404 research outputs found

    Interference Alignment for Cognitive Radio Communications and Networks: A Survey

    Get PDF
    © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).Interference alignment (IA) is an innovative wireless transmission strategy that has shown to be a promising technique for achieving optimal capacity scaling of a multiuser interference channel at asymptotically high-signal-to-noise ratio (SNR). Transmitters exploit the availability of multiple signaling dimensions in order to align their mutual interference at the receivers. Most of the research has focused on developing algorithms for determining alignment solutions as well as proving interference alignment’s theoretical ability to achieve the maximum degrees of freedom in a wireless network. Cognitive radio, on the other hand, is a technique used to improve the utilization of the radio spectrum by opportunistically sensing and accessing unused licensed frequency spectrum, without causing harmful interference to the licensed users. With the increased deployment of wireless services, the possibility of detecting unused frequency spectrum becomes diminished. Thus, the concept of introducing interference alignment in cognitive radio has become a very attractive proposition. This paper provides a survey of the implementation of IA in cognitive radio under the main research paradigms, along with a summary and analysis of results under each system model.Peer reviewe

    Opportunistic Interference Mitigation Achieves Optimal Degrees-of-Freedom in Wireless Multi-cell Uplink Networks

    Full text link
    We introduce an opportunistic interference mitigation (OIM) protocol, where a user scheduling strategy is utilized in KK-cell uplink networks with time-invariant channel coefficients and base stations (BSs) having MM antennas. Each BS opportunistically selects a set of users who generate the minimum interference to the other BSs. Two OIM protocols are shown according to the number SS of simultaneously transmitting users per cell: opportunistic interference nulling (OIN) and opportunistic interference alignment (OIA). Then, their performance is analyzed in terms of degrees-of-freedom (DoFs). As our main result, it is shown that KMKM DoFs are achievable under the OIN protocol with MM selected users per cell, if the total number NN of users in a cell scales at least as SNR(K−1)M\text{SNR}^{(K-1)M}. Similarly, it turns out that the OIA scheme with SS(<M<M) selected users achieves KSKS DoFs, if NN scales faster than SNR(K−1)S\text{SNR}^{(K-1)S}. These results indicate that there exists a trade-off between the achievable DoFs and the minimum required NN. By deriving the corresponding upper bound on the DoFs, it is shown that the OIN scheme is DoF optimal. Finally, numerical evaluation, a two-step scheduling method, and the extension to multi-carrier scenarios are shown.Comment: 18 pages, 3 figures, Submitted to IEEE Transactions on Communication

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks

    Get PDF
    Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be promising in the fifth generation (5G) wireless networks. H-CRANs enable users to enjoy diverse services with high energy efficiency, high spectral efficiency, and low-cost operation, which are achieved by using cloud computing and virtualization techniques. However, H-CRANs face many technical challenges due to massive user connectivity, increasingly severe spectrum scarcity and energy-constrained devices. These challenges may significantly decrease the quality of service of users if not properly tackled. Non-orthogonal multiple access (NOMA) schemes exploit non-orthogonal resources to provide services for multiple users and are receiving increasing attention for their potential of improving spectral and energy efficiency in 5G networks. In this article a framework for energy-efficient NOMA H-CRANs is presented. The enabling technologies for NOMA H-CRANs are surveyed. Challenges to implement these technologies and open issues are discussed. This article also presents the performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure

    Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection -- Secure DoF and Jammer Scaling Law

    Full text link
    In this paper, we propose opportunistic jammer selection in a wireless security system for increasing the secure degrees of freedom (DoF) between a transmitter and a legitimate receiver (say, Alice and Bob). There is a jammer group consisting of SS jammers among which Bob selects KK jammers. The selected jammers transmit independent and identically distributed Gaussian signals to hinder the eavesdropper (Eve). Since the channels of Bob and Eve are independent, we can select the jammers whose jamming channels are aligned at Bob, but not at Eve. As a result, Eve cannot obtain any DoF unless it has more than KNjKN_j receive antennas, where NjN_j is the number of jammer's transmit antenna each, and hence KNjKN_j can be regarded as defensible dimensions against Eve. For the jamming signal alignment at Bob, we propose two opportunistic jammer selection schemes and find the scaling law of the required number of jammers for target secure DoF by a geometrical interpretation of the received signals.Comment: Accepted with minor revisions, IEEE Trans. on Signal Processin

    Optimising Cooperative Spectrum Sensing in Cognitive Radio Networks Using Interference Alignment and Space-Time Coding

    Get PDF
    In this thesis, the process of optimizing Cooperative Spectrum Sensing in Cognitive Radio has been investigated in fast-fading environments where simulation results have shown that its performance is limited by the Probability of Reporting Errors. By proposing a transmit diversity scheme using Differential space-time block codes (D-STBC) where channel state information (CSI) is not required and regarding multiple pairs of Cognitive Radios (CR’s) with single antennas as a virtual MIMO antenna arrays in multiple clusters, Differential space-time coding is applied for the purpose of decision reporting over Rayleigh channels. Both Hard and Soft combination schemes were investigated at the fusion center to reveal performance advantages for Hard combination schemes due to their minimal bandwidth requirements and simplistic implementation. The simulations results show that this optimization process achieves full transmit diversity, albeit with slight performance degradation in terms of power with improvements in performance when compared to conventional Cooperative Spectrum Sensing over non-ideal reporting channels. Further research carried out in this thesis shows performance deficits of Cooperative Spectrum Sensing due to interference on sensing channels of Cognitive Radio. Interference Alignment (IA) being a revolutionary wireless transmission strategy that reduces the impact of interference seems well suited as a strategy that can be used to optimize the performance of Cooperative Spectrum Sensing. The idea of IA is to coordinate multiple transmitters so that their mutual interference aligns at their receivers, facilitating simple interference cancellation techniques. Since its inception, research efforts have primarily been focused on verifying IA’s ability to achieve the maximum degrees of freedom (an approximation of sum capacity), developing algorithms for determining alignment solutions and designing transmission strategies that relax the need for perfect alignment but yield better performance. With the increased deployment of wireless services, CR’s ability to opportunistically sense and access the unused licensed frequency spectrum, without causing harmful interference to the licensed users becomes increasingly diminished, making the concept of introducing IA in CR a very attractive proposition. For a multiuser multiple-input–multiple-output (MIMO) overlay CR network, a space-time opportunistic IA (ST-OIA) technique has been proposed that allows spectrum sharing between a single primary user (PU) and multiple secondary users (SU) while ensuring zero interference to the PUs. With local CSI available at both the transmitters and receivers of SUs, the PU employs a space-time WF (STWF) algorithm to optimize its transmission and in the process, frees up unused eigenmodes that can be exploited by the SU. STWF achieves higher performance than other WF algorithms at low to moderate signal-to-noise ratio (SNR) regimes, which makes it ideal for implementation in CR networks. The SUs align their transmitted signals in such a way their interference impairs only the PU’s unused eigenmodes. For the multiple SUs to further exploit the benefits of Cooperative Spectrum Sensing, it was shown in this thesis that IA would only work when a set of conditions were met. The first condition ensures that the SUs satisfy a zero interference constraint at the PU’s receiver by designing their post-processing matrices such that they are orthogonal to the received signal from the PU link. The second condition ensures a zero interference constraint at both the PU and SUs receivers i.e. the constraint ensures that no interference from the SU transmitters is present at the output of the post-processing matrices of its unintended receivers. The third condition caters for the multiple SUs scenario to ensure interference from multiple SUs are aligned along unused eigenmodes. The SU system is assumed to employ a time division multiple access (TDMA) system such that the Principle of Reciprocity is employed towards optimizing the SUs transmission rates. Since aligning multiple SU transmissions at the PU is always limited by availability of spatial dimensions as well as typical user loads, the third condition proposes a user selection algorithm by the fusion centre (FC), where the SUs are grouped into clusters based on their numbers (i.e. two SUs per cluster) and their proximity to the FC, so that they can be aligned at each PU-Rx. This converts the cognitive IA problem into an unconstrained standard IA problem for a general cognitive system. Given the fact that the optimal power allocation algorithms used to optimize the SUs transmission rates turns out to be an optimal beamformer with multiple eigenbeams, this work initially proposes combining the diversity gain property of STBC, the zero-forcing function of IA and beamforming to optimize the SUs transmission rates. However, this solution requires availability of CSI, and to eliminate the need for this, this work then combines the D-STBC scheme with optimal IA precoders (consisting of beamforming and zero-forcing) to maximize the SUs data rates
    • …
    corecore