436 research outputs found

    Waveform Design for Secure SISO Transmissions and Multicasting

    Full text link
    Wireless physical-layer security is an emerging field of research aiming at preventing eavesdropping in an open wireless medium. In this paper, we propose a novel waveform design approach to minimize the likelihood that a message transmitted between trusted single-antenna nodes is intercepted by an eavesdropper. In particular, with knowledge first of the eavesdropper's channel state information (CSI), we find the optimum waveform and transmit energy that minimize the signal-to-interference-plus-noise ratio (SINR) at the output of the eavesdropper's maximum-SINR linear filter, while at the same time provide the intended receiver with a required pre-specified SINR at the output of its own max-SINR filter. Next, if prior knowledge of the eavesdropper's CSI is unavailable, we design a waveform that maximizes the amount of energy available for generating disturbance to eavesdroppers, termed artificial noise (AN), while the SINR of the intended receiver is maintained at the pre-specified level. The extensions of the secure waveform design problem to multiple intended receivers are also investigated and semidefinite relaxation (SDR) -an approximation technique based on convex optimization- is utilized to solve the arising NP-hard design problems. Extensive simulation studies confirm our analytical performance predictions and illustrate the benefits of the designed waveforms on securing single-input single-output (SISO) transmissions and multicasting

    On the Non-Orthogonal Layered Broadcast Codes in Cooperative Wireless Networks

    Get PDF
    A multi-fold increase in spectral efficiency and throughput are envisioned in the fifth generation of cellular networks to meet the requirements of International Telecommunication Union (ITU) IMT-2020 on massive connectivity and tremendous data traffic. This is achieved by evolution in three aspects of current networks. The first aspect is shrinking the cell sizes and deploying dense picocells and femtocells to boost the spectral reuse. The second is to allocate more spectrum resources including millimeter-wave bands. The third is deploying highly efficient communications and multiple access techniques. Non-orthogonal multiple access (NOMA) is a promising communication technique that complements the current commercial spectrum access approach to boost the spectral efficiency, where different data streams/users’ data share the same time, frequency and code resource blocks (sub-bands) via superimposition with each other. The receivers decode their own messages by deploying the successive interference cancellation (SIC) decoding rule. It is known that the NOMA coding is superior to conventional orthogonal multiple access (OMA) coding, where the resources are split among the users in either time or frequency domain. The NOMA based coding has been incorporated into other coding techniques including multi-input multi-output (MIMO), orthogonal frequency division multiplexing (OFDM), cognitive radio and cooperative techniques. In cooperative NOMA codes, either dedicated relay stations or stronger users with better channel conditions, act as relay to leverage the spatial diversity and to boost the performance of the other users. The advantage of spatial diversity gain in relay-based NOMA codes, is deployed to extend the coverage area of the network, to mitigate the fading effect of multipath channel and to increase the system throughput, hence improving the system efficiency. In this dissertation we consider the multimedia content delivery and machine type communications over 5G networks, where scalable content and low complexity encoders is of interest. We propose cross-layer design for transmission of successive refinement (SR) source code interplayed with non-orthogonal layered broadcast code for deployment in several cooperative network architectures. Firstly, we consider a multi-relay coding scheme where a source node is assisted by a half-duplex multi-relay non-orthogonal amplify-forward (NAF) network to communicate with a destination node. Assuming the channel state information (CSI) is not available at the source node, the achievable layered diversity multiplexing tradeoff (DMT) curve is derived. Then, by taking distortion exponent (DE) as the figure of merit, several achievable lower bounds are proved, and the optimal expected distortion performance under high signal to noise ratio (SNR) approximation is explicitly obtained. It is shown that the proposed coding can achieve the multi-input single-output (MISO) upper bound under certain regions of bandwidth ratios, by which the optimal performance in these regions can be explicitly characterized. Further the non-orthogonal layered coding scheme is extended to a multi-hop MIMO decode-forward (DF) relay network where a set of DE lower bounds is derived. Secondly, we propose a layered cooperative multi-user scheme based on non-orthogonal amplify-forward (NAF) relaying and non-orthogonal multiple access (NOMA) codes, aiming to achieve multi-user uplink transmissions with low complexity and low signaling overhead, particularly applicable to the machine type communications (MTC) and internet of things (IoT) systems. By assuming no CSI available at the transmitting nodes, the proposed layered codes make the transmission rate of each user adaptive to the channel realization. We derive the close-form analytical results on outage probability and the DMT curve of the proposed layered NAF codes in the asymptotic regime of high SNR, and optimize the end-to-end performance in terms of the exponential decay rate of expected distortion. Thirdly, we consider a single relay network and study the non-orthogonal layered scheme in the general SNR regime. A layered relaying scheme based on compress-forward (CF) is introduced, where optimization of end to end performance in terms of expected distortion is conducted to jointly determine network parameters. We further derive the explicit analytical optimal solution with two layers in the absence of channel knowledge. Finally, we consider the problem of multicast of multi-resolution layered messages over downlink of a cellular system with the assumption of CSI is not available at the base station (BS). Without loss generality, spatially random users are divided into two groups, where the near group users with better channel conditions decode for both layers, while the users in the second group decode for base layer only. Once the BS launches a multicast message, the first group users who successfully decoded the message, deploy a distributed cooperating scheme to assist the transmission to the other users. The cooperative scheme is naive but we will prove it can effectively enhance the network capacity. Closed form outage probability is explicitly derived for the two groups of users. Further it is shown that diversity order equal to the number of users in the near group is achievable, hence the coding gain of the proposed distributed scheme fully compensate the lack of CSI at the BS in terms of diversity order

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Computation Over Gaussian Networks With Orthogonal Components

    Get PDF
    Function computation of arbitrarily correlated discrete sources over Gaussian networks with orthogonal components is studied. Two classes of functions are considered: the arithmetic sum function and the type function. The arithmetic sum function in this paper is defined as a set of multiple weighted arithmetic sums, which includes averaging of the sources and estimating each of the sources as special cases. The type or frequency histogram function counts the number of occurrences of each argument, which yields many important statistics such as mean, variance, maximum, minimum, median, and so on. The proposed computation coding first abstracts Gaussian networks into the corresponding modulo sum multiple-access channels via nested lattice codes and linear network coding and then computes the desired function by using linear Slepian-Wolf source coding. For orthogonal Gaussian networks (with no broadcast and multiple-access components), the computation capacity is characterized for a class of networks. For Gaussian networks with multiple-access components (but no broadcast), an approximate computation capacity is characterized for a class of networks.Comment: 30 pages, 12 figures, submitted to IEEE Transactions on Information Theor

    Spectrum Sharing in Wireless Networks via QoS-Aware Secondary Multicast Beamforming

    Get PDF
    Secondary spectrum usage has the potential to considerably increase spectrum utilization. In this paper, quality-of-service (QoS)-aware spectrum underlay of a secondary multicast network is considered. A multiantenna secondary access point (AP) is used for multicast (common information) transmission to a number of secondary single-antenna receivers. The idea is that beamforming can be used to steer power towards the secondary receivers while limiting sidelobes that cause interference to primary receivers. Various optimal formulations of beamforming are proposed, motivated by different ldquocohabitationrdquo scenarios, including robust designs that are applicable with inaccurate or limited channel state information at the secondary AP. These formulations are NP-hard computational problems; yet it is shown how convex approximation-based multicast beamforming tools (originally developed without regard to primary interference constraints) can be adapted to work in a spectrum underlay context. Extensive simulation results demonstrate the effectiveness of the proposed approaches and provide insights on the tradeoffs between different design criteria
    corecore