677 research outputs found

    Optimal power allocation for MIMO-OFDM based Cognitive Radio systems with arbitrary input distributions

    Get PDF
    In Cognitive Radio (CR) systems, the data rate of the Secondary User (SU) can be maximized by optimizing the transmit power, given a threshold for the interference caused to the Primary User (PU). In conventional power optimization algorithms, the Gaussian input distribution is assumed, which is unrealistic, whereas the Finite Symbol Alphabet (FSA) input distribution, (i.e., M-QAM) is more applicable to practical systems. In this paper, we consider the power optimization problem in multiple input multiple output orthogonal frequency division multiplexing based CR systems given FSA inputs, and derive an optimal power allocation scheme by capitalizing on the relationship between mutual information and minimum mean square error. The proposed scheme is shown to save transmit power compared to its conventional counterpart. Furthermore, our proposed scheme achieves higher data rate compared to the Gaussian optimized power due to fewer number of subcarriers being nulled. The proposed optimal power algorithm is evaluated and compared with the conventional power allocation algorithms using Monte Carlo simulations. Numerical results reveal that, for distances between the SU transmitter and the PU receiver ranging between 50m to 85m, the transmit power saving with the proposed algorithm is in the range 13-90%, whereas the rate gain is in the range 5-31% depending on the modulation scheme (i.e., BPSK, QPSK and 16-QAM) used

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Precoded Chebyshev-NLMS based pre-distorter for nonlinear LED compensation in NOMA-VLC

    Get PDF
    Visible light communication (VLC) is one of the main technologies driving the future 5G communication systems due to its ability to support high data rates with low power consumption, thereby facilitating high speed green communications. To further increase the capacity of VLC systems, a technique called non-orthogonal multiple access (NOMA) has been suggested to cater to increasing demand for bandwidth, whereby users' signals are superimposed prior to transmission and detected at each user equipment using successive interference cancellation (SIC). Some recent results on NOMA exist which greatly enhance the achievable capacity as compared to orthogonal multiple access techniques. However, one of the performance-limiting factors affecting VLC systems is the nonlinear characteristics of a light emitting diode (LED). This paper considers the nonlinear LED characteristics in the design of pre-distorter for cognitive radio inspired NOMA in VLC, and proposes singular value decomposition based Chebyshev precoding to improve performance of nonlinear multiple-input multiple output NOMA-VLC. A novel and generalized power allocation strategy is also derived in this work, which is valid even in scenarios when users experience similar channels. Additionally, in this work, analytical upper bounds for the bit error rate of the proposed detector are derived for square MM-quadrature amplitude modulation.Comment: R. Mitra and V. Bhatia are with Indian Institute of Technology Indore, Indore-453552, India, Email:[email protected], [email protected]. This work was submitted to IEEE Transactions on Communications on October 26, 2016, decisioned on March 3, 2017, and revised on April 25, 2017, and is currently under review in IEEE Transactions on Communication

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
    corecore