4,880 research outputs found

    A Comparative Study of Relaying Schemes with Decode-and-Forward over Nakagami-m Fading Channels

    Full text link
    Utilizing relaying techniques to improve performance of wireless systems is a promising avenue. However, it is crucial to understand what type of relaying schemes should be used for achieving different performance objectives under realistic fading conditions. In this paper, we present a general framework for modelling and evaluating the performance of relaying schemes based on the decode-and-forward (DF) protocol over independent and not necessarily identically distributed (INID) Nakagami-m fading channels. In particular, we present closed-form expressions for the statistics of the instantaneous output signal-to-noise ratio of four significant relaying schemes with DF; two based on repetitive transmission and the other two based on relay selection (RS). These expressions are then used to obtain closed-form expressions for the outage probability and the average symbol error probability for several modulations of all considered relaying schemes over INID Nakagami-m fading. Importantly, it is shown that when the channel state information for RS is perfect, RS-based transmission schemes always outperform repetitive ones. Furthermore, when the direct link between the source and the destination nodes is sufficiently strong, relaying may not result in any gains and in this case it should be switched-off.Comment: Submitted to Journal of Computer Systems, Networks, and Communication

    Outage rates and outage durations of opportunistic relaying systems

    Full text link
    Opportunistic relaying is a simple yet efficient cooperation scheme that achieves full diversity and preserves the spectral efficiency among the spatially distributed stations. However, the stations' mobility causes temporal correlation of the system's capacity outage events, which gives rise to its important second-order outage statistical parameters, such as the average outage rate (AOR) and the average outage duration (AOD). This letter presents exact analytical expressions for the AOR and the AOD of an opportunistic relaying system, which employs a mobile source and a mobile destination (without a direct path), and an arbitrary number of (fixed-gain amplify-and-forward or decode-and-forward) mobile relays in Rayleigh fading environment

    Secure Routing in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways (IGWs), while the APs that do not have wired connections are called the mesh routers (MRs). The MRs are connected to the IGWs using multi-hop communication. The IGWs provide access to conventional clients and interconnect ad hoc, sensor, cellular, and other networks to the Internet. However, most of the existing routing protocols for WMNs are extensions of protocols originally designed for mobile ad hoc networks (MANETs) and thus they perform sub-optimally. Moreover, most routing protocols for WMNs are designed without security issues in mind, where the nodes are all assumed to be honest. In practical deployment scenarios, this assumption does not hold. This chapter provides a comprehensive overview of security issues in WMNs and then particularly focuses on secure routing in these networks. First, it identifies security vulnerabilities in the medium access control (MAC) and the network layers. Various possibilities of compromising data confidentiality, data integrity, replay attacks and offline cryptanalysis are also discussed. Then various types of attacks in the MAC and the network layers are discussed. After enumerating the various types of attacks on the MAC and the network layer, the chapter briefly discusses on some of the preventive mechanisms for these attacks.Comment: 44 pages, 17 figures, 5 table

    Detect-and-forward relaying aided cooperative spatial modulation for wireless networks

    No full text
    A novel detect-and-forward (DeF) relaying aided cooperative SM scheme is proposed, which is capable of striking a flexible tradeoff in terms of the achievable bit error ratio (BER), complexity and unequal error protection (UEP). More specifically, SM is invoked at the source node (SN) and the information bit stream is divided into two different sets: the antenna index-bits (AI-bits) as well as the amplitude and phase modulation-bits (APM-bits). By exploiting the different importance of the AI-bits and the APM-bits in SM detection, we propose three low-complexity, yet powerful relay protocols, namely the partial, the hybrid and the hierarchical modulation (HM) based DeF relaying schemes. These schemes determine the most appropriate number of bits to be re-modulated by carefully considering their potential benefits and then assigning a specific modulation scheme for relaying the message. As a further benefit, the employment of multiple radio frequency (RF) chains and the requirement of tight inter-relay synchronization (IRS) can be avoided. Moreover, by exploiting the benefits of our low-complexity relaying protocols and our inter-element interference (IEI) model, a low-complexity maximum-likelihood (ML) detector is proposed for jointly detecting the signal received both via the source-destination (SD) and relay-destination (RD) links. Additionally, an upper bound of the BER is derived for our DeF-SM scheme. Our numerical results show that the bound is asymptotically tight in the high-SNR region and the proposed schemes provide beneficial system performance improvements compared to the conventional MIMO schemes in an identical cooperative scenario.<br/
    corecore