10,362 research outputs found
Sum Rate Maximized Resource Allocation in Multiple DF Relays Aided OFDM Transmission
In relay-aided wireless transmission systems, one of the key issues is how to
decide assisting relays and manage the energy resource at the source and each
individual relay, to maximize a certain objective related to system
performance. This paper addresses the sum rate maximized resource allocation
(RA) problem in a point to point orthogonal frequency division modulation
(OFDM) transmission system assisted by multiple decode-and-forward (DF) relays,
subject to the individual sum power constraints of the source and the relays.
In particular, the transmission at each subcarrier can be in either the direct
mode without any relay assisting, or the relay-aided mode with one or several
relays assisting. We propose two RA algorithms which optimize the assignment of
transmission mode and source power for every subcarrier, as well as the
assisting relays and the power allocation to them for every {relay-aided}
subcarrier. First, it is shown that the considered RA problem has zero
Lagrangian duality gap when there is a big number of subcarriers. In this case,
a duality based algorithm that finds a globally optimum RA is developed.
Second, a coordinate-ascent based iterative algorithm, which finds a suboptimum
RA but is always applicable regardless of the duality gap of the RA problem, is
developed. The effectiveness of these algorithms has been illustrated by
numerical experiments.Comment: 13 pages in two-column format, 10 figures, to appear in IEEE Journal
on Selected Areas in Communication
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Weighted Sum Rate Maximization for Downlink OFDMA with Subcarrier-pair based Opportunistic DF Relaying
This paper addresses a weighted sum rate (WSR) maximization problem for
downlink OFDMA aided by a decode-and-forward (DF) relay under a total power
constraint. A novel subcarrier-pair based opportunistic DF relaying protocol is
proposed. Specifically, user message bits are transmitted in two time slots. A
subcarrier in the first slot can be paired with a subcarrier in the second slot
for the DF relay-aided transmission to a user. In particular, the source and
the relay can transmit simultaneously to implement beamforming at the
subcarrier in the second slot. Each unpaired subcarrier in either the first or
second slot is used for the source's direct transmission to a user. A benchmark
protocol, same as the proposed one except that the transmit beamforming is not
used for the relay-aided transmission, is also considered. For each protocol, a
polynomial-complexity algorithm is developed to find at least an approximately
optimum resource allocation (RA), by using continuous relaxation, the dual
method, and Hungarian algorithm. Instrumental to the algorithm design is an
elegant definition of optimization variables, motivated by the idea of
regarding the unpaired subcarriers as virtual subcarrier pairs in the direct
transmission mode. The effectiveness of the RA algorithm and the impact of
relay position and total power on the protocols' performance are illustrated by
numerical experiments. The proposed protocol always leads to a maximum WSR
equal to or greater than that for the benchmark one, and the performance gain
of using the proposed one is significant especially when the relay is in close
proximity to the source and the total power is low. Theoretical analysis is
presented to interpret these observations.Comment: 8 figures, accepted and to be published in IEEE Transactions on
Signal Processing. arXiv admin note: text overlap with arXiv:1301.293
Self-concatenated code design and its application in power-efficient cooperative communications
In this tutorial, we have focused on the design of binary self-concatenated coding schemes with the help of EXtrinsic Information Transfer (EXIT) charts and Union bound analysis. The design methodology of future iteratively decoded self-concatenated aided cooperative communication schemes is presented. In doing so, we will identify the most important milestones in the area of channel coding, concatenated coding schemes and cooperative communication systems till date and suggest future research directions
Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks
Future wireless networks have a substantial potential in terms of supporting
a broad range of complex compelling applications both in military and civilian
fields, where the users are able to enjoy high-rate, low-latency, low-cost and
reliable information services. Achieving this ambitious goal requires new radio
techniques for adaptive learning and intelligent decision making because of the
complex heterogeneous nature of the network structures and wireless services.
Machine learning (ML) algorithms have great success in supporting big data
analytics, efficient parameter estimation and interactive decision making.
Hence, in this article, we review the thirty-year history of ML by elaborating
on supervised learning, unsupervised learning, reinforcement learning and deep
learning. Furthermore, we investigate their employment in the compelling
applications of wireless networks, including heterogeneous networks (HetNets),
cognitive radios (CR), Internet of things (IoT), machine to machine networks
(M2M), and so on. This article aims for assisting the readers in clarifying the
motivation and methodology of the various ML algorithms, so as to invoke them
for hitherto unexplored services as well as scenarios of future wireless
networks.Comment: 46 pages, 22 fig
Wireless Network-Level Partial Relay Cooperation: A Stable Throughput Analysis
In this work, we study the benefit of partial relay cooperation. We consider
a two-node system consisting of one source and one relay node transmitting
information to a common destination. The source and the relay have external
traffic and in addition, the relay is equipped with a flow controller to
regulate the incoming traffic from the source node. The cooperation is
performed at the network level. A collision channel with erasures is
considered. We provide an exact characterization of the stability region of the
system and we also prove that the system with partial cooperation is always
better or at least equal to the system without the flow controller.Comment: Submitted for journal publication. arXiv admin note: text overlap
with arXiv:1502.0113
- …