440 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Hardware Impairments Aware Transceiver Design for Full-Duplex Amplify-and-Forward MIMO Relaying
In this work we study the behavior of a full-duplex (FD) and
amplify-and-forward (AF) relay with multiple antennas, where hardware
impairments of the FD relay transceiver is taken into account. Due to the
inter-dependency of the transmit relay power on each antenna and the residual
self-interference in an FD-AF relay, we observe a distortion loop that degrades
the system performance when the relay dynamic range is not high. In this
regard, we analyze the relay function in presence of the hardware inaccuracies
and an optimization problem is formulated to maximize the signal to
distortion-plus-noise ratio (SDNR), under relay and source transmit power
constraints. Due to the problem complexity, we propose a
gradient-projection-based (GP) algorithm to obtain an optimal solution.
Moreover, a nonalternating sub-optimal solution is proposed by assuming a
rank-1 relay amplification matrix, and separating the design of the relay
process into multiple stages (MuStR1). The proposed MuStR1 method is then
enhanced by introducing an alternating update over the optimization variables,
denoted as AltMuStR1 algorithm. It is observed that compared to GP, (Alt)MuStR1
algorithms significantly reduce the required computational complexity at the
expense of a slight performance degradation. Finally, the proposed methods are
evaluated under various system conditions, and compared with the methods
available in the current literature. In particular, it is observed that as the
hardware impairments increase, or for a system with a high transmit power, the
impact of applying a distortion-aware design is significant.Comment: Submitted to IEEE Transactions on Wireless Communication
Research Issues, Challenges, and Opportunities of Wireless Power Transfer-Aided Full-Duplex Relay Systems
We present a comprehensive review for wireless power transfer (WPT)-aided full-duplex (FD) relay systems. Two critical challenges in implementing WPT-aided FD relay systems are presented, that is, pseudo FD realization and high power consumption. Existing time-splitting or power-splitting structure based-WPT-aided FD relay systems can only realize FD operation in one of the time slots or only forward part of the received signal to the destination, belonging to pseudo FD realization. Besides, self-interference is treated as noise and self-interference cancellation (SIC) operation incurs high power consumption at the FD relay node. To this end, a promising solution is outlined to address the two challenges, which realizes consecutive FD realization at all times and forwards all the desired signal to the destination for decoding. Also, active SIC, that is, analog/digital cancellation, is not required by the proposed solution, which effectively reduces the circuit complexity and releases high power consumption at the FD relay node. Specific classifications and performance metrics of WPT-aided FD relay systems are summarized. Some future research is also envisaged for WPT-aided FD systems
Throughput Analysis and Optimization of Wireless-Powered Multiple Antenna Full-Duplex Relay Systems
We consider a full-duplex (FD) decode-and-forward system in which the
time-switching protocol is employed by the multi-antenna relay to receive
energy from the source and transmit information to the destination. The
instantaneous throughput is maximized by optimizing receive and transmit
beamformers at the relay and the time-split parameter. We study both optimum
and suboptimum schemes. The reformulated problem in the optimum scheme achieves
closed-form solutions in terms of transmit beamformer for some scenarios. In
other scenarios, the optimization problem is formulated as a semi-definite
relaxation problem and a rank-one optimum solution is always guaranteed. In the
suboptimum schemes, the beamformers are obtained using maximum ratio combining,
zero-forcing, and maximum ratio transmission. When beamformers have closed-form
solutions, the achievable instantaneous and delay-constrained throughput are
analytically characterized. Our results reveal that, beamforming increases both
the energy harvesting and loop interference suppression capabilities at the FD
relay. Moreover, simulation results demonstrate that the choice of the linear
processing scheme as well as the time-split plays a critical role in
determining the FD gains.Comment: Accepted for publication in IEEE Transactions on Communication
Optimization and Analysis of Wireless Powered Multi-antenna Cooperative Systems
In this paper, we consider a three-node cooperative wireless powered
communication system consisting of a multi-antenna hybrid access point (H-AP)
and a single-antenna relay and a single-antenna user. The energy constrained
relay and user first harvest energy in the downlink and then the relay assists
the user using the harvested power for information transmission in the uplink.
The optimal energy beamforming vector and the time split between harvest and
cooperation are investigated. To reduce the computational complexity,
suboptimal designs are also studied, where closed-form expressions are derived
for the energy beamforming vector and the time split. For comparison purposes,
we also present a detailed performance analysis in terms of the achievable
outage probability and the average throughput of an intuitive energy
beamforming scheme, where the H-AP directs all the energy towards the user. The
findings of the paper suggest that implementing multiple antennas at the H-AP
can significantly improve the system performance, and the closed-form
suboptimal energy beamforming vector and time split yields near optimal
performance. Also, for the intuitive beamforming scheme, a diversity order of
(N+1)/2 can be achieved, where N is the number of antennas at the H-AP
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …