Next Article in Journal
Adaptive Joint Carrier and DOA Estimations of FHSS Signals Based on Knowledge-Enhanced Compressed Measurements and Deep Learning
Previous Article in Journal
A Partial Information Decomposition for Multivariate Gaussian Systems Based on Information Geometry
Previous Article in Special Issue
Anti-Jamming Communication Using Imitation Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Editorial

Information Theory in Emerging Wireless Communication Systems and Networks

Department of Electrical and Computer Engineering, University of Illinois Chicago, Chicago, IL 60607, USA
Entropy 2024, 26(7), 543; https://doi.org/10.3390/e26070543
Submission received: 10 June 2024 / Accepted: 12 June 2024 / Published: 26 June 2024

1. Introduction

Wireless communication systems and networks are rapidly evolving to meet the increasing demands for higher data rates, better reliability, and connectivity anywhere, anytime. There are various new technologies and communication techniques that are currently being proposed for autonomous aerial networks [1,2], the Internet of Space Things [3], terahertz communications [4], large-scale massive multiple-input multiple-output (MIMO) [5,6], intelligent reflecting surfaces (IRSs) [7], visible light communication (VLC) [8], blockchain-based wireless systems [9], and quantum communications and computing [10], just to name a few. Artificial intelligence, machine learning, and edge computing are also expected to be key features of tomorrow’s wireless systems [11,12,13,14]. The nascent nature of the many new proposed methods begs the following fundamental questions: What are the ultimate performance limits of emerging wireless communication systems and networks? How can we design practical schemes to achieve the ultimate limits? Since its inception over 70 years ago by Claude Shannon [15], information theory has been the primary tool for studying the performance limits of communication systems and networks [16]. Consequently, this Special Issue is focused on the information-theoretic analysis of emerging wireless communication systems and networks.
This Special Issue features seven contributions that explore various areas of wireless communications from an information-theoretical perspective. Specifically, two papers focus on full-duplex communications, one on aerial communications, two on intelligent reflecting surfaces, one on polar coding, three on artificial intelligence techniques in wireless communications, and one on wireless system security. Detailed descriptions of these contributions are provided below.

2. An Overview of Published Articles

Full-duplex communication has recently become a fundamental technique to meet the continuously increasing rate demands of emerging wireless systems [17]. By allowing communication on the same frequency band simultaneously, the aggregate data rate of the links can effectively be doubled, achieving significant gains in spectral efficiency [18]. The first article of the Special Issue, contribution 1, investigates the power allocation problem in a full-duplex, two-way (FDTW) communication network over an OFDM channel, aiming at improving the sum data rate and energy efficiency. The authors first characterize the sum rate and energy efficiency achieved in a single-carrier FDTW system. The optimal transmit power that achieves the maximal sum data rate is presented. The energy efficiency maximization problem is solved by using fractional programming. The authors then extend their results to a multi-subcarrier FDTW system using an iterative algorithm, achieving a solution that is close to globally optimal. Simulation results show that using the obtained optimal transmit power allocation algorithm can significantly improve the sum rate and energy efficiency in both single-carrier and multi-subcarrier systems.
Intelligent reflecting surfaces (IRSs) and unmanned aerial vehicles (UAVs) are also considered to be key features of future-generation communication systems. IRSs can enhance signal strength and coverage by intelligently tuning signal reflections at a large number of passive elements [7], while UAVs can provide enhanced signal coverage to remote locations and in the presence of geographical obstructions [2]. A UAV equipped with an IRS can provide several benefits in terms of maximizing reliability or rates [19]. In particular, contribution 2 studies IRS-assisted secure transmission in UAV communication systems, where the UAV base station, the legitimate receiver, and the malicious eavesdropper in the system are all equipped with multiple antennas. In order to maximize the secrecy rate, the transmit precoding matrix, the artificial noise matrix, the IRS phase shift matrix, and the UAV’s position are jointly optimized subject to the constraints of the transmit power limit, unit modulus of IRS phase shift, and maximum moving distance of the UAV. Since the problem is non-convex, an alternating optimization (AO) algorithm is proposed to solve it. The author’s theoretical analysis and simulation results show that the proposed AO algorithm has a good convergence performance and can increase the SR by 40.5% compared with the method without IRS assistance.
Contribution 3 investigates two-way communications between an access point (AP) and multiple terminals in low-cost Internet of Things (IoT) networks. The main issues considered are the asymmetric transmission traffic on the uplink (UL) and downlink (DL) and the unbalanced receivers’ processing capability at the AP and the terminals. As a solution, a hybrid non-orthogonal multiple-access/orthogonal multiple-access (NoMA/OMA) scheme together with a joint power and time allocation method is proposed. For the system’s design, the authors formulate the optimization problem with the aim of minimizing the system power and satisfying the UL and DL transmission rate constraints. Due to the coupling of power and time variables in the objective function and the multi-user interference (MUI) in the UL transmission rate constraints, the formulated problem is shown to be non-linear and non-convex and thus is hard to solve. To obtain a numerical, efficient solution, the original problem is first reformulated to be a convex problem relying on the successive convex approximation (SCA) method, and then a numerical efficient solution is thus obtained by using an iterative routine. The proposed transmission scheme is shown to be not only physically feasible but also power-efficient.
As one of the biggest breakthroughs in information theory, polar codes were introduced by Arikan as the first provably capacity-achieving channel code with a low encoding and decoding complexity [20]. Applications include 6G and beyond wireless communication, data compression, and error correction in digital communications. This Special Issue also touches on this fundamental area through contribution 4, which discusses the advancements in polar code decoding. Contribution 4 focuses on cyclic redundancy check (CRC)-aided successive cancellation list (CA-SCL) decoding, which is a powerful algorithm that dramatically improves the error performance of polar codes. Path selection is a major issue that affects the decoding latency of SCL decoders. Generally, it is implemented using a metric sorter, which causes its latency to increase as the list grows. In contribution 4, neural-network-based intelligent path selection (IPS) is proposed as an alternative to the traditional metric sorter. The results show that the proposed path selection method can achieve comparable performance gains to existing methods under SCL/CA-SCL decoding. Compared with the conventional methods, IPS has a lower latency for medium and large list sizes. For the proposed hardware structure, the time complexity of IPS is O ( k log 2 L ) , where k is the number of hidden layers in the network and L is the list size.
The next paper of the Special Issue continues the “AI for Wireless” theme of contribution 4 by applying deep Q-learning (DQL) algorithms to wireless resource allocation problems. Specifically, contribution 5 addresses a downlink resource allocation problem in distributed interference orthogonal frequency-division multiple-access (OFDMA) systems under maximal power constraints. As next-generation wireless networks become increasingly complex and heterogeneous, optimizing system performance metrics while guaranteeing user service requests becomes challenging. Traditional approaches for these non-convex problems are computationally expensive. This paper explores a DQL-based approach to optimize transmit power control for users in multi-cell interference networks, aiming to maximize overall system throughput while meeting maximum power and signal-to-interference-plus-noise ratio (SINR) constraints. The problem is formulated as a non-cooperative game, where base stations (BSs) compete to improve their utility functions while ensuring quality of service (QoS) requirements. Numerical simulations show that the proposed DQL-based scheme outperforms traditional solutions, effectively maximizing system throughput while satisfying power and spectral efficiency requirements.
The next paper of the Special Issue, contribution 6, continues the exploration of IRSs discussed in contribution 2, which combined RISs and UAVs to enhance secure communication. Contribution 6 focuses on the optimal deployment of an IRS element in a line-of-sight domain (LoSD) based on a realistic deployment scenario, which jointly considers the path loss, transmit power, and energy efficiency of the system. Furthermore, the authors aim to minimize the transmit power via jointly optimizing its transmit beamforming and the reflect phase shifts of the IRS subject to the quality-of-service (QoS) constraint, namely, the signal-to-noise ratio (SNR) constraint at the user. However, their optimization problem is non-convex with intricately coupled variables. To tackle this challenge, they apply proper transformations on the QoS constraint and then propose an efficient alternating optimization (AO) algorithm. The simulation results demonstrate that compared to a conventional endpoint deployment strategy that simply deploys an IRS at the transceiver ends, their proposed LoSD deployment strategy significantly reduces the transmit power by optimizing the available LoS links when a single IRS is relayed.
Finally, like contribution 5, contribution 7 of this Special Issue focuses on novel AI applications in wireless systems, studying secure communication design [21]. The communication reliability of wireless communication systems is threatened by malicious jammers. Aiming at the problem of reliable communication under malicious jamming, a large number of schemes have been proposed to mitigate the effects of malicious jamming by avoiding the blocking interference of jammers. However, existing anti-jamming schemes, such as DQNs, use a limited amount of historical data. In view of this, contribution 7 proposes anti-jamming communication using imitation learning. Specifically, the authors propose an algorithm that consists of three steps: First, the heuristic-based expert trajectory generation algorithm is proposed as the expert strategy, which enables the obtention of the expert trajectory from historical samples. The trajectory mentioned in this algorithm represents the sequence of actions undertaken by the expert in various situations. Then, the authors obtain a user strategy by imitating the expert strategy using an imitation learning neural network. Finally, they adopt a functional user strategy for efficient and sequential anti-jamming decisions. The simulation results indicate that the proposed method outperforms DQN-based anti-jamming methods and provides robustness against channel fading, noise, and different jamming patterns.

3. Conclusions

This Special Issue presents seven contributions covering a wide range of emerging areas in wireless communications. Current trends indicate that multiple-antenna communications, such as those using continuous reflecting surfaces, along with full-duplex concepts, will remain dominant research directions for next-generation systems. It is also evident that machine learning or “AI for Wireless” methodologies are becoming increasingly common for optimizing wireless communication systems. This shows that AI technologies can potentially become more important in shaping the future of wireless networks.

Funding

This work was supported in part by the National Science Foundation (NSF) under Grant CNS-2148182.

Conflicts of Interest

The author declares no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

List of Contributions

  • Ye, H.; Chen, Z.; Jia, Y.; Chen, S. The Optimal Power Allocation for Sum Rate and Energy Efficiency of Full-Duplex Two-Way Communication Network. Entropy 2022, 24, 537. https://doi.org/10.3390/e24040537.
  • Cheng, T.; Wang, B.; Wang, Z.; Cao, K.; Dong, R.; Weng, J. Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems. Entropy 2022, 24, 1605. https://doi.org/10.3390/e24111605.
  • Chen, D.; Jiang, E. Joint Power and Time Allocation in Hybrid NoMA/OMA IoT Networks for Two-Way Communications. Entropy 2022, 24, 1756. https://doi.org/10.3390/e24121756.
  • Cui, H.; Niu, K.; Zhong, S. Intelligent Path-Selection-Aided Decoding of Polar Codes. Entropy 2023, 25, 200. https://doi.org/10.3390/e25020200.
  • Tefera, M.; Zhang, S.; Jin, Z. Deep Reinforcement Learning-Assisted Optimization for Resource Allocation in Downlink OFDMA Cooperative Systems. Entropy 2023, 25, 413. https://doi.org/10.3390/e25030413.
  • Zhao, K.; Song, Z.; Xiong, J. Optimal Deployment Strategy for Reconfigurable Intelligent Surface under LoSD via Joint Active and Passive Beamforming. Entropy 2023, 25, 1073. https://doi.org/10.3390/e25071073.
  • Zhou, Z.; Niu, Y.; Wan, B.; Zhou, W. Anti-Jamming Communication Using Imitation Learning. Entropy 2023, 25, 1547. https://doi.org/10.3390/e25111547.

References

  1. Li, B.; Fei, Z.; Zhang, Y. UAV communications for 5G and beyond: Recent advances and future trends. IEEE Internet Things J. 2018, 6, 2241–2263. [Google Scholar] [CrossRef]
  2. Shabanighazikelayeh, M.; Koyuncu, E. Optimal placement of UAVs for minimum outage probability. IEEE Trans. Veh. Technol. 2022, 71, 9558–9570. [Google Scholar] [CrossRef]
  3. Kua, J.; Loke, S.W.; Arora, C.; Fernando, N.; Ranaweera, C. Internet of things in space: A review of opportunities and challenges from satellite-aided computing to digitally-enhanced space living. Sensors 2021, 21, 8117. [Google Scholar] [CrossRef]
  4. O’Hara, J.F.; Ekin, S.; Choi, W.; Song, I. A perspective on terahertz next-generation wireless communications. Technologies 2019, 7, 43. [Google Scholar] [CrossRef]
  5. Lu, L.; Li, G.Y.; Swindlehurst, A.L.; Ashikhmin, A.; Zhang, R. An overview of massive MIMO: Benefits and challenges. IEEE J. Sel. Top. Signal Process. 2014, 8, 742–758. [Google Scholar] [CrossRef]
  6. Koyuncu, E. Performance gains of optimal antenna deployment in massive MIMO systems. IEEE Trans. Wirel. Commun. 2018, 17, 2633–2644. [Google Scholar] [CrossRef]
  7. Weinberger, K.; Ahmad, A.A.; Sezgin, A.; Zappone, A. Synergistic benefits in IRS-and RS-enabled C-RAN with energy-efficient clustering. IEEE Trans. Wirel. Commun. 2022, 21, 8459–8475. [Google Scholar] [CrossRef]
  8. Loureiro, P.A.; Guiomar, F.P.; Monteiro, P.P. Visible Light Communications: A Survey on Recent High-Capacity Demonstrations and Digital Modulation Techniques. Photonics 2023, 10, 993. [Google Scholar] [CrossRef]
  9. Zuo, Y.; Guo, J.; Gao, N.; Zhu, Y.; Jin, S.; Li, X. A survey of blockchain and artificial intelligence for 6G wireless communications. IEEE Commun. Surv. Tutorials 2023, 25, 2494–2528. [Google Scholar] [CrossRef]
  10. Hasan, S.R.; Chowdhury, M.Z.; Saiam, M.; Jang, Y.M. Quantum communication systems: Vision, protocols, applications, and challenges. IEEE Access 2023, 11, 15855–15877. [Google Scholar] [CrossRef]
  11. Ismail, S.; Dawoud, D.W.; Reza, H. Securing wireless sensor networks using machine learning and blockchain: A review. Future Internet 2023, 15, 200. [Google Scholar] [CrossRef]
  12. Shi, Y.; Lian, L.; Shi, Y.; Wang, Z.; Zhou, Y.; Fu, L.; Bai, L.; Zhang, J.; Zhang, W. Machine learning for large-scale optimization in 6g wireless networks. IEEE Commun. Surv. Tutorials 2023, 25, 2088–2132. [Google Scholar] [CrossRef]
  13. Miao, R.; Koyuncu, E. Federated Momentum Contrastive Clustering. ACM Trans. Intell. Syst. Technol. 2024; accepted. [Google Scholar] [CrossRef]
  14. Lin, S.; Shi, M.; Arora, A.; Bassily, R.; Bertino, E.; Caramanis, C.; Chowdhury, K.; Ekici, E.; Eryilmaz, A.; Ioannidis, S.; et al. Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks. In Proceedings of the 2022 IEEE 8th International Conference on Collaboration and Internet Computing (CIC), Atlanta, GA, USA, 14–16 December 2022; pp. 16–25. [Google Scholar] [CrossRef]
  15. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  16. Goldsmith, A. Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  17. Sabharwal, A.; Schniter, P.; Guo, D.; Bliss, D.W.; Rangarajan, S.; Wichman, R. In-band full-duplex wireless: Challenges and opportunities. IEEE J. Sel. Areas Commun. 2014, 32, 1637–1652. [Google Scholar] [CrossRef]
  18. Zhang, Z.; Long, K.; Vasilakos, A.V.; Hanzo, L. Full-duplex wireless communications: Challenges, solutions, and future research directions. Proc. IEEE 2016, 104, 1369–1409. [Google Scholar] [CrossRef]
  19. Jiang, L.; Jafarkhani, H. Reconfigurable intelligent surface assisted mmwave UAV wireless cellular networks. In Proceedings of the ICC 2021-IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar]
  20. Arikan, E. Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theory 2009, 55, 3051–3073. [Google Scholar] [CrossRef]
  21. Bai, L.; Zhu, L.; Liu, J.; Choi, J.; Zhang, W. Physical layer authentication in wireless communication networks: A survey. J. Commun. Inf. Netw. 2020, 5, 237–264. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Koyuncu, E. Information Theory in Emerging Wireless Communication Systems and Networks. Entropy 2024, 26, 543. https://doi.org/10.3390/e26070543

AMA Style

Koyuncu E. Information Theory in Emerging Wireless Communication Systems and Networks. Entropy. 2024; 26(7):543. https://doi.org/10.3390/e26070543

Chicago/Turabian Style

Koyuncu, Erdem. 2024. "Information Theory in Emerging Wireless Communication Systems and Networks" Entropy 26, no. 7: 543. https://doi.org/10.3390/e26070543

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop