• Fifth generation (5G) and beyond-5G (B5G) systems expect coverage and capacity enhancements along with the consideration of limited power, cost and spectrum. Densification of small cells (SCs) is a promising approach to cater these demands of 5G and B5G systems. However, such an ultra dense network of SCs requires provision of smart backhaul and fronthaul networks. In this paper, we employ a scalable idea of using networked flying platforms (NFPs) as aerial hubs to provide fronthaul connectivity to the SCs. We consider the association problem of SCs and NFPs in a SC network and study the effect of practical constraints related to the system and NFPs. Mainly, we show that the association problem is related to the generalized assignment problem (GAP). Using this relation with the GAP, we show the NP-hard complexity of the association problem and further derive an upper bound for the maximum achievable sum data rate. Linear Programming relaxation of the problem is also studied to compare the results with the derived bounds. Finally, two efficient (less complex) greedy solutions of the association problem are presented, where one of them is a distributed solution and the other one is its centralized version. Numerical results show a favorable performance of the presented algorithms with respect to the exhaustive search and derived bounds. The computational complexity comparison of the algorithms with the exhaustive search is also presented to show that the presented algorithms can be practically implemented.
  • We propose a new one-bit feedback scheme with scheduling decision based on the maximum expected weighted rate. We show the concavity of the $2$-user case and provide the optimal solution which achieves the maximum weighted rate of the users. For the general asymmetric M-user case, we provide a heuristic method to achieve the maximum expected weighted rate. We show that the sum rate of our proposed scheme is very close to the sum rate of the full channel state information case, which is the upper bound performance.
  • 5G+ systems expect enhancement in data rate and coverage area under limited power constraint. Such requirements can be fulfilled by the densification of small cells (SCs). However, a major challenge is the management of fronthaul links connected with an ultra dense network of SCs. A cost effective and scalable idea of using network flying platforms (NFPs) is employed here, where the NFPs are used as fronthaul hubs that connect the SCs to the core network. The association problem of NFPs and SCs is formulated considering a number of practical constraints such as backhaul data rate limit, maximum supported links and bandwidth by NFPs and quality of service requirement of the system. The network centric case of the system is considered that aims to maximize the number of associated SCs without any biasing, i.e., no preference for high priority SCs. Then, two new efficient greedy algorithms are designed to solve the presented association problem. Numerical results show a favorable performance of our proposed methods in comparison to exhaustive search.
  • The densification of small-cell base stations in a 5G architecture is a promising approach to enhance the coverage area and facilitate the ever increasing capacity demand of end users. However, the bottleneck is an intelligent management of a backhaul/fronthaul network for these small-cell base stations. This involves efficient association and placement of the backhaul hubs that connects these small-cells with the core network. Terrestrial hubs suffer from an inefficient non line of sight link limitations and unavailability of a proper infrastructure in an urban area. Seeing the popularity of flying platforms, we employ here an idea of using networked flying platform (NFP) such as unmanned aerial vehicles (UAVs), drones, unmanned balloons flying at different altitudes, as aerial backhaul hubs. The association problem of these NFP-hubs and small-cell base stations is formulated considering backhaul link and NFP related limitations such as maximum number of supported links and bandwidth. Then, this paper presents an efficient and distributed solution of the designed problem, which performs a greedy search in order to maximize the sum rate of the overall network. A favorable performance is observed via a numerical comparison of our proposed method with optimal exhaustive search algorithm in terms of sum rate and run-time speed.
  • In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is when each node has two unicast messages to be delivered to the two other nodes, while the second configuration is when each node has two unicast messages as well as one broadcast message to be delivered to the two other nodes. For each configuration, we first derive upper bounds on the total DoF of the system. Cut-set bounds in conjunction with genie-aided bounds are derived to characterize the achievable total DoF. Afterwards, we analytically derive the optimal number of transmit and receive antennas at each node to maximize the total DoF of the system, subject to the total number of antennas at each node. Finally, the achievable schemes for each configuration are constructed. The proposed schemes are mainly based on zero-forcing and null-space transmit beamforming.
  • In this paper, we consider the two-user single-input single-output (SISO) X-channel and $K$-user SISO X-network in fast fading environment. It is assumed that the transmitters have access to synergistic alternating channel state information (CSI). Specifically, the CSIT alternates between three states, namely, perfect, delayed and no-CSIT, in a certain manner to enable these states to work together cooperatively. These states are associated with fractions of time denoted by $\lambda_P$, $\lambda_D$ \text{and} $\lambda_N$, respectively. For the two-user $X$-channel, simple upper bound is developed to prove the tightness of the achievability result of $4/3$ DoF under a certain distribution of the availability of three CSIT states for $\Lambda(\lambda_P=1/3, \lambda_D= 1/3, \lambda_N=1/3)$. For the $K$-user $X$-network, it is shown that the sum Degrees of freedom (DoF) is at least $2K/(K + 1)$, using two-phase transmission schemes over finite symbols channel extension and under the same distribution of the availability of $\Lambda(\lambda_P=1/3, \lambda_D= 1/3, \lambda_N=1/3)$.This achievability result, can be considered as a tight lower bound, coincides with the best lower bound known for the same network but with partial output feedback in stead of alternating CSIT. Hence, we show that the role of synergistic alternating CSIT with distribution $\Lambda(1/3,1/3,1/3)$ is equivalent to the partial output feedback. Also, this lower bound is strictly better than the best lower bound known for the case of delayed CSI assumption for all values of $K$. All the proposed transmission schemes are based on two phases transmission strategy, namely, interference creation and interference resurrection, which exploit the synergy of instantaneous CSI and delay CSIT to retrospectively align interference in the subsequent channel uses.
  • We investigate the secure degrees of freedom (SDoF) of the K-user MIMO multiple access (MAC) and the two user MIMO interference channel. An unknown number of eavesdroppers are trying to decode the messages sent by the transmitters. Each eavesdropper is equipped with a number of antennas less than or equal to a known value NE. The legitimate transmitters and receivers are assumed to have global channel knowledge. We present the sum SDoF of the two user MIMO interference channel. We derive an upperbound on the sum SDoF of the K-user MAC channel and present an achievable scheme that partially meets the derived upperbound.
  • We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each with a number of antennas less than or equal to a known value NE. The channel matrices between the legitimate transmitter and the receivers are available everywhere, while the legitimate pair have no information about the eavesdroppers' channels. We provide the exact sum SDoF for the considered system. A new comprehensive upperbound is deduced and a new achievable scheme based on utilizing jamming is exploited. We prove that cooperative jamming is SDoF optimal even without the eavesdropper CSI available at the transmitters.
  • We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, the legitimate receiver with the existence of an unknown number of eavesdroppers each with a number of antennas less than or equal to a known value $N_E$. The channel matrices between the legitimate transmitters and the receiver are available everywhere, while the legitimate pair does not know the eavesdroppers' channels matrices. We provide the exact sum SDoF for the considered system. A new comprehensive upperbound is deduced and a new achievable scheme based on utilizing jamming is exploited. We prove that Cooperative Jamming is SDoF optimal even without the instantaneous eavesdropper CSI available at the transmitters.
  • In full-duplex systems, oscillator phase noise (PN) problem is considered the bottleneck challenge that may face the self-interference cancellation (SIC) stage especially when orthogonal frequency division multiplexing (OFDM) transmission scheme is deployed. Phase noise degrades the SIC performance significantly, if not mitigated before or during the SIC technique. The presence of the oscillator phase noise has different impacts on the transmitted data symbol like common phase error (CPE) and inter-carrier interference (ICI). However, phase noise can be estimated and mitigated digitally in either time or frequency domain. Through this work, we propose a novel and simple time domain self-interference (SI) phase noise estimation and mitigation technique. The proposed algorithm is inspired from Wiener filtering in time domain. Simulation results show that the proposed algorithm has a superior performance than the already-existing time-domain or frequency domain PN mitigation solutions with a noticeable reduction in the computational complexity.
  • In this paper, we investigate the performance of multi-user diversity (MUD) with optimal power allocation (OPA) in spectrum sharing (SS) under average interference power (AIP) constraint. In particular, OPA through average transmit power constraint in conjunction with the AIP constraint is assumed to maximize the ergodic secondary capacity. The solution of this problem requires the calculation of two Lagrange multipliers instead of one as obtained for the peak interference power (PIP) constraint and calculated using the well known water-filling algorithm. To this end, an algorithm based on bisection method is devised in order to calculate both Lagrange multipliers iteratively. Moreover, Rayleigh and Nakagami-$m$ fading channels with one and multiple primary users are considered to derive the required end-to-end SNR analysis. Numerical results are depicted to corroborate our performance analysis and compare it with the PIP case highlighting hence, the impact of the AIP constraint compared to the PIP constraint application.
  • In this letter, we propose the interference cancellation through interference alignment at the downlink of cognitive cellular networks. Interference alignment helps the spatial resources to be shared among primary and secondary cells and thus, it can provide higher degrees of freedom through interference cancellation. We derive and depict the achievable degrees of freedom. We also analyse and calculate the achievable sum rates applying water-filling optimal power allocation.
  • In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable secret key generation. Estimation of almost all the existing physical layer characteristic suffer dramatically at low signal to noise (SNR) levels. In this paper, we propose a novel secret key generation algorithm that is based on the estimated angle of arrival (AoA) between the two legitimate nodes. Our algorithm has an outstanding performance at very low SNR levels. Our algorithm can exploit either the Azimuth AoA to generate the secret key or both the Azimuth and Elevation angles to generate the secret key. Exploiting a second common source of randomness adds an extra degree of freedom to the performance of our algorithm. We compare the performance of our algorithm to the algorithm that uses the most commonly used characteristics of the physical layer which are channel amplitude and phase. We show that our algorithm has a very low bit mismatch rate (BMR) at very low SNR when both channel amplitude and phase based algorithm fail to achieve an acceptable BMR.
  • We propose an intuitive, simple and hardware friendly, yet surprisingly novel and efficient, received signal's angle of arrival (AoA) estimation scheme. Our intuitive, two-phases cross-correlation based scheme relies on a switched beam antenna array, which is used to collect an omni-directional signal using few elements of the antenna array in the first phase. In the second phase, the scheme switches the main beam of the antenna array to scan the angular region of interest. The collected signal from each beam (direction or angle) is cross correlated with the omni-directional signal. The cross-correlation coefficient will be the highest at the correct AoA and relatively negligible elsewhere. The proposed scheme simplicity stems from its low computational complexity (only cross-correlation and comparison operations are required) and its independence of the transmitted signal structure (does not require information about the transmitted signal). The proposed scheme requires a receiver with switched beam antenna array, which can be attached to a single radio frequency chain through phase shifters, hence, its hardware friendliness. The high efficiency of our system can be observed by comparing its performance with the literature's best performing MUSIC algorithm. The comparison demonstrates that our scheme outperforms the MUSIC algorithm, specially at low SNR levels. Moreover, the number of sources that can be detected using our scheme is bound by the number of switched beams, rather than the number of antenna elements in the case of the MUSIC algorithm.
  • This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources, e.g., solar, wind and acoustic noise. We propose a probabilistic access strategy by the SU based on the number of packets at its energy queue. We investigate the effect of the energy arrival rate, the amount of energy per energy packet, and the capacity of the energy queue on the SU throughput under fading channels. Results reveal that the proposed access strategy can enhance the performance of the SU.
  • In this paper, we establish the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel with alternating channel state information at the transmitters (CSIT). Three cases are considered for the availability of CSIT; perfect, delayed and no-CSIT. Each state is associated with a fraction of time denoted by $\lambda_P, \lambda_D$ and $\lambda_N $, respectively. We provide new results for DoF of the two-user SISO X-channel when the available CSIT alternates between these three cases under a certain distribution $\Lambda(\lambda_P, \lambda_D, \lambda_N )$. Specifically, we show that the X-channel with alternating CSIT for $\Lambda(1/8, 3/8, 1/2)$ can achieve $5/4$ DoF. The interesting thing about $5/4$ is that it represents a position of compromise or a middle ground between the channel knowledge that transmitters need to steer interference and the degrees of freedom that the network can achieve. Moreover, $5/4$ is strictly greater than $6/5$ which is the upper bound for the X-channel with \textit{fixed} delayed CSIT.
  • This paper investigates the maximum secondary throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources and primary radio frequency (RF) transmissions. We propose a power allocation policy at the PU and analyze its effect on the throughput of both the PU and SU. Furthermore, we study the impact of the bursty arrivals at the PU on the energy harvested by the SU from RF transmissions. Moreover, we investigate the impact of the rate of energy harvesting from natural resources on the SU throughput. We assume fading channels and compute exact closed-form expressions for the energy harvested by the SU under fading. Results reveal that the proposed power allocation policy along with the implemented RF energy harvesting at the SU enhance the throughput of both primary and secondary links.
  • In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for storing its own packets and the other for storing the fraction of the undelivered primary packets accepted for relaying. The secondary source is assumed to be a battery-based node which harvests energy packets from the environment. In addition to its data queues, the SU has an energy queue to store the harvested energy packets. The secondary energy packets are used for primary packets decoding and data packets transmission. More specifically, if the secondary energy queue is empty, the secondary source can neither help the primary source nor transmit a packet from the data queues. The energy queue is modeled as a discrete time queue with Markov arrival and service processes. Due to the interaction of the queues, we provide inner and outer bounds on the stability region of the proposed system. We investigate the impact of the energy arrival rate on the stability region. Numerical results show the significant gain of cooperation.
  • In this work, we study the problem of band allocation of $M_s$ buffered secondary users (SUs) to $M_p$ primary bands licensed to (owned by) $M_p$ buffered primary users (PUs). The bands are assigned to SUs in an orthogonal (one-to-one) fashion such that neither band sharing nor multi-band allocations are permitted. In order to study the stability region of the secondary network, the optimization problem used to obtain the stability region's envelope (closure) is established and is shown to be a linear program which can be solved efficiently and reliably. We compare our orthogonal allocation system with two typical low-complexity and intuitive band allocation systems. In one system, each cognitive user chooses a band randomly in each time slot with some assignment probability designed such that the system maintained stable, while in the other system fixed (deterministic) band assignment is adopted throughout the lifetime of the network. We derive the stability regions of these two systems. We prove mathematically, as well as through numerical results, the advantages of our proposed orthogonal system over the other two systems.
  • In this paper, the 3-user Gaussian MIMO interference channel is considered. The asymmetric distribution of the DoF, where different users have different number of DoF, is studied. Two cases are presented, the first is when all transmitters and receivers have equal number of antennas $M$, the other when the transmitters have $M$ antennas each, while the receivers have $N$ antennas each. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. The region of the achievable DoF tuple $(d_1; d_2; d_3)$ is presented.
  • This paper considers a network in which a primary user (PU) may cooperate with a cognitive radio (CR) user for transmission of its data packets. The PU is assumed to be a buffered terminal operating in a time-slotted fashion. We develop two protocols which involve cooperation between primary and secondary users. To satisfy certain quality of service requirements, users share time slot duration and frequency bandwidth. Moreover, the secondary user (SU) may leverage the primary feedback signal. The proposed protocols are designed such that the secondary rate is maximized and the primary queueing delay is maintained less than the queueing delay in case of non-cooperative PU. In addition, the proposed protocols guarantee the stability of the primary queue and maintain the average energy emitted by the CR user below a certain value. The proposed protocols also provide more robust and potentially continuous service for SUs compared to the conventional practice in cognitive networks where SUs transmit in the spectrum holes and silence sessions of the PUs. We include primary source burstiness, sensing errors, and feedback reception errors to the analysis of the proposed cooperative cognitive protocols. Numerical results show the beneficial gains of the cooperative protocols in terms of secondary rate and primary throughput, queueing delay, and average energy savings.
  • In this paper, we propose a cognitive protocol that involves cooperation between the primary and secondary users. In addition to its own queue, the secondary user (SU) has a queue to store, and then relay, the undelivered primary packets. When the primary queue is nonempty, the SU remains idle and attempts to decode the primary packet. When the primary queue is empty, the SU splits the total channel bandwidth into two orthogonal subbands and assigns each to a queue probabilistically. We show the advantage of the proposed protocol over the prioritized cognitive relaying (PCR) protocol in which the SU assigns a priority in transmission to the primary packets over its own packets. We present two problem formulations, one based on throughput and the other on delay. Both optimization problems are shown to be linear programs for a given bandwidth assignment. Numerical results demonstrate the benefits of the proposed protocol.
  • In this paper, we consider a cognitive setting under the context of cooperative communications, where the cognitive radio (CR) user is assumed to be a self-organized relay for the network. The CR user and the PU are assumed to be energy harvesters. The CR user cooperatively relays some of the undelivered packets of the primary user (PU). Specifically, the CR user stores a fraction of the undelivered primary packets in a relaying queue (buffer). It manages the flow of the undelivered primary packets to its relaying queue using the appropriate actions over time slots. Moreover, it has the decision of choosing the used queue for channel accessing at idle time slots (slots where the PU's queue is empty). It is assumed that one data packet transmission dissipates one energy packet. The optimal policy changes according to the primary and CR users arrival rates to the data and energy queues as well as the channels connectivity. The CR user saves energy for the PU by taking the responsibility of relaying the undelivered primary packets. It optimally organizes its own energy packets to maximize its payoff as time progresses.
  • In this paper, we investigate the maximum throughput of a saturated rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU harvests energy packets (tokens) from the environment with a certain harvesting rate. All transmitters are assumed to have data buffers to store the incoming data packets. In addition to its own traffic buffer, the SU has a buffer for storing the admitted primary packets for relaying; and a buffer for storing the energy tokens harvested from the environment. We propose a new cooperative cognitive relaying protocol that allows the SU to relay a fraction of the undelivered primary packets. We consider an interference channel model (or a multipacket reception (MPR) channel model), where concurrent transmissions can survive from interference with certain probability characterized by the complement of channel outages. The proposed protocol exploits the primary queue burstiness and receivers' MPR capability. In addition, it efficiently expends the secondary energy tokens under the objective of secondary throughput maximization. Our numerical results show the benefits of cooperation, receivers' MPR capability, and secondary energy queue arrival rate on the system performance from a network layer standpoint.
  • In this paper, we propose a novel three-time-slot transmission scheme combined with an efficient embedded linear channel equalization (ELCE) technique for the Physical layer Network Coding (PNC). Our transmission scheme, we achieve about 33% increase in the spectral efficiency over the conventional two-time-slot scheme while maintaining the same end-toend BER performance.We derive an exact expression for the endto- end BER of the proposed three-time-slot transmission scheme combined with the proposed ELCE technique for BPSK transmission. Numerical results demonstrate that the exact expression for the end-to-end BER is consistent with the BER simulation results.