The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, there has been growing interest in secure communication via multi-antenna physical-layer designs. In this paper, we consider a transmit covariance design for a secrecy rate maximization problem under a multicast scenario, where a multi-antenna transmitter delivers a common confidential message to multiple single-antenna receivers in the presence of multiple multi-antenna eavesdroppers. This...
In wireless X networks where all transmitters send the independent messages to all receivers, the theoretical degrees of freedom (DOF) and interference alignment (IA) scheme for its achievability are given by Cadambe and Jafar. However, IA scheme for wireless X network may be infeasible in practice unless the transmitters have the perfect channel information. In addition, if the transmitter with single...
In MIMO-OFDM communications, the channel state information (CSI) of the forward link is needed for precoder design at the transmitter to achieve the maximal performance gains. In frequency division duplex (FDD) systems, the CSI estimated at the receivers needs to be fed back to the transmitters. Because of the limited network resources, there will be CSI feedback errors due to quantization, delay...
Block Diagonalization (BD) algorithm is a generalization of channel inversion scheme in multiuser multi-input multi-output (MIMO) broadcast channels. Although the BD algorithm is effective in removing interuser interference, it has a drawback that additional information should be delivered to the receiver. Recent work on BD with vector perturbation (VP) avoids the need for additional information and...
In this work the problem of non-cooperative resource optimization in the uplink of a relay-assisted MIMO MAC system with partial CSI at the transmitter is addressed. Each multiple access user pursues individual rate maximization, whereas the relay designs its amplify-and-forward matrix in order to optimize the system's sum-rate. From a game-theoretic perspective, the resource allocation process is...
This paper examines the use of two-way training in multiple-input multiple-output (MIMO) wireless systems to discriminate the channel estimation (and, thus, data detection) performance between two receivers, namely, a legitimate receiver (LR) and an unauthorized receiver (UR). This work extends upon the discriminatory channel estimation (DCE) proposed in our prior work, where it was previously assumed...
In this paper, we propose a practical interference alignment technique based on an opportunistic user selection in a three-user MIMO interference channel where no information is allowed to be shared among transmitters. In the proposed scheme, the user whose interference signals from other transmitters are most aligned with each other is selected at each transmitter. The proposed opportunistic interference...
We investigate multiple-input multiple-output broadcast channel with channel distribution information at the transmitter. We consider the fading-paper model with Nt transmit and Nr receive antennas. Near-optimal methods for designing the inflation factor matrix (choice of auxiliary random variable) to maximize the linear assignment capacity in a general fading channel model are proposed. Further,...
Inter-cell interference coming from multiple base stations (BS) in adjacent cells limits the capacity of wireless cellular networks. In this paper, we exploit the uplink-downlink duality principle and BS cooperation to design linear and nonlinear downlink inter-cell interference management techniques for multi-user multiple-input-multiple-output (MIMO) systems. The proposed linear algorithm can effectively...
We consider transceiver design in uncoded multiple-input multiple-output (MIMO) systems with noisy channel state estimates. Specifically, we design a transceiver that takes into account the statistics of the CSI errors red to minimize the average bit average rate (BER) of the system. Our design utilizes the noisy CSI estimates and the error statistics at the transmitter to partition the spatial channels...
We analyze the fundamental limits of secret-key agreement over MIMO quasi-static fading channels. In the low-power and high-power regimes, we establish closed-form expressions for secret-key capacity. In the low-power regime, we show that the optimal signaling strategy is independent of the eavesdropper's fading realization. The low-power secret-key capacity is achieved by transmitting along the direction...
This paper discusses the performance of Golden codes in a hybrid satellite/terrestrial system framework employing dual polarized MIMO-OFDM transmissions. Although the use of Golden codes in satellite and terrestrial scenarios has been studied independently, a realistic performance assessment must involve both components taking into account the relative delay between their reception. In fact, this...
This paper studies the \emph{robust weighted-sum rate} optimization problem in the presence of channel uncertainty over a $K$-user Gaussian Interference Channel (GIFC), where multiple antennas are present at all transmitters and receivers. Motivated by recent results on \emph{interference alignment} that show the optimality of linear precoders and simple receivers in achieving the maximum degrees-of-freedom...
The capacity optimization problem of MIMO links with interference has attracted an increasing interest. Due to the nonconvexity of the capacity problem, only suboptimal solutions can be found. In the previous works, a Gradient Projection (GP) algorithm [1] and a Quasi-Newton (QN) method [2] were proposed to provide suboptimal solutions subject to the constant power constraint. In this paper, we derive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.