+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

5G and Beyond Wireless Communication Networks. Edition No. 1. IEEE Press

  • Book

  • 208 Pages
  • September 2023
  • John Wiley and Sons Ltd
  • ID: 5839476

5G and Beyond Wireless Communication Networks

A comprehensive and up-to-date survey of 5G technologies and applications

In 5G and Beyond Wireless Communication Networks, a team of distinguished researchers deliver an expert treatment of the technical details of modern 5G wireless networks and the performance gains they make possible. The book examines the recent progress in research and development in the area, covering related topics on fundamental 5G requirements and its enabling technologies.

The authors survey 5G service architecture and summarize enabling technologies, including highly dense small cell and heterogeneous networks, device-to-device communications underlaying cellular networks, fundamentals of non-orthogonal multiple access in 5G new radio and its applications. Readers will also find:

  • A thorough introduction to 5G wireless networks, including discussions of anticipated growth in mobile data traffic
  • Comprehensive explorations of dense small cell and heterogeneous networks
  • Practical discussions of the most recent developments in 5G research and enabling technologies
  • Recent advancement of non-orthogonal multiple access and its role in current and future wireless systems

Perfect for graduate students, professors, industry professionals, and engineers with an interest in wireless communication, 5G and Beyond Wireless Communication Networks will also benefit undergraduate and graduate students and researchers seeking an up-to-date and accessible new resource about 5G networks.

Table of Contents

About the Authors xi

Preface xiii

Acknowledgments xv

1 Introduction to 5G and Beyond Network 1

1.1 5G and Beyond System Requirements 1

1.1.1 Technical Challenges 2

1.2 Enabling Technologies 3

1.2.1 5G New Radio 3

1.2.1.1 Non-orthogonal Multiple Access (NOMA) 3

1.2.1.2 Channel Codes 5

1.2.1.3 Massive MIMO 5

1.2.1.4 Other 5G NR Techniques 6

1.2.2 Mobile Edge Computing (MEC) 6

1.2.3 Hybrid and Heterogeneous Communication Architecture for Pervasive IoTs 7

1.3 Book Outline 8

2 5G Wireless Networks with Underlaid D2D Communications 11

2.1 Background 11

2.1.1 MU-MIMO 11

2.1.2 D2D Communication 11

2.1.3 MU-MIMO and D2D in 5G 12

2.2 NOMA-Aided Network with Underlaid D2D 12

2.3 NOMA with SIC and Problem Formation 14

2.3.1 NOMA with SIC 14

2.3.2 Problem Formation 15

2.4 Precoding and User Grouping Algorithm 15

2.4.1 Zero-Forcing Beamforming 16

2.4.1.1 First ZF Precoding 16

2.4.1.2 Second ZF Precoding 16

2.4.2 User Grouping and Optimal Power Allocation 16

2.4.2.1 First ZF Precoding 17

2.4.2.2 Second ZF Precoding 18

2.5 Numerical Results 18

2.6 Summary 19

3 5G NOMA-Enabled Wireless Networks 21

3.1 Background 21

3.2 Error Propagation in NOMA 22

3.3 SIC and Problem Formulation 22

3.3.1 SIC with Error Propagation 23

3.3.2 Problem Formation 24

3.4 Precoding and Power Allocation 25

3.4.1 Precoding Design 25

3.4.2 Case Studies for Power Allocation 26

3.4.2.1 Case I 26

3.4.2.2 Case II 27

3.5 Numerical Results 27

3.6 Summary 30

4 NOMA in Relay and IoT for 5G Wireless Networks 31

4.1 Outage Probability Study in a NOMA Relay System 31

4.1.1 Background 31

4.1.2 System Model 32

4.1.2.1 NOMA Cooperative Scheme 32

4.1.2.2 NOMA TDMA Scheme 34

4.1.3 Outage Probability Analysis 35

4.1.3.1 Outage Probability in NOMA Cooperative Scheme 35

4.1.4 Outage Probability in NOMA TDMA Scheme 36

4.1.5 Outage Probability with Error Propagation in SIC 37

4.1.5.1 Outage Probability in NOMA Cooperative Scheme with EP 38

4.1.5.2 Outage Probability in NOMA TDMA Scheme with EP 38

4.1.6 Numerical Results 39

4.2 NOMA in a mmWave-Based IoT Wireless System with SWIPT 41

4.2.1 Introduction 41

4.2.2 System Model 41

4.2.2.1 Phase 1 Transmission 42

4.2.2.2 Phase 2 Transmission 44

4.2.3 Outage Analysis 45

4.2.3.1 UE 1 Outage Probability 45

4.2.3.2 UE 2 Outage Probability 45

4.2.3.3 Outage at High SNR 47

4.2.3.4 Diversity Analysis for UE 2 47

4.2.4 Numerical Results 47

4.2.5 Summary 48

5 Robust Beamforming in NOMA Cognitive Radio Networks: Bounded CSI 51

5.1 Background 51

5.1.1 RelatedWork and Motivation 52

5.1.1.1 Linear EH Model 52

5.1.1.2 Non-linear EH Model 53

5.1.2 Contributions 53

5.2 System and Energy Harvesting Models 54

5.2.1 System Model 54

5.2.2 Non-linear EH Model 55

5.2.3 Bounded CSI Error Model 55

5.2.3.1 NOMA Transmission 56

5.3 Power Minimization-Based Problem Formulation 56

5.3.1 Problem Formulation 57

5.3.2 Matrix Decomposition 59

5.4 Maximum Harvested Energy Problem Formulation 60

5.4.1 Complexity Analysis 61

5.5 Numerical Results 62

5.5.1 Power Minimization Problem 62

5.5.2 Energy Harvesting Maximization Problem 64

5.6 Summary 67

6 Robust Beamforming in NOMA Cognitive Radio Networks: Gaussian CSI 69

6.1 Gaussian CSI Error Model 69

6.2 Power Minimization-Based Problem Formulation 69

6.2.1 Bernstein-Type Inequality I 70

6.2.2 Bernstein-Type Inequality II 71

6.3 Maximum Harvested Energy Problem Formulation 72

6.3.1 Complexity Analysis 73

6.4 Numerical Results 73

6.4.1 Power Minimization Problem 74

6.4.2 Energy Harvesting Maximization Problem 76

6.5 Summary 79

7 Mobile Edge Computing in 5G Wireless Networks 81

7.1 Background 81

7.2 System Model 82

7.2.1 Data Offloading 83

7.2.2 Local Computing 83

7.3 Problem Formulation 83

7.3.1 Update pk, tk, and fk 85

7.3.2 Update Lagrange Multipliers 86

7.3.3 Update Auxiliary Variables 86

7.3.4 Complexity Analysis 87

7.4 Numerical Results 87

7.5 Summary 90

8 Toward Green MEC Offloading with Security Enhancement 91

8.1 Background 91

8.2 System Model 92

8.2.1 Secure Offloading 92

8.2.2 Local Computing 93

8.2.3 Receiving Computed Results 93

8.2.4 Computation Efficiency in MEC Systems 93

8.3 Computation Efficiency Maximization with Active Eavesdropper 94

8.3.1 SCA-Based Optimization Algorithm 94

8.3.2 Objective Function 95

8.3.3 Proposed Solution to P4 with given (λΚ, βΚ) 96

8.3.4 Update (λΚ, βΚ) 97

8.4 Numerical Results 97

8.5 Summary 100

9 Wireless Systems for Distributed Machine Learning 101

9.1 Background 101

9.2 System Model 102

9.2.1 FL Model Update 102

9.2.2 Gradient Quantization 104

9.2.3 Gradient Sparsification 104

9.3 FL Model Update with Adaptive NOMA Transmission 104

9.3.1 Uplink NOMA Transmission 104

9.3.2 NOMA Scheduling 105

9.3.3 Adaptive Transmission 106

9.4 Scheduling and Power Optimization 107

9.4.1 Problem Formulation 107

9.5 Scheduling Algorithm and Power Allocation 108

9.5.1 Scheduling Graph Construction 108

9.5.2 Optimal scheduling Pattern 109

9.5.3 Power Allocation 110

9.6 Numerical Results 111

9.7 Summary 114

10 Secure Spectrum Sharing with Machine Learning: An Overview 115

10.1 Background 115

10.1.1 SS: A Brief History 116

10.1.2 Security Issues in SS 118

10.2 ML-Based Methodologies for SS 119

10.2.1 ML-Based CRN 119

10.2.1.1 Spectrum Sensing 120

10.2.1.2 Spectrum Selection 122

10.2.1.3 Spectrum Access 123

10.2.1.4 Spectrum Handoff 125

10.2.2 Database-Assisted SS 125

10.2.2.1 ML-Based EZ Optimization 126

10.2.2.2 Incumbent Detection 126

10.2.2.3 Channel Selection and Transaction 127

10.2.3 ML-Based LTE-U/LTE-LAA 127

10.2.3.1 ML-Based LBT Methods 128

10.2.3.2 ML-Based Duty Cycle Methods 129

10.2.3.3 Game-Theory-Based Methods 129

10.2.3.4 Distributed-Algorithm-Based Methods 130

10.2.4 Ambient Backscatter Networks 131

10.2.4.1 Information Extraction 131

10.2.4.2 Operating Mode Selection and User Coordination 132

10.2.4.3 AmBC-CR Methods 133

10.3 Summary 134

11 Secure Spectrum Sharing with Machine Learning: Methodologies 135

11.1 Security Concerns in SS 135

11.1.1 Primary User Emulation Attack 135

11.1.2 Spectrum Sensing Data Falsification Attack 135

11.1.3 Jamming Attacks 136

11.1.4 Intercept/Eavesdrop 137

11.1.5 Privacy Issues in Database-Assisted SS Systems 137

11.2 ML-Assisted Secure SS 138

11.2.1 State-of-the-Art Methods of Defense Against PUE Attack 138

11.2.1.1 ML-Based Detection Methods 138

11.2.1.2 Robust Detection Methods 140

11.2.1.3 ML-Based Attack Methods 141

11.2.2 State-of-the-Art Methods of Defense Against SSDF Attack 142

11.2.2.1 Outlier Detection Methods 143

11.2.2.2 Reputation-Based Detection Methods 143

11.2.2.3 SSDF and PUE Combination Attacks 144

11.2.3 State-of-the-Art Methods of Defense Against Jamming Attacks 144

11.2.3.1 ML-Based Anti-Jamming Methods 145

11.2.3.2 Attacker Enhanced Anti-Jamming Methods 146

11.2.3.3 AmBC Empowered Anti-Jamming Methods 148

11.2.4 State-of-the-Art Methods of Defense Against Intercept/Eavesdrop 149

11.2.4.1 RL-Based Anti-Eavesdropping Methods 149

11.2.5 State-of-the-Art ML-Based Privacy Protection Methods 150

11.2.5.1 Privacy Protection for PUs in SS Networks 150

11.2.5.2 Privacy Protection for SUs in SS Networks 151

11.2.5.3 Privacy Protection for ML Algorithms 151

11.3 Summary 153

12 Open Issues and Future Directions for 5G and Beyond Wireless Networks 155

12.1 Joint Communication and Sensing 155

12.2 Space-Air-Ground Communication 155

12.3 Semantic Communication 156

12.4 Data-Driven Communication System Design 156

Appendix A Proof of Theorem 5.1 157

Bibliography 161

Index 181

Authors

Haijian Sun Utah State University, USA. Rose Qingyang Hu National Inst. of Standards & Technology. Yi Qian University of Nebraska-Lincoln, USA.