-
Designing Anti-Jamming Receivers for NR-DCSK Systems Utilizing ICA, WPD, and VMD Methods
Authors:
Binh Van Nguyen,
Minh Tuan Nguyen,
Hyoyoung Jung,
Kiseon Kim
Abstract:
In this work, we consider an advanced noise reduction differential chaotic shift keying (NR-DCSK) system in which a single antenna source communicates with a single antenna destination under the attack of a single antenna jammer. We devote our efforts to design a novel anti-jamming (AJ) receiver for the considered system. Particularly, we propose a variational mode decomposition-independent compon…
▽ More
In this work, we consider an advanced noise reduction differential chaotic shift keying (NR-DCSK) system in which a single antenna source communicates with a single antenna destination under the attack of a single antenna jammer. We devote our efforts to design a novel anti-jamming (AJ) receiver for the considered system. Particularly, we propose a variational mode decomposition-independent component analysis-wavelet packet decomposition-based (VMD-ICA-WPD-based) structure, in which the VMD method is firstly exploited to generate multiple signals from the single received one. Secondly, the ICA method is applied to coarsely separate chaotic and jamming signals. After that, the WPD method is used to finely estimate and mitigate jamming signals that exist on all outputs of the ICA method. Finally, an inverse ICA procedure is carried out, followed by a summation, and the outcome is passed through the conventional correlation-based receiver for recovering the transmitted information. Simulation results show that the proposed receiver provides significant system performance enhancement compared to that given by the conventional correlation-based receiver with WPD, i.e. 8 dB gain at BER =0.03 and Eb/N0 = 20 dB.
△ Less
Submitted 4 October, 2018;
originally announced October 2018.
-
Analysis and Optimization for Weighted Sum Rate in Energy Harvesting Cooperative NOMA Systems
Authors:
Binh Van Nguyen,
Quang-Doanh Vu,
Kiseon Kim
Abstract:
We consider a cooperative non-orthogonal multiple access system with radio frequency energy harvesting, in which a user with good channel harvests energy from its received signal and serves as a decode-and-forward relay for enhancing the performance of a user with poor channel. We here aim at maximizing the weighted sum rate of the system by optimizing the power allocation coefficient used at the…
▽ More
We consider a cooperative non-orthogonal multiple access system with radio frequency energy harvesting, in which a user with good channel harvests energy from its received signal and serves as a decode-and-forward relay for enhancing the performance of a user with poor channel. We here aim at maximizing the weighted sum rate of the system by optimizing the power allocation coefficient used at the source and the power splitting coefficient used at the user with good channel. By exploiting the specific structure of the considered problem, we propose a low-complexity one-dimensional search algorithm which can provide optimal solution to the problem. As a benchmark comparison, we derive analytic expressions and simple high signal-to-noise ratio (SNR) approximations of the ergodic rates achieved at two users and their weighted sum with fixed values of the power allocation and the power splitting coefficients, from which the scaling of the weighted sum in the high SNR region is revealed. Finally, we provided numerical results to demonstrate the validity of the optimized scheme. Index Terms-Cooperative NOMA, RF-energy harvesting, weighted sum rate analysis and optimization.
△ Less
Submitted 6 June, 2018;
originally announced June 2018.
-
Performance Analysis of a Cognitive Radio Network with an Energy Harvesting Secondary Transmitter under Nakagami-m Fading
Authors:
Binh Van Nguyen,
Hyoyoung Jung,
Dongsoo Har,
Kiseon Kim
Abstract:
In this paper, we consider an overlay cognitive radio network, in which a secondary transmitter (ST) is willing to relay the information of a primary transmitter toward a primary receiver. In return, ST can access the licensed band to send its own information superimposed with the primary signal to a secondary receiver. The power-limited ST uses a power splitting protocol to harvest energy from it…
▽ More
In this paper, we consider an overlay cognitive radio network, in which a secondary transmitter (ST) is willing to relay the information of a primary transmitter toward a primary receiver. In return, ST can access the licensed band to send its own information superimposed with the primary signal to a secondary receiver. The power-limited ST uses a power splitting protocol to harvest energy from its received signal to increase its transmit power. We analyze the performance of the primary and the secondary systems under independent Nakagami-m fading by deriving their corresponding outage probabilities in integral-based expressions. In addition, by considering the high signal-to-noise ratio, we obtain very tight closed-form approximations of the outage probabilities. Thereafter, by further analyzing the approximations, we reveal novel insights on the diversity orders and coding gains of the two systems. Our analytical results are validated through extensive Monte-Carlo simulations.
△ Less
Submitted 26 November, 2017;
originally announced November 2017.
-
Physical Layer Security Schemes for Full-Duplex Cooperative Systems: State of the Art and Beyond
Authors:
Binh Van Nguyen,
Hyoyoung Jung,
Kiseon Kim
Abstract:
Due to the broadcast nature of wireless medium, wireless communication is highly vulnerable to eavesdropping attack. Traditionally, secure wireless data transmission has relied on cryptographic techniques at the network layer which incur high computational power and complexity. As an alternative, physical layer security (PLS) is emerging as a promising paradigm to protect wireless systems by explo…
▽ More
Due to the broadcast nature of wireless medium, wireless communication is highly vulnerable to eavesdropping attack. Traditionally, secure wireless data transmission has relied on cryptographic techniques at the network layer which incur high computational power and complexity. As an alternative, physical layer security (PLS) is emerging as a promising paradigm to protect wireless systems by exploiting the physical characteristics of the wireless channels. Among various PLS approaches, the one based on cooperative communication is favorable and has got a lot of interest from the research community. Although PLS schemes with half-duplex relays have been extensively discovered, the issue of PLS in cooperative systems with full-duplex (FD) relays is far from being comprehensively understood. In this paper, we first present the state of the art on PLS approaches proposed for FD cooperative systems. We then provide a case study in which a source-based jamming scheme is proposed to enhance the secrecy performance of a cooperative system with an untrusted FD relay. Finally, we outline several interesting yet challenging future research problems in this topic.
△ Less
Submitted 15 November, 2017;
originally announced November 2017.
-
On the Anti-Jamming Performance of the NR-DCSK System
Authors:
Binh Van Nguyen,
Hyoyoung Jung,
Kiseon Kim
Abstract:
This paper investigates the anti-jamming performance of the NR-DCSK system. We consider several practical jamming environments including broad-band jamming (BBJ), partial-time jamming (PTJ), tone jamming (TJ) consisting of both single-tone and multi-tone, and sweep jamming (SWJ). We first analytically derived the bit error rates of the considered system under the BBJ and the PTJ environments in cl…
▽ More
This paper investigates the anti-jamming performance of the NR-DCSK system. We consider several practical jamming environments including broad-band jamming (BBJ), partial-time jamming (PTJ), tone jamming (TJ) consisting of both single-tone and multi-tone, and sweep jamming (SWJ). We first analytically derived the bit error rates of the considered system under the BBJ and the PTJ environments in closed-form expressions. Our derived results show that the system performances under these two jamming environments are enhanced as $P$ increases, where $P$ is the parameter of the NR-DCSK modulation scheme denoting the number of times a chaotic sample is repeated. In addition, our results demonstrate that for the PTJ, the optimal value of the jamming factor is close to zero when the jamming power is small, however, it increases and approaches one as the jamming power enlarges. We then investigate the performance of the considered system under the TJ and the SWJ environments via Monte-Carlo simulations. Our simulations show that single-tone jamming causes a more significant performance degradation than that provided by multi-tone jamming counterparts. Moreover, we point out that the system performance is significantly degraded when the starting frequency of the sweep jammer is close to the carrier frequency of the transmitted chaotic signals, the sweep bandwidth is small, and the sweep time is half of the transmitted bit duration.
△ Less
Submitted 15 November, 2017;
originally announced November 2017.