Abstract—Multiple access in 5G mobile networks is an emerging research topic, since it is key for the next generation network to keep pace with the exponential growth of mobile data and multimedia traffic. Non-orthogonal multiple access (NOMA) has recently received considerable attention as a promising candidate for 5G multiple access. The key idea of NOMA is to exploit the power domain for multiple access, which means multiple users can be served concurrently at the same time, frequency, and spreading code. Instead of using water-filling power allocation strategies, NOMA allocates more power to the users with poorer channel conditions, with the aim to facilitate a balanced tradeoff between system throughput and user fairness. Recent industrial demonstrations show that the use of NOMA can significantly improve the spectral efficiency of mobile networks. Because of such a superior performance, NOMA has been also recently proposed for downlink scenarios in 3rd generation partnership project long-term evolution (3GPP-LTE) systems, and the considering technique was termed multiuser superposition transmission (MUST). In this tutorial, we will provide a progress review for NOMA, including an information theoretic perspective of NOMA, the interaction between cognitive radio and NOMA, the design of MIMO and cooperative NOMA, the application of NOMA in millimeter-wave (mmWave) networks, and the impact of practical constraints, such as imperfect channel state information and limited feedback, on the performance of NOMA.
Objectives 1. Review for the overall requirements to realize spectrally efficient 5G communications.
2. The tutorial will start by introducing the basic concepts of NOMA in a simple scenario with one base station and multiple users, where each node is equipped with a single antenna. The performance gain of NOMA will be illustrated from an information theoretic perspective.
3. The interaction between the two 5G concepts, NOMA and cognitive ratio networks will be illustrated. On one hand, NOMA can be viewed as a special case of cognitive radio networks, which means that many solutions obtained from cognitive radio networks, particularly power allocation polices, can be applied to NOMA. On the other hand, the application of NOMA in cognitive radio networks can ensure secondary users are admitted in a more spectrally efficient way.
4. The combination of MIMO technologies and NOMA will be described. Unlike conventional multiple access techniques, the design of MIMO-NOMA is challenging. For example, power allocation of NOMA requires a step to order users according to their channel conditions. This user ordering is possible for SISO cases since it is easy to compare scalar channel coefficients, but it is difficult in MIMO scenarios in the presence of channel matrices/vectors. A few designs of MIMO-NOMA with different trade-offs between system performance and complexity will be illustrated.
5. The design of cooperative NOMA will be discussed. Note that in an NOMA system, successive interference cancellation is used, which means that some users know the other users’ information perfectly. Such priori information should be used, e.g., some users can be exploited as relays to help the others with poorer channel conditions. A few examples of cooperative NOMA protocols will be introduced and their advantages/disadvantages will be illustrated.
6. The application of NOMA in mmWave networks will be introduced. Similar to NOMA, the motivation for using mmWave communications is motivated by the spectrum crunch, but the solution provided by mmWave communications is to use mmWave bands which are less occupied compared to those used by current cellular networks. This talk to show that the use of NOMA is still important to mmWave networks, even though more bandwidth resources are available in very high frequencies, since the huge demands on bandwidth resources due to the exponential growth of broadband traffic can be met only by acquiring more radio spectrum and also efficiently using these acquired spectrum.
7. Recent standardization activities related to NOMA will be provided as well. Particularly the tutorial will focus on the implementation of multi-user superposition transmission (MUST), a technique which has been included into 3GPP LTE Release 13. Different forms of MUST, and their relationship to the fundamental form of NOMA will be discussed.
8. Challenges and open problems about realizing spectrally efficient NOMA communications in the next generation of wireless networks will be discussed.
1: Overview and Motivation
2: The Impact of User Pairing on NOMA
2: The Impact of Imperfect CSI
2: The Design of NOMA When Users Have Similar Channel Conditions
1: Cooperative NOMA
2: Basics of Cooperative NOMA
2: The Application of SWIPT to Cooperative NOMA
2: Relay Selection for Cooperative NOMA
1: Interplay Between Cognitive Radio and NOMA
2: Cognitive Radio inspired NOMA
2: Dynamic NOMA
2: The Application of NOMA to Cognitive Radio Networks
2: MIMO-NOMA With Limited CSIT
2: MIMO-NOMA With CSIT
2: Application of NOMA to Massive MIMO
1: The Application of NOMA to mmWave Communications
2: The Motivation and Introduction
2: Random Beamforming in mmWave-NOMA networks
2: Performance Analysis for mmWave-NOMA transmission
1. Research Challenges and Future Directions
Primary Audience In presenting the tutorial, all concepts are built up from basics therefore the audience only require a modest prior knowledge of communications and signal processing. Methods are then presented to adjust and engineer the system behaviours to improve the spectrum efficiency while quantitative vision is given on the corresponding costs of such changes. The analytical tools and concepts provided in this tutorial as well as the techniques and conclusions are in line with the objectives and interests of IEEE VTC attendees, such as telecommunication engineers, academic researchers and graduate students.
Novelty This tutorial presents a timely overview on achieving spectrally efficient communications, the holy grail of modern wireless communications, particularly for emerging 5G networks. Therefore, the tutorial will shed light on some fundamental challenges in designing such spectrally efficient networks from the system engineering perspective. In presenting the tutorial, all concepts are built up from basics therefore the audience only require a modest prior knowledge of communications and signal processing. Furthermore, instructors’ newly published research results on the impact of NOMA communications on the system trade-offs will also be presente
Biography Zhiguo Ding received his B.Eng in Electrical Engineering from the Beijing University of Posts and Telecommunications in 2000, and the Ph.D degree in Electrical Engineering from Imperial College London in 2005. From Jul. 2005 to Aug. 2014, he was working in Queen’s University Belfast, Imperial College and Newcastle University. Since Sept. 2014, he has been with Lancaster University as a Chair Professor in Signal Processing. From Sept. 2012 to Sept. 2017, he is also an academic visitor in Princeton University working with Prof. Vincent Poor.
Dr Ding’ research interests are 5G networks, game theory, cooperative and energy harvesting networks and statistical signal processing. He is serving as an Editor for IEEE Transactions on Communications, IEEE Transactions on Vehicular Networks, IEEE Wireless Communication Letters, IEEE Communication Letters, and Journal of Wireless Communications and Mobile Computing. He was the TPC Co-Chair for the 6th IET International Conference on Wireless, Mobile & Multimedia Networks (ICWMMN2015), Symposium Chair for International Conference on Computing, Networking and Communications (ICNC 2016), and the 25th Wireless and Optical Communication Conference (WOCC), and Co-Chair of WCNC-2013 Workshop on New Advances for Physical Layer Network Coding. He received the best paper award in IET Comm. Conf. on Wireless, Mobile and Computing, 2009 and the 2015 International Conference on Wireless Communications and Signal Processing (WCSP 2015), IEEE Communication Letter Exemplary Reviewer 2012, and the EU Marie Curie Fellowship 2012-2014.
Abstract—Wireless communication technologies are ubiquitous nowadays. Most of the smart devices have
Cellular, Wi-Fi, Bluetooth connections. These technologies have been developed for many years, nonetheless they are still being enhanced. More development can be expected in the next 5 years, such as faster transmission data rate, more efficient spectrum usage, lower power consumption, etc. Similarly, cellular networks have been evolved for several generations. For example, GSM as part of 2G family, UMTS as part of the 3G family, and LTE as part of 4G family. In the next few years, 5G cellular network systems will continue the evolution to keep up with the fast-growing needs of customers. Secure wireless communications will certainly be part of other advances in the industry such as multimedia streaming, data storage and sharing in clouds, mobile cloud computing services, etc. This tutorial covers the topics on security for next generation mobile wireless networks, with focusing on 4G (LTE and LTE-A) and 5G mobile wireless network systems, followed by a discussion on the challenges and open research issues in the area of 5G security.
Objectives Wireless communication technologies are ubiquitous nowadays. Most of the smart devices have Cellular, Wi-Fi, Bluetooth connections. These technologies have been developed for many years, nonetheless they are still being enhanced. For instance, Wi-Fi has been enhanced from IEEE 802.11a/b/g standards to IEEE 802.11n/ac standards. More development can be expected in the next 5 years, such as faster transmission data rate, more efficient spectrum usage, lower power consumption, etc. Similarly, cellular networks have been evolved for several generations. For example, GSM as part of 2G family, UMTS as part of the 3G family, and LTE as part of 4G family. In the next few years, 5G cellular network systems will continue the evolution to keep up with the fast-growing needs of customers. Secure wireless communications will certainly be part of other advances in the industry such as multimedia streaming, data storage and sharing in clouds, mobile cloud computing services, etc.
Wireless security is one of the most important topics and attracting more and more attention from industry, research, and academia. Network system security encompasses integrity, authentication, confidentiality and non-repudiation of both user and management information. Unlike wired communication networks that have some degree of physical security, physical security in mobile wireless communication networks is impossible to achieve on wireless links (because of the broadcast nature) and therefore security attacks on information flow are the most widespread. Modification of information is possible because of the nature of the channel and the mobility of nodes. The radio channel is harsh and subject to interference, fading, multipath, and high error rates. As a result, packet losses are common even without security threats. An opponent can make use of these natural impairments to modify information and also render the information unavailable. This tutorial will address all these issues. Special attention will be paid to wireless specific issues, e.g., tradeoffs between security and power consumption, adaptively changing security protocols in response to the radio channel, etc. This tutorial covers the topics on security for next generation mobile wireless networks, with focusing on 4G (LTE and LTE-A) and 5G mobile wireless network systems, followed by a discussion on the challenges and open research issues in the area.
1. Security concepts & mechanisms (20 minutes)
a. Security services – confidentiality, integrity and authentication – and their use for protection/prevention in wireless communication networks
b. Other prevention mechanisms – access control, firewalls, and perimeter security
2. Classical mobile wireless network security (20 minutes)
a. A quick overview of 2G & 3G Security
i. Network security of CDMA and GSM
ii. Network security of UMTS and WiMAX
3. Mobile wireless network security - 4G Security (LTE, LTE-A) (50 minutes)
a. Vulnerabilities of LTE & LTE-A system architecture
b. LTE & LTE-A security architecture
c. LTE & LTE-A security features and mechanisms
d. Heterogeneous and small cell network security
e. Solutions to the related security issues in LTE & LTE-A
4. Next generation mobile wireless network security - 5G Security (60 minutes)
a. Overview of potential network security of 5G networks
i. Security for new service delivery models
ii. Evolved threat landscape
iii. Increased privacy concerns in 5G
b. 5G radio network security
c. Flexible and scalable security architecture
d. Energy-efficient security
e. Massive MIMO security and privacy
f. High frequency communications security
g. Cloud security
h. Other security issues in 5G
5. Challenges and open research issues (15 minutes)
6. Conclusion (15 minutes)
Primary Audience Graduate students, professors, researchers, scientists, practitioners, engineers, Industry managers, consultants, and government security agencies.
Novelty This tutorial not only covers the current research and development on security for 4G (LTE and LTE-A), but also the latest development on security for 5G mobile wireless network systems, and the unique discussions on the challenges and open research issues in the area, based on the tutorial speaker’s own research experience.
Biography Yi Qian is a professor in the Department of Electrical and Computer Engineering, University of Nebraska-Lincoln (UNL). Prior to joining UNL, he worked in the telecommunications industry, academia, and the government. His research interests include information assurance and network security, network design, network modeling, simulation and performance analysis for next generation wireless networks, wireless ad-hoc and sensor networks, vehicular networks, smart grid communication networks, broadband satellite networks, optical networks, high-speed networks and the Internet. He is serving on the editorial board for several international journals and magazines, including serving as the Associate Editor-in-Chief for IEEE Wireless Communications Magazine. He was the Chair of IEEE Communications Society Technical Committee for Communications and Information Security 2014-2015. He is a Distinguished Lecturer for IEEE Vehicular Technology Society.
Dr. Qian has been teaching “Network Security” every fall semester, and “Wireless Security” every spring semester after he joined University of Nebraska-Lincoln in 2009. He received two best teaching awards from the College of Engineering at UNL in the last few years. After teaching “Wireless Security” at UNL for the last six years, Dr. Qian is writing a comprehensive textbook on the topic, “Security in Wireless Communication Networks”, to be published by Wiley/IEEE Press in 2017.
Abstract—The demands on massive connectivity, large capacity and short latency for the next generation wireless communication networks (5G) drastically push the development of new type multiple access technology over the conventional orthogonal access technology. Recently, some new type non-orthogonal multiple access techniques such as sparse code multiple access (SCMA) proposed by Huawei, multiuser shared access (MUSA) proposed by ZTE and pattern division multiple access (PDMA) proposed by DTmobile have attracted lots of attention and have been looked as the potential 5G New Air Interface Technologies. In this tutorial, I will make an extensive introduction to the sparse code multiple access (SCMA) as a representative of non-orthogonal multiple access techniques, where I will majorly focus on the codebook and decoder design, capacity analysis, codebook assignment and power assignment. Meanwhile I will address some related problems such as grant free access, energy efficiency, and inter-cell interference mitigation for SCMA networks. By this tutorial, one can get full image of SCMA, the importance of SCMA, SCMA design and some open problems related to SCMA.
Introduce the new type 5G air interface technology to the community such that communication people knows the latest advancement of 5G network, the key performance indicator of 5G networks.
Introduce the new type non-orthogonal multiple access technology, i.e., the sparse code multiple access (SCMA) to the community. This SCMA performance better than the conventional non-orthogonal multiple access （NOMA）, which fully utilizes the power diversity and phase diversity of the users, while the conventional non-orthogonal multiple access only utilizes the power diversity of users. In addition, since the users' signature is sparse, the decoding complexity is much reduced.
Introduce latest advancement of SCMA to the communications community. People who are studying and working on wireless airinterface, non-orthogonal multiple access, LDPC coding and decoding, SCMA, LDS are interested in this topics. This tutorial will give a new idea to design non-orthogonal multiple access, and will give some idea to reduce the MPA decoding algorithm.
By this tutorial, we wish more people will realize the importance of SMCA and attract more people working in SCMA..
Key Performance Indicators of 5G
Background of New Type Non-orthogonal Multiple Access
SCMA Coding and decoding
Codebook Design for SCMA
Low complexity SCMA Decoder
SCMA Codebook Assignment
SCMA Power Allocation
Summary and Future Works
Primary Audience People who are studying or working in 5G networks, 5G airinterface technolgoy, nonorthogonal multiple access, massive connectivity for internet or things, low latency for internet of things, LDPC coding and decoding, are interested in this tutorial.
Novelty This tutorial introduces a new type air interface technolgoy of non-orthogonal multiple access, which fully use the power diversity and phase diversity of users' signals, while the conventional non-orthogonal multiple access only utilizes the power diversity of users. In additional, the each users' signature is sparse which reduces the decoding complexity.
Biography Wen Chen, a senior member of IEEE and CIE, a Professor of Electronic Engineering in Shanghai Jiao Tong University, China, where he is also the director of the Institute for Signal Processing and Systems. During 2014-2015, he was the dean of School of Electronic Engineering and Automation, Guilin University of Electronic Technology. Since 2016, he has been the chairman of Intellectual Property Corporation, Shanghai Jiao Tong University. His interests cover physical layer communications and cross layer design of communication systems, in which area, he has published 76 IEEE journal papers and more than 110 IEEE conference papers.
Professor Chen has made a tutorial in IEEE ICCC2016, Keynotes in IEEE APCC2016 and IEEE ICISIS2011. He has delivered invited talks for 25 times in various international conferences, workshops and universities (see wnt.sjtu.edu.cn). Prof. Chen has organized many IEEE sponsored conferences. He is the general chairs of HMWC2013, WiMob2011, ICIS2011-2009, ISISE2010-2008, WCNIS2010, the TPC chairs of WiMob2012, ICCT2012, ICCSC2008, and served many IEEE conferences as TPC members.
Prof. Chen received the InnovateAsia 5G Competition Award for contribution in sparse code multiple access in 2015, the WCSP2015 best paper award, and Shanghai outstanding thesis supervision award in 2015. He is selected as an outstanding member of Chinese Institute of Electronics in 2013 and received 3 best papers awards of Chinese Information Theory Society in 2013 and 2014. He is also selected as a Pujiang Excellent Scholars in Shanghai in 2007, a New Century Excellent Scholars in China in 2006, and awarded the Ariyama Memorial Award in 1997. He is an editor of IEEE TWC and an associate editor of IEEE Access.
Abstract—The fast development of smart phones and tablet devices has greatly stimulated the demand for wireless data services, leading to an impressive growth of the data traffic. Meanwhile, the networks, services, and devices will be more heterogeneous in 5G systems and the need to connect billions of devices to the networks will emerge. In this tutorial, we will first overview the main interference management techniques in 5G ultra-dense heterogeneous networks (HetNets) and discuss the major technical challenges. Then we will provide a new architecture for interference management based on interference map. The architecture is expected to meet the requirements of future 5G HetNets in terms of data rate, latency, cost, reliability, etc. In particular, the emphasis will be given to the advanced signal processing techniques, i.e., advanced sensing and localization, to build the interference map, where full-duplex radios are also considered. Finally, we will discuss the open problems and potential directions for 5G ultra-dense HetNets.
Objectives The main objective of this tutorial is to introduce the fundamental research and advances in 5G ultra-dense heterogeneous networks (HetNets) from the perspective of interference management. We will introduce the main technical challenges in 5G ultra-dense HetNets and discuss the advanced sensing and localization techniques that are essential to address these challenges. Through the effective use of these techniques, a new architecture can be built in 5G ultra-dense HetNets, which is expected to meet the requirements of 5G NetNets in terms of data rate, latency, cost, reliability, etc. We will also provide some most recent research outcomes on these techniques.
Part 1 Introduction (0.5 hour)
1. Overview of interference management in 5G HetNets
2. Challenges in 5G ultra-dense HetNets
Part 2 Advanced sensing techniques for interference management (1.5 hour)
2. Location-aware spectrum sensing
3. Jamming-based probing
4. Full-duplex-assisted probing
Part 3 Advanced localization techniques for interference management (0.75 hour)
2. Passive localization
3. Full-duplex-assisted localization
Part 4 Conclusion (0.25 hours)
1. Open problems
2. Future directions
Primary Audience The tutorial is intended for the generally knowledgeable individual working in the field of wireless communications and networking with some background in probability theory and signal processing. The intended audience includes young researchers and faculty, graduate students, and system engineers.
Novelty This tutorial covers not only the current research and development on 5G HetNets, but also the latest signal processing techniques, i.e., advanced sensing and localization techniques. These enable new architectures to solve the interference management issue in 5G ultra-dense HetNets. In addition, we provide comprehensive discussions on the challenges and open research issues in this area, based on the authors’ recent research results.
Biography Guodong Zhao received his Ph.D. Degree from Beihang University, Beijing, China in 2011. He visited Georgia Institute of Technology, Atlanta, GA, USA, in 2007-2008 and Hong Kong University of Science and Technology (HKUST), Hong Kong, in 2012-2013. Since 2011, he has been with University of Electronic Science and Technology of China (UESTC), where he is currently an Associate Professor. His research interests are within the areas of wireless communications and signal processing. He published over 30 papers in IEEE journals and conferences. In 2012, he received the best paper award from IEEE Global Telecommunication Conference (Globecom) and the best Ph.D. thesis award from Beihang University.
Xiangwei Zhou received his Ph.D. degree in Electrical and Computer Engineering from Georgia Institute of Technology in 2011. Since August 2015, Dr. Zhou has been with the Division of Electrical and Computer Engineering at Louisiana State University as an Assistant Professor. His general research interests include wireless communications, statistical signal processing, and cross-layer optimization. He is the ECE Outstanding Teacher of Year 2014 at Southern Illinois University Carbondale and a recipient of the best paper award at the 2014 International Conference on Wireless Communications and Signal Processing. Dr. Zhou is currently serving on the editorial board of IEEE Transactions on Wireless Communications.
Wei Zhang is a Fellow of the IEEE and an IEEE Communications Society Distinguished Lecturer. He serves as the Editor-in-Chief of the IEEE Wireless Communications Letters. He is also an Editor for the IEEE Transactions on Communications, and the IEEE Transactions on cognitive communications and networking. He is a Vice Director of the IEEE ComSoc Asia Pacific Board. He has served as the Secretary for the IEEE Wireless Communications Technical Committee. Currently, he is an Associate Professor with the University of New South Wales, Sydney, Australia.
Abstract—We present an overview of the state-of-the-art Vehicular Networking technologies, ranging from communications, networking, applications, to security and privacy. We will discuss technical details in the design of vehicular networking architectures and protocol suites, including LTE, IEEE 802.11p and IEEE 1609.6. The interactions and cooperation between LTE and 802.11p to support vehicular applications will also be examined.
We will investigate the performance analysis of vehicular networks with Markov chain, mobility, and channel models. We will reveal the challenges and future research directions of vehicular networks with the advent of 5G and autonomous vehicles.
Objectives - learn the technical details in the design of vehicular networking architectures and protocol suites, including LTE, IEEE 802.11p and IEEE 1609.6.
- study methodologies in the performance analysis of vehicular networks with Markov chain, mobility, and channel models.
- understand the challenges and future research directions of vehicular networks with the advent of 5G and autonomous vehicles.
1. Intelligent Transport Systems
2. Vehicular Networking Applications and Requirements
3. Vehicular Networking Standards:
b. IEEE 1609 WAVE
c. IEEE 802.11p
d. LTE for vehicular networks
4. ITS project activities around the world
5. Vehicular Networking architecture and protocol designs
a. Physical layer
b. MAC layer Markov analysis
c. Network layer routing and topology control
d. Vehicular Networking security
6. Vehicular Networking challenges and opportunities
Primary Audience Researchers, engineers, and students working on Vehicular Networking research and development.
Novelty - The interactions and cooperation between LTE and 802.11p to support vehicular applications will also be examined.
- We will investigate the performance analysis of vehicular networks with Markov chain, mobility, and channel models.
- We will reveal the challenges and future research directions of vehicular networks with the advent of 5G and autonomous vehicles.
Biography Ren Ping Liu is a Professor at School of Computing and Communications in University of Technology Sydney, where he leads Network Security Lab in the Global Big Data Technologies Centre. Prior to that he was a Principal Scientist at CSIRO, where he led wireless networking research activities. He specialises in protocol design and modelling, and has delivered networking solutions to a number of government agencies and industry customers. Professor Liu was the winner of Australian Engineering Innovation Award and CSIRO Chairman’s medal. His research interests include Markov analysis and QoS scheduling of wireless networks. Professor Liu has over 100 research publications, and has supervised over 30 PhD students.
Professor Liu is the founding chair of IEEE NSW VTS Chapter and a Senior Member of IEEE. He served as TPC chair for BodyNets2015, ISCIT2015, WPMC2014, as OC co-chair for VTC2017-Spring, BodyNets2014, ICUWB2013, ISCIT2012, SenSys2007, and in Technical Program Committee in a number of IEEE Conferences. Ren Ping Liu received his B.E.(Hon) and M.E. degrees from Beijing University of Posts and Telecommunications, China, and the Ph.D. degree from the University of Newcastle, Australia.
T9: Heterogeneous Network Management using SDN at the Mobile Edge for Connected Vehicle Applications by Abhimanyu Gosain, Raytheon BBN Technologies; Jim Martin, Mashrur Chowdhury, Clemson University has been cancelled
Abstract—Wireless everything--this is the goal that the digital society is marching towards. Looking 10--20 years ahead, the ubiquitous wireless world aims at building ultra-high-quality wireless networks that connect an ultra-large number of devices and enable fully interoperable information exchange among them. Security is one of the pivotal issues that need to be carefully addressed in the design and implementation of such wireless networks, since wireless transmissions are inherently vulnerable to security breaches. This tutorial focuses on physical layer security, which has been recognized as a promising mechanism to safeguard data confidentiality by exploiting the intrinsic randomness of the communications medium. In particular, this tutorial places an emphasis on leveraging disruptive wireless technologies to secure data transmission from the physical layer. First, this tutorial provides a high-level overview of the security methods for the previous and current mobile networks. Then, this tutorial introduces the state-of-the-art fundamental research of physical layer security, such as the evolution of secrecy performance evaluation and physical layer key generation. After this, the tutorial presents a structured and comprehensive survey of the security solutions enabled by cutting-edge wireless techniques, such as heterogeneous networking, full-duplex communication, massive multiple antennas, millimeter-wave transmission, machine-to-machine communication, energy- and spectrum-efficient communication, and software defined radio-based prototype. Finally, this tutorial identifies and discusses the outstanding barriers that future wireless designers must tackle.
Objectives The overarching objective of this tutorial is to provide a physical layer perspective on the security design of future wireless networks. At the end of this tutorial the participants will be able to:
Gain a basic understanding of the traditional security methods used in the previous and current wireless mobile networks and the security requirements of futuristic wireless networks.
Obtain critical comprehension of the state-of-the-art theoretical advancement of physical layer security.
Understand the concepts and underlying principles in cutting-edge physical layer security solutions and explore the role of disruptive wireless technologies in such solutions.
Analyse the benefits brought by physical layer security in supporting the deployment of safety-critical wireless networks in the not distant future.
1: Security in mobile communication networks
2: Traditional methods to secure previous and current mobile networks
Security requirements in future wireless networks
1: Theoretical advancement in physical layer security
2: Information-theoretical foundation of physical layer security
Evolution of secrecy performance evaluation
Secure physical layer key generation
1: Cutting-edge physical layer security solutions
2: Heterogeneous secure communication
Full-duplex secure communication
Massive MIMO-aided secure communication
Secure communication over mmWave channels
Machine type secure communication
Energy-efficient secure communication
Spectrum-efficient secure communication
Software defined radio-based prototyping
1: Challenges and Open Issues
2: Physical layer security beyond secrecy
Cross-layer design with cryptographical methods
Challenges imposed by future wireless world
Primary Audience This tutorial will be of interest to graduate students, junior and senior researchers, and engineers from the communications, signal processing, and networking communities who are interested in the secure design of the next-generation wireless networks (e.g., multi-tier/HetNets, massive MIMO and mmWave systems, D2D communication, and sensor networks). It will be also of interest to commercial and government security sectors who are interested in regulating and framing the use of physical layer security techniques in future.
Novelty There is an upsurge need for the understanding of the fundamental characteristics and future trends of physical layer security techniques, as these techniques are recognized as promising tools for safeguarding futuristic wireless networks. To meet this need, our tutorial presents a timely overview spanning both theoretical foundations and practical issues with cutting-edge physical layer security solutions. It also holds unique discussions on the challenges and open issues in physical layer security, based on the presenters' rich and world-class research experiences.
Biography Nan Yang is working as a Senior Lecturer and Future Engineering Research Leadership Fellow at the Australian National University. He is currently serving on the Editorial Board of the IEEE Transactions on Wireless Communications and the IEEE Transactions on Vehicular Technology. In 2014 he received the IEEE ComSoc Asia-Pacific Outstanding Young Researcher Award in 2014 in recognition of his contributions in wireless security. He has published 1 book chapter and over 35 journal and conference papers on physical layer security. He was the TPC Chair of the 2015 and 2016 IEEE GLOBECOM Workshop on Trusted Communications with Physical Layer Security.
Xiangyun Zhou received his Ph.D. degree in 2010 from the Australian National University where he is currently working as a Senior Lecturer. He serves on the Editorial Board of the IEEE Transactions on Wireless Communications and the IEEE Communications Letters. He has published one edited book and over 40 journal and conference papers on physical layer security, one of which received a Best Paper Award at ICC 2011. He was the co-chair of major international workshops on physical layer security at ICC 2014--2016 and GLOBECOM 2015--2016. He was a Guest Editor for the 2015 special issue on physical layer security in IEEE Communications Magazine.
Trung Q. Duong is currently an Assistant Professor at Queen's University Belfast, UK. He is the founder and co-organizer of series of the 1st, 2nd, 3rd, and 4th IEEE GLOBECOM Workshop on Trusted Communications with Physical Layer Security in 2013, 2014, 2015, and 2016. He was the Lead Guest Editor of IET Communications, Special Issue on ``Secure Physical Layer Communications'' in 2014. He is serving as an Editor of the IEEE Transactions on Wireless Communications, the IEEE Transactions on Communications, the IEEE Communications Letters, and the IET Communications. So far he has published more than 220 papers, among which 31 IEEE journal articles are in the field of physical layer security.