A Survey on 5G Coverage Improvement Techniques: Issues and Future Challenges
<p>Structure of the article.</p> "> Figure 2
<p>(<b>a</b>) Single cell, (<b>b</b>) cell structure.</p> "> Figure 3
<p>5G coverage enhancement techniques.</p> "> Figure 4
<p>Small cell techniques.</p> "> Figure 5
<p>(<b>a</b>) The mmWave signal is blocked by obstacles. (<b>b</b>) Small cells used to avoid the multipath fading.</p> "> Figure 6
<p>Primary carrier components and secondary carrier components in a network.</p> "> Figure 7
<p>Types of carrier aggregations.</p> "> Figure 8
<p>Illustration of DR-OC communication.</p> "> Figure 9
<p>Illustration of DC-OC communication.</p> "> Figure 10
<p>Illustration of DR-DC communication.</p> "> Figure 11
<p>Illustration of DC-DC communication.</p> "> Figure 12
<p>NOMA with a SIC receiver.</p> "> Figure 13
<p>Massive MIMO with UL and DL.</p> "> Figure 14
<p>Statistical analysis of 5G key parameters.</p> ">
Abstract
:1. Introduction
1.1. Existing Surveys
1.2. Contributions
- This survey focused on the 5G network coverage. Starting from the coverage definitions, requirements, and its enhancement techniques;
- The evaluations and advancements of mobile networks from 1G to 5G, are discussed;
- 3GPP releases are explored towards the coverage enhancements, spectrum bands, multiplexing techniques, number of channels aggregated, and their bandwidths;
- In this survey, we highlighted the 5G network key parameters, applications and advantages;
- The coverage degradation sources are identified and the enhancement techniques are explored;
- The coverage enhancement techniques such as small cells, carrier aggregation, device to device communication, non-orthogonal multiple access, multiple input and multiple output, and optimization approaches are discussed;
- The pros and cons and the future challenges of each enhancement technique are highlighted.
1.3. Paper Outline
2. 5G Network Coverage Planning
2.1. Coverage Definitions
2.2. Identification of Coverage Issues
2.3. Coverage Monitoring
2.4. Coverage Enhancement Requirements
3. 5G Coverage Enhancement Techniques
3.1. Small Cells
- Power Requirements: For data transmission, the small cells use mmWave frequency bands, which require strong operating powers. A huge number of small cells must be installed in order to cover a vast area with a high population density, which requires more transmission power. Therefore, the power required will increase with the increase of small cells, which increases the deployment cost and energy. Hence, power optimization techniques must be proposed in the future to enhance the network coverage;
- Coverage Radius: Small cells coverage radius is less compared to the conventional BSs. The users need more coverage capacity in their working places or living places, where the small cells are to be deployed. In places where there is no need of any coverage, such as ponds, lakes, and forests, the small cells are not required to be deployed. Therefore, the deployment of small cells depends on the population density, available carriers, and topography. Along with these it also depends on small cell parameters such as supporting frequency bands, carrier frequencies, and coverage area size. The coverage radius is one of future challenges in the small cells to provide a better coverage and to avoid any gaps in the coverage;
- Mobility and Handovers: Small cells cover a small geographic area. When a small cell is installed in a shopping mall and a person is moving from one floor to another floor and browsing, emailing, calling, or downloading files, then it should not cause any degradation in the connectivity. Therefore, how many UEs it can handle at a time with high data rates is also one of the challenging issues to be considered in the future;
- Deployment and Testing: Small cells can utilise the existing infrastructure such as street lamp poles, walls, top of the apartments, etc. The weight of a small cell is one of the important factors when deploying them in indoor or outdoor regions. The correct way to test a small cell is to improve the quality of service and also to satisfy the subscribers demands. The user traffic, mobility and handovers, and overall system load should be considered as the testing parameters. These parameters should be improved by proper testing. So, AI based algorithms need to be proposed to test the small cells automatically. Identifying the correct testing method is also one of the future challenging issues.
3.2. Carrier Aggregation
- Intra-band contiguous method: One or more adjacent carriers of the same band are aggregated to form a single carrier, which is called the intra-band contiguous method of CA;
- Intra-band non-contiguous method: One or more carriers separated by some band gap in one frequency band are aggregated to form a single carrier. This is called the intra-band non-contiguous method of CA;
- DL Sensitivity: Instead of designing a duplexer for each carrier component, the interference between DL and UL at the receiver is used to design it. A separate multiplexer or duplexer is required if there is a large frequency separation between the UL and DL frequency bands. Therefore, designing a multiplexer for reducing RF front-end design at large frequency variations is a future challenge;
- Harmonic Generations: The harmonics are generated by the use of non-linear components in duplexers, power amplifiers, and transceivers. These harmonics are generated to reduce system complexity. This is one of the open challenges for researchers to design the best harmonic generator;
- Filter Design: In California, proper filter design is required to decode the carriers at the receiver without any interference;
- Power Amplifier: The intra-band UL CA signals use a higher bandwidth and a high peak-to-average power ratio (PARP) to reduce the maximum power. The maximum power can be reduced by adjusting the resource block configurations. Therefore, to achieve reduced power with high bandwidth and high PAPR, tuned power amplifiers are required. So, the open challenge is the design of tuned power amplifiers for UL CA;
- Implementation Issues: The hardware implementation of CA is very critical, as it requires oscillators, radio frequency chains, signal processing techniques, a strong battery life, etc. [70].
3.3. Device to Device Communication
- Device relaying with an Operator Controlled Link Establishment (DR-OC): In this method, a device will communicate with the BS if there is poor cell coverage or if it is at the cell edge. This method is used to relay the data to other networks, as shown in Figure 8.
- Direct D2D Communication with Operator Controlled Link Establishment (DC-OC): In this method, the BS will establish a link between the source device and the destination device. Once the link is established, the devices will communicate with each other directly without any role of BS, as shown in Figure 9.
- Device Relaying with Device Controlled Link Establishment (DR-DC): In this method, the source and destination devices will communicate with each other using relay transmission data. In this method there is no role of BS, as shown in Figure 10.
- Direct D2D communication with Device Controlled Link Establishment (DC-DC): In this method, the source and the destination devices will communicate with each other by establishing a direct link between them on their own, and there is no role of BS, as shown in Figure 11.
3.3.1. Mode Selection
- Dynamic mode selection: The papers so far discussed in this section are mostly focused on the static mode selection schemes of D2D communication. Mode selection depends on the spectrum and resource availability. Therefore, an optimal mode selection scheme needs to be proposed based on the resources available;
- Mode selection overhead: The mode selection depends on the channel estimation, signalling, and CSI, which leads to system overhead. Therefore, the amount of overhead needs to be minimised by proposing an appropriate algorithm to improve the throughput and device lifetime in D2D communications.
3.3.2. Device Discovery
- Initial device discovery signal: In D2D communication, initially the device will send a device discovery signal to detect the neighbouring devices. Any malicious user can also send the discovery signal to identify trusted users and create some security issues. Therefore, to avoid security issues due to malicious users, the initial signal generation parameters such as signal data size and control data have to be secured;
- Multi cell device discovery: The proposed research till now has focused on single cell device discovery models. If the user is at the cell edge or dynamically changing his location from one cell region to another cell region, then multi-cell device discovery is required. Therefore, detection of multi-cell devices is one of the future challenges in D2D communication systems;
- Non Repudiation and Traceability: Non repudiation prevents D2D users from being denied transmission and reception of messages. Traceability is mandatory to detect the source of false messages. This is also one of the future challenges to providing a secured data transfer;
- Availability and Efficiency: In D2D communication systems, the availability of a device largely depends on the degree of cooperation of devices. Efficiency is the ability of a communication system to implement and operate economically. Therefore, achieving higher efficiency in device discovery is one of the future challenges in D2D communications.
3.3.3. Interference Management
- D2D in mmWave Communication: Multi-cell D2D communication is possible with the small cell concept and mmWave in 5G networks. The mmWave improves the data rates, network capacity, and latency but different interferences occur due to the penetration losses of mmWaves. Therefore, the interference mitigation algorithms for 5G mmWave need to be addressed to provide multicell D2D communication;
- Cell Densification and Offloading: The small cell and macro cell concepts of 5G are integrated with D2D communication to provide multi-cell D2D transmissions. Multi-cell D2D is used to improve the spectral efficiency and overall system performance of D2D communication. Therefore, the resource allocation and interference control algorithms for multicell D2D communication are challenging future issues.
3.3.4. Security and Privacy
- Lack of Standardisation: To provide a secured connection between the DUs, there are no standard rules for data transmission, the amount of data to be transferred, feedback signalling, security policies, and so on. Therefore, the standardisation of these parameters needs to be addressed;
- Security Threats: A lot of security threats are happening in D2D communications. They are denial of service, man in the middle attack, impersonation attack, session hijacking, interference attack, data leakage, malware attack, free riding attack, data modification, privacy violation, forge attack, active attack on controlled data, and so on. All these need to be addressed in the future;
- Privacy and Security: D2D communication allows DUs to communicate directly with one another. However, identifying the trusted users and malicious users is a challenging issue. Therefore, efficient algorithms need to be proposed to identify the trusted users and malicious users before providing a secured connection;
- Data Confidentiality and Integrity: Data confidentiality protects the data being revealed from unauthorised users as well as preserves the user content and secures the privacy. Integrity ensures that data is not altered during the transmission. This is also one of the future challenging issues in providing an accurate data transmission;
- Session Key Agreement: This session key agreement is used to ensure the security of data transfer over air interface. It is mandatory to keep the session key secret to avoid any type of security issues;
- Non Repudiation and Traceability: Non repudiation prevents D2D users from being denied transmission and the reception of messages. Traceability is mandatory to detect the source of false messages in a D2D communication system.
3.4. Non Orthogonal Multiple Access
3.4.1. Resource Allocation Issues
3.4.2. Power Allocation Issues
3.4.3. Signalling Issues
- SIC Issues: The concept of SIC in NOMA was introduced to decode the signals of paired users at the receiver [147]. The authors used a PD-NOMA for multiplexing the users into one RB, and SIC was used to decode the users at the received PD-NOMA for multiplexing the users into one RB, and SIC was used to decode the users at the receiver. The SIC hardware implementation is very complex at high powers, but theoretical implementation is possible using Moore’s law. The performance gain of NOMA has been affected by SIC characteristics such as receiver complexity, decoding order, imperfect channel estimation, and so on [148]. The SIC receiver has been affected by the decoding of users. If the decoding order of the users does not match the multiplexed sequence, then it will cause imperfect SIC implementation. In this case, a re-transmission request is forwarded to the BS, and the whole process has been repeated again to get the perfect SIC results from the receiver. However, it takes more time to decode the data at the receiver end [149].Therefore, optimization algorithms have been proposed to avoid SIC imperfections [150,151,152,153,154]. In Ref. [150], the authors proposed an efficient PA algorithm for multi-carrier NOMA (MC-NOMA). The optimal SIC decoding value has been determined by the outage threshold of the carrier-to-noise ratio. Two algorithms, i.e., complementary geometric programming (CGP) and arithmetic geometric mean approximation (AGMA), have been proposed to optimise the total power [151]. A two-phase algorithm has been proposed to solve the non-convex resource allocation problems in NOMA [152]. Using a matching theory algorithm, the user scheduling is optimised first, and then the branch and bound technique is used to optimise PA. In Ref. [153], an efficient successive convex approximation (SCA) algorithm is proposed to optimise the sum rate. The sum rate and system utility are maximised by the SNR and the number of iterations in the MIMO-NOMA system. The iterative PA algorithm provides a maximum weighted sum rate in the NOMA system [154].The analytical techniques used to overcome signalling issues such as outage probability and CSI of NOMA in UL and DL are addressed by the authors in Refs. [155,156,157]. In Ref. [155], the authors proposed a dynamic SIC receiver concept based on the users’ received power, and the outage probability is estimated theoretically. SIC analytically estimates the statistical CSI to improve the outage probability [156]. In Ref. [157], a new decoding algorithm is used to decode the signal information at the SIC receiver, and its outage performance is verified analytically.
- CSI Issues: In literature, most of the authors assumed a perfect CSI at the receiver. However, in NOMA, the concepts of SIC decoding, user pairing, and PA depend on imperfect CSI. This leads to computational complexity, overhead signalling, and delayed feedback. To overcome these issues, optimization and analytical methods are identified, and with these methods, the outage probabilities are increased by assuming imperfect CSI and also reducing the number of feedback bits [158,159,160,161,162]. The minimum outage probability is obtained from a minimum feedback rate. An optimal power allocation scheme is used to improve the total sum rate of a NOMA system [158]. The outage probability is minimised by optimising the dynamic PA using the one-bit CSI feedback method [159]. Imperfect CSI and perfect CSI models are used to estimate the system throughput and bandwidth [160]. The outage probability based on channel feedback is estimated analytically [161,162]. As summarised in Table 13, various optimization and analytical algorithms have been proposed in recent research to resolve signalling issues and improve coverage and capacity in 5G networks.
3.4.4. Security Issues
- Optimization Methods: The authors in Refs [163,164,165,166,167] proposed optimization techniques to overcome the security issues in NOMA technique. An optimization algorithm is used to maximise the security sum rate (SSR) in a secured physical layer of a NOMA system. The authors in Ref. [163] proposed an optimal PA and optimal power splitting algorithms to maximise the security sum rate. The proposed algorithms significantly improve the system performance by assuming a uniform PA and a fixed power splitting scheme. In Ref. [164], the authors proposed two mobility models, such as a random way point (RWP) and random direction (RD), to observe the security performance of the physical layer. The average security sum rate of NOMA users was estimated and analysed. From the numerical results, it is observed that the RWP achieves a high safety rate than all other mobility models. In Ref. [165], the security sum rate is maximised by using a two-stage optimization technique. In the first stage, the SINR of a particular user is fixed to its maximum value, and then it is used to maximise the security sum rate by using a one-dimensional search algorithm. The optimal beamforming technique is used to improve the safety rate by adjusting SINR between signal strength and interference. In Ref. [166], the authors considered the security outage probability (SOP) to maximise the NOMA security performance. Design parameters such as PA, decoding order, and data rate are estimated even though the CSI is not perfectly known at the transmitter. Pairing a strong user with an unstructured weak user improves the physical layer performance [167]. The optimization algorithm minimises the pairing outage probability. The mathematical expressions for outage probability and secured outage probability are derived based on the proposed optimization algorithm;
- Analytical Methods: The physical layer security is estimated using analytical methods along with optimization methods. The numerical expressions for SOP are derived using analytical methods in Refs [168,169,170]. NOMA users and eavesdroppers are randomly placed, and a protected area is generated around the source of the eavesdroppers with an imperfect SIC. The security performance of the physical layer is improved by increasing the eavesdroppers’ execution area. This is extended for multiple antenna transmissions and estimates the numerical expressions for diversity order, which will reduce the SOP of multiple antenna transmissions [168]. In Ref. [169], the authors assumed a new concept where BS and users are operating in half-duplex mode and eavesdroppers are in full-duplex mode. To interrupt the NOMA transmissions, the eavesdroppers are performing active jamming and passive eavesdropping. A novel transmission outage probability scheme is proposed to improve the outage transmission probability. The analytical expressions for SOP and security diversity orders are derived to improve the security performance. The security performance of an overlay CR-NOMA system was described in Ref. [170]. In this method, we consider the primary user (PU) as a secured user and the secondary user (SU) as an eavesdropper. This proposed system provides guarantees of QoS for the PUs and reduces the interference between the users. The analytical expressions for connection outage probability, SOP, and security throughput of the PU’s are derived by assuming the Nakagami-m fading channel. By reducing the number of SUs, security performance can be improved. As summarised in Table 14, various optimization and analytical algorithms have been proposed in recent research to resolve security issues and improve coverage and capacity in 5G networks.
3.4.5. NOMA—Future Challenges and Research Issues
- User Pairing in NOMA: In the NOMA implementation, multiple users are multiplexed into one RB, and the SIC receiver will decode the paired users at the receiver. We have discussed pairings of two or three users in previous sections, but not multiple users. Nowadays, the demand for connected devices such as IoT, V2V, and massive machine types is increasing, which requires them to pair a large number of users to one RB. Therefore, NOMA requires some new pairing techniques to fulfil the requirements of future wireless networks. Along with this, there is another challenge to be addressed, which is the practical implementation of user pairing in NOMA systems;
- Receiver Complexity in SIC implementation: In NOMA, the users are multiplexed at the transmitter side using pairing techniques and decoded at the receiver using a SIC receiver. As the number of users increases, the allocation of transmission power to pair the users becomes very complex, and at the same time, decoding the strong user to the next strong user and up to a weak user is a very difficult task at the receiver end. This process increases the latency and also introduces interference with the increased number of multiplexed users. Therefore, reducing the latency and interference and providing an efficient and dynamic SIC receiver for the NOMA system is a future challenge;
- Multi-cell NOMA system: In NOMA systems, most of the researchers considered a single cell, and very few addressed the multi-cell concept because the multi-cell system causes inter-cell interference. The interference will affect the performance of the weak users who are at the cell edge. Therefore, to solve the interference issues along with the pairing and decoding issues, a small cell concept of 5G is included in the multi-cell NOMA system. This is the future challenge in the multi-cell NOMA systems to be addressed;
- Mobility in NOMA: NOMA is used to enable 5G and beyond 5G technologies. In IoT, V2V, and M2M communications, mobility is the key parameter. Most of the research in NOMA systems is based on static systems. The PA, pairing, and SIC receiver algorithms are proposed based on the static behaviour of the users. However, in future communications, dynamic PA, pairing, and SIC algorithms will be required. As the user moves from one location to another, the channel gains vary with respect to the user’s location. Therefore, proposing dynamic algorithms for NOMA systems is one of the challenges of the future;
- CSI in NOMA: Most of the research is carried out assuming perfect CSI in NOMA systems, but fewer users consider imperfect CSI. The CSI plays an important role in user pairing and decoding for users with SIC receivers in the NOMA system. To increase the system performance and spectrum efficiency of a dynamic system, the estimation of CSI is very important. For a dynamic channel, the estimation of CSI using machine learning and game theory algorithms is one of the important future challenges in NOMA systems.
3.5. Multiple Input and Multiple Output
MIMO—Future Challenges and Research Issues
- Signal Detection: The UL signal detection becomes more complex in M-MIMO systems due to the large number of radiating elements, which decreases the system throughput. Along with this, the superimposition of user-transmitted signals at the BS causes interference, which also reduces the spectral efficiency and throughput. Therefore, to enhance the spectral efficiency and throughput of a M-MIMO UL, intelligent algorithms are required. Designing less complicated and accurate algorithms for UL signal detection is one of the future research challenges;
- Channel Estimation: For a perfect CSI, the M-MIMO system performance increases linearly with the number of transmitting and receiving antennas. The BS should know how to use CSI in order to identify and detect the user-transmitted signal at the UL and to precode the signals at the DL. Channel estimation at the DL and UL depends on the FDD and TDD duplexing modes.FDD Mode Channel Estimation: In this mode, the CSI needs to be estimated for both DL and UL. During the DL, the BS forwards the pilot signals to the user, and the user replies with the estimated CSI to the BS. Similarly, during the UL, the BS estimates the CSI using the orthogonal pilot signals forwarded by the user. The DL channel estimation for a M-MIMO system with a large number of antennas becomes very difficult and is impossible to carry out in real-world applications.TDD Mode Channel Estimation: The problem during the DL channel estimation in FDD mode is solved by using TDD mode. In this mode, with the advantage of channel reciprocity, the BS estimates the DL channel with the use of UL CSI. During DL, the user will forward the orthogonal pilot signals to the BS, and the BS will estimate the CSI to the user terminal based on these pilot signals;
- Pilot Contamination: In M-MIMO systems, the BS requires the user terminal’s channel response in order to estimate the channel. When the user terminal delivers orthogonal pilot signals to the BS, the BS estimates the uplink channel. Additionally, the BS calculates the downlink channel to the user terminal using M-MIMO’s channel reciprocity property. The BS can accurately estimate the channel if the pilot signals in the home cell and nearby cells are orthogonal. However, because there are only a limited number of orthogonal pilot signals available in a given bandwidth and period, adjacent cells must reuse the orthogonal pilot signals, which leads to pilot contamination. Hence, the pilot signal contamination is one of the challenges for future research in M-MIMO systems;
- Energy Efficiency: Energy efficiency is defined as the ratio of spectral efficiency to the total transmitted power. M-MIMO systems offer significant energy efficiency by achieving higher spectral efficiency with low power consumption. The increased number of antennas in the M-MIMO system will increase the spectral efficiency, but it will also increase the total power consumption, which reduces the energy efficiency. Numerous studies have been done to develop energy-efficient M-MIMO systems based on the trade-off between energy efficiency and spectral efficiency and also to reduce the power consumption by designing the power amplifiers. Therefore, achieving higher energy efficiency is one of the challenges of future research.
3.6. 5G Optimization Algorithms
5G Optimization—Future Challenges and Research Issues
- ML and RL Algorithms: New ML and RL based optimization algorithms are required to enhance the 5G network coverage and capacity and also to bridge the gap between intelligent algorithms and 5G technologies;
- Scheduling Algorithms: Scheduling algorithms need to be proposed for 5G networks to optimize the throughput and to enhance the capacity of cellular networks;
- Optimization of the Antenna Parameter: Optimization of antenna tilt angle, antenna height, and number of antennas is required to enhance the coverage and capacity and to reduce cell edge interference, deployment cost, and complexity.
4. 5G Enhancement Techniques—Key Technologies, Advantages, Limitations, and Future Challenges
5. 6G and Its Challenges
6. Conclusions and Future Scope
Funding
Conflicts of Interest
References
- Bhalla, M.R.; Bhalla, A.V. Generations of mobile wireless technology: Asurvey. Int. J. Comput. Appl. 2010, 5, 26–32. [Google Scholar] [CrossRef]
- Mehta, H.; Patel, D.; Joshi, B.; Modi, H. 0G to 5G mobile technology: A survey. J. Basic Appl. Eng. Res. 2014, 5, 56–60. [Google Scholar]
- Popovski, P.; Nielsen, J.J.; Angjelichinoski, M.; Bana, A.S. Wireless Access in Ultra-Reliable Low-Latency Communication (URLLC). IEEE Trans. Commun. 2019, 67, 5783–5801. [Google Scholar] [CrossRef] [Green Version]
- Norp, T. 5G Requirements and Key Performance Indicators. J. ICT 2018, 6, 15–30. [Google Scholar] [CrossRef] [Green Version]
- Buzzi, S.; Chih-Lin, I.; Klein, T.E.; Poor, H.V.; Yang, C.; Zappone, A. A survey of energy-efficient techniques for 5G networks and challenges ahead. IEEE J. Sel. Areas Commun. 2016, 34, 697–709. [Google Scholar] [CrossRef] [Green Version]
- Dangi, R.; Lalwani, P.; Choudhary, G.; You, I.; Pau, G. Study and Investigation on 5G Technology: A Systematic Review. Sensors 2022, 22, 26. [Google Scholar] [CrossRef]
- Hossain, E.; Hasan, B. 5G cellular: Key enabling technologies and research challenges. IEEE Instrum. Meas. Mag. 2015, 18, 11–21. [Google Scholar] [CrossRef] [Green Version]
- 5G Innovation Centre. 5G White Paper: Meeting the Challenge of Universal Coverage, Reach and Reliability in the Coming 5G Era; White Paper; University of Surrey: Guildford, UK, 2016. [Google Scholar]
- Marcus, M.J. ITU WRC-19 Spectrum Policy Results. IEEE Wirel. Commun. 2019, 26, 4–5. [Google Scholar] [CrossRef]
- Kim, T.Y.; Singh, A.K.; Ko, H. Modeling for small cell networks in 5G communication environment. Telecommun. Syst. 2022, 80, 189–214. [Google Scholar] [CrossRef]
- Ramazanali, H.; Mesodiakaki, A.; Vinel, A.; Verikoukis, C. Survey of user association in 5G HetNets. In Proceedings of the 2016 8th IEEE Latin-American Conference on Communications (LATINCOM), Medellin, Colombia, 15–17 November 2016; pp. 1–6. [Google Scholar]
- Xu, Y.; Gui, G.; Gacanin, H.; Adachi, F. A Survey on Resource Allocation for 5G Heterogeneous Networks: Current Research, Future Trends, and Challenges. IEEE Commun. Surv. Tutorials 2021, 23, 668–695. [Google Scholar] [CrossRef]
- Khatib, E.J.; Barco, R. Optimization of 5G Networks for Smart Logistics. Energies 2021, 14, 1758. [Google Scholar] [CrossRef]
- Dash, S.; Sahu, B.J.R. Genetic algorithm based coverage optimization 5G networks. J. Inf. Optim. Sci. 2022, 43, 933–939. [Google Scholar] [CrossRef]
- Lieira, D.D.; Quessada, M.S.; Cristiani, A.L.; Meneguette, R.I. Algorithm for 5G Resource Management Optimization in Edge Computing. IEEE Lat. Am. Trans. 2021, 19, 1772–1780. [Google Scholar] [CrossRef]
- Shayea, I.; Ergen, M.; Azizan, A.; Ismail, M.; Daradkeh, Y.I. Individualistic Dynamic Handover Parameter Self-Optimization Algorithm for 5G Networks Based on Automatic Weight Function. IEEE Access 2020, 8, 214392–214412. [Google Scholar] [CrossRef]
- Abuin, A.; Iradier, E.; Fanari, L.; Montalban, J.; Angueira, P. Complexity Reduction Techniques for NOMA-based RRM Algorithms in 5G Networks. In Proceedings of the 2020 IEEE International Conference on Electrical Engineering and Photonics (EExPolytech), St. Petersburg, Russia, 15–16 October 2020; pp. 86–89. [Google Scholar]
- Akbar, A.; Jangsher, S.; Bhatti, F.A. NOMA and 5G emerging technologies: A survey on issues and solution techniques. Comput. Netw 2021, 190, 107950. [Google Scholar] [CrossRef]
- Hussain, M.D.; Rasheed, H. Non-orthogonal Multiple Access for Next-Generation Mobile Networks: A Technical Aspect for Research Direction. Wirel. Commun. Mob. Comput. 2020, 2020, 1–17. [Google Scholar] [CrossRef]
- Ansari, R.I.; Chrysostomou, C.; Hassan, H.A.; Guizani, M.; Mumtaz, S.; Rodriguez, S.; Rodrigues, J.J. 5G D2D Networks: Techniques, Challenges, and Future Prospects. IEEE Syst. J. 2018, 12, 3970–3984. [Google Scholar] [CrossRef]
- Celik, A.; Tetzner, J.; Sinha, K.; John, M. 5G device-to-device communication security and multipath routing solutions. Appl. Netw. Sci. 2019, 4, 102. [Google Scholar] [CrossRef] [Green Version]
- Sedidi, R.; Kumar, A. Key exchange protocols for secure Device-to-Device (D2D) communication in 5G. In Proceedings of the 2016 Wireless Days, Toulouse, France, 23–25 March 2016; pp. 1–6. [Google Scholar]
- Wang, M.; Yan, Z. Security in D2D Communications: A Review. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015; pp. 1199–1204. [Google Scholar]
- Gandotra, P.; Jah, R.K.; Jain, S. A survey on device-to-device (D2D) communication: Architecture and security issues. J. Netw. Comput. Appl. 2017, 78, 9–29. [Google Scholar] [CrossRef]
- Afolalu, O.; Ventura, N. Carrier aggregation-enabled non-orthogonal multiple access approach towards enhanced network performance in 5G Ultra-Dense Networks. Int. J. Commun. Syst. 2021, 34, e4701. [Google Scholar] [CrossRef]
- Alam, M.J.; Ma, M. Resource Matching in Carrier Aggregation Enabling 5G Networks. Wirel. Pers. Commun. 2017, 95, 1229–1248. [Google Scholar] [CrossRef]
- Chikhale, D.; Deosarkar, S.; Munde, M. Carrier Aggregation in 5g Using Millimeter Range Communication. In Proceedings of the 2021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON), Kuala Lumpur, Malaysia, 24–26 September 2021; pp. 1–6. [Google Scholar]
- Lin, P.; Hu, C.; Li, X.; Yu, J.; Xie, W. Research on Carrier Aggregation of 5G NR. In Proceedings of the 2022 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Bilbao, Spain, 15–17 June 2022; pp. 1–5. [Google Scholar]
- Chataut, R.; Akl, R. Massive MIMO Systems for 5G and beyond Networks—Overview, Recent Trends, Challenges, and Future Research Direction. Sensors 2020, 20, 2753. [Google Scholar] [CrossRef] [PubMed]
- Baltzis, K.B. Hexagonal vs Circular Cell Shape: A Comparative Analysis and Evaluation of the Two Popular Modeling Approximations. In Cellular Networks–Positioning, Performance Analysis, Reliability; Melikov, A., Ed.; InTech.: London, UK, 2011; ISBN 978-953-307-246-3. Available online: http://www.intechopen.com/books/cellular-networks-positioning-performance-analysis-reliability/hexagonal-vscircular-cell-shape-a-comparative-analysis-and-evaluation-of-the-two-popular-modeling-a (accessed on 1 February 2023).
- Haroon, M.S.; Abbas, H.Z.; Muhammad, F.; Abbas, G. Coverage analysis of cell-edge users in heterogeneous wireless networks using Stienen’s model and RFA scheme. Int. J. Commun. Syst. 2019, 30, e4147. [Google Scholar] [CrossRef]
- You, X.; Wang, D.; Zhu, P.; Sheng, B. Cell edge performance of cellular mobile systems. IEEE J. Sel. Areas Commun. 2011, 29, 1139–1150. [Google Scholar] [CrossRef]
- Kumar, S.; Kovacs, I.Z.; Monghal, G.; Pedersen, K.I.; Mogensen, P.E. Performance evaluation of 6-sector-site deployment for downlink utran long term evolution. In Proceedings of the 2008 IEEE 68th Vehicular Technology Conference, Calgary, BC, Canada, 21–24 September 2008; pp. 1–5. [Google Scholar]
- Shehu, N.M. Coverage and Capacity Improvement in GSM Network. Int. J. Nov. Res. Electr. Mech. Eng. 2015, 2, 57–62. [Google Scholar]
- Andrades, A.G.; Barco, R.; Serrano, I. A method of assessment of LTE coverage holes. Wirel. Commun. Netw. 2016, 2016, 236. [Google Scholar] [CrossRef] [Green Version]
- Radio Measurements Collection for Minimization of Drive Tests (MDT); Overall Description; Stage 2 (Release 15), Version 15.0.0, 3GPP Standard (TS) 37.320, June 2018. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2602 (accessed on 1 February 2023).
- Diana, A. A Comparative Analysis of RF Planning Techniques and Challenges between Legacy Third and Fifth Generation Wireless Networks; A Project Report; Ohio University: Athens, OH, USA, 2017; pp. 1–24. [Google Scholar]
- Dariusz, M.; Miroslaw, K.; Michalski, I. Open RAN—Radio Access Network Evolution, Benefits and Market Trends. Appl. Sci. 2022, 12, 408. [Google Scholar]
- Release 15 Description; Summary of Rel-15 Work Items (Release 15), Version 1.1.0. 3rd Gener. Partnership Project (3GPP), Sophia Antipolis, France, Rep. (TR) 21.915, March 2019. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3389 (accessed on 1 February 2023).
- Technical Specifications and Technical Reports for a UTRAN Based 3GPP System (Release 6), Version 6.10.0, 3GPP Standard (TS) 21.101, December 2009. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=544 (accessed on 1 February 2023).
- Guidelines for Evaluation of Radio Interface Technologies for IMT2020. In Proceedings of the International Telecommunication Union, Geneva, Switzerland, October 2017; Rep. Report ITU-R M.2412. Available online: https://www.itu.int/dms_pub/itu-r/opb/rep/R-REP-M.2412-2017-PDF-E.pdf (accessed on 1 February 2023).
- Study on Scenarios and Requirements for Next Generation Access Technologies; (Release 15). 3rd Gener. Partnership Project (3GPP), Sophia Antipolis, France, Rep. (TR) 38.913, June 2018. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2996 (accessed on 1 February 2023).
- Saleh, A.; Bulakci, O.; Redana, S.; Hämäläinen, J. On cell range extension in LTE-advanced type 1 inband relay networks. Wirel. Commun. Mob. Comput. 2015, 15, 770–786. [Google Scholar] [CrossRef]
- Ding, M.; Wang, P.; López-Pérez, D.; Mao, G.; Lin, Z. Performance impact of LoS and NLoS transmissions in dense cellular networks. IEEE Trans. Wirel. Commun. 2016, 15, 2365–2380. [Google Scholar] [CrossRef] [Green Version]
- Alhammadi, A.; Roslee, M.; Alias, M.Y.; Shayea, I.; Alraih, S.; Mohamed, K.S. Auto Tuning Self-Optimization Algorithm for Mobility Management in LTE-A and 5G HetNets. IEEE Access 2020, 8, 294–304. [Google Scholar] [CrossRef]
- Service Requirements for the 5G System; Stage 1 (Release 16), Version 16.8.0, 3GPP Standard (TS) 22.261, June 2019. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3107 (accessed on 1 February 2023).
- Mowla, M.M.; Ahmad, I.; Habibi, D.; Phung, Q.V. Energy efficient backhauling for 5G small cell networks. IEEE Trans. Sustain. Comput. 2018, 4, 279–292. [Google Scholar] [CrossRef]
- Rajoria, S.; Trivedi, A.; Godfrey, W.W. A comprehensive survey: Small cell meets massive MIMO. Phys. Commun. 2018, 26, 40–49. [Google Scholar] [CrossRef]
- Sun, Y.; Xu, L.; Wu, Y.; Wang, T.; Fang, W.; Shan, L.; Fang, Y. Energy efficient small cell density optimization based on stochastic geometry in ultra-dense HetNets. In Proceedings of the 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN), Guangzhou, China, 6–8 May 2017; pp. 249–254. [Google Scholar]
- Feteiha, M.F.; Qutqut, M.H.; Hassanein, H.S. Outage probability analysis of mobile small cells over LTE-A networks. In Proceedings of the International Wireless Communications and Mobile Computing Conference, IWCMC, Nicosia, Cyprus, 4–8 August 2014; pp. 1045–1050. [Google Scholar]
- Jundhare, M.D.; Kulkarni, A.V. An overview and current development of femtocells in 5G technology. In Proceedings of the International Conference on Advances in Communication Technology (ICAECCT), Pune, India, 2–3 December 2016; pp. 204–209. [Google Scholar]
- Khan, M.F.; Bhatti, F.A.; Habib, A.; Jangsher, S.; Khan, M.I.; Zafar, I.; Shah, S.M.; Jamshed, M.A.; Iqbal, J. Analysis of macro user offloading to femto cells for 5G cellular networks. In Proceedings of the International Symposium on Wireless Systems and Networks, Lahore, Pakistan, 19–22 November 2017; pp. 1–6. [Google Scholar]
- Andrews, J.G.; Claussen, H.; Dohler, M.; Rangan, S.; Reed, M.C. Femto cells: Past, present, and future. IEEE J. Sel. Areas Commun. 2012, 30, 497–508. [Google Scholar] [CrossRef]
- Namgeol, O.; Han, S.W.; Kim, H. System capacity and coverage analysis of femtocell networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Sydney, NSW, Australia, 18–21 April 2010; pp. 1–5. [Google Scholar]
- Landstrom, S.; Murai, H.; Simonsson, A. Deployment aspects of LTE pico nodes. In Proceedings of the IEEE International Conference on Communications Workshops, ICC, Kyoto, Japan, 5–9 June 2011; pp. 1–5. [Google Scholar]
- Yasir, B.A.; Su, G.; Bachache, N. Range expansion for pico cell in heterogeneous LTE—A cellular networks. In Proceedings of the 2nd International Conference on Computer Science and Network Technology, ICCSNT, Changchun, China, 29–31 December 2012; pp. 1235–1240. [Google Scholar]
- Lopez-Perez, D.; Chu, X.; Guvenc, I. On the expanded region of pico cells in heterogeneous networks. IEEE J. Sel. Top. Signal Process 2012, 6, 281–294. [Google Scholar] [CrossRef]
- Samaoui, S.; Bouabidi, I.E.; Obaidat, M.S.; Zarai, F.; Mansouri, W. Chapter 1—Wireless and mobile technologies and protocols and their performance evaluation. Modeling and Simulation of Computer Networks and Systems; Obaidat, M.S., Nicopolitidis, P., Zarai, F., Eds.; Morgan Kaufmann: Burlington, MA, USA, 2015; pp. 3–32. [Google Scholar]
- Devopedia. Carrier Aggregation. Version 3, 29 October 2022. Available online: https://devopedia.org/carrier-aggregation (accessed on 29 October 2022).
- 3GPP, User equipment (UE) radio transmission and reception, Technical Specification 36.101, 3rd Generation Partnership Project (3GPP), 2017, V13.8.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2411 (accessed on 1 February 2023).
- Parikh, J. Scheduling Schemes for Carrier Aggregation in LTE-Advanced Systems. Int. J. Res. Eng. Technol. 2014, 3, 219–223. [Google Scholar]
- 3GPP, Carrier aggregation; base station (BS) radio transmission and reception, Technical Specification 36.808, 3rd Generation Partnership Project (3GPP), 2013, Version 10.1.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2487 (accessed on 1 February 2023).
- Iwamura, M.; Etemad, K.; Fong, M.H.; Nory, R.; Love, R. Carrier aggregation framework in 3GPP LTE-advanced [WiMAX/LTE Update]. IEEE Commun. Mag. 2010, 48, 60–67. [Google Scholar] [CrossRef]
- 3GPP, User equipment (UE) radio transmission and reception; part 3: Range 1 and range 2 inter working operation with other radios, Technical Specification 38.101-3, 3rd Generation Partnership Project (3GPP), 2021, Version 17.2.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3285 (accessed on 1 February 2023).
- Wei, M.; Xu, X.; Guo, H.; Zhou, Y.; Hu, C. Research Based on High and Low Frequency Cooperative through Carrier Aggregation for Deep Coverage Enhancement. In Proceedings of the 2022 IEEE 14th International Conference on Advanced Infocomm Technology (ICAIT), Chongqing, China, 8–11 July 2022; pp. 128–133. [Google Scholar]
- Parikh, J.; Basu, A. Carrier Aggregation for Enhancement of Bandwidth in 4G Systems. In Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013; Singh, K., Awasthi, A.K., Eds.; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer: Berlin/Heidelberg, Germany, 2013; Volume 115. [Google Scholar]
- Alotaibi, M.; Sirbu, M.; Peha, J. Impact of spectrum aggregation technology and frequency on cellular networks performance. In Proceedings of the 2015 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Stockholm, Sweden, 29 September–2 October 2015; pp. 326–335. [Google Scholar]
- James, A.; Madhukumar, A.S. Enhanced coverage through relay assisted carrier aggregation for cellular networks. Digit. Signal Process. 2017, 65, 52–62. [Google Scholar] [CrossRef]
- Cao, Y.; Lyu, H.; Chen, K. Enhancing Carrier Aggregation: Design of BAW Quadplexer With Ultrahigh Cross-Band Isolation. IEEE Microw. Mag. 2020, 21, 101–110. [Google Scholar] [CrossRef]
- Shajaiah, H.; Khawar, A.; Hadi, A.; Clancy, T.C. Resource allocation with carrier aggregation in LTE Advanced cellular system sharing spectrum with S-band radar. In Proceedings of the 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN), McLean, VA, USA, 1–4 April 2014; pp. 34–37. [Google Scholar]
- Haus, M.; Waqas, M.; Ding, A.Y.; Li, Y.; Tarkoma, S.; Ott, J. Security and privacy in device-to-device (D2D) communication: A review. IEEE Commun. Surv. Tutor. 2017, 19, 1054–1079. [Google Scholar] [CrossRef]
- Asadi, A.; Wang, Q.; Mancuso, V. A survey on Device-to-Device communication in cellular networks. IEEE Commun. Surv. Tutor. 2014, 16, 1801–1819. [Google Scholar] [CrossRef] [Green Version]
- Udit, N.K.; Kumar, S.D. An overview of device-to-device communication in cellular networks. ICT Express 2018, 4, 203–208. [Google Scholar]
- Iqbal, J.; Iqbal, M.A.; Ahmad, A.; Khan, M.; Qamar, A.; Han, K. Comparison of Spectral Efficiency Techniques in Device-to-Device Communication for 5G. IEEE Access 2019, 7, 57440–57449. [Google Scholar] [CrossRef]
- Jameel, F.; Hamid, Z.; Jabeen, F.; Zeadally, S.; Javed, M.A. A survey of Device-to-Device communications: Research issues and challenges. IEEE Commun. Surv. Tutor. 2018, 20, 2133–2168. [Google Scholar] [CrossRef]
- Noura, M.; Nordin, R. A survey on interference management for Device-to-Device (D2D) communication and its challenges in 5G networks. J. Netw. Comput. Appl. 2016, 71, 130–150. [Google Scholar] [CrossRef]
- Gandotra, P.; Jha, R.K. Device-to-Device communication in cellular networks: A survey. J. Netw. Comput. Appl. 2016, 71, 99–117. [Google Scholar] [CrossRef] [Green Version]
- Hoang, T.D.; Le, L.B.; Le-Ngoc, T. Joint mode selection and resource allocation for relay-based D2D communications. IEEE Commun. Lett. 2016, 21, 398–401. [Google Scholar] [CrossRef]
- Chou, H.J.; Chang, R.Y. Joint mode selection and interference management in Device-to-Device communications under-laid MIMO cellular networks. IEEE Trans. Wirel. Commun. 2017, 16, 1120–1134. [Google Scholar] [CrossRef]
- Yang, L.; Wu, D.; Shi, H.; Long, Y.; Cai, Y. Social-aware joint mode selection and link allocation for device-to device communication underlaying cellular networks. China Commun. 2018, 15, 92–107. [Google Scholar] [CrossRef]
- Gui, J.; Deng, J. Multi-Hop Relay-Aided Underlay D2D Communications for Improving Cellular Coverage Quality. IEEE Access 2018, 8, 14318–14338. [Google Scholar] [CrossRef]
- Liu, M.; Zhang, L.; Gautam, P.R. Joint Relay Selection and Resource Allocation for Relay-Assisted D2D Underlay Communications. In Proceedings of the 2019 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC), Lisbon, Portugal, 24–27 November 2019. [Google Scholar]
- Bithas, P.S.; Maliatsos, K.; Foukalas, F. An SINR-aware joint mode selection, scheduling, and resource allocation scheme for D2D communications. Trans. Veh. Technol. 2019, 68, 4949–4963. [Google Scholar] [CrossRef] [Green Version]
- Hou, G.; Chen, C. D2D communication mode selection and resource allocation in 5G wireless networks. Comput. Commun. 2020, 155, 244–251. [Google Scholar] [CrossRef]
- Bulusu, S.; Mehta, N.B.; Kalyanasundaram, S. Rate adaptation, scheduling, and mode selection in D2D systems with partial channel knowledge. IEEE Trans. Wirel. Commun. 2018, 17, 1053–1065. [Google Scholar] [CrossRef]
- Dai, Y.; Sheng, M.; Liu, J.; Cheng, N.; Shen, X.; Yang, Q. Joint mode selection and resource allocation for D2D-enabled NOMA cellular networks. Trans. Veh. Technol. 2019, 68, 6721–6733. [Google Scholar] [CrossRef]
- Haider, N.; Ali, A.; Suarez-Rodriguez, C.; Dutkiewicz, E. Optimal mode selection for full-duplex enabled D2D cognitive networks. IEEE Access 2019, 7, 57298–57311. [Google Scholar] [CrossRef]
- Hayat, O.; Ngah, R.; Hashim, S.Z.M.; Dahri, M.H.; Malik, R.F.; Rahayu, Y. Device discovery in D2D communication: A survey. IEEE Access 2019, 7, 131114–131134. [Google Scholar] [CrossRef]
- Zhang, J.; Deng, L.; Li, X.; Zhou, Y.; Liang, Y.; Liu, Y. Novel Device-to-Device discovery scheme based on random backoff in LTE-advanced networks. IEEE Trans. Veh. Technol. 2017, 66, 11404–11408. [Google Scholar] [CrossRef] [Green Version]
- Chour, H.; Nasser, Y.; Artail, H.; Kachouh, A.; Al-Dubai, A. VANET aided D2D discovery: Delay analysis and performance. IEEE Trans. Veh. Technol. 2017, 66, 8059–8071. [Google Scholar] [CrossRef]
- Mosbah, A.B.; Hammami, S.E.; Moungla, H.; Afifi, H.; Kamal, A.E.; Hammami, S.E. Enhancing Device-to-Device direct discovery based on predicted user density patterns. Comput. Netw. 2019, 151, 245–259. [Google Scholar] [CrossRef]
- Long, Y.; Yamamoto, R.; Yamazaki, T.; Tanaka, Y. A deep learning based social-aware D2D peer discovery mechanism. In Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang, Republic of Korea, 17–20 February 2019; pp. 91–97. [Google Scholar]
- Kaleem, Z.; Qadri, N.N.; Duong, T.Q.; Karagiannidis, G.K. Energy-efficient device discovery in D2D cellular networks for public safety scenario. IEEE Syst. J. 2019, 13, 2716–2719. [Google Scholar] [CrossRef]
- Jaffry, S.; Zaidi, S.K.; Shah, S.T.; Hasan, S.F.; Gui, X. D2D Neighborhood Discovery by a Mobile Device. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Kaleem, Z.; Khan, A.; Hassan, S.A.; Vo, N.S.; Nguyen, L.D.; Nguyen, H.M. Full-duplex enabled time-efficient device discovery for public safety communications. Mob. Netw. Appl. 2019, 25, 341–349. [Google Scholar] [CrossRef]
- Masood, A.; Sharma, N.; Alam, M.M.; Le Moullec, Y.; Scazzoli, D.; Reggiani, L.; Magarini, M.; Ahmad, R. Device-to-Device discovery and localization assisted by UAVs in pervasive public safety networks. In Proceedings of the ACM MobiHoc Workshop on Innovative Aerial Communication Solutions for First Responders Network in Emergency Scenarios-iFIRE ’19, Catania, Italy, 2 July 2019; pp. 6–11. [Google Scholar]
- Ni, Y.; Zhao, J.; Wang, Y.; Zhu, H. Beam-forming and interference cancellation for D2D communication assisted by two-way decode-and-forward relay node. China Commun. 2018, 15, 100–111. [Google Scholar] [CrossRef]
- Gandotra, P.; Jha, R.K.; Jain, S. Green NOMA with multiple interference cancellation (MIC) using sector-based resource allocation. IEEE Trans. Netw. Serv. Manag. 2018, 15, 1006–1017. [Google Scholar] [CrossRef]
- Wu, Y.; Wang, S.; Liu, W.; Guo, W.; Chu, X. Iunius: A cross-layer peer-to-peer system with Device-to-Device communications. IEEE Trans. Wirel. Commun. 2016, 15, 7005–7017. [Google Scholar] [CrossRef]
- Su, X.; Yu, H.; Kim, W.; Choi, C.; Choi, D. Interference cancellation for non-orthogonal multiple access used in future wireless mobile networks. J. Wirel. Commun. Netw. 2016, 2016, 231. [Google Scholar] [CrossRef] [Green Version]
- Vu, H.V.; Le-Ngoc, T. Underlaid FD D2D Communications in Massive MIMO Systems via Joint beam-forming and Power Allocation. In Proceedings of the 2021 IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021; pp. 1–6. [Google Scholar]
- Lv, S.; Xing, C.; Long, K.; Zhang, Z. Guard zone based interference management for D2D-aided underlaying cellular networks. IEEE Trans. Veh. Technol. 2016, 66, 1. [Google Scholar] [CrossRef]
- Melki, L.; Najeh, S.; Besbes, H. Interference management scheme for network-assisted multi-hop D2D communications. In Proceedings of the 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 4–8 September 2016; pp. 1–5. [Google Scholar]
- Behjati, M.; Nordin, R.; Alsharif, M.H. A User Cooperation Approach for Interference Cancellation in FDD Massive MIMO Systems. Electronics 2020, 9, 1679. [Google Scholar] [CrossRef]
- Xue, J.; Wei, S. Interference Avoidance Algorithm Based on Relay Technology in D2D Communication. J. Comput. Theor. Nanosci. 2015, 12, 1282–1286. [Google Scholar] [CrossRef]
- Kim, J.; Karim, N.A.; Cho, S. An Interference Mitigation Scheme of Device-to-Device Communications for Sensor Networks Underlying LTE-A. Sensors 2017, 17, 1088. [Google Scholar] [CrossRef] [Green Version]
- Kamruzzaman, M.; Sarkar, N.I.; Gutierrez, J. A Dynamic Algorithm for Interference Management in D2D-Enabled Heterogeneous Cellular Networks: Modeling and Analysis. Sensors 2022, 22, 1063. [Google Scholar] [CrossRef]
- Wang, L.; Liu, J.; Chen, M.; Gui, G.; Sari, H. Optimization-based access assignment scheme for physical-layer security in D2D communications underlaying a cellular network. IEEE Trans. Veh. Technol. 2018, 67, 5766–5777. [Google Scholar] [CrossRef]
- Wang, M.; Yan, Z. Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans. Ind. Inform. 2017, 14, 3637–3647. [Google Scholar] [CrossRef] [Green Version]
- Waqas, M.; Ahmed, M.; Li, Y.; Jin, D.; Chen, S. Social-aware secret key generation for secure Device-to-device communication via trusted and non-trusted relays. IEEE Trans. Wirel. Commun. 2018, 17, 3918–3930. [Google Scholar] [CrossRef] [Green Version]
- Gupta, R.K.; Almuzaini, K.K.; Pateriya, R.K.; Shah, K.; Kumar, S.P.; Akwafo, R. An Improved Secure Key Generation Using Enhanced Identity-Based Encryption for Cloud Computing in Large-Scale 5G. Wirel. Commun. Mob. Comput. 2022, 2022, 7291250. [Google Scholar] [CrossRef]
- Ding, Z.; Liu, Y.; Choi, J.; Sun, Q.; Elkashlan, M.; Chih-Lin, I.; Poor, H.V. Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Commun. Mag. 2017, 55, 185–191. [Google Scholar] [CrossRef] [Green Version]
- Vaezi, M.; Schober, R.; Ding, Z.; Poor, H.V. Non-orthogonal multiple access: Common myths and critical questions. IEEE Wirel. Commun. 2019, 26, 174–180. [Google Scholar] [CrossRef] [Green Version]
- Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-Lin, I.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
- Dai, L.; Wang, B.; Ding, Z.; Wang, Z.; Chen, S.; Hanzo, L. A survey of non-orthogonal multiple access for 5G. IEEE Commun. Surv. Tutor. 2018, 20, 2294–2323. [Google Scholar] [CrossRef] [Green Version]
- Islam, S.R.; Avazov, N.; Dobre, O.A.; Kwak, K.S. Power-domain non-orthogonal multiple access in 5G systems: Potentials and challenges. IEEE Commun. Surv. Tutor. 2016, 19, 721–742. [Google Scholar] [CrossRef] [Green Version]
- Karimi, M.M.; Raza, M.A.; Dobre, O.A. Signature-based non-orthogonal massive multiple access for future wireless networks: Uplink massive connectivity for machine-type communications. IEEE Veh. Technol. Mag. 2018, 13, 40–50. [Google Scholar]
- Maraqa, O.; Rajasekaran, A.S.; Al-Ahmadi, A.; Yanikomeroglu, H.; Sait, S.M. A survey of rate-optimal power domain NOMA with enabling technologies of future wireless networks. IEEE Commun. Surv. Tutor. 2020, 22, 2192–2235. [Google Scholar] [CrossRef]
- Shin, W.; Vaezi, M.; Lee, B.; Love, D.J.; Lee, J.; Poor, H.V. Non-orthogonal multiple access in multi-cell networks: Theory, performance, and practical challenges. IEEE Commun. Mag. 2017, 55, 176–183. [Google Scholar] [CrossRef] [Green Version]
- Zhang, H.; Zhang, D.K.; Meng, W.X.; Li, C. User pairing algorithm with SIC in non-orthogonal multiple access system. In Proceedings of the 2016 IEEE International Conference on Communications, ICC, Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar]
- Ding, Z.; Fan, P.; Poor, H. Impact of user pairing on 5G non-orthogonal multiple access downlink transmissions. IEEE Trans. Veh. Technol. 2015, 65, 6010–6023. [Google Scholar] [CrossRef]
- Wang, S.; Lv, T.; Zhang, X. Multi-agent reinforcement learning-based user pairing in multi-carrier NOMA systems. In Proceedings of the 2019 IEEE International Conference on Communications Workshops, ICC Workshops, Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Guo, F.; Lu, H.; Zhu, D.; Wu, H. Interference-aware user grouping strategy in NOMA systems with QoS constraints. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 1378–1386. [Google Scholar]
- Xing, X.; Liu, Y.; Nallanathan, A.; Ding, Z.; Poor, H.V. Optimal throughput fairness tradeoffs for downlink non-orthogonal multiple access over fading channels. IEEE Trans. Wirel. Commun. 2018, 17, 3556–3571. [Google Scholar] [CrossRef]
- Elouafadi, R.; Benjillali, M. On optimal power allocation for downlink NOMA transmissions under PHY QoS constraints. In Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference, IWCMC, Tangier, Morocco, 24–28 June 2019; pp. 1606–1611. [Google Scholar]
- Zhu, J.; Wang, J.; Huang, Y.; He, S.; You, X.; Yang, L. On optimal power allocation for downlink non-orthogonal multiple access systems. IEEE J. Sel. Areas Commun. 2017, 35, 2744–2757. [Google Scholar] [CrossRef] [Green Version]
- Lei, L.; Yuan, D.; Värbrand, P. On power minimization for non-orthogonal multiple access (NOMA). IEEE Commun. Lett. 2016, 20, 2458–2461. [Google Scholar] [CrossRef] [Green Version]
- Fu, Y.; Chen, Y.; Sung, C.W. Distributed downlink power control for the non-orthogonal multiple access system with two interfering cells. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar]
- Wang, C.L.; Chen, J.Y.; Chen, Y.J. Power allocation for a downlink non-orthogonal multiple access system. IEEE Wirel. Commun. Lett. 2016, 5, 532–535. [Google Scholar] [CrossRef]
- Shahab, M.B.; Kader, M.F.; Shin, S.Y. On the power allocation of non-orthogonal multiple access for 5G wireless networks. In Proceedings of the 2016 International Conference on Open Source Systems & Technologies, ICOSST, Lahore, Pakistan, 15–17 December 2016; pp. 89–94. [Google Scholar]
- Abuajwa, O.; Roslee, M.B.; Yusoff, Z.B. Simulated Annealing for Resource Allocation in Downlink NOMA Systems in 5G Networks. Appl. Sci. 2021, 11, 4592. [Google Scholar] [CrossRef]
- Wang, Z.; Wen, C.; Fan, Z.; Wan, X. A novel price-based power allocation algorithm in non-orthogonal multiple access networks. IEEE Wirel. Commun. Lett. 2017, 7, 230–233. [Google Scholar] [CrossRef]
- Wang, Z.Q.; Huang, K.H.; Wan, X.Y.; Fan, Z.F. Optimal price-based power allocation algorithm with quality of service constraints in non-orthogonal multiple access networks. IEICE Trans. Inf. Syst. 2019, 102, 2257–2260. [Google Scholar] [CrossRef] [Green Version]
- Aldebes, R.; Dimyati, K.; Hanafi, E. Game-theoretic power allocation algorithm for downlink NOMA cellular system. Electron. Lett. 2019, 55, 1361–1364. [Google Scholar] [CrossRef]
- Lamba, A.K.; Kumar, R.; Sharma, S. Power allocation for downlink multiuser hybrid NOMA-OMA systems: An auction game approach. Int. J. Commun. Syst. 2020, 33, e4306. [Google Scholar] [CrossRef]
- Vamvakas, P.; Tsiropoulou, E.E.; Papavassiliou, S. Dynamic spectrum management in 5G wireless networks: A real-life modeling approach. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 2134–2142. [Google Scholar]
- Vamvakas, P.; Tsiropoulou, E.E.; Papavassiliou, S. On controlling spectrum fragility via resource pricing in 5G wireless networks. IEEE Networks Lett. 2019, 1, 111–115. [Google Scholar] [CrossRef]
- Datta, S.N.; Kalyanasundaram, S. Optimal power allocation and user selection in non-orthogonal multiple access systems. In Proceedings of the 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
- Mei, J.; Yao, L.; Long, H.; Zheng, K. Joint user pairing and power allocation for downlink non-orthogonal multiple access systems. In Proceedings of the 2016 IEEE International Conference on Communications, ICC, Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar]
- Liu, F.; Petrova, M. Proportional fair scheduling for downlink single-carrier NOMA systems. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–7. [Google Scholar]
- Ali, M.S.; Tabassum, H.; Hossain, E. Dynamic user clustering and power allocation for uplink and downlink non-orthogonal multiple access (NOMA) systems. IEEE Access 2016, 4, 6325–6343. [Google Scholar] [CrossRef]
- Celik, A.; Tsai, M.C.; Radaydeh, R.M.; Al-Qahtani, F.S.; Alouini, M.S. Distributed user clustering and resource allocation for imperfect NOMA in heterogeneous networks. IEEE Trans. Commun. 2019, 67, 7211–7227. [Google Scholar] [CrossRef] [Green Version]
- Chen, L.; Ma, L.; Xu, Y. Proportional fairness-based user pairing and power allocation algorithm for non-orthogonal multiple access system. IEEE Access 2019, 7, 19602–19615. [Google Scholar] [CrossRef]
- Guo, J.; Wang, X.; Yang, J.; Zheng, J.; Zhao, B. User pairing and power allocation for downlink non-orthogonal multiple access. In Proceedings of the 2016 IEEE Globecom Workshops, GC Wkshps, Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
- Azam, I.; Shahab, M.B.; Shin, S.Y. User pairing and power allocation for capacity maximization in uplink NOMA. In Proceedings of the 2019 42nd International Conference on Telecommunications and Signal Processing, TSP, Budapest, Hungary, 1–3 July 2019; pp. 690–694. [Google Scholar]
- Shahab, M.B.; Shin, S.Y. User pairing and power allocation for non-orthogonal multiple access: Capacity maximization under data reliability constraints. Phys. Commun. 2018, 30, 132–144. [Google Scholar] [CrossRef]
- Kenichi, H.; Anass, B. Non-orthogonal Multiple Access (NOMA) with Successive Interference Cancellation for Future Radio Access. IEICE Trans. Commun. 2015, 98, 403–414. [Google Scholar]
- Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: Cambridge, MA, USA, 2005. [Google Scholar]
- Manglayev, T.; Kizilirmak, R.C.; Kho, Y.H.; Bazhayev, N.; Lebedev, I. NOMA with imperfect SIC implementation. In Proceedings of the IEEE EUROCON 2017—17th International Conference on Smart Technologies, Ohrid, Macedonia, 6–8 July 2017; pp. 22–25. [Google Scholar]
- Wei, Z.; Ng, D.W.K.; Yuan, J.; Wang, H.M. Optimal resource allocation for power efficient MC-NOMA with imperfect channel state information. IEEE Trans. Commun. 2017, 65, 3944–3961. [Google Scholar] [CrossRef] [Green Version]
- Li, S.; Derakhshani, M.; Lambotharan, S. Outage-constrained robust power allocation for downlink MC-NOMA with imperfect SIC. In Proceedings of the 2018 IEEE International Conference on Communications, ICC, Kansas City, MO, USA, 20–24 May 2018; pp. 1–7. [Google Scholar]
- Cui, F.; Qin, Z.; Cai, Y.; Zhao, M.; Li, G.Y. Rethinking outage constraints for resource management in NOMA networks. IEEE J. Sel. Top. Signal Process. 2019, 13, 423–435. [Google Scholar] [CrossRef]
- Cui, J.; Ding, Z.; Fan, P. Outage Probability Constrained MIMO-NOMA Designs Under Imperfect CSI. IEEE Trans. Wirel. Commun. 2018, 17, 8239–8255. [Google Scholar] [CrossRef]
- Wang, X.; Chen, R.; Xu, Y.; Meng, Q. Low-complexity power allocation in NOMA systems with imperfect SIC for maximizing weighted sum-rate. IEEE Access 2019, 7, 94238–94253. [Google Scholar] [CrossRef]
- Gao, Y.; Xia, B.; Xiao, K.; Chen, Z.; Li, X.; Zhang, S. Theoretical analysis of the dynamic decode ordering SIC receiver for uplink NOMA systems. IEEE Commun. Lett. 2017, 21, 2246–2249. [Google Scholar] [CrossRef]
- Tang, Z.; Wang, J.; Wang, J.; Song, J. On the achievable rate region of NOMA under outage probability constraints. IEEE Commun. Lett. 2018, 23, 370–373. [Google Scholar] [CrossRef]
- Fan, J.; Zhang, J.; Chen, S.; Zheng, J.; Ai, B. The application of NOMA on high-speed railway with partial CSI. In Proceedings of the 2019 IEEE 90th Vehicular Technology Conference, VTC2019-Fall, Honolulu, HI, USA, 22–25 September 2019; pp. 1–5. [Google Scholar]
- Liu, S.; Zhang, C. Non-orthogonal multiple access in a downlink multiuser beam-forming system with limited CSI feedback. J. Wirel. Commun. Netw. 2016, 239, 1–11. [Google Scholar]
- Saxena, P.; Bhatnagar, M.R. 1-bit feedback-based beam-forming scheme for an uplink FSO-NOMA system with SIC errors. Appl. Opt. 2020, 59, 11274–11291. [Google Scholar] [CrossRef]
- Adam, A.B.M.; Wan, X.; Wang, Z. User scheduling and power allocation for downlink multi-cell multi-carrier NOMA systems. Digit. Commun. Netw. 2022, 3. [Google Scholar] [CrossRef]
- Yang, Z.; Ding, Z.; Fan, P.; Karagiannidis, G.K. On the performance of non-orthogonal multiple access systems with partial channel information. IEEE Trans. Commun. 2015, 64, 654–667. [Google Scholar] [CrossRef]
- Choi, J. Repetition-based NOMA transmission and its outage probability analysis. IEEE Trans. Veh. Technol. 2020, 69, 5913–5922. [Google Scholar] [CrossRef] [Green Version]
- He, G.; Li, L.; Li, X.; Chen, W.; Yang, L.L.; Han, Z. Secrecy sum rate maximization in NOMA systems with wireless information and power transfer. In Proceedings of the 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 11–13 October 2017; pp. 1–6. [Google Scholar]
- Tang, J.; Jiao, T.; Wang, N.; Wang, P.; Zeng, K.; Wen, H. Mobility improves NOMA physical layer security. In Proceedings of the 2018 IEEE Global Communications Conference, GLOBECOM, IEEE, Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
- Yin, C.; Yan, L. Secure beam-forming design for the UAV-enabled transmission over NOMA networks. J. Wirel. Commun. Netw. 2020, 79, 1–11. [Google Scholar]
- He, B.; Liu, A.; Yang, N.; Lau, V.K. On the design of secure non-orthogonal multiple access systems. IEEE J. Sel. Areas Commun. 2017, 35, 2196–2206. [Google Scholar] [CrossRef] [Green Version]
- ElHalawany, B.M.; Wu, K. Physical-layer security of NOMA systems under un-trusted users. In Proceedings of the 2018 IEEE Global Communications Conference, GLOBECOM, Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
- Liu, Y.; Qin, Z.; Elkashlan, M.; Gao, Y.; Hanzo, L. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 2017, 16, 1656–1672. [Google Scholar] [CrossRef]
- Lv, L.; Ding, Z.; Chen, J.; Al-Dhahir, N. Design of secure NOMA against full-duplex proactive eavesdropping. IEEE Wirel. Commun. Lett. 2019, 8, 1090–1094. [Google Scholar] [CrossRef]
- Xiang, Z.; Yang, W.; Pan, G.; Cai, Y.; Song, Y. Physical layer security in cognitive radio inspired NOMA network. IEEE J. Sel. Top. Signal Process. 2019, 13, 700–714. [Google Scholar] [CrossRef]
- Ngo, H.Q.; Larsson, E.G.; Marzetta, T.L. Energy and spectral efficiency of very large multiuser MIMO systems. IEEE Trans. Commun. 2013, 61, 1436–1449. [Google Scholar]
- Khwandah, S.A.; Cosmas, J.P.; Lazaridis, P.I.; Zaharis, Z.D.; Chochliouros, I.P. Massive MIMO Systems for 5G Communications. Wirel. Pers. Commun. 2021, 120, 2101–2115. [Google Scholar] [CrossRef]
- Foschini, G.J. Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas. Bell Labs Tech. J. 1996, 1, 41–59. [Google Scholar] [CrossRef]
- Telatar, E. Capacity of multi-antenna Gaussian channels. Eur. Trans. Telecommun. 1999, 10, 585–595. [Google Scholar] [CrossRef]
- Lin, Z.; Du, X.; Chen, H.; Ai, B.; Chen, Z.; Wu, D. Millimeter-wave propagation modeling and measurements for 5g mobile networks. IEEE Wirel. Commun. 2019, 26, 72–77. [Google Scholar] [CrossRef]
- Suyama, S.; Okuyama, T.; Nonaka, N.; Asai, T. Recent Studies on Massive MIMO Technologies for 5G Evolution and 6G. In Proceedings of the 2022 IEEE Radio and Wireless Symposium (RWS), Las Vegas, NV, USA, 16–19 January 2022; pp. 90–93. [Google Scholar]
- Tashiro, K.; Hoshino, K.; Nagate, A. Cylindrical Massive MIMO System for HAPS: Capacity Enhancement and Coverage Extension. In Proceedings of the 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland, 25–28 April 2021; pp. 1–6. [Google Scholar]
- Hussain, S.S.; Yaseen, S.M.; Barman, K. An Overview of Massive Mimo System in 5G; International Science Press: New Delhi, India, 2016; Volume 9, pp. 4957–4968. [Google Scholar]
- Zbairi, M.; Ez-zazi, I.; Arioua, M. Towards Optimal Spectral Efficiency of Cell Free Massive MIMO Based Linear Detectors in 5G. In Proceedings of the 2020 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), Marrakech, Morocco, 25–27 November 2020; pp. 1–6. [Google Scholar]
- Dicandia, F.A.; Genovesi, S. Spectral Efficiency Improvement of 5G Massive MIMO Systems for High-Altitude Platform Stations by Using Triangular Lattice Arrays. Sensors 2021, 21, 3202. [Google Scholar] [CrossRef]
- Salh, A.; Shah, N.S.M.; Audah, L.; Abdullah, Q.; Abdullah, N.; Hamzah, N.A.; Saif, A. Trade-off Energy and Spectral Efficiency in 5G Massive MIMO System. In Proceedings of the Information Theory (cs.IT); Signal Processing, Sana’a, Yemen, 10–12 August 2021; pp. 1–6. [Google Scholar]
- Chen, X.; Ng, D.W.K.; Yu, W.; Larsson, E.G.; Al-Dhahir, N.; Schober, R. Massive Access for 5G and Beyond. IEEE J. Sel. Areas Commun. 2021, 39, 615–637. [Google Scholar] [CrossRef]
- Borges, D.; Montezuma, P.; Dinis, R.; Beko, M. Massive MIMO Techniques for 5G and Beyond—Opportunities and Challenges. Electronics 2021, 10, 1667. [Google Scholar] [CrossRef]
- Alsheikh, M.A.; Lin, S.; Niyato, D.; Tan, H.P. Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Commun. Surv. Tutorials 2014, 16, 1996–2018. [Google Scholar] [CrossRef] [Green Version]
- Campos, R.S.; Lovisolo, L. Genetic algorithm-based cellular network optimization considering positioning applications. IET Commun. 2019, 13, 879–891. [Google Scholar] [CrossRef]
- Thien, H.T.; Vu, V.-H.; Koo, I. Game Theory-Based Smart Mobile-Data Offloading Scheme in 5G Cellular Networks. Appl. Sci. 2020, 10, 2327. [Google Scholar] [CrossRef] [Green Version]
- Comşa, I.S.; Zhang, S.; Aydin, M.E.; Kuonen, P.; Lu, Y.; Trestian, R.; Ghinea, G. Towards 5G: A Reinforcement Learning-Based Scheduling Solution for Data Traffic Management. IEEE Trans. Netw. Serv. Manag. 2018, 15, 1661–1675. [Google Scholar] [CrossRef] [Green Version]
- Ahamed, M.M.; Faruque, S. 5G Network Coverage Planning and Analysis of the Deployment Challenges. Sensors 2021, 21, 6608. [Google Scholar] [CrossRef]
- Sousa, M.; Alves, A.; Vieira, P.; Queluz, M.P.; Rodrigues, A. Analysis and Optimization of 5G Coverage Predictions Using a beam-forming Antenna Model and Real Drive Test Measurements. IEEE Access 2021, 9, 101787–101808. [Google Scholar] [CrossRef]
- Dandanov, N.; Al-Shatri, H.; Klein, A.; Poulkov, V. Dynamic Self-Optimization of the Antenna Tilt for Best Trade-off Between Coverage and Capacity in Mobile Networks. Wirel. Pers. Commun. 2017, 92, 251–278. [Google Scholar] [CrossRef]
- Qureshi, M.N.; Shahid, M.K.; Tiwana, M.I.; Haddad, M.; Ahmed, I.; Faisal, T. Neural Networks for Energy-Efficient Self Optimization of eNodeB Antenna Tilt in 5G Mobile Network Environments. IEEE Access 2022, 10, 61678–61694. [Google Scholar] [CrossRef]
- Dreifuerst, R.M.; Daulton, S.; Qian, Y.; Varkey, P.; Balandat, M.; Kasturia, S.; Tomar, A.; Yazdan, A.; Ponnampalam, V.; Heath, R.W. Optimizing Coverage and Capacity in Cellular Networks using Machine Learning. In Proceedings of the ICASSP 2021—2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, ON, Canada, 6–11 June 2021; pp. 8138–8142. [Google Scholar]
- Sodhro, A.H.; Pirbhulal, S.; Luo, Z.; Muhammad, K.; Zahid, N.Z. Toward 6G Architecture for Energy-Efficient Communication in IoT-Enabled Smart Automation Systems. IEEE Internet Things J. 2021, 8, 5141–5148. [Google Scholar] [CrossRef]
- Chen, S.; Liang, Y.-C.; Sun, S.; Kang, S.; Cheng, W.; Peng, M. Vision, Requirements, and Technology Trend of 6G: How to Tackle the Challenges of System Coverage, Capacity, User Data-Rate and Movement Speed. IEEE Wirel. Commun. 2020, 27, 218–228. [Google Scholar] [CrossRef] [Green Version]
- Akhtar, M.W.; Hassan, S.A.; Ghaffar, R.; Jung, H.; Garg, S.; Hossain, M.S. The shift to 6G communications: Vision and requirements. Hum. Centric Comput. Inf. Sci. 2020, 10, 1–27. [Google Scholar] [CrossRef]
- Giordani, M.; Polese, M.; Mezzavilla, M.; Rangan, S.; Zorzi, M. Toward 6G Networks: Use Cases and Technologies. IEEE Commun. Mag. 2020, 58, 55–61. [Google Scholar] [CrossRef]
- Hakeem, S.A.A.; Hussein, H.H.; Kim, H. Security Requirements and Challenges of 6G Technologies and Applications. Sensors 2022, 22, 1969. [Google Scholar] [CrossRef]
- Porambage, P.; Gür, G.; Moya Osorio, D.P.; Livanage, M.; Ylianttila, M. 6G Security Challenges and Potential Solutions. In Proceedings of the 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Porto, Portugal, 8–11 June 2021; pp. 622–627. [Google Scholar]
- Wang, M.; Zhu, Z.; Zhang, T.; Zhang, J.; Yu, S.; Zhou, W. Security and privacy in 6G networks: New areas and new challenges. Digit. Commun. Netw. 2020, 6, 281–291. [Google Scholar] [CrossRef]
- Banafaa, M.; Shayea, I.; Din, J.; Azmi, M.H.; Alashbi, A.; Daradkeh, Y.I.; Alhammadi, A. 6G Mobile Communication Technology: Requirements, Targets, Applications, Challenges, Advantages, and Opportunities. Alex. Eng. J. 2023, 64, 245–274. [Google Scholar] [CrossRef]
- Adhikari, M.; Hazra, A. 6G-Enabled Ultra-Reliable Low-Latency Communication in Edge Networks. IEEE Commun. Stand. Mag. 2022, 6, 67–74. [Google Scholar] [CrossRef]
Generation | Access Techniques | Data Rate | Frequency Bands | Applications | Key Parameters |
---|---|---|---|---|---|
5G | NOMA, FBMC | 2.4 Kbps | 1.8 GHz, 2.4 GHz, 30–300 GHz | Voice, Data, Video calling, ultra HD video, virtual reality applications | Ultra-low latency, ultra-high availability, ultra-speed, and ultra-reliability |
4G | LTEA, OFDMA, SCFDMA, WIMAX | 10 Kbps | 2.3 GHz, 2.5 GHz, 3.5 GHz | Voice, data, video calling, HD television, and online gaming | Faster broadband internet and lower latency |
3G | WCDMA, UMTS, CDMA | 384 Kbps to 5 Mbps | 800 MHz, 850 MHz, 900 MHz, 1800 MHz, 1900 MHz, 2100 MHz | Voice, data, and video calling | Broadband internet and smart phones |
2G | GSM, TDMA, CDMA | 100 Mbps to 200 Mbps | 800 MHz, 900 MHz, 1800 MHz, 1900 MHz | Voice and data | Digital |
1G | FDMA, AMPS | 10 Gbps to 50 Gbps | 800 MHz | Voice | Mobility |
Authors & Ref. No. | Small Cells | CA | D2D | NOMA | 5G Optimization | MIMO |
---|---|---|---|---|---|---|
Kim, T.Y. et al. [10] | ✓ | X | X | X | X | X |
Ramazanali, H. et al. [11] | ✓ | X | X | X | X | X |
Xu, Y. et al. [12] | ✓ | X | X | ✓ | X | ✓ |
Khatib, E.J. et al. [13] | X | X | X | X | ✓ | X |
Dash, S. et al. [14] | X | X | X | X | ✓ | X |
Lieira, D.D. et al. [15] | X | X | X | X | ✓ | X |
Shayea, I. et al. [16] | X | X | X | X | ✓ | X |
Abuin, A. et al. [17] | X | X | X | ✓ | X | ✓ |
Akbar, A. et al. [18] | ✓ | X | X | ✓ | X | ✓ |
Hussain, MD. et al. [19] | X | X | X | ✓ | X | X |
Ansari, R.I. et al. [20] | X | X | ✓ | X | X | X |
Celik, A. et al. [21] | X | X | ✓ | X | X | X |
Sedidi, R. et al. [22] | X | X | ✓ | X | X | X |
Wang, M. et al. [23] | X | X | ✓ | X | X | X |
Gandotra, P. et al. [24] | X | X | ✓ | X | X | X |
Afolalu, O. et al. [25] | X | ✓ | X | ✓ | X | X |
Alam, M.J. et al. [26] | X | ✓ | X | X | X | X |
Chikhale, D. et al. [27] | X | ✓ | X | X | X | X |
Lin, P. et al. [28] | X | ✓ | X | X | X | X |
Qamar, F. et al. [29] | X | X | X | X | X | ✓ |
Our Survey | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Abbreviation | Full Form | Abbreviation | Full Form |
---|---|---|---|
3GPP | Third Generation Partnership Project | LTE-A | Long Term Evaluation Advanced |
5G | Fifth Generation | ML | Machine Learning |
AGMA | Arithmetic Geometric Mean Algorithm | MIC | Multiple Interference Cancellation |
ANN | Artificial Neural Networks | MIMO | Multiple input Multiple Output |
BS | Base Station | mmWave | Milli-Meter Wave |
CA | Carrier Aggregation | NOMA | Non Orthogonal Multiple Access |
CC | Carrier Component | OC | Operator Control |
CDNOMA | Code Division NOMA | OFDMA | Orthogonal Frequency Division Multiple Access |
CDMA | Code Division Multiple Access | OMA | Orthogonal Multiple Access |
CGP | Complementary Geometric Programming | PA | Power Allocation |
CR | Cognitive Radio | PDNOMA | Power Domain NOMA |
CS-NOMA | Compressing NOMA | PCC | Primary Carrier Component |
CSI | Channel State Information | QoS | Quality of Service |
CU | Cellular User | RAN | Random Access Network |
CUE | Cellular User Equipment | RB | Resource Block |
D2D | Device to Device | RD | Random Distribution |
DL | Down Link | RF | Radio Frequency |
DR | Device Relaying | RL | Reinforcement Learning |
DC | Direct D2D Communication | SINR | Signal to Interference Noise Ratio |
DU | D2D User | SIC | Successive Interference Cancellation |
DUE | D2D User Equipment | SOP | Security Outage Probability |
eMBB | Enhanced Mobile Broad Band | SCC | Secondary Carrier Component |
FDD | Frequency Division Duplexing | SU | Secondary User |
FDMA | Frequency Division Multiple Access | TDD | Time Division Duplexing |
FR1 | Frequency Range 1 | UE | User Equipment |
FR2 | Frequency Range 2 | UL | Up Link |
IC | Interference Cancellation | URLLC | Ultra Reliable Low Latency Communication |
IMT | International Mobile Telecommunication | UAV | Unmanned Aerial Survey |
IoT | Internet of Things | V2V | Vehicle to Vehicle |
ITU | International Telecommunication Union | V2X | Vehicle to Anything |
LTE | Long Term Evaluation | WRC | Worlds Radio-communication Conference |
Parameter | Femto Cell | Pico Cell | Micro Cell |
---|---|---|---|
Maximum coverage radius | 50 m | 250 m | 2.5 Km |
Maximum transmitted power | 100 mW | 250 mW | 5 W |
Maximum number of users | 16 | 64 | 200 |
Type of backhaul | Fibre, Wired | Fibre, wired | Fibre, wired, microwave |
Cost | Low | Low | Medium |
Advantages | Offload network congestion, extended coverage and high data rates | Extended throughput and coverage | Extended coverage |
Applications | Residential | Small enterprise | Smart cities, smart metro |
Location | Indoor and outdoor | Indoor | Outdoor |
Authors & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Sun, Y. et al. [49] | The energy efficiency of an ultra dense HetNets is estimated based on the stochastic geometry theorem. | The small cells are optimised and enhanced the energy efficiency. | The energy efficiency is constant with a further increase of UEs and it reduces the overall system performance. UE density optimization is required to enhance the efficiency. |
Feteiha, M.F. et al. [50] | Small cells are deployed in a public transport bus to verify the traffic to and from the macro cells. Traffic offloading is verified dynamically and the DL outage probability expressions are derived. | The overall system coverage and outage probability gain are enhanced. Power consumption is reduced. | The pre-coding signals are to be perfectly formatted to avoid any security issues. |
Khan, M.F. et al. [52] | The impact of outdoor UEs on the traffic offload is analysed based on the cell densification concept. | Enhanced the UEs and cell edge throughput, overall system capacity, and coverage. | The overall deployment cost increases due to the deployment of additional pico cells. |
Namgeol, O. et al. [54] | The interference effect of the HCS networks and the outage probability of femto cells are analysed. | Enhanced the outage probability and spectral efficiency of a HCS network. | Carrier to interference ratio between the femto cells in the HCS network to be avoided. |
Landstrom, S. et al. [55] | Pico cells are deployed with the macro cells to improve the overall system performance. | Enhanced the coverage capacity and cell edge coverage. Traffic density at the macro cell is reduced. | Identifying the fixed locations of pico cells is very important in order to reduce the traffic density at the macro cell and to improve the cell edge coverage. |
Yasir, B.A. et al. [56] | The coverage area of a macro cell is added with the pico cells to improve the overall system throughput and the received signal power is used to estimate the path loss. | Enhanced the cell edge spectral efficiency, coverage capacity, and throughput. | The system complexity and deployment cost increases with the number of pico cells deployed. |
Lopez-Perez, D. [57] | A macro cell and pico cell cooperative scheduling scheme is considered to reduce the UL and DL interference due to the macro cell on pico cell UEs. | Enhanced the traffic offloading gain, DL throughput to 36%, UL throughput to 7% and overall system performance by reducing the interference. | Need to improve the UL throughput and reduce the interference between the pico cell UEs and macro cell. |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Wei, M. et al. [65] | Theoretically analysed the high and low frequency CC aggregations: 2.5 GHz and 3.5 GHz frequency bands are aggregated to get enhanced coverage capacity. | The UL and DL coverage capacity was enhanced inside and deep inside the buildings. | This method can be extended to mmWave frequency bands. |
Parikh, J. et al. [66] | Contiguous and non-contiguous CA methods are used in LTE-A systems that are compatible with the LTE systems to achieve the high data rates. | Achieves high data rates, better coverage, and wider bandwidths | LTE devices which will not support the LTE-A will use only 20 MHz carriers instead of 100 MHz carriers. |
Alotaibi, M. et al. [67] | The impact of spectrum aggregation (SA) on LTE networks is measured. The performance of intra band SA and contiguous CA in LTE are compared. | The spectrum aggregation of LTE system provides better system performance compared to individual carrier systems. | Lower frequency bands are aggregated for a limited cell size. For an extended cell size, high frequency components need to be aggregate. |
James, A. et al. [68] | Intra and inter band CA techniques are analysed and the energy efficiency of single and multi-flow based relay assisted CA systems are proposed to estimate the ergodic rate of users. | The relays boost the coverage capacity of the lower CCs and provide a better capacity fairness between the users. | There is further need to improve the capacity fairness between the users. |
Cao, Y. et al. [69] | Two LC based lumped networks and TL based phase shifters are used with the BAW duplexers. | Throughput and overall system performance are improved. | Interference free frequency multiplexing schemes are to be used to improve the CA performance |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Hoang, T.D. et al. [78] | A joint optimal mode selection and resource allocation and power allocation schemes are proposed for a D2D undelayed cellular networks. | The system sum rate is improved through the optimization of mode selection schemes. An optimised resource allocation scheme reduces the co-channel interference. | D2D links will suffer from the co-channel interference from the cellular links. |
Chou, H.J. et al. [79] | Degree of freedom based mode selection and interference alignment based interference management schemes are proposed. | Provides high system sum rate and low interference between DUE and CUE. The sum rate increases with the increased number of MIMO antennas. | The sum rate is low for a lesser number of antennas, i.e., it achieves only 10 bits/s/Hz for six antennas. |
Yang, L. et al. [80] | An optimization model for resource allocation based on non-transferable utility and distributed coalition formation algorithms are proposed. | Traffic offload, system performance, and average sum utilities are enhanced. | A single cell scenario is used in this paper but a multi cell scenario is required in 5G systems for better coverage. |
Gui, J. et al. [81] | DL throughput optimization techniques are proposed for D2D communications. The multi hop relay aided in-band D2D, game based power adjustment and greedy algorithms are discussed. | DL throughput, energy efficiency, and coverage capacity are enhanced using the proposed algorithms. | The co-channel interference increases with the increased number of UEs. |
Liu, M. et al. [82] | Optimization of power allocation, resource allocation, and mode selection based relay assisted D2D communication system is considered. | Power allocation complexity is reduced and overall system throughput is maximised. | At low powers the interference between the DUs is increased and the system sum rate is reduced. |
Bithas, P.S. et al. [83] | Proposed a Markov chain theory for single user and greedy heuristic algorithm for multi user scenarios for mode selection in D2D communication. | Outage probability, system sum rate, and average user SINR are improved without increasing the system complexity and signalling overhead. | At low SINR, the DUE is unable to select the best mode of operation and the system performance is affected by the synchronisation errors. |
Hou, G. et al. [84] | Resource allocation and mode selection algorithms are proposed to enhance the system performance. | Spectral efficiency and system throughput are enhanced. | Multiplexing resources increases the interference between the UEs. |
Bulusu, S. et al. [85] | Proposed a throughput optimal joint mode selection user scheduling algorithm and discrete rate adaptation scheme for D2D communication system. | User fairness increases with the optimal mode selection. Cell throughput increases with the multi user diversity. | Joint rate power adaptation modes for partial CSI are to be addressed. |
Dai, Y. et al. [86] | D2D enabled NOMA cellular network resource allocation and mode selection issues are discussed. The expression for optimal resource allocation was derived based on game theory approach. | Enhanced the system sum rate, coverage capacity, and spectral efficiency. | Inter cell interference increases with the increased number of BSs. |
Haider, N. et al. [87] | To protect the PUs, an optimal mode selection algorithm is analysed. | The success probability increases and interference between the DUs is reduced. | Optimal guard zone radius is required to improve the system capacity. |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Zhang, J. et al. [89] | A random back-off procedure is used to detect a device in D2D communication and analytical expressions for average delay in device discovery are derived. | Enhanced the device discovery probability. The maximum number of devices discovered are 61.4% and the success probability is 13.6%. The occurrence of collisions are reduced in the guard zone of a device discovery. | There is a trade-off between the success probability of CUs and DUs. |
Chour, H. et al. [90] | A VANET based device discovery scheme has been proposed to offload the D2D discovery traffic. Analytical expressions for latency in device discovery is derived. | VANET enhanced the D2D discovery process efficiently. Achieved low latency in the device discovery process and reduced the traffic due to routing messages of device discovery. | The proposed model is only applicable to some particular geographic regions such as small roads and urban areas, but not to highways. |
Mosbah, A.B. et al. [91] | An adaptive device discovery scheme has been proposed to derive the analytical expression for user density prediction. This method predicts the present device discovery performance based on the historical data. | Improved the device discovery performance using ML and optimization algorithms. | The user density changes dynamically and the prediction based method will not provide an accurate performance of the system at each and every time. |
Long, Y. et al. [92] | A peer-device discovery scheme based on the deep neural networks has been proposed to detect the malicious devices. Trusted and malicious devices can be identified easily using this method. | This method will improve the efficiency of detecting the trusted devices. | Channel capacity and SNR are influenced by the instability of the device connections. |
Kallem, Z. et al. [93] | Device discovery maximisation algorithm based on the conversion of half duplex mode of operation to full duplex mode using the SINR threshold was proposed. | The device discovery rate is significantly increased with the full duplex mode compared to the conventional half duplex mode. | The power consumption increases with the increased number of devices discovered. The collision probability also increases with the increased number of resource blocks assigned per user. |
Jaffiry, S. et al. [94] | Proposed a neighbourhood device discovery scheme for detecting the moving UEs. This method will estimate the number of devices discovered, which are moving in a straight line between two points. | Device discovery rate increases with the device density, if the devices are moving with a constant speed in a given path. | If the devices are moving with different speeds or are randomly distributed or randomly change their locations then the proposed method fails to detect the devices. |
Kallem, Z. et al. [95] | Proposed a public safety priority based in-band full duplex frame structure. A time efficient resource allocation scheme is used to convert a half duplex mode of operation to a full duplex mode when the half duplex mode fails to support the available resources. | The device discovery rate is enhanced by 37% compared to the random access method. The number of devices discovered also increased by 13.3% by reducing the collision rate. | This method provides priority to the public safety, but fails to detect the neighbouring devices, which will reduce the overall device discovery rate. |
Masood, A. et al. [96] | Proposed a device discovery and localisation with the use of UAVs in the public safety networks. The MUSIC algorithm is used to locate the UEs in disaster situations. | The devices affected by a disaster are effectively detected. Enhanced the throughput and reduced the packet error rate. | The packet error rate increases with the increased SNR and with the different modulation and coding schemes. |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Gandotra, P. et al. [98] | Proposed a NOMA based multi interference cancellation scheme using the optimal resource allocation and signal detection. Optimised the power consumption. | The proposed scheme reduces the overall system complexity up to 13 dB compared to the OFDM and conventional NOMA schemes. | Latency is increased and the fairness factor is decreased with the increased number of D2D pairs. |
Wu, Y. et al. [99] | Proposed a Lunius system to optimise the local file sharing between the peer to peer users. It improves the user experience and offloads the traffic at BS in a D2D communication system. | Throughput, data rates, and spectral efficiency are maximised and the traffic load at the BS is reduced. | The Lunius system performance depends on the cooperation between the D2D links and the error rates. |
Ni, Y. et al. [100] | MIMO with minimum mean square error SIC and zero forcing scheme was proposed to enhance the performance of a NOMA system. A practical IC scheme is used to reduce the bit error rate. | Data rates are increased and the bit error rates are reduced. | Only a two-users scenario is considered but in practical cases the number of users in a given cellular region are more than two. |
Vu, H.V. et al. [101] | A joint beam-forming and PA schemes are used with the MIMO cellular networks to enhance the overall system throughput. | Enhanced the spectral efficiency gain and throughput in a full duplex mode of operation compared with the half duplex. | Increased D2D links compressed the spectral efficiency gain. |
LV, S. et al. [102] | A guard zone based D2D scheme is proposed with the SIC at the BS of a cellular network. An analytical expression for the successful transmission probability for a uniform distribution of CUEs and DUEs is derived. | The success probability and throughput are maximised by optimising the inner radius of the guard zone. | The success probability and average throughput decreases with the increased inner radius of the guard zone. |
Melki, L. et al. [103] | Multi hop D2D communication system is considered to improve the system performance. | Throughput, SINR and coverage capacity are maximised with the number of users. | This method is applicable for short range D2D links only. |
Behjati, M. et al. [104] | A new IC technique is designed to reduce the feedback overhead in a massive MIMO system. | CSI feedback overhead is reduced. Overall system performance and throughput are enhanced. | As the number of antennas increases in a MIMO system, the throughput decreases. |
Xue, J. et al. [105] | Proposed a relay based D2D communication system with the interference cancellation scheme. | The overall system performance and user capacity are enhanced with the relay trigger and relay selection algorithms. | The increased number of relays required to cover a large number of CUs increases the system complexity. |
Kim, J. et al. [106] | A fractional frequency reuse and almost blank sub-frame schemes are proposed to mitigate the inter cell interference between the CUEs and DUEs. | The throughput is enhanced up to 60% and the interference is reduced using the frequency reuse method. | The co-channel interference between the DUE pairs is not considered in this paper. |
Kamruzzaman, Md. et al. [107] | A dynamic D2D algorithm is proposed to reduce the interference based on the outage probability, SINR and cell density. | User capacity is maximised for a small cell density. Outage probability increases with the increased SINR. | The overall success probability decreases with the small cell density. |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Wang, L. et al. [108] | In a D2D underlaid communication system, physical layer security is discussed and an optimal threshold is used to enhance the security of a CU. | The proposed scheme effectively protects the CUs from the eavesdroppers. | In this method only one CU is protected from the multiple eavesdroppers and D2D pairs. However, in practical multiple CUs, protection is required. |
Wang, M. et al. [109] | Proposed a key agreement and privacy preserving authentication protocols to provide the secured D2D communication. | Provides a secured D2D communication from the malicious users and also protects from the internal attacks. | Estimation of success probability is further required. |
Waqas, M. et al. [110] | Relay based cooperative trusted and semi-trusted and non trusted environments are used to provide a physical layer security. The optimal relay pairs are selected based on the coalition game theory. | The trusted environment will provide a better security when compared with the semi and non trusted environments. | The average user security decreases with the distance threshold. |
Gupta, R.K. et al. [111] | A secured key is generated through a bit string based on the enhanced identity encryption scheme. The leakage of UE’s identity can be reduced with this method. | The time required for encryption and decryption process is much less. The UE’s identity can be hidden by using the Lagrange coefficient. | As the number of UE’s messages increases, the time required for encryption, decryption, and authentication also increases. |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Zhang, H. et al. [120] | Two user pairing and access algorithms are proposed to enhance the system capacity of a SIC based NOMA system. | The proposed methods enhanced the system throughput, capacity, and spectral efficiency. | At minimum SNR, the average channel capacity is very small for fixed PA algorithms compared to all the other algorithms. |
Ding, Z. et al. [121] | Fixed PA and CR inspired NOMA schemes are proposed to improve the performance of NOMA systems. | Enhanced the outage probability and data rates of the NOMA system with the increased SNR. | If two neighbouring users are paired then it will provide a better data rate compared to the non-neighbouring users. |
Wang, S. et al. [122] | Multi carrier NOMA with cooperative game and conventional neural network schemes are used to design a user pairing network. | Enhanced the average channel throughput based on the soft and hard channel capacities with SNR and with the number of users. | As the number users increases the performance loss also increases, which degrades the average spectral efficiency. |
Guo, F. et al. [123] | Interference-aware user grouping scheme is considered in the NOMA system to minimise the energy consumption. Exchange league concept is used to identify the energy consumption in the case of multi user scenario. | Computational complexity reduced with the proposed algorithm. Total transmit power varies with the number of user groups and the number of individual users. Transmit power increases with the individual users but decreases with the user groups. | Interference between the users in one group will increase randomly with enhanced number of users in that group. So, the total transmit power reduces with the user groups. |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Li, C. et al. [131] | Simulated annealing technique is considered to optimise the power allocation and to enhance the system throughput. | The proposed simulated annealing provides better throughput compared to numerical optimization methods. It also reduces the time complexity for achieving enhanced throughput. | An equal power allocation scheme is used as an optimal power allocation in this paper. |
Wang, Z. et al. [132] | A novel price based PA algorithm is considered for a DL-NOMA system with two special cases such as two users scenario and multiple users scenario. | The proposed algorithm maximised the revenue of a BS up to 14.94% and the total sum rate of the users up to 20.63%. | Power fairness is required to encourage the users with low channel conditions. |
Wang, Z.Q. et al. [133] | Stackelberg game theory was used to solve the power allocation problem in NOMA system with QoS constraints. | Optimal price based scheme improved the BS revenue and the number of users allowed to use power. | Power fairness is required to encourage the users with low channel conditions. |
Aldebes, R. et al. [134] | Glicksberg game theory based PA algorithm is considered for the DL-NOMA system to derive an optimal expression for maximising the utility function. | The average data rate and sum rate are enhanced with the proposed scheme. | As the number of users in a cell increases beyond the threshold, the average data rates are reduced. |
Lamba, A.K. et al. [135] | An auction game based PA scheme was proposed for the hybrid NOMA-OMA system. In this method, BS will acts as an auctioneer and sell the powers to the user pairs formed with one strong user and one weak user. | This method achieves very high sum rates compared to the conventional NOMA system. | User pairing plays an important role in this method to provide a power fairness. |
Datta, S.N. et al. [138] | An optimal PA and an efficient user selection algorithm was proposed to maximise the performance gain of a DL-NOMA system. Karush–Kuhn–Tucker greedy algorithm was used for optimal PA and user selection. | The performance of the proposed optimal power allocation scheme is better than conventional NOMA schemes and also provides the maximum weighted sum rate and performance gain. | The inter/intra cell interference is estimated for an ideal channel and an ideal IC scheme is used to mitigate the interference. |
Mei, J. et al. [139] | A joint user pairing and PA optimization scheme is proposed to maximise the system performance and to reduce the system complexity. | System complexity is reduced by 62% and the average user throughput is enhanced by 82%. | User pairing complexity is reduced but the multi user scheduling complexity is still high. |
Liu, F. et al. [140] | A low complexity algorithm is designed for a joint PA and user selection scheme. | Overall system complexity is reduced, and cell edge and overall system throughput is enhanced. | In this method only two to three users are paired. If the number of users paired increases then it increases the system complexity. |
Ali. M.S. et al. [141] | A joint optimization problem for maximisation of sum throughput is considered based on the power budget, SIC receiver constraints, and minimum rate requirements. | The throughput of UL/DL NOMA system is maximised. | If the cluster size increases then the performance of DL-NOMA system is reduced. |
Chen, L. et al. [143] | A joint user selection and PA scheme is considered for the UL-NOMA system to improve the user fairness. | Enhanced the fairness performance, average data rates, and average outage probability. | The fairness index decreases with the user density. |
Shahab, M.B. et al. [146] | A dynamic user pairing and PA scheme is considered in a NOMA system to improve the data rates and BER. | System capacity is maximised by satisfying the individual user data rates and BER. | BER is reduced up to some optimal PA value. However, it increases after the optimal PA value. |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Wei, Z. et al. [150] | A sub-optimal iterative resource allocation (RA) algorithm is considered to provide a perfect balance between the overall system sum rate and its complexity. | Enhanced the total power saved with the increased number of users and reduced the total power consumption. The spectral efficiency gain is enhanced by reducing the overall power consumption. | The outage probability is low at low transmit powers. |
Li, S. et al. [151] | Proposed a robust optimization scheme for DL-NOMA system. A non-convex problem is converted into a convex problem by using a complementary geometry programming and arithmetic geometric mean approximation schemes. | The proposed scheme achieves high transmit power savings compared to the non robust scheme. Overall power efficiency is enhanced by the robust scheme. | Average transmit power is improved if the number of users are facing poor channel gain issues and do not satisfy the minimum QoS requirement. |
Cui, F. et al. [152] | An outage probability based user scheduling scheme was proposed for a DL-NOMA system under imperfect SIC. The non-convex RA problem was solved by optimising the user scheduling through a matching theory algorithm and branch and bound technique. | The proposed method minimised the total transmit power required. | The required transmit power increases with the residual interference. The increased residual interference deteriorates the outage probability of the users. |
Alotaibi, S. et al. [153] | Two imperfect CSI schemes such as channel distribution information and channel estimation uncertainty are considered for the MIMO-NOMA system to enhance the sum rate and also an efficient SCA algorithm is used to optimise the sum rate. | The overall system sum rate and system utility are maximised. | Due to the imperfect CSI, the overall interference increases and there is a trade-off between system complexity and throughput. |
Wang, X. et al. [154] | Imperfect SIC is considered for a DL MC-NOMA system to maximise the weighted sum rate. A low complexity PA algorithm is proposed based on the perfect and imperfect SIC. | The weighted sum rate decreases with the SIC errors and power factor. | As the number of users or number of iterations increases, the weighted sum rate also increases, which increases the total power required. |
Gao, Y. et al. [155] | A dynamic decoding order SIC receiver is considered for the UL-NOMA system. Analytical expression for outage probability is derived based on the three user scenario. | The outage probability of user 1 and user 2 decreases but it increases with user 3. A dynamic SIC receiver provides very low outage probability with the fixed SIC. | The outage probability increases with a back off factor of 10 dB. |
Tang, Z. et al. [156] | Initially a slow fading channel was considered to define a outage achievable rate, then a statistical channel is used to estimate the SIC errors in a NOMA system. | Enhanced the outage achievable rate of NOMA system compared to the conventional OMA system and also achieved the higher data rates. | A perfect SIC receiver is assumed in this paper, but in practical cases an imperfect SIC needs to be considered to get accurate results. |
Fan, J. et al. [157] | A single cell DL-NOMA system is considered for high speed railways in order to provide high data rates. A partial CSI with Rician fading channel is assumed to estimate the performance of NOMA system. | The proposed system enhanced the average outage probability compared to the conventional OMA system. The outage performance can be further increased by increasing the Rician factor K. | In high speed railways, Doppler shift arises due to the mobility, which leads to channel estimation errors and inter channel interference. |
Liu, S. et al. [158] | Multi user DL-NOMA system with limited CSI feedback channel is considered to achieve high sum rate. Random beam-forming and zero forcing techniques are also considered to reduce the interference between the users. | Random beam-forming technique is more suitable for a limited CSI feedback channel and it achieves higher system sum rate than compared to the OMA system. | In this paper, only limited CSI feedback channel is considered, which reduces the overall system performance. |
Saxena, P. et al. [159] | The effect of beam-forming technique in a multi input single output up-link NOMA system is considered with one bit feedback to estimate the system performance. | Enhanced the system performance and also achieved the high coding gain. | The overall performance of proposed system is reduced with the enhanced number of transmitting antennas. |
Yang. Z. et al. [161] | A single cell DL-NOMA system performance is studied under imperfect CSI and CSI based on order statistics. Analytical expression for outage probability and average sum rate are derived. | Enhanced the performance of NOMA system compared to the conventional OMA system under two proposed CSI scenarios. Average sum rate and outage probability are enhanced with the SNR. | Perfect CSI gives better performance compared to the proposed two CSI scenarios because it is an ideal case. |
Choi, J. [162] | A repetition based NOMA system is considered to achieve high diversity gain. An analytical expression for outage probability was derived based on the key parameter. | The proposed method enhanced the average error probability and outage probability. | The average error probability depends on the code length. |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
He, G. et al. [163] | An optimal PA and power splitting ratio selection algorithms are used to maximise the security sum rate (SSR) of the physical layer in a DL-NOMA system. | Enhanced the overall system performance with the optimal PA and power splitting ratio methods. The power splitting method provides the highest SSR compared to the PA method. | The SSR of the system is affected by the individual users’ minimum required energy. |
Tang, J. et al. [164] | The security of the physical layer in NOMA system is affected by the random mobility of the users. In this paper, the authors considered random way point and direction mobility models to estimate the SSR. | Enhanced the SSR using the large protected zone radius. Users with good channel conditions will get higher SSR and fairness than compared with the users with poor channel conditions. | SSR is affected by the poor users. If the number of poor users increases, then the SSR and fairness decreases. |
Yin, C. et al. [165] | UAV enabled multicast-unicast transmission system is considered for a DL-NOMA to maximise the SSR. | Enhanced the SSR of a UAV enabled NOMA system and also increased the uni-casting secrecy sum rate by increasing the transmission powers. | The multi-casting SSR decreased with the power because more powers are required to transmit the multi-cast information. |
He, B. et al. [166] | Optimal NOMA scheme is designed to maximise the transmit power based on the SSR and QoS requirements. | Enhanced the performance of the NOMA system regardless of the number of users. | Eavesdroppers are assumed as passive in order to enhance the performance, but an eavesdropper will always deteriorate the overall performance. |
ElHalawany, B.M. et al. [167] | A NOMA system with two users, i.e., trusted user and malicious user pairing is considered at the BS. Outage probability and secrecy outage probability are estimated for the proposed scheme. | The performance of the system depends on the users position from the BS. Enhanced secrecy outage probability is achieved when the malicious users are far away from the BS. | Secrecy outage probability deteriorates if the number of malicious users near the BS increases. |
Liu, Y. et al. [168] | A technique called stochastic geometry is used to locate the users in NOMA system. Secrecy performance of the proposed technique is estimated based on single and multiple antennas. | Enhanced the secrecy performance by extending the eavesdroppers exclusion zone and using artificial noise at the BS. | Performance of the network is overestimated due to the assumption of perfect SIC. |
Lv, L. et al. [169] | A novel transmission outage constrained scheme is considered in NOMA system to provide security and reliability. Outage probability and diversity order are estimated. | The proposed scheme provide the secured transaction without leakage of any confidential information | The increased number of eavesdroppers will reduce the efficiency. |
Ziang, Z. et al. [170] | CR-NOMA network with multiple PUs and SUs is considered. Analytical expressions for outage probability and throughput are derived by assuming PU as a trusted user and SU as an eavesdropper. | Enhanced the secrecy performance by pairing the PUs with better channel conditions. | SUs will not improve the secrecy performance and throughput because they are assumed to be eavesdroppers. |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Suyama, S. et al. [176] | Massive MIMO technology was considered for the 5G and 6G networks to enhance the throughput and data rates. | High data rates of 100 Gbps are achieved using the mmWave frequency band of 28 GHz. | Multiple M-MIMO systems are used to enhance the throughput. This will increase the system complexity. |
Tashiro, K. et al. [177] | A cylindrical antenna structure for the MIMO system was proposed to enhance the system capacity and SINR. | The system capacity is enhanced by 2.1 times compared to the planar structure. This will also enhance the coverage radius of up to 100 km. | Optimization of antennas will further enhance the system capacity. |
Hussain, S.S. et al. [178] | Beam division multiple access technique was considered for the M-MIMO system to enhance the system capacity. | System capacity is enhanced 10 times and energy efficiency is enhanced 100 times by reducing the bit error rate. | Spectral efficiency and data rate enhancement is required to improve the overall system performance. |
Zbairi, M. et al. [179] | A cell free MIMO UP receiver was considered with the zero forcing, MMSE, and maximum ratio combining detectors. | The spectral efficiency is enhanced using the zero forcing and MMSE detectors compared to the cellular M-MIMO and small cell M-MIMO systems. | The maximum ratio combining detector reduce the spectral efficiency. |
Dicandia, F.A. et al. [180] | A triangular lattice structure of antennas was considered for M-MIMO system between the frequency bands of 24.25 GHz and 29.5 GHz. | Higher spectral efficiency is achieved by maintaining the minimum distance between the antennas. | The optimal distance should be estimated to improve the spectral efficiency and to achieve higher data rates. |
Salh, A. et al. [181] | The trade-off between spectral efficiency and energy efficiency is used to reduce the transmit power based on multi-objective optimization in a M-MIMO system. | Spectral efficiency and energy efficiency are maximised by minimising total energy consumption. | The number of antennas is fixed in this paper. |
Author & Ref. No. | Approach | Advantages | Limitations |
---|---|---|---|
Campos, R.S. et al. [185] | A genetic algorithm is proposed to optimise the location identification of the mobile station in a cell and new BS deployment location. | Optimization of the mobile station location achieved lower latency and higher precision. Optimization of new BS deployment location enhanced the coverage and capacity of a cellular network. | Deploying new BSs in a lower cell density area leads to high positioning errors. |
Thien, H.T. et al. [186] | Game theory based algorithm is used in D2D link pairs, to offload the data of one UE to another UE based on the offload coefficient. A Nash bargaining solution is considered to provide a game optimal solution. | Enhanced the energy efficiency and throughput by maximising the high D2D link fairness. The proposed method effectively offloads the UE data. | Energy efficiency decreases with the increase of minimum transmission power required, i.e., at 10 Mbps the energy efficiency is 26.56 and at 50 Mbps it is 24.21. |
Cosma, I.S. et al. [187] | An innovative RL and neural network based scheduling algorithm is proposed to minimise the packet delay and drop rates by maintaining minimum QoS requirements. | The proposed algorithm enhanced the packet data rates and reduced the packet delays. | Performance of RL algorithm depends on the input parameters. Therefore, optimization network performance with respect to the input parameters is required. |
Ahamad, M.M. et al. [188] | Higher order sectorization with proper antenna tilt is considered to enhance the coverage and capacity in 5G networks. | Phased antenna array enhanced the RF coverage at higher frequency bands compared to the low and mid frequency bands. | Accurate cell site planning is required to overcome the cell edge interference. |
Sousa, M. et al. [189] | A new antenna has been proposed to optimise the antenna tilt and beam-forming antennas. The proposed model assumed that the antenna height at the BS should be less than the average height of the high rise buildings in order to enhance the coverage. | The proposed model enhanced the indoor and outdoor coverage area. | ML and RL algorithms are used to reduce the path loss and to enhance the accuracy. |
Dandanov, N. et al. [190] | RL algorithm is considered to optimise the coverage and capacity based on the automatic antenna tilt angle. | The automatic antenna tilt will identify the higher traffic density locations and enhance the coverage and capacity by reducing the implementation cost and complexity. | Dynamic antenna tilt angle adjustment is required to avoid the coverage holes. |
Qureshi, M.N. et al. [191] | Two RL based algorithms, deep Q-learning based on artificial neural networks and stochastic cellular learning, are used to optimise the antenna tilt. | Enhanced the overall coverage and data rates of a cellular network using two algorithms. ANN enhanced the cell edge performance compared to the stochastic method. | Handovers will increase the call rejection ratio, which will affect the overall system performance. |
Dreifuerst, R.M. et al. [192] | Deep deterministic policy gradient and RL algorithms are used to enhance the coverage capacity and to minimise the interference by jointly optimising the antenna tilt and transmit power. | The proposed algorithms enhanced the coverage and capacity of a cellular network. | Automated optimisation techniques are required to predict the actual traffic density and coverage gaps. |
S.No | Performance Indicator | List of Research Articles |
---|---|---|
1 | Coverage Capacity [177] | [50,52,55,56,65,66,68,81,86,103,105,107,120,146,177,178,185,189,190,191,192] |
2 | Latency [90] | [89,90,91,92,93,94,95,96,185] |
3 | Throughput [57] | [52,56,57,67,69,81,82,84,85,89,96,99,101,102,103,104,106,120,122,139,140,141,186,187] |
4 | Spectral Efficiency [181] | [54,56,67,84,86,99,101,108,120,150,179,181] |
5 | Data Rate [140] | [69,99,100,121,134,140,143,146,176] |
6 | Outage Probability [168] | [50,54,68,83,155,156,157,158,161,162,167] |
7 | Interference Management [107] | [57,78,79,87,98,106,107,110] |
8 | Power Consumption [150] | [50,82,150,151,152,153,178] |
9 | Overall System Performance [105] | [55,56,57,69,80,104,105,138,140,163,164,165,166,168,170,170] |
5G Techniques | Key Technologies | Benefits | Limitations | Challenges | References |
---|---|---|---|---|---|
Small cells | Femto Cells, Pico Cells, and Micro Cells | Enhanced capacity, enhanced throughput, enhanced coverage, and easy deployment | Reduced no. of small cells, infrastructure, expenditure, and coverage area | Coverage radius, mobility and handovers, deployment and testing | [49,50,52,53,54,56,57] |
Carrier aggregation | Intra-band contiguous, intra-band non-contiguous, inter-band non-contiguous | Increased capacity, high data rates, improved load balancing, extended coverage, low latency | Battery life, coverage priority, proper filtering | Optimization algorithms to maximise the battery life, new CA techniques for the dynamic frequency bands, power amplifiers, filter design | [60,62,64,65,66,68,69] |
D2D | Overlay mode, underlay mode, mode selection, device discovery | Enhanced capacity, spectrum sharing, interference management, inter-operability between DUE and CUE, cellular offloading | Security and privacy, limited range, malicious users | Initial device discovery, synchronisation, mode selection overhead, interference mitigation | [82,83,86,87,90,91,92,93,94,95,96,100,102,106,107,108,109,110] |
NOMA | User pairing, power allocation, SIC decoder | High spectrum efficiency, low latency, massive connectivity, enhanced throughput | Receiver complexity, power efficiency | User pairing algorithms, SIC receiver algorithms, mobility | [120,121,122,123,131,132,133,134,135,136,137,140,142,143,151,152,153] |
MIMO | MIMO, massive MIMO, multi user MIMO | Energy efficiency, throughput, spectral efficiency, higher data rates, channel capacity | System complexity, number of antennas, interference, power consumption | Signal detection, channel estimation, pilot contamination, energy efficiency | [176,177,178,179,180,181] |
5G optimization | AI algorithms, ML and RL based algorithms | Enhanced coverage, low latency, high data rates | QoS, complexity | Bridging the gap between AI and 5G technologies with the use of AI and ML algorithms. | [184,185,186,187,188,189,190,191,192] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sudhamani, C.; Roslee, M.; Tiang, J.J.; Rehman, A.U. A Survey on 5G Coverage Improvement Techniques: Issues and Future Challenges. Sensors 2023, 23, 2356. https://doi.org/10.3390/s23042356
Sudhamani C, Roslee M, Tiang JJ, Rehman AU. A Survey on 5G Coverage Improvement Techniques: Issues and Future Challenges. Sensors. 2023; 23(4):2356. https://doi.org/10.3390/s23042356
Chicago/Turabian StyleSudhamani, Chilakala, Mardeni Roslee, Jun Jiat Tiang, and Aziz Ur Rehman. 2023. "A Survey on 5G Coverage Improvement Techniques: Issues and Future Challenges" Sensors 23, no. 4: 2356. https://doi.org/10.3390/s23042356