7,117 research outputs found
Performance of Joint Channel and Physical Network Coding Based on Alamouti STBC
This work considers the protograph-coded physical network coding (PNC) based
on Alamouti space-time block coding (STBC) over Nakagami-fading two-way relay
channels, in which both the two sources and relay possess two antennas. We
first propose a novel precoding scheme at the two sources so as to implement
the iterative decoder efficiently at the relay. We further address a simplified
updating rule of the log-likelihood-ratio (LLR) in such a decoder. Based on the
simplified LLR-updating rule and Gaussian approximation, we analyze the
theoretical bit-error-rate (BER) of the system, which is shown to be consistent
with the decoding thresholds and simulated results. Moreover, the theoretical
analysis has lower computational complexity than the protograph extrinsic
information transfer (PEXIT) algorithm. Consequently, the analysis not only
provides a simple way to evaluate the error performance but also facilitates
the design of the joint channel-and-PNC (JCNC) in wireless communication
scenarios.Comment: 6 pages, 4 figures, accpete
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Wireless network coding for multi-hop relay channels
Future wireless communication systems are required to meet growing demands for high spectral e�ciency, low energy consumption and high mobility. The advent of wireless network coding (WNC) has o�ered a new opportunity to improve network throughput and transmission reliability by exploiting interference in intermediate relays. Combined with network coding and self-information cancelation, WNC
for two-way relay channels (TWRCs) has come to the forefront. This dissertation focuses on exploiting WNC in multi-hop two-way relay channels (MH-TRCs). Particularly, a multi-hop wireless network coding (MH-WNC) scheme is designed for the generalized L-node K-message MH-TRC. Theoretical studies on the network throughput and performance bounds achieved by the MH-WNC scheme with di�erent relaying strategies (i.e., amplify-and-forward
(AF) and compute-and-forward (CPF)) are carried out. Furthermore, by introducing di�erent numbers of transmission time intervals into the MH-WNC, a
multiple-time-interval (Multi-TI) MH-WNC is proposed to determine an optimal MH-WNC which can achieve the best outage performance for all-scale MH-TRCs.
Finally, this study extends the research on WNC one step forward from two-user networks to multi-user networks. An extended CPF joint with a dominated solution for maximizing the overall computation rate is proposed for the multi-way
relay channel (mRC) in the last chapter. The contributions of this dissertation are multifold. First, the proposed MHWNC scheme with fixed two transmission time intervals can achieve a significantly improved network throughput compared to the non-network coding (Non-NC) scheme in the generalized L-node K-message MH-TRC. Theoretical results
are derived for both multi-hop analog network coding (MH-ANC) and multi-hop compute-and-forward (MH-CPF). Moreover, both theoretical and numerical results demonstrate that the two MH-WNC schemes can be applied to different scale MH-TRCs to achieve a better outage performance compared to the conventional Non-NC scheme (i.e., MH-ANC for the non-regenerative MH-TRC with a small number of nodes, and MH-CPF for the regenerative MH-TRC with a large number of nodes.). Furthermore, a Multi-TI MH-WNC scheme is generalized with a special binary-tree model and characteristic matrix. The determined optimal MH-WNC scheme is able to provide the best outage performance and
outperform the Non-NC scheme in all scale MH-TRCs. Last but not least, this dissertation provides a preliminary investigation of WNC in mRCs. The proposed dominated solution for maximizing the overall computation rate can ensure that all the nodes in the mRC successfully recover their required messages. Moreover, the extended CPF strategy is proven superior to Non-NC in the mRC with a
small number of users
Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay
This paper studies the secure beamforming design in a multiple-antenna
three-node system where two source nodes exchange messages with the help of an
untrusted relay node. The relay acts as both an essential signal forwarder and
a potential eavesdropper. Both two-phase and three-phase two-way relay
strategies are considered. Our goal is to jointly optimize the source and relay
beamformers for maximizing the secrecy sum rate of the two-way communications.
We first derive the optimal relay beamformer structures. Then, iterative
algorithms are proposed to find source and relay beamformers jointly based on
alternating optimization. Furthermore, we conduct asymptotic analysis on the
maximum secrecy sum-rate. Our analysis shows that when all transmit powers
approach infinity, the two-phase two-way relay scheme achieves the maximum
secrecy sum rate if the source beamformers are designed such that the received
signals at the relay align in the same direction. This reveals an important
advantage of signal alignment technique in against eavesdropping. It is also
shown that if the source powers approach zero the three-phase scheme performs
the best while the two-phase scheme is even worse than direct transmission.
Simulation results have verified the efficiency of the secure beamforming
algorithms as well as the analytical findings.Comment: 10 figures, Submitted to IEEE Transactions on Signal Processin
Space-Time Coded Spatial Modulated Physical Layer Network Coding for Two-Way Relaying
Using the spatial modulation approach, where only one transmit antenna is
active at a time, we propose two transmission schemes for two-way relay channel
using physical layer network coding with space time coding using Coordinate
Interleaved Orthogonal Designs (CIOD's). It is shown that using two
uncorrelated transmit antennas at the nodes, but using only one RF transmit
chain and space-time coding across these antennas can give a better performance
without using any extra resources and without increasing the hardware
implementation cost and complexity. In the first transmission scheme, two
antennas are used only at the relay, Adaptive Network Coding (ANC) is employed
at the relay and the relay transmits a CIOD Space Time Block Code (STBC). This
gives a better performance compared to an existing ANC scheme for two-way relay
channel which uses one antenna each at all the three nodes. It is shown that
for this scheme at high SNR the average end-to-end symbol error probability
(SEP) is upper bounded by twice the SEP of a point-to-point fading channel. In
the second transmission scheme, two transmit antennas are used at all the three
nodes, CIOD STBC's are transmitted in multiple access and broadcast phases.
This scheme provides a diversity order of two for the average end-to-end SEP
with an increased decoding complexity of for an arbitrary
signal set and for square QAM signal set.Comment: 9 pages, 7 figure
Hash-and-Forward Relaying for Two-Way Relay Channel
This paper considers a communication network comprised of two nodes, which
have no mutual direct communication links, communicating two-way with the aid
of a common relay node (RN), also known as separated two-way relay (TWR)
channel.
We first recall a cut-set outer bound for the set of rates in the context of
this network topology assuming full-duplex transmission capabilities. Then, we
derive a new achievable rate region based on hash-and-forward (HF) relaying
where the RN does not attempt to decode but instead hashes its received signal,
and show that under certain channel conditions it coincides with Shannon's
inner-bound for the two-way channel [1]. Moreover, for binary adder TWR channel
with additive noise at the nodes and the RN we provide a detailed capacity
achieving coding scheme based on structure codes.Comment: 5 pages, 2 figures, submitted to the IEEE ISIT'11 conferenc
- …