13,986 research outputs found
Low-density Parity-check Codes for Wireless Relay Networks
In wireless networks, it has always been a challenge to satisfy high traffic throughput demands, due to limited spectrum resources. In past decades, various techniques, including cooperative communications, have been developed to achieve higher communication rates.
This thesis addresses the challenges imposed by cooperative wireless networks, in particular focusing on practical code constructions and designs for wireless relay networks. The thesis is divided into the following four topics: 1) constructing and designing low-density parity-check (LDPC) codes for half-duplex three-phase two-way relay channels, 2) extending LDPC code constructions to half-duplex three-way relay channels, 3) proposing maximum-rate relay selection algorithms and LDPC code constructions for the broadcast problem in wireless relay networks, and 4) proposing an iterative hard interference cancellation decoder for LDPC codes in 2-user multiple-access channels.
Under the first topic, we construct codes for half-duplex three-phase two-way relay channels where two terminal nodes exchange information with the help of a relay node. Constructing codes for such channels is challenging, especially when messages are encoded into multiple streams and a destination node receives signals from multiple nodes. We first prove an achievable rate region by random coding. Next, a systematic LDPC code is constructed at the relay node where relay bits are generated from two source codewords. At the terminal nodes, messages are decoded from signals of the source node and the relay node. To analyze the performance of the codes, discretized density evolution is derived. Based on the discretized density evolution, degree distributions are optimized by iterative linear programming in three steps. The optimized codes obtained are 26% longer than the theoretic ones.
For the second topic, we extend LDPC code constructions from half-duplex three-phase two-way relay channels to half-duplex three-way relay channels. An achievable rate region of half-duplex three-way relay channels is first proved. Next, LDPC codes for each sub-region of the achievable rate region are constructed, where relay bits can be generated only from a received codeword or from both the source codeword and received codewords.
Under the third topic, we study relay selection and code constructions for the broadcast problem in wireless relay networks. We start with the system model, followed by a theorem stating that a node can decode a message by jointly decoding multiple blocks of received signals. Next, the maximum rate is given when a message is decoded hop-by-hop or decoded by a set of nodes in a transmission phase. Furthermore, optimal relay selection algorithms are proposed for the two relay schemes. Finally, LDPC codes are constructed for the broadcast problem in wireless relay networks.
For the fourth topic, an iterative hard interference cancellation decoder for LDPC codes in 2-user multiple-access channels is proposed. The decoder is based on log-likelihood ratios (LLRs). Interference is estimated, quantized and subtracted from channel outputs. To analyze the codes, density evolution is derived. We show that the required signal-to-noise ratio (SNR) for the proposed low-complexity decoder is 0.2 dB higher than that for an existing sub-optimal belief propagation decoder at code rate 1/3.4 month
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Relaying for Multiuser Networks in the Absence of Codebook Information
This work considers relay assisted transmission for multiuser networks when
the relay has no access to the codebooks used by the transmitters. The relay is
called oblivious for this reason. Of particular interest is the generalized
compress-and-forward (GCF) strategy, where the destinations jointly decode the
compression indices and the transmitted messages, and their optimality in this
setting. The relay-to-destination links are assumed to be out-of-band with
finite capacity. Two models are investigated: the multiple access relay channel
(MARC) and the interference relay channel (IFRC). For the MARC with an
oblivious relay, a new outerbound is derived and it is shown to be tight by
means of achievability of the capacity region using GCF scheme. For the IFRC
with an oblivious relay, a new strong interference condition is established,
under which the capacity region is found by deriving a new outerbound and
showing that it is achievable using GCF scheme. The result is further extended
to establish the capacity region of M-user MARC with an oblivious relay, and
multicast networks containing M sources and K destinations with an oblivious
relay.Comment: submitted to IEEE Transactions on Information Theor
Relaying Simultaneous Multicast Messages
The problem of multicasting multiple messages with the help of a relay, which
may also have an independent message of its own to multicast, is considered. As
a first step to address this general model, referred to as the compound
multiple access channel with a relay (cMACr), the capacity region of the
multiple access channel with a "cognitive" relay is characterized, including
the cases of partial and rate-limited cognition. Achievable rate regions for
the cMACr model are then presented based on decode-and-forward (DF) and
compress-and-forward (CF) relaying strategies. Moreover, an outer bound is
derived for the special case in which each transmitter has a direct link to one
of the receivers while the connection to the other receiver is enabled only
through the relay terminal. Numerical results for the Gaussian channel are also
provided.Comment: This paper was presented at the IEEE Information Theory Workshop,
Volos, Greece, June 200
The Multi-way Relay Channel
The multiuser communication channel, in which multiple users exchange
information with the help of a relay terminal, termed the multi-way relay
channel (mRC), is introduced. In this model, multiple interfering clusters of
users communicate simultaneously, where the users within the same cluster wish
to exchange messages among themselves. It is assumed that the users cannot
receive each other's signals directly, and hence the relay terminal in this
model is the enabler of communication. In particular, restricted encoders,
which ignore the received channel output and use only the corresponding
messages for generating the channel input, are considered. Achievable rate
regions and an outer bound are characterized for the Gaussian mRC, and their
comparison is presented in terms of exchange rates in a symmetric Gaussian
network scenario. It is shown that the compress-and-forward (CF) protocol
achieves exchange rates within a constant bit offset of the exchange capacity
independent of the power constraints of the terminals in the network. A finite
bit gap between the exchange rates achieved by the CF and the
amplify-and-forward (AF) protocols is also shown. The two special cases of the
mRC, the full data exchange model, in which every user wants to receive
messages of all other users, and the pairwise data exchange model which
consists of multiple two-way relay channels, are investigated in detail. In
particular for the pairwise data exchange model, in addition to the proposed
random coding based achievable schemes, a nested lattice coding based scheme is
also presented and is shown to achieve exchange rates within a constant bit gap
of the exchange capacity.Comment: Revised version of our submission to the Transactions on Information
Theor
- …