67 research outputs found

    Secrecy rate analysis of UAV-enabled mmWave networks using matern hardcore point processes

    Get PDF
    IEEE Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of their broad coverage, UAV communications are prone to passive eavesdropping attacks. This paper analyzes the secrecy performance of UAVs networks at the millimeter wave (mmWave) band and takes into account unique features of air-toground channels and practical constraints of UAV deployment. To be specific, it explores the 3D antenna gain in the air-toground links and uses the Matérn hardcore point process to guarantee the safety distance between the randomly deployed UAV base stations. In addition, we propose the transmit jamming strategy to improve the secrecy performance in which part of UAVs send jamming signals to confound the eavesdroppers. Simulation results verify our analysis and demonstrate the impact of different system parameters on the achievable secrecy rate. It is also revealed that optimizing the density of jamming UAVs will significantly improve security of UAV-enabled networks

    EBG enhanced broadband dual antenna configuration for passive self-interference suppression in full-duplex communications

    Get PDF
    A full-duplex system is realised using dual EBG isolated rectangular spiral antennas and its performance is compared with the same full-duplex system using a circulator and a single spiral antenna element. The new antenna system consists of two antennas one with RHCP and the another one with LHCP implemented on a single substrate. Two columns of EBG is placed between the two antennas to improve the isolation. At the operating frequency of 3.2 GHz, the antenna configuration has nearly 31 dB isolation. For the identical baseband input power, the full-duplex system utilising dual spiral antenna configuration exhibits 9 dB higher isolation than the circulator based full-duplex system

    Optimization of hybrid cache placement for collaborative relaying

    Get PDF
    Traditional wireless multi-hop relaying systems suffer from inefficient use of bandwidth resources. This letter studies the use of content caching at distributed relays to tackle this problem and improve the performance of collaborative relaying. We propose a hybrid caching scheme that is jointly optimized with the transmission schemes, to achieve a fine balance between the signal cooperation gain and the caching diversity gain. The optimization problem of cache placement to minimize the outage probability is studied and is shown to be convex. Numerical results demonstrate significant outage performance gains over traditional relaying without caching

    Blockchain-empowered decentralized storage in air-to-ground industrial networks

    Get PDF
    Blockchain has created a revolution in digital networking by using distributed storage, cryptographic algorithms, and smart contracts. Many areas are benefiting from this technology, including data integrity and security, as well as authentication and authorization. Internet of Things (IoTs) networks often suffers from such security issues, which is slowing down wide-scale adoption. In this paper, we describe the employing of blockchain technology to construct a decentralized platform for storing and trading information in the air-to-ground IoT heterogeneous network. To allow both air and ground sensors to participate in the decentralized network, we design a mutual-benefit consensus process to create uneven equilibrium distributions of resources among the participants. We use a Cournot model to optimize the active density factor set in the heterogeneous air network and then employ a Nash equilibrium to balance the number of ground sensors, which is influenced by the achievable average downlink rate between the air sensors and the ground supporters. Finally, we provide numerical results to demonstrate the beneficial properties of the proposed consensus process for air-to-ground networks and show the maximum active sensor's density utilization of air networks to achieve a high quality of service

    Throughput maximization for full-duplex energy harvesting MIMO communications

    Get PDF
    © 2016 IEEE.This paper proposes methods for optimizing bidirectional information rates between a base station (BS) and a wirelessly powered mobile station (MS). In the first phase, the MS harvests energy using signals transmitted by the BS, whereas in the second phase both the BS and MS communicate to each other in a full-duplex mode. The BS-beamformer and the time-splitting parameter (TSP) of energy harvesting scheme are jointly optimized to obtain the BS-MS rate region. The joint optimization is non-convex, however a computationally efficient optimum technique based upon semidefinite relaxation and line-search is proposed to solve the problem. Moreover, a suboptimum approach based upon the zero-forcing (ZF) beamformer constraint is also proposed. In this case, a closed-form solution of TSP is obtained. Simulation results demonstrate the advantage of the optimum method over the suboptimum method, especially for smaller values of BS transmit power and number of transmit antennas at the BS

    A efficient mapping algorithm with novel node-ranking approach for embedding virtual networks

    Get PDF
    Virtual network embedding (VNE) problem has been widely accepted as an important aspect in network virtualization (NV) area: how to efficiently embed virtual networks, with node and link resource demands, onto the shared substrate network that has finite network resources. Previous VNE heuristic algorithms, only considering single network topology attribute and local resources of each node, may lead to inefficient resource utilization of the substrate network in the long term. To address this issue, a topology attribute and global resource-driven VNE algorithm (VNE-TAGRD), adopting a novel node-ranking approach, is proposed in this paper. The novel node-ranking approach, developed from the well-known Google PageRank algorithm, considers three essential topology attributes and global network resources information before conducting the embedding of given virtual network request (VNR). Numerical simulation results reveal that the VNE-TAGRD algorithm outperforms five typical and latest heuristic algorithms that only consider single network topology attribute and local resources of each node, such as long-term average VNR acceptance ratio and average revenue to cost ratio

    On the secrecy performance of land mobile satellite communication systems

    Get PDF
    In this paper, we investigate the secrecy performance against eavesdropping of a land mobile satellite (LMS) system, where the satellite employs the spot beam technique, and both the terrestrial user and eavesdropper are equipped with multiple antennas and utilize maximal ratio combining (MRC) to receive the confidential message. Specifically, in terms of the availability of the eavesdropper’s CSI at the satellite, we consider both passive (Scenario I) and active (Scenario II) eavesdropping. For Scenario I where the eavesdropper’s channel state information (CSI) is unknown to the satellite, closed-form expressions for the probability of non-zero secrecy capacity and secrecy outage probability are derived. Furthermore, expressions for the asymptotic secrecy outage probability are also presented to reveal the secrecy diversity order and array gain of the considered system. For Scenario II where the eavesdropper’s CSI is available at the satellite, novel expressions for the exact and asymptotic average secrecy capacity are obtained. Based on a simple asymptotic formula, we can characterize the high signalto- noise ratio (SNR) slope and high SNR power offset of the LMS systems. Finally, simulations are provided to validate our theoretical analysis and show the effect of different parameters on the system performance

    Exploiting constructive interference for simultaneous wireless information and power transfer in multiuser downlink systems

    Get PDF
    In this paper we propose a power-efficient approach for information and energy transfer in multiple-input single output downlink systems. By means of data-aided precoding, we exploit the constructive part of interference for both information decoding and wireless power transfer. Rather than suppressing interference as in conventional schemes, we take advantage of constructive interference among users, inherent in the downlink, as a source of both useful information signal energy and electrical wireless energy. Specifically, we propose a new precoding design that minimizes the transmit power while guaranteeing the quality of service (QoS) and energy harvesting constraints for generic phase shift keying modulated signals. The QoS constraints are modified to accommodate constructive interference, based on the constructive regions in the signal constellation. Although the resulting problem is nonconvex, several methods are developed for its solution. First we derive necessary and sufficient conditions for the feasibility of the considered problem. Then we propose second-order cone programming and semi definite programming algorithms with polynomial complexity that provide upper and lower bounds to the optimal solution and establish the asymptotic optimality of these algorithms when the modulation order and SINR threshold tend to infinity. A practical iterative algorithm is also proposed based on successive linear approximation of the non-convex terms yielding excellent results. More complex algorithms are also proposed to provide tight upper and lower bounds for benchmarking purposes. Simulation results show significant power savings with the proposed data-aided precoding approach compared to the conventional precoding scheme

    Network-coded NOMA with antenna selection for the support of two heterogeneous groups of users

    Get PDF
    The combination of Non-Orthogonal Multiple Access (NOMA) and Transmit Antenna Selection (TAS) techniques has recently attracted significant attention due to the low cost, low complexity and high diversity gains. Meanwhile, Random Linear Coding (RLC) is considered to be a promising technique for achieving high reliability and low latency in multicast communications. In this paper, we consider a downlink system with a multi-antenna base station and two multicast groups of single-antenna users, where one group can afford to be served opportunistically, while the other group consists of comparatively low power devices with limited processing capabilities that have strict Quality of Service (QoS) requirements. In order to boost reliability and satisfy the QoS requirements of the multicast groups, we propose a cross-layer framework including NOMAbased TAS at the physical layer and RLC at the application layer. In particular, two low complexity TAS protocols for NOMA are studied in order to exploit the diversity gain and meet the QoS requirements. In addition, RLC analysis aims to facilitate heterogeneous users, such that, sliding window based sparse RLC is employed for computational restricted users, and conventional RLC is considered for others. Theoretical expressions that characterize the performance of the proposed framework are derived and verified through simulation results

    Dual-beam orthogonal circular polarized antenna

    Get PDF
    © 2019 European Association on Antennas and Propagation. A novel mm-wave-antenna structure has been proposed and investigated. It operates at 32 GHz with 3.2 GHz (-10 dB) bandwidth. It has the potential to be easily scaled for 5G band. The structure is composed of a monopole antenna above a ground plane and an SIW wall. The antenna structure was studied numerically, revealing a directivity of 6.5 dBi within a bandwidth of 3.2GHz. In addition, the effects of different structural parameters have been investigated. The radiation pattern of the antenna reveals two orthogonal beams, circularly polarized, separately in the left and right direction
    • …
    corecore