7,366 research outputs found

    Matrix-Monotonic Optimization for MIMO Systems

    Full text link
    For MIMO systems, due to the deployment of multiple antennas at both the transmitter and the receiver, the design variables e.g., precoders, equalizers, training sequences, etc. are usually matrices. It is well known that matrix operations are usually more complicated compared to their vector counterparts. In order to overcome the high complexity resulting from matrix variables, in this paper we investigate a class of elegant multi-objective optimization problems, namely matrix-monotonic optimization problems (MMOPs). In our work, various representative MIMO optimization problems are unified into a framework of matrix-monotonic optimization, which includes linear transceiver design, nonlinear transceiver design, training sequence design, radar waveform optimization, the corresponding robust design and so on as its special cases. Then exploiting the framework of matrix-monotonic optimization the optimal structures of the considered matrix variables can be derived first. Based on the optimal structure, the matrix-variate optimization problems can be greatly simplified into the ones with only vector variables. In particular, the dimension of the new vector variable is equal to the minimum number of columns and rows of the original matrix variable. Finally, we also extend our work to some more general cases with multiple matrix variables.Comment: 37 Pages, 5 figures, IEEE Transactions on Signal Processing, Final Versio

    Efficient Wireless Security Through Jamming, Coding and Routing

    Full text link
    There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, we consider how these single-hop physical layer security techniques can be extended to multi-hop wireless networks and show how to augment physical layer security techniques with higher layer network mechanisms such as coding and routing. Specifically, we consider the secure minimum energy routing problem, in which the objective is to compute a minimum energy path between two network nodes subject to constraints on the end-to-end communication secrecy and goodput over the path. This problem is formulated as a constrained optimization of transmission power and link selection, which is proved to be NP-hard. Nevertheless, we show that efficient algorithms exist to compute both exact and approximate solutions for the problem. In particular, we develop an exact solution of pseudo-polynomial complexity, as well as an epsilon-optimal approximation of polynomial complexity. Simulation results are also provided to show the utility of our algorithms and quantify their energy savings compared to a combination of (standard) security-agnostic minimum energy routing and physical layer security. In the simulated scenarios, we observe that, by jointly optimizing link selection at the network layer and cooperative jamming at the physical layer, our algorithms reduce the network energy consumption by half

    Degrees of Freedom of Two-Hop Wireless Networks: "Everyone Gets the Entire Cake"

    Full text link
    We show that fully connected two-hop wireless networks with K sources, K relays and K destinations have K degrees of freedom both in the case of time-varying channel coefficients and in the case of constant channel coefficients (in which case the result holds for almost all values of constant channel coefficients). Our main contribution is a new achievability scheme which we call Aligned Network Diagonalization. This scheme allows the data streams transmitted by the sources to undergo a diagonal linear transformation from the sources to the destinations, thus being received free of interference by their intended destination. In addition, we extend our scheme to multi-hop networks with fully connected hops, and multi-hop networks with MIMO nodes, for which the degrees of freedom are also fully characterized.Comment: Presented at the 2012 Allerton Conference. Submitted to IEEE Transactions on Information Theor
    • …
    corecore