70 research outputs found
A Systematic Approach for Interference Alignment in CSIT-less Relay-Aided X-Networks
The degrees of freedom (DoF) of an X-network with M transmit and N receive
nodes utilizing interference alignment with the support of relays each
equipped with antennas operating in a half-duplex non-regenerative mode
is investigated. Conditions on the feasibility of interference alignment are
derived using a proper transmit strategy and a structured approach based on a
Kronecker-product representation. The advantages of this approach are twofold:
First, it extends existing results on the achievable DoF to generalized antenna
configurations. Second, it unifies the analysis for time-varying and constant
channels and provides valuable insights and interconnections between the two
channel models. It turns out that a DoF of \nicefrac{NM}{M+N-1} is feasible
whenever the sum of the
Delivery Time Minimization in Edge Caching: Synergistic Benefits of Subspace Alignment and Zero Forcing
An emerging trend of next generation communication systems is to provide
network edges with additional capabilities such as additional storage resources
in the form of caches to reduce file delivery latency. To investigate this
aspect, we study the fundamental limits of a cache-aided wireless network
consisting of one central base station, transceivers and receivers from
a latency-centric perspective. We use the normalized delivery time (NDT) to
capture the per-bit latency for the worst-case file request pattern at high
signal-to-noise ratios (SNR), normalized with respect to a reference
interference-free system with unlimited transceiver cache capabilities. For
various special cases with and that satisfy , we establish the optimal tradeoff between cache storage and latency. This
is facilitated through establishing a novel converse (for arbitrary and
) and an achievability scheme on the NDT. Our achievability scheme is a
synergistic combination of multicasting, zero-forcing beamforming and
interference alignment.Comment: submitted to ICC 2018; fixed some typo
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
A Survey on Fundamental Limits of Integrated Sensing and Communication
The integrated sensing and communication (ISAC), in which the sensing and communication share the same frequency band and hardware, has emerged as a key technology in future wireless systems due to two main reasons. First, many important application scenarios in fifth generation (5G) and beyond, such as autonomous vehicles, Wi-Fi sensing and extended reality, requires both high-performance sensing and wireless communications. Second, with millimeter wave and massive multiple-input multiple-output (MIMO) technologies widely employed in 5G and beyond, the future communication signals tend to have high-resolution in both time and angular domain, opening up the possibility for ISAC. As such, ISAC has attracted tremendous research interest and attentions in both academia and industry. Early works on ISAC have been focused on the design, analysis and optimization of practical ISAC technologies for various ISAC systems. While this line of works are necessary, it is equally important to study the fundamental limits of ISAC in order to understand the gap between the current state-of-the-art technologies and the performance limits, and provide useful insights and guidance for the development of better ISAC technologies that can approach the performance limits. In this paper, we aim to provide a comprehensive survey for the current research progress on the fundamental limits of ISAC. Particularly, we first propose a systematic classification method for both traditional radio sensing (such as radar sensing and wireless localization) and ISAC so that they can be naturally incorporated into a unified framework. Then we summarize the major performance metrics and bounds used in sensing, communications and ISAC, respectively. After that, we present the current research progresses on fundamental limits of each class of the traditional sensing and ISAC systems. Finally, the open problems and future research directions are discussed
A Novel Transmission Scheme for the -user Broadcast Channel with Delayed CSIT
The state-dependent -user memoryless Broadcast Channel~(BC) with state
feedback is investigated. We propose a novel transmission scheme and derive its
corresponding achievable rate region, which, compared to some general schemes
that deal with feedback, has the advantage of being relatively simple and thus
is easy to evaluate. In particular, it is shown that the capacity region of the
symmetric erasure BC with an arbitrary input alphabet size is achievable with
the proposed scheme. For the fading Gaussian BC, we derive a symmetric
achievable rate as a function of the signal-to-noise ratio~(SNR) and a small
set of parameters. Besides achieving the optimal degrees of freedom at high
SNR, the proposed scheme is shown, through numerical results, to outperform
existing schemes from the literature in the finite SNR regime.Comment: 30 pages, 3 figures, submitted to IEEE Transactions on Wireless
Communications (revised version
D 3. 3 Final performance results and consolidated view on the most promising multi -node/multi -antenna transmission technologies
This document provides the most recent updates on the technical contributions and research
challenges focused in WP3. Each Technology Component (TeC) has been evaluated
under possible uniform assessment framework of WP3 which is based on the simulation guidelines
of WP6. The performance assessment is supported by the simulation results which are in their
mature and stable state. An update on the Most Promising Technology Approaches (MPTAs)
and their associated TeCs is the main focus of this document. Based on the input of all the TeCs in WP3, a consolidated view of WP3 on the role of multinode/multi-antenna transmission
technologies in 5G systems has also been provided. This consolidated view is further
supported in this document by the presentation of the impact of MPTAs on METIS scenarios
and the addressed METIS goals.Aziz, D.; Baracca, P.; De Carvalho, E.; Fantini, R.; Rajatheva, N.; Popovski, P.; Sørensen, JH.... (2015). D 3. 3 Final performance results and consolidated view on the most promising multi -node/multi -antenna transmission technologies. http://hdl.handle.net/10251/7675
コグニティブネットワークとヘテロジニアスネットワークの協調によるスペクトルの効率的利用に関する研究
学位の種別: 課程博士審査委員会委員 : (主査)東京大学教授 瀬崎 薫, 東京大学教授 浅見 徹, 東京大学教授 江崎 浩, 東京大学准教授 川原 圭博, 東京大学教授 森川 博之, 東京大学教授 相田 仁University of Tokyo(東京大学
- …