31 research outputs found

    Advanced index modulation techniques for future wireless networks

    Get PDF
    In the research study proposed in this Ph.D Thesis, we consider Index Modulation as a novel tool to enhance energy and spectral efficiencies for upcoming 5G networks, including wireless sensor networks and internet of things. In this vein, spatial modulation was proposed to enhance the capacity of wireless systems to partially achieve the capacity of MIMO systems but at lower cost, making it a technique that has attracted significant attention over the past few years. As such, SM schemes have been regarded as possible candidates for spectrum- and energy-efficient next generation MIMO systems. However, the implementation of the SM is also challenging because of its heavy dependence on channel characteristics, channel correlation, corrupted CSI and the need to have adequate spacing between antennas. Moreover, the SM requires multiple antennas at the transmitter which adds cost to the hardware implementation. In addition, the number of mapped bits in SM is limited by the physical size of the wireless device where only small number of antennas can be used. The switching time wasted by RF antenna switches adds to the complexity of the issue. In this Thesis, we study the drawbacks of SM in the articles indicated, namely Performance Comparison of Spatial Modulation Detectors Under Channel Impairments that is placed in the Appendix at the end of Thesis as it is a conference paper, and The Impact of Antenna Switching Time on Spatial Modulation that is put in Chapter 1. In the first article, we have shown that channel impairments have serious impacts on the BER performance and on the capacity of the SM system and that the SM is too sensitive to both imperfect and correlated channels. In the second article, we have demonstrated that the switching time defined as the time needed by the system to turn off an antenna and turn on another one, which is an inherent property of RF industrial switches used in SM systems, is in the order of nanoseconds and naturally influences the transmission rate of SM systems because of introducing systematic transmission gaps or pauses. Given the speed limitation of practical RF switches in performing transitions, antenna transition-based technologies like SM schemes are capped in terms of data rate performance. In fact, the effective data rate of SM will remain hostage to developments in industrial RF switches. This brings restrictions to the implementation and operation issues when extremely high data rates become a necessity. It is shown by the assemblage of our results that the switching time Tsw which is a requirement for transitions between antennas to happen, dictates restrictions on data rate, capacity and spectral efficiency of SM systems. Furthermore, we propose baseband non-hardware-based indexing modulation schemes based on frequency-index modulation, coherent chaotic modulation and non-coherent differential chaotic modulation schemes as potential alternatives to SM, that would also fit wireless sensor networks and internet of things applications. In this regard, we have proposed three articles. The first article which represents frequency index modulation is called Frequency Index Modulation for Low Complexity Low Energy Communication Networks and is placed in Chapter 2 of this Thesis. In this article, we explore a low complexity multi-user communication system based on frequency index modulation that suits Internet of Things (IoT) applications and we show that such a system would constitute an excellent candidate for wireless sensor applications, where it represents a simpler substitution for frequency-hopping (FH) based architectures, in which the hops carry extra bits. The third article which concerns coherent chaotic modulation is called Design of an Initial-Condition Index Chaos Shift Keying Modulation and is located in Chapter 3. In this article, an initial condition index chaos shift keying modulation is proposed. This design aims to increase the spectral and energy efficiencies to unprecedented levels. The proposed scheme exploits the initial conditions to generate different chaotic sequences to convey extra bits per transmission. In comparison to rival modulation schemes, the results obtained in the proposed work show a promising data rate boost and a competitive performance. The last article employs a non-coherent differential chaotic shift-key system named Permutation Index DCSK Modulation Technique for Secure Multi-User High-Data-Rate Communication Systems that is found in the Appendix. In this original design, where each data frame is divided into two time slots in which the reference chaotic signal is sent in the first time slot and a permuted replica of the reference signal multiplied by the modulating bit is sent in the second time slot, we target enhancing data security, energy and spectral efficiencies. Overall, in light of the high demands for bandwidth and energy efficiencies of futuristic systems, the suggested soft indexing mechanisms are successful candidates with promising results

    Noise-based Transmit Reference Modulation:A Feasibility Analysis

    Get PDF
    Wireless sensor networks (WSNs) receive huge research interest for a multitude of applications, ranging from remote monitoring applications, such as monitoring of potential forest fires, floods and air pollution, to domestic and industrial monitoring of temperature, humidity, vibration, stress, etc. In the former set of applications, a large number of nodes can be involved which are usually deployed in remote or inaccessible environments. Due to logistic and cost reasons, battery replacement is undesired. Energy-efficient radios are needed, with a power-demand so little that batteries can last the lifetime of the node or that the energy can be harvested from the environment. Coherent direct-sequence spread spectrum (DSSS) based radios are widely employed in monitoring applications, due to their overall resilience to channel impairments and robustness against interference. However, a DSSS rake receiver has stringent requirements on precise synchronization and accurate channel knowledge. To obviate the complexity of a coherent DSSS receiver, particularly for low data rate sensor networks, a DSSS scheme that has fast synchronization and possibly low power consumption, is much desired. In this regard, this thesis studies a noncoherent DSSS scheme called transmit reference (TR), which promises a simple receiver architecture and fast synchronization. In traditional TR, the modulated information signal is sent along an unmodulated reference signal, with a small time offset between them. In this thesis, we present and investigate a variant of TR, called noise-based frequency offset modulation (N-FOM), which uses pure noise as the spreading signal and a small frequency offset (instead of a time offset) to separate the information and reference signals. The detection is based on correlation of the received signal with a frequency-shifted version of itself, which collects the transmitted energy without compromising the receiver simplicity. Analytical expressions on performance metrics, supplemented by simulation results, improve understanding of the underlying mechanisms and provide insights into utility of N-FOM in low-power WSNs. In point-to-point line-of-sight (LOS) communication, it was observed that the communication scheme has a minimal utility. The energy-detector type of receiver mixes all in-band signals, which magnifies the overall noise. Particularly, the self-mixing of the transmitted signal also elevates the noise level, which increases with a further increase in the received signal energy. Therefore, for a fixed set of system parameters, the performance attains an asymptote with increasing transmission power. The phenomenon also establishes a non-monotonic relation between performance and the spreading factor. It was observed that a higher spreading factor in N-FOM is beneficial only in a high-SNR regime. After developing an understanding of the performance degrading mechanisms, few design considerations are listed. It is found that a suitable choice of the receiver front-end filter can maximize the SNR. However, the optimal filter depends on received signal and noise levels. A practically feasible – albeit suboptimal – filter is presented which gives close to the optimal performance. Next, timing synchronization is considered. The implications of synchronization errors are analyzed, and a synchronization strategy is devised. The proposed synchronization strategy has little overhead and can be easily implemented for symbol-level synchronization. The N-FOM LOS link model is extended to assess the performance degradation due to interference. Performance metrics are derived which quantify the effects of multiple-user interference, as well as that from external interferers, such as WiFi. Since the correlation operation mixes all in-band signals, the total interfering entities are quadratically increased. The research shows the vulnerability of N-FOM to interference, which makes it optimistic to operate in a crowded shared spectrum (such as the ISM 2.4\,GHz band). We also observe an upper limit on the number of mutually interfering links in a multiple access (MA) network, that can be established with an acceptable quality. The scheme is further investigated for its resilience against impairments introduced by a dense multipath environment. It is observed that despite the noise enhancement, the N-FOM system performs reasonably well in a non-line-of-sight (NLOS) communication. The detection mechanism exploits the multipath channel diversity and leads to an improved performance in a rich scattering environment. An analytical expression for outage probability is also derived. The results indicate that a healthy N-FOM link with very low outage probability can be established at a nominal value of the received bit SNR. It is also found that the choice of the frequency offset is central to the system design. Due to multiple practical implications associated with this parameter, the maximum data rate and the number of usable frequency offsets are limited, particularly in a MA NLOS communication scenario. The analysis evolves into a rule-of-thumb criterion for the data rate and the frequency offset. It is deduced that, due to its limited capability to coexist in a shared spectrum, N-FOM is not a replacement for coherent DSSS systems. The scheme is mainly suited to a low data rate network with low overall traffic, operating in an interference-free rich scattering environment. Such a niche of sensor applications could benefit from N-FOM where the design goal requires a simple detection mechanism and immunity to multipath fading

    Efficient complementary sequences-based architectures and their application to ranging measurements

    Get PDF
    Premio Extraordinario de Doctorado de la UAH en 2015En las últimas décadas, los sistemas de medición de distancias se han beneficiado de los avances en el área de las comunicaciones inalámbricas. En los sistemas basados en CDMA (Code-Division Multiple-Access), las propiedades de correlación de las secuencias empleadas juegan un papel fundamental en el desarrollo de dispositivos de medición de altas prestaciones. Debido a las sumas ideales de correlaciones aperiódicas, los conjuntos de secuencias complementarias, CSS (Complementary Sets of Sequences), son ampliamente utilizados en sistemas CDMA. En ellos, es deseable el uso de arquitecturas eficientes que permitan generar y correlar CSS del mayor número de secuencias y longitudes posibles. Por el término eficiente se hace referencia a aquellas arquitecturas que requieren menos operaciones por muestra de entrada que con una arquitectura directa. Esta tesis contribuye al desarrollo de arquitecturas eficientes de generación/correlación de CSS y derivadas, como son las secuencias LS (Loosely Synchronized) y GPC (Generalized Pairwise Complementary), que permitan aumentar el número de longitudes y/o de secuencias disponibles. Las contribuciones de la tesis pueden dividirse en dos bloques: En primer lugar, las arquitecturas eficientes de generación/correlación para CSS binarios, derivadas en trabajos previos, son generalizadas al alfabeto multinivel (secuencias con valores reales) mediante el uso de matrices de Hadamard multinivel. Este planteamiento tiene dos ventajas: por un lado el aumento del número de longitudes que pueden generarse/correlarse y la eliminación de las limitaciones de las arquitecturas previas en el número de secuencias en el conjunto. Por otro lado, bajo ciertas condiciones, los parámetros de las arquitecturas generalizadas pueden ajustarse para generar/correlar eficientemente CSS binarios de mayor número de longitudes que con las arquitecturas eficientes previas. En segundo lugar, las arquitecturas propuestas son usadas para el desarrollo de nuevos algoritmos de generación/correlación de secuencias derivadas de CSS que reducen el número de operaciones por muestra de entrada. Finalmente, se presenta la aplicación de las secuencias estudiadas en un nuevo sistema de posicionamiento local basado en Ultra-Wideband y en un sistema de posicionamiento local basado en ultrasonidos

    High-Performance Modelling and Simulation for Big Data Applications

    Get PDF
    This open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications

    Digital Communication System with High Security and High Immunity

    Get PDF
    Today, security issues are increased due to huge data transmissions over communication media such as mobile phones, TV cables, online games, Wi-Fi and satellite transmission etc. for uses such as medical, military or entertainment. This creates a challenge for government and commercial companies to keep these data transmissions secure. Traditional secure ciphers, either block ciphers such as Advanced Encryption Standard (AES) or stream ciphers, are not fast or completely secure. However, the unique properties of a chaotic system, such as structure complexity, deterministic dynamics, random output response and extreme sensitivity to the initial condition, make it motivating for researchers in the field of communication system security. These properties establish an increased relationship between chaos and cryptography that create strong and fast cipher compared to conventional algorithms, which are weak and slow ciphers. Additionally, chaotic synchronisation has sparked many studies on the application of chaos in communication security, for example, the chaotic synchronisation between two different systems in which the transmitter (master system) is driving the receiver (slave system) by its output signal. For this reason, it is essential to design a secure communication system for data transmission in noisy environments that robust to different types of attacks (such as a brute force attack). In this thesis, a digital communication system with high immunity and security, based on a Lorenz stream cipher chaotic signal, has been perfectly applied. A new cryptosystem approach based on Lorenz chaotic systems was designed for secure data transmission. The system uses a stream cipher, in which the encryption key varies continuously in a chaotic manner. Furthermore, one or more of the parameters of the Lorenz generator is controlled by an auxiliary chaotic generator for increased security. In this thesis, the two Lorenz chaotic systems are called the Main Lorenz Generator and the Auxiliary Lorenz Generator. The system was designed using the SIMULINK tool. The system performance in the presence of noise was tested, and the simulation results are provided. Then, the clock-recovery technique is presented, with real-time results of the clock recovery. The receiver demonstrated its ability to recover and lock the clock successfully. Furthermore, the technique for synchronisation between two separate FPGA boards (transmitter and receiver) is detailed, in which the master system transmits specific data to trigger a slave system in order to run synchronously. The real-time results are provided, which show the achieved synchronisation. The receiver was able to recover user data without error, and the real-time results are listed. The randomness test (NIST) results of the Lorenz chaotic signals are also given. Finally, the security analysis determined the system to have a high degree of security compared to other communication systems

    Digital Communication System with High Security and High Immunity

    Get PDF
    Today, security issues are increased due to huge data transmissions over communication media such as mobile phones, TV cables, online games, Wi-Fi and satellite transmission etc. for uses such as medical, military or entertainment. This creates a challenge for government and commercial companies to keep these data transmissions secure. Traditional secure ciphers, either block ciphers such as Advanced Encryption Standard (AES) or stream ciphers, are not fast or completely secure. However, the unique properties of a chaotic system, such as structure complexity, deterministic dynamics, random output response and extreme sensitivity to the initial condition, make it motivating for researchers in the field of communication system security. These properties establish an increased relationship between chaos and cryptography that create strong and fast cipher compared to conventional algorithms, which are weak and slow ciphers. Additionally, chaotic synchronisation has sparked many studies on the application of chaos in communication security, for example, the chaotic synchronisation between two different systems in which the transmitter (master system) is driving the receiver (slave system) by its output signal. For this reason, it is essential to design a secure communication system for data transmission in noisy environments that robust to different types of attacks (such as a brute force attack). In this thesis, a digital communication system with high immunity and security, based on a Lorenz stream cipher chaotic signal, has been perfectly applied. A new cryptosystem approach based on Lorenz chaotic systems was designed for secure data transmission. The system uses a stream cipher, in which the encryption key varies continuously in a chaotic manner. Furthermore, one or more of the parameters of the Lorenz generator is controlled by an auxiliary chaotic generator for increased security. In this thesis, the two Lorenz chaotic systems are called the Main Lorenz Generator and the Auxiliary Lorenz Generator. The system was designed using the SIMULINK tool. The system performance in the presence of noise was tested, and the simulation results are provided. Then, the clock-recovery technique is presented, with real-time results of the clock recovery. The receiver demonstrated its ability to recover and lock the clock successfully. Furthermore, the technique for synchronisation between two separate FPGA boards (transmitter and receiver) is detailed, in which the master system transmits specific data to trigger a slave system in order to run synchronously. The real-time results are provided, which show the achieved synchronisation. The receiver was able to recover user data without error, and the real-time results are listed. The randomness test (NIST) results of the Lorenz chaotic signals are also given. Finally, the security analysis determined the system to have a high degree of security compared to other communication systems

    High-Performance Modelling and Simulation for Big Data Applications

    Get PDF
    This open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications

    Special Topics in Information Technology

    Get PDF
    This open access book presents thirteen outstanding doctoral dissertations in Information Technology from the Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy. Information Technology has always been highly interdisciplinary, as many aspects have to be considered in IT systems. The doctoral studies program in IT at Politecnico di Milano emphasizes this interdisciplinary nature, which is becoming more and more important in recent technological advances, in collaborative projects, and in the education of young researchers. Accordingly, the focus of advanced research is on pursuing a rigorous approach to specific research topics starting from a broad background in various areas of Information Technology, especially Computer Science and Engineering, Electronics, Systems and Control, and Telecommunications. Each year, more than 50 PhDs graduate from the program. This book gathers the outcomes of the thirteen best theses defended in 2020-21 and selected for the IT PhD Award. Each of the authors provides a chapter summarizing his/her findings, including an introduction, description of methods, main achievements and future work on the topic. Hence, the book provides a cutting-edge overview of the latest research trends in Information Technology at Politecnico di Milano, presented in an easy-to-read format that will also appeal to non-specialists

    Special Topics in Information Technology

    Get PDF
    This open access book presents thirteen outstanding doctoral dissertations in Information Technology from the Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy. Information Technology has always been highly interdisciplinary, as many aspects have to be considered in IT systems. The doctoral studies program in IT at Politecnico di Milano emphasizes this interdisciplinary nature, which is becoming more and more important in recent technological advances, in collaborative projects, and in the education of young researchers. Accordingly, the focus of advanced research is on pursuing a rigorous approach to specific research topics starting from a broad background in various areas of Information Technology, especially Computer Science and Engineering, Electronics, Systems and Control, and Telecommunications. Each year, more than 50 PhDs graduate from the program. This book gathers the outcomes of the thirteen best theses defended in 2020-21 and selected for the IT PhD Award. Each of the authors provides a chapter summarizing his/her findings, including an introduction, description of methods, main achievements and future work on the topic. Hence, the book provides a cutting-edge overview of the latest research trends in Information Technology at Politecnico di Milano, presented in an easy-to-read format that will also appeal to non-specialists
    corecore