12,010 research outputs found

    Robust Transmission in Downlink Multiuser MISO Systems: A Rate-Splitting Approach

    Get PDF
    We consider a downlink multiuser MISO system with bounded errors in the Channel State Information at the Transmitter (CSIT). We first look at the robust design problem of achieving max-min fairness amongst users (in the worst-case sense). Contrary to the conventional approach adopted in literature, we propose a rather unorthodox design based on a Rate-Splitting (RS) strategy. Each user's message is split into two parts, a common part and a private part. All common parts are packed into one super common message encoded using a public codebook, while private parts are independently encoded. The resulting symbol streams are linearly precoded and simultaneously transmitted, and each receiver retrieves its intended message by decoding both the common stream and its corresponding private stream. For CSIT uncertainty regions that scale with SNR (e.g. by scaling the number of feedback bits), we prove that a RS-based design achieves higher max-min (symmetric) Degrees of Freedom (DoF) compared to conventional designs (NoRS). For the special case of non-scaling CSIT (e.g. fixed number of feedback bits), and contrary to NoRS, RS can achieve a non-saturating max-min rate. We propose a robust algorithm based on the cutting-set method coupled with the Weighted Minimum Mean Square Error (WMMSE) approach, and we demonstrate its performance gains over state-of-the art designs. Finally, we extend the RS strategy to address the Quality of Service (QoS) constrained power minimization problem, and we demonstrate significant gains over NoRS-based designs.Comment: Accepted for publication in IEEE Transactions on Signal Processin

    On the Capacity Region of Multi-Antenna Gaussian Broadcast Channels with Estimation Error

    Get PDF
    In this paper we consider the effect of channel estimation error on the capacity region of MIMO Gaussian broadcast channels. It is assumed that the receivers and the transmitter have (the same) estimates of the channel coefficients (i.e., the feedback channel is noiseless). We obtain an achievable rate region based on the dirty paper coding scheme. We show that this region is given by the capacity region of a dual multi-access channel with a noise covariance that depends on the transmit power. We explore this duality to give the asymptotic behavior of the sum-rate for a system with a large number of user, i.e., n rarr infin. It is shown that as long as the estimation error is of fixed (w.r.t n) variance, the sum-capacity is of order M log log n, where M is the number of antennas deployed at the transmitter. We further obtain the sum-rate loss due to the estimation error. Finally, we consider a training-based scheme for block fading MISO Gaussian broadcast channels. We find the optimum length of the training interval as well as the optimum power used for training in order to maximize the achievable sum-rate

    A Case for Time Slotted Channel Hopping for ICN in the IoT

    Full text link
    Recent proposals to simplify the operation of the IoT include the use of Information Centric Networking (ICN) paradigms. While this is promising, several challenges remain. In this paper, our core contributions (a) leverage ICN communication patterns to dynamically optimize the use of TSCH (Time Slotted Channel Hopping), a wireless link layer technology increasingly popular in the IoT, and (b) make IoT-style routing adaptive to names, resources, and traffic patterns throughout the network--both without cross-layering. Through a series of experiments on the FIT IoT-LAB interconnecting typical IoT hardware, we find that our approach is fully robust against wireless interference, and almost halves the energy consumed for transmission when compared to CSMA. Most importantly, our adaptive scheduling prevents the time-slotted MAC layer from sacrificing throughput and delay

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
    • …
    corecore