![]() ; ; et al in IEEE Internet of Things Journal (2022), 9(15), 13298-13314 Malicious jamming attacks have been regarded asa serious threat to Internet of Things (IoT) networks, which cansignificantly degrade the quality of service (QoS) of users. Thispaper utilizes an ... [more ▼] Malicious jamming attacks have been regarded asa serious threat to Internet of Things (IoT) networks, which cansignificantly degrade the quality of service (QoS) of users. Thispaper utilizes an intelligent reflecting surface (IRS) to enhanceanti-jamming performance due to its capability in reconfiguringthe wireless propagation environment via dynamicly adjustingeach IRS reflecting elements. To enhance the communicationperformance against jamming attacks, a robust beamformingoptimization problem is formulated in a multiuser IRS-assistedanti-jamming communications scenario with or without imperfectjammer’s channel state information (CSI). In addition, we furtherconsider the fact that the jammer’s transmit beamforming cannot be known at BS. Specifically, with no knowledge of jammerstransmit beamforming, the total transmit power minimizationproblems are formulated subject to the outage probability re-quirements of legitimate users with the jammer’s statistical CSI,and signal-to-interference-plus-noise ratio (SINR) requirementsof legitimate users without the jammer’s CSI, respectively.By applying the Decomposition-based large deviation inequal-ity (DBLDI), Bernstein-type inequality (BTI), Cauchy-Schwarzinequality, and penalty non-smooth optimization method, weefficiently solve the initial intractable and non-convex problems.Numerical simulations demonstrate that the proposed anti-jamming approaches achieve superior anti-jamming performanceand lower power-consumption compared to the non-IRS schemeand reveal the impact of key parameters on the achievable systemperformance. [less ▲] Detailed reference viewed: 18 (0 UL)![]() ; ; et al in IEEE Transactions on Aerospace and Electronic Systems (2022) Motivated by the fact that both security and energy efficiency are the fundamental requirements and design targets of future satellite communications, this letter investigates secure energy efficient ... [more ▼] Motivated by the fact that both security and energy efficiency are the fundamental requirements and design targets of future satellite communications, this letter investigates secure energy efficient beamforming in multibeam satellite systems, where the satellite user in each beam is surrounded by an eavesdropper attempting to intercept the confidential information. To simul- taneously improve the transmission security and reduce power consumption, our design objective is to maximize the system secrecy energy efficiency (SEE) under the constraint of total transmit power budget. Different from the existing schemes with high complexity, we propose an alternating optimization scheme to address the SEE problem by decomposing the original nonconvex problem into subproblems. Specifically, we first utilize the signal- to-leakage-plus-noise ratio (SLNR) metric to obtain closed-form normalized beamforming weight vectors, while the successive convex approximation (SCA) method is used to efficiently solve the power allocation subproblem. Then, an iterative algorithm is proposed to obtain the suboptimal solutions. Finally, simulation results are provided to verify the superiority of the proposed scheme compared to the benchmark schemes [less ▲] Detailed reference viewed: 13 (0 UL)![]() ; ; et al in IEEE Transactions on Communications (2022), 70(6), 4189-4210 The integration of aerial platforms to provide ubiq- uitous coverage and connectivity for densely deployed terrestrial networks is expected to be a reality in emerging sixth-generation networks. Energy ... [more ▼] The integration of aerial platforms to provide ubiq- uitous coverage and connectivity for densely deployed terrestrial networks is expected to be a reality in emerging sixth-generation networks. Energy-effificient design and secure transmission are two crucial issues for integrated terrestrial-aerial networks. With this focus, due to the potential of RIS in substantially saving power consumption and boosting the security of private information by enabling a smart radio environment, this paper investigates the energy-efficient hybrid beamforming for multi- layer reconfigurable intelligent surface (RIS)-assisted secure in- tegrated terrestrial-aerial network for defending against simul- taneous jamming and eavesdropping attacks. Specifically, with the available of angular information based imperfect channel state information (CSI), we propose a framework for the joint optimization of user’s received precoder, terrestrial BS’s and HAP’s digital precoder, and multi-layer RIS analog precoder to maximize the system energy efficiency (EE) performance. For the design of received precoder, a heuristic beamforming scheme is proposed to convert the worst-case problem into a min-max one such that a closed-form solution is derived. For the design of digital precoder, we propose an iterative sequential convex approximation approach via capitalizing the auxiliary variables and first-order Taylor series expansion. Finally, a monotonic vertex-update algorithm with penalty convex concave procedure is proposed to obtain analog precoder with low computational complexity. Numerical results show the superiority and effective- ness of proposed optimization framework and architecture [less ▲] Detailed reference viewed: 32 (1 UL)![]() ; ; et al in IEEE Transactions on Vehicular Technology (2022), 71(4), 3760-3775 Satellite and unmanned aerial vehicle (UAV) net-works have been introduced as enhanced approach to providedynamic control, massive connections and global coverage forfuture wireless communication systems ... [more ▼] Satellite and unmanned aerial vehicle (UAV) net-works have been introduced as enhanced approach to providedynamic control, massive connections and global coverage forfuture wireless communication systems. This paper considersa coordinated satellite-UAV communication system, where theUAV performs the environmental reconnaissance task with theassistance of satellite in a hostile jamming environment. To fulfillthis task, the UAV needs to realize autonomous trajectory controland upload the collected data to the satellite. With the aid ofthe uploading data, the satellite builds the environment situationmap integrating the beam quality, jamming status, and trafficdistribution. Accordingly, we propose a closed-loop anti-jammingdynamic trajectory optimization approach, which is divided intothree stages. Firstly, a coarse trajectory planning is made accord-ing to the limited prior information and preset points. Secondly,the flight control between two adjacent preset points is formulatedas a Markov decision process, and reinforcement learning (RL)based automatic flying control algorithms are proposed to explorethe unknown hostile environment and realize autonomous andprecise trajectory control. Thirdly, based on the collected dataduring the UAV’s flight, the satellite utilizes an environmentsituation estimating algorithm to build an environment situationmap, which is used to reselect the preset points for the first stageand provide better initialization for the RL process in the secondstage. Simulation results verify the validity and superiority of theproposed approach. [less ▲] Detailed reference viewed: 16 (0 UL)![]() ; ; et al in IEEE Transactions on Aerospace and Electronic Systems (2022) Reconfigurable intelligent surface (RIS) has been viewed as a promising solution in constructing reconfigurable radio environment of the propagation channel and boosting the received signal power by ... [more ▼] Reconfigurable intelligent surface (RIS) has been viewed as a promising solution in constructing reconfigurable radio environment of the propagation channel and boosting the received signal power by smartly coordinating the passive elements’ phase shifts at the RIS. Inspired by this emerging technique, this article focuses on joint beamforming design and optimization for RIS-aided hybrid satellite-terrestrial relay networks, where the links from the satellite and base station (BS) to multiple users are blocked. Specifically, a refracting RIS cooperates with a BS, where the latter operates as a half-duplex decode-and-forward relay, in order to strengthen the desired satellite signals at the blocked users. Considering the limited onboard power resource, the design objective is to minimize the total transmit power of both the satellite and BS while guaranteeing the rate requirements of users. Since the optimized beamforming weight vectors at the satellite and BS, and phase shifters at the RIS are coupled, leading to a mathematically intractable optimization problem, we propose an alternating optimization scheme by utilizing singular value decomposition and uplink–downlink duality to optimize beamforming weight vectors, and using Taylor expansion and penalty function methods to optimize phase shifters iteratively. Finally, simulation results are provided to verify the superiority of the proposed scheme compared to the benchmark schemes [less ▲] Detailed reference viewed: 22 (0 UL)![]() ; ; et al in IEEE Transactions on Wireless Communications (2022), 21(2), 1272-1287 Due to the emergence of non-terrestrial platformswith extensive coverage, flexible deployment, and reconfigurablecharacteristics, the hybrid satellite-aerial-terrestrial networks(HSATNs) can accommodate a ... [more ▼] Due to the emergence of non-terrestrial platformswith extensive coverage, flexible deployment, and reconfigurablecharacteristics, the hybrid satellite-aerial-terrestrial networks(HSATNs) can accommodate a great variety of wireless accessservices in different applications. To effectively reduce the trans-mission latency and facilitate the frequent update of files withimproved spectrum efficiency, we investigate the performanceof cache-enabled HSATN, where the user retrieves the requiredcontent files from the cache-enabled aerial relay or the satellitewith the non-orthogonal multiple access (NOMA) scheme. If therequired content files of the user are cached in the aerial relay,the cache-enabled relay would serve directly. Otherwise, the userwould retrieve the content file from the satellite system, where thesatellite system seeks opportunities for proactive content pushingto the relay during the user content delivery phase. Specifically,taking into account the uncertainty of the number and locationof aerial relays, along with the channel fading of terrestrialusers, the outage probability and hit probability of the considerednetwork are, respectively, derived based on stochastic geometry.Numerical results unveil the effectiveness of the cache-enabledHSATN with the NOMA scheme and proclaim the influence ofkey factors on the system performance. The realistic, tractable,and expandable framework, as well as associated methodology,provide both useful guidance and a solid foundation for evolvednetworks with advanced configurations in the performance ofcache-enabled HSATN. [less ▲] Detailed reference viewed: 14 (0 UL)![]() ; ; et al in IEEE Transactions on Vehicular Technology (2021), 70(10, Oct. 2021), 11017-11022 Both the jammer and the eavesdropper pose severe threat to wireless communications due to the broadcast nature of wireless channels. In this paper, an intelligent reflecting surface (IRS) assisted secure ... [more ▼] Both the jammer and the eavesdropper pose severe threat to wireless communications due to the broadcast nature of wireless channels. In this paper, an intelligent reflecting surface (IRS) assisted secure communication system is considered, where a base station (BS) wishes to reliably convey information to a user, in the presence of both a jammer and an eavesdropper whose channel state information (CSI) is not perfectly known. Specifically, we aim to maximize the system achievable rate by jointly designing the BS’s transmit beamforming and the IRS’s reflect beamforming with imperfect CSI, while limiting the information leakage to the potential eavesdropper. Due to the non-convexity and intractability of the original problem induced by the CSI uncertainty, we utilize the auxiliary variables and General Sign-Definiteness transformation to convert the original optimization problem into a tractable convex optimization problem, and then obtain the high-quality optimal solution by using the successive convex approximation and penalty convex concave procedure. Numerical simulations demonstrate the superiority of our proposed optimization algorithm compared with existing approaches, and also reveal the impact of key parameters on the achievable system performance. [less ▲] Detailed reference viewed: 34 (2 UL)![]() ; ; et al in IEEE Wireless Communications Letters (2021), 10(11, Nov. 2021), This paper investigates the secure transmission in a multi-user massive MIMO system over Ricean fading channel in the presence of a multi-antenna eavesdropper. In order to reduce the system complexity and ... [more ▼] This paper investigates the secure transmission in a multi-user massive MIMO system over Ricean fading channel in the presence of a multi-antenna eavesdropper. In order to reduce the system complexity and the channel estimation overhead, a low-complexity beamforming (BF) scheme using only the specular component is presented. Moreover, the generation of artificial noise (AN) is employed at the base station (BS) for additional security enhancement. Specifically, a tractable closedform lower bound for the achievable ergodic secrecy rate is derived. Furthermore, the optimal power allocation factor is obtained based on the asymptotic analysis to maximize the achievable ergodic secrecy rate. The analytical results reveal that the ergodic secrecy rate improves with the increase of Ricean K- factor and converges to a specific constant when increasing the number of antennas. The performance of the proposed scheme is evaluated through comprehensive simulations. [less ▲] Detailed reference viewed: 26 (1 UL)![]() ; ; et al in IEEE Transactions on Vehicular Technology (2021), 70(9, Sept. 2021), 8937-8949 This paper considers the secure transmission in a cell-free massive MIMO system with imperfect radio frequency (RF) chains and low-resolution analog-to-digital converters (ADCs) and digital-to-analog ... [more ▼] This paper considers the secure transmission in a cell-free massive MIMO system with imperfect radio frequency (RF) chains and low-resolution analog-to-digital converters (ADCs) and digital-to-analog converters (DACs) at both access points (APs) and legitimate users, where an active eavesdropper attempts to wiretap the confidential data. The Gaussian RF impairment model (GRFIM) and additive quantization noise model (AQNM) are used to evaluate the impacts of the RF impairments and low resolution ADCs/DACs, respectively. The analytical results of the linear minimum mean square error (MMSE) channel estimation show that there is nonzero floor on the estimation error with respect to the RF impairments, ADC/DAC precision and the pilot power of the eavesdropper which is different from the conventional case with perfect transceiver. Then, a tractable closed-form expression for the ergodic secrecy rate is obtained with respect to key system parameters, such as the antenna number per AP, the AP number, user number, quality factors of the ADC/DAC and the RF chain, pilot signal power of the eavesdropper, etc. Moreover, a compensation algorithm between the imperfect RF components and the inexpensive coarse ADCs/DACs is also presented. Finally, numerical results are provided to illustrate the efficiency of the achieved expressions and the devised algorithm, and show the effects of RF impairments and low resolution ADC/DAC on the secrecy performance. [less ▲] Detailed reference viewed: 21 (1 UL)![]() ; ; et al in IEEE Systems Journal (2021), 15(2), 2382-2385 This article investigates the secure energy efficiency (EE) optimization problem in a cognitive satellite-terrestrial network with a capable eavesdropper. The objective is to maximize the secure EE for ... [more ▼] This article investigates the secure energy efficiency (EE) optimization problem in a cognitive satellite-terrestrial network with a capable eavesdropper. The objective is to maximize the secure EE for the primary satellite network while satisfying the allowable signal-to-interference-plus-noise ratio requirements of the secondary and primary users along within the transmit power limitation of both satellite and the terrestrial base station. Owing to the nonconvexity and intractability of the original optimization problem, a beamforming scheme and associated transformation algorithms are proposed by jointly applying the Taylor approximation, fraction programming, and alternating search to cope with the implementation difficulty. The key is to convert the original optimization problem into a simple convex framework and obtain the optimal solution step by step. Finally, numerical simulations are given to verify the feasibility and practicability of the proposed optimization algorithms. [less ▲] Detailed reference viewed: 71 (7 UL)![]() ; ; et al in IEEE Transactions on Vehicular Technology (2021), 70 Integrated satellite terrestrial networks and non-orthogonal multiple access (NOMA) have been confirmed to be promising and effective approaches to achieve substantial performance gains for future ... [more ▼] Integrated satellite terrestrial networks and non-orthogonal multiple access (NOMA) have been confirmed to be promising and effective approaches to achieve substantial performance gains for future wireless paradigms. This paper studies the effect of hardware impairments (HIs) on the secrecy performance of NOMA-based integrated satellite multiple-terrestrial relay networks (ISMTRNs). Particularly, we consider two important wiretapping cases: Case I, colluding case: all eavesdroppers cooperatively overhear the information; and Case II, non-colluding case: one eavesdropper with the best wiretapping quality is chosen to overhear the main channel information. Specially, the closed-form expressions for the secrecy outage probability (SOP) of the considered NOMA-based ISMTRNs in the presence of the above two eavesdropping cases and partial relay selection scheme are obtained. To obtain further insights in high signal-to-noise ratios (SNRs) regime, the asymptotic analysis of SOP with two considered cases are also derived, which give efficient means to evaluate the benefit of NOMA scheme and the impacts of HIs on the SOP. Moreover, we obtain Monte Carlo (MC) simulations for the secrecy energy efficiency (SEE). [less ▲] Detailed reference viewed: 50 (4 UL)![]() ; ; et al in IEEE Internet of Things Journal (2021), 8(8), 7009-7023 In this paper, we investigate the multiple-channel cooperative spectrum sharing in hybrid satellite-terrestrial internet of things (IoT) networks with auction mechanism, which is designed to reduce the ... [more ▼] In this paper, we investigate the multiple-channel cooperative spectrum sharing in hybrid satellite-terrestrial internet of things (IoT) networks with auction mechanism, which is designed to reduce the operational expenditure of the satellitebased IoT (S-IoT) network while alleviating the spectrum scarcity issues of terrestrial-based IoT (T-IoT) network. The cluster heads of selected T-IoT networks assist the primary satellite users transmission through cooperative relaying techniques in exchange for spectrum access. We propose an auction-based optimization problem to maximize the sum transmission rate of all primary S-IoT receivers with the appropriate secondary network selection and corresponding radio resource allocation profile by the distributed implementation, while meeting the minimum transmission rate of secondary receivers of each T-IoT network. Specifically, the one-shot VCG auction is introduced to obtain the maximum social welfare, where the winner determination problem is transformed into an assignment problem and solved by the Hungarian algorithm. To further reduce the primary satellite network decision complexity, the sequential Vickrey auction is implemented by sequential fashion until all channels are auctioned. Due to incentive compatibility with those two auction mechanisms, the secondary T-IoT cluster yields the true bids of each channel, where both the non-orthogonal multiple access (NOMA) and time division multiple access (TDMA) schemes are implemented in cooperative communication. Finally, simulation results validate the effectiveness and fairness of the proposed auction-based approach as well as the superiority of the NOMA scheme in secondary relays selection. Moreover, the influence of key factors on the performance of the proposed scheme is analyzed in detail. [less ▲] Detailed reference viewed: 26 (0 UL)![]() ; ; et al in IEEE Internet of Things Journal (2020) In this paper, we investigate the multi-channel cooperative spectrum sharing in hybrid satellite-terrestrial internet of things (IoT) networks with the auction mechanism, which is designed to reduce the ... [more ▼] In this paper, we investigate the multi-channel cooperative spectrum sharing in hybrid satellite-terrestrial internet of things (IoT) networks with the auction mechanism, which is designed to reduce the operational expenditure of the satellitebased IoT (S-IoT) network while alleviating the spectrum scarcity issues of terrestrial-based IoT (T-IoT) network. The cluster heads of selected T-IoT networks assist the primary satellite users transmission through cooperative relaying techniques in exchange for spectrum access. We propose an auction-based optimization problem to maximize the sum transmission rate of all primary S-IoT receivers with the appropriate secondary network selection and corresponding radio resource allocation profile by the distributed implementation while meeting the minimum transmission rate of secondary receivers of each TIoT network. Specifically, the one-shot Vickrey-Clarke-Groves (VCG) auction is introduced to obtain the maximum social welfare, where the winner determination problem is transformed into an assignment problem and solved by the Hungarian algorithm. To further reduce the primary satellite network decision complexity, the sequential Vickrey auction is implemented by sequential fashion until all channels are auctioned. Due to incentive compatibility with those two auction mechanisms, the secondary T-IoT cluster yields the true bids of each channel, where both the non-orthogonal multiple access (NOMA) and time division multiple access (TDMA) schemes are implemented in cooperative communication. Finally, simulation results validate the effectiveness and fairness of the proposed auction-based approach as well as the superiority of the NOMA scheme in secondary relays selection. Moreover, the influence of key factors on the performance of the proposed scheme is analyzed in detail. [less ▲] Detailed reference viewed: 47 (5 UL)![]() ; ; et al in IEEE Systems Journal (2020), 14(3), 3343-3350 In this letter, we investigate the ergodic capacity of an uplink satellite network using a power-domain nonorthogonal multiple access (NOMA for simplicity) to serve users simultaneously in the ... [more ▼] In this letter, we investigate the ergodic capacity of an uplink satellite network using a power-domain nonorthogonal multiple access (NOMA for simplicity) to serve users simultaneously in the consideration of random deployment of satellite users. Taking into account the deployed information of served users, we derive expression for the achievable ergodic capacity of the considered networks, where an entire link budget involving propagation loss, channel statistical prosperities, and location information is considered. Moreover, expression for ergodic capacity with OMA scheme is also derived to facilitate the performance comparison. Numerical simulation results are provided to attest the validity of theoretical results and show the vital effect of key parameters, such as the deployed information and link quality on the considered networks. [less ▲] Detailed reference viewed: 41 (5 UL)![]() ; ; et al in IEEE Internet of Things Journal (2020) With the ever increasing requirement of transferring data from/to smart users within a wide area, satellite internet of things (S-IoT) networks has emerged as a promising paradigm to provide cost ... [more ▼] With the ever increasing requirement of transferring data from/to smart users within a wide area, satellite internet of things (S-IoT) networks has emerged as a promising paradigm to provide cost-effective solution for remote and disaster areas. Taking into account the diverse link qualities and delay qualityof- service (QoS) requirements of S-IoT devices, we introduce a power domain non-orthogonal multiple access (NOMA) scheme in the downlink S-IoT networks to enhance resource utilization efficiency and employ the concept of effective capacity to show delay-QoS requirements of S-IoT traffics. Firstly, resource allocation among NOMA users is formulated with the aim of maximizing sum effective capacity of the S-IoT while meeting the minimum capacity constraint of each user. Due to the intractability and non-convexity of the initial optimization problem, especially in the case of large-scale user-pair in NOMA enabled S-IoT. This paper employs a deep reinforcement learning (DRL) algorithm for dynamic resource allocation. Specifically, channel conditions and/or delay-QoS requirements of NOMA users are carefully selected as state according to exact closed-form expressions as well as low-SNR and high-SNR approximations, a deep Q network is first adopted to yet reward and output the optimum power allocation coefficients for all users, and then learn to adjust the allocation policy by updating the weights of neural networks using gained experiences. Simulation results are provided to demonstrate that with a proper discount factor, reward design, and training mechanism, the proposed DRL based power allocation scheme can output optimal/near-optimal action in each time slot, and thus, provide superior performance than that achieved with a fixed power allocation strategy and orthogonal multiple access (OMA) scheme. [less ▲] Detailed reference viewed: 87 (7 UL)![]() Shankar, Bhavani ![]() ![]() in Proceedings of 83rd IEEE VTC (Spring 2016) (2016, May) The demand for wider bandwidths has motivated the need for wireless systems to migrate to higher frequency bands. In line with this trend is an envisaged deployment of Ka-band (or mmWave) cellular ... [more ▼] The demand for wider bandwidths has motivated the need for wireless systems to migrate to higher frequency bands. In line with this trend is an envisaged deployment of Ka-band (or mmWave) cellular infrastructure. Further, to improve the spectral efficiency, developing full-duplex radio transceivers is gaining momentum. In view of this move, the paper proposes the possibility of reusing the satellite feeder uplink band in the full-duplex small cells. The motivation for such a reuse is two-fold :(a) there is virtually no interference from the small cells to the incumbent in-orbit satellite receiver, and (b) directive feeder antennas, with possibly additional isolation and processing causing negligible interference to the small cells. The presented interference analysis clearly supports the proposed coexistence. [less ▲] Detailed reference viewed: 304 (6 UL)![]() Kalantari, Ashkan ![]() ![]() in IEEE Transactions on Wireless Communications (2015) Interference in wireless networks degrades the signal quality at the terminals. However, it can potentially enhance the secrecy rate. This paper investigates the secrecy rate in a two-user interference ... [more ▼] Interference in wireless networks degrades the signal quality at the terminals. However, it can potentially enhance the secrecy rate. This paper investigates the secrecy rate in a two-user interference network where one of the users, namely user 1, requires to establish a confidential connection. User 1 wants to prevent an unintended user of the network to decode its transmission. User 1 has to transmit such that its secrecy rate is maximized while the quality of service at the destination of the other user, user 2, is satisfied, and both user's power limits are taken into account. We consider two scenarios: 1) user 2 changes its power in favor of user 1, an altruistic scenario, 2) user 2 is selfish and only aims to maintain the minimum quality of service at its destination, an egoistic scenario. It is shown that there is a threshold for user 2's transmission power that only below or above which, depending on the channel qualities, user 1 can achieve a positive secrecy rate. Closed-form solutions are obtained in order to perform joint optimal power control. Further, a new metric called secrecy energy efficiency is introduced. We show that in general, the secrecy energy efficiency of user 1 in an interference channel scenario is higher than that of an interference-free channel. [less ▲] Detailed reference viewed: 274 (34 UL)![]() Shankar, Bhavani ![]() ![]() in The 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2015 (2015) With the successful implementation of full-duplex radio prototypes, traditional orthogonal half-duplex communications is deemed to be inefficient in certain terrestrial applications. While full-duplex ... [more ▼] With the successful implementation of full-duplex radio prototypes, traditional orthogonal half-duplex communications is deemed to be inefficient in certain terrestrial applications. While full-duplex techniques are gaining interest in terrestrial communications, thanks to the trend of short-distance and low-power transmissions, their application to satellite communications has drawn little attention. Motivated by this, the paper explores the use of the full-duplex relaying operation on-board the satellite in a DVB-S2 compliant network. Self-interference, whose management is the key component of a full-duplex communication, is the focus of study in this paper. Modelling the effects of self-interference and power amplifier nonlinearities on the quality of the received signal in undertaken. Subsequently, closed-form expressions for the various interference components are derived. The numerical evaluations of derived expressions rely on realistic link budgets and indicate substantial gains in spectral efficiency when self-interference can be well calibrated and measured. This confirms that the satellite full-duplex communications could be a promising solution for the efficient use of satellite spectrum, at least from a technical point of view. [less ▲] Detailed reference viewed: 214 (4 UL)![]() Kalantari, Ashkan ![]() ![]() in IEEE Global Conference on Signal and Information Processing (GlobalSIP) (2014, December 03) Interference usually is an adverse phenomenon in wireless networks. However, the interference can potentially be used to boost the secrecy rate in wireless interference channels. This work studies the ... [more ▼] Interference usually is an adverse phenomenon in wireless networks. However, the interference can potentially be used to boost the secrecy rate in wireless interference channels. This work studies the secrecy rate in a two-user interference network where unintended user may overhear one of the users, namely user 1. User 1 tunes its transmission power in order to maximize its secrecy rate as well as to maintain the quality of service at the other user’s destination, user 2, while both user’s power limits are considered. It is demonstrated that achieving a positive secrecy rate for user 1 only depends on the channel conditions and user 2’s transmission power. Consequently, depending on the channel conditions, the exact threshold for user 2’s transmission power which leads to a positive secrecy rate for user 1 is derived. [less ▲] Detailed reference viewed: 241 (16 UL)![]() ; ; et al in Wireless Communications, IEEE Transactions on (2014), 13(5), 2646-2658 We consider a multiuser multiple-input single-output interference channel where the receivers are characterized by both quality-of-service (QoS) and radio-frequency (RF) energy harvesting (EH) constraints ... [more ▼] We consider a multiuser multiple-input single-output interference channel where the receivers are characterized by both quality-of-service (QoS) and radio-frequency (RF) energy harvesting (EH) constraints. We consider the power splitting RF-EH technique where each receiver divides the received signal into two parts a) for information decoding and b) for battery charging. The minimum required power that supports both the QoS and the RF-EH constraints is formulated as an optimization problem that incorporates the transmitted power and the beamforming design at each transmitter as well as the power splitting ratio at each receiver. We consider both the cases of fixed beamforming and when the beamforming design is incorporated into the optimization problem. For fixed beamforming we study three standard beamforming schemes, the zero-forcing (ZF), the regularized zero-forcing (RZF) and the maximum ratio transmission (MRT); a hybrid scheme, MRT-ZF, comprised of a linear combination of MRT and ZF beamforming is also examined. The optimal solution for ZF beamforming is derived in closed-form, while optimization algorithms based on second-order cone programming are developed for MRT, RZF and MRT-ZF beamforming to solve the problem. In addition, the joint-optimization of beamforming and power allocation is studied using semidefinite programming (SDP) with the aid of rank relaxation. [less ▲] Detailed reference viewed: 191 (1 UL) |
||