-
RSMA-Enabled Covert Communications Against Multiple Spatially Random Wardens
Authors:
Xinyue Pei,
Jihao Liu,
Xuewen Luo,
Xingwei Wang,
Yingyang Chen,
Miaowen Wen,
Theodoros A. Tsiftsis
Abstract:
This work investigates covert communication in a rate-splitting multiple access (RSMA)-based multi-user multiple-input single-output system, where the random locations of the wardens follow a homogeneous Poisson point process. To demonstrate practical deployment scenarios, imperfect channel state information at the transmitter is considered. Closed-form expressions for the statistics of the receiv…
▽ More
This work investigates covert communication in a rate-splitting multiple access (RSMA)-based multi-user multiple-input single-output system, where the random locations of the wardens follow a homogeneous Poisson point process. To demonstrate practical deployment scenarios, imperfect channel state information at the transmitter is considered. Closed-form expressions for the statistics of the received signal-to-interference-plus-noise ratio, along with the analytical formulations for the covertness constraint, outage probability, and effective covert throughput (ECT), are derived. Subsequently, an ECT maximization problem is formulated under covertness and power allocation constraints. This optimization problem is addressed using an alternating optimization-assisted genetic algorithm (AO-GA). Simulation results corroborate the theoretical analysis and demonstrate the superiority of RSMA over conventional multiple access schemes, as well as the effectiveness of the proposed AO-GA.
△ Less
Submitted 6 June, 2025;
originally announced June 2025.
-
Dual-UAV-Aided Covert Communications for Air-to-Ground ISAC Networks
Authors:
Jingke Sun,
Liang Yang,
Alexandros-Apostolos A. Boulogeorgos,
Theodoros A. Tsiftsis,
Hongwu Liu
Abstract:
To enhance both the sensing and covert communication performance, a dual-unmanned aerial vehicle (UAV)-aided scheme is proposed for integrated sensing and communication networks, in which one UAV maneuvers as the aerial dual-functional base-station (BS), while another UAV flies as the cooperative jammer. Artificial noise (AN) transmitted by the jamming UAV is utilized not only to confuse the groun…
▽ More
To enhance both the sensing and covert communication performance, a dual-unmanned aerial vehicle (UAV)-aided scheme is proposed for integrated sensing and communication networks, in which one UAV maneuvers as the aerial dual-functional base-station (BS), while another UAV flies as the cooperative jammer. Artificial noise (AN) transmitted by the jamming UAV is utilized not only to confuse the ground warden but also to aid the aerial BS to sense multiple ground targets by combing the target-echoed dual-functional waveform and AN components from a perspective of the hybrid monostatitc-bistatic radar. We employ the distance-normalized beampattern sum-gain to measure the sensing performance. To maximize the average covert rate (ACR) from the aerial BS to the ground user, the dual-functional BS beamforming, jamming UAV beamforming, and dual-UAV trajectory are co-designed, subject to transmit power budgets, UAV maneuver constraint, covertness requirement, and sensing performance constraint. The imperfect successive interference cancellation (SIC) effects on the received signal-to-interference-plus-noise ratio are also considered in maximizing the ACR. To tackle the highly complicated non-convex ACR maximization problem, dual-UAV beamforming and dual-UAV trajectory are optimized in a block coordinate descent way using the trust-region successive convex approximation and semidefinite relaxation. To find the dual-UAV maneuver locations suitable for sensing the ground targets, we first optimize the dual-UAV trajectory for the covert communication purpose only and then solve a weighted distance minimization problem for the covert communication and sensing purpose.
△ Less
Submitted 31 May, 2025;
originally announced June 2025.
-
Dual-UAV-Enabled Secure Communication and Sensing for A2G-ISAC Systems with Maneuverable Jamming
Authors:
Libiao Lou,
Yuan Liu,
Fotis Foukalas,
Hongjiang Lei,
Gaofeng Pan,
Theodoros A. Tsiftsis,
Hongwu Liu
Abstract:
In this paper, we propose a dual-unmanned aerial vehicle (UAV)-enabled secure communication and sensing (SCS) scheme for an air-to-ground integrated sensing and communication (ISAC) system, in which a dual-functional source UAV and jamming UAV collaborate to enhance both the secure communication and target sensing performance. From a perspective of hybrid monostatitc-bistatic radar, the jamming UA…
▽ More
In this paper, we propose a dual-unmanned aerial vehicle (UAV)-enabled secure communication and sensing (SCS) scheme for an air-to-ground integrated sensing and communication (ISAC) system, in which a dual-functional source UAV and jamming UAV collaborate to enhance both the secure communication and target sensing performance. From a perspective of hybrid monostatitc-bistatic radar, the jamming UAV maneuvers to aid the source UAV to detect multiple ground targets by emitting artificial noise, meanwhile interfering with the ground eavesdropper. Residual interference is considered to reflect the effects of imperfect successive interference cancellation (SIC) on the receive signal-plus-interference-to-noise ratios, which results in a degraded system performance. To maximize the average secrecy rate (ASR), the dual-UAV trajectory and dual-UAV beamforming are jointly optimized subject to the transmit power budget, UAV maneuvering constraint, and sensing requirements. To tackle the highly complicated non-convex ASR maximization problem, the dual-UAV trajectory and dual-UAV beamforming are optimized for the secure communication (SC) purpose and the SCS purpose, sequentially. In the SC phase, a block coordinate descent algorithm is proposed to optimize the dual-UAV trajectory and dual-UAV beamforming iteratively, using the trust-region successive convex approximation (SCA) and semidefinite relaxation (SDR) techniques. Then, a weighted distance minimization problem is formulated to determine the dual-UAV maneuvering positions suitable for the SCS purpose, which is solved by a heuristic greedy algorithm, followed by the joint optimization of source beamforming and jamming beamforming.
△ Less
Submitted 18 May, 2025; v1 submitted 13 May, 2025;
originally announced May 2025.
-
Fairness vs. Equality: RSMA-Based Multi-Target and Multi-User Integrated Sensing and Communications
Authors:
Xudong Li,
Rugui Yao,
Alexandros-Apostolos A. Boulogeorgos,
Theodoros A. Tsiftsis
Abstract:
This paper investigates the tradeoff between sensing and communication in an ISAC system comprising multiple sensing targets and communication users. A dual-functional base station conducts downlink data transmission services based on RSMA for multiple users, while sensing surrounding multiple targets. To enable effective multicast communications and ensure fair and balanced multi-target sensing a…
▽ More
This paper investigates the tradeoff between sensing and communication in an ISAC system comprising multiple sensing targets and communication users. A dual-functional base station conducts downlink data transmission services based on RSMA for multiple users, while sensing surrounding multiple targets. To enable effective multicast communications and ensure fair and balanced multi-target sensing and under a constrained power budget, we propose a multi-target sensing enhancement scheme incorporating fairness-aware BF, common rate splitting, and sensing power allocation. The proposed scheme minimizes the sensing CRB, while maximizing communication rate demands. Specifically, we derive closed-form expressions for both sensing CRB and communication rates. Building upon them, we formulate an optimization problem aiming to minimize the sensing CRB, while maximizing the communication rates. Considering the non-convex nature of the original optimization problem poses significant computational challenges, we transform the tradeoff optimization into a Pareto-optimal problem by employing Taylor series expansion, semi-definite relaxation, successive convex approximation, and penalty function to transform the non-convex problem and associated constraints into tractable forms. Extensive simulations validate the theoretical analysis and demonstrate significant advantages of the proposed RSMA-based fairness-aware BF over non-orthogonal multiple access, space division multiple access, and orthogonal multiple access, through comprehensive comparisons in two key aspects: CRB performance improvement and sensing-communication tradeoff characteristics. The proposed optimization framework exhibits remarkable superiority in enhancing both sensing accuracy and communication quality for ISAC systems.
△ Less
Submitted 4 April, 2025;
originally announced April 2025.
-
Secure and Green Rate-Splitting Multiple Access Integrated Sensing and Communications
Authors:
Xudong Li,
Rugui Yao,
Theodoros A. Tsiftsis,
Alexandros-Apostolos A. Boulogeorgos
Abstract:
In this paper, we investigate the sensing, communication, security, and energy efficiency of integrated sensing and communication (ISAC)-enabled cognitive radio networks (CRNs) in a challenging scenario where communication quality, security, and sensing accuracy are affected by interference and eavesdropping. Specifically, we analyze the communication and sensing signals of ISAC as well as the com…
▽ More
In this paper, we investigate the sensing, communication, security, and energy efficiency of integrated sensing and communication (ISAC)-enabled cognitive radio networks (CRNs) in a challenging scenario where communication quality, security, and sensing accuracy are affected by interference and eavesdropping. Specifically, we analyze the communication and sensing signals of ISAC as well as the communication signal consisting of common and private streams, based on rate-splitting multiple access (RSMA) of multicast network. Then, the sensing signal-tocluster-plus-noise ratio, the security rate, the communication rate, and the security energy efficiency (SEE) are derived, respectively. To simultaneously enhance the aforementioned performance metrics, we formulate a targeted optimization framework that aims to maximizing SEE by jointly optimizing the transmit signal beamforming (BF) vectors and the echo signal BF vector to construct green interference using the echo signal, as well as common and private streams split by RSMA to refine security rate and suppress power consumption, i.e., achieving a higher SEE. Given the non-convex nature of the optimization problem, we present an alternative approach that leverages Taylor series expansion, majorization-minimization, semi-definite programming, and successive convex approximation techniques. Specifically, we decompose the original non-convex and intractable optimization problem into three simplified sub-optimization problems, which are iteratively solved using an alternating optimization strategy. Simulations provide comparisons with state-of-the-art schemes, highlighting the superiority of the proposed joint multi-BF optimization scheme based on RSMA and constructed green interference in improving system performances.
△ Less
Submitted 19 February, 2025;
originally announced February 2025.
-
Coalition Formation for Heterogeneous Federated Learning Enabled Channel Estimation in RIS-assisted Cell-free MIMO
Authors:
Nan Qi,
Haoxuan Liu,
Theodoros A. Tsiftsis,
Alexandros-Apostolos A. Boulogeorgos,
Fuhui Zhou,
Shi Jin,
Qihui Wu
Abstract:
Downlink channel estimation remains a significant bottleneck in reconfigurable intelligent surface-assisted cell-free multiple-input multiple-output communication systems. Conventional approaches primarily rely on centralized deep learning methods to estimate the high-dimensional and complex cascaded channels. These methods require data aggregation from all users for centralized model training, le…
▽ More
Downlink channel estimation remains a significant bottleneck in reconfigurable intelligent surface-assisted cell-free multiple-input multiple-output communication systems. Conventional approaches primarily rely on centralized deep learning methods to estimate the high-dimensional and complex cascaded channels. These methods require data aggregation from all users for centralized model training, leading to excessive communication overhead and significant data privacy concerns. Additionally, the large size of local learning models imposes heavy computational demands on end users, necessitating strong computational capabilities that most commercial devices lack. To address the aforementioned challenges, a coalition-formation-guided heterogeneous federated learning (FL) framework is proposed. This framework leverages coalition formation to guide the formation of heterogeneous FL user groups for efficient channel estimation. Specifically, by utilizing a distributed deep reinforcement learning (DRL) approach, each FL user intelligently and independently decides whether to join or leave a coalition, aiming at improving channel estimation accuracy, while reducing local model size and computational costs for end users. Moreover, to accelerate the DRL-FL convergence process and reduce computational burdens on end users, a transfer learning method is introduced. This method incorporates both received reference signal power and distance similarity metrics, by considering that nodes with similar distances to the base station and comparable received signal power have a strong likelihood of experiencing similar channel fading. Massive experiments performed that reveal that, compared with the benchmarks, the proposed framework significantly reduces the computational overhead of end users by 16%, improves data privacy, and improves channel estimation accuracy by 20%.
△ Less
Submitted 8 February, 2025;
originally announced February 2025.
-
Covert Communications in Active-IOS Aided Uplink NOMA Systems With Full-Duplex Receiver
Authors:
Xueyu Kang,
Nan Qi,
Lu Lv,
Alexandros-Apostolos A. Boulogeorgos,
Theodoros A. Tsiftsis,
Hongwu Liu
Abstract:
In this paper, an active intelligent omni-surface (A-IOS) is deployed to aid uplink transmissions in a non-orthogonal multiple access (NOMA) system. In order to shelter the covert signal embedded in the superposition transmissions, a multi-antenna full-duplex (FD) receiver is utilized at the base-station to recover signal in addition to jamming the warden. With the aim of maximizing the covert rat…
▽ More
In this paper, an active intelligent omni-surface (A-IOS) is deployed to aid uplink transmissions in a non-orthogonal multiple access (NOMA) system. In order to shelter the covert signal embedded in the superposition transmissions, a multi-antenna full-duplex (FD) receiver is utilized at the base-station to recover signal in addition to jamming the warden. With the aim of maximizing the covert rate, the FD transmit and receive beamforming, A-IOS refraction and reflection beamforming, NOMA transmit power, and FD jamming power are jointly optimized. To tackle the non-convex covert rate maximization problem subject to the highly coupled system parameters, an alternating optimization algorithm is designed to iteratively solve the decoupled sub-problems of optimizing the system parameters. The optimal solutions for the sub-problems of the NOMA transmit power and FD jamming power optimizations are derived in closed-form. To tackle the rank-one constrained non-convex fractional programming of the A-IOS beamforming and FD beamforming, a penalized Dinkelbach transformation approach is proposed to resort to the optimal solutions via semidefinite programming. Numerical results clarify that the deployment of the A-IOS significantly improves the covert rate compared with the passive-IOS aided uplink NOMA system. It is also found that the proposed scheme provides better covert communication performance with the optimized NOMA transmit power and FD jamming power compared with the benchmark schemes.
△ Less
Submitted 4 February, 2025;
originally announced February 2025.
-
Active-RIS-Aided Covert Communications in NOMA-Inspired ISAC Wireless Systems
Authors:
Miaomiao Zhu,
Pengxu Chen,
Liang Yang,
Alexandros-Apostolos A. Boulogeorgos,
Theodoros A. Tsiftsis,
Hongwu Liu
Abstract:
Non-orthogonal multiple access (NOMA)-inspired integrated sensing and communication (ISAC) facilitates spectrum sharing for radar sensing and NOMA communications, whereas facing privacy and security challenges due to open wireless propagation. In this paper, active reconfigurable intelligent surface (RIS) is employed to aid covert communications in NOMA-inspired ISAC wireless system with the aim o…
▽ More
Non-orthogonal multiple access (NOMA)-inspired integrated sensing and communication (ISAC) facilitates spectrum sharing for radar sensing and NOMA communications, whereas facing privacy and security challenges due to open wireless propagation. In this paper, active reconfigurable intelligent surface (RIS) is employed to aid covert communications in NOMA-inspired ISAC wireless system with the aim of maximizing the covert rate. Specifically, a dual-function base-station (BS) transmits the superposition signal to sense multiple targets, while achieving covert and reliable communications for a pair of NOMA covert and public users, respectively, in the presence of a warden. Two superposition transmission schemes, namely, the transmissions with dedicated sensing signal (w-DSS) and without dedicated sensing signal (w/o-DSS), are respectively considered in the formulations of the joint transmission and reflection beamforming optimization problems. Numerical results demonstrate that active-RIS-aided NOMA-ISAC system outperforms the passive-RIS-aided and without-RIS counterparts in terms of covert rate and trade-off between covert communication and sensing performance metrics. Finally, the w/o-DSS scheme, which omits the dedicated sensing signal, achieves a higher covert rate than the w-DSS scheme by allocating more transmit power for the covert transmissions, while preserving a comparable multi-target sensing performance.
△ Less
Submitted 29 June, 2024;
originally announced July 2024.
-
Impact of Inter-Operator Interference via Reconfigurable Intelligent Surfaces
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Panagiotis A. Karkazis,
Helen C. Leligou,
Petar Popovski
Abstract:
A wireless communication system is studied that operates in the presence of multiple reconfigurable intelligent surfaces (RISs). In particular, a multi-operator environment is considered where each operator utilizes an RIS to enhance its communication quality. Although out-of-band interference does not exist (since each operator uses isolated spectrum resources), RISs controlled by different opera…
▽ More
A wireless communication system is studied that operates in the presence of multiple reconfigurable intelligent surfaces (RISs). In particular, a multi-operator environment is considered where each operator utilizes an RIS to enhance its communication quality. Although out-of-band interference does not exist (since each operator uses isolated spectrum resources), RISs controlled by different operators do affect the system performance of one another due to the inherently rapid phase shift adjustments that occur on an independent basis. The system performance of such a communication scenario is analytically studied for the practical case where discrete-only phase shifts occur at RIS. The proposed framework is quite general since it is valid under arbitrary channel fading conditions as well as the presence (or not) of the transceiver's direct link. Finally, the derived analytical results are verified via numerical and simulation trial as well as some novel and useful engineering outcomes are manifested.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
Extreme Level Crossing Rate: A New Performance Indicator for URLLC Systems
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Panagiotis A. Karkazis,
Helen C. Leligou,
Fotis Foukalas
Abstract:
Level crossing rate (LCR) is a well-known statistical tool that is related to the duration of a random stationary fading process \emph{on average}. In doing so, LCR cannot capture the behavior of \emph{extremely rare} random events. Nonetheless, the latter events play a key role in the performance of ultra-reliable and low-latency communication systems rather than their average (expectation) count…
▽ More
Level crossing rate (LCR) is a well-known statistical tool that is related to the duration of a random stationary fading process \emph{on average}. In doing so, LCR cannot capture the behavior of \emph{extremely rare} random events. Nonetheless, the latter events play a key role in the performance of ultra-reliable and low-latency communication systems rather than their average (expectation) counterparts. In this paper, for the first time, we extend the notion of LCR to address this issue and sufficiently characterize the statistical behavior of extreme maxima or minima. This new indicator, entitled as extreme LCR (ELCR), is analytically introduced and evaluated by resorting to the extreme value theory and risk assessment. Capitalizing on ELCR, some key performance metrics emerge, i.e., the maximum outage duration, minimum effective duration, maximum packet error rate, and maximum transmission delay. They are all derived in simple closed-form expressions. The theoretical results are cross-compared and verified via extensive simulations whereas some useful engineering insights are manifested.
△ Less
Submitted 21 July, 2023;
originally announced July 2023.
-
Next-Generation Full Duplex Networking System Empowered by Reconfigurable Intelligent Surfaces
Authors:
Yingyang Chen,
Yuncong Li,
Miaowen Wen,
Duoying Zhang,
Bingli Jiao,
Zhiguo Ding,
Theodoros A. Tsiftsis,
H. Vincent Poor
Abstract:
Full duplex (FD) radio has attracted extensive attention due to its co-time and co-frequency transceiving capability. {However, the potential gain brought by FD radios is closely related to the management of self-interference (SI), which imposes high or even stringent requirements on SI cancellation (SIC) techniques. When the FD deployment evolves into next-generation mobile networking, the SI pro…
▽ More
Full duplex (FD) radio has attracted extensive attention due to its co-time and co-frequency transceiving capability. {However, the potential gain brought by FD radios is closely related to the management of self-interference (SI), which imposes high or even stringent requirements on SI cancellation (SIC) techniques. When the FD deployment evolves into next-generation mobile networking, the SI problem becomes more complicated, significantly limiting its potential gains.} In this paper, we conceive a multi-cell FD networking scheme by deploying a reconfigurable intelligent surface (RIS) at the cell boundary to configure the radio environment proactively. To achieve the full potential of the system, we aim to maximize the sum rate (SR) of multiple cells by jointly optimizing the transmit precoding (TPC) matrices at FD base stations (BSs) and users and the phase shift matrix at RIS. Since the original problem is non-convex, we reformulate and decouple it into a pair of subproblems by utilizing the relationship between the SR and minimum mean square error (MMSE). The optimal solutions of TPC matrices are obtained in closed form, while both complex circle manifold (CCM) and successive convex approximation (SCA) based algorithms are developed to resolve the phase shift matrix suboptimally. Our simulation results show that introducing an RIS into an FD networking system not only improves the overall SR significantly but also enhances the cell edge performance prominently. More importantly, we validate that the RIS deployment with optimized phase shifts can reduce the requirement for SIC and the number of BS antennas, which further reduces the hardware cost and power consumption, especially with a sufficient number of reflecting elements. As a result, the utilization of an RIS enables the originally cumbersome FD networking system to become efficient and practical.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Zero Forcing Uplink Detection through Large-Scale RIS: System Performance and Phase Shift Design
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Rugui Yao
Abstract:
A multiple-input multiple-output wireless communication system is analytically studied, which operates with the aid of a large-scale reconfigurable intelligent surface (LRIS). LRIS is equipped with multiple passive elements with discrete phase adjustment capabilities, and independent Rician fading conditions are assumed for both the transmitter-to-LRIS and LRIS-to-receiver links. A direct transcei…
▽ More
A multiple-input multiple-output wireless communication system is analytically studied, which operates with the aid of a large-scale reconfigurable intelligent surface (LRIS). LRIS is equipped with multiple passive elements with discrete phase adjustment capabilities, and independent Rician fading conditions are assumed for both the transmitter-to-LRIS and LRIS-to-receiver links. A direct transceiver link is also considered which is modeled by Rayleigh fading distribution. The system performance is analytically studied when the linear yet efficient zero-forcing detection is implemented at the receiver. In particular, the outage performance is derived in closed-form expression for different system configuration setups with regards to the available channel state information (CSI) at the receiver. In fact, the case of both perfect and imperfect CSI is analyzed. Also, an efficient phase shift design approach at LRIS is introduced, which is linear on the number of passive elements and receive antennas. The proposed phase shift design can be applied on two different modes of operation; namely, when the system strives to adapt either on the instantaneous or statistical CSI. Finally, some impactful engineering insights are provided, such as how the channel fading conditions, CSI, discrete phase shift resolution, and volume of antenna/LRIS element arrays impact on the overall system performance.
△ Less
Submitted 23 November, 2022;
originally announced November 2022.
-
Outage Performance of Cross-Packet HARQ
Authors:
Jiahui Feng,
Zheng Shi,
Guanghua Yang,
Nikolaos I. Miridakis,
Shaodan Ma,
Theodoros A. Tsiftsis
Abstract:
As opposed to hybrid automatic repeat request with incremental redundancy (HARQ-IR) that all the resources are occupied to resend the redundant information, cross-packet HARQ (XP-HARQ) allows the introduction of new information into retransmissions to substantially exploit the remaining resources. This letter provides a profound investigation into the outage performance of XP-HARQ. In particular,…
▽ More
As opposed to hybrid automatic repeat request with incremental redundancy (HARQ-IR) that all the resources are occupied to resend the redundant information, cross-packet HARQ (XP-HARQ) allows the introduction of new information into retransmissions to substantially exploit the remaining resources. This letter provides a profound investigation into the outage performance of XP-HARQ. In particular, the exact outage expression of XP-HARQ is derived if the maximum number of transmissions is two, and tight outage bounds are obtained for more than two transmissions. Moreover, the asymptotic outage analysis of XP-HARQ in the high signal-to-noise ratio (SNR) regime is carried out not only to simplify the outage expression, but also to show that full time diversity is achievable by XP-HARQ. The simulation results are eventually presented for verifications.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.
-
Zero-Forcing Based Downlink Virtual MIMO-NOMA Communications in IoT Networks
Authors:
Zheng Shi,
Hong Wang,
Yaru Fu,
Guanghua Yang,
Shaodan Ma,
Fen Hou,
Theodoros A. Tsiftsis
Abstract:
To support massive connectivity and boost spectral efficiency for internet of things (IoT), a downlink scheme combining virtual multiple-input multiple-output (MIMO) and nonorthogonal multiple access (NOMA) is proposed. All the single-antenna IoT devices in each cluster cooperate with each other to establish a virtual MIMO entity, and multiple independent data streams are requested by each cluster…
▽ More
To support massive connectivity and boost spectral efficiency for internet of things (IoT), a downlink scheme combining virtual multiple-input multiple-output (MIMO) and nonorthogonal multiple access (NOMA) is proposed. All the single-antenna IoT devices in each cluster cooperate with each other to establish a virtual MIMO entity, and multiple independent data streams are requested by each cluster. NOMA is employed to superimpose all the requested data streams, and each cluster leverages zero-forcing detection to de-multiplex the input data streams. Only statistical channel state information (CSI) is available at base station to avoid the waste of the energy and bandwidth on frequent CSI estimations. The outage probability and goodput of the virtual MIMO-NOMA system are thoroughly investigated by considering Kronecker model, which embraces both the transmit and receive correlations. Furthermore, the asymptotic results facilitate not only the exploration of physical insights but also the goodput maximization. In particular, the asymptotic outage expressions provide quantitative impacts of various system parameters and enable the investigation of diversity-multiplexing tradeoff (DMT). Moreover, power allocation coefficients and/or transmission rates can be properly chosen to achieve the maximal goodput. By favor of Karush-Kuhn-Tucker conditions, the goodput maximization problems can be solved in closed-form, with which the joint power and rate selection is realized by using alternately iterating optimization.Besides, the optimization algorithms tend to allocate more power to clusters under unfavorable channel conditions and support clusters with higher transmission rate under benign channel conditions.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
Cognitive Radio-Inspired Rate-Splitting Multiple Access for Semi-Grant-Free Transmissions
Authors:
Hongwu Liu,
Kyeong Jin Kim,
Theodoros A. Tsiftsis,
Bruno Clerckx,
Kyung Sup Kwak,
H. Vincent Poor
Abstract:
In this paper, we propose a cognitive radio-inspired rate-splitting multiple access (CR-RSMA) scheme to assist semi-grant-free (SGF) transmissions in which a grant-based user (GBU) and multiple grant-free users (GFUs) access the base-station (BS) by sharing the same resource block. Using the cognitive radio principle, the GBU and admitted GFU are treated as the primary and secondary users, respect…
▽ More
In this paper, we propose a cognitive radio-inspired rate-splitting multiple access (CR-RSMA) scheme to assist semi-grant-free (SGF) transmissions in which a grant-based user (GBU) and multiple grant-free users (GFUs) access the base-station (BS) by sharing the same resource block. Using the cognitive radio principle, the GBU and admitted GFU are treated as the primary and secondary users, respectively, and rate-splitting is applied at the admitted GFU to realize SGF transmissions. The admitted GFU's transmit power allocation, target rate allocation, and successive interference cancellation decoding order at the BS are jointly optimized to attain the maximum achievable rate for the admitted GFU without deteriorating the GBU's outage performance compared to orthogonal multiple access. Due to the extended non-outage zone, CR-RSMA-assised SGF (CR-RSMA-SGF) transmissions achieve a lower outage probability than SGF transmissions assisted by cognitive radio-inspired non-orthogonal multiple access. Exact expressions and asymptotic analysis for the admitted GFU's outage probability are derived to evaluate the system performance achieved by CR-RSMA-SGF transmissions. The superior outage performance and full multiuser diversity gain achieved by CR-RSMA-SGF transmissions are verified by the analytical and simulation results.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
On the Physical Layer Security of Visible Light Communications Empowered by Gold Nanoparticles
Authors:
Geonho Han,
Hyuckjin Choi,
Ryeong Myeong Kim,
Ki Tae Nam,
Junil Choi,
Theodoros A. Tsiftsis
Abstract:
Visible light is a proper spectrum for secure wireless communications because of its high directivity and impermeability in indoor scenarios. However, if an eavesdropper is located very close to a legitimate receiver, secure communications become highly risky. In this paper, to further increase the level of security of visible light communication (VLC) and increase its resilience against to malici…
▽ More
Visible light is a proper spectrum for secure wireless communications because of its high directivity and impermeability in indoor scenarios. However, if an eavesdropper is located very close to a legitimate receiver, secure communications become highly risky. In this paper, to further increase the level of security of visible light communication (VLC) and increase its resilience against to malicious attacks, we propose to capitalize on the recently synthesized gold nanoparticles (GNPs) with chiroptical properties for circularly polarized light resulting the phase retardation that interacts with the linear polarizer angle. GNP plates made by judiciously stacking many GNPs perform as physical secret keys. Transmitters send both the intended symbol and artificial noise to exploit the channel variation effect by the GNP plates, which is highly effective when an eavesdropper is closely located to the legitimate receiver. A new VLC channel model is first developed by representing the effect of GNP plates and linear polarizers in the circular polarization domain. Based on the new channel model, the angles of linear polarizers at the transmitters and legitimate receiver are optimized considering the effect of GNP plates to increase the secrecy rate in wiretapping scenarios. Simulations verify that when the transmitters are equipped with GNP plates, even if the eavesdropper is located right next to the legitimate receiver, insightful results on the physical layer security metrics are gained as follows: 1) the secrecy rate is significantly improved and 2) the symbol error rate gap between the legitimate receiver and eavesdropper becomes much larger due to the chiroptical properties of GNP plates.
△ Less
Submitted 7 June, 2024; v1 submitted 12 August, 2022;
originally announced August 2022.
-
On the Age of Status Updates in Unreliable Multi-Source M/G/1 Queueing Systems
Authors:
Muthukrishnan Senthil Kumar,
Aresh Dadlani,
Masoumeh Moradian,
Ahmad Khonsari,
Theodoros A. Tsiftsis
Abstract:
The timeliness of status message delivery in communications networks is subjective to time-varying wireless channel transmissions. In this paper, we investigate the age of information (AoI) of each source in a multi-source M/G/1 queueing update system with active server failures. In particular, we adopt the method of supplementary variables to derive a closed-form expression for the average AoI in…
▽ More
The timeliness of status message delivery in communications networks is subjective to time-varying wireless channel transmissions. In this paper, we investigate the age of information (AoI) of each source in a multi-source M/G/1 queueing update system with active server failures. In particular, we adopt the method of supplementary variables to derive a closed-form expression for the average AoI in terms of system parameters, where the server repair time follows a general distribution and the service time of packets generated by independent sources is a general random variable. Numerical results are provided to validate the effectiveness of the proposed packet serving policy under different parametric settings.
△ Less
Submitted 31 October, 2022; v1 submitted 2 August, 2022;
originally announced August 2022.
-
On Secure NOMA-Aided Semi-Grant-Free Systems
Authors:
Hongjiang Lei,
Fangtao Yang,
Hongwu Liu,
Imran Shafique Ansari,
Kyeong Jin Kim,
Theodoros A. Tsiftsis
Abstract:
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB users. This work investigates the secrecy performance of non-orthogonal multiple access (NOMA)-aided SGF systems. First, analytical expressions for the exact and asymptotic secrecy outage probability (SOP) of NOMA-aid…
▽ More
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB users. This work investigates the secrecy performance of non-orthogonal multiple access (NOMA)-aided SGF systems. First, analytical expressions for the exact and asymptotic secrecy outage probability (SOP) of NOMA-aided SGF systems with a single GF user are derived. Then, the SGF systems with multiple GF users and the best-user scheduling scheme is considered. Analytical expressions for the exact and asymptotic SOP are derived by utilizing order statistics theory. Monte Carlo simulation results are provided and compared with two benchmark schemes. The effects of system parameters on the SOP of the considered system are demonstrated and the accuracy of the developed analytical results is verified. The results indicate that both the outage target rate for GB and the secure target rate for GF are the main factors of the secrecy performance of SGF systems.
△ Less
Submitted 27 February, 2023; v1 submitted 17 April, 2022;
originally announced April 2022.
-
Rate Splitting Multiple Access Aided Mobile Edge Computing in Cognitive Radio Networks
Authors:
Hongwu Liu,
Yinghui Ye,
Zhiquan Bai,
Kyeong Jin Kim,
Theodoros A. Tsiftsis
Abstract:
In this paper, we investigate rate splitting multiple access (RSMA) aided mobile edge computing (MEC) in a cognitive radio network. We propose a RSMA scheme that enables the secondary user to offload tasks to the MEC server utilizing dynamic rate splitting without deteriorating the primary user's offloading. The expressions for the optimal rate splitting parameters that maximize the achievable rat…
▽ More
In this paper, we investigate rate splitting multiple access (RSMA) aided mobile edge computing (MEC) in a cognitive radio network. We propose a RSMA scheme that enables the secondary user to offload tasks to the MEC server utilizing dynamic rate splitting without deteriorating the primary user's offloading. The expressions for the optimal rate splitting parameters that maximize the achievable rate for the secondary user and successful computation probability of the proposed RSMA scheme are derived in closed-form. We formulate a problem to maximize successful computation probability by jointly optimizing task offloading ratio and task offloading time and obtain the optimal solutions in closed-form. Simulation results clarify that the proposed RSMA scheme achieves a higher successful computation probability than the existing non-orthogonal multiple access scheme.
△ Less
Submitted 13 April, 2022;
originally announced April 2022.
-
A New Rate Splitting Strategy for Uplink CR-NOMA Systems
Authors:
Hongwu Liu,
Zhiquan Bai,
Hongjiang Lei,
Gaofeng Pan,
Kyeong Jin Kim,
Theodoros A. Tsiftsis
Abstract:
In uplink non-orthogonal multiple access (NOMA) channels, the existing cooperative successive interference cancellation (SIC) and power control (PC) schemes lack the capability of achieving the full capacity region, which restricts the outage performance of uplink NOMA users. For the uplink cognitive radio inspired NOMA system, we propose a new rate splitting (RS) strategy to maximize the achievab…
▽ More
In uplink non-orthogonal multiple access (NOMA) channels, the existing cooperative successive interference cancellation (SIC) and power control (PC) schemes lack the capability of achieving the full capacity region, which restricts the outage performance of uplink NOMA users. For the uplink cognitive radio inspired NOMA system, we propose a new rate splitting (RS) strategy to maximize the achievable rate of the secondary user without deteriorating the primary user's outage performance. Based on the interference threshold and its own channel gain, the secondary user adaptively conducts RS, transmit power allocation and SIC, which utilizes the transmit power efficiently. The closed-form expression for the outage probability is derived for the secondary user. Numerical results show that the proposed RS scheme achieves the best outage performance for the secondary user among the existing cooperative SIC and PC schemes.
△ Less
Submitted 12 April, 2022;
originally announced April 2022.
-
New Antenna Selection Schemes for Full-Duplex Cooperative MIMO-NOMA Systems
Authors:
Zahra Mobini,
Mohammadali Mohammadi,
Theodoros A. Tsiftsis,
Zhiguo Ding,
Chintha Tellambura
Abstract:
In this paper, we address the antenna selection (AS) problem in full-duplex (FD) cooperative non-orthogonal multiple access (NOMA) systems, where a multi-antenna FD relay bridges the connection between the multi-antenna base station and NOMA far user. Specifically, two AS schemes, namely max-$\SUu$ and max-$\SUuu$, are proposed to maximize the end-to-end signal-to-interference-plus-noise ratio at…
▽ More
In this paper, we address the antenna selection (AS) problem in full-duplex (FD) cooperative non-orthogonal multiple access (NOMA) systems, where a multi-antenna FD relay bridges the connection between the multi-antenna base station and NOMA far user. Specifically, two AS schemes, namely max-$\SUu$ and max-$\SUuu$, are proposed to maximize the end-to-end signal-to-interference-plus-noise ratio at either or both near and far users, respectively. Moreover, a two-stage AS scheme, namely quality-of-service (QoS) provisioning scheme, is designed to realize a specific rate at the far user while improving the near user's rate. To enhance the performance of the QoS provisioning AS scheme, the idea of dynamic antenna clustering is applied at the relay to adaptively partition the relay's antennas into transmit and receive subsets. The proposed AS schemes' exact outage probability and achievable rate expressions are derived. To provide more insight, closed-form asymptotic outage probability expressions for the max-$\SUu$ and max-$\SUuu$ AS schemes are obtained. Our results show that while the QoS provisioning AS scheme can deliver a near-optimal performance for static antenna setup at the relay, it provides up to $12\%$ average sum rate gain over the optimum AS selection with fixed antenna setup.
△ Less
Submitted 25 February, 2022;
originally announced February 2022.
-
Extreme Age of Information for Wireless-Powered Communication Systems
Authors:
Nikolaos I. Miridakis,
Zheng Shi,
Theodoros A. Tsiftsis,
Guanghua Yang
Abstract:
The extreme or maximum age of information (AoI) is analytically studied for wireless communication systems. In particular, a wireless powered single-antenna source node and a receiver (connected to the power grid) equipped with multiple antennas are considered when operated under independent Rayleigh-faded channels. Via the extreme value theory and its corresponding statistical features, we demons…
▽ More
The extreme or maximum age of information (AoI) is analytically studied for wireless communication systems. In particular, a wireless powered single-antenna source node and a receiver (connected to the power grid) equipped with multiple antennas are considered when operated under independent Rayleigh-faded channels. Via the extreme value theory and its corresponding statistical features, we demonstrate that the extreme AoI converges to the Gumbel distribution whereas its corresponding parameters are obtained in straightforward closed-form expressions. Capitalizing on this result, the risk of the extreme AoI realization is analytically evaluated according to some relevant performance metrics, while some useful engineering insights are manifested.
△ Less
Submitted 20 January, 2022; v1 submitted 19 January, 2022;
originally announced January 2022.
-
Non-Linear Age of Information: An Energy Efficient Receiver-Centric Approach
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Guanghua Yang
Abstract:
The age of information (AoI) performance metric for point-to-point wireless communication systems is analytically studied under Rician-faded channels and when the receiver is equipped with multiple antennas. The general scenario of a non-linear AoI function is considered, which includes the conventional linear AoI as a special case. The stop-and-wait transmission policy is adopted, where the sourc…
▽ More
The age of information (AoI) performance metric for point-to-point wireless communication systems is analytically studied under Rician-faded channels and when the receiver is equipped with multiple antennas. The general scenario of a non-linear AoI function is considered, which includes the conventional linear AoI as a special case. The stop-and-wait transmission policy is adopted, where the source node samples and then transmits new data only upon the successful reception of previous data. This approach can serve as a performance benchmark for any queuing system used in practice. New analytical and closed-form expressions are derived with respect to the average AoI and average peak AoI for the considered system configuration. We particularly focus on the energy efficiency of the said mode of operation, whereas some useful engineering insights are provided.
△ Less
Submitted 31 December, 2021;
originally announced December 2021.
-
Semi-Blind Multiuser Detection Under the Presence of Reconfigurable Intelligent Surfaces
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Guanghua Yang,
Panagiotis A. Karkazis,
Helen C. Leligou
Abstract:
A multiuser multiple-input multiple-output wireless communication system is analytically studied, which operates with the aid of a reconfigurable intelligent surface (RIS). The intermediate RIS is equipped with multiple elements and operates via random phase rotations to simultaneously serve multiple users. Independent Rayleigh fading conditions are assumed among the included channels. The system…
▽ More
A multiuser multiple-input multiple-output wireless communication system is analytically studied, which operates with the aid of a reconfigurable intelligent surface (RIS). The intermediate RIS is equipped with multiple elements and operates via random phase rotations to simultaneously serve multiple users. Independent Rayleigh fading conditions are assumed among the included channels. The system performance is analytically studied when the linear yet efficient zero-forcing detection is implemented at the receiver. In particular, the outage performance is derived in closed-form expression for different system configuration setups with regards to the available channel state information at the receiver. Further, a joint coherent/noncoherent linear detection is analytically presented. Finally, some new engineering insights are provided, such as how the channel state information and/or the volume of antenna/RIS arrays impact on the overall system performance as well as the arising efficiency on the performance/complexity tradeoff by utilizing the joint coherent/noncoherent scheme.
△ Less
Submitted 10 October, 2021;
originally announced October 2021.
-
A Rate Splitting Strategy for Uplink CR-NOMA Systems
Authors:
Hongwu Liu,
Zhiquan Bai,
Hongjiang Lei,
Gaofeng Pan,
Kyeong Jin Kim,
Theodoros A. Tsiftsis
Abstract:
In uplink non-orthogonal multiple access (NOMA) channels, the existing cooperative successive interference cancellation (SIC) and power control (PC) schemes lack the capability of achieving the full capacity region, which restricts the outage performance of uplink NOMA users. For the uplink cognitive radio (CR) inspired NOMA system, we propose a new rate splitting (RS) strategy to maximize the ach…
▽ More
In uplink non-orthogonal multiple access (NOMA) channels, the existing cooperative successive interference cancellation (SIC) and power control (PC) schemes lack the capability of achieving the full capacity region, which restricts the outage performance of uplink NOMA users. For the uplink cognitive radio (CR) inspired NOMA system, we propose a new rate splitting (RS) strategy to maximize the achievable rate of the secondary user without deteriorating the primary user's outage performance. Based on the interference threshold and its own channel gain, the secondary user adaptively conducts RS, transmit power allocation and SIC, which utilizes the transmit power efficiently. Closed-form expression of the outage probability is derived for the secondary user. Numerical results show that the proposed RS scheme achieves the best outage performance for the secondary user among the existing cooperative SIC and PC schemes.
△ Less
Submitted 31 January, 2022; v1 submitted 5 October, 2021;
originally announced October 2021.
-
Rate Splitting Multiple Access for Semi-Grant-Free Transmissions
Authors:
Hongwu Liu,
Theodoros A. Tsiftsis,
Bruno Clerckx,
Kyeong Jin Kim,
Kyung Sup Kwak,
H. Vincent Poor
Abstract:
Enabled by hybrid grant-based (GB) and grant-free (GF) transmission techniques, GF users of internet of things (IoT) devices and massive machine-type communications (mMTC) meet opportunities to share wireless resources with GB users. In this paper, we propose a rate splitting multiple access (RSMA) strategy for an emerging semi-grant-free (SGF) transmission system to increase connectivity and reli…
▽ More
Enabled by hybrid grant-based (GB) and grant-free (GF) transmission techniques, GF users of internet of things (IoT) devices and massive machine-type communications (mMTC) meet opportunities to share wireless resources with GB users. In this paper, we propose a rate splitting multiple access (RSMA) strategy for an emerging semi-grant-free (SGF) transmission system to increase connectivity and reliability. In the proposed RSMA assisted SGF (RSMA-SGF) scheme, the GF users apply the rate splitting principle to realize distributed contentions and utilize transmit power most effectively for robust transmissions, meanwhile keeping themselves transparent to the GB user. Compared to existing non-orthogonal multiple access (NOMA) assisted SGF schemes, the RSMA-SGF scheme significantly decreases outage probability and achieves full multiuser diversity gain without restricting the GB and GF users' target rates to a limited value region. Exact expressions and asymptotic analysis for the outage probability are provided to facilitate the system performance evaluation of the proposed RSMA-SGF scheme. Computer simulation results clarify the superior outage performance of the RSMA-SGF scheme and verify the accuracy of the developed analytical results.
△ Less
Submitted 5 October, 2021;
originally announced October 2021.
-
Joint Task Offloading and Resource Allocation for IoT Edge Computing with Sequential Task Dependency
Authors:
Xuming An,
Rongfei Fan,
Han Hu,
Ning Zhang,
Saman Atapattu,
Theodoros A. Tsiftsis
Abstract:
Incorporating mobile edge computing (MEC) in Internet of Things (IoT) enables resource-limited IoT devices to offload their computation tasks to a nearby edge server. In this paper, we investigate an IoT system assisted by the MEC technique with its computation task subjected to sequential task dependency, which is critical for video stream processing and other intelligent applications. To minimiz…
▽ More
Incorporating mobile edge computing (MEC) in Internet of Things (IoT) enables resource-limited IoT devices to offload their computation tasks to a nearby edge server. In this paper, we investigate an IoT system assisted by the MEC technique with its computation task subjected to sequential task dependency, which is critical for video stream processing and other intelligent applications. To minimize energy consumption per IoT device while limiting task processing delay, task offloading strategy, communication resource, and computation resource are optimized jointly under both slow and fast fading channels. In slow fading channels, an optimization problem is formulated, which is non-convex and involves one integer variable. To solve this challenging problem, we decompose it as a one-dimensional search of task offloading decision problem and a non-convex optimization problem with task offloading decision given. Through mathematical manipulations, the non-convex problem is transformed to be a convex one, which is shown to be solvable only with the simple Golden search method. In fast fading channels, optimal online policies depending on instant channel state are derived even though they are entangled. In addition, it is proved that the derived policy will converge to the offline policy when channel coherence time is low, which can help to save extra computation complexity. Numerical results verify the correctness of our analysis and the effectiveness of our proposed strategies over existing methods.
△ Less
Submitted 29 December, 2021; v1 submitted 25 November, 2020;
originally announced November 2020.
-
Moment-based Spectrum Sensing Under Generalized Noise Channels
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Guanghua Yang
Abstract:
A new spectrum sensing detector is proposed and analytically studied, when it operates under generalized noise channels. Particularly, the McLeish distribution is used to model the underlying noise, which is suitable for both non-Gaussian (impulsive) as well as classical Gaussian noise modeling. The introduced detector adopts a moment-based approach, whereas it is not required to know the transmit…
▽ More
A new spectrum sensing detector is proposed and analytically studied, when it operates under generalized noise channels. Particularly, the McLeish distribution is used to model the underlying noise, which is suitable for both non-Gaussian (impulsive) as well as classical Gaussian noise modeling. The introduced detector adopts a moment-based approach, whereas it is not required to know the transmit signal and channel fading statistics (i.e., blind detection). Important performance metrics are presented in closed forms, such as the false-alarm probability, detection probability and decision threshold. Analytical and simulation results are cross-compared validating the accuracy of the proposed approach. Finally, it is demonstrated that the proposed approach outperforms the conventional energy detector in the practical case of noise uncertainty, yet introducing a comparable computational complexity.
△ Less
Submitted 9 September, 2020;
originally announced September 2020.
-
Generalized Energy Detection Under Generalized Noise Channels
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Guanghua Yang
Abstract:
Generalized energy detection (GED) is analytically studied when operates under fast-faded channels and in the presence of generalized noise. For the first time, the McLeish distribution is used to model the underlying noise, which is suitable for both non-Gaussian (impulsive) as well as classical Gaussian noise channels. Important performance metrics are presented in closed forms, such as the fals…
▽ More
Generalized energy detection (GED) is analytically studied when operates under fast-faded channels and in the presence of generalized noise. For the first time, the McLeish distribution is used to model the underlying noise, which is suitable for both non-Gaussian (impulsive) as well as classical Gaussian noise channels. Important performance metrics are presented in closed forms, such as the false-alarm and detection probabilities as well as the decision threshold. Analytical and simulation results are cross-compared validating the accuracy of the proposed approach in the entire signal-to-noise ratio regime. Finally, useful outcomes are extracted with respect to GED system settings under versatile noise environments and when noise uncertainty is present.
△ Less
Submitted 11 September, 2020; v1 submitted 9 September, 2020;
originally announced September 2020.
-
UAV-Aided Multi-Way NOMA Networks with Residual Hardware Impairments
Authors:
Xingwang Li,
Qunshu Wang,
Yuanwei Liu,
Theodoros A. Tsiftsis,
Zhiguo Ding,
Arumugam Nallanathan
Abstract:
In this paper, we study an unmanned aerial vehicle (UAV)-aided non-orthogonal multiple access (NOMA) multi-way relaying networks (MWRNs). Multiple terrestrial users aim to exchange their mutual information via an amplify-and-forward (AF) UAV relay. Specifically, the realistic assumption of the residual hardware impairments (RHIs) at the transceivers is taken into account. To evaluate the performan…
▽ More
In this paper, we study an unmanned aerial vehicle (UAV)-aided non-orthogonal multiple access (NOMA) multi-way relaying networks (MWRNs). Multiple terrestrial users aim to exchange their mutual information via an amplify-and-forward (AF) UAV relay. Specifically, the realistic assumption of the residual hardware impairments (RHIs) at the transceivers is taken into account. To evaluate the performance of the considered networks, we derive the analytical expressions for the achievable sum-rate (ASR). In addition, we carry out the asymptotic analysis by invoking the affine expansion of the ASR in terms of \emph{high signal-to-noise ratio (SNR) slope} and \emph{high SNR power offset}. Numerical results show that: 1) Compared with orthogonal multiple access (OMA), the proposed networks can significantly improve the ASR since it can reduce the time slots from $\left[ {\left( {M - 1} \right)/2} \right] + 1$ to 2; and 2) RHIs of both transmitter and receiver have the same effects on the ASR of the considered networks.
△ Less
Submitted 17 May, 2020;
originally announced May 2020.
-
Air-to-Air Communications Beyond 5G: A Novel 3D CoMP Transmission Scheme
Authors:
Yan Li,
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Guanghua Yang,
Minghua Xia
Abstract:
In this paper, a novel $3$D cellular model consisting of aerial base stations (aBSs) and aerial user equipments (aUEs) is proposed, by integrating the coordinated multi-point (CoMP) transmission technique with the theory of stochastic geometry. For this new $3$D architecture, a tractable model for aBSs' deployment based on the binomial-Delaunay tetrahedralization is developed, which ensures seamle…
▽ More
In this paper, a novel $3$D cellular model consisting of aerial base stations (aBSs) and aerial user equipments (aUEs) is proposed, by integrating the coordinated multi-point (CoMP) transmission technique with the theory of stochastic geometry. For this new $3$D architecture, a tractable model for aBSs' deployment based on the binomial-Delaunay tetrahedralization is developed, which ensures seamless coverage for a given space. In addition, a versatile and practical frequency allocation scheme is designed to eliminate the inter-cell interference effectively. Based on this model, performance metrics including the achievable data rate and coverage probability are derived for two types of aUEs: {\it i)} the general aUE (i.e., an aUE having distinct distances from its serving aBSs) and {\it ii)} the worst-case aUE (i.e., an aUE having equal distances from its serving aBSs). Simulation and numerical results demonstrate that the proposed approach emphatically outperforms the conventional binomial-Voronoi tessellation without CoMP. Insightfully, it provides a similar performance to the binomial-Voronoi tessellation which utilizes the conventional CoMP scheme; yet, introducing a considerably reduced computational complexity and backhaul/signaling overhead.
△ Less
Submitted 16 July, 2020; v1 submitted 13 February, 2020;
originally announced February 2020.
-
Reconfigurable Intelligent Surface assisted Two-Way Communications: Performance Analysis and Optimization
Authors:
Saman Atapattu,
Rongfei Fan,
Prathapasinghe Dharmawansa,
Gongpu Wang,
Jamie Evans,
Theodoros A. Tsiftsis
Abstract:
In this paper, we investigate the two-way communication between two users assisted by a re-configurable intelligent surface (RIS). The scheme that two users communicate simultaneously over Rayleigh fading channels is considered. The channels between the two users and RIS can either be reciprocal or non-reciprocal. For reciprocal channels, we determine the optimal phases at the RIS to maximize the…
▽ More
In this paper, we investigate the two-way communication between two users assisted by a re-configurable intelligent surface (RIS). The scheme that two users communicate simultaneously over Rayleigh fading channels is considered. The channels between the two users and RIS can either be reciprocal or non-reciprocal. For reciprocal channels, we determine the optimal phases at the RIS to maximize the signal-to-interference-plus-noise ratio (SINR). We then derive exact closed-form expressions for the outage probability and spectral efficiency for single-element RIS. By capitalizing the insights obtained from the single-element analysis, we introduce a gamma approximation to model the product of Rayleigh random variables which is useful for the evaluation of the performance metrics in multiple-element RIS. Asymptotic analysis shows that the outage decreases at $\left(\log(ρ)/ρ\right)^L$ rate where $L$ is the number of elements, whereas the spectral efficiency increases at $\log(ρ)$ rate at large average SINR $ρ$. For non-reciprocal channels, the minimum user SINR is targeted to be maximized. For single-element RIS, closed-form solution is derived whereas for multiple-element RIS the problem turns out to be non-convex. The latter one is solved through semidefinite programming relaxation and a proposed greedy-iterative method, which can achieve higher performance and lower computational complexity, respectively.
△ Less
Submitted 3 May, 2020; v1 submitted 22 January, 2020;
originally announced January 2020.
-
Channel Estimation for Wireless Communication Systems Assisted by Large Intelligent Surfaces
Authors:
Junliang Lin,
Gongpu Wang,
Rongfei Fan,
Theodoros A. Tsiftsis,
Chintha Tellambura
Abstract:
In this letter, the channel estimation problem is studied for wireless communication systems assisted by large intelligent surface. Due to features of assistant channel, channel estimation (CE) problem for the investigated system is shown as a constrained estimation error minimization problem, which differs from traditional CE problems. A Lagrange multiplier and dual ascent-based estimation scheme…
▽ More
In this letter, the channel estimation problem is studied for wireless communication systems assisted by large intelligent surface. Due to features of assistant channel, channel estimation (CE) problem for the investigated system is shown as a constrained estimation error minimization problem, which differs from traditional CE problems. A Lagrange multiplier and dual ascent-based estimation scheme is then designed to obtain a closed-form solution for the estimator iteratively. Moreover, the Cramer-Rao lower bounds are deduced for performance evaluation. Simulation results show that the designed scheme could improve estimation accuracy up to 18%, compared with least square method in low signal-to-noise ratio regime.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Traffic-aware Two-stage Queueing Communication Networks: Queue Analysis and Energy Saving
Authors:
Nan Qi,
Nikolaos I. Miridakis,
Ming Xiao,
Theodoros A. Tsiftsis,
Rugui Yao,
Shi Jin
Abstract:
To boost energy saving for the general delay-tolerant IoT networks, a two-stage and single-relay queueing communication scheme is investigated. Concretely, a traffic-aware $N$-threshold and gated-service policy are applied at the relay. As two fundamental and significant performance metrics, the mean waiting time and long-term expected power consumption are explicitly derived and related with the…
▽ More
To boost energy saving for the general delay-tolerant IoT networks, a two-stage and single-relay queueing communication scheme is investigated. Concretely, a traffic-aware $N$-threshold and gated-service policy are applied at the relay. As two fundamental and significant performance metrics, the mean waiting time and long-term expected power consumption are explicitly derived and related with the queueing and service parameters, such as packet arrival rate, service threshold and channel statistics. Besides, we take into account the electrical circuit energy consumptions when the relay server and access point (AP) are in different modes and energy costs for mode transitions, whereby the power consumption model is more practical. The expected power minimization problem under the mean waiting time constraint is formulated. Tight closed-form bounds are adopted to obtain tractable analytical formulae with less computational complexity. The optimal energy-saving service threshold that can flexibly adjust to packet arrival rate is determined. In addition, numerical results reveal that: 1) sacrificing the mean waiting time not necessarily facilitates power savings; 2) a higher arrival rate leads to a greater optimal service threshold; and 3) our policy performs better than the current state-of-the-art.
△ Less
Submitted 14 February, 2020; v1 submitted 12 September, 2019;
originally announced September 2019.
-
A Survey on Spatial Modulation in Emerging Wireless Systems: Research Progresses and Applications
Authors:
Miaowen Wen,
Beixiong Zheng,
Kyeong Jin Kim,
Marco Di Renzo,
Theodoros A. Tsiftsis,
Kwang-Cheng Chen,
Naofal Al-Dhahir
Abstract:
Spatial modulation (SM) is an innovative and promising digital modulation technology that strikes an appealing trade-off between spectral efficiency and energy efficiency with a simple design philosophy. SM enjoys plenty of benefits and shows great potential to fulfill the requirements of future wireless communications. The key idea behind SM is to convey additional information typically through t…
▽ More
Spatial modulation (SM) is an innovative and promising digital modulation technology that strikes an appealing trade-off between spectral efficiency and energy efficiency with a simple design philosophy. SM enjoys plenty of benefits and shows great potential to fulfill the requirements of future wireless communications. The key idea behind SM is to convey additional information typically through the ON/OFF states of transmit antennas and simultaneously save the implementation cost by reducing the number of radio frequency chains. As a result, the SM concept can have widespread effects on diverse applications and can be applied in other signal domains such as frequency/time/code/angle domain or even across multiple domains. This survey provides a comprehensive overview of the latest results and progresses in SM research. Specifically, the fundamental principles, variants of system design, and enhancements of SM are described in detail. Furthermore, the integration of the SM family with other promising techniques, applications to emerging communication systems, and extensions to new signal domains are also extensively studied.
△ Less
Submitted 3 July, 2019;
originally announced July 2019.
-
Zero Forcing Detection For Short Packet Transmission Under Channel Estimation Errors
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Hui-Ming Wang
Abstract:
A multiuser multiple-input multiple-output wireless communication system is analytically studied under the short-packet transmission regime. The practical scenario of channel estimation errors is adopted when the signals undergo Rayleigh channel fading conditions. Unlike most previous works, the channel estimation error term is treated as a signal rather than interference or noise, which may furth…
▽ More
A multiuser multiple-input multiple-output wireless communication system is analytically studied under the short-packet transmission regime. The practical scenario of channel estimation errors is adopted when the signals undergo Rayleigh channel fading conditions. Unlike most previous works, the channel estimation error term is treated as a signal rather than interference or noise, which may further enhance the overall system performance. The spatial multiplexing mode of transmit operation is considered, while the zero-forcing detection is applied at the receiver. New and exact closed-form expressions for the outage probability and total system goodput are derived. Capitalizing on the analytical results, some new engineering insights are also presented; such as the impact of channel estimation errors with respect to the number of antennas, transmit power, and/or coding rate.
△ Less
Submitted 16 March, 2019;
originally announced March 2019.
-
Secure Users Oriented Downlink MISO NOMA
Authors:
Hui-Ming Wang,
Xu Zhang,
Qian Yang,
Theodoros A. Tsiftsis
Abstract:
This paper proposes a secure users oriented multiple-input and single-output (MISO) non-orthogonal multiple access (NOMA) downlink transmission scheme, where multiple legitimate users are categorized as quality of service (QoS)-required users (QU) and the security-required users (SU) overheard by a passive eavesdropper. The basic idea is to exploit zero-forcing beamforming (ZFBF) to cancel interfe…
▽ More
This paper proposes a secure users oriented multiple-input and single-output (MISO) non-orthogonal multiple access (NOMA) downlink transmission scheme, where multiple legitimate users are categorized as quality of service (QoS)-required users (QU) and the security-required users (SU) overheard by a passive eavesdropper. The basic idea is to exploit zero-forcing beamforming (ZFBF) to cancel interference among SUs, and then several QUs are efficiently scheduled based on the obtained beamforming vectors to divide the legitimate users into several user clusters, in such a way that the QUs could share the concurrent transmissions and help to interfere with the eavesdropper to enhance SU secrecy. The goal is to maximize the achievable minimum secrecy rate (MSR) and sum secrecy rate (SSR) of all SUs, respectively, subject to the secrecy outage probability (SOP) constraint of each SU and the QoS constraint of each QU. To provide a comprehensive investigation we consider two extreme cases that the eavesdropper has perfect multiuser detection ability (lower bound of secrecy) or does not have multiuser detection ability (upper bound of secrecy). In the lower bound case, the Dinkelbach algorithm and the monotonic optimization (MO)-based outer polyblock approximation algorithm are proposed to solve the max-min secrecy rate (MMSR) and max-sum secrecy rate (MSSR) problems, respectively. As for the upper bound case, an alternative optimization (AO)-based algorithm is proposed to solve the two non-convex problems. Finally, the superiority of the proposed cases to the conventional orthogonal multiple access (OMA) one is verified by numerical results.
△ Less
Submitted 1 March, 2019;
originally announced March 2019.
-
Base Station Cooperation in Millimeter Wave Cellular Networks: Performance Enhancement of Cell-Edge Users
Authors:
Hui-Ming Wang,
Ke-Wen Huang,
Theodoros A. Tsiftsis
Abstract:
Millimeter wave (mmWave) signals are much more sensitive to blockage, which results in a significant increase of the outage probability, especially for the users at the edge of the cells. In this paper, we exploit the technique of base station (BS) cooperation to improve the performance of the cell-edge users in the downlink transmission of mmWave cellular networks. We design two cooperative schem…
▽ More
Millimeter wave (mmWave) signals are much more sensitive to blockage, which results in a significant increase of the outage probability, especially for the users at the edge of the cells. In this paper, we exploit the technique of base station (BS) cooperation to improve the performance of the cell-edge users in the downlink transmission of mmWave cellular networks. We design two cooperative schemes, which are referred to as fixed-number BS cooperation (FNC) scheme and fixed-region BS cooperation (FRC) scheme, respectively. In FNC scheme, the cooperative BSs consist of the M nearest BSs around the served cell-edge users, and in FRC scheme, the cooperative BSs include all the BSs located within a given region. We derive the expressions for the average rate and outage probability of a typical cell-edge user located at the origin based on the stochastic geometry framework. To reduce the computational complexity of our analytical results for the outage probability, we further propose a Gamma approximation based method to provide approximations with satisfying accuracy. Our analytical results incorporate the critical characteristics of mmWave channels, i.e., the blockage effects, the different path loss of LOS and NLOS links and the highly directional antenna arrays. Simulation results show that the performance of the cell-edge users is greatly improved when mmWave networks are combined with the technique of BS cooperation.
△ Less
Submitted 13 June, 2018;
originally announced June 2018.
-
Cooperative Secure Transmission by Exploiting Social Ties in Random Networks
Authors:
H. -M. Wang,
Y. Xu,
K. -W. Huang,
Z. Han,
T. A. Tsiftsis
Abstract:
Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications, such as resource sharing, cooperative communication and so on. In this paper, we propose a hybrid cooperative beamforming and jamming scheme to sec…
▽ More
Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications, such as resource sharing, cooperative communication and so on. In this paper, we propose a hybrid cooperative beamforming and jamming scheme to secure communication based on the social trust degree under a stochastic geometry framework. The friendly nodes are categorized into relays and jammers according to their locations and social trust degrees with the source node. We aim to analyze the involved connection outage probability (COP) and secrecy outage probability (SOP) of the performance in the networks. To achieve this target, we propose a double Gamma ratio (DGR) approach through Gamma approximation. Based on this, the COP and SOP are tractably obtained in closed-form. We further consider the SOP in the presence of Poisson Point Process (PPP) distributed eavesdroppers and derive an upper bound. The simulation results verify our theoretical findings, and validate that the social trust degree has dramatic influences on the security performance in the networks.
△ Less
Submitted 22 March, 2018;
originally announced March 2018.
-
A New Interweave Cognitive Radio Scheme for Out-band Energy Harvesting Systems
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis
Abstract:
In this paper, a new interweave cognitive radio (CR) transmission scheme is analytically presented for energy harvesting (EH)-enabled transmitting nodes. EH is performed via a dedicated power beacon (PB) base station through wireless power transfer, which harvests energy to both primary and secondary systems. The out-band mode-of-operation between PB and the two heterogeneous systems is considered…
▽ More
In this paper, a new interweave cognitive radio (CR) transmission scheme is analytically presented for energy harvesting (EH)-enabled transmitting nodes. EH is performed via a dedicated power beacon (PB) base station through wireless power transfer, which harvests energy to both primary and secondary systems. The out-band mode-of-operation between PB and the two heterogeneous systems is considered (i.e., data communication and EH are realized at different frequency bands). The performance of the new interweave CR system is studied under independent and not necessarily identically distributed $κ-μ$ shadowed faded channels. Representative numerical and simulation results corroborate the effectiveness of the proposed scheme and presented analysis, while some useful engineering insights are provided.
△ Less
Submitted 31 January, 2018;
originally announced January 2018.
-
MIMO Underlay Cognitive Radio: Optimized Power Allocation, Effective Number of Transmit Antennas and Harvest-Transmit Tradeoff
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
George C. Alexandropoulos
Abstract:
In this paper, the performance of an underlay multiple-input multiple-output (MIMO) cognitive radio system is analytically studied. In particular, the secondary transmitter operates in a spatial multiplexing transmission mode, while a zero-forcing detector is employed at the secondary receiver. Additionally, the secondary system is interfered by single-antenna primary users (PUs). To enhance the p…
▽ More
In this paper, the performance of an underlay multiple-input multiple-output (MIMO) cognitive radio system is analytically studied. In particular, the secondary transmitter operates in a spatial multiplexing transmission mode, while a zero-forcing detector is employed at the secondary receiver. Additionally, the secondary system is interfered by single-antenna primary users (PUs). To enhance the performance of secondary transmission, optimal power allocation is performed at the secondary transmitter with a constraint on the maximum allowable outage threshold specified by the PUs. Further, the effective number of secondary transmit antennas is specified based on the optimal power allocation for an arbitrary MIMO scale. Also, a lower bound on the ergodic channel capacity of the secondary system is derived in a closed-form expression. Afterwards, the scenario of a massive MIMO secondary system is thoroughly analyzed and evaluated, where the harvesting-enabled secondary transmission is studied. The optimal power allocation, the effective number of secondary transmit antennas, the efficient tradeoff between transmit-and-harvest secondary antennas, and the average channel capacity of the secondary system are analytically presented. Finally, extensive numerical and simulation results corroborate the effectiveness of our analysis, while some useful engineering insights are provided.
△ Less
Submitted 22 January, 2018;
originally announced January 2018.
-
Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack
Authors:
Hui-Ming Wang,
Ke-Wen Huang,
Theodoros A. Tsiftsis
Abstract:
Transmitter-side channel state information (CSI) of the legitimate destination plays a critical role in physical layer secure transmissions. However, channel training procedure is vulnerable to the pilot spoofing attack (PSA) or pilot jamming attack (PJA) by an active eavesdropper (Eve), which inevitably results in severe private information leakage. In this paper, we propose a random channel trai…
▽ More
Transmitter-side channel state information (CSI) of the legitimate destination plays a critical role in physical layer secure transmissions. However, channel training procedure is vulnerable to the pilot spoofing attack (PSA) or pilot jamming attack (PJA) by an active eavesdropper (Eve), which inevitably results in severe private information leakage. In this paper, we propose a random channel training (RCT) based secure downlink transmission framework for a time division duplex (TDD) multiple antennas base station (BS). In the proposed RCT scheme, multiple orthogonal pilot sequences (PSs) are simultaneously allocated to the legitimate user (LU), and the LU randomly selects one PS from the assigned PS set to transmit. Under either the PSA or PJA, we provide the detailed steps for the BS to identify the PS transmitted by the LU, and to simultaneously estimate channels of the LU and Eve. The probability that the BS makes an incorrect decision on the PS of the LU is analytically investigated. Finally, closed-form secure beamforming (SB) vectors are designed and optimized to enhance the secrecy rates during the downlink transmissions. Numerical results show that the secrecy performance is greatly improved compared to the conventional channel training scheme wherein only one PS is assigned to the LU.
△ Less
Submitted 12 January, 2018;
originally announced January 2018.
-
On the Capacity of Wireless Powered Cognitive Relay Network with Interference Alignment
Authors:
Sultangali Arzykulov,
Galymzhan Nauryzbayev,
Theodoros A. Tsiftsis,
Mohamed Abdallah
Abstract:
In this paper, a two-hop decode-and-forward cognitive radio system with deployed interference alignment is considered. The relay node is energy-constrained and scavenges the energy from the interference signals. In the literature, there are two main energy harvesting protocols, namely, time-switching relaying and power-splitting relaying. We first demonstrate how to design the beamforming matrices…
▽ More
In this paper, a two-hop decode-and-forward cognitive radio system with deployed interference alignment is considered. The relay node is energy-constrained and scavenges the energy from the interference signals. In the literature, there are two main energy harvesting protocols, namely, time-switching relaying and power-splitting relaying. We first demonstrate how to design the beamforming matrices for the considered primary and secondary networks. Then, the system capacity under perfect and imperfect channel state information scenarios, considering different portions of time-switching and power-splitting protocols, is estimated.
△ Less
Submitted 13 December, 2017;
originally announced December 2017.
-
Error Performance of Wireless Powered Cognitive Relay Networks with Interference Alignment
Authors:
Sultangali Arzykulov,
Galymzhan Nauryzbayev,
Theodoros A. Tsiftsis,
Mohamed Abdallah
Abstract:
This paper studies a two-hop decode-and-forward underlay cognitive radio system with interference alignment technique. An energy-constrained relay node harvests the energy from the interference signals through a power-splitting (PS) relaying protocol. Firstly, the beamforming matrices design for the primary and secondary networks is demonstrated. Then, a bit error rate (BER) performance of the sys…
▽ More
This paper studies a two-hop decode-and-forward underlay cognitive radio system with interference alignment technique. An energy-constrained relay node harvests the energy from the interference signals through a power-splitting (PS) relaying protocol. Firstly, the beamforming matrices design for the primary and secondary networks is demonstrated. Then, a bit error rate (BER) performance of the system under perfect and imperfect channel state information (CSI) scenarios for PS protocol is calculated. Finally, the impact of the CSI mismatch parameters on the BER performance is simulated.
△ Less
Submitted 13 December, 2017;
originally announced December 2017.
-
An Amateur Drone Surveillance System Based on Cognitive Internet of Things
Authors:
Guoru Ding,
Qihui Wu,
Linyuan Zhang,
Yun Lin,
Theodoros A. Tsiftsis,
Yu-Dong Yao
Abstract:
Drones, also known as mini-unmanned aerial vehicles, have attracted increasing attention due to their boundless applications in communications, photography, agriculture, surveillance and numerous public services. However, the deployment of amateur drones poses various safety, security and privacy threats. To cope with these challenges, amateur drone surveillance becomes a very important but largel…
▽ More
Drones, also known as mini-unmanned aerial vehicles, have attracted increasing attention due to their boundless applications in communications, photography, agriculture, surveillance and numerous public services. However, the deployment of amateur drones poses various safety, security and privacy threats. To cope with these challenges, amateur drone surveillance becomes a very important but largely unexplored topic. In this article, we firstly present a brief survey to show the state-of-the-art studies on amateur drone surveillance. Then, we propose a vision, named Dragnet, by tailoring the recent emerging cognitive internet of things framework for amateur drone surveillance. Next, we discuss the key enabling techniques for Dragnet in details, accompanied with the technical challenges and open issues. Furthermore, we provide an exemplary case study on the detection and classification of authorized and unauthorized amateur drones, where, for example, an important event is being held and only authorized drones are allowed to fly over.
△ Less
Submitted 29 November, 2017;
originally announced November 2017.
-
Low Complexity Resource Allocation for Massive Carrier Aggregation
Authors:
Stelios Stefanatos,
Fotis Foukalas,
Theodoros A. Tsiftsis
Abstract:
Optimal resource allocation (RA) in massive carrier aggregation scenarios is a challenging combinatorial optimization problem whose dimension is proportional to the number of users, component carriers (CCs), and OFDMA resource blocks per CC. Towards scalable, near-optimal RA in massive CA settings, an iterative RA algorithm is proposed for joint assignment of CCs and OFDMA resource blocks to users…
▽ More
Optimal resource allocation (RA) in massive carrier aggregation scenarios is a challenging combinatorial optimization problem whose dimension is proportional to the number of users, component carriers (CCs), and OFDMA resource blocks per CC. Towards scalable, near-optimal RA in massive CA settings, an iterative RA algorithm is proposed for joint assignment of CCs and OFDMA resource blocks to users. The algorithm is based on the principle of successive geometric programming approximations and has a complexity that scales only linearly with the problem dimension. Although its derivation is based on a relaxed formulation of the RA problem, the algorithm is shown to converge to integer-valued RA variables with probability 1 under mild assumptions on the distribution of user utilities. Simulations demonstrate improved performance of the proposed algorithm compared to commonly considered heuristic RA procedures of comparable complexity.
△ Less
Submitted 16 June, 2017; v1 submitted 11 June, 2017;
originally announced June 2017.
-
All Cognitive MIMO: A New Multiuser Detection Approach with Different Priorities
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Dimitrios D. Vergados,
Angelos Michalas
Abstract:
A new detection scheme for multiuser multiple-input multiple-output (MIMO) systems is analytically presented. In particular, the transmitting users are being categorized in two distinct priority service groups, while they communicate directly with a multi-antenna receiver. The linear zero-forcing scheme is applied in two consecutive detection stages upon the signal reception. In the first stage, t…
▽ More
A new detection scheme for multiuser multiple-input multiple-output (MIMO) systems is analytically presented. In particular, the transmitting users are being categorized in two distinct priority service groups, while they communicate directly with a multi-antenna receiver. The linear zero-forcing scheme is applied in two consecutive detection stages upon the signal reception. In the first stage, the signals of one service group are detected, followed by the second stage including the corresponding detection of the remaining signals. An appropriate switching scheme based on specific transmission quality requirements is utilized prior to the detection so as to allocate the signals of a given service group to the suitable detection stage. The objective is the enhancement of the reception quality for both service groups. The proposed approach can be implemented directly in cognitive radio communication assigning the secondary users to the appropriate service group. The exact outage probability of the considered system is derived in closed form. The special case of massive MIMO is further studied yielding some useful engineering outcomes; the effective channel coherence time and a certain optimality condition defining both the transmission quality and effective number of independent transmissions.
△ Less
Submitted 31 March, 2017;
originally announced March 2017.
-
EGC Reception for FSO Systems Under Mixture-Gamma Fading Channels and Pointing Errors
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis
Abstract:
The performance of equal gain combining reception at free-space optical communication systems is analytically studied and evaluated. We consider the case when the total received signal undergoes independent and not necessarily identically distributed channel fading, modeled by the versatile mixture-Gamma distribution. Also, the misalignment-induced fading due to the presence of pointing errors is…
▽ More
The performance of equal gain combining reception at free-space optical communication systems is analytically studied and evaluated. We consider the case when the total received signal undergoes independent and not necessarily identically distributed channel fading, modeled by the versatile mixture-Gamma distribution. Also, the misalignment-induced fading due to the presence of pointing errors is jointly considered in the enclosed analysis. New closed-form expressions in terms of finite sum series of the Meijer's $G$-function are derived regarding some key performance metrics of the considered system; namely, the scintillation index, outage probability, and average bit-error rate. Based on these results, some useful outcomes are manifested, such as the system diversity order, the crucial role of diversity branches, and the impact of composite channel fading/pointing error effect onto the system performance.
△ Less
Submitted 14 February, 2017;
originally announced February 2017.
-
Optimal Power Allocation and Active Interference Mitigation for Spatial Multiplexed MIMO Cognitive Systems
Authors:
Nikolaos I. Miridakis,
Minghua Xia,
Theodoros A. Tsiftsis
Abstract:
In this paper, the performance of an underlay multiple-input multiple-output (MIMO) cognitive radio system is analytically studied. In particular, the secondary transmitter operates in a spatial multiplexing transmission mode, while a zero-forcing (ZF) detector is employed at the secondary receiver. Additionally, the secondary system is interfered by multiple randomly distributed single-antenna pr…
▽ More
In this paper, the performance of an underlay multiple-input multiple-output (MIMO) cognitive radio system is analytically studied. In particular, the secondary transmitter operates in a spatial multiplexing transmission mode, while a zero-forcing (ZF) detector is employed at the secondary receiver. Additionally, the secondary system is interfered by multiple randomly distributed single-antenna primary users (PUs). To enhance the performance of secondary transmission, optimal power allocation is performed at the secondary transmitter with a constraint on the interference temperature (IT) specified by the PUs. The outage probability of the secondary receiver is explicitly derived in an exact closed-form expression. Also, some special cases of practical interest, including co-located PUs and massive MIMO, are discussed. Further, to mitigate instantaneous excessive interference onto PUs caused by the time-average IT, an iterative antenna reduction algorithm is developed for the secondary transmitter and, accordingly, the average number of transmit antennas is analytically computed. Extensive numerical and simulation results corroborate the effectiveness of our analysis.
△ Less
Submitted 4 December, 2017; v1 submitted 25 October, 2016;
originally announced October 2016.
-
Distributed Spatial Multiplexing Systems with Hardware Impairments and Imperfect Channel Estimation under Rank-$1$ Rician Fading Channels
Authors:
Nikolaos I. Miridakis,
Theodoros A. Tsiftsis,
Corbett Rowell
Abstract:
The performance of a multiuser communication system with single-antenna transmitting terminals and a multi-antenna base-station receiver is analytically investigated. The system operates under independent and non-identically distributed rank-$1$ Rician fading channels with imperfect channel estimation and residual hardware impairments (compensation algorithms are assumed, which mitigate the main i…
▽ More
The performance of a multiuser communication system with single-antenna transmitting terminals and a multi-antenna base-station receiver is analytically investigated. The system operates under independent and non-identically distributed rank-$1$ Rician fading channels with imperfect channel estimation and residual hardware impairments (compensation algorithms are assumed, which mitigate the main impairments) at the transceiver. The spatial multiplexing mode of operation is considered where all the users are simultaneously transmitting their streams to the receiver. Zero-forcing is applied along with successive interference cancellation (SIC) as a means for efficient detection of the received streams. New analytical closed-form expressions are derived for some important performance metrics, namely, the outage probability and ergodic capacity of the entire system. Both the analytical expressions and simulation results show the impact of imperfect channel estimation and hardware impairments to the overall system performance in the usage scenarios of massive MIMO and mmWave communication systems.
△ Less
Submitted 25 October, 2016;
originally announced October 2016.