在用户数量激增的应急通信场景下,为保证地面用户的通信质量,提出了基于距离约束的用户自适应接入方案。首先采用泊松点距离约束策略(Poisson Point under Distance Constraint,PPDC)对无人机(Unmanned Aerial Vehicle,UAV)的位置进行建...在用户数量激增的应急通信场景下,为保证地面用户的通信质量,提出了基于距离约束的用户自适应接入方案。首先采用泊松点距离约束策略(Poisson Point under Distance Constraint,PPDC)对无人机(Unmanned Aerial Vehicle,UAV)的位置进行建模,避免无人机区域重叠带来的干扰问题。其次,引入基站负载传输协议(Base Station Load Transfer Protocol,BSLTP),当接入基站的用户数量超过给定阈值时,超载用户由无人机提供服务。此外,分别分析了地面基站和无人机的覆盖性能,得到了系统整体覆盖概率,并研究了无人机高度、覆盖半径、激增用户密度对网络覆盖性能的影响。最后,通过仿真验证了理论结果的正确性,且所提部署方案能够有效提升网络覆盖性能。展开更多
无人机(unmanned aerial vehicles,UAV)在空间内不规则分布和移动给系统设计带来巨大挑战,为了对UAV服务下的热点场景进行更加真实可靠地分析,基于随机几何和移动ad hoc网络(mobile ad hoc network,MANET)理论,构建了一种三维移动UAV网...无人机(unmanned aerial vehicles,UAV)在空间内不规则分布和移动给系统设计带来巨大挑战,为了对UAV服务下的热点场景进行更加真实可靠地分析,基于随机几何和移动ad hoc网络(mobile ad hoc network,MANET)理论,构建了一种三维移动UAV网络模型。UAV群被建模为三维泊松点过程(three-dimensional Poisson point process,3-D PPP),可以在水平和竖直方向位移。为了进一步研究该系统的网络性能,考虑了2种服务模型:基站切换模型(base station handover model,BHM)和基站恒定模型(base station constant model,BCM)。通过推导服务距离分布以及其余基站干扰的拉普拉斯变换,得出该系统的覆盖概率和信道容量。通过仿真分析了不同参数指标对覆盖概率以及信道容量的影响。实验结果表明,与传统二维UAV网络模型相比,该三维动态模型能够更准确地反映实际情况,并且基于最近邻策略的基站切换能够显著提升网络性能。展开更多
Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concr...Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units (RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals' secrecy transmission capacity performances, where the closed-form expressions are derived. Furthermore, two security strategies based on eavesdropper neutralization region to protect the target RRU user against eavesdropping were presented and analyzed. Simulation illustrates the secrecy transmission capacity performance limits on different system parameters. The presented security strategies show a significant enhancement on the secrecy performance.展开更多
文摘在用户数量激增的应急通信场景下,为保证地面用户的通信质量,提出了基于距离约束的用户自适应接入方案。首先采用泊松点距离约束策略(Poisson Point under Distance Constraint,PPDC)对无人机(Unmanned Aerial Vehicle,UAV)的位置进行建模,避免无人机区域重叠带来的干扰问题。其次,引入基站负载传输协议(Base Station Load Transfer Protocol,BSLTP),当接入基站的用户数量超过给定阈值时,超载用户由无人机提供服务。此外,分别分析了地面基站和无人机的覆盖性能,得到了系统整体覆盖概率,并研究了无人机高度、覆盖半径、激增用户密度对网络覆盖性能的影响。最后,通过仿真验证了理论结果的正确性,且所提部署方案能够有效提升网络覆盖性能。
文摘无人机(unmanned aerial vehicles,UAV)在空间内不规则分布和移动给系统设计带来巨大挑战,为了对UAV服务下的热点场景进行更加真实可靠地分析,基于随机几何和移动ad hoc网络(mobile ad hoc network,MANET)理论,构建了一种三维移动UAV网络模型。UAV群被建模为三维泊松点过程(three-dimensional Poisson point process,3-D PPP),可以在水平和竖直方向位移。为了进一步研究该系统的网络性能,考虑了2种服务模型:基站切换模型(base station handover model,BHM)和基站恒定模型(base station constant model,BCM)。通过推导服务距离分布以及其余基站干扰的拉普拉斯变换,得出该系统的覆盖概率和信道容量。通过仿真分析了不同参数指标对覆盖概率以及信道容量的影响。实验结果表明,与传统二维UAV网络模型相比,该三维动态模型能够更准确地反映实际情况,并且基于最近邻策略的基站切换能够显著提升网络性能。
基金supported by the National Natural Science Foundation of China (U1035001)
文摘Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units (RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals' secrecy transmission capacity performances, where the closed-form expressions are derived. Furthermore, two security strategies based on eavesdropper neutralization region to protect the target RRU user against eavesdropping were presented and analyzed. Simulation illustrates the secrecy transmission capacity performance limits on different system parameters. The presented security strategies show a significant enhancement on the secrecy performance.