IET Communications
Volume 10, Issue 1, 04 January 2016
Volumes & issues:
Volume 10, Issue 1
04 January 2016
-
- Author(s): Hao Wu ; Zhi-Chao Sha ; Zhi-Tao Huang ; Yi-Yu Zhou
- Source: IET Communications, Volume 10, Issue 1, p. 1 –7
- DOI: 10.1049/iet-com.2014.1254
- Type: Article
- + Show details - Hide details
-
p.
1
–7
(7)
Signal-to-noise ratio (SNR) estimation is required in many receivers and systems of communications. In this study, the authors propose a novel SNR estimation method for DVB-S2 over additive white Gaussian noise channel. This is a non-data-aided, eigenvalue decomposition-based method. First, they use the even and odd component vectors of received signal to construct a novel 2 × 2 matrix, and propose an estimation variable using the standard condition number of this matrix. And then, they derive the relationship between this variable and SNR, and give the detailed expressions for SNR estimation on different modulations used in DVB-S2, including quadrature phase shift keying, 8PSK, 16 amplitude PSK (APSK) and 32APSK. Monte Carlo simulation results show the good estimation performance for different modulations. The proposed method is asymptotic unbiased and can be used for both constant and non-constant modulus constellations such as M-ary PSK, MAPSK and M-ary quadrature amplitude modulation.
- Author(s): Hao Du ; Roger Green ; Yunfei Chen
- Source: IET Communications, Volume 10, Issue 1, p. 8 –16
- DOI: 10.1049/iet-com.2015.0067
- Type: Article
- + Show details - Hide details
-
p.
8
–16
(9)
In this study, two optical wireless indoor multiple-input–multiple-output systems using on–off keying and pulse position modulation are studied. Then, by using the Matlab curve-fitting, the training parts of the experimental results are fitted and evaluation models are developed, where root mean squared error and additional testing data are used to verify the accuracy of the evaluation models.
- Author(s): Ali Kuhestani and Abbas Mohammadi
- Source: IET Communications, Volume 10, Issue 1, p. 17 –23
- DOI: 10.1049/iet-com.2015.0078
- Type: Article
- + Show details - Hide details
-
p.
17
–23
(7)
In this study, the authors study the problem of secure transmission in two-hop amplify-and-forward systems with an untrusted relay. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming technique is used. In this method, the destination sends an intended jamming signal to the relay. This jamming signal helps protecting the source message from being captured reliably at the untrusted relay, while the destination cancels itself intended jamming signal. The optimal power allocation (OPA) strategy is considered for the proposed system. They observe that the objective function is a quasi-concave function at high signal-to-noise-ratio regimes. Based on this OPA strategy, in the first step, the outage probability of the system is investigated. It is investigated for three cases. In the two cases, either of the source or the destination node is equipped with large-scale antennas, and in the third case, both of them are equipped with large-scale antenna arrays. In all the cases, the closed-form expressions are derived. In the second step, they investigate the ergodic secrecy rate and present the closed-form solutions for all the mentioned cases. Finally, simulation results indicate the accuracy of the derived equations.
- Author(s): Jaeyong Son ; Changkyu Seol ; Kyungwhoon Cheun ; Kyeongcheol Yang
- Source: IET Communications, Volume 10, Issue 1, p. 24 –33
- DOI: 10.1049/iet-com.2015.0102
- Type: Article
- + Show details - Hide details
-
p.
24
–33
(10)
In this study, the coverage of downlink cellular orthogonal frequency-division multiple-access networks transmitting one quadrature-amplitude modulation symbol per hop is analysed. The coverage probability is first defined by using an upper bound on the bit error rate (BER) of a bit-interleaved coded modulation system. Moreover then, the moment generating functions of the legacy Gaussian and Laplacian metrics (LMs) for soft-decision decoding of an employed error-correcting code are derived for computing the upper bound on the BER and the corresponding coverage probability of the networks. Numerical results demonstrate that due to the impulsive nature of the inter-cell interference for moderate-to-small cell loads, the networks using the LM for soft-decision decoding significantly outperform those employing the legacy Gaussian metric in terms of the achievable cell radius and the amount of the average transmit power reduction.
- Author(s): Ranjay Hazra and Anshul Tyagi
- Source: IET Communications, Volume 10, Issue 1, p. 34 –43
- DOI: 10.1049/iet-com.2015.0131
- Type: Article
- + Show details - Hide details
-
p.
34
–43
(10)
This study presents a novel analytical approach for evaluation of bit error rate (BER) performance of an impulse radio-ultra-wideband (IR-UWB) energy detector-pulse position modulation (ED-PPM) system, using dual-hop cooperative amplify and forward (AF) relaying strategy with optimum diversity combining, over IEEE 802.15.4a UWB channel. An approximate expression for BER has been derived based on energy detection principle. The analytical BER expression thus derived is validated with computer simulations, which confirm the accuracy in approximation used in investigation of BER. Furthermore, it is observed that the BER performance of IR-UWB ED-PPM system, improves substantially using dual-hop cooperative AF scheme, compared with non-cooperative scheme. Despite its poor BER performance, ED systems are preferred over AC systems, because of simplicity and low complexity.
- Author(s): Hui Tian ; Ziqiang Liu ; Wei Xi ; Gaofeng Nie ; Liu Liu ; Huiling Jiang
- Source: IET Communications, Volume 10, Issue 1, p. 44 –49
- DOI: 10.1049/iet-com.2015.0136
- Type: Article
- + Show details - Hide details
-
p.
44
–49
(6)
Orbital angular momentum (OAM) provides a new dimension for multiplexing and consequently can improve the link capacity remarkably. In the scope of radio communication, uniform circular array (UCA) is usually used to generate OAM signals, where beam axis detection and alignment is a key factor that influences the detection of OAM signal and directly determines the capacity of OAM links. This study analyses the beam axis detection and alignment issues under the ideal (noiseless) condition. The authors first clarify the fact that for single-mode OAM transmission, the intensity of electric field in radial direction is characterised by the Bessel function of the first kind. Inspired by this property, they propose three practical methods for beam axis detection and alignment, that is, double parallelogram array method, double UCA method and single UCA method. Iterative translation and rotation strategy are applied to enhance the precision. Finally, the effectiveness of the proposed methods is justified by simulation.
- Author(s): Azzam Al-nahari
- Source: IET Communications, Volume 10, Issue 1, p. 50 –56
- DOI: 10.1049/iet-com.2015.0216
- Type: Article
- + Show details - Hide details
-
p.
50
–56
(7)
Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved.
- Author(s): Tran Trung Duy ; George C. Alexandropoulos ; Vu Thanh Tung ; Vo Nguyen Son ; Trung Q. Duong
- Source: IET Communications, Volume 10, Issue 1, p. 57 –64
- DOI: 10.1049/iet-com.2015.0236
- Type: Article
- + Show details - Hide details
-
p.
57
–64
(8)
This study considers a dual-hop cognitive inter-vehicular relay-assisted communication system where all communication links are non-line of sight ones and their fading is modelled by the double Rayleigh fading distribution. Road-side relays (or access points) implementing the decode-and-forward relaying protocol are employed and one of them is selected according to a predetermined policy to enable communication between vehicles. The performance of the considered cognitive cooperative system is investigated for Kth best partial and full relay selection (RS) as well as for two distinct fading scenarios. In the first scenario, all channels are double Rayleigh distributed. In the second scenario, only the secondary source to relay and relay to destination channels are considered to be subject to double Rayleigh fading whereas, channels between the secondary transmitters and the primary user are modelled by the Rayleigh distribution. Exact and approximate expressions for the outage probability performance for all considered RS policies and fading scenarios are presented. In addition to the analytical results, complementary computer simulated performance evaluation results have been obtained by means of Monte Carlo simulations. The perfect match between these two sets of results has verified the accuracy of the proposed mathematical analysis.
- Author(s): Hua Sun ; Soon Xin Ng ; Lajos Hanzo
- Source: IET Communications, Volume 10, Issue 1, p. 65 –71
- DOI: 10.1049/iet-com.2015.0359
- Type: Article
- + Show details - Hide details
-
p.
65
–71
(7)
Hierarchical modulation (HM) is a layered modulation scheme, which is widely employed by the telecommunication industry. The higher flexibility and lower complexity of the HM scheme has its dramatic benefits for wireless communications, hence the achievable performance of cooperation-aided coded HM has drawn substantial research interests. In this study, a triple-layer HM-aided four-node cooperative communication system is proposed, and its discrete-input continuous-output memoryless channel capacity is derived, which is used for finding the optimal position of the relay nodes as well as to design appropriate HM constellations. The authors’ simulation results show that if a rate-1/2 ‘perfect’ channel code is assumed, the four-node network becomes capable of conveying a coded HM-64QAM signal in three time slots at an average signal-to-noise ratio of −0.71 dB.
- Author(s): Moslem Noori and Lutz Lampe
- Source: IET Communications, Volume 10, Issue 1, p. 72 –80
- DOI: 10.1049/iet-com.2015.0361
- Type: Article
- + Show details - Hide details
-
p.
72
–80
(9)
Sustaining high data rates over an indoor broadband power line communication (PLC) link is a challenging task due to the significant attenuation of high frequency signals transmitted over power cables. Repeaters are often used to alleviate the problem of signal attenuation, however, this comes at a loss of multiplexing gain. On the other hand, modern relaying concepts, as used in wireless systems, are not as effective in PLC setups due to the absence of diversity improvement. In this study, the authors address this issue and propose a new approach to improve the multiplexing gain of relay-aided PLC systems. The authors consider a multi-user indoor PLC scenario where all users want to share their data. For this setup, the authors then advocate the application of amplify-and-forward (AF) multi-way relaying (MWR). Considering the practical constraints of an indoor PLC system, the authors study the achievable data rates of AF MWR, and compare them to those achievable with direct (non-cooperative) transmission and conventional relaying schemes. The simulations demonstrate that depending on the network topology, MWR can result in significant performance improvement. The authors further discuss how their rate analysis can be exploited to decrease the energy consumption in the system.
- Author(s): Ali Hassan Sodhro ; Ye Li ; Madad Ali Shah
- Source: IET Communications, Volume 10, Issue 1, p. 81 –90
- DOI: 10.1049/iet-com.2015.0368
- Type: Article
- + Show details - Hide details
-
p.
81
–90
(10)
An important constraint in wireless body area network (WBAN) is to maximise the energy-efficiency of wearable devices due to their limited size and light weight. Two experimental scenarios; ‘right wrist to right hip’ and ‘chest to right hip’ with body posture of walking are considered. It is analyzed through extensive real-time data sets that due to large temporal variations in the wireless channel, a constant transmission power and a typical conventional transmission power control (TPC) methods are not suitable choices for WBAN. To overcome these problems a novel energy-efficient adaptive power control (APC) algorithm is proposed that adaptively adjusts transmission power (TP) level based on the feedback from base station. The main advantages of the proposed algorithm are saving more energy with acceptable packet loss ratio (PLR) and lower complexity in implementation of desired tradeoff between energy savings and link reliability. We adapt, optimise and theoretically analyse the required parameters to enhance the system performance. The proposed algorithm sequentially achieves significant higher energy savings of 40.9%, which is demonstrated by Monte Carlo simulations in MATLAB. However, the only limitation of proposed algorithm is a slightly higher PLR in comparison to conventional TPC such as Gao's and Xiao's methods.
- Author(s): Quoc-Tuan Vien ; Huan X. Nguyen ; Arumugam Nallanathan
- Source: IET Communications, Volume 10, Issue 1, p. 91 –97
- DOI: 10.1049/iet-com.2015.0461
- Type: Article
- + Show details - Hide details
-
p.
91
–97
(7)
This study investigates cooperative spectrum sensing (CSS) in cognitive wireless radio networks (CWRNs). A practical system is considered where all channels experience Nakagami-m fading and suffers from background noise. The realisation of the CSS can follow two approaches where the final spectrum decision is based on either only the global decision at fusion centre (FC) or both decisions from the FC and secondary user (SU). By deriving closed-form expressions and bounds of missed detection probability (MDP) and false alarm probability (FAP), the authors are able to not only demonstrate the impacts of the m-parameter on the sensing performance, but also evaluate and compare the effectiveness of the two CSS schemes with respect to various fading parameters and the number of SUs. It is interestingly noticed that a smaller number of SUs could be selected to achieve the lower bound of the MDP rather using all the available SUs while still maintaining a low FAP. As a second contribution, they propose a SU selection algorithm for the CSS to find the optimised number of SUs for lower complexity and reduced power consumption. Finally, numerical results are provided to demonstrate the findings.
- Author(s): Hassan Zivari-Fard ; Bahareh Akhbari ; Mahmoud Ahmadian-Attari ; Mohammad Reza Aref
- Source: IET Communications, Volume 10, Issue 1, p. 98 –110
- DOI: 10.1049/iet-com.2015.0468
- Type: Article
- + Show details - Hide details
-
p.
98
–110
(13)
The authors study the problem of secret communication over a multiple-access channel with a common message. Here, the authors assume that two transmitters have confidential messages, which must be kept secret from the wiretapper (the second receiver), and both of them have access to a common message which can be decoded by the two receivers. The authors call this setting as multiple-access wiretap channel with common message (MAWC-CM). For this setting, the authors derive general inner and outer bounds on the secrecy capacity region for the discrete memoryless case and show that these bounds meet each other for a special case called the switch channel. As well, for a Gaussian version of MAWC-CM, the authors derive inner and outer bounds on the secrecy capacity region. Providing numerical results for the Gaussian case, the authors illustrate the comparison between the derived achievable rate region and the outer bound for the considered model and the capacity region of compound multiple access channel.
- Author(s): Pankaj K. Sharma and Prabhat K. Upadhyay
- Source: IET Communications, Volume 10, Issue 1, p. 111 –121
- DOI: 10.1049/iet-com.2015.0504
- Type: Article
- + Show details - Hide details
-
p.
111
–121
(11)
In this study, the authors consider a cooperative spectrum sharing network with multiple primary users (PUs) and multiple secondary users (SUs). Hereby, one end-PU communicates bidirectionally with one of the best selected other end-PUs with the cooperation of the best selected SU using time division broadcast protocol. Based on an overlay approach, the selected SU allocates its partial power to relay the PUs’ signals and utilises the remaining power to transmit its own signal. The authors devise a low-complexity distributed PU–SU selection strategy to minimise the overall outage probability of the primary system. For Nakagami-m fading, the authors derive tight expressions of outage probability for both primary and secondary systems of the considered scheme. Further, by deriving their asymptotic behaviour at high signal-to-noise ratio, the authors highlight the performance gain accrued by cooperative and multiuser diversity along with that offered by the channels under Nakagami-m fading. Besides, the authors demonstrate the effective locations for the SUs to access the spectrum. Above all, the authors illustrate that the increase of the number of SUs is more desirable than the number of PUs to explore the spectrum sharing opportunities. Numerical and simulation results substantiate the effectiveness of the proposed scheme and the theoretical analysis.
- Author(s): Yan-Haw Chen ; Ching-Fu Huang ; Jack Chang
- Source: IET Communications, Volume 10, Issue 1, p. 122 –130
- DOI: 10.1049/iet-com.2015.0546
- Type: Article
- + Show details - Hide details
-
p.
122
–130
(9)
An efficient decoding of quadratic residue (QR) codes utilising hashing search to find error patterns is presented in this study. The key idea behind the proposed decoding method is theoretically based on the existence of a one-to-one mapping between the single primary known syndrome and correctable error patterns. Compared with the binary search time approach, one of the advantages of utilising this method presented in this study is that the hashing search time can be reduced by a factor of two. This method would help reduce the binary search time for finding error patterns when decoding the (23, 12, 7), (41, 21, 9), and (47, 24, 11) QR codes. Furthermore, it would reduce the decoding time by 45% using the fast lookup table decoding method to decode the (71, 36, 11) QR code. Ultimately, the proposed decoding algorithm for QR codes can be made regular, simple, and suitable for software implementations.
Signal-to-noise ratio estimation for DVB-S2 based on eigenvalue decomposition
Optical wireless indoor multiple-input–multiple-output system using on–off keying and pulse position modulation modulations
Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: resource allocation and performance study
Coverage analysis of downlink cellular orthogonal frequency-division multiple-access networks using moment generating functions
Bit error rate performance of IR-UWB ED-PPM system using cooperative dual-hop AF strategy
Beam axis detection and alignment for uniform circular array-based orbital angular momentum wireless communication
Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers
Outage performance of cognitive cooperative networks with relay selection over double-Rayleigh fading channels
Discrete-input continuous-output memoryless channel capacity of cooperative hierarchical modulation
Multi-way relaying for cooperative indoor power line communications
Energy-efficient adaptive transmission power control for wireless body area networks
Cooperative spectrum sensing with secondary user selection for cognitive radio networks over Nakagami-m fading channels
Multiple access channel with common message and secrecy constraint
Cooperative spectrum sharing in two-way multi-user multi-relay networks
Decoding of binary quadratic residue codes with hash table
Most viewed content
Most cited content for this Journal
-
A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
- Author(s): Mohammad Kamrul Hasan ; Taher M. Ghazal ; Rashid A. Saeed ; Bishwajeet Pandey ; Hardik Gohel ; Ala’ A. Eshmawi ; S. Abdel‐Khalek ; Hula Mahmoud Alkhassawneh
- Type: Article
-
Compressive sensing-based coprime array direction-of-arrival estimation
- Author(s): Chengwei Zhou ; Yujie Gu ; Yimin D. Zhang ; Zhiguo Shi ; Tao Jin ; Xidong Wu
- Type: Article
-
Massive MIMO: survey and future research topics
- Author(s): Daniel C. Araújo ; Taras Maksymyuk ; André L.F. de Almeida ; Tarcisio Maciel ; João C.M. Mota ; Minho Jo
- Type: Article
-
Performance analysis of non-orthogonal multiple access in downlink cooperative network
- Author(s): Jinjin Men and Jianhua Ge
- Type: Article
-
Non-orthogonal multiple access schemes with partial relay selection
- Author(s): Sunyoung Lee ; Daniel Benevides da Costa ; Quoc-Tuan Vien ; Trung Q. Duong ; Rafael Timóteo de Sousa Jr.
- Type: Article