13,200 research outputs found
Physical Layer Network Coding for the K-user Multiple Access Relay Channel
A Physical layer Network Coding (PNC) scheme is proposed for the -user
wireless Multiple Access Relay Channel (MARC), in which source nodes
transmit their messages to the destination node with the help of a relay
node The proposed PNC scheme involves two transmission phases: (i) Phase 1
during which the source nodes transmit, the relay node and the destination node
receive and (ii) Phase 2 during which the source nodes and the relay node
transmit, and the destination node receives. At the end of Phase 1, the relay
node decodes the messages of the source nodes and during Phase 2 transmits a
many-to-one function of the decoded messages. Wireless networks in which the
relay node decodes, suffer from loss of diversity order if the decoder at the
destination is not chosen properly. A novel decoder is proposed for the PNC
scheme, which offers the maximum possible diversity order of for a proper
choice of certain parameters and the network coding map. Specifically, the
network coding map used at the relay is chosen to be a -dimensional Latin
Hypercube, in order to ensure the maximum diversity order of Also, it is
shown that the proposed decoder can be implemented by a fast decoding
algorithm. Simulation results presented for the 3-user MARC show that the
proposed scheme offers a large gain over the existing scheme for the -user
MARC.Comment: More Simulation results added, 12 pages, 10 figures. arXiv admin
note: substantial text overlap with arXiv:1210.049
Linear physical-layer network coding and information combining for the K-user fading multiple-access relay network
© 2002-2012 IEEE. We propose a new linear physical-layer network coding (LPNC) and information combining scheme for the K -user fading multiple-access relay network (MARN), which consists of K users, one relay, and one destination. The relay and the destination are connected by a rate-constraint wired or wireless backhaul. In the proposed scheme, the K users transmit signals simultaneously. The relay and the destination receive the superimposed signals distorted by fading and noise. The relay reconstructs L linear combinations of the K users' messages, referred to as network-coded (NC) messages, and forwards them to the destination. The destination then attempts to recover all K users' messages by combining its received signals and the NC messages obtained from the relay. We develop an explicit expression on the selection of the coefficients of the NC messages at the relay that minimizes the end-to-end error probability at a high signal-to-noise ratio. We develop a channel-coded LPNC scheme by using an irregular repeat-accumulate modulation code over GF( q ). An iterative belief-propagation algorithm is employed to compute the NC messages at the relay, while a new algorithm is proposed for the information combining decoding at the destination. We demonstrate that our proposed scheme outperforms benchmark schemes significantly in both un-channel-coded and channel-coded MARNs
Reliable Physical Layer Network Coding
When two or more users in a wireless network transmit simultaneously, their
electromagnetic signals are linearly superimposed on the channel. As a result,
a receiver that is interested in one of these signals sees the others as
unwanted interference. This property of the wireless medium is typically viewed
as a hindrance to reliable communication over a network. However, using a
recently developed coding strategy, interference can in fact be harnessed for
network coding. In a wired network, (linear) network coding refers to each
intermediate node taking its received packets, computing a linear combination
over a finite field, and forwarding the outcome towards the destinations. Then,
given an appropriate set of linear combinations, a destination can solve for
its desired packets. For certain topologies, this strategy can attain
significantly higher throughputs over routing-based strategies. Reliable
physical layer network coding takes this idea one step further: using
judiciously chosen linear error-correcting codes, intermediate nodes in a
wireless network can directly recover linear combinations of the packets from
the observed noisy superpositions of transmitted signals. Starting with some
simple examples, this survey explores the core ideas behind this new technique
and the possibilities it offers for communication over interference-limited
wireless networks.Comment: 19 pages, 14 figures, survey paper to appear in Proceedings of the
IEE
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A Cooperative Network Coding Strategy for the Interference Relay Channel.
In this paper, we study an interference relay network with a satellite as relay. We propose a cooperative strategy based on physical layer network coding and superposition modulation decoding for uni-directional communications among users. The performance of our solution in terms of throughput is evaluated through capacity analysis and simulations that include practical constraints such as the lack of synchronization in time and frequency.We obtain a significant throughput gain compared to the classical time sharing case
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Weak Secrecy in the Multi-Way Untrusted Relay Channel with Compute-and-Forward
We investigate the problem of secure communications in a Gaussian multi-way
relay channel applying the compute-and-forward scheme using nested lattice
codes. All nodes employ half-duplex operation and can exchange confidential
messages only via an untrusted relay. The relay is assumed to be honest but
curious, i.e., an eavesdropper that conforms to the system rules and applies
the intended relaying scheme. We start with the general case of the
single-input multiple-output (SIMO) L-user multi-way relay channel and provide
an achievable secrecy rate region under a weak secrecy criterion. We show that
the securely achievable sum rate is equivalent to the difference between the
computation rate and the multiple access channel (MAC) capacity. Particularly,
we show that all nodes must encode their messages such that the common
computation rate tuple falls outside the MAC capacity region of the relay. We
provide results for the single-input single-output (SISO) and the
multiple-input single-input (MISO) L-user multi-way relay channel as well as
the two-way relay channel. We discuss these results and show the dependency
between channel realization and achievable secrecy rate. We further compare our
result to available results in the literature for different schemes and show
that the proposed scheme operates close to the compute-and-forward rate without
secrecy.Comment: submitted to JSAC Special Issue on Fundamental Approaches to Network
Coding in Wireless Communication System
Network-Coded Multiple Access
This paper proposes and experimentally demonstrates a first wireless local
area network (WLAN) system that jointly exploits physical-layer network coding
(PNC) and multiuser decoding (MUD) to boost system throughput. We refer to this
multiple access mode as Network-Coded Multiple Access (NCMA). Prior studies on
PNC mostly focused on relay networks. NCMA is the first realized multiple
access scheme that establishes the usefulness of PNC in a non-relay setting.
NCMA allows multiple nodes to transmit simultaneously to the access point (AP)
to boost throughput. In the non-relay setting, when two nodes A and B transmit
to the AP simultaneously, the AP aims to obtain both packet A and packet B
rather than their network-coded packet. An interesting question is whether
network coding, specifically PNC which extracts packet (A XOR B), can still be
useful in such a setting. We provide an affirmative answer to this question
with a novel two-layer decoding approach amenable to real-time implementation.
Our USRP prototype indicates that NCMA can boost throughput by 100% in the
medium-high SNR regime (>=10dB). We believe further throughput enhancement is
possible by allowing more than two users to transmit together
- …