IET Communications
Volume 9, Issue 12, 13 August 2015
Volumes & issues:
Volume 9, Issue 12
13 August 2015
-
- Author(s): Sunghwan Kim ; Sungoh Kwon ; Seokhoon Yoon
- Source: IET Communications, Volume 9, Issue 12, p. 1437 –1441
- DOI: 10.1049/iet-com.2014.1044
- Type: Article
- + Show details - Hide details
-
p.
1437
–1441
(5)
In this study, a concatenated coding scheme based on Reed–Muller (RM) codes and bit-extension codes is proposed for equivocation of a wiretap channel. RM codes and their cosets are adopted for message encoding, and bit-extension codes are used to enhance the equivocation capability for a wiretapper's channel. The average equivocation is discussed when only RM codes are used in the system, and the probability causing imperfect secrecy is also determined. Analytical results show that the proposed code can be used for the equivocation capability of wiretap channels and suggest a proper management over a wiretap channel.
- Author(s): Mahdi Raeis ; Kamal Shahtalebi ; Amir Reza Forouzan
- Source: IET Communications, Volume 9, Issue 12, p. 1442 –1449
- DOI: 10.1049/iet-com.2014.0554
- Type: Article
- + Show details - Hide details
-
p.
1442
–1449
(8)
In this study, the authors examine resource allocation in an orthogonal frequency-division multiple-access-based cognitive radio (CR) network which dynamically senses primary users (PUs) spectrum and opportunistically uses available channels. The aim is resource allocation such that the CR network throughput is maximised under the PUs maximum interference constraint and cognitive users (CUs) transmission power budget. This problem is formulated as a mixed-integer non-linear programming problem which is 𝒩𝒫-hard in general and infeasible to solve in real-time. To reduce the computational complexity, the authors decouple the problem into two separate steps. After initial power allocation, in the first step, an adaptive algorithm is employed to assign subcarriers to the CUs toward throughput maximisation by using these initial powers. In the second step, power is allocated optimally to the assigned subcarriers. Simulation results show that the proposed method nearly achieves the optimal solution in a small number of iterations meaning significant reduction in the computational complexity.
- Author(s): Himanshu Nayar ; Vinay J. Ribeiro ; Ranjan K. Mallik
- Source: IET Communications, Volume 9, Issue 12, p. 1450 –1457
- DOI: 10.1049/iet-com.2014.1086
- Type: Article
- + Show details - Hide details
-
p.
1450
–1457
(8)
The authors present a novel frequency division multiplexing scheme which can generate a signal whose worst-case peak-to-average power ratio (PAPR) is tunable by an input parameter; they call this scheme tunable PAPR frequency division multiplexing (TP-FDM). Special cases of TP-FDM are orthogonal FDM (OFDM) and single carrier (SC) modulation. Unlike several other proposed PAPR reduction schemes, TP-FDM requires no per-symbol side information to be sent from transmitter to receiver. TP-FDM has overall computational requirements almost the same as OFDM. The author's study of the symbol error rate (SER) of TP-FDM in a Rayleigh fading channel shows that higher PAPR signals give a better SER performance. Thus, instead of choosing either of the extremes, OFDM and SC modulation, as is currently done in some cellular systems, one can tune the PAPR with TP-FDM to the maximum suitable for the transmitter and receiver device electronics, so as to minimise SER. They compare and contrast TP-FDM with transform precoded OFDM methods in terms of SER and PAPR. They also extend TP-FDM to a multi-user scenario.
- Author(s): Leila Ghabeli and Milan S. Derpich
- Source: IET Communications, Volume 9, Issue 12, p. 1458 –1465
- DOI: 10.1049/iet-com.2014.0710
- Type: Article
- + Show details - Hide details
-
p.
1458
–1465
(8)
The authors present an improved achievable rate region for two-pair bidirectional Gaussian relay networks based on successive compute-and-forward method. In these networks, one relay helps in the communication between two pairs of users. In their proposed scheme, the authors use nested lattice codes for encoding the messages at the users, and Gaussian random codes for the encoding at the relay. They use the successive compute-and-forward strategy to decode two integer linear combinations of the lattice codewords in the uplink, and successive interference cancellation for decoding the Gaussian codewords in the downlink. The downlink channel can be considered as a broadcast channel with two receiver groups, but within each group, a pair of users is considered as an additive white Gaussian noise channel (instead of a broadcast channel) because each node knows its own transmitted message. It is shown that for all channel gains of downlink channels and all channel gains of symmetric uplink channel pairs, the strategy achieves rates to within constant gaps of 1/2 and 3/4 bit/s/Hz per user of the cut-set upper bound for restricted and non-restricted models, respectively. These gaps are tighter than those previously obtained for this network, which have not exploited the successive compute-and-forward method.
- Author(s): Nguyen Xuan Quyen ; Vu Van Yem ; Trung Q. Duong
- Source: IET Communications, Volume 9, Issue 12, p. 1466 –1473
- DOI: 10.1049/iet-com.2014.0907
- Type: Article
- + Show details - Hide details
-
p.
1466
–1473
(8)
This study designs and analyses a new phase-coded spread-spectrum communication system where both phase-coded carrier and spreading factor are varied based on a chaotic behaviour in the communication process. This design aims to reduce the probability of interception of the considered system. Discrete values generated by a chaotic map are exploited to create a non-return-to-zero (NRZ)-chaos sequence and simultaneously make bit duration variable. The NRZ-chaos sequence is then modulated by binary phase-shift keying technique to produce the phased-coded carrier. Owing to chip duration being constant, the variation of bit duration also leads to the variation of spreading factor. Spectrum spreading in the transmitter is performed by multiplying directly the variable-duration bits with the phase-coded carrier. A coherent receiver relying on a direct correlator is used for recovering the data. Design of the transmitter and receiver as well as analysis of bit error probability for the proposed system in cases of single-user and multi-user under additive white Gaussian noise channel is presented. Simulation results are shown to confirm the operation of the designed structures and the obtained analytical performance.
- Author(s): Wilfried Gappmair and Michael Bergmann
- Source: IET Communications, Volume 9, Issue 12, p. 1474 –1478
- DOI: 10.1049/iet-com.2015.0080
- Type: Article
- + Show details - Hide details
-
p.
1474
–1478
(5)
Assuming a land-mobile satellite link with negligible multipath and shadowing effects, the corresponding channel model is adequately described by a correlated Rician distribution. In this context, the estimation of carrier and channel parameters has been investigated in some earlier work by means of an algorithmic approach primarily based on heuristic considerations. In the current study, the authors will review the results obtained so far from a maximum-likelihood (ML) point of view. A major output of the analysis is that the simple ad-hoc framework achieved previously is indeed an ML solution, when the impairments introduced by Rician fading are spectrally flat and strictly band limited.
- Author(s): Mohammad R. Sabagh ; Mehrdad Dianati ; Rahim Tafazolli ; Mehri Mehrjoo
- Source: IET Communications, Volume 9, Issue 12, p. 1479 –1492
- DOI: 10.1049/iet-com.2014.0782
- Type: Article
- + Show details - Hide details
-
p.
1479
–1492
(14)
This study investigates energy efficient allocation of radio resource blocks in orthogonal frequency division multiple access (OFDMA) systems while considering the status of the users’ data buffers to reduce packet dropping rate by the downlink scheduler. The proposed scheme exploits the fluctuations of traffic load to efficiently schedule users’ data packets by reducing the overall energy consumption of the system whenever the status of data buffers permits. From information theory point of view, the proposed scheme exploits the fundamental trade-off between energy efficiency and spectral efficiency to perform scheduling. First, the problem is formulated as an optimisation problem and then a novel solution, based on dynamic programming, is applied. By comparing the analytical solution with the ones obtained by exhaustive search, it is demonstrated that the proposed scheme is close to the optimal solution, with low computational complexity. In addition, comprehensive simulations are conducted to evaluate the performance of the suggested algorithm. Both analytical and simulation results demonstrate the superiority of the proposed algorithm compared with the well-known benchmark schemes in terms of energy efficiency and packet dropping rate.
- Author(s): Ming Li and Qian Liu
- Source: IET Communications, Volume 9, Issue 12, p. 1493 –1500
- DOI: 10.1049/iet-com.2014.0877
- Type: Article
- + Show details - Hide details
-
p.
1493
–1500
(8)
In this study, the authors investigate eavesdropping mitigation for wireless communications with physical-layer security techniques. They consider a multicasting scenario with one transmitter, multiple trusted receivers and multiple eavesdroppers, each equipped with one antenna. Aiming at protecting trusted communications from data interception, they develop two novel waveform designs for eavesdropping reduction under two scenarios: (i) when the eavesdroppers’ channel state information (CSI) is known, they design the waveform and transmit energy which can minimise the maximal signal-to-interference-plus-noise ratios (SINRs) at the eavesdroppers while achieving guaranteed SINRs at the trusted receivers and (ii) when the eavesdroppers’ CSIs are not available, they adopt ‘artificial noise’ (AN) strategy aiming at generating as much disturbance to eavesdroppers as possible. A novel waveform and transmit power design is proposed which can maximise the AN's energy with assured quality-of-service at trusted receivers. Extensive simulation studies illustrate the efficiency of the proposed designs for eavesdropping mitigation in wireless communications.
- Author(s): Ly-Minh-Duy Le ; Kah Chan Teh ; Kwok H. Li
- Source: IET Communications, Volume 9, Issue 12, p. 1501 –1509
- DOI: 10.1049/iet-com.2014.0882
- Type: Article
- + Show details - Hide details
-
p.
1501
–1509
(9)
Over the past few decades, frequency hopping (FH) techniques have attracted considerable interest in both military and commercial communications. However, fading and interference can significantly degrade the performance of an FH system. One method commonly employed to overcome the degradation in performance because of the fading is the use of diversity. Furthermore, fast FH (FFH) systems can enjoy both time and frequency diversity and hence FFH systems employed in conjunction with diversity-combining techniques are effective for combating fading and interference effects. In this study, the authors provide a comprehensive survey on the past and current research work on diversity-combining techniques for suppressing different types of interference in FFH M-ary frequency-shift-keying systems over various fading channels. Some commonly used theoretical approaches for analysing performance of FFH systems are also presented. In addition to the survey, they will also discuss some interesting areas of future work in this research topic.
- Author(s): Shahla Najafi and Mahrokh G. Shayesteh
- Source: IET Communications, Volume 9, Issue 12, p. 1510 –1521
- DOI: 10.1049/iet-com.2014.0792
- Type: Article
- + Show details - Hide details
-
p.
1510
–1521
(12)
Cognitive radio and cooperative networks are increasingly regarded as revolutionary technologies that utilise the radio spectrum efficiently. In this study, spectrally encoded (spread-time) code division multiple access (SE-CDMA) scheme is proposed as a flexible and adaptable technique for physical layer of cognitive relay networks. All primary and secondary users transmit their signals to a common base station (BS) and then the BS selects one of the cognitive secondary users based on feedback information to relay the primary user's (PU's) data. To study the efficiency of the system, two scenarios are considered. In the first scenario, the secondary users transmit their information using the SE-CDMA technique and the PU is considered narrowband. In the second scenario, both primary and secondary users utilise the SE-CDMA technique. The performance of the system is evaluated in terms of the error probability of the PU, the outage probability of the primary and secondary users and comparing theoretical results with simulations. Moreover, the performance of the proposed method is compared with orthogonal frequency division multiple access-based cognitive relaying scheme. The results indicate the efficiency of the SE-CDMA technique.
- Author(s): Ngoc Phuc Le ; Le Chung Tran ; Farzad Safaei ; Vineeth Satheeskumar Varma
- Source: IET Communications, Volume 9, Issue 12, p. 1522 –1530
- DOI: 10.1049/iet-com.2014.0804
- Type: Article
- + Show details - Hide details
-
p.
1522
–1530
(9)
In this study, the authors investigate energy efficiency in antenna selection multi-input multi-output automatic repeat request (MIMO ARQ) wireless systems. The authors first derive an approximate expression for the average frame-error rate (FER) in antenna selection MIMO systems over quasi-static Nakagami-m fading channels. The FER approximation is then used to obtain an analytical expression of an energy-efficiency metric that is defined as the total energy required to successfully deliver one information bit. The authors prove that this energy-efficiency metric is a quasi-convex function with respect to the average signal-to-noise ratio value. Based on this analysis, the authors obtain the optimal value of the average energy per transmitted data symbol such that the total energy consumption in the system is minimised. The results show that the energy efficiency in antenna selection MIMO ARQ systems is improved when the number of equipped antennas is increased. Simulation results are provided to validate the analysis.
- Author(s): Alexander Beremiz Hilario Tacuri and José Mauro Pedro Fortes
- Source: IET Communications, Volume 9, Issue 12, p. 1531 –1538
- DOI: 10.1049/iet-com.2014.1212
- Type: Article
- + Show details - Hide details
-
p.
1531
–1538
(8)
The performance of modern communications transmitters utilising multi-carrier modulation techniques is highly sensitive to non-linear distortions arising mainly from the high-power amplifier. The increase in symbol duration makes the system more sensitive to time-varying channels. In addition, the wideband characteristics of multi-carrier signals result in frequency-dependent distortions, typically known as memory effects. This study presents analytical expressions that can be used to evaluate the impact of the distortions induced by time-varying non-linearities with memory on the bit error rate performance of a multi-carrier signal such as the orthogonal frequency division multiplexing. The time-varying non-linearity with memory is modelled by a time-varying Volterra series. The resulting mathematical expressions are applied to specific situations, allowing for a quantitative evaluation of the system performance degradation.
- Author(s): Torbjörn Wigren
- Source: IET Communications, Volume 9, Issue 12, p. 1539 –1546
- DOI: 10.1049/iet-com.2014.0831
- Type: Article
- + Show details - Hide details
-
p.
1539
–1546
(8)
To enable uplink inter-cell interference coordination in cellular networks, estimates of the powers generated by the own serving cell, the neighbour cells and the thermal noise processes need to be made available. An algorithm for such high-bandwidth interference power splitting is derived in the study. The algorithm does not require inter-base station communication. The resulting estimates support self-organising network interference management and coordinated scheduling, both technologies being important in new heterogeneous networks. A new method for G -matrix tracking is also outlined, based on the estimates obtained from the proposed algorithm. The performance evaluation, performed for a 3G wideband code division multiple access setup of the algorithm, shows that the estimation inaccuracy's of the proposed algorithm is below 10–15% in the relevant operating region.
- Author(s): Héctor Poveda ; Guillaume Ferré ; Eric Grivel
- Source: IET Communications, Volume 9, Issue 12, p. 1547 –1554
- DOI: 10.1049/iet-com.2014.1122
- Type: Article
- + Show details - Hide details
-
p.
1547
–1554
(8)
This study deals with an interweave cognitive-radio (CR) system, where an uplink orthogonal frequency-division multiple access system is considered for the primary users (PUs). Our purpose is to estimate the PU carrier frequency offsets (PU-CFOs) as well as the channels to estimate the transmitted symbols. However, in wideband wireless communications, the PU received-signal spectrum usually exhibits a localised fading because of the multipath propagation channel. When the PU faded frequencies are used by the CR system, the PU system is contaminated by a CR narrowband interference (CR-NBI). In that case, if a Kalman filter (KF)-based approach is used for the estimations of the CFOs and the channels, the state-space representation does not necessarily take into account the CR-NBI; this hence has a negative impact on the algorithm performance. Therefore the authors propose to make this solution more robust to the CR-NBI by detecting when it appears and disappears to avoid using the data disturbed by the CR-NBI. The authors’ contribution is to assume that the CR-NBI is because of the transmission of contiguous blocks and to propose various criteria based on the covariance matrix of the KF innovation.
- Author(s): Mostafa Esmaeili and T. Aaron Gulliver
- Source: IET Communications, Volume 9, Issue 12, p. 1555 –1560
- DOI: 10.1049/iet-com.2015.0026
- Type: Article
- + Show details - Hide details
-
p.
1555
–1560
(6)
In this paper, a new secure channel coding scheme is presented which randomly inserts and deletes bits in a codeword of a quasi-cyclic-low-density parity check (QC-LDPC) code. It is shown that the key size is smaller than other code-based cryptosystems based on permutation and scrambling matrices. The positions of the inserted and deleted bits are determined using a secret key. It is shown that the error performance of the resulting code after the insertions and deletions is better than a random low-density parity check code with similar parameters. An important advantage of this cryptosystem is that even if the QC-LDPC code is revealed, the system remains secure. Furthermore, the proposed approach using insertions and deletions can be employed with other classes of error correcting codes.
Concatenated codes using Reed–Muller codes and bit-extension codes for a wiretap channel
Computationally efficient adaptive algorithm for resource allocation in orthogonal frequency-division multiple-access-based cognitive radio networks
Multicarrier modulation with variable peak-to-average power ratio using partial fast Fourier transform
Approaching the capacity of two-pair bidirectional Gaussian relay networks
Design and analysis of a spread-spectrum communication system with chaos-based variation of both phase-coded carrier and spreading factor
Estimation of carrier and channel parameters in time-selective fading channels
Energy efficient and quality of service aware resource block allocation in OFDMA systems
Eavesdropping mitigation for wireless communications over single-input–single-output channels
Survey on diversity-combining techniques for interference suppression in fast frequency hopping systems
Spectrally encoded code division multiple access-based cognitive relay networks
Energy efficiency analysis of antenna selection multi-input multi-output automatic repeat request systems over Nakagami-m fading channels
Performance of mobile orthogonal frequency division multiplexing systems over time-varying non-linearities with memory
Wireless interference power estimation for inter-cell interference coordination
Way to design an orthogonal frequency-division multiple access-base station receiver disturbed by a narrowband interfering cognitive radio signal
Joint channel coding-cryptography based on random insertions and deletions in quasi-cyclic-low-density parity check codes
Most viewed content
Most cited content for this Journal
-
A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
- Author(s): Mohammad Kamrul Hasan ; Taher M. Ghazal ; Rashid A. Saeed ; Bishwajeet Pandey ; Hardik Gohel ; Ala’ A. Eshmawi ; S. Abdel‐Khalek ; Hula Mahmoud Alkhassawneh
- Type: Article
-
Compressive sensing-based coprime array direction-of-arrival estimation
- Author(s): Chengwei Zhou ; Yujie Gu ; Yimin D. Zhang ; Zhiguo Shi ; Tao Jin ; Xidong Wu
- Type: Article
-
Massive MIMO: survey and future research topics
- Author(s): Daniel C. Araújo ; Taras Maksymyuk ; André L.F. de Almeida ; Tarcisio Maciel ; João C.M. Mota ; Minho Jo
- Type: Article
-
Performance analysis of non-orthogonal multiple access in downlink cooperative network
- Author(s): Jinjin Men and Jianhua Ge
- Type: Article
-
Non-orthogonal multiple access schemes with partial relay selection
- Author(s): Sunyoung Lee ; Daniel Benevides da Costa ; Quoc-Tuan Vien ; Trung Q. Duong ; Rafael Timóteo de Sousa Jr.
- Type: Article