512 research outputs found
Beamforming Optimization for Full-Duplex Wireless-powered MIMO Systems
We propose techniques for optimizing transmit beamforming in a full-duplex
multiple-input-multiple-output (MIMO) wireless-powered communication system,
which consists of two phases. In the first phase, the wireless-powered mobile
station (MS) harvests energy using signals from the base station (BS), whereas
in the second phase, both MS and BS communicate to each other in a full-duplex
mode. When complete instantaneous channel state information (CSI) is available,
the BS beamformer and the time-splitting (TS) parameter of energy harvesting
are jointly optimized in order to obtain the BS-MS rate region. The joint
optimization problem is non-convex, however, a computationally efficient
optimum technique, based upon semidefinite relaxation and line-search, is
proposed to solve the problem. A sub-optimum zero-forcing approach is also
proposed, in which a closed-form solution of TS parameter is obtained. When
only second-order statistics of transmit CSI is available, we propose to
maximize the ergodic information rate at the MS, while maintaining the outage
probability at the BS below a certain threshold. An upper bound for the outage
probability is also derived and an approximate convex optimization framework is
proposed for efficiently solving the underlying non-convex problem. Simulations
demonstrate the advantages of the proposed methods over the sub-optimum and
half-duplex ones.Comment: 14 pages, accepte
A differential ML combiner for differential amplify-and-forward system in time-selective fading channels
We propose a new differential maximum-likelihood (DML) combiner for noncoherent detection of the differential amplify-and-forward (D-AF) relaying system in the time-selective channel. The weights are computed based on both the average channel quality and the correlation coefficient of the direct and relay channels. Moreover, we derive a closed-form approximate expression for the average bit error rate (BER), which is applicable to any single-relay D-AF system with fixed weights. Both theoretical and simulated results are presented to show that the time-selective nature of the underlying channels tends to reduce the diversity gains at the low-signal-to-noise-ratio (SNR) region, resulting in an asymptotic BER floor at the high-SNR region. Moreover, the proposed DML combiner is capable of providing significant BER improvements compared with the conventional differential detection (CDD) and selection-combining (SC) schemes
Constructive interference as an information carrier by dual-layered MIMO transmission
We propose a bandwidth-efficient transmission scheme for multiple-input-multiple-output point-to-point and downlink channels. The bandwidth efficiency (BE) of spatial multiplexing (SMX) is improved by implicitly encoding information in the spatial domain based on the existence of constructive interference in the received symbols, which creates a differentiation in the symbol power. Explicitly, the combination of symbols received at a higher power level carries implicit information in the spatial domain in the same manner as that the combination of nonzero elements in the received symbol vector carries information for receive-antenna-based spatial modulation (RSM). The nonzero power throughout the received symbol vector for the proposed technique allows a full SMX underlying transmission, with the BE enhancement brought by the spatial symbol. Our simulation results demonstrate both significant BE gains and error probability reduction for our approach over the conventional SMX and RSM schemes
The Role of Physical Layer Security in Satellite-Based Networks
In the coming years, 6G will revolutionize the world with a large amount of
bandwidth, high data rates, and extensive coverage in remote and rural areas.
These goals can only be achieved by integrating terrestrial networks with
non-terrestrial networks. On the other hand, these advancements are raising
more concerns than other wireless links about malicious attacks on
satellite-terrestrial links due to their openness. Over the years, physical
layer security (PLS) has emerged as a good candidate to deal with security
threats by exploring the randomness of wireless channels. In this direction,
this paper reviews how PLS methods are implemented in satellite communications.
Firstly, we discuss the ongoing research on satellite-based networks by
highlighting the key points in the literature. Then, we revisit the research
activities on PLS in satellite-based networks by categorizing the different
system architectures. Finally, we highlight research directions and
opportunities to leverage the PLS in future satellite-based networks
Predictive relay-selection cooperative diversity in land mobile satellite systems
Cooperative diversity protocols promise a new dimension of diversity that
provides better communication by engaging nearby relays in forming a ‘virtual’ array
of antennas for combined signal transmission. The current incremental cooperative
diversity algorithms incrementally select best relay(s) to cooperate based on the channel
quality reported by the relays. However, the algorithms do not take into consideration
the fact that the chosen best relay(s) at estimation may not always be best at the time of
communication. This is due to the time delay between the relay selection and its
transmission of signal (problem of outdated Channel Quality Information). To solve this
problem, the concept of channel prediction is introduced and employed whereby each
relay determines a predicted value of its Channel Quality Information (CQI) based on
its past measurements. The paper therefore develops a novel predictive relay-selection
(PRS) cooperative diversity model which seeks to improve Land Mobile Satellite (LMS)
communication through prediction protocols. In the model, the chosen best relay is the
one with the best predicted CQI value instead of the traditional outdated one.
Performance analysis of outage probability and average bit error probability for the
newly developed PRS cooperation shows that the PRS cooperation is better than direct
and outdated CQI relay communication.http://onlinelibrary.wiley.com/doi/10.1002/sat.11182017-03-31hb2016Electrical, Electronic and Computer Engineerin
A New Secure Transmission Scheme With Outdated Antenna Selection
We propose a new secure transmission scheme in
the multi-input multi-output multi-eavesdropper wiretap channel.
In this channel, the NA-antenna transmitter adopts transmit
antenna selection (TAS) to choose the antenna that maximizes
the instantaneous signal-to-noise ratio (SNR) at the receiver to
transmit, while the NB-antenna receiver and the NE-antenna
eavesdropper adopt maximal-ratio combining (MRC) to combine
the received signals. We focus on the practical scenario where
the channel state information (CSI) during the TAS process is
outdated. In this scenario, we propose a new transmission scheme
to prevent the detrimental effect of the outdated CSI on the
wiretap codes design at the transmitter. To thoroughly assess
the secrecy performance achieved by the proposed scheme, we
derive new closed-form expressions for the exact secrecy outage
probability and the probability of non-zero secrecy capacity for
arbitrary SNRs. We also derive new compact expressions for the
asymptotic secrecy outage probability at high SNRs. Notably,
in the analysis we take spatial correlation at the receiver into
consideration. Apart from the advantage of our scheme over
the conventional TAS/MRC scheme, we demonstrate that the
outdated TAS reduces the secrecy diversity order from NANB
to NB. We also demonstrate that antenna correlation improves
the secrecy performance at low SNR but deteriorates the secrecy
performance at medium and high SNRs, by affecting the secrecy
array gain only.ARC Discovery Projects Grant DP150103905
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …