90 research outputs found

    Downlink Precoding for Massive MIMO Systems Exploiting Virtual Channel Model Sparsity

    Full text link
    In this paper, the problem of designing a forward link linear precoder for Massive Multiple-Input Multiple-Output (MIMO) systems in conjunction with Quadrature Amplitude Modulation (QAM) is addressed. First, we employ a novel and efficient methodology that allows for a sparse representation of multiple users and groups in a fashion similar to Joint Spatial Division and Multiplexing. Then, the method is generalized to include Orthogonal Frequency Division Multiplexing (OFDM) for frequency selective channels, resulting in Combined Frequency and Spatial Division and Multiplexing, a configuration that offers high flexibility in Massive MIMO systems. A challenge in such system design is to consider finite alphabet inputs, especially with larger constellation sizes such as M≥16M\geq 16. The proposed methodology is next applied jointly with the complexity-reducing Per-Group Processing (PGP) technique, on a per user group basis, in conjunction with QAM modulation and in simulations, for constellation size up to M=64M=64. We show by numerical results that the precoders developed offer significantly better performance than the configuration with no precoder or the plain beamformer and with M≥16M\geq 16

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision

    Power allocation and linear precoding for wireless communications with finite-alphabet inputs

    Get PDF
    This dissertation proposes a new approach to maximizing data rate/throughput of practical communication system/networks through linear precoding and power allocation. First, the mutual information or capacity region is derived for finite-alphabet inputs such as phase-shift keying (PSK), pulse-amplitude modulation (PAM), and quadrature amplitude modulation (QAM) signals. This approach, without the commonly used Gaussian input assumptions, complicates the mutual information analysis and precoder design but improves performance when the designed precoders are applied to practical systems and networks. Second, several numerical optimization methods are developed for multiple-input multiple-output (MIMO) multiple access channels, dual-hop relay networks, and point-to-point MIMO systems. In MIMO multiple access channels, an iterative weighted sum rate maximization algorithm is proposed which utilizes an alternating optimization strategy and gradient descent update. In dual-hop relay networks, the structure of the optimal precoder is exploited to develop a two-step iterative algorithm based on convex optimization and optimization on the Stiefel manifold. The proposed algorithm is insensitive to initial point selection and able to achieve a near global optimal precoder solution. The gradient descent method is also used to obtain the optimal power allocation scheme which maximizes the mutual information between the source node and destination node in dual-hop relay networks. For point-to-point MIMO systems, a low complexity precoding design method is proposed, which maximizes the lower bound of the mutual information with discretized power allocation vector in a non-iterative fashion, thus reducing complexity. Finally, performances of the proposed power allocation and linear precoding schemes are evaluated in terms of both mutual information and bit error rate (BER). Numerical results show that at the same target mutual information or sum rate, the proposed approaches achieve 3-10dB gains compared to the existing methods in the medium signal-to-noise ratio region. Such significant gains are also indicated in the coded BER systems --Abstract, page iv-v

    An Anti-Eavesdropping Strategy for Precoding-Aided Spatial Modulation With Rough CSI of Eve

    Get PDF
    In this paper, an anti-eavesdropping strategy is proposed for secure precoding-aided spatial modulation networks, under the assumption that the rough channel state information of eavesdropper can be obtained at the transmitter. Traditionally, artificial noise (AN) can be always projected into the null-space of the legitimate channel, however it may lead to some security loss since this strategy dispenses with a holistic consideration for secure transmissions. To reduce the computational complexity of our optimization problem, we derive a closed-form expression that is a loose bound of the approximate rate over the illegitimate channel. Then a concave maximization problem is formulated for optimizing the covariance matrix of AN. Simulation results show that our proposed low-complexity scheme performs closely to the method which directly maximizes the approximate secrecy rate expression, and harvests significant secrecy rate gains compared with the traditional null-space projection benchmark
    • …
    corecore