1,207 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Space-time coding techniques with bit-interleaved coded modulations for MIMO block-fading channels
The space-time bit-interleaved coded modulation (ST-BICM) is an efficient
technique to obtain high diversity and coding gain on a block-fading MIMO
channel. Its maximum-likelihood (ML) performance is computed under ideal
interleaving conditions, which enables a global optimization taking into
account channel coding. Thanks to a diversity upperbound derived from the
Singleton bound, an appropriate choice of the time dimension of the space-time
coding is possible, which maximizes diversity while minimizing complexity.
Based on the analysis, an optimized interleaver and a set of linear precoders,
called dispersive nucleo algebraic (DNA) precoders are proposed. The proposed
precoders have good performance with respect to the state of the art and exist
for any number of transmit antennas and any time dimension. With turbo codes,
they exhibit a frame error rate which does not increase with frame length.Comment: Submitted to IEEE Trans. on Information Theory, Submission: January
2006 - First review: June 200
Information-theoretic Physical Layer Security for Satellite Channels
Shannon introduced the classic model of a cryptosystem in 1949, where Eve has
access to an identical copy of the cyphertext that Alice sends to Bob. Shannon
defined perfect secrecy to be the case when the mutual information between the
plaintext and the cyphertext is zero. Perfect secrecy is motivated by
error-free transmission and requires that Bob and Alice share a secret key.
Wyner in 1975 and later I.~Csisz\'ar and J.~K\"orner in 1978 modified the
Shannon model assuming that the channels are noisy and proved that secrecy can
be achieved without sharing a secret key. This model is called wiretap channel
model and secrecy capacity is known when Eve's channel is noisier than Bob's
channel.
In this paper we review the concept of wiretap coding from the satellite
channel viewpoint. We also review subsequently introduced stronger secrecy
levels which can be numerically quantified and are keyless unconditionally
secure under certain assumptions. We introduce the general construction of
wiretap coding and analyse its applicability for a typical satellite channel.
From our analysis we discuss the potential of keyless information theoretic
physical layer security for satellite channels based on wiretap coding. We also
identify system design implications for enabling simultaneous operation with
additional information theoretic security protocols
Space-Time Signal Design for Multilevel Polar Coding in Slow Fading Broadcast Channels
Slow fading broadcast channels can model a wide range of applications in
wireless networks. Due to delay requirements and the unavailability of the
channel state information at the transmitter (CSIT), these channels for many
applications are non-ergodic. The appropriate measure for designing signals in
non-ergodic channels is the outage probability. In this paper, we provide a
method to optimize STBCs based on the outage probability at moderate SNRs.
Multilevel polar coded-modulation is a new class of coded-modulation techniques
that benefits from low complexity decoders and simple rate matching. In this
paper, we derive the outage optimality condition for multistage decoding and
propose a rule for determining component code rates. We also derive an upper
bound on the outage probability of STBCs for designing the
set-partitioning-based labelling. Finally, due to the optimality of the
outage-minimized STBCs for long codes, we introduce a novel method for the
joint optimization of short-to-moderate length polar codes and STBCs
Downlink SDMA with Limited Feedback in Interference-Limited Wireless Networks
The tremendous capacity gains promised by space division multiple access
(SDMA) depend critically on the accuracy of the transmit channel state
information. In the broadcast channel, even without any network interference,
it is known that such gains collapse due to interstream interference if the
feedback is delayed or low rate. In this paper, we investigate SDMA in the
presence of interference from many other simultaneously active transmitters
distributed randomly over the network. In particular we consider zero-forcing
beamforming in a decentralized (ad hoc) network where each receiver provides
feedback to its respective transmitter. We derive closed-form expressions for
the outage probability, network throughput, transmission capacity, and average
achievable rate and go on to quantify the degradation in network performance
due to residual self-interference as a function of key system parameters. One
particular finding is that as in the classical broadcast channel, the per-user
feedback rate must increase linearly with the number of transmit antennas and
SINR (in dB) for the full multiplexing gains to be preserved with limited
feedback. We derive the throughput-maximizing number of streams, establishing
that single-stream transmission is optimal in most practically relevant
settings. In short, SDMA does not appear to be a prudent design choice for
interference-limited wireless networks.Comment: Submitted to IEEE Transactions on Wireless Communication
Joint Source-Channel Coding with Time-Varying Channel and Side-Information
Transmission of a Gaussian source over a time-varying Gaussian channel is
studied in the presence of time-varying correlated side information at the
receiver. A block fading model is considered for both the channel and the side
information, whose states are assumed to be known only at the receiver. The
optimality of separate source and channel coding in terms of average end-to-end
distortion is shown when the channel is static while the side information state
follows a discrete or a continuous and quasiconcave distribution. When both the
channel and side information states are time-varying, separate source and
channel coding is suboptimal in general. A partially informed encoder lower
bound is studied by providing the channel state information to the encoder.
Several achievable transmission schemes are proposed based on uncoded
transmission, separate source and channel coding, joint decoding as well as
hybrid digital-analog transmission. Uncoded transmission is shown to be optimal
for a class of continuous and quasiconcave side information state
distributions, while the channel gain may have an arbitrary distribution. To
the best of our knowledge, this is the first example in which the uncoded
transmission achieves the optimal performance thanks to the time-varying nature
of the states, while it is suboptimal in the static version of the same
problem. Then, the optimal \emph{distortion exponent}, that quantifies the
exponential decay rate of the expected distortion in the high SNR regime, is
characterized for Nakagami distributed channel and side information states, and
it is shown to be achieved by hybrid digital-analog and joint decoding schemes
in certain cases, illustrating the suboptimality of pure digital or analog
transmission in general.Comment: Submitted to IEEE Transactions on Information Theor
- …