1,154 research outputs found
Secure Layered Transmission in Multicast Systems with Wireless Information and Power Transfer
This paper considers downlink multicast transmit beamforming for secure
layered transmission systems with wireless simultaneous information and power
transfer. We study the power allocation algorithm design for minimizing the
total transmit power in the presence of passive eavesdroppers and energy
harvesting receivers. The algorithm design is formulated as a non-convex
optimization problem. Our problem formulation promotes the dual use of energy
signals in providing secure communication and facilitating efficient energy
transfer. Besides, we take into account a minimum required power for energy
harvesting at the idle receivers and heterogeneous quality of service (QoS)
requirements for the multicast video receivers. In light of the intractability
of the problem, we reformulate the considered problem by replacing a non-convex
probabilistic constraint with a convex deterministic constraint. Then, a
semidefinite programming relaxation (SDR) approach is adopted to obtain an
upper solution for the reformulated problem. Subsequently, sufficient
conditions for the global optimal solution of the reformulated problem are
revealed. Furthermore, we propose two suboptimal power allocation schemes based
on the upper bound solution. Simulation results demonstrate the excellent
performance and significant transmit power savings achieved by the proposed
schemes compared to isotropic energy signal generation.Comment: 7 pages, 3 figures, accepted for presentation at the IEEE
International Conference on Communications (ICC), Sydney, Australia, 201
Media-Based MIMO: A New Frontier in Wireless Communications
The idea of Media-based Modulation (MBM), is based on embedding information
in the variations of the transmission media (channel state). This is in
contrast to legacy wireless systems where data is embedded in a Radio Frequency
(RF) source prior to the transmit antenna. MBM offers several advantages vs.
legacy systems, including "additivity of information over multiple receive
antennas", and "inherent diversity over a static fading channel". MBM is
particularly suitable for transmitting high data rates using a single transmit
and multiple receive antennas (Single Input-Multiple Output Media-Based
Modulation, or SIMO-MBM). However, complexity issues limit the amount of data
that can be embedded in the channel state using a single transmit unit. To
address this shortcoming, the current article introduces the idea of Layered
Multiple Input-Multiple Output Media-Based Modulation (LMIMO-MBM). Relying on a
layered structure, LMIMO-MBM can significantly reduce both hardware and
algorithmic complexities, as well as the training overhead, vs. SIMO-MBM.
Simulation results show excellent performance in terms of Symbol Error Rate
(SER) vs. Signal-to-Noise Ratio (SNR). For example, a LMIMO-MBM is
capable of transmitting bits of information per (complex) channel-use,
with SER at dB (or SER
at dB). This performance is achieved using a single transmission
and without adding any redundancy for Forward-Error-Correction (FEC). This
means, in addition to its excellent SER vs. energy/rate performance, MBM
relaxes the need for complex FEC structures, and thereby minimizes the
transmission delay. Overall, LMIMO-MBM provides a promising alternative to MIMO
and Massive MIMO for the realization of 5G wireless networks.Comment: 26 pages, 11 figures, additional examples are given to further
explain the idea of Media-Based Modulation. Capacity figure adde
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
D13.2 Techniques and performance analysis on energy- and bandwidth-efficient communications and networking
Deliverable D13.2 del projecte europeu NEWCOM#The report presents the status of the research work of the
various Joint Research Activities (JRA) in WP1.3 and the results
that were developed up to the second year of the project. For
each activity there is a description, an illustration of the
adherence to and relevance with the identified fundamental
open issues, a short presentation of the main results, and a
roadmap for the future joint research. In the Annex, for each
JRA, the main technical details on specific scientific activities
are described in detail.Peer ReviewedPostprint (published version
- …