3,673 research outputs found
Estimation in Phase-Shift and Forward Wireless Sensor Networks
We consider a network of single-antenna sensors that observe an unknown
deterministic parameter. Each sensor applies a phase shift to the observation
and the sensors simultaneously transmit the result to a multi-antenna fusion
center (FC). Based on its knowledge of the wireless channel to the sensors, the
FC calculates values for the phase factors that minimize the variance of the
parameter estimate, and feeds this information back to the sensors. The use of
a phase-shift-only transmission scheme provides a simplified analog
implementation at the sensor, and also leads to a simpler algorithm design and
performance analysis. We propose two algorithms for this problem, a numerical
solution based on a relaxed semidefinite programming problem, and a closed-form
solution based on the analytic constant modulus algorithm. Both approaches are
shown to provide performance close to the theoretical bound. We derive
asymptotic performance analyses for cases involving large numbers of sensors or
large numbers of FC antennas, and we also study the impact of phase errors at
the sensor transmitters. Finally, we consider the sensor selection problem, in
which only a subset of the sensors is chosen to send their observations to the
FC.Comment: 28 pages, 5 figures, accepted by IEEE Transactions on Signal
Processing, Apr. 201
Decentralized sequential change detection using physical layer fusion
The problem of decentralized sequential detection with conditionally
independent observations is studied. The sensors form a star topology with a
central node called fusion center as the hub. The sensors make noisy
observations of a parameter that changes from an initial state to a final state
at a random time where the random change time has a geometric distribution. The
sensors amplify and forward the observations over a wireless Gaussian multiple
access channel and operate under either a power constraint or an energy
constraint. The optimal transmission strategy at each stage is shown to be the
one that maximizes a certain Ali-Silvey distance between the distributions for
the hypotheses before and after the change. Simulations demonstrate that the
proposed analog technique has lower detection delays when compared with
existing schemes. Simulations further demonstrate that the energy-constrained
formulation enables better use of the total available energy than the
power-constrained formulation in the change detection problem.Comment: 10 pages, two-column, 10 figures, revised based on feedback from
reviewers, accepted for publication in IEEE Trans. on Wireless Communication
Random Beamforming over Correlated Fading Channels
We study a multiple-input multiple-output (MIMO) multiple access channel
(MAC) from several multi-antenna transmitters to a multi-antenna receiver. The
fading channels between the transmitters and the receiver are modeled by random
matrices, composed of independent column vectors with zero mean and different
covariance matrices. Each transmitter is assumed to send multiple data streams
with a random precoding matrix extracted from a Haar-distributed matrix. For
this general channel model, we derive deterministic approximations of the
normalized mutual information, the normalized sum-rate with
minimum-mean-square-error (MMSE) detection and the
signal-to-interference-plus-noise-ratio (SINR) of the MMSE decoder, which
become arbitrarily tight as all system parameters grow infinitely large at the
same speed. In addition, we derive the asymptotically optimal power allocation
under individual or sum-power constraints. Our results allow us to tackle the
problem of optimal stream control in interference channels which would be
intractable in any finite setting. Numerical results corroborate our analysis
and verify its accuracy for realistic system dimensions. Moreover, the
techniques applied in this paper constitute a novel contribution to the field
of large random matrix theory and could be used to study even more involved
channel models.Comment: 35 pages, 5 figure
Asymptotic Moments for Interference Mitigation in Correlated Fading Channels
We consider a certain class of large random matrices, composed of independent
column vectors with zero mean and different covariance matrices, and derive
asymptotically tight deterministic approximations of their moments. This random
matrix model arises in several wireless communication systems of recent
interest, such as distributed antenna systems or large antenna arrays.
Computing the linear minimum mean square error (LMMSE) detector in such systems
requires the inversion of a large covariance matrix which becomes prohibitively
complex as the number of antennas and users grows. We apply the derived moment
results to the design of a low-complexity polynomial expansion detector which
approximates the matrix inverse by a matrix polynomial and study its asymptotic
performance. Simulation results corroborate the analysis and evaluate the
performance for finite system dimensions.Comment: 7 pages, 2 figures, to be presented at IEEE International Symposium
on Information Theory (ISIT), Saint Petersburg, Russia, July 31 - August 5,
201
Distributed Detection and Estimation in Wireless Sensor Networks
In this article we consider the problems of distributed detection and
estimation in wireless sensor networks. In the first part, we provide a general
framework aimed to show how an efficient design of a sensor network requires a
joint organization of in-network processing and communication. Then, we recall
the basic features of consensus algorithm, which is a basic tool to reach
globally optimal decisions through a distributed approach. The main part of the
paper starts addressing the distributed estimation problem. We show first an
entirely decentralized approach, where observations and estimations are
performed without the intervention of a fusion center. Then, we consider the
case where the estimation is performed at a fusion center, showing how to
allocate quantization bits and transmit powers in the links between the nodes
and the fusion center, in order to accommodate the requirement on the maximum
estimation variance, under a constraint on the global transmit power. We extend
the approach to the detection problem. Also in this case, we consider the
distributed approach, where every node can achieve a globally optimal decision,
and the case where the decision is taken at a central node. In the latter case,
we show how to allocate coding bits and transmit power in order to maximize the
detection probability, under constraints on the false alarm rate and the global
transmit power. Then, we generalize consensus algorithms illustrating a
distributed procedure that converges to the projection of the observation
vector onto a signal subspace. We then address the issue of energy consumption
in sensor networks, thus showing how to optimize the network topology in order
to minimize the energy necessary to achieve a global consensus. Finally, we
address the problem of matching the topology of the network to the graph
describing the statistical dependencies among the observed variables.Comment: 92 pages, 24 figures. To appear in E-Reference Signal Processing, R.
Chellapa and S. Theodoridis, Eds., Elsevier, 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors
We address the design of opportunistic spectrum access (OSA) strategies that
allow secondary users to independently search for and exploit instantaneous
spectrum availability. Integrated in the joint design are three basic
components: a spectrum sensor that identifies spectrum opportunities, a sensing
strategy that determines which channels in the spectrum to sense, and an access
strategy that decides whether to access based on imperfect sensing outcomes.
We formulate the joint PHY-MAC design of OSA as a constrained partially
observable Markov decision process (POMDP). Constrained POMDPs generally
require randomized policies to achieve optimality, which are often intractable.
By exploiting the rich structure of the underlying problem, we establish a
separation principle for the joint design of OSA. This separation principle
reveals the optimality of myopic policies for the design of the spectrum sensor
and the access strategy, leading to closed-form optimal solutions. Furthermore,
decoupling the design of the sensing strategy from that of the spectrum sensor
and the access strategy, the separation principle reduces the constrained POMDP
to an unconstrained one, which admits deterministic optimal policies. Numerical
examples are provided to study the design tradeoffs, the interaction between
the spectrum sensor and the sensing and access strategies, and the robustness
of the ensuing design to model mismatch.Comment: 43 pages, 10 figures, submitted to IEEE Transactions on Information
Theory in Feb. 200
- …