471 research outputs found
Sum Rate and Fairness Analysis for the MU-MIMO Downlink under PSK Signalling: Interference Suppression vs Exploitation
In this paper, we analyze the sum rate performance of multi-user
multiple-input multiple-output (MU-MIMO) systems, with a finite constellation
phase-shift keying (PSK) input alphabet. We analytically calculate and compare
the achievable sum rate in three downlink transmission scenarios: 1) without
precoding, 2) with zero forcing (ZF) precoding 3) with closed form constructive
interference (CI) precoding technique. In light of this, new analytical
expressions for the average sum rate are derived in the three cases, and Monte
Carlo simulations are provided throughout to validate the analysis.
Furthermore, based on the derived expressions, a power allocation scheme that
can ensure fairness among the users is also proposed. The results in this work
demonstrate that, the CI strictly outperforms the other two schemes, and the
performance gap between the considered schemes increases with increase in the
MIMO size. In addition, the CI provides higher fairness and the power
allocation algorithm proposed in this paper can achieve maximum fairness index
The Distributed MIMO Scenario: Can Ideal ADCs Be Replaced by Low-resolution ADCs?
This letter considers the architecture of distributed antenna system, which
is made up of a massive number of single-antenna remote radio heads (RRHs),
some with full-resolution but others with low-resolution analog-to-digital
converter (ADC) receivers. This architecture is greatly motivated by its high
energy efficiency and low-cost implementation. We derive the worst-case uplink
spectral efficiency (SE) of the system assuming a frequency-flat channel and
maximum-ratio combining (MRC), and reveal that the SE increases as the number
of quantization bits for the low-resolution ADCs increases, and the SE
converges as the number of RRHs with low-resolution ADCs grows. Our results
furthermore demonstrate that a great improvement can be obtained by adding a
majority of RRHs with low-resolution ADC receivers, if sufficient quantization
precision and an acceptable proportion of high-to-low resolution RRHs are used.Comment: 4 pages, to be published in IEEE Wireless Communications Letter
Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
In this paper, we propose a two-way secure communication scheme where two
transceivers exchange confidential messages via a wireless powered untrusted
amplify-and-forward (AF) relay in the presence of an external jammer. We take
into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ)
scenarios. Based on the time switching (TS) architecture at the relay, the data
transmission is done in three phases. In the first phase, both the
energy-starved nodes, the untrustworthy relay and the jammer, are charged by
non-information radio frequency (RF) signals from the sources. In the second
phase, the two sources send their information signals and concurrently, the
jammer transmits artificial noise to confuse the curious relay. Finally, the
third phase is dedicated to forward a scaled version of the received signal
from the relay to the sources. For the proposed secure transmission schemes, we
derive new closed-form lower-bound expressions for the ergodic secrecy sum rate
(ESSR) in the high signal-to-noise ratio (SNR) regime. We further analyze the
asymptotic ESSR to determine the key parameters; the high SNR slope and the
high SNR power offset of the jamming based scenarios. To highlight the
performance advantage of the proposed FJ, we also examine the scenario of
without jamming (WoJ). Finally, numerical examples and discussions are provided
to acquire some engineering insights, and to demonstrate the impacts of
different system parameters on the secrecy performance of the considered
communication scenarios. The numerical results illustrate that the proposed FJ
significantly outperforms the traditional one-way communication and the
Constellation rotation approach, as well as our proposed benchmarks, the
two-way WoJ and GNJ scenarios.Comment: 14 pages, 6 figures, Submitted to IEEE Transactions on Vehicular
Technolog
Secure Full-Duplex Device-to-Device Communication
This paper considers full-duplex (FD) device-to-device (D2D) communications
in a downlink MISO cellular system in the presence of multiple eavesdroppers.
The D2D pair communicate sharing the same frequency band allocated to the
cellular users (CUs). Since the D2D users share the same frequency as the CUs,
both the base station (BS) and D2D transmissions interfere each other. In
addition, due to limited processing capability, D2D users are susceptible to
external attacks. Our aim is to design optimal beamforming and power control
mechanism to guarantee secure communication while delivering the required
quality-of-service (QoS) for the D2D link. In order to improve security,
artificial noise (AN) is transmitted by the BS. We design robust beamforming
for secure message as well as the AN in the worst-case sense for minimizing
total transmit power with imperfect channel state information (CSI) of all
links available at the BS. The problem is strictly non-convex with infinitely
many constraints. By discovering the hidden convexity of the problem, we derive
a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201
- …