37 research outputs found

    Multicarrier Frequency Hopping Spread Spectrum Techniques With Quasi-Cyclic Low Density Parity Check Codes Channel Coding

    Get PDF
    This work presents a new proposed Multicarrier Frequency Hopping Spread Spectrum (MCFH-SS) system employing Quasi-Cyclic Low Density Parity Check (QC-LDPC) codes instead of the conventional LDPC codes. A new technique for constructing the QC-LDPC codes based on row division method is proposed. The new codes offer more flexibility in terms of high girth, multiple code rates and block length. Moreover, a new scheme for channel prediction in MCFH-SS system is proposed. The technique adaptively estimates the channel conditions and eliminates the need for the system to transmit a request message prior to transmitting the packet data. The ready-to-use channel will be occupied with a Pseudonoise (PN) code and use for transmission or else, it will be banned

    Noise-based Transmit Reference Modulation:A Feasibility Analysis

    Get PDF
    Wireless sensor networks (WSNs) receive huge research interest for a multitude of applications, ranging from remote monitoring applications, such as monitoring of potential forest fires, floods and air pollution, to domestic and industrial monitoring of temperature, humidity, vibration, stress, etc. In the former set of applications, a large number of nodes can be involved which are usually deployed in remote or inaccessible environments. Due to logistic and cost reasons, battery replacement is undesired. Energy-efficient radios are needed, with a power-demand so little that batteries can last the lifetime of the node or that the energy can be harvested from the environment. Coherent direct-sequence spread spectrum (DSSS) based radios are widely employed in monitoring applications, due to their overall resilience to channel impairments and robustness against interference. However, a DSSS rake receiver has stringent requirements on precise synchronization and accurate channel knowledge. To obviate the complexity of a coherent DSSS receiver, particularly for low data rate sensor networks, a DSSS scheme that has fast synchronization and possibly low power consumption, is much desired. In this regard, this thesis studies a noncoherent DSSS scheme called transmit reference (TR), which promises a simple receiver architecture and fast synchronization. In traditional TR, the modulated information signal is sent along an unmodulated reference signal, with a small time offset between them. In this thesis, we present and investigate a variant of TR, called noise-based frequency offset modulation (N-FOM), which uses pure noise as the spreading signal and a small frequency offset (instead of a time offset) to separate the information and reference signals. The detection is based on correlation of the received signal with a frequency-shifted version of itself, which collects the transmitted energy without compromising the receiver simplicity. Analytical expressions on performance metrics, supplemented by simulation results, improve understanding of the underlying mechanisms and provide insights into utility of N-FOM in low-power WSNs. In point-to-point line-of-sight (LOS) communication, it was observed that the communication scheme has a minimal utility. The energy-detector type of receiver mixes all in-band signals, which magnifies the overall noise. Particularly, the self-mixing of the transmitted signal also elevates the noise level, which increases with a further increase in the received signal energy. Therefore, for a fixed set of system parameters, the performance attains an asymptote with increasing transmission power. The phenomenon also establishes a non-monotonic relation between performance and the spreading factor. It was observed that a higher spreading factor in N-FOM is beneficial only in a high-SNR regime. After developing an understanding of the performance degrading mechanisms, few design considerations are listed. It is found that a suitable choice of the receiver front-end filter can maximize the SNR. However, the optimal filter depends on received signal and noise levels. A practically feasible – albeit suboptimal – filter is presented which gives close to the optimal performance. Next, timing synchronization is considered. The implications of synchronization errors are analyzed, and a synchronization strategy is devised. The proposed synchronization strategy has little overhead and can be easily implemented for symbol-level synchronization. The N-FOM LOS link model is extended to assess the performance degradation due to interference. Performance metrics are derived which quantify the effects of multiple-user interference, as well as that from external interferers, such as WiFi. Since the correlation operation mixes all in-band signals, the total interfering entities are quadratically increased. The research shows the vulnerability of N-FOM to interference, which makes it optimistic to operate in a crowded shared spectrum (such as the ISM 2.4\,GHz band). We also observe an upper limit on the number of mutually interfering links in a multiple access (MA) network, that can be established with an acceptable quality. The scheme is further investigated for its resilience against impairments introduced by a dense multipath environment. It is observed that despite the noise enhancement, the N-FOM system performs reasonably well in a non-line-of-sight (NLOS) communication. The detection mechanism exploits the multipath channel diversity and leads to an improved performance in a rich scattering environment. An analytical expression for outage probability is also derived. The results indicate that a healthy N-FOM link with very low outage probability can be established at a nominal value of the received bit SNR. It is also found that the choice of the frequency offset is central to the system design. Due to multiple practical implications associated with this parameter, the maximum data rate and the number of usable frequency offsets are limited, particularly in a MA NLOS communication scenario. The analysis evolves into a rule-of-thumb criterion for the data rate and the frequency offset. It is deduced that, due to its limited capability to coexist in a shared spectrum, N-FOM is not a replacement for coherent DSSS systems. The scheme is mainly suited to a low data rate network with low overall traffic, operating in an interference-free rich scattering environment. Such a niche of sensor applications could benefit from N-FOM where the design goal requires a simple detection mechanism and immunity to multipath fading

    Quality of Service Provisioning for Voice Application over Wlans

    Get PDF
    Résumé Aujourd'hui, les réseaux locaux sans fils WLANs (en anglais Wireless Local Area Networks) sont de plus en plus déployés en raison de leur facilité d'installation et de leur faible coûts. Le standard IEEE (en anglais Institute of Electrical and Electronics Engineers) 802.11 définit les caractéristiques des réseaux locaux sans fil WLANs. Alors que la première norme proposée pouvait soutenir un débit de données jusqu'à 2 Mbps, dans les versions récentes de la norme 802.11, des débits de données pouvant atteindre jusqu'à 200 Mbps seront pris en charge dans les réseaux sans fil de prochaine génération. Garantir les besoins de QoS (en anglais Quality of Service) est un défi considérable pour les réseaux WLAN, en particulier pour les applications multimédia. Vu que largeur de bande disponible dans les réseaux sans fil est limitée, la bande passante supportant la QoS ne peut être facilement augmentée. Cependant, les protocoles efficaces capables de satisfaire la qualité de service doivent être conçus pour améliorer l'utilisation des ressources dans les réseaux. Le protocole de la couche MAC (en anglais Medium Access Control) affecte fondamentalement les paramètres QoS. Le contrôle d'admission est également un élément essentiel pour la qualité de service dans les réseaux locaux sans fil. Ca projet a pour objectif de modéliser et analyser la couche MAC et contrôler l'admission dans des réseaux locaux sans fil 802.11 avec infrastructure basée sur le mécanisme DCF (en anglais Distributed Coordination Function). Bien que notre objectif général est de garantir les besoins de QoS des applications multimédias sur les réseaux sans fil, nous avons répondu à plusieurs questions importantes telles que la modélisation de la couche MAC, l'évaluation de la QoS et le contrôle d'admission. La première contribution de cette recherche est de proposer un cadre analytique qui prend en compte la direction du trafic en mode infrastructure non saturé. Contrairement aux recherches antérieures, dans l'analyse proposée la probabilité de collision d'un paquet transmis par chaque station sans fil en liaison ascendante est différente de la probabilité de collision pour les paquets qui sont transmis à partir du point d'accès en liaison descendante. Ce modèle de distinction entre les modèles backoff par station en liaison ascendante et en liaison descendante est capable d'exprimer la performance MAC en termes de nombre de stations sans fil et plusieurs paramètres système tels que la taille de la fenêtre de contention, le nombre maximum d'étapes backoff, la taille du tampon à la couche MAC, ainsi que les paramètres de trafic tels que les durées de conversation, le silence et le taux d'arrivée. Contrairement aux études précédentes, nous appliquons deux groupes d'équations, un groupe est défini pour la station sans fil et l'autre pour le point d'accès. ----------Abstract Wireless Local Area Networks (WLANs) are widely deployed nowadays because of their low cost and convenient implementation. The Institute of Electrical and Electronics Engineers (IEEE) 802.11 series standards define the specifications for such networks. While the first proposed standard could support a data rate up to 2 Mbps, in the recent upgraded versions of the standard data rates up to 54 Mbps are achievable and up to 200 Mbps are said to be supported in next generation WLANs. An important concern in WLANs is the support of Quality of Service (QoS), specifically for multimedia applications. Because of the limited available bandwidth in wireless networks, bandwidth cannot be easily increased to support QoS. However, efficient protocols capable of providing QoS have to be designed to improve resource utilization in networks. The Medium Access Control (MAC) protocol crucially affects the QoS parameters. Admission control is also an essential element for QoS provisioning in WLANs. Our research covers mathematical modeling and analysis of the MAC layer and admission control considering Distributed Coordination Function (DCF) in infrastructure mode of IEEE 802.11-based WLANs. While our general goal is to guarantee the QoS parameters of multimedia applications over WLANs, we address several important issues such as MAC layer modeling, QoS evaluation and admission control. The first contribution of this research is to propose an analytical framework which takes into account the traffic direction in non-saturated infrastructure mode of WLANs. Unlike previous work, in the proposed analysis the collision probability of a packet transmitted by each wireless station in the uplink direction is different from the probability of collision for the packets transmitted from the access point in the downlink direction. Our model differentiates between per-station backoff models in the uplink and downlink and is capable of expressing the MAC performance in terms of several system parameters such as contention window size, maximum number of backoff stages, size of buffer at the MAC layer, traffic parameters such as talk and silent durations and arrival rate, as well as the number of wireless stations. In contrast to the previous studies, we apply two groups of equations, one group is defined for the wireless station and the other one for the access point. These equations represent the transmission probability, probability of collision and the probability of being in the busy state in terms of the number of wireless stations, the traffic arrival rate and system parameters such as the size of the contention window and maximum number of retransmissions

    Advanced Trends in Wireless Communications

    Get PDF
    Physical limitations on wireless communication channels impose huge challenges to reliable communication. Bandwidth limitations, propagation loss, noise and interference make the wireless channel a narrow pipe that does not readily accommodate rapid flow of data. Thus, researches aim to design systems that are suitable to operate in such channels, in order to have high performance quality of service. Also, the mobility of the communication systems requires further investigations to reduce the complexity and the power consumption of the receiver. This book aims to provide highlights of the current research in the field of wireless communications. The subjects discussed are very valuable to communication researchers rather than researchers in the wireless related areas. The book chapters cover a wide range of wireless communication topics

    Physical-Layer Security in Cognitive Radio Networks

    Get PDF
    The fifth-generation (5G) communications and beyond are expected to serve a huge number of devices and services. However, due to the fixed spectrum allocation policies, the need for cognitive radio networks (CRNs) has increased accordingly. CRNs have been proposed as a promising approach to address the problem of under-utilization and scarcity of the spectrum. In CRNs, secondary users (SUs) access the licensed spectrum of the primary users (PUs) using underlay, overlay, or interweave paradigms. SUs can access the spectrum band simultaneously with the PUs in underlay access mode provided that the SUs’ transmission power does not cause interference to the PUs’ communication. In this case, SUs should keep monitoring the interference level that the PU receiver can tolerate and adjust the transmission power accordingly. However, varying the transmission power may lead to some threats to the privacy of the information transfer of CRNs. Therefore, securing data transmission in an underlay CRN is a challenge that should be addressed. Physical-layer security (PLS) has recently emerged as a reliable method to protect the confidentiality of the SUs’ transmission against attacks, especially for the underlay model with no need for sharing security keys. Indeed, PLS has the advantage of safeguarding the data transmission without the necessity of adding enormous additional resources, specifically when there are massively connected devices. Apart from the energy consumed by the various functions carried out by SUs, enhancing security consumes additional energy. Therefore, energy harvesting (EH) is adopted in our work to achieve both; energy efficiency and spectral efficiency. EH is a significant breakthrough for green communication, allowing the network nodes to reap energy from multiple sources to lengthen battery life. The energy from various sources, such as solar, wind, vibration, and radio frequency (RF) signals, can be obtained through the process of EH. This accumulated energy can be stored to be used for various processes, such as improving the users’ privacy and prolonging the energy-constrained devices’ battery life. In this thesis, for the purpose of realistic modelling of signal transmission, we explicitly assume scenarios involving moving vehicles or nodes in networks that are densely surrounded by obstacles. Hence, we begin our investigations by studying the link performance under the impact of cascaded κ−μ fading channels. Moreover, using the approach of PLS, we address the privacy of several three-node wiretap system models, in which there are two legitimate devices communicating under the threat of eavesdroppers. We begin by a three-node wiretap system model operating over cascaded κ − μ fading channels and under worst-case assumptions. Moreover, assuming cascaded κ − μ distributions for all the links, we investigate the impact of these cascade levels, as well as the impact of multiple antennas employed at the eavesdropper on security. Additionally, the PLS is examined for two distinct eavesdropping scenarios: colluding and non-colluding eavesdroppers. Throughout the thesis, PLS is mainly evaluated through the secrecy outage probability (SOP), the probability of non-zero secrecy capacity (Pnzcr ), and the intercept probability (Pint). Considering an underlay CRN operating over cascaded Rayleigh fading channel, with the presence of an eavesdropper, we explore the PLS for SUs in the network. This study is then extended to investigate the PLS of SUs in an underlay single-input-multiple-output (SIMO) CRN over cascaded κ-μ general fading channels with the presence of a multi-antenna eavesdropper. The impact of the constraint over the transmission power of the SU transmitter due to the underlay access mode is investigated. In addition, the effects of multiple antennas and cascade levels over security are well-explored. In the second part of our thesis, we propose an underlay CRN, in which an SU transmitter communicates with an SU destination over cascaded κ-μ channels. The confidentiality of the shared information between SUs is threatened by an eavesdropper. Our major objective is to achieve a secured network, while at the same time improving the energy and spectrum efficiencies with practical modeling for signals’ propagation. Hence, we presume that the SU destination harvests energy from the SU transmitter. The harvested energy is used to produce jamming signals to be transmitted to mislead the eavesdropper. In this scenario, a comparison is made between an energy-harvesting eavesdropper and a non-energy harvesting one. Additionally, we present another scenario in which cooperative jamming is utilized as one of the means to boost security. In this system model, the users are assumed to communicate over cascaded Rayleigh channels. Moreover, two scenarios for the tapping capabilities of the eavesdroppers are presented; colluding and non-colluding eavesdroppers. This study is then extended for the case of non-colluding eavesdroppers, operating over cascaded κ-μ channels. Finally, we investigate the reliability of the SUs and PUs while accessing the licensed bands using the overlay mode, while enhancing the energy efficiency via EH techniques. Hence, we assume that multiple SUs are randomly distributed, in which one of the SUs is selected to harvest energy from the PUs’ messages. Then, utilizing the gathered energy, this SU combines its own messages with the amplified PUs messages and forwards them to the destinations. Furthermore, we develop two optimization problems with the potential of maximizing the secondary users’ rate and the sum rate of both networks

    Access point deployment optimisation in communication-based train control systems

    Get PDF
    Through the use of new communication-based train control (CBTC) systems, modern metro railways have been able to provide a more efficient, more reliable and more eco-friendly transport services. The main advantages of the CBTC systems are achieved by utilising modern communication technologies. The performance of the communications network is dependent on a well-designed access point (AP) deployment, as this determines the overall communication capability and impacts the cost. In this thesis, a systematic methodology is proposed for formulating and solving AP deployment planning (ADP) problems in two scenarios: (i) a tunnel section area; and (ii) a real-world metro system. Different mathematical models are presented for modelling the ADP problem in these two scenarios. In addition to mathematical models, an exhaustive search and a customized search algorithm, which uses a multi-objective evolutionary algorithm based on decomposition (MOEA/D), are proposed for solving the ADP optimisation problems. The methodologies are applied to the scenarios mentioned above. To evaluate the optimisation results, the optimised AP deployments are tested on a simulation platform integrating a railway network simulator and a communication network simulator. The test result shows that with the optimised AP deployments the DCS can achieve a better performance while using fewer APs

    An Overview of Physical Layer Security with Finite Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research

    Applications of MATLAB in Science and Engineering

    Get PDF
    The book consists of 24 chapters illustrating a wide range of areas where MATLAB tools are applied. These areas include mathematics, physics, chemistry and chemical engineering, mechanical engineering, biological (molecular biology) and medical sciences, communication and control systems, digital signal, image and video processing, system modeling and simulation. Many interesting problems have been included throughout the book, and its contents will be beneficial for students and professionals in wide areas of interest
    corecore