Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI  [PDF]
Xiaoming Chen,Lei Lei,Huazi Zhang,Chau Yuen
Computer Science , 2014,
Abstract: In this paper, we study the problem of physical layer security in a large-scale multiple-input multiple-output (LS-MIMO) relaying system. The advantage of LS-MIMO relaying systems is exploited to enhance both wireless security and spectral efficiency. In particular, the challenging issue incurred by short interception distance is well addressed. Under very practical assumptions, i.e., no eavesdropper's channel state information (CSI) and imperfect legitimate channel CSI, this paper gives a thorough investigation of the impact of imperfect CSI in two classic relaying systems, i.e., amplify-and-forward (AF) and decode-and-forward (DF) systems, and obtain explicit expressions of secrecy outage capacities for both cases. Finally, our theoretical claims are validated by the numerical results.
Energy-Efficient Power Allocation for Secure Communications in Large-Scale MIMO Relaying Systems  [PDF]
Jian Chen,Xiaoming Chen,Tao Liu,Lei Lei
Mathematics , 2014,
Abstract: In this paper, we address the problem of energy-efficient power allocation for secure communications in an amplify-and-forward (AF) large-scale multiple-input multiple-output (LS-MIMO) relaying system in presence of a passive eavesdropper. The benefits of an AF LS-MIMO relay are exploited to significantly improve the secrecy performance, especially the secrecy energy efficiency (bit per Joule). We first analyze the impact of transmit power at the relay on the secrecy outage capacity, and prove that the secrecy outage capacity is a concave function of transmit power under very practical assumptions, i.e. no eavesdropper channel state information (CSI) and imperfect legitimate CSI. Then, we propose an energy-efficient power allocation scheme to maximize the secrecy energy efficiency. Finally, simulation results validate the advantage of the proposed energy-efficient scheme compared to the capacity maximization scheme.
Optimal Power Allocation for Secure Communications in Large-Scale MIMO Relaying Systems  [PDF]
Jian Chen,Xiaoming Chen,Xiumin Wang,Lei Lei
Mathematics , 2015,
Abstract: In this paper, we address the problem of optimal power allocation at the relay in two-hop secure communications. In order to solve the challenging issue of short-distance interception in secure communications, the benefit of large-scale MIMO (LS-MIMO) relaying techniques is exploited to improve the secrecy performance significantly, even in the case without eavesdropper channel state information (CSI). The focus of this paper is on the analysis and design of optimal power allocation for the relay, so as to maximize the secrecy outage capacity. We reveal the condition that the secrecy outage capacity is positive, prove that there is one and only one optimal power, and present an optimal power allocation scheme. Moreover, the asymptotic characteristics of the secrecy outage capacity is carried out to provide some clear insights for secrecy performance optimization. Finally, simulation results validate the effectiveness of the proposed scheme.
Achievable Throughput of Multi-mode Multiuser MIMO with Imperfect CSI Constraints  [PDF]
Jun Zhang,Marios Kountouris,Jeffrey G. Andrews,Robert W. Heath Jr
Mathematics , 2008,
Abstract: For the multiple-input multiple-output (MIMO) broadcast channel with imperfect channel state information (CSI), neither the capacity nor the optimal transmission technique have been fully discovered. In this paper, we derive achievable ergodic rates for a MIMO fading broadcast channel when CSI is delayed and quantized. It is shown that we should not support too many users with spatial division multiplexing due to the residual inter-user interference caused by imperfect CSI. Based on the derived achievable rates, we propose a multi-mode transmission strategy to maximize the throughput, which adaptively adjusts the number of active users based on the channel statistics information.
Novel Robust Optimization and Power Allocation of Time Reversal-MIMO-UWB Systems in an Imperfect CSI
Sajjad Alizadeh,Hossein Khaleghi Bizaki
International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems , 2013, DOI: 10.11601/ijates.v2i2.49
Abstract: Time Reversal (TR) technique is an attractive solution for a scenario where the transmission system employs low complexity receivers with multiple antennas at both transmitter and receiver sides. The TR technique can be combined with a high data rate MIMO-UWB system as TR-MIMO-UWB system. In spite of TR's good performance in MIMO-UWB systems, it suffers from performance degradation in an imperfect Channel State Information (CSI) case. In this paper, at first a robust TR pre-filter is designed together with a MMSE equalizer in TR-MIMO-UWB system where is robust against channel imperfection conditions. We show that the robust pre-filter optimization technique, considerably improves the BER performance of TR-MIMO-UWB system in imperfect CSI, where temporal focusing of the TR technique is kept, especially for high SNR values. Then, in order to improve the system performance more than ever, a power loading scheme is developed by minimizing the average symbol error rate in an imperfect CSI. Numerical and simulation results are presented to confirm the performance advantage attained by the proposed robust optimization and power loading in an imperfect CSI scenario.
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI  [PDF]
Amitav Mukherjee,A. Lee Swindlehurst
Mathematics , 2010, DOI: 10.1109/TSP.2010.2078810
Abstract: In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In particular, we focus on the judicious transmission of artificial interference to mask the desired signal at the time it is broadcast. Unlike previous work that assumes some prior knowledge of the eavesdropper's channel and focuses on maximizing secrecy capacity, we consider the case where no information regarding the eavesdropper is available, and we use signal-to-interference-plus-noise-ratio (SINR) as our performance metric. Specifically, we focus on the problem of maximizing the amount of power available to broadcast a jamming signal intended to hide the desired signal from a potential eavesdropper, while maintaining a prespecified SINR at the desired receiver. The jamming signal is designed to be orthogonal to the information signal when it reaches the desired receiver, assuming both the receiver and the eavesdropper employ optimal beamformers and possess exact channel state information (CSI). In practice, the assumption of perfect CSI at the transmitter is often difficult to justify. Therefore, we also study the resulting performance degradation due to the presence of imperfect CSI, and we present robust beamforming schemes that recover a large fraction of the performance in the perfect CSI case. Numerical simulations verify our analytical performance predictions, and illustrate the benefit of the robust beamforming schemes.
MIMO DF Relay Beamforming for Secrecy with Artificial Noise, Imperfect CSI, and Finite-Alphabet  [PDF]
Sanjay Vishwakarma,A. Chockalingam
Mathematics , 2015,
Abstract: In this paper, we consider decode-and-forward (DF) relay beamforming with imperfect channel state information (CSI), cooperative artificial noise (AN) injection, and finite-alphabet input in the presence of an user and $J$ non-colluding eavesdroppers. The communication between the source and the user is aided by a multiple-input-multiple-output (MIMO) DF relay. We use the fact that a wiretap code consists of two parts: i) common message (non-secret), and ii) secret message. The source transmits two independent messages: i) common message (non-secret), and ii) secret message. The common message is transmitted at a fixed rate $R_{0}$, and it is intended for the user. The secret message is also intended for the user but it should be kept secret from the $J$ eavesdroppers. The source and the MIMO DF relay operate under individual power constraints. In order to improve the secrecy rate, the MIMO relay also injects artificial noise. The CSI on all the links are assumed to be imperfect and CSI errors are assumed to be norm bounded. In order to maximize the worst case secrecy rate, we maximize the worst case link information rate to the user subject to: i) the individual power constraints on the source and the MIMO relay, and ii) the best case link information rates to $J$ eavesdroppers be less than or equal to $R_{0}$ in order to support a fixed common message rate $R_{0}$. Numerical results showing the effect of perfect/imperfect CSI, presence/absence of AN with finite-alphabet input on the secrecy rate are presented.
MIMO Interference Alignment Over Correlated Channels with Imperfect CSI  [PDF]
Behrang Nosrat-Makouei,Jeffrey G. Andrews,Robert W. Heath Jr
Mathematics , 2010, DOI: 10.1109/TSP.2011.2124458
Abstract: Interference alignment (IA), given uncorrelated channel components and perfect channel state information, obtains the maximum degrees of freedom in an interference channel. Little is known, however, about how the sum rate of IA behaves at finite transmit power, with imperfect channel state information, or antenna correlation. This paper provides an approximate closed-form signal-to-interference-plus-noise-ratio (SINR) expression for IA over multiple-input-multiple-output (MIMO) channels with imperfect channel state information and transmit antenna correlation. Assuming linear processing at the transmitters and zero-forcing receivers, random matrix theory tools are utilized to derive an approximation for the post-processing SINR distribution of each stream for each user. Perfect channel knowledge and i.i.d. channel coefficients constitute special cases. This SINR distribution not only allows easy calculation of useful performance metrics like sum rate and symbol error rate, but also permits a realistic comparison of IA with other transmission techniques. More specifically, IA is compared with spatial multiplexing and beamforming and it is shown that IA may not be optimal for some performance criteria.
Performance Analysis of Two-Way AF MIMO Relaying of OSTBCs with Imperfect Channel Gains  [PDF]
Arti M. K.,Manav R. Bhatnagar
Mathematics , 2014,
Abstract: In this paper, we consider the relaying of orthogonal space time block codes (OSTBCs) in a two-way amplify-and-forward (AF) multiple-input multiple-output (MIMO) relay system with estimated channel state information (CSI). A simple four phase protocol is used for training and OSTBC data transmission. Decoding of OSTBC data at a user terminal is performed by replacing the exact CSI by the estimated CSI, in a maximum likelihood decoder. Tight approximations for the moment generating function (m.g.f.) of the received signal-to-noise ratio at a user is derived under Rayleigh fading by ignoring the higher order noise terms. Analytical average error performance of the considered cooperative scheme is derived by using the m.g.f. expression. Moreover, the analytical diversity order of the considered scheme is also obtained for certain system configurations. It is shown by simulations and analysis that the channel estimation does not affect the diversity order of the OSTBC based two-way AF MIMO relay system.
Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF?  [PDF]
Xiaoming Chen,Lei Lei,Huazi Zhang,Chau Yuen
Mathematics , 2015,
Abstract: In this paper, we consider a large scale multiple input multiple output (LS-MIMO) relaying system, where an information source sends the message to its intended destination aided by an LS-MIMO relay, while a passive eavesdropper tries to intercept the information forwarded by the relay. The advantage of a large scale antenna array is exploited to improve spectral efficiency and enhance wireless security. In particular, the challenging issue incurred by short-distance interception is well addressed. Under very practical assumptions, i.e., no eavesdropper channel state information (CSI) and imperfect legitimate CSI at the relay, this paper gives a thorough secrecy performance analysis and comparison of two classic relaying techniques, i.e., amplify-and-forward (AF) and decode-and-forward (DF). Furthermore, asymptotical analysis is carried out to provide clear insights on the secrecy performance for such an LS-MIMO relaying system. We show that under large transmit powers, AF is a better choice than DF from the perspectives of both secrecy performance and implementation complexity, and prove that there exits an optimal transmit power at medium regime that maximizes the secrecy outage capacity.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.