3,673 research outputs found

    Estimation in Phase-Shift and Forward Wireless Sensor Networks

    Get PDF
    We consider a network of single-antenna sensors that observe an unknown deterministic parameter. Each sensor applies a phase shift to the observation and the sensors simultaneously transmit the result to a multi-antenna fusion center (FC). Based on its knowledge of the wireless channel to the sensors, the FC calculates values for the phase factors that minimize the variance of the parameter estimate, and feeds this information back to the sensors. The use of a phase-shift-only transmission scheme provides a simplified analog implementation at the sensor, and also leads to a simpler algorithm design and performance analysis. We propose two algorithms for this problem, a numerical solution based on a relaxed semidefinite programming problem, and a closed-form solution based on the analytic constant modulus algorithm. Both approaches are shown to provide performance close to the theoretical bound. We derive asymptotic performance analyses for cases involving large numbers of sensors or large numbers of FC antennas, and we also study the impact of phase errors at the sensor transmitters. Finally, we consider the sensor selection problem, in which only a subset of the sensors is chosen to send their observations to the FC.Comment: 28 pages, 5 figures, accepted by IEEE Transactions on Signal Processing, Apr. 201

    Decentralized sequential change detection using physical layer fusion

    Full text link
    The problem of decentralized sequential detection with conditionally independent observations is studied. The sensors form a star topology with a central node called fusion center as the hub. The sensors make noisy observations of a parameter that changes from an initial state to a final state at a random time where the random change time has a geometric distribution. The sensors amplify and forward the observations over a wireless Gaussian multiple access channel and operate under either a power constraint or an energy constraint. The optimal transmission strategy at each stage is shown to be the one that maximizes a certain Ali-Silvey distance between the distributions for the hypotheses before and after the change. Simulations demonstrate that the proposed analog technique has lower detection delays when compared with existing schemes. Simulations further demonstrate that the energy-constrained formulation enables better use of the total available energy than the power-constrained formulation in the change detection problem.Comment: 10 pages, two-column, 10 figures, revised based on feedback from reviewers, accepted for publication in IEEE Trans. on Wireless Communication

    Random Beamforming over Correlated Fading Channels

    Full text link
    We study a multiple-input multiple-output (MIMO) multiple access channel (MAC) from several multi-antenna transmitters to a multi-antenna receiver. The fading channels between the transmitters and the receiver are modeled by random matrices, composed of independent column vectors with zero mean and different covariance matrices. Each transmitter is assumed to send multiple data streams with a random precoding matrix extracted from a Haar-distributed matrix. For this general channel model, we derive deterministic approximations of the normalized mutual information, the normalized sum-rate with minimum-mean-square-error (MMSE) detection and the signal-to-interference-plus-noise-ratio (SINR) of the MMSE decoder, which become arbitrarily tight as all system parameters grow infinitely large at the same speed. In addition, we derive the asymptotically optimal power allocation under individual or sum-power constraints. Our results allow us to tackle the problem of optimal stream control in interference channels which would be intractable in any finite setting. Numerical results corroborate our analysis and verify its accuracy for realistic system dimensions. Moreover, the techniques applied in this paper constitute a novel contribution to the field of large random matrix theory and could be used to study even more involved channel models.Comment: 35 pages, 5 figure

    Asymptotic Moments for Interference Mitigation in Correlated Fading Channels

    Full text link
    We consider a certain class of large random matrices, composed of independent column vectors with zero mean and different covariance matrices, and derive asymptotically tight deterministic approximations of their moments. This random matrix model arises in several wireless communication systems of recent interest, such as distributed antenna systems or large antenna arrays. Computing the linear minimum mean square error (LMMSE) detector in such systems requires the inversion of a large covariance matrix which becomes prohibitively complex as the number of antennas and users grows. We apply the derived moment results to the design of a low-complexity polynomial expansion detector which approximates the matrix inverse by a matrix polynomial and study its asymptotic performance. Simulation results corroborate the analysis and evaluate the performance for finite system dimensions.Comment: 7 pages, 2 figures, to be presented at IEEE International Symposium on Information Theory (ISIT), Saint Petersburg, Russia, July 31 - August 5, 201

    Distributed Detection and Estimation in Wireless Sensor Networks

    Full text link
    In this article we consider the problems of distributed detection and estimation in wireless sensor networks. In the first part, we provide a general framework aimed to show how an efficient design of a sensor network requires a joint organization of in-network processing and communication. Then, we recall the basic features of consensus algorithm, which is a basic tool to reach globally optimal decisions through a distributed approach. The main part of the paper starts addressing the distributed estimation problem. We show first an entirely decentralized approach, where observations and estimations are performed without the intervention of a fusion center. Then, we consider the case where the estimation is performed at a fusion center, showing how to allocate quantization bits and transmit powers in the links between the nodes and the fusion center, in order to accommodate the requirement on the maximum estimation variance, under a constraint on the global transmit power. We extend the approach to the detection problem. Also in this case, we consider the distributed approach, where every node can achieve a globally optimal decision, and the case where the decision is taken at a central node. In the latter case, we show how to allocate coding bits and transmit power in order to maximize the detection probability, under constraints on the false alarm rate and the global transmit power. Then, we generalize consensus algorithms illustrating a distributed procedure that converges to the projection of the observation vector onto a signal subspace. We then address the issue of energy consumption in sensor networks, thus showing how to optimize the network topology in order to minimize the energy necessary to achieve a global consensus. Finally, we address the problem of matching the topology of the network to the graph describing the statistical dependencies among the observed variables.Comment: 92 pages, 24 figures. To appear in E-Reference Signal Processing, R. Chellapa and S. Theodoridis, Eds., Elsevier, 201

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors

    Full text link
    We address the design of opportunistic spectrum access (OSA) strategies that allow secondary users to independently search for and exploit instantaneous spectrum availability. Integrated in the joint design are three basic components: a spectrum sensor that identifies spectrum opportunities, a sensing strategy that determines which channels in the spectrum to sense, and an access strategy that decides whether to access based on imperfect sensing outcomes. We formulate the joint PHY-MAC design of OSA as a constrained partially observable Markov decision process (POMDP). Constrained POMDPs generally require randomized policies to achieve optimality, which are often intractable. By exploiting the rich structure of the underlying problem, we establish a separation principle for the joint design of OSA. This separation principle reveals the optimality of myopic policies for the design of the spectrum sensor and the access strategy, leading to closed-form optimal solutions. Furthermore, decoupling the design of the sensing strategy from that of the spectrum sensor and the access strategy, the separation principle reduces the constrained POMDP to an unconstrained one, which admits deterministic optimal policies. Numerical examples are provided to study the design tradeoffs, the interaction between the spectrum sensor and the sensing and access strategies, and the robustness of the ensuing design to model mismatch.Comment: 43 pages, 10 figures, submitted to IEEE Transactions on Information Theory in Feb. 200
    corecore