42,671 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
Wireless sensor networks monitor dynamic environments that change rapidly
over time. This dynamic behavior is either caused by external factors or
initiated by the system designers themselves. To adapt to such conditions,
sensor networks often adopt machine learning techniques to eliminate the need
for unnecessary redesign. Machine learning also inspires many practical
solutions that maximize resource utilization and prolong the lifespan of the
network. In this paper, we present an extensive literature review over the
period 2002-2013 of machine learning methods that were used to address common
issues in wireless sensor networks (WSNs). The advantages and disadvantages of
each proposed algorithm are evaluated against the corresponding problem. We
also provide a comparative guide to aid WSN designers in developing suitable
machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Delay Performance of MISO Wireless Communications
Ultra-reliable, low latency communications (URLLC) are currently attracting
significant attention due to the emergence of mission-critical applications and
device-centric communication. URLLC will entail a fundamental paradigm shift
from throughput-oriented system design towards holistic designs for guaranteed
and reliable end-to-end latency. A deep understanding of the delay performance
of wireless networks is essential for efficient URLLC systems. In this paper,
we investigate the network layer performance of multiple-input, single-output
(MISO) systems under statistical delay constraints. We provide closed-form
expressions for MISO diversity-oriented service process and derive
probabilistic delay bounds using tools from stochastic network calculus. In
particular, we analyze transmit beamforming with perfect and imperfect channel
knowledge and compare it with orthogonal space-time codes and antenna
selection. The effect of transmit power, number of antennas, and finite
blocklength channel coding on the delay distribution is also investigated. Our
higher layer performance results reveal key insights of MISO channels and
provide useful guidelines for the design of ultra-reliable communication
systems that can guarantee the stringent URLLC latency requirements.Comment: This work has been submitted to the IEEE for possible publication.
Copyright may be transferred without notice, after which this version may no
longer be accessibl
An OFDM Signal Identification Method for Wireless Communications Systems
Distinction of OFDM signals from single carrier signals is highly important
for adaptive receiver algorithms and signal identification applications. OFDM
signals exhibit Gaussian characteristics in time domain and fourth order
cumulants of Gaussian distributed signals vanish in contrary to the cumulants
of other signals. Thus fourth order cumulants can be utilized for OFDM signal
identification. In this paper, first, formulations of the estimates of the
fourth order cumulants for OFDM signals are provided. Then it is shown these
estimates are affected significantly from the wireless channel impairments,
frequency offset, phase offset and sampling mismatch. To overcome these
problems, a general chi-square constant false alarm rate Gaussianity test which
employs estimates of cumulants and their covariances is adapted to the specific
case of wireless OFDM signals. Estimation of the covariance matrix of the
fourth order cumulants are greatly simplified peculiar to the OFDM signals. A
measurement setup is developed to analyze the performance of the identification
method and for comparison purposes. A parametric measurement analysis is
provided depending on modulation order, signal to noise ratio, number of
symbols, and degree of freedom of the underlying test. The proposed method
outperforms statistical tests which are based on fixed thresholds or empirical
values, while a priori information requirement and complexity of the proposed
method are lower than the coherent identification techniques
All-Digital Self-interference Cancellation Technique for Full-duplex Systems
Full-duplex systems are expected to double the spectral efficiency compared
to conventional half-duplex systems if the self-interference signal can be
significantly mitigated. Digital cancellation is one of the lowest complexity
self-interference cancellation techniques in full-duplex systems. However, its
mitigation capability is very limited, mainly due to transmitter and receiver
circuit's impairments. In this paper, we propose a novel digital
self-interference cancellation technique for full-duplex systems. The proposed
technique is shown to significantly mitigate the self-interference signal as
well as the associated transmitter and receiver impairments. In the proposed
technique, an auxiliary receiver chain is used to obtain a digital-domain copy
of the transmitted Radio Frequency (RF) self-interference signal. The
self-interference copy is then used in the digital-domain to cancel out both
the self-interference signal and the associated impairments. Furthermore, to
alleviate the receiver phase noise effect, a common oscillator is shared
between the auxiliary and ordinary receiver chains. A thorough analytical and
numerical analysis for the effect of the transmitter and receiver impairments
on the cancellation capability of the proposed technique is presented. Finally,
the overall performance is numerically investigated showing that using the
proposed technique, the self-interference signal could be mitigated to ~3dB
higher than the receiver noise floor, which results in up to 76% rate
improvement compared to conventional half-duplex systems at 20dBm transmit
power values.Comment: Submitted to IEEE Transactions on Wireless Communication
Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs
Optimal power allocation for orthogonal frequency division multiplexing
(OFDM) wiretap channels with Gaussian channel inputs has already been studied
in some previous works from an information theoretical viewpoint. However,
these results are not sufficient for practical system design. One reason is
that discrete channel inputs, such as quadrature amplitude modulation (QAM)
signals, instead of Gaussian channel inputs, are deployed in current practical
wireless systems to maintain moderate peak transmission power and receiver
complexity. In this paper, we investigate the power allocation and artificial
noise design for OFDM wiretap channels with discrete channel inputs. We first
prove that the secrecy rate function for discrete channel inputs is nonconcave
with respect to the transmission power. To resolve the corresponding nonconvex
secrecy rate maximization problem, we develop a low-complexity power allocation
algorithm, which yields a duality gap diminishing in the order of
O(1/\sqrt{N}), where N is the number of subcarriers of OFDM. We then show that
independent frequency-domain artificial noise cannot improve the secrecy rate
of single-antenna wiretap channels. Towards this end, we propose a novel
time-domain artificial noise design which exploits temporal degrees of freedom
provided by the cyclic prefix of OFDM systems {to jam the eavesdropper and
boost the secrecy rate even with a single antenna at the transmitter}.
Numerical results are provided to illustrate the performance of the proposed
design schemes.Comment: 12 pages, 7 figures, accepted by IEEE Transactions on Wireless
Communications, Jan. 201
- …