62,789 research outputs found
Distributed video coding for wireless video sensor networks: a review of the state-of-the-art architectures
Distributed video coding (DVC) is a relatively new video coding architecture originated from two fundamental theorems namely, Slepian–Wolf and Wyner–Ziv. Recent research developments have made DVC attractive for applications in the emerging domain of wireless video sensor networks (WVSNs). This paper reviews the state-of-the-art DVC architectures with a focus on understanding their opportunities and gaps in addressing the operational requirements and application needs of WVSNs
Lecture Notes on Network Information Theory
These lecture notes have been converted to a book titled Network Information
Theory published recently by Cambridge University Press. This book provides a
significantly expanded exposition of the material in the lecture notes as well
as problems and bibliographic notes at the end of each chapter. The authors are
currently preparing a set of slides based on the book that will be posted in
the second half of 2012. More information about the book can be found at
http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of
the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/
Differential modulation for two-way wireless communications: a perspective of differential network coding at the physical layer
This work considers two-way relay channels (TWRC), where two terminals transmit simultaneously to each other with the help of a relay node. For single antenna systems, we propose several new transmission schemes for both amplify-and-forward (AF) protocol and decode-and-forward (DF) protocol where the channel state information is not required. These new schemes are the counterpart of the traditional noncoherent detection or differential detection in point-to-point communications. Differential modulation design for TWRC is challenging because the received signal is a mixture of the signals from both source terminals. We derive maximum likelihood (ML) detectors for both AF and DF protocols, where the latter can be considered as performing differential network coding at the physical layer. As the exact ML detector is prohibitively complex, we propose several suboptimal alternatives including decision feedback detectors and prediction-based detectors. All these strategies work well as evidenced by the simulation results. The proposed protocols are especially useful when the required average data rate is high. In addition, we extend the protocols to the multiple-antenna case and provide the design criterion of the differential unitary space time modulation (DUSTM) for TWRC
Communicating over Filter-and-Forward Relay Networks with Channel Output Feedback
Relay networks aid in increasing the rate of communication from source to
destination. However, the capacity of even a three-terminal relay channel is an
open problem. In this work, we propose a new lower bound for the capacity of
the three-terminal relay channel with destination-to-source feedback in the
presence of correlated noise. Our lower bound improves on the existing bounds
in the literature. We then extend our lower bound to general relay network
configurations using an arbitrary number of filter-and-forward relay nodes.
Such network configurations are common in many multi-hop communication systems
where the intermediate nodes can only perform minimal processing due to limited
computational power. Simulation results show that significant improvements in
the achievable rate can be obtained through our approach. We next derive a
coding strategy (optimized using post processed signal-to-noise ratio as a
criterion) for the three-terminal relay channel with noisy channel output
feedback for two transmissions. This coding scheme can be used in conjunction
with open-loop codes for applications like automatic repeat request (ARQ) or
hybrid-ARQ.Comment: 15 pages, 8 figures, to appear in IEEE Transactions on Signal
Processin
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …