306 research outputs found
HARQ Feedback in Spectrum Sharing Networks
This letter studies the throughput and the outage probability of spectrum
sharing networks utilizing hybrid automatic repeat request (HARQ) feedback. We
focus on the repetition time diversity and the incremental redundancy HARQ
protocols where the results are obtained for both continuous and bursting
communication models. The channel data transmission efficiency is investigated
in the presence of both secondary user peak transmission power and primary user
received interference power constraints. Finally, we evaluate the effect of
secondary-primary channel state information imperfection on the performance of
the secondary channel. Simulation results show that, while the throughput is
not necessarily increased by HARQ, substantial outage probability reduction is
achieved in all conditions.Comment: Published in IEEE Communications Letter
Secret Message Transmission by HARQ with Multiple Encoding
Secure transmission between two agents, Alice and Bob, over block fading
channels can be achieved similarly to conventional hybrid automatic repeat
request (HARQ) by letting Alice transmit multiple blocks, each containing an
encoded version of the secret message, until Bob informs Alice about successful
decoding by a public error-free return channel. In existing literature each
block is a differently punctured version of a single codeword generated with a
Wyner code that uses a common randomness for all blocks. In this paper instead
we propose a more general approach where multiple codewords are generated from
independent randomnesses. The class of channels for which decodability and
secrecy is ensured is characterized, with derivations for the existence of
secret codes. We show in particular that the classes are not a trivial subset
(or superset) of those of existing schemes, thus highlighting the novelty of
the proposed solution. The result is further confirmed by deriving the average
achievable secrecy throughput, thus taking into account both decoding and
secrecy outage.Comment: Proc. Int. Conference on Communications (ICC) 201
Rate Adaptation for Incremental Redundancy Secure HARQ
International audienceThis paper studies secure communication based on incremental redundancy (INR) secure hybrid automatic retrans-mission request (HARQ) protocol over block-fading wiretap channels. The transmitter has no instantaneous channel state information (CSI) available from either main channel or the eavesdropper channel, hence the coding rates cannot be adapted to instantaneous channel conditions. We investigate the outage performance for two schemes of INR secure HARQ protocols: case 1) when there exists two reliable multi-bit feedback channels from both legitimate receiver and eavesdropper to the transmitter carrying a function of outdated CSI, case 2) when there is a multi-bit feedback channel only from legitimate receiver. In both cases, we demonstrate that using the information carried via multi-bit feedback channels, the transmitter can adapt the coding rates in order to achieve a better secrecy throughput using a smaller number of transmissions comparing to the ACK/NACK feedback channel model. For some parameters, our rate adaptation protocol achieves a strictly positive secrecy throughput whereas it is equal to zero for the protocol with ACK/NACK feedback. We show that for some set of parameters, the loss of secrecy throughput between case 1 and case 2 is very small compared to the gain provided by both protocols
Wireless Network Control with Privacy Using Hybrid ARQ
We consider the problem of resource allocation in a wireless cellular
network, in which nodes have both open and private information to be
transmitted to the base station over block fading uplink channels. We develop a
cross-layer solution, based on hybrid ARQ transmission with incremental
redundancy. We provide a scheme that combines power control, flow control, and
scheduling in order to maximize a global utility function, subject to the
stability of the data queues, an average power constraint, and a constraint on
the privacy outage probability. Our scheme is based on the assumption that each
node has an estimate of its uplink channel gain at each block, while only the
distribution of the cross channel gains is available. We prove that our scheme
achieves a utility, arbitrarily close to the maximum achievable utility given
the available channel state information
- …