scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Transactions on Wireless Communications in 2011"


Journal ArticleDOI
TL;DR: The paper shows that the precoding matrix used by the base station in one cell becomes corrupted by the channel between that base station and the users in other cells in an undesirable manner and develops a new multi-cell MMSE-based precoding method that mitigates this problem.
Abstract: This paper considers a multi-cell multiple antenna system with precoding used at the base stations for downlink transmission. Channel state information (CSI) is essential for precoding at the base stations. An effective technique for obtaining this CSI is time-division duplex (TDD) operation where uplink training in conjunction with reciprocity simultaneously provides the base stations with downlink as well as uplink channel estimates. This paper mathematically characterizes the impact that uplink training has on the performance of such multi-cell multiple antenna systems. When non-orthogonal training sequences are used for uplink training, the paper shows that the precoding matrix used by the base station in one cell becomes corrupted by the channel between that base station and the users in other cells in an undesirable manner. This paper analyzes this fundamental problem of pilot contamination in multi-cell systems. Furthermore, it develops a new multi-cell MMSE-based precoding method that mitigates this problem. In addition to being linear, this precoding method has a simple closed-form expression that results from an intuitive optimization. Numerical results show significant performance gains compared to certain popular single-cell precoding methods.

1,306 citations


Journal ArticleDOI
TL;DR: The results show that by proper resource management, D2D communication can effectively improve the total throughput without generating harmful interference to cellular networks.
Abstract: We consider Device-to-Device (D2D) communication underlaying cellular networks to improve local services. The system aims to optimize the throughput over the shared resources while fulfilling prioritized cellular service constraints. Optimum resource allocation and power control between the cellular and D2D connections that share the same resources are analyzed for different resource sharing modes. Optimality is discussed under practical constraints such as minimum and maximum spectral efficiency restrictions, and maximum transmit power or energy limitation. It is found that in most of the considered cases, optimum power control and resource allocation for the considered resource sharing modes can either be solved in closed form or searched from a finite set. The performance of the D2D underlay system is evaluated in both a single-cell scenario, and a Manhattan grid environment with multiple WINNER II A1 office buildings. The results show that by proper resource management, D2D communication can effectively improve the total throughput without generating harmful interference to cellular networks.

1,093 citations


Journal ArticleDOI
TL;DR: The state of the art in molecular electronics is reviewed to motivate the study of the Terahertz Band (0.1-10.0 THz) for electromagnetic (EM) communication among nano- devices and a new propagation model is developed based on radiative transfer theory and in light of molecular absorption.
Abstract: Nanotechnologies promise new solutions for several applications in the biomedical, industrial and military fields. At the nanoscale, a nanomachine is considered as the most basic functional unit which is able to perform very simple tasks. Communication among nanomachines will allow them to accomplish more complex functions in a distributed manner. In this paper, the state of the art in molecular electronics is reviewed to motivate the study of the Terahertz Band (0.1-10.0 THz) for electromagnetic (EM) communication among nano-devices. A new propagation model for EM communications in the Terahertz Band is developed based on radiative transfer theory and in light of molecular absorption. This model accounts for the total path loss and the molecular absorption noise that a wave in the Terahertz Band suffers when propagating over very short distances. Finally, the channel capacity of the Terahertz Band is investigated by using this model for different power allocation schemes, including a scheme based on the transmission of femtosecond-long pulses. The results show that for very short transmission distances, in the order of several tens of millimeters, the Terahertz channel supports very large bit-rates, up to few terabits per second, which enables a radically different communication paradigm for nanonetworks.

889 citations


Journal ArticleDOI
TL;DR: This work proposes the combination of opportunistic mode selection and transmit power adaptation for maximizing instantaneous and average spectral efficiency after noting that the trade-off favors alternately the modes during operation.
Abstract: Focusing on two-antenna infrastructure relays employed for coverage extension, we develop hybrid techniques that switch opportunistically between full-duplex and half-duplex relaying modes. To rationalize the system design, the classic three-node full-duplex relay link is first amended by explicitly modeling residual relay self-interference, i.e., a loopback signal from the transmit antenna to the receive antenna remaining after cancellation. The motivation for opportunistic mode selection stems then from the fundamental trade-off determining the spectral efficiency: The half-duplex mode avoids inherently the self-interference at the cost of halving the end-to-end symbol rate while the full-duplex mode achieves full symbol rate but, in practice, suffers from residual interference even after cancellation. We propose the combination of opportunistic mode selection and transmit power adaptation for maximizing instantaneous and average spectral efficiency after noting that the trade-off favors alternately the modes during operation. The analysis covers both common relaying protocols (amplify-and-forward and decode-and-forward) as well as reflects the difference of downlink and uplink systems. The results show that opportunistic mode selection offers significant performance gain over system design that is confined to either mode without rationalization.

674 citations


Journal ArticleDOI
TL;DR: A new interference management strategy is proposed to enhance the overall capacity of cellular networks (CNs) and device-to-device (D2D) systems and derive the lower bound of the ergodic capacity as a closed form.
Abstract: A new interference management strategy is proposed to enhance the overall capacity of cellular networks (CNs) and device-to-device (D2D) systems. We consider M out of K cellular user equipments (CUEs) and one D2D pair exploiting the same resources in the uplink (UL) period under the assumption of M multiple antennas at the base station (BS). First, we use the conventional mechanism which limits the maximum transmit power of the D2D transmitter so as not to generate harmful interference from D2D systems to CNs. Second, we propose a δD-interference limited area (ILA) control scheme to manage interference from CNs to D2D systems. The method does not allow the coexistence (i.e., use of the same resources) of CUEs and a D2D pair if the CUEs are located in the δD-ILA defined as the area in which the interference to signal ratio (ISR) at the D2D receiver is greater than the predetermined threshold, δD. Next, we analyze the coverage of the δD-ILA and derive the lower bound of the ergodic capacity as a closed form. Numerical results show that the δD-ILA based D2D gain is much greater than the conventional D2D gain, whereas the capacity loss to the CNs caused by using the δD-ILA is negligibly small.

557 citations


Journal ArticleDOI
TL;DR: It is shown that the outage probability of cognitive relay networks is higher than that of conventional relay networks due to the interference constraint, and the decrease in outage probability achieved by increasing the selection diversity is not less than that in conventional relay Networks.
Abstract: This paper evaluates the outage probability of cognitive relay networks with cooperation between secondary users based on the underlay approach, while adhering to the interference constraint on the primary user, i.e., the limited amount of interference which the primary user can tolerate. A relay selection criterion, suitable for cognitive relay networks, is provided, and using it, we derive the outage probability. It is shown that the outage probability of cognitive relay networks is higher than that of conventional relay networks due to the interference constraint, and we quantify the increase. In addition, the outage probability is affected by the distance ratio of the interference link (between the secondary transmitter and the primary receiver) to the relaying link (between the secondary transmitter and the secondary receiver). We also prove that cognitive relay networks achieve the same full selection diversity order as conventional relay networks, and that the decrease in outage probability achieved by increasing the selection diversity (the number of relays) is not less than that in conventional relay networks.

521 citations


Journal ArticleDOI
TL;DR: Detection performance of an energy detector used for cooperative spectrum sensing in a cognitive radio network is investigated over channels with both multipath fading and shadowing and can be extended to channels with Nakagami-m multipath fades and lognormal shadowing as well.
Abstract: Detection performance of an energy detector used for cooperative spectrum sensing in a cognitive radio network is investigated over channels with both multipath fading and shadowing. The analysis focuses on two fusion strategies: data fusion and decision fusion. Under data fusion, upper bounds for average detection probabilities are derived for four scenarios: 1) single cognitive relay; 2) multiple cognitive relays; 3) multiple cognitive relays with direct link; and 4) multi-hop cognitive relays. Under decision fusion, the exact detection and false alarm probabilities are derived under the generalized "k-out-of-n" fusion rule at the fusion center with consideration of errors in the reporting channel due to fading. The results are extended to a multi-hop network as well. Our analysis is validated by numerical and simulation results. Although this research focuses on Rayleigh multipath fading and lognormal shadowing, the analytical framework can be extended to channels with Nakagami-m multipath fading and lognormal shadowing as well.

512 citations


Journal ArticleDOI
TL;DR: This paper analytically evaluating the two main types of FFR deployments - Strict FFR and Soft Frequency Reuse - using a Poisson point process to model the base station locations and observes that FFR provides an increase in the sum-rate as well as the well-known benefit of improved coverage for cell-edge users.
Abstract: Fractional frequency reuse (FFR) is an interference management technique well-suited to OFDMA-based cellular networks wherein the bandwidth of the cells is partitioned into regions with different frequency reuse factors. To date, FFR techniques have been typically been evaluated through system-level simulations using a hexagonal grid for the base station locations. This paper instead focuses on analytically evaluating the two main types of FFR deployments - Strict FFR and Soft Frequency Reuse (SFR) - using a Poisson point process to model the base station locations. The results are compared with the standard grid model and an actual urban deployment. Under reasonable special cases for modern cellular networks, our results reduce to simple closed-form expressions, which provide insight into system design guidelines and the relative merits of Strict FFR, SFR, universal reuse, and fixed frequency reuse. Finally, a SINR-proportional resource allocation strategy is proposed based on the analytical expressions and we observe that FFR provides an increase in the sum-rate as well as the well-known benefit of improved coverage for cell-edge users.

432 citations


Journal ArticleDOI
TL;DR: The fundamental tradeoff between energy efficiency (EE) and SE in downlink orthogonal frequency division multiple access (OFDMA) networks is addressed and a low-complexity but near-optimal resource allocation algorithm is developed for practical application of the EE-SE tradeoff.
Abstract: Conventional design of wireless networks mainly focuses on system capacity and spectral efficiency (SE). As green radio (GR) becomes an inevitable trend, energy-efficient design is becoming more and more important. In this paper, the fundamental tradeoff between energy efficiency (EE) and SE in downlink orthogonal frequency division multiple access (OFDMA) networks is addressed. We first set up a general EE-SE tradeoff framework, where the overall EE, SE and per-user quality-of-service (QoS) are all considered, and prove that under this framework, EE is strictly quasiconcave in SE. We then discuss some basic properties, such as the impact of channel power gain and circuit power on the EE-SE relation. We also find a tight upper bound and a tight lower bound on the EE-SE curve for general scenarios, which reflect the actual EE-SE relation. We then focus on a special case that priority and fairness are considered and suggest an alternative upper bound, which is proved to be achievable for flat fading channels. We also develop a low-complexity but near-optimal resource allocation algorithm for practical application of the EE-SE tradeoff. Numerical results confirm the theoretical findings and demonstrate the effectiveness of the proposed resource allocation scheme for achieving a flexible and desirable tradeoff between EE and SE.

379 citations


Journal ArticleDOI
Min Hyunkee1, Woohyun Seo1, Jemin Lee1, Sungsoo Park1, Daesik Hong1 
TL;DR: Numerical results show that by applying the receive mode selection, the D2D receiver achieves a remarkable enhancement of outage probability in the middle interference regime from the usage of MODE3 compared to the conventional ways of using only MODE1 or MODE2.
Abstract: A new interference management scheme is proposed to improve the reliability of a device-to-device (D2D) communication in the uplink (UL) period without reducing the power of cellular user equipment (UE). To improve the reliability of the D2D receiver, two conventional receive techniques and one proposed method are introduced. One of the conventional methods is demodulating the desired signal first (MODE1), while the other is demodulating an interference first (MODE2), and the proposed method is exploiting a retransmission of the interference from the base station (BS) (MODE3). We derive their outage probabilities in closed forms and explain the mechanism of receive mode selection which selects the mode guaranteeing the minimum outage probability among three modes. Numerical results show that by applying the receive mode selection, the D2D receiver achieves a remarkable enhancement of outage probability in the middle interference regime from the usage of MODE3 compared to the conventional ways of using only MODE1 or MODE2.

346 citations


Journal ArticleDOI
TL;DR: A sufficient condition for generic multi-channel power control to have a unique equilibrium in frequency-selective channels is discovered and the proposed scheme improves both energy efficiency and spectral efficiency in an interference-limited multi-cell cellular network.
Abstract: Power optimization techniques are becoming increasingly important in wireless system design since battery technology has not kept up with the demand of mobile devices. They are also critical to interference management in wireless systems because interference usually results from both aggressive spectral reuse and high power transmission and severely limits system performance. In this paper, we develop an energy-efficient power optimization scheme for interference-limited wireless communications. We consider both circuit and transmission powers and focus on energy efficiency over throughput. We first investigate a non-cooperative game for energy-efficient power optimization in frequency-selective channels and reveal the conditions of the existence and uniqueness of the equilibrium for this game. Most importantly, we discover a sufficient condition for generic multi-channel power control to have a unique equilibrium in frequency-selective channels. Then we study the tradeoff between energy efficiency and spectral efficiency and show by simulation results that the proposed scheme improves both energy efficiency and spectral efficiency in an interference-limited multi-cell cellular network.

Journal ArticleDOI
Dali Wei, Yichao Jin1, Serdar Vural1, Klaus Moessner1, Rahim Tafazolli1 
TL;DR: A distributed clustering algorithm, Energy-efficient Clustering (EC), that determines suitable cluster sizes depending on the hop distance to the data sink, while achieving approximate equalization of node lifetimes and reduced energy consumption levels is proposed.
Abstract: Hot spots in a wireless sensor network emerge as locations under heavy traffic load. Nodes in such areas quickly deplete energy resources, leading to disruption in network services. This problem is common for data collection scenarios in which Cluster Heads (CH) have a heavy burden of gathering and relaying information. The relay load on CHs especially intensifies as the distance to the sink decreases. To balance the traffic load and the energy consumption in the network, the CH role should be rotated among all nodes and the cluster sizes should be carefully determined at different parts of the network. This paper proposes a distributed clustering algorithm, Energy-efficient Clustering (EC), that determines suitable cluster sizes depending on the hop distance to the data sink, while achieving approximate equalization of node lifetimes and reduced energy consumption levels. We additionally propose a simple energy-efficient multihop data collection protocol to evaluate the effectiveness of EC and calculate the end-to-end energy consumption of this protocol; yet EC is suitable for any data collection protocol that focuses on energy conservation. Performance results demonstrate that EC extends network lifetime and achieves energy equalization more effectively than two well-known clustering algorithms, HEED and UCR.

Journal ArticleDOI
TL;DR: Numerical results provide insight into the spatial variations of attainable capacity within a room, and the combinations of beamsteering and spatial multiplexing used in different scenarios are provided.
Abstract: In this paper, we investigate spatial multiplexing at millimeter (mm) wave carrier frequencies for short-range indoor applications by quantifying fundamental limits in line-of-sight (LOS) environments and then investigating performance in the presence of multipath and LOS blockage. Our contributions are summarized as follows. For linear arrays with constrained form factor, an asymptotic analysis based on the properties of prolate spheroidal wave functions shows that a sparse array producing a spatially uncorrelated channel matrix effectively provides the maximum number of spatial degrees of freedom in a LOS environment, although substantial beamforming gains can be obtained by using denser arrays. This motivates our proposed mm-wave MIMO architecture, which utilizes arrays of subarrays to provide both directivity and spatial multiplexing gains. System performance is evaluated in a simulated indoor environment using a ray-tracing model that incorporates multipath effects and potential LOS blockage. Eigenmode transmission with waterfilling power allocation serves as a performance benchmark, and is compared to the simpler scheme of beamsteering transmission with MMSE reception and a fixed signal constellation. Our numerical results provide insight into the spatial variations of attainable capacity within a room, and the combinations of beamsteering and spatial multiplexing used in different scenarios.

Journal ArticleDOI
TL;DR: The use of a secrecy guard zone is shown to give a significant improvement on the throughput of networks with high security requirements, and the throughput cost of achieving a moderate level of security is quite low, while throughput must be significantly sacrificed to realize a highly secure network.
Abstract: This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. We consider random networks where the legitimate nodes and the eavesdroppers are distributed according to independent two-dimensional Poisson point processes. The transmission capacity framework is used to characterize the area spectral efficiency of secure transmissions with constraints on both the quality of service (QoS) and the level of security. This framework illustrates the dependence of the network throughput on key system parameters, such as the densities of legitimate nodes and eavesdroppers, as well as the QoS and security constraints. One important finding is that the throughput cost of achieving a moderate level of security is quite low, while throughput must be significantly sacrificed to realize a highly secure network. We also study the use of a secrecy guard zone, which is shown to give a significant improvement on the throughput of networks with high security requirements.

Journal ArticleDOI
TL;DR: In the proposed MF-SIC algorithm with shadow area constraints (SAC), an enhanced interference cancellation is achieved by introducingconstellation points as the candidates to combat the error propagation in decision feedback loops.
Abstract: In this paper, a low-complexity multiple feedback successive interference cancellation (MF-SIC) strategy is proposed for the uplink of multiuser multiple-input multiple-output (MU-MIMO) systems. In the proposed MF-SIC algorithm with shadow area constraints (SAC), an enhanced interference cancellation is achieved by introducing {constellation points as the candidates} to combat the error propagation in decision feedback loops. We also combine the MF-SIC with multi-branch (MB) processing, which achieves a higher detection diversity order. For coded systems, a low-complexity soft-input soft-output (SISO) iterative (turbo) detector is proposed based on the MF and the MB-MF interference suppression techniques. The computational complexity of the MF-SIC is comparable to the conventional SIC algorithm since very little additional complexity is required. Simulation results show that the algorithms significantly outperform the conventional SIC scheme and approach the optimal detector.

Journal ArticleDOI
TL;DR: A mixture gamma (MG) distribution for the signal-to-noise ratio (SNR) of wireless channels is proposed, which is not only a more accurate model for composite fading, but is also a versatile approximation for any fading SNR.
Abstract: Composite fading (i.e., multipath fading and shadowing together) has increasingly been analyzed by means of the K channel and related models. Nevertheless, these models do have computational and analytical difficulties. Motivated by this context, we propose a mixture gamma (MG) distribution for the signal-to-noise ratio (SNR) of wireless channels. Not only is it a more accurate model for composite fading, but is also a versatile approximation for any fading SNR. As this distribution consists of N (≥ 1) component gamma distributions, we show how its parameters can be determined by using probability density function (PDF) or moment generating function (MGF) matching. We demonstrate the accuracy of the MG model by computing the mean square error (MSE) or the Kullback-Leibler (KL) divergence or by comparing the moments. With this model, performance metrics such as the average channel capacity, the outage probability, the symbol error rate (SER), and the detection capability of an energy detector are readily derived.

Journal ArticleDOI
TL;DR: An optimal approach based on the dual method and a suboptimal approach are developed to reduce complexity while maintaining reasonable performance in cognitive radio (CR) systems.
Abstract: In this paper, we investigate joint relay selection and power allocation to maximize system throughput with limited interference to licensed (primary) users in cognitive radio (CR) systems. As these two problems are coupled together, we first develop an optimal approach based on the dual method and then propose a suboptimal approach to reduce complexity while maintaining reasonable performance. From our simulation results, the proposed approaches can increase the system throughput by over 50%.

Journal ArticleDOI
Gang Wang1, Kehu Yang1
TL;DR: A new approach to the localization problem in wireless sensor networks using received-signal-strength (RSS) measurements, which is approximately approached by the maximum likelihood (ML) parameter estimation, which the authors refer to as the weighted least squares (WLS) approach.
Abstract: In this letter, we propose a new approach to the localization problem in wireless sensor networks using received-signal-strength (RSS) measurements. The problem is reformulated under the equivalent exponential transformation of the conventional path loss measurement model and the unscented transformation (UT), and is approximately approached by the maximum likelihood (ML) parameter estimation, which we refer to as the weighted least squares (WLS) approach. This formulation is used for sensor node localization in both noncooperative and cooperative scenarios. Simulation results confirm the effectiveness of the approach for both outdoor and indoor environments.

Journal ArticleDOI
Wonjae Shin1, Namyoon Lee1, Jong-Bu Lim1, Changyong Shin1, Kyung-Hun Jang1 
TL;DR: This letter focuses on a two-cell multiple-input multiple-output Gaussian interfering broadcast channels (MIMO-IFBC) with M transmit antennas and N receive antennas, and proposes a novel IA technique jointly designing transmit and receive beamforming vectors in a closed-form expression without iterative computation.
Abstract: The interference alignment (IA) is a promising technique to effectively mitigate interferences in wireless communication systems. To show the potential benefits of such an IA scheme, this letter focuses on a two-cell multiple-input multiple-output (MIMO) Gaussian interfering broadcast channels (MIMO-IFBC) with M transmit antennas and N receive antennas. It corresponds to a downlink scenario for cellular networks with two base stations (BSs) with M transmit antennas per BS, and two users with N receive antennas per user, on the cell-boundary of each BS. In this scenario, we propose a novel IA technique jointly designing transmit and receive beamforming vectors in a closed-form expression without iterative computation. It is also analytically shown that the proposed IA algorithm achieves the optimal degrees of freedom (DoF) of 2N in the case of [¾N] ≤ M <; 2N. The simulations demonstrate that not only the analytical results are valid, but the sum-rate of our proposed scheme also outperforms those of conventional techniques, especially in the high signal-to-noise ratio (SNR) regime.

Journal ArticleDOI
TL;DR: In this article, a new framework incorporating a multitude of theoretical uplink CoMP concepts, which are then put into perspective with practical CoMP algorithms, is proposed to provide new insight into the potential value of different uplink coMP concepts in next generation wireless communications systems, and reveals the subset of schemes that are most likely to be used in practice.
Abstract: Coordinated Multi-Point (CoMP) is known to be a key technology for next generation mobile communications systems, as it allows to overcome the burden of inter-cell interference. Especially in the uplink, it is likely that interference exploitation schemes will be used in the near future, as they can be used with legacy terminals and be based on operator-proprietary signal processing concepts, hence requiring no or little changes in standardization. Major drawbacks, however, are the extent of additional backhaul infrastructure needed, and the sensitivity to imperfect channel knowledge. This paper jointly addresses both issues in a new framework incorporating a multitude of proposed theoretical uplink CoMP concepts, which are then put into perspective with practical CoMP algorithms. This comprehensive analysis provides new insight into the potential value of different uplink CoMP concepts in next generation wireless communications systems, and reveals the subset of schemes that are most likely to be used in practice.

Journal ArticleDOI
TL;DR: The proposed method is able to guarantee feasible solutions even if the interference information is outdated or incomplete, and allows for a number of special cases, where the backhaul information exchange is reduced at the cost of somewhat sub-optimal performance.
Abstract: A decentralized solution is proposed for the coordinated multi-cell multi-antenna minimum power beamformer design problem with single-antenna users. The optimal minimum power beamformers can be obtained locally at each base station (BS) relying on limited backhaul information exchange between BSs. The original centralized problem is reformulated such that the BSs are coupled by real-valued inter-cell interference terms. The coupling is handled by taking local copies of the interference terms at each BS and enforcing consistency between them. The consistency constraints are then decoupled by a standard dual decomposition approach leading to a distributed algorithm. The proposed method is able to guarantee feasible solutions even if the interference information is outdated or incomplete. In addition, the proposed approach allows for a number of special cases, where the backhaul information exchange is reduced at the cost of somewhat sub-optimal performance. The performance of the proposed coordinated multi-cell transmission is compared with the coherent multi-cell beamforming and with inter-cell interference nulling in different scenarios with varying interference. A near-optimal performance can be achieved even with significantly reduced backhaul information exchange and with relatively high velocities and/or low backhaul signaling rates.

Journal ArticleDOI
TL;DR: This paper addresses the general case in which the eavesdropper and legitimate channels have nontrivial covariances, and shows that when full information on the legitimate channel is available to the transmitter, the optimal input covariance has always rank one.
Abstract: A Gaussian multiple-input single-output (MISO) wiretap channel model is considered, where there exists a transmitter equipped with multiple antennas, a legitimate receiver and an eavesdropper, each equipped with a single antenna. We study the problem of finding the optimal input covariance that maximizes the ergodic secrecy rate subject to a power constraint, where only statistical information about the eavesdropper channel is available at the transmitter. This is a non-convex optimization problem that is in general difficult to solve. Existing results address the case in which the eavesdropper or/and legitimate channels have independent and identically distributed Gaussian entries with zero mean and unit variance, i.e., the channels have trivial covariances. This paper addresses the general case in which the eavesdropper and legitimate channels have nontrivial covariances. A set of equations describing the optimal input covariance matrix are proposed along with an algorithm to obtain the solution. Based on this framework, it is shown that when full information on the legitimate channel is available to the transmitter, the optimal input covariance has always rank one. It is also shown that when only statistical information on the legitimate channel is available to the transmitter, the legitimate channel has some general non-trivial covariance and the eavesdropper channel has trivial covariance, the optimal input covariance has the same eigenvectors as the legitimate channel covariance.

Journal ArticleDOI
TL;DR: This paper proposes a novel Generalized Space-Time Shift Keying (G-STSK) architecture, which acts as a unified Multiple-Input Multiple-Output (MIMO) framework, based on the rationale that P out of Q dispersion matrices are selected and linearly combined in conjunction with the classic PSK/QAM modulation.
Abstract: In this paper, motivated by the recent concept of Spatial Modulation (SM), we propose a novel Generalized Space-Time Shift Keying (G-STSK) architecture, which acts as a unified Multiple-Input Multiple-Output (MIMO) framework. More specifically, our G-STSK scheme is based on the rationale that P out of Q dispersion matrices are selected and linearly combined in conjunction with the classic PSK/QAM modulation, where activating P out of Q dispersion matrices provides an implicit means of conveying information bits in addition to the classic modem. Due to its substantial flexibility, our G-STSK framework includes diverse MIMO arrangements, such as SM, Space-Shift Keying (SSK), Linear Dispersion Codes (LDCs), Space-Time Block Codes (STBCs) and Bell Lab's Layered Space-Time (BLAST) scheme. Hence it has the potential of subsuming all of them, when flexibly adapting a set of system parameters. Moreover, we also derive the Discrete-input Continuous-output Memoryless Channel (DCMC) capacity for our G-STSK scheme, which serves as the unified capacity limit, hence quantifying the capacity of the class of MIMO arrangements. Furthermore, EXtrinsic Information Transfer (EXIT) chart analysis is used for designing our G-STSK scheme and for characterizing its iterative decoding convergence.

Journal ArticleDOI
TL;DR: This paper designs a hop selection metric for the piconet controller to select appropriate relay hops for a traffic flow, aiming to improve the flow throughput and balance the traffic loads across the network, and proposes a multi-hop concurrent transmission (MHCT) scheme to exploit the spatial capacity of mmWave WPANs.
Abstract: Millimeter-wave (mmWave) communications is a promising enabling technology for high rate (Giga-bit) multimedia applications. However, because of the high propagation loss at 60 GHz band, mmWave signal power degrades significantly over distance. Therefore, a traffic flow being transmitted over multiple short hops can attain higher throughput than that over a single long hop. In this paper, we first design a hop selection metric for the piconet controller (PNC) to select appropriate relay hops for a traffic flow, aiming to improve the flow throughput and balance the traffic loads across the network. We then propose a multi-hop concurrent transmission (MHCT) scheme to exploit the spatial capacity of mmWave WPANs by allowing nodes to transmit concurrently in communication links without causing harmful interference. The analysis of concurrent transmission probability and time division multiplexing demonstrates that the MHCT scheme is capable of improving the time slot utilization. Extensive simulations are conducted to validate the analytical results and demonstrate that the proposed MHCT scheme can improve the average traffic flow throughput and network throughput.

Journal ArticleDOI
TL;DR: This work considers both uplink and downlink transmissions and both outage-based and average-based metrics, and derives an approximation for the main parameter in the Wyner model - the interference intensity term, which depends on the path loss exponent.
Abstract: The Wyner model has been widely used to model and analyze cellular networks due to its simplicity and analytical tractability. Its key aspects include fixed user locations and the deterministic and homogeneous interference intensity. While clearly a significant simplification of a real cellular system, which has random user locations and interference levels that vary by several orders of magnitude over a cell, a common presumption by theorists is that the Wyner model nevertheless captures the essential aspects of cellular interactions. But is this true? To answer this question, we compare the Wyner model to a model that includes random user locations and fading. We consider both uplink and downlink transmissions and both outage-based and average-based metrics. For the uplink, for both metrics, we conclude that the Wyner model is in fact quite accurate for systems with a sufficient number of simultaneous users, e.g., a CDMA system. Conversely, it is broadly inaccurate otherwise. Turning to the downlink, the Wyner model becomes inaccurate even for systems with a large number of simultaneous users. In addition, we derive an approximation for the main parameter in the Wyner model - the interference intensity term, which depends on the path loss exponent.

Journal ArticleDOI
TL;DR: Numerical results show that cooperative transmission can improve the capacity performance of multi-cell multi-antenna cooperative cellular networks, especially in a scenario with a high density of interfering base stations.
Abstract: Characterization and modeling of co-channel interference is critical for the design and performance evaluation of realistic multi-cell cellular networks. In this paper, based on alpha stable processes, an analytical co-channel interference model is proposed for multi-cell multiple-input multi-output (MIMO) cellular networks. The impact of different channel parameters on the new interference model is analyzed numerically. Furthermore, the exact normalized downlink average capacity is derived for a multi-cell MIMO cellular network with co-channel interference. Moreover, the closed-form normalized downlink average capacity is derived for cell-edge users in multi-cell multiple-input single-output (MISO) cooperative cellular networks with co-channel interference. From the new co-channel interference model and capacity formulas, the impact of cooperative antennas and base stations on cell-edge user performance in the multi-cell multi-antenna cellular network is investigated by numerical methods. Numerical results show that cooperative transmission can improve the capacity performance of multi-cell multi-antenna cooperative cellular networks, especially in a scenario with a high density of interfering base stations. The capacity performance gain is degraded with the increased number of cooperative antennas or base stations.

Journal ArticleDOI
TL;DR: A joint TOA/AOA estimator is proposed for UWB indoor ranging under LOS operating conditions, and as expected, the estimation accuracy decreases with the pulse bandwidth.
Abstract: A joint TOA/AOA estimator is proposed for UWB indoor ranging under LOS operating conditions. The estimator employs an array of antennas, each feeding a demodulator consisting in a squarer and a low-pass filter. Signal samples taken at Nyquist rate at the filter outputs are processed to produce TOA and AOA estimates. Performance is assessed with transmitted pulses with a bandwidth of either 1.5 GHz (type-1 pulses) or 0.5 GHz (type-2 pulses), which correspond to sampling rates of 3 GHz and 1 GHz, respectively. As expected, the estimation accuracy decreases with the pulse bandwidth. Ranging errors of about 10 cm and angular errors of about 1° are achieved at SNR of practical interest with type-1 pulses and two antennas at a distance of 50 cm. With type-2 pulses the errors increase to 35 cm and 3°. Comparisons are made with other schemes discussed in literature.

Journal ArticleDOI
TL;DR: This paper presents the first theoretical framework for WCL performance analysis in terms of its localization error distribution parameterized by node density, node placement, shadowing variance, correlation distance and inaccuracy of sensor node positioning.
Abstract: Information about primary transmitter location is crucial in enabling several key capabilities in cognitive radio networks, including improved spatio-temporal sensing, intelligent location-aware routing, as well as aiding spectrum policy enforcement. Compared to other proposed non-interactive localization algorithms, the weighted centroid localization (WCL) scheme uses only the received signal strength information, which makes it simple to implement and robust to variations in the propagation environment. In this paper we present the first theoretical framework for WCL performance analysis in terms of its localization error distribution parameterized by node density, node placement, shadowing variance, correlation distance and inaccuracy of sensor node positioning. Using this analysis, we quantify the robustness of WCL to various physical conditions and provide design guidelines, such as node placement and spacing, for the practical deployment of WCL. We also propose a power-efficient method for implementing WCL through a distributed cluster-based algorithm, that achieves comparable accuracy with its centralized counterpart.

Journal ArticleDOI
TL;DR: This letter considers non-colluding and colluding eavesdroppers, and derive the network secure connectivity for both eavesdropper strategies, and mathematically shows how nodes with multiple transmit antenna elements can improve secure connectivity by forming a directional antenna or using eigen-beamforming.
Abstract: Information-theoretic security constraints reduce the connectivity of wireless networks in the presence of eavesdroppers, which motivates better modeling of such networks and the development of techniques that are robust to eavesdropping. In this letter, we are concerned with the existence of secure connections from a typical transmitter to the legitimate receiver(s) over fading channels, where the legitimate nodes and eavesdroppers are all randomly located. We consider non-colluding and colluding eavesdroppers, and derive the network secure connectivity for both eavesdropper strategies. We mathematically show how nodes with multiple transmit antenna elements can improve secure connectivity by forming a directional antenna or using eigen-beamforming. Compared with single antenna transmission, a large connectivity improvement can be achieved by both multi-antenna transmission techniques even with a small number of antennas.

Journal ArticleDOI
TL;DR: An optimum power allocation scheme is proposed, which simultaneously minimizes the outage probability and maximizes the total mutual information of the ANC protocol, and a finite-SNR diversity-multiplexing tradeoff is obtained.
Abstract: We study the analog network coding (ANC), which is a well-known amplify-and-forward (AF)-based bidirectional protocol, for a bidirectional network consisting of two different sources and a relay. In this protocol, the two sources exchange information with the help of the relay during two time slots in a half-duplex mode. For this system, we first derive a tight lower bound of outage probability, which is very close to the exact outage probability in the whole signal-to-noise ratio (SNR) range irrespective of the values of channel variances. Using the tight lower bound, we obtain finite-SNR diversity-multiplexing tradeoff of the ANC protocol. Furthermore, we propose an optimum power allocation scheme, which simultaneously minimizes the outage probability and maximizes the total mutual information of the ANC protocol.