• ### Stochastic Channel Modeling for Diffusive Mobile Molecular Communication Systems(1709.06785)

July 11, 2018 cs.IT, math.IT, cs.ET
In this paper, we develop a mathematical framework for modeling the time-variant stochastic channels of diffusive mobile MC systems. In particular, we consider a diffusive mobile MC system consisting of a pair of transmitter and receiver nano-machines suspended in a fluid medium with a uniform bulk flow, where we assume that either the transmitter, or the receiver, or both are mobile and we model the mobility by Brownian motion. The transmitter and receiver nano-machines exchange information via diffusive signaling molecules. Due to the random movements of the transmitter and receiver nano-machines, the statistics of the channel impulse response (CIR) change over time. We derive closed-form expressions for the mean, the autocorrelation function (ACF), the cumulative distribution function (CDF), and the probability density function (PDF) of the time-variant CIR. Exploiting the ACF, we define the coherence time of the time-variant MC channel as a metric for characterization of the variations of the CIR. The derived CDF is employed for calculation of the outage probability of the system. We also show that under certain conditions, the PDF of the CIR can be accurately approximated by a Log-normal distribution. Based on this approximation, we derive a simple model for outdated channel state information (CSI). Moreover, we derive an analytical expression for evaluation of the expected error probability of a simple detector for the considered MC system. In order to investigate the impact of CIR decorrelation over time, we compare the performances of a detector with perfect CSI knowledge and a detector with outdated CSI knowledge. The accuracy of the proposed analytical expressions is verified via particle-based simulation of the Brownian motion.
• ### Advanced Target Detection via Molecular Communication(1805.01514)

May 3, 2018 cs.IT, math.IT, cs.ET
In this paper, we consider target detection in suspicious tissue via diffusive molecular communications (MCs). If a target is present, it continuously and with a constant rate secretes molecules of a specific type, so-called biomarkers, into the medium, which are symptomatic for the presence of the target. Detection of these biomarkers is challenging since due to the diffusion and degradation, the biomarkers are only detectable in the vicinity of the target. In addition, the exact location of the target within the tissue is not known. In this paper, we propose to distribute several reactive nanosensors (NSs) across the tissue such that at least some of them are expected to come in contact with biomarkers, which cause them to become activated. Upon activation, an NS releases a certain number of molecules of a secondary type into the medium to alert a fusion center (FC), where the final decision regarding the presence of the target is made. In particular, we consider a composite hypothesis testing framework where it is assumed that the location of the target and the biomarker secretion rate are unknown, whereas the locations of the NSs are known. We derive the uniformly most powerful (UMP) test for the detection at the NSs. For the final decision at the FC, we show that the UMP test does not exist. Hence, we derive a genie-aided detector as an upper bound on performance. We then propose two sub-optimal detectors and evaluate their performance via simulations
• ### Modeling Duct Flow for Molecular Communication(1711.01479)

May 2, 2018 cs.IT, math.IT, cs.ET
Active transport such as fluid flow is sought in molecular communication to extend coverage, improve reliability, and mitigate interference. Flow models are often over-simplified, assuming one-dimensional diffusion with constant drift. However, diffusion and flow are usually encountered in three-dimensional bounded environments where the flow is highly non-uniform such as in blood vessels or microfluidic channels. For a qualitative understanding of the relevant physical effects inherent to these channels, based on the Peclet number and the transmitter-receiver distance, we study when simplified models of uniform flow and advection-only transport are applicable. For these two regimes, analytical expressions for the channel impulse response are derived and validated by particle-based simulation. Furthermore, as advection-only transport is typically overlooked and hence not analyzed in the molecular communication literature, we evaluate the symbol error rate for exemplary on-off keying as performance metric.
• ### Biological Optical-to-Chemical Signal Conversion Interface: A Small-scale Modulator for Molecular Communications(1804.05555)

April 16, 2018 cs.ET
Although many exciting applications of molecular communication (MC) systems are envisioned to be at microscale, the available MC testbeds reported in the literature so far are mostly at macroscale. This may partially be due to the fact that controlling an MC system at microscale is quite challenging. To link the macroworld to the microworld, we propose a biological signal conversion interface that can also be seen as a microscale modulator. This interface translates an optical signal, which can be easily controlled using a light-emitting diode (LED), into a chemical signal by changing the pH of the environment. The modulator is realized using \textit{Escherichia coli} bacteria that express the light-driven proton pump gloeorhodopsin from \textit{Gloeobacter violaceus}. Upon inducing external light stimuli, these bacteria can locally change their surrounding pH level by exporting protons into the environment. Based on measurement data from a testbed, we develop an analytical model for the induced chemical signal as a function of the applied optical signal. Finally, using a pH sensor as detector, we show for an example scenario that the proposed setup is able to successfully convert an optical signal representing a sequence of binary symbols into a chemical signal with a bit rate of $1$~bit/min.
• ### Transfer Function Models for Particle Diffusion in a Horizontal Cylindrical Shape with a Vertical Force Component(1803.10848)

March 28, 2018 physics.comp-ph, cs.CE
This paper considers particle propagation in a cylindrical molecular communication channel, e.g. a simplified model of a blood vessel. Emitted particles are influenced by diffusion, flow, and a vertical force induced e.g. by gravity or magnetism. The dynamics of the diffusion process are modeled by multi-dimensional transfer functions in a spatio-temporal frequency domain. Realistic boundary conditions are incorporated by the design of a feedback loop. The result is a discrete-time semi-analytical model for the particle concentration. The model is validated by comparison to particle-based simulations. These numerical experiments reveal that the particle concentration of the proposed semi-analytical model and the particle-based model are in excellent agreement. The analytical form of the proposed solution provides several benefits over purely numerical models, e.g. high variability, existence of low run-time algorithms, extendability to several kinds of boundary conditions, and analytical connection to parameters from communication theory.
• ### Experimental Molecular Communication Testbed Based on Magnetic Nanoparticles in Duct Flow(1803.06990)

March 19, 2018 cs.ET
Simple and easy to implement testbeds are needed to further advance molecular communication research. To this end, this paper presents an in-vessel molecular communication testbed using magnetic nanoparticles dispersed in an aqueous suspension as they are also used for drug targeting in biotechnology. The transmitter is realized by an electronic pump for injection via a Y-connector. A second pump provides a background flow for signal propagation. For signal reception, we employ a susceptometer, an electronic device including a coil, where the magnetic particles move through and generate an electrical signal. We present experimental results for the transmission of a binary sequence and the system response following a single injection. For this flow-driven particle transport, we propose a simple parameterized mathematical model for evaluating the system response.
• ### Fundamentals of Wireless Information and Power Transfer: From RF Energy Harvester Models to Signal and System Designs(1803.07123)

March 19, 2018 cs.IT, math.IT, eess.SP
Radio waves carry both energy and information simultaneously. Nevertheless, Radio-Frequency (RF) transmission of these quantities have traditionally been treated separately. Currently, we are experiencing a paradigm shift in wireless network design, namely unifying wireless transmission of information and power so as to make the best use of the RF spectrum and radiations as well as the network infrastructure for the dual purpose of communicating and energizing. In this paper, we review and discuss recent progress on laying the foundations of the envisioned dual purpose networks by establishing a signal theory and design for Wireless Information and Power Transmission (WIPT) and identifying the fundamental tradeoff between conveying information and power wirelessly. We start with an overview of WIPT challenges and technologies, namely Simultaneous Wireless Information and Power Transfer (SWIPT),Wirelessly Powered Communication Network (WPCN), and Wirelessly Powered Backscatter Communication (WPBC). We then characterize energy harvesters and show how WIPT signal and system designs crucially revolve around the underlying energy harvester model. To that end, we highlight three different energy harvester models, namely one linear model and two nonlinear models, and show how WIPT designs differ for each of them in single-user and multi-user deployments. Topics discussed include rate-energy region characterization, transmitter and receiver architecture, waveform design, modulation, beamforming and input distribution optimizations, resource allocation, and RF spectrum use. We discuss and check the validity of the different energy harvester models and the resulting signal theory and design based on circuit simulations, prototyping and experimentation. We also point out numerous directions that are promising for future research.
• ### Cache-Aided Non-Orthogonal Multiple Access(1801.10484)

Jan. 29, 2018 cs.IT, math.IT
In this paper, we propose a cache-aided non-orthogonal multiple access (NOMA) scheme for spectrally efficient downlink transmission in the fifth-generation (5G) cellular networks. The proposed scheme not only reaps the benefits associated with caching and NOMA, but also exploits the data cached at the users for interference cancellation. As a consequence, caching can help to reduce the residual interference power, making multiple decoding orders at the users feasible. The resulting flexibility in decoding can be exploited for realizing additional performance gains. We characterize the achievable rate region of cache-aided NOMA and derive the Pareto optimal rate tuples forming the boundary of the rate region. Moreover, we optimize cache-aided NOMA for minimization of the time required for video file delivery. The optimal decoding order and the optimal transmit power and rate allocation are derived as functions of the cache status, the file sizes, and the channel conditions. Our simulation results confirm that compared to several baseline schemes, the proposed cache-aided NOMA scheme significantly expands the achievable rate region and increases the sum rate for downlink transmission, which translates into substantially reduced file delivery times.
• ### Cache-Aided Non-Orthogonal Multiple Access(1712.09557)

Jan. 29, 2018 cs.IT, math.IT
In this paper, we propose a novel joint caching and non-orthogonal multiple access (NOMA) scheme to facilitate advanced downlink transmission for next generation cellular networks. In addition to reaping the conventional advantages of caching and NOMA transmission, the proposed cache-aided NOMA scheme also exploits cached data for interference cancellation which is not possible with separate caching and NOMA transmission designs. Furthermore, as caching can help to reduce the residual interference power, several decoding orders are feasible at the receivers, and these decoding orders can be flexibly selected for performance optimization. We characterize the achievable rate region of cache-aided NOMA and investigate its benefits for minimizing the time required to complete video file delivery. Our simulation results reveal that, compared to several baseline schemes, the proposed cache-aided NOMA scheme significantly expands the achievable rate region for downlink transmission, which translates into substantially reduced file delivery times.
• ### Secure Video Streaming in Heterogeneous Small Cell Networks with Untrusted Cache Helpers(1707.08050)

Jan. 29, 2018 cs.IT, math.IT
This paper studies secure video streaming in cache-enabled small cell networks, where some of the cache-enabled small cell base stations (BSs) helping in video delivery are untrusted. Unfavorably, caching improves the eavesdropping capability of these untrusted helpers as they may intercept both the cached and the delivered video files. To address this issue, we propose joint caching and scalable video coding (SVC) of video files to enable secure cooperative multiple-input multiple-output (MIMO) transmission and, at the same time, exploit the cache memory of both the trusted and untrusted BSs for improving the system performance. Considering imperfect channel state information (CSI) at the transmitters, we formulate a two-timescale non-convex mixed-integer robust optimization problem to minimize the total transmit power required for guaranteeing the quality of service (QoS) and secrecy during video streaming. We develop an iterative algorithm based on a modified generalized Benders decomposition (GBD) to solve the problem optimally, where the caching and the cooperative transmission policies are determined via offline (long-timescale) and online (short-timescale) optimization, respectively. Furthermore, inspired by the optimal algorithm, a low-complexity suboptimal algorithm based on a greedy heuristic is proposed. Simulation results show that the proposed schemes achieve significant gains in power efficiency and secrecy performance compared to several baseline schemes.
• ### Spectral and Energy Efficient Wireless Powered IoT Networks: NOMA or TDMA?(1801.09109)

Jan. 27, 2018 cs.IT, math.IT
Wireless powered communication networks (WPCNs), where multiple energy-limited devices first harvest energy in the downlink and then transmit information in the uplink, have been envisioned as a promising solution for the future Internet-of-Things (IoT). Meanwhile, non-orthogonal multiple access (NOMA) has been proposed to improve the system spectral efficiency (SE) of the fifth-generation (5G) networks by allowing concurrent transmissions of multiple users in the same spectrum. As such, NOMA has been recently considered for the uplink of WPCNs based IoT networks with a massive number of devices. However, simultaneous transmissions in NOMA may also incur more transmit energy consumption as well as circuit energy consumption in practice which is critical for energy constrained IoT devices. As a result, compared to orthogonal multiple access schemes such as time-division multiple access (TDMA), whether the SE can be improved and/or the total energy consumption can be reduced with NOMA in such a scenario still remains unknown. To answer this question, we first derive the optimal time allocations for maximizing the SE of a TDMA-based WPCN (T-WPCN) and a NOMA-based WPCN (N-WPCN), respectively. Subsequently, we analyze the total energy consumption as well as the maximum SE achieved by these two networks. Surprisingly, it is found that N-WPCN not only consumes more energy, but also is less spectral efficient than T-WPCN. Simulation results verify our theoretical findings and unveil the fundamental performance bottleneck, i.e., "worst user bottleneck problem", in multiuser NOMA systems.
• ### Data-Aided Secure Massive MIMO Transmission with Active Eavesdropping(1801.07076)

Jan. 22, 2018 cs.IT, math.IT
In this paper, we study the design of secure communication for time division duplexing multi-cell multi-user massive multiple-input multiple-output (MIMO) systems with active eavesdropping. We assume that the eavesdropper actively attacks the uplink pilot transmission and the uplink data transmission before eavesdropping the downlink data transmission phase of the desired users. We exploit both the received pilots and data signals for uplink channel estimation. We show analytically that when the number of transmit antennas and the length of the data vector both tend to infinity, the signals of the desired user and the eavesdropper lie in different eigenspaces of the received signal matrix at the base station if their signal powers are different. This finding reveals that decreasing (instead of increasing) the desire user's signal power might be an effective approach to combat a strong active attack from an eavesdropper. Inspired by this result, we propose a data-aided secure downlink transmission scheme and derive an asymptotic achievable secrecy sum-rate expression for the proposed design. Numerical results indicate that under strong active attacks, the proposed design achieves significant secrecy rate gains compared to the conventional design employing matched filter precoding and artificial noise generation.
• ### Resource Allocation for Solar Powered UAV Communication Systems(1801.07188)

Jan. 22, 2018 cs.IT, math.IT
In this paper, we investigate the resource allocation design for multicarrier (MC) systems employing a solar powered unmanned aerial vehicle (UAV) for providing communication services to multiple downlink users. We study the joint design of the three-dimensional positioning of the UAV and the power and subcarrier allocation for maximization of the system sum throughput. The algorithm design is formulated as a mixed-integer non-convex optimization problem, which requires a prohibitive computational complexity for obtaining the globally optimal solution. Therefore, a low-complexity suboptimal iterative solution based on successive convex approximation is proposed. Simulation results confirm that the proposed suboptimal algorithm achieves a substantially higher system sum throughput compared to several baseline schemes.
• ### NOMA Assisted Wireless Caching: Strategies and Performance Analysis(1709.06951)

Jan. 19, 2018 cs.IT, math.IT
Conventional wireless caching assumes that content can be pushed to local caching infrastructure during off-peak hours in an error-free manner; however, this assumption is not applicable if local caches need to be frequently updated via wireless transmission. This paper investigates a new approach to wireless caching for the case when cache content has to be updated during on-peak hours. Two non-orthogonal multiple access (NOMA) assisted caching strategies are developed, namely the push-then-deliver strategy and the push-and-deliver strategy. In the push-then-deliver strategy, the NOMA principle is applied to push more content files to the content servers during a short time interval reserved for content pushing in on-peak hours and to provide more connectivity for content delivery, compared to the conventional orthogonal multiple access (OMA) strategy. The push-and-deliver strategy is motivated by the fact that some users' requests cannot be accommodated locally and the base station has to serve them directly. These events during the content delivery phase are exploited as opportunities for content pushing, which further facilitates the frequent update of the files cached at the content servers. It is also shown that this strategy can be straightforwardly extended to device-to-device caching, and various analytical results are developed to illustrate the superiority of the proposed caching strategies compared to OMA based schemes.
• ### Performance Analysis of Near-Optimal Energy Buffer Aided Wireless Powered Communication(1703.02328)

Oct. 11, 2017 cs.IT, math.IT
In this paper, we consider a wireless powered communication system, where an energy harvesting (EH) node harvests energy from a radio frequency (RF) signal broadcasted by an access point (AP) in the downlink (DL). The node stores the harvested energy in an energy buffer and uses the stored energy to transmit data to the AP in the uplink (UL). We investigate two simple online transmission policies for the EH node, namely a best-effort policy and an on-off policy, which do not require knowledge of the EH profile nor channel knowledge. In particular, for both policies, the EH node transmits in each time slot with a constant desired power if sufficient energy is available in its energy buffer. Otherwise, the node transmits with the maximum possible power in the best-effort policy and remains silent in the on-off policy. For both policies, we use the theory of discrete-time continuous-state Markov chains to analyze the limiting distribution of the stored energy for finite- and infinite-size energy buffers. We provide this limiting distribution in closed form for a Nakagami-m fading DL channel and analyze the outage probability for a Nakagami-m fading UL channel. All derived analytical results are not limited to EH via RF WPT but are applicable for any independent and identically distributed EH process, originating from e.g. solar and wind energy. Our results reveal that, for low outage probabilities, the best-effort policy is superior to the on-off policy and the optimal constant UL transmit power of the EH node that minimizes the outage probability is always less than the average harvested power but increases with the capacity of the energy buffer. The opposite behaviour is observed for high outage probabilities. Furthermore, we show that the minimum outage probability of the two proposed policies closely approaches the outage probability of the optimal offline power allocation policy.
• ### Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems(1710.01391)

Oct. 3, 2017 cs.IT, math.IT
In this paper, we study the resource allocation algorithm design for multiple-input single-output (MISO) multicarrier non-orthogonal multiple access (MC-NOMA) systems, in which a full-duplex base station serves multiple half-duplex uplink and downlink users on the same subcarrier simultaneously. The resource allocation is optimized for maximization of the weighted system throughput while the information leakage is constrained and artificial noise is injected to guarantee secure communication in the presence of multiple potential eavesdroppers. To this end, we formulate a robust non-convex optimization problem taking into account the imperfect channel state information (CSI) of the eavesdropping channels and the quality-of-service (QoS) requirements of the legitimate users. Despite the non-convexity of the optimization problem, we solve it optimally by applying monotonic optimization which yields the optimal beamforming, artificial noise design, subcarrier allocation, and power allocation policy. The optimal resource allocation policy serves as a performance benchmark since the corresponding monotonic optimization based algorithm entails a high computational complexity. Hence, we also develop a low-complexity suboptimal resource allocation algorithm which converges to a locally optimal solution. Our simulation results reveal that the performance of the suboptimal algorithm closely approaches that of the optimal algorithm. Besides, the proposed optimal MISO NOMA system can not only ensure downlink and uplink communication security simultaneously but also provides a significant system secrecy rate improvement compared to traditional MISO orthogonal multiple access (OMA) systems and two other baseline schemes.
• ### Non-Orthogonal Multiple Access for FSO Backhauling(1710.05702)

Sept. 30, 2017 eess.SP
We consider a free space optical (FSO) backhauling system which consists of two base stations (BSs) and one central unit (CU). We propose to employ non-orthogonal multiple access (NOMA) for FSO backhauling where both BSs transmit at the same time and in the same frequency band to the same photodetector at the CU. We develop a dynamic NOMA scheme which determines the optimal decoding order as a function of the channel state information at the CU and the quality of service requirements of the BSs, such that the outage probabilities of both BSs are jointly minimized. Moreover, we analyze the performance of the proposed NOMA scheme in terms of the outage probability over Gamma-Gamma FSO turbulence channels. We further derive closed-form expressions for the outage probability for the high signal-to-noise ratio regime. Our simulation results confirm the analytical derivations and reveal that the proposed dynamic NOMA scheme significantly outperforms orthogonal transmission and existing NOMA schemes.
• ### Molecular Communication using Magnetic Nanoparticles(1704.04206)

Sept. 28, 2017 cs.IT, math.IT, cs.ET
In this paper, we propose to use magnetic nanoparticles as information carriers for molecular communication. This enables the use of an external magnetic field to guide information-carrying particles towards the receiver. We show that the particle movement can be mathematically modeled as diffusion with drift. Thereby, we reveal that the key parameters determining the magnetic force are particle size and magnetic field gradient. As an example, we consider magnetic nanoparticle based communication in a bounded two-dimensional environment. For this model, we derive an analytical expression for the channel impulse response subject to fluid flow and magnetic drift. Furthermore, adopting the symbol error rate as performance metric, we show that using magnetic nanoparticles facilitates reliable communication, even in the presence of fluid flow.
• ### Power-Efficient and Secure WPCNs with Hardware Impairments and Non-Linear EH Circuit(1709.04231)

Sept. 13, 2017 cs.IT, math.IT
In this paper, we design a robust resource allocation algorithm for a wireless-powered communication network (WPCN) taking into account residual hardware impairments (HWIs) at the transceivers, the imperfectness of the channel state information, and the non-linearity of practical radio frequency energy harvesting circuits. In order to ensure power-efficient secure communication, physical layer security techniques are exploited to deliberately degrade the channel quality of a multiple-antenna eavesdropper. The resource allocation algorithm design is formulated as a non-convex optimization problem for minimization of the total consumed power in the network, while guaranteeing the quality of service of the information receivers in terms of secrecy rate. The globally optimal solution of the optimization problem is obtained via a two-dimensional search and semidefinite programming relaxation. To strike a balance between computational complexity and system performance, a low-complexity iterative suboptimal resource allocation algorithm is then proposed. Numerical results demonstrate that both the proposed optimal and suboptimal schemes can significantly reduce the total system power consumption required for guaranteeing secure communication, and unveil the impact of HWIs on the system performance: (1) residual HWIs create a system performance bottleneck in the high transmit/receive power regimes; (2) increasing the number of transmit antennas can effectively reduce the system power consumption and alleviate the performance degradation due to residual HWIs; (3) imperfect CSI increases the system power consumption and exacerbates the impact of residual HWIs.
• ### Symbol Synchronization for Diffusion-Based Molecular Communications(1709.00444)

Sept. 1, 2017 cs.IT, math.IT
Symbol synchronization refers to the estimation of the start of a symbol interval and is needed for reliable detection. In this paper, we develop several symbol synchronization schemes for molecular communication (MC) systems where we consider some practical challenges which have not been addressed in the literature yet. In particular, we take into account that in MC systems, the transmitter may not be equipped with an internal clock and may not be able to emit molecules with a fixed release frequency. Such restrictions hold for practical nanotransmitters, e.g. modified cells, where the lengths of the symbol intervals may vary due to the inherent randomness in the availability of food and energy for molecule generation, the process for molecule production, and the release process. To address this issue, we develop two synchronization-detection frameworks which both employ two types of molecule. In the first framework, one type of molecule is used for symbol synchronization and the other one is used for data detection, whereas in the second framework, both types of molecule are used for joint symbol synchronization and data detection. For both frameworks, we first derive the optimal maximum likelihood (ML) symbol synchronization schemes as performance upper bounds. Since ML synchronization entails high complexity, for each framework, we also propose three low-complexity suboptimal schemes, namely a linear filter-based scheme, a peak observation-based scheme, and a threshold-trigger scheme which are suitable for MC systems with limited computational capabilities. Furthermore, we study the relative complexity and the constraints associated with the proposed schemes and the impact of the insertion and deletion errors that arise due to imperfect synchronization.
• ### Non-Coherent Detection for Diffusive Molecular Communications(1707.08926)

July 27, 2017 cs.IT, math.IT
We study non-coherent detection schemes for molecular communication (MC) systems that do not require knowledge of the channel state information (CSI). In particular, we first derive the optimal maximum likelihood (ML) multiple-symbol (MS) detector for MC systems. As a special case of the optimal MS detector, we show that the optimal ML symbol-by-symbol (SS) detector can be equivalently written in the form of a threshold-based detector, where the optimal decision threshold is constant and depends only on the statistics of the MC channel. The main challenge of the MS detector is the complexity associated with the calculation of the optimal detection metric. To overcome this issue, we propose an approximate MS detection metric which can be expressed in closed form. To reduce complexity even further, we develop a non-coherent decision-feedback (DF) detector and a suboptimal blind detector. Finally, we derive analytical expressions for the bit error rate (BER) of the optimal SS detector, as well as upper and lower bounds for the BER of the optimal MS detector. Simulation results confirm the analysis and reveal the effectiveness of the proposed optimal and suboptimal detection schemes compared to a benchmark scheme that assumes perfect CSI knowledge, particularly when the number of observations used for detection is sufficiently large.
• ### Resource Allocation for MC-NOMA Systems with Cognitive Relaying(1707.06483)

July 20, 2017 cs.IT, math.IT
In this paper, we investigate the resource allocation algorithm design for cooperative cognitive relaying multicarrier non-orthogonal multiple access (MC-NOMA) systems. In particular, the secondary base station serves multiple secondary users and simultaneously acts as a relay assisting the information transmission in the primary network. The resource allocation aims to maximize the weighted system throughput by jointly optimizing the power and subcarrier allocation for both the primary and the secondary networks while satisfying the quality-of-service requirements of the primary users. The algorithm design is formulated as a mixed combinatorial non-convex optimization problem. We apply monotonic optimization theory to solve the problem leading to an optimal resource allocation policy. Besides, we develop a low-complexity scheme to find a suboptimal solution. Our simulation results reveal that the performance of the proposed suboptimal algorithm closely approaches that of the optimal one. Besides, the combination of MC-NOMA and cognitive relaying improves the system throughput considerably compared to conventional multicarrier cognitive relaying systems.
• ### A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends(1706.05347)

June 16, 2017 cs.IT, math.IT
Non-orthogonal multiple access (NOMA) is an essential enabling technology for the fifth generation (5G) wireless networks to meet the heterogeneous demands on low latency, high reliability, massive connectivity, improved fairness, and high throughput. The key idea behind NOMA is to serve multiple users in the same resource block, such as a time slot, subcarrier, or spreading code. The NOMA principle is a general framework, and several recently proposed 5G multiple access schemes can be viewed as special cases. This survey provides an overview of the latest NOMA research and innovations as well as their applications. Thereby, the papers published in this special issue are put into the content of the existing literature. Future research challenges regarding NOMA in 5G and beyond are also discussed.
• ### SCW Codes for Maximum Likelihood Detection in Diffusive Molecular Communications without Channel State Information(1706.02171)

June 6, 2017 cs.IT, math.IT
Instantaneous or statistical channel state information (CSI) is needed for most detection schemes developed for molecular communication (MC) systems. Since the MC channel changes over time, e.g., due to variations in the velocity of flow, the temperature, or the distance between transmitter and receiver, CSI acquisition has to be conducted repeatedly to keep track of CSI variations. Frequent CSI acquisition may entail a large overhead whereas infrequent CSI acquisition may result in a low CSI estimation accuracy. To overcome these challenges, we design codes which enable maximum likelihood sequence detection at the receiver without instantaneous or statistical CSI. In particular, assuming concentration shift keying modulation, we show that a class of codes, referred to as strongly constant-weight (SCW) codes, enables optimal CSI-free sequence detection at the expense of a decrease in data rate. For the proposed SCW codes, we analyze the code rate, the error rate, and the average number of released molecules. In addition, we study the properties of binary SCW codes and balanced SCW codes in further detail. Simulation results verify our analytical derivations and reveal that SCW codes with CSI-free detection outperform uncoded transmission with optimal coherent and non-coherent detection.
• ### Deep Sensing: Cooperative Spectrum Sensing Based on Convolutional Neural Networks(1705.08164)

May 23, 2017 cs.NI
In this paper, we investigate cooperative spectrum sensing (CSS) in a cognitive radio network (CRN) where multiple secondary users (SUs) cooperate in order to detect a primary user (PU) which possibly occupies multiple bands simultaneously. Deep sensing, which constitutes the first CSS framework based on a convolutional neural network (CNN), is proposed. In deep sensing, instead of the explicit mathematical modeling of CSS, the optimal strategy for combining the individual sensing results of the SUs is obtained with a CNN based on training sensing samples. Accordingly, an environment-specific CSS is found in an adaptive manner regardless of whether the individual sensing results are quantized or not. Through simulation, we show that the performance of CSS can be significantly improved by the proposed deep sensing scheme, especially in the low signal-to-noise ratio (SNR) regime, even when the number of training samples is moderate.