1,037 research outputs found

    A Relay Can Increase Degrees of Freedom in Bursty Interference Networks

    Full text link
    We investigate the benefits of relays in multi-user wireless networks with bursty user traffic, where intermittent data traffic restricts the users to bursty transmissions. To this end, we study a two-user bursty MIMO Gaussian interference channel with a relay, where two Bernoulli random states govern the bursty user traffic. We show that an in-band relay can provide a degrees of freedom (DoF) gain in this bursty channel. This beneficial role of in-band relays in the bursty channel is in direct contrast to their role in the non-bursty channel which is not as significant to provide a DoF gain. More importantly, we demonstrate that for certain antenna configurations, an in-band relay can help achieve interference-free performances with increased DoF. We find the benefits particularly substantial with low data traffic, as the DoF gain can grow linearly with the number of antennas at the relay. In this work, we first derive an outer bound from which we obtain a necessary condition for interference-free DoF performances. Then, we develop a novel scheme that exploits information of the bursty traffic states to achieve them.Comment: submitted to the IEEE Transactions on Information Theor

    When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network

    Full text link
    We develop and analyze new cooperative strategies for ad hoc networks that are more spectrally efficient than classical DF cooperative protocols. Using analog network coding, our strategies preserve the practical half-duplex assumption but relax the orthogonality constraint. The introduction of interference due to non-orthogonality is mitigated thanks to precoding, in particular Dirty Paper coding. Combined with smart power allocation, our cooperation strategies allow to save time and lead to more efficient use of bandwidth and to improved network throughput with respect to classical RDF/PDF.Comment: 7 pages, 7 figure

    Approximate Sum-Capacity of K-user Cognitive Interference Channels with Cumulative Message Sharing

    Full text link
    This paper considers the K user cognitive interference channel with one primary and K-1 secondary/cognitive transmitters with a cumulative message sharing structure, i.e cognitive transmitter i∈[2:K]i\in [2:K] knows non-causally all messages of the users with index less than i. We propose a computable outer bound valid for any memoryless channel. We first evaluate the sum-rate outer bound for the high- SNR linear deterministic approximation of the Gaussian noise channel. This is shown to be capacity for the 3-user channel with arbitrary channel gains and the sum-capacity for the symmetric K-user channel. Interestingly. for the K user channel having only the K th cognitive know all the other messages is sufficient to achieve capacity i.e cognition at transmitter 2 to K-1 is not needed. Next the sum capacity of the symmetric Gaussian noise channel is characterized to within a constant additive and multiplicative gap. The proposed achievable scheme for the additive gap is based on Dirty paper coding and can be thought of as a MIMO-broadcast scheme where only one encoding order is possible due to the message sharing structure. As opposed to other multiuser interference channel models, a single scheme suffices for both the weak and strong interference regimes. With this scheme the generalized degrees of freedom (gDOF) is shown to be a function of K, in contrast to the non cognitive case and the broadcast channel case. Interestingly, it is show that as the number of users grows to infinity the gDoF of the K-user cognitive interference channel with cumulative message sharing tends to the gDoF of a broadcast channel with a K-antenna transmitter and K single-antenna receivers. The analytical additive additive and multiplicative gaps are a function of the number of users. Numerical evaluations of inner and outer bounds show that the actual gap is less than the analytical one.Comment: Journa

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201
    • …
    corecore