3,215 research outputs found
Semi-blind adaptive beamforming for high-throughput quadrature amplitude modulation systems
A semi-blind adaptive beamforming scheme is proposed for wireless systems that employ high-throughput quadrature amplitude modulation signalling. A minimum number of training symbols, equal to the number of receiver antenna arrays elements, are first utilised to provide a rough initial least squares estimate of the beamformer's weight vector. A concurrent constant modulus algorithm and soft decision-directed scheme is then applied to adapt the beamformer. This semi-blind adaptive beamforming scheme is capable of converging fast to the minimum mean-square-error beamforming solution, as demonstrated in our simulation study
Multi-Step Knowledge-Aided Iterative ESPRIT for Direction Finding
In this work, we propose a subspace-based algorithm for DOA estimation which
iteratively reduces the disturbance factors of the estimated data covariance
matrix and incorporates prior knowledge which is gradually obtained on line. An
analysis of the MSE of the reshaped data covariance matrix is carried out along
with comparisons between computational complexities of the proposed and
existing algorithms. Simulations focusing on closely-spaced sources, where they
are uncorrelated and correlated, illustrate the improvements achieved.Comment: 7 figures. arXiv admin note: text overlap with arXiv:1703.1052
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Artificial-Noise-Aided Secure Multi-Antenna Transmission with Limited Feedback
We present an optimized secure multi-antenna transmission approach based on
artificial-noise-aided beamforming, with limited feedback from a desired
single-antenna receiver. To deal with beamformer quantization errors as well as
unknown eavesdropper channel characteristics, our approach is aimed at
maximizing throughput under dual performance constraints - a connection outage
constraint on the desired communication channel and a secrecy outage constraint
to guard against eavesdropping. We propose an adaptive transmission strategy
that judiciously selects the wiretap coding parameters, as well as the power
allocation between the artificial noise and the information signal. This
optimized solution reveals several important differences with respect to
solutions designed previously under the assumption of perfect feedback. We also
investigate the problem of how to most efficiently utilize the feedback bits.
The simulation results indicate that a good design strategy is to use
approximately 20% of these bits to quantize the channel gain information, with
the remainder to quantize the channel direction, and this allocation is largely
insensitive to the secrecy outage constraint imposed. In addition, we find that
8 feedback bits per transmit antenna is sufficient to achieve approximately 90%
of the throughput attainable with perfect feedback.Comment: to appear in IEEE Transactions on Wireless Communication
Symmetric RBF classifier for nonlinear detection in multiple-antenna aided systems
In this paper, we propose a powerful symmetric radial basis function (RBF) classifier for nonlinear detection in the so-called âoverloadedâ multiple-antenna-aided communication systems. By exploiting the inherent symmetry property of the optimal Bayesian detector, the proposed symmetric RBF classifier is capable of approaching the optimal classification performance using noisy training data. The classifier construction process is robust to the choice of the RBF width and is computationally efficient. The proposed solution is capable of providing a signal-to-noise ratio (SNR) gain in excess of 8 dB against the powerful linear minimum bit error rate (BER) benchmark, when supporting four users with the aid of two receive antennas or seven users with four receive antenna elements. Index TermsâClassification, multiple-antenna system, orthogonal forward selection, radial basis function (RBF), symmetry
Low-complexity Location-aware Multi-user Massive MIMO Beamforming for High Speed Train Communications
Massive Multiple-input Multiple-output (MIMO) adaption is one of the primary
evolving objectives for the next generation high speed train (HST)
communication system. In this paper, we consider how to design an efficient
low-complexity location-aware beamforming for the multi-user (MU) massive MIMO
system in HST scenario. We first put forward a low-complexity beamforming based
on location information, where multiple users are considered. Then, without
considering inter-beam interference, a closed-form solution to maximize the
total service competence of base station (BS) is proposed in this MU HST
scenario. Finally, we present a location-aid searching-based suboptimal
solution to eliminate the inter-beam interference and maximize the BS service
competence. Various simulations are given to exhibit the advantages of our
proposed massive MIMO beamforming method.Comment: This paper has been accepted for future publication by VTC2017-Sprin
- âŠ