7,117 research outputs found

    Performance of Joint Channel and Physical Network Coding Based on Alamouti STBC

    Full text link
    This work considers the protograph-coded physical network coding (PNC) based on Alamouti space-time block coding (STBC) over Nakagami-fading two-way relay channels, in which both the two sources and relay possess two antennas. We first propose a novel precoding scheme at the two sources so as to implement the iterative decoder efficiently at the relay. We further address a simplified updating rule of the log-likelihood-ratio (LLR) in such a decoder. Based on the simplified LLR-updating rule and Gaussian approximation, we analyze the theoretical bit-error-rate (BER) of the system, which is shown to be consistent with the decoding thresholds and simulated results. Moreover, the theoretical analysis has lower computational complexity than the protograph extrinsic information transfer (PEXIT) algorithm. Consequently, the analysis not only provides a simple way to evaluate the error performance but also facilitates the design of the joint channel-and-PNC (JCNC) in wireless communication scenarios.Comment: 6 pages, 4 figures, accpete

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Wireless network coding for multi-hop relay channels

    Get PDF
    Future wireless communication systems are required to meet growing demands for high spectral e�ciency, low energy consumption and high mobility. The advent of wireless network coding (WNC) has o�ered a new opportunity to improve network throughput and transmission reliability by exploiting interference in intermediate relays. Combined with network coding and self-information cancelation, WNC for two-way relay channels (TWRCs) has come to the forefront. This dissertation focuses on exploiting WNC in multi-hop two-way relay channels (MH-TRCs). Particularly, a multi-hop wireless network coding (MH-WNC) scheme is designed for the generalized L-node K-message MH-TRC. Theoretical studies on the network throughput and performance bounds achieved by the MH-WNC scheme with di�erent relaying strategies (i.e., amplify-and-forward (AF) and compute-and-forward (CPF)) are carried out. Furthermore, by introducing di�erent numbers of transmission time intervals into the MH-WNC, a multiple-time-interval (Multi-TI) MH-WNC is proposed to determine an optimal MH-WNC which can achieve the best outage performance for all-scale MH-TRCs. Finally, this study extends the research on WNC one step forward from two-user networks to multi-user networks. An extended CPF joint with a dominated solution for maximizing the overall computation rate is proposed for the multi-way relay channel (mRC) in the last chapter. The contributions of this dissertation are multifold. First, the proposed MHWNC scheme with fixed two transmission time intervals can achieve a significantly improved network throughput compared to the non-network coding (Non-NC) scheme in the generalized L-node K-message MH-TRC. Theoretical results are derived for both multi-hop analog network coding (MH-ANC) and multi-hop compute-and-forward (MH-CPF). Moreover, both theoretical and numerical results demonstrate that the two MH-WNC schemes can be applied to different scale MH-TRCs to achieve a better outage performance compared to the conventional Non-NC scheme (i.e., MH-ANC for the non-regenerative MH-TRC with a small number of nodes, and MH-CPF for the regenerative MH-TRC with a large number of nodes.). Furthermore, a Multi-TI MH-WNC scheme is generalized with a special binary-tree model and characteristic matrix. The determined optimal MH-WNC scheme is able to provide the best outage performance and outperform the Non-NC scheme in all scale MH-TRCs. Last but not least, this dissertation provides a preliminary investigation of WNC in mRCs. The proposed dominated solution for maximizing the overall computation rate can ensure that all the nodes in the mRC successfully recover their required messages. Moreover, the extended CPF strategy is proven superior to Non-NC in the mRC with a small number of users

    Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay

    Full text link
    This paper studies the secure beamforming design in a multiple-antenna three-node system where two source nodes exchange messages with the help of an untrusted relay node. The relay acts as both an essential signal forwarder and a potential eavesdropper. Both two-phase and three-phase two-way relay strategies are considered. Our goal is to jointly optimize the source and relay beamformers for maximizing the secrecy sum rate of the two-way communications. We first derive the optimal relay beamformer structures. Then, iterative algorithms are proposed to find source and relay beamformers jointly based on alternating optimization. Furthermore, we conduct asymptotic analysis on the maximum secrecy sum-rate. Our analysis shows that when all transmit powers approach infinity, the two-phase two-way relay scheme achieves the maximum secrecy sum rate if the source beamformers are designed such that the received signals at the relay align in the same direction. This reveals an important advantage of signal alignment technique in against eavesdropping. It is also shown that if the source powers approach zero the three-phase scheme performs the best while the two-phase scheme is even worse than direct transmission. Simulation results have verified the efficiency of the secure beamforming algorithms as well as the analytical findings.Comment: 10 figures, Submitted to IEEE Transactions on Signal Processin

    Space-Time Coded Spatial Modulated Physical Layer Network Coding for Two-Way Relaying

    Full text link
    Using the spatial modulation approach, where only one transmit antenna is active at a time, we propose two transmission schemes for two-way relay channel using physical layer network coding with space time coding using Coordinate Interleaved Orthogonal Designs (CIOD's). It is shown that using two uncorrelated transmit antennas at the nodes, but using only one RF transmit chain and space-time coding across these antennas can give a better performance without using any extra resources and without increasing the hardware implementation cost and complexity. In the first transmission scheme, two antennas are used only at the relay, Adaptive Network Coding (ANC) is employed at the relay and the relay transmits a CIOD Space Time Block Code (STBC). This gives a better performance compared to an existing ANC scheme for two-way relay channel which uses one antenna each at all the three nodes. It is shown that for this scheme at high SNR the average end-to-end symbol error probability (SEP) is upper bounded by twice the SEP of a point-to-point fading channel. In the second transmission scheme, two transmit antennas are used at all the three nodes, CIOD STBC's are transmitted in multiple access and broadcast phases. This scheme provides a diversity order of two for the average end-to-end SEP with an increased decoding complexity of O(M3)\mathcal{O}(M^3) for an arbitrary signal set and O(M2M)\mathcal{O}(M^2\sqrt{M}) for square QAM signal set.Comment: 9 pages, 7 figure

    Hash-and-Forward Relaying for Two-Way Relay Channel

    Full text link
    This paper considers a communication network comprised of two nodes, which have no mutual direct communication links, communicating two-way with the aid of a common relay node (RN), also known as separated two-way relay (TWR) channel. We first recall a cut-set outer bound for the set of rates in the context of this network topology assuming full-duplex transmission capabilities. Then, we derive a new achievable rate region based on hash-and-forward (HF) relaying where the RN does not attempt to decode but instead hashes its received signal, and show that under certain channel conditions it coincides with Shannon's inner-bound for the two-way channel [1]. Moreover, for binary adder TWR channel with additive noise at the nodes and the RN we provide a detailed capacity achieving coding scheme based on structure codes.Comment: 5 pages, 2 figures, submitted to the IEEE ISIT'11 conferenc
    corecore