
The rapid growth of IoT driven by recent advancements in consumer
electronics, 5G communication technologies, and cloudcomputing enabled
bigdata analytics, has recently attracted tremendous attention from both the
industry and academia. One of the major open challenges for IoT is the limited
network lifetime due to massive IoT devices being powered by batteries with
finite capacities. The lowpower and lowcomplexity backscatter communications
(BackCom), which simply relies on passive reflection and modulation of an
incident radiofrequency (RF) wave, has emerged to be a promising technology
for tackling this challenge. However, the contemporary BackCom has several
major limitations, such as short transmission range, low data rate, and
unidirectional information transmission. The article aims at introducing the
recent advances in the active area of BackCom. Specifically, we provide a
systematic introduction of the next generation BackCom covering basic
principles, systems, techniques besides IoT applications. Lastly, we describe
the IoT application scenarios with the next generation BackCom.

Covert communication aims to hide the very existence of wireless
transmissions in order to guarantee a strong security in wireless networks. In
this work, we examine the possibility and achievable performance of covert
communication in oneway relay networks. Specifically, the relay is greedy and
opportunistically transmits its own information to the destination covertly on
top of forwarding the source's message, while the source tries to detect this
covert transmission to discover the illegitimate usage of the resource (e.g.,
power, spectrum) allocated only for the purpose of forwarding source's
information. We propose two strategies for the relay to transmit its covert
information, namely fixedrate and fixedpower transmission schemes, for which
the source's detection limits are analysed in terms of the false alarm and miss
detection rates and the achievable effective covert rates from the relay to
destination are derived. Our examination determines the conditions under which
the fixedrate transmission scheme outperforms the fixedpower transmission
scheme, and vice versa, which enables the relay to achieve the maximum
effective covert rate. Our analysis indicates that the relay has to forward the
source's message to shield its covert transmission and the effective covert
rate increases with its forwarding ability (e.g., its maximum transmit power).

We consider a system that is composed of an energy constrained sensor node
and a sink node, and devise optimal data compression and transmission policies
with an objective to prolong the lifetime of the sensor node. While applying
compression before transmission reduces the energy consumption of transmitting
the sensed data, blindly applying too much compression may even exceed the cost
of transmitting raw data, thereby losing its purpose. Hence, it is important to
investigate the tradeoff between data compression and transmission energy
costs. In this paper, we study the joint optimal compressiontransmission
design in three scenarios which differ in terms of the available channel
information at the sensor node, and cover a wide range of practical situations.
We formulate and solve joint optimization problems aiming to maximize the
lifetime of the sensor node whilst satisfying specific delay and bit error rate
(BER) constraints. Our results show that a jointly optimized
compressiontransmission policy achieves significantly longer lifetime (90% to
2000%) as compared to optimizing transmission only without compression.
Importantly, this performance advantage is most profound when the delay
constraint is stringent, which demonstrates its suitability for low latency
communication in future wireless networks.

Considering Rayleigh fading channels, in this work we adopt channel inversion
power control to achieve covert communications, where a transmitter can
possibly hide itself from a warden while transmitting information to a
receiver. Specifically, we examine the performance of the achieved covert
communications in two scenarios in terms of the effective covert rate (ECR),
which quantifies the amount of information that the transmitter can reliably
convey to the receiver subject to the warden's detection error probability
being no less than some specific value. In the first scenario, the noise
uncertainty at the warden serves as the enabler of covert communications and
our examination shows that increasing the noise uncertainty at the warden and
the receiver simultaneously may not continuously improve the ECR. In the second
scenario, covert communications are aided by a fullduplex receiver, which
always transmits artificial noise (AN) with a random power. Our analysis
indicates that the achieved ECR approaches to an upper bound as the transmit
power of AN approaches to infinity. This work provides useful guidelines and
performance limits on achieving covert communications and potentially hiding a
transmitter in practical Rayleigh fading channels.

Locationaware communication systems are expected to play a pivotal part in
the next generation of mobile communication networks. Therefore, there is a
need to understand the localization limits in these networks, particularly,
using millimeterwave technology (mmWave). Towards that, we address the uplink
and downlink localization limits in terms of 3D position and orientation error
bounds for mmWave multipath channels. We also carry out a detailed analysis of
the dependence of the bounds of different systems parameters. Our key findings
indicate that the uplink and downlink behave differently in two distinct ways.
First of all, the error bounds have different scaling factors with respect to
the number of antennas in the uplink and downlink. Secondly, uplink
localization is sensitive to the orientation angle of the user equipment (UE),
whereas downlink is not. Moreover, in the considered outdoor scenarios, the
nonlineofsight paths generally improve localization when a lineofsight
path exists. Finally, our numerical results show that mmWave systems are
capable of localizing a UE with submeter position error, and subdegree
orientation error.

In this paper, we propose a novel splitting receiver, which involves joint
processing of coherently and noncoherently received signals. Using a passive
RF power splitter, the received signal at each receiver antenna is split into
two streams which are then processed by a conventional coherent detection (CD)
circuit and a powerdetection (PD) circuit, respectively. The streams of the
signals from all the receiver antennas are then jointly used for information
detection. We show that the splitting receiver creates a threedimensional
received signal space, due to the joint coherent and noncoherent processing.
We analyze the achievable rate of a splitting receiver, which shows that the
splitting receiver provides a rate gain of $3/2$ compared to either the
conventional (CDbased) coherent receiver or the PDbased noncoherent receiver
in the high SNR regime. We also analyze the symbol error rate (SER) for
practical modulation schemes, which shows that the splitting receiver achieves
asymptotic SER reduction by a factor of at least $\sqrt{M}1$ for $M$QAM
compared to either the conventional (CDbased) coherent receiver or the
PDbased noncoherent receiver.

Future InternetofThings (IoT) is expected to wirelessly connect billions of
lowcomplexity devices. For wireless information transfer (WIT) in IoT, high
density of IoT devices and their ad hoc communication result in strong
interference which acts as a bottleneck on WIT. Furthermore, battery
replacement for the massive number of IoT devices is difficult if not
infeasible, making wireless energy transfer (WET) desirable. This motivates:
(i) the design of fullduplex WIT to reduce latency and enable efficient
spectrum utilization, and (ii) the implementation of passive IoT devices using
backscatter antennas that enable WET from one device (reader) to another (tag).
However, the resultant increase in the density of simultaneous links
exacerbates the interference issue. This issue is addressed in this paper by
proposing the design of fullduplex backscatter communication (BackCom)
networks, where a novel multipleaccess scheme based on timehopping
spreadspectrum (THSS) is designed to enable both oneway WET and twoway WIT
in coexisting backscatter readertag links. Comprehensive performance analysis
of BackCom networks is presented in this paper, including forward/backward
biterror rates and WET efficiency and outage probabilities, which accounts for
energy harvesting at tags, noncoherent and coherent detection at tags and
readers, respectively, and the effects of asynchronous transmissions.

Covert communication aims to shield the very existence of wireless
transmissions in order to guarantee a strong security in wireless networks. In
this work, for the first time we examine the possibility and achievable
performance of covert communication in oneway relay networks. Specifically,
the relay opportunistically transmits its own information to the destination
covertly on top of forwarding the source's message, while the source tries to
detect this covert transmission to discover the illegitimate usage of the
recourse (e.g., power, spectrum) allocated only for the purpose of forwarding
source's information. The necessary condition that the relay can transmit
covertly without being detected is identified and the source's detection limit
is derived in terms of the false alarm and miss detection rates. Our analysis
indicates that boosting the forwarding ability of the relay (e.g., increasing
its maximum transmit power) also increases its capacity to perform the covert
communication in terms of achieving a higher effective covert rate subject to
some specific requirement on the source's detection performance.

To enable massive machine type communication (mMTC), data aggregation is a
promising approach to reduce the congestion caused by a massive number of
machine type devices (MTDs). In this work, we consider a twophase
cellularbased mMTC network where MTDs transmit to aggregators (i.e.,
aggregation phase) and the aggregated data is then relayed to base stations
(i.e., relaying phase). Due to the limited resources, the aggregators not only
aggregate data, but also schedule resources among MTDs. We consider two
scheduling schemes: random resource scheduling (RRS) and channelaware resource
scheduling (CRS). By leveraging the stochastic geometry, we present a tractable
analytical framework to investigate the signaltointerference ratio (SIR) for
each phase, thereby computing the MTD success probability, the average number
of successful MTDs and probability of successful channel utilization, which are
the key metrics characterizing the overall mMTC performance. Our numerical
results show that, although the CRS outperforms the RRS in terms of SIR at the
aggregation phase, the simpler RRS has almost the same performance as the CRS
for most cases with regards to the overall mMTC performance. Furthermore, the
provision of more resources at the aggregation phase is not always beneficial
to the mMTC performance.

A covert communication system under block fading channels is considered where
users experience uncertainty about their channel knowledge. The transmitter
seeks to hide the covert communication to a private user by exploiting a
legitimate public communication link while the warden tries to detect this
covert communication by using a radiometer. We derive the exact expression for
the radiometers optimal threshold which determines the performance limit of the
wardens detector. Furthermore for given transmission outage constraints the
achievable rates for legitimate and covert users are analyzed while maintaining
a specific level of covertness. Our numerical results illustrate how the
achievable performance is affected by the channel uncertainty and required
level of covertness.

Covert communication is to achieve a reliable transmission from a transmitter
to a receiver while guaranteeing an arbitrarily small probability of this
transmission being detected by a warden. In this work, we study the covert
communication in AWGN channels with finite blocklength, in which the number of
channel uses is finite. Specifically, we analytically prove that the entire
block (all available channel uses) should be utilized to maximize the effective
throughput of the transmission subject to a predetermined covert requirement.
This is a nontrivial result because more channel uses results in more
observations at the warden for detecting the transmission. We also determine
the maximum allowable transmit power per channel use, which is shown to
decrease as the blocklength increases. Despite the decrease in the maximum
allowable transmit power per channel use, the maximum allowable total power
over the entire block is proved to increase with the blocklength, which leads
to the fact that the effective throughput increases with the blocklength.

Prior studies on covert communication with noise uncertainty adopted a
worstcase approach from the warden's perspective. That is, the worstcase
detection performance of the warden is used to assess covertness, which is
overly optimistic. Instead of simply considering the worst limit, in this work,
we take the distribution of noise uncertainty into account to evaluate the
overall covertness in a statistical sense. Specifically, we define new metrics
for measuring the covertness, which are then adopted to analyze the maximum
achievable rate for a given covertness requirement under both bounded and
unbounded noise uncertainty models.

This paper studies a wireless network consisting of multiple
transmitterreceiver pairs sharing the same spectrum where interference is
regarded as noise. Previously, the throughput region of such a network was
characterized for either one time slot or an infinite time horizon. This work
aims to close the gap by investigating the throughput region for transmissions
over a finite time horizon. We derive an efficient algorithm to examine the
achievability of any given rate in the finitehorizon throughput region and
provide the rateachieving policy. The computational efficiency of our
algorithm comes from the use of A* search with a carefully chosen heuristic
function and a tree pruning strategy. We also show that the celebrated
maxweight algorithm which finds all achievable rates in the infinitehorizon
throughput region fails to work for the finitehorizon throughput region.

This paper studies an online algorithm for an energy harvesting transmitter,
where the transmission (completion) time is considered as the system
performance. Unlike the existing online algorithms which more or less require
the knowledge on the future behavior of the energyharvesting rate, we consider
a practical but significantly more challenging scenario where the
energyharvesting rate is assumed to be totally unknown. Our design is
formulated as a robustoptimal control problem which aims to optimize the
worstcase performance. The transmit power is designed only based on the
current battery energy level and the data queue length directly monitored by
the transmitter itself. Specifically, we apply an eventtrigger approach in
which the transmitter continuously monitors the battery energy and triggers an
event when a significant change occurs. Once an event is triggered, the
transmit power is updated according to the solution to the robustoptimal
control problem, which is given in a simple analytic form. We present numerical
results on the transmission time achieved by the proposed design and
demonstrate its robustoptimality.

This work for the first time examines the impact of transmitterside
correlation on the artificialnoiseaided secure transmission, based on which a
new power allocation strategy for artificial noise (AN) is devised for physical
layer security enhancement. Specifically, we design a correlationbased power
allocation (CPA) for AN, of which the optimality in terms of achieving the
minimum secrecy outage probability is analytically proved in the large system
regime with the number of transmit antennas approaching infinity. In order to
fully reveal the benefits of the CPA, we derive easytoevaluate expressions
for the secrecy outage probability achieved by the CPA. Our study demonstrates
that the CPA is nearly optimal and significantly outperforms the widelyused
uniform power allocation (UPA) even for a moderately small number of correlated
transmit antennas. Furthermore, our numerical results reveal a fundamental
difference between the CPA and UPA. That is when the number of correlated
transmit antennas increases, the secrecy outage probability of the CPA always
reduces while the secrecy outage probability of the UPA suffers from a
saturation point.

This paper studies a wireless network consisting of multiple
transmitterreceiver pairs where interference is treated as noise. Previously,
the throughput region of such networks was characterized for either one time
slot or an infinite time horizon. We aim to fill the gap by investigating the
throughput region for transmissions over a finite time horizon. Unlike the
infinitehorizon throughput region, which is simply the convex hull of the
throughput region of one time slot, the finitehorizon throughput region is
generally nonconvex. Instead of directly characterizing all achievable
ratetuples in the finitehorizon throughput region, we propose a metric termed
the rate margin, which not only determines whether any given ratetuple is
within the throughput region (i.e., achievable or unachievable), but also tells
the amount of scaling that can be done to the given achievable (unachievable)
ratetuple such that the resulting ratetuple is still within (brought back
into) the throughput region. Furthermore, we derive an efficient algorithm to
find the rateachieving policy for any given ratetuple in the finitehorizon
throughput region.

Underlay inband devicetodevice (D2D) communication can improve the
spectrum efficiency of cellular networks. However, the coexistence of D2D and
cellular users causes intercell and intracell interference. The former can be
effectively managed through intercell interference coordination and,
therefore, is not considered in this work. Instead, we focus on the intracell
interference and propose a D2D mode selection scheme to manage it inside a
finite cellular network region. The potential D2D users are controlled by the
base station (BS) to operate in D2D mode based on the average interference
generated to the BS. Using stochastic geometry, we study the outage probability
experienced at the BS and a D2D receiver, and spectrum reuse ratio, which
quantifies the average fraction of successfully transmitting D2D users. The
analysis shows that the outage probability at the D2D receiver varies for
different locations. Additionally, without impairing the performance at the BS,
if the pathloss exponent on the cellular link is slightly lower than that on
the D2D link, the spectrum reuse ratio can have negligible decrease while the
D2D users' average number of successful transmissions increases with increasing
D2D node density. This indicates that an increasing level of D2D communication
can be beneficial in future networks..

This paper investigates the offline packetdelayminimization problem for an
energy harvesting transmitter. To overcome the nonconvexity of the problem, we
propose a C2diffeomorphic transformation and provide the necessary and
sufficient condition for the transformed problem to a standard convex
optimization problem. Based on this condition, a simple choice of the
transformation is determined which allows an analytically tractable solution of
the original nonconvex problem to be easily obtained once the transformed
convex problem is solved. We further study the structure of the optimal
transmission policy in a special case and find it to follow a
weighteddirectionalwaterfilling structure. In particular, the optimal policy
tends to allocate more power in earlier time slots and less power in later time
slots. Our analytical insight is verified by simulation results.

Theoretical studies on physical layer security often adopt the secrecy outage
probability as the performance metric for wireless communications over
quasistatic fading channels. The secrecy outage probability has two
limitations from a practical point of view: a) it does not give any insight
into the eavesdropper's decodability of confidential messages; b) it cannot
characterize the amount of information leakage to the eavesdropper when an
outage occurs. Motivated by the limitations of the secrecy outage probability,
we propose three new secrecy metrics for secure transmissions over quasistatic
fading channels. The first metric establishes a link between the concept of
secrecy outage and the decodability of messages at the eavesdropper. The second
metric provides an errorprobabilitybased secrecy metric which is typically
used for the practical implementation of secure wireless systems. The third
metric characterizes how much or how fast the confidential information is
leaked to the eavesdropper. We show that the proposed secrecy metrics
collectively give a more comprehensive understanding of physical layer security
over fading channels and enable one to appropriately design secure
communication systems with different views on how secrecy is measured.

This paper proposes a centralized decision making framework at the macro base
station (MBS) for device to device (D2D) communication underlaying a twotier
cellular network. We consider a D2D pair in the presence of an MBS and a femto
access point, each serving a user, with quality of service constraints for all
users. Our proposed solution encompasses mode selection (choosing between
cellular or reuse or dedicated mode), resource allocation (in cellular and
dedicated mode) and power control (in reuse mode) within a single framework.
The framework prioritizes D2D dedicated mode if the D2D pair are close to each
other and orthogonal resources are available. Otherwise, it allows D2D reuse
mode if the D2D satisfies both the maximum distance and an additional
interference criteria. For reuse mode, we present a geometric vertex search
approach to solve the power allocation problem. We analytically prove the
validity of this approach and show that it achieves near optimal performance.
For cellular and dedicated modes, we show that frequency sharing maximizes sum
rate and solve the resource allocation problem in closed form. Our simulations
demonstrate the advantages of the proposed framework in terms of the
performance gains achieved in D2D mode.

Energy harvesting (EH) provides a means of greatly enhancing the lifetime of
wireless sensor nodes. However, the randomness inherent in the EH process may
cause significant delay for performing sensing operation and transmitting the
sensed information to the sink. Unlike most existing studies on the delay
performance of EH sensor networks, where only the energy consumption of
transmission is considered, we consider the energy costs of both sensing and
transmission. Specifically, we consider an EH sensor that monitors some status
environmental property and adopts a harvestthenuse protocol to perform
sensing and transmission. To comprehensively study the delay performance, we
consider two complementary metrics and analytically derive their statistics:
(i) update age  measuring the time taken from when information is obtained by
the sensor to when the sensed information is successfully transmitted to the
sink, i.e., how timely the updated information at the sink is, and (ii) update
cycle  measuring the time duration between two consecutive successful
transmissions, i.e., how frequently the information at the sink is updated. Our
results show that the consideration of sensing energy cost leads to an
important tradeoff between the two metrics: more frequent updates result in
less timely information available at the sink.

In this paper, we study the problem of secure routing in a multihop wireless
adhoc network in the presence of randomly distributed eavesdroppers.
Specifically, the locations of the eavesdroppers are modeled as a homogeneous
Poisson point process (PPP) and the sourcedestination pair is assisted by
intermediate relays using the decodeandforward (DF) strategy. We analytically
characterize the physical layer security performance of any chosen multihop
path using the endtoend secure connection probability (SCP) for both
colluding and noncolluding eavesdroppers. To facilitate finding an efficient
solution to secure routing, we derive accurate approximations of the SCP. Based
on the SCP approximations, we study the secure routing problem which is defined
as finding the multihop path having the highest SCP. A revised BellmanFord
algorithm is adopted to find the optimal path in a distributed manner.
Simulation results demonstrate that the proposed secure routing scheme achieves
nearly the same performance as exhaustive search.

In this paper, we propose to use a wirelesspowered friendly jammer to enable
secure communication between a source node and destination node, in the
presence of an eavesdropper. We consider a twophase communication protocol
with fixedrate transmission. In the first phase, wireless power transfer is
conducted from the source to the jammer. In the second phase, the source
transmits the informationbearing signal under the protection of a jamming
signal sent by the jammer using the harvested energy in the first phase. We
analytically characterize the longtime behavior of the proposed protocol and
derive a closedform expression for the throughput. We further optimize the
rate parameters for maximizing the throughput subject to a secrecy outage
probability constraint. Our analytical results show that the throughput
performance differs significantly between the singleantenna jammer case and
the multiantenna jammer case. For instance, as the source transmit power
increases, the throughput quickly reaches an upper bound with singleantenna
jammer, while the throughput grows unbounded with multiantenna jammer. Our
numerical results also validate the derived analytical results.

The existing research on physical layer security commonly assumes the number
of eavesdropper antennas to be known. Although this assumption allows one to
easily compute the achievable secrecy rate, it can hardly be realized in
practice. In this paper, we provide an innovative approach to study secure
communication systems without knowing the number of eavesdropper antennas by
introducing the concept of spatial constraint into physical layer security.
Specifically, the eavesdropper is assumed to have a limited spatial region to
place (possibly an infinite number of) antennas. From a practical point of
view, knowing the spatial constraint of the eavesdropper is much easier than
knowing the number of eavesdropper antennas. We derive the achievable secrecy
rates of the spatiallyconstrained system with and without friendly jamming. We
show that a nonzero secrecy rate is achievable with the help of a friendly
jammer, even if the eavesdropper places an infinite number of antennas in its
spatial region. Furthermore, we find that the achievable secrecy rate does not
monotonically increase with the jamming power, and hence, we obtain the
closedform solution of the optimal jamming power that maximizes the secrecy
rate.

In a mobile ad hoc network (MANET), effective prediction of timevarying
interferences can enable adaptive transmission designs and therefore improve
the communication performance. This paper investigates interference prediction
in MANETs with a finite number of nodes by proposing and using a generalorder
linear model for node mobility. The proposed mobility model can well
approximate node dynamics of practical MANETs. In contrast to previous studies
on interference statistics, we are able through this model to give a best
estimate of the timevarying interference at any time rather than longterm
average effects. Specifically, we propose a compound Gaussian point process
functional as a general framework to obtain analytical results on the mean
value and momentgenerating function of the interference prediction. With a
series form of this functional, we give the necessary and sufficient condition
for when the prediction is essentially equivalent to that from a Binomial Point
Process (BPP) network in the limit as time goes to infinity. These conditions
permit one to rigorously determine when the commonly used BPP approximations
are valid. Finally, our simulation results corroborate the effectiveness and
accuracy of the analytical results on interference prediction and also show the
advantages of our method in dealing with complex mobilities.