• ### When Exploiting Individual User Preference Is Beneficial for Caching at Base Stations(1801.03255)

March 2, 2018 cs.IT, math.IT
Most of prior works optimize caching policies based on the following assumptions: 1) every user initiates request according to content popularity, 2) all users are with the same active level, and 3) users are uniformly located in the considered region. In practice, these assumptions are often not true. In this paper, we explore the benefit of optimizing caching policies for base stations by exploiting user preference considering the spatial locality and different active level of users. We obtain optimal caching policies, respectively minimizing the download delay averaged over all file requests and user locations in the network (namely network average delay), and minimizing the maximal weighted download delay averaged over the file requests and location of each user (namely maximal weighted user average delay), as well as minimizing the weighted sum of both. The analysis and simulation results show that exploiting heterogeneous user preference and active level can improve user fairness, and can also improve network performance when users are with spatial locality.
• ### Energy-Efficient Resource Allocation in NOMA Heterogeneous Networks(1801.04552)

Jan. 14, 2018 cs.IT, math.IT
Non-orthogonal multiple access (NOMA) has attracted much recent attention owing to its capability for improving the system spectral efficiency in wireless communications. Deploying NOMA in heterogeneous network can satisfy users' explosive data traffic requirements, and NOMA will likely play an important role in the fifth-generation (5G) mobile communication networks. However, NOMA brings new technical challenges on resource allocation due to the mutual cross-tier interference in heterogeneous networks. In this article, to study the tradeoff between data rate performance and energy consumption in NOMA, we examine the problem of energy-efficient user scheduling and power optimization in 5G NOMA heterogeneous networks. The energy-efficient user scheduling and power allocation schemes are introduced for the downlink 5G NOMA heterogeneous network for perfect and imperfect channel state information (CSI) respectively. Simulation results show that the resource allocation schemes can significantly increase the energy efficiency of 5G NOMA heterogeneous network for both cases of perfect CSI and imperfect CSI.
• ### Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation(1801.04441)

Jan. 13, 2018 cs.IT, math.IT
Secure communication is a promising technology for wireless networks because it ensures secure transmission of information. In this paper, we investigate the joint subcarrier (SC) assignment and power allocation problem for non-orthogonal multiple access (NOMA) amplify-and-forward two-way relay wireless networks, in the presence of eavesdroppers. By exploiting cooperative jamming (CJ) to enhance the security of the communication link, we aim to maximize the achievable secrecy energy efficiency by jointly designing the SC assignment, user pair scheduling and power allocation. Assuming the perfect knowledge of the channel state information (CSI) at the relay station, we propose a low-complexity subcarrier assignment scheme (SCAS-1), which is equivalent to many-to-many matching games, and then SCAS-2 is formulated as a secrecy energy efficiency maximization problem. The secure power allocation problem is modeled as a convex geometric programming problem, and then solved by interior point methods. Simulation results demonstrate that the effectiveness of the proposed SSPA algorithms under scenarios of using and not using CJ, respectively.
• ### Secure Beamforming in Full-Duplex SWIPT Systems With Loopback Self-Interference Cancellation(1801.02609)

Jan. 8, 2018 cs.IT, math.IT, cs.NI
Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a secrecy rate maximization problem under energy transfer rate constraints. Although the secrecy rate maximization problem is non-convex, we solve it via semidefinite relaxation and a two-dimensional search. We prove the optimality of our proposed algorithm and demonstrate its performance via simulations.
• ### Fog Radio Access Networks: Mobility Management, Interference Mitigation and Resource Optimization(1707.06892)

July 20, 2017 cs.IT, math.IT
In order to make Internet connections ubiquitous and autonomous in our daily lives, maximizing the utilization of radio resources and social information is one of the major research topics in future mobile communication technologies. Fog radio access network (FRAN) is regarded as a promising paradigm for the fifth generation (5G) of mobile networks. FRAN integrates fog computing with RAN and makes full use of the edge of networks. FRAN would be different in networking, computing, storage and control as compared with conventional radio access networks (RAN) and the emerging cloud RAN. In this article, we provide a description of the FRAN architecture, and discuss how the distinctive characteristics of FRAN make it possible to efficiently alleviate the burden on the fronthaul, backhaul and backbone networks, as well as reduce content delivery latencies. We will focus on the mobility management, interference mitigation, and resource optimization in FRAN. Our simulation results show that the proposed FRAN architecture and the associated mobility and resource management mechanisms can reduce the signaling cost and increase the net utility for the RAN.
• ### Heterogeneous Services Provisioning in Small Cell Networks with Cache and Mobile Edge Computing(1706.09542)

June 29, 2017 cs.NI
In the area of full duplex (FD)-enabled small cell networks, limited works have been done on consideration of cache and mobile edge communication (MEC). In this paper, a virtual FD-enabled small cell network with cache and MEC is investigated for two heterogeneous services, high-data-rate service and computation-sensitive service. In our proposed scheme, content caching and FD communication are closely combined to offer high-data-rate services without the cost of backhaul resource. Computing offloading is conducted to guarantee the delay requirement of users. Then we formulate a virtual resource allocation problem, in which user association, power control, caching and computing offloading policies and resource allocation are jointly considered. Since the original problem is a mixed combinatorial problem, necessary variables relaxation and reformulation are conducted to transfer the original problem to a convex problem. Furthermore, alternating direction method of multipliers (ADMM) algorithm is adopted to obtain the optimal solution. Finally, extensive simulations are conducted with different system configurations to verify the effectiveness of the proposed scheme.
• ### Interference-Alignment and Soft-Space-Reuse Based Cooperative Transmission for Multi-cell Massive MIMO Networks(1706.05166)

June 16, 2017 cs.IT, math.IT
As a revolutionary wireless transmission strategy, interference alignment (IA) can improve the capacity of the cell-edge users. However, the acquisition of the global channel state information (CSI) for IA leads to unacceptable overhead in the massive MIMO systems. To tackle this problem, in this paper, we propose an IA and soft-space-reuse (IA-SSR) based cooperative transmission scheme under the two-stage precoding framework. Specifically, the cell-center and the cell-edge users are separately treated to fully exploit the spatial degrees of freedoms (DoF). Then, the optimal power allocation policy is developed to maximize the sum-capacity of the network. Next, a low-cost channel estimator is designed for the proposed IA-SSR framework. Some practical issues in IA-SSR implementation are also discussed. Finally, plenty of numerical results are presented to show the efficiency of the proposed algorithm.
• ### Base Station Selection for Massive MIMO Networks with Two-stage Precoding(1706.05179)

June 16, 2017 cs.IT, math.IT
The two-stage precoding has been proposed to reduce the overhead of both the channel training and the channel state information (CSI) feedback for the massive multiple-input multiple-output (MIMO) system. But the overlap of the angle-spreading-ranges (ASR) for different user clusters may seriously degrade the performance of the two-stage precoding. In this letter, we propose one ASR overlap mitigating scheme through the base station (BS) selection. Firstly, the BS selection is formulated as a sum signal-to-interference-plus-noise ratio (SINR) maximization problem. Then, the problem is solved by a low-complex algorithm through maximizing signal-to-leakage-plus-noise ratio (SLNR). In addition, we propose one low-overhead algorithm with the lower bound on the average SLNR as the objective function. Finally, we demonstrate the efficacy of the proposed schemes through the numerical simulations.
• ### Dynamic Resource Allocation in Next Generation Cellular Networks with Full-Duplex Self-backhauls(1611.06302)

Nov. 19, 2016 cs.NI
With the dense deployment of small cell networks, low-cost backhaul schemes for small cell base stations (SBSs) have attracted great attentions. Self-backhaul using cellular communication technology is considered as a promising solution. Although some excellent works have been done on self-backhaul in small cell networks, most of them do not consider the recent advances of full-duplex (FD) and massive multiple-input and multiple-output (MIMO) technologies. In this paper, we propose a self-backhaul scheme for small cell networks by combining FD and massive MIMO technologies. In our proposed scheme, the macro base station (MBS) is equipped with massive MIMO antennas, and the SBSs have the FD communication ability. By treating the SBSs as \textit{special} macro users, we can achieve the simultaneous transmissions of the access link of users and the backhaul link of SBSs in the same frequency. Furthermore, considering the existence of inter-tier and intra-tier interference, we formulate the power allocation problem of the MBS and SBSs as an optimization problem. Because the formulated power allocation problem is a non-convex problem, we transform the original problem into a difference of convex program (DCP) by successive convex approximation method (SCAM) and variable transformation, and then solve it using a constrained concave convex procedure (CCCP) based iterative algorithm. Finally, extensive simulations are conducted with different system configurations to verify the effectiveness of the proposed scheme.
• ### Performance Analysis of a Heterogeneous Traffic Scheduler using Large Deviation Principle(1510.04488)

April 6, 2016 cs.NI, cs.PF
In this paper, we study the stability of light traffic achieved by a scheduling algorithm which is suitable for heterogeneous traffic networks. Since analyzing a scheduling algorithm is intractable using the conventional mathematical tool, our goal is to minimize the largest queue-overflow probability achieved by the algorithm. In the large deviation setting, this problem is equivalent to maximizing the asymptotic decay rate of the largest queue-overflow probability. We first derive an upper bound on the decay rate of the queue overflow probability as the queue overflow threshold approaches infinity. Then, we study several structural properties of the minimum-cost-path to overflow of the queue with the largest length, which is basically equivalent to the decay rate of the largest queue-overflow probability. Given these properties, we prove that the queue with the largest length follows a sample path with linear increment. For certain parameter value, the scheduling algorithm is asymptotically optimal in reducing the largest queue length. Through numerical results, we have shown the large deviation properties of the queue length typically used in practice while varying one parameter of the algorithm.
• ### Distributed Virtual Resource Allocation in Small Cell Networks with Full Duplex Self-backhauls and Virtualization(1510.05746)

Oct. 20, 2015 cs.NI
Wireless network virtualization has attracted great attentions from both academia and industry. Another emerging technology for next generation wireless networks is in-band full duplex (FD) communications. Due to its promising performance, FD communication has been considered as an effective way to achieve self-backhauls for small cells. In this paper, we introduce wireless virtualization into small cell networks, and propose a virtualized small cell network architecture with FD self-backhauls. We formulate the virtual resource allocation problem in virtualized small cell networks with FD self-backhauls as an optimization problem. Since the formulated problem is a mixed combinatorial and non-convex optimization problem, its computational complexity is high. Moreover, the centralized scheme may suffer from signaling overhead, outdated dynamics information, and scalability issues. To solve it efficiently, we divide the original problem into two subproblems. For the first subproblem, we transfer it to a convex optimization problem, and then solve it by an efficient alternating direction method of multipliers (ADMM)-based distributed algorithm. The second subproblem is a convex problem, which can be solved by each infrastructure provider. Extensive simulations are conducted with different system configurations to show the effectiveness of the proposed scheme.
• ### Reinforcement Learning Based Transmission Strategy of Cognitive User in IEEE 802.11 based Networks(1510.04692)

Oct. 15, 2015 cs.NI
Traditional concept of cognitive radio is the coexistence of primary and secondary user in multiplexed manner. we consider the opportunistic channel access scheme in IEEE 802.11 based networks subject to the interference mitigation scenario. According to the protocol rule and due to the constraint of message passing, secondary user is unaware of the exact state of the primary user. In this paper, we have proposed an online algorithm for the secondary which assist determining a backoff counter or the decision of being idle for utilizing the time/frequency slot unoccupied by the primary user. Proposed algorithm is based on conventional reinforcement learning technique namely Q-Learning. Simulation has been conducted in order to prove the strength of this algorithm and also results have been compared with our contemporary solution of this problem where secondary user is aware of some states of primary user.
• ### Cooperative Interference Mitigation and Handover Management for Heterogeneous Cloud Small Cell Networks(1504.08076)

May 1, 2015 cs.IT, math.IT, cs.NI
Heterogeneous small cell network has attracted much attention to satisfy users' explosive data traffic requirements. Heterogeneous cloud small cell network (HCSNet), which combines cloud computing and heterogeneous small cell network, will likely play an important role in 5G mobile communication networks. However, with massive deployment of small cells, co-channel interference and handover management are two important problems in HCSNet, especially for cell edge users. In this article, we examine the problems of cooperative interference mitigation and handover management in HCSNet. A network architecture is described to combine cloud radio access network with small cells. An effective coordinated multi-point (CoMP) clustering scheme using affinity propagation is adopted to mitigate cell edge users' interference. A low complexity handover management scheme is presented, and its signaling procedure is analyzed in HCSNet. Numerical results show that the proposed network architecture, CoMP clustering scheme and handover management scheme can significantly increase the capacity of HCSNet while maintaining users' quality of service.
• ### Block-Level Unitary Query: Incorporating Orthogonal-like Space-time Code with Query Diversity for MIMO Backscatter RFID(1502.04933)

Feb. 17, 2015 cs.IT, math.IT
Because of the emerging field of Internet of Things (IoT), future backscatter RFID is required to be more reliable and data intensive. Motivated by this, orthogonal space-time block code (OSTBC), which is very successful in mobile communications for its low complexity and high performance, has already been investigated for backscatter RFID. On the other hand, a recently proposed scheme called unitary query was shown to be able to considerably improve the reliability of backscatter radio by exploiting query diversity. Therefore incorporating the classical OSTBC (at the tag end) with the recently proposed unitary query (at the query end) seems to be promising. However, in this paper, we show that simple, direct employment of OSTBC together with unitary query incurs a linear decoding problem and eventually leads to a severe performance degradation. As a re-design of the recently proposed unitary query and the classical OSTBC specifically for MIMO backscatter RFID, we present a BUTQ-mOSTBC design pair idea by proposing the block-level unitary query (BUTQ) at the query end and the corresponding modified OSTBC (mOSTBC) at the tag end. The proposed BUTQ-mOSTBC can resolve the linear decoding problem, keep the simplicity and high performance properties of the classical OSTBC, and achieve the query diversity for the $M \times L \times N$ MIMO backscatter RFID channel.
• ### Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques(1405.3725)

May 15, 2014 cs.IT, math.IT