Anti-Jamming Message-Driven Frequency Hopping: Part I System Design

Size: px
Start display at page:

Download "Anti-Jamming Message-Driven Frequency Hopping: Part I System Design"

Transcription

1 Ati-Jammig essage-drive Frequecy Hoppig: Part I System Desig Lei Zhag Huahui Wag Togtog Li Abstract This is Part I of a two-part paper that cosiders atijammig system desig i wireless etworks based o messagedrive frequecy hoppig DFH, a highly efficiet spread spectrum techique. I this paper, we first aalyze the performace of DFH uder hostile jammig. It is observed that while DFH is robust uder strog jammig, it experieces cosiderable performace losses uder disguised jammig from sources that mimic the true sigal. To overcome this limitatio, we propose a ati-jammig DFH AJ-DFH system. The mai idea is to trasmit a secure ID sequece alog with the iformatio stream. The ID sequece is geerated through a cryptographic algorithm usig the shared secret betwee the trasmitter ad the receiver, it is the exploited by the receiver for effective sigal extractio. It is show that AJ-DFH ca effectively reduce the performace degradatio caused by disguised jammig, ad is also robust uder strog jammig. I additio, we exted AJ- DFH to the multi-carrier case, which ca icrease the system efficiecy ad jammig resistace sigificatly through jammig radomizatio ad frequecy diversity, ad ca readily be used as a collisio-free multiple access system. Part II of the paper focuses o the capacity aalysis of DFH ad AJ-DFH uder disguised jammig. I. INTRODUCTION I wireless etworks, oe of the most commoly used techiques for limitig the effectiveess of a oppoet s commuicatio is referred to as jammig, i which the authorized user s sigal is deliberately iterfered by the adversary. Alog with the wide spread of various wireless devices, especially with the advet of user cofigurable itelliget devices such as cogitive radios, jammig attack is o loger limited to battlefield or military related evets, but has become a urget ad serious threat to civilia commuicatios as well [] [4]. As a widely used spread spectrum techique, frequecy hoppig FH was origially desiged for secure commuicatio uder hostile eviromets [5] [9]. I covetioal FH, each user hops idepedetly based o its ow PN sequece, a collisio occurs wheever there are two or more users trasmittig over the same frequecy bad. aily limited by the collisio effect, the spectral efficiecy of the covetioal FH is very low [], []. To improve the spectral efficiecy, FH systems that exploit high-dimesioal modulatio scheme have bee studied i the literature [] [6]. However, the performace of these systems are still limited by the collisio effect, also kow as self-jammig. Lei Zhag is with arvell Semicoductor Ic., 5488 arvell L, Sata Clara, CA 9554, USA. lei@marvell.com. Huahui Wag is with AT &T Shao Laboratories, Florham Park, NJ 793, USA. huahui@research.att.com Togtog Li is with the Departmet of ECE, ichiga State Uiversity, East Lasig, I 4884, USA. togli@egr.msu.edu Recetly, a three-dimesioal modulatio scheme, kow as message-drive frequecy hoppig DFH, was proposed i []. The basic idea of DFH is that part of the message acts as the PN sequece for carrier frequecy selectio at the trasmitter. ore specifically, selectio of carrier frequecies is directly cotrolled by the ecrypted iformatio stream rather tha by a pre-selected pseudo-radom sequece as i covetioal FH. The most sigificat property of DFH is that: by embeddig a large portio of iformatio ito the hoppig frequecy selectio process, additioal iformatio trasmissio is achieved with o extra cost o either badwidth or power. I fact, trasmissio through hoppig frequecy cotrol adds aother dimesio to the sigal space, ad the resulted codig gai ca icrease the system spectral efficiecy by multiple times []. I this paper, we aalyze the performace of DFH uder hostile jammig. It is observed that: DFH is particularly powerful uder strog jammig scearios, ad outperforms the covetioal FH by big margis. The uderlyig argumet is that for DFH, eve if the sigal is jammed, strog jammig ca ehace the power of the jammed sigal ad hece icreases the probability of carrier detectio. Whe the system experieces disguised jammig, where the jammig is highly correlated with the sigal, ad has a power level close or equal to the sigal power, it is the difficult for the DFH receiver to distiguish jammig from the true sigal, resultig i performace losses. As will be show i part II of the paper, this is essetially due to the existece of symmetricity betwee the jammig iterferece ad the authorized sigal. To overcome the drawback of DFH, i this paper, we propose a ati-jammig DFH AJ-DFH scheme. The mai idea is to isert some sigal idetificatio ID iformatio durig the trasmissio process. This secure ID iformatio is geerated through the Advaced Ecryptio Stadard AES [7] usig the shared secret betwee the trasmitter ad the receiver. The ID iformatio ca be exploited by the receiver to locate the true carrier frequecy. oreover, protected by AES, it is computatioally ifeasible for malicious users to recover the ID sequece. The major differece with DFH is that: i AJ-DFH, we add shared radomess betwee the trasmitter ad the receiver to break the symmetricity betwee the jammig iterferece ad authorized sigal. ore specifically, i AJ- DFH, secure ID sigals are itroduced to distiguish the true iformatio chael from the disguised chaels ivoked by jammig iterferece. Our aalysis idicates that: comparig with DFH, AJ-DFH ca effectively reduce the performace degradatio caused by disguised jammig. At the same

2 time, its spectral efficiecy is very close to that of DFH, which is several times higher tha that of covetioal FH. Sigle carrier AJ-DFH ca be further exteded to multicarrier AJ-DFH C-AJ-DFH. It is observed that by exploitig secure group geeratio, C-AJ-DFH ca icrease the system efficiecy ad jammig resistace sigificatly through jammig radomizatio ad eriched frequecy diversity. By assigig differet carrier groups to differet users, C-AJ-DFH ca also be used as a collisio-free multiple access system. We further ivestigate ID costellatio desig ad its impact o the performace of AJ-DFH uder both oise jammig ad disguised jammig. Noise jammig, where the jammig is modeled as Gaussia oise, has bee widely adopted i literature [8] []. However, disguised jammig ca be much more harmful for most commuicatio systems. For AJ- DFH, the worst case disguised jammig is ID jammig, for which the jammer tries to mimic the ID sigal, ad seds symbols from the same costellatio as that of the ID sigal. We show that uder oise jammig, the detectio error probability is maily determied by the sigal to jammig ad oise ratio. I this case, for a give power costrait, costat modulus costellatio delivers the best results i terms of detectio error probability. Uder ID jammig, the situatio is more complex. I the ideal case whe the system is oisefree, icreasig the ID costellatio size ca icrease the ID ucertaity, hece reduce the probability of error. I this case, the ideal costellatio size is =. However, whe oise is preset, we prove that the detectio error probability coverges as goes to ifiity. I other words, there exists a threshold t, icreasig the costellatio size over t will result i little improvemet i error probability. This result justifies the use of practical, fiite size costellatios i AJ-DFH. This paper is orgaized as follows. I Sectio II, we itroduce the cocept of disguised jammig ad evaluate DFH uder hostile jammig. I Sectio III, the proposed AJ-DFH scheme is itroduced, followig by the extesio to the multicarrier case. ID costellatio desig is ivestigated i Sectio IV. Spectral efficiecy is aalyzed i Sectio V. Simulatio examples are provided i Sectio VI ad we coclude i Sectio VII. Part II of the paper [] focuses o the capacity aalysis of DFH ad AJ-DFH uder disguised jammig. II. ESSAGE-DRIVEN FREQUENCY HOPPING A BRIEF REVIEW I this sectio, we briefly review the message-drive frequecy hoppig DFH system, ad evaluate its performace uder differet jammig scearios. A. System Descriptio The basic idea of DFH is that a major part of the iformatio is trasmitted through carrier frequecy selectio i the hoppig process. I other words, the hoppig patter is determied by the ecrypted message iformatio itself. Let N c be the total umber of available chaels, with {f, f,, f Nc } beig the set of all available carrier frequecies. The umber of bits used to specify a idividual chael here is B c = log N c, where x deotes the largest iteger less tha or equal to x. Without loss of geerality, we assume that N c = Bc. Let Ω be the selected costellatio that cotais symbols, each symbol i the costellatio represets B s = log bits. Let T s ad T h deote the symbol period ad the hop duratio, respectively, the the umber of hops per symbol period is give by N h = Ts T h. We assume that N h is a iteger larger tha or equal to oe. X Ecrypted Iformatio Sequece Fig.. Carrier Bit Vectors X, X, X, Nh S/P Partitioig X a Iformatio block structure X,, X,, N h Carrier Bits Y Ordiary Bits Carrier Frequecy Selectio Basebad Sigal Geeratio b Trasmitter Trasmitter structure of DFH. f,, f,, N h mt Ordiary Bit Vector Y odulatio The trasmitter structure of DFH is show i Fig.. We start by dividig the ecrypted iformatio stream ito blocks of legth L N h B c + B s. Each block is parsed ito N h B c carrier bits ad B s ordiary bits. The carrier bits are used to determie the hoppig frequecies, ad the ordiary bits are mapped to a symbol which is trasmitted through the selected chaels successively. Deote the th block by X, as illustrated i Fig. a. Note that i DFH, the whole block X is trasmitted withi oe symbol period. At the receiver, the trasmittig frequecy is captured usig a filter bak as i the FSK receiver rather tha usig the frequecy sythesizer. To detect the active frequecy bad, a bak of N c badpass filters BPF, each cetered at f i i =,,, N c, is deployed at the receiver frot ed, followed by a demodulator equipped with matched filter ad sampler. At each hoppig period, the ordiary bits ad the correspodig carrier frequecy ca be determied usig the miimum distace criterio. Jammig detectio algorithm ca be icorporated at the receiver to improve the system performace []. B. Performace of DFH uder Hostile Jammig First, we itroduce the cocept of disguised jammig. Disguised jammig deotes the case where the jammig is highly correlated with the sigal, ad has a power level close or equal to the sigal power. ore specifically, let st ad Jt be the user s sigal ad jammig iterferece, respectively. Defie ρ = T Ps P J t st t stj tdt as the ormalized cross-correlatio coefficiet of st ad Jt over the time period [t, t ], where T = t t, P s = t T t st dt ad P J = t T t Jt dt. We say that Jt is a disguised jammig to sigal st over [t, t ] if

3 3 Jt ad st are highly correlated. ore specifically, ρ > ρ, where ρ is a applicatio-orieted, predefied correlatio threshold. The jammig to sigal ratio JSR is close to db. ore specifically, P J P s < ϵ P, where ϵ P is a applicatioorieted, predefied jammig-to-sigal ratio threshold. I this paper, we cosider disguised jammig over each hoppig period, that is, [t, t ] = [mt h, m + T h ] for some iteger m. I the worst case, the costellatio Ω ad the pulse shapig filter of the iformatio sigal are kow to the jammer, the jammer ca the disguise itself by trasmittig symbols from Ω over a fake chael usig the same power level. That is, Jt = e iθ st for some phase θ. 3 covetioal FH: Disguised Jammig covetioal FH: Noise Jammig DFH: Disguised Jammig DFH: Noise Jammig this paper, we itroduce the ati-jammig DFH AJ-DFH system. Remark: It is iterestig to ote that i the primary user emulatio PUE attack i cogitive radio etworks, the malicious user mimics the primary user s sigal i fallow bads to preempt spectrum resources that could have bee used by legitimate secodary users [3] [5]. This implies that disguised jammig ca be used to iterfere the authorized user s sigal directly as discussed i this paper, ad ca also be used to distract other users such as i PUE attacks. Similar techiques ca be used to distract/prevet eavesdroppig as well. III. ANTI-JAING DFH AJ-DFH A. Trasmitter Desig The mai idea here is to isert some sigal idetificatio ID iformatio durig the trasmissio process. This secure ID iformatio is geerated through a cryptographic algorithm usig the shared secret betwee the trasmitter ad the receiver, ad ca be used by the receiver to locate the true carrier frequecy. Our desig goal is to reiforce jammig resistace without sacrificig too much o spectral efficiecy JSRdB Ecrypted Iformatio Iitial Vector, Key Chael Codig PN Sequece Geeratio Ecryptio Secure ID Geeratio Iterleavig Y X Symbol apper Carrier Frequecy Selectio s Basebad Sigal Geeratio f X odulatio st Fig.. Performace compariso uder sigle bad jammig, /N = db, N c = 64, N h = 3. DFH uses QPSK modulatio ad covetioal FH uses 4-FSK modulatio. I this case, the spectral efficiecy of DFH is roughly 3.3 times that of covetioal FH. We compare the performace of DFH with that of covetioal FH i AWGN chaels, uder both oise jammig ad disguised jammig. The result with o chael codig is show i Fig.. The jammig-to-sigal ratio is defied as JSR = P J P s, where P J ad P s deote the jammig power ad sigal power per hop, respectively. As ca be see, DFH delivers excellet performace uder strog jammig scearios i.e., JSR, ad outperforms covetioal FH by big margis. Note that i this case, the spectral efficiecy of DFH is 3.3 times that of covetioal FH. The uderlyig argumet is that: whe the jammig power is much stroger tha the sigal power, jammig ca be easily distiguished from the true sigal whe they are i differet bads; eve if jammig collides with the sigal, the true carrier frequecy ca still be detected as jammig ca eve ehace the power of the jammed chael ad hece icreases the probability of carrier detectio. For covetioal FH, o the other had, oce the jammig power reaches a certai level, the system performace is maily limited by the probability that the sigal is jammed. However, we also otice that uder disguised jammig, the system experieces cosiderable performace losses, sice it is difficult for the DFH receiver to distiguish disguised jammig from the true sigal. The sesitivity of DFH to disguised jammig is iflueced by the SNR. To ehace the jammig resistace of DFH uder disguised jammig, i Fig. 3. AJ-DFH trasmitter structure. The trasmitter structure of AJ-DFH is illustrated i Fig. 3. Each user is assiged a secure ID sequece. We propose to replace the ordiary bits i DFH with the ID bits. I order to prevet impersoate attack, each user s ID sequece eeds to be kept secret from the malicious jammer. The ID sequece ca be geerated usig two steps as i [6]: i Geerate a pseudo-radom biary sequece usig a liear feedback shift registerlfsr; ii Take the output of LFSR as the plaitext, ad feed it ito the Advaced Ecryptio Stadard AES [7] ecrypter. The AES output is the used as our ID sequece. Recall that B c = log N c ad B s = log, where N c is the umber of chaels, ad is the costellatio size. We divide the source iformatio ito blocks of size B c ad divide the ID sequece ito blocks of size B s. Deote the th source iformatio block ad ID block as X ad Y, respectively. Let f X be the carrier frequecy correspodig to X, ad s the symbol correspodig to ID bit-vector Y. It should be oted that the ID symbol is refreshed at each hoppig period. The trasmitted sigal ca the be represeted as st = { } Re s gt T h e jπf X t = Re = N c { = i= α i, s gt T h e jπfit }, where T h is the hop duratio, gt is the pulse shapig filter, { if fx = f i, α i, = otherwise.

4 4 B. Receiver Desig The receiver structure for AJ-DFH is show i Fig. 4. For each hop, the received sigal is first fed ito the badpass filter bak. The output of the filter bak is demodulated, ad the used for carrier bits i.e., the iformatio bits detectio. Fig. 4. r t BPF, f t BPF, f t BPF, fnct Iitial Vector, Key Demodulatio Secure ID Geeratio AJ-DFH receiver structure. Y Sigal Detectio & Extractio s Symbol apper Recovered Iformatio Demodulatio: Let st, Jt ad t deote the ID sigal, the jammig ad the oise, respectively. For AWGN chaels, the received sigal ca be represeted as rt = st + Jt + t. 3 For i =,,, N c, the output of the ith ideal badpass filter f i t is r i t = f i t rt. For demodulatio, r i t is first shifted back to the basebad, ad the passed through a matched filter. At the th hoppig period, for i =,, N c, the sampled matched filter output correspods to chael i ca be expressed as r i, = α i, s + β i, J i, + i,, 4 where s, J i, ad i, correspod to the ID symbol, the jammig iterferece ad the oise, respectively; α i,, β i, {, } are biary idicators for the presece of ID sigal ad jammig, respectively. Note that the true iformatio is carried i α i,. Sigal Detectio ad Extractio: Sigal detectio ad extractio is performed for each hoppig period. For otatio simplicity, without loss of geerality, we omit the subscript i 4. That is, for a particular hoppig period, 4 is reduced to: r i = α i s + β i J i + i, for i =,, N c. 5 Defie r = r,..., r Nc, α = α,..., α Nc, β = β,..., β Nc, J = J,..., J Nc ad =,..., Nc, the 5 ca be rewritte i vector form as: r = sα + β J +. 6 For sigle-carrier AJ-DFH, at each hoppig period, oe ad oly oe item i α is ozero. I this case, there are N c possible iformatio vectors: α =,,...,, α =,,...,,, α Nc =,,...,. If α k is selected, ad the biary expressio of k is b b b Bc, with B c = log N c, the the estimated iformatio sequece is b b b Bc. At each hoppig period, the iformatio symbol α, or equivaletly, the hoppig frequecy idex k, eeds to be estimated based o the received sigal ad the secure ID iformatio which ca be regeerated at the receiver through the shared secret. Whe the iput iformatio vectors are equiprobable, that is, P α i = N c for i =,,..., N c, the AP maximum a posteriori probability detector is reduced to the L maximum likelihood detector. For the L detector, the hoppig frequecy idex ˆk ca be estimated as: ˆk = arg max i N c P r{r α i }. 7 Whe,..., Nc, J,..., J Nc are all statistically idepedet, r,..., r Nc are also idepedet. I this case, the joit L detector i 7 ca be decomposed as: ˆk = arg max i N c j= = arg max = arg max N c P r{r j α i } N c i N c j=,j i N c i N c j= P r{r j α j = } P r{r i α i = } P r{r j α j = } P r{r i α i = } P r{r i α i = }. 8 Sice N c j= P r{r j α j = } is idepedet of i, 8 ca be further reduced to the likelihood ratio test ˆk = arg max i N c P r{r i α i = } P r{r i α i = }, 9 where P r{r i α i = } = β i P r{r i α i =, β i }P β i ad P r{r i α i = } = β i P r{r i α i =, β i }P β i, with β i {, }. I the ideal case whe β i is kow for i =,, N c, the L detector above ca be further simplified. If we assume that,, Nc are i.i.d. circularly symmetric Gaussia radom variables of zero-mea ad variace, ad J,, J Nc are i.i.d. circularly symmetric Gaussia radom variables of zero-mea ad variace J i, the it follows from 5 ad 9 that r i ˆk r i s = arg max, i N c where i = β ij i +. Note that i is geerally ukow. If we replace the overall iterferece power i with the istataeous power of the received sigal r i, the it follows from that: i r i s ˆk = arg mi i N c r i. For more tractable theoretical aalysis, we ca replace r i with the average sigal power observed i chael i, P i = E{ r i }. Defie Z i r i s Pi, the we have ˆk = arg mi Z i. i N c Discussios: I the covetioal FH, a frequecy sythesizer is used at the receiver to capture the trasmitted sigal. The strict requiremet o frequecy sychroizatio turs out to be a sigificat challege i FH system desig, especially for fast hoppig systems. I DFH ad AJ-DFH, a badpass filter bak is used to capture the hoppig frequecy. The complexity is similar to usig multiple FSK receivers i parallel. It is observed that: Comparig with covetioal FH, DFH based systems relax the frequecy sychroizatio

5 5 problem. At the same time, we show that if a badpass filter bak is used by a adversary, the the covetioal FH sigal as well as the PN sequece ca be easily captured, makig it fragile to follower jammig ad resultig i total loss of the trasmissio. I AJ-DFH, the ecrypted iformatio is trasmitted through hoppig frequecy cotrol, this is like usig the oe-time key pad, makig it impossible for the adversary to lauch follower jammig. Comparig with FSK, which has zero capacity uder disguised jammig, AJ- DFH is much more efficiet ad robust uder disguised jammig. C. Extesio to ulti-carrier AJ-DFH For more efficiet spectrum usage ad robust jammig resistace, i this sectio, we exted the cocept of DFH to multi-carrier AJ-DFH C-AJ-DFH. The idea is to split all the N c chaels ito N g o-overlappig groups, ad each subcarrier hops withi the assiged group based o the AJ-DFH scheme. To esure hoppig radomess of all the subcarriers, the groups eed to be reorgaized or regeerated securely after a pre-specified period, amed group period. A secure subgroup assigmet algorithm ca be developed as what we did i [7], to esure that: i Each subcarrier hops over a ew group of chaels durig each group period, so that it evetually hops over all the available chaels i a pseudoradom maer; ii Oly the legitimate receiver ca recover the trasmitted iformatio correctly. ulti-carrier AJ-DFH without Diversity: I this case, each subcarrier trasmits a idepedet bit stream. The spectral efficiecy of the AJ-DFH system ca be icreased sigificatly. Let B c = log N c ad B g = log N g, the the umber of bits trasmitted by the C-AJ-DFH withi each hoppig period is B C = B c B g N g = B c log N g N g. B C is maximized whe B g = B c or B g = B c, which results i B C = Bc. Note that the umber of bits trasmitted by the AJ-DFH withi each hoppig period is B c, it ca be see that B C > B c as log as B c >. Take N c = 56 for example, the the trasmissio efficiecy of AJ-DFH ca be icreased by B C B c = B c B c = 6 times. ulti-carrier AJ-DFH with Diversity: Uder multibad jammig, diversity eeds to be itroduced to the AJ- DFH system for robust jammig resistace. A atural solutio to achieve frequecy diversity is to trasmit the same or correlated iformatio through multiple subcarriers. The umber of subcarriers eeded to covey the same iformatio varies i differet jammig scearios. Geerally, the umber of correlated sigal subcarriers should ot be less tha the umber of jammed bads. At the receiver, the received sigals from differet diversity braches ca be combied for joit sigal detectio [8] [3]. As will be show i Sectio VI, C-AJ-DFH ca icrease the system efficiecy ad jammig resistace sigificatly through jammig radomizatio ad frequecy diversity. oreover, by assigig differet carrier groups to differet users, C-AJ-DFH ca also be used as a collisiofree multiple access system. IV. ID CONSTELLATION DESIGN AND ITS IPACT ON SYSTE PERFORANCE For AJ-DFH, ID sigals are itroduced to distiguish the true iformatio chael from disguised chaels ivoked by jammig iterferece. I this sectio, we ivestigate ID costellatio desig ad its impact o the performace of AJ- DFH uder various jammig scearios. A. Desig Criterio ad Jammig Classificatio The geeral desig criterio of the ID costellatio is to miimize the probability of error uder a give sigal power. Uder this criterio, the followig questios eed to be aswered: How does the size of the costellatio impact the system performace? How does the type or shape of the costellatio ifluece the detectio error? Which type should we use for optimal performace? I this sectio, we will try to address these questios uder differet jammig scearios. I literature, jammig has geerally bee modeled as Gaussia oise [8] [], referred as oise jammig. Recall that disguised jammig deotes the jammig iterferece which has similar power ad spectral characteristics as that of the true sigal. For AJ-DFH, whe the ID costellatio is kow to, or ca be guessed by the jammer, the jammer ca the disguise itself by sedig symbols take from the same costellatio over a differet or fake chael. I this case, it could be difficult for the receiver to distiguish the true chael from the disguised chael, leadig to high detectio error probability. We refer to this kid of jammig as ID jammig or ID attack. ID jammig is the worst case disguised jammig for AJ-DFH. B. Costellatio Desig uder Noise Jammig Without loss of geerality, we cosider the case where the ID symbol is trasmitted through chael, i.e., α = α,, α Nc =,,,. 3 Recall that for i =,, N c, r i = α i s + β i J i + i. Let ñ i = β i J i + i, ad deote its variace as i = β i J i +, which may vary from chael to chael. Followig the defiitio i, we have Z = ñ, ad Z i = ñ i s s + i for i N c. It ca be see that Z is a Rayleigh radom variable with probability desity fuctio PDF p Z z = z where = radom variable with PDF z e, z >, 4 s +. For i N c, Z i is a Ricia p Zi z i = z z i e i +ν zi ν I, z i >, 5 where ν = s i, = ad I x is the modified Bessel fuctio of the first kid with order zero. Accordig to, the carrier ca be correctly detected if ad oly if Z < Z i for all i N c. Assumig that

6 6 the symbols i costellatio Ω are equally probable, the the carrier detectio error probability is give by P e = P r{z < Z,..., Z < Z Nc s}p S s = N c P r{z i > z s, Z = z }p Z z dz. i= Note that Z,, Z Nc are i.i.d. Ricia radom variables, the it follows from 4 ad 5 that P e = N c Q s, z i s + z e s z dz, 6 where Q is the arcum Q-fuctio [3]. We have the followig result: Propositio : Assumig the true chael idex is k. Uder oise jammig, a upper boud of the carrier detectio error probability P e ca be obtaied as: P U e = i= + k s + k e s s + k where m = arg max{ l } for l N c, l k. Proof: See Appedix A. Assumig the true chael idex is k, let x = s x +x x+ e ζ k ad ax = x+ N c. The Pe U ca be writte as Pe U = ax with ζ = k / m. Note that whe x, ax N c x +x x+ e ζ x+ ãx. It ca be show that whe x, ãx is a covex fuctio. By Jese s iequality [3], we have Pe U s ã ã k k s Ps = ã k 8 The equality is achieved if ad oly if s = P s for all s Ω. This implies that: uder the coditio that the sigal. to jammig ad oise ratio over chael k satisfies s k, Pe U is approximately miimized whe the costellatio is costat modulus, that is, s = P s for all s Ω. A ituitive explaatio for this result is that the sigal power i costat modulus costellatios always equals to the maximal sigal power available. oreover, it ca be see that Pe U is idepedet of the costellatio size, but is oly a fuctio of P s /k. Next, we will ivestigate how the costellatio size affects the system performace uder ID attacks. C. Costellatio Desig uder ID Jammig Clearly, uder ID attacks, the ucertaity of the ID symbol eeds to be maximized. Uder the assumptio that all the symbols i a costellatio Ω of size are all equally probable, the the average symbol etropy Hs = log = log bits. 9 I the ideal case whe the chael is oise-free, the optimal costellatio size would be =. However, whe oise is preset, a larger also implies there is a larger probability for a ID symbol to be mistake for its eighborig symbols. ore specifically, we have the followig result: Theorem : For a give SNR ad assumig PSK costellatio is utilized, uder ID jammig, the carrier detectio error probability P e is a fuctio of costellatio size ad lim P e = P e. I other words, for ay give ϵ >, there always exists a t such that for all > t, P e P e < ϵ. The expressio of P e ad the proof of the theorem ca be foud i Appedix B. This theorem essetially says that: for a give SNR, due to the oise effect, icreasig the costellatio size over a threshold t will result i little improvemet i detectio error probability. This result justifies the use of fiite costellatio i AJ-DFH. V. SPECTRAL EFFICIENCY ANALYSIS Nc The spectral efficiecy ν is defied as the ratio of the m s + k, iformatio bit rate R b to the trasmissio badwidth W t, i.e., ν = R b W 7 t. I this sectio, we will aalyze ad compare the spectral efficiecy of the existig ad proposed frequecy hoppig schemes, icludig covetioal FH, DFH ad C-AJ-DFH. We start with the sigle-user case. Recall that T s ad T h deotes the symbol period ad the hoppig duratio, respectively; N h = T s /T h is the umber of hops per symbol period. For fair compariso, we assume that all systems have: i The same umber of available chaels N c ; ii The same hoppig period T h to esure the hoppig chaels have the same badwidth W c = /T h ; iii The same frequecy spacig f betwee two adjacet subcarriers, where f /T h is chose to avoid iter-carrier iterferece. Note that uder these assumptios, all systems have the same total badwidth W t = N c f + W c. For covetioal FH usig FSK modulatio, log bits are trasmitted durig each symbol period. The bit rate of covetioal FH ca be calculated as R b = log T h N h, ad the correspodig spectral efficiecy ca be obtaied as ν = R b W t = log T h N h W t. The bit rate ad spectral efficiecy of other frequecy hoppig schemes ca be obtaied similarly. The results are listed i Table I. = log T s TABLE I THE BIT RATE R b AND SPECTRAL EFFICIENCY ν COPARISON IN THE SINGLE-USER CASE covetioal FH DFH AJ-DFH C-AJ-DFH R b b/s log T h N h N h B c +B s N h T h B c T h T h ν b/s/hz log T h N h W t N h B c+b s T h N h W t B c T h W t B c log N g N g B c log N g N g T h W t Next, we cosider the more geeral multiuser case. The multiple access scheme for covetioal FH, amely FHA, was proposed i [6]. The multiple access extesio of DFH, deoted as E-DFH, has bee aalyzed i []. Due to the variability i multiple access system desig, a closed-form expressio of the spectral efficiecy is hard to obtai. Here we

7 7 compare the total iformatio bits allowed to be trasmitted by each system uder the same ad badwidth requiremets, ad illustrate the spectral efficiecy compariso through the followig example. Let N u deote the umber of users ad we choose the umber of chaels be N c = 64 i.e., B c = 6. For C- AJ-DFH, we choose N g = N u = 4; For E-DFH, we choose 8-PSK to modulate B s = 3 ordiary bits ad N g = N u = 4, N h = 3. For FHA, we choose 64-FSK modulatio, N h = 3, ad cosider N u =, 3, 4, respectively. The required is 4. Fig. 5 depicts the performace of these multiuser systems. From Fig. 5a, it ca be see that both C-AJ-DFH ad E-DFH achieve the desired at N 6.5dB. From Fig. 5b, it ca be observed that: due to severe collisio effect amog differet users, FHA ca oly N accommodate up to users at 6.5dB for the desired. I this particular example, the spectral efficiecy of both C-AJ-DFH ad E-DFH are 4 times ad 5 times that of FHA. For example, for /N = 5dB, we ca choose t = 3. This example demostrates the theoretical result i Theorem. Based o the result of Example, i the followig examples, we choose to use 3-PSK to modulate the ID sigal of AJ- DFH ad C-AJ-DFH. 3 /N =5dB /N =db /N =5dB Noise free Costellatio size Fig. 6. Example : The performace of AJ-DFH with differet costellatio size, uder sigle-bad ID jammig. 3 4 C AJ DFH E DFH /N db a E-DFH ad C-AJ-DFH, N u = N u = N u =3 N u = /N db b FHA Fig. 5. Performace compariso of C-AJ-DFH, E-DFH ad FHA i the multiuser case. Here N u deotes the umber of users i the system. Based o our aalysis above, as well as the performace aalysis of AJ-DFH uder various jammig attacks i Sectio VI, it ca be show that: while AJ-DFH is much more robust tha DFH uder various jammig attacks, its spectral efficiecy is very close to that of DFH, which is several times higher tha that of covetioal FH. A comprehesive capacity aalysis for DFH ad AJ-DFH uder disguised jammig is provided i Part II of the paper []. VI. SIULATION RESULTS I this sectio, simulatio examples are provided to illustrate the performaces of the proposed AJ-DFH ad C- AJ-DFH schemes uder various jammig scearios. For all the systems cosidered i the followig examples, we assume the total umber of available chaels is N c = 64, that is, B c = 6. Example : Impact of the ID costellatio size I this example, we cosider the impact of the ID costellatio size o the performace of AJ-DFH uder sigle-bad ID jammig. From Fig. 6, it ca be see that i the ideal case where the system is oise-free, the performace of AJ-DFH improves cotiuously as the costellatio size icreases. However, whe oise is preset, the coverges oce the costellatio size reaches a certai threshold t. Example : Performace compariso uder sigle bad jammig I this example, we cosider both oise jammig ad disguised jammig. SNR is take as /N = db ad Jammig-to-Sigal Ratio JSR is defied as the ratio of the jammig power to sigal powers durig oe hoppig period. For covetioal FH, 4-FSK modulatio scheme is used ad we assume that the adjacet frequecy toes i 4-FSK correspod to the ceter frequecies of the adjacet DFH chaels. For DFH, QPSK is used to modulate ordiary bits ad the umber of hops per symbol period is N h = 3. From Fig. 7, it ca be observed that AJ-DFH ca effectively reduce the performace degradatio caused by disguised jammig, while remaiig robust uder oise jammig. Note that JSR=dB uder disguised jammig correspods to the ID jammig for AJ-DFH. It ca also be see that the performace of AJ-DFH improves sigificatly whe the jammig power differs from the sigal power. This implies that ucertaity i the sigal power is aother dimesio i combatig ID jammig. Fig covetioal FH: Disguised Jammig covetioal FH: Noise Jammig DFH: Disguised Jammig DFH: Noise Jammig AJ DFH: Disguised Jammig AJ DFH: Noise Jammig JSRdB Example : Performace compariso uder sigle bad jammig. Example 3: Performace compariso uder multi-bad oise jammig ad disguised jammig I this example,

8 8 /N = db. For disguised jammig, the jammer takes symbols radomly from the same costellatio as the ID sigal. The jammed bads are selected idepedetly ad radomly. For C-AJ-DFH without diversity, the chaels are divided ito 3 groups to maximize the spectral efficiecy; for C-AJ-DFH with diversity, each symbol is trasmitted simultaeously over 4 subcarriers to achieve frequecy diversity. The equal gai combiatio scheme is adopted for the joit detectio metric at the receiver. From Fig. 8 ad Fig. 9, it ca be see that C-AJ-DFH delivers much better performace tha sigle carrier AJ-DFH uder multi-bad jammig. Fig. 8. Fig. 9. jammig DFH covetioal FH AJ DFH C AJ DFH: without diversity C AJ DFH: with diversity JSRdB Example 3: Performace compariso uder -bad oise jammig. 4 DFH covetioal FH AJ DFH C AJ DFH: without diversity C AJ DFH: with diversity JSRdB Example 3: Performace compariso uder -bad disguised whe oise is preset, the detectio error probability coverges as the costellatio size goes to ifiity. oreover, AJ-DFH ca be exteded to C-AJ-DFH by allowig simultaeous multi-carrier trasmissio. With jammig radomizatio ad eriched frequecy diversity, C-AJ-DFH ca icrease the system efficiecy ad jammig resistace sigificatly, ad ca readily be used as a collisio-free multiple access scheme. ACKNOWLEDGEENT This work was supported i part by the Natioal Sciece Foudatio uder grats CNS-7468, CNS-783, CNS- 76, ad CNS-39. It follows from 6 that P e = APPENDIX A PROOF OF PROPOSITION N c Q s, z p Z z dz l l= s, z p Z z dz m Q Nc where m = arg max l Nc {l }. The iequality follows from the fact that for fixed s ad z, Q l s, z is a mootoically decreasig fuctio with respect to l. The equality ca be achieved whe = = Nc. Assume N c. For N c =, it is easy to show that P e = Pe U with m =. Note that for fixed s ad m, Q m s, z = P r{z m > z s, z = Z } is a fuctio of z. For N c >, fx = x Nc is covex whe x >. By Jese s iequality, we obtai Q N c s, z p Z z dz m [ ] Nc P r{z m > z s, Z = z }p Z z dz = [P r{z < Z m s}] N c. 3 Accordig to [33], P r{z < Z m s} ca be calculated as VII. CONCLUSIONS I this paper, we proposed a efficiet ati-jammig scheme, AJ-DFH, based o the message-drive frequecy hoppig techique. It was show that by isertig a secure ID sequece i trasmissio, AJ-DFH ca effectively reduce the performace degradatio caused by disguised jammig. The impact of ID costellatio desig o system performace was ivestigated uder both oise jammig ad ID jammig. It was proved that for a give power costrait, costat modulus costellatio delivers the best results uder oise jammig i terms of detectio error probability; While uder ID jammig, P r{z < Z m s} = s + Followig -4, P e s + e s s + m s +. 4 e s s + Nc m s + = P U e for N c >. 5 Overall, P e P U e for N c..

9 9 APPENDIX B PROOF OF THEORE Note that the system is uder ID attack. If the power of the -ary PSK costellatio is P s, the the sigal ad jammig symbol ca be writte as s = P s e j πm s, J j = P s e j πm J respectively, where = ad m s, m J. Without loss of geerality, we assume that: i Both the ID ad jammig take the symbols i Ω with equal probability /; ii The sigal is trasmitted i chael α = ad chael j is jammed β j =. Whe j =, jammig collides with the ID sigal. I this case, r = s + J + ad r l = l for l =,..., N c. J We have Z = + ad Z l = l s s+j +, where is the oise variace. The detectio error probability i this case ca be calculated as P e = [P r{z < Z s, J, z }] N c J Ω p Z z dz. 6 Note that Z is a Ricia radom variable with PDF p Z z = z Ps s+j +, = e z +ν s+j + I zν, where ν = ad Z l s are i.i.d. Ricia radom variables with ν = P s, =. The 6 ca be writte as i 7, where κ m s m J mod is uiformly distributed over [, ]. Whe j =,..., N c, jammig does ot collide with ID sigal. I this case, r = s +, r j = J j + j ad r l = l for l =,..., N c, l j. We have Z = Z j = Jj s+j Ps + probability i this case ca be calculated as P e = Ps + ad Z l = l s. The detectio error J j Ω P r{z j > z s, J j, z } [P r{z l > z s, z }] Nc p Z z dz. 8 Note that Z is a Rayleigh radom variable with PDF p Z z = z e z, where = Ps + P s+, Z j is a Ricia radom variable with ν = J j s, =, P s + ad Z l s are i.i.d. Ricia radom variables with ν = P s, =. The 8 ca be writte as i 9. The overall detectio error probability i oisy eviromet is give as P e = P r{j = }P e + P r{ j N c }P e = N c P e + N c N c P e. 3 Whe P s is fixed, it follows from 7 ad 9 that P e is a fuctio of give as P e = κ= b πκ, 3 where bx is give i 3. As approaches ifiity, P e coverges. I fact, we have, P e = lim P b πκ π e = lim π = π = π b lim κ= π κ= πκ π bxdx. 33 Note that bx is the detectio error probability whe the agle betwee the sigal symbol ad the jammig symbol is x, hece bx ad we have P e = π π bxdx. 34 That is: ϵ >, there always exists a iteger t such that > t, P e P e < ϵ. REFERENCES [] A. pitziopoulos, D. Gavalas, C. Kostatopoulos, ad G. Patziou, A survey o jammig attacks ad coutermeasures i WSNs, IEEE Commu. Surveys Tuts., vol., o. 4, pp. 4 56, 9. [] H. Yag, F. Ricciato, S. Lu, ad L. Zhag, Securig a wireless world, Proc. IEEE, vol. 94, o., pp , Feb. 6. [3] W. Xu, W. Trappe, Y. Zhag, ad T. Wood, The feasibility of lauchig ad detectig jammig attacks i wireless etworks, i Proc. AC It. Symp. obile Ad Hoc Networkig Comput. AC, 5, p. 57. [4]. K. Simo, J. K. Omura, R. A. Scholtz, ad B. K. Levitt, Spread Spectrum Commuicatios Hadbook. cgraw-hill, 994. [5] G. Cooper ad R. Nettleto, A spread spectrum techique for high capacity mobile commuuzatio, IEEE Tras. Veh. Techol., vol. 7, pp , Nov [6] A. Viterbi, A processig satellite traspoder for multlple access by low rate mobile users, i Proc. Digital Satellite Commu. Cof., otreal, Caada, Oct 978. [7]. Simo ad A. Polydoros, Coheret detectio of frequecy-hopped quadrature modulatios i the presece of jammig part I: QPSK ad QASK modulatios, IEEE Tras. Commu., vol. 9, pp , Nov 98. [8] R. Pickholtz, D. Schillig, ad L. ilstei, Theory of spread-spectrum commuicatios: A tutorial, IEEE Tras. Commu., vol. 3, o. 5, pp , ay 98. [9]. Pursley ad W. Stark, Performace of reed-solomo coded frequecy-hop spread-spectrum commuicatios i partial-bad iterferece, IEEE Tras. Commu., vol. 33, pp , Aug 985. [] K. Choi ad K. Cheu, Performace of asychroous slow frequecyhop multiple-access etworks with FSK modulatio, IEEE Tras. Commu., vol. 48, o., pp , Feb. [] Q. Lig ad T. Li, essage-drive frequecy hoppig: Desig ad aalysis, IEEE Tras. Wireless Commu., vol. 8, o. 4, pp , April 9. [] L.-L. Yag ad L. Hazo, Overlappig -ary frequecy shift keyig spread-spectrum multiple-access systems usig radom sigal sequeces, IEEE Tras. Veh. Techol., vol. 48, o. 6, pp , Nov 999. [3] S. Glisic, Z. Nikolic, N. ilosevic, ad A. Pouttu, Advaced frequecy hoppig modulatio for spread spectrum WLAN, IEEE J. Sel. Areas Commu., vol. 8, o., pp. 6 9, Ja. [4] J. Cho, Y. Kim, ad K. Cheu, A ovel frequecy-hoppig spreadspectrum multiple-access etwork usig -ary orthogoal Walsh sequece keyig, IEEE Tras. Commu., vol. 5, o., pp , Nov. 3. [5] K. Choi ad K. Cheu, aximum throughput of FHSS multiple-access etworks usig FSK modulatio, IEEE Tras. Commu., vol. 5, pp , ar 4. [6] Y. Kim, K. Cheu, ad K. Yag, A badwidth-power efficiet modulatio scheme based o quaterary quasi-orthogoal sequeces, IEEE Commu. Lett., vol. 7, o. 7, July 3.

10 P e = J Ω e s+j + z +P s = [ e κ= Q N c Ps, s + J + z z z I Ps s + J + dz Ps πκ +cos + Q N c Ps ], z z P s I z z [ Ps P s + cos πκ + cos πκ + P s ] + dz, 7 P e = Ps + Q J j s, z J Ω Q Nc Ps, Ps + z z e Ps+ z dz = Q P s cos πκ, Ps + κ= z Q N c Ps, Ps + z z e Ps+ z dz. 9 bx = N c [ ] e Ps +cos x+ N c N c Q N c Q N c Ps z P s Ps, z, z I z [ ] Ps z + cos x + P s + cos x + P s dz Q Ps cos x, Ps + z Ps + z e Ps+ z dz. 3 [7] Advaced Ecryptio Stadard, FIPS-97, Natioal Istitute of Stadards ad Techology Std., Nov.. [8] J. Lee ad L. iller, Error performace aalyses of differetial phaseshift-keyed/frequecy-hoppig spread-spectrum commuicatio system i the partial-bad jammig eviromets, IEEE Tras. Commu., vol. 3, o. 5, pp , ay 98. [9] J. Kag ad K. Teh, Performace of coheret fast frequecy-hopped spread-spectrum receivers with partial-bad oise jammig ad AWGN, IEE Proc. Commu., vol. 5, o. 5, pp , Oct. 5. [] C. Esli ad H. Delic, Atijammig performace of space-frequecy codig i partial-bad oise, IEEE Tras. Veh. Techol., vol. 55, o., pp , arch 6. [] L. Zhag ad T. Li, Ati-jammig message-drive frequecy hoppig: Part II capacity aalysis uder disguised jammig, IEEE Tras. Wireless Commu.,, to appear. [] L. Zhag, J. Re, ad T. Li, Spectrally efficiet ati-jammig system desig usig message-drive frequecy hoppig, i Proceedigs of IEEE Iteratioal Coferece o Commuicatios, Ju. 9. [3] R. Che, J.-. Park, ad J. Reed, Defese agaist primary user emulatio attacks i cogitive radio etworks, IEEE Joural o Selected Areas i Commuicatios, vol. 6, o., pp. 5 37, 8. [4] H. Li ad Z. Ha, Dogfight i spectrum: Combatig primary user emulatio attacks i cogitive radio systems, part i: Kow chael statistics, IEEE Trasactios o Wireless Commuicatios, vol. 9, o., pp ,. [5], Dogfight i spectrum: Combatig primary user emulatio attacks i cogitive radio systems, part ii: Ukow chael statistics, IEEE Trasactios o Wireless Commuicatios, vol., o., pp ,. [6] T. Li, Q. Lig, ad J. Re, Physical layer built-i security aalysis ad ehacemet algorithms for CDA systems, EURASIP J. Wireless Commu. Networkig, vol. 7, pp. Article ID , 7 pages, 7. [7] L. Lightfoot, L. Zhag, ad T. Li, Secure collisio-free frequecy hoppig for OFDA based wireless etworks, EURASIP J. Advaces Sigal Process., vol. 9, 9. [8] R. Viswaatha ad K. Taghizadeh, Diversity combiig i FH/BFSK systems to combat partial bad jammig, IEEE Tras. Commu., vol. 36, o. 9, pp. 6 69, Sep 988. [9] J. Lee, L. iller, ad Y. Kim, Probability of error aalyses of a BFSK frequecy-hoppig system with diversity uder partial-bad jammig iterferece part II: Performace of square-law oliear combiig soft decisio receivers, IEEE Tras. Commu., vol. 3, o., pp. 43 5, Dec 984. [3] L. iller, J. Lee, ad A. Kadrichu, Probability of error aalyses of a BFSK frequecy-hoppig system with diversity uder partialbad jammig iterferece part III: Performace of a square-law selformalizig soft decisio receiver, IEEE Tras. Commu., vol. 34, o. 7, pp , Jul 986. [3] J. G. Proakis ad. Salehi, Digital Commuicatios, 5th ed. New York: cgraw-hill, 8. [3]. Kuczma, A Itroductio to the Theory of Fuctioal Equatios ad Iequalities: Cauchy s Equatio ad Jese s Iequality, d ed. Spriger, 9. [33] S. Stei, Uified aalysis of certai coheret ad ocoheret biary

11 commuicatios systems, IEEE Tras. If. Theory, vol., o., pp. 43 5, Ja 964. Lei Zhag received the B.S. ad.s. degrees i commuicatio egieerig i 5 ad 7, respectively, both from Xidia Uiversity, Xi a Chia. He received the Ph.D. degree i electrical ad computer egieerig i, from ichiga State Uiversity, East Lasig I. Dr. Zhag joied arvell Semicoductor i, ad is curretly workig i the area of mobile SOC desig ad verificatio. Huahui Wag received his B.S. degree i Electroics from Pekig Uiversity, Chia i, ad the.eg ad Ph.D degrees i Electrical Egieerig from Natioal Uiversity of Sigapore ad ichiga State Uiversity i 3 ad 6, respectively. Dr. Wag s research iterests ivolved various desig aspects of wireless commuicatio ad etworkig, icludig PHY layer system desig ad AC/higher lay protocol aalysis. From 7 to 8, he worked as a research egieer i LG/Zeith Electroics ad cotributed to the stadardizatio of the ew mobile DTV systems for the Uited States. From 9 to, he worked as a Research Associate at ichiga State Uiversity workig o cogitive radios ad ati-jammig systems. I, he joied AT&T Labs at Florham Park, NJ, where he is curretly a Seior ember of Techical Staff. His mai research activities are i the area of etwork plaig ad optimizatio for both UTS ad LTE systems. Togtog Li received her Ph.D. degree i Electrical Egieerig i from Aubur Uiversity. From to, she was with Bell Labs, ad had bee workig o the desig ad implemetatio of 3G ad 4G systems. Sice, she has bee with ichiga State Uiversity, where she is ow a Associate Professor. Dr. Li s research iterests fall ito the areas of wireless ad wired commuicatios, wireless security, iformatio theory ad statistical sigal processig. She is a recipiet of the Natioal Sciece Foudatio NSF CAREER Award 8 for her research o efficiet ad reliable wireless commuicatios. She served as a Associate Editor for IEEE Sigal Processig Letters from 7-9, ad a Editorial Board ember for EURASIP Joural Wireless Commuicatios ad Networkig from 4-. She is curretly servig as the Associate Editor for IEEE Trasactios o Sigal processig.

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Iformatio Trasmissio System Lab. Spread Spectrum Sigal for Digital Commuicatios Istitute of Commuicatios Egieerig Natioal Su Yat-se Uiversity Spread Spectrum Commuicatios Defiitio: The trasmitted

More information

Combined Scheme for Fast PN Code Acquisition

Combined Scheme for Fast PN Code Acquisition 13 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 6 8, 009, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +(0) 4059 4036138, Fax:

More information

Symbol Error Rate Evaluation for OFDM Systems with MPSK Modulation

Symbol Error Rate Evaluation for OFDM Systems with MPSK Modulation Symbol Error Rate Evaluatio for OFDM Systems with MPS Modulatio Yuhog Wag ad Xiao-Pig Zhag Departmet of Electrical ad Computer Egieerig, Ryerso Uiversity 35 Victoria Street, Toroto, Otario, Caada, M5B

More information

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA 1274 LETTER A Novel Adaptive Chael Estimatio Scheme for DS-CDMA Che HE a), Member ad Xiao-xiag LI, Nomember SUMMARY This paper proposes a adaptive chael estimatio scheme, which uses differet movig average

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

CHAPTER 8 JOINT PAPR REDUCTION AND ICI CANCELLATION IN OFDM SYSTEMS

CHAPTER 8 JOINT PAPR REDUCTION AND ICI CANCELLATION IN OFDM SYSTEMS CHAPTER 8 JOIT PAPR REDUCTIO AD ICI CACELLATIO I OFDM SYSTEMS Itercarrier Iterferece (ICI) is aother major issue i implemetig a OFDM system. As discussed i chapter 3, the OFDM subcarriers are arrowbad

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels Compariso of Frequecy Offset Estimatio Methods for OFDM Burst Trasmissio i the Selective Fadig Chaels Zbigiew Długaszewski Istitute of Electroics ad Telecommuicatios Pozań Uiversity of Techology 60-965

More information

The PAPR Reduction in OFDM System with the Help of Signal Mapping Scheme

The PAPR Reduction in OFDM System with the Help of Signal Mapping Scheme Iteratioal Joural o Applied Sciece ad Egieerig 27. 5, : 75-8 The PAPR Reductio i OFD System with the Help o Sigal appig Scheme Jyh-Horg We, 2, Gwo-Ruey Lee ad Cheg-Yig Yag 3 * The Istitute o Electrical

More information

SIDELOBE SUPPRESSION IN OFDM SYSTEMS

SIDELOBE SUPPRESSION IN OFDM SYSTEMS SIDELOBE SUPPRESSION IN OFDM SYSTEMS Iva Cosovic Germa Aerospace Ceter (DLR), Ist. of Commuicatios ad Navigatio Oberpfaffehofe, 82234 Wesslig, Germay iva.cosovic@dlr.de Vijayasarathi Jaardhaam Muich Uiversity

More information

Cancellation of Multiuser Interference due to Carrier Frequency Offsets in Uplink OFDMA

Cancellation of Multiuser Interference due to Carrier Frequency Offsets in Uplink OFDMA Cacellatio of Multiuser Iterferece due to Carrier Frequecy Offsets i Upli OFDMA S. Maohar, V. Tiiya, D. Sreedhar, ad A. Chocaligam Departmet of ECE, Idia Istitute of Sciece, Bagalore 56001, INDIA Abstract

More information

A Reduced Complexity Channel Estimation for OFDM Systems with Precoding and Transmit Diversity in Mobile Wireless Channels Hlaing Minn, Dong In Kim an

A Reduced Complexity Channel Estimation for OFDM Systems with Precoding and Transmit Diversity in Mobile Wireless Channels Hlaing Minn, Dong In Kim an A Reduced Complexity Chael Estimatio for OFDM Systems with Precodig ad Trasmit Diversity i Mobile Wireless Chaels Hlaig Mi, Dog I Kim ad Vijay K. Bhargava Departmet of Electrical ad Computer Egieerig,

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

4. INTERSYMBOL INTERFERENCE

4. INTERSYMBOL INTERFERENCE DATA COMMUNICATIONS 59 4. INTERSYMBOL INTERFERENCE 4.1 OBJECT The effects of restricted badwidth i basebad data trasmissio will be studied. Measuremets relative to itersymbol iterferece, usig the eye patter

More information

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks Throughput/Delay Aalysis of pectrally Phase- Ecoded Optical over etwors K. Putsri *,. ittichivapa * ad H.M.H.halaby ** * Kig Mogut s Istitute of Techology Ladrabag Departmet of Telecommuicatios Egieerig,

More information

A Study on Performance Analysis for Error Probability in SWSK Systems

A Study on Performance Analysis for Error Probability in SWSK Systems 556 Tae-Il Jeog, et al.: A STUDY ON PERFORMANCE ANALYSIS FOR ERROR PROBABILITY IN SWSK SYSTEMS A Study o Performace Aalysis for Error Probability i SWSK Systems Tae-Il Jeog, wag-seo Moo, ad Jog-Nam Kim,

More information

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio Performace Aalysis of Chael Switchig with Various Badwidths i Cogitive Radio Po-Hao Chag, Keg-Fu Chag, Yu-Che Che, ad Li-Kai Ye Departmet of Electrical Egieerig, Natioal Dog Hwa Uiversity, 1,Sec.2, Da-Hsueh

More information

Beam Pattern Scanning (BPS) versus Space-Time Block Coding (STBC) and Space-Time Trellis Coding (STTC)

Beam Pattern Scanning (BPS) versus Space-Time Block Coding (STBC) and Space-Time Trellis Coding (STTC) It. J. Commuicatios, Network ad System Scieces, 2009, 6, 469-479 doi:10.4236/ijcs.2009.26051 Published Olie September 2009 (http://www.scirp.org/joural/ijcs/). 469 Beam Patter Scaig (BPS) versus Space-Time

More information

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1 SELEX Elsag 5/18/01 R. Pucci SDR 1 WiComm 1 Military BU - SELEX Elsag Possible update of SDR Platforms to COGNITIVE architectures COGNITIVE MANAGER INTERFACE Geolocatio, Voice, Video, etc Applicatio Policy

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my

More information

Joint Power Allocation and Beamforming for Cooperative Networks

Joint Power Allocation and Beamforming for Cooperative Networks It. J. Commuicatios, etwork ad System Scieces,, 4, 447-45 doi:.436/ijcs..4753 Published Olie July (http://www.scirp.org/joural/ijcs) Joit Power Allocatio ad Beamformig for Cooperative etworks Sodes Maadi,,

More information

Introduction to CPM-OFDM: An Energy Efficient Multiple Access Transmission Scheme

Introduction to CPM-OFDM: An Energy Efficient Multiple Access Transmission Scheme Joural of Commuicatio ad Computer 1 (015) 37-43 doi: 10.1765/1548-7709/015.01.007 D DAVID PUBLISHING Itroductio to CPM-OFDM: A Eergy Efficiet Multiple Access Trasmissio Scheme Mohammad Irfa, Sag Hoo Lee

More information

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:

More information

Adaptive Resource Allocation in Multiuser OFDM Systems

Adaptive Resource Allocation in Multiuser OFDM Systems Adaptive Resource Allocatio i Multiuser OFDM Systems Fial Report Multidimesioal Digital Sigal Processig Malik Meherali Saleh The Uiversity of Texas at Austi malikmsaleh@mail.utexas.edu Sprig 005 Abstract

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

A Research on Spectrum Allocation Using Optimal Power in Downlink Wireless system

A Research on Spectrum Allocation Using Optimal Power in Downlink Wireless system Iteratioal Research Joural of Egieerig ad Techology (IRJET) e-iss: 2395-0056 Volume: 03 Issue: 04 Apr-206 www.irjet.et p-iss: 2395-0072 A Research o Spectrum Allocatio Usig Optimal Power i Dowli Wireless

More information

Design of FPGA Based SPWM Single Phase Inverter

Design of FPGA Based SPWM Single Phase Inverter Proceedigs of MUCEET2009 Malaysia Techical Uiversities Coferece o Egieerig ad Techology Jue 20-22, 2009, MS Garde,Kuata, Pahag, Malaysia MUCEET2009 Desig of FPGA Based SPWM Sigle Phase Iverter Afarulrazi

More information

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

Subcarriers and Bits Allocation in Multiuser Orthogonal Frequency Division Multiplexing System

Subcarriers and Bits Allocation in Multiuser Orthogonal Frequency Division Multiplexing System Sesors & Trasducers, Vol. 168, Issue 4, April 014, pp. 10-15 Sesors & Trasducers 014 by IFSA Publishig, S. L. http://www.sesorsportal.com Subcarriers ad Bits Allocatio i Multiuser Orthogoal Frequecy Divisio

More information

Decode-forward and Compute-forward Coding Schemes for the Two-Way Relay Channel

Decode-forward and Compute-forward Coding Schemes for the Two-Way Relay Channel Decode-forward ad Compute-forward Codig Schemes for the Two-Way Relay Chael Peg Zhog ad Mai Vu Departmet of Electrical ad Computer Egieerig McGill Uiversity Motreal, QC, Caada H3A A7 Emails: peg.zhog@mail.mcgill.ca,

More information

A NEW DISCRETE HARTLEY TRANSFORM PRECODING BASED INTERLEAVED-OFDMA UPLINK SYSTEM WITH REDUCED PAPR FOR 4G CELLULAR NETWORKS

A NEW DISCRETE HARTLEY TRANSFORM PRECODING BASED INTERLEAVED-OFDMA UPLINK SYSTEM WITH REDUCED PAPR FOR 4G CELLULAR NETWORKS Joural of Egieerig Sciece ad Techology Vol. 6, No. 6 (211) 685-694 School of Egieerig, Taylor s Uiversity A NEW DISCRETE HARTLEY TRANSFORM PRECODING BASED INTERLEAVED-OFDMA UPLINK SYSTEM WITH REDUCED PAPR

More information

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II ECE 333: Itroductio to Commuicatio Networks Fall 22 Lecture : Physical layer II Impairmets - distortio, oise Fudametal limits Examples Notes: his lecture cotiues the discussio of the physical layer. Recall,

More information

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay Efficiet Feedback-Based Schedulig Policies for Chuked Network Codes over Networks with Loss ad Delay Aoosheh Heidarzadeh ad Amir H. Baihashemi Departmet of Systems ad Computer Egieerig, Carleto Uiversity,

More information

Lecture 4: Frequency Reuse Concepts

Lecture 4: Frequency Reuse Concepts EE 499: Wireless & Mobile Commuicatios (8) Lecture 4: Frequecy euse Cocepts Distace betwee Co-Chael Cell Ceters Kowig the relatio betwee,, ad, we ca easily fid distace betwee the ceter poits of two co

More information

Fitting Signals into Given Spectrum Modulation Methods

Fitting Signals into Given Spectrum Modulation Methods S-72.333 Post-graduate Course i Radio Commuicatios 2001-2002 Fittig Sigals ito Give Spectrum Modulatio Methods Lars Maura 41747e Lars.maura@hut.fi Abstract Modulatio is the process where the message iformatio

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

PERFORMANCE ANALYSIS OF DIRECT SEQUENCE DIFFERENTIAL PHASE SHIFT KEYING (DS-DPSK) WITH SELF-NORMALIZATION AND L-FOLD DIVERSITY IN A FADING CHANNEL

PERFORMANCE ANALYSIS OF DIRECT SEQUENCE DIFFERENTIAL PHASE SHIFT KEYING (DS-DPSK) WITH SELF-NORMALIZATION AND L-FOLD DIVERSITY IN A FADING CHANNEL PERFORMANCE ANALYSIS OF DIRECT SEQUENCE DIFFERENTIAL PHASE SHIFT KEYING (DS-DPSK) WITH SELF-NORMALIZATION AND L-FOLD DIVERSITY IN A FADING CHANNEL Charles W. Victory Tri T. Ha Naval Postgraduate School

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 troductio to Wireless Commuicatio ystems ECE 476/ECE 501C/C 513 Witer 2003 eview for Exam #1 March 4, 2003 Exam Details Must follow seatig chart - Posted 30 miutes before exam. Cheatig will be treated

More information

Resource Allocation in Downlink MIMO-OFDMA with Proportional Fairness

Resource Allocation in Downlink MIMO-OFDMA with Proportional Fairness 8 JOURAL OF COUICATIOS VOL. 4 O. FERUARY 009 Resource Allocatio i Dowli IO-OFDA with Proportioal Fairess i Da ad Chi Chug o Departmet of Electrical ad Computer Egieerig atioal Uiversity of Sigapore Email:{dabi

More information

Cooperative Spectrum Sensing in Cognitive Radio Networks

Cooperative Spectrum Sensing in Cognitive Radio Networks Cooperative Spectrum Sesig i Cogitive Radio Networks Ghurumuruha Gaesa ad Ye (Geoffrey) Li School of Electrical ad Computer Egieerig Georgia Istitute of Techology, Atlata, Georgia 30332 0250 Abstract I

More information

Noncoherent Detection of Satellite-Based AIS Signal with Phase Offset Compensation

Noncoherent Detection of Satellite-Based AIS Signal with Phase Offset Compensation Sesors & Trasducers Vol. 166 Issue 3 March 2014 pp. 128-134 Sesors & Trasducers 2014 by IFSA Publishig S. L. http://www.sesorsportal.com Nocoheret Detectio of Satellite-Based AIS Sigal with Phase Offset

More information

CFAR DETECTION IN MIMO RADARS USING FUZZY FUSION RULES IN HOMOGENEOUS BACKGROUND

CFAR DETECTION IN MIMO RADARS USING FUZZY FUSION RULES IN HOMOGENEOUS BACKGROUND CFAR DETECTION IN MIMO RADARS USING FUZZY FUSION RULES IN HOMOGENEOUS BACKGROUND Faycal Khaldi 1 ad Faouzi Soltai 2 1,2 Départemet d électroique, Uiversité des Frères Metouri Costatie Costatie 25, Algeria

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

3rd International Conference on Mechatronics and Information Technology (ICMIT 2016)

3rd International Conference on Mechatronics and Information Technology (ICMIT 2016) 3rd Iteratioal Coferece o Mechatroics ad Iformatio Techology (ICMIT 206) A Novel Iterferece Suppressio Algorithm Based o Irregular Wavelet Pacet Trasform i DSSS Satellite Commuicatio System Yaghui Tog,

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract The capacity of wireless ad hoc etwors is maily restricted by the umber

More information

PERFORMANCE COMPARISON BETWEEN MC-CDMA AND DS-CDMA SYSTEMS FOR AWGN AND RAYLEIGH FADING CHANNEL

PERFORMANCE COMPARISON BETWEEN MC-CDMA AND DS-CDMA SYSTEMS FOR AWGN AND RAYLEIGH FADING CHANNEL ISSN: 2278 99X Volume, Issue 11, November 215 PERFORMANCE COMPARISON BETWEEN MC-CDMA AND DS-CDMA SYSTEMS FOR AWGN AND RAYLEIGH FADING CHANNEL R.Ramalakshmi, S.Karthikeya Abstract- The latest techology

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

Summary of Random Variable Concepts April 19, 2000

Summary of Random Variable Concepts April 19, 2000 Summary of Radom Variable Cocepts April 9, 2000 his is a list of importat cocepts we have covered, rather tha a review that derives or explais them. he first ad primary viewpoit: A radom process is a idexed

More information

Integrated Detection Method of Underwater Acoustic Fuze Based on IEMD, VIFD and ED

Integrated Detection Method of Underwater Acoustic Fuze Based on IEMD, VIFD and ED Advaces i Applied Acoustics Vol. Iss., November Itegrated Detectio Method of Uderwater Acoustic Fuze Based o IEMD, VIFD ad ED Qiao Hu Sciece ad Techology o Uderwater Iformatio ad Cotrol Laboratory, Xi

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

Hierarchical Beamforming for Large One-Dimensional Wireless Networks

Hierarchical Beamforming for Large One-Dimensional Wireless Networks Hierarchical Beamformig for Large Oe-Dimesioal Wireless Networks Alla Merzakreeva, Olivier Lévêque Swiss Federal Istitute of Techology - Lausae, Switzerlad {alla.merzakreeva, olivier.leveque}@epfl.ch Ayfer

More information

Optimization of Fractional Frequency Reuse in Long Term Evolution Networks

Optimization of Fractional Frequency Reuse in Long Term Evolution Networks 2012 IEEE Wireless Commuicatios ad Networkig Coferece: Mobile ad Wireless Networks Optimizatio of Fractioal Frequecy Reuse i Log Term Evolutio Networks Dimitrios Bilios 1,2, Christos Bouras 1,2, Vasileios

More information

An Adaptive Image Denoising Method based on Thresholding

An Adaptive Image Denoising Method based on Thresholding A Adaptive Image Deoisig Method based o Thresholdig HARI OM AND MANTOSH BISWAS Departmet of Computer Sciece & Egieerig Idia School of Mies, Dhabad Jharkad-86004 INDIA {hariom4idia, matoshb}@gmail.com Abstract

More information

Problem of calculating time delay between pulse arrivals

Problem of calculating time delay between pulse arrivals America Joural of Egieerig Research (AJER) 5 America Joural of Egieerig Research (AJER) e-issn: 3-847 p-issn : 3-936 Volume-4, Issue-4, pp-3-4 www.ajer.org Research Paper Problem of calculatig time delay

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

A novel adaptive modulation and coding strategy based on partial feedback for enhanced MBMS network

A novel adaptive modulation and coding strategy based on partial feedback for enhanced MBMS network THE JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOMMUNICATIONS Volume 5, Issue, March 2008 SHENG Yu, PENG Mu-ge, WANG We-bo A ovel adaptive modulatio ad codig strategy based o partial feedback for ehaced

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

WSN Node Localization Regularization Algorithm Based on Quasi Optimal Criterion Parameter Selection

WSN Node Localization Regularization Algorithm Based on Quasi Optimal Criterion Parameter Selection Sesors & rasducers Vol. 23 Special Issue July 203 pp. 94-98 Sesors & rasducers 203 by IFSA http://www.sesorsportal.com WSN Node Localizatio Regularizatio Algorithm Based o Quasi Optimal Criterio Parameter

More information

Database-assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution

Database-assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution 1 Database-assisted Spectrum Access i Dyamic Networks: A Distributed Learig Solutio Yuhua Xu, Member, IEEE, Yitao Xu ad Alaga Apalaga, Seior Member, IEEE arxiv:1502.06669v2 [cs.it] 3 Jul 2015 Abstract

More information

Capacity of Interference-limited Three Dimensional CSMA Networks

Capacity of Interference-limited Three Dimensional CSMA Networks Capacity of Iterferece-limited Three Dimesioal CSMA Networks Tao Yag, Guoqiag Mao School of Electrical ad Iformatio Egieerig The Uiversity of Sydey Email: {tao.yag, guoqiag.mao}@sydey.edu.au Wei Zhag School

More information

OFDMA Based Two-hop Cooperative Relay Network Resources Allocation

OFDMA Based Two-hop Cooperative Relay Network Resources Allocation This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the ICC 008 proceedigs. OFDMA Based Two-hop Cooperative Relay Network Resources

More information

PROJECT #2 GENERIC ROBOT SIMULATOR

PROJECT #2 GENERIC ROBOT SIMULATOR Uiversity of Missouri-Columbia Departmet of Electrical ad Computer Egieerig ECE 7330 Itroductio to Mechatroics ad Robotic Visio Fall, 2010 PROJECT #2 GENERIC ROBOT SIMULATOR Luis Alberto Rivera Estrada

More information

Super J-MOS Low Power Loss Superjunction MOSFETs

Super J-MOS Low Power Loss Superjunction MOSFETs Low Power Loss Superjuctio MOSFETs Takahiro Tamura Mutsumi Sawada Takayuki Shimato ABSTRACT Fuji Electric has developed superjuctio MOSFETs with a optimized surface desig that delivers lower switchig.

More information

A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems

A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems 530 OURAL OF COMMUICATIOS, VOL. 5, O. 7, ULY 00 A Radio Resource Allocatio Algorithm for QoS Provisio i PMP-based Systems Pig Wag Broadbad Wireless commuicatios ad Multimedia laboratory, Key Laboratory

More information

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack Faulty Clock Detectio for Crypto Circuits Agaist Differetial Faulty Aalysis Attack Pei uo ad Yusi Fei Departmet of Electrical ad Computer Egieerig Northeaster Uiversity, Bosto, MA 02115 Abstract. Differetial

More information

PERFORMANCE OF MULTIBEAM MIMO FOR NLOS MILLIMETER WAVE INDOOR COMMUNICATION SYSTEMS CHAPTER 6

PERFORMANCE OF MULTIBEAM MIMO FOR NLOS MILLIMETER WAVE INDOOR COMMUNICATION SYSTEMS CHAPTER 6 PERFORMANCE OF MULTIBEAM MIMO FOR NLOS MILLIMETER WAVE INDOOR COMMUNICATION SYSTEMS CAPTER 6 1 PERFORMANCE OF MULTIBEAM MIMO FOR NLOS MILLIMETER WAVE INDOOR COMMUNICATION SYSTEMS CAPTER 6 igh data rate

More information

Information-Theoretic Analysis of an Energy Harvesting Communication System

Information-Theoretic Analysis of an Energy Harvesting Communication System Iformatio-Theoretic Aalysis of a Eergy Harvestig Commuicatio System Omur Ozel Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 074 omur@umd.edu ulukus@umd.edu

More information

OPTIMIZED LINK ADAPTATION FOR WIRELESS PACKET COMMUNICATIONS BASED ON DISCRETE-RATE MODULATION AND CODING SCHEMES

OPTIMIZED LINK ADAPTATION FOR WIRELESS PACKET COMMUNICATIONS BASED ON DISCRETE-RATE MODULATION AND CODING SCHEMES OPTIMIZED LIK ADAPTATIO FO WIELE PACKET COMMUICATIO BAED O DICETE-ATE MODULATIO AD CODIG CHEME Jalil eifali Harsii, ad Farshad Lahouti Wireless Multimedia Commuicatios Laboratory chool of Electrical ad

More information

The Firing Dispersion of Bullet Test Sample Analysis

The Firing Dispersion of Bullet Test Sample Analysis Iteratioal Joural of Materials, Mechaics ad Maufacturig, Vol., No., Ma 5 The Firig Dispersio of Bullet Test Sample Aalsis Youliag Xu, Jubi Zhag, Li Ma, ad Yoghai Sha Udisputed, this approach does reduce

More information

3. Error Correcting Codes

3. Error Correcting Codes 3. Error Correctig Codes Refereces V. Bhargava, Forward Error Correctio Schemes for Digital Commuicatios, IEEE Commuicatios Magazie, Vol 21 No1 11 19, Jauary 1983 Mischa Schwartz, Iformatio Trasmissio

More information

Adaptive Channel Estimation Techniques for MIMO OFDM Systems

Adaptive Channel Estimation Techniques for MIMO OFDM Systems (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Adaptive Chael Estimatio Techiques for MIMO OFDM Systems Md. Masud Raa Dept. of Electroics ad Radio Egieerig Kyug ee Uiversity South

More information

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells The Potetial of Dyamic Power ad Sub-carrier Assigmets i Multi-User OFDM-FDMA Cells Mathias Bohge, James Gross, Adam Wolisz TU Berli Eisteiufer 5, 1587 Berli, Germay {bohge gross wolisz}@tk.tu-berli.de

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

Nonlinear System Identification Based on Reduced Complexity Volterra Models Guodong Jin1,a* and Libin Lu1,b

Nonlinear System Identification Based on Reduced Complexity Volterra Models Guodong Jin1,a* and Libin Lu1,b 6th Iteratioal Coferece o Electroics, Mechaics, Culture ad Medicie (EMCM 205) Noliear System Idetificatio Based o Reduced Complexity Volterra Models Guodog Ji,a* ad Libi Lu,b Xi a research istitute of

More information

Outline. Motivation. Analog Functional Testing in Mixed-Signal Systems. Motivation and Background. Built-In Self-Test Architecture

Outline. Motivation. Analog Functional Testing in Mixed-Signal Systems. Motivation and Background. Built-In Self-Test Architecture Aalog Fuctioal Testig i Mixed-Sigal s Jie Qi Dept. of Electrical & Computer Egieerig Aubur Uiversity Co-Advisors: Charles Stroud ad Foster Dai Outlie Motivatio ad Backgroud Built-I Self-Test Architecture

More information

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks 2013 IEEE Wireless Commuicatios ad Networkig Coferece (WCNC): MAC Broadcastig i Multichael Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig Kyug Hee Uiversity 1 Seocheo,Giheug, Yogi,

More information

Implementation of OFDM wireless communication model for achieving the improved BER using DWT-OFDM

Implementation of OFDM wireless communication model for achieving the improved BER using DWT-OFDM www.ijecs.i Iteratioal Joural Of Egieerig Ad Computer Sciece ISSN: 2319-7242 Volume 6 Issue 1 Ja. 2017, Page No. 19951-19959 Idex Copericus Value (2015): 58.10, DOI: 10.18535/ijecs/v6i1.17 Implemetatio

More information

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Chapter ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West

More information

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna Joural of Electromagetic Aalysis ad Applicatios, 2011, 3, 242-247 doi:10.4236/jemaa.2011.36039 Published Olie Jue 2011 (http://www.scirp.org/joural/jemaa) History ad Advacemet of the Family of Log Periodic

More information

Evaluation of turbulent parameters based on angle-of-arrival fluctuation Yang LI 1,Chao GAO 2, Yi-Ming LI 2, Gang YANG 2 & Xiao-Feng LI 2

Evaluation of turbulent parameters based on angle-of-arrival fluctuation Yang LI 1,Chao GAO 2, Yi-Ming LI 2, Gang YANG 2 & Xiao-Feng LI 2 Iteratioal Coferece o Iformatio Techology ad Maagemet Iovatio (ICITMI 15) Evaluatio of turbulet parameters based o agle-of-arrival fluctuatio Yag LI 1,Chao GAO, Yi-Mig LI, Gag YANG & Xiao-Feg LI 1 Accoutig

More information

An Efficient Adaptive Modulation Scheme for Wireless OFDM Systems

An Efficient Adaptive Modulation Scheme for Wireless OFDM Systems A Efficiet Adaptive Modulatio Scheme for Wireless OFDM Systems Chag Wook Lee ad Gi Joo Jeo A adaptive modulatio scheme is preseted for multiuser orthogoal frequecy-divisio multiplexig systems. The aim

More information

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells The Potetial of Dyamic Power ad Sub-carrier Assigmets i Multi-User OFDM-FDMA Cells Mathias Bohge, James Gross, Adam Wolisz Telecommuicatio Networks Group, TU Berli Eisteiufer 5, 1587 Berli, Germay {bohge

More information

Delta- Sigma Modulator with Signal Dependant Feedback Gain

Delta- Sigma Modulator with Signal Dependant Feedback Gain Delta- Sigma Modulator with Sigal Depedat Feedback Gai K.Diwakar #1 ad V.Vioth Kumar *2 # Departmet of Electroics ad Commuicatio Egieerig * Departmet of Electroics ad Istrumetatio Egieerig Vel Tech Uiversity,Cheai,

More information

Cross-Entropy-Based Sign-Selection Algorithms for Peak-to-Average Power Ratio Reduction of OFDM Systems

Cross-Entropy-Based Sign-Selection Algorithms for Peak-to-Average Power Ratio Reduction of OFDM Systems 4990 IEEE TRASACTIOS O SIGAL PROCESSIG, VOL. 56, O. 10, OCTOBER 2008 Cross-Etropy-Based Sig-Selectio Algorithms for Peak-to-Average Power Ratio Reductio of OFDM Systems Luqig Wag ad Chitha Tellambura Abstract

More information

Adaptive Modulation for OFDM Systems J.Faezah 1, and K.Sabira 2

Adaptive Modulation for OFDM Systems J.Faezah 1, and K.Sabira 2 Iteratioal Joural of Commuicatio Networks ad Iformatio Security (IJCNIS) Vol., No., August 9 Adaptive Modulatio for OFDM Systems J.Faezah, ad K.Sabira Cetre for Foudatios Studies ad Extesio Educatio, Multimedia

More information

Cooperative Detection and Communication in Wireless Sensor Networks

Cooperative Detection and Communication in Wireless Sensor Networks Cooperative Detectio ad Commuicatio i Wireless Sesor Networks Mohiuddi Ahmed, Yug-Szu Tu, ad Gregory Pottie Electrical Egieerig Departmet, Uiversity of Califoria, Los Ageles Box 95594, Los Ageles, Califoria

More information

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015)

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015) Iteratioal Power, Electroics ad Materials Egieerig Coferece (IPEMEC 205) etwork Mode based o Multi-commuicatio Mechaism Fa Yibi, Liu Zhifeg, Zhag Sheg, Li Yig Departmet of Military Fiace, Military Ecoomy

More information

Antenna Diversity Techniques for a Single Carrier System with Frequency Domain Equalization An Overview

Antenna Diversity Techniques for a Single Carrier System with Frequency Domain Equalization An Overview Atea Diversity Techiques for a Sigle Carrier System with Frequecy Domai Equalizatio A Overview. Witschig, G. Strasser,. Weigel, A. Spriger Istitute for Commuicatios ad Istitute for Techical Electroics

More information

SOFTWARE DEFINED RADIO IN WIRELESS AD-HOC NETWORK

SOFTWARE DEFINED RADIO IN WIRELESS AD-HOC NETWORK SOFTWARE DEFINED RADIO IN WIRELESS AD-HOC NETWORK Ajay Kr. Sigh 1, G. Sigh 2 ad D. S. Chauha 2 1 Departmet of Computer Sciece ad Egieerig Jaypee Uiversity of Iformatio Techology, Sola -173 215, Idia 2

More information

Minimum Normalized Transmit Rate Based Fair Scheduling Algorithm in Orthogonal Frequency Division Multiplexing (OFDM)

Minimum Normalized Transmit Rate Based Fair Scheduling Algorithm in Orthogonal Frequency Division Multiplexing (OFDM) Iteratioal Joural of Electroic Egieerig Research ISSN 097-640 Volue 1 Nuber 4 (009) pp. 337 344 Research Idia Publicatios http://www.ripublicatio.co/ijeer.ht Miiu Noralized Trasit Rate Based Fair Schedulig

More information