74 research outputs found

    Energy efficient OFDMA networks maintaining statistical QoS guarantees for delay-sensitive traffic

    No full text
    An energy-efficient design is proposed under specific statistical quality-of-service (QoS) guarantees for delay-sensitive traffic in the downlink orthogonal frequency-division multiple access (OFDMA) networks. This design is based on Wu’s effective capacity (EC) concept [1], which characterizes the maximum throughput of a system subject to statistical delay-QoS requirements at the data-link layer. In the particular context considered, our main contributions consist of quantifying the effective energy-efficiency (EEE)-versus-EC tradeoff and characterizing the delay sensitive traffic as a function of the QoS-exponent ?, which expresses the exponential decay rate of the delay-QoS violation probabilities. Upon exploiting the properties of fractional programming, the originally quasi-concave EEE optimization problem having a fractional form is transformed into a subtractive optimization problem by applying Dinkelbach’s method. As a result, an iterative inner-outer loop based resource allocation algorithm is conceived for efficiently solving the transformed EEE optimization problem. Our simulation results demonstrate that the proposed scheme converges within a few Dinkelbach iterations to the desired solution accuracy. Furthermore, the impact of the circuitry power, of the QoS-exponent and of the power amplifier inefficiency is characterized numerically. These results reveal that the optimally allocated power maximizing the EEE decays exponentially with respect to both the circuitry power and the QoS-exponent, whilst decaying linearly with respect to the power amplifier inefficiency

    Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI

    Full text link
    In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In particular, we focus on the judicious transmission of artificial interference to mask the desired signal at the time it is broadcast. Unlike previous work that assumes some prior knowledge of the eavesdropper's channel and focuses on maximizing secrecy capacity, we consider the case where no information regarding the eavesdropper is available, and we use signal-to-interference-plus-noise-ratio (SINR) as our performance metric. Specifically, we focus on the problem of maximizing the amount of power available to broadcast a jamming signal intended to hide the desired signal from a potential eavesdropper, while maintaining a prespecified SINR at the desired receiver. The jamming signal is designed to be orthogonal to the information signal when it reaches the desired receiver, assuming both the receiver and the eavesdropper employ optimal beamformers and possess exact channel state information (CSI). In practice, the assumption of perfect CSI at the transmitter is often difficult to justify. Therefore, we also study the resulting performance degradation due to the presence of imperfect CSI, and we present robust beamforming schemes that recover a large fraction of the performance in the perfect CSI case. Numerical simulations verify our analytical performance predictions, and illustrate the benefit of the robust beamforming schemes.Comment: 10 pages, 5 figures; to appear, IEEE Transactions on Signal Processing, 201

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision

    An Overview of Physical Layer Security with Finite Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research

    Wireless Patient Monitoring over 4G Network

    Get PDF
    The purpose of this thesis is to explain how remote patient monitoring systems work over the 4G network using wearable sensors and corresponding interface devices. Gathered data from the sensing devices are carried over the Monitoring Wireless Sensor Network to the more elaborate 4G Network where the data is then relayed to the interface devices for reading, storage, interpretation and effective utilization. This thesis describes the underlying technologies and principles of sensors and sensor net-works, the concept of the 4G Network and how it integrates with the sensor network. The goal of Wireless Patient Monitoring over the 4G Network is link the spatial gap that exist between Healthcare and ICT, this will in turn enhance patients care efficiency while cutting costs, maximising profits and increase security while monitoring patients. This thesis is important in that it gives the reader an overview and basic idea of how a wireless patient monitoring system works over the 4G Network. An increasing number of ICT firms, healthcare and medical institutions are investing heavily on remote patient monitoring systems technologies and this thesis provides the reader the insight of how such systems work and how they can be implemented
    • …
    corecore