562 research outputs found

    Wireless-Powered Communication Assisted by Two-Way Relay with Interference Alignment Underlaying Cognitive Radio Network

    Full text link
    This study investigates the outage performance of an under-laying wireless-powered secondary system that reuses the primary users (PU) spectrum in a multiple-input multiple-output (MIMO) cognitive radio (CR) network. Each secondary user (SU) harvests energy and receives information simultaneously by applying power splitting (PS) protocol. The communication between SUs is aided by a two-way (TW) decode and forward (DF) relay. We formulate a problem to design the PS ratios at SUs, the power control factor at the secondary relay, and beamforming matrices at all nodes to minimize the secondary network's outage probability. To address this problem, we propose a two-step solution. The first step establishes closedform expressions for the PS ratios at each SU and secondary relay's power control factor. Furthermore, in the second step, interference alignment (IA) is used to design proper precoding and decoding matrices for managing the interference between secondary and primary networks. We choose IA matrices based on the minimum mean square error (MMSE) iterative algorithm. The simulation results demonstrate a significant decrease in the outage probability for the proposed scheme compared to the benchmark schemes, with an average reduction of more than two orders of magnitude achieved

    Wireless-powered cooperative MIMO NOMA networks: Design and performance improvement for cell-edge users

    Get PDF
    In this paper, we study two transmission scenarios for the base station (BS) in cellular networks to serve the far user, who is located at the cell-edge area in such a network. In particular, we show that wireless-powered non-orthogonal multiple access (NOMA) and the cell-center user in such a model can harvest energy from the BS. To overcome disadvantages of the cell-edge user due to its weak received signal, we fabricate a far NOMA user with multiple antennas to achieve performance improvement. In addition, the first scenario only considers a relay link deployed to forward signals to a far NOMA user, while both direct links and relay links are generally enabled to serve a far user in the second scenario. These situations, together with their outage performance, are analyzed and compared to provide insights in the design of a real-multiple-antenna NOMA network, in which the BS is also required to equip multiple antennas for robust quality of transmission. Higher complexity in computations is already known in consideration of outage metrics with respect to performance analysis, since the system model employs multiple antennas. To this end, we employ a transmit antenna selection (TAS) policy to formulate closed-form expressions of outage probability that satisfies the quality-of-service (QoS) requirements in the NOMA network. Our simulation results reveal that the performance of the considered system will be improved in cases of higher quantity of transmit antennas in dedicated devices. Finally, the proposed design in such a NOMA system cannot only ensure a downlink with higher quality to serve a far NOMA user, but also provide significant system performance improvement compared to a traditional NOMA networks using a single antenna.Web of Science83art. no. 32

    Transmit optimization techniques for physical layer security

    Get PDF
    PhD ThesisOver the last several decades, reliable communication has received considerable attention in the area of dynamic network con gurations and distributed processing techniques. Traditional secure communications mainly considered transmission cryptography, which has been developed in the network layer. However, the nature of wireless transmission introduces various challenges of key distribution and management in establishing secure communication links. Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks in addition to existing conventional cryptographic methods, where the physical layer dynamics of fading channels are exploited to establish secure wireless links. On the other hand, with the ever-increasing demand of wireless access users, multi-antenna transmission has been considered as one of e ective approaches to improve the capacity of wireless networks. Multi-antenna transmission applied in physical layer security has extracted more and more attentions by exploiting additional degrees of freedom and diversity gains. In this thesis, di erent multi-antenna transmit optimization techniques are developed for physical layer secure transmission. The secrecy rate optimization problems (i.e., power minimization and secrecy rate maximization) are formulated to guarantee the optimal power allocation. First, transmit optimization for multiple-input single-output (MISO) secrecy channels are developed to design secure transmit beamformer that minimize the transmit power to achieve a target secrecy rate. Besides, the associated robust scheme with the secrecy rate outage probability constraint are presented with statistical channel uncertainty, where the outage probability constraint requires that the achieved secrecy rate exceeds certain thresholds with a speci c probability. Second, multiantenna cooperative jammer (CJ) is presented to provide jamming services that introduces extra interference to assist a multiple-input multipleoutput (MIMO) secure transmission. Transmit optimization for this CJaided MIMO secrecy channel is designed to achieve an optimal power allocation. Moreover, secure transmission is achieved when the CJ introduces charges for its jamming service based on the amount of the interference caused to the eavesdropper, where the Stackelberg game is proposed to handle, and the Stackelberg equilibrium is analytically derived. Finally, transmit optimization for MISO secure simultaneous wireless information and power transfer (SWIPT) is investigated, where secure transmit beamformer is designed with/without the help of arti - cial noise (AN) to maximize the achieved secrecy rate such that satisfy the transmit power budget and the energy harvesting (EH) constraint. The performance of all proposed schemes are validated by MATLAB simulation results
    • …
    corecore