1,822 research outputs found
On the Outage Probability of the Full-Duplex Interference-Limited Relay Channel
In this paper, we study the performance, in terms of the asymptotic error
probability, of a user which communicates with a destination with the aid of a
full-duplex in-band relay. We consider that the network is
interference-limited, and interfering users are distributed as a Poisson point
process. In this case, the asymptotic error probability is upper bounded by the
outage probability (OP). We investigate the outage behavior for well-known
cooperative schemes, namely, decode-and-forward (DF) and compress-and-forward
(CF) considering fading and path loss. For DF we determine the exact OP and
develop upper bounds which are tight in typical operating conditions. Also, we
find the correlation coefficient between source and relay signals which
minimizes the OP when the density of interferers is small. For CF, the
achievable rates are determined by the spatial correlation of the
interferences, and a straightforward analysis isn't possible. To handle this
issue, we show the rate with correlated noises is at most one bit worse than
with uncorrelated noises, and thus find an upper bound on the performance of
CF. These results are useful to evaluate the performance and to optimize
relaying schemes in the context of full-duplex wireless networks.Comment: 30 pages, 4 figures. Final version. To appear in IEEE JSAC Special
Issue on Full-duplex Wireless Communications and Networks, 201
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Cooperative Multi-Cell Networks: Impact of Limited-Capacity Backhaul and Inter-Users Links
Cooperative technology is expected to have a great impact on the performance
of cellular or, more generally, infrastructure networks. Both multicell
processing (cooperation among base stations) and relaying (cooperation at the
user level) are currently being investigated. In this presentation, recent
results regarding the performance of multicell processing and user cooperation
under the assumption of limited-capacity interbase station and inter-user
links, respectively, are reviewed. The survey focuses on related results
derived for non-fading uplink and downlink channels of simple cellular system
models. The analytical treatment, facilitated by these simple setups, enhances
the insight into the limitations imposed by limited-capacity constraints on the
gains achievable by cooperative techniques
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …