3 research outputs found

    Asymptotic BEP and SEP of Differential EGC in Correlated Ricean Fading and Non-Gaussian Noise

    Full text link

    Asymptotic Performance of Hybrid-Selection/Maximal-Ratio Combining Over Fading Channels

    No full text
    Abstract-In this letter, we study the asymptotic performance of hybrid-selection/maximal-ratio combining (HS/MRC) and postdetection HS/equal-gain combining (HS/EGC) over generalized fading channels for large average signal-to-noise ratios (ASNRs). By evaluating the asymptotic moment generating function of the HS/MRC output SNR at high ASNR, we derive the diversity and coding gains for HS/MRC for a large class of modulation formats and versatile fading conditions, including different types of fading channels and nonidentical SNR statistics across diversity branches. Our analytical results reveal that the diversity gains of HS/MRC and HS/EGC are equivalent to that of MRC, and the difference in the coding gains for different modulation formats is manifested in terms of a modulation factor defined in this letter. Some new analytical results about effects of the number of combined branches for HS/MRC and noncoherent combining loss of HS/EGC are also provided. Index Terms-Coding gain, diversity gain, error and outage probabilities, generalized selection combining (GSC), hybrid-selection/maximal-ratio combining (HS/MRC)

    Physical Layer Security in Wireless Networks: Design and Enhancement.

    Get PDF
    PhDSecurity and privacy have become increasingly significant concerns in wireless communication networks, due to the open nature of the wireless medium which makes the wireless transmission vulnerable to eavesdropping and inimical attacking. The emergence and development of decentralized and ad-hoc wireless networks pose great challenges to the implementation of higher-layer key distribution and management in practice. Against this background, physical layer security has emerged as an attractive approach for performing secure transmission in a low complexity manner. This thesis concentrates on physical layer security design and enhancement in wireless networks. First, this thesis presents a new unifying framework to analyze the average secrecy capacity and secrecy outage probability. Besides the exact average secrecy capacity and secrecy outage probability, a new approach for analyzing the asymptotic behavior is proposed to compute key performance parameters such as high signal-to-noise ratio slope, power offset, secrecy diversity order, and secrecy array gain. Typical fading environments such as two-wave with diffuse power and Nakagami-m are taken into account. Second, an analytical framework of using antenna selection schemes to achieve secrecy is provided. In particular, transmit antenna selection and generalized selection combining are considered including its special cases of selection combining and maximal-ratio combining. Third, the fundamental questions surrounding the joint impact of power constraints on the cognitive wiretap channel are addressed. Important design insights are revealed regarding the interplay between two power constraints, namely the maximum transmit at the secondary network and the peak interference power at the primary network. Fourth, secure single carrier transmission is considered in the two-hop decode-andi forward relay networks. A two-stage relay and destination selection is proposed to minimize the eavesdropping and maximize the signal power of the link between the relay and the destination. In two-hop amplify-and-forward untrusted relay networks, secrecy may not be guaranteed even in the absence of external eavesdroppers. As such, cooperative jamming with optimal power allocation is proposed to achieve non-zero secrecy rate. Fifth and last, physical layer security in large-scale wireless sensor networks is introduced. A stochastic geometry approach is adopted to model the positions of sensors, access points, sinks, and eavesdroppers. Two scenarios are considered: i) the active sensors transmit their sensing data to the access points, and ii) the active access points forward the data to the sinks. Important insights are concluded
    corecore