ترغب بنشر مسار تعليمي؟ اضغط هنا

Physical Layer Service Integration in 5G: Potentials and Challenges

89   0   0.0 ( 0 )
 نشر من قبل Weidong Mei
 تاريخ النشر 2017
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can establish perfect security using only the characteristics of wireless medium. Nonetheless, to further increase the spectral efficiency, an emerging concept, termed physical-layer service integration (PHY-SI), has been recognized as an effective means. Its basic idea is to combine multiple coexisting services, i.e., multicast/broadcast service and confidential service, into one integral service for one-time transmission at the transmitter side. This article first provides a tutorial on typical PHY-SI models. Furthermore, we propose some state-of-the-art solutions to improve the overall performance of PHY-SI in certain important communication scenarios. In particular, we highlight the extension of several concepts borrowed from conventional single-service communications, such as artificial noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These techniques are shown to be effective in the design of reliable and robust PHY-SI schemes. Finally, several potential research directions are identified for future work.



قيم البحث

اقرأ أيضاً

Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.
Intelligent reflecting surface (IRS) has emerged as an appealing solution to enhance the wireless communication performance by reconfiguring the wireless propagation environment. In this paper, we propose to apply IRS to the physical-layer service in tegration (PHY-SI) system, where a single-antenna access point (AP) integrates two sorts of service messages, i.e., multicast message and confidential message, via superposition coding to serve multiple single-antenna users. Our goal is to optimize the power allocation (for transmitting different messages) at the AP and the passive beamforming at the IRS to maximize the achievable secrecy rate region. To this end, we formulate this problem as a bi-objective optimization problem, which is shown equivalent to a secrecy rate maximization problem subject to the constraints on the quality of multicast service. Due to the non-convexity of this problem, we propose two customized algorithms to obtain its high-quality suboptimal solutions, thereby approximately characterizing the secrecy rate region. The resulting performance gap with the globally optimal solution is analyzed. Furthermore, we provide theoretical analysis to unveil the impact of IRS beamforming on the performance of PHY-SI. Numerical results demonstrate the advantages of leveraging IRS in improving the performance of PHY-SI and also validate our theoretical analysis.
Unmanned aerial vehicle (UAV) wireless communications have experienced an upsurge of interest in both military and civilian applications, due to its high mobility, low cost, on-demand deployment, and inherent line-of-sight (LoS) air-to-ground channel s. However, these benefits also make UAV wireless communication systems vulnerable to malicious eavesdropping attacks. In this article, we aim to examine the physical layer security issues in UAV systems. In particular, passive and active eavesdroppings are two primary attacks in UAV systems. We provide an overview on emerging techniques, such as trajectory design, resource allocation, and cooperative UAVs, to fight against both types of eavesdroppings in UAV wireless communication systems. Moreover, the applications of non-orthogonal multiple access, multiple-input and multiple-output, and millimeter wave in UAV systems are also proposed to improve the system spectral efficiency and to guarantee security simultaneously. Finally, we discuss some potential research directions and challenges in terms of physical layer security in UAV systems.
71 - Yong Zeng , Jiangbin Lyu , 2018
Enabling high-rate, low-latency and ultra-reliable wireless communications between unmanned aerial vehicles (UAVs) and their associated ground pilots/users is of paramount importance to realize their large-scale usage in the future. To achieve this g oal, cellular-connected UAV, whereby UAVs for various applications are integrated into the cellular network as new aerial users, is a promising technology that has drawn significant attention recently. Compared to the conventional cellular communication with terrestrial users, cellular-connected UAV communication possesses substantially different characteristics that bring in new research challenges as well as opportunities. In this article, we provide an overview of this emerging technology, by firstly discussing its potential benefits, unique communication and spectrum requirements, as well as new design considerations. We then introduce promising technologies to enable the future generation of three-dimensional (3D) heterogeneous wireless networks with coexisting aerial and ground users. Last, we present simulation results to corroborate our discussions and highlight key directions for future research.
Although millimeter wave (mmWave) systems promise to offer larger bandwidth and unprecedented peak data rates, their practical implementation faces several hardware challenges compared to sub-6 GHz communication systems. These hardware constraints ca n seriously undermine the performance and deployment progress of mmWave systems and, thus, necessitate disruptive solutions in the cross-design of analog and digital modules. In this article, we discuss the importance of different hardware constraints and propose a novel system architecture, which is able to release these hardware constraints while achieving better performance for future millimeter wave communication systems. The characteristics of the proposed architecture are articulated in detail, and a representative example is provided to demonstrate its validity and efficacy.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا