2,908 research outputs found
Training-Embedded, Single-Symbol ML-Decodable, Distributed STBCs for Relay Networks
Recently, a special class of complex designs called Training-Embedded Complex
Orthogonal Designs (TE-CODs) has been introduced to construct single-symbol
Maximum Likelihood (ML) decodable (SSD) distributed space-time block codes
(DSTBCs) for two-hop wireless relay networks using the amplify and forward
protocol. However, to implement DSTBCs from square TE-CODs, the overhead due to
the transmission of training symbols becomes prohibitively large as the number
of relays increase. In this paper, we propose TE-Coordinate Interleaved
Orthogonal Designs (TE-CIODs) to construct SSD DSTBCs. Exploiting the block
diagonal structure of TE-CIODs, we show that, the overhead due to the
transmission of training symbols to implement DSTBCs from TE-CIODs is smaller
than that for TE-CODs. We also show that DSTBCs from TE-CIODs offer higher rate
than those from TE-CODs for identical number of relays while maintaining the
SSD and full-diversity properties.Comment: 7 pages, 2 figure
Distributed space-time block codes for two-hop wireless relay networks
Recently, the idea of space-time coding has been applied to wireless relay networks wherein a set of geographically separated relay nodes cooperate to process the received signal from the source and forward them to the destination such that the signal received at the destination appears like a Space-Time Block Code (STBC). Such STBCs (referred to as Distributed Space-Time Block Codes (DSTBCs)) when appropriately designed are known to offer spatial diversity. It is known that different classes of DSTBCs can be designed primarily depending on (i) whether the Amplify and Forward (AF) protocol or the Decode and Forward (DF) protocol is employed at the relays and (ii) whether the relay nodes are synchronized or not. In this paper, we present a survey on the problems and results associated with the design of DSTBCs for the following classes of two-hop wireless relay networks: (i) synchronous relay networks with AF protocols, (ii) asynchronous relay networks with AF protocols (iii) synchronous relay networks with DF protocols and (iv) asynchronous relay Fig. 1. Co-located MIMO channel model networks with DF protocols
Sparse Signal Processing Concepts for Efficient 5G System Design
As it becomes increasingly apparent that 4G will not be able to meet the
emerging demands of future mobile communication systems, the question what
could make up a 5G system, what are the crucial challenges and what are the key
drivers is part of intensive, ongoing discussions. Partly due to the advent of
compressive sensing, methods that can optimally exploit sparsity in signals
have received tremendous attention in recent years. In this paper we will
describe a variety of scenarios in which signal sparsity arises naturally in 5G
wireless systems. Signal sparsity and the associated rich collection of tools
and algorithms will thus be a viable source for innovation in 5G wireless
system design. We will discribe applications of this sparse signal processing
paradigm in MIMO random access, cloud radio access networks, compressive
channel-source network coding, and embedded security. We will also emphasize
important open problem that may arise in 5G system design, for which sparsity
will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
EXTRINSIC CHANNEL-LIKE FINGERPRINT EMBEDDING FOR TRANSMITTER AUTHENTICATION IN WIRELESS SYSTEMS
We present a physical-layer fingerprint-embedding scheme for wireless signals, focusing on multiple input multiple output (MIMO) and orthogonal frequency division multiplexing (OFDM) transmissions, where the fingerprint signal conveys a low capacity communication suitable for authenticating the transmission and further facilitating secure communications. Our system strives to embed the fingerprint message into the noise subspace of the channel estimates obtained by the receiver, using a number of signal spreading techniques. When side information of channel state is known and leveraged by the transmitter, the performance of the fingerprint embedding can be improved. When channel state information is not known, blind spreading techniques are applied. The fingerprint message is only visible to aware receivers who explicitly preform detection of the signal, but is invisible to receivers employing typical channel equalization. A taxonomy of overlay designs is discussed and these designs are explored through experiment using time-varying channel-state information (CSI) recorded from IEEE802.16e Mobile WiMax base stations. The performance of the fingerprint signal as received by a WiMax subscriber is demonstrated using CSI measurements derived from the downlink signal. Detection performance for the digital fingerprint message in time-varying channel conditions is also presented via simulation
- …