1,319 research outputs found

    A survey and tutorial of electromagnetic radiation and reduction in mobile communication systems

    Get PDF
    This paper provides a survey and tutorial of electromagnetic (EM) radiation exposure and reduction in mobile communication systems. EM radiation exposure has received a fair share of interest in the literature; however, this work is one of the first to compile the most interesting results and ideas related to EM exposure in mobile communication systems and present possible ways of reducing it. We provide a comprehensive survey of existing literature and also offer a tutorial on the dosimetry, metrics, international projects as well as guidelines and limits on the exposure from EM radiation in mobile communication systems. Based on this survey and given that EM radiation exposure is closely linked with specific absorption rate (SAR) and transmit power usage, we propose possible techniques for reducing EM radiation exposure in mobile communication systems by exploring known concepts related to SAR and transmit power reduction in mobile systems. Thus, this paper serves as an introductory guide to EM radiation exposure in mobile communication systems and provides insights toward the design of future low-EM exposure mobile communication networks

    Analysis of Channel-Based User Authentication by Key-Less and Key-Based Approaches

    Full text link
    User authentication (UA) supports the receiver in deciding whether a message comes from the claimed transmitter or from an impersonating attacker. In cryptographic approaches messages are signed with either an asymmetric or symmetric key, and a source of randomness is required to generate the key. In physical layer authentication (PLA) instead the receiver checks if received messages presumably coming from the same source undergo the same channel. We compare these solutions by considering the physical-layer channel features as randomness source for generating the key, thus allowing an immediate comparison with PLA (that already uses these features). For the symmetric-key approach we use secret key agreement, while for asymmetric-key the channel is used as entropy source at the transmitter. We focus on the asymptotic case of an infinite number of independent and identically distributed channel realizations, showing the correctness of all schemes and analyzing the secure authentication rate, that dictates the rate at which the probability that UA security is broken goes to zero as the number of used channel resources (to generate the key or for PLA) goes to infinity. Both passive and active attacks are considered and by numerical results we compare the various systems

    Design guidelines for spatial modulation

    No full text
    A new class of low-complexity, yet energyefficient Multiple-Input Multiple-Output (MIMO) transmission techniques, namely the family of Spatial Modulation (SM) aided MIMOs (SM-MIMO) has emerged. These systems are capable of exploiting the spatial dimensions (i.e. the antenna indices) as an additional dimension invoked for transmitting information, apart from the traditional Amplitude and Phase Modulation (APM). SM is capable of efficiently operating in diverse MIMO configurations in the context of future communication systems. It constitutes a promising transmission candidate for large-scale MIMO design and for the indoor optical wireless communication whilst relying on a single-Radio Frequency (RF) chain. Moreover, SM may also be viewed as an entirely new hybrid modulation scheme, which is still in its infancy. This paper aims for providing a general survey of the SM design framework as well as of its intrinsic limits. In particular, we focus our attention on the associated transceiver design, on spatial constellation optimization, on link adaptation techniques, on distributed/ cooperative protocol design issues, and on their meritorious variants

    EXIT chart analysis of iteratively detected and SVD-assisted broadband MIMO-BICM schemes

    Get PDF
    In this contribution the number of activated MIMO layers and the number of bits per symbol are jointly optimized under the constraint of a given fixed data throughput and integrity. In general, non-frequency selective MIMO links have attracted a lot of research and have reached a state of maturity. By contrast, frequency selective MIMO links require substantial further research, where spatio-temporal vector coding (STVC) introduced by Raleigh seems to be an appropriate candidate for broadband transmission channels. In analogy to bit-interleaved coded irregular modulation, a broadband MIMO-BICM scheme is introduced, where different signal constellations and mappings are used within a single codeword. Extrinsic Information Transfer (EXIT) charts are used for analyzing and optimizing the convergence behaviour of the iterative demapping and decoding. Our results show that in order to achieve the best bit-error rate, not necessarily all MIMO layers have to be activated
    corecore