The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, an asymptotic analysis of the inversely proportional setting (IPS) of carrier sense threshold (CST) and transmission power in densely deployed wireless local area networks (WLANs) is presented. In densely deployed WLANs, CST adjustment is a crucial technology to enhance spatial channel reuse, but it can starve surrounding transmitters due to an asymmetric carrier sensing relationship...
Enabling the device-to-device (D2D) communication in the cellular network (CN) induces the problem of interference. This paper proposes a scheme of controlling the power of the D2D user equipments (DUEs) by switching D2D transmitter on the basis of receiver-sensitivity. The performance of the proposed scheme has been evaluated in slow fading environment, with the assumptions that the proximity gains,...
Tactical networks are generally simple ad-hoc networks in design, however, this simple design often gets complicated, when heterogeneous wireless technologies have to work together to enable seamless multi-hop communications across multiple sessions. In recent years, there has been some significant advances in computational, radio, localization, and networking te, and session's rate i.e., aggregate...
A novel interference management approach is proposed for modern communication scenarios, where multiple applications and networks coexist on the same channel resource. The leading principle behind the proposed approach is that the interference level should be adapted to the content being transmitted by the data links to maximize the amount of delivered information. A network setting is considered...
Recently, an enormous increasing number of mobile devices have changed people's life and brought huge demands for services. D2D (Device-to-Device) communication is a brand-new fashion that allows mobile stations communicating directly with each other using existing licensed band without traversing through core network, and thereby offload traffic from base stations (BS). On the other hand, relays...
In this paper the process of spectrum assignment in narrowband power line communication is studied. Due to the frequency-selective and time-variant nature of the PLC channel, spectrum assignment must be performed dynamically throughout the transmission. This requires constant channel state information at the PLC transmitter which in turn increases undesired overhead in the system and degrades throughput...
We study a two-user symmetric interference channel (IC) with common and private message under security constraints. In this model, one transmitter wants to send a common message to both receivers, while the other transmitter wants to send a private message to one receiver and needs to be protected from the unintended receiver. We first establish an inner bound on the secrecy rate region for the case...
In this paper, we consider the achievable secure degrees-of-freedom (sdof) for the multiple-input single-output (MISO) wiretap channel with an unknown Eavesdropper's channel state information (CSI). The underlying system model comprises three nodes: a multi-antenna transmitter (Alice), a single-antenna receiver (Bob) and a single-antenna eavesdropper (Eve). Recent studies have shown that the achievable...
We study energy-efficient secure link adaptation for large-scale device-to-device (D2D) underlaid cellular networks, where base stations (BSs), D2D transmitters, and eavesdroppers (Eve nodes) are distributed as independent homogeneous Poisson point processes. First, we analyze the impact of the underlaid D2D network on the secrecy performance, i.e., secrecy spectral efficiency (SE) and secrecy energy...
We investigate the energy efficiency (EE) maximization problem under the scenario of Device-to-Device (D2D) communications underlaying cellular networks. By jointly considering time-varying channels and stochastic arrivals, we propose a distributed power allocation algorithm for both D2D user groups (DUGs) and cellular user terminals (CUTs) with long- term quality of service (QoS) provision. To effectively...
Device-to-Device (D2D) communication is one of the key technologies to get to very high data rates in future 5G networks through offloading part of the cellular traffic onto D2D networks. While extensive research is targeted on addressing the many challenges D2D brings along in cellular networks, security issues have not gained much attention, especially that the direct connections between proximity...
The article considers the joint optimization of artificial noise (AN) and information signal precoders in a MIMO wiretap interference network where the transmission of each user may be overheard by several MIMO-capable eavesdroppers. We use the theory of non-cooperative games to propose a distributed framework to optimize the covariance matrices of the information signal and AN at each link. To tackle...
We consider centralized cross-layer resource allocation for a device-to-device (D2D) video transmission system, given knowledge of the channel state information and the rate distortion information of the video streams, and propose an iterative algorithm for subcarrier assignment and power allocation. In the resource allocation, the performance improvement by applying the exact symbol error rate (SER)...
This paper studies a wireless network consisting of multiple transmitter-receiver pairs sharing the same spectrum where interference is regarded as noise. Previously, the throughput region of such a network was characterized for either one time slot or an infinite time horizon. This work aims to close the gap by investigating the throughput region for transmissions over a finite time horizon. We derive...
Deployment of Multiple Cognitive Radio Networks (CRNs) is a very common scenario in today's world, like in the field of defence or disaster management. In this paper, we deal with the case of multiple numbers of co-located CRNs acting as secondary network along with one primary user (PU). We study the node based throughput performance of a CRN in presence of several coexisting CRNs. We generalize...
In this paper, we consider device-to-device (D2D) communication underlaying cellular networks, where D2D users harvest radio frequency (RF) power from uplink cellular transmissions. This paper addresses two important issues for energy harvesting-based D2D cellular networks. The first is how the energy harvested from cellular ambient RF signals affects the D2D spectral efficiency. Using tools from...
Abstract-We define a new class of modulations for wireless communication that use indelible electromagnetic signals to convey information. We describe the modulations' theory and show that they admit a large trade-space between data rate and security against hostile interference. We combinatorically analyze jammer attacks against the two presently known instances of these waveforms, and we explore...
In this paper, we propose a novel anti- eavesdropping scheme by introducing friendly jammers to a wireless network of things (WNoT). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WNoT with friendly jammers and the eavesdropping risk of WNoT without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh...
Security has become an increasingly important issue in wireless communications for the IoT (Internet of Things) environments, to which physical layer approaches can contribute by differentiating desired transceiver and wiretap channels for security of confidential data. In this paper, we propose an optimal power allocation strategy for practical physical-layer security, based on friendly jamming with...
Power control has been an important field in wireless communications with many applications. The well-known Foschini-Miljanic (FM) algorithm, which has greatly influenced the subsequent literature, is a simple and elegant distributed power control scheme that enjoys several desirable properties. However, the channel environment in the FM algorithm is assumed to be fixed and constant over time, an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.