7,618 research outputs found
Waveform Design for Secure SISO Transmissions and Multicasting
Wireless physical-layer security is an emerging field of research aiming at
preventing eavesdropping in an open wireless medium. In this paper, we propose
a novel waveform design approach to minimize the likelihood that a message
transmitted between trusted single-antenna nodes is intercepted by an
eavesdropper. In particular, with knowledge first of the eavesdropper's channel
state information (CSI), we find the optimum waveform and transmit energy that
minimize the signal-to-interference-plus-noise ratio (SINR) at the output of
the eavesdropper's maximum-SINR linear filter, while at the same time provide
the intended receiver with a required pre-specified SINR at the output of its
own max-SINR filter. Next, if prior knowledge of the eavesdropper's CSI is
unavailable, we design a waveform that maximizes the amount of energy available
for generating disturbance to eavesdroppers, termed artificial noise (AN),
while the SINR of the intended receiver is maintained at the pre-specified
level. The extensions of the secure waveform design problem to multiple
intended receivers are also investigated and semidefinite relaxation (SDR) -an
approximation technique based on convex optimization- is utilized to solve the
arising NP-hard design problems. Extensive simulation studies confirm our
analytical performance predictions and illustrate the benefits of the designed
waveforms on securing single-input single-output (SISO) transmissions and
multicasting
Approximate Sum-Capacity of K-user Cognitive Interference Channels with Cumulative Message Sharing
This paper considers the K user cognitive interference channel with one
primary and K-1 secondary/cognitive transmitters with a cumulative message
sharing structure, i.e cognitive transmitter knows non-causally
all messages of the users with index less than i. We propose a computable outer
bound valid for any memoryless channel. We first evaluate the sum-rate outer
bound for the high- SNR linear deterministic approximation of the Gaussian
noise channel. This is shown to be capacity for the 3-user channel with
arbitrary channel gains and the sum-capacity for the symmetric K-user channel.
Interestingly. for the K user channel having only the K th cognitive know all
the other messages is sufficient to achieve capacity i.e cognition at
transmitter 2 to K-1 is not needed. Next the sum capacity of the symmetric
Gaussian noise channel is characterized to within a constant additive and
multiplicative gap. The proposed achievable scheme for the additive gap is
based on Dirty paper coding and can be thought of as a MIMO-broadcast scheme
where only one encoding order is possible due to the message sharing structure.
As opposed to other multiuser interference channel models, a single scheme
suffices for both the weak and strong interference regimes. With this scheme
the generalized degrees of freedom (gDOF) is shown to be a function of K, in
contrast to the non cognitive case and the broadcast channel case.
Interestingly, it is show that as the number of users grows to infinity the
gDoF of the K-user cognitive interference channel with cumulative message
sharing tends to the gDoF of a broadcast channel with a K-antenna transmitter
and K single-antenna receivers. The analytical additive additive and
multiplicative gaps are a function of the number of users. Numerical
evaluations of inner and outer bounds show that the actual gap is less than the
analytical one.Comment: Journa
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Vandermonde-subspace Frequency Division Multiplexing for Two-Tiered Cognitive Radio Networks
Vandermonde-subspace frequency division multiplexing (VFDM) is an overlay
spectrum sharing technique for cognitive radio. VFDM makes use of a precoder
based on a Vandermonde structure to transmit information over a secondary
system, while keeping an orthogonal frequency division multiplexing
(OFDM)-based primary system interference-free. To do so, VFDM exploits
frequency selectivity and the use of cyclic prefixes by the primary system.
Herein, a global view of VFDM is presented, including also practical aspects
such as linear receivers and the impact of channel estimation. We show that
VFDM provides a spectral efficiency increase of up to 1 bps/Hz over cognitive
radio systems based on unused band detection. We also present some key design
parameters for its future implementation and a feasible channel estimation
protocol. Finally we show that, even when some of the theoretical assumptions
are relaxed, VFDM provides non-negligible rates while protecting the primary
system.Comment: 9 pages, accepted for publication in IEEE Transactions on
Communication
Cognitive Orthogonal Precoder for Two-tiered Networks Deployment
In this work, the problem of cross-tier interference in a two-tiered
(macro-cell and cognitive small-cells) network, under the complete spectrum
sharing paradigm, is studied. A new orthogonal precoder transmit scheme for the
small base stations, called multi-user Vandermonde-subspace frequency division
multiplexing (MU-VFDM), is proposed. MU-VFDM allows several cognitive small
base stations to coexist with legacy macro-cell receivers, by nulling the
small- to macro-cell cross-tier interference, without any cooperation between
the two tiers. This cleverly designed cascaded precoder structure, not only
cancels the cross-tier interference, but avoids the co-tier interference for
the small-cell network. The achievable sum-rate of the small-cell network,
satisfying the interference cancelation requirements, is evaluated for perfect
and imperfect channel state information at the transmitter. Simulation results
for the cascaded MU-VFDM precoder show a comparable performance to that of
state-of-the-art dirty paper coding technique, for the case of a dense cellular
layout. Finally, a comparison between MU-VFDM and a standard complete spectrum
separation strategy is proposed. Promising gains in terms of achievable
sum-rate are shown for the two-tiered network w.r.t. the traditional bandwidth
management approach.Comment: 11 pages, 9 figures, accepted and to appear in IEEE Journal on
Selected Areas in Communications: Cognitive Radio Series, 2013. Copyright
transferred to IEE
- âŠ