scispace - formally typeset
Search or ask a question
Author

Qinghua Li

Bio: Qinghua Li is an academic researcher from Intel. The author has contributed to research in topics: WiMAX & 3G MIMO. The author has an hindex of 2, co-authored 2 publications receiving 586 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A survey of the MIMO techniques in the two standards, IEEE 802.16e/m and 3GPP LTE/LTE-Advanced, which compares the features of the two and depicts the engineering considerations.
Abstract: IEEE 802.16m and 3GPP LTE-Advanced are the two evolving standards targeting 4G wireless systems. In both standards, multiple-input multiple-output antenna technologies play an essential role in meeting the 4G requirements. The application of MIMO technologies is one of the most crucial distinctions between 3G and 4G. It not only enhances the conventional point-to-point link, but also enables new types of links such as downlink multiuser MIMO. A large family of MIMO techniques has been developed for various links and with various amounts of available channel state information in both IEEE 802.16e/m and 3GPP LTE/LTE-Advanced. In this article we provide a survey of the MIMO techniques in the two standards. The MIMO features of the two are compared, and the engineering considerations are depicted.

511 citations

Journal ArticleDOI
Qinghua Li1, Won-Il Roh2
TL;DR: A survey on the state of art of MIMO technologies in current WiMAX standards with an emphasis on practical engineering considerations and the ongoing MIMo technologies in the evolution toward the next-generation WiMAX network is provided.
Abstract: WiMAX is the first cellular standard that employs OFDMA technology and provides true integrated services for both fixed and mobile broadband access. Among the many new technologies adopted in WiMAX, MIMO antenna technology plays an essential role in delivering fast, rich-content, mobile broadband service reliably over extended coverage areas. In this article we provide a survey on the state of art of MIMO technologies in current WiMAX standards with an emphasis on practical engineering considerations. Moreover, we also briefly discuss the ongoing MIMO technologies in the evolution toward the next-generation WiMAX network.

86 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This article provides an overview of signal processing challenges in mmWave wireless systems, with an emphasis on those faced by using MIMO communication at higher carrier frequencies.
Abstract: Communication at millimeter wave (mmWave) frequencies is defining a new era of wireless communication. The mmWave band offers higher bandwidth communication channels versus those presently used in commercial wireless systems. The applications of mmWave are immense: wireless local and personal area networks in the unlicensed band, 5G cellular systems, not to mention vehicular area networks, ad hoc networks, and wearables. Signal processing is critical for enabling the next generation of mmWave communication. Due to the use of large antenna arrays at the transmitter and receiver, combined with radio frequency and mixed signal power constraints, new multiple-input multiple-output (MIMO) communication signal processing techniques are needed. Because of the wide bandwidths, low complexity transceiver algorithms become important. There are opportunities to exploit techniques like compressed sensing for channel estimation and beamforming. This article provides an overview of signal processing challenges in mmWave wireless systems, with an emphasis on those faced by using MIMO communication at higher carrier frequencies.

2,380 citations

Journal ArticleDOI
10 May 2016
TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Abstract: Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

948 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of mmWave communications for future mobile networks (5G and beyond) is presented, including an overview of the solution for multiple access and backhauling, followed by the analysis of coverage and connectivity.
Abstract: Millimeter wave (mmWave) communications have recently attracted large research interest, since the huge available bandwidth can potentially lead to the rates of multiple gigabit per second per user Though mmWave can be readily used in stationary scenarios, such as indoor hotspots or backhaul, it is challenging to use mmWave in mobile networks, where the transmitting/receiving nodes may be moving, channels may have a complicated structure, and the coordination among multiple nodes is difficult To fully exploit the high potential rates of mmWave in mobile networks, lots of technical problems must be addressed This paper presents a comprehensive survey of mmWave communications for future mobile networks (5G and beyond) We first summarize the recent channel measurement campaigns and modeling results Then, we discuss in detail recent progresses in multiple input multiple output transceiver design for mmWave communications After that, we provide an overview of the solution for multiple access and backhauling, followed by the analysis of coverage and connectivity Finally, the progresses in the standardization and deployment of mmWave for mobile networks are discussed

887 citations

Journal ArticleDOI
TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
Abstract: This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

632 citations

Journal ArticleDOI
TL;DR: This tutorial explores the fundamental issues involved in selecting the best communications approaches for mmWave frequencies, and provides insights, challenges, and appropriate uses of each MIMO technique based on early knowledge of the mmWave propagation environment.
Abstract: The use of mmWave frequencies for wireless communications offers channel bandwidths far greater than previously available, while enabling dozens or even hundreds of antenna elements to be used at the user equipment, base stations, and access points. To date, MIMO techniques, such as spatial multiplexing, beamforming, and diversity, have been widely deployed in lower-frequency systems such as IEEE 802.11n/ac (wireless local area networks) and 3GPP LTE 4G cellphone standards. Given the tiny wavelengths associated with mmWave, coupled with differences in the propagation and antennas used, it is unclear how well spatial multiplexing with multiple streams will be suited to future mmWave mobile communications. This tutorial explores the fundamental issues involved in selecting the best communications approaches for mmWave frequencies, and provides insights, challenges, and appropriate uses of each MIMO technique based on early knowledge of the mmWave propagation environment.

613 citations