562 research outputs found
Wireless-Powered Communication Assisted by Two-Way Relay with Interference Alignment Underlaying Cognitive Radio Network
This study investigates the outage performance of an under-laying
wireless-powered secondary system that reuses the primary users (PU) spectrum
in a multiple-input multiple-output (MIMO) cognitive radio (CR) network. Each
secondary user (SU) harvests energy and receives information simultaneously by
applying power splitting (PS) protocol. The communication between SUs is aided
by a two-way (TW) decode and forward (DF) relay. We formulate a problem to
design the PS ratios at SUs, the power control factor at the secondary relay,
and beamforming matrices at all nodes to minimize the secondary network's
outage probability. To address this problem, we propose a two-step solution.
The first step establishes closedform expressions for the PS ratios at each SU
and secondary relay's power control factor. Furthermore, in the second step,
interference alignment (IA) is used to design proper precoding and decoding
matrices for managing the interference between secondary and primary networks.
We choose IA matrices based on the minimum mean square error (MMSE) iterative
algorithm. The simulation results demonstrate a significant decrease in the
outage probability for the proposed scheme compared to the benchmark schemes,
with an average reduction of more than two orders of magnitude achieved
Wireless-powered cooperative MIMO NOMA networks: Design and performance improvement for cell-edge users
In this paper, we study two transmission scenarios for the base station (BS) in cellular networks to serve the far user, who is located at the cell-edge area in such a network. In particular, we show that wireless-powered non-orthogonal multiple access (NOMA) and the cell-center user in such a model can harvest energy from the BS. To overcome disadvantages of the cell-edge user due to its weak received signal, we fabricate a far NOMA user with multiple antennas to achieve performance improvement. In addition, the first scenario only considers a relay link deployed to forward signals to a far NOMA user, while both direct links and relay links are generally enabled to serve a far user in the second scenario. These situations, together with their outage performance, are analyzed and compared to provide insights in the design of a real-multiple-antenna NOMA network, in which the BS is also required to equip multiple antennas for robust quality of transmission. Higher complexity in computations is already known in consideration of outage metrics with respect to performance analysis, since the system model employs multiple antennas. To this end, we employ a transmit antenna selection (TAS) policy to formulate closed-form expressions of outage probability that satisfies the quality-of-service (QoS) requirements in the NOMA network. Our simulation results reveal that the performance of the considered system will be improved in cases of higher quantity of transmit antennas in dedicated devices. Finally, the proposed design in such a NOMA system cannot only ensure a downlink with higher quality to serve a far NOMA user, but also provide significant system performance improvement compared to a traditional NOMA networks using a single antenna.Web of Science83art. no. 32
Transmit optimization techniques for physical layer security
PhD ThesisOver the last several decades, reliable communication has received considerable
attention in the area of dynamic network con gurations and
distributed processing techniques. Traditional secure communications
mainly considered transmission cryptography, which has been developed
in the network layer. However, the nature of wireless transmission introduces
various challenges of key distribution and management in establishing
secure communication links. Physical layer security has been
recently recognized as a promising new design paradigm to provide security
in wireless networks in addition to existing conventional cryptographic
methods, where the physical layer dynamics of fading channels
are exploited to establish secure wireless links. On the other hand, with
the ever-increasing demand of wireless access users, multi-antenna transmission
has been considered as one of e ective approaches to improve
the capacity of wireless networks. Multi-antenna transmission applied
in physical layer security has extracted more and more attentions by
exploiting additional degrees of freedom and diversity gains.
In this thesis, di erent multi-antenna transmit optimization techniques
are developed for physical layer secure transmission. The secrecy rate
optimization problems (i.e., power minimization and secrecy rate maximization)
are formulated to guarantee the optimal power allocation.
First, transmit optimization for multiple-input single-output (MISO) secrecy
channels are developed to design secure transmit beamformer that
minimize the transmit power to achieve a target secrecy rate. Besides,
the associated robust scheme with the secrecy rate outage probability
constraint are presented with statistical channel uncertainty, where the
outage probability constraint requires that the achieved secrecy rate
exceeds certain thresholds with a speci c probability. Second, multiantenna
cooperative jammer (CJ) is presented to provide jamming services
that introduces extra interference to assist a multiple-input multipleoutput
(MIMO) secure transmission. Transmit optimization for this CJaided
MIMO secrecy channel is designed to achieve an optimal power
allocation. Moreover, secure transmission is achieved when the CJ introduces
charges for its jamming service based on the amount of the
interference caused to the eavesdropper, where the Stackelberg game
is proposed to handle, and the Stackelberg equilibrium is analytically
derived. Finally, transmit optimization for MISO secure simultaneous
wireless information and power transfer (SWIPT) is investigated, where
secure transmit beamformer is designed with/without the help of arti -
cial noise (AN) to maximize the achieved secrecy rate such that satisfy
the transmit power budget and the energy harvesting (EH) constraint.
The performance of all proposed schemes are validated by MATLAB
simulation results
- …