35 research outputs found
Joint Spatial and Spectrum Cooperation in Wireless Network.
PhDThe sky-rocketing growth of multimedia infotainment applications and broadband-hungry
mobile devices exacerbate the stringent demand for ultra high data rate and more spectrum resources. Along with it, the unbalanced temporal and geographical variations
of spectrum usage further inspires those spectral-efficient networks, namely, cognitive
radio and heterogeneous cellular networks (HCNs). This thesis focuses on the system
design and performance enhancement of cognitive radio (CR) and HCNs. Three different
aspects of performance improvement are considered, including link reliability of cognitive
radio networks (CNs), security enhancement of CNs, and energy efficiency improvement
of CNs and HCNs.
First, generalized selection combining (GSC) is proposed as an effective receiver design
for interference reduction and reliability improvement of CNs with outdated CSI. A uni-
ed way for deriving the distribution of received signal-to-noise ratio (SNR) is developed
in underlay spectrum sharing networks subject to interference from the primary trans-
mitter (PU-Tx) to the secondary receiver (SU-Rx), maximum transmit power constraint
at the secondary transmitter (SU-Tx), and peak interference power constraint at the
PU receiver (PU-Rx), is developed. Second, transmit antenna selection with receive
generalized selection combining (TAS/GSC) in multi-antenna relay-aided communica-
tion is introduced in CNs under Rayleigh fading and Nakagami-m fading. Based on
newly derived complex statistical properties of channel power gain of TAS/GSC, exact
ergodic capacity and high SNR ergodic capacity are derived over Nakagami-m fading.
Third, beamforming and arti cial noise generation (BF&AN) is introduced as a robust
scheme to enhance the secure transmission of large-scale spectrum sharing networks
with multiple randomly located eavesdroppers (Eves) modeled as homogeneous Poisson
Point Process (PPP). Stochastic geometry is applied to model and analyze the impact of
i
BF&AN on this complex network. Optimal power allocation factor for BF&AN which
maximizes the average secrecy rate is further studied under the outage probability con-
straint of primary network. Fourth, a new wireless energy harvesting protocol is proposed
for underlay cognitive relay networks with the energy-constrained SU-Txs. Exact and
asymptotic outage probability, delay-sensitive throughput, and delay-tolerant through-
put are derived to explore the tradeoff between the energy harvested from the PU-Txs
and the interference caused by the PU-Txs. Fifth, a harvest-then-transmit protocol is
proposed in K-tier HCNs with randomly located multiple-antenna base stations (BSs)
and single antenna mobile terminals (MTs) modeled as homogeneous PPP. The average
received power at MT, the uplink (UL) outage probability, and the UL average ergodic
rate are derived to demonstrate the intrinsic relationship between the energy harvested
from BSs in the downlink (DL) and the MT performance in the UL. Throughout the
thesis, it is shown that link reliability, secrecy performance, and energy efficiency of
CNs and HCNs can be signi cantly leveraged by taking advantage of multiple antennas,
relays, and wireless energy harvesting
D11.2 Consolidated results on the performance limits of wireless communications
Deliverable D11.2 del projecte europeu NEWCOM#The report presents the Intermediate Results of N# JRAs on Performance Limits of Wireless Communications and highlights the fundamental issues that have been investigated by the WP1.1. The report illustrates the Joint Research Activities (JRAs) already identified during the first year of the project which are currently ongoing. For each activity there is a description, an illustration of the adherence and relevance with the identified fundamental open issues, a short presentation of the preliminary results, and a roadmap for the joint research work in the next year. Appendices for each JRA give technical details on the scientific activity in each JRA.Peer ReviewedPreprin
Advanced Trends in Wireless Communications
Physical limitations on wireless communication channels impose huge challenges to reliable communication. Bandwidth limitations, propagation loss, noise and interference make the wireless channel a narrow pipe that does not readily accommodate rapid flow of data. Thus, researches aim to design systems that are suitable to operate in such channels, in order to have high performance quality of service. Also, the mobility of the communication systems requires further investigations to reduce the complexity and the power consumption of the receiver. This book aims to provide highlights of the current research in the field of wireless communications. The subjects discussed are very valuable to communication researchers rather than researchers in the wireless related areas. The book chapters cover a wide range of wireless communication topics
Security and Privacy for Modern Wireless Communication Systems
The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks