A Survey of Fifth-Generation Cellular Communications Using MIMO for IoT Applications

2021 ◽  
pp. 145-155
Author(s):  
Sanket A. Nirmal ◽  
Richa Chandel
2021 ◽  
Author(s):  
Huseyin Haci ◽  
Joydev Ghosh

<div>Non-orthogonal multiple access (NOMA) is shown to be the optimal channel access method and a strong candidate to be employed at the fifth generation (5G) and beyond networks. This paper studies direct transmission (DT) and cooperative transmission (CT) modes of operations in NOMA communications and proposes an investigation on evolving a cooperative transmission NOMA (C-NOMA) into a Hybrid transmission NOMA (H-NOMA) that can be used for design and deployment of relay based wireless networks, such as networks for Internet of Things (IoT) applications.</div>


Author(s):  
Jose Marcos C. Brito

The fifth generation of mobile communications networks (5G) is currently in the standardization process, which is expected to be completed in 2020. For this new generation, new applications and scenarios are imposing new performance requirements in addition to higher data rates. Specifically, the Internet of Things (IoT) and e-health applications have very important economic roles in 5G networks and define particular performance requirements that must be considered when defining the technologies for 5G networks. In this paper, the author discusses the influence of e-health and IoT applications on the technological trends for 5G networks.


Author(s):  
Jose Marcos C. Brito

The fifth generation of mobile communications networks (5G) is currently in the standardization process, which is expected to be completed in 2020. For this new generation, new applications and scenarios are imposing new performance requirements in addition to higher data rates. Specifically, the Internet of Things (IoT) and e-health applications have very important economic roles in 5G networks and define particular performance requirements that must be considered when defining the technologies for 5G networks. In this paper, the author discusses the influence of e-health and IoT applications on the technological trends for 5G networks.


2020 ◽  
Vol 12 (5) ◽  
pp. 86
Author(s):  
Georgios Tsoumanis ◽  
Asterios Papamichail ◽  
Vasileios Dragonas ◽  
George Koufoudakis ◽  
Constantinos T. Angelis ◽  
...  

The emerging new paradigm under the fifth generation of wireless communications technologies (5G) and high expectations for massively expanding today’s Internet of Things (IoT) under 5G, are expected to support a large plurality of low-cost devices for an all-increasing number of new IoT applications. Many emerging IoT applications are going to take advantage of techniques and technologies that have high demands from low-cost devices in terms of processing large amounts of data and communication. For example, in systems based on fog computing technology, low-cost devices have to assign some of their limited resources for processing purposes. Considering the drawbacks emerging from using low-cost devices and the fact that many applications are in need for time-constrained approaches, TDMA-based Medium Access Control (MAC) policies need to be revisited and implemented in low-cost devices of today. In this sense, a policy independent of the underlying topology, TiMAC policy, is considered here and is implemented in low-cost devices using 433 MHz RF modules. Even though the implementation is limited by synchronization issues and a small number of nodes, the obtained experimental results demonstrate the potential for employing TDMA-based MAC policies on IoT systems consisting of low-cost devices.


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 350 ◽  
Author(s):  
Giulia Buttazzoni ◽  
Fulvio Babich ◽  
Francesca Vatta ◽  
Massimiliano Comisso

One of the main targets of the forthcoming fifth-generation (5G) cellular network will be the support of the communications for billions of sensors and actuators, so as to finally realize the Internet of things (IoT) paradigm. This pervasive scenario unavoidably requires the design of cheap antenna systems with beamforming capabilities for compensating the strong attenuations that characterize the millimeter-wave (mmWave) channel. To address this issue, this paper proposes an iterative algorithm for sparse antenna arrays that enables to derive the number of elements, their amplitudes, phases, and positions in the presence of constraints on the far-field pattern. The algorithm, which relies on the compressive sensing approach, is formulated by transforming the original nonconvex optimization problem into a convex one. To prove the suitability of the conceived solution for 5G IoT mmWave applications, numerical examples and comparisons with other existing methods are provided, considering synthesis problems with different pattern and aperture specifications.


2021 ◽  
Author(s):  
Huseyin Haci ◽  
Joydev Ghosh

<div>Non-orthogonal multiple access (NOMA) is shown to be the optimal channel access method and a strong candidate to be employed at the fifth generation (5G) and beyond networks. This paper studies direct transmission (DT) and cooperative transmission (CT) modes of operations in NOMA communications and proposes an investigation on evolving a cooperative transmission NOMA (C-NOMA) into a Hybrid transmission NOMA (H-NOMA) that can be used for design and deployment of relay based wireless networks, such as networks for Internet of Things (IoT) applications.</div>


2018 ◽  
Vol 2018 ◽  
pp. 1-21 ◽  
Author(s):  
Pablo Salva-Garcia ◽  
Jose M. Alcaraz-Calero ◽  
Qi Wang ◽  
Jorge Bernal Bernabe ◽  
Antonio Skarmeta

Internet of Things (IoT) is a key business driver for the upcoming fifth-generation (5G) mobile networks, which in turn will enable numerous innovative IoT applications such as smart city, mobile health, and other massive IoT use cases being defined in 5G standards. To truly unlock the hidden value of such mission-critical IoT applications in a large scale in the 5G era, advanced self-protection capabilities are entailed in 5G-based Narrowband IoT (NB-IoT) networks to efficiently fight off cyber-attacks such as widespread Distributed Denial of Service (DDoS) attacks. However, insufficient research has been conducted in this crucial area, in particular, few if any solutions are capable of dealing with the multiple encapsulated 5G traffic for IoT security management. This paper proposes and prototypes a new security framework to achieve the highly desirable self-organizing networking capabilities to secure virtualized, multitenant 5G-based IoT traffic through an autonomic control loop featured with efficient 5G-aware traffic filtering. Empirical results have validated the design and implementation and demonstrated the efficiency of the proposed system, which is capable of processing thousands of 5G-aware traffic filtering rules and thus enables timely protection against large-scale attacks.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 671
Author(s):  
Shin-Hung Pan ◽  
Shu-Ching Wang

The continuous development of fifth-generation (5G) networks is the main driving force for the growth of Internet of Things (IoT) applications. It is expected that the 5G network will greatly expand the applications of the IoT, thereby promoting the operation of cellular networks, the security and network challenges of the IoT, and pushing the future of the Internet to the edge. Because the IoT can make anything in anyplace be connected together at any time, it can provide ubiquitous services. With the establishment and use of 5G wireless networks, the cellular IoT (CIoT) will be developed and applied. In order to provide more reliable CIoT applications, a reliable network topology is very important. Reaching a consensus is one of the most important issues in providing a highly reliable CIoT design. Therefore, it is necessary to reach a consensus so that even if some components in the system is abnormal, the application in the system can still execute correctly in CIoT. In this study, a protocol of consensus is discussed in CIoT with dual abnormality mode that combines dormant abnormality and malicious abnormality. The protocol proposed in this research not only allows all normal components in CIoT to reach a consensus with the minimum times of data exchange, but also allows the maximum number of dormant and malicious abnormal components in CIoT. In the meantime, the protocol can make all normal components in CIoT satisfy the constraints of reaching consensus: Termination, Agreement, and Integrity.


Sign in / Sign up

Export Citation Format

Share Document