70 research outputs found

    Improper Gaussian signaling for multiple-access channels in underlay cognitive radio

    Get PDF
    This paper considers an unlicensed multiple-access channel (MAC) that coexists with a licensed point-to-point user, following the underlay cognitive radio paradigm. We assume that every transceiver except the secondary base station has one antenna and that the primary user (PU) is protected by a minimum rate constraint. In contrast to the conventional assumption of proper Gaussian signaling, we allow the secondary users to transmit improper Gaussian signals, which are correlated with their complex conjugate. When the secondary base station performs zero-forcing, we show that improper signaling is optimal if the sum of the interference channel gains (in an equivalent canonical model) is above a certain threshold. Additionally, we derive an efficient algorithm to compute the transmission parameters that attain the rate region boundary for this scenario. The proposed algorithm exploits a single-user representation of the secondary MAC along with new results on the optimality of improper signaling in the single-user case when the PU is corrupted by an improper noise.The work of C. Lameiro and P. J. Schreier was supported by the German Research Foundation (DFG) under grants SCHR 1384/6-1 and LA 4107/1-1. The work of I. Santamaría was supported by the Ministerio de Economía y Competitividad (MINECO) and AEI/FEDER funds of the UE, Spain, under projects RACHEL (TEC2013-47141-C4-3-R) and CARMEN (TEC2016-75067-C4-4-R)

    Physical layer security in cognitive radio networks using improper gaussian signaling

    Get PDF
    Orientador: Prof. Dr. Evelio Martin Garcia FernandezCoorientador: Prof. Dr. Samuel Baraldi MafraTese (doutorado) - Universidade Federal do Paraná, Setor de Tecnologia, Programa de Pós-Graduação em Engenharia Elétrica. Defesa : Curitiba, 25/10/2018Inclui referências: p.55-60Resumo: Em redes de comunicação sem fio que possuem restrições de interferência, a adoção de sinais assimétricos ou impróprios pode atingir taxas de transmissão mais altas do que as obtidas com sinais próprios, devido a maior entropia diferencial destes. Portanto, uma vez que o desempenho de segurança de uma rede está diretamente relacionado a taxa de transmissão de seus usuários, esta tese propõe o emprego de sinais impróprios para melhorar o desempenho do sigilo em redes de Radio Cognitivo. Ate onde sabemos, este e o primeiro trabalho que aborda a Segurança da Camada Física deste tipo de sistema usando sinais assimétricos. Os resultados foram obtidos para dois cenários diferentes em um mesmo modelo de sistema: uma rede cognitiva underlay com uma ligacao direta entre o transmissor secundário e seu receptor, cuja comunicação está sendo espionada. Usuários primários e secundários causam interferência entre si. Em ambos os cenários, apenas a informação estatística do estado do canal foi considerada disponível para os usuários cognitivos. Para o primeiro cenário, em que a localização dos nós do sistema foi definida arbitrariamente, derivamos uma expressao analótica para a Probabilidade de Falha de Sigilo, a principal métrica de desempenho analisada, e foi mostrado que a adoção de sinalização impropria pode ser benéfica tanto para os usuários que causam quanto para os que recebem interferência. Em um segundo cenário, em que a localização dos nos foi distribuída uniformemente sobre uma célula circular, encontramos valores ótimos ou sub-ótimos para a potencia de transmissão e grau de impropriedade dos sinais dos usuários secundários simultaneamente, a fim de otimizar o desempenho de segurança da rede. A otimização foi feita com o auxílio de Algoritmos Genéticos. Em seguida, os benefícios do esquema de transmissão em termos da probabilidade de falha de sigilo e da vazão de dados segura do sistema, bem como o custo de eficiência energética foram avaliados. Os resultados indicam que, para sistemas limitados por interferência, ao buscar por baixas probabilidades de falha de sigilo, e sempre uma estratégia melhor para os usuários secundários adotar algum grau de impropriedade em suas transmissões. Além disso, a adoção de sinais impróprios também pode melhorar as taxas seguras atingíveis no lado dos usuários cognitivos em redes underlay. No entanto, em termos de eficiência energética do sistema, otimizar apenas a potencia de transmissão secundaria e adotar sinais próprios obtém o melhor desempenho. Os resultados apresentados nesta pesquisa são promissores, uma vez que em muitas redes sem fio, inclusive cognitivas, existem restrições de interferência e sinais assimétricos poderiam alcançar um desempenho melhor do que os próprios, o paradigma atual. Palavras-chave: Radio Cognitivo, Segurança na Camada Física, SinaisAbstract: In interference constrained wireless communication networks, adopting asymmetric or improper signals may attain higher transmission rates than those achieved by proper ones, due to the higher differential entropy of the latter. Therefore, since the secrecy performance of a network is directly related to the transmission rate of its users, this thesis proposes employing improper signals in order to enhance the secrecy performance of Cognitive Radio networks. As far as we know, this is the first work that addresses the Physical Layer Security of these type of system by using asymmetric signals. The results were obtained for two different scenarios in the same system model: an underlay cognitive network with a direct link between secondary transmitter and receiver, whose communication is being eavesdropped. Both primary and secondary users cause interference at each other. In both scenarios only Statistical Channel State Information was considered available at the cognitive users. For the first scenario, in which nodes locations were defined arbitrarily, we derived an analytical expression for the Secrecy Outage Probability, the main performance metric analyzed, and it was shown that adopting improper signaling can be beneficial for users either causing or receiving interference. In a second scenario, in which nodes locations were uniformly distributed over a circular cell, we found optimal or suboptimal values of the secondary users transmit power and degree of impropriety, concurrently, in order to optimize the secrecy performance, with the aid of Genetic Algorithms. Then, the benefits of the transmission scheme in terms of the Secrecy Outage Probability and the Secure Throughput of the system, as well as the Secure Energy Efficiency cost were assessed. Results indicate that, for systems with interference constraints, when searching for lower Secrecy Outage Probabilities, it is always a better strategy for the Secondary Users to adopt some degree of impropriety in their transmissions. In addition, adopting improper signals can also improve the achievable secure rates at the cognitive users side in underlay networks. However, in terms of the energy efficiency of the system, optimizing only the secondary transmit power while employing proper signals achieves the best performance. The results presented in this research are promising, since in many wireless channels, including Cognitive Networks, there are interference constraints and asymmetric signals could attain better performance than proper ones, the current paradigm. Keywords: Cognitive Radio Networks, Physical Layer Security, Improper Gaussian Signaling, Secrecy Outage Probability

    Physical and medium access control layer advances in 5G wireless networks

    Get PDF
    No abstract available

    Benefits of improper signaling for overlay cognitive radio

    Get PDF
    This paper considers improper Gaussian signaling (IGS) in an overlay cognitive radio scenario. We follow a protocol in which the secondary user (SU) uses part of its power to relay the message for the primary user (PU) and consider a simple yet illustrative 2-user scenario. We analyze two communication schemes depending on whether or not the PU cooperates with the SU and derive closed-form expressions for the optimal transmission parameters that maximize the SU rate while ensuring a specified minimum performance of the PU. Our numerical results show that IGS may significantly outperform proper signaling and that, interestingly, the cooperative approach provides negligible performance gains over its non-cooperative counterpart.The work of C. Lameiro and P. J. Schreier was supported by the German Research Foundation (DFG) under grants SCHR 1384/6-1 and LA 4107/1-1. The work of I. Santamaría was supported by the Ministerio de Economía y Competitividad (MINECO) and AEI/FEDER funds of the UE, Spain, under project CARMEN (TEC2016-75067-C4-4-R)

    NOMA-based improper signaling for multicell MISO RIS-assisted broadcast channels

    Get PDF
    In this paper, we study the performance of reconfigurable intelligent surfaces (RISs) in a multicell broadcast channel (BC) that employs improper Gaussian signaling (IGS) jointly with non-orthogonal multiple access (NOMA) to optimize either the minimum-weighted rate or the energy efficiency (EE) of the network. We show that although the RIS can significantly improve the system performance, it cannot mitigate interference completely, so we have to employ other interference-management techniques to further improve performance. We show that the proposed NOMA-based IGS scheme can substantially outperform proper Gaussian signaling (PGS) and IGS schemes that treat interference as noise (TIN) in particular when the number of users per cell is larger than the number of base station (BS) antennas (referred to as overloaded networks). In other words, IGS and NOMA complement to each other as interference management techniques in multicell RIS-assisted BCs. Furthermore, we consider three different feasibility sets for the RIS components showing that even a RIS with a small number of elements provides considerable gains for all the feasibility sets.The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Sangarapillai Lambotharan. The work of Ignacio Santamaria was supported by the Project ADELE funded by MCIN/ AEI /10.13039/501100011033, under Grant PID2019-104958RB-C43. The work of Eduard Jorswieck was supported by the Federal Ministry of Education and Research (BMBF, Germany) through the Program of Souverän. Digital. Vernetzt.” joint Project 6G-RIC, under Grants 16KISK020K and 16KISK031

    Robust improper signaling for two-user SISO interference channels

    Get PDF
    It has been shown that improper Gaussian signaling (IGS) can improve the performance of wireless interference-limited systems when perfect channel-state information (CSI) is available. In this paper, we investigate the robustness of IGS against imperfect CSI on the transmitter side in a two-user single-input single-output (SISO) interference channel (IC) as well as in a SISO Z-IC, when interference is treated as noise. We assume that the true channel coefficients belong to a known region around the channel estimates, which we call the uncertainty region. Following a worst-case robustness approach, we study the rate-region boundary of the IC for the worst channel in the uncertainty region. For the two-user IC, we derive a robust design in closed form, which is independent of the phase of the channels by allowing only one of the users to transmit IGS. For the Z-IC, we provide a closed-form design for the transmission parameters by considering an enlarged uncertainty region and allowing both users to employ IGS. In both cases, the IGS-based designs are ensured to perform no worse than proper Gaussian signaling. Furthermore, we show, through numerical examples, that the proposed robust designs significantly outperform non-robust solutions.The work of M. Soleymani, C. Lameiro and P. J. Schreier was supported by the German Research Foundation (DFG) under grants LA 4107/1-1 and SCHR 1384/8-1. The work of I. Santamaria was supported by MINECO of Spain and AEI/FEDER funds of the E.U., under grant TEC2016-75067-C4-4-R (CARMEN)

    multimedia transmission over wireless networks: performance analysis and optimal resource allocation

    Get PDF
    In recent years, multimedia applications such as video telephony, teleconferencing, and video streaming, which are delay sensitive and bandwidth intensive, have started to account for a significant portion of the data traffic in wireless networks. Such multimedia applications require certain quality of service (QoS) guarantees in terms of delay, packet loss, buffer underflows and overflows, and received multimedia quality. It is also important to note that such requirements need to be satisfied in the presence of limited wireless resources, such as power and bandwidth. Therefore, it is critical to conduct a rigorous performance analysis of multimedia transmissions over wireless networks and identify efficient resource allocation strategies. Motivated by these considerations, in the first part of the thesis, performance of hierarchical modulation-based multimedia transmissions is analyzed. Unequal error protection (UEP) of data transmission using hierarchical quadrature amplitude modulation (HQAM) is considered in which high priority (HP) data is protected more than low priority (LP) data. In this setting, two different types of wireless networks are considered. Specifically, multimedia transmission over cognitive radio networks and device-to-device (D2D) cellular wireless networks is addressed. Closed-form bit error rate (BER) expressions are derived and optimal power control strategies are determined. Next, throughput and optimal resource allocation strategies are studied for multimedia transmission under delay QoS and energy efficiency (EE) constraints. A Quality-Rate (QR) distortion model is employed to measure the quality of received video in terms of peak signal-to-noise ratio (PSNR) as a function of video source rate. Effective capacity (EC) is used as the throughput metric under delay QoS constraints. In this analysis, four different wireless networks are taken into consideration: First, D2D underlaid wireless networks are addressed. Efficient transmission mode selection and resource allocation strategies are analyzed with the goal of maximizing the quality of the received video at the receiver in a frequency-division duplexed (FDD) cellular network with a pair of cellular users, one base station and a pair of D2D users under delay QoS and EE constraints. A full-duplex communication scenario with a pair of users and multiple subchannels in which users can have different delay requirements is addressed. Since the optimization problem is not concave or convex due to the presence of interference, optimal power allocation policies that maximize the weighted sum video quality subject to total transmission power level constraint are derived by using monotonic optimization theory. The optimal scheme is compared with two suboptimal strategies. A full-duplex communication scenario with multiple pairs of users in which different users have different delay requirements is addressed. EC is used as the throughput metric in the presence of statistical delay constraints since deterministic delay bounds are difficult to guarantee due to the time-varying nature of wireless fading channels. Optimal resource allocation strategies are determined under bandwidth, power and minimum video quality constraints again using the monotonic optimization framework. A broadcast scenario in which a single transmitter sends multimedia data to multiple receivers is considered. The optimal bandwidth allocation and the optimal power allocation/power control policies that maximize the sum video quality subject to total bandwidth and minimum EE constraints are derived. Five different resource allocation strategies are investigated, and the joint optimization of the bandwidth allocation and power control is shown to provide the best performance. Tradeoff between EE and video quality is also demonstrated. In the final part of the thesis, power control policies are investigated for streaming variable bit rate (VBR) video over wireless links. A deterministic traffic model for stored VBR video, taking into account the frame size, frame rate, and playout buffers is considered. Power control and the transmission mode selection with the goal of maximizing the sum transmission rate while avoiding buffer underflows and overflows under transmit power constraints is exploited in a D2D wireless network. Another system model involving a transmitter (e.g., a base station (BS)) that sends VBR video data to a mobile user equipped with a playout buffer is also adopted. In this setting, both offline and online power control policies are considered in order to minimize the transmission power without playout buffer underflows and overflows. Both dynamic programming and reinforcement learning based algorithms are developed
    corecore