Covert communication can prevent the opponent from knowing that a wireless communication has occurred. In the additive white Gaussian noise channels, if we only take the ambient noise into account, a square root law was obtained and the result shows that Alice can reliably and covertly transmit $\mathcal{O}(\sqrt{n})$ bits to Bob in $n$ channel uses. If additional "friendly" node closest to the adversary can produce artificial noise to aid in hiding the communication, the covert throughput can be improved. In this paper, we consider the covert communication in noisy wireless networks, where potential transmitters form a stationary Poisson point process. Alice wishes to communicate covertly to Bob without being detected by the warden Willie. In this scenario, Bob and Willie not only experience the ambient noise, but also the aggregated interference simultaneously. Although the random interference sources are not in collusion with Alice and Bob, our results show that uncertainty in noise and interference experienced by Willie is beneficial to Alice. When the distance between Alice and Willie $d_{a,w}=\omega(n^{\delta/4})$ ($\delta=2/\alpha$ is stability exponent), Alice can reliably and covertly transmit $\mathcal{O}(\log_2\sqrt{n})$ bits to Bob in $n$ channel uses, and there is no limitation on the transmit power of transmitters. Although the covert throughout is lower than the square root law and the friendly jamming scheme, the spatial throughout of the network is higher, and Alice does not presuppose to know the location of Willie. From the network perspective, the communications are hidden in the noisy wireless networks, and what Willie sees is merely a "\emphshadow" wireless network where he knows for certain some nodes are transmitting, but he cannot catch anyone red-handed.

We consider a wireless network in which $K$ transmitters, each equipped with a single antenna, fully cooperate to serve $K$ single antenna receivers, each equipped with a cache memory. The transmitters have access to partial knowledge of the channel state information. For a symmetric setting, in terms of channel strength levels, partial channel knowledge levels and cache sizes, we characterize the generalized degrees of freedom (GDoF) up to a constant multiplicative factor. The achievability scheme exploits the interplay between spatial multiplexing gains and coded-multicasting gain. On the other hand, a cut-set argument in conjunction with a new application of the aligned image sets approach are used to derive the outer bound. We further show that the characterized order-optimal GDoF is also attained in a decentralized setting, where no coordination is required for content placement in the caches.

An important ingredient of the future 5G systems will be Ultra-Reliable Low-Latency Communication (URLLC). A way to offer URLLC without intervention in the baseband/PHY layer design is to use \emphinterface diversity and integrate multiple communication interfaces, each interface based on a different technology. Our approach is to use coding to seamlessly distribute coded payload and redundancy data across multiple available communication interfaces. We formulate an optimization problem to find the payload allocation weights that maximize the reliability at specific target latency values. By considering different scenarios, we find that optimized strategies can significantly outperform $k$-out-of-$n$ strategies, where the latter do not account for the characteristics of the different interfaces. Our approach is supported by experimental results.

We present two new nonlinearity tolerant modulation formats at spectral efficiencies lower than 4bits/4D-symbol, obtained using a simplified bit-to-symbol mapping approach to set-partition PDM-QPSK in 8 dimensions.

We consider a two-way updating system with a master node and a slave node. In each block, the master node transfers energy and updates to the slave node alternatively. The slave node performs transmission to the master node if it has sufficient energy for current block, i.e., using best-effort policy. Moreover, the slave node generates a new update immediately after the completion of previous update. We examine the freshness of the updates received by the master node in terms of \textitage of information (AoI), which is defined as the time elapsed after the generation of the latest received update. We derive average uplink AoI and uplink update rate as functions of downlink update rate in closed form. The obtained results illustrate the performance limit of the unilaterally powered two-way updating system in terms of timeliness and efficiency. The results also specify the achievable tradeoff between the update rates of the two-way updating system.

Wireless fading channels suffer from both channel fadings and Additive White Gaussian Noise (AWGN). As a result, it is impossible for fading channels to support a constant rate data stream without using buffers. In this paper, we consider information transmission over an infinite-buffer-aided block Rayleigh fading channel in the low signal-to-noise ratio (SNR) regime. We characterize the transmission capability of the channel in terms of stationary queue length distribution, packet delay, as well as data rate. Based on the memoryless property of the service provided by the channel in each block, we formulate the transmission process as a discrete time discrete state $D/G/1$ queueing problem. The obtained results provide a full characterization of block Rayleigh fading channels and can be extended to the finite-buffer-aided transmissions.

In this letter, we propose an enhanced Access Reservation Protocol (ARP) with a partial preamble transmission (PPT) mechanism for the narrow band Internet of Things (NB-IoT) systems. The proposed ARP can enhance the ARP performance by mitigating the occurrence of preamble collisions, while being compatible with the conventional NB-IoT ARP. We provide an analytical model that captures the performance of the proposed ARP in terms of false alarm, mis-detection and collision probabilities. Moreover, we investigate a trade-off between the mis-detection and the collision probabilities, and optimize the proposed ARP according to the system loads. The results show that the proposed ARP outperforms the conventional NB-IoT ARP, in particular at heavier system loads.

Secure and reliable transmission over communication channels is first characterized by Wyner's wiretap channel (WTC) model. In recent years, the WTC with noiseless feedback (WTC-NF) attracts a lot attention, and it has been shown that the legal receiver's feedback enlarges the secrecy capacity of the WTC. Even so, the current feedback strategy for the WTC mainly focuses on generating key used for encrypting the transmitted message, and this strategy does not achieve the secrecy capacity of the WTC-NF. In this paper, a new coding strategy for the WTC-NF is presented. Besides used for generating key, the legal receiver's feedback of this new strategy is also used to produced a help information which helps the legal receiver to ameliorate his decoding performance. For the WTC-NF, the proposed new feedback strategy is shown to be better than the already existing one, and a binary example is given to further explain these results.