2,862 research outputs found
Adaptive Bit Partitioning for Multicell Intercell Interference Nulling with Delayed Limited Feedback
Base station cooperation can exploit knowledge of the users' channel state
information (CSI) at the transmitters to manage co-channel interference. Users
have to feedback CSI of the desired and interfering channels using
finite-bandwidth backhaul links. Existing codebook designs for single-cell
limited feedback can be used for multicell cooperation by partitioning the
available feedback resources between the multiple channels. In this paper, a
new feedback-bit allocation strategy is proposed, as a function of the delays
in the communication links and received signal strengths in the downlink.
Channel temporal correlation is modeled as a function of delay using the
Gauss-Markov model. Closed-form expressions for bit partitions are derived to
allocate more bits to quantize the stronger channels with smaller delays and
fewer bits to weaker channels with larger delays, assuming random vector
quantization. Cellular network simulations are used to show that the proposed
algorithm yields higher sum-rates than an equal-bit allocation technique.Comment: Submitted to IEEE Transactions on Signal Processing, July 201
Joint Wireless Information and Energy Transfer with Reduced Feedback in MIMO Interference Channels
To determine the transmission strategy for joint wireless information and
energy transfer (JWIET) in the MIMO interference channel (IFC), the information
access point (IAP) and energy access point (EAP) require the channel state
information (CSI) of their associated links to both the information-decoding
(ID) mobile stations (MSs) and energy-harvesting (EH) MSs (so-called local
CSI). In this paper, to reduce th e feedback overhead of MSs for the JWIET in
two-user MIMO IFC, we propose a Geodesic energy beamforming scheme that
requires partial CSI at the EAP. Furthermore, in the two-user MIMO IFC, it is
proved that the Geodesic energy beamforming is the optimal strategy. By adding
a rank-one constraint on the transmit signal covariance of IAP, we can further
reduce the feedback overhead to IAP by exploiting Geodesic information
beamforming. Under the rank-one constraint of IAP's transmit signal, we prove
that Geodesic information/energy beamforming approach is the optimal strategy
for JWIET in the two-user MIMO IFC. We also discuss the extension of the
proposed rank-one Geodesic information/energy beamforming strategies to general
K-user MIMO IFC. Finally, by analyzing the achievable rate-energy performance
statistically under imperfect partial CSIT, we propose an adaptive bit
allocation strategy for both EH MS and ID MS.Comment: accepted to IEEE Journal of Selected Areas in Communications (IEEE
JSAC), Special Issue on Wireless Communications Powered by Energy Harvesting
and Wireless Energy Transfe
Codebook Based Hybrid Precoding for Millimeter Wave Multiuser Systems
In millimeter wave (mmWave) systems, antenna architecture limitations make it
difficult to apply conventional fully digital precoding techniques but call for
low cost analog radio-frequency (RF) and digital baseband hybrid precoding
methods. This paper investigates joint RF-baseband hybrid precoding for the
downlink of multiuser multi-antenna mmWave systems with a limited number of RF
chains. Two performance measures, maximizing the spectral efficiency and the
energy efficiency of the system, are considered. We propose a codebook based RF
precoding design and obtain the channel state information via a beam sweep
procedure. Via the codebook based design, the original system is transformed
into a virtual multiuser downlink system with the RF chain constraint.
Consequently, we are able to simplify the complicated hybrid precoding
optimization problems to joint codeword selection and precoder design (JWSPD)
problems. Then, we propose efficient methods to address the JWSPD problems and
jointly optimize the RF and baseband precoders under the two performance
measures. Finally, extensive numerical results are provided to validate the
effectiveness of the proposed hybrid precoders.Comment: 35 pages, 9 figures, to appear in Trans. on Signal Process, 201
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …