13 research outputs found
Method of iterative single-channel blind separation for qpsk signals
A method for single-channel blind separation of two QPSK (quadrature phase shift keying) signals is proposed. The method is based on the iterative maximization of a posteriori probability for mixture's components. The relations for a posteriori probabilities are derived and on its basis the iterative algorithm for the estimation of mixture's components is developed. The algorithm for the estimation of channel parameters (amplitudes, phases, time delays) is also developed. The effectiveness of method is demonstrated for various noise levels and time diversities between channels. The proposed parameters’ estimation procedure provides significant reduction of bit error rate (BER) over the case of unknown parameters.Запропоновано метод одноканального сліпого розділення двох сигналів з квадратурно-фазовою маніпуляцією (QPSK). Метод базується на ітеративному оцінюванні компонентів суміші за принципом максимізації апостеріорної ймовірності. Отримані формули для відповідних апостеріорних ймовірностей та на їх основі розроблено алгоритм оцінювання компонентів суміші. Також розроблено алгоритм оцінювання параметрів каналу (амплітуд, фаз і часових затримок). Ефективність методу перевірена при різних рівнях шуму та часового рознесення між каналами. Розроблена процедура оцінювання параметрів забезпечує суттєве скорочення бітової похибки (BER) у порівнянні з випадком невідомих параметрів
Sparse Signal Processing Concepts for Efficient 5G System Design
As it becomes increasingly apparent that 4G will not be able to meet the
emerging demands of future mobile communication systems, the question what
could make up a 5G system, what are the crucial challenges and what are the key
drivers is part of intensive, ongoing discussions. Partly due to the advent of
compressive sensing, methods that can optimally exploit sparsity in signals
have received tremendous attention in recent years. In this paper we will
describe a variety of scenarios in which signal sparsity arises naturally in 5G
wireless systems. Signal sparsity and the associated rich collection of tools
and algorithms will thus be a viable source for innovation in 5G wireless
system design. We will discribe applications of this sparse signal processing
paradigm in MIMO random access, cloud radio access networks, compressive
channel-source network coding, and embedded security. We will also emphasize
important open problem that may arise in 5G system design, for which sparsity
will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces
Ефективна демодуляція та ідентифікація сигналів із фазовою маніпуляцією у каналах із несприятливими умовами радіоприймання
Круглик О. С. Ефективна демодуляція та ідентифікація сигналів із фазовою
маніпуляцією у каналах із несприятливими умовами радіоприймання. -
Кваліфікаційна наукова праця на правах рукопису.
Дисертація на здобуття наукового ступеня доктора філософії за
спеціальністю 172 «Телекомунікації та радіотехніка» (17 - Електроніка та
телекомунікації). Національний технічний університет України «Київський
політехнічний інститут імені Ігоря Сікорського», Київ, 2022.
Розвиток цифрового зв'язку породжує необхідність розробки
високошвидкісних, ресурсномістких систем телекомунікаційних систем і більш
ефективних методів використання частотного ресурсу. Новітні технології зв’язку
із розширенням сфери їх використання одночасно із новими можливостями та
перевагами, ускладнюють завдання синхронізації та подальшої обробки даних
приймачем. Крім того, в каналах з несприятливими умовами радіоприймання, для
яких характерна швидка зміна параметрів сигналу внаслідок часового
розсіювання і допплерівського розширення спектра сигналів та невідомими
характеристики каналу передачі, виникають ситуації, коли більшість модемів не
дозволяють забезпечити якісний прийом сигналу. Тому ключовим завданням на
шляху створення нових систем цифрового радіозв’язку є розробка більш
ефективних та більш стійких до несприятливих умов приймання методів цифрової
синхронізації. При цьому головну роль відіграють системи із використанням
фазової маніпуляції сигналу, які є найбільш поширеними та, відповідно, найбільш
практично важливими.
В дисертаційній роботі розкрито поняття несприятливих умов
радіоприймання, які найбільше характерні для приймання сигналу в так званій
«третій точці» прийому в завданнях кооперативної ретрансляції та
радіомоніторингу. Розглянуто основні технології мультиплексування при
передаванні сигналів на фізичному рівні в безпровідному цифровому зв’язку та
показано залежність вибору методу синхронізації від схеми мультиплексування,
що використовується в конкретній системі зв’язку. Розглянуто спосіб
ефективного використання частотного ресурсу за рахунок використання
технології Carrier-in-Carrier. Проведено короткий аналіз та опис відомих способів
передавання та розділення сигналів із суми за технологією Carrier-in-Carrier.
Проведено аналітичний огляд популярних методів ідентифікації та демодуляції
сигналів із фазовою маніпуляцією, а також обґрунтовано необхідність досліджень
та розробки нових алгоритмів ідентифікації і синхронізації для закриття потреб в
сучасних сферах використання безпровідного зв’язку.
Запропоновано гібридний метод демодуляції сигналів, який поєднує
алгоритми прямого оцінювання параметрів сигналу (feedforward) з подальшою
синхронізацією параметрів за схемами зі зворотним зв'язком (feedback).
Початкова оцінка зміщення частоти-носія, фази та часової затримки сигналу
виконується по відомому пілот-сигналу. Потім отримані оцінки застосовуються
для ініціалізації схем зі зворотним зв’язком для миттєвого входу у режим
стеження. Проведено розрахунок оптимальних параметрів петлевих фільтрів для
підсистем фазо-частотної та часової синхронізації. Виконано порівнювальне
моделювання відомих традиційних методів демодуляції та гібридного методу на
прикладі сигналів з фазовою маніпуляцією, таких як QPSK, 8PSK, 16APSK та
32APSK. Отримані результати підтверджують, що в умовах швидкої зміни
параметрів сигналу гібридний алгоритм забезпечує мінімальне значення бітової
похибки в залежності від SNR у порівнянні з традиційними методами, які
засновані окремо на схемах синхронізації feedback або feedforward.
Запропоноване гібридне поєднання алгоритмів feedback і feedforward дозволило
застосовувати алгоритми зі зворотним зв’язком до сигналів з пакетним режимом
передавання даних. Розглянутий підхід до синхронізації можна також
використовувати для сигналів із іншими видами фазової маніпуляції.
Досліджено сучасні алгоритми фреймової синхронізації для стандарту
супутникового зв'язку DVB-S2. Робота підсистеми фреймової синхронізації з
великими зміщеннями частоти-носія сигналу є основною перевагою різницевих
методів обчислення кореляції над класичним розрахунком крос-кореляції.
Використання різницевих методів дає можливість відмовитись від початкової
оцінки зміщення частоти-носія і пришвидшити реєстрацію модему зв’язку.
Запропоновано алгоритм із адаптивним порогом, який засновано на використанні
різницевої кореляції сигналів. Особливістю представленого методу є те, що зі
зміною рівня вхідного сигналу поріг для прийняття рішення також змінюється
адаптивно, що дозволяє відмовитися на даній стадії обробки сигналу від системи
автоматичного регулювання потужності. Проведено порівняльне моделювання
запропонованого методу фреймової синхронізації із відомими методами, які
засновані на обчисленні різницевої кореляції, результати отриманих
характеристик ймовірності пропуску від співвідношення сигнал/шум показали
перевагу запропонованого алгоритму над відомими методами. Також розглянуті
шляхи щодо практичної реалізації даного алгоритму на елементній базі FPGA.
Зокрема, був використаний апроксимуючий метод для розрахунку модуля
комплексного числа, імплементація якого легко виконується на логічних
елементах кристала FPGA без втрати швидкодії алгоритму в цілому.
Введено новий підхід до демодуляції сигналів на основі методів
корпускулярної фільтрації. Корпускулярна (або багаточасткова, particle)
фільтрація є ефективним засобом вирішення нелінійних та негаусівських задач
теорії статистичного оцінювання. Основним принципом корпускулярної
фільтрації є апроксимація розподілу невідомих параметрів за допомогою
дискретного набору корпускул та пов'язаних з ними вагових коефіцієнтів.
Сформульовано модель простору станів сигналу спостереження з урахуванням
динаміки оновлення параметрів каналу. Проведено порівняльний аналіз із
відомими методами демодуляції на прикладі сигналів із фазовою маніпуляцією.
Показано, що при достатній кількості корпускул, ефективність демодуляції, а
саме забезпечення мінімальної бітової похибки (BER), може бути покращена
шляхом застосування методів корпускулярної фільтрації при низьких
співвідношеннях сигнал/шум на фоні негаусівського шуму.
Розроблено метод детектування версії стандарту DVB-S2/S2X із
використанням запропонованих методів синхронізації і декодування службової
інформації фізичного рівня. Обидві версії стандарту мають майже однакову
структуру на фізичному рівні. Подібність сигналів фізичного рівня призводить,
наприклад, до того, що при невірному налаштуванні частоти, приймачем DVB-S2
може прийматися сигнал стандарту DVB-S2X. Детектор складається із систем
кадрової синхронізації, демодулятора і декодера поля PLSCODE. Запропоновано
формули розрахунку біт поля PLSCODE і декодування службової інформації
відповідно для стандартів широкосмугового оповіщення DVB-S2 та DVB-S2X.
Представлений детектор дозволяє визначити до якої ревізії належить переданий
сигнал та визначити параметри фрейму. Розроблено програмну модель описаного
методу. Виконано експериментальні розрахунки ROC кривої та ймовірності
пропуску від співвідношення сигнал/шум. Отримані результати моделювання
показують високу ефективність запропонованого методу детектування навіть при
негативних співвідношеннях сигнал/шум.
Також в роботі пропонується метод ідентифікації сигналів, які передаються
за технологією Carrier-in-Carrier із використанням QPSK модуляції. Метод
базується на розрахунку кумулянтів четвертого порядку для виявлення змін в
формі сигнального сузір’я, які характерні для сигналів типу Carrier-in-Carrier.
Відповідно до методології робочих характеристик приймача (ROC) знайдено
порогове значення для правила прийняття рішень. Встановлено, що
запропонований метод забезпечує коректне виявлення суми сигналів QPSK для
широкого діапазону співвідношень сигнал/шум, різних амплітуд сигналів із суми,
а також для різних смуг пропускання змішаних сигналів. Отримані результати
свідчать про високу ефективність запропонованого методу виявлення. Також
показана перевага запропонованого методу виявлення перед методом «радіусів».Kruhlyk O. S. Efficient demodulation and identification of signals with phase
manipulation in channels with unfavorable radio reception conditions. - Qualifying
scientific work on manuscript rights.
Thesis for Doctor’s of Philosophy degree by specialty 172 "Telecommunications
and radio engineering" (17 - Electronics and telecommunications). National Technical
University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Kyiv, 2022.
The development of digital communication creates the need to develop highspeed, resource-intensive telecommunication systems and more efficient methods of
using frequency resources. The latest communication technologies with the expansion
of the scope of their use at the same time with new opportunities and advantages
complicate the tasks of synchronization and further processing of data by the receiver.
In addition, in channels with unfavorable radio reception conditions, which are
characterized by a rapid change in signal parameters due to time dispersion and Doppler
broadening of the signal spectrum and unknown characteristics of the transmission
channel, situations arise when most modems do not allow to ensure high-quality signal
reception. Therefore, a key task in the way of creating new digital radio communication
systems is the development of more efficient and more resistant to unfavorable
reception conditions of digital synchronization methods. At the same time, the main role
is played by systems using phase manipulation of the signal, which are the most
common and, accordingly, the most practically important.
The concept of unfavorable radio reception conditions, which are most
characteristic for signal reception at the so-called "third point" of reception in the tasks
of cooperative relaying and radio monitoring is revealed in the dissertation. The basic
technologies of multiplexing during the transmission of signals at the physical level in
wireless digital communication are considered and the dependence of the choice of the
synchronization method on the multiplexing scheme used in a specific communication
system is shown. The method of efficient use of the frequency resource due to the use of
"Carrier-in-Carrier" technology is considered. A brief analysis and description of known
methods of transmission and separation of sum signals using Carrier-in-Carrier
technology is carried out. An analytical review of popular methods of identification and
demodulation of signals with phase manipulation was conducted, as well as the need for
research and development of new identification and synchronization algorithms to meet
the needs of modern areas of wireless communication was substantiated.
A hybrid method of signal demodulation is proposed, which combines algorithms
for direct estimation of signal parameters (feedforward) with further synchronization of
parameters according to schemes with feedback. The initial estimation of the offset of
the carrier frequency, phase and time delay of the signal is performed on a known
unique word. The obtained estimates are then used to initialize the feedback circuits to
instantly enter tracking mode. The optimal parameters of loop filters for phasefrequency and time synchronization subsystems were calculated. A comparative
simulation of well-known traditional demodulation methods and the hybrid method is
performed on the example of signals with phase manipulation, such as QPSK, 8PSK,
16APSK and 32APSK. The obtained results confirm that in conditions of rapid changes
in signal parameters, the hybrid algorithm provides the minimum value of the bit error
depending on the SNR in comparison with traditional methods, which are based
separately on feedback or feedforward synchronization schemes. The proposed hybrid
combination of feedback and feedforward algorithms made it possible to apply feedback
algorithms to signals with a packet data transmission mode. The considered approach to
synchronization can also be used for signals with other types of phase manipulation.
Modern frame synchronization algorithms for the DVB-S2 satellite
communication standard have been studied. The operation of the frame synchronization
subsystem with large carrier frequency offsets of the signal is the main advantage of the
differential correlation calculation methods over the classical cross-correlation
calculation. The use of differential methods makes it possible to abandon the initial
estimate of the carrier frequency offset and speed up the registration of the
communication modem. An algorithm with an adaptive threshold is proposed, which is
based on the use of differential signal correlation. A feature of the presented method is
that with a change in the level of the input signal, the threshold for making a decision
also changes adaptively, which allows to abandon the system of automatic power
regulation at this stage of signal processing. Comparative modeling of the proposed
method of frame synchronization with known methods based on the calculation of
differential correlation was carried out, the results of the obtained characteristics of the
probability of omission from the signal/noise ratio showed the advantage of the
proposed algorithm over known methods. Ways of practical implementation of this
algorithm on the FPGA element base are also considered. In particular, an
approximating method was used to calculate the module of a complex number, the
implementation of which is easily performed on the logic elements of the FPGA crystal
without losing the speed of the algorithm as a whole.
A new approach to signal demodulation based on particle filtering methods is
introduced. Corpuscular (or multi-particle, particle) filtering is an effective means of
solving nonlinear and non-Gaussian problems of the theory of statistical evaluation. The
main principle of corpuscular filtering is the approximation of the distribution of
unknown parameters using a discrete set of particles and their associated weighting
factors. A model of the state space of the observation signal is formulated, taking into
account the dynamics of updating channel parameters. A comparative analysis with
well-known demodulation methods was carried out on the example of signals with
phase manipulation. It is shown that with a sufficient number of corpuscles, the
demodulation efficiency, namely ensuring the minimum bit error (BER), can be
improved by applying corpuscular filtering methods at low signal-to-noise ratios against
a background of non-Gaussian noise.
A method of detecting the version of the DVB-S2/S2X standard has been
developed using the proposed methods of synchronization and decoding of service
information of the physical level. Both versions of the standard have almost the same
structure at the physical level. The similarity of the signals of the physical level leads,
for example, to the fact that if the frequency is incorrectly set, the DVB-S2 receiver can
receive a signal of the DVB-S2X standard. The detector consists of frame
synchronization systems, a demodulator and a PLSCODE field decoder. The formulas
for calculating the PLSCODE bit field and decoding the service information,
respectively, are proposed for the DVB-S2 and DVB-S2X broadband notification
standards. The presented detector allows to determine to which revision the transmitted
signal belongs and to determine the parameters of the frame. A software model of the
described method has been developed. Experimental calculations of the ROC curve and
the miss detection probability from the signal/noise ratio were performed. The obtained
simulation results show the high efficiency of the proposed detection method even with
negative signal to noise ratios.
Also, the paper proposes a method of identifying signals that are transmitted
using Carrier-to-Carrier technology using QPSK modulation. The method is based on
the calculation of fourth-order cumulants to detect changes in the shape of the signal
constellation, which are characteristic of Carrier-in-Carrier signals. According to the
receiver operating characteristic (ROC) methodology, a threshold value for the decision
rule is found. It was established that the proposed method provides correct detection of
the sum of QPSK signals for a wide range of signal-to-noise ratios, different amplitudes
of signals from the sum, and also for different bandwidths of mixed signals. The
obtained results indicate the high efficiency of the proposed detection method. The
advantage of the proposed detection method over the "radius" method is also shown
Nouvelle méthode d'estimation des différences de temps d'arrivée pour la localisation des objets connectés haut débit
The forthcoming vision of Internet of Things (IoT) and Internet of Everything (IoE) will immerse people in so-called Smart Environments involving a great number of sectors of applications such as smart habitat, smart-cities, environment monitoring, e-health… IoT and IoE tend to make everyday objects readable, recognizable, locatable, addressable and controllable via the widespread wireless deployment and the internet. Among these capabilities, localization and more extensively the ubiquitous positioning will play, in the next future, a key role to promote another emerging vision: a spatio-temporal Internet of Places (IoP), which would be able to structure and organize, by means of wireless energy aware approaches, the spatial content of Internet. It is well known that in wireless local and personal area networks, the spectrum congestion, the low energy efficiency communications and the insufficient exploitation of the spatial resources are among the factors that may slow down its development in terms of throughput and autonomy. To overcome these unavoidable restrictions, wireless localization technology, as the mechanism for discovering spatio-temporal relationship between connected objects, appears here also as one of the key solutions. This is because dedicated localization techniques in wireless communication can help in developing more extensively the exploitation of spatial resources and allow driving optimized routing for low energy multi-hop communication and spectrum decongestion for Green ICT (Information and Communication Technology). To propose optimized systems achieving both high data rate communication and precise localization, we define a well suited TDOA (Time Difference of Arrival) based method able to perform localization based on communication signals and data only. With this technique, unlike conventional TDOA estimations, it is possible to drastically decrease the complexity of required infrastructures by using either SIMO (Single Input Multiple Output), MISO (Multiple Input Single Output) or MIMO (Multiple Input Multiple Output) configurations in connected objects. This whole study is made within the framework of the IEEE 802.11ad standard and WiGig alliance specifications, however the proposed solutions are compatible with other standards and can be extended to other context aware applications requiring localization inputs such as robotics for example or smart shopping...La vision future de l'internet des objets (IdO) et Internet du Tout (OIE) plongera les personnes soi-disant environnements intelligents impliquant un grand nombre de secteurs d'applications telles que l'habitat intelligent, smart-villes, surveillance de l'environnement, l'e-santé ... IdO et l'OIE ont tendance à faire des objets du quotidien lisible, identifiable, localisable, adressable et contrôlable via le déploiement sans fil généralisée et l'Internet. Parmi ces capacités, la localisation et plus largement le positionnement omniprésente joueront, dans un proche avenir, un rôle clé pour promouvoir une autre vision émergente: un Internet spatio-temporelle des lieux (IoP), qui serait en mesure de structurer et d'organiser, par des moyens des approches sans fil d'énergie savez, le contenu spatial d'Internet. Il est bien connu que dans les réseaux locaux sans fil et personnelles, l'encombrement du spectre, les communications à faible efficacité énergétique et l'exploitation insuffisante des ressources spatiales sont parmi les facteurs qui peuvent ralentir son développement en termes de débit et de l'autonomie. Pour surmonter ces restrictions inévitables, la technologie de localisation sans fil, comme le mécanisme pour découvrir relation spatio-temporelle entre les objets connectés, apparaît ici aussi comme une des solutions clés. Ce est parce que les techniques de localisation dédiés à la communication sans fil peuvent aider à développer plus largement l'exploitation des ressources spatiales et de permettre la conduite routage optimisé pour une faible énergie communication multi-hop et la décongestion du spectre pour Green ICT (Information et Communication Technology). Pour proposer des systèmes optimisés atteindre à la fois la communication des taux de données élevés et la localisation précise, nous définissons un TDOA bien adapté (Time Difference of Arrival) méthode basée en mesure d'effectuer la localisation basée sur des signaux de communication et de données seulement. Avec cette technique, contrairement estimations TDOA classiques, il est possible de diminuer considérablement la complexité des infrastructures nécessaires en utilisant des configurations SIMO (Single Input Multiple Output), MISO (Multiple Input Single Output) ou MIMO (Multiple Input Multiple Output) dans les objets connectés . Toute cette étude est faite dans le cadre de l'IEEE 802.11ad spécifications de l'alliance standard et WiGig, mais les solutions proposées sont compatibles avec d'autres normes et peuvent être étendues à d'autres applications de contexte courant nécessitant entrées de localisation tels que la robotique par exemple ou de shopping intelligent..
Recommended from our members
Wireless indoor localisation within the 5G internet of radio light
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonNumerous applications can be enhanced by accurate and efficient indoor localisation using wireless
sensor networks, however trade-offs often exist between these two parameters. In this thesis, realworld
and simulation data is used to examine the hybrid millimeter wave and Visible Light
Communications (VLC) architecture of the 5G Internet of Radio Light (IoRL) Horizon 2020 project.
Consequently, relevant localisation challenges within Visible Light Positioning (VLP) and asynchronous
sampling networks are identified, and more accurate and efficient solutions are developed.
Currently, VLP relies strongly on the assumed Lambertian properties of light sources.
However, in practice, not all lights are Lambertian. To support the widespread deployment of VLC
technology in numerous environments, measurements from non-Lambertian sources are analysed to
provide new insights into the limitations of existing VLP techniques. Subsequently, a novel VLP
calibration technique is proposed, and results indicate a 59% accuracy improvement against existing
methods. This solution enables high accuracy centimetre level VLP to be achieved with non-
Lambertian sources.
Asynchronous sampling of range-based measurements is known to impact localisation
performance negatively. Various Asynchronous Sampling Localisation Techniques (ASLT) exist to
mitigate these effects. While effective at improving positioning performance, the exact suitability of
such solutions is not evident due to their additional processes, subsequent complexity, and increased
costs. As such, extensive simulations are conducted to study the effectiveness of ASLT under variable
sampling latencies, sensor measurement noise, and target trajectories. Findings highlight the
computational demand of existing ASLT and motivate the development of a novel solution. The
proposed Kalman Extrapolated Least Squares (KELS) method achieves optimal localisation
performance with a significant energy reduction of over 50% when compared to current leading ASLT.
The work in this thesis demonstrates both the capability for high performance VLP from non-
Lambertian sources as well as the potential for energy efficient localisation for sequentially sampled
range measurements.Horizon 202
Recommended from our members
MIMO-based Friendly Jamming and Interference Management Techniques for Secure Wireless Communications
The ever-increasing growth of wireless systems has made them an essential part of our daily life. People rely heavily on wireless networks for communications and to conduct critical transactions from their mobile devices, including financial transactions, access to health records, etc. The proliferation of wireless communication devices opens the door for many security breaches, ranging from eavesdropping to jamming attacks. Such a disadvantage stems from the broadcast nature of wireless transmissions, which creates an exposed environment.
In this dissertation, we focus on eavesdropping attacks. While cryptographic techniques can be used to thwart eavesdropping attacks and enable secure wireless communications, they are not sufficient to protect the lower-layer headers of a packet (i.e., PHY and MAC headers). Hence, even though the secret message is encrypted, these unencrypted headers can be exploited by an adversary to extract invaluable information and initiate malicious attacks (e.g., traffic classification). Physical-layer (PHY-layer) security has been introduced as a promising candidate to prevent attacks that exploit unencrypted lower layer headers.
PHY-layer security techniques typically rely on injecting an intentional interference into the medium so as to confuse nearby eavesdroppers (Eve). Specifically, a legitimate transmit-receive (Alice-Bob) pair generates a bogus signal, namely friendly jamming (FJ), along with the information signal, to increase interference at Eve(s) but without affecting the legitimate receiver (Bob). Depending on which end of a legitimate link is responsible for generating the FJ signal, two types of FJ techniques exist: transmitter-based (TxFJ) and receiver-based (RxFJ).
In this dissertation, we propose to advance the state-of-art in PHY-layer security by considering multi-link scenarios, including multi-user multiple-input multiple-output (MU-MIMO) and peer-to-peer (P2P) networks. Specifically, we consider a scenario where one or more external Eve(s) attempt to snoop on communications of various links. In such networks, transmission of one link may be interfered with neighboring links' transmissions. Thus, special care must be dedicated to handling interference.
In our first contribution in this dissertation, we consider a P2P network tapped by external Eve(s) in which each Alice-Bob pair conceals its communications using TxFJ. TxFJ is realized at Alice side using MIMO precoding. The goal is to design the precoders for both information and TxFJ signals at all Alices so as to maximize a given utility (e.g., sum of communication rates) while preventing eavesdropping elsewhere. Because legitimate links do not cooperate with each other and there is no centralized authority to perform optimization, every link selfishly aims at maximizing its secrecy rate. Using non-cooperative game theory, we design a distributed method for maximizing the sum of secrecy rates. Under the exact knowledge of eavesdropping channels, we show that our distributed method has a comparable secrecy sum-rate to a centralized approach.
In our next contribution, we focus on employing practical precoders in our design for a P2P network. Specifically, we employed a zero-forcing-based (ZF-based) precoder for the TxFJ of each Alice-Bob pair in a P2P network. We also assume that each link has a certain rate demand to be satisfied. In such a scenario, even though the non-cooperative game designed for this P2P network is shown to be convergent to its unique Nash Equilibrium (NE), there is still no guarantee that the resulting NE is Pareto-optimal. Hence, we propose a modified price-based game, in which each link is penalized for generating interference on other legitimate links. We show that the price-based game converges to the Pareto-optimal point of secrecy rate region. We then leverage mixed-strategy games to provide solutions that are robust to uncertainties in knowledge of eavesdropping channels. The proposed ZF-based design of precoders is also implemented on software-defined radios to assess its performance on a single link in real-world scenarios.
In another contribution of this dissertation, we consider to further enhance the secrecy of each link in a P2P network by equipping each receiver with RxFJ. Hence, in addition to the power allocation between TxFJ and information signals, we optimize RxFJ power as well. We show that by using RxFJ at each Bob, we could leverage the well-established concept of concave games, which compared to non-convex games enjoy more simplified game-theoretic analysis. We derive sufficient conditions under which the game admits a unique NE. We also propose another version of our power control algorithm that can be implemented asynchronously, making it robust to transmission delays in the network.
In our last contribution, we consider the downlink of a MU-MIMO network in the presence of an external Eve. No knowledge of Eve's location is assumed at the access point. The network is studied in underloaded and overloaded conditions. In an underloaded (overloaded) network, the number of antennas at the access point is larger (smaller) than the total number of downlink users' antennas. In the overloaded setting, traditional methods of creating TxFJ, such as ZF-based methods, are infeasible. We propose a linear precoding scheme that relaxes such infeasibility in overloaded MU-MIMO networks. In the worst-case scenario where Eve has knowledge of the channels between access point and downlink users, we show that our method imposes the most stringent condition on the number of antennas required at Eve to cancel out TxFJ signals. We also show that choosing the number of independent streams to be sent to downlink users has an important role in achieving a tradeoff between security, reliability, and the achievable rate
Interference Mitigation in Wireless Communications
The primary objective of this thesis is to design advanced interference resilient schemes for asynchronous slow frequency hopping wireless personal area networks (FH-WPAN) and time division multiple access (TDMA) cellular systems in interference dominant environments. We also propose an interference-resilient power allocation method for multiple-input-multiple-output (MIMO) systems.
For asynchronous FH-WPANs in the presence of frequent packet collisions, we propose a single antenna interference canceling dual decision feedback (IC-DDF) receiver based on joint maximum likelihood (ML) detection and recursive least squares (RLS) channel estimation. For the system level performance evaluation, we propose a novel geometric method that combines bit error rate (BER) and the spatial distribution of the traffic load of CCI for the computation of packet error rate (PER). We also derived the probabilities of packet collision in multiple asynchronous FH-WPANs with uniform and nonuniform traffic patterns.
For the design of TDMA receivers resilient to CCI in frequency selective channels, we propose a soft output joint detection interference rejection combining delayed decision feedback sequence estimation (JD IRC-DDFSE) scheme. In the proposed scheme, IRC suppresses the CCI, while DDFSE equalizes ISI with reduced complexity. Also, the soft outputs are generated from IRC-DDFSE decision metric to improve the performance of iterative or non-iterative type soft-input outer code decoders.
For the design of interference resilient power allocation scheme in MIMO systems, we investigate an adaptive power allocation method using subset antenna transmission (SAT) techniques. Motivated by the observation of capacity imbalance among the multiple parallel sub-channels, the SAT method achieves high spectral efficiency by allocating power on a selected transmit antenna subset. For 4 x 4 V-BLAST MIMO systems, the proposed scheme with SAT showed analogous results. Adaptive modulation schemes combined with the proposed method increase the capacity gains. From a feasibility viewpoint, the proposed method is a practical solution to CCI-limited MIMO systems since it does not require the channel state information (CSI) of CCI.Ph.D.Committee Chair: Professor Gordon L. StBe
IoT and Sensor Networks in Industry and Society
The exponential progress of Information and Communication Technology (ICT) is one of the main elements that fueled the acceleration of the globalization pace. Internet of Things (IoT), Artificial Intelligence (AI) and big data analytics are some of the key players of the digital transformation that is affecting every aspect of human's daily life, from environmental monitoring to healthcare systems, from production processes to social interactions. In less than 20 years, people's everyday life has been revolutionized, and concepts such as Smart Home, Smart Grid and Smart City have become familiar also to non-technical users.
The integration of embedded systems, ubiquitous Internet access, and Machine-to-Machine (M2M) communications have paved the way for paradigms such as IoT and Cyber Physical Systems (CPS) to be also introduced in high-requirement environments such as those related to industrial processes, under the forms of Industrial Internet of Things (IIoT or I2oT) and Cyber-Physical Production Systems (CPPS). As a consequence, in 2011 the German High-Tech Strategy 2020 Action Plan for Germany first envisioned the concept of Industry 4.0, which is rapidly reshaping traditional industrial processes. The term refers to the promise to be the fourth industrial revolution. Indeed, the first industrial revolution was triggered by water and steam power. Electricity and assembly lines enabled mass production in the second industrial revolution. In the third industrial revolution, the introduction of control automation and Programmable Logic Controllers (PLCs) gave a boost to factory production. As opposed to the previous revolutions, Industry 4.0 takes advantage of Internet access, M2M communications, and deep learning not only to improve production efficiency but also to enable the so-called mass customization, i.e. the mass production of personalized products by means of modularized product design and flexible processes.
Less than five years later, in January 2016, the Japanese 5th Science and Technology Basic Plan took a further step by introducing the concept of Super Smart Society or Society 5.0. According to this vision, in the upcoming future, scientific and technological innovation will guide our society into the next social revolution after the hunter-gatherer, agrarian, industrial, and information eras, which respectively represented the previous social revolutions. Society 5.0 is a human-centered society that fosters the simultaneous achievement of economic, environmental and social objectives, to ensure a high quality of life to all citizens. This information-enabled revolution aims to tackle today’s major challenges such as an ageing population, social inequalities, depopulation and constraints related to energy and the environment. Accordingly, the citizens will be experiencing impressive transformations into every aspect of their daily lives.
This book offers an insight into the key technologies that are going to shape the future of industry and society. It is subdivided into five parts: the I Part presents a horizontal view of the main enabling technologies, whereas the II-V Parts offer a vertical perspective on four different environments.
The I Part, dedicated to IoT and Sensor Network architectures, encompasses three Chapters. In Chapter 1, Peruzzi and Pozzebon analyse the literature on the subject of energy harvesting solutions for IoT monitoring systems and architectures based on Low-Power Wireless Area Networks (LPWAN). The Chapter does not limit the discussion to Long Range Wise Area Network (LoRaWAN), SigFox and Narrowband-IoT (NB-IoT) communication protocols, but it also includes other relevant solutions such as DASH7 and Long Term Evolution MAchine Type Communication (LTE-M). In Chapter 2, Hussein et al. discuss the development of an Internet of Things message protocol that supports multi-topic messaging. The Chapter further presents the implementation of a platform, which integrates the proposed communication protocol, based on Real Time Operating System. In Chapter 3, Li et al. investigate the heterogeneous task scheduling problem for data-intensive scenarios, to reduce the global task execution time, and consequently reducing data centers' energy consumption. The proposed approach aims to maximize the efficiency by comparing the cost between remote task execution and data migration.
The II Part is dedicated to Industry 4.0, and includes two Chapters. In Chapter 4, Grecuccio et al. propose a solution to integrate IoT devices by leveraging a blockchain-enabled gateway based on Ethereum, so that they do not need to rely on centralized intermediaries and third-party services.
As it is better explained in the paper, where the performance is evaluated in a food-chain traceability application, this solution is particularly beneficial in Industry 4.0 domains. Chapter 5, by De Fazio et al., addresses the issue of safety in workplaces by presenting a smart garment that integrates several low-power sensors to monitor environmental and biophysical parameters. This enables the detection of dangerous situations, so as to prevent or at least reduce the consequences of workers accidents.
The III Part is made of two Chapters based on the topic of Smart Buildings. In Chapter 6, Petroșanu et al. review the literature about recent developments in the smart building sector, related to the use of supervised and unsupervised machine learning models of sensory data. The Chapter poses particular attention on enhanced sensing, energy efficiency, and optimal building management. In Chapter 7, Oh examines how much the education of prosumers about their energy consumption habits affects power consumption reduction and encourages energy conservation, sustainable living, and behavioral change, in residential environments. In this Chapter, energy consumption monitoring is made possible thanks to the use of smart plugs.
Smart Transport is the subject of the IV Part, including three Chapters. In Chapter 8, Roveri et al. propose an approach that leverages the small world theory to control swarms of vehicles connected through Vehicle-to-Vehicle (V2V) communication protocols. Indeed, considering a queue dominated by short-range car-following dynamics, the Chapter demonstrates that safety and security are increased by the introduction of a few selected random long-range communications. In Chapter 9, Nitti et al. present a real time system to observe and analyze public transport passengers' mobility by tracking them throughout their journey on public transport vehicles. The system is based on the detection of the active Wi-Fi interfaces, through the analysis of Wi-Fi probe requests. In Chapter 10, Miler et al. discuss the development of a tool for the analysis and comparison of efficiency indicated by the integrated IT systems in the operational activities undertaken by Road Transport Enterprises (RTEs). The authors of this Chapter further provide a holistic evaluation of efficiency of telematics systems in RTE operational management.
The book ends with the two Chapters of the V Part on Smart Environmental Monitoring. In Chapter 11, He et al. propose a Sea Surface Temperature Prediction (SSTP) model based on time-series similarity measure, multiple pattern learning and parameter optimization. In this strategy, the optimal parameters are determined by means of an improved Particle Swarm Optimization method. In Chapter 12, Tsipis et al. present a low-cost, WSN-based IoT system that seamlessly embeds a three-layered cloud/fog computing architecture, suitable for facilitating smart agricultural applications, especially those related to wildfire monitoring.
We wish to thank all the authors that contributed to this book for their efforts. We express our gratitude to all reviewers for the volunteering support and precious feedback during the review process. We hope that this book provides valuable information and spurs meaningful discussion among researchers, engineers, businesspeople, and other experts about the role of new technologies into industry and society
Heterogeneous wireless networks for smart cities
In the near future, a world of smart cities is envisioned in which many devices equipped with sensors and communication interfaces can be used to collect and share data in order to derive maps or infer information on some parameter of interest. Wireless technologies are enabling this smart city paradigms, where many items are networked for the growth of society. This scenario opens new challenges to wireless network designers, with new performance metrics, coverage and privacy needs, as well as the need for a tighter integration of different networks. This is the fundamental concept of Heterogeneous Networks. Enclosing humans in the loop, through crowdsensing techniques, will dramatically increase the amount of data available for the mapping process, with obvious benefits in terms of the resulting accuracy. On the other hand, the huge amount of data generated represents also a challenge that, along with the irregular, uncontrollable, spatial distribution of measurements represent serious challenges to be addressed. Another important aspect of smart cities scenarios is represented by vehicular networks. Several technologies have been proposed to address such application. Among the others, an interesting solution is provided by Visible
Light Communications (VLC). Based on the use of the light emission diodes (LEDs) that are already available on the majority of vehicles, VLC would enable short range communication in large, unlicensed, and uncongested bands with limited costs. In the framework of smart cities scenarios, my research activity aimed at formulating and solving some of the issues arising from the envisioned challenging services, with both analytical and simulation-based approaches