311 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Interference modelling and management for cognitive radio networks
Radio spectrum is becoming increasingly scarce as more and more devices go wireless.
Meanwhile, studies indicate that the assigned spectrum is not fully utilised.
Cognitive radio (CR) technology is envisioned to be a promising solution to address
the imbalance between spectrum scarcity and spectrum underutilisation. It improves
the spectrum utilisation by reusing the unused or underutilised spectrum owned by
incumbent systems (primary systems). With the introduction of CR networks, two
types of interference originating from CR networks are introduced. They are the interference
from CR to primary networks (CR-primary interference) and the interference
among spectrum-sharing CR nodes (CR-CR interference). The interference should be
well controlled and managed in order not to jeopardise the operation of the primary
network and to improve the performance of CR systems. This thesis investigates the
interference in CR networks by modelling and mitigating the CR-primary interference
and analysing the CR-CR interference channels.
Firstly, the CR-primary interference is modelled for multiple CR nodes sharing the
spectrum with the primary system. The probability density functions of CR-primary
interference are derived for CR networks adopting different interference management
schemes. The relationship between CR operating parameters and the resulting CRprimary
interference is investigated. It sheds light on the deployment of CR networks
to better protect the primary system.
Secondly, various interference mitigation techniques that are applicable to CR networks
are reviewed. Two novel precoding schemes for CR multiple-input multipleoutput
(MIMO) systems are proposed to mitigate the CR-primary interference and
maximise the CR throughput. To further reduce the CR-primary interference, we also
approach interference mitigation from a cross-layer perspective by jointly considering
channel allocation in the media access control layer and precoding in the physical
layer of CR MIMO systems.
Finally, we analyse the underlying interference channels among spectrum-sharing CR
users when they interfere with each other. The Pareto rate region for multi-user MIMO
interference systems is characterised. Various rate region convexification schemes are
examined to convexify the rate region. Then, game theory is applied to the interference
system to coordinate the operation of each CR user. Nash bargaining over MIMO
interference systems is characterised as well.
The research presented in this thesis reveals the impact of CR operation on the resulting
CR-primary network, how to mitigate the CR-primary interference and how
to coordinate the spectrum-sharing CR users. It forms the fundamental basis for interference
management in CR systems and consequently gives insights into the design
and deployment of CR networks
Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks
Future wireless networks have a substantial potential in terms of supporting
a broad range of complex compelling applications both in military and civilian
fields, where the users are able to enjoy high-rate, low-latency, low-cost and
reliable information services. Achieving this ambitious goal requires new radio
techniques for adaptive learning and intelligent decision making because of the
complex heterogeneous nature of the network structures and wireless services.
Machine learning (ML) algorithms have great success in supporting big data
analytics, efficient parameter estimation and interactive decision making.
Hence, in this article, we review the thirty-year history of ML by elaborating
on supervised learning, unsupervised learning, reinforcement learning and deep
learning. Furthermore, we investigate their employment in the compelling
applications of wireless networks, including heterogeneous networks (HetNets),
cognitive radios (CR), Internet of things (IoT), machine to machine networks
(M2M), and so on. This article aims for assisting the readers in clarifying the
motivation and methodology of the various ML algorithms, so as to invoke them
for hitherto unexplored services as well as scenarios of future wireless
networks.Comment: 46 pages, 22 fig
- …