FIGURE 5 - uploaded by Jehad M. Hamamreh
Content may be subject to copyright.
NOMA with auxiliary signal superposition using spatial transmit diversity (C T 4 )

NOMA with auxiliary signal superposition using spatial transmit diversity (C T 4 )

Source publication
Article
Full-text available
Next-generation wireless communication paradigms demand properties such as high reliability, low power consumption, and enhanced security. Also, the ever-increasing demand for better wireless services has led to the continuous improvement and emergence of various wireless networks such as 5G and beyond networks. Beyond 5G communication systems (i.e...

Contexts in source publication

Context 1
... diversity (C T 4 ) This design exploits NOMA with auxiliary signal superposition using spatial transmit diversity of base station for mMTC. The basic idea is to add channel-dependent auxiliary signals on top of the multiplexed users' (or IoT devices) signals, which are transmitted from two different antenna sources at the same time as shown in Fig. 5. The transmission is done such that the auxiliary signals completely cancel the interference only at the legitimate VOLUME 1, 2020 users, while causing severe degradation to the external eavesdropper. Moreover, besides external security, the added signals are designed such that the inter-user interference between the legitimate users ...
Context 2
... external security, the added signals are designed such that the inter-user interference between the legitimate users is completely removed. The data for user 1 and user 2 , x 1 and x 2 respectively, is modulated using QAM modulation and the auxiliary signal specific for each antenna is added on top of the superimposed data signals as shown in Fig. 5. Thus, there is no need for using complex successive cancellation process at the receiver, resulting in reducing complexity, lowering power consumption, and decreasing latency. The transmitted signal from antenna-1 after the addition of the auxiliary signal r 1 is given as ...
Context 3
... diversity (C T 4 ) This design exploits NOMA with auxiliary signal superposition using spatial transmit diversity of base station for mMTC. The basic idea is to add channel-dependent auxiliary signals on top of the multiplexed users' (or IoT devices) signals, which are transmitted from two different antenna sources at the same time as shown in Fig. 5. The transmission is done such that the auxiliary signals completely cancel the interference only at the legitimate VOLUME 1, 2020 users, while causing severe degradation to the external eavesdropper. Moreover, besides external security, the added signals are designed such that the inter-user interference between the legitimate users ...
Context 4
... external security, the added signals are designed such that the inter-user interference between the legitimate users is completely removed. The data for user 1 and user 2 , x 1 and x 2 respectively, is modulated using QAM modulation and the auxiliary signal specific for each antenna is added on top of the superimposed data signals as shown in Fig. 5. Thus, there is no need for using complex successive cancellation process at the receiver, resulting in reducing complexity, lowering power consumption, and decreasing latency. The transmitted signal from antenna-1 after the addition of the auxiliary signal r 1 is given as ...

Similar publications

Preprint
Full-text available
In this work we study the coexistence in the same Radio Access Network (RAN) of two generic services present in the Fifth Generation (5G) of wireless communication systems: enhanced Mobile BroadBand (eMBB) and massive Machine-Type Communications (mMTC). eMBB services are requested for applications that demand extremely high data rates and moderate...

Citations

... Despite these advantages, RedCap devices face challenges related to efficient multiple-access techniques that can fully leverage their potential while adhering to their constraints. There are many multiple access techniques both orthogonal and non-orthogonal proposed in the literature recently [2], [3], but none of them is deemed a good fit for the multifaceted requirements of RedCap devices, especially the one related to reducing complexity while improving efficiency. Motivated by that, this paper introduces a new multiple-access technique designed to address these challenges, aiming to optimize the performance and efficiency of RedCap devices in various application scenarios. ...
Article
RedCap devices face challenges related to efficient multiple access techniques that can fully leverage their potential while adhering to their constraints. There are many multiple access techniques proposed in the literature recently, but none of them is deemed a good fit for the multi-facet requirements of RedCap devices. Motivated by that, this paper introduces a new multiple-access technique designed to address these challenges, aiming to optimize the performance and efficiency of RedCap devices in various application scenarios. The proposed technique seeks to enhance data rates, reduce latency, and extend battery life while maintaining the cost-effectiveness and simplicity essential for RedCap devices. Consequently, the proposed design effectively overcomes prior challenges and boosts system throughput by leveraging the power domain to transmit supplementary data bits, all while preserving a streamlined and uncomplicated transceiver design. In summary, with the same time, frequency, space, and power resources, it can be served an additional user with a stream of data bits equal to that of the main user, thus resulting in doubling the system’s spectral efficiency.
... Perfect confidentiality and zero information leakage are guaranteed by the auxiliary signal design against external illegal users as well as between the authorized users. • Working in any scenario: The proposed architecture allows the combination of any two users, independent of their distances from the base station, in contrast to standard NOMA, which only allows users with varied distances from the base station to be superimposed [8], [9], [10], [11]. ...
... The frequency-domain precoder matrices should be designed in such a way to cancel the interference caused by U E 2 on U E 1 and vice versa. From (8), the term including the factor x 1 is the only term desired with respect to U E 1 whereas the left terms in (8) represents the undesired interference caused by U E 2 on U E 1 . ...
... The frequency-domain precoder matrices should be designed in such a way to cancel the interference caused by U E 2 on U E 1 and vice versa. From (8), the term including the factor x 1 is the only term desired with respect to U E 1 whereas the left terms in (8) represents the undesired interference caused by U E 2 on U E 1 . ...
Preprint
Full-text available
In this paper, we introduce ZIMUX, a novel nonorthogonal, zero-interference multiplexing method designed to achieve completely interference-free, secure, and reliable transmission in future wireless networks (6G and Beyond). Unlike conventional non-orthogonal multiple access (NOMA), which struggles with increased complexity and inter-user interference, ZIMUX leverages the design of a novel type of frequency domain-based precoders to eliminate inter-user interference, while ensuring simplified receiver operations with no need for successive interference cancellation (SIC) nor channel equalization. Key benefits of ZIMUX include reduced receiver complexity, lower transmission latency, decreased signaling overhead, and enhanced security against both external and internal eavesdropping. Our design enables the seamless combination of users regardless of their distance from the base station, making it adaptable to a wide range of communication scenarios. The simplicity and efficiency of ZIMUX position it as a candidate solution for applications requiring low complexity, such as the Internet of Things (IoT), while maintaining high levels of security and performance. (Article link: https://rs-ojict.pubpub.org/pub/hqw3pak4/)
... Perfect confidentiality and zero information leakage are guaranteed by the auxiliary signal design against external illegal users as well as between the authorized users. • Working in any scenario: The proposed architecture allows the combination of any two users, independent of their distances from the base station, in contrast to standard NOMA, which only allows users with varied distances from the base station to be superimposed [8], [9], [10], [11]. ...
... The frequency-domain precoder matrices should be designed in such a way to cancel the interference caused by U E 2 on U E 1 and vice versa. From (8), the term including the factor x 1 is the only term desired with respect to U E 1 whereas the left terms in (8) represents the undesired interference caused by U E 2 on U E 1 . ...
... The frequency-domain precoder matrices should be designed in such a way to cancel the interference caused by U E 2 on U E 1 and vice versa. From (8), the term including the factor x 1 is the only term desired with respect to U E 1 whereas the left terms in (8) represents the undesired interference caused by U E 2 on U E 1 . ...
Preprint
In this paper, we introduce ZIMUX, a novel Non-Orthogonal Multiple Access (NOMA) technology designed to achieve completely interference-free, secure, and reliable transmission in future wireless networks (6G and Beyond). Unlike conventional NOMA, which struggles with increased complexity and inter-user interference, ZIMUX leverages the design of a novel type of frequency domain-based precoders to eliminate inter-user interference, while ensuring simplified receiver operations. Key benefits of ZIMUX include reduced receiver complexity, lower transmission latency, decreased signaling overhead, and enhanced security against both external and internal eavesdropping. Our design enables the seamless combination of users regardless of their distance from the base station, making it adaptable to a wide range of communication scenarios. The simplicity and efficiency of ZIMUX position it as a candidate solution for applications requiring low complexity, such as the Internet of Things (IoT), while maintaining high levels of security and performance.
... Motivated by previous studies on cooperative precoding to enhance channel quality for legitimate users [63][64][65] and cooperative jamming to impair channel quality for unauthorized users in wireless communication [66][67][68] , we propose a novel cooperative jamming and precoding PLS scheme for IBFD DF relayaided PLC systems. Unlike other studies assuming perfect channel information 69,70 , our proposed approach takes into account imperfect channel information and aims to design the precoding matrices at the legitimate nodes. The objective is to maximize the secrecy rate of AF relay-aided PLC systems with imperfect channel information in the presence of multiple eavesdroppers. ...
Article
Full-text available
Enhancing information security has become increasingly significant in the digital age. This paper investigates the concept of physical layer security (PLS) within a relay-aided power line communication (PLC) system operating over a multiple-input multiple-output (MIMO) channel based on MK model. Specifically, we examine the transmission of confidential signals between a source and a distant destination while accounting for the presence of multiple eavesdroppers, both colluding and non-colluding. We propose a two-phase jamming scheme that leverages a full-duplex (FD) amplify-and-forward (AF) relay to address this challenge. Our primary objective is to maximize the secrecy rate, which necessitates the optimization of the jamming precoding and transmitting precoding matrices at both the source and the relay while adhering to transmit power constraints. We present a formulation of this problem and demonstrate that it can be efficiently solved using an effective block coordinate descent (BCD) algorithm. Simulation results are conducted to validate the convergence and performance of the proposed algorithm. These findings confirm the effectiveness of our approach. Furthermore, the numerical analysis reveals that our proposed algorithm surpasses traditional schemes that lack jamming to achieve higher secrecy rates. As a result, the proposed algorithm offers the benefit of guaranteeing secure communications in a realistic channel model, even in scenarios involving colluding eavesdroppers.
... After the duration of t 1 and t 2 , the modified received signals are represented by equations (17), (18), (19), and (20) are equalized at the respective receivers to remove the channel effects and get the desired data at the legitimate user which is done by simply multiplying each equation by the inverse of the sum of channels experienced by the received signals as shown below ...
... The obtained computer simulation results prove that the performance of the proposed system is better than the individual systems utilizing AS, PR, and conventional MIMO based systems. We also intend to extend the proposed technique to existing papers [36], [38], [39], [34], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52] that are related to signal superposition, auxiliary signals, and precoding methods. ...
Article
Full-text available
A wireless network can utilize its entire resources to serve users without any allocation and provide upgraded performances such as enhanced throughput and high reliability without interference among users. However, previous wireless communication technologies could not bring the full utilization of network resources and overcome the challenge of forgoing scheduling among users. Therefore, to address these requirements, we propose and develop a novel design coined as Precoded Universal MIMO Superposition Transmission (PU-MIMO-ST) that can also be applicable for the most challenging and worst case interference scenario where the number of antenna points (APs) and the number of user equipment (UEs) is equal. In the considered system model, the APs are linked to a central processing unit (CPU) via backhaul and the UEs receive cooperation from the network resulting in achieving the optimal usage of network resources. The results obtained from computer simulations proof and verify the effectiveness of the proposed design called PU-MIMO-ST compared with other competitive works in terms of reliability, throughput, reduced complexity on the reception side, as well as power conservation.
... The contribution of this paper lies in bridging the gap between the two fields of spectral gain enhancement where the technique developed, in this paper, is capable of enhancing the spectral gain at both the area level and at the device level. MU-AS-ST was proposed with other designs in [11] as novel non-orthogonal transmission schemes for achieving highly efficient, reliable, and secure multi-user communications. Motivated by the need to address the limitations of the existing power domain NOMA schemes, authors in [11] presented four novel NOMA-inspired communication schemes for enhancing security and reliability of low complexity massive machine-type communications in future wireless networks. ...
... MU-AS-ST was proposed with other designs in [11] as novel non-orthogonal transmission schemes for achieving highly efficient, reliable, and secure multi-user communications. Motivated by the need to address the limitations of the existing power domain NOMA schemes, authors in [11] presented four novel NOMA-inspired communication schemes for enhancing security and reliability of low complexity massive machine-type communications in future wireless networks. Each of the proposed techniques was studied separately in detail as in [12]- [15]. ...
Article
Full-text available
The world of today is characterized by a very huge inter-connectivity of data-hungry devices. This imposes on wireless system designers not only developing techniques that are spectrally efficient at the area level where many users are served with the same resources simultaneously but also developing techniques that are spectrally efficient at the device level as well. For addressing this problem, we propose in this paper a technique that is capable of doubling the spectral efficiency per area and per device by modulating a recently developed multiple access design called multi-user auxiliary signal superposition transmission (MU-AS-ST) through a multi-dimensional OFDM technique termed OFDM with subcarrier power modulation (OFDM-SPM). This integration results in the technique proposed in this paper and yields, with doubling the spectral efficiency, merits such as robust security, low complexity, and enhanced transmission reliability. Article PDF: https://rs-ojict.pubpub.org/pub/d5qg7po3
... However, OFDMA is complex for devices and that sensitivity is for frequency compensation [24]. Another is non-orthogonal multiple access (NOMA) [25]. There is highly efficient and has better security for the user. ...
Article
Full-text available
The shortcoming of Wi-Fi networks is that one user can access the router at a time. This drawback limits the system throughput and delay. This paper proposes a concept of Simultaneously Different Tx/Rx (SDTR) radiation patterns with only one antenna set at the router. Furthermore, these two patterns have to be simultaneously operated at the same time so that the system delay can be eased. An omni-directional pattern is employed at router for receiving mode so that the router can sense carrier signal from all directions. At the same time, the router launches a directional beam pointed to another user. A proposed circuit allows these two modes to be able to operate the same time. To evaluate the SDTR concept, a prototype is constructed for testing in real circumstance comparing to computer simulation. As a result, the SDTR concept can improve the system throughput while decreasing the system delay comparing to conventional system.
... The considerable processing power required by cryptography is incompatible with future low-power wireless devices. Finally, cryptography lacks the versatility to provide various levels of security for numerous services and contexts [5]. ...
Article
Fifth-generation (5G) mobile networks require authenticated and fully secured transmissions between user devices and 5G base stations (gNodeB). In the current 5G technology standard, mobile devices cannot distinguish between a real and a fake base station (BS) by following the standard 5G security protocols. This vulnerability is a dangerous security issue identified in 5G cellular networks worldwide, where hackers and spoofers can easily impersonate or hack the valuable information of mobile users. Although 5G security protocols are enhanced to prevent such kinds of attacks, fake BSs still threaten the security of wireless communication networks. To the best of the authors’ knowledge, there is currently no security method available in the literature that can enable users to identify who is sending the connection request response. Thus, this can allow an attacker to intercept the international mobile subscriber identity (IMSI) easily in the clear. Therefore, in this work, we propose a novel hack-proof framework that can perfectly secure IMSI resulting in prevention against spoofing attacks. The proposed algorithm includes a user equipment device (UE) and a BS that communicate in the clear to securely authenticate each other in a TDD fashion. For simulation purposes, an OFDM transmission scheme is considered over a multipath wireless fading channel. The obtained results show that our proposed method works successfully without affecting the reliability of the transmitted bits compared to plain data transmission methods. More specifically, the performance results are shown to be similar to normal OFDM-based data transmission schemes conducted over general multipath fading channels, where no further degradation is caused. This indicates that the proposed method can effectively secure the IMSI of mobile user devices against active and passive attackers by providing a safe network connection between the communicating parties (UE and BS).
... The obtained computer simulation results prove that the performance of the proposed system is better than the individual systems utilizing AS, PR, and conventional MIMO based systems. We also intend to extend the proposed technique to existing papers [36], [38], [39], [34], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52] that are related to signal superposition, auxiliary signals, and precoding methods. ...
Article
Full-text available
A wireless network can utilize its complete resources to serve users without sharing and offer services like enhancing spectral efficiency, and providing an unprecedented reliable performance without interference among users. Previous wireless communication technologies could not offer the full utilization of a network’s resources and overcome the challenge of forgoing scheduling. Therefore, to address these requirements and proclaim that a wireless network can utilize its full capabilities to serve every user in a network without sharing a shred of its resource, we propose a novel design known as PU-MIMO-ST (Precoded Universal MIMO Superposition Transmission) to provide usage of a network’s complete resources and capabilities to every user without any interference and sharing at all. This framework involves two geographically distributed antennas that serve two user equipments (UEs) concurrently with superimposed user data signals. The antennas termed antenna points (APs) form a link to a central processing unit (CPU) via a backhaul, and the UEs receive full cooperation from the network because the number of APs equals the number of UEs. Thus, the proposed design achieves the optimal usage of networks resources. The results obtained from the computer simulation point out the effectiveness of PUMIMO-ST compared with other similar works in terms of reliability, throughput, reduced complexity on the reception side, and saving of power. Keywords: MIMO, multi-user MIMO, massive MIMO, network MIMO, distributed MIMO, distributed antenna system, multi-cell MIMO, DIDO, cell-free massive MIMO, pCell, 6G and Beyond.