The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider a single-input multiple-output (SIMO) multiple-access channel (MAC) multi-cellular communication scenario in which two base stations having a group of users each, are situated in two adjacent cells. In order to provide cooperative diversity at the base stations (BSs), multiple relays are used. Each group of users transmits information to its corresponding BS directly as well as via relays,...
In this paper, the problem of security in multiple input multiple output (MIMO) system has been analysed in the presence of an eavesdropper in cognitive radio networks. Multiple primary and secondary users communicate with the primary and secondary receiver, respectively. The secrecy capacity at primary receiver (PR) and secondary receiver (SR) have been calculated. At first, we use zero-forcing (ZF)...
An opportunistic relaying strategy is introduced in this paper to enhance the performance of multicasting. The key feature of this work is to provide an additional diversity to the multicast users selecting best relay from a group of multiple relays. It is assumed that there is no direct path between the source and the destinations and communication occurs only through the relays. The best relay is...
In this paper, a confidential communication scenario is considered through selection decode-and-forward cooperative relay networks over Rayleigh fading channel in which a source communicates with a destination via multiple relays. A best relay is selected using selection combining technique which communicates with the destination. An eavesdropper observes their communication and tries to decode confidential...
A new closed form expression for the ergodic secrecy capacity with multi-keyhole Multiple-Input Multiple-Output (MIMO) channel has been derived in this paper. Assuming independent and identically distributed (i.i.d.) Rayleigh flat-fading between transmitting and receiving antennas and equal power allocation to each of the transmit antennas, the ergodic secrecy capacity is expressed as a finite sum...
In this paper, we consider a confidential communication through multi-cellular co-located multiple-input multiple-output (C-MIMO) and distributed MIMO (D-MIMO) networks in the presence of an eavesdropper. The base station (BS) of each cell sends a common stream of information to a group of receivers within the cell and an eavesdropper observes their communications. We are interested to protect these...
In this paper, a secured dual-hop confidential communication system is considered. In which, a source transmits secret information to the destination in the presence of an interferer and an eavesdropper. And, multiple relays provide cooperative diversity at the destination. The interferer, source and relays are equipped with single antenna whereas the destination and eavesdropper are equipped with...
This paper is concerned with the analysis of secrecy capacity and secure outage performance of cooperative spatial multiplexing system with the effect of linear equalization. A confidential communication scenario is considered through Rayleigh fading channel in which a number of users communicate with a destination via multiple relays. An eavesdropper observes their communication and tries to decode...
We consider a confidential communication through Rayleigh fading channel in which a source transmits a common stream of information to the multiple client receivers via multiple relays in the presence of an eavesdropper. We assume that there is no direct path from source to client receivers and eavesdropper, and communication occurs only through the relays. In order to increase the spectral efficiency,...
In this paper, we consider a multicasting scenario in cooperative spatial multiplexing system over Rayleigh fading channel in which a source S transmits a common stream of information to a group of client receivers via K relays. We assume that there is no direct path between S and the client receivers and communication occurs only through the relays. Considering a linear equalization, e.g. zero-forcing...
The Bit Error Rate (BER) and Peak to Average Power Ratio (PAPR) are the major concerns for wireless communication. This paper aims to analyze these two important parameters for different inputs and outputs block sizes of the discrete Fourier transform (DFT) based single carrier frequency division multiple access (SCFDMA) system by using the conventional raised cosine (RC) and square root raised cosine...
This paper is concerned with the reduction of peak to average power ratio (PAPR) of 3rd generation partnership project (3GPP) LTE standard using the single carrier-frequency division multiple access (SCFDMA) for mobile uplink transmission. The PAPR reduction is done based on the discrete Fourier transform (DFT) spreading technique which is well known as DFT - SCFDMA and in case of LTE which can reduce...
We consider the problem of wireless multicasting through multiple-input multiple-output (MIMO) heterogeneous networks in which macro and pico base stations communicate with multiple macro and pico users, respectively. At first, we calculate the multicast capacity of macro users (MUs) and pico users (PUs), and investigate the impact of interferences on it. Then, we use zero-forcing (ZF) precoding at...
This paper estimates bounds on the capacity of Nakagami-m fading massive multiple-input multiple-output (MIMO) channels with large number of antennas at the transmitter and receiver. We consider two models namely conventional co-located MIMO (C-MIMO) and distributed MIMO (D-MIMO) models. At first, we derive the achievable rate for the C-MIMO and D-MIMO systems. Secondly, we use maximum ratio combining...
We consider a confidential communication system in which a source sends a confidential information to the destination in the presence of an eavesdropper. Multiple relays are used to provide cooperative diversity to the destination. The destination and the eavesdropper are equipped with multiple antennas while each relay and source are equipped with single antenna. We are interested to protect the...
This paper aims to analyze the bit error rate (BER) and peak to average power ratio (PAPR) for discrete cosine transform (DCT) based single carrier frequency division multiple access (SCFDMA) system. Note that BER and PAPR are the major concerns for any wireless communication and for having lower PAPR till now discrete Fourier transform (DFT) based SCFDMA is implemented for the up-link communication...
We consider the problem of secure wireless multicasting through multiple-input multiple-output (MIMO) radio system in which two co-existing users communicate with two groups of receivers in the presence of multiple eavesdroppers. At first, we calculate the secrecy multicast capacity of each group and investigate the impact of interferences on it. Then, we use zero-forcing (ZF) precoding at a relay...
We consider the problem of secret communication through a relay assisted downlink cognitive interference channel in which secondary base station (SBS) is allowed to transmit simultaneously with the primary base station (PBS) over the same channel instead of waiting for an idle channel which is traditional for a cognitive radio. We propose a cooperative jamming (CJ) scheme to improve the secrecy rate...
Along with the channel capacity, the error exponent is one of the most important information-theoretic measures of reliability, as it sets ultimate bounds on the performance of communication systems employing codes of finite complexity. In this paper, we derive an exact analytical expression for the random coding error exponent, which provides significant insight regarding the ultimate limits to communications...
We consider the problem of secret communication through cognitive relay assisted interference channels in which secondary user (SU) is allowed to transmit simultaneously with the primary user (PU) over the same channel instead of waiting for an idle channel which is traditional for a cognitive radio. We propose two cooperative jamming (CJ) schemes to improve the secrecy rate of cognitive interference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.