13,937 research outputs found

    Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback

    Full text link
    Channel state information (CSI) at the transmitter is of importance to the performance of physical layer security based on multi-antenna networks. Specifically, CSI is not only beneficial to improve the capacity of the legitimate channel, but also can be used to degrade the performance of the eavesdropper channel. Thus, the secrecy rate increases accordingly. This letter focuses on the quantitative analysis of the ergodic secrecy sum-rate in terms of feedback amount of the CSI from the legitimate users in multiuser multi-antenna downlink networks. Furthermore, the asymptotic characteristics of the ergodic secrecy sum-rate in two extreme cases is investigated in some detail. Finally, our theoretical claims are confirmed by the numerical results.Comment: 4 pages, 2 figures. In IEEE Wireless Communications Letters, 201

    Skyrmion dynamics in a chiral magnet driven by periodically varying spin currents

    Full text link
    In this work, we investigated the spin dynamics in a slab of chiral magnets induced by an alternating (ac) spin current. Periodic trajectories of the skyrmion in real space are discovered under the ac current as a result of the Magnus and viscous forces, which originate from the Gilbert damping, the spin transfer torque, and the β \beta -nonadiabatic torque effects. The results are obtained by numerically solving the Landau-Lifshitz-Gilbert equation and can be explained by the Thiele equation characterizing the skyrmion core motion

    Spatial Resource Allocation for Spectrum Reuse in Unlicensed LTE Systems

    Full text link
    In this paper, we study how to reuse the unlicensed spectrum in LTE-U systems while guaranteeing harmonious coexistence between the LTE-U and Wi-Fi systems. For a small cell with multiple antennas at the base station (SBS), some spatial degrees of freedom (DoFs) are used to serve small cell users (SUEs) while the rest are employed to mitigate the interference to the Wi-Fi users by applying zero-forcing beamforming (ZFBF). As a result, the LTE-U and Wi-Fi throughput can be balanced by carefully allocating the spatial DoFs. Due to the channel state information (CSI) estimation and feedback errors, ZFBF cannot eliminate the interference completely. We first analyze the residual interference among SUEs, called intra-RAT interference, and the interference to the Wi-Fi users, called inter-RAT interference after ZFBF, due to imperfect CSI. Based on the analysis, we derive the throughputs of the small cell and the Wi-Fi systems, respectively. Accordingly, a spatial DoF allocation scheme is proposed to balance the throughput between the small cell and the Wi-Fi systems. Our theoretical analysis and the proposed scheme are verified by simulation results

    Spatial Throughput Characterization in Cognitive Radio Networks with Threshold-Based Opportunistic Spectrum Access

    Full text link
    This paper studies the opportunistic spectrum access (OSA) of the secondary users in a large-scale overlay cognitive radio (CR) network. Two threshold-based OSA schemes, namely the primary receiver assisted (PRA) protocol and the primary transmitter assisted (PTA) protocol, are investigated. Under the PRA/PTA protocol, a secondary transmitter (ST) is allowed to access the spectrum only when the maximum signal power of the received beacons/pilots sent from the active primary receivers/transmitters (PRs/PTs) is lower than a certain threshold. To measure the resulting transmission opportunity for the secondary users by the proposed OSA protocols, the concept of spatial opportunity, which is defined as the probability that an arbitrary location in the primary network is detected as a spatial spectrum hole, is introduced and then evaluated by applying tools from stochastic geometry. Based on spatial opportunity, the coverage (non-outage transmission) performance in the overlay CR network is analyzed. With the obtained results of spatial opportunity and coverage probability, we finally characterize the spatial throughput, which is defined as the average spatial density of successful transmissions in the primary/secondary network, under the PRA and PTA protocols, respectively.Comment: Accepted by IEEE Journal on Selected Areas in Communications, Cognitive Radio Serie

    Throughput and Delay Scaling in Supportive Two-Tier Networks

    Full text link
    Consider a wireless network that has two tiers with different priorities: a primary tier vs. a secondary tier, which is an emerging network scenario with the advancement of cognitive radio technologies. The primary tier consists of randomly distributed legacy nodes of density nn, which have an absolute priority to access the spectrum. The secondary tier consists of randomly distributed cognitive nodes of density m=nβm=n^\beta with β2\beta\geq 2, which can only access the spectrum opportunistically to limit the interference to the primary tier. Based on the assumption that the secondary tier is allowed to route the packets for the primary tier, we investigate the throughput and delay scaling laws of the two tiers in the following two scenarios: i) the primary and secondary nodes are all static; ii) the primary nodes are static while the secondary nodes are mobile. With the proposed protocols for the two tiers, we show that the primary tier can achieve a per-node throughput scaling of λp(n)=Θ(1/logn)\lambda_p(n)=\Theta(1/\log n) in the above two scenarios. In the associated delay analysis for the first scenario, we show that the primary tier can achieve a delay scaling of Dp(n)=Θ(nβlognλp(n))D_p(n)=\Theta(\sqrt{n^\beta\log n}\lambda_p(n)) with λp(n)=O(1/logn)\lambda_p(n)=O(1/\log n). In the second scenario, with two mobility models considered for the secondary nodes: an i.i.d. mobility model and a random walk model, we show that the primary tier can achieve delay scaling laws of Θ(1)\Theta(1) and Θ(1/S)\Theta(1/S), respectively, where SS is the random walk step size. The throughput and delay scaling laws for the secondary tier are also established, which are the same as those for a stand-alone network.Comment: 13 pages, double-column, 6 figures, accepted for publication in JSAC 201
    corecore