scispace - formally typeset
Search or ask a question

Showing papers on "Communication channel published in 2010"


Journal ArticleDOI
Thomas L. Marzetta1
TL;DR: A cellular base station serves a multiplicity of single-antenna terminals over the same time-frequency interval and a complete multi-cellular analysis yields a number of mathematically exact conclusions and points to a desirable direction towards which cellular wireless could evolve.
Abstract: A cellular base station serves a multiplicity of single-antenna terminals over the same time-frequency interval. Time-division duplex operation combined with reverse-link pilots enables the base station to estimate the reciprocal forward- and reverse-link channels. The conjugate-transpose of the channel estimates are used as a linear precoder and combiner respectively on the forward and reverse links. Propagation, unknown to both terminals and base station, comprises fast fading, log-normal shadow fading, and geometric attenuation. In the limit of an infinite number of antennas a complete multi-cellular analysis, which accounts for inter-cellular interference and the overhead and errors associated with channel-state information, yields a number of mathematically exact conclusions and points to a desirable direction towards which cellular wireless could evolve. In particular the effects of uncorrelated noise and fast fading vanish, throughput and the number of terminals are independent of the size of the cells, spectral efficiency is independent of bandwidth, and the required transmitted energy per bit vanishes. The only remaining impairment is inter-cellular interference caused by re-use of the pilot sequences in other cells (pilot contamination) which does not vanish with unlimited number of antennas.

6,248 citations


Proceedings ArticleDOI
Jung-Il Choi1, Mayank Jain1, Kannan Srinivasan1, Phil Levis1, Sachin Katti1 
20 Sep 2010
TL;DR: In this paper, a single channel full-duplex wireless transceiver is proposed, which uses a combination of RF and baseband techniques to achieve FD with minimal effect on link reliability.
Abstract: This paper discusses the design of a single channel full-duplex wireless transceiver. The design uses a combination of RF and baseband techniques to achieve full-duplexing with minimal effect on link reliability. Experiments on real nodes show the full-duplex prototype achieves median performance that is within 8% of an ideal full-duplexing system. This paper presents Antenna Cancellation, a novel technique for self-interference cancellation. In conjunction with existing RF interference cancellation and digital baseband interference cancellation, antenna cancellation achieves the amount of self-interference cancellation required for full-duplex operation. The paper also discusses potential MAC and network gains with full-duplexing. It suggests ways in which a full-duplex system can solve some important problems with existing wireless systems including hidden terminals, loss of throughput due to congestion, and large end-to-end delays.

1,623 citations


Journal ArticleDOI
TL;DR: The role of multiple antennas for secure communication is investigated within the framework of Wyner's wiretap channel, and a masked beamforming scheme that radiates power isotropically in all directions attains near-optimal performance in the high SNR regime.
Abstract: The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices are fixed and known to all the terminals. A computable characterization of the secrecy capacity is established as the saddle point solution to a minimax problem. The converse is based on a Sato-type argument used in other broadcast settings, and the coding theorem is based on Gaussian wiretap codebooks. At high signal-to-noise ratio (SNR), the secrecy capacity is shown to be attained by simultaneously diagonalizing the channel matrices via the generalized singular value decomposition, and independently coding across the resulting parallel channels. The associated capacity is expressed in terms of the corresponding generalized singular values. It is shown that a semi-blind "masked" multi-input multi-output (MIMO) transmission strategy that sends information along directions in which there is gain to the intended receiver, and synthetic noise along directions in which there is not, can be arbitrarily far from capacity in this regime. Necessary and sufficient conditions for the secrecy capacity to be zero are provided, which simplify in the limit of many antennas when the entries of the channel matrices are independent and identically distributed. The resulting scaling laws establish that to prevent secure communication, the eavesdropper needs three times as many antennas as the sender and intended receiver have jointly, and that the optimum division of antennas between sender and intended receiver is in the ratio of 2:1.

1,529 citations


Journal ArticleDOI
TL;DR: Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint.
Abstract: Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel conditions: absent feedback, they are typically feasible only when the source-destination channel is better than the source-eavesdropper channel. Node cooperation is a means to overcome this challenge and improve the performance of secure wireless communications. This paper addresses secure communications of one source-destination pair with the help of multiple cooperating relays in the presence of one or more eavesdroppers. Three cooperative schemes are considered: decode-and-forward (DF), amplify-and-forward (AF), and cooperative jamming (CJ). For these schemes, the relays transmit a weighted version of a reencoded noise-free message signal (for DF), a received noisy source signal (for AF), or a common jamming signal (for CJ). Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or, minimize the transmit power subject to a secrecy rate constraint. For DF in the presence of one eavesdropper, closed-form optimal solutions are derived for the relay weights. For other problems, since the optimal relay weights are difficult to obtain, several criteria are considered leading to suboptimal but simple solutions, i.e., the complete nulling of the message signals at all eavesdroppers (for DF and AF), or the complete nulling of jamming signal at the destination (for CJ). Based on the designed relay weights, for DF in the presence of multiple eavesdroppers, and for CJ in the presence of one eavesdropper, the optimal power allocation is obtained in closed-form; in all other cases the optimal power allocation is obtained via iterative algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results show that the proposed design can significantly improve the performance of secure wireless communications.

1,385 citations


Proceedings ArticleDOI
13 Jun 2010
TL;DR: The problem considered here is that of wireless information and power transfer across a noisy coupled-inductor circuit, which is a frequency-selective channel with additive white Gaussian noise, and the optimal tradeoff is characterized given the total power available.
Abstract: The problem considered here is that of wireless information and power transfer across a noisy coupled-inductor circuit, which is a frequency-selective channel with additive white Gaussian noise. The optimal tradeoff between the achievable rate and the power transferred is characterized given the total power available. The practical utility of such systems is also discussed.

1,137 citations


Journal ArticleDOI
26 Apr 2010
TL;DR: In this article, the authors formalize the notion of multipath sparsity and present a new approach to estimate sparse (or effectively sparse) multipath channels that is based on some of the recent advances in the theory of compressed sensing.
Abstract: High-rate data communication over a multipath wireless channel often requires that the channel response be known at the receiver. Training-based methods, which probe the channel in time, frequency, and space with known signals and reconstruct the channel response from the output signals, are most commonly used to accomplish this task. Traditional training-based channel estimation methods, typically comprising linear reconstruction techniques, are known to be optimal for rich multipath channels. However, physical arguments and growing experimental evidence suggest that many wireless channels encountered in practice tend to exhibit a sparse multipath structure that gets pronounced as the signal space dimension gets large (e.g., due to large bandwidth or large number of antennas). In this paper, we formalize the notion of multipath sparsity and present a new approach to estimating sparse (or effectively sparse) multipath channels that is based on some of the recent advances in the theory of compressed sensing. In particular, it is shown in the paper that the proposed approach, which is termed as compressed channel sensing (CCS), can potentially achieve a target reconstruction error using far less energy and, in many instances, latency and bandwidth than that dictated by the traditional least-squares-based training methods.

1,066 citations


Proceedings ArticleDOI
30 Aug 2010
TL;DR: It is shown that, for the first time, wireless packet delivery can be accurately predicted for commodity 802.11 NICs from only the channel measurements that they provide, and the rate prediction is as good as the best rate adaptation algorithms for 802.
Abstract: RSSI is known to be a fickle indicator of whether a wireless link will work, for many reasons. This greatly complicates operation because it requires testing and adaptation to find the best rate, transmit power or other parameter that is tuned to boost performance. We show that, for the first time, wireless packet delivery can be accurately predicted for commodity 802.11 NICs from only the channel measurements that they provide. Our model uses 802.11n Channel State Information measurements as input to an OFDM receiver model we develop by using the concept of effective SNR. It is simple, easy to deploy, broadly useful, and accurate. It makes packet delivery predictions for 802.11a/g SISO rates and 802.11n MIMO rates, plus choices of transmit power and antennas. We report testbed experiments that show narrow transition regions (

697 citations


Journal ArticleDOI
TL;DR: Spectrum sensing techniques from the optimal likelihood ratio test to energy detection, matched filtering detection, cyclostationary detection, eigenvalue-based sensing, joint space-time sensing, and robust sensing methods are reviewed.
Abstract: Cognitive radio is widely expected to be the next Big Bang in wireless communications. Spectrum sensing, that is, detecting the presence of the primary users in a licensed spectrum, is a fundamental problem for cognitive radio. As a result, spectrum sensing has reborn as a very active research area in recent years despite its long history. In this paper, spectrum sensing techniques from the optimal likelihood ratio test to energy detection, matched filtering detection, cyclostationary detection, eigenvalue-based sensing, joint space-time sensing, and robust sensing methods are reviewed. Cooperative spectrum sensing with multiple receivers is also discussed. Special attention is paid to sensing methods that need little prior information on the source signal and the propagation channel. Practical challenges such as noise power uncertainty are discussed and possible solutions are provided. Theoretical analysis on the test statistic distribution and threshold setting is also investigated.

690 citations


Journal ArticleDOI
TL;DR: It is shown that very significant downlink throughput is achievable with simple and efficient channel state feedback, provided that the feedback link is properly designed.
Abstract: In this paper, we consider a multiple-input-multiple-output (MIMO) fading broadcast channel and compute achievable ergodic rates when channel state information (CSI) is acquired at the receivers via downlink training and it is provided to the transmitter by channel state feedback. Unquantized (analog) and quantized (digital) channel state feedback schemes are analyzed and compared under various assumptions. Digital feedback is shown to be potentially superior when the feedback channel uses per channel state coefficient is larger than 1. Also, we show that by proper design of the digital feedback link, errors in the feedback have a minor effect even if simple uncoded modulation is used on the feedback channel. We discuss first the case of an unfaded additive white Gaussian noise (AWGN) feedback channel with orthogonal access and then the case of fading MIMO multiple access (MIMO-MAC). We show that by exploiting the MIMO-MAC nature of the uplink channel, a much better scaling of the feedback channel resource with the number of base station (BS) antennas can be achieved. Finally, for the case of delayed feedback, we show that in the realistic case where the fading process has (normalized) maximum Doppler frequency shift 0 ? F < 1/2, a fraction 1 - 2F of the optimal multiplexing gain is achievable. The general conclusion of this work is that very significant downlink throughput is achievable with simple and efficient channel state feedback, provided that the feedback link is properly designed.

684 citations


Journal ArticleDOI
TL;DR: This paper considers the special case of flat-fading channels to develop an upper bound on energy efficiency and to characterize its variation with bandwidth, channel gain and circuit power, and demonstrates the fundamental tradeoff between energy-efficient and spectrum-efficient transmission.
Abstract: Energy efficiency is becoming increasingly important for small form factor mobile devices, as battery technology has not kept up with the growing requirements stemming from ubiquitous multimedia applications. This paper addresses link adaptive transmission for maximizing energy efficiency, as measured by the "throughput per Joule" metric. In contrast to the existing water-filling power allocation schemes that maximize throughput subject to a fixed overall transmit power constraint, our scheme maximizes energy efficiency by adapting both overall transmit power and its allocation, according to the channel states and the circuit power consumed. We demonstrate the existence of a unique globally optimal link adaptation solution and develop iterative algorithms to obtain it. We further consider the special case of flat-fading channels to develop an upper bound on energy efficiency and to characterize its variation with bandwidth, channel gain and circuit power. Our results for OFDM systems demonstrate improved energy savings with energy optimal link adaptation as well as illustrate the fundamental tradeoff between energy-efficient and spectrum-efficient transmission.

651 citations


Journal ArticleDOI
TL;DR: It is pointed out that a popular assumption - that multipath channels are sparse in their equivalent baseband representation - has pitfalls and there are over-complete dictionaries that lead to much sparser channel representations and better estimation performance.
Abstract: Compressive sensing is a topic that has recently gained much attention in the applied mathematics and signal processing communities. It has been applied in various areas, such as imaging, radar, speech recognition, and data acquisition. In communications, compressive sensing is largely accepted for sparse channel estimation and its variants. In this article we highlight the fundamental concepts of compressive sensing and give an overview of its application to pilot aided channel estimation. We point out that a popular assumption - that multipath channels are sparse in their equivalent baseband representation - has pitfalls. There are over-complete dictionaries that lead to much sparser channel representations and better estimation performance. As a concrete example, we detail the application of compressive sensing to multicarrier underwater acoustic communications, where the channel features sparse arrivals, each characterized by its distinct delay and Doppler scale factor. To work with practical systems, several modifications need to be made to the compressive sensing framework as the channel estimation error varies with how detailed the channel is modeled, and how data and pilot symbols are mixed in the signal design.

Journal ArticleDOI
TL;DR: A new physical end-to-end (including the channel) model for molecular communication is introduced, which is related to a specific process involving particle exchanges, namely, particle emission, particle diffusion and particle reception.
Abstract: Molecular communication is a promising paradigm for nanoscale networks. The end-to-end (including the channel) models developed for classical wireless communication networks need to undergo a profound revision so that they can be applied for nanonetworks. Consequently, there is a need to develop new end-to-end (including the channel) models which can give new insights into the design of these nanoscale networks. The objective of this paper is to introduce a new physical end-to-end (including the channel) model for molecular communication. The new model is investigated by means of three modules, i.e., the transmitter, the signal propagation and the receiver. Each module is related to a specific process involving particle exchanges, namely, particle emission, particle diffusion and particle reception. The particle emission process involves the increase or decrease of the particle concentration rate in the environment according to a modulating input signal. The particle diffusion provides the propagation of particles from the transmitter to the receiver by means of the physics laws underlying particle diffusion in the space. The particle reception process is identified by the sensing of the particle concentration value at the receiver location. Numerical results are provided for three modules, as well as for the overall end-to-end model, in terms of normalized gain and delay as functions of the input frequency and of the transmission range.

Journal ArticleDOI
TL;DR: New paradigms for design and operation of heterogeneous cellular networks, focusing on cell splitting, range expansion, semi-static resource negotiation on third-party backhaul connections, and fast dynamic interference management for QoS via over-the-air signaling are described.
Abstract: Embedding pico/femto base-stations and relay nodes in a macro-cellular network is a promising method for achieving substantial gains in coverage and capacity compared to macro-only networks. These new types of base-stations can operate on the same wireless channel as the macro-cellular network, providing higher spatial reuse via cell splitting. However, these base-stations are deployed in an unplanned manner, can have very different transmit powers, and may not have traffic aggregation among many users. This could potentially result in much higher interference magnitude and variability. Hence, such deployments require the use of innovative cell association and inter-cell interference coordination techniques in order to realize the promised capacity and coverage gains. In this paper, we describe new paradigms for design and operation of such heterogeneous cellular networks. Specifically, we focus on cell splitting, range expansion, semi-static resource negotiation on third-party backhaul connections, and fast dynamic interference management for QoS via over-the-air signaling. Notably, our methodologies and algorithms are simple, lightweight, and incur extremely low overhead. Numerical studies show that they provide large gains over currently used methods for cellular networks.

Journal ArticleDOI
TL;DR: Based on the channel analysis, the MI waveguide technique for communication is developed in order to reduce the high path loss of the traditional EM wave system and the ordinary MI system and reveals that the transmission range of the MIWaveguide system is dramatically increased.
Abstract: The main difference between the wireless underground sensor networks (WUSNs) and the terrestrial wireless sensor networks is the signal propagation medium. The underground is a challenging environment for wireless communications since the propagation medium is no longer air but soil, rock and water. The well established wireless signal propagation techniques using electromagnetic (EM) waves do not work well in this environment due to three problems: high path loss, dynamic channel condition and large antenna size. New techniques using magnetic induction (MI) create constant channel condition and can accomplish the communication with small size coils. In this paper, detailed analysis on the path loss and the bandwidth of the MI system in underground soil medium is provided. Based on the channel analysis, the MI waveguide technique for communication is developed in order to reduce the high path loss of the traditional EM wave system and the ordinary MI system. The performance of the EM wave system, the ordinary MI system and our improved MI waveguide system are quantitatively compared. The results reveal that the transmission range of the MI waveguide system is dramatically increased.

Posted Content
TL;DR: This paper shows that in an MIMO broadcast channel with transmit antennas and receivers each with 1 receive antenna, K/1/2+···+1/K (>;1) degrees of freedom is achievable even when the fed back channel state is completely independent of the current channel state.
Abstract: Transmitter channel state information (CSIT) is crucial for the multiplexing gains offered by advanced interference management techniques such as multiuser MIMO and interference alignment. Such CSIT is usually obtained by feedback from the receivers, but the feedback is subject to delays. The usual approach is to use the fed back information to predict the current channel state and then apply a scheme designed assuming perfect CSIT. When the feedback delay is large compared to the channel coherence time, such a prediction approach completely fails to achieve any multiplexing gain. In this paper, we show that even in this case, the completely stale CSI is still very useful. More concretely, we show that in a MIMO broadcast channel with $K$ transmit antennas and $K$ receivers each with 1 receive antenna, $\frac{K}{1+1/2+ ...+ \frac{1}{K}} (> 1) $ degrees of freedom is achievable even when the fed back channel state is completely independent of the current channel state. Moreover, we establish that if all receivers have independent and identically distributed channels, then this is the optimal number of degrees of freedom achievable. In the optimal scheme, the transmitter uses the fed back CSI to learn the side information that the receivers receive from previous transmissions rather than to predict the current channel state. Our result can be viewed as the first example of feedback providing a degree-of-freedom gain in memoryless channels.

Journal ArticleDOI
TL;DR: In this article, the influence of channel structures and channel coordination on the supplier, the retailer, and the entire supply chain in the context of two single-channel and two dual-channel supply chains was investigated.

Posted Content
TL;DR: In this paper, the influence of channel structures and channel coordination on the supplier, the retailer, and the entire supply chain in the context of two single-channel and two dual-channel supply chains was investigated.
Abstract: This paper investigates the influence of channel structures and channel coordination on the supplier, the retailer, and the entire supply chain in the context of two single-channel and two dual-channel supply chains. We extensively study two Pareto zone concepts: channel-adding Pareto zone and contract-implementing Pareto zone. In the channel-adding Pareto zone, both the supplier and the retailer benefit from adding a new channel to the traditional single-channel supply chain. In the contract-implementing Pareto zone, it is mutually beneficial for the supplier and the retailer to utilize the proposed contract coordination policy. The analysis suggests the preference lists of the supplier and the retailer over channel structures with and without coordination are different, and depend on parameters like channel base demand, channel operational costs, and channel substitutability.

Journal ArticleDOI
TL;DR: A comprehensive review of the physical layer security in multiuser wireless networks can be found in this article, where the authors provide an overview of the foundations dating back to Shannon and Wyner on information-theoretic security.
Abstract: This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.

Patent
01 Oct 2010
TL;DR: In this paper, the uplink control information and other feedback for several downlink component carriers using one or more uplink component carriers is described. But, the user equipment device may be configured to transmit such data using a physical uplink controller channel rather than a physically uplink shared channel.
Abstract: Methods and systems for transmitting uplink control information and feedback are disclosed for carrier aggregation systems. A user equipment device may be configured to transmit uplink control information and other feedback for several downlink component carriers using one or more uplink component carriers. The user equipment device may be configured to transmit such data using a physical uplink control channel rather than a physical uplink shared channel. The user equipment device may be configured to determine the uplink control information and feedback data that is to be transmitted, the physical uplink control channel resources to be used to transmit the uplink control information and feedback data, and how the uplink control information and feedback data may be transmitted over the physical uplink control channel.

Journal ArticleDOI
TL;DR: In this paper, the authors demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities and demonstrate that reliable secret key establishment can be accomplished at rates on the order of 10 b/s.
Abstract: The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time, and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on level crossings of the fading process, which is well-suited for the Rayleigh and Rician fading models associated with a richly scattering environment. Our level crossing algorithm is simple, and incorporates a self-authenticating mechanism to prevent adversarial manipulation of message exchanges during the protocol. Since the level crossing algorithm is best suited for fading processes that exhibit symmetry in their underlying distribution, we present a second and more powerful approach that is suited for more general channel state distributions. This second approach is motivated by observations from quantizing jointly Gaussian processes, but exploits empirical measurements to set quantization boundaries and a heuristic log likelihood ratio estimate to achieve an improved secret key generation rate. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical WiFi channel that reliable secret key establishment can be accomplished at rates on the order of 10 b/s.

Journal ArticleDOI
TL;DR: This paper surveys and unifies a number of recent contributions that have collectively developed a metric for decentralized wireless network analysis known as transmission capacity and applies it to show how TC can be used to better understand scheduling, power control, and the deployment of multiple antennas in a decentralized network.
Abstract: This paper surveys and unifies a number of recent contributions that have collectively developed a metric for decentralized wireless network analysis known as transmission capacity. Although it is notoriously difficult to derive general end-to-end capacity results for multi-terminal or adhoc networks, the transmission capacity (TC) framework allows for quantification of achievable single-hop rates by focusing on a simplified physical/MAC-layer model. By using stochastic geometry to quantify the multi-user interference in the network, the relationship between the optimal spatial density and success probability of transmissions in the network can be determined, and expressed-often fairly simply-in terms of the key network parameters. The basic model and analytical tools are first discussed and applied to a simple network with path loss only and we present tight upper and lower bounds on transmission capacity (via lower and upper bounds on outage probability). We then introduce random channels (fading/shadowing) and give TC and outage approximations for an arbitrary channel distribution, as well as exact results for the special cases of Rayleigh and Nakagami fading. We then apply these results to show how TC can be used to better understand scheduling, power control, and the deployment of multiple antennas in a decentralized network. The paper closes by discussing shortcomings in the model as well as future research directions.

Journal ArticleDOI
TL;DR: An achievable scheme composed of nested lattice codes for the uplink and structured binning for the downlink based on a three-stage lattice partition chain, which is a key ingredient for producing the best gap-to-capacity results to date.
Abstract: In this paper, a Gaussian two-way relay channel, where two source nodes exchange messages with each other through a relay, is considered. We assume that all nodes operate in full-duplex mode and there is no direct channel between the source nodes. We propose an achievable scheme composed of nested lattice codes for the uplink and structured binning for the downlink. Unlike conventional nested lattice codes, our codes utilize two different shaping lattices for source nodes based on a three-stage lattice partition chain, which is a key ingredient for producing the best gap-to-capacity results to date. Specifically, for all channel parameters, the achievable rate region of our scheme is within 1/2 bit from the capacity region for each user and its sum rate is within log3/2 bit from the sum capacity.

Journal ArticleDOI
TL;DR: This paper considers the design of the analog and digital beamforming coefficients, for the case of narrowband signals, and proposes the optimal analog beamformer to minimize the mean squared error between the desired user and its receiver estimate.
Abstract: In multiple-input multiple-output (MIMO) systems, the use of many radio frequency (RF) and analog-to-digital converter (ADC) chains at the receiver is costly. Analog beamformers operating in the RF domain can reduce the number of antenna signals to a feasible number of baseband channels. Subsequently, digital beamforming is used to capture the desired user signal. In this paper, we consider the design of the analog and digital beamforming coefficients, for the case of narrowband signals. We aim to cancel interfering signals in the analog domain, thus minimizing the required ADC resolution. For a given resolution, we will propose the optimal analog beamformer to minimize the mean squared error between the desired user and its receiver estimate. Practical analog beamformers employ only a quantized number of phase shifts. For this case, we propose a design technique to successively approximate the desired overall beamformer by a linear combination of implementable analog beamformers. Finally, an online channel estimation technique is introduced to estimate the required statistics of the wireless channel on which the optimal beamformers are based.

Journal ArticleDOI
TL;DR: This paper introduces high-rate uncorrelated bit extraction (HRUBE), a framework for interpolating, transforming for decorrelation, and encoding channel measurements using a multibit adaptive quantization scheme which allows multiple bits per component.
Abstract: Secret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropper at a third location. This paper addresses bit extraction, i.e., the extraction of secret key bits from noisy radio channel measurements at two nodes such that the two secret keys reliably agree. Problems include 1) nonsimultaneous directional measurements, 2) correlated bit streams, and 3) low bit rate of secret key generation. This paper introduces high-rate uncorrelated bit extraction (HRUBE), a framework for interpolating, transforming for decorrelation, and encoding channel measurements using a multibit adaptive quantization scheme which allows multiple bits per component. We present an analysis of the probability of bit disagreement in generated secret keys, and we use experimental data to demonstrate the HRUBE scheme and to quantify its experimental performance. As two examples, the implemented HRUBE system can achieve 22 bits per second at a bit disagreement rate of 2.2 percent, or 10 bits per second at a bit disagreement rate of 0.54 percent.

Journal ArticleDOI
TL;DR: It is shown, by means of the achievable secrecy rate based on compress-and-forward, that by asking the untrusted relay node to relay information, one can achieve a higher secrecy rate than just treating the relay as an eavesdropper.
Abstract: We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario, an interesting question is whether the relay node should be deployed at all. That is, whether cooperation with an untrusted relay node can ever be beneficial. We first provide an achievable secrecy rate for the general untrusted relay channel, and proceed to investigate this question for two types of relay networks with orthogonal components. For the first model, there is an orthogonal link from the source to the relay. For the second model, there is an orthogonal link from the relay to the destination. For the first model, we find the equivocation capacity region and show that answer is negative. In contrast, for the second model, we find that the answer is positive. Specifically, we show, by means of the achievable secrecy rate based on compress-and-forward, that by asking the untrusted relay node to relay information, we can achieve a higher secrecy rate than just treating the relay as an eavesdropper. For a special class of the second model, where the relay is not interfering itself, we derive an upper bound for the secrecy rate using an argument whose net effect is to separate the eavesdropper from the relay. The merit of the new upper bound is demonstrated on two channels that belong to this special class. The Gaussian case of the second model mentioned above benefits from this approach in that the new upper bound improves the previously known bounds. For the Cover-Kim deterministic relay channel, the new upper bound finds the secrecy capacity when the source-destination link is not worse than the source-relay link, by matching with achievable rate we present.

Journal ArticleDOI
TL;DR: The generalized diversity gain is derived and it is shown that, with a guaranteed primary outage probability, the full diversity order is achieved using the proposed adaptive cooperation scheme.
Abstract: In this correspondence, an adaptive cooperation diversity scheme with best-relay selection is proposed for multiple-relay cognitive radio networks to improve the performance of secondary transmissions while ensuring the quality of service (QoS) of primary transmissions. Exact closed-form expressions of the outage probability of secondary transmissions, referred to as secondary outage probability, are derived under the constraint of satisfying a required outage probability of primary transmissions (primary outage probability) for both the traditional non-cooperation and the proposed adaptive cooperation schemes over Rayleigh fading channels. Numerical and simulation results show that, with a guaranteed primary outage probability, a floor of the secondary outage probability occurs in high signal-to-noise ratio (SNR) regions. Moreover, the outage probability floor of the adaptive cooperation scheme is lower than that of the non-cooperation scenario, which illustrates the advantage of the proposed scheme. In addition, we generalize the traditional definition of the diversity gain, which can not be applied directly in cognitive radio networks since mutual interference between the primary and secondary users should be considered. We derive the generalized diversity gain and show that, with a guaranteed primary outage probability, the full diversity order is achieved using the proposed adaptive cooperation scheme.

Patent
13 Sep 2010
TL;DR: This paper analyzed the internal relationships of the performance parameters of ADCs, showing their frequency dependency and structure dependency, and shown that performance and power dissipation depend greatly on the ADC structure and the target applications.
Abstract: In one embodiment, an analog to digital converter (ADC) for converting an analog signal to a digital signal includes an input channel for receiving the analog signal, and includes a first and second sampling-integrating units. The first sampling-integrating unit receives the analog signal, samples the analog signal, integrates a superposition of a first feedback signal and a sampled signal of the analog signal, and generates a first output signal. The second sampling-integrating unit receives the first output signal, samples the first output signal, integrates a superposition of a second feedback signal and a sampled signal of the first output signal, and generates a second output signal. The ADC includes a feedback circuit for generating the digital signal according to the second output signal and for providing the first and second feedback signals indicative of the digital signal to the first and second sampling-integrating units respectively.

Journal ArticleDOI
TL;DR: Simulation results confirm that if packet generation rate and associated transmission power for safety messages are adjusted in an on-demand and adaptive fashion, robust tracking is possible under various traffic conditions.
Abstract: Vehicular ad hoc networks play a critical role in enabling important active safety applications such as cooperative collision warning. These active safety applications rely on continuous broadcast of self-information by all vehicles, which allows each vehicle to track all its neighboring cars in real time. The most pressing challenge in such safety-driven communication is to maintain acceptable tracking accuracy while avoiding congestion in the shared channel. In this article we propose a transmission control protocol that adapts communication rate and power based on the dynamics of a vehicular network and safety-driven tracking process. The proposed solution uses a closed-loop control concept and accounts for wireless channel unreliability. Simulation results confirm that if packet generation rate and associated transmission power for safety messages are adjusted in an on-demand and adaptive fashion, robust tracking is possible under various traffic conditions.

Journal ArticleDOI
TL;DR: In this article, a series of laboratory experiments demonstrates that riparian vegetation can cause a braided channel to self-organize to, and maintain, a dynamic, single-thread channel.
Abstract: A series of laboratory experiments demonstrates that riparian vegetation can cause a braided channel to self-organize to, and maintain, a dynamic, single-thread channel. The initial condition for the experiments was steady-state braiding in non-cohesive sand under uniform discharge. From here, an experiment consisted of repeated cycles alternating a short duration high flow with a long duration low flow, and uniform dispersal of alfalfa seeds over the bed at the end of each high flow. Plants established on freshly deposited bars and areas of braidplain that were unoccupied during low flow. The presence of the plants had the effect of progressively focusing the high flow so that a single dominant channel developed. The single-thread channel self-adjusted to carry the high flow. Vegetation also slowed the rate of bank erosion. Matching of deposition along the point bar with erosion along the outer bend enabled the channel to develop sinuosity and migrate laterally while suppressing channel splitting and the creation of new channel width. The experimental channels spontaneously reproduced many of the mechanisms by which natural meandering channels migrate and maintain a single dominant channel, in particular bend growth and channel cutoff. In contrast with the braided system, where channel switching is a nearly continuous process, vegetation maintained a coherent channel until wholesale diversion of flow via cutoff and/or avulsion occurred, by which point the previous channel tended to be highly unfavorable for flow. Thus vegetation discouraged the coexistence of multiple channels. Varying discharge was key to allowing expression of feedbacks between the plants and the flow and promoting the transition from braiding to a single-thread channel that was then dynamically maintained. Copyright © 2010 John Wiley & Sons, Ltd.

Journal ArticleDOI
TL;DR: It is shown that each Pareto-boundary rate-tuple of the MISO-IC can be achieved in a decentralized manner when each of the BSs attains its own channel capacity subject to a certain set of interference-power constraints at the other MS receivers.
Abstract: In this correspondence, we study the downlink transmission in a multi-cell system, where multiple base stations (BSs) each with multiple antennas cooperatively design their respective transmit beamforming vectors to optimize the overall system performance. For simplicity, it is assumed that all mobile stations (MSs) are equipped with a single antenna each, and there is one active MS in each cell at one time. Accordingly, the system of interests can be modeled by a multiple-input single-output (MISO) Gaussian interference channel (IC), termed as MISO-IC, with interference treated as noise. We propose a new method to characterize different rate-tuples for active MSs on the Pareto boundary of the achievable rate region for the MISO-IC, by exploring the relationship between the MISO-IC and the cognitive radio (CR) MISO channel. We show that each Pareto-boundary rate-tuple of the MISO-IC can be achieved in a decentralized manner when each of the BSs attains its own channel capacity subject to a certain set of interference-power constraints (also known as interference-temperature constraints in the CR system) at the other MS receivers. Furthermore, we show that this result leads to a new decentralized algorithm for implementing the multi-cell cooperative downlink beamforming.