2,564 research outputs found
Symbol error rate analysis for M-QAM modulated physical-layer network coding with phase errors
Recent theoretical studies of physical-layer network coding (PNC) show much interest on high-level modulation, such as M-ary quadrature amplitude modulation (M-QAM), and most related works are based on the assumption of phase synchrony. The possible presence of synchronization error and channel estimation error highlight the demand of analyzing the symbol error rate (SER) performance of PNC under different phase errors. Assuming synchronization and a general constellation mapping method, which maps the superposed signal into a set of M coded symbols, in this paper, we analytically derive the SER for M-QAM modulated PNC under different phase errors. We obtain an approximation of SER for general M-QAM modulations, as well as exact SER for quadrature phase-shift keying (QPSK), i.e. 4-QAM. Afterwards, theoretical results are verified by Monte Carlo simulations. The results in this paper can be used as benchmarks for designing practical systems supporting PNC. © 2012 IEEE
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
User-Antenna Selection for Physical-Layer Network Coding based on Euclidean Distance
In this paper, we present the error performance analysis of a multiple-input
multiple-output (MIMO) physical-layer network coding (PNC) system with two
different user-antenna selection (AS) schemes in asymmetric channel conditions.
For the first antenna selection scheme (AS1), where the user-antenna is
selected in order to maximize the overall channel gain between the user and the
relay, we give an explicit analytical proof that for binary modulations, the
system achieves full diversity order of in the
multiple-access (MA) phase, where , and denote the number of
antennas at user , user and relay respectively. We present a
detailed investigation of the diversity order for the MIMO-PNC system with AS1
in the MA phase for any modulation order. A tight closed-form upper bound on
the average SER is also derived for the special case when , which is
valid for any modulation order. We show that in this case the system fails to
achieve transmit diversity in the MA phase, as the system diversity order drops
to irrespective of the number of transmit antennas at the user nodes.
Additionally, we propose a Euclidean distance (ED) based user-antenna selection
scheme (AS2) which outperforms the first scheme in terms of error performance.
Moreover, by deriving upper and lower bounds on the diversity order for the
MIMO-PNC system with AS2, we show that this system enjoys both transmit and
receive diversity, achieving full diversity order of in the MA phase for any modulation order. Monte Carlo simulations are
provided which confirm the correctness of the derived analytical results.Comment: IEEE Transactions on Communications. arXiv admin note: text overlap
with arXiv:1709.0445
Performance Analysis of Adaptive Physical Layer Network Coding for Wireless Two-way Relaying
The analysis of modulation schemes for the physical layer network-coded two
way relaying scenario is presented which employs two phases: Multiple access
(MA) phase and Broadcast (BC) phase. It was shown by Koike-Akino et. al. that
adaptively changing the network coding map used at the relay according to the
channel conditions greatly reduces the impact of multiple access interference
which occurs at the relay during the MA phase. Depending on the signal set used
at the end nodes, deep fades occur for a finite number of channel fade states
referred as the singular fade states. The singular fade states fall into the
following two classes: The ones which are caused due to channel outage and
whose harmful effect cannot be mitigated by adaptive network coding are
referred as the \textit{non-removable singular fade states}. The ones which
occur due to the choice of the signal set and whose harmful effects can be
removed by a proper choice of the adaptive network coding map are referred as
the \textit{removable} singular fade states. In this paper, we derive an upper
bound on the average end-to-end Symbol Error Rate (SER), with and without
adaptive network coding at the relay, for a Rician fading scenario. It is shown
that without adaptive network coding, at high Signal to Noise Ratio (SNR), the
contribution to the end-to-end SER comes from the following error events which
fall as : the error events associated with the removable
singular fade states, the error events associated with the non-removable
singular fade states and the error event during the BC phase. In contrast, for
the adaptive network coding scheme, the error events associated with the
removable singular fade states contributing to the average end-to-end SER fall
as and as a result the adaptive network coding scheme
provides a coding gain over the case when adaptive network coding is not used.Comment: 10 pages, 5 figure
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
PNC Enabled IIoT: A General Framework for Channel-Coded Asymmetric Physical-Layer Network Coding
This paper investigates the application of physical-layer network coding
(PNC) to Industrial Internet-of-Things (IIoT) where a controller and a robot
are out of each other's transmission range, and they exchange messages with the
assistance of a relay. We particularly focus on a scenario where the controller
has more transmitted information, and the channel of the controller is stronger
than that of the robot. To reduce the communication latency, we propose an
asymmetric transmission scheme where the controller and robot transmit
different amount of information in the uplink of PNC simultaneously. To achieve
this, the controller chooses a higher order modulation. In addition, the both
users apply channel codes to guarantee the reliability. A problem is a
superimposed symbol at the relay contains different amount of source
information from the two end users. It is thus hard for the relay to deduce
meaningful network-coded messages by applying the current PNC decoding
techniques which require the end users to transmit the same amount of
information. To solve this problem, we propose a lattice-based scheme where the
two users encode-and-modulate their information in lattices with different
lattice construction levels. Our design is versatile on that the two end users
can freely choose their modulation orders based on their channel power, and the
design is applicable for arbitrary channel codes.Comment: Submitted to IEEE for possible publicatio
Lattices from Codes for Harnessing Interference: An Overview and Generalizations
In this paper, using compute-and-forward as an example, we provide an
overview of constructions of lattices from codes that possess the right
algebraic structures for harnessing interference. This includes Construction A,
Construction D, and Construction (previously called product
construction) recently proposed by the authors. We then discuss two
generalizations where the first one is a general construction of lattices named
Construction subsuming the above three constructions as special cases
and the second one is to go beyond principal ideal domains and build lattices
over algebraic integers
Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages
The broadcast channel with confidential messages is a well studied scenario
from the theoretical standpoint, but there is still lack of practical schemes
able to achieve some fixed level of reliability and security over such a
channel. In this paper, we consider a quasi-static fading channel in which both
public and private messages must be sent from the transmitter to the receivers,
and we aim at designing suitable coding and modulation schemes to achieve such
a target. For this purpose, we adopt the error rate as a metric, by considering
that reliability (security) is achieved when a sufficiently low (high) error
rate is experienced at the receiving side. We show that some conditions exist
on the system feasibility, and that some outage probability must be tolerated
to cope with the fading nature of the channel. The proposed solution exploits
low-density parity-check codes with unequal error protection, which are able to
guarantee two different levels of protection against noise for the public and
the private information, in conjunction with different modulation schemes for
the public and the private message bits.Comment: 6 pages, 4 figures, to be presented at IEEE ICC'14 - Workshop on
Wireless Physical Layer Securit
- …