Assume the communication between a source and a destination is supported by a large reflecting surface (LRS), which consists of an array of reflector elements with adjustable reflection phases. By knowing the phase shifts induced by the composite propagation channels through the LRS, the phases of the reflectors can be configured such that the signals combine coherently at the destination, which improves the communication performance. However, perfect phase estimation or highprecision configuration of the reflection phases is unfeasible. In this paper, we study the transmission through an LRS with phase errors that have a generic distribution. We show that the LRS-based composite channel is equivalent to a point-topoint Nakagami fading channel. This equivalent representation allows for theoretical analysis of the performance and can help the system designer study the interplay between performance, the distribution of phase errors, and the number of reflectors. Numerical evaluation of the error probability for a limited number of reflectors confirms the theoretical prediction and shows that the performance is remarkably robust against the phase errors.
We develop a cluster expansion for the probability of full connectivity of high density random networks in confined geometries. In contrast to percolation phenomena at lower densities, boundary effects, which have previously been largely neglected, are not only relevant but dominant. We derive general analytical formulas that show a persistence of universality in a different form to percolation theory, and provide numerical confirmation. We also demonstrate the simplicity of our approach in three simple but instructive examples and discuss the practical benefits of its application to different models.
We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base station employs transmit antenna selection (TAS) to enhance secrecy performance. We compare the cases where the receiving user equipment (UE) operates in half-duplex (HD) mode and full-duplex (FD) mode. In the latter case, the UE simultaneously receives the intended downlink message and transmits a jamming signal to strengthen secrecy. We investigate two models of (semi)passive eavesdropping: (1) EDs act independently and (2) EDs collude to intercept the transmitted message. For both of these models, we obtain expressions for the secrecy outage probability in the downlink for HD and FD UE operation. The expressions for HD systems have very accurate approximate or exact forms in terms of elementary and/or special functions for all path loss exponents. Those related to the FD systems have exact integral forms for general path loss exponents, while exact closed forms are given for specific exponents. A closed-form approximation is also derived for the FD case with colluding EDs. The resulting analysis shows that the reduction in the secrecy outage probability is logarithmic in the number of antennas used for TAS and identifies conditions under which HD operation should be used instead of FD jamming at the UE. These performance trends and exact relations between system parameters can be used to develop adaptive power allocation and duplex operation methods in practice. Examples of such techniques are alluded to herein.Index Terms-Physical layer security, stochastic geometry, secrecy outage probability, antenna selection, full-duplex
In this paper, we propose an adaptive orthogonal frequency-division multiplexing (OFDM) index modulation (IM) scheme for two-hop relay networks. In contrast to the traditional OFDM IM scheme with a deterministic and fixed mapping scheme, in this proposed adaptive OFDM IM scheme, the mapping schemes between a bit stream and indices of active subcarriers for the first and second hops are adaptively selected by a certain criterion. As a result, the active subcarriers for the same bit stream in the first and second hops can be varied in order to combat slow frequency-selective fading. In this way, the system reliability can be enhanced. Additionally, considering the fact that a relay device is normally a simple node, which may not always be able to perform mapping scheme selection due to limited processing capability, we also propose an alternative adaptive methodology in which the mapping scheme selection is only performed at the source and the relay will simply utilize the selected mapping scheme without changing it. The analyses of average outage probability, network capacity and symbol error rate (SER) are given in closed form for decode-and-forward (DF) relaying networks and are substantiated by numerical results generated by Monte Carlo simulations. Index Terms
In this paper, we propose a novel codebook design scheme for orthogonal frequency-division multiplexing with index modulation (OFDM-IM) to improve system performance. The optimization process can be implemented efficiently by the lexicographic ordering principle. By applying the proposed codebook design, all subcarrier activation patterns with a fixed number of active subcarriers will be explored. Furthermore, as the number of active subcarriers is fixed, the computational complexity for estimation at the receiver is reduced and the zero-active subcarrier dilemma is solved without involving complex higher layer transmission protocols. It is found that the codebook design can potentially provide a trade-off between diversity and transmission rate. We investigate the diversity mechanism and formulate three diversity-rate optimization problems for the proposed OFDM-IM system. Based on the genetic algorithm (GA), the method of solving these formulated optimization problems is provided and verified to be effective. Then, we analyze the average block error rate (BLER) and bit error rate (BER) of OFDM-IM systems applying the codebook design. Finally, all analyses are numerically verified by Monte Carlo simulations. In addition, a series of comparisons are provided, by which the superiority of the codebook design is thereby confirmed.
This paper considers secrecy enhancement mechanisms in visible light communication (VLC) systems with spatially distributed passive eavesdroppers (EDs) under the assumption that there are multiple LED transmitters and one legitimate receiver (UE). Based on certain amplitude constraints, we propose an optimal beamforming scheme to optimize secrecy performance. Contrary to the case where null-steering is made possible by using knowledge of the ED locations, we show that the optimal solution when only statistical information about ED locations is available directs the transmission along a particular eigenmode related to the intensity of the ED process and the intended channel. Then, a sub-optimal LED selection scheme is provided to reduce the secrecy outage probability (SOP). An approximate closed-form for the SOP is derived by using secrecy capacity bounds. All analysis is numerically verified by Monte Carlo simulations. The analysis shows that the optimal beamformer yields superior performance to LED selection. However, LED selection is still a highly efficient suboptimal scheme due to the complexity associated with the use of multiple transmitters in the full beamforming approach. These performance trends and exact relations between system parameters can be used to develop a secure VLC system in the presence of randomly distributed EDs. Index TermsPhysical layer security, visible light communication, beamforming, stochastic geometry, secrecy outage probability.
Unmanned aerial vehicles (UAVs) have been undergoing fast development for providing broader signal coverage and more extensive surveillance capabilities in military and civilian applications. Due to the broadcast nature of the wireless signal and the openness of the space, UAV eavesdroppers (UEDs) pose a potential threat to ground communications. In this paper, we consider the communications of a legitimate ground link in the presence of friendly jamming and UEDs within a finite area of space. The spatial distribution of the UEDs obeying a uniform binomial point process (BPP) is used to characterize the randomness of the UEDs. The ground link is assumed to experience log-distance path loss and Rayleigh fading, while free space path loss with/without the averaged excess path loss due to the environment is used for the air-to-ground/air-to-air links. A piecewise function is proposed to approximate the line-of-sight (LoS) probability for the air-to-ground links, which provides a better approximation than using the existing sigmoid-based fitting. The analytical expression for the secure connection probability (SCP) of the legitimate ground link in the presence of non-colluding UEDs is derived. The analysis reveals some useful trends in the SCP as a function of the transmit signal to jamming power ratio, the locations of the UAV jammer, and the height of UAVs.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.