21 research outputs found
Secure Beamforming For MIMO Broadcasting With Wireless Information And Power Transfer
This paper considers a basic MIMO information-energy (I-E) broadcast system,
where a multi-antenna transmitter transmits information and energy
simultaneously to a multi-antenna information receiver and a dual-functional
multi-antenna energy receiver which is also capable of decoding information.
Due to the open nature of wireless medium and the dual purpose of information
and energy transmission, secure information transmission while ensuring
efficient energy harvesting is a critical issue for such a broadcast system.
Assuming that physical layer security techniques are applied to the system to
ensure secure transmission from the transmitter to the information receiver, we
study beamforming design to maximize the achievable secrecy rate subject to a
total power constraint and an energy harvesting constraint. First, based on
semidefinite relaxation, we propose global optimal solutions to the secrecy
rate maximization (SRM) problem in the single-stream case and a specific
full-stream case where the difference of Gram matrices of the channel matrices
is positive semidefinite. Then, we propose a simple iterative algorithm named
inexact block coordinate descent (IBCD) algorithm to tackle the SRM problem of
general case with arbitrary number of streams. We proves that the IBCD
algorithm can monotonically converge to a Karush-Kuhn-Tucker (KKT) solution to
the SRM problem. Furthermore, we extend the IBCD algorithm to the joint
beamforming and artificial noise design problem. Finally, simulations are
performed to validate the performance of the proposed beamforming algorithms.Comment: Submitted to journal for possible publication. First submission to
arXiv Mar. 14 201
Sample Approximation-Based Deflation Approaches for Chance SINR Constrained Joint Power and Admission Control
Consider the joint power and admission control (JPAC) problem for a
multi-user single-input single-output (SISO) interference channel. Most
existing works on JPAC assume the perfect instantaneous channel state
information (CSI). In this paper, we consider the JPAC problem with the
imperfect CSI, that is, we assume that only the channel distribution
information (CDI) is available. We formulate the JPAC problem into a chance
(probabilistic) constrained program, where each link's SINR outage probability
is enforced to be less than or equal to a specified tolerance. To circumvent
the computational difficulty of the chance SINR constraints, we propose to use
the sample (scenario) approximation scheme to convert them into finitely many
simple linear constraints. Furthermore, we reformulate the sample approximation
of the chance SINR constrained JPAC problem as a composite group sparse
minimization problem and then approximate it by a second-order cone program
(SOCP). The solution of the SOCP approximation can be used to check the
simultaneous supportability of all links in the network and to guide an
iterative link removal procedure (the deflation approach). We exploit the
special structure of the SOCP approximation and custom-design an efficient
algorithm for solving it. Finally, we illustrate the effectiveness and
efficiency of the proposed sample approximation-based deflation approaches by
simulations.Comment: The paper has been accepted for publication in IEEE Transactions on
Wireless Communication
Outage Constrained Robust Secure Transmission for MISO Wiretap Channels
In this paper we consider the robust secure beamformer design for MISO
wiretap channels. Assume that the eavesdroppers' channels are only partially
available at the transmitter, we seek to maximize the secrecy rate under the
transmit power and secrecy rate outage probability constraint. The outage
probability constraint requires that the secrecy rate exceeds certain threshold
with high probability. Therefore including such constraint in the design
naturally ensures the desired robustness. Unfortunately, the presence of the
probabilistic constraints makes the problem non-convex and hence difficult to
solve. In this paper, we investigate the outage probability constrained secrecy
rate maximization problem using a novel two-step approach. Under a wide range
of uncertainty models, our developed algorithms can obtain high-quality
solutions, sometimes even exact global solutions, for the robust secure
beamformer design problem. Simulation results are presented to verify the
effectiveness and robustness of the proposed algorithms
Arithmetic Average Density Fusion -- Part I: Some Statistic and Information-theoretic Results
Finite mixture such as the Gaussian mixture is a flexible and powerful
probabilistic modeling tool for representing the multimodal distribution widely
involved in many estimation and learning problems. The core of it is
representing the target distribution by the arithmetic average (AA) of a finite
number of sub-distributions which constitute a mixture. While the mixture has
been widely used for single sensor filter design, it is only recent that the AA
fusion demonstrates compelling performance for multi-sensor filter design. In
this paper, some statistic and information-theoretic results are given on the
covariance consistency, mean square error, mode-preservation capacity, and the
information divergence of the AA fusion approach. In particular, based on the
concept of conservative fusion, the relationship of the AA fusion with the
existing conservative fusion approaches such as covariance union and covariance
intersection is exposed. A suboptimal weighting approach has been proposed,
which jointly with the best mixture-fit property of the AA fusion leads to a
max-min optimization problem. Linear Gaussian models are considered for
algorithm illustration and simulation comparison, resulting in the first-ever
AA fusion-based multi-sensor Kalman filter.Comment: 30 pages, 14 figures, 3 tables. Information Fusion, 202
Capacity Upper Bound of Channel Assembling in Cognitive Radio Networks with Quasistationary Primary User Activities
In cognitive radio networks (CRNs) with multiple channels, various channel-assembling (ChA) strategies may be applied to secondary users (SUs), resulting in different achieved capacity. However, there is no previous work on determining the capacity upper bound (UB) of ChA for SUs under given system configurations. In this paper, we derive the maximum capacity for CRNs with ChA through Markov chain modeling, considering that primary user (PU) activities are relatively static, compared with SU services. We first deduce a closed-form expression for the maximum capacity in a dynamic ChA strategy and then demonstrate that no other ChA strategy can provide higher capacity than that achieved by this dynamic strategy. © 2012 IEEE.The work of L. Jiao and F. Y. Li was supported in part by the Research Council of Norway through the ECO-boat MOL project under Grant 210426. The work of E. Song was supported in part by the National Natural Science Foundation of China under Grant 60901037 and in part by the Foundation for Basic Research of Sichuan University for Distinguished Young Scholars under Grant 0082604132188. The work of V. Pla was supported by the Spanish Ministerio de Ciencia e Innovacion through Project TIN2010-21378-C02-02. The review of this paper was coordinated by Prof. B. Hamdaoui.Jiao, L.; Song, E.; Pla, V.; Li, FY. (2013). Capacity Upper Bound of Channel Assembling in Cognitive Radio Networks with Quasistationary Primary User Activities. IEEE Transactions on Vehicular Technology. 62(4):1849-1855. https://doi.org/10.1109/TVT.2012.2236115S1849185562
Joint Source-Relay Design for Full-Duplex MIMO AF Relay Systems
The performance of full-duplex (FD) relay systems can be greatly impacted by the self-interference (SI) at relays. By exploiting multiple antennas, the spectral efficiency of FD relay systems can be enhanced through spatial SI mitigation. This paper studies joint source transmit beamforming and relay processing to achieve rate maximization for FD multiple-input-multiple-output (MIMO) amplify-and-forward (AF) relay systems with consideration of relay processing delay. The problem is difficult to solve mainly due to the SI constraint induced by the relay processing delay. In this paper, we first present a sufficient condition under which the relay amplification matrix has rank-one structure. Then, for the case of rank-one amplification matrix, the rate maximization problem is equivalently simplified into an unconstrained problem that can be locally solved using the gradient ascent method. Next, we propose a penalty-based algorithmic framework, named P-BSUM, for a class of constrained optimization problems that have difficult equality constraints in addition to some convex constraints. By rewriting the rate maximization problem with a set of auxiliary variables, we apply the P-BSUM algorithm to the rate maximization problem in the general case. Finally, numerical results validate the efficiency of the proposed algorithms and show that the joint source-relay design approach under the rankone assumption could be strictly suboptimal as compared to the P-BSUM-based joint source-relay design approach
Power allocation in multi-channel cognitive radio networks with channel assembling
Consider power allocation for Secondary User (SU) packet transmissions over multiple channels with variable Primary User (PU) arrival rates in cognitive radio networks. Two problems are studied in this paper: The first one is to minimize the collision probability with PUs and the second one is to maximize the data rate while keeping the collision probability bounded. It is shown that the optimal solution for the first problem is to allocate all power onto the best channel based on a certain criterion. The second problem with a per-channel power budget constraint is proven to be NP-hard and therefore a pseudo-polynomial time solution for the problem is proposed. When a total power budget for all channels is imposed in the second problem, a computationally efficient algorithm is introduced. The proposed algorithms are validated by numerical experiments