145 research outputs found
Optimal Beamforming for Two-Way Multi-Antenna Relay Channel with Analogue Network Coding
This paper studies the wireless two-way relay channel (TWRC), where two
source nodes, S1 and S2, exchange information through an assisting relay node,
R. It is assumed that R receives the sum signal from S1 and S2 in one
time-slot, and then amplifies and forwards the received signal to both S1 and
S2 in the next time-slot. By applying the principle of analogue network (ANC),
each of S1 and S2 cancels the so-called "self-interference" in the received
signal from R and then decodes the desired message. Assuming that S1 and S2 are
each equipped with a single antenna and R with multi-antennas, this paper
analyzes the capacity region of an ANC-based TWRC with linear processing
(beamforming) at R. The capacity region contains all the achievable
bidirectional rate-pairs of S1 and S2 under the given transmit power
constraints at S1, S2, and R. We present the optimal relay beamforming
structure as well as an efficient algorithm to compute the optimal beamforming
matrix based on convex optimization techniques. Low-complexity suboptimal relay
beamforming schemes are also presented, and their achievable rates are compared
against the capacity with the optimal scheme.Comment: to appear in JSAC, 200
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks
By taking a variety of realistic hardware imperfections into consideration,
we propose an optimal power allocation (OPA) strategy to maximize the
instantaneous secrecy rate of a cooperative wireless network comprised of a
source, a destination and an untrusted amplify-and-forward (AF) relay. We
assume that either the source or the destination is equipped with a large-scale
multiple antennas (LSMA) system, while the rest are equipped with a single
antenna. To prevent the untrusted relay from intercepting the source message,
the destination sends an intended jamming noise to the relay, which is referred
to as destination-based cooperative jamming (DBCJ). Given this system model,
novel closed-form expressions are presented in the high signal-to-noise ratio
(SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage
probability (SOP). We further improve the secrecy performance of the system by
optimizing the associated hardware design. The results reveal that by
beneficially distributing the tolerable hardware imperfections across the
transmission and reception radio-frequency (RF) front ends of each node, the
system's secrecy rate may be improved. The engineering insight is that equally
sharing the total imperfections at the relay between the transmitter and the
receiver provides the best secrecy performance. Numerical results illustrate
that the proposed OPA together with the most appropriate hardware design
significantly increases the secrecy rate.Comment: 29 pages, 7 figures, Submitted to IEEE Transactions on Wireless
Communication
- …