第六代移动通信(6G,6th generation mobile networks)技术的研究与发展已成为全球通信领域的热点。6G时代将带来前所未有的通信速率、超低时延、超大连接数以及高度智能化等特性,为移动终端的发展提供了前所未有的机遇与挑战。本文探讨6...第六代移动通信(6G,6th generation mobile networks)技术的研究与发展已成为全球通信领域的热点。6G时代将带来前所未有的通信速率、超低时延、超大连接数以及高度智能化等特性,为移动终端的发展提供了前所未有的机遇与挑战。本文探讨6G终端的发展趋势、技术革新以及可能形态。展开更多
近年来,第五代蜂窝移动通信(5G,5th generation mobile networks)蒸蒸日上,它提出了按需扩容、分片承载等新的要求。为了解决这一问题,网络切片应运而生。本文首先简述了5G发展现状以及网络切片的技术背景,接着分析了5G承载网络切片基...近年来,第五代蜂窝移动通信(5G,5th generation mobile networks)蒸蒸日上,它提出了按需扩容、分片承载等新的要求。为了解决这一问题,网络切片应运而生。本文首先简述了5G发展现状以及网络切片的技术背景,接着分析了5G承载网络切片基于端口实现方法的不足,提出基于隧道的实现方法,从而实现了对实际物理网络的抽象,降低了对物理端口资源的隔离要求。最后通过5G承载网络切片的应用案例,介绍了嵌套网络切片的使用场景。展开更多
Security against eavesdroppers is a critical issue in cognitive radio networks(CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters(...Security against eavesdroppers is a critical issue in cognitive radio networks(CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters(STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter(PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max–min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT's security but also increases the access opportunities of the STs.展开更多
文摘近年来,第五代蜂窝移动通信(5G,5th generation mobile networks)蒸蒸日上,它提出了按需扩容、分片承载等新的要求。为了解决这一问题,网络切片应运而生。本文首先简述了5G发展现状以及网络切片的技术背景,接着分析了5G承载网络切片基于端口实现方法的不足,提出基于隧道的实现方法,从而实现了对实际物理网络的抽象,降低了对物理端口资源的隔离要求。最后通过5G承载网络切片的应用案例,介绍了嵌套网络切片的使用场景。
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61271232 and 61372126)the University Postgraduate Research and Innovation Project in Jiangsu Province,China(Grant No.CXZZ12-0472)
文摘Security against eavesdroppers is a critical issue in cognitive radio networks(CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters(STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter(PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max–min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT's security but also increases the access opportunities of the STs.