The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents field trial results of innovative air interface technologies: sparse code multiple access (SCMA), filtered orthogonal frequency division multiplexing (f-OFDM), and massive multiple-input multiple-output (MIMO). To confirm the improvement of the promising technologies, the counterparts in long term evolution (LTE) are selected as the comparison baseline. For each technology, detailed...
The 5th generation of mobile communications system (5G) is nowadays expected to support very diverse applications, devices, and services such as enhanced mobile broadband (eMBB) and the Internet of things (IoTs). In order to meet the future requirements, new 5G candidate radio access technologies have been proposed and studied. For example, Massive multiple-input multiple-output (MIMO) is an attractive...
Standardization activities have already begun on 5G to support very high system requirements. A common consensus toward achieving these targets is to permit transmission over a wide spectrum range. The departure from a dedicated licensed-only spectrum regime to a shared spectrum model poses new challenges for next generation mobile communication systems. Cognitive Radio Technologies is an enabler...
Non-orthogonal multiple access (NOMA) is envisioned to be one of the promising radio access techniques for the fifth generation (5G) mobile networks. In this paper, a portable NOMA testbed based on software defined radio (SDR) is developed by transporting our NOMA system to mini personal computers (PCs). Moreover, the NOMA testbed has been enhanced from 5 MHz bandwidth to 10 MHz bandwidth. As the...
Smartphones and other devices connected to a mobile network typically create billions of measurement samples every day. Those measurements are currently used for instantaneous resource allocation and link adaptation. There is much room for using the measurements also for network optimization with big data analytics. The measurements give valuable insight into the service quality experienced by devices...
This paper focuses on the 5G to the Home (FTTH), or 5G Fixed Wireless Access (FWA), use case. In this work, we introduce the concept and new technical problems the 5G system is expected to solve for delivering at least 100 Mb/s/household in downlink, and thus replacing the last few hundred meters of optic fiber infrastructure to the home. This is followed by a financial evaluation of the proposed...
A reliable feedback channel is vital to report decoding acknowledgments in retransmission mechanisms such as the hybrid automatic repeat request (HARQ). While the feedback bits are known to be costly for the wireless link, a feedback message more informative than the conventional single-bit feedback can increase resource utilization efficiency. Considering the practical limitations for increasing...
In order to ensure the transmit speed and quality, it is critical to adopt efficient path selection technique for load balancing in complex networks. However, traditional balancing technique is unable to possess global knowledge of the whole network and lacks the ability to find the optimal path. Software Defined Networks (SDN) provides an approach to obtain whole network status. But, the performance...
This paper presents a novel access control scheme for personal health record(PHR) data in cloud computing. The scheme utilizes attribute-based encryption(ABE), hash function and symmetric encryption to realize a fine-grained, multi- privilege access control to PHR. The patients can share their PHR with medical staff from various departments with different privileges securely. The experimental results...
Security evaluation of diverse SDN frameworks is of significant importance to design resilient systems and deal with attacks. Focused on SDN scenarios, a game-theoretic model is proposed to analyze their security performance in existing SDN architectures. The model can describe specific traits in different structures, represent several types of information of players (attacker and defender) and quantitatively...
The logically-centralized controllers have largely operated as the coordination points in software-defined networking(SDN), through which applications submit network operations to manage the global network resource. Therefore, the validity of these network operations from SDN applications are critical for the security of SDN. In this paper, we analyze the mechanism that generates network operations...
Named Data Networking (NDN) has natural advantages in the consumer mobility support for its design characteristics, while the producer mobility support was left unspecified. Some producer mobility support schemes have been proposed in recent years, which better solved the huge overhead caused by the route aggregation in normal NDN, yet critical issues like long handover latency and high packet loss...
In this paper, we design and implement the programmable nodes in software-defined sensor networks. Combining the emerging software defined networking (SDN) and the existing wireless sensor networks (WSNs), we propose an SDN-based sensor network architecture, called as software defined sensor networks (SDSN), which is composed of one centralized controller node, named as SDSN programmable controller...
Eavesdropping in wireless communication environment should be suppressed. However, most existing schemes ordinarily focus on secrecy rate enhancement, which may not be achieved with the non-Gaussian signals. Therefore, we consider this security problem from the actual signal point of view. On the basis of this premise, a novel scheme is proposed. In our scheme, each original signal in one constellation...
An adaptive control scheme of digital loop filter for automatic frequency control (AFC) is proposed to improve LTE downlink throughput in high-speed train (HST) channel. A mobile device in HST channel suffers from performance degradation due to the abrupt change in Doppler shift. In this case, a higher loop gain is desirable to quickly track the Doppler shift. However, in general, there is a fundamental...
In this paper, we investigate the secrecy performance of single-input single-output (SISO) system over fading, such that the main channel and the eavesdropper channel are subject to Rician/Nakagami-$m$ fading or Nakagami-$m$/Rician fading, and derive the analytical expressions of the probability of the existence of the non-zero secrecy capacity and the outage probability of secrecy capacity. Although...
5G wireless networks are expected to usher in massive Machine Type Communications (mMTC) pertaining to the Internet of Things (IoT). A large fraction of the devices participating in IoT are likely to be low-power devices that generate sporadic traffic. It is anticipated that autonomous grant-free communications would be needed to accommodate these devices and the traffic they generate. Preamble transmission...
Imperfect reconstructed filter bank multiple access (FBMA) for uplink transmission has been proposed recently which gets rid of real orthogonality in current filter bank multicarrier schemes. While it eases the filter design task and achieves better bit error rate (BER) performance than orthogonal frequency division multiple access (OFDMA), it still suffers from high peak-to-average power ratio (PAPR)...
Non-orthogonal multiple access (NOMA) is a promising multiple access scheme to increase the system capacity for future fifth generation (5G) communication systems. However, NOMA with receivers employing conventional successive interference cancellation (SIC) technique requires a careful choice of target rates and power allocation coefficients in order to keep NOMA operational. In this paper, we represent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.