• Title/Summary/Keyword: imperfect CSI

Search Result 31, Processing Time 0.041 seconds

Performance Analysis of Energy-Efficient Secure Transmission for Wireless Powered Cooperative Networks with Imperfect CSI

  • Yajun Zhang;Jun Wu;Bing Wang;Hongkai Wang;Xiaohui Shang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2399-2418
    • /
    • 2023
  • The paper focuses on investigating secure transmission in wireless powered communication networks (WPCN) that involve multiple energy-constrained relays and one energy-constrained source. The energy is harvested from a power beacon (PB) while operating in the presence of a passive eavesdropper. The study primarily aims to achieve energy-efficient secure communications by examining the impact of channel estimation on the secrecy performance of WPCN under both perfect and imperfect CSI scenarios. To obtain practical insights on improving security and energy efficiency, we propose closed-form expressions for secrecy outage probability (SOP) under the linear energy harvesting (LEH) model of WPCN. Furthermore, we suggest a search method to optimize the secure energy efficiency (SEE) with limited power from PB. The research emphasizes the significance of channel estimation in maintaining the desired performance levels in WPCN in real-world applications. The theoretical results are validated through simulations to ensure their accuracy and reliability.

Robust Cooperative Relay Beamforming Design for Security

  • Gong, Xiangwu;Dong, Feihong;Li, Hongjun;Shao, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4483-4501
    • /
    • 2015
  • In this paper, we investigate a security transmission scheme at the physical layer for cooperative wireless relay networks in the presence of a passive eavesdropper. While the security scheme has been previously investigated with perfect channel state information(CSI) in the presence of a passive eavesdropper, this paper focuses on researching the robust cooperative relay beamforming mechanism for wireless relay networks which makes use of artificial noise (AN) to confuse the eavesdropper and increase its uncertainty about the source message. The transmit power used for AN is maximized to degrade the signal-to-interference-plus-noise-ratio (SINR) level at the eavesdropper, while satisfying the individual power constraint of each relay node and worst-case SINR constraint at the desired receiver under a bounded spherical region for the norm of the CSI error vector from the relays to the destination. Cooperative beamforming weight vector in the security scheme can be obtained by using S-Procedure and rank relaxation techniques. The benefit of the proposed scheme is showed in simulation results.

Performance analysis of SWIPT-assisted adaptive NOMA/OMA system with hardware impairments and imperfect CSI

  • Jing Guo;Jin Lu;Xianghui Wang;Lili Zhou
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.254-266
    • /
    • 2023
  • This paper investigates the effect of hardware impairments (HIs) and imperfect channel state information (ICSI) on a SWIPT-assisted adaptive nonorthogonal multiple access (NOMA)/orthogonal multiple access (OMA) system over independent and nonidentical Rayleigh fading channels. In the NOMA mode, the energy-constrained near users act as a relay to improve the performance for the far users. The OMA transmission mode is adopted to avoid a complete outage when NOMA is infeasible. The best user selection scheme is considered to maximize the energy harvested and avoid error propagation. To characterize the performance of the proposed systems, closed-form and asymptotic expressions of the outage probability for both near and far users are studied. Moreover, exact and approximate expressions of the ergodic rate for near and far users are investigated. Simulation results are provided to verify our theoretical analysis and confirm the superiority of the proposed NOMA/OMA scheme in comparison with the conventional NOMA and OMA protocol with/without HIs and ICSI.

A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks

  • Zhang, Bo;Huang, Kai-zhi;Chen, Ya-jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2595-2618
    • /
    • 2018
  • In this paper, we investigate secure communication with the presence of multiple eavesdroppers (Eves) in a two-tier downlink dense heterogeneous network, wherein there is a macrocell base station (MBS) and multiple femtocell base stations (FBSs). Each base station (BS) has multiple users. And Eves attempt to wiretap a macrocell user (MU). To keep Eves ignorant of the confidential message, we propose a physical-layer security scheme based on cross-layer cooperation to exploit interference in the considered network. Under the constraints on the quality of service (QoS) of other legitimate users and transmit power, the secrecy rate of system can be maximized through jointly optimizing the beamforming vectors of MBS and cooperative FBSs. We explore the problem of maximizing secrecy rate in both non-colluding and colluding Eves scenarios, respectively. Firstly, in non-colluding Eves scenario, we approximate the original non-convex problem into a few semi-definite programs (SDPs) by employing the semi-definite relaxation (SDR) technique and conservative convex approximation under perfect channel state information (CSI) case. Furthermore, we extend the frame to imperfect CSI case and use the Lagrangian dual theory to cope with uncertain constraints on CSI. Secondly, in colluding Eves scenario, we transform the original problem into a two-tier optimization problem equivalently. Among them, the outer layer problem is a single variable optimization problem and can be solved by one-dimensional linear search. While the inner-layer optimization problem is transformed into a convex SDP problem with SDR technique and Charnes-Cooper transformation. In the perfect CSI case of both non-colluding and colluding Eves scenarios, we prove that the relaxation of SDR is tight and analyze the complexity of proposed algorithms. Finally, simulation results validate the effectiveness and robustness of proposed scheme.

Probabilistic Constrained Approach for Distributed Robust Beamforming Design in Cognitive Two-way Relay Networks

  • Chen, Xueyan;Guo, Li;Dong, Chao;Lin, Jiaru;Li, Xingwang;Cavalcante, Charles Casimiro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.21-40
    • /
    • 2018
  • In this paper, we propose the distributed robust beamforming design scheme in cognitive two-way amplify-and-forward (AF) relay networks with imperfect channel state information (CSI). Assuming the CSI errors follow a complex Gaussian distribution, the objective of this paper is to design the robust beamformer which minimizes the total transmit power of the collaborative relays. This design will guarantee the outage probability of signal-to-interference-plus-noise ratio (SINR) beyond a target level at each secondary user (SU), and satisfies the outage probability of interference generated on the primary user (PU) above the predetermined maximum tolerable interference power. Due to the multiple CSI uncertainties in the two-way transmission, the probabilistic constrained optimization problem is intractable and difficult to obtain a closed-form solution. To deal with this, we reformulate the problem to the standard form through a series of matrix transformations. We then accomplish the problem by using the probabilistic approach based on two sorts of Bernstein-type inequalities and the worst-case approach based on S-Procedure. The simulation results indicate that the robust beamforming designs based on the probabilistic method and the worst-case method are both robust to the CSI errors. Meanwhile, the probabilistic method can provide higher feasibility rate and consumes less power.

Performance Analysis of STTC-based Dual Virtual Cell System under The Overlay Convergent Networks of Cognitive Networking (중첩 융합 네트워크 환경에서 STTC기반 이중 셀 시스템의 성능분석)

  • Kwon, Eun-Mi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7A
    • /
    • pp.528-534
    • /
    • 2012
  • In order to achieve high capacity and reliable link quality of the overlay convergent networks with the cognitive networking based on the advanced capability of the mobile terminal, a Distributed Wireless Communication System (DWCS) can provide the capability of enhancing the link quality. This paper has considered virtual cell: the Dual Virtual Cell (DVC), and also proposes DVC employment strategy based on radio resource monitering. The considered system constructs DVC for multi-user high-rate data transmission, and the DWCS system exploits space-time trellis codes i.e., STTC to improve a spectral efficiency. The effects of imperfect CSI(channel state information) on the system performance has also been investigated.

Low-Complexity MIMO Detection Algorithm with Adaptive Interference Mitigation in DL MU-MIMO Systems with Quantization Error

  • Park, Jangyong;Kim, Minjoon;Kim, Hyunsub;Jung, Yunho;Kim, Jaeseok
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.210-217
    • /
    • 2016
  • In this paper, we propose a low complexity multiple-input multiple-output (MIMO) detection algorithm with adaptive interference mitigation in downlink multiuser MIMO (DL MU-MIMO) systems with quantization error of the channel state information (CSI) feedback. In DL MU-MIMO systems using the imperfect precoding matrix caused by quantization error of the CSI feedback, the station receives the desired signal as well as the residual interference signal. Therefore, a complexMIMO detection algorithm with interference mitigation is required for mitigating the residual interference. To reduce the computational complexity, we propose a MIMO detection algorithm with adaptive interference mitigation. The proposed algorithm adaptively mitigates the residual interference by using the maximum likelihood detection (MLD) error criterion (MEC). We derive a theoretical MEC by using the MLD error condition and a practical MEC by approximating the theoretical MEC. In conclusion, the proposed algorithm adaptively performs interference mitigation when satisfying the practical MEC. Simulation results show that the proposed algorithm reduces the computational complexity and has the same performance, compared to the generalized sphere decoder, which always performs interference mitigation.

Resource Allocation for OFDMA Relay Networks with Imperfect CSI (불완전한 채널 정보를 갖는 OFDMA 중계 네트워크를 위한 자원 할당 기법)

  • Lee, Jaeho;Lee, Jae Hong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.07a
    • /
    • pp.247-249
    • /
    • 2011
  • 기존의 OFDMA 시스템에서의 자원할당 기술은 주로 완벽한 채널정보에 기반하여 송신 전력, 부반송파를 할당하였다. 하지만 실제 시스템에서는 사용자의 움직임이나 채널 피드백 지연에 의해 완전한 채널정보를 얻을 수 없다. 본 논문에서는 불완전한 채널 정보를 갖는 OFDMA 중계 네트워크를 위한 자원 할당 기법을 제안한다. 불완전한 채널 정보를 갖는 환경에서는 패킷 오류가 발생할 확률이 높기 때문에 이를 예측하여 적응적 데이터 전송률을 할당하는 기법이 필요하다. 제안된 알고리즘은 채널 정보를 예측하여 데이터 전송률, 그리고 부반송파 할당을 통해 유효처리율을 최대화시킨다. 모의 실험 결과 제안된 알고리즘은 채널정보를 예측하지 않는 단순한 알고리즘과 비교하여 더 높은 유효처리율을 갖음을 확인하였다.

  • PDF

Outage Probability of a Two-Way Full-Duplex Relay Network with Imperfect CSI (불완전한 채널 정보를 갖는 전이중 양방향 중계 네트워크의 불능 확률 성능 분석)

  • Choi, Dongwook;Lee, Jae Hong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.11a
    • /
    • pp.67-68
    • /
    • 2012
  • 전이중(full-duplex) 양방향 중계 네트워크는 전이중 방식을 사용하는 중계기에서 물리 계층 네트워크 부호화(physical layer network coding) 혹은 중첩 부호화(superposition coding)을 사용하여 기존 반이중(half duplex) 중계기를 사용하는 양방향 중계 네트워크에 비해 높은 주파수 효율을 제공한다. 본 논문에서는 전이중 양방향 중계 네트워크를 고려하여 전이중 방식에서 필연적으로 발생하는 루프간섭 신호의 영향을 살펴보았다. 여기에서 사용자 및 중계기는 루프간섭 신호를 제거하기 위해 루프간섭 신호를 추정한다. 하지만 루프간섭 신호를 추정할 때 추정 오류가 발생하여 수신 신호에서 루프간섭 신호를 완벽하게 제거하기는 어렵다. 모의실험에서는 이로 인해 발생할 수 있는 성능 변화를 불능 확률을 통해 분석하였다.

  • PDF

Relay Selection Scheme Using Imperfect CSI in Cognitive Relay Networks With Multiple Primary Users (다수의 1 차 사용자가 존재하는 무선 인지 중계 네트워크에서의 불완전 채널 정보를 이용한 중계기 선택 기법)

  • Lee, Juhyun;Hong, Seung Geun;Lee, Jae Hong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.06a
    • /
    • pp.88-89
    • /
    • 2018
  • 본 논문에서는 다수의 1 차 사용자가 존재하는 무선 인지 중계 네트워크를 분석한다. 다수의 1 차 사용자들의 신호는 2 차 사용자에게 간섭으로 작용하고 2 차 사용자들의 신호 또한 1 차 사용자에게 간섭으로 작용하게 된다. 이러한 환경에서 불완전한 채널 정보를 이용하여 최적의 중계기를 선택하는 방법을 제안하고 이때의 2 차 사용자 네트워크에서의 불능 확률을 분석하였다. 또한 모의실험을 통하여 불완전 채널 정보의 상관 계수의 변화에 따른 불능 확률의 변화를 확인하였다.

  • PDF