Pub Date : 2014-12-01DOI: 10.1109/GLOCOMW.2014.7063446
Joao Vieira, Steffen Malkowsky, K. Nieman, Z. Miers, Nikhil Kundargi, Liang Liu, I. Wong, V. Öwall, O. Edfors, F. Tufvesson
Massive multiple-input multiple-output (MIMO) is one of the main candidates to be included in the fifth generation (5G) cellular systems. For further system development it is desirable to have real-time testbeds showing possibilities and limitations of the technology. In this paper we describe the Lund University Massive MIMO testbed - LuMaMi. It is a flexible testbed where the base station operates with up to 100 coherent radio-frequency transceiver chains based on software radio technology. Orthogonal Frequency Division Multiplex (OFDM) based signaling is used for each of the 10 simultaneous users served in the 20 MHz bandwidth. Real time MIMO precoding and decoding is distributed across 50 Xilinx Kintex-7 FPGAs with PCI-Express interconnects. The unique features of this system are: (i) high throughput processing of 384 Gbps of real time baseband data in both the transmit and receive directions, (ii) low-latency architecture with channel estimate to precoder turnaround of less than 500 micro seconds, and (iii) a flexible extension up to 128 antennas. We detail the design goals of the testbed, discuss the signaling and system architecture, and show initial measured results for a uplink Massive MIMO over-the-air transmission from four single-antenna UEs to 100 BS antennas.
{"title":"A flexible 100-antenna testbed for Massive MIMO","authors":"Joao Vieira, Steffen Malkowsky, K. Nieman, Z. Miers, Nikhil Kundargi, Liang Liu, I. Wong, V. Öwall, O. Edfors, F. Tufvesson","doi":"10.1109/GLOCOMW.2014.7063446","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063446","url":null,"abstract":"Massive multiple-input multiple-output (MIMO) is one of the main candidates to be included in the fifth generation (5G) cellular systems. For further system development it is desirable to have real-time testbeds showing possibilities and limitations of the technology. In this paper we describe the Lund University Massive MIMO testbed - LuMaMi. It is a flexible testbed where the base station operates with up to 100 coherent radio-frequency transceiver chains based on software radio technology. Orthogonal Frequency Division Multiplex (OFDM) based signaling is used for each of the 10 simultaneous users served in the 20 MHz bandwidth. Real time MIMO precoding and decoding is distributed across 50 Xilinx Kintex-7 FPGAs with PCI-Express interconnects. The unique features of this system are: (i) high throughput processing of 384 Gbps of real time baseband data in both the transmit and receive directions, (ii) low-latency architecture with channel estimate to precoder turnaround of less than 500 micro seconds, and (iii) a flexible extension up to 128 antennas. We detail the design goals of the testbed, discuss the signaling and system architecture, and show initial measured results for a uplink Massive MIMO over-the-air transmission from four single-antenna UEs to 100 BS antennas.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"323 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124571678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/GLOCOMW.2014.7063610
S. Althunibat, Birabwa Joanitah Denise, F. Granelli
The presence of malicious attackers in cognitive radio networks (CRNs) deeply degrades the overall performance in terms of detection accuracy, throughput and energy efficiency. A popular attack, called spectrum sensing data falsification (SSDF) attack, invades the CRN during cooperative spectrum sensing process. SSDF attack is represented by a malicious user that sends false sensing results to the fusion center, trying to mislead the global decision regarding the spectrum occupancy. Detecting such type of attack becomes a challenge especially in cluster-based CRNs. In this paper we propose an attacker-identification and removal algorithm that is able to detect attackers in cluster-based CRNs. The proposed algorithm requires that each transmitting user should send a report about the delivery of its transmitted data. The delivery report is then used to assess the local decisions of all users in order to recognize attackers and remove them. Mathematical formulation and computer simulations show a better performance than the previous works.
{"title":"Secure cluster-based cooperative spectrum sensing against malicious attackers","authors":"S. Althunibat, Birabwa Joanitah Denise, F. Granelli","doi":"10.1109/GLOCOMW.2014.7063610","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063610","url":null,"abstract":"The presence of malicious attackers in cognitive radio networks (CRNs) deeply degrades the overall performance in terms of detection accuracy, throughput and energy efficiency. A popular attack, called spectrum sensing data falsification (SSDF) attack, invades the CRN during cooperative spectrum sensing process. SSDF attack is represented by a malicious user that sends false sensing results to the fusion center, trying to mislead the global decision regarding the spectrum occupancy. Detecting such type of attack becomes a challenge especially in cluster-based CRNs. In this paper we propose an attacker-identification and removal algorithm that is able to detect attackers in cluster-based CRNs. The proposed algorithm requires that each transmitting user should send a report about the delivery of its transmitted data. The delivery report is then used to assess the local decisions of all users in order to recognize attackers and remove them. Mathematical formulation and computer simulations show a better performance than the previous works.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128665603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/GLOCOMW.2014.7063568
P. Parida, Suvra Shekhar Das
In this work, we have considered the downlink of an Orthogonal Frequency Division Multiplexing based Non Orthogonal Multiple Access system where transmission to multiple number of users is performed on the same sub-band (time-frequency resource unit) using Superposition Coding (SC) technique. At the receiver side, the SC coded symbols are recovered with Successive Interference Cancellation (SIC). Assuming that complete channel state information is present at the base station, we propose (1) co-channel user set selection, (2) power distribution among the multiplexed users on each sub-band, and (3) power allocation across the sub-bands to maximize the weighted sum rate of the system. Since the problem is a non-convex combinatorial optimization problem, two step heuristic solution is employed. In the first step, for each of the sub-bands, a greedy user selection and iterative sub-optimal power allocation algorithm based on Difference of Convex (DC) programming is presented. In the second step, exploiting the DC structure of the modified problem, power allocation across sub-band is carried out through the same iterative power allocation algorithm. Simulation results are provided to assess and compare the performance of the proposed algorithms.
{"title":"Power allocation in OFDM based NOMA systems: A DC programming approach","authors":"P. Parida, Suvra Shekhar Das","doi":"10.1109/GLOCOMW.2014.7063568","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063568","url":null,"abstract":"In this work, we have considered the downlink of an Orthogonal Frequency Division Multiplexing based Non Orthogonal Multiple Access system where transmission to multiple number of users is performed on the same sub-band (time-frequency resource unit) using Superposition Coding (SC) technique. At the receiver side, the SC coded symbols are recovered with Successive Interference Cancellation (SIC). Assuming that complete channel state information is present at the base station, we propose (1) co-channel user set selection, (2) power distribution among the multiplexed users on each sub-band, and (3) power allocation across the sub-bands to maximize the weighted sum rate of the system. Since the problem is a non-convex combinatorial optimization problem, two step heuristic solution is employed. In the first step, for each of the sub-bands, a greedy user selection and iterative sub-optimal power allocation algorithm based on Difference of Convex (DC) programming is presented. In the second step, exploiting the DC structure of the modified problem, power allocation across sub-band is carried out through the same iterative power allocation algorithm. Simulation results are provided to assess and compare the performance of the proposed algorithms.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122867718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/GLOCOMW.2014.7063523
W. Feng, Yong Li, Depeng Jin, Lieguang Zeng
With the significant growth of mobile data traffic in the coming years, 60-GHz millimeter-wave (mm-wave) communication shows great potential in high throughput networks to meet this demand. The directional transmission in 60-GHz radio has motivated studies of spatial sharing (SPSH). In IEEE 802.11ad, a widely acknowledged protocol of 60-GHz system, spatial sharing inside a network is supported. In addition, different networks are recommended to transmit in non-overlapping period to mitigate inter-network interference, which is hard to employ in real system under circumstances such as heavy traffic load. However, there is no specific mechanism for spatial sharing with interference mitigation among networks in IEEE 802.11ad standard. Therefore, we propose an inter-network spatial sharing strategy in IEEE 802.11ad Wireless Local Area Networks (WLANs) in this paper. Specifically, the strategy includes SPSH report, which helps establish a complete interference and coexistence database. Corresponding time scheduling scheme is based on mutual avoidance of interference. Extensive simulations have shown that our proposed strategy enhances spatial gain and depicted more robust performance compared with existing mechanism in IEEE 802.11ad.
{"title":"Inter-network spatial sharing with interference mitigation based on IEEE 802.11ad WLAN system","authors":"W. Feng, Yong Li, Depeng Jin, Lieguang Zeng","doi":"10.1109/GLOCOMW.2014.7063523","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063523","url":null,"abstract":"With the significant growth of mobile data traffic in the coming years, 60-GHz millimeter-wave (mm-wave) communication shows great potential in high throughput networks to meet this demand. The directional transmission in 60-GHz radio has motivated studies of spatial sharing (SPSH). In IEEE 802.11ad, a widely acknowledged protocol of 60-GHz system, spatial sharing inside a network is supported. In addition, different networks are recommended to transmit in non-overlapping period to mitigate inter-network interference, which is hard to employ in real system under circumstances such as heavy traffic load. However, there is no specific mechanism for spatial sharing with interference mitigation among networks in IEEE 802.11ad standard. Therefore, we propose an inter-network spatial sharing strategy in IEEE 802.11ad Wireless Local Area Networks (WLANs) in this paper. Specifically, the strategy includes SPSH report, which helps establish a complete interference and coexistence database. Corresponding time scheduling scheme is based on mutual avoidance of interference. Extensive simulations have shown that our proposed strategy enhances spatial gain and depicted more robust performance compared with existing mechanism in IEEE 802.11ad.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126101956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/GLOCOMW.2014.7063576
Zhaohan Jia, Xin He, F. Li
In CSMA/CA based wireless local networks, two stations are not allowed to transmit at the same time due to interference generated to each other, resulting in degraded throughput. Concurrent transmission, which enables simultaneous transmission of two or more stations under certain conditions, is able to overcome this problem, leading to enhanced channel utilization efficiency. Different from earlier work on this topic which focuses on omni-direction concurrent transmission, we introduce in this paper beamforming into a co-channel concurrent transmission scheme and investigate the benefits of concurrency with beamforming. The circumstances for concurrent transmission and frame scheduling are investigated. Simulation results show that the throughput performance achieved by concurrency with beamforming outperforms the traditional transmission and the original omni-directional concurrent transmission.
{"title":"Enable concurrent transmissions with beamforming for broadband wireless access in CSMA/CA-based WLANs","authors":"Zhaohan Jia, Xin He, F. Li","doi":"10.1109/GLOCOMW.2014.7063576","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063576","url":null,"abstract":"In CSMA/CA based wireless local networks, two stations are not allowed to transmit at the same time due to interference generated to each other, resulting in degraded throughput. Concurrent transmission, which enables simultaneous transmission of two or more stations under certain conditions, is able to overcome this problem, leading to enhanced channel utilization efficiency. Different from earlier work on this topic which focuses on omni-direction concurrent transmission, we introduce in this paper beamforming into a co-channel concurrent transmission scheme and investigate the benefits of concurrency with beamforming. The circumstances for concurrent transmission and frame scheduling are investigated. Simulation results show that the throughput performance achieved by concurrency with beamforming outperforms the traditional transmission and the original omni-directional concurrent transmission.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121071881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/GLOCOMW.2014.7063436
Rong Zhang, Yuehui Jin, Tan Yang, Yidong Cui, Yao Xiao
A major functionality of Inter-domain Traffic Engineering is to optimally allocate resources to meet traffic demand. We implement this functionality by introducing economics into the problem of performance optimization, achieving maximum performance while pursuing minimum economic costs. In this paper we propose the DOPE model (Dual-objective Optimization on Performance and Economics) as the foundation of building an Inter-domain Traffic Engineering architecture which optimizes performance and reduces economic costs simultaneously. We utilize the well-known concept of Nash Bargaining to optimize the performance so as to make the solution Pareto-efficient and fair. In addition we introduce the Revenue Sharing Contract in order to make the ISPs collaborate voluntarily to minimize the social economic costs. To protect ISPs from the leakage of sensitive information, we take a Decomposition Method, which combines the Sub-gradient Method with Lagrangian Relaxation Algorithm, and separates the overall dual-objective optimization problem into partial sub-problems. These sub-problems can be solved independently by ISPs. Our proposed approach is evaluated in several experiments with simulated networks. The results show that our approach converges quickly and performs as well as the centralized solution with full knowledge of the networks. Besides, our approach achieves both optimized performance and reduced economic costs, which is significantly better than existing unilateral methods. Therefore, we believe that our approach is an effective solution to the problem of Inter-domain Traffic Engineering, and will be highly adopted by ISPs when compared with existing approaches.
跨域流量工程的一个主要功能是优化资源配置以满足流量需求。我们通过将经济学引入性能优化问题来实现此功能,在追求最小经济成本的同时实现最大性能。本文提出了性能与经济双目标优化(Dual-objective Optimization on Performance and Economics)模型,作为构建性能优化与经济成本同时降低的跨域流量工程体系结构的基础。我们利用著名的纳什议价概念来优化绩效,使解决方案具有帕累托效率和公平性。此外,为了使网络服务提供商自愿合作,以使社会经济成本最小化,我们引入了收益共享契约。为了防止isp敏感信息泄露,我们采用了一种将子梯度法与拉格朗日松弛算法相结合的分解方法,将整体双目标优化问题分解为部分子问题。这些子问题可以由isp独立解决。我们提出的方法在模拟网络的几个实验中得到了评估。结果表明,该方法收敛速度快,性能与充分了解网络的集中式解决方案相当。此外,我们的方法实现了性能的优化和经济成本的降低,明显优于现有的单边方法。因此,我们认为我们的方法是解决跨域流量工程问题的有效方法,与现有方法相比,将被isp高度采用。
{"title":"Joint optimization of performance and economics in inter-domain traffic engineering","authors":"Rong Zhang, Yuehui Jin, Tan Yang, Yidong Cui, Yao Xiao","doi":"10.1109/GLOCOMW.2014.7063436","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063436","url":null,"abstract":"A major functionality of Inter-domain Traffic Engineering is to optimally allocate resources to meet traffic demand. We implement this functionality by introducing economics into the problem of performance optimization, achieving maximum performance while pursuing minimum economic costs. In this paper we propose the DOPE model (Dual-objective Optimization on Performance and Economics) as the foundation of building an Inter-domain Traffic Engineering architecture which optimizes performance and reduces economic costs simultaneously. We utilize the well-known concept of Nash Bargaining to optimize the performance so as to make the solution Pareto-efficient and fair. In addition we introduce the Revenue Sharing Contract in order to make the ISPs collaborate voluntarily to minimize the social economic costs. To protect ISPs from the leakage of sensitive information, we take a Decomposition Method, which combines the Sub-gradient Method with Lagrangian Relaxation Algorithm, and separates the overall dual-objective optimization problem into partial sub-problems. These sub-problems can be solved independently by ISPs. Our proposed approach is evaluated in several experiments with simulated networks. The results show that our approach converges quickly and performs as well as the centralized solution with full knowledge of the networks. Besides, our approach achieves both optimized performance and reduced economic costs, which is significantly better than existing unilateral methods. Therefore, we believe that our approach is an effective solution to the problem of Inter-domain Traffic Engineering, and will be highly adopted by ISPs when compared with existing approaches.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126937935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/GLOCOMW.2014.7063387
N. Vlajic, Armin Slopek
Economic Denial of Sustainability (EDoS) is a new form of security attack specifically targeting Cloud-hosted websites/domains. The main goal of EDoS attack is to impose a significant financial burden on the victim through skillful and measured consumption of the victim's metered (pay-as-you-go) bandwidth. The most straightforward way to conduct an EDoS attack is by means of a custom-built or a rented botnet capable of executing application-layer DDoS. However, the common known disadvantages of botnet-based EDoS/DDoS attacks are: a) high cost in cases when the (rented) botnet needs to be used over a prolonged interval of time, b) high chance of bot-blacklisting that could result in a significantly diminished attack potential. The goal of our work presented in this paper was to investigate the technical feasibility of using spam-email with Web-bugs in order to engage the browsers of legitimate users in an EDoS attack. Compared to a botnet-based EDoS, such an attack would be far more difficult to detect and thwart for the victim, while imposing minimal to no cost to the attacker. Our preliminary results, involving real-world spam-email and an actual `victim' site set up on Amazon S3 Cloud, show that EDoS using Web-bugs is a technically feasible attack option with a reasonably sufficient attack potential. To the best of our knowledge, this study is the first one to combine the topics/concepts of EDoS, Web-bugs and spam-email, and point to a potentially problematic interplay among them.
{"title":"Web bugs in the cloud: Feasibility study of a new form of EDoS attack","authors":"N. Vlajic, Armin Slopek","doi":"10.1109/GLOCOMW.2014.7063387","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063387","url":null,"abstract":"Economic Denial of Sustainability (EDoS) is a new form of security attack specifically targeting Cloud-hosted websites/domains. The main goal of EDoS attack is to impose a significant financial burden on the victim through skillful and measured consumption of the victim's metered (pay-as-you-go) bandwidth. The most straightforward way to conduct an EDoS attack is by means of a custom-built or a rented botnet capable of executing application-layer DDoS. However, the common known disadvantages of botnet-based EDoS/DDoS attacks are: a) high cost in cases when the (rented) botnet needs to be used over a prolonged interval of time, b) high chance of bot-blacklisting that could result in a significantly diminished attack potential. The goal of our work presented in this paper was to investigate the technical feasibility of using spam-email with Web-bugs in order to engage the browsers of legitimate users in an EDoS attack. Compared to a botnet-based EDoS, such an attack would be far more difficult to detect and thwart for the victim, while imposing minimal to no cost to the attacker. Our preliminary results, involving real-world spam-email and an actual `victim' site set up on Amazon S3 Cloud, show that EDoS using Web-bugs is a technically feasible attack option with a reasonably sufficient attack potential. To the best of our knowledge, this study is the first one to combine the topics/concepts of EDoS, Web-bugs and spam-email, and point to a potentially problematic interplay among them.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127631196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/GLOCOMW.2014.7063614
Shihao Yan, Nan Yang, R. Malaney, Jinhong Yuan
We propose an antenna switching scheme in the full-duplex wiretap channel where the legitimate receiver, equipped with two antennas, operates in a full-duplex mode. We focus on a practical eavesdropping scenario where the instantaneous channel state information of the eavesdropper's channel is not available at the transmitter and the receiver. In our proposed scheme, the receiver selects the antenna that maximizes the main channel gain as the receive antenna and uses the remaining antenna to transmit jamming signals. We derive an exact expression for the secrecy outage probability to evaluate the secrecy performance of our new scheme. This expression allows us to quantify the secrecy performance gain of our proposed scheme relative to a standard antenna predetermination scheme where the receive and transmit antennas at the receiver are predetermined. We demonstrate that our scheme achieves a lower secrecy outage probability than the antenna predetermination scheme. We also show that our scheme achieves the full secrecy diversity order whereas the antenna predetermination scheme does not.
{"title":"Antenna switching for security enhancement in full-duplex wiretap channels","authors":"Shihao Yan, Nan Yang, R. Malaney, Jinhong Yuan","doi":"10.1109/GLOCOMW.2014.7063614","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063614","url":null,"abstract":"We propose an antenna switching scheme in the full-duplex wiretap channel where the legitimate receiver, equipped with two antennas, operates in a full-duplex mode. We focus on a practical eavesdropping scenario where the instantaneous channel state information of the eavesdropper's channel is not available at the transmitter and the receiver. In our proposed scheme, the receiver selects the antenna that maximizes the main channel gain as the receive antenna and uses the remaining antenna to transmit jamming signals. We derive an exact expression for the secrecy outage probability to evaluate the secrecy performance of our new scheme. This expression allows us to quantify the secrecy performance gain of our proposed scheme relative to a standard antenna predetermination scheme where the receive and transmit antennas at the receiver are predetermined. We demonstrate that our scheme achieves a lower secrecy outage probability than the antenna predetermination scheme. We also show that our scheme achieves the full secrecy diversity order whereas the antenna predetermination scheme does not.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126489377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/GLOCOMW.2014.7063486
P. Butala, H. Elgala, T. Little, P. Zarkesh-Ha
Visible light communication (VLC) is achieved by modulation of one or more spectral components in the visible spectrum (≈380-780 um). The use of this range provides an opportunity to exploit an otherwise untapped medium that is used in human lighting. Most VLC systems constructed to date focus on using a broad visible band generated by phosphor-converted light emitting diodes, or by filtering to isolate the blue component from these sources. Multi-wavelength systems consider additional wavelength bands that are combined to produce the desired communications capacity and lighting output. This color combining, or mixing, realizes desired color temperature and intensity and represents a form of wavelength-division multiplexing. This paper investigates the relationships between the colors comprising the lighting source for a range of lighting states, the spectral separation of communication channels, the relative intensities required to realize lighting states, how modulation can be most effectively mapped to the available color channels, and the design of an optical filtering approach to maximize signal to noise ratio while minimizing crosstalk at the receiver. Simulation results based on a three colored VLC system are discussed using orthogonal frequency division multiplexing for each color. It is shown that the system is the most power efficient at 6250 K correlated color temperature, with transmitter spectral spread of 5 nm and filter transmittance width of 40 nm.
{"title":"Multi-wavelength visible light communication system design","authors":"P. Butala, H. Elgala, T. Little, P. Zarkesh-Ha","doi":"10.1109/GLOCOMW.2014.7063486","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063486","url":null,"abstract":"Visible light communication (VLC) is achieved by modulation of one or more spectral components in the visible spectrum (≈380-780 um). The use of this range provides an opportunity to exploit an otherwise untapped medium that is used in human lighting. Most VLC systems constructed to date focus on using a broad visible band generated by phosphor-converted light emitting diodes, or by filtering to isolate the blue component from these sources. Multi-wavelength systems consider additional wavelength bands that are combined to produce the desired communications capacity and lighting output. This color combining, or mixing, realizes desired color temperature and intensity and represents a form of wavelength-division multiplexing. This paper investigates the relationships between the colors comprising the lighting source for a range of lighting states, the spectral separation of communication channels, the relative intensities required to realize lighting states, how modulation can be most effectively mapped to the available color channels, and the design of an optical filtering approach to maximize signal to noise ratio while minimizing crosstalk at the receiver. Simulation results based on a three colored VLC system are discussed using orthogonal frequency division multiplexing for each color. It is shown that the system is the most power efficient at 6250 K correlated color temperature, with transmitter spectral spread of 5 nm and filter transmittance width of 40 nm.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133095622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/GLOCOMW.2014.7063515
A. Benjebbour, Anxin Li, Y. Kishiyama, Huiling Jiang, Takehiro Nakamura
This paper investigates the system-level performance of downlink non-orthogonal multiple access (NOMA) combined with single user MIMO (SU-MIMO) for future LTE (Long-Term Evolution) enhancements. The goal is to clarify the performance gains of NOMA combined with SU-MIMO transmission, taking into account the LTE radio interface such as frequency-domain scheduling, adaptive modulation and coding (AMC), and NOMA specific functionalities such as multi-user pairing/ordering and transmit power allocation. In particular, we propose practical schemes to efficiently combine NOMA with open-loop SU-MIMO (Transmission Mode 3: TM3) and closed-loop SU-MIMO (Transmission Mode 4: TM4) specified in LTE. Based on computer simulations, we compare NOMA performance gains for different granularities of scheduling and MCS (modulation and coding scheme) selection, for both genie-aided channel quality information (CQI) estimation and approximated CQI estimation, and using different number of power sets. Evaluation results show that NOMA can still provide a hefty portion of its expected gains even with approximated CQI estimation and limited number of power sets, and also when LTE compliant subband scheduling and wideband MCS are applied.
{"title":"System-level performance of downlink NOMA combined with SU-MIMO for future LTE enhancements","authors":"A. Benjebbour, Anxin Li, Y. Kishiyama, Huiling Jiang, Takehiro Nakamura","doi":"10.1109/GLOCOMW.2014.7063515","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063515","url":null,"abstract":"This paper investigates the system-level performance of downlink non-orthogonal multiple access (NOMA) combined with single user MIMO (SU-MIMO) for future LTE (Long-Term Evolution) enhancements. The goal is to clarify the performance gains of NOMA combined with SU-MIMO transmission, taking into account the LTE radio interface such as frequency-domain scheduling, adaptive modulation and coding (AMC), and NOMA specific functionalities such as multi-user pairing/ordering and transmit power allocation. In particular, we propose practical schemes to efficiently combine NOMA with open-loop SU-MIMO (Transmission Mode 3: TM3) and closed-loop SU-MIMO (Transmission Mode 4: TM4) specified in LTE. Based on computer simulations, we compare NOMA performance gains for different granularities of scheduling and MCS (modulation and coding scheme) selection, for both genie-aided channel quality information (CQI) estimation and approximated CQI estimation, and using different number of power sets. Evaluation results show that NOMA can still provide a hefty portion of its expected gains even with approximated CQI estimation and limited number of power sets, and also when LTE compliant subband scheduling and wideband MCS are applied.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}