Abstract:This paper presents the first bit error rate (BER) analysis of a pinching-antenna (PA)-based non-orthogonal multiple access (NOMA) communication system. The PA is assumed to be able to be placed anywhere along the waveguide and serves two NOMA user equipment (UEs) in both uplink (UL) and downlink (DL) scenarios. Exact closed-form expressions for the average BER of each user are derived under practical imperfect successive interference cancellation (SIC). These expressions are then used to optimize the PA location for minimizing the overall average BER of both UEs. In the UL case, the interference between the users' channels introduces phase-dependent fluctuations in the BER cost function, making it highly non-convex with many local extrema. To address this challenge, a smoothing technique is applied to extract the lower envelope of the BER function, effectively suppressing ripples and enabling a reliable identification of the global minimum. In the DL case, a joint optimization of the PA location and NOMA power allocation coefficients is proposed to minimize the average BER. Simulation results verify the accuracy of the analytical derivations and the effectiveness of the proposed optimization methods. Notably, the UL results demonstrate that an optimally positioned PA can create the required received power difference between two equally powered UEs for reliable power-domain NOMA decoding under imperfect SIC.
Abstract:This letter investigates a novel uplink (UL) system that integrates power-domain non-orthogonal multiple access (PD-NOMA) with a continuous reconfigurable intelligent surface (CRIS). We analyze the effective CRIS-assisted channels under spatially correlated fading to accurately approximate the characteristic function of the cascaded channel. This allows the derivation of an expression for the bit error rate (BER), a key performance metric for UL PD-NOMA. We further utilize the derived BER expressions to introduce a joint optimization framework that minimizes the average BER via UL power allocation and dynamic RIS partitioning among the users. The analytical results are validated by simulations, and show that the proposed optimization scheme eliminates the BER floors that are associated with UL NOMA. The results also confirm the superiority of the optimized CRIS-NOMA scheme over conventional orthogonal multiple access (OMA) and non-optimized UL NOMA schemes.
Abstract:Consider the signal-to-noise ratio (SNR) of a continuous fluid antenna system (CFAS) operating over a Rayleigh fading channel. In this paper, we extend traditional system assumptions and consider spatially coherent isotropic correlation, continuous positioning of the antenna rather than discrete, and the use of multi-dimensional space (1D, 2D and 3D). By focusing on the upper tail of the received SNR distribution (the high SNR probability (HSP)), we are able to derive asymptotically exact closed-form formulas for the HSP. Finally, these results lead to scaling laws which describe the increase in the HSP as we employ more dimensions and the optimal CFAS dimensions.
Abstract:Continuous aperture arrays (CAPAs) provide a theoretical upper bound on the performance of densely packed antenna arrays, but their analysis is limited by the lack of closed-form signal-to-noise ratio (SNR) distributions under realistic fading conditions. This paper derives accurate analytical expressions for the matched-filter SNR distribution of one-dimensional CAPAs in correlated Rayleigh environments under both the sinc and Jakes correlation models using the Karhunen-Loeve expansion. By applying a truncated hypoexponential model, we obtain accurate approximations for the probability density function and cumulative distribution function of the SNR that closely match simulations, including the outage probability region where precise characterization is critical. Compared to a standard gamma approximation, our approach provides significantly improved accuracy in this regime. Additionally, the CAPA system considered is shown to outperform discrete antenna arrays. The derived expressions enable tractable and accurate evaluation of CAPAs under practical channel models.
Abstract:We investigate network availability (NA) in aerial heterogeneous networks (AHetNets) for effective emergency rescue, where diverse delay-constrained communication services must be provided to user equipments (UEs) with varying mobility. The heterogeneity in delay constraints and UE mobility introduces resource allocation conflicts and imbalances, which undermine communication reliability and challenge NA. Although unified resource allocation (URA) can mitigate these issues, it remains unclear whether NA can be sustained under such diverse conditions. To address this, we derive expressions for the lower bound (LB) on NA in AHetNets under URA. Our analysis reveals that extended heterogeneity significantly degrades the LB due to resource limitations-even when the heterogeneity stems from additional services under less stringent delay constraints (LSDC) or from UEs with lower mobility. To overcome this degradation, we formulate and solve a joint optimization problem for the number of UEs sharing time-frequency resources ($K$) and pilot length ($ξ$), aiming to enhance the LB by improving spatial, frequency, and temporal resource efficiency. Simulation results validate our analysis and demonstrate that jointly optimizing $K$ and $ξ$ enables AHetNets to achieve the target NA under greater heterogeneity, outperforming existing resource allocation policies.
Abstract:This paper proposes a distributed continuous aperture array (D CAPA) to support simultaneous wireless information and power transfer (SWIPT) to multiple information users (IUs) and energy users (EUs). Each metasurface supports continuous surface currents that radiate electromagnetic (EM) waves for information and energy transmission to the users. These waves propagate through continuous EM channels characterized by the dyadic Green function. We formulate a system power consumption (PC) minimization problem subject to spectral efficiency and energy harvesting quality of service (QoS) requirements, where the QoS requirements are derived under the equal power allocation (EPA) scheme. An efficient two layer optimization algorithm is developed to solve this problem by optimizing the power allocation subject to the QoS violation penalties using augmented Lagrangian transformation. Our numerical results show that well optimized current distributions over each metasurface in the proposed D CAPA achieve up to 65% and 61% reductions in overall system PC compared to the EPA and colocated CAPA (C CAPA) cases, while maintaining the same total aperture size and transmission power.
Abstract:This study explores a next-generation multiple access (NGMA) framework for cell-free massive MIMO (CF-mMIMO) systems enhanced by stacked intelligent metasurfaces (SIMs), aiming to improve simultaneous wireless information and power transfer (SWIPT) performance. A fundamental challenge lies in optimally selecting the operating modes of access points (APs) to jointly maximize the received energy and satisfy spectral efficiency (SE) quality-of-service constraints. Practical system impairments, including a non-linear harvested energy model, pilot contamination (PC), channel estimation errors, and reliance on long-term statistical channel state information (CSI), are considered. We derive closed-form expressions for both the achievable SE and the average sum harvested energy (sum-HE). A mixed-integer non-convex optimization problem is formulated to jointly optimize the SIM phase shifts, APs mode selection, and power allocation to maximize average sum-HE under SE and average harvested energy constraints. To solve this problem, we propose a centralized training, decentralized execution (CTDE) framework based on deep reinforcement learning (DRL), which efficiently handles high-dimensional decision spaces. A Markovian environment and a normalized joint reward function are introduced to enhance the training stability across on-policy and off-policy DRL algorithms. Additionally, we provide a two-phase convex-based solution as a theoretical robust performance. Numerical results demonstrate that the proposed DRL-based CTDE framework achieves SWIPT performance comparable to convexification-based solution, while significantly outperforming baselines.
Abstract:This paper proposes a novel optimization framework for enhancing the security resilience of cell-free massive multiple-input multiple-output (CF-mMIMO) networks with multi-antenna access points (APs) and protective partial zero-forcing (PPZF) under active eavesdropping. Based on the main principles of absorption, adaptation, and recovery, we formulate a security-aware resilience metric to quantify the system performance during and after a security outage. A multi-user service priority-aware power allocation problem is formulated to minimize the mean squared error (MSE) between real-time and desired security efficiency, thereby enabling a trade-off between the target user's secrecy performance and multi-user quality of service (QoS). To solve this non-convex problem, a security-aware iterative algorithm based on the successive convex approximation (SCA) is employed. The proposed algorithm determines the optimal power allocation strategy by balancing solution quality against recovery time. At each iteration, it evaluates the overall resilience score and selects the strategy that achieves the highest value. Simulation results confirm that the proposed framework significantly improves the resilience of CF-mMIMO networks, allowing flexible adaptation between rapid recovery and high-quality recovery, depending on system requirements.
Abstract:Remote and resource-constrained Internet-of-Things (IoT) deployments often lack terrestrial connectivity for task offloading, motivating non-terrestrial networks (NTNs) with onboard multiaccess edge computing (MEC) capabilities. Nevertheless, in the presence of malicious actors, authentication needs to be performed to avoid non-authorized nodes from draining the computing resources of the NTN nodes. As a solution, we propose a four-layer MEC-enabled NTN with unmanned aerial vehicles (UAVs) acting as access nodes, a high altitude platform station (HAPS) acting as coordinator and authenticator, and a constellation of low-Earth orbit satellites (LEOSats) acting as remote MEC servers. We consider a tag-based physical-layer authentication (PLA) scheme to authenticate legitimate users, and formulate a joint task offloading decision and resource allocation for the admitted tasks, which is solved via block coordinate descent. Numerical results show that the PLA scheme is efficient and performs better than the benchmark schemes. We also demonstrate that the proposed scheme is robust against malicious attacks even under relaxed false-alarm constraints.
Abstract:Integrated sensing and communication (ISAC) systems are key enablers of future networks but raise significant security concerns. In this realm, the emergence of malicious ISAC systems has amplified the need for authorized parties to legitimately monitor suspicious communication links and protect legitimate targets from potential detection or exploitation by malicious foes. In this paper, we propose a new wireless proactive monitoring paradigm, where a legitimate monitor intercepts a suspicious communication link while performing cognitive jamming to enhance the monitoring success probability (MSP) and simultaneously safeguard the target. To this end, we derive closed-form expressions of the signal-to-interference-plus-noise-ratio (SINR) at the user (UE), sensing access points (S-APs), and an approximating expression of the SINR at the proactive monitor. Moreover, we propose an optimization technique under which the legitimate monitor minimizes the success detection probability (SDP) of the legitimate target, by optimizing the jamming power allocation over both communication and sensing channels subject to total power constraints and monitoring performance requirement. To enhance the monitor's longevity and reduce the risk of detection by malicious ISAC systems, we further propose an adaptive power allocation scheme aimed at minimizing the total transmit power at the monitor while meeting a pre-selected sensing SINR threshold and ensuring successful monitoring. Our numerical results show that the proposed algorithm significantly compromises the sensing and communication performance of malicious ISAC.