311 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Interference modelling and management for cognitive radio networks

    Get PDF
    Radio spectrum is becoming increasingly scarce as more and more devices go wireless. Meanwhile, studies indicate that the assigned spectrum is not fully utilised. Cognitive radio (CR) technology is envisioned to be a promising solution to address the imbalance between spectrum scarcity and spectrum underutilisation. It improves the spectrum utilisation by reusing the unused or underutilised spectrum owned by incumbent systems (primary systems). With the introduction of CR networks, two types of interference originating from CR networks are introduced. They are the interference from CR to primary networks (CR-primary interference) and the interference among spectrum-sharing CR nodes (CR-CR interference). The interference should be well controlled and managed in order not to jeopardise the operation of the primary network and to improve the performance of CR systems. This thesis investigates the interference in CR networks by modelling and mitigating the CR-primary interference and analysing the CR-CR interference channels. Firstly, the CR-primary interference is modelled for multiple CR nodes sharing the spectrum with the primary system. The probability density functions of CR-primary interference are derived for CR networks adopting different interference management schemes. The relationship between CR operating parameters and the resulting CRprimary interference is investigated. It sheds light on the deployment of CR networks to better protect the primary system. Secondly, various interference mitigation techniques that are applicable to CR networks are reviewed. Two novel precoding schemes for CR multiple-input multipleoutput (MIMO) systems are proposed to mitigate the CR-primary interference and maximise the CR throughput. To further reduce the CR-primary interference, we also approach interference mitigation from a cross-layer perspective by jointly considering channel allocation in the media access control layer and precoding in the physical layer of CR MIMO systems. Finally, we analyse the underlying interference channels among spectrum-sharing CR users when they interfere with each other. The Pareto rate region for multi-user MIMO interference systems is characterised. Various rate region convexification schemes are examined to convexify the rate region. Then, game theory is applied to the interference system to coordinate the operation of each CR user. Nash bargaining over MIMO interference systems is characterised as well. The research presented in this thesis reveals the impact of CR operation on the resulting CR-primary network, how to mitigate the CR-primary interference and how to coordinate the spectrum-sharing CR users. It forms the fundamental basis for interference management in CR systems and consequently gives insights into the design and deployment of CR networks

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig
    • …
    corecore