35 research outputs found

    Joint Spatial and Spectrum Cooperation in Wireless Network.

    Get PDF
    PhDThe sky-rocketing growth of multimedia infotainment applications and broadband-hungry mobile devices exacerbate the stringent demand for ultra high data rate and more spectrum resources. Along with it, the unbalanced temporal and geographical variations of spectrum usage further inspires those spectral-efficient networks, namely, cognitive radio and heterogeneous cellular networks (HCNs). This thesis focuses on the system design and performance enhancement of cognitive radio (CR) and HCNs. Three different aspects of performance improvement are considered, including link reliability of cognitive radio networks (CNs), security enhancement of CNs, and energy efficiency improvement of CNs and HCNs. First, generalized selection combining (GSC) is proposed as an effective receiver design for interference reduction and reliability improvement of CNs with outdated CSI. A uni- ed way for deriving the distribution of received signal-to-noise ratio (SNR) is developed in underlay spectrum sharing networks subject to interference from the primary trans- mitter (PU-Tx) to the secondary receiver (SU-Rx), maximum transmit power constraint at the secondary transmitter (SU-Tx), and peak interference power constraint at the PU receiver (PU-Rx), is developed. Second, transmit antenna selection with receive generalized selection combining (TAS/GSC) in multi-antenna relay-aided communica- tion is introduced in CNs under Rayleigh fading and Nakagami-m fading. Based on newly derived complex statistical properties of channel power gain of TAS/GSC, exact ergodic capacity and high SNR ergodic capacity are derived over Nakagami-m fading. Third, beamforming and arti cial noise generation (BF&AN) is introduced as a robust scheme to enhance the secure transmission of large-scale spectrum sharing networks with multiple randomly located eavesdroppers (Eves) modeled as homogeneous Poisson Point Process (PPP). Stochastic geometry is applied to model and analyze the impact of i BF&AN on this complex network. Optimal power allocation factor for BF&AN which maximizes the average secrecy rate is further studied under the outage probability con- straint of primary network. Fourth, a new wireless energy harvesting protocol is proposed for underlay cognitive relay networks with the energy-constrained SU-Txs. Exact and asymptotic outage probability, delay-sensitive throughput, and delay-tolerant through- put are derived to explore the tradeoff between the energy harvested from the PU-Txs and the interference caused by the PU-Txs. Fifth, a harvest-then-transmit protocol is proposed in K-tier HCNs with randomly located multiple-antenna base stations (BSs) and single antenna mobile terminals (MTs) modeled as homogeneous PPP. The average received power at MT, the uplink (UL) outage probability, and the UL average ergodic rate are derived to demonstrate the intrinsic relationship between the energy harvested from BSs in the downlink (DL) and the MT performance in the UL. Throughout the thesis, it is shown that link reliability, secrecy performance, and energy efficiency of CNs and HCNs can be signi cantly leveraged by taking advantage of multiple antennas, relays, and wireless energy harvesting

    D11.2 Consolidated results on the performance limits of wireless communications

    Get PDF
    Deliverable D11.2 del projecte europeu NEWCOM#The report presents the Intermediate Results of N# JRAs on Performance Limits of Wireless Communications and highlights the fundamental issues that have been investigated by the WP1.1. The report illustrates the Joint Research Activities (JRAs) already identified during the first year of the project which are currently ongoing. For each activity there is a description, an illustration of the adherence and relevance with the identified fundamental open issues, a short presentation of the preliminary results, and a roadmap for the joint research work in the next year. Appendices for each JRA give technical details on the scientific activity in each JRA.Peer ReviewedPreprin

    Advanced Trends in Wireless Communications

    Get PDF
    Physical limitations on wireless communication channels impose huge challenges to reliable communication. Bandwidth limitations, propagation loss, noise and interference make the wireless channel a narrow pipe that does not readily accommodate rapid flow of data. Thus, researches aim to design systems that are suitable to operate in such channels, in order to have high performance quality of service. Also, the mobility of the communication systems requires further investigations to reduce the complexity and the power consumption of the receiver. This book aims to provide highlights of the current research in the field of wireless communications. The subjects discussed are very valuable to communication researchers rather than researchers in the wireless related areas. The book chapters cover a wide range of wireless communication topics

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
    corecore