677 research outputs found
Optimal power allocation for MIMO-OFDM based Cognitive Radio systems with arbitrary input distributions
In Cognitive Radio (CR) systems, the data rate of the Secondary User (SU) can be maximized by optimizing the transmit power, given a threshold for the interference caused to the Primary User (PU). In conventional power optimization algorithms, the Gaussian input distribution is assumed, which is unrealistic, whereas the Finite Symbol Alphabet (FSA) input distribution, (i.e., M-QAM) is more applicable to practical systems. In this paper, we consider the power optimization problem in multiple input multiple output orthogonal frequency division multiplexing based CR systems given FSA inputs, and derive an optimal power allocation scheme by capitalizing on the relationship between mutual information and minimum mean square error. The proposed scheme is shown to save transmit power compared to its conventional counterpart. Furthermore, our proposed scheme achieves higher data rate compared to the Gaussian optimized power due to fewer number of subcarriers being nulled. The proposed optimal power algorithm is evaluated and compared with the conventional power allocation algorithms using Monte Carlo simulations. Numerical results reveal that, for distances between the SU transmitter and the PU receiver ranging between 50m to 85m, the transmit power saving with the proposed algorithm is in the range 13-90%, whereas the rate gain is in the range 5-31% depending on the modulation scheme (i.e., BPSK, QPSK and 16-QAM) used
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Precoded Chebyshev-NLMS based pre-distorter for nonlinear LED compensation in NOMA-VLC
Visible light communication (VLC) is one of the main technologies driving the
future 5G communication systems due to its ability to support high data rates
with low power consumption, thereby facilitating high speed green
communications. To further increase the capacity of VLC systems, a technique
called non-orthogonal multiple access (NOMA) has been suggested to cater to
increasing demand for bandwidth, whereby users' signals are superimposed prior
to transmission and detected at each user equipment using successive
interference cancellation (SIC). Some recent results on NOMA exist which
greatly enhance the achievable capacity as compared to orthogonal multiple
access techniques. However, one of the performance-limiting factors affecting
VLC systems is the nonlinear characteristics of a light emitting diode (LED).
This paper considers the nonlinear LED characteristics in the design of
pre-distorter for cognitive radio inspired NOMA in VLC, and proposes singular
value decomposition based Chebyshev precoding to improve performance of
nonlinear multiple-input multiple output NOMA-VLC. A novel and generalized
power allocation strategy is also derived in this work, which is valid even in
scenarios when users experience similar channels. Additionally, in this work,
analytical upper bounds for the bit error rate of the proposed detector are
derived for square -quadrature amplitude modulation.Comment: R. Mitra and V. Bhatia are with Indian Institute of Technology
Indore, Indore-453552, India, Email:[email protected],
[email protected]. This work was submitted to IEEE Transactions on
Communications on October 26, 2016, decisioned on March 3, 2017, and revised
on April 25, 2017, and is currently under review in IEEE Transactions on
Communication
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
- …