2022
DOI: 10.1007/s11432-021-3328-y
|View full text |Cite
|
Sign up to set email alerts
|

Active device detection and performance analysis of massive non-orthogonal transmissions in cellular Internet of Things

Abstract: This paper investigates multiple access schemes for uplink and downlink transmissions in cellular networks with massive Internet of Things (IoT) devices. Recall that single-carrier frequency division multiple access and orthogonal frequency division multiple access, which are orthogonal multiple access (OMA) schemes, have been conventionally adopted for uplink and downlink transmissions in narrow-band IoT, respectively. Unlike these OMA schemes, we propose two non-orthogonal multiple access (NOMA) schemes for … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 40 publications
0
4
0
Order By: Relevance
“…For asynchronous transmissions, the work in [53] proposes an efficient activity and data detection method for asynchronous scenarios by inserting pilot sequences and guard spaces in the data frames, and designing a generalized expectation consistent signal recovery based algorithm. The work, however, is based on spreading sequences as signatures in the uplink, whereas power domain NOMA is used in the downlink transmissions from the AP.…”
Section: B Receivers For Power Domain Gf-nomamentioning
confidence: 99%
“…For asynchronous transmissions, the work in [53] proposes an efficient activity and data detection method for asynchronous scenarios by inserting pilot sequences and guard spaces in the data frames, and designing a generalized expectation consistent signal recovery based algorithm. The work, however, is based on spreading sequences as signatures in the uplink, whereas power domain NOMA is used in the downlink transmissions from the AP.…”
Section: B Receivers For Power Domain Gf-nomamentioning
confidence: 99%
“…where κ is equal to (1 − ϵ), representing the maximum allowable signal power leaked to Willie. As the optimization variables R and Q present a complex coupling relationship in the objective function (6) and hidden constraint (6b), we can adopt the idea of alternate optimization to design R and Q. First, fix Q, and we can find that the original problem degenerates into a convex problem about R, and the closed-form solution of the optimal R can be derived.…”
Section: Global Csi Knownmentioning
confidence: 99%
“…With electromagnetic space becoming the main battlefield of international information confrontation, intelligence departments of various countries are competing to establish electromagnetic reconnaissance and monitoring systems for the right to control electromagnetism [5]. Covert communication can help secretly transmit wireless signals to avoid close monitoring by other countries and provide an important guarantee for seizing the high ground of information confrontation and electromagnetic power [6]. It can be seen that covert communication has a very wide range of applications, from small civilian privacy to national security.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional channel estimation algorithms are typically based on the centralized baseband processing (CBD) architecture [7][8][9]. However, this architecture is faced with challenges such as high communication cost and computational complexity.…”
Section: Introductionmentioning
confidence: 99%