EURASIP Journal on Wireless Communications and Networking最新文献

筛选
英文 中文
Anti-jamming for cognitive radio networks with Stackelberg game-assisted DSSS approach 利用堆叠尔伯格博弈辅助 DSSS 方法为认知无线电网络抗干扰
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2024-09-17 DOI: 10.1186/s13638-024-02397-x
Muhammad Imran, Pan Zhiwen, Liu Nan, Muhammad Sajjad, Faisal Mehmood Butt
{"title":"Anti-jamming for cognitive radio networks with Stackelberg game-assisted DSSS approach","authors":"Muhammad Imran, Pan Zhiwen, Liu Nan, Muhammad Sajjad, Faisal Mehmood Butt","doi":"10.1186/s13638-024-02397-x","DOIUrl":"https://doi.org/10.1186/s13638-024-02397-x","url":null,"abstract":"<p>The proposed study introduces a novel anti-jamming approach for cognitive radio networks (CRNs) by integrating the Stackelberg game model with direct sequence spread spectrum (DSSS) techniques. This innovative combination enhances the security and performance of CRNs by optimizing resource allocation and fortifying network resilience against jamming attacks. The Stackelberg game model provides a strategic framework where the Defender and Adversary dynamically adjust their strategies to achieve Nash equilibrium, ensuring strategic stability. The application of DSSS further improves signal robustness, mitigating interference from jamming attempts. Simulation results demonstrate significant improvements in network security, resource utilization, and overall performance, validating the efficacy and advantages of the proposed scheme in maintaining reliable communication in the presence of adversarial threats.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"32 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142255148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A SAR analysis of hexagonal-shaped UWB antenna for healthcare applications 用于医疗保健应用的六角形 UWB 天线的 SAR 分析
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2024-09-15 DOI: 10.1186/s13638-024-02405-0
Kailash V. Karad, Vaibhav S. Hendre, Jaswantsing L. Rajput, Vivek Kadam, Vaibhav E. Narawade, Ravindra Bakale, Gayatri D. Londhe
{"title":"A SAR analysis of hexagonal-shaped UWB antenna for healthcare applications","authors":"Kailash V. Karad, Vaibhav S. Hendre, Jaswantsing L. Rajput, Vivek Kadam, Vaibhav E. Narawade, Ravindra Bakale, Gayatri D. Londhe","doi":"10.1186/s13638-024-02405-0","DOIUrl":"https://doi.org/10.1186/s13638-024-02405-0","url":null,"abstract":"<p>This paper comprehensively analyses the specific absorption rate (SAR) for an ultra-wideband (UWB) wearable antenna designed for body-centric communication applications. The study is motivated by the extent of electromagnetic radiation in our surroundings, raising worries about health for wireless device users and wearable devices that utilize UWB technology. The proposed antenna is made of a foam substrate having a dielectric constant of 1.07, a thickness of 2 mm with a dimension of <span>(36times 48times 2 {text{mm}}^{3})</span>. The designed structure optimizes UWB (3.1–10.6 GHz) in connotation with the ISM band of 2.4 GHz. The proposed antenna works well over the wide frequency range resulting in a bandwidth of 11.53 GHz and a total gain of 8.05 dBi. An excellent impedance matching is obtained by creating a stub at the feed point which gives the maximum value of S<sub>11</sub> as − 44.88 dB. The analysis focuses on the SAR values to measure the rate of electromagnetic energy absorption by human tissues over 1 and 10 g by constructing an equivalent three-layer body phantom model. The results indicate that the proposed antenna exhibits SAR values well within the limits set by international standards of 1.6 W/kg averaged over 1 g of tissue and 2 W/kg for 10 g of tissue, while maintaining efficient radiation characteristics across the UWB spectrum.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"16 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142255151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Successive interference cancellation with multiple feedback in NOMA-enabled massive IoT network 在支持 NOMA 的大规模物联网网络中利用多重反馈消除连续干扰
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2024-09-13 DOI: 10.1186/s13638-024-02404-1
Shubham Bisen, Vimal Bhatia, Peter Brida
{"title":"Successive interference cancellation with multiple feedback in NOMA-enabled massive IoT network","authors":"Shubham Bisen, Vimal Bhatia, Peter Brida","doi":"10.1186/s13638-024-02404-1","DOIUrl":"https://doi.org/10.1186/s13638-024-02404-1","url":null,"abstract":"<p>In this work, we propose a multiple feedback-based successive interference cancellation (SIC) scheme for an ultra-dense Internet of Things (IoT) device network. Non-orthogonal multiple access (NOMA) enables massive connectivity with improved user fairness and spectral efficiency and is envisaged as a multiple access technique for IoT devices. NOMA simultaneously serves multiple users within a single resource block, leading to unbounded yet regulated multi-user interference. SIC is widely adopted in the NOMA system to detect users’ symbols. Nevertheless, multi-user interference and error propagation in the SIC layer are inherent challenges in NOMA. Recent studies have aimed to minimize interference and error propagation, imposing stringent conditions on the number of users and power allocation. Thus, this paper proposes novel multiple feedback-based SIC algorithms for the uplink multi-user NOMA scenarios that outperform the conventional SIC. Further, the proposed algorithm’s performance is analyzed under the practical case of imperfect channel state information at the receiver node to validate the robustness. The computational complexity of multiple feedback SIC is compared with the conventional SIC.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"7 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142255154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of shared relay CR-NOMA network based on SWIPT 基于 SWIPT 的共享中继 CR-NOMA 网络性能分析
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2024-09-09 DOI: 10.1186/s13638-024-02398-w
Chuanwang Song, Yuanjun Wang, Yuanteng Zhou, Yinghao Ma, Enyu Li, Keyong Hu
{"title":"Performance analysis of shared relay CR-NOMA network based on SWIPT","authors":"Chuanwang Song, Yuanjun Wang, Yuanteng Zhou, Yinghao Ma, Enyu Li, Keyong Hu","doi":"10.1186/s13638-024-02398-w","DOIUrl":"https://doi.org/10.1186/s13638-024-02398-w","url":null,"abstract":"<p>With the development of wireless communication technology, the number of devices accessing the communication network is increasing. This paper addresses critical issues such as low spectrum resource utilization and the energy constraints of devices. The investigation focuses on the system performance of the shared relay Cognitive Radio Non-Orthogonal Multiple Access (CR-NOMA) network based on Simultaneous Wireless Information and Power Transfer (SWIPT) network model. Unlike the existing CR-NOMA model in which the secondary network user do not participate in the transmission of information from the primary network, we consider the secondary network near user as shared relay. The shared relay utilizes SWIPT technology to harvest energy using a nonlinear energy harvesting model. Additionally, the shared relay assists in transmitting information from the primary network base station to primary user, as well as from the secondary network base station to far user of the secondary network. Subsequently, we conduct a series of simulations to analyze the effects of Signal-to-Noise Ratio (SNR), power distribution factor, interference threshold, and time-switching (TS) factor on system performance. Furthermore, we compare and analyze the performance of our proposed network model against CR-NOMA network across three dimensions: outage probability, throughput, and energy efficiency. Our results demonstrate that the proposed network model exhibits superior outage performance and enhances user throughput compared to the CR-NOMA network. Additionally, it demonstrates improved energy efficiency compared to the shared relay CR-NOMA network, leading to an overall improvement in network performance.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"4 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational offloading into UAV swarm networks: a systematic literature review 无人机蜂群网络的计算卸载:系统文献综述
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2024-09-07 DOI: 10.1186/s13638-024-02401-4
Asrar Ahmed Baktayan, Ammar Thabit Zahary, Axel Sikora, Dominik Welte
{"title":"Computational offloading into UAV swarm networks: a systematic literature review","authors":"Asrar Ahmed Baktayan, Ammar Thabit Zahary, Axel Sikora, Dominik Welte","doi":"10.1186/s13638-024-02401-4","DOIUrl":"https://doi.org/10.1186/s13638-024-02401-4","url":null,"abstract":"<p>Unmanned Aerial Vehicle (UAV) swarms have emerged as a promising technology for various applications, such as delivery, surveillance, and infrastructure inspection. An additional feature of deploying large UAV swarms is their use in mobile offloading networking. At the same time, this implies a key challenge in the efficient management of the computational and networking requirements for these offloading processes. This paper aims to fill this gap through a systematic literature review (SLR) analysing the research on distributed task offloading in UAV swarms. We conducted a systematic search of major scientific databases to identify relevant literature published between 2019 and 2023. A total of 63 papers were selected through a multistage screening process and their key contributions. This SLR aims to provide the current state of research on UAV swarm task offloading, including considerations for computation offloading, the role of UAV swarms, different aspects of UAV swarms, the number of UAVs in swarms impacting performance, and open issues. Our review also highlights UAV swarm offloading in various domains and discusses the challenges and limitations that must be addressed to ensure the widespread adoption of this technology. We outline the future research directions and potential applications of UAV swarm offloading, including its integration with other technologies.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"1 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threshold-driven K-means sector clustering algorithm for wireless sensor networks 用于无线传感器网络的阈值驱动 K-means 扇形聚类算法
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2024-09-04 DOI: 10.1186/s13638-024-02403-2
Bo Zeng, Shanshan Li, Xiaofeng Gao
{"title":"Threshold-driven K-means sector clustering algorithm for wireless sensor networks","authors":"Bo Zeng, Shanshan Li, Xiaofeng Gao","doi":"10.1186/s13638-024-02403-2","DOIUrl":"https://doi.org/10.1186/s13638-024-02403-2","url":null,"abstract":"<p>The clustering algorithm is an effective method for developing energy efficiency routing protocol for wireless sensor networks (WSNs). In clustered WSNs, cluster heads must handle high traffic, thus consuming more energy. Therefore, forming balanced clusters and selecting optimal cluster heads are significant challenges. The paper proposes a sector clustering algorithm based on K-means called KMSC. KMSC improves efficiency and balances the cluster size by employing symmetric dividing sectors in conjunction with K-means. For the selection of cluster heads (CHs), KMSC uses the residual energy and distance to calculate the weight of the node, then selects the node with the highest weight as CH. A hybrid single-hop and multi-hop communication is utilized to reduce long-distance transmissions. Furthermore, the impact of the number of sectors, the threshold for clustering, and the network size on the performance of KMSC has been explored. The simulation results show that KMSC outperforms EECPK-means, K-means, TSC, LSC, and SEECP in terms of FND, HND, and LND.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"39 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-aware energy-efficient design for mobile edge computing network operating with finite blocklength codes 使用有限块长代码的移动边缘计算网络的安全意识节能设计
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2024-09-03 DOI: 10.1186/s13638-024-02395-z
Chenhao Shi, Yulin Hu, Yao Zhu, Anke Schmeink
{"title":"Security-aware energy-efficient design for mobile edge computing network operating with finite blocklength codes","authors":"Chenhao Shi, Yulin Hu, Yao Zhu, Anke Schmeink","doi":"10.1186/s13638-024-02395-z","DOIUrl":"https://doi.org/10.1186/s13638-024-02395-z","url":null,"abstract":"<p>Energy efficiency and physical-layer security are crucial considerations in the advancement of mobile edge computing systems. This paper addresses the trade-off between secure-reliability and energy consumption in finite blocklength (FBL) communications. Specifically, we examine a three-node scenario involving a user, a legitimate edge computing server, and an eavesdropper, where the user offloads sensitive data to the edge server while facing potential eavesdropping threats. We propose an optimization framework aimed at minimizing energy consumption while ensuring secure-reliability by decomposing the problem into manageable subproblems. By demonstrating the convexity of the objective function concerning the variables, we establish the existence of an optimal parameter selection for the problem. This implies that practical optimization of parameters can significantly enhance system performance. Our numerical results demonstrate that the application of FBL regime and retransmission mechanism can effectively reduce the energy consumption of the system while ensuring secure-reliability. For the quantitative analyses, the retransmission mechanism is 33.1% better than no retransmission, and the FBL regime is 13.1% better than infinite blocklength (IBL) coding.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"2013 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives 无线链路层动态对称密钥生成:信息论视角
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2024-08-27 DOI: 10.1186/s13638-024-02396-y
David Samuel Bhatti, Shahzad Saleem, Heung-No Lee, Ki-Il Kim
{"title":"A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives","authors":"David Samuel Bhatti, Shahzad Saleem, Heung-No Lee, Ki-Il Kim","doi":"10.1186/s13638-024-02396-y","DOIUrl":"https://doi.org/10.1186/s13638-024-02396-y","url":null,"abstract":"<p>The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security acknowledges the possibility of breaches when adequate computational resources are available, that is why information-theoretic security is being explored, which suggests the existence of unbreakable cryptographic systems even in the presence of limitless processing power. Secret key exchange has traditionally relied on RSA or DH protocols, but researchers are now exploring innovative approaches for sharing secret keys among wireless network devices, leveraging physical or link layer characteristics. This research seeks to revolutionize secure multi-party key acquisition in wireless networks, capitalizing on information-theoretic security and collaborative data extraction. The proposed secret key generation framework comprehensively organizes and explains the information-theoretic aspects of secret key generation within the lower layers of wireless networks, especially the link layer, proposes a novel information-theoretic SKG framework for the dynamic acquisition of symmetric secret keys, and responds to contemporary information security challenges by relying on information-theory principles rather than vulnerable mathematical relationships in the post-quantum period. A new cryptographic key can be generated using a straightforward method, and when it is combined (XORed) with the previous key, it creates a continuously changing secret for encryption and decryption. This approach enhances security because, as attackers attempt to break the encryption, the system generates fresh, dynamic keys, making it progressively more challenging for them to succeed. The research work in question integrates key renewal, or how often keys are updated (dynamic keys), with a security off-period. It introduces a framework for determining the best key refresh rate based on the anticipated rate at which keys might be compromised. Furthermore, the proposed framework is scalable, allowing new nodes to quickly join the existing network. The system was tested with multiple nodes equipped with IEEE 802.11 interfaces, which were set in monitor mode to capture frames at the link layer. Nodes map their on-time frames onto their Bloom filters. Nodes exchange these Bloom filters in a feedback mechanism. Nodes extract those frames from their .pcap files, which are present in all Bloom filters; these are common frames among all nodes. These frames are used to form a shared secret that is passed to HMAC Key Derivation Function by each node to acquire the final encryption key of the required length. The validation of this encryption key is performed using a simple challenge-response protocol; upon successful validation, encrypted communication begins. Otherwise, the key generation process is restarted.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"24 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-complexity cooperative active and passive beamforming multi-RIS-assisted communication networks 低复杂度合作式主动和被动波束成形多 RIS 辅助通信网络
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2024-08-27 DOI: 10.1186/s13638-024-02375-3
Mostafa M. Elsherbini, Osama A. Omer, Mostafa Salah
{"title":"Low-complexity cooperative active and passive beamforming multi-RIS-assisted communication networks","authors":"Mostafa M. Elsherbini, Osama A. Omer, Mostafa Salah","doi":"10.1186/s13638-024-02375-3","DOIUrl":"https://doi.org/10.1186/s13638-024-02375-3","url":null,"abstract":"<p>Reconfigurable intelligent surface (RIS) is a groundbreaking technology that has a significant potential for sixth generation (6G) networks. Its unique capability to control wireless environments makes it an attractive option. However, the spatial diversity increased by assisting users with all deployed RISs, this investigation has two drawbacks the high complexity design, and the received signals by the far RISs are severely attenuated. Therefore, we propose a RIS selection strategy to select the proper RISs as a pre-stage before the joint beamforming between the base station (BS) and RISs to reduce the high complexity of joint beamforming optimization. Furthermore, the joint active and passive beamforming problem based on the selection is formulated. Hence, achieving spatial diversity by examining cooperation between passive beamforming of multi-hop RIS, leads to a challenging problem. To tackle this issue, we design an algorithm for the RIS selection scheme. Also, to relax the non-convexity of the proposed problem, we decouple the problem into solvable subproblems by utilizing the fractional programming (FP) and quadratic transform (QT) optimization methods. Simulation results have demonstrated through different user locations the effectiveness of the selection strategy in performance enhancement by 30% in the sum rate, besides an obvious reduction in the complexity cost than other techniques.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"130 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power-efficient full-duplex near user with power allocation and antenna selection in NOMA-based systems 基于 NOMA 的系统中功率分配和天线选择的高能效全双工近用户系统
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2024-08-23 DOI: 10.1186/s13638-024-02391-3
Mahsa Shirzadian Gilan, Behrouz Maham
{"title":"Power-efficient full-duplex near user with power allocation and antenna selection in NOMA-based systems","authors":"Mahsa Shirzadian Gilan, Behrouz Maham","doi":"10.1186/s13638-024-02391-3","DOIUrl":"https://doi.org/10.1186/s13638-024-02391-3","url":null,"abstract":"<p>This paper proposes a power scaling (PS) technique aimed at mitigating the outage floor problem commonly encountered in multi-user full-duplex (FD) non-orthogonal multiple access (NOMA) systems. Two antenna modes denominated as adaptive antenna mode (AAM) and fixed antenna mode (FAM) are utilized in this work for <i>L</i> FD near users in close proximity. In addition, a combined method of selecting both antenna mode and near user integrated with PS is employed to improve the overall network performance. Moreover, a power allocation between the chosen near user and far user is considered. In the low-to-moderate power regions, by AAM and FAM, we achieve twice of full diversity gain and full diversity gain, respectively. The research presents mathematical expressions for deriving the average capacity and outage probability and supports the theoretical findings with simulation-based evidence. The results of this work show that PS method not only contributes to a greater spatial diversity but also leads to superior performance compared to traditional FD NOMA systems. Moreover, our proposed method overcomes the outage floor and capacity ceiling. Furthermore, the work can be developed to 6G massive MIMO technology in multi-user FD cooperative NOMA systems.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"87 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信