396 research outputs found

    Sum Rate and Fairness Analysis for the MU-MIMO Downlink under PSK Signalling: Interference Suppression vs Exploitation

    Get PDF
    In this paper, we analyze the sum rate performance of multi-user multiple-input multiple-output (MU-MIMO) systems, with a finite constellation phase-shift keying (PSK) input alphabet. We analytically calculate and compare the achievable sum rate in three downlink transmission scenarios: 1) without precoding, 2) with zero forcing (ZF) precoding 3) with closed form constructive interference (CI) precoding technique. In light of this, new analytical expressions for the average sum rate are derived in the three cases, and Monte Carlo simulations are provided throughout to validate the analysis. Furthermore, based on the derived expressions, a power allocation scheme that can ensure fairness among the users is also proposed. The results in this work demonstrate that, the CI strictly outperforms the other two schemes, and the performance gap between the considered schemes increases with increase in the MIMO size. In addition, the CI provides higher fairness and the power allocation algorithm proposed in this paper can achieve maximum fairness index

    The Distributed MIMO Scenario: Can Ideal ADCs Be Replaced by Low-resolution ADCs?

    Get PDF
    This letter considers the architecture of distributed antenna system, which is made up of a massive number of single-antenna remote radio heads (RRHs), some with full-resolution but others with low-resolution analog-to-digital converter (ADC) receivers. This architecture is greatly motivated by its high energy efficiency and low-cost implementation. We derive the worst-case uplink spectral efficiency (SE) of the system assuming a frequency-flat channel and maximum-ratio combining (MRC), and reveal that the SE increases as the number of quantization bits for the low-resolution ADCs increases, and the SE converges as the number of RRHs with low-resolution ADCs grows. Our results furthermore demonstrate that a great improvement can be obtained by adding a majority of RRHs with low-resolution ADC receivers, if sufficient quantization precision and an acceptable proportion of high-to-low resolution RRHs are used.Comment: 4 pages, to be published in IEEE Wireless Communications Letter

    Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer

    Get PDF
    In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is done in three phases. In the first phase, both the energy-starved nodes, the untrustworthy relay and the jammer, are charged by non-information radio frequency (RF) signals from the sources. In the second phase, the two sources send their information signals and concurrently, the jammer transmits artificial noise to confuse the curious relay. Finally, the third phase is dedicated to forward a scaled version of the received signal from the relay to the sources. For the proposed secure transmission schemes, we derive new closed-form lower-bound expressions for the ergodic secrecy sum rate (ESSR) in the high signal-to-noise ratio (SNR) regime. We further analyze the asymptotic ESSR to determine the key parameters; the high SNR slope and the high SNR power offset of the jamming based scenarios. To highlight the performance advantage of the proposed FJ, we also examine the scenario of without jamming (WoJ). Finally, numerical examples and discussions are provided to acquire some engineering insights, and to demonstrate the impacts of different system parameters on the secrecy performance of the considered communication scenarios. The numerical results illustrate that the proposed FJ significantly outperforms the traditional one-way communication and the Constellation rotation approach, as well as our proposed benchmarks, the two-way WoJ and GNJ scenarios.Comment: 14 pages, 6 figures, Submitted to IEEE Transactions on Vehicular Technolog

    Secure Full-Duplex Device-to-Device Communication

    Get PDF
    This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201
    • …
    corecore