Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks

Size: px
Start display at page:

Download "Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks"

Transcription

1 Joint Cooperative Relaying an Jamming for Maximum Secrecy Capacity in Wireless Networks Li Wang, Chunyan Cao, Mei Song an Yu Cheng Beijing Key Laboratory of Work Safety Intelligent Monitoring School of Electronic Engineering, Beijing University of Posts an Telecommunications, Beijing, P.R. China Department of Electrical an Computer Engineering Illinois Institute of Technology 330 S. Dearborn Street, Siegel Hall 320 Chicago, IL Abstract This paper proposes a joint cooperative relaying an jamming scheme base on istribute beamforming to enhance the secrecy rate of a wireless channel in the presence of an eavesropper. Specifically, we consier the scenario that a source noe transmits messages to a estination with the help of multiple cooperative relays, where a relay might be compromise to become an eavesropper as an insie attacker. Our joint relaying an jamming approach is to assign some relay noes to act as jammers to interfere the eavesropper, while the remaining ones continue relaying information to the estination. We propose a protocol to implement the joint cooperative relaying an jamming. Our protocol further consiers the particular challenge brought by the insie attacker: it may know the jamming signal an can use it to remove the interference from the jammers. The issue of phase an frequency synchronization in the istribute beamforming is also taken into account. A mixe integer programming problem is formulate to maximize the secrecy rate with the propose joint relaying an jamming, by which the optimal role assignment to a relay an the associate optimal power assignment can be solve. Numerical results are presente to emonstrate the efficiency of the propose joint relaying an jamming in improving the secrecy rate, with comparison to existing approaches. Inex Terms Cooperative relaying an jamming, istribute beamforming, synchronization, insie attacker, secrecy rate. I. INTRODUCTION Recently, physical layer security has been regare as a promising approach to aress security issues in wireless networks without upper-layer encryption, which exploits the physical characteristics of the wireless channels to ensure secure communications. Secrecy rate is efine as the rate at which information can be transmitte secretly from the source to its intene estination in the presence of eavesroppers, an the maximum achievable secrecy rate is name the secrecy capacity. In [], Aaron Wyner introuce the wiretap channel an establishe the funamental results of creating perfect secure communications without cryptographic techniques involve. Wyner s approach was extene to Gaussian wiretap channels an broacast channels in later works [2]-[3]. Cooperative transmission has attracte a lot of attention to enhance the capacity of a wireless channel as a virtual MIMO system [4]-[5]. The current efforts to improve the secrecy rate in the context of cooperative communications can be roughly classifie into three categories, cooperative beamforming, cooperative jamming, an hybri relaying an jamming. For cooperative beamforming, all relays resort to the istribute beamforming technique to concentrate the signal towars the intene estination, trying to mitigate the information leakage to the eavesropper as much as possible [6]- [7], [8]. The philosophy of cooperative jamming is that some relay noes concentrate certain jamming signal to interfere the eavesropper (normally by the istribute beamforming technique too) while not impact the estination [9]-[0], []. A relay equippe with multiple antennas for jamming was stuie in [0]. However, the cost of a multiple antenna system is normally high. The work in [2] presente a systematic stuy of cooperative beamforming an cooperative jamming. The cooperative jamming situation consiere in [2] only applies to the one-hop source to estination transmission though. Hybri relaying an jamming schemes to secure the networks were propose in [3]-[4], where some noes aopt istribute beamforming to relay the message an others jam the eavesroppers. It is worth noting that most of existing works, in all the three categories, consiere a given set of relay(s), jammer(s) an the eavesropper(s), which may not be the case in practice: a normal noe coul be compromise to turn into an attacker an the role of a relay noe coul be ynamically assigne. This paper consiers a practical scenario where a transmission with multiple cooperative relays starts at the normal state an the relays can apply istribute beamforming technique for high capacity. A relay noe might be compromise to become an eavesropper, which is an insie attacker. We assign some relay noes to act as jammers to interfere the eavesropper, while the rest continue relaying information to the estination. The unique issue in our scenario is the optimal role assignment to each relay, as a ata relay or a jammer, for maximum secrecy rate. We formulate a mixe integer programming problem. Furthermore, we consier the particular challenge brought by the insie attacker: all the jammers nee to transmit the same jamming symbols an use the istribute beamforming technique for effective jamming, however, the insie attacker may also know the jamming symbols (if preloae) an can use it to remove the interferences from the jammers. We thus esign a protocol to aress such an issue. In aition, our protocol incorporates operations for /4/$ IEEE 4448

2 Fig.. System moel for secure transmission. synchronization in istribute beamforming, which is ignore in most of the existing stuies on secrecy rate for cooperative communications. To make our scheme more efficient an practical, we introuce two hop istribute beamforming for joint cooperative relaying an jamming. The paper is organize as follows. Section II presents the system moel. Section III presents the protocol esign for joint cooperative relaying an jamming. Section IV formulates a mixe integer programming problem to maximize the secrecy rate. Numerical results are provie in Section V to emonstrate the performance. Section VI gives conclusion remarks. II. SYSTEM MODEL In this section, we will first present the system moel an then give a brief escription of the secure transmission between the source an the estination. As shown in Fig., we consier the scenario where a source nees to communicate with a estination uner the help of some cooperative relays in the DF manner. Each noe is equippe with a single omni-irectional antenna an operates in a half-uplex moe. We assume that channels for ifferent pairs of noes are inepenent an ientically istribute (i.i..) with flat Rayleigh faing, an the noise is the aitive white Gaussian noise (AWGN) with a mean of zero an a variance of σ 2. In the system, a relay noe might be compromise to become an eavesropper, as an insie attacker, which can be etecte by its malicious behavior. Some relay noes will be assigne as jammers to interfere the eavesropper, while the remaining ones continue relaying information to the estination. Here we assume the eavesropper can be locate by some existing techniques [5], an all caniate noes can successfully ecoe the message transmitte by the source as assume in [2]. The secure transmission process between the source an the estination can be ivie into two transmitting phases. In the first phase, the source broacasts the message, S, which is also listene by the eavesropper. To ecrease the interception, the jammers sen jamming signals, Z, at the same time. Distribute beamforming is employe at the jammers so that the jamming signals confuse the eavesropper only, without impacting the estination. In the secon phase, the relays utilize istribute beamforming to forwar the ata to the estination, while the jammers continue sening jamming signals to interfere the eavesropper. When useful message sent by the relays can be completely nulle out at the eavesropper using null space cooperative beamforming at the relays [8], the jamming is not neee an the transmit power of the jammer set can be set zero. While if cooperative beamforming at the relays oes not work well, the jammers interfere the eavesropper an ecrease its interception. Optimal power allocation to jammers an relays will be stuie in Section IV. We enote the channel gain form the source to the estination by h s, the channel gain form the source to the eavesropper by h se, the row channel gain vector ( N) from the source to all the caniate noes by h T sn, the column channel gain vector (N ) from all the caniate noes to the eavesropper by h Ne, the column channel gain vector (N ) from all the caniate noes to the estination by h N, the channel gain matrix (N N) between all the caniate noes by H N. N is the number of caniate noes. ( ) T is the transpose of a matrix or a vector. [x] + =max(0,x). III. JOINT COOPERATIVE RELAYING AND JAMMING In this section, we esign a protocol to implement the propose cooperative relaying an jamming scheme. The technique unerpinning of the joint relaying an jamming is the istribute beamforming. An important issue with istribute beamforming is the synchronization of the carrier signals in phase an frequency. The stuy in [6] presente an effective synchronization technique for istribute beamforming an inicate that the beamforming gain still remains goo even with imperfect synchronization. We evelop our protocol base on that use in [6]. Furthermore, the severe impact of insie attacks from the eavesropper can not be ignore. Cooperative jamming relies on istribute beamforming where the jammers nee to transmit the same jamming symbols for effective jamming, however, the eavesropper may also know the preefine jamming symbols an can use it to remove the interference. Our protocol utilizes on-line selection of the jamming signals rather than pre-installation to be against the insie attacker. Although we involve some cryptographic techniques here to eliver the on-line selecte jamming signal from the source to the jamming noes, the cryptographic technique just incurs some overhea to our cooperative relaying an jamming, an the secrecy rate still epens on the physical layer security technique. The propose protocol works as follows. First, the source generates a sinusoi signal c 0 (t) with a frequency f c base on its local oscillator an broacasts it. Here we assume that the source has one pair of public/private keys. The sinusoi signal c 0 (t) can be moulate with the public key of the source. The jammers use PLL (Phase Locking Loop) to lock on the frequency f c an the receive signal at the κth jammer noe is c κ,0 (t) with a phase shift θ κ. The jammers apply phase error correction techniques to eal with phase shift θ κ [6]. Then the κth jammer noe obtains the calibrate signal c κ (t) use for channel estimation an beamforming. All the jammers also emoulate the public key 4449

3 of the source to be use later for jamming signal transmission. An easier (but not that general) implementation is that the public key of the source is pre-installe into each relay noe. Secon, all the caniate noes an the estination then take turns to broacast a carrier signal so that each noe can estimate the channel gain between itself an the broacasting one. These channel gains can later be use for istribute beamforming, either for cooperative relaying to the estination or for jamming to the eavesropper. Thir, if each jammer obtains the public key of the source in the first step, it then uses this key to encrypt its session key to the source (here we use the local phase error as a session key, which is relate to the propagation elay of the wireless channel between the source an this jammer). The source can later use the session key to sen upate jamming signals use for istribute beamforming to the jammers, which is similar to the metho in [7] by exploiting the wireless channel for builing cryptographic services. Last, at a certain moment, if the source announces the eavesropper, it will sen the upate jamming signals to each jammer, encrypte by their session keys, respectively. The jammers then start to jam the eavesropper with istribute beamforming. Since the on-line selecte jamming signal is encrypte by the session key, the eavesropper (the insie attacker) cannot obtain it. Please be note that the propose protocol can be implemente with a time-ivie system, by extening the frame structure presente in [6]. As the focus of this paper is to emonstrate the effectiveness of the joint cooperative relaying an jamming an the associate optimal relay role assignment, we will fully evelop the implementation etails an conuct relate overhea stuy in our future work. IV. SECRECY CAPACITY MAXIMIZATION In this section, we will first formulate the secrecy rate of the whole transmission, an present a mixe integer programming problem to maximize the secrecy rate, which relates to the optimal assignment of the roles to caniate noes. Distribute beamforming is utilize in the moel, where each relay noe an jammer noe apply a weight to the signal transmitte. With proper selection of the weights, the receive signal at a certain noe can be nulle out to achieve jamming through istribute beamforming. A. Secrecy Rate Formulation As inicate before, to improve the secrecy rate of the whole transmission, a two-phase transmission between the source an the estination is establishe. Each caniate noe can be regare as a relay or a jammer. We present an optimal relay an jammer selection to maximize the secrecy rate. Denote the set of all the caniate noes N = {, 2,,..., N}. For each caniate noe, we set two parameters to inicate its role as a relay or jammer. The specifical escription can be expresse as { relay if x i = an u i =0, n i = jammer if x i = 0 an u i =, where n i is the ith caniate noe (i =,..., N), the value of x i an u i can be 0 or, an x i + u i =. Accoring to the efinition, for convenience of escription an explicit physical meaning, we enote the roles of all N caniate noes by two vectors x =[x,x 2,..., x N ] T an u = [u,u 2,..., u N ] T. Therefore, we can obtain the role of the ith caniate noe by the values of x i an u i, which are relative to the secrecy rate maximization problem. ) The first transmitting phase: The source broacasts the message, S, an certainly the eavesropper can hear the message. To isturb the eavesropping, the jammers at the same time sen the jamming signals, Z, by istribute beamforming without affecting the estination. For the caniate noes acting as relays, the values corresponing to them in vector x must be, an the values corresponing to the caniate noes acting as jammers in vector u must be. In this phase, the receive signals at the caniate noes, the estination an the eavesropper can be written as y N = P s h T sn S + n N, () y () = P s h s S + n (), (2) y e () = P s h se S + P u T W h Ne Z + n () e, (3) respectively, where P s is the transmit power of the source, P is the total transmit power of the caniate noes in the first phase, W = iag([w (), w() 2,..., w() N ]) is a N N power allocation weight matrix of the caniate noes in the first phase, w T w = where w =[w (), w() 2,..., w() N ]T, n N is the AWGN at the caniate noes, n () is the AWGN at the estination an n () e is the AWGN at the eavesropper. The receive SNRs at the estination an the eavesropper in the first phase can be escribe as γ () = P s h s 2 σ 2, (4) γ e () P s h se 2 = P u T W h Ne 2 + σ 2, (5) respectively. 2) The secon transmitting phase: The relays utilize istribute beamforming to forwar the weighte message to the estination while the jammers continue sening jamming signals to interfere the eavesropper without impacting the estination. In this phase, the receive signals at the estination an the eavesropper can be written as y (2) = P 2 x T W 2 h N S + n (2), (6) y e (2) = P 2 x T W 2 h Ne S + P 2 u T W 2 h Ne Z + n (2) e, (7) respectively, where P 2 is the total transmit power of the caniate noes in the secon phase, W 2 = iag([w (2), w(2) 2,..., w(2) N ]) is a N N power allocation weight matrix of the caniate noes in the secon phase, w2 T w 2 = where w 2 =[w (2), w(2) 2,..., w(2) N ]T, n (2) is the AWGN at the estination an n (2) e is the AWGN at the eavesropper. 4450

4 The receive SNRs at the estination an the eavesropper in the secon phase can be escribe as γ (2) = P 2 x T W 2 h N 2 σ 2, (8) γ e (2) = P 2 x T W 2 h Ne 2 P 2 u T W 2 h Ne 2 + σ 2, (9) respectively. In the secon phase, when the esire message sent by the relays can be completely nulle out at the eavesropper by using cooperative beamforming at the relays, i.e., x T W 2 h Ne =0, the eavesropper can wiretap nothing about the esire message, then the jamming is not necessary. We combine the signals from the first an secon phases aopting maximal ratio combining (MRC) metho [8], an the receive SNRs at the estination an the eavesropper in the whole transmission can be escribe as γ = γ () + γ (2) = P s h s 2 σ 2 + P 2 x T W 2 h N 2 σ 2, (0) γ e = γ e () + γ e (2) P s h se 2 = P u T W h Ne 2 + σ 2 + P 2 x T W 2 h Ne 2 P 2 u T W 2 h Ne 2 + σ 2, () respectively. When x T W 2 h Ne =0, the secon part of the above equation is zero, i.e., γ e (2) =0. The corresponing maximum information rates at the estination an the eavesropper are R = 2 log 2( + γ )=log 2 ( + γ () + γ (2) ), (2) R e = 2 log 2( + γ e )=log 2 ( + γ () e + γ (2) e ), (3) respectively, where the factor /2 is ue to the fact that the two phases share the transmission time. Therefore, the secrecy rate of the whole transmission can be written as SC = {R R e } + = 2 {log 2 ( + γ ) log 2 ( + γ e )} +. (4) B. Maximization Problem From the above iscussion, we can see that changing the number of relays an jammers will impact the secrecy rate, i.e., ifferent values of the vectors x an u influence the security of the transmission. Thus, a mixe integer programming problem for secrecy rate maximization with the optimal values of the vectors x an u is presente. In the first transmitting phase, istribute beamforming is aopte at the jammers to avoi the interference at the relays an the estination while confusing the eavesropper. Thus, there are two null space constraints in this phase, i.e., u T W H N X = 0 N an u T W h N = 0, where X = iag([x, x 2,..., x N ]). The necessary conition for the null space constraints in this phase is that the number of jammers is larger than that of relays an estination, i.e., N J >N R +, where N J an N R are the numbers of jammers an relays, respectively. Otherwise, if N J N R +, we cannot avoi interference cause by the jammers at the relays an the estination completely. If cooperative beamforming at the relays oes not work well in the secon transmitting phase, the jammers interfere the eavesropper without affecting the estination, that is, u T W 2 h N =0an N J >. When null space cooperative beamforming employe at the relays can completely null out the esire message at the eavesropper, then x T W 2 h Ne =0 an N R >. Our objective is to select optimal relays an jammers with power allocation to maximize the secrecy rate subject to a total transmit power constraint. Depening on whether x T W 2 h Ne is zero or not, we can formulate the secrecy rate maximization problem as following. ) x T W 2 h Ne 0 (without nulling out): The esire message sent by the relays cannot be completely nulle out at the eavesropper in the secon phase. Uner the null space constraints in the first phase, the optimization problem for maximum secrecy rate can be formulate as follows. arg max SC =arg max {R R e } =arg max 2 {log 2 ( + γ ) log 2 ( + γ e )}, (5) subject to P s + P + P 2 = P 0, (5a) u T W h N =0, (5b) u T W 2 h N =0, (5c) u T W H N X = 0 N, (5) where P 0 is the total transmit power constraint. It is obviously a mixe integer programming problem. Specifically, when SNR, the objective function can be expresse as arg max 2 {log 2 ( + γ ) log 2 ( + γ e )} arg max P s h s 2 σ + P2 xt W 2h N 2 2 σ 2 P s h se 2 P u T W h Ne + P2 xt W 2h Ne 2 2 +σ 2 P 2 u T W 2h Ne 2 +σ 2. (6) 2) x T W 2 h Ne =0(nulling out): The esire message sent by the relays can be completely nulle out at the eavesropper in the secon phase. In this case, the secrecy rate maximization problem can be formulate as follows. arg max SC =arg max 2 {log 2 ( + γ ) log 2 ( + γ e )}, (7) subject to P s + P + P 2 = P 0, (7a) u T W h N =0, (7b) x T W 2 h Ne =0, (7c) u T W H N X = 0 N. (7) 445

5 propose scheme 0.2 DF scheme CJ scheme Source-eavesropper Distance (m) Fig. 2. Scenario use for numerical experiments. Fig. 3. Secrecy rate versus source-eavesropper istance. Similarly, when SNR, the objective function will be arg max 2 {log 2 ( + γ ) log 2 ( + γ e )} arg max =arg max P s h s 2 σ + P2 xt W 2h N 2 2 σ 2 P s h se 2 P u T W h Ne 2 +σ 2 (P s h s 2 + P 2 x T W 2 h N 2 ) P u T W h Ne 2 + σ 2 P s h se 2. (8) We can see that the secrecy rate maximization problem is a mixe integer programming problem, which is NP-har in general. In this paper, our focus is to emonstrate the efficiency of the propose joint relaying an jamming an the optimal relay assignment, an we use exhaustive search to solve the problem which is an easy approach to obtain the solution when the network scale is small, while it becomes ifficult for a large network scale. Therefore, in the future work, we will stuy how to evelop efficient approximate algorithms to solve this mixe integer programming problem when the network scale gets larger, such as the branch-an-boun an cutting plane methos. V. NUMERICAL RESULTS In this section, numerical results are provie to emonstrate the performance of our propose scheme. In our simulation, the path-loss exponent of wireless channels is β =3 an the aitive white Gaussian noise power is σ 2 =mw. In aition, we set the total transmit power constraint, P 0 = 000 mw. The 2D square topology of the scenario is shown as in Fig. 2, where there is a source, a estination, an eavesropper an several ranomly istribute caniate noes whose center is at (0, 0). To emonstrate the performance of our propose scheme, two cooperative schemes, ecoe-an-forwar (DF) scheme an cooperative jamming (CJ) scheme mentione in [2] have been involve. The relays transmit a weighte version of a reencoe noise-free message signal for the DF scheme while the relays transmit a jamming signal for the CJ scheme. Accoring to our assumption that all caniate noes can properly ecoe the signals from the source, we can assign a fixe large value of P s = 200 mw to satisfy the assumption, an thus our establishe moel is applie to solve the power allocation an weight factors for the relays an jammers. In aition, the number of caniate noes is N =6. As in Fig. 2, the eavesropper location is first fixe at (0, 5). When move the position of the eavesropper from (5, 5) to (5, 5), we can obtain the relationship between the secrecy rate of the whole transmission an the istance from the eavesropper to the source. From Fig. 3, when the istance between the eavesropper an the source becomes larger, the secrecy rates for the DF scheme, the CJ scheme an our propose scheme first increase an then ecrease. The secrecy rates for all three schemes increase since the receive signal power at the eavesropper ecreases when the eavesropper moves away from the source, while when the istance between the eavesropper an the source continues to increase, the secrecy rate ecreases since the eavesropper approaches the estination, which has a negative impact on the secrecy rate. Furthermore, the secrecy rate for the CJ scheme is much lower than the other two schemes, since the CJ scheme can only ecrease the rate at the eavesropper but it cannot improve the rate at the estination. Fig. 4 shows the secrecy rate for ifferent numbers of caniate noes. The eavesropper location is fixe at (0, 5). From the figure, with the number of caniate noes increasing, the secrecy rate of the whole transmission for each scheme becomes larger, which inicates that increasing the number of caniate noes improves the secrecy rate. However, when the number of caniate noes continues to increase, the secrecy rates for three schemes increase slowly an are almost saturate, which shows that there is a limitation for improving the secrecy rate through increasing the number of caniate noes. In aition, the secrecy rate for the CJ scheme is also much lower than the other two schemes which is limite by the istance between the source an the estination. Furthermore, the secrecy rate for our scheme has a better performance than the other two schemes since we consier the optimal selection of relays an jammers to simultaneously enhance the rate at the estination an reuce the rate at the eavesropper. VI. CONCLUSION In this paper, a joint cooperative relaying an jamming scheme has been presente to enhance the secrecy rate of a 4452

6 Fig. 4. propose scheme DF scheme CJ scheme Number of Caniate Noes Secrecy rate versus number of caniate noes. wireless channel in the presence of an eavesropper, which is an insie attacker. We have propose to assign some relay noes to act as jammers while the rest continue relaying information to the estination. A mixe integer programming problem for maximum secrecy rate has been formulate. Furthermore, our scheme also consiers some special challenges, such as ealing with both the impact of the insie attacker an the phase an frequency synchronization in istribute beamforming. Numerical results have emonstrate the merits of our scheme in terms of secrecy rate, with comparison to DF an CJ schemes. [0] L. Dong, Z. Han, A.P. Petropulu an H.V. Poor, Cooperative jamming for wireless physical layer security, in 2009 IEEE SSP Workshops, Sept. 2009, pp [] R. Zhang, L. Song, Z. Han an B. Jiao, Physical layer security for twoway untruste relaying with frienly jammers, IEEE Trans. Vehicular Tech., vol. 6, no. 8, pp , Oct [2] L. Dong, Z. Han, A.P. Petropulu an H.V. Poor, Improving wireless physical layer security via cooperating relays, in IEEE Trans. Signal Process., vol. 58, no. 3, pp , Mar [3] H.-M. Wang, M. Luo an Q. Yin, Hybri cooperative relaying an jamming for secure two-way relay networks, in Proc. IEEE GLOBECOM, Dec. 202, pp [4] J. Chen, R. Zhang, L. Song, Z. Han an B. Jiao, Joint relay an jammer selection for secure two-way relay networks, IEEE Trans. Inf. Forensics an Security, vol. 7, no., pp , Feb [5] Hong L., M. McNeal an C. Wei, Secure cooperative MIMO communications uner active compromise noes, 20 IEEE Int l. Pervasive Computing an Commun. Workshops (PERCOM Workshops), Mar 20, pp [6] R. Muumbai, G. Barriac an U. Mahow, On the feasibility of istribute beamforming in wireless networks, IEEE Trans. Wireless Commun., vol. 6, no. 5, pp , May [7] R. Liu an W. Trappe, Securing Wireless Communications at the Physical Layer, Springer, [8] T. S. Rappaport, Wireless Communications Principles an Practice, 2n e. Prentice Hall, ACKNOWLEDGMENT This work was supporte in part by the National Natural Science Founation of China (Grant No ), the Science Technology Innovation Founation for Young Teachers in BUPT (Grant No. 203RC0202), the State Major Science an Technology Special Projects (Grant No. 202ZX ), an the Beijing Higher Eucation Young Elite Teacher Project (Grant No. YETP0442). REFERENCES [] A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J., vol. 54, no. 8, pp , Oct [2] S. K. Leung-Yan-Cheong an M. E. Hellman, The Gaussian wire-tap channel, IEEE Trans. Inf. Theory, vol. 24, no. 4, pp , Jul [3] I. Csiszar an J. Korner, Broacast channels with confiential messages, IEEE Trans. Inf. Theory, vol. 24, no. 3, pp , May 978. [4] Q. Guan, F.R. Yu an S. Jiang, Capacity-optimize topology control for MANETs with cooperative communications, IEEE Trans. Wireless Commun., vol. 0, no. 7, pp , Jul. 20. [5] D.W.K. Ng, E.S. Lo an R. Schober, Energy-efficient resource allocation in multi-cell OFDMA systems with limite backhaul capacity, IEEE Trans. Wireless Commun., vol., no. 0, pp , Oct [6] J. Kim, A. Ikhlef an R. Schober, Combine relay selection an cooperative beamforming for physical layer security, J. Commun. Netw., vol. 4, no. 4, pp , Aug [7] Y. Liu an W. Nie, Selection base cooperative beamforming an power allocation for relay networks, J. Commun. Netw., vol. 3, no. 4, pp , Aug. 20. [8] Y. Yang, Q. Li, W.-K. Ma, J. Ge an P. C. Ching, Cooperative secure beamforming for AF relay networks with multiple eavesroppers, IEEE Signal Process. Lett., vol. 20, no., pp , Jan [9] J. Yang, I. Kim an D. I. Kim, Optimal cooperative jamming for multiuser broacast channel with multiple eavesroppers, IEEE Trans. Wireless Commun., vol. 2, no. 6, pp , Jun

SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS

SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS Xiaohua Li 1 1 Department of ECE State University of New York at Binghamton Binghamton, NY 139, USA {xli,jhwu1}@binghamton.eu

More information

Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users

Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users D. Richar Brown III Electrical an Computer Engineering Department Worcester Polytechnic Institute Worcester,

More information

Capacity Gain from Transmitter and Receiver Cooperation

Capacity Gain from Transmitter and Receiver Cooperation Capacity Gain from Transmitter an Receiver Cooperation Chris T. K. Ng an Anrea J. Golsmith Dept. of Electrical Engineering Stanfor University, Stanfor, CA 90 Email: ngctk, anrea}@wsl.stanfor.eu arxiv:cs/00800v1

More information

Dynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee

Dynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee Dynamic Hybri Duplex for Rate Maximization in OFDMA Sangmin Oh an Chae Y. Lee Dept. of Inustrial Engineering, KAIST, 373-1 Kusung Dong, Taeon, Korea Tel: +82-42-350-5916, FAX: +82-42-350-3110 Email: {sangmin.oh,

More information

ROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2

ROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2 6 International Conference on Sustainable Energy, Environment an Information Engineering (SEEIE 6) ISBN: 978--6595-337-3 ROC Analys of BLM Detector in AF Relays Base Cooperative Wireless Networks Omar

More information

Joint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback

Joint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback Joint Partial Relay Selection, Power Allocation an Cooperative Maximum Likelihoo Detection for MIMO Relay Systems with Limite Feeback Thomas Hesketh, Rorigo C. e Lamare, Stephen Wales Department of Electronics,

More information

IN GENERAL, an optical network can consist of a

IN GENERAL, an optical network can consist of a 1 Geometric Capacity Provisioning for Wavelength-Switche WDM Networks Li-Wei Chen, Eytan Moiano Abstract In this paper, we use an asymptotic analysis similar to the sphere-packing argument in the proof

More information

Performance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems

Performance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems Performance Analysis an Comparison of ZF an MRT Base Downlink Massive MIMO Systems Tebe Parfait, Yujun uang, 1,2 ponyo Jerry 1 Mobilelink Lab Univ of Electronic Sci an Tech of China, UESTC Chengu, China

More information

Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks

Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimeia Networks Zhengguo Sheng, Jun Fan, Chi Harol Liu, Victor C. M. Leung, Xue Liu*, an Kin K. Leung Orange Labs, France Telecom,

More information

Topology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks

Topology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceeings. Topology-assiste techniques to relay selection

More information

Cross-layer Routing Optimization for Wireless Networks with Cooperative Diversity

Cross-layer Routing Optimization for Wireless Networks with Cooperative Diversity Cross-layer Routing Optimiation for Wireless Networs with Cooperative Diversity Zhiguo Ding an Kin K. Leung Department of Electrical an Electronic Engineering Imperial College Lonon, UK. Email: {higuo.ing,

More information

Wireless Powered Dual-Hop Multiple Antenna Relay Transmission in the Presence of Interference

Wireless Powered Dual-Hop Multiple Antenna Relay Transmission in the Presence of Interference EEE CC 05 - Wireless Communications Symposium Wireless Powere Dual-Hop Multiple Antenna Relay Transmission in the Presence of nterference Guangxu Zhu, Caijun Zhong, Himal A. Suraweera, George K. Karagianniis,

More information

QoS Topology Control in Ad Hoc Wireless Networks

QoS Topology Control in Ad Hoc Wireless Networks QoS Topology Control in A Hoc Wireless Networks Xiaohua Jia, Deying Li Dept of Computer Science City University of Hong Kong Hong Kong, China Dingzhu Du Dept of Computer Science an Engineering University

More information

Energy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks

Energy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks Energy Efficient Virtual MIMO-base Cooperative Communications for Wireless Sensor Networks Suharman K. Jayaweera Department of Electrical an Computer Engineering Wichita State University, Wichita, KS,

More information

A General Algorithm for Interference Alignment and Cancellation in Wireless Networks

A General Algorithm for Interference Alignment and Cancellation in Wireless Networks A General Algorithm for Interference Alignment an Cancellation in Wireless Networks Li Erran Li, Richar Alimi, Dawei Shen, Harish Viswanathan an Y. Richar Yang Bell Labs MIT Yale University Abstract Physical

More information

Cache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI

Cache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI Cache-Aie Content Delivery in Fog-RAN Systems with Topological Information an no CSI Wei-Ting Chang, Ravi Tanon, Osvalo Simeone Abstract In this work, we consier a Fog Raio Access Network (F-RAN) system

More information

Page 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design.

Page 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design. Overview 18-759: Wireless Networks Lecture 7: Cellular Networks Dina Papagiannaki & Peter Steenkiste Departments of Computer Science an Electrical an Computer Engineering Spring Semester 2009 http://www.cs.cmu.eu/~prs/wireless09/

More information

Secure Communication with a Wireless-Powered Friendly Jammer

Secure Communication with a Wireless-Powered Friendly Jammer Secure Communication with a Wireless-Powere Frienly Jammer Wanchun Liu, Xiangyun Zhou, Salman Durrani, an Petar Popovski arxiv:42.0349v2 [cs.it] 26 Aug 205 Abstract In this paper, we propose to use a wireless-powere

More information

Relay Deployment and Power Control for Lifetime Elongation in Sensor Networks

Relay Deployment and Power Control for Lifetime Elongation in Sensor Networks Relay Deployment an Power Control for Lifetime Elongation in Sensor Networks Yufeng Xin, Tuna Güven, Mark Shayman Institute of Avance Computer Stuies University of Marylan, College Park, MD 074 e-mail:

More information

Indoor Wireless Planning using Smart Antennas

Indoor Wireless Planning using Smart Antennas Inoor Wireless Planning using Smart Antennas Ali Abbasi an Maji Ghaeri Department of Computer Science, University of Calgary Emails: {abbasi, mghaeri}@ucalgary.ca Abstract This paper consiers the problem

More information

Shadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment

Shadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment JAVA, International Journal of Electrical Electronics Engineering Volume 4, Number, April 26 Shaowing Moel for Inoor Multi-hop Raio Link in Office Environment Mohamma Fahli Inustrial Engineering Department

More information

SUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks

SUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks SUBSET: A Joint esign of Channel Selection an Channel Hopping for Fast Blin enezvous in Cognitive aio A Hoc Networks Xingya Liu an Jiang Xie epartment of Electrical an Computer Engineering The University

More information

The effect of two realistic Radio Propagation Models for Mobile Ad hoc NETworks in Urban Area Environment Supported with stations

The effect of two realistic Radio Propagation Models for Mobile Ad hoc NETworks in Urban Area Environment Supported with stations International Journal of Scientific & Engineering Research Volume 2, Issue 1, Oct-211 1 The effect of two realistic Raio Propagation Moels for Mobile A hoc NETworks in Urban Area Environment Supporte with

More information

An Analysis of Reliable MAC Layer Multicast in Wireless Networks

An Analysis of Reliable MAC Layer Multicast in Wireless Networks An Analysis of Reliable MAC Layer Multicast in Wireless etworks Yoooc Song, Junho Chung, Wookyung Sung, Bosung Kim, Dowon Hyun an Juwook Jang Department of lectronic ngineering, Sogang University. mail:

More information

Indoor Positioning Using Ultrasound and Radio Combination

Indoor Positioning Using Ultrasound and Radio Combination Inoor Positioning Using Ultrasoun an Raio Combination Gintautas Salcius, Evalas Povilaitis, Algimantas Tacilauskas Centre of Real Time Computer Systems, Kaunas University of Technology Stuentu St. 50,

More information

Performance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels

Performance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels http://x.oi.org/.5755/ j.eee..5.333 ELEKTRONIKA IR ELEKTROTECHNIKA ISSN 39-5 VOL. NO. 5 5 Performance of Amplify-an-Forwar Relaying with Wireless Power Transfer over Dissimilar Channels Dac-Binh Ha Duc-Dung

More information

AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS

AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS Davi B. Smith (1) (1) Faculty of Engineering (Telecommunications), University of Technology Syney PO Box 13 Broaway NS 007 Australia E-mail:

More information

Wireless Event-driven Networked Predictive Control Over Internet

Wireless Event-driven Networked Predictive Control Over Internet UKACC International Conference on Control 22 Cariff, UK, 3-5 September 22 Wireless Event-riven Networke Preictive Control Over Internet Wenshan Hu, Hong Zhou, an Qijun Deng Abstract In networke control

More information

Construction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna

Construction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna Construction of Power Efficient Routing Tree for A Hoc Wireless Networks using Directional Antenna Qing Dai an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT

EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT Timothy W. McLain Ranal W. Bear Je M. Kelsey Department of Mechanical Engineering, Brigham Young University, Provo, Utah 86 Department

More information

Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks

Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks Balance-energy Sleep Scheuling Scheme for High Density Cluster-base Sensor Networks Jing Deng, unghsiang S. Han, Weni B. Heinzelman, an Pramo K. Varshney Abstract In orer to conserve battery power in very

More information

MODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION

MODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION Int. J. Elec&Electr.Eng&Telcomm. 2012 G Sateesh Kumar et al., 2012 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 1, No. 1, October 2012 2012 IJEETC. All Rights Reserve MODELLING OF GPS SIGNAL LARGE

More information

Effect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems

Effect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the ICC 008 proceeings. Effect of Carrier Frequency Offset on the erformance

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Power Efficient Pilot Symbol Power Allocation under Time-variant Channels

Power Efficient Pilot Symbol Power Allocation under Time-variant Channels Power Efficient Pilot Symbol Power Allocation uner Time-variant Channels Michal Šimko, Paulo S. R. Diniz,QiWang an Markus Rupp Institute of Telecommunications, Vienna University of Technology, Vienna,

More information

Double Closed-loop Control System Design of PMSM Based on DSP MoupengTao1, a,songjianguo2, b, SongQiang3, c

Double Closed-loop Control System Design of PMSM Based on DSP MoupengTao1, a,songjianguo2, b, SongQiang3, c 4th International Conference on Mechatronics, Materials, Chemistry an Computer Engineering (ICMMCCE 2015) Double Close-loop Control System Design of PMSM Base on DSP MoupengTao1, a,songjianguo2, b, SongQiang3,

More information

AN-1140 APPLICATION NOTE

AN-1140 APPLICATION NOTE APPLICATION NOTE One Technology Way P.O. Box 9106 Norwoo, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com Microphone Array Beamforming by Jera Lewis INTRODUCTION All MEMS microphones

More information

Jitter Limitations on a Gigabit Copper Multi- Carrier System

Jitter Limitations on a Gigabit Copper Multi- Carrier System Jitter Limitations on a Gigabit Copper Multi- Carrier System Jan H. Rutger Schraer, Eric A.M. Klumperink, Jan L. Visschers, Bram Nauta University of Twente, IC-Design Group, P.O. Box 7, 75 AE, Enschee,

More information

Indoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map

Indoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map Inoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map Ahma Abbou 1, Ali H. Jaber Department of Statistics ebanese University Nabatieh, ebanon 1 Ahma.Abbou@etu.unilim.fr, ali.jaber@ul.eu.lb

More information

Replanning of Optical Networks based on Defragmentation Techniques

Replanning of Optical Networks based on Defragmentation Techniques Replanning of Optical Networks base on Defragmentation Techniques Daniela Aguiar Moniz aniela.moniz@tecnico.ulisboa.pt Instituto Superior Técnico, Lisboa, Portugal November 2015 Abstract The traffic growth

More information

Transit Network Design under Stochastic Demand

Transit Network Design under Stochastic Demand Transit Network Design uner Stochastic Deman Hong K. LO Civil an Environmental Engineering Hong Kong University of Science an Technology 1 Public transport Backgroun Fixe route transit (FRT) : fixe route

More information

Implementation of Beam Formation for WMNs

Implementation of Beam Formation for WMNs Implementation of Beam Formation for WMNs M. UTHANSAKUL, S. PRADITTARA AND P. UTHANSAKUL School of Telecommunication Engineering Suranaree University of Technology 111 University Avenue, Muang, Nakhonratchasima

More information

Principal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing

Principal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Principal Component Analysis-Base Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Xin He 1, Yashwant Malaiya 2, Anura P. Jayasumana 1 Kenneth P. Parker 3 an Stephen Hir

More information

Breaking the Interference Barrier in Dense Wireless Networks with Interference Alignment

Breaking the Interference Barrier in Dense Wireless Networks with Interference Alignment Breaking the Interference Barrier in Dense Wireless Networks with Interference Alignment Konstantinos Dovelos an Boris Bellalta Universitat Pompeu Fabra (UPF, Barcelona Abstract arxiv:1710.11458v2 [cs.ni]

More information

Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA

Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA Probabilistic Hanshake in All-to-all Broacast Coe Slotte ALOHA Mikhail Ivanov, Petar Popovski, Frerik Brännström, Alexanre Graell i Amat, an Čeomir Stefanović Department of Signals an Systems, Chalmers

More information

On the performance of truncated type III hybrid ARQ scheme with code combining

On the performance of truncated type III hybrid ARQ scheme with code combining WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2003; 3:641 658 (DOI: 10.1002/wcm.147) On the performance of truncate type III hybri ARQ scheme with coe combining Qingchun Chen*,y

More information

RECENTLY, the 2G standard GSM was enhanced by

RECENTLY, the 2G standard GSM was enhanced by 274 IEEE TRANSACTIONS ON WIREESS COMMUNICATIONS, VO. 5, NO. 2, FEBRUARY 2006 The Training Sequence Coe Depenence of EDGE Receivers using Zero IF Sampling Martin Krueger, Member, IEEE, Robert Denk, an Bin

More information

The use of Facts devices in disturbed Power Systems-Modeling, Interface, and Case Study

The use of Facts devices in disturbed Power Systems-Modeling, Interface, and Case Study nternational Journal of Computer an Electrical Engineering, ol., No., April 009 793-898 The use of Facts evices in isturbe Power Systems-Moeling, nterface, an Case Stuy Salim. Haa, A. Haouche, an H. ouyea

More information

Generalized Signal Alignment For MIMO Two-Way X Relay Channels

Generalized Signal Alignment For MIMO Two-Way X Relay Channels Generalized Signal Alignment For IO Two-Way X Relay Channels Kangqi Liu, eixia Tao, Zhengzheng Xiang and Xin Long Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China Emails:

More information

On the Performance of Cooperative Routing in Wireless Networks

On the Performance of Cooperative Routing in Wireless Networks 1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

arxiv: v2 [nlin.ao] 24 May 2012

arxiv: v2 [nlin.ao] 24 May 2012 arxiv:205.2952v2 [nlin.ao] 24 May 202 Synchronization an quorum sensing in a swarm of humanoi robots Patrick Bechon, Jean-Jacques Slotine Abstract With the avent of inexpensive simple humanoi robots, new

More information

The Analysis and Complementarity of Abbe Principle Application Limited in Coordinate Measurement

The Analysis and Complementarity of Abbe Principle Application Limited in Coordinate Measurement Proceeings of the Worl Congress on Engineering 00 Vol III The Analysis an Complementarity of Abbe Principle Application Limite in Coorinate Measurement Fei Yetai, Shang Ping, Chen Xiaohuai, Huang Qiangxian

More information

DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING

DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING Zelko Popovic Distribution engineer Rae Koncara 57, 24300 Backa Topola, Yugoslavia Phone: +38 24 74 220 Fax: +38 24 74 898

More information

Uneven Clustering Routing Algorithm Based on Optimal Clustering for Wireless Sensor Networks

Uneven Clustering Routing Algorithm Based on Optimal Clustering for Wireless Sensor Networks Journal of Communications Vol. 11, No., February 016 Uneven Clustering Routing Algorithm Base on Optimal Clustering for Wireless Sensor Networks Jianpo Li an Junyuan Huo School of Information Engineering,

More information

Slow Beam Steering for Indoor Multi-User Visible Light Communications

Slow Beam Steering for Indoor Multi-User Visible Light Communications Slow Beam Steering for Inoor Multi-User Visible Light Communications Yusuf Sai Eroğlu, Chethan Kumar Anjinappa, İsmail Güvenç, an Nezih Pala Department of Electrical an Computer Engineering, North Carolina

More information

KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017

KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017 Jurnal Ilmiah KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017 ISSN 0216 0544 e-issn 2301 6914 OPTIMAL RELAY DESIGN OF ZERO FORCING EQUALIZATION FOR MIMO MULTI WIRELESS RELAYING NETWORKS

More information

Relay Selection in Adaptive Buffer-Aided Space-Time Coding with TAS for Cooperative Wireless Networks

Relay Selection in Adaptive Buffer-Aided Space-Time Coding with TAS for Cooperative Wireless Networks Asian Journal of Engineering and Applied Technology ISSN: 2249-068X Vol. 6 No. 1, 2017, pp.29-33 The Research Publication, www.trp.org.in Relay Selection in Adaptive Buffer-Aided Space-Time Coding with

More information

On Time-of-Arrival Estimation in NB-IoT Systems

On Time-of-Arrival Estimation in NB-IoT Systems On Time-of-Arrival Estimation in NB-IoT Systems Sha Hu, Xuhong Li, an Frerik Rusek Department of Electrical an Information Technology, Lun University, Lun, Sween {firstname.lastname}@eit.lth.se arxiv:7.383v

More information

A new method of converter transformer protection without commutation failure

A new method of converter transformer protection without commutation failure IOP Conference Series: Earth an Environmental Science PAPER OPEN ACCESS A new metho of converter transformer protection without commutation failure To cite this article: Jiayu Zhang et al 08 IOP Conf.

More information

THe notion of the disease [1] has been extended from

THe notion of the disease [1] has been extended from IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 Effective Network Quarantine with Minimal Restrictions on Communication Activities uanyang Zheng an Jie Wu, Fellow, IEEE Abstract

More information

ORTHOGONAL frequency division multiple access

ORTHOGONAL frequency division multiple access ITL JOURAL OF ELECTROICS AD TELECOMMUICATIOS, 01, VOL. 58, O. 3, PP. 61 66 Manuscript receive December 18, 011; revise February, 01. DOI: 10.478/v10177-01-0036-0 Timing Synchronization an Frequency Offset

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

Measurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz

Measurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz Measurement of Semi-Anechoic Chamber Using Moifie VSWR metho above 1GHz M. Bittera, K. Kováč, J. Hallon Department of Measurement, Faculty of Electrical Engineering an Information Technology, Slovak University

More information

HOW SYMMETRICAL COMPONENTS MAY HELP TO SUPPRESS VOLTAGE SENSORS IN DIRECTIONAL RELAYS FOR DISTRIBUTION NETWORKS

HOW SYMMETRICAL COMPONENTS MAY HELP TO SUPPRESS VOLTAGE SENSORS IN DIRECTIONAL RELAYS FOR DISTRIBUTION NETWORKS C E D 17 th nternational Conference on Electricity Distribution Barcelona, 12-15 May 2003 HOW SYMMETCAL COMPONENTS MAY HELP TO SUPPESS VOLTAGE SENSOS N DECTONAL ELAYS FO DSTBUTON NETWOKS Xavier LE PVET

More information

New M-ary QAM Transmission Payload System

New M-ary QAM Transmission Payload System r AIAA ICSSC-005 New M-ary QAM Transmission Payloa System Masayoshi TANAKA * Nihon University, College of Inustrial Technology, --, Izumicho, Narashino, 75-8575, Japan This paper presents a new M-ary moulation

More information

RCGA based PID controller with feedforward control for a heat exchanger system

RCGA based PID controller with feedforward control for a heat exchanger system Journal of the Korean Society of Marine Engineering, Vol. 1, No. pp. 11~17, 17 ISSN 223-7925 (Print) J. Korean Soc. of Marine Engineering (JKOSME) ISSN 223-8352 (Online) https://oi.org/.5916/jkosme.17.1..11

More information

Radio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b

Radio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b Raio Range Ajustment for Energy Efficient Wireless Sensor Networks Q. Gao a,, K. J. Blow a 1, D. J. Holing a, I. W. Marshall b, X. H. Peng a a Electronic Engineering, Aston University, Birmingham B4 7ET,Unite

More information

Performance Comparison of the Differential Evolution and Particle Swarm Optimization Algorithms in Free-Space Optical Communications Systems

Performance Comparison of the Differential Evolution and Particle Swarm Optimization Algorithms in Free-Space Optical Communications Systems [Downloae from www.aece.ro on Tuesay August 18 015 at 1:7:15 (UTC) by 194.7.9.5. Reistribution subect to AECE license or copyright.] Avances in Electrical an Computer Engineering Volume 15 Number 015 erformance

More information

Acoustical Localization in Schools of Submersibles

Acoustical Localization in Schools of Submersibles Oceans 6, Singapore (authors manuscript o not istribute) Acoustical Localization in Schools of Submersibles Navina Kottege & Uwe R. Zimmer Research School of Information Sciences an Engineering Autonomous

More information

Analog Input. Current

Analog Input. Current A Continuous-Time Switche- Moulator with Reuce Loop Delay Louis Luh John Choma,Jr. Jerey Draper Electrical Engineering Information Sciences Institute University of Southern California University of Southern

More information

A Primary User Emulation Attack Countermeasure Strategy and Energy-Efficiency Analysis in Cognitive Radio Networks

A Primary User Emulation Attack Countermeasure Strategy and Energy-Efficiency Analysis in Cognitive Radio Networks Journal o Communications Vol., No., January 7 A imary User Emulation Attack Countermeasure Strategy an Energy-Eiciency Analysis in Cognitive Raio Networks unchuan Wang, Xiaorong Xu, Weiwei Wu, an Jianrong

More information

Code-Carrier Divergence Monitoring for the GPS Local Area Augmentation System

Code-Carrier Divergence Monitoring for the GPS Local Area Augmentation System Coe-Carrier Divergence Monitoring for the GPS Local Area Augmentation System Dwaraanath V. Simili an Boris Pervan, Illinois Institute of Technology, Chicago, IL Abstract Coe-carrier smoothing is a commonly

More information

Teaching Control Using NI Starter Kit Robot

Teaching Control Using NI Starter Kit Robot UKACC International Conference on Control 2012 Cariff, UK, 3-5 September 2012 Teaching Control Using NI Starter Kit Robot Payman Shakouri, Member IEEE, (Research stuent) Gorana Collier, Member IEEE, Anrzej

More information

Chapter 2 Review of the PWM Control Circuits for Power Converters

Chapter 2 Review of the PWM Control Circuits for Power Converters Chapter 2 Review of the PWM Control Circuits for Power Converters 2. Voltage-Moe Control Circuit for Power Converters Power converters are electrical control circuits that transfer energy from a DC voltage

More information

INTERFERENCE REJECTION PERFORMANCE AS A MEANS OF FREQUENCY OPTIMISATION IN A MIXED CELLULAR/MANET NETWORK

INTERFERENCE REJECTION PERFORMANCE AS A MEANS OF FREQUENCY OPTIMISATION IN A MIXED CELLULAR/MANET NETWORK ITERFERECE REJECTIO PERFORMACE A A MEA OF FREQUECY OPTIMIATIO I A MIXED CELLULAR/MAET ETORK Kayonne ebley Faculty Avisor: Dr. Richar Dean Department of Electrical an Computer Engineering Morgan tate University

More information

FASTER-THAN-NYQUIST SPATIOTEMPORAL SYMBOL-LEVEL PRECODING IN THE DOWNLINK OF MULTIUSER MISO CHANNELS

FASTER-THAN-NYQUIST SPATIOTEMPORAL SYMBOL-LEVEL PRECODING IN THE DOWNLINK OF MULTIUSER MISO CHANNELS FASTER-THAN-NYQUIST SPATIOTEMPORAL SYMBOL-LEVEL PRECODING IN THE DOWNLINK OF MULTIUSER MISO CHANNELS Maha Aloeh, Danilo Spano, Symeon Chatzinotas, an Björn Ottersten Interisciplinary Centre for Security

More information

A model for mobility-dependent large-scale. propagation characteristics of wireless channel. D. Moltchanov, Y. Koucheryavy, J.

A model for mobility-dependent large-scale. propagation characteristics of wireless channel. D. Moltchanov, Y. Koucheryavy, J. A moel for mobility-epenent large-scale propagation characteristics of wireless channels D. Moltchanov, Y. Koucheryavy, J. Harju Abstract In this paper we propose an extension to existing Markovian wireless

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the worl s leaing publisher of Open Access books Built by scientists, for scientists 3,500 108,000 1.7 M Open access books available International authors an eitors Downloas Our authors

More information

Using Chaos to Detect IIR and FIR Filters

Using Chaos to Detect IIR and FIR Filters PIERS ONLINE, VOL. 6, NO., 00 90 Using Chaos to Detect IIR an FIR Filters T. L. Carroll US Naval Research Lab, Coe 66, Washington, DC 07, USA Abstract In many signal processing applications, IIR an FIR

More information

A Study of Near-Field Direct Antenna Modulation Systems Using Convex Optimization

A Study of Near-Field Direct Antenna Modulation Systems Using Convex Optimization American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July, WeB8.5 A Stuy of Near-Fiel Direct Antenna Moulation Systems Using Convex Optimization Java Lavaei, Ayin Babakhani, Ali Hajimiri

More information

Controller Design for Cuk Converter Using Model Order Reduction

Controller Design for Cuk Converter Using Model Order Reduction n International Conference on Power, Control an Embee Systems Controller Design for Cuk Converter Using Moel Orer Reuction Brijesh Kumar Kushwaha an Mr. Aniruha Narain Abstract: Cuk converter contain two

More information

Pilot Based Time Delay Estimation for KSP-OFDM Systems in a Multipath Fading Environment

Pilot Based Time Delay Estimation for KSP-OFDM Systems in a Multipath Fading Environment Pilot Base Time Delay Estimation for KSP-OFDM Systems in a Multipath Faing Environment Dieter Van Welen, Freerik Simoens, Heii Steenam an Marc Moeneclaey TELI Department, Ghent University Sint-Pietersnieuwstraat

More information

Dynamic Wireless Power Transfer System for Electric Vehicles to Simplify Ground Facilities - Real-time Power Control and Efficiency Maximization -

Dynamic Wireless Power Transfer System for Electric Vehicles to Simplify Ground Facilities - Real-time Power Control and Efficiency Maximization - Worl Electric Vehicle Journal Vol. 8 - ISSN 232-6653 - 26 WEVA Page WEVJ8-5 EVS29 Symposium Montréal, Québec, Canaa, June 9-22, 26 Dynamic Wireless Power Transfer System for Electric Vehicles to Simplify

More information

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao

More information

Optimal Energy Harvesting Scheme for Power Beacon-Assisted Wireless-Powered Networks

Optimal Energy Harvesting Scheme for Power Beacon-Assisted Wireless-Powered Networks Indonesian Journal of Electrical Engineering and Computer Science Vol. 7, No. 3, September 2017, pp. 802 808 DOI: 10.11591/ijeecs.v7.i3.pp802-808 802 Optimal Energy Harvesting Scheme for Power Beacon-Assisted

More information

Efficient Binary Corona Training Protocols for Heterogeneous Sensor and Actor Networks

Efficient Binary Corona Training Protocols for Heterogeneous Sensor and Actor Networks 1 Efficient Binary Corona Training Protocols for Heterogeneous Sensor an Actor Networks F. Barsi, A.A. Bertossi, C. Lavault, A. Navarra, S. Olariu, M.C. Pinotti, an V. Ravelomanana Abstract Sensor networks

More information

Energy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control

Energy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control 11 I Colloquium on Humanities, Science an ngineering Research (CHUSR 11), Dec 5-6 11, Penang nergy fficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control Z.W. Siew, A. Kiring,

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

MULTIPATH fading could severely degrade the performance

MULTIPATH fading could severely degrade the performance 1986 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 12, DECEMBER 2005 Rate-One Space Time Block Codes With Full Diversity Liang Xian and Huaping Liu, Member, IEEE Abstract Orthogonal space time block

More information

Experimental implementation of an Ultra-Wide Band MIMO radar

Experimental implementation of an Ultra-Wide Band MIMO radar Experimental implementation of an Ultra-Wie Ban MIMO raar Ettien Lazare Kpré, Thomas Fromenteze, Cyril Decroze, Davi Carsenat To cite this version: Ettien Lazare Kpré, Thomas Fromenteze, Cyril Decroze,

More information

Abstract Harvesting energy from ambient environment is a new promising solution to free electronic devices from electric

Abstract Harvesting energy from ambient environment is a new promising solution to free electronic devices from electric Wireless Communication System with RF-base Energy Harvesting: From Information Theory to Green System Tao Li, Pingyi Fan, Senior Member, IEEE, Khale Ben Letaief, Fellow, IEEE arxiv:1411.6087v1 [cs.it]

More information

Model Reference Adaptive Fuzzy Controller for Permanent Magnet Synchronous Motor

Model Reference Adaptive Fuzzy Controller for Permanent Magnet Synchronous Motor Volume 50, Number 1, 2009 25 Moel Reference Aaptive Fuzzy Controller for Permanent Magnet Synchronous Motor A. MEROUFEL, M. MASSOUM an B. BELABBES Abstract: Conventional control epens on the mathematical

More information

Cell-Free Massive MIMO versus Small Cells

Cell-Free Massive MIMO versus Small Cells IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. X, XXX 2017 1 Cell-Free Massive MIMO versus Small Cells Hien Quoc Ngo, Alexei Ashikhmin, Hong Yang, Erik G. Larsson, an Thomas L. Marzetta arxiv:1602.08232v2

More information

Power Allocation for Three-Phase Two-Way Relay Networks with Simultaneous Wireless Information and Power Transfer

Power Allocation for Three-Phase Two-Way Relay Networks with Simultaneous Wireless Information and Power Transfer Power Allocation for Three-Phase Two-Way Relay Networks with Simultaneous Wireless Information and Power Transfer Shahab Farazi and D. Richard Brown III Worcester Polytechnic Institute 100 Institute Rd,

More information

On Energy Efficiency Maximization of AF MIMO Relay Systems with Antenna Selection

On Energy Efficiency Maximization of AF MIMO Relay Systems with Antenna Selection On Energy Efficiency Maximization of AF MIMO Relay Systems with Antenna Selection (Invited Paper) Xingyu Zhou, Student Member, IEEE, Bo Bai Member, IEEE, Wei Chen Senior Member, IEEE, and Yuxing Han E-mail:

More information

Color image recognition by use of a joint transform correlator of three liquid-crystal televisions

Color image recognition by use of a joint transform correlator of three liquid-crystal televisions Color image recognition by use of a joint transform correlator of three liqui-crystal televisions Mei-Li Hsieh, Ken Y. Hsu, an Hongchen Zhai We present a joint transform correlator for color image recognition

More information

A Circuit Level Fault Model for Resistive Shorts of MOS Gate Oxide

A Circuit Level Fault Model for Resistive Shorts of MOS Gate Oxide Circuit Level Fault Moel for esistive Shorts of MOS Gate Oxie Xiang Lu, Zhuo Li, Wangqi Qiu, D. M. H. Walker an Weiping Shi Dept. of Electrical Engineering Texas &M University College Station, TX 77843-34,

More information

Erlang Capacity of Multi-class TDMA Systems with Adaptive Modulation and Coding

Erlang Capacity of Multi-class TDMA Systems with Adaptive Modulation and Coding Downloae from orbittuk on: Oct 2, 218 Erlang Capacity of Multi-class TDMA Systems with Aaptive Moulation an Coing Wang, Hua; Iversen, Villy Bæk Publishe in: Proceeings of IEEE ICC 28 Link to article, DOI:

More information

Reliability and Route Diversity in Wireless Networks

Reliability and Route Diversity in Wireless Networks 2005 Conference on Information Sciences an Sstems, The Johns Hopkins Universit, March 16 18, 2005 Reliabilit an Route Diversit in Wireless Networks Ehsan Khanani, Etan Moiano, Jinane Abounai, Lizhong Zheng

More information

IN RECENT years, wireless multiple-input multiple-output

IN RECENT years, wireless multiple-input multiple-output 1936 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 6, NOVEMBER 2004 On Strategies of Multiuser MIMO Transmit Signal Processing Ruly Lai-U Choi, Michel T. Ivrlač, Ross D. Murch, and Wolfgang

More information