The last few years have witnessed a tremendous growth of the demand for wireless services and a significant increase of the number of mobile subscribers. A recent data traffic forecast from Cisco reported that the global mobile data traffic reached 1.2 zettabytes per year in 2016, and the global IP traffic will increase nearly threefold over the next 5 years. Based on these predictions, a 127-fold increase of the IP traffic is expected from 2005 to 2021. It is also anticipated that the mobile data traffic will reach 3.3 zettabytes per year by 2021, and that the number of mobile-connected devices will reach 3.5 per capita.
With such demands for higher data rates and for better quality of service (QoS), fifth generation (5G) standardization initiatives, whose initial phase was specified in June 2018 under the umbrella of Long Term Evolution (LTE) Release 15, have been under vibrant investigation. In particular, the International Telecommunication Union (ITU) has identified three usage scenarios (service categories) for 5G wireless networks: (i) enhanced mobile broadband (eMBB), (ii) ultra-reliable and low latency communications (uRLLC), and (iii) massive machine type communications (mMTC). The vast variety of applications for beyond 5G wireless networks has motivated the necessity of novel and more flexible physical layer (PHY) technologies, which are capable of providing higher spectral and energy efficiencies, as well as reduced transceiver implementations.
1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.
In many communication channels, secrecy constraints usually incur a penalty in capacity, as well as generalized degrees-of-freedom (GDoF). In this paper, we show an interesting observation that adding a helper can totally remove the penalty in sum GDoF for a two-user symmetric Gaussian interference channel. For the interference channel where each transmitter sends a message to an intended receiver without secrecy constraints, the sum GDoF is a well-known “W” curve, characterized by Etkin–Tse–Wang in 2008. If the secrecy constraints are imposed on this interference channel, where the message of each transmitter must be secure from the unintended receiver (eavesdropper), then a GDoF penalty is incurred and the secure sum GDoF is reduced to a modified “W” curve, derived by Chen recently. In this paper, we show that, by adding a helper into this interference channel with secrecy constraints, the secure sum GDoF turns out to be a “W” curve, which is the same as the sum GDoF of the setting without secrecy constraints. The proposed scheme is based on the cooperative jamming and a careful signal design such that the jamming signal of the helper is aligned at a specific direction and power level with the information signals of the transmitters, which allows us to totally remove the penalty in GDoF due to the secrecy constraints. Furthermore, the estimation approaches of noise removal and signal separation due to the rational independence are used in the secure rate analysis.
© Copyright 2019 IEEE – All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.