scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Communications Magazine in 2015"


Journal ArticleDOI
TL;DR: The concept of software defined multiple access (SoDeMA) is proposed, which enables adaptive configuration of available multiple access schemes to support diverse services and applications in future 5G networks.
Abstract: The increasing demand of mobile Internet and the Internet of Things poses challenging requirements for 5G wireless communications, such as high spectral efficiency and massive connectivity. In this article, a promising technology, non-orthogonal multiple access (NOMA), is discussed, which can address some of these challenges for 5G. Different from conventional orthogonal multiple access technologies, NOMA can accommodate much more users via nonorthogonal resource allocation. We divide existing dominant NOMA schemes into two categories: power-domain multiplexing and code-domain multiplexing, and the corresponding schemes include power-domain NOMA, multiple access with low-density spreading, sparse code multiple access, multi-user shared access, pattern division multiple access, and so on. We discuss their principles, key features, and pros/cons, and then provide a comprehensive comparison of these solutions from the perspective of spectral efficiency, system performance, receiver complexity, and so on. In addition, challenges, opportunities, and future research trends for NOMA design are highlighted to provide some insight on the potential future work for researchers in this field. Finally, to leverage different multiple access schemes including both conventional OMA and new NOMA, we propose the concept of software defined multiple access (SoDeMA), which enables adaptive configuration of available multiple access schemes to support diverse services and applications in future 5G networks.

2,512 citations


Journal ArticleDOI
TL;DR: A reference signal design for the hybrid beamform structure is presented, which achieves better channel estimation performance than the method solely based on analog beamforming, and can be conveniently utilized to guide practical LSAS design for optimal energy/ spectrum efficiency trade-off.
Abstract: With the severe spectrum shortage in conventional cellular bands, large-scale antenna systems in the mmWave bands can potentially help to meet the anticipated demands of mobile traffic in the 5G era. There are many challenging issues, however, regarding the implementation of digital beamforming in large-scale antenna systems: complexity, energy consumption, and cost. In a practical large-scale antenna deployment, hybrid analog and digital beamforming structures can be important alternative choices. In this article, optimal designs of hybrid beamforming structures are investigated, with the focus on an N (the number of transceivers) by M (the number of active antennas per transceiver) hybrid beamforming structure. Optimal analog and digital beamforming designs in a multi-user beamforming scenario are discussed. Also, the energy efficiency and spectrum efficiency of the N × M beamforming structure are analyzed, including their relationship at the green point (i.e., the point with the highest energy efficiency) on the energy efficiency-spectrum efficiency curve, the impact of N on the energy efficiency performance at a given spectrum efficiency value, and the impact of N on the green point energy efficiency. These results can be conveniently utilized to guide practical LSAS design for optimal energy/ spectrum efficiency trade-off. Finally, a reference signal design for the hybrid beamform structure is presented, which achieves better channel estimation performance than the method solely based on analog beamforming. It is expected that large-scale antenna systems with hybrid beamforming structures in the mmWave band can play an important role in 5G.

1,129 citations


Journal ArticleDOI
TL;DR: A brief overview of NFV is provided, its requirements and architectural framework are explained, several use cases are presented, and the challenges and future directions in this burgeoning research area are discussed.
Abstract: Network function virtualization was recently proposed to improve the flexibility of network service provisioning and reduce the time to market of new services. By leveraging virtualization technologies and commercial off-the-shelf programmable hardware, such as general-purpose servers, storage, and switches, NFV decouples the software implementation of network functions from the underlying hardware. As an emerging technology, NFV brings several challenges to network operators, such as the guarantee of network performance for virtual appliances, their dynamic instantiation and migration, and their efficient placement. In this article, we provide a brief overview of NFV, explain its requirements and architectural framework, present several use cases, and discuss the challenges and future directions in this burgeoning research area.

1,076 citations


Journal ArticleDOI
TL;DR: An overview of state-of- the-art RF-enabled WET technologies and their applications to wireless communications, highlighting the key design challenges, solutions, and opportunities ahead.
Abstract: The performance of wireless communication is fundamentally constrained by the limited battery life of wireless devices, the operations of which are frequently disrupted due to the need of manual battery replacement/recharging. The recent advance in RF-enabled wireless energy transfer (WET) technology provides an attractive solution named wireless powered communication (WPC), where the wireless devices are powered by dedicated wireless power transmitters to provide continuous and stable microwave energy over the air. As a key enabling technology for truly perpetual communications, WPC opens up the potential to build a network with larger throughput, higher robustness, and increased flexibility compared to its battery-powered counterpart. However, the combination of wireless energy and information transmissions also raises many new research problems and implementation issues that need to be addressed. In this article, we provide an overview of stateof- the-art RF-enabled WET technologies and their applications to wireless communications, highlighting the key design challenges, solutions, and opportunities ahead.

1,032 citations


Journal ArticleDOI
TL;DR: This article examines security, a pivotal issue in the 5G network where wireless transmissions are inherently vulnerable to security breaches, and focuses on physical layer security, which safeguards data confidentiality by exploiting the intrinsic randomness of the communications medium.
Abstract: The fifth generation (5G) network will serve as a key enabler in meeting the continuously increasing demands for future wireless applications, including an ultra-high data rate, an ultrawide radio coverage, an ultra-large number of devices, and an ultra-low latency. This article examines security, a pivotal issue in the 5G network where wireless transmissions are inherently vulnerable to security breaches. Specifically, we focus on physical layer security, which safeguards data confidentiality by exploiting the intrinsic randomness of the communications medium and reaping the benefits offered by the disruptive technologies to 5G. Among various technologies, the three most promising ones are discussed: heterogenous networks, massive multiple-input multiple-output, and millimeter wave. On the basis of the key principles of each technology, we identify the rich opportunities and the outstanding challenges that security designers must tackle. Such an identification is expected to decisively advance the understanding of future physical layer security.

848 citations


Journal ArticleDOI
TL;DR: It is shown that numerous open challenges, such as efficient SI suppression, high-performance FD MAC-layer protocol design, low power consumption, and hybrid FD/HD designs, have to be tackled before successfully implementing FD-based systems.
Abstract: The wireless research community aspires to conceive full duplex operation by supporting concurrent transmission and reception in a single time/frequency channel for the sake of improving the attainable spectral efficiency by a factor of two as compared to the family of conventional half duplex wireless systems. The main challenge encountered in implementing FD wireless devices is that of finding techniques for mitigating the performance degradation imposed by self-interference. In this article, we investigate the potential FD techniques, including passive suppression, active analog cancellation, and active digital cancellation, and highlight their pros and cons. Furthermore, the troubles of FD medium access control protocol design are discussed for addressing the problems such as the resultant end-to-end delay and network congestion. Additionally, an opportunistic decode-andforward- based relay selection scheme is analyzed in underlay cognitive networks communicating over independent and identically distributed Rayleigh and Nakagami-m fading channels in the context of FD relaying. We demonstrate that the outage probability of multi-relay cooperative communication links can be substantially reduced. Finally, we discuss the challenges imposed by the aforementioned techniques and a range of critical issues associated with practical FD implementations. It is shown that numerous open challenges, such as efficient SI suppression, high-performance FD MAC-layer protocol design, low power consumption, and hybrid FD/HD designs, have to be tackled before successfully implementing FD-based systems.

646 citations


Journal ArticleDOI
TL;DR: Simulation results show that the WiFi-based positioning approach can achieve 1 m accuracy without any hardware change in commercial WiFi products, which is much better than the conventional solutions from both academia and industry concerning the trade-off of cost and system complexity.
Abstract: Recently, several indoor localization solutions based on WiFi, Bluetooth, and UWB have been proposed. Due to the limitation and complexity of the indoor environment, the solution to achieve a low-cost and accurate positioning system remains open. This article presents a WiFibased positioning technique that can improve the localization performance from the bottleneck in ToA/AoA. Unlike the traditional approaches, our proposed mechanism relaxes the need for wide signal bandwidth and large numbers of antennas by utilizing the transmission of multiple predefined messages while maintaining high-accuracy performance. The overall system structure is demonstrated by showing localization performance with respect to different numbers of messages used in 20/40 MHz bandwidth WiFi APs. Simulation results show that our WiFi-based positioning approach can achieve 1 m accuracy without any hardware change in commercial WiFi products, which is much better than the conventional solutions from both academia and industry concerning the trade-off of cost and system complexity.

590 citations


Journal ArticleDOI
TL;DR: This article presents an overview of enabling technologies for efficient WEH, analyzes the lifetime of WEH-enabled IoT devices, and briefly study the future trends in the design of efficientWEH systems and research challenges that lie ahead.
Abstract: The Internet of Things (IoT) is an emerging computing concept that describes a structure in which everyday physical objects, each provided with unique identifiers, are connected to the Internet without requiring human interaction. Long-term and self-sustainable operation are key components for realization of such a complex network, and entail energy-aware devices that are potentially capable of harvesting their required energy from ambient sources. Among different energy harvesting methods, such as vibration, light, and thermal energy extraction, wireless energy harvesting (WEH) has proven to be one of the most promising solutions by virtue of its simplicity, ease of implementation, and availability. In this article, we present an overview of enabling technologies for efficient WEH, analyze the lifetime of WEH-enabled IoT devices, and briefly study the future trends in the design of efficient WEH systems and research challenges that lie ahead.

587 citations


Journal ArticleDOI
TL;DR: The IoBNT stands as a paradigm-shifting concept for communication and network engineering, where novel challenges are faced to develop efficient and safe techniques for the exchange of information, interaction, and networking within the biochemical domain, while enabling an interface to the electrical domain of the Internet.
Abstract: The Internet of Things (IoT) has become an important research topic in the last decade, where things refer to interconnected machines and objects with embedded computing capabilities employed to extend the Internet to many application domains. While research and development continue for general IoT devices, there are many application domains where very tiny, concealable, and non-intrusive Things are needed. The properties of recently studied nanomaterials, such as graphene, have inspired the concept of Internet of NanoThings (IoNT), based on the interconnection of nanoscale devices. Despite being an enabler for many applications, the artificial nature of IoNT devices can be detrimental where the deployment of NanoThings could result in unwanted effects on health or pollution. The novel paradigm of the Internet of Bio-Nano Things (IoBNT) is introduced in this paper by stemming from synthetic biology and nanotechnology tools that allow the engineering of biological embedded computing devices. Based on biological cells, and their functionalities in the biochemical domain, Bio-NanoThings promise to enable applications such as intra-body sensing and actuation networks, and environmental control of toxic agents and pollution. The IoBNT stands as a paradigm-shifting concept for communication and network engineering, where novel challenges are faced to develop efficient and safe techniques for the exchange of information, interaction, and networking within the biochemical domain, while enabling an interface to the electrical domain of the Internet.

528 citations


Journal ArticleDOI
TL;DR: This first comprehensive tutorial on the use of matching theory, a Nobel Prize winning framework, for resource management in wireless networks is developed and results show how matching theory can effectively improve the performance of resource allocation in all three applications discussed.
Abstract: The emergence of novel wireless networking paradigms such as small cell and cognitive radio networks has forever transformed the way in which wireless systems are operated. In particular, the need for self-organizing solutions to manage the scarce spectral resources has become a prevalent theme in many emerging wireless systems. In this article, the first comprehensive tutorial on the use of matching theory, a Nobel Prize winning framework, for resource management in wireless networks is developed. To cater for the unique features of emerging wireless networks, a novel, wireless-oriented classification of matching theory is proposed. Then the key solution concepts and algorithmic implementations of this framework are exposed. The developed concepts are applied in three important wireless networking areas in order to demonstrate the usefulness of this analytical tool. Results show how matching theory can effectively improve the performance of resource allocation in all three applications discussed.

515 citations


Journal ArticleDOI
TL;DR: This article focuses on the application of advanced smart antenna technologies to SWIPT, including multiple-input multiple-output and relaying techniques, which have the potential to significantly improve the energy efficiency and also the spectral efficiency ofSWIPT.
Abstract: Simultaneous wireless information and power transfer (SWIPT) is a promising solution to increase the lifetime of wireless nodes and hence alleviate the energy bottleneck of energy constrained wireless networks. As an alternative to conventional energy harvesting techniques, SWIPT relies on the use of radio frequency signals, and is expected to bring some fundamental changes to the design of wireless communication networks. This article focuses on the application of advanced smart antenna technologies to SWIPT, including multiple-input multiple-output and relaying techniques. These smart antenna technologies have the potential to significantly improve the energy efficiency and also the spectral efficiency of SWIPT. Different network topologies with single and multiple users are investigated, along with some promising solutions to achieve a favorable trade-off between system performance and complexity. A detailed discussion of future research challenges for the design of SWIPT systems is also provided.

Journal ArticleDOI
TL;DR: This study presents a roadmap from the current cellular technologies toward fully MTC-capable 5G mobile systems, and provides a clear mapping between the main MTC service requirements and their associated challenges.
Abstract: Machine-type communications (MTC) enables a broad range of applications from mission- critical services to massive deployment of autonomous devices. To spread these applications widely, cellular systems are considered as a potential candidate to provide connectivity for MTC devices. The ubiquitous deployment of these systems reduces network installation cost and provides mobility support. However, based on the service functions, there are key challenges that currently hinder the broad use of cellular systems for MTC. This article provides a clear mapping between the main MTC service requirements and their associated challenges. The goal is to develop a comprehensive understanding of these challenges and the potential solutions. This study presents, in part, a roadmap from the current cellular technologies toward fully MTC-capable 5G mobile systems.

Journal ArticleDOI
TL;DR: Simulation results show that the proposed network architecture and interference avoidance schemes can significantly increase the capacity of 4G heterogeneous cellular networks while maintaining the service quality of Wi-Fi systems.
Abstract: As two major players in terrestrial wireless communications, Wi-Fi systems and cellular networks have different origins and have largely evolved separately. Motivated by the exponentially increasing wireless data demand, cellular networks are evolving towards a heterogeneous and small cell network architecture, wherein small cells are expected to provide very high capacity. However, due to the limited licensed spectrum for cellular networks, any effort to achieve capacity growth through network densification will face the challenge of severe inter-cell interference. In view of this, recent standardization developments have started to consider the opportunities for cellular networks to use the unlicensed spectrum bands, including the 2.4 GHz and 5 GHz bands that are currently used by Wi-Fi, Zigbee and some other communication systems. In this article, we look into the coexistence of Wi-Fi and 4G cellular networks sharing the unlicensed spectrum. We introduce a network architecture where small cells use the same unlicensed spectrum that Wi-Fi systems operate in without affecting the performance of Wi-Fi systems. We present an almost blank subframe (ABS) scheme without priority to mitigate the co-channel interference from small cells to Wi-Fi systems, and propose an interference avoidance scheme based on small cells estimating the density of nearby Wi-Fi access points to facilitate their coexistence while sharing the same unlicensed spectrum. Simulation results show that the proposed network architecture and interference avoidance schemes can significantly increase the capacity of 4G heterogeneous cellular networks while maintaining the service quality of Wi-Fi systems.

Journal ArticleDOI
TL;DR: It is shown that MaMIMO itself is robust against passive eavesdropping attacks and a pilot contamination scheme that actively attacks the channel estimation process is reviewed.
Abstract: This article discusses opportunities and challenges of physical layer security integration in MaMIMO systems. Specifically, we first show that MaMIMO itself is robust against passive eavesdropping attacks. We then review a pilot contamination scheme that actively attacks the channel estimation process. This pilot contamination attack not only dramatically reduces the achievable secrecy capacity but is also difficult to detect. We proceed by reviewing some methods from literature that detect active attacks on MaMIMO. The last part of the article surveys the open research problems that we believe are the most important to address in the future and give a few promising directions of research to solve them.

Journal ArticleDOI
TL;DR: This article introduces an mmWave+4G system architecture with TDMA-based MAC structure as a candidate for 5G cellular networks and proposes an effective resource sharing scheme by allowing non-interfering D2D links to operate concurrently.
Abstract: Millimeter-wave communication is a promising technology for future 5G cellular networks to provide very high data rate (multi-gigabits-persecond) for mobile devices. Enabling D2D communications over directional mmWave networks is of critical importance to efficiently use the large bandwidth to increase network capacity. In this article, the propagation features of mmWave communication and the associated impacts on 5G cellular networks are discussed. We introduce an mmWave+4G system architecture with TDMA-based MAC structure as a candidate for 5G cellular networks. We propose an effective resource sharing scheme by allowing non-interfering D2D links to operate concurrently. We also discuss neighbor discovery for frequent handoffs in 5G cellular networks.

Journal ArticleDOI
TL;DR: This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC, and shows that an insider attack can cause significant instability in the CACC vehicle stream.
Abstract: Autonomous vehicles capable of navigating unpredictable real-world environments with little human feedback are a reality today. Such systems rely heavily on onboard sensors such as cameras, radar/LIDAR, and GPS as well as capabilities such as 3G/4G connectivity and V2V/V2I communication to make real-time maneuvering decisions. Autonomous vehicle control imposes very strict requirements on the security of the communication channels used by the vehicle to exchange information as well as the control logic that performs complex driving tasks such as adapting vehicle velocity or changing lanes. This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC. Our simulation results show that an insider attack can cause significant instability in the CACC vehicle stream. We also illustrate how different countermeasures, such as downgrading to ACC mode, could potentially be used to improve the security and safety of the connected vehicle streams.

Journal ArticleDOI
TL;DR: An introduction to wirelessly powered communications (WPC) is provided by describing the key features of WPC, shedding light on a set of frequently asked questions, and identifying the key design issues and discussing possible solutions.
Abstract: The advancements in microwave power transfer (MPT) over recent decades have enabled wireless power transfer over long distances. The latest breakthroughs in wireless communication — massive MIMO, small cells, and millimeterwave communication — make wireless networks suitable platforms for implementing MPT. This can lead to the elimination of the “last wires” connecting mobile devices to the grid for recharging, thereby tackling a huge long-standing ICT challenge. Furthermore, the seamless integration between MPT and wireless communication opens up a new area called wirelessly powered communications (WPC) where many new research directions arise, such as simultaneous information and power transfer, WPC network architectures, and techniques for safe and efficient WPC. This article provides an introduction to WPC by describing the key features of WPC, shedding light on a set of frequently asked questions, and identifying the key design issues and discussing possible solutions.

Journal ArticleDOI
TL;DR: A cloud based platform is introduced, aiming to simplify the deployment, operation and management, and facilitate round-the-clock optimization of the network, to pave the way for the development of 5G.
Abstract: With the proliferation of connected devices and emerging data-hungry applications, the volume of mobile data traffic is predicted to have a 1000-fold growth by the year 2020. To address the challenge of this data explosion, industry and academia have initiated research and development of 5G wireless networks, which are envisaged to cater to the massive data traffic volume, while providing ubiquitous connectivity and supporting diverse applications with different quality of service (QoS) requirements. To support the expected massive growth of mobile data, a large number of small cells are expected to be deployed indoors and outdoors, giving rise to heterogeneous networks (HetNets), which are considered to be the key path toward 5G. With such large-scale HetNets, network operators face many serious challenges in terms of operation and management, costeffective small cell deployment, and intercell interference mitigation. To deal with those issues, a cloud based platform is introduced, aiming to simplify the deployment, operation and management, and facilitate round-the-clock optimization of the network, to pave the way for the development of 5G. Two case studies are provided to illustrate the benefits of the cloud based architecture. Finally, the related standardization activities are provided and some research topics essential for a successful development of 5G are discussed.

Journal ArticleDOI
TL;DR: The design of core functionalities for cooperative autonomous driving are presented, the required evolution of communication standards are addressed, and the current V2X communication standards from ETSI are analyzed for missing features.
Abstract: Two emerging technologies in the automotive domain are autonomous vehicles and V2X communication. Even though these technologies are usually considered separately, their combination enables two key cooperative features: sensing and maneuvering. Cooperative sensing allows vehicles to exchange information gathered from local sensors. Cooperative maneuvering permits inter-vehicle coordination of maneuvers. These features enable the creation of cooperative autonomous vehicles, which may greatly improve traffic safety, efficiency, and driver comfort. The first generation V2X communication systems with the corresponding standards, such as Release 1 from ETSI, have been designed mainly for driver warning applications in the context of road safety and traffic efficiency, and do not target use cases for autonomous driving. This article presents the design of core functionalities for cooperative autonomous driving and addresses the required evolution of communication standards in order to support a selected number of autonomous driving use cases. The article describes the targeted use cases, identifies their communication requirements, and analyzes the current V2X communication standards from ETSI for missing features. The result is a set of specifications for the amendment and extension of the standards in support of cooperative autonomous driving.

Journal ArticleDOI
TL;DR: In this paper, the authors comprehensively review the most prominent existing and novel M2M radio technologies, as well as share their first-hand real-world deployment experiences, with the goal to provide a unified insight into enabling machine-to-machine architectures, unique technology features, expected performance, and related standardization developments.
Abstract: This article addresses the market-changing phenomenon of the Internet of Things (IoT), which relies on the underlying paradigm of machine-to-machine (M2M) communications to integrate a plethora of various sensors, actuators, and smart meters across a wide spectrum of businesses. Today the M2M landscape features an extreme diversity of available connectivity solutions which, due to the enormous economic promise of the IoT, need to be harmonized across multiple industries. To this end, we comprehensively review the most prominent existing and novel M2M radio technologies, as well as share our first-hand real-world deployment experiences, with the goal to provide a unified insight into enabling M2M architectures, unique technology features, expected performance, and related standardization developments. We pay particular attention to the cellular M2M sector employing 3GPP LTE technology. This work is a systematic recollection of our many recent research, industrial, entrepreneurial, and standardization efforts within the contemporary M2M ecosystem.

Journal ArticleDOI
TL;DR: New tradeoffs in designing full duplex enabled radio networks are identified, and new scheduling algorithms and advanced interference cancellation techniques are discussed, which are essential to maximize the capacity gain and energy efficiency.
Abstract: Recent advances in antenna and RF circuit design have greatly reduced the crosstalk between the transmitter and receiver circuits on a wireless device, which enable radios to transmit and receive on the same frequency at the same time. Such a full duplex radio has the potential to double the spectral efficiency of a point-to-point radio link. However, the application of such a radio in current cellular systems (3GPP LTE) has not been comprehensively analyzed. This article addresses the fundamental challenges in incorporating full duplex radios in a cellular network to unlock the full potential of full duplex communications. We observe that without carefully planning, full duplex transmission might cause much higher interference in both uplink and downlink, which greatly limits the potential gains. Another challenge is that standard scheduling methods which attempt to achieve the maximum capacity gain lead to a severe loss in energy efficiency. In this article, we identify new tradeoffs in designing full duplex enabled radio networks, and discuss favorable conditions to operate in full duplex mode. New scheduling algorithms and advanced interference cancellation techniques are discussed, which are essential to maximize the capacity gain and energy efficiency. Under this new design, most of the gain is achievable with full duplex enabled base stations, while user equipment still operates in half duplex mode.

Journal ArticleDOI
TL;DR: Novel state-of-the-art antenna solutions as well as digital self-interference cancellation algorithms for compact MIMO full-duplex relays, specifically targeted for reduced-cost deployments in local area networks are presented.
Abstract: In-band full-duplex relays transmit and receive simultaneously at the same center frequency, hence offering enhanced spectral efficiency for relay deployment. In order to deploy such full-duplex relays, it is necessary to efficiently mitigate the inherent self-interference stemming from the strong transmit signal coupling to the sensitive receive chain. In this article, we present novel state-of-the-art antenna solutions as well as digital self-interference cancellation algorithms for compact MIMO fullduplex relays, specifically targeted for reduced-cost deployments in local area networks. The presented antenna design builds on resonant wavetraps and is shown to provide passive isolations on the order of 60–70 dB. We also discuss and present advanced digital cancellation solutions, beyond classical linear processing, specifically tailored against nonlinear distortion of the power amplifier when operating close to saturation. Measured results from a complete demonstrator system, integrating antennas, RF cancellation, and nonlinear digital cancellation, are also presented, evidencing close to 100 dB of overall self-interference suppression. The reported results indicate that building and deploying compact full-duplex MIMO relays is already technologically feasible.

Journal ArticleDOI
TL;DR: A description of the architecture and a concept based on separation of mobility, radio resource coordination among multiple nodes, and data plane handling, as well as on integration with wide-area networks, is introduced.
Abstract: Demands for very high system capacity and end-user data rates of the order of 10 Gb/s can be met in localized environments by Ultra-Dense Networks (UDN), characterized as networks with very short inter-site distances capable of ensuring low interference levels during communications. UDNs are expected to operate in the millimeter-wave band, where wide bandwidth signals needed for such high data rates can be designed, and will rely on high-gain beamforming to mitigate path loss and ensure low interference. The dense deployment of infrastructure nodes will make traditional wire-based backhaul provisioning challenging. Wireless self-backhauling over multiple hops is proposed to enhance flexibility in deployment. A description of the architecture and a concept based on separation of mobility, radio resource coordination among multiple nodes, and data plane handling, as well as on integration with wide-area networks, is introduced. A simulation of a multi-node office environment is used to demonstrate the performance of wireless self-backhauling at various loads.

Journal ArticleDOI
TL;DR: This article discusses the challenges and opportunities in the design of scalable wireless systems to embrace the big data era, and introduces methods to capitalize on the vast data traffic for building a big-data-aware wireless network with better wireless service quality and new mobile applications.
Abstract: The rapidly growing wave of wireless data service is pushing against the boundary of our communication network's processing power. The pervasive and exponentially increasing data traffic present imminent challenges to all aspects of wireless system design, such as spectrum efficiency, computing capabilities, and fronthaul/backhaul link capacity. In this article, we discuss the challenges and opportunities in the design of scalable wireless systems to embrace the big data era. On one hand, we review the state-of-the-art networking architectures and signal processing techniques adaptable for managing big data traffic in wireless networks. On the other hand, instead of viewing mobile big data as an unwanted burden, we introduce methods to capitalize on the vast data traffic, for building a big-data-aware wireless network with better wireless service quality and new mobile applications. We highlight several promising future research directions for wireless communications in the mobile big data era.

Journal ArticleDOI
TL;DR: In this paper, the fundamental limits of covert communication systems are discussed, and a vision for the future of such systems as well is provided. But, the limitation of these methods is not discussed.
Abstract: Widely deployed encryption-based security prevents unauthorized decoding, but does not ensure undetectability of communication. However, covert, or low probability of detection/intercept communication is crucial in many scenarios ranging from covert military operations and the organization of social unrest, to privacy protection for users of wireless networks. In addition, encrypted data or even just the transmission of a signal can arouse suspicion, and even the most theoretically robust encryption can often be defeated by a determined adversary using non-computational methods such as side-channel analysis. Various covert communication techniques have been developed to address these concerns, including steganography for finite-alphabet noiseless applications and spread-spectrum systems for wireless communications. After reviewing these covert communication systems, this article discusses new results on the fundamental limits of their capabilities, and provides a vision for the future of such systems as well.

Journal ArticleDOI
TL;DR: This article reports the work on next generation transponders for optical networks carried out within the last few years, highlighting advantages, economics, and complexity.
Abstract: This article reports the work on next generation transponders for optical networks carried out within the last few years. A general architecture supporting super-channels (i.e., optical connections composed of several adjacent subcarriers) and sliceability (i.e., subcarriers grouped in a number of independent super-channels with different destinations) is presented. Several transponder implementations supporting different transmission techniques are considered, highlighting advantages, economics, and complexity. Discussions include electronics, optical components, integration, and programmability. Application use cases are reported.

Journal ArticleDOI
TL;DR: This paper categorizes computation offloading into three modes: remote cloud service mode, connected ad hoc cloudletService mode, and opportunistic ad hocCloudlet service mode and conducts a detailed analytic study for the proposed three modes of computation offload at ad hoccloudlet.
Abstract: As mobile devices are equipped with more memory and computational capability, a novel peer-to-peer communication model for mobile cloud computing is proposed to interconnect nearby mobile devices through various short range radio communication technologies to form mobile cloudlets, where every mobile device works as either a computational service provider or a client of a service requester. Though this kind of computation offloading benefits compute-intensive applications, the corresponding service models and analytics tools are remaining open issues. In this paper we categorize computation offloading into three modes: remote cloud service mode, connected ad hoc cloudlet service mode, and opportunistic ad hoc cloudlet service mode. We also conduct a detailed analytic study for the proposed three modes of computation offloading at ad hoc cloudlet.

Journal ArticleDOI
Wade Trappe1
TL;DR: It is highlighted that the opportunities for applying physical layer security to real systems will be quite rich if the community can overcome challenges and note new directions for the community to investigate.
Abstract: There has recently been significant interest in applying the principles of information-theoretical security and signal processing to secure physical layer systems. Although the community has made progress in understanding how the physical layer can support confidentiality and authentication, it is important to realize that there are many important issues that must be addressed if physical layer security is ever to be adopted by real and practical security systems. In this article, I briefly review several different flavors of physical layer security (at least for wireless systems), and then identify aspects (a.k.a. weaknesses) where the foundation for physical layer security needs to be strengthened. I then highlight that the opportunities for applying physical layer security to real systems will be quite rich if the community can overcome these challenges. In the course of the article, I note new directions for the community to investigate, with the objective of keeping physical layer security research targeted at having a practical impact on real systems.

Journal ArticleDOI
TL;DR: This article reviews an emerging wireless information and power transfer (WIPT) technique with an emphasis on its performance enhancement employing multi-antenna techniques and investigates the WIPT tradeoffs based on two typical multi- Antenna techniques: the limited feedback multi-Antenna technique for short-distance transfer; and the large-scale multiple-input multiple-output (LS-MIMO) technique for long- distance transfer.
Abstract: This article reviews an emerging wireless information and power transfer (WIPT) technique with an emphasis on its performance enhancement employing multi-antenna techniques. Compared to traditional wireless information transmission, WIPT faces numerous challenges. First, it is more susceptible to channel fading and path loss, resulting in a much shorter power transfer distance. Second, it gives rise to the issue of how to balance spectral efficiency for information transmission and energy efficiency for power transfer in order to obtain an optimal tradeoff. Third, there exists a security issue for information transmission in order to improve power transfer efficiency. In this context, multi-antenna techniques, e.g. energy beamforming, are introduced to solve these problems by exploiting spatial degree of freedom. This article provides a tutorial on various aspects of multi-antenna based WIPT techniques, with a focus on tackling the challenges by parameter optimization and protocol design. In particular, we investigate the WIPT tradeoffs based on two typical multi-antenna techniques: the limited feedback multi-antenna technique for short-distance transfer; and the large-scale multiple-input multiple-output (LS-MIMO, also known as massive MIMO) technique for long-distance transfer. Finally, simulation results validate the effectiveness of the proposed schemes.

Journal ArticleDOI
TL;DR: The paradigm of coded random access is presented, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on a graph, opening the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA.
Abstract: The rise of machine-to-machine communications has rekindled interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as waste. However, if the common receiver (e.g. base station) is able to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on a graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded random access protocols are described, as well as a case study on how to upgrade a legacy ALOHA system using the ideas of coded random access.