Figures
Abstract
Coverage and capacity are optimized in fifth generation (5G) networks by small base station (SBS) distribution in the coverage realm of macro base station (MBS). However, system performance is significantly reduced by inter-cell interference (ICI) because of the orthogonal frequency division multiple access assumption. In addition to ICI, this work considers intentional jammers’ interference (IJI) due to the presence of jammers. These Jammers try to inject undesirable energies into the legitimate communication band, which significantly degrade uplink (UL) signal-to-interference ratio (SIR). To reduce ICI and IJI, in this work, we employ SBS muting, where the SBSs near MBS are switched off. To further mitigate ICI and IJI, we use one of the effective interference management schemes a.k.a reverse frequency allocation (RFA). We presume that due to mitigation in ICI and IJI, the UL coverage performance of the proposed network model can be further improved.
Citation: Ghonaim SM, Khan S, Althobiani F, Alghaffari S, Khan S, Irfan M, et al. (2023) Interference mitigation in intentional jammers aided non-uniform heterogeneous cellular networks. PLoS ONE 18(6): e0287709. https://doi.org/10.1371/journal.pone.0287709
Editor: Khalid Taher Mohammed Al-Hussaini, Thamar University: Dhamar University, YEMEN
Received: April 6, 2023; Accepted: June 9, 2023; Published: June 28, 2023
Copyright: © 2023 Ghonaim et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the paper.
Funding: This research work was funded by Institutional Fund Projects under grant no. (G:138-980-1443). Therefore, authors gratefully acknowledge the technical and financial support from the Ministry of Education and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
1.1 Motivation
Heterogeneous cellular networks (HetNets) is a promising candidate technology for the future fifth generation (5G) networks [1–3]. The world wireless research forum predicts high speed connectivity for trillion of devices in the near future [4]. 5G networks can achieve capacity of 100 Gbps with improved battery life, higher coverage, and enhanced user accommodation [5, 6]. HetNets are made up of tiny, small base stations (SBS) coupled with high-power macro base stations (MBS) from a homogeneous cellular network [2, 7]. The deployment of such base stations (BSs) enhances network scalability [8, 9].
Intra-cell interference(ICI) is still the key limiting factor in HetNets despite the adoption of orthogonal frequency division multiple access (OFDMA), which results in minimal intra-cell interference [10, 11].
The functioning of the HetNet network can be negatively impacted by severe intentional jammers’ interference (IJI) caused by jammers’ presence [12–14]. The location of base stations transmit power, and other network parameters are all presumptively known to such jammers [13]. Therefore, by introducing undesired energy in the appropriate communication range, they can significantly degrade the uplink (UL) signal-to-interference ratio (SIR) [13]. Due to (i) decreased MBS-edge user (M-EU) power transmission in UL, (ii) greater M-EU user distances, and (iii) a higher path-loss exponent, IJI is effective in UL [14, 15].
SBS muting is taken into consideration in HetNets because I a user receives more coverage close to the MBS [5] and (ii) a higher MBS transmit power causes significant co-tier interference [16]. Due to less SBS deployment, SBS muting results in lower ICI and IJI, which enhances network coverage [17].
We refer to SBS muting by non-uniform HetNets (NUHs) and without SBS muting by uniform HetNets (UHs) in the remaining sections of the work. Different interference mitigation strategies, including reverse frequency allocation (RFA) [18], cell range extension (CRE)(CRE) [19], and fractional frequency reuse (FFR) [20], are used in the state-of-the-art. RFA is regarded as one of these plans’ proactive and effective interference mitigation strategies [18, 21].
Different key 5G technologies with their applications are presented in [22, 23]. Latest work on HetNets along with emerging technologies, such as (i) non-orthogonal multiple access (NOMA), (ii) massive multiple input multiple outputs (massive MIMO), and (iii) millimeter wave can be found in [24–26].
The works in [27, 28] evaluate both intra-cell interference and ICI in 5G networks. The authors used inter-cell interference coordination (ICIC) technique to mitigate the interference. Through results, it is shown that ICIC leads to improved network performance results. Similarly, in [29], the authors investigate the inter-block interference (IBI) and ICI in HetNets. They propose a novel precoding scheme to reduce ICI and IJI in HetNets.
Their proposed model leads to significant performance superiority due to lower IJI and ICI. The above-mentioned work, however, lacks to investigate both SBS muting and RFA scheme.
The work in [30] study the security aspects of 5G networks focusing on various types of attacks and security services. Moreover, security concerns are evaluated for different 5G technologies, such as software-defined networks, device-to-device communications, heterogeneous networks, massive MIMO, and the Internet of things. Moreover, attacks on 5G networks including traffic analysis, eavesdropping, denial of service, distributed denial of service, and jamming are investigated. The study in [31], provides an in-depth analysis of different jamming and anti-jamming techniques in 5G networks. Similarly, the works in [32] investigate the spoofing and jamming of the physical downlink and UL control channels and signals in 5G networks. Moreover, they employ various jamming methods to evaluate network immunity against jamming. They conclude that effective measures are needed to mitigate jamming in 5G networks. In contrast to our work, [30–32] lacks the employment of RFA and SBS muting to reduce ICI and IJI.
In [33], the authors employ NOMA enabled NUH, where SBSs are distributed with different densities in various regions. Through results, they demonstrate that NOMA-enabled NUH outperforms all other scenarios in terms of energy efficiency. Similarly, the works in [34, 35] explore the employment of NUHs. Their results indicate significant performance improvement due to lower interference achieved by SBS muting in HetNets. However, the latest work of [33–35] lacks to analyze IJI in HetNets.
The latest work on RFA employment can be found in [17, 21, 36], where RFA scheme leads to better coverage and rate due to effective mitigation of interference. However, they lack to investigate both NUH and intentional jammers in HetNets.
In this work, we look into HetNets’ performance in terms of coverage when there is IJI and ICI. To alleviate the impact of ICI and IJI we use SBS muting as well as RFA as a preventive measure for interference mitigation.
1.2 Approach and contributions
The paper uses two layers of BS, known as MBSs and SBSs, to illustrate a model based on HetNets. IJI attacks frequently result in additional UL intersections in addition to the typical ICI. Thus, the system as a whole is considered degenerative. In Fig 1A and 1B. the network models are displayed. The MBS service area is divided into two sections: the inner zone, designated A1, and the edge region, designated A2, with radii Δs1 and Δs2, accordingly [37, 38].
A: Uniform HetNets. B: Non-uniform HetNets. C: Legends.
The significance of this work from the state-of-the-art can be summarized as follow.
- The work in [27–29] evaluates both intra-cell interference and ICI in 5G networks. However, they lack to investigate IJI.
- In contrast to our work, [30–32] lacks the employment of RFA and SBS muting to reduce ICI and IJI.
- The latest work of [33–35] evaluates NUHs but lacks to analyse IJI in HetNets.
- The latest work on RFA employment can be found in [17, 21, 36]. However, they lack to investigate both NUH and IJI in HetNets.
The following are this paper’s significant contributions.
- Analysis of the UL coverage for the typical user which is defined as Slivnyak theorem states that the statistical characteristics of an independent homogeneous Poission Point Process (IHPPP) are preserved and simplified by a typical user at origin [39, 40].,
, in A2 when IJI and ICI are present.
- This study examines how proactive interference control strategies can reduce IJI and ICI. RFA and the use of NUHs, a smart network design technique.
- For (i) UHs with RFA employment (see (10)) and (ii) NUHs with RFA employment (see (11)), we develop coverage probability expressions.
- The outcomes are presented for various network characteristics, including SIR threshold, jammers’ density and transmitted power, users’ transmit power and density of SBS.
1.3 Paper organization
The remainder of the paper is laid out as follows. The system model is presented in Section 2. The suggested model’s coverage probabilities are calculated in Section 3. Section 4 contains the results and commentary. The paper is finished in Section 5. Table 1 showcases a qualitative tabulation of various references that carried work based on our proposed work that needs improvements while, Table 2 contains an index of the notations made in the article. And finally, Table 3 has the system parameters defined.
2 System model
This section presents the suggested network design as shown in Fig 1A and 1B. Due to multi-tier BSs deployment and the existence of intentional jammers the network performance degrades severely due to ICI and IJI. UL communication of M-EUs in HetNets are susceptible to IJI and ICI because of lower UL transmit power and longer transmission distances between MBS and M-EUs. Moreover, we incorporate RFA in NUH with non uniform BSs deployment to mitigate both ICI and IJI and thus, enhance UL performance of M-EUs. Preliminary mathematical results obtained in this section are used for coverage probability assessment in Section 3.
2.1 Network layoutS
In this paper, we consider two-tier HetNet comprising of co-deployed SBS’s with MBS’s. We suppose that there exist intentional jammers throughout the network which degrade the desired communication link. MBS’s, SBS’s, users, and jammers are distributed via IHPPPs ϕM, ϕS, ϕu, and ϕJ, respectively [17]. The density of MBSs, SBSs, users, and jammers is ζM, ζS, ζu, and ζJ, respectively. The proposed network models are presented in Fig 1A and 1B [17, 18, 33]. We assume that the UL communication of M-EUs are stressed by IJI and ICI. This work assumes NUHs with RFA in contrast to UHs with RFA to reduce ICI and IJI. Moreover, we investigate the UL coverage performance of located in A2. The path loss exponent is denoted by α [41, 42]. The Rayleigh fading gain, i.e., |h|2 ∼ exp(1) [17, 40] is represented by |h|. For RFA and NUH employment, we divide the MBS coverage region in to A1 and A2 with radii Δs1 and Δs2, respectively [37, 43].
2.2 Jamming mechanism
Jammers are considered to transmits unwanted energy across the entire spectrum of the communication system to reduce network performance [37, 38, 44]. This work assumes that the jammers are located uniformly in the coverage vicinity of MBS which are distributed according to IHPPP [35, 45]. The UL communications of M-EUs in HetNet is significantly degraded by ICI and IJI [39]. Due to power constraints, jammers in lower density or located at far distance merely cause any harm to the communication system [15]. Therefore, such low power jammers to be effective, they must be well tuned and need to be located near the target [45, 46]. Moreover, in worst case scenario, jammers block the UL communication in HetNets and, thus, cause the distributed denial of service (DDoS) attacks [39, 45].
2.3 Reverse frequency allocation
Due to efficient interference mitigation, RFA-based resource partitioning significantly improves coverage [39]. By using RFA, the entire spectrum is left open for an SBS to use in the opposite direction and in non-overlapping regions [18, 39]. Various sub-bands are used interchangeably among SBSs and MBSs while following RFA as ∀ g ∈ (1, 2) and l ∈ (M, S) used alternatively. Fig 2 showcases this scenario. M stands for MBS, while S stands for SBS.
In-accordance with RFA, total alloted frequency band, F, is further divided into sub-bands with different frequencies, i.e., F1 and F2, such that F = ⋃z∈(1,2) Fz, as shown in Fig 2. Whereas, these sub-bands F1 and F2 of MBS is used for UL and DL communication in outer area macro cell () and inner area of macro cell (
), respectively. For the UL and DL communication, these sub-bands are further split into UL and DL sub-carriers which are modeled as F1 = F1,UL+ F1,DL and F2 = F2,UL+ F2,DL, respectively. Similar to F1 and F2, as sub-band frequencies of MBS, the sub-bands for SBSs are
and
, respectively, which are reversely used in the corresponding regions reciprocally, i.e., outer region of SBS,
, and center region of SBS,
, respectively. These sub-bands of SBSs i.e.,
and
, are further cut-up into sub-carriers of UL and DL denoted respectively as
and
for notation clarity.
3 Coverage probability
This section focus on the assessment of coverage probability in the proposed network scenarios where ν is assumed to be located in A2 and in A1; (i) uplink coverage probability for uniform HetNets (UHs’) is presented in Subsection 3.1 while (ii) the uplink coverage probability in case of non-uniform HetNets (NUHs’) is derived in Subsection 3.2.
3.1 Uplink coverage probability for uniform HetNets (UHs)
The UL coverage probability when there are intentional jammers (IJs) and RFA, , while considering ν in A2 can be obtained as:
(1)
Following the architecture of RFA, the total interference in UL is the addition of the UL interference from MBSs in A2, i.e., , the DL interference from SBSs in A1, i.e.,
, and the interference from IJs, i.e., IJ,A. Therefore,
from (1) can be written as:
(2)
Eq (2) can be expanded as:
(3)
In (3), is the ν UL transmission power connected with MBS,
is the transmission power of SBS, and Pt,j is the emitting power of jammers. Moreover, substituting (2) into (1), we obtain
as:
(4)
Here, Step (1) follows from the coverage probability definition [17, 40]. Step (2) follows from Step (1) by using the void property of IHPPPs [40]. Similarly, Step (3) is obtained by replacing by s, where
. In addition, Stage (4) is obtained by the use of the exponential property of additions in products i.e., exp(a + b) = exp(a) × exp(b).
The Laplace transform (LT) of interference in UL from MBSs in A2, i.e., , is obtained as:
(5)
Here, Step (a) follows the definition of LT [40], Step (b) is achieved by substituting , into Step (a), Step (c) is achieved by replacing s, s.t.,
, into Step (b), Step (e) is followed by evaluating the LT of Step (d) with respect to hj, Step (f), is followed by considering probability generating functional (PGFL) of IHPPP [47], Step (g) is achieved by replacing
into Step (f), and Step (h) is achieved from Gauss-hypergeometric approximation of Step (g) [47].
Similarly, the LT of the total UL interference received from the MBSs in A1, i.e., , is obtained as:
(6)
In addition, the LT of the DL interference from SBSs in A1, i.e., , can be written in a similar way as far (5), and is given as:
(7)
(8) η2 is the ratio of
and
where
is the DL transmit power of SBSs.
The UL coverage probability, , in the presence of ICI, IJI, and RFA employment while considering ν in A2 can be written as [17]
(9)
(10)
(11)
By substituting (6), (7), and (8) into (9), is expressed as (10).
3.2 Uplink coverage probability for non-uniform HetNets (NUHs’)
Non-uniform heterogeneous network deployment is established where SBS in A1 is muted and user in that vicinity is in coverage with MBS. The UL coverage probability, , while assuming IJs, RFA, and ν in A2 can be written as
(12)
By substituting (6) and (8) into (12), is expressed as (11). In (10) and (11),
indicates the Gauss-hypergeometric function.
4 Results and discussion
This section describes results for the user’s UL coverage probability while taking into consideration: (i) UL coverage probability of UH and (ii) UL coverage probability of NUH. MATLAB 2015a has been used in drawing our results. MBS, SBS, jammers and users are dispersed in A = π(500m)2, s.t., A = A1UA2. Transmitted power by MBS, SBS, jammers, and users are supposed to be 40 dBm, 30 dBm, 20 dBm, and 20 dBm, respectively. Various network parameters such as ζM, ζS, ζj, ΓM, Pt,J and are assumed for analyzing UL coverage when the user is located in A2.
Fig 3 compares UL coverage probability for different values of ΓM in A2. This figure assumes ζj = 0 and 100, for both UH and NUH network scenarios. This figure indicates that the simulation results will coincide with the numerical results both for UH and NUH. The plots in the figure further demonstrate that NUHs with ζj = 0 lead to the highest coverage gain as compared with the rest of the scenarios. This is due to improved interference mitigation by NUHs as a result of lower SBS deployment.
In Fig 4, we demonstrate UL coverage probability against different values of ΓM for both UH and NUH in A2. This figure is obtained for ζj = 0 and 100 and ζS/ζM = 30. This result demonstrates that NUH with RFA outperforms the other scenarios due to significant interference mitigation. At ΓM = −10dB, the proposed NUH with RFA and ζj = 0 leads to 20% UL coverage gain.
In Fig 5A and 5B, we compare UL coverage probability against different values of ΓM for UH and NUH, respectively. The plots in both the figures are obtained for ζj = 0, 100, 200, 300, 400, 500. Moreover, the results indicate that a sufficient number of IJs in the network are needed to significantly degrade UL coverage because of the wideband nature and low transmission power of IJs. Furthermore, increasing the value ζj leads to lower UL coverage in both UH and NUH due to higher interference. The results indicate significant coverage performance improvements by RFA and NUH due to effective interference mitigation.
A: UH B: NUH.
In Fig 6A and 6B, we evaluate UL coverage probability for different values of ζj, while considering RFA, UH, and NUH. The plots are obtained for ΓM = 0 dB, −5 dB, −10 dB, −15 dB, −20 dB, −25 dB and ζS/ζM = 30. The plots indicate that higher values of ΓM lead to lower coverage due to lower user association. Furthermore, the plots in both figures indicate that NUH gives rise to higher coverage in contrast to UH. By employing RFA, the network performance improves in both cases but due to less interference the coverage in NUH is better than UH.
A: UH B: NUH.
Similarly, Fig 7A and 7B demonstrate UL coverage performance against IJs distribution area for different values of ζj and ζS/ζM = 10.
A: UH B: NUH.
Both of these figures indicate that increasing IJs distribution area leads to improved coverage as the IJs become less effective. The figures further depict that at an area of 1 km2, NUH with RFA leads to 19% UL coverage improvement due to significant interference reduction.
Finally, Fig 8A and 8B show UL coverage probability against IJs distribution area for different values of ΓM. These figures consider ζj = 100 and ζS/ζM = 10. The results indicate that increase in the values of ΓM gives rise to lower coverage due to lower user connection. The figures also indicate that NUH with RFA and ΓM = -50 dB give rise to the highest coverage gain in contrast to the rest of the scenarios.
A: UH B: NUH.
5 Conclusion
This work aims to reduce ICI and IJI by employing SBS muting and RFA in HetNets. Various network parameters such as jammer’s density, jammers transmit power and their distribution area, SIR threshold are investigated against user coverage. The results are obtained for both UHs and NUHs in addition to and without RFA. The results depict that NUHs employing RFA outperform other scenarios in terms of UL coverage. Moreover, the investigation indicates 20% UL coverage improvement at ΓM = −10 dB while using RFA and NUHs as compared with RFA and UHs. This work can be extended to evaluate drone-based jammers in HetNets.
References
- 1. Ghosh SK, Ghosh SC. Performance analysis of dual connectivity in control/user-plane split heterogeneous networks. Computer Communications. 2020 Jan 1;149:370–81.
- 2. Fadoul MM. Rate and coverage analysis in multi-tier heterogeneous network using stochastic geometry approach. Ad Hoc Networks. 2020 Mar 1;98:102038.
- 3. Olfat E, Bengtsson M. A general framework for joint estimation-detection of channel, nonlinearity parameters and symbols for OFDM in IoT-based 5G networks. Signal Processing. 2020 Feb 1;167:107298.
- 4.
Bogale TE, Le LB. Massive MIMO and millimeter wave for 5G wireless HetNet: potentials and challenges. arXiv preprint arXiv:1510.06359. 2015 Oct 21.
- 5.
Ouali K, Kassar M, Nguyen TM, Sethom K, Kervella B. An efficient D2D handover management scheme for SDN-based 5G networks. In 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) 2020 Jan 10 (pp. 1–6). IEEE.
- 6. Qamar F, Hindia MN, Dimyati K, Noordin KA, Amiri IS. Interference management issues for the future 5G network: a review. Telecommunication Systems. 2019 Aug 15;71:627–43.
- 7.
Ramazanali H, Mesodiakaki A, Vinel A, Verikoukis C. Survey of user association in 5G HetNets. In 2016 8th IEEE Latin-American conference on communications (LATINCOM) 2016 Nov 15 (pp. 1–6). IEEE.
- 8.
Sada AS, Abdullahi ZM, Usman AD, Tekanyi AM, Mubarak AU, Maiwada YA. Modified Handover Decision Algorithm in Long Term Evolution Advanced Network. In 2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) 2019 Oct 14 (pp. 1–4). IEEE.
- 9. Dao NN, Park M, Kim J, Paek J, Cho S. Resource-aware relay selection for inter-cell interference avoidance in 5G heterogeneous network for Internet of Things systems. Future Generation Computer Systems. 2019 Apr 1;93:877–87.
- 10. Xu J, Lee SJ, Kang WS, Seo JS. Adaptive resource allocation for MIMO-OFDM based wireless multicast systems. IEEE Transactions on Broadcasting. 2010 Feb 5;56(1):98–102.
- 11.
IJEMARU GK, OLEKA EU, NGHARAMIKE ET, Njokuocha KI, UDUNWA AI. Inter-Cell Interference Mitigation Techniques in a Heterogeneous LTE-Advanced Access Network.
- 12. Tsiota A, Xenakis D, Passas N, Merakos L. On jamming and black hole attacks in heterogeneous wireless networks. IEEE Transactions on Vehicular Technology. 2019 Aug 29;68(11):10761–74.
- 13.
Arjoune Y, Faruque S. Smart jamming attacks in 5G new radio: A review. In2020 10th annual computing and communication workshop and conference (CCWC) 2020 Jan 6 (pp. 1010–1015). IEEE.
- 14.
Tian P, Tian H, Zhu J, Chen L, She X. An adaptive bias configuration strategy for range extension in LTE-advanced heterogeneous networks. InIET international conference on communication technology and application (ICCTA 2011) 2011 Oct 14 (pp. 336–340). IET.
- 15. Muhammad F, Haroon MS, Abbas ZH, Abbas G, Kim S. Uplink interference management for HetNets stressed by clustered wide-band jammers. IEEE access. 2019 Dec 17;7:182679–90.
- 16. Wu H, Wei Z, Hou Y, Zhang N, Tao X. Cell-edge user offloading via flying UAV in non-uniform heterogeneous cellular networks. IEEE Transactions on Wireless Communications. 2020 Jan 14;19(4):2411–26.
- 17. Haroon MS, Abbas ZH, Muhammad F, Abbas G. Analysis of coverage-oriented small base station deployment in heterogeneous cellular networks. Physical Communication. 2020 Feb 1;38:100908.
- 18. Haroon MS, Abbas ZH, Muhammad F, Abbas G. Coverage analysis of cell‐edge users in heterogeneous wireless networks using Stienen’s model and RFA scheme. International Journal of Communication Systems. 2020 Jul 10;33(10):e4147.
- 19. Kuribayashi HP, De Souza MA, Gomes DD, Silva KD, Da Silva MS, Costa JC, et al. Particle swarm-based cell range expansion for heterogeneous mobile networks. IEEE Access. 2020 Feb 24;8:37021–34.
- 20. Novlan TD, Ganti RK, Ghosh A, Andrews JG. Analytical evaluation of fractional frequency reuse for heterogeneous cellular networks. IEEE Transactions on Communications. 2012 Jun 18;60(7):2029–39.
- 21. Ijaz A, Hassan SA, Zaidi SA, Jayakody DN, Zaidi SM. Coverage and rate analysis for downlink HetNets using modified reverse frequency allocation scheme. IEEE access. 2017 Feb 17;5:2489–502.
- 22. Chih-Lin I, Han S, Xu Z, Sun Q, Pan Z. 5G: rethink mobile communications for 2020+. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences. 2016 Mar 6;374(2062):20140432. pmid:26809577
- 23. Bogale TE, Le LB. Massive MIMO and mmWave for 5G wireless HetNet: Potential benefits and challenges. IEEE Vehicular Technology Magazine. 2016 Feb 3;11(1):64–75.
- 24. Swami P, Bhatia V, Vuppala S, Ratnarajah T. User fairness in NOMA-HetNet using optimized power allocation and time slotting. IEEE Systems Journal. 2020 Mar 9;15(1):1005–14.
- 25. Liu W, Tian L, Sun JX. Interference alignment for MIMO downlink heterogeneous networks. IEEE Access. 2020 Feb 17;8:35090–104.
- 26. Chaieb C, Mlika Z, Abdelkefi F, Ajib W. On the optimization of user association and resource allocation in HetNets with mm-wave base stations. IEEE Systems Journal. 2020 Jun 16;14(3):3957–67.
- 27. Jazea NA, Kadim HA, Sallomi AH. Study and analysis of intra-cell interference and inter-cell interference for 5G network. Journal of Engineering and Sustainable Development. 2020 May 1;24(3):43–57.
- 28. Padmaloshani P, Nirmala S. Semi‐distributed dynamic inter‐cell interference coordination scheme for interference avoidance in heterogeneous networks. ETRI Journal. 2020 Apr;42(2):175–85.
- 29. Wang H, Song R, Leung SH. Removal of ICI and IBI in Wireless Heterogeneous Networks With Timing Misalignment. IEEE Communications Letters. 2017 Jan 16;21(5):1195–8.
- 30. Fang D, Qian Y, Hu RQ. Security for 5G mobile wireless networks. IEEE access. 2017 Dec 4;6:4850–74.
- 31.
Elmahi E, Salekzamankhani S, Sharma M. In-Depth Analysis of Signal Jammers’ and Anti-Jamming Effect on 5G Signal. In2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) 2019 Aug 26 (pp. 1–6). IEEE.
- 32.
Lichtman M, Rao R, Marojevic V, Reed J, Jover RP. 5G NR jamming, spoofing, and sniffing: Threat assessment and mitigation. In2018 IEEE international conference on communications workshops (ICC Workshops) 2018 May 20 (pp. 1–6). IEEE.
- 33. Han T, Gong J, Liu X, Islam SR, Li Q, Bai Z, et al. On downlink NOMA in heterogeneous networks with non-uniform small cell deployment. IEEE Access. 2018 Jun 8;6:31099–109.
- 34. Wen W, Cui Y, Zheng FC, Jin S, Jiang Y. Random caching based cooperative transmission in heterogeneous wireless networks. IEEE Transactions on Communications. 2018 Feb 20;66(7):2809–25.
- 35. Abbas ZH, Haroon MS, Abbas G, Muhammad F. SIR analysis for non-uniform HetNets with joint decoupled association and interference management. Computer Communications. 2020 Apr 1;155:48–57.
- 36. Peng J, Zeng J, Su X, Liu B, Zhao H. A QoS-based cross-tier cooperation resource allocation scheme over ultra-dense HetNets. IEEE Access. 2019 Feb 24;7:27086–96.
- 37. Abbas ZH, Abbas G, Haroon MS, Muhammad F. Analysis of interference management in heterogeneous cellular networks in the presence of wideband jammers. IEEE Communications Letters. 2020 Feb 3;24(5):1138–41.
- 38. Haroon MS, Abbas ZH, Abbas G, Muhammad F. Coverage analysis of ultra-dense heterogeneous cellular networks with interference management. Wireless Networks. 2020 Apr;26(3):2013–25.
- 39. Abbas ZH, Abbas G, Haroon MS, Muhammad F, Kim S. Proactive uplink interference mitigation in HetNets stressed by uniformly distributed wideband jammers. Electronics. 2019 Dec 7;8(12):1496.
- 40.
Błaszczyszyn B, Haenggi M, Keeler P, Mukherjee S. Stochastic geometry analysis of cellular networks. Cambridge University Press; 2018 Apr 19.
- 41. Muhammad F, Abbas ZH, Li FY. Cell association with load balancing in nonuniform heterogeneous cellular networks: Coverage probability and rate analysis. IEEE Transactions on Vehicular Technology. 2016 Sep 30;66(6):5241–55.
- 42.
Zou S, Liu N, Pan Z, You X. Joint power and resource allocation for non-uniform topologies in heterogeneous networks. In2016 IEEE 83rd Vehicular Technology Conference (VTC Spring) 2016 May 15 (pp. 1–5). IEEE.
- 43. Jiang X, Zheng B, Zhu WP, Wang L, Zou Y. Large system analysis of heterogeneous cellular networks with interference alignment. IEEE Access. 2018 Jan 30;6:8148–60.
- 44. Lichtman M, Poston JD, Amuru S, Shahriar C, Clancy TC, Buehrer RM, et al. A communications jamming taxonomy. IEEE Security & Privacy. 2016 Feb 3;14(1):47–54.
- 45. Qasim M, Haroon MS, Imran M, Muhammad F, Kim S. 5G cellular networks: Coverage analysis in the presence of inter-cell interference and intentional jammers. Electronics. 2020 Sep 20;9(9):1538.
- 46. Arif M, Wyne S, Navaie K, Haroon MS, Qureshi S. Clustered jamming in aerial HetNets with decoupled access. IEEE Access. 2020 Aug 4;8:142218–28.
- 47.
Hernandez-Aquino R, Zaidi SA, McLernon D, Ghogho M. Modelling and performance evaluation of non-uniform two-tier cellular networks through Stienen model. In2016 IEEE International Conference on Communications (ICC) 2016 May 22 (pp. 1–6). IEEE.
- 48. Abbas ZH, Haroon MS, Muhammad F, Abbas G, Li FY. Enabling soft frequency reuse and Stienen’s cell partition in two-tier heterogeneous networks: Cell deployment and coverage analysis. IEEE Transactions on Vehicular Technology. 2020 Dec 29;70(1):613–26.
- 49. Ullah A, Abbas ZH, Abbas G, Muhammad F, Jiao L. Performance analysis of user-centric SBS deployment with load balancing in heterogeneous cellular networks: A Thomas cluster process approach. Computer Networks. 2020 Apr 7;170:107120.