7,818 research outputs found
Capacity Regions and Sum-Rate Capacities of Vector Gaussian Interference Channels
The capacity regions of vector, or multiple-input multiple-output, Gaussian
interference channels are established for very strong interference and aligned
strong interference. Furthermore, the sum-rate capacities are established for Z
interference, noisy interference, and mixed (aligned weak/intermediate and
aligned strong) interference. These results generalize known results for scalar
Gaussian interference channels.Comment: 33 pages, 1 figure, submitted to IEEE trans. on Information theor
Transmit Signal and Bandwidth Optimization in Multiple-Antenna Relay Channels
Transmit signal and bandwidth optimization is considered in multiple-antenna
relay channels. Assuming all terminals have channel state information, the
cut-set capacity upper bound and decode-and-forward rate under full-duplex
relaying are evaluated by formulating them as convex optimization problems. For
half-duplex relays, bandwidth allocation and transmit signals are optimized
jointly. Moreover, achievable rates based on the compress-and-forward
transmission strategy are presented using rate-distortion and Wyner-Ziv
compression schemes. It is observed that when the relay is close to the source,
decode-and-forward is almost optimal, whereas compress-and-forward achieves
good performance when the relay is close to the destination.Comment: 16 pages, 10 figure
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Optimal Beamforming for Gaussian MIMO Wiretap Channels with Two Transmit Antennas
A Gaussian multiple-input multiple-output wiretap channel in which the
eavesdropper and legitimate receiver are equipped with arbitrary numbers of
antennas and the transmitter has two antennas is studied in this paper. Under
an average power constraint, the optimal input covariance to obtain the secrecy
capacity of this channel is unknown, in general. In this paper, the input
covariance matrix required to achieve the capacity is determined. It is shown
that the secrecy capacity of this channel can be achieved by linear precoding.
The optimal precoding and power allocation schemes that maximize the achievable
secrecy rate, and thus achieve the capacity, are developed subsequently. The
secrecy capacity is then compared with the achievable secrecy rate of
generalized singular value decomposition (GSVD)-based precoding, which is the
best previously proposed technique for this problem. Numerical results
demonstrate that substantial gain can be obtained in secrecy rate between the
proposed and GSVD-based precodings.Comment: Accepted for publication in IEEE Transactions on Wireless
Communication
On the Capacity of a Class of MIMO Cognitive Radios
Cognitive radios have been studied recently as a means to utilize spectrum in
a more efficient manner. This paper focuses on the fundamental limits of
operation of a MIMO cognitive radio network with a single licensed user and a
single cognitive user. The channel setting is equivalent to an interference
channel with degraded message sets (with the cognitive user having access to
the licensed user's message). An achievable region and an outer bound is
derived for such a network setting. It is shown that under certain conditions,
the achievable region is optimal for a portion of the capacity region that
includes sum capacity.Comment: 13 pages, 8 figures, Accepted for publication in Journal of Selected
Topics in Signal Processing (JSTSP) - Special Issue on Dynamic Spectrum
Acces
Dynamic Resource Allocation in Cognitive Radio Networks: A Convex Optimization Perspective
This article provides an overview of the state-of-art results on
communication resource allocation over space, time, and frequency for emerging
cognitive radio (CR) wireless networks. Focusing on the
interference-power/interference-temperature (IT) constraint approach for CRs to
protect primary radio transmissions, many new and challenging problems
regarding the design of CR systems are formulated, and some of the
corresponding solutions are shown to be obtainable by restructuring some
classic results known for traditional (non-CR) wireless networks. It is
demonstrated that convex optimization plays an essential role in solving these
problems, in a both rigorous and efficient way. Promising research directions
on interference management for CR and other related multiuser communication
systems are discussed.Comment: to appear in IEEE Signal Processing Magazine, special issue on convex
optimization for signal processin
- …