3,731 research outputs found
On Design of Collaborative Beamforming for Two-Way Relay Networks
We consider a two-way relay network, where two source nodes, S1 and S2,
exchange information through a cluster of relay nodes. The relay nodes receive
the sum signal from S1 and S2 in the first time slot. In the second time slot,
each relay node multiplies its received signal by a complex coefficient and
retransmits the signal to the two source nodes, which leads to a collaborative
two-way beamforming system. By applying the principle of analog network coding,
each receiver at S1 and S2 cancels the "self-interference" in the received
signal from the relay cluster and decodes the message. This paper studies the
2-dimensional achievable rate region for such a two-way relay network with
collaborative beamforming. With different assumptions of channel reciprocity
between the source-relay and relay-source channels, the achievable rate region
is characterized under two setups. First, with reciprocal channels, we
investigate the achievable rate regions when the relay cluster is subject to a
sum-power constraint or individual-power constraints. We show that the optimal
beamforming vectors obtained from solving the weighted sum inverse-SNR
minimization (WSISMin) problems are sufficient to characterize the
corresponding achievable rate region. Furthermore, we derive the closed form
solutions for those optimal beamforming vectors and consequently propose the
partially distributed algorithms to implement the optimal beamforming, where
each relay node only needs the local channel information and one global
parameter. Second, with the non-reciprocal channels, the achievable rate
regions are also characterized for both the sum-power constraint case and the
individual-power constraint case. Although no closed-form solutions are
available under this setup, we present efficient numerical algorithms.Comment: new version of the previously posted, single column double spacing,
24 page
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Rank-Two Beamforming and Power Allocation in Multicasting Relay Networks
In this paper, we propose a novel single-group multicasting relay beamforming
scheme. We assume a source that transmits common messages via multiple
amplify-and-forward relays to multiple destinations. To increase the number of
degrees of freedom in the beamforming design, the relays process two received
signals jointly and transmit the Alamouti space-time block code over two
different beams. Furthermore, in contrast to the existing relay multicasting
scheme of the literature, we take into account the direct links from the source
to the destinations. We aim to maximize the lowest received quality-of-service
by choosing the proper relay weights and the ideal distribution of the power
resources in the network. To solve the corresponding optimization problem, we
propose an iterative algorithm which solves sequences of convex approximations
of the original non-convex optimization problem. Simulation results demonstrate
significant performance improvements of the proposed methods as compared with
the existing relay multicasting scheme of the literature and an algorithm based
on the popular semidefinite relaxation technique
A Modified Levenberg-Marquardt Method for the Bidirectional Relay Channel
This paper presents an optimization approach for a system consisting of
multiple bidirectional links over a two-way amplify-and-forward relay. It is
desired to improve the fairness of the system. All user pairs exchange
information over one relay station with multiple antennas. Due to the joint
transmission to all users, the users are subject to mutual interference. A
mitigation of the interference can be achieved by max-min fair precoding
optimization where the relay is subject to a sum power constraint. The
resulting optimization problem is non-convex. This paper proposes a novel
iterative and low complexity approach based on a modified Levenberg-Marquardt
method to find near optimal solutions. The presented method finds solutions
close to the standard convex-solver based relaxation approach.Comment: submitted to IEEE Transactions on Vehicular Technology We corrected
small mistakes in the proof of Lemma 2 and Proposition
Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay
This paper studies the secure beamforming design in a multiple-antenna
three-node system where two source nodes exchange messages with the help of an
untrusted relay node. The relay acts as both an essential signal forwarder and
a potential eavesdropper. Both two-phase and three-phase two-way relay
strategies are considered. Our goal is to jointly optimize the source and relay
beamformers for maximizing the secrecy sum rate of the two-way communications.
We first derive the optimal relay beamformer structures. Then, iterative
algorithms are proposed to find source and relay beamformers jointly based on
alternating optimization. Furthermore, we conduct asymptotic analysis on the
maximum secrecy sum-rate. Our analysis shows that when all transmit powers
approach infinity, the two-phase two-way relay scheme achieves the maximum
secrecy sum rate if the source beamformers are designed such that the received
signals at the relay align in the same direction. This reveals an important
advantage of signal alignment technique in against eavesdropping. It is also
shown that if the source powers approach zero the three-phase scheme performs
the best while the two-phase scheme is even worse than direct transmission.
Simulation results have verified the efficiency of the secure beamforming
algorithms as well as the analytical findings.Comment: 10 figures, Submitted to IEEE Transactions on Signal Processin
Robust Transmissions in Wireless Powered Multi-Relay Networks with Chance Interference Constraints
In this paper, we consider a wireless powered multi-relay network in which a
multi-antenna hybrid access point underlaying a cellular system transmits
information to distant receivers. Multiple relays capable of energy harvesting
are deployed in the network to assist the information transmission. The hybrid
access point can wirelessly supply energy to the relays, achieving multi-user
gains from signal and energy cooperation. We propose a joint optimization for
signal beamforming of the hybrid access point as well as wireless energy
harvesting and collaborative beamforming strategies of the relays. The
objective is to maximize network throughput subject to probabilistic
interference constraints at the cellular user equipment. We formulate the
throughput maximization with both the time-switching and power-splitting
schemes, which impose very different couplings between the operating parameters
for wireless power and information transfer. Although the optimization problems
are inherently non-convex, they share similar structural properties that can be
leveraged for efficient algorithm design. In particular, by exploiting
monotonicity in the throughput, we maximize it iteratively via customized
polyblock approximation with reduced complexity. The numerical results show
that the proposed algorithms can achieve close to optimal performance in terms
of the energy efficiency and throughput.Comment: 14 pages, 8 figure
- …