9 research outputs found

    Distributed differential beamforming and power allocation for cooperative communication networks

    Get PDF
    Many coherent cooperative diversity techniques for wireless relay networks have recently been suggested to improve the overall system performance in terms of the achievable data rate or bit error rate (BER) with low decoding complexity and delay. However, these techniques require channel state information (CSI) at the transmitter side, at the receiver side, or at both sides. Therefore, due to the overhead associated with estimating CSI, distributed differential space-time coding techniques have been suggested to overcome this overhead by detecting the information symbols without requiring any (CSI) at any transmitting or receiving antenna. However, the latter techniques suffer from low performance in terms of BER as well as high latency and decoding complexity. In this paper, a distributed differential beamforming technique with power allocation is proposed to overcome all drawbacks associated with the later techniques without needing CSI at any antenna and to be used for cooperative communication networks. We prove through our analytical and simulation results that the proposed technique outperforms the state-of-the-art techniques in terms of BER with comparably low decoding complexity and latency

    Physical layer security solutions against passive and colluding eavesdroppers in large wireless networks and impulsive noise environments

    Get PDF
    Wireless networks have experienced rapid evolutions toward sustainability, scalability and interoperability. The digital economy is driven by future networked societies to a more holistic community of intelligent infrastructures and connected services for a more sustainable and smarter society. Furthermore, an enormous amount of sensitive and confidential information, e.g., medical records, electronic media, financial data, and customer files, is transmitted via wireless channels. The implementation of higher layer key distribution and management was challenged by the emergence of these new advanced systems. In order to resist various malicious abuses and security attacks, physical layer security (PLS) has become an appealing alternative. The basic concept behind PLS is to exploit the characteristics of wireless channels for the confidentiality. Its target is to blind the eavesdroppers such that they cannot extract any confidential information from the received signals. This thesis presents solutions and analyses to improve the PLS in wireless networks. In the second chapter, we investigate the secrecy capacity performance of an amplify-andforward (AF) dual-hop network for both distributed beamforming (DBF) and opportunistic relaying (OR) techniques. We derive the capacity scaling for two large sets; trustworthy relays and untrustworthy aggressive relays cooperating together with a wire-tapper aiming to intercept the message. We show that the capacity scaling in the DBF is lower bounded by a value which depends on the ratio between the number of the trustworthy and the untrustworthy aggressive relays, whereas the capacity scaling of OR is upper bounded by a value depending on the number of relays as well as the signal to noise ratio (SNR). In the third chapter, we propose a new location-based multicasting technique, for dual phase AF large networks, aiming to improve the security in the presence of non-colluding passive eavesdroppers. We analytically demonstrate that the proposed technique increases the security by decreasing the probability of re-choosing a sector that has eavesdroppers, for each transmission time. Moreover, we also show that the secrecy capacity scaling of our technique is the same as for broadcasting. Hereafter, the lower and upper bounds of the secrecy outage probability are calculated, and it is shown that the security performance is remarkably enhanced, compared to the conventional multicasting technique. In the fourth chapter, we propose a new cooperative protocol, for dual phase amplify-andforward large wireless sensor networks, aiming to improve the transmission security while taking into account the limited capabilities of the sensor nodes. In such a network, a portion of the K relays can be potential passive eavesdroppers. To reduce the impact of these untrustworthy relays on the network security, we propose a new transmission protocol, where the source agrees to share with the destination a given channel state information (CSI) of source-trusted relay-destination link to encode the message. Then, the source will use this CSI again to map the right message to a certain sector while transmitting fake messages to the other sectors. Adopting such a security protocol is promising because of the availability of a high number of cheap electronic sensors with limited computational capabilities. For the proposed scheme, we derived the secrecy outage probability (SOP) and demonstrated that the probability of receiving the right encoded information by an untrustworthy relay is inversely proportional to the number of sectors. We also show that the aggressive behavior of cooperating untrusted relays is not effective compared to the case where each untrusted relay is trying to intercept the transmitted message individually. Fifth and last, we investigate the physical layer security performance over Rayleigh fading channels in the presence of impulsive noise, as encountered, for instance, in smart grid environments. For this scheme, secrecy performance metrics were considered with and without destination assisted jamming at the eavesdropper’s side. From the obtained results, it is verified that the SOP, without destination assisted jamming, is flooring at high signal-to-noise-ratio values and that it can be significantly improved with the use of jamming

    Robust wireless sensor network for smart grid communication : modeling and performance evaluation

    Get PDF
    Our planet is gradually heading towards an energy famine due to growing population and industrialization. Hence, increasing electricity consumption and prices, diminishing fossil fuels and lack significantly in environment-friendliness due to their emission of greenhouse gasses, and inefficient usage of existing energy supplies have caused serious network congestion problems in many countries in recent years. In addition to this overstressed situation, nowadays, the electric power system is facing many challenges, such as high maintenance cost, aging equipment, lack of effective fault diagnostics, power supply reliability, etc., which further increase the possibility of system breakdown. Furthermore, the adaptation of the new renewable energy sources with the existing power plants to provide an alternative way for electricity production transformed it in a very large and complex scale, which increases new issues. To address these challenges, a new concept of next generation electric power system, called the "smart grid", has emerged in which Information and Communication Technologies (ICTs) are playing the key role. For a reliable smart grid, monitoring and control of power system parameters in the transmission and distribution segments are crucial. This necessitates the deployment of a robust communication network within the power grid. Traditionally, power grid communications are realized through wired communications, including power line communication (PLC). However, the cost of its installation might be expensive especially for remote control and monitoring applications. More recently, plenty of research interests have been drawn to the wireless communications for smart grid applications. In this regard, the most promising methods of smart grid monitoring explored in the literature is based on wireless sensor network (WSN). Indeed, the collaborative nature of WSN brings significant advantages over the traditional wireless networks, including low-cost, wider coverage, self-organization, and rapid deployment. Unfortunately, harsh and hostile electric power system environments pose great challenges in the reliability of sensor node communications because of strong RF interference and noise called impulsive noise. On account of the fundamental of WSN-based smart grid communications and the possible impacts of impulsive noise on the reliability of sensor node communications, this dissertation is supposed to further fill the lacking of the existing research outcomes. To be specific, the contributions of this dissertation can be summarized as three fold: (i) investigation and performance analysis of impulsive noise mitigation techniques for point-to-point single-carrier communication systems impaired by bursty impulsive noise; (ii) design and performance analysis of collaborative WSN for smart grid communication by considering the RF noise model in the designing process, a particular intension is given to how the time-correlation among the noise samples can be taken into account; (iii) optimal minimum mean square error (MMSE)estimation of physical phenomenon like temperature, current, voltage, etc., typically modeled by a Gaussian source in the presence of impulsive noise. In the first part, we compare and analyze the widely used non-linear methods such as clipping, blanking, and combined clipping-blanking to mitigate the noxious effects of bursty impulsive noise for point-to-point communication systems with low-density parity-check (LDPC) coded single-carrier transmission. While, the performance of these mitigation techniques are widely investigated for multi-carrier communication systems using orthogonal frequency division multiplexing (OFDM) transmission under the effect of memoryless impulsive noise, we note that OFDM is outperformed by its single-carrier counterpart when the impulses are very strong and/or they occur frequently, which likely exists in contemporary communication systems including smart grid communications. Likewise, the assumption of memoryless noise model is not valid for many communication scenarios. Moreover, we propose log-likelihood ratio (LLR)-based impulsive noise mitigation for the considered scenario. We show that the memory property of the noise can be exploited in the LLR calculation through maximum a posteriori (MAP) detection. In this context, provided simulation results highlight the superiority of the LLR-based mitigation scheme over the simple clipping/blanking schemes. The second contribution can be divided into two aspects: (i) we consider the performance analysis of a single-relay decode-and-forward (DF) cooperative relaying scheme over channels impaired by bursty impulsive noise. For this channel, the bit error rate (BER) performances of direct transmission and a DF relaying scheme using M-PSK modulation in the presence of Rayleigh fading with a MAP receiver are derived; (ii) as a continuation of single-relay collaborative WSN scheme, we propose a novel relay selection protocol for a multi-relay DF collaborative WSN taking into account the bursty impulsive noise. The proposed protocol chooses the N’th best relay considering both the channel gains and the states of the impulsive noise of the source-relay and relay-destination links. To analyze the performance of the proposed protocol, we first derive closed-form expressions for the probability density function (PDF) of the received SNR. Then, these PDFs are used to derive closed-form expressions for the BER and the outage probability. Finally, we also derive the asymptotic BER and outage expressions to quantify the diversity benefits. From the obtained results, it is seen that the proposed receivers based on the MAP detection criterion is the most suitable one for bursty impulsive noise environments as it has been designed according to the statistical behavior of the noise. Different from the aforementioned contributions, talked about the reliable detection of finite alphabets in the presence of bursty impulsive noise, in the thrid part, we investigate the optimal MMSE estimation for a scalar Gaussian source impaired by impulsive noise. In Chapter 5, the MMSE optimal Bayesian estimation for a scalar Gaussian source, in the presence of bursty impulsive noise is considered. On the other hand, in Chapter 6, we investigate the distributed estimation of a scalar Gaussian source in WSNs in the presence of Middleton class-A noise. From the obtained results we conclude that the proposed optimal MMSE estimator outperforms the linear MMSE estimator developed for Gaussian channel

    Cooperative Diversity in CDMA over Nakagami−m Fading Channels

    Get PDF
    Spatial diversity can be employed by sending copies of the transmitted signal using multiple antennas at the transmitter/receiver, as implemented in multiple-input multipleoutput (MIMO) systems. Spatial receive diversity has already been used in many applications with centralized systems where base station receivers are equipped with multiple antennas. However, due to the power constraints and the small size of the mobile terminal, it may not be feasible to deploy multiple transmit antennas. User cooperation diversity, a new form of space diversity, has been developed to address these limitations. Recently, user cooperative diversity has gained more attention as a less complex alternative to centralized MIMO wireless systems. It revealed the ability to improve wireless communications through reliable reception. One common network of the user cooperation diversity is the direct sequence code division multiple access (DS-CDMA) in which the Rayleigh fading channels are adopted and the orthogonality between users is assumed. The Rayleigh fading channels are unrealistic since they cannot represent the statistical characteristics of the complex indoor environments. On the other hand, Nakagami-m fading model is well known as a generalized distribution, where many fading environments can be modeled. It can be used to model fading conditions ranging from severe, light to no fading, by changing its fading parameter m. The bit-error-rate (BER) and outage probability of uplink cooperative DS-CDMA over Nakagami-m has not been addressed in the literature. Thus, in this thesis, the performance of both decode-and-forward (DF) and amplify-and-forward (AF) cooperative asynchronous DS-CDMA system over Nakagami-m fading channels is investigated. The Rake receiver is used to exploit the advantages of multipath propagation. Besides, multiuser detection (MUD) is used to mitigate the effect of multiple-access interference (MAI). We show that our proposed multi-user system achieves the full system diversity gain. The first part of the thesis introduces a new closed-form expression for the outage probability and the error probability of the DF cooperative DS-CDMA over asynchronous transmission over independent non-identical Nakagami-m fading channels. The underlying system employs MUD such as minimum mean square error (MMSE) and decorrelator detector (DD) to achieve the full diversity. The aforementioned closed-form expression is obtained through the moment generating function (MGF) for the total signal-to-noise ratio (SNR) at the base station where the cumulative density function (CDF) is obtained. Furthermore, we investigate the asymptotic behavior of the system at high SNR to calculate the achievable diversity gain. The results demonstrate that the system diversity gain is fulfilled when MUD is used to mitigate the effect of MAI. In the second part of the thesis, we study the performance of cooperative CDMA system using AF relaying over independent non-identical distribution (i.n.i) Nakagami-m fading channels. Using the MGF of the total SNR at the base station, we derive the outage probability of the system. This enables us to derive the asymptotic outage probability for any arbitrary value of the fading parameter m. The last part of the thesis investigates the optimum power allocation and optimum relay location in AF cooperative CDMA systems over i.n.i Nakagami-m fading channels. Moreover, we introduce the joint optimization of both power allocation and relay location under the transmit power constraint to minimize the outage probability of the system. The joint optimization of both power allocation and relay location is used to minimize the outage performance of the system, thereby achieving full diversity gain

    Resource allocation in future green wireless networks : applications and challenges

    Get PDF
    Over the past few years, green radio communication has been an emerging topic since the footprint from the Information and Communication Technologies (ICT) is predicted to increase 7.3% annually and then exceed 14% of the global footprint by 2040. Moreover, the explosive progress of ICT, e.g., the fifth generation (5G) networks, has resulted in expectations of achieving 10-fold longer device battery lifetime, and 1000-fold higher global mobile data traffic over the fourth generation (4G) networks. Therefore, the demands for increasing the data rate and the lifetime while reducing the footprint in the next-generation wireless networks call for more efficient utilization of energy and other resources. To overcome this challenge, the concepts of small-cell, energy harvesting, and wireless information and power transfer networks can be evaluated as promising solutions for re-greening the world. In this dissertation, the technical contributions in terms of saving economical cost, protecting the environment, and guaranteeing human health are provided. More specifically, novel communication scenarios are proposed to minimize energy consumption and hence save economic costs. Further, energy harvesting (EH) techniques are applied to exploit available green resources in order to reduce carbon footprint and then protect the environment. In locations where implemented user devices might not harvest energy directly from natural resources, base stations could harvest-and-store green energy and then use such energy to power the devices wirelessly. However, wireless power transfer (WPT) techniques should be used in a wise manner to avoid electromagnetic pollution and then guarantee human health. To achieve all these aspects simultaneously, this thesis proposes promising schemes to optimally manage and allocate resources in future networks. Given this direction, in the first part, Chapter 2 mainly studies a transmission power minimization scheme for a two-tier heterogeneous network (HetNet) over frequency selective fading channels. In addition, the HetNet backhaul connection is unable to support a sufficient throughput for signaling an information exchange between two tiers. A novel idea is introduced in which the time reversal (TR) beamforming technique is used at a femtocell while zero-forcing-based beamforming is deployed at a macrocell. Thus, a downlink power minimizationscheme is proposed, and optimal closed-form solutions are provided. In the second part, Chapters 3, 4, and 5 concentrate on EH and wireless information and power transfer (WIPT) using RF signals. More specifically, Chapter 3 presents an overview of the recent progress in green radio communications and discusses potential technologies for some emerging topics on the platforms of EH and WPT. Chapter 4 develops a new integrated information and energy receiver architecture based on the direct use of alternating current (AC) for computation. It is shown that the proposed approach enhances not only the computational ability but also the energy efficiency over the conventional one. Furthermore, Chapter 5 proposes a novel resource allocation scheme in simultaneous wireless information and power transfer (SWIPT) networks where three crucial issues: power-efficient improvement, user-fairness guarantee, and non-ideal channel reciprocity effect mitigation, are jointly addressed. Hence, novel methods to derive optimal and suboptimal solutions are provided. In the third part, Chapters 6, 7, and 8 focus on simultaneous lightwave information and power transfer (SLIPT) for indoor applications, as a complementary technology to RF SWIPT. In this research, Chapter 6 investigates a hybrid RF/visible light communication (VLC) ultrasmall cell network where optical transmitters deliver information and power using the visible light, whereas an RF access point works as a complementary power transfer system. Thus, a novel resource allocation scheme exploiting RF and visible light for power transfer is devised. Chapter 7 proposes the use of lightwave power transfer to enable future sustainable Federated Learning (FL)-based wireless networks. FL is a new data privacy protection technique for training shared machine learning models in a distributed approach. However, the involvement of energy-constrained mobile devices in the construction of the shared learning models may significantly reduce their lifetime. The proposed approach can support the FL-based wireless network to overcome the issue of limited energy at mobile devices. Chapter 8 introduces a novel framework for collaborative RF and lightwave power transfer for wireless communication networks. The constraints on the transmission power set by safety regulations result in significant challenges to enhance the power transfer performance. Thus, the study of technologies complementary to conventional RF SWIPT is essential. To cope with this isue, this chapter proposes a novel collaborative RF and lightwave power transfer technology for next-generation wireless networks

    Wireless networks physical layer security : modeling and performance characterization

    Get PDF
    Intrigued by the rapid growth and expand of wireless devices, data security is increasingly playing a significant role in our daily transactions and interactions with different entities. Possible examples, including e-healthcare information and online shopping, are becoming vulnerable due to the intrinsic nature of wireless transmission medium and the widespread open access of wireless links. Traditionally, the communication security is mainly regarded as the tasks at the upper layers of layered protocol stack, security techniques, including personal access control, password protection, and end-to-end encryption, have been widely studied in the open literature. More recently, plenty of research interests have been drawn to the physical layer forms of secrecy. As a new but appealing paradigm at physical layer, physical layer security is based on two pioneering works: (i) Shannon’s information-theoretic formulation and (ii) Wyner’s wiretap formulation. On account of the fundamental of physical layer security and the different nature of various wireless network, this dissertation is supposed to further fill the lacking of the existing research outcomes. To be specific, the contributions of this dissertation can be summarized as three-fold:(i) exploration of secrecy metrics to more general fading channels; (ii) characterization a new fading channel model and its reliability and security analysis in digital communication systems; and (iii) investigation of physical layer security over the random multiple-input multiple-output (MIMO) α −Ό fading channels. Taking into account the classic Alice-Bob-Eve wiretap model, the first contribution can be divided into four aspects: (i) we have investigated the secrecy performance over single-input single-output (SISO) α −Ό fading channels. The probability of non-zero (PNZ) secrecy capacity and the lower bound of secrecy outage probability (SOP) are derived for the special case when the main channel and wiretap channel undergo the same non-linearity fading parameter, i.e., α. Later on, for the purpose of filling the gap of lacking closed-form expression of SOP in the open literature and extending the obtained results in chapter 2 to the single-input multiple-output (SIMO) α − ÎŒ wiretap fading channels, utilizing the fact that the received signal-tonoise ratios (SNRs) at the legitimate receiver and eavesdropper can be approximated as new α −Ό distributed random variables (RVs), the SOP metric is therefore derived, and given in terms of the bivariate Fox’s H-function; (ii) the secrecy performance over the Fisher-Snedecor F wiretap fading channels is initially considered. The SOP, PNZ, and ASC are finalized in terms of Meijer’s G-function; (iii) in order to generalize the obtained results over α −Ό and Fisher-Snedecor F wiretap fading channels, a more flexible and general fading channel, i.e., Fox’s H-function fading model, are taken into consideration. Both the exact and asymptotic analysis of SOP, PNZ, and average secrecy capacity (ASC), are developed with closed-form expressions; and (iv) finally, motivated by the fact that the mixture gamma (MG) distribution is an appealing tool, which can be used to model the received instantaneous SNRs over wireless fading channels, the secrecy metrics over wiretap fading channels are derived based on the MG approach. Due to the limited transmission power and communication range, cooperative relays or multi-hop wireless networks are usually regarded as two promising means to address these concerns. Inspired by the obtained results in Chapters 2 and 3, the second main contribution is to propose a novel but simple fading channel model, namely, the cascaded α −Ό. This new distribution is advantageous since it encompasses the existing cascaded Rayleigh, cascaded Nakagami-m, and cascaded Weibull with ease. Based on this, both the reliability and secrecy performance of a digital system over cascaded α −Ό fading channels are further evaluated. Closed-form expressions of reliability metrics (including amount of fading (AF), outage probability, average channel capacity, and average symbol error probability (ABEP).) and secrecy metrics (including SOP, PNZ, and ASC) are respectively provided. Besides, their asymptotic behaviors are also performed and compared with the exact results. Considering the impacts of users’ densities, spatial distribution, and the path-loss exponent on secrecy issue, the third aspect of this thesis is detailed in Chapter 8 as the secrecy investigation of stochastic MIMO system over α −Ό wiretap fading channels. Both the stochastic geometry and conventional space-time transmission (STT) scheme are used in the system configuration. The secrecy issue is mathematically evaluated by three metrics, i.e., connection outage, the probability of non-zero secrecy capacity and the ergodic secrecy capacity. Those three metrics are later on derived regarding two ordering scheme, and further compared with Monte-Carlo simulations

    Error performance analysis of opportunistic relaying system based on DCSK

    No full text
    Conference Name:11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012. Conference Address: Liverpool, United kingdom. Time:June 25, 2012 - June 27, 2012.University of Bradford; IEEE Technical Committee on Scalable Computing (TCSC); IEEE; IEEE Computer SocietyIn this paper, a differential chaos shift keying (DCSK) opportunistic relaying scheme is proposed and the system performance is analyzed over multipath Rayleigh fading channel, where all the relays adopt decode-and-forward (DF) strategy. Considering the effect of the path loss, the best relay is chosen by max-min selection criterion. We derive the probability density function (PDF) of the signal noise ratio (SNR) in each hop, and give the expression of the end-to-end bit error rate (BER). The effects of the number of relays, the propagation distance and the spread-spectrum factor on the system performance are investigated. It is shown that the BER performances are proportional to the number of relays and the propagation distance, while they are inverse ratio to the spread-spectrum factor. Numerical results prove an excellent match between simulations and our analysis expressions. 挏 2012 IEEE

    Error Performance Analysis of Opportunistic Relaying System Based on DCSK

    No full text
    corecore