Pub Date : 2023-09-01DOI: 10.26636/jtit.2023.3.1354
Yunus Dursun
This paper presents a comprehensive study that examines the fundamental concept of the non-orthogonal multiple access (NOMA) scheme and provides its detailed comparison with the orthogonal multiple access (OMA) technique. Furthermore, the paper explores the application of the generalized singular value decomposition (GSVD) method in conjunction with NOMA, accompanied by a detailed review of GSVD-based NOMA systems. This study also introduces the concept of mobile edge computing (MEC) and extensively discusses its key parameters. Furthermore, a comprehensive analysis of NOMA MEC is presented, shedding light on its potential advantages and challenges. The aims of this study are to provide a comprehensive understanding of the aforementioned topics and contribute to the advancement of MIMO-NOMA systems.
{"title":"Comparative Analysis of NOMA and OMA Schemes: GSVD-based NOMA Systems and the Role of Mobile Edge Computing","authors":"Yunus Dursun","doi":"10.26636/jtit.2023.3.1354","DOIUrl":"https://doi.org/10.26636/jtit.2023.3.1354","url":null,"abstract":"This paper presents a comprehensive study that examines the fundamental concept of the non-orthogonal multiple access (NOMA) scheme and provides its detailed comparison with the orthogonal multiple access (OMA) technique. Furthermore, the paper explores the application of the generalized singular value decomposition (GSVD) method in conjunction with NOMA, accompanied by a detailed review of GSVD-based NOMA systems. This study also introduces the concept of mobile edge computing (MEC) and extensively discusses its key parameters. Furthermore, a comprehensive analysis of NOMA MEC is presented, shedding light on its potential advantages and challenges. The aims of this study are to provide a comprehensive understanding of the aforementioned topics and contribute to the advancement of MIMO-NOMA systems.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45293557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.26636/jtit.2023.3.1362
Nikta Azimian, Reza Mohammadi, M. Nassiri
In the Industrial Internet of Things, a wide variety of sensors are distributed all over the environment to monitor data collection, thereby allowing industrial processes to be monitored more efficiently. One of the fundamental goals of IIoT is to provide the highest level of reliability while simultaneously increasing network lifetime, reducing power consumption, and preventing delays. 6TiSCH is a popular communication standard relied upon in IIoT. The aim of the present study is to propose an inter-layer method that simultaneously considers network scheduling and routing processes based on TSCH and RPL approaches in multi-sink environments. The proposed method is intended to address the limitations of IIoT and meet the requirements of field-specific applications.
{"title":"A Cross-layer Method for Scheduling and Routing Real-time Traffic Flow in Industrial IoT","authors":"Nikta Azimian, Reza Mohammadi, M. Nassiri","doi":"10.26636/jtit.2023.3.1362","DOIUrl":"https://doi.org/10.26636/jtit.2023.3.1362","url":null,"abstract":"In the Industrial Internet of Things, a wide variety of sensors are distributed all over the environment to monitor data collection, thereby allowing industrial processes to be monitored more efficiently. One of the fundamental goals of IIoT is to provide the highest level of reliability while simultaneously increasing network lifetime, reducing power consumption, and preventing delays. 6TiSCH is a popular communication standard relied upon in IIoT. The aim of the present study is to propose an inter-layer method that simultaneously considers network scheduling and routing processes based on TSCH and RPL approaches in multi-sink environments. The proposed method is intended to address the limitations of IIoT and meet the requirements of field-specific applications.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43253235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.26636/jtit.2023.3.1360
S. Shrote, Sadhana D. Poshattiwar
The main concept behind employing cognitive radio is to enable secondary users (SUs) or unlicensed users to utilize the available spectrum. Spectrum sensing methods detect the existence of primary users (PUs) and have become the main topic of research in the CRN industry and in academia. This paper proposes a new framework based on the Adam gradient descent (Adam GD) algorithm to develop a spectrum sensing mechanism used in CRNs and detecting the availability of free channels. The signal's components are extracted from the received signal and the spectrum is searched for availability which is detected through a fusion center using the proposed algorithm. The proposed Adam GD algorithm attains the maximum detection probability rate and the minimum false alarm probability of 0.71 and 0.39, respectively, for a Rayleigh channel.
{"title":"An Efficient Cooperative Spectrum Sensing Method Using Renyi Entropy Weighted Optimal Likelihood Ratio for CRN","authors":"S. Shrote, Sadhana D. Poshattiwar","doi":"10.26636/jtit.2023.3.1360","DOIUrl":"https://doi.org/10.26636/jtit.2023.3.1360","url":null,"abstract":"The main concept behind employing cognitive radio is to enable secondary users (SUs) or unlicensed users to utilize the available spectrum. Spectrum sensing methods detect the existence of primary users (PUs) and have become the main topic of research in the CRN industry and in academia. This paper proposes a new framework based on the Adam gradient descent (Adam GD) algorithm to develop a spectrum sensing mechanism used in CRNs and detecting the availability of free channels. The signal's components are extracted from the received signal and the spectrum is searched for availability which is detected through a fusion center using the proposed algorithm. The proposed Adam GD algorithm attains the maximum detection probability rate and the minimum false alarm probability of 0.71 and 0.39, respectively, for a Rayleigh channel.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43683209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.26636/jtit.2023.3.1359
Hassan Ougraz, Said Safi, A. Boumezzough, M. Frikel
In recent years, researchers have tried to estimate the direction-of-arrival (DOA) of wideband sources and several novel techniques have been proposed. In this paper, we compare six algorithms for calculating the DOA of broadband signals, namely coherent subspace signal method (CSSM), two-sided correlation transformation (TCT), incoherent multiple signal classification (IMUSIC), test of orthogonality of frequency subspaces (TOFS), test of orthogonality of projected subspaces (TOPS), and squared TOPS (S-TOPS). The comparison is made through computer simulations for different parameters, such as signal-to-noise ratio (SNR), in order to establish the efficiency and performance of the discussed methods in noisy environments. CSSM and TCT require initial values, but the remaining approaches do not need any preprocessing.
{"title":"Performance Comparison of Several Algorithms for Localization of Wideband Sources","authors":"Hassan Ougraz, Said Safi, A. Boumezzough, M. Frikel","doi":"10.26636/jtit.2023.3.1359","DOIUrl":"https://doi.org/10.26636/jtit.2023.3.1359","url":null,"abstract":"In recent years, researchers have tried to estimate the direction-of-arrival (DOA) of wideband sources and several novel techniques have been proposed. In this paper, we compare six algorithms for calculating the DOA of broadband signals, namely coherent subspace signal method (CSSM), two-sided correlation transformation (TCT), incoherent multiple signal classification (IMUSIC), test of orthogonality of frequency subspaces (TOFS), test of orthogonality of projected subspaces (TOPS), and squared TOPS (S-TOPS). The comparison is made through computer simulations for different parameters, such as signal-to-noise ratio (SNR), in order to establish the efficiency and performance of the discussed methods in noisy environments. CSSM and TCT require initial values, but the remaining approaches do not need any preprocessing.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45737421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-29DOI: 10.26636/jtit.2023.171523
Salim Janji, P. Sroka
Drones are considered to be an important part of future 6G telecommunication systems. Thanks to their quick deployment potential, they provide additional connectivity options in the form of a flying hotspot. However, in such use cases, they typically require a wireless backhaul link to facilitate their proper operation, which might be a challenging task in dense urban environments. One of the potential methods that may be relied upon to connect such nodes is the integrated access and backhaul (IAB) approach, where part of the spectrum allocated to users accessing the base station is used for wireless backhauling. Thus, in this work, we consider the problem of establishing a multi-hop wireless backhaul link following the IAB concept, with the aid of drone relay stations (DRSs) and reconfigurable intelligent surfaces (RISs). We formulate the problem of coverage improvement with a fixed number of relays, assuming certain throughput requirements for the backhaul link. The simulations show that the use of RISs offers a coverage improvement in such a scenario or a reduction in the number of nodes involved in ensuring the required backhaul performance.
{"title":"RIS-aided Multi-hop Backhauling for 5G/6G UAV-assisted Access Points","authors":"Salim Janji, P. Sroka","doi":"10.26636/jtit.2023.171523","DOIUrl":"https://doi.org/10.26636/jtit.2023.171523","url":null,"abstract":"Drones are considered to be an important part of future 6G telecommunication systems. Thanks to their quick deployment potential, they provide additional connectivity options in the form of a flying hotspot. However, in such use cases, they typically require a wireless backhaul link to facilitate their proper operation, which might be a challenging task in dense urban environments. One of the potential methods that may be relied upon to connect such nodes is the integrated access and backhaul (IAB) approach, where part of the spectrum allocated to users accessing the base station is used for wireless backhauling. Thus, in this work, we consider the problem of establishing a multi-hop wireless backhaul link following the IAB concept, with the aid of drone relay stations (DRSs) and reconfigurable intelligent surfaces (RISs). We formulate the problem of coverage improvement with a fixed number of relays, assuming certain throughput requirements for the backhaul link. The simulations show that the use of RISs offers a coverage improvement in such a scenario or a reduction in the number of nodes involved in ensuring the required backhaul performance.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44560948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-29DOI: 10.26636/jtit.2023.169123
B. T. Krishna, Midhunchakkaravathy Janarthanan
In this paper, an active implementation of a differential voltage current conveyor (DVCC) based on a low-pass filter operating in the fractional order domain is presented. The transfer function for a fractional order system is dependent on the rational approximation of sα. Different methods used for calculating the rational approximation, including Carlson, Elkhazalil, and curve fitting, are evaluated here. Finally, to validate the theoretical results, a fractional order Butterworth filter is simulated in the Pspice environment using the 0.5 micrometer CMOS technology with an R-C network-based fractional order capacitor. Additionally, using the Monte Carlo analysis, the impact of current and voltage faults on DVCC response is investigated. It has been inferred that realization with a wider bandwidth is possible.
{"title":"Design of a Fractional Order Low-pass Filter Using a Differential Voltage Current Conveyor","authors":"B. T. Krishna, Midhunchakkaravathy Janarthanan","doi":"10.26636/jtit.2023.169123","DOIUrl":"https://doi.org/10.26636/jtit.2023.169123","url":null,"abstract":"In this paper, an active implementation of a differential voltage current conveyor (DVCC) based on a low-pass filter operating in the fractional order domain is presented. The transfer function for a fractional order system is dependent on the rational approximation of sα. Different methods used for calculating the rational approximation, including Carlson, Elkhazalil, and curve fitting, are evaluated here. Finally, to validate the theoretical results, a fractional order Butterworth filter is simulated in the Pspice environment using the 0.5 micrometer CMOS technology with an R-C network-based fractional order capacitor. Additionally, using the Monte Carlo analysis, the impact of current and voltage faults on DVCC response is investigated. It has been inferred that realization with a wider bandwidth is possible.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48993760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-29DOI: 10.26636/jtit.2023.169223
Namita D. Pulgam, S. Shinde
Rapid development of online medical technologies raises questions about the security of the patient’s medical data.When patient records are encrypted and labeled with a watermark, they may be exchanged securely online. In order to avoid geometrical attacks aiming to steal the information, image quality must be maintained and patient data must be appropriately extracted from the encoded image. To ensure that watermarked images are more resistant to attacks (e.g. additive noise or geometric attacks), different watermarking methods have been invented in the past. Additive noise causes visual distortion and render the potentially harmful diseases more difficult to diagnose and analyze. Consequently, denoising is an important pre-processing method for obtaining superior outcomes in terms of clarity and noise reduction and allows to improve the quality of damaged medical images. Therefore, various publications have been studied to understand the denoising methods used to improve image quality. The findings indicate that deep learning and neural networks have recently contributed considerably to the advancement of image processing techniques. Consequently, a system has been created that makes use of machine learning to enhance the quality of damaged images and to facilitate the process of identifying specific diseases. Images, damaged in the course of an assault, are denoised using the suggested technique relying on a symmetric dilated convolution neural network. This improves the system’s resilience and establishes a secure environment for the exchange of data while maintaining secrecy.
{"title":"Improving Quality of Watermarked Medical Images Using Symmetric Dilated Convolution Neural Networks","authors":"Namita D. Pulgam, S. Shinde","doi":"10.26636/jtit.2023.169223","DOIUrl":"https://doi.org/10.26636/jtit.2023.169223","url":null,"abstract":"Rapid development of online medical technologies raises questions about the security of the patient’s medical data.When patient records are encrypted and labeled with a watermark, they may be exchanged securely online. In order to avoid geometrical attacks aiming to steal the information, image quality must be maintained and patient data must be appropriately extracted from the encoded image. To ensure that watermarked images are more resistant to attacks (e.g. additive noise or geometric attacks), different watermarking methods have been invented in the past. Additive noise causes visual distortion and render the potentially harmful diseases more difficult to diagnose and analyze. Consequently, denoising is an important pre-processing method for obtaining superior outcomes in terms of clarity and noise reduction and allows to improve the quality of damaged medical images. Therefore, various publications have been studied to understand the denoising methods used to improve image quality. The findings indicate that deep learning and neural networks have recently contributed considerably to the advancement of image processing techniques. Consequently, a system has been created that makes use of machine learning to enhance the quality of damaged images and to facilitate the process of identifying specific diseases. Images, damaged in the course of an assault, are denoised using the suggested technique relying on a symmetric dilated convolution neural network. This improves the system’s resilience and establishes a secure environment for the exchange of data while maintaining secrecy.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44832841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-29DOI: 10.26636/jtit.2023.171423
Ramesh Boddu, Arindam Deb, J. S. Roy
The filtering antenna provides both radiation and filtering features and is an important component for the RF front-end of wireless devices. The main function of a filtering antenna is to reject out-of-band signals, thus reducing the interference from adjacent channels. The aim of the present work is to design a 2.6 GHz microstrip filtering antenna for 4G and 5G global mobile services. The filtering antenna is designed using a hairpin bandpass filter integrated with an elliptical microstrip aerial. Good impedance matching is obtained by using appropriate dimensions of the hairpin bandpass filter. The 10 dB return loss bandwidth of the filtering antenna is approx. 5.7%, with the maximum gain for the elliptical filtering antenna of approx. 2.2 dB. Good agreements between the measured and simulated results are obtained for the proposed filtering antenna and the bandwidth covers almost the entire 2.6 GHz band.
{"title":"Design of a Microstrip Filtering Antenna for 4G and 5G Wireless Networks","authors":"Ramesh Boddu, Arindam Deb, J. S. Roy","doi":"10.26636/jtit.2023.171423","DOIUrl":"https://doi.org/10.26636/jtit.2023.171423","url":null,"abstract":"The filtering antenna provides both radiation and filtering features and is an important component for the RF front-end of wireless devices. The main function of a filtering antenna is to reject out-of-band signals, thus reducing the interference from adjacent channels. The aim of the present work is to design a 2.6 GHz microstrip filtering antenna for 4G and 5G global mobile services. The filtering antenna is designed using a hairpin bandpass filter integrated with an elliptical microstrip aerial. Good impedance matching is obtained by using appropriate dimensions of the hairpin bandpass filter. The 10 dB return loss bandwidth of the filtering antenna is approx. 5.7%, with the maximum gain for the elliptical filtering antenna of approx. 2.2 dB. Good agreements between the measured and simulated results are obtained for the proposed filtering antenna and the bandwidth covers almost the entire 2.6 GHz band.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44220633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-29DOI: 10.26636/jtit.2023.170023
A. Saleh, Mohamad A. Ahmed
In this paper, two radio links with different frequency bands are considered for base stations (BS) serving users via decode-and-forward (DF) cooperative relays. Backhaul and access links are proposed with sub-6 GHz and millimeter wave (mmWave) bands, respectively. Non-orthogonal multiple access (NOMA) is employed in the backhaul link to simultaneously transmit a superposed signal in the power domain, using the same band. The superposed signals, containing two signals that differ in terms of power allocation factors (PAFs), are designed for two selected DF relays in the BS. The two relays are chosen from several relays to be serviced by the BS based on a pairing algorithm that depends on different users’ circumstances. The furthest DF relay detects the incoming NOMA signal directly, while the nearest one applies successive interference cancellation (SIC) before extracting its signal. Each DF relay forwards the detected signals toward their intended users over mmWave channels. Three performance metrics are utilized to evaluate the system’s performance: outage probability, achievable throughput, and bit error rate. Comparisons between two mmWave bands in the access link (28 and 73 GHz) are made to demonstrate the superiority of the 28 GHz band in terms of the three performance-related metrics.
{"title":"Performance Enhancement of Cooperative MIMO-NOMA Systems Over Sub-6 GHz and mmWave Bands","authors":"A. Saleh, Mohamad A. Ahmed","doi":"10.26636/jtit.2023.170023","DOIUrl":"https://doi.org/10.26636/jtit.2023.170023","url":null,"abstract":"In this paper, two radio links with different frequency bands are considered for base stations (BS) serving users via decode-and-forward (DF) cooperative relays. Backhaul and access links are proposed with sub-6 GHz and millimeter wave (mmWave) bands, respectively. Non-orthogonal multiple access (NOMA) is employed in the backhaul link to simultaneously transmit a superposed signal in the power domain, using the same band. The superposed signals, containing two signals that differ in terms of power allocation factors (PAFs), are designed for two selected DF relays in the BS. The two relays are chosen from several relays to be serviced by the BS based on a pairing algorithm that depends on different users’ circumstances. The furthest DF relay detects the incoming NOMA signal directly, while the nearest one applies successive interference cancellation (SIC) before extracting its signal. Each DF relay forwards the detected signals toward their intended users over mmWave channels. Three performance metrics are utilized to evaluate the system’s performance: outage probability, achievable throughput, and bit error rate. Comparisons between two mmWave bands in the access link (28 and 73 GHz) are made to demonstrate the superiority of the 28 GHz band in terms of the three performance-related metrics.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42770638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-29DOI: 10.26636/jtit.2023.169323
Ngo Thanh Hai, D. L. Khoa
Uninformed jammers are used to facilitate covert communications between a transmitter and an intended receiver under the surveillance of a warden. In reality, the signals the uniformed jammer emits to make the warden’s decision uncertain have inadvertently interfered with the detection of the intended receiver. In this paper, we apply truncated channel inversion power control (TCIPC) to both the transmitter and the uninformed jammer. The TCIPC scheme used on the uninformed jammer may help the intended receiver remove jamming signals using the successive interference cancellation (SIC) technique. Under the assumption that the warden knows the channel coefficient between two intended transceivers and achieves the optimal detection power threshold, we form the optimization problem to maximize the effective transmission rate (ETR) under covertness and decoding constraints. With the aim of enhancing covertness-related performance, we achieve the optimal power control parameters and determine system parameter-related constraints required for the existence of these solutions. According to the simulations, the use of the TCIPC scheme on the uninformed jammer significantly improves covertness-related performance in comparison to that of random power control (RPC) and constant power control (CPC) schemes. In addition, simulation results show that, for the TCIPC scheme: 1) the maximum ETR tends to converge as the transmitter’s or the uninformed jammer’s maximum transmit power increases, and 2) there exists an optimal value of the transmitter’s predetermined transmission rate to achieve the optimal performance.
{"title":"Jamming Signal Cancellation by Channel Inversion Power Control for Preserving Covert Communications","authors":"Ngo Thanh Hai, D. L. Khoa","doi":"10.26636/jtit.2023.169323","DOIUrl":"https://doi.org/10.26636/jtit.2023.169323","url":null,"abstract":"Uninformed jammers are used to facilitate covert communications between a transmitter and an intended receiver under the surveillance of a warden. In reality, the signals the uniformed jammer emits to make the warden’s decision uncertain have inadvertently interfered with the detection of the intended receiver. In this paper, we apply truncated channel inversion power control (TCIPC) to both the transmitter and the uninformed jammer. The TCIPC scheme used on the uninformed jammer may help the intended receiver remove jamming signals using the successive interference cancellation (SIC) technique. Under the assumption that the warden knows the channel coefficient between two intended transceivers and achieves the optimal detection power threshold, we form the optimization problem to maximize the effective transmission rate (ETR) under covertness and decoding constraints. With the aim of enhancing covertness-related performance, we achieve the optimal power control parameters and determine system parameter-related constraints required for the existence of these solutions. According to the simulations, the use of the TCIPC scheme on the uninformed jammer significantly improves covertness-related performance in comparison to that of random power control (RPC) and constant power control (CPC) schemes. In addition, simulation results show that, for the TCIPC scheme: 1) the maximum ETR tends to converge as the transmitter’s or the uninformed jammer’s maximum transmit power increases, and 2) there exists an optimal value of the transmitter’s predetermined transmission rate to achieve the optimal performance.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48957051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}