25 research outputs found

    Resource allocation and optimization techniques in wireless relay networks

    Get PDF
    Relay techniques have the potential to enhance capacity and coverage of a wireless network. Due to rapidly increasing number of smart phone subscribers and high demand for data intensive multimedia applications, the useful radio spectrum is becoming a scarce resource. For this reason, two way relay network and cognitive radio technologies are required for better utilization of radio spectrum. Compared to the conventional one way relay network, both the uplink and the downlink can be served simultaneously using a two way relay network. Hence the effective bandwidth efficiency is considered to be one time slot per transmission. Cognitive networks are wireless networks that consist of different types of users, a primary user (PU, the primary license holder of a spectrum band) and secondary users (SU, cognitive radios that opportunistically access the PU spectrum). The secondary users can access the spectrum of the licensed user provided they do not harmfully affect to the primary user. In this thesis, various resource allocation and optimization techniques have been investigated for wireless relay and cognitive radio networks

    Mathematical optimization techniques for resource allocation in cognitive radio networks

    Get PDF
    Introduction of data intensive multimedia and interactive services together with exponential growth of wireless applications have created a spectrum crisis. Many spectrum occupancy measurements, however, have shown that most of the allocated spectrum are used inefficiently indicating that radically new approaches are required for better utilization of spectrum. This motivates the concept of opportunistic spectrum sharing or the so-called cognitive radio technology that has great potential to improve spectrum utilization. This technology allows the secondary users to access the spectrum which is allocated to the licensed users in order to transmit their own signal without harmfully affecting the licensed users' communications. In this thesis, an optimal radio resource allocation algorithm is proposed for an OFDM based underlay cognitive radio networks. The proposed algorithm optimally allocates transmission power and OFDM subchannels to the users at the basestation in order to satisfy the quality of services and interference leakage constraints based on integer linear programming. To reduce the computational complexity, a novel recursive suboptimal algorithm is proposed based on a linear optimization framework. To exploit the spatial diversity, the proposed algorithms are extended to a MIMO-OFDM based cognitive radio network. Finally, a novel spatial multiplexing technique is developed to allocate resources in a cognitive radio network which consists of both the real time and the non-real users. Conditions required for convergence of the proposed algorithm are analytically derived. The performance of all these new algorithms are verified using MATLAB simulation results.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Multiuser Downlink Beamforming Techniques for Cognitive Radio Networks

    Get PDF
    Spectrum expansion and a significant network densification are key elements in meeting the ever increasing demands in data rates and traffic loads of future communication systems. In this context, cognitive radio (CR) techniques, which sense and opportunistically use spectrum resources, as well as beamforming methods, which increase spectral efficiency by exploiting spatial dimensions, are particularly promising. Thus, the scope of this thesis is to propose efficient downlink (DL) beamforming and power allocation schemes, in a CR framework. The methods developed here, can be further applied to various practical scenarios such as hierarchical multi-tier, heterogenous or dense networks. In this work, the particular CR underlay paradigm is considered, according to which, secondary users (SUs) opportunistically use the spectrum held by primary users (PUs), without disturbing the operation of the latter. Developing beamforming algorithms, in this scenario, requires that channel state information (CSI) from both SUs and PUs is required at the BS. Since in CR networks PUs have typically limited or no cooperation with the SUs, we particularly focus on designing beamforming schemes based on statistical CSI, which can be obtained with limited or no feedback. To further meet the energy efficiency requirements, the proposed beamforming designs aim to minimize the transmitted power at the BS, which serves SUs at their desired Quality-of-Service (QoS), in form of Signal-to-interference-plus-noise (SINR), while respecting the interference requirements of the primary network. In the first stage, this problem is considered under the assumption of perfect CSI of both SUs and PUs. The difficulty of this problem consists on one hand, in its non-convexity and, on the other hand, in the fact that the beamformers are coupled in all constraints. State-of-the-art approaches are based on convex approximations, given by semidefinite relaxation (SDR) methods, and suffer from large computational complexity per iteration, as well as the drawback that optimal beamformers cannot always be retrieved from the obtained solutions. The approach, proposed in this thesis, aims to overcome these limitations by exploiting the structure of the problem. We show that the original downlink problem can be equivalently represented in a so called ’virtual’ uplink domain (VUL), where the beamformers and powers are allocated, such that uplink SINR constraints of the SUs are satisfied, while both SUs and PUs transmit to the BS. The resulting VUL problem has a simpler structure than the original formulation, as the beamformers are decoupled in the SINR constraints. This allows us to develop algorithms, which solve the original problem, with significantly less computational complexity than the state-of-the-art methods. The rigurous analysis of the Lagrange duality, performed next, exposes scenarios, in which the equivalence between VUL and DL problems can be theroretically proven and shows the relation between the obtained powers in the VUL domain and the optimal Lagrange multipliers, corresponding to the original problem. We further use the duality results and the intuition of the VUL reformulation, in the extended problem of joint admission control and beamforming. The aim of this is to find a maximal set of SUs, which can be jointly served, as well as the corresponding beamforming and power allocation. Our approach uses Lagrange duality, to detect infeasible cases and the intuition of the VUL reformulation to decide upon the users, which have the largest contribution to the infeasibiity of the problem. With these elements, we construct a deflation based algorithm for the joint beamforming and admission control problem, which benefits from low complexity, yet close to optimal perfomance. To make the method also suitable for dense networks, with a large number of SUs and PUs, a cluster aided approach is further proposed and consists in grouping users, based on their long term spatial signatures. The information in the clusters serves as an initial indication of the SUs which cannot be simultaneously served and the PUs which pose similar interference constraints to the BS. Thus, the cluster information can be used to significantly reduce the dimension of the problem in scenarios with large number of SUs and PUs, and this fact is further validated by extensive simulations. In the second part of this thesis, the practical case of imperfect covariance based CSI, available at the transmitter, is considered. To account for the uncertainty in the channel knowledge, a worst case approach is taken, in which the SINR and the interference constraints are considered for all CSI mismatches in a predefined set One important factor, which influences the performance of the worst case beamforming approach is a proper choice of the the defined uncertainty set, to accurately model the possible uncertainties in the CSI. In this thesis, we show that recently derived Riemannian distances are better suited to measure the mismatches in the statistical CSI than the commonly used Frobenius norms, as they better capture the properties of the covariance matrices, than the latter. Therefore, we formulate a novel worst case robust beamforming problem, in which the uncertainty set is bounded based on these measures and for this, we derive a convex approximation, to which a solution can be efficiently found in polynomial time. Theoretical and numerical results confirm the significantly better performance of our proposed methods, as compared to the state-of-the-art methods, in which Frobenius norms are used to bound the mismatches. The consistently better results of the designs utilizing Riemannian distances also manifest in scenarios with large number of users, where admission control techniques must supplement the beamforming design with imperfect CSI. Both benchmark methods as well as low complexity techniques, developed in this thesis to solve this problem, show that designs based on Riemannian distance outperform their competitors, in both required transmit power as well as number of users, which can be simultaneously served

    Transmit optimization techniques for physical layer security

    Get PDF
    PhD ThesisOver the last several decades, reliable communication has received considerable attention in the area of dynamic network con gurations and distributed processing techniques. Traditional secure communications mainly considered transmission cryptography, which has been developed in the network layer. However, the nature of wireless transmission introduces various challenges of key distribution and management in establishing secure communication links. Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks in addition to existing conventional cryptographic methods, where the physical layer dynamics of fading channels are exploited to establish secure wireless links. On the other hand, with the ever-increasing demand of wireless access users, multi-antenna transmission has been considered as one of e ective approaches to improve the capacity of wireless networks. Multi-antenna transmission applied in physical layer security has extracted more and more attentions by exploiting additional degrees of freedom and diversity gains. In this thesis, di erent multi-antenna transmit optimization techniques are developed for physical layer secure transmission. The secrecy rate optimization problems (i.e., power minimization and secrecy rate maximization) are formulated to guarantee the optimal power allocation. First, transmit optimization for multiple-input single-output (MISO) secrecy channels are developed to design secure transmit beamformer that minimize the transmit power to achieve a target secrecy rate. Besides, the associated robust scheme with the secrecy rate outage probability constraint are presented with statistical channel uncertainty, where the outage probability constraint requires that the achieved secrecy rate exceeds certain thresholds with a speci c probability. Second, multiantenna cooperative jammer (CJ) is presented to provide jamming services that introduces extra interference to assist a multiple-input multipleoutput (MIMO) secure transmission. Transmit optimization for this CJaided MIMO secrecy channel is designed to achieve an optimal power allocation. Moreover, secure transmission is achieved when the CJ introduces charges for its jamming service based on the amount of the interference caused to the eavesdropper, where the Stackelberg game is proposed to handle, and the Stackelberg equilibrium is analytically derived. Finally, transmit optimization for MISO secure simultaneous wireless information and power transfer (SWIPT) is investigated, where secure transmit beamformer is designed with/without the help of arti - cial noise (AN) to maximize the achieved secrecy rate such that satisfy the transmit power budget and the energy harvesting (EH) constraint. The performance of all proposed schemes are validated by MATLAB simulation results

    Massive MIMO and small cells: How to densify heterogeneous networks

    Full text link
    International audienceWe propose a time division duplex (TDD) based network architecture where a macrocell tier with a "massive" multiple-input multiple-output (MIMO) base station (BS) is overlaid with a dense tier of small cells (SCs). In this context, the TDD protocol and the resulting channel reciprocity have two compelling advantages. First, a large number of BS antennas can be deployed without incurring a prohibitive overhead for channel training. Second, the BS can estimate the interference covariance matrix from the SC tier which can be leveraged for downlink precoding. In particular, the BS designs its precoding vectors to transmit independent data streams to its users while being orthogonal to the subspace spanned by the strongest interference directions; thereby minimizing the sum interference imposed on the SCs. In other words, the BS "sacrifices" some of its antennas for interference cancellation while the TDD protocol allows for an implicit coordination across the tiers. Simulation results suggest that, given a sufficiently large number of BS antennas, the proposed scheme can significantly improve the sum-rate of the SC tier at the price of a small macro performance loss

    Nonorthogonal Multiple Access for 5G and Beyond

    Get PDF
    This work was supported in part by the U.K. Engineering and Physical Sciences Research Council (EPSRC) under Grant EP/N029720/1 and Grant EP/N029720/2. The work of L. Hanzo was supported by the ERC Advanced Fellow Grant Beam-me-up
    corecore