1,338 research outputs found
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Multipair Full-Duplex Relaying with Massive Arrays and Linear Processing
We consider a multipair decode-and-forward relay channel, where multiple
sources transmit simultaneously their signals to multiple destinations with the
help of a full-duplex relay station. We assume that the relay station is
equipped with massive arrays, while all sources and destinations have a single
antenna. The relay station uses channel estimates obtained from received pilots
and zero-forcing (ZF) or maximum-ratio combining/maximum-ratio transmission
(MRC/MRT) to process the signals. To reduce significantly the loop interference
effect, we propose two techniques: i) using a massive receive antenna array; or
ii) using a massive transmit antenna array together with very low transmit
power at the relay station. We derive an exact achievable rate in closed-form
for MRC/MRT processing and an analytical approximation of the achievable rate
for ZF processing. This approximation is very tight, especially for large
number of relay station antennas. These closed-form expressions enable us to
determine the regions where the full-duplex mode outperforms the half-duplex
mode, as well as, to design an optimal power allocation scheme. This optimal
power allocation scheme aims to maximize the energy efficiency for a given sum
spectral efficiency and under peak power constraints at the relay station and
sources. Numerical results verify the effectiveness of the optimal power
allocation scheme. Furthermore, we show that, by doubling the number of
transmit/receive antennas at the relay station, the transmit power of each
source and of the relay station can be reduced by 1.5dB if the pilot power is
equal to the signal power, and by 3dB if the pilot power is kept fixed, while
maintaining a given quality-of-service
Interference Alignment for Cognitive Radio Communications and Networks: A Survey
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).Interference alignment (IA) is an innovative wireless transmission strategy that has shown to be a promising technique for achieving optimal capacity scaling of a multiuser interference channel at asymptotically high-signal-to-noise ratio (SNR). Transmitters exploit the availability of multiple signaling dimensions in order to align their mutual interference at the receivers. Most of the research has focused on developing algorithms for determining alignment solutions as well as proving interference alignment’s theoretical ability to achieve the maximum degrees of freedom in a wireless network. Cognitive radio, on the other hand, is a technique used to improve the utilization of the radio spectrum by opportunistically sensing and accessing unused licensed frequency spectrum, without causing harmful interference to the licensed users. With the increased deployment of wireless services, the possibility of detecting unused frequency spectrum becomes diminished. Thus, the concept of introducing interference alignment in cognitive radio has become a very attractive proposition. This paper provides a survey of the implementation of IA in cognitive radio under the main research paradigms, along with a summary and analysis of results under each system model.Peer reviewe
Resource Allocation for Outdoor-to-Indoor Multicarrier Transmission with Shared UE-side Distributed Antenna Systems
In this paper, we study the resource allocation algorithm design for downlink
multicarrier transmission with a shared user equipment (UE)-side distributed
antenna system (SUDAS) which utilizes both licensed and unlicensed frequency
bands for improving the system throughput. The joint UE selection and
transceiver processing matrix design is formulated as a non-convex optimization
problem for the maximization of the end-to-end system throughput (bits/s). In
order to obtain a tractable resource allocation algorithm, we first show that
the optimal transmitter precoding and receiver post-processing matrices jointly
diagonalize the end-to-end communication channel. Subsequently, the
optimization problem is converted to a scalar optimization problem for multiple
parallel channels, which is solved by using an asymptotically optimal iterative
algorithm. Simulation results illustrate that the proposed resource allocation
algorithm for the SUDAS achieves an excellent system performance and provides a
spatial multiplexing gain for single-antenna UEs.Comment: accepted for publication at the IEEE Vehicular Technology Conference
(VTC) Spring, Glasgow, Scotland, UK, May 201
- …