950 research outputs found
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks
By taking a variety of realistic hardware imperfections into consideration,
we propose an optimal power allocation (OPA) strategy to maximize the
instantaneous secrecy rate of a cooperative wireless network comprised of a
source, a destination and an untrusted amplify-and-forward (AF) relay. We
assume that either the source or the destination is equipped with a large-scale
multiple antennas (LSMA) system, while the rest are equipped with a single
antenna. To prevent the untrusted relay from intercepting the source message,
the destination sends an intended jamming noise to the relay, which is referred
to as destination-based cooperative jamming (DBCJ). Given this system model,
novel closed-form expressions are presented in the high signal-to-noise ratio
(SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage
probability (SOP). We further improve the secrecy performance of the system by
optimizing the associated hardware design. The results reveal that by
beneficially distributing the tolerable hardware imperfections across the
transmission and reception radio-frequency (RF) front ends of each node, the
system's secrecy rate may be improved. The engineering insight is that equally
sharing the total imperfections at the relay between the transmitter and the
receiver provides the best secrecy performance. Numerical results illustrate
that the proposed OPA together with the most appropriate hardware design
significantly increases the secrecy rate.Comment: 29 pages, 7 figures, Submitted to IEEE Transactions on Wireless
Communication
Beacon-Assisted Spectrum Access with Cooperative Cognitive Transmitter and Receiver
Spectrum access is an important function of cognitive radios for detecting
and utilizing spectrum holes without interfering with the legacy systems. In
this paper we propose novel cooperative communication models and show how
deploying such cooperations between a pair of secondary transmitter and
receiver assists them in identifying spectrum opportunities more reliably.
These cooperations are facilitated by dynamically and opportunistically
assigning one of the secondary users as a relay to assist the other one which
results in more efficient spectrum hole detection. Also, we investigate the
impact of erroneous detection of spectrum holes and thereof missing
communication opportunities on the capacity of the secondary channel. The
capacity of the secondary users with interference-avoiding spectrum access is
affected by 1) how effectively the availability of vacant spectrum is sensed by
the secondary transmitter-receiver pair, and 2) how correlated are the
perceptions of the secondary transmitter-receiver pair about network spectral
activity. We show that both factors are improved by using the proposed
cooperative protocols. One of the proposed protocols requires explicit
information exchange in the network. Such information exchange in practice is
prone to wireless channel errors (i.e., is imperfect) and costs bandwidth loss.
We analyze the effects of such imperfect information exchange on the capacity
as well as the effect of bandwidth cost on the achievable throughput. The
protocols are also extended to multiuser secondary networks.Comment: 36 pages, 6 figures, To appear in IEEE Transaction on Mobile
Computin
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks
CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA) system, while the rest are equipped with a single-antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming (DBCJ). Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP). We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency (RF) front ends of each node, the system & #x2019;s secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate
Energy efficiency and interference management in long term evolution-advanced networks.
Doctoral Degree. University of KwaZulu-Natal, Durban.Cellular networks are continuously undergoing fast extraordinary evolution to overcome
technological challenges. The fourth generation (4G) or Long Term Evolution-Advanced
(LTE-Advanced) networks offer improvements in performance through increase in network density,
while allowing self-organisation and self-healing. The LTE-Advanced architecture is heterogeneous,
consisting of different radio access technologies (RATs), such as macrocell, smallcells, cooperative
relay nodes (RNs), having various capabilities, and coexisting in the same geographical coverage
area. These network improvements come with different challenges that affect users’ quality of
service (QoS) and network performance. These challenges include; interference management, high
energy consumption and poor coverage of marginal users. Hence, developing mitigation schemes for
these identified challenges is the focus of this thesis.
The exponential growth of mobile broadband data usage and poor networks’ performance along
the cell edges, result in a large increase of the energy consumption for both base stations (BSs) and
users. This due to improper RN placement or deployment that creates severe inter-cell and intracell
interferences in the networks. It is therefore, necessary to investigate appropriate RN placement
techniques which offer efficient coverage extension while reducing energy consumption and mitigating
interference in LTE-Advanced femtocell networks. This work proposes energy efficient and optimal
RN placement (EEORNP) algorithm based on greedy algorithm to assure improved and effective
coverage extension. The performance of the proposed algorithm is investigated in terms of coverage
percentage and number of RN needed to cover marginalised users and found to outperform other RN
placement schemes.
Transceiver design has gained importance as one of the effective tools of interference
management. Centralised transceiver design techniques have been used to improve network
performance for LTE-Advanced networks in terms of mean square error (MSE), bit error rate (BER)
and sum-rate. The centralised transceiver design techniques are not effective and computationally
feasible for distributed cooperative heterogeneous networks, the systems considered in this thesis.
This work proposes decentralised transceivers design based on the least-square (LS) and minimum MSE (MMSE) pilot-aided channel estimations for interference management in uplink
LTE-Advanced femtocell networks. The decentralised transceiver algorithms are designed for the
femtocells, the macrocell user equipments (MUEs), RNs and the cell edge macrocell UEs (CUEs) in
the half-duplex cooperative relaying systems. The BER performances of the proposed algorithms
with the effect of channel estimation are investigated.
Finally, the EE optimisation is investigated in half-duplex multi-user multiple-input
multiple-output (MU-MIMO) relay systems. The EE optimisation is divided into sub-optimal EE
problems due to the distributed architecture of the MU-MIMO relay systems. The decentralised
approach is employed to design the transceivers such as MUEs, CUEs, RN and femtocells for the
different sub-optimal EE problems. The EE objective functions are formulated as convex
optimisation problems subject to the QoS and transmit powers constraints in case of perfect channel
state information (CSI). The non-convexity of the formulated EE optimisation problems is
surmounted by introducing the EE parameter substractive function into each proposed algorithms.
These EE parameters are updated using the Dinkelbach’s algorithm. The EE optimisation of the
proposed algorithms is achieved after finding the optimal transceivers where the unknown
interference terms in the transmit signals are designed with the zero-forcing (ZF) assumption and
estimation errors are added to improve the EE performances. With the aid of simulation results, the
performance of the proposed decentralised schemes are derived in terms of average EE evaluation
and found to be better than existing algorithms
- …