Lifeng Wang

Lifeng Wang
University College London | UCL · Department of Electronic and Electrical Engineering

Doctor of Philosophy in Electronic Engineering

About

48
Publications
21,885
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,371
Citations

Publications

Publications (48)
Conference Paper
Full-text available
In this paper, the synergy of combining the edge and central cloud computing is studied in heterogeneous cellular networks (HetNets). Multi-antenna small base stations (SBSs) equipped with edge cloud servers offer computing services for user equipment (UEs) proximally, whereas a macro base station (MBS) provides central cloud computing services for...
Article
Full-text available
In this paper, we study the coexistence and synergy between edge and central cloud computing in a heterogeneous cellular network (HetNet), which contains a multi-antenna macro base station (MBS), multiple multi-antenna small base stations (SBSs) and multiple single-antenna user equipment (UEs). The SBSs are empowered by edge clouds offering limited...
Preprint
This study focuses on edge computing in dense millimeter wave vehicle-to-everything (V2X) networks. A control problem is formulated to minimize the energy consumption under delay constraint resulting from vehicle mobility. A tractable algorithm is proposed to solve this problem by optimizing the offloaded computing tasks and transmit power of vehic...
Preprint
Full-text available
In this paper, we study the coexistence and synergy between edge and central cloud computing in heterogeneous cellular networks (HetNets), in which multi-antenna small base stations (SBSs) empowered by clouds at the edge offer computing services for user equipments (UEs), whereas a macro base station (MBS) provides computing services from a central...
Article
Full-text available
This paper focuses on edge caching in dense heterogeneous cellular networks (HetNets), in which small base stations (SBSs) with limited cache size store the popular contents, and massive multiple-input multiple-output (MIMO) aided macro base stations provide wireless self-backhaul when SBSs require the non-cached contents. Our aim is to address the...
Article
Full-text available
Heterogeneous ultra-dense networks enable ultra-high data rates and ultra-low latency through the use of dense sub-6 GHz and millimeter wave (mmWave) small cells with different antenna configurations. Existing work has widely studied spectral and energy efficiency in such networks and shown that high spectral and energy efficiency can be achieved....
Article
Full-text available
This paper studies the performance of cache-enabled dense small cell networks consisting of multi-antenna sub-6 GHz and millimeter-wave base stations. Different from the existing works which only consider a single antenna at each base station, the optimal content placement is unknown when the base stations have multiple antennas. We first derive th...
Conference Paper
Full-text available
This paper studies the performance of cache-enabled dense small cell networks consisting of multi-antenna sub-6 GHz and millimeter-wave base stations. We first derive the successful content delivery probability by accounting for the key channel features at sub-6 GHz and mmWave frequencies. In general, the optimal content placement is unknown when t...
Article
Full-text available
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This paper explores the potential of physica...
Article
Full-text available
One of key 5G scenarios is that device-to-device (D2D) and massive multiple-input multiple-output (MIMO) will be co-existed. However, interference in the uplink D2D underlaid massive MIMO cellular networks needs to be coordinated, due to the vast cellular and D2D transmissions. To this end, this paper introduces a spatially dynamic power control so...
Article
Full-text available
This paper focuses on wireless powered 5G dense cellular networks, where base station (BS) delivers energy to user equipment (UE) via the microwave radiation in sub-6 GHz or millimeter wave (mmWave) frequency, and UE uses the harvested energy for uplink information transmission. By addressing the impacts of employing different number of antennas an...
Conference Paper
One of key 5G scenarios is that device-to-device (D2D) and massive multiple-input multiple-output (MIMO) will be co-existed. However, interference in the uplink D2D underlaid massive MIMO cellular networks needs to be coordinated, due to the vast cellular and D2D transmissions. To this end, this paper introduces a spatially dynamic power control so...
Conference Paper
This paper considers the massive multiple-input multiple-output (MIMO) enabled heterogeneous cloud radio access network (C-RAN), in which both remote radio heads (RRHs) and massive MIMO macrocell base stations (BS) are deployed to potentially accomplish high throughput and energy efficiency (EE). In this network, the soft fractional frequency reuse...
Article
Full-text available
In this paper, we investigate the potential benefits of the massive multiple-input multiple-output (MIMO) enabled heterogeneous cloud radio access network (C-RAN) in terms of the secrecy and energy efficiency (EE). In this network, both remote radio heads (RRHs) and massive MIMO macrocell base stations (BSs) are deployed and soft fractional frequen...
Article
In this letter, we exploit the implementation of uplink power control and cell range extension for interference coordination in a two-tier massive multiple input multiple output (MIMO) enabled heterogeneous cellular network. Our results show that the uplink performance in the massive MIMO macrocells can be significantly improved through uplink powe...
Article
Full-text available
This paper explores the potential of wireless power transfer (WPT) in massive multiple-input multiple-output (MIMO) aided heterogeneous networks (HetNets), where massive MIMO is applied in the macrocells, and users aim to harvest as much energy as possible and reduce the uplink path loss for enhancing their information transfer. By addressing the i...
Conference Paper
In this paper, we investigate the potential application of wireless power transfer (WPT) in heterogeneous networks (HetNets) with massive multiple-input multiple-output (MIMO) antennas. Users first harvest energy from the downlink WPT, and then use the harvested energy for uplink transmission. We adopt the downlink received signal power (DRSP) base...
Article
Full-text available
In this paper, we model and analyze the downlink (DL) wireless power transfer and uplink (UL) information transmission of K-tier heterogeneous cellular networks (HCNs) with randomly located base stations (BSs) and mobile terminals (MTs). In the DL and UL, each energy-constrained MT pairs up with its corresponding BS, which provides the maximum rece...
Article
Full-text available
This paper considers amplify-and-forward (AF) two-way relay networks, where an energy constrained relay node harvests energy from the received radio-frequency signal. Based on time switching (TS) receiver, we separate the energy harvesting (EH) phase and the information processing (IP) phase in time. In the EH phase, three practical wireless power...
Article
Full-text available
We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks,where multiple non-colluding eavesdroppers attempt to intercept the secondary transmission. We develop a comprehensive analytical framework to accurately assess the secrecy performance un...
Article
Full-text available
This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks using stochastic geometry. In such networks, the sensing data from the remote sensors are collected by sinks with the help of access points, and the external eavesdroppers intercept the data transmissions...
Conference Paper
Full-text available
Compared to the existing lower frequency wireless power transfer, millimeter wave (mmWave) power transfer takes advantage of the high-dimensional multi-antenna and narrow beam transmission. In this paper we introduce wireless power transfer for mmWave cellular networks. Here, we consider users with large energy storage that are recharged by the mmW...
Article
Full-text available
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We int...
Article
Full-text available
This letter focuses on the spectrum efficiency (SE) and energy efficiency (EE) of K-tier heterogeneous networks (HetNets), in which massive multiple-input multiple-output (MIMO) is employed in the macro cells. We consider the impact of massive MIMO on flexible cell association. We develop an analytical approach to examine SE and EE of HetNets. We c...
Conference Paper
Full-text available
This paper exploits the potential of physical layer security in massive multiple-input multiple-output (MIMO) aided two-tier heterogeneous networks (HetNets). We focus on the downlink secure transmission in the presence of multiple eavesdroppers. We first address the impact of massive MIMO on the maximum receive power based user association. We the...
Article
Full-text available
The fifth generation (5G) mobile networks are envisioned to support the deluge of data traffic with reduced energy consumption and improved quality of service (QoS) provision. To this end, the key enabling technologies, such as heterogeneous networks (HetNets), massive multiple-input multiple-output (MIMO) and millimeter wave (mmWave) techniques, a...
Article
Full-text available
Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdrop...
Article
Full-text available
Massive multiple-input and multiple-output (MIMO) and heterogeneous networks (HetNets) have been recognized as key enabling technologies for future fifth generation (5G) mobile networks. However, the circuit power consumption of massive MIMO scales with the tremendous number of antennas. As a result, the problem of energy efficient user association...
Article
Full-text available
Massive multiple input multiple output (MIMO) is one of the key technologies for fifth generation and can substantially improve energy and spectrum efficiencies. This paper explores the potential benefits of massive MIMO in spectrum sharing networks. We consider a multiuser MIMO primary network , with N P-antenna primary base station (PBS) and K si...
Conference Paper
Full-text available
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the cellular base stations (BSs). We in...
Article
Full-text available
We consider transmit antenna selection with receive generalized selection combining (TAS/GSC) for cognitive decode-and-forward (DF) relaying in Nakagami-$m$ fading channels. In an effort to assess the performance, the probability density function and the cumulative distribution function of the end-to-end SNR are derived using the moment generating...
Article
Full-text available
The fifth generation (5G) network will serve as a key enabler in meeting the continuously increasing demands for future wireless applications, including an ultra-high data rate, an ultrawide radio coverage, an ultra-large number of devices, and an ultra-low latency. This article examines security, a pivotal issue in the 5G network where wireless tr...
Conference Paper
Full-text available
Energy efficiency has become one of the key performance indicators for 5G wireless networks. Coordinated multipoint (CoMP) transmission/reception and multi-input single-output (MISO) are two technologies which can achieve higher energy efficiency in heterogeneous networks (HetNets) compared to conventional single-input single-out (SISO) systems. Co...
Article
In this paper, the impact of multiple eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with...
Conference Paper
Full-text available
This paper exploits an amplify-and-forward (AF) two-way relaying network (TWRN), where an energy constrained relay node harvests energy with wireless power transfer. Two bidirectional protocols, multiple access broadcast (MABC) protocol and time division broadcast (TDBC) protocol, are considered. Three wireless power transfer policies, namely, 1) d...
Article
Full-text available
In this paper, the impact of multiple active eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the rel...
Article
Full-text available
In this paper, the impact of interference from multiple licensed transceivers on cognitive underlay single-carrier systems is examined. Specifically, the situation is considered in which the secondary network is limited by three key parameters: 1) maximum transmit power at the secondary transmitter, 2) peak interference power at the primary receive...
Article
This paper considers transmit antenna selection (TAS) and receive generalized selection combining (GSC) for secure communication in the multiple-input-multiple-output wiretap channel, where confidential messages transmitted from an NA-antenna transmitter to an NB-antenna legitimate receiver are overheard by an NE-antenna eavesdropper. We assume tha...
Article
We consider the problem of secure transmission in two-hop amplify-and-forward untrusted relay networks. We analyze the ergodic secrecy capacity (ESC) and present compact expressions for the ESC in the high signal-to-noise ratio regime. We also examine the impact of large scale antenna arrays at either the source or the destination. For large antenn...
Conference Paper
Full-text available
We examine the impact of transmit antenna selection with receive generalized selection combining (TAS/GSC) for cognitive decode-and-forward (DF) relaying in Nakagami-m fading channels. We select a single transmit antenna at the secondary transmitter which maximizes the receive signal-to-noise ratio (SNR) and combine a subset of receive antennas wit...
Conference Paper
This paper proposes millimeter wave (mmWave) mobile broadband for achieving secure communication in downlink cellular network. Analog beamforming with phase shifters is adopted for the mmWave transmission. The secrecy throughput is analyzed based on two different transmission modes, namely delay-tolerant transmission and delay-limited transmission....
Article
Full-text available
This paper advocates physical layer security of maximal ratio combining (MRC) in wiretap two-wave with diffuse power fading channels. In such a wiretap channel, we consider that confidential messages transmitted from a single antenna transmitter to an $M$-antenna receiver are overheard by an $N$-antenna eavesdropper. The receiver adopts MRC to maxi...
Article
Full-text available
This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward relay networks, where a pair of cognitive relays is opportunistically selected for security protection against eavesdropping. The first relay transmits the secrecy information to the destination, and the second relay, as a friendly jammer,...
Article
This paper utilizes a new strategy to accomplish the general uplink opportunistic interference alignment (OIA) in cellular network. K cooperative cells are considered, each user and base station (BS) own N transmit antennas and M receive antennas respectively. The leakage interference is newly defined. Each user calculates the amount of the leakage...

Network

Cited By