90 research outputs found
Downlink Precoding for Massive MIMO Systems Exploiting Virtual Channel Model Sparsity
In this paper, the problem of designing a forward link linear precoder for
Massive Multiple-Input Multiple-Output (MIMO) systems in conjunction with
Quadrature Amplitude Modulation (QAM) is addressed. First, we employ a novel
and efficient methodology that allows for a sparse representation of multiple
users and groups in a fashion similar to Joint Spatial Division and
Multiplexing. Then, the method is generalized to include Orthogonal Frequency
Division Multiplexing (OFDM) for frequency selective channels, resulting in
Combined Frequency and Spatial Division and Multiplexing, a configuration that
offers high flexibility in Massive MIMO systems. A challenge in such system
design is to consider finite alphabet inputs, especially with larger
constellation sizes such as . The proposed methodology is next
applied jointly with the complexity-reducing Per-Group Processing (PGP)
technique, on a per user group basis, in conjunction with QAM modulation and in
simulations, for constellation size up to . We show by numerical results
that the precoders developed offer significantly better performance than the
configuration with no precoder or the plain beamformer and with
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
Power allocation and linear precoding for wireless communications with finite-alphabet inputs
This dissertation proposes a new approach to maximizing data rate/throughput of practical communication system/networks through linear precoding and power allocation. First, the mutual information or capacity region is derived for finite-alphabet inputs such as phase-shift keying (PSK), pulse-amplitude modulation (PAM), and quadrature amplitude modulation (QAM) signals. This approach, without the commonly used Gaussian input assumptions, complicates the mutual information analysis and precoder design but improves performance when the designed precoders are applied to practical systems and networks. Second, several numerical optimization methods are developed for multiple-input multiple-output (MIMO) multiple access channels, dual-hop relay networks, and point-to-point MIMO systems. In MIMO multiple access channels, an iterative weighted sum rate maximization algorithm is proposed which utilizes an alternating optimization strategy and gradient descent update. In dual-hop relay networks, the structure of the optimal precoder is exploited to develop a two-step iterative algorithm based on convex optimization and optimization on the Stiefel manifold. The proposed algorithm is insensitive to initial point selection and able to achieve a near global optimal precoder solution. The gradient descent method is also used to obtain the optimal power allocation scheme which maximizes the mutual information between the source node and destination node in dual-hop relay networks. For point-to-point MIMO systems, a low complexity precoding design method is proposed, which maximizes the lower bound of the mutual information with discretized power allocation vector in a non-iterative fashion, thus reducing complexity. Finally, performances of the proposed power allocation and linear precoding schemes are evaluated in terms of both mutual information and bit error rate (BER). Numerical results show that at the same target mutual information or sum rate, the proposed approaches achieve 3-10dB gains compared to the existing methods in the medium signal-to-noise ratio region. Such significant gains are also indicated in the coded BER systems --Abstract, page iv-v
An Anti-Eavesdropping Strategy for Precoding-Aided Spatial Modulation With Rough CSI of Eve
In this paper, an anti-eavesdropping strategy is proposed for secure precoding-aided spatial modulation networks, under the assumption that the rough channel state information of eavesdropper can be obtained at the transmitter. Traditionally, artificial noise (AN) can be always projected into the null-space of the legitimate channel, however it may lead to some security loss since this strategy dispenses with a holistic consideration for secure transmissions. To reduce the computational complexity of our optimization problem, we derive a closed-form expression that is a loose bound of the approximate rate over the illegitimate channel. Then a concave maximization problem is formulated for optimizing the covariance matrix of AN. Simulation results show that our proposed low-complexity scheme performs closely to the method which directly maximizes the approximate secrecy rate expression, and harvests significant secrecy rate gains compared with the traditional null-space projection benchmark
- …