Securing mmwave Vehicular Communication Links with Multiple Transmit Antennas

Size: px
Start display at page:

Download "Securing mmwave Vehicular Communication Links with Multiple Transmit Antennas"

Transcription

1 Securing mmwave Vehicular Communication Links with Multiple Transmit Antennas Mohammed E. Eltayeb Department of Electrical and Electronic Engineering California State University, Sacramento Sacramento, USA Robert W. Heath, Jr. Department of Electrical and Computer Engineering The University of Texas at Austin Austin, USA Abstract This paper presents a low-complexity physical layer security technique for millimeter wave mmwave vehicular communication systems. The proposed technique exploits the large dimensional antenna arrays available in mmwave systems and the road reflected path to generate location dependent transmission. This results in coherent transmission to the legitimate receiver and interference that jams eavesdroppers with sensitive receivers along the same lane of travel. Theoretical and simulation results demonstrate the validity and effectiveness of the proposed technique and show that high secrecy throughput can be achieved when compared to conventional array transmission techniques. Index Terms Antenna arrays, Radio frequency, Array signal processing, Millimeter wave, Transmitters. I. INTRODUCTION Vehicular communication in the millimeter wave mmwave band has been recently proposed to realize multi-gbps data rates and support future intelligent transportation systems ITS applications []-[4]. This paradigm shift from classical lower frequency to higher frequency mmwave technologies introduces new security challenges that cannot be fully handled via traditional cryptographic means. For instance, in lower frequency systems, public cryptographic keys can be simply broadcasted over the wireless channel, however, in mmwave systems, the directionality of the mmwave channel dictates dedicated public key transmission to all network nodes. This imposes a great deal of overhead on the system. Moreover, these cryptographic techniques generally require an infrastructure for key management which might not be readily available for mmwave systems [5]. With the emergence of new time-sensitive ITS applications and the increasing size of the decentralized vehicular network, the implementation of traditional cryptographic techniques becomes complex and challenging. Motivated by these challenges, recent research investigated the use of keyless physical layer PHY security techniques to secure mmwave communication links [6]- []. These techniques rely on multi-antenna transmission to create interference or artificial noise within the null space of the legitimate receiver. Such interference will degrade the channel of potential eavesdroppers. Despite their effectiveness, the techniques proposed in [6]- [] require the eavesdropper to be physically located on non-receiver transmission directions and will fail if a malicious eavesdropper receives a reflected path from the target receiver. Moreover, the techniques proposed in [6] and [7] are based on digital beamforming, and therefore, are not suitable for mmwave systems. In vehicular environments, the legitimate receiver and the eavesdropper can have the same angle of departure AoD if the eavesdropper is located along the receiver s lane of travel. Additionally, an eavesdropper within the vicinity of the target receiver can intercept the communication link via a path reflected from the target receiver. Therefore, techniques that generate location based i.e. direction and distance encryption are of great interest to counter such scenarios and secure mmwave links. In this paper, we propose a location-based PHY security technique for vehicular networks. We exploit the large dimensional antenna arrays available in mmwave systems and the road reflected path to generate location based transmission. We consider the special case where a transmitter is communicating with a receiver in the presence of an eavesdropper along the same lane of travel as shown in Fig., i.e., both the receiver and the eavesdropper receive the direct path. To enhance the secrecy of the communication link, a few antennas are cophased along the direct path, while the remaining antennas are co-phased along the target receiver s road reflected path. These antennas are randomly selected with every symbol transmission. This random antenna selection generates random grating lobes in both the direct and the reflected paths, and results in noise-like signals in both paths. As we will show, by aligning the two paths to the target receiver, these noiselike signals converge to a constant at the target receiver and become a random variable at other locations. This randomizes the beam pattern at non-receiver locations and enhances the secrecy of the communication link. II. SYSTEM MODEL We consider a mmwave vehicular system with a transmitter and a receiver in the presence of a single or multiple eavesdroppers on the direction of transmission as shown in Fig.. We adopt a uniform linear array ULA with N T antennas along the y-axis with the array centered at the origin; nonetheless, the proposed technique can be adapted to other antenna structures. This can be done by, for example, varying the complex antenna weights to form coherent combining at

2 The conjugate operator on the reflected path is required to cancel the interference that results from the random antenna switching at the receiver. From and, the received signal at the target receiver after channel equalization becomes Fig.. An example of a transmitter communicating with a receiver in the presence of an eavesdropper. The transmitter generates interference artificial noise in non-receiver regions. the target receiver as described in the Section III. To transmit a data symbol sk = c k e jφ k, where k is the symbol index, c k and Φ k are the symbol s amplitude and phase, and E[ s ] =, sk is multiplied by a unit norm transmit beamforming vector fk = [f k f k... f NT k] C NT. The mmwave channel between the transmitter and the receiver is assumed to be a narrow band line-of-sight LoS with perfect synchronization. Due to the dominant reflected path from the road surface, a two-ray model is usually adopted in the literature to model LOS vehicular communication []-[]. Based on this model, the mmwave channel can be modeled using array manifold concepts as []-[4] h θ D, θ R = αd a θ D + αr a θ R, where θ D, θ R are the AoDs along the direct and reflected paths, α D and α R represent the mmwave channel gains including the path-loss along both the direct and the reflected paths. The nth entry of the array manifold vector aθ C NT is [aθ] n = sin θ, and λ is the wavelength. All receivers, including eavesdroppers, are assumed to have perfect channel knowledge and access to both their direct and reflected paths. e jn N T πd λ III. SECURE MILLIMETER WAVE TRANSMISSION In this section, we introduce a PHY security technique that jams potential eavesdroppers located along the direction of travel. Any of the techniques proposed in [8]- [] can be used to jam eavesdroppers on other directions. The proposed technique exploits both the direct and the road reflected path to design a beam pattern that coherently combines only at the target receiver, thereby creating location-based direction and distance transmission. To achieve this, a random subset of M antennas are selected to transmit the kth information symbol along the direct path while the reaming N T M antennas used to transmit the kth formation symbol along the reflected path. Based on this, the nth antenna phase shift when transmitting the kth symbol becomes { NT υ n k = n πd λ sinθ D, n I D k NT n πd λ sinθ R Φ k, n I R k where the size of the random subsets I D = M and I R = N T M, and Φ k is the kth transmit symbol phase. Based on the nth entry of the beamforming vector fk becomes f n k = NT e jυnk. To receive the information symbols, the target receiver combines the signal received on its direct path with the conjugate of signal received on its reflected path. yk, θ D, θ R = a θ D a θ R fksk + fksk + zk, where zk is the effective noise after channel equalization and normalization by the receive antenna gain. Expanding yk, θ D, θ R, the received signal at the target receiver becomes yk, θ D, θ R = m I Dk n I Rk N T sk e j N T m πd λ sinθd e j N T m πd λ sinθd + e j N T n πd λ sinθd e j N T n πd λ sinθr Φ k + N T s k m I Dk n I Rk e j N T m πd λ sinθr e j N T m πd λ sinθd + e j N T n πd λ sinθr e j N T n πd λ k sinθr Φ + z. Grouping similar elements we obtain yk, θ D, θ R = skm + s k e jηnθr ηnθd + N T n I Rk s k e jηmθr ηmθd + skn T M + z = NT m I Dk sk + s kγθ R, θ D + z, where η x θ = N T x πd λ sinθ, the random term artificial noise n I Rk ejηnθr ηnθd results from the random antenna switching, and the constant Γθ R, θ D = πd sinn T λ sinθr sinθ D NT sin πd sinθr sinθd. λ From, we observe that if the transmitted symbol is real, i.e. Φ k =, then s k = sk and the resulting beam pattern converges to N T + Γθ R, θ D, which is constant. If the transmitted symbol is complex, the term s k in the second part of introduces noise at the target receiver. There are two ways to deal with this. The first is to simply transmit the real and imaginary parts of the symbol in orthogonal timeslots. This of course will result in a.5 loss in the rate. The second way is to treat the term s kγθ R, θ D as noise at the receiver. This will result in a signal-to-noise-ratio SNR hit. Nonetheless, both strategies will improve the secrecy of

3 the communication link when compared to conventional techniques which focus on direction-only encryption not location. The received signal at an eavesdropper with a sensitive receiver located along the same direction of the target receiver with AoDs θ D, θ θ R, since the reflected path is unique to the target receiver, can be derived in a similar manner as yk, θ D, θ = s k N T m I Dk Me jφ k + e jηnθr ηnθd + n I Rk e jηmθ ηmθd + e jηnθ ηnθr + z E,4 n I Rk where z E is the effective noise at the eavesdropper and it is is assumed to be much lower than the effective noise at the target receiver i.e. z E << z. From 4 we observe that the signal received at an arbitrary location along the transmit direction becomes a random variable that is a function of the subsets I D k and I R k and the AoD of the reflected path, and converges to a constant only when θ = θ R, i.e. at the location of the target receiver only. IV. PERFORMANCE EVALUATION In this section, we evaluate the performance of the proposed mmwave secure transmission technique in terms of secrecy throughput. For mathematical tractability, we assume that all communication takes place during a coherence interval T in which the channel is assumed to be constant. This assumption allows us to account for the distortion caused by the artificial noise and derive the secrecy throughput. Further, we assume that the transmitter transmits real symbols only, i.e. half the time will be used for communicating the real part and the remaining time for communicating the imaginary parts of the communication symbols. This allows us to evaluate the performance of the system irrespective of the underlying modulation technique used at the transmitter. Based on these assumptions, the secrecy throughput R bits/channel use becomes R = [log + γ r log + γ e ] +, 5 where the factor accounts for time consumed for communicating the imaginary part of sk, γ r is the SNR at the target receiver, γ e is the SNR at the eavesdropper, and a + denotes max{, a}. We derive the secrecy throughput of the proposed technique and consider the following scenarios: i eavesdropper intercepts communication via the direct path only, ii eavesdropper intercepts communication via the reflected path only, and iii eavesdropper intercepts communication via both the direct and reflected paths. From, the SNR at the receiver can be expressed as γ r = N T σ + Γθ R, θ D, 6 where σ is the effective noise variance at the target receiver. Let the random variable β Ixkθ, θ = n I ej N T n πd λ sinθ sinθ xk, then from 4, the SNR at an eavesdropper intercepting communication via the direct path becomes σ e,d γ e,d = N T M + E[β IRkθ D, θ R ] N T var[β IRkφ D, θ R ] + σe,d, 7 is the effective noise variance at the eavesdropper. The SNR expression in 7 accounts for the average beamforming gain at the eavesdropper and the randomness or variance of the resulting beam pattern, which is noise to the eavesdropper. The SNR at an eavesdropper intercepting communication via the reflected path see third and fourth terms of 4 can be expressed in a smilier manner as N γ e,r = T E[β IRkθ R, θ+β IDkθ D, θ] N T var[β IRkθ R, θ+β IDkθ D, θ] + σe,r 8 E[β IRkθ R, θ] +E[β IDkθ D, θ] = var[β IRkθ R, θ]+var[β IDkθ D, θ]+n T σe,r, 9 where σe,r is the effective variance and 7 follows since β IRkθ R, θ and β IDkθ D, θ are independent. Finally, the SNR at an eavesdropper intercepting communication via the direct and the reflected paths see 4 can be expressed as γ e = M + E[β IRkθ D, θ R ] +E[β IDkθ D, θ] + E[β IRkθ R, θ] var[β IRkθ D, θ R + β IDkθ D, θ +β IRkθ R, θ] + N T σ e where σe = σe,d + σ e,r is the total effective noise variance at the eavesdropper, and the variance of the beam pattern at the eavesdropper is var[β IRkθ D, θ R + β IDkθ D, θ + β IRkθ R, θ] = var[β IRkθ D, θ R ] + var[β IDkθ D, θ] + var[β IRkθ R, θ] since the individual random patterns are independent. To complete the SNR derivations, we need to derive the mean and variance of the random variables β IRkθ D, θ R, β IRkθ R, θ R, and β IDkθ D, θ. We undertake this in the following lemma. Lemma : For large number of antennas N T, the random variable β Ixkθ, θ, where I x k = M, and θ θ, converges to a Gaussian random variable with mean E[β Ixkθ, θ ] = M sin πd N T λ sinθ sinθ N T sin πd λ sinθ sinθ, and variance var[β Ixkθ, θ ] = M MNT. Proof : See Appendix I. From Lemma, the beam pattern variance at an eavesdropper when intercepting communication via the direct path only, the reflected path only, and both paths becomes var[β IRkφ D, θ R ] = M MNT,

4 Normalized Beam Pattern Variance Combined eaves Combined eaves theory Reflected eaves Reflected eaves theory Direct Eaves Direct eaves theory Combined receiver Secrecy Throughput bits/channel use Angle Direction degrees 5 a Direct path b Combined Subset Size M Fig.. Numerical and normalized theoretical values eq. -5 of the beam pattern variance at both the target receiver and the eavesdropper versus the transmission subset size M; N T = 8, θ D =, θ R = 4, and the eavesdropper AoD along the reflected path θ E = 5. Secrecy Throughput bits/channel use Proposed Proposed theory Conventional Angle Direction degrees var[β IRkθ R, θ]+var[β IDkθ D, θ] = M MNT,4 var[β IRkθ D, θ R ] + var[β IDkθ D, θ] + var[β IRkθ R, θ] = M MNT, 5 respectively. Applying Lemma and 6- to 5, the secrecy throughput can be derived for each case. V. NUMERICAL RESULTS AND DISCUSSIONS In this section, we demonstrate that the proposed technique can achieve low secrecy throughput at the target receiver while enforcing higher secrecy throughput in undesired locations. We consider a system that operates at 6 GHz with a bandwidth of 5 MHz and an average transmit power of 7dBm. A standard two-ray log-distance path loss model with exponent is used to model the mmwave communication channel. Unless otherwise specified, the number of transmit antennas is set to 8 antennas, d λ =.5, the distances and receive antenna gains are set to achieve an effective noise variance σ =. at the receiver, and σe = 5 at the eavesdropper. The receiver and the eavesdropper are assumed to share the same AoD for the direct path. To study the effect of the subset size on the variance of the beam pattern at an eavesdropper, we plot the numerical and theoretical values of the resulting beam pattern variance in Fig.. We consider three scenarios. The first assumes that the eavesdropper intercepts communication via the shared direct path only, the second assumes that eavesdropper intercepts communication via the reflected path only and the third assumes that the eavesdropper intercepts communication via Fig.. Secrecy throughout of an eavesdropper when using the proposed PHY technique and conventional array transmission for two scenarios with θ D =, θ R = 4, N T = 8, and M = 64. Scenario a eavesdropper intercepts communication using its direct path only. Scenario b eavesdropper intercepts communication using both the direct and the reflected paths. Both the eavesdropper and the target receiver share the same AoD along the direct path. both the direct and the reflected path. For all scenarios, the figure shows that the beam pattern variance, which is a measure of artificial noise, is zero at M = and M = 8, i.e. when the transmitter transmits on either the direct or the reflected path. The reason for this is that when the transmitter uses all of its antennas to transmit on either path, there will be no random grating lobes on either path. In this case, an eavesdropper with a sensitive receiver can intercept communication from either the main lobe or the sidelobe. The figure also shows that there is an optimal subset size that maximizes the beam pattern variance which is occurs at M = NT. At this value of M, there is an equal amount of artificial noise generated by the random grating lobes on both the direct and reflected paths. Since both the target receiver and eavesdropper share the same AoD of the direct path, the beam pattern variance will be lower when the eavesdropper uses the direct path only to intercept communication and highest when it uses both the reflected and direct path as the eavesdropper receives artificial noise on both path. This is confirmed by the Fig.. The beam pattern variance is zero at the target receiver since the proposed technique ensures that both the direct and the reflected paths combine coherently and cancel-out interference on the direct and reflected paths. In Fig., we present results on the secrecy throughput of the proposed technique for an eavesdropper and compare it against conventional array transmission without PHY encryption.

5 Secrecy Throughput bits/channel use N T = 8, 64 Proposed theory Proposed Secrecy Throughput bits/channel use = =. =. =.4 = Subset size M Subset size M Fig. 4. Numerical and theoretical values of the secrecy throughput versus the transmit subset size M for different number of transmit antennas; θ D =, θ R = 4, and the eavesdropper AoD along the reflected path is θ E = 5. Fig. 5. Evaluation of the secrecy throughput in the presence of beam alignment errors; θ D =, θ R = 4, θ E = 5, and N T = 8. With the target receiver located along θ R = 4, two scenarios are considered for the eavesdropper: a eavesdropper intercepts communication using the direct path only Fig. a, and b eavesdropper intercepts communication using the both the direct and reflected paths Fig. b. In the first scenario, Fig. a shows that non-zero secrecy throughput is achieved irrespective of the eavesdropper s location. This results since the proposed technique introduces a jamming signal, which results from the random antenna switching when communicating on the reflected path, on the direct path, thereby improving the secrecy of the shared direct path. In the second scenario, Fig. b shows that non-zero secrecy throughput is achieved at all location, except at θ E = 4. Hence, the secrecy throughput is zero only at the location of the target receiver at θ R = 4, which is not realistic in practice. At θ E = 4, the proposed technique ensures that interference in both the direct and the reflected path converge to coherently combine and converge to a constant. This results in high SNR at the target location only. For both situations, Fig. shows that the proposed technique provides higher secrecy throughput when compared to conventional array transmission. Conventional array transmission does not encrypt or jam communication on either paths, hence resulting in the zero secrecy throughput shown in Fig.. Furthermore, the figure shows that the analytical results in Section IV are in agreement with the numerical simulation results. This allows us to gain further insights in the impact of key parameters like the N T and M on the achievable secrecy throughput. In Fig. 4 we study the effect of the transmission subset size M on the secrecy throughput when the eavesdropper intercepts communication via the direct path only. Unlike Fig. which shows that M = NT maximizes the beam pattern randomness on the direct path, Fig. 4 shows that higher secrecy throughput can be achieved when almost all antennas are used to communicate along the reflected path. Lowering the subset size M lowers the beamforming gain on the direct path, which is shared by the eavesdropper, while ensuring some randomness on the direct path as well. The secrecy throughput deteriorates when the beamforming gain exceeds the artificial noise signal ampplitude at the eavesdropper. Note that changing the subset size has no effect on target receiver since both direct and reflected beams coherently combine at the target receiver irrespective of the subset size M. Finally in Fig. 5, we investigate the impact of imperfect beam alignment, due to AoD estimation errors or change in the vehicle location, on the secrecy throughput. As stated in Section III, the proposed technique requires both the direct and the reflected beams to be perfectly aligned to the target receiver in order for the beams to converge to a constant. When the beams are not perfectly aligned, the resulting pattern at the target receiver will not converge to a constant. This generates artificial noise at the target receiver as well as the eavesdropper, and results in a hit in the secrecy throughput. This is confirmed in Fig. 5 for different beam alignment errors = θ R ˆθ R, where θ R is the true AoD along the reflected path and ˆθ R is the estimated AoD. Fig. 5 shows that higher secrecy throughput compared to conventional techniques can be achieved even in the presence of small alignment errors, e.g. =.. The secrecy throughput, however, quickly deteriorates as the alignment error increases. Therefore, it is important to implement a mechanism that ensures perfect alignment at target receiver to maintain the secrecy of the communication link. VI. CONCLUSIONS In this paper, we proposed a PHY layer security technique for secure mmwave vehicular communication. The proposed

6 technique takes advantage of the large antenna arrays at the mmwave frequencies to jam eavesdroppers with sensitive receivers. This enhances the security of the communication link between a transmitter and a legitimate receiver. The findings of this paper suggest that by exploiting the road reflected path, location dependent transmission can be achieved. This makes the proposed security technique favorable in vehicular environments where an eavesdropper can have access to the direct path either by directly intercepting it or via a reflected or back scattered path. APPENDIX I The random variable β Ixkθ, θ with I x k = M can be rewritten as β Ixkθ, θ = m I xk ejm N T πd λ sin θ sin θ. Since the entries of the set I x k, are randomly selected for each data symbol, β Ixkθ, θ can be simplified to β Ixkθ, θ = N T n= Q N jn T ne πd λ sinθ sinθ, where Q n is a Bernoulli random variable and Q n = with probability M N T, and Q n = with probability M N T. For sufficiently large N T, β Ixkθ, θ becomes a sum of IID complex random variables. Invoking the central limit theorem, β Ixkθ, θ converges to a complex Gaussian random variable. The mean of β Ixkθ, θ can be written as E[β Ixkθ, θ ] = E [ NT = E[Q n ] Q n e jn N T πd λ sinθ sinθ ] n= N T e jn N T πd λ sinθ sinθ n= = M sin N T πd λ sinθ sinθ N T sin πd λ sinθ sinθ, 6 where in 6 E[Q n ] = M N T. The variance of β Ixkθ, θ can be derived as follows var[β Ixkθ, θ ] = var [ NT n= N T = var[q n ] Q n e jn N T πd λ sinθ sinθ ] n= = M N T M N T N T = M where var[q n ] = M N T M N T. [ e jn N T πd λ sinθ sinθ ] MNT, 7 [] M. Motro, T. Kim, R. Kalantari, et al., Communications and Radar- Supported Transportation Operations and Planning, Technical Report , TX-DoT, 7. [4] P. Kumari, N. Gozalez-Prelcic, and R. Heath Jr, Investigating the IEEE 8.ad standard for millimeter wave automotive radar, in Proc. IEEE Vehicular Technology Conf., Boston, 5. [5] M. Raya, P. Papadimitratos, and J. Hubaux, Securing vehicular communications, in IEEE Wireless Commun., vol., no. 5, pp.8-5, Oct. 6. [6] S. Goel, and R. Negi, Guaranteeing secrecy using artificial noise, IEEE Trans. Wireless Communn., vol. 7, no. 6 pp. 8-89, 8. [7] A. Yener and S. Ulukus, Wireless physical-layer security: lessons learned from information theory, Proc. IEEE, vol., no., pp , 5. [8] N. Valliappan, A. Lozano, and R. Heath, Antenna subset modulation for secure millimeter-wave wireless communication, IEEE Trans. Commun., vol. 6, no. 8, pp. -45, Aug.. [9] M. Eltayeb, J. Choi, T. Al-Naffouri, and R. Heath, Enhancing Secrecy with Multi-Antenna Transmission in Millimeter Wave Vehicular Communication Systems, IEEE Trans. Veh. Technol., vol. 66, no. 9, pp , Sept. 7. [] M. Eltayeb, J. Choi, T. Al-Naffouri, and R. Heath, On the security of millimeter wave vehicular communication systems using random antenna subsets, in Veh. Technol. Conf., Montreal, Canada, Sept. 6. [] W. Schafer, A new deterministic/stochastic approach to model the intervehicle channel at 6 GHz, in Veh. Technol. Conf., Secaucus, NJ, May 99, pp. -5. [] R. Schneider, D. Didascalou, and W. Wiesbeck, Impact of road surfaces on millimeter-wave propagation, IEEE Trans. Veh. Technology, vol. 49, no. 4, pp. 4-, Jul.. [] M. Boban, J. Barros, and O. Tonguz, Geometry-based vehicle-tovehicle channel modeling for large-scale simulation, IEEE Trans. Veh. Technol., vol. 6, no. 9, pp , Nov. 4. [4] M. Akdeniz, Y. Liu, M. Samimi, S. Sun, S. Rangan, T. Rappaport, and E. Erkip, Millimeter wave channel modeling and cellular capacity evaluation, IEEE J. on Selected Areas in Commun., vol., no. 6, pp , June 4. [5] H. L. Van Trees, Optimum array processing detection, estimation, and modulation theory, part IV, st ed. WileyInterscience, Mar.. REFERENCES [] J. Choi, N. Gonzalez-Prelcic, R. Daniels, C. Bhat, and R. Heath, Millimeter wave vehicular communication to support massive automotive sensing, IEEE Commun. Mag., vol. 54, no., pp. 6-67, Dec. 6. [] V. Va, and R. Heath Jr., Basic relationship between channel coherence time and beamwidth in vehicular channels, in IEEE 8nd Veh. Technol. Conf., Boston, Sept. 5.

On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets

On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets Mohammed Eltayeb*, Junil Choi*, Tareq Al-Naffouri #, and Robert W. Heath Jr.* * Wireless Networking and Communications

More information

Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems

Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems Item Type Article Authors Eltayeb, Mohammed E.; Choi, Junil; Al-Naffouri, Tareq Y.; Heath, Robert W.

More information

Compressed-Sensing Based Multi-User Millimeter Wave Systems: How Many Measurements Are Needed?

Compressed-Sensing Based Multi-User Millimeter Wave Systems: How Many Measurements Are Needed? Compressed-Sensing Based Multi-User Millimeter Wave Systems: How Many Measurements Are Needed? Ahmed Alkhateeb*, Geert Leus #, and Robert W. Heath Jr.* * Wireless Networking and Communications Group, Department

More information

Low Complexity Energy Efficiency Analysis in Millimeter Wave Communication Systems

Low Complexity Energy Efficiency Analysis in Millimeter Wave Communication Systems The 217 International Workshop on Service-oriented Optimization of Green Mobile Networks GREENNET Low Complexity Energy Efficiency Analysis in Millimeter Wave Communication Systems Pan Cao and John Thompson

More information

Coverage and Rate in Finite-Sized Device-to-Device Millimeter Wave Networks

Coverage and Rate in Finite-Sized Device-to-Device Millimeter Wave Networks Coverage and Rate in Finite-Sized Device-to-Device Millimeter Wave Networks Matthew C. Valenti, West Virginia University Joint work with Kiran Venugopal and Robert Heath, University of Texas Under funding

More information

Interference in Finite-Sized Highly Dense Millimeter Wave Networks

Interference in Finite-Sized Highly Dense Millimeter Wave Networks Interference in Finite-Sized Highly Dense Millimeter Wave Networks Kiran Venugopal, Matthew C. Valenti, Robert W. Heath Jr. UT Austin, West Virginia University Supported by Intel and the Big- XII Faculty

More information

Impact of Antenna Geometry on Adaptive Switching in MIMO Channels

Impact of Antenna Geometry on Adaptive Switching in MIMO Channels Impact of Antenna Geometry on Adaptive Switching in MIMO Channels Ramya Bhagavatula, Antonio Forenza, Robert W. Heath Jr. he University of exas at Austin University Station, C0803, Austin, exas, 787-040

More information

Wearable networks: A new frontier for device-to-device communication

Wearable networks: A new frontier for device-to-device communication Wearable networks: A new frontier for device-to-device communication Professor Robert W. Heath Jr. Wireless Networking and Communications Group Department of Electrical and Computer Engineering The University

More information

Efficient Signaling Schemes for mmwave LOS MIMO Communication Using Uniform Linear and Circular Arrays

Efficient Signaling Schemes for mmwave LOS MIMO Communication Using Uniform Linear and Circular Arrays Efficient Signaling Schemes for mmwave LOS MIMO Communication Using Uniform Linear and Circular Arrays G. D. Surabhi and A. Chockalingam Department of ECE, Indian Institute of Science, Bangalore 562 Abstract

More information

Vehicle-to-X communication for 5G - a killer application of millimeter wave

Vehicle-to-X communication for 5G - a killer application of millimeter wave 2017, Robert W. W. Heath Jr. Jr. Vehicle-to-X communication for 5G - a killer application of millimeter wave Professor Robert W. Heath Jr. Wireless Networking and Communications Group Department of Electrical

More information

Analysis of Massive MIMO With Hardware Impairments and Different Channel Models

Analysis of Massive MIMO With Hardware Impairments and Different Channel Models Analysis of Massive MIMO With Hardware Impairments and Different Channel Models Fredrik Athley, Giuseppe Durisi 2, Ulf Gustavsson Ericsson Research, Ericsson AB, Gothenburg, Sweden 2 Dept. of Signals and

More information

AN ALTERNATIVE METHOD FOR DIFFERENCE PATTERN FORMATION IN MONOPULSE ANTENNA

AN ALTERNATIVE METHOD FOR DIFFERENCE PATTERN FORMATION IN MONOPULSE ANTENNA Progress In Electromagnetics Research Letters, Vol. 42, 45 54, 213 AN ALTERNATIVE METHOD FOR DIFFERENCE PATTERN FORMATION IN MONOPULSE ANTENNA Jafar R. Mohammed * Communication Engineering Department,

More information

Vehicle-to-X communication using millimeter waves

Vehicle-to-X communication using millimeter waves Infrastructure Person Vehicle 5G Slides Robert W. Heath Jr. (2016) Vehicle-to-X communication using millimeter waves Professor Robert W. Heath Jr., PhD, PE mmwave Wireless Networking and Communications

More information

FEASIBILITY STUDY ON FULL-DUPLEX WIRELESS MILLIMETER-WAVE SYSTEMS. University of California, Irvine, CA Samsung Research America, Dallas, TX

FEASIBILITY STUDY ON FULL-DUPLEX WIRELESS MILLIMETER-WAVE SYSTEMS. University of California, Irvine, CA Samsung Research America, Dallas, TX 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) FEASIBILITY STUDY ON FULL-DUPLEX WIRELESS MILLIMETER-WAVE SYSTEMS Liangbin Li Kaushik Josiam Rakesh Taori University

More information

Millimeter Wave Cellular Channel Models for System Evaluation

Millimeter Wave Cellular Channel Models for System Evaluation Millimeter Wave Cellular Channel Models for System Evaluation Tianyang Bai 1, Vipul Desai 2, and Robert W. Heath, Jr. 1 1 ECE Department, The University of Texas at Austin, Austin, TX 2 Huawei Technologies,

More information

Analysis of massive MIMO networks using stochastic geometry

Analysis of massive MIMO networks using stochastic geometry Analysis of massive MIMO networks using stochastic geometry Tianyang Bai and Robert W. Heath Jr. Wireless Networking and Communications Group Department of Electrical and Computer Engineering The University

More information

Differentially Coherent Detection: Lower Complexity, Higher Capacity?

Differentially Coherent Detection: Lower Complexity, Higher Capacity? Differentially Coherent Detection: Lower Complexity, Higher Capacity? Yashar Aval, Sarah Kate Wilson and Milica Stojanovic Northeastern University, Boston, MA, USA Santa Clara University, Santa Clara,

More information

Auxiliary Beam Pair Enabled AoD Estimation for Large-scale mmwave MIMO Systems

Auxiliary Beam Pair Enabled AoD Estimation for Large-scale mmwave MIMO Systems Auxiliary Beam Pair Enabled AoD Estimation for Large-scale mmwave MIMO Systems Dalin Zhu, Junil Choi and Robert W. Heath Jr. Wireless Networking and Communications Group Department of Electrical and Computer

More information

arxiv: v1 [cs.ni] 26 Apr 2017

arxiv: v1 [cs.ni] 26 Apr 2017 Technical Report Millimeter Wave Communication in Vehicular Networks: Coverage and Connectivity Analysis arxiv:75.696v [cs.ni] 26 Apr 27 Marco Giordani Andrea Zanella Michele Zorzi E-mail: {giordani, zanella,

More information

Chapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band

Chapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band Chapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band 4.1. Introduction The demands for wireless mobile communication are increasing rapidly, and they have become an indispensable part

More information

Performance Analysis of Beam Sweeping in Millimeter Wave Assuming Noise and Imperfect Antenna Patterns

Performance Analysis of Beam Sweeping in Millimeter Wave Assuming Noise and Imperfect Antenna Patterns Performance Analysis of Beam Sweeping in Millimeter Wave Assuming Noise and Imperfect Antenna Patterns Vutha Va and Robert W. Heath Jr. Wireless Networking and Communications Group Department of Electrical

More information

Beamforming in Interference Networks for Uniform Linear Arrays

Beamforming in Interference Networks for Uniform Linear Arrays Beamforming in Interference Networks for Uniform Linear Arrays Rami Mochaourab and Eduard Jorswieck Communications Theory, Communications Laboratory Dresden University of Technology, Dresden, Germany e-mail:

More information

THE EFFECT of multipath fading in wireless systems can

THE EFFECT of multipath fading in wireless systems can IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998 119 The Diversity Gain of Transmit Diversity in Wireless Systems with Rayleigh Fading Jack H. Winters, Fellow, IEEE Abstract In

More information

Analysis of Self-Body Blocking in MmWave Cellular Networks

Analysis of Self-Body Blocking in MmWave Cellular Networks Analysis of Self-Body Blocking in MmWave Cellular Networks Tianyang Bai and Robert W. Heath Jr. The University of Texas at Austin Department of Electrical and Computer Engineering Wireless Networking and

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error

Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error Abhishek Thakur 1 1Student, Dept. of Electronics & Communication Engineering, IIIT Manipur ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

Eigenvalues and Eigenvectors in Array Antennas. Optimization of Array Antennas for High Performance. Self-introduction

Eigenvalues and Eigenvectors in Array Antennas. Optimization of Array Antennas for High Performance. Self-introduction Short Course @ISAP2010 in MACAO Eigenvalues and Eigenvectors in Array Antennas Optimization of Array Antennas for High Performance Nobuyoshi Kikuma Nagoya Institute of Technology, Japan 1 Self-introduction

More information

Propagation Channels. Chapter Path Loss

Propagation Channels. Chapter Path Loss Chapter 9 Propagation Channels The transmit and receive antennas in the systems we have analyzed in earlier chapters have been in free space with no other objects present. In a practical communication

More information

BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOCK CODES WITH MMSE CHANNEL ESTIMATION

BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOCK CODES WITH MMSE CHANNEL ESTIMATION BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOC CODES WITH MMSE CHANNEL ESTIMATION Lennert Jacobs, Frederik Van Cauter, Frederik Simoens and Marc Moeneclaey

More information

Proportional Fair Scheduling for Wireless Communication with Multiple Transmit and Receive Antennas 1

Proportional Fair Scheduling for Wireless Communication with Multiple Transmit and Receive Antennas 1 Proportional Fair Scheduling for Wireless Communication with Multiple Transmit and Receive Antennas Taewon Park, Oh-Soon Shin, and Kwang Bok (Ed) Lee School of Electrical Engineering and Computer Science

More information

Low-Complexity Beam Allocation for Switched-Beam Based Multiuser Massive MIMO Systems

Low-Complexity Beam Allocation for Switched-Beam Based Multiuser Massive MIMO Systems Low-Complexity Beam Allocation for Switched-Beam Based Multiuser Massive MIMO Systems Jiangzhou Wang University of Kent 1 / 31 Best Wishes to Professor Fumiyuki Adachi, Father of Wideband CDMA [1]. [1]

More information

Adaptive Modulation, Adaptive Coding, and Power Control for Fixed Cellular Broadband Wireless Systems: Some New Insights 1

Adaptive Modulation, Adaptive Coding, and Power Control for Fixed Cellular Broadband Wireless Systems: Some New Insights 1 Adaptive, Adaptive Coding, and Power Control for Fixed Cellular Broadband Wireless Systems: Some New Insights Ehab Armanious, David D. Falconer, and Halim Yanikomeroglu Broadband Communications and Wireless

More information

DESIGN OF PRINTED YAGI ANTENNA WITH ADDI- TIONAL DRIVEN ELEMENT FOR WLAN APPLICA- TIONS

DESIGN OF PRINTED YAGI ANTENNA WITH ADDI- TIONAL DRIVEN ELEMENT FOR WLAN APPLICA- TIONS Progress In Electromagnetics Research C, Vol. 37, 67 81, 013 DESIGN OF PRINTED YAGI ANTENNA WITH ADDI- TIONAL DRIVEN ELEMENT FOR WLAN APPLICA- TIONS Jafar R. Mohammed * Communication Engineering Department,

More information

1 Interference Cancellation

1 Interference Cancellation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.

More information

V2X Downlink Coverage Analysis with a Realistic Urban Vehicular Model

V2X Downlink Coverage Analysis with a Realistic Urban Vehicular Model V2X Downlink Coverage Analysis with a Realistic Urban Vehicular Model Yae Jee Cho, Kaibin Huang*, and Chan-Byoung Chae School of Integrated Technology, Yonsei Institute of Convergence Technology, Yonsei

More information

Compact Antenna Spacing in mmwave MIMO Systems Using Random Phase Precoding

Compact Antenna Spacing in mmwave MIMO Systems Using Random Phase Precoding Compact Antenna Spacing in mmwave MIMO Systems Using Random Phase Precoding G D Surabhi and A Chockalingam Department of ECE, Indian Institute of Science, Bangalore 56002 Abstract Presence of strong line

More information

Multipath Effect on Covariance Based MIMO Radar Beampattern Design

Multipath Effect on Covariance Based MIMO Radar Beampattern Design IOSR Journal of Engineering (IOSRJE) ISS (e): 225-32, ISS (p): 2278-879 Vol. 4, Issue 9 (September. 24), V2 PP 43-52 www.iosrjen.org Multipath Effect on Covariance Based MIMO Radar Beampattern Design Amirsadegh

More information

BER Performance of Antenna Array-Based Receiver using Multi-user Detection in a Multipath Channel

BER Performance of Antenna Array-Based Receiver using Multi-user Detection in a Multipath Channel BER Performance of Antenna Array-Based Receiver using Multi-user Detection in a Multipath Channel Abstract Rim Haddad Laboratory research in telecom systems 6 Tel@ SUP COM High School of Communicationof

More information

STUDY OF PHASED ARRAY ANTENNA AND RADAR TECHNOLOGY

STUDY OF PHASED ARRAY ANTENNA AND RADAR TECHNOLOGY 42 STUDY OF PHASED ARRAY ANTENNA AND RADAR TECHNOLOGY Muhammad Saleem,M.R Anjum & Noreen Anwer Department of Electronic Engineering, The Islamia University of Bahawalpur, Pakistan ABSTRACT A phased array

More information

Opportunistic Beamforming Using Dumb Antennas

Opportunistic Beamforming Using Dumb Antennas IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 6, JUNE 2002 1277 Opportunistic Beamforming Using Dumb Antennas Pramod Viswanath, Member, IEEE, David N. C. Tse, Member, IEEE, and Rajiv Laroia, Fellow,

More information

IN RECENT years, wireless multiple-input multiple-output

IN RECENT years, wireless multiple-input multiple-output 1936 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 6, NOVEMBER 2004 On Strategies of Multiuser MIMO Transmit Signal Processing Ruly Lai-U Choi, Michel T. Ivrlač, Ross D. Murch, and Wolfgang

More information

Millimeter Wave Small-Scale Spatial Statistics in an Urban Microcell Scenario

Millimeter Wave Small-Scale Spatial Statistics in an Urban Microcell Scenario Millimeter Wave Small-Scale Spatial Statistics in an Urban Microcell Scenario Shu Sun, Hangsong Yan, George R. MacCartney, Jr., and Theodore S. Rappaport {ss7152,hy942,gmac,tsr}@nyu.edu IEEE International

More information

Prevention of Eavesdropping in OFDMA Systems

Prevention of Eavesdropping in OFDMA Systems Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 1 (2016), pp. 453-461 Research India Publications http://www.ripublication.com Prevention of Eavesdropping in OFDMA Systems

More information

ADAPTIVE ANTENNAS. TYPES OF BEAMFORMING

ADAPTIVE ANTENNAS. TYPES OF BEAMFORMING ADAPTIVE ANTENNAS TYPES OF BEAMFORMING 1 1- Outlines This chapter will introduce : Essential terminologies for beamforming; BF Demonstrating the function of the complex weights and how the phase and amplitude

More information

Coverage and Rate Trends in Dense Urban mmwave Cellular Networks

Coverage and Rate Trends in Dense Urban mmwave Cellular Networks Coverage and Rate Trends in Dense Urban mmwave Cellular Networks Mandar N. Kulkarni, Sarabjot Singh and Jeffrey G. Andrews Abstract The use of dense millimeter wave (mmwave) cellular networks with highly

More information

Beamforming with Finite Rate Feedback for LOS MIMO Downlink Channels

Beamforming with Finite Rate Feedback for LOS MIMO Downlink Channels Beamforming with Finite Rate Feedback for LOS IO Downlink Channels Niranjay Ravindran University of innesota inneapolis, N, 55455 USA Nihar Jindal University of innesota inneapolis, N, 55455 USA Howard

More information

A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks

A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks R. Menon, A. B. MacKenzie, R. M. Buehrer and J. H. Reed The Bradley Department of Electrical and Computer Engineering Virginia Tech,

More information

Capacity Evaluation of an Indoor Wireless Channel at 60 GHz Utilizing Uniform Rectangular Arrays

Capacity Evaluation of an Indoor Wireless Channel at 60 GHz Utilizing Uniform Rectangular Arrays Capacity Evaluation of an Indoor Wireless Channel at 60 GHz Utilizing Uniform Rectangular Arrays NEKTARIOS MORAITIS 1, DIMITRIOS DRES 1, ODYSSEAS PYROVOLAKIS 2 1 National Technical University of Athens,

More information

Antenna arrangements realizing a unitary matrix for 4 4 LOS-MIMO system

Antenna arrangements realizing a unitary matrix for 4 4 LOS-MIMO system Antenna arrangements realizing a unitary matrix for 4 4 LOS-MIMO system Satoshi Sasaki a), Kentaro Nishimori b), Ryochi Kataoka, and Hideo Makino Graduate School of Science and Technology, Niigata University,

More information

Effects of Antenna Mutual Coupling on the Performance of MIMO Systems

Effects of Antenna Mutual Coupling on the Performance of MIMO Systems 9th Symposium on Information Theory in the Benelux, May 8 Effects of Antenna Mutual Coupling on the Performance of MIMO Systems Yan Wu Eindhoven University of Technology y.w.wu@tue.nl J.W.M. Bergmans Eindhoven

More information

WIRELESS power transfer through coupled antennas

WIRELESS power transfer through coupled antennas 3442 IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 58, NO. 11, NOVEMBER 2010 Fundamental Aspects of Near-Field Coupling Small Antennas for Wireless Power Transfer Jaechun Lee, Member, IEEE, and Sangwook

More information

Spatial Correlation Effects on Channel Estimation of UCA-MIMO Receivers

Spatial Correlation Effects on Channel Estimation of UCA-MIMO Receivers 11 International Conference on Communication Engineering and Networks IPCSIT vol.19 (11) (11) IACSIT Press, Singapore Spatial Correlation Effects on Channel Estimation of UCA-MIMO Receivers M. A. Mangoud

More information

Amplitude and Phase Distortions in MIMO and Diversity Systems

Amplitude and Phase Distortions in MIMO and Diversity Systems Amplitude and Phase Distortions in MIMO and Diversity Systems Christiane Kuhnert, Gerd Saala, Christian Waldschmidt, Werner Wiesbeck Institut für Höchstfrequenztechnik und Elektronik (IHE) Universität

More information

Frequency-Hopped Multiple-Access Communications with Multicarrier On Off Keying in Rayleigh Fading Channels

Frequency-Hopped Multiple-Access Communications with Multicarrier On Off Keying in Rayleigh Fading Channels 1692 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 48, NO. 10, OCTOBER 2000 Frequency-Hopped Multiple-Access Communications with Multicarrier On Off Keying in Rayleigh Fading Channels Seung Ho Kim and Sang

More information

Fig.1channel model of multiuser ss OSTBC system

Fig.1channel model of multiuser ss OSTBC system IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. V (Feb. 2014), PP 48-52 Cooperative Spectrum Sensing In Cognitive Radio

More information

MIMO Receiver Design in Impulsive Noise

MIMO Receiver Design in Impulsive Noise COPYRIGHT c 007. ALL RIGHTS RESERVED. 1 MIMO Receiver Design in Impulsive Noise Aditya Chopra and Kapil Gulati Final Project Report Advanced Space Time Communications Prof. Robert Heath December 7 th,

More information

A Complete MIMO System Built on a Single RF Communication Ends

A Complete MIMO System Built on a Single RF Communication Ends PIERS ONLINE, VOL. 6, NO. 6, 2010 559 A Complete MIMO System Built on a Single RF Communication Ends Vlasis Barousis, Athanasios G. Kanatas, and George Efthymoglou University of Piraeus, Greece Abstract

More information

Antenna Subset Modulation for Secure. Millimeter-Wave Wireless Communication

Antenna Subset Modulation for Secure. Millimeter-Wave Wireless Communication Antenna Subset Modulation for Secure 1 Millimeter-Wave Wireless Communication Nachiappan Valliappan, Angel Lozano, and Robert W. Heath Jr. Abstract The small carrier wavelength at millimeter-wave mm-wave

More information

Joint Adaptive Modulation and Diversity Combining with Feedback Error Compensation

Joint Adaptive Modulation and Diversity Combining with Feedback Error Compensation Joint Adaptive Modulation and Diversity Combining with Feedback Error Compensation Seyeong Choi, Mohamed-Slim Alouini, Khalid A. Qaraqe Dept. of Electrical Eng. Texas A&M University at Qatar Education

More information

MIMO Channel Modeling and Capacity Analysis for 5G Millimeter-Wave Wireless Systems

MIMO Channel Modeling and Capacity Analysis for 5G Millimeter-Wave Wireless Systems M. K. Samimi, S. Sun, T. S. Rappaport, MIMO Channel Modeling and Capacity Analysis for 5G Millimeter-Wave Wireless Systems, in the 0 th European Conference on Antennas and Propagation (EuCAP 206), April

More information

5G: Opportunities and Challenges Kate C.-J. Lin Academia Sinica

5G: Opportunities and Challenges Kate C.-J. Lin Academia Sinica 5G: Opportunities and Challenges Kate C.-J. Lin Academia Sinica! 2015.05.29 Key Trend (2013-2025) Exponential traffic growth! Wireless traffic dominated by video multimedia! Expectation of ubiquitous broadband

More information

Indoor Channel Modelling for SISO and Massive SIMO in the 60 GHz mm-wave Band

Indoor Channel Modelling for SISO and Massive SIMO in the 60 GHz mm-wave Band http://dx.doi.org/10.5755/j01.eie.23.4.18720 Indoor Channel Modelling for SISO and Massive SIMO in the 60 GHz mm-wave Band Baris Yuksekkaya 1,2 1 Department of Electronical and Electronic Engineering,

More information

Written Exam Channel Modeling for Wireless Communications - ETIN10

Written Exam Channel Modeling for Wireless Communications - ETIN10 Written Exam Channel Modeling for Wireless Communications - ETIN10 Department of Electrical and Information Technology Lund University 2017-03-13 2.00 PM - 7.00 PM A minimum of 30 out of 60 points are

More information

Indoor Positioning with UWB Beamforming

Indoor Positioning with UWB Beamforming Indoor Positioning with UWB Beamforming Christiane Senger a, Thomas Kaiser b a University Duisburg-Essen, Germany, e-mail: c.senger@uni-duisburg.de b University Duisburg-Essen, Germany, e-mail: thomas.kaiser@uni-duisburg.de

More information

Channel Modelling for Beamforming in Cellular Systems

Channel Modelling for Beamforming in Cellular Systems Channel Modelling for Beamforming in Cellular Systems Salman Durrani Department of Engineering, The Australian National University, Canberra. Email: salman.durrani@anu.edu.au DERF June 26 Outline Introduction

More information

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

Adaptive Beamforming Applied for Signals Estimated with MUSIC Algorithm

Adaptive Beamforming Applied for Signals Estimated with MUSIC Algorithm Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 57(71), Fascicola 2, 2012 Adaptive Beamforming

More information

DIRECTION OF ARRIVAL ESTIMATION IN WIRELESS MOBILE COMMUNICATIONS USING MINIMUM VERIANCE DISTORSIONLESS RESPONSE

DIRECTION OF ARRIVAL ESTIMATION IN WIRELESS MOBILE COMMUNICATIONS USING MINIMUM VERIANCE DISTORSIONLESS RESPONSE DIRECTION OF ARRIVAL ESTIMATION IN WIRELESS MOBILE COMMUNICATIONS USING MINIMUM VERIANCE DISTORSIONLESS RESPONSE M. A. Al-Nuaimi, R. M. Shubair, and K. O. Al-Midfa Etisalat University College, P.O.Box:573,

More information

Comparison of Beamforming Techniques for W-CDMA Communication Systems

Comparison of Beamforming Techniques for W-CDMA Communication Systems 752 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 Comparison of Beamforming Techniques for W-CDMA Communication Systems Hsueh-Jyh Li and Ta-Yung Liu Abstract In this paper, different

More information

Low-Complexity Hybrid Precoding in Massive Multiuser MIMO Systems

Low-Complexity Hybrid Precoding in Massive Multiuser MIMO Systems Low-Complexity Hybrid Precoding in Massive Multiuser MIMO Systems Le Liang, Student Member, IEEE, Wei Xu, Member, IEEE, and Xiaodai Dong, Senior Member, IEEE 1 arxiv:1410.3947v1 [cs.it] 15 Oct 014 Abstract

More information

Effects of Beamforming on the Connectivity of Ad Hoc Networks

Effects of Beamforming on the Connectivity of Ad Hoc Networks Effects of Beamforming on the Connectivity of Ad Hoc Networks Xiangyun Zhou, Haley M. Jones, Salman Durrani and Adele Scott Department of Engineering, CECS The Australian National University Canberra ACT,

More information

PROGRESSIVE CHANNEL ESTIMATION FOR ULTRA LOW LATENCY MILLIMETER WAVE COMMUNICATIONS

PROGRESSIVE CHANNEL ESTIMATION FOR ULTRA LOW LATENCY MILLIMETER WAVE COMMUNICATIONS PROGRESSIVECHANNELESTIMATIONFOR ULTRA LOWLATENCYMILLIMETER WAVECOMMUNICATIONS Hung YiCheng,Ching ChunLiao,andAn Yeu(Andy)Wu,Fellow,IEEE Graduate Institute of Electronics Engineering, National Taiwan University

More information

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and

More information

Hybrid Digital and Analog Beamforming Design for Large-Scale MIMO Systems

Hybrid Digital and Analog Beamforming Design for Large-Scale MIMO Systems Hybrid Digital and Analog Beamforg Design for Large-Scale MIMO Systems Foad Sohrabi and Wei Yu Department of Electrical and Computer Engineering University of Toronto Toronto Ontario M5S 3G4 Canada Emails:

More information

Evaluation of the Effects of the Co-Channel Interference on the Bit Error Rate of Cellular Systems for BPSK Modulation

Evaluation of the Effects of the Co-Channel Interference on the Bit Error Rate of Cellular Systems for BPSK Modulation The 7 th International Telecommunications ymposium (IT 00 Evaluation of the Effects of the Co-Channel Interference on the Bit Error Rate of Cellular ystems for BPK Modulation Daniel Altamirano and Celso

More information

Asynchronous Space-Time Cooperative Communications in Sensor and Robotic Networks

Asynchronous Space-Time Cooperative Communications in Sensor and Robotic Networks Proceedings of the IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada July 2005 Asynchronous Space-Time Cooperative Communications in Sensor and Robotic Networks Fan Ng, Juite

More information

Random Beamforming with Multi-beam Selection for MIMO Broadcast Channels

Random Beamforming with Multi-beam Selection for MIMO Broadcast Channels Random Beamforming with Multi-beam Selection for MIMO Broadcast Channels Kai Zhang and Zhisheng Niu Dept. of Electronic Engineering, Tsinghua University Beijing 84, China zhangkai98@mails.tsinghua.e.cn,

More information

PROVIDING high data rates to onboard users in public

PROVIDING high data rates to onboard users in public Higher Frequency Band Beamforming Scheme for High Speed Train Ayotunde O. Laiyemo, Petri Luoto, Pekka Pirinen, and Matti Latva-aho, Centre for Wireless Communications, University of Oulu, P.O. Box 4500,

More information

Opportunistic Communication in Wireless Networks

Opportunistic Communication in Wireless Networks Opportunistic Communication in Wireless Networks David Tse Department of EECS, U.C. Berkeley October 10, 2001 Networking, Communications and DSP Seminar Communication over Wireless Channels Fundamental

More information

Performance of Closely Spaced Multiple Antennas for Terminal Applications

Performance of Closely Spaced Multiple Antennas for Terminal Applications Performance of Closely Spaced Multiple Antennas for Terminal Applications Anders Derneryd, Jonas Fridén, Patrik Persson, Anders Stjernman Ericsson AB, Ericsson Research SE-417 56 Göteborg, Sweden {anders.derneryd,

More information

MIMO Wireless Communications

MIMO Wireless Communications MIMO Wireless Communications Speaker: Sau-Hsuan Wu Date: 2008 / 07 / 15 Department of Communication Engineering, NCTU Outline 2 2 MIMO wireless channels MIMO transceiver MIMO precoder Outline 3 3 MIMO

More information

An Energy-Division Multiple Access Scheme

An Energy-Division Multiple Access Scheme An Energy-Division Multiple Access Scheme P Salvo Rossi DIS, Università di Napoli Federico II Napoli, Italy salvoros@uninait D Mattera DIET, Università di Napoli Federico II Napoli, Italy mattera@uninait

More information

at 1 The simulation codes are provided to reproduce the results in this paper

at   1 The simulation codes are provided to reproduce the results in this paper Angle-Based Codebook for Low-Resolution Hybrid Precoding in illimeter-wave assive IO Systems Jingbo Tan, Linglong Dai, Jianjun Li, and Shi Jin Tsinghua National Laboratory for Information Science and Technology

More information

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree

More information

LARGE SCALE MILLIMETER WAVE CHANNEL MODELING FOR 5G

LARGE SCALE MILLIMETER WAVE CHANNEL MODELING FOR 5G LARGE SCALE MILLIMETER WAVE CHANNEL MODELING FOR 5G 1 ARCADE NSHIMIYIMANA, 2 DEEPAK AGRAWAL, 3 WASIM ARIF 1, 2,3 Electronics and Communication Engineering, Department of NIT Silchar. National Institute

More information

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques 1 Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques Bin Song and Martin Haardt Outline 2 Multi-user user MIMO System (main topic in phase I and phase II) critical problem Downlink

More information

Frequency-domain space-time block coded single-carrier distributed antenna network

Frequency-domain space-time block coded single-carrier distributed antenna network Frequency-domain space-time block coded single-carrier distributed antenna network Ryusuke Matsukawa a), Tatsunori Obara, and Fumiyuki Adachi Department of Electrical and Communication Engineering, Graduate

More information

Pareto Optimization for Uplink NOMA Power Control

Pareto Optimization for Uplink NOMA Power Control Pareto Optimization for Uplink NOMA Power Control Eren Balevi, Member, IEEE, and Richard D. Gitlin, Life Fellow, IEEE Department of Electrical Engineering, University of South Florida Tampa, Florida 33620,

More information

Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection

Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection Mohammad Torabi Wessam Ajib David Haccoun Dept. of Electrical Engineering Dept. of Computer Science Dept. of Electrical

More information

An HARQ scheme with antenna switching for V-BLAST system

An HARQ scheme with antenna switching for V-BLAST system An HARQ scheme with antenna switching for V-BLAST system Bonghoe Kim* and Donghee Shim* *Standardization & System Research Gr., Mobile Communication Technology Research LAB., LG Electronics Inc., 533,

More information

A Simulation Research on Linear Beam Forming Transmission

A Simulation Research on Linear Beam Forming Transmission From the SelectedWorks of Innovative Research Publications IRP India Winter December 1, 2014 A Simulation Research on Linear Beam Forming Transmission Innovative Research Publications, IRP India, Innovative

More information

Limited Feedback in Multiple-Antenna Systems with One-Bit Quantization

Limited Feedback in Multiple-Antenna Systems with One-Bit Quantization Limited Feedback in Multiple-Antenna Systems with One-Bit uantization Jianhua Mo and Robert W. Heath Jr. Wireless Networking and Communications Group The University of Texas at Austin, Austin, TX 787,

More information

Millimeter Wave Mobile Communication for 5G Cellular

Millimeter Wave Mobile Communication for 5G Cellular Millimeter Wave Mobile Communication for 5G Cellular Lujain Dabouba and Ali Ganoun University of Tripoli Faculty of Engineering - Electrical and Electronic Engineering Department 1. Introduction During

More information

What is the Role of MIMO in Future Cellular Networks: Massive? Coordinated? mmwave?

What is the Role of MIMO in Future Cellular Networks: Massive? Coordinated? mmwave? What is the Role of MIMO in Future Cellular Networks: Massive? Coordinated? mmwave? Robert W. Heath Jr. The University of Texas at Austin Wireless Networking and Communications Group www.profheath.org

More information

Interference of Chirp Sequence Radars by OFDM Radars at 77 GHz

Interference of Chirp Sequence Radars by OFDM Radars at 77 GHz Interference of Chirp Sequence Radars by OFDM Radars at 77 GHz Christina Knill, Jonathan Bechter, and Christian Waldschmidt 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must

More information

Modeling Mutual Coupling and OFDM System with Computational Electromagnetics

Modeling Mutual Coupling and OFDM System with Computational Electromagnetics Modeling Mutual Coupling and OFDM System with Computational Electromagnetics Nicholas J. Kirsch Drexel University Wireless Systems Laboratory Telecommunication Seminar October 15, 004 Introduction MIMO

More information

Dynamic Resource Allocation for Multi Source-Destination Relay Networks

Dynamic Resource Allocation for Multi Source-Destination Relay Networks Dynamic Resource Allocation for Multi Source-Destination Relay Networks Onur Sahin, Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn, New York, USA Email: osahin0@utopia.poly.edu,

More information

University of Bristol - Explore Bristol Research. Link to published version (if available): /VTCF

University of Bristol - Explore Bristol Research. Link to published version (if available): /VTCF Bian, Y. Q., & Nix, A. R. (2006). Throughput and coverage analysis of a multi-element broadband fixed wireless access (BFWA) system in the presence of co-channel interference. In IEEE 64th Vehicular Technology

More information

11 Beam pattern, wave interference

11 Beam pattern, wave interference 11 Beam pattern, wave interference In this lecture we will see how antenna beams can be patterned by using interference effects of fields radiated by multiple dipoles or dipole-like elements. Let s recall

More information