ترغب بنشر مسار تعليمي؟ اضغط هنا

Backscatter Cooperation in NOMA Communications Systems

107   0   0.0 ( 0 )
 نشر من قبل Weiyu Chen
 تاريخ النشر 2020
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

In this paper, a backscatter cooperation (BC) scheme is proposed for non-orthogonal multiple access (NOMA) downlink transmission. The key idea is to enable one user to split and then backscatter part of its received signals to improve the reception at another user. To evaluate the performance of the proposed BC-NOMA scheme, three benchmark schemes are introduced. They are the non-cooperation (NC)-NOMA scheme, the conventional relaying (CR)-NOMA scheme, and the incremental relaying (IR)-NOMA scheme. For all these schemes, the analytical expressions of the minimum total power to avoid information outage are derived, based on which their respective outage performance, expected rates, and diversity-multiplexing trade-off (DMT) are investigated. Analytical results show that the proposed BC-NOMA scheme strictly outperforms the NC-NOMA scheme in terms of all the three metrics. Furthermore, theoretical analyses are validated via Monte-Carlo simulations. It is shown that unlike the CR-NOMA scheme and the IR-NOMA scheme, the proposed BC-NOMA scheme can enhance the transmission reliability without impairing the transmission rate, which makes backscattering an appealing solution to cooperative NOMA downlinks.

قيم البحث

اقرأ أيضاً

The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure communications. In particular, a decode-and-forward (DF) based cooperative protocol is considered, and the objective is to design the system for secrecy capacity maximization or transmit power minimization. System design for the DF-based cooperative protocol is first studied by assuming the availability of global channel state information (CSI). For the case of one eavesdropper, an iterative scheme is proposed to obtain the optimal solution for the problem of transmit power minimization. For the case of multiple eavesdroppers, the problem of secrecy capacity maximization or transmit power minimization is in general intractable. Suboptimal system design is proposed by adding an additional constraint, i.e., the complete nulling of signals at all eavesdroppers, which yields simple closed-form solutions for the aforementioned two problems. Then, the impact of imperfect CSI of eavesdroppers on system design is studied, in which the ergodic secrecy capacity is of interest.
Ambient backscatter communications (AmBackComs) have been recognized as a spectrum- and energy-efficient technology for Internet of Things, as it allows passive backscatter devices (BDs) to modulate their information into the legacy signals, e.g., ce llular signals, and reflect them to their associated receivers while harvesting energy from the legacy signals to power their circuit operation. {color{black} However, the co-channel interference between the backscatter link and the legacy link and the non-linear behavior of energy harvesters at the BDs have largely been ignored in the performance analysis of AmBackComs. Taking these two aspects, this paper provides a comprehensive outage performance analysis for an AmBackCom system with multiple backscatter links}, where one of the backscatter links is opportunistically selected to leverage the legacy signals transmitted in a given resource block. For any selected backscatter link, we propose an adaptive reflection coefficient (RC), which is adapted to the non-linear energy harvesting (EH) model and the location of the selected backscatter link, to minimize the outage probability of the backscatter link. In order to study the impact of co-channel interference on both backscatter and legacy links, for a selected backscatter link, we derive the outage probabilities for the legacy link and the backscatter link. Furthermore, we study the best and worst outage performances for the backscatter system where the selected backscatter link maximizes or minimizes the signal-to-interference-plus noise ratio (SINR) at the backscatter receiver. We also study the best and worst outage performances for the legacy link where the selected backscatter link results in the lowest and highest co-channel interference to the legacy receiver, respectively.
Secure communication is a promising technology for wireless networks because it ensures secure transmission of information. In this paper, we investigate the joint subcarrier (SC) assignment and power allocation problem for non-orthogonal multiple ac cess (NOMA) amplify-and-forward two-way relay wireless networks, in the presence of eavesdroppers. By exploiting cooperative jamming (CJ) to enhance the security of the communication link, we aim to maximize the achievable secrecy energy efficiency by jointly designing the SC assignment, user pair scheduling and power allocation. Assuming the perfect knowledge of the channel state information (CSI) at the relay station, we propose a low-complexity subcarrier assignment scheme (SCAS-1), which is equivalent to many-to-many matching games, and then SCAS-2 is formulated as a secrecy energy efficiency maximization problem. The secure power allocation problem is modeled as a convex geometric programming problem, and then solved by interior point methods. Simulation results demonstrate that the effectiveness of the proposed SSPA algorithms under scenarios of using and not using CJ, respectively.
We investigate the reliability and security of the ambient backscatter (AmBC) non-orthogonal multiple access (NOMA) systems, where the source aims to communication with two NOMA users in the presence of an eavesdropper. We consider a more practical c ase that nodes and backscatter device (BD) suffer from in-phase and quadrature-phase imbalance (IQI). More specifically, exact analytical expressions for the outage probability (OP) and the intercept probability (IP) are derived in closedform. Moreover, the asymptotic behaviors and corresponding diversity orders for the OP are discussed. Numerical results show that: 1) Although IQI reduces the reliability, it can enhance the security. 2) Compared with the traditional orthogonal multiple access (OMA) system, the AmBC-NOMA system can obtain better reliability when the signal-to-noise (SNR) ratio is low; 3) There are error floors for the OP because of the reflection coefficient b{eta} .
This paper proposes a tractable solution for integrating non-orthogonal multiple access (NOMA) into massive machine-type communications (mMTC) to increase the uplink connectivity. Multiple transmit power levels are provided at the user end to enable open-loop power control, which is absent from the traditional uplink NOMA with the fixed transmit power. The basics of this solution are firstly presented to analytically show the inherent performance gain in terms of the average arrival rate (AAR). Then, a practical framework based on a novel power map is proposed to associate a set of well-designed transmit power levels with each geographical region for handling the no instantaneous channel state information problem. Based on this framework, the semi-grant-free (semi-GF) transmission with two practical protocols is introduced to enhance the connectivity, which has higher AAR than both the conventional grand-based and GF transmissions. When the number of active GF devices in mMTC far exceeds the available resource blocks, the corresponding AAR tends to zero. To solve this problem, user barring techniques are employed into the semi-GF transmission to stable the traffic flow and thus increase the AAR. Lastly, promising research directions are discussed for improving the proposed networks.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا