74 research outputs found
Energy efficient OFDMA networks maintaining statistical QoS guarantees for delay-sensitive traffic
An energy-efficient design is proposed under specific statistical quality-of-service (QoS) guarantees for delay-sensitive traffic in the downlink orthogonal frequency-division multiple access (OFDMA) networks. This design is based on Wu’s effective capacity (EC) concept [1], which characterizes the maximum throughput of a system subject to statistical delay-QoS requirements at the data-link layer. In the particular context considered, our main contributions consist of quantifying the effective energy-efficiency (EEE)-versus-EC tradeoff and characterizing the delay sensitive traffic as a function of the QoS-exponent ?, which expresses the exponential decay rate of the delay-QoS violation probabilities. Upon exploiting the properties of fractional programming, the originally quasi-concave EEE optimization problem having a fractional form is transformed into a subtractive optimization problem by applying Dinkelbach’s method. As a result, an iterative inner-outer loop based resource allocation algorithm is conceived for efficiently solving the transformed EEE optimization problem. Our simulation results demonstrate that the proposed scheme converges within a few Dinkelbach iterations to the desired solution accuracy. Furthermore, the impact of the circuitry power, of the QoS-exponent and of the power amplifier inefficiency is characterized numerically. These results reveal that the optimally allocated power maximizing the EEE decays exponentially with respect to both the circuitry power and the QoS-exponent, whilst decaying linearly with respect to the power amplifier inefficiency
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
In this paper, we investigate methods for reducing the likelihood that a
message transmitted between two multiantenna nodes is intercepted by an
undetected eavesdropper. In particular, we focus on the judicious transmission
of artificial interference to mask the desired signal at the time it is
broadcast. Unlike previous work that assumes some prior knowledge of the
eavesdropper's channel and focuses on maximizing secrecy capacity, we consider
the case where no information regarding the eavesdropper is available, and we
use signal-to-interference-plus-noise-ratio (SINR) as our performance metric.
Specifically, we focus on the problem of maximizing the amount of power
available to broadcast a jamming signal intended to hide the desired signal
from a potential eavesdropper, while maintaining a prespecified SINR at the
desired receiver. The jamming signal is designed to be orthogonal to the
information signal when it reaches the desired receiver, assuming both the
receiver and the eavesdropper employ optimal beamformers and possess exact
channel state information (CSI). In practice, the assumption of perfect CSI at
the transmitter is often difficult to justify. Therefore, we also study the
resulting performance degradation due to the presence of imperfect CSI, and we
present robust beamforming schemes that recover a large fraction of the
performance in the perfect CSI case. Numerical simulations verify our
analytical performance predictions, and illustrate the benefit of the robust
beamforming schemes.Comment: 10 pages, 5 figures; to appear, IEEE Transactions on Signal
Processing, 201
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
An Overview of Physical Layer Security with Finite Alphabet Signaling
Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research
Wireless Patient Monitoring over 4G Network
The purpose of this thesis is to explain how remote patient monitoring systems work over the 4G network using wearable sensors and corresponding interface devices. Gathered data from the sensing devices are carried over the Monitoring Wireless Sensor Network to the more elaborate 4G Network where the data is then relayed to the interface devices for reading, storage, interpretation and effective utilization.
This thesis describes the underlying technologies and principles of sensors and sensor net-works, the concept of the 4G Network and how it integrates with the sensor network.
The goal of Wireless Patient Monitoring over the 4G Network is link the spatial gap that exist between Healthcare and ICT, this will in turn enhance patients care efficiency while cutting costs, maximising profits and increase security while monitoring patients.
This thesis is important in that it gives the reader an overview and basic idea of how a wireless patient monitoring system works over the 4G Network. An increasing number of ICT firms, healthcare and medical institutions are investing heavily on remote patient monitoring systems technologies and this thesis provides the reader the insight of how such systems work and how they can be implemented
- …