over Enriched Multipath Fading Conditions(1505.03331)

Dec. 29, 2016 cs.IT, math.IT
This work is devoted to the analysis of the performance of energy detection based spectrum sensing in the presence of enriched fading conditions which are distinct for the large number of multipath components and the lack of a dominant components. This type of fading conditions are characterized efficiently by the well known Nakagami${-}q$ or Hoyt distribution and the proposed analysis is carried out in the context of the area under the receiver operating characteristics (ROC) curve (AUC). Unlike the widely used probability of detection metric, the AUC is a single metric and has been shown to be rather capable of evaluating the performance of a detector in applications relating to cognitive radio, radar systems and biomedical engineering, among others. Based on this, novel analytic expressions are derived for the average AUC and its complementary metric, average CAUC, for both integer and fractional values of the involved time-bandwidth product. The derived expressions have a tractable algebraic representation which renders them convenient to handle both analytically and numerically. Based on this, they are employed in analyzing the behavior of energy detection based spectrum sensing over enriched fading conditions for different severity scenarios, which demonstrates that the performance of energy detectors is, as expected, closely related to the value of the fading parameter $q$.
• ### Analytic solutions to a Marcum Q-function-based integral and application in energy detection of unknown signals over multipath fading channels(1505.03346)

Dec. 29, 2016 cs.IT, math.IT
This work presents analytic solutions for a useful integral in wireless communications, which involves the Marcum $Q{-}$function in combination with an exponential function and arbitrary power terms. The derived expressions have a rather simple algebraic representation which renders them convenient both analytically and computationally. Furthermore, they can be useful in wireless communications and particularly in the context of cognitive radio communications and radar systems, where this integral is often encountered. To this end, we derive novel expressions for the probability of detection in energy detection based spectrum sensing over $\eta{-}\mu$ fading channels. These expressions are given in closed-form and are subsequently employed in analyzing the effects of generalised multipath fading conditions in cognitive radio systems. As expected, it is shown that the detector is highly dependent upon the severity of fading conditions as even slight variation of the fading parameters affect the corresponding performance significantly.
• ### Multiple Access for Visible Light Communications: Research Challenges and Future Trends(1612.05894)

Dec. 18, 2016 cs.IT, math.IT
The ever-increasing demand of mobile Internet and multimedia services poses unique and significant challenges for current and future generation wireless networks. These challenges are mainly relating to the support of massive ubiquitous connectivity, low latency and highly efficient utilization of spectrum resources. Therefore, it is vital to consider them extensively prior to design and deployment of future wireless networks. To this end, the present article provides a comprehensive overview of a particularly promising and effective wireless technology, namely, visible light communication (VLC). In this context, we initially provide a thorough overview of frequency domain multiple access techniques for single and multi-carrier systems, which is then followed by an in depth discussion on the technical considerations of optical code division multiple access techniques and their adoption in indoor VLC applications. Furthermore, we address space division multiple access and, finally, we revisit and analyze the distinct characteristics of a new technology, namely, non-orthogonal multiple access, which has been proposed recently as a particularly effective solution.
• ### On the Performance of Visible Light Communications Systems with Non-Orthogonal Multiple Access(1612.01114)

Dec. 4, 2016 cs.IT, math.IT
Visible light communications (VLC) have been recently proposed as a promising and efficient solution to indoor ubiquitous broadband connectivity. In this paper, non-orthogonal multiple access, which has been recently proposed as an effective scheme for fifth generation (5G) wireless networks, is considered in the context of VLC systems, under different channel uncertainty models. To this end, we first derive a novel closed-form expression for the bit-error-rate (BER) under perfect channel state information (CSI). Capitalizing on this, we quantify the effect of noisy and outdated CSI by deriving a simple approximated expression for the former and a tight upper bound for the latter. The offered results are corroborated by respective results from extensive Monte Carlo simulations and are used to provide useful insights on the effect of imperfect CSI knowledge on the system performance. It was shown that, while noisy CSI leads to slight degradation in the BER performance, outdated CSI can cause detrimental performance degradation if the order of the users' channel gains change as a result of mobility
• ### Low Power Wide Area Networks (LPWANs) for Internet of Things (IoT) Applications: Research Challenges and Future Trends(1611.07449)

Nov. 2, 2016 cs.NI
Internet of things (IoT) changes significantly the requirements for connectivity, mainly with regards to long battery life, low device cost, low deployment cost, extended coverage and support for a massive number of devices. Driven from these requirements, several different cellular and non-cellular low power wide area network (LPWAN) solutions are emerging and competing for IoT business and the overall connectivity market. Motivated by this, in this paper, we review and compare the design specifications of different LPWAN solutions, as well as, we discuss their suitability for different IoT applications. Finally, we present the challenges, future trends, and potential research directions for LPWANs.
• ### Securing the MIMO Wiretap Channel with Polar Codes and Encryption(1510.06578)

March 27, 2016 cs.IT, math.IT
Polar codes have been proven to be capacity achieving for any binary-input discrete memoryless channel, while at the same time they can reassure secure and reliable transmission over the single-input single-output wireless channel. However, the use of polar codes to secure multiple-antenna transmission and reception has not yet been reported in the open literature. In this paper, we assume a multiple-input multiple-output wiretap channel, where the legitimate receiver and the eavesdropper are equipped with the same number of antennas. We introduce a protocol that exploits the properties of both physical and media access control layer security by employing polar coding and encryption techniques in a hybrid manner in order to guarantee secure transmission. A novel security technique is also proposed, where a cryptographic key is generated based on the information transmitted and renewed every transmission block without the need for a separate key exchange method. Finally, to illustrate the effectiveness of the proposed protocol, we prove the weak and strong security conditions, and we provide a practical method to achieve computational security for the cases where these conditions cannot be established.