Browsing by Subject "Channel state information"
Now showing 1 - 9 of 9
- Results Per Page
- Sort Options
Item Open Access Effects of channel state information uncertainty on the performance of stochastic signaling(IEEE, 2011) Göken, Çağrı; Gezici, Sinan; Arıkan, OrhanIn this paper, stochastic signaling is studied for power-constrained scalar valued binary communications systems in the presence of uncertainties in channel state information (CSI). First, it is shown that, for a given decision rule at the receiver, stochastic signaling based on the available CSI at the transmitter results in a randomization between at most two different signal levels for each symbol. Then, the performance of stochastic signaling and conventional deterministic signaling is compared, and sufficient conditions are derived for improvability and nonimprovability of deterministic signaling via stochastic signaling in the presence of CSI uncertainty. Finally a numerical example is presented to explore the theoretical results. © 2011 IEEE.Item Open Access Exact expression and tight bound on pairwise error probability for performance analysis of turbo codes over Nakagami-m fading channels(IEEE, 2007) Ali, S. A.; Kambo, N. S.; İnce, E. A.This letter presents derivation for an exact and efficient expression on pairwise error probability over fully interleaved Nakagami-m fading channels under ideal channel state information at the decoder. As an outcome, this derivation also leads to a tight upper bound on pairwise error probability which is close to the exact expression. Pairwise error probability plots for different values of Nakagami parameter m along with an already existing numerically computable expression are provided. As an application of pairwise error probability, average union upper bounds for turbo codes having (1, 7/5, 7/5) and (1, 5/7, 5/7) generator polynomials employing transfer function approach are presented to illustrate the usefulness of the new efficient results. © 2007 IEEE.Item Open Access On the capacity of fading channels with amplitude-limited inputs(IEEE, 2016) Elmoslimany, A.; Duman, Tolga M.We address the problem of finding the capacity of fading channels under the assumption of amplitude-limited inputs. Specifically, we show that if the fading coefficients have a finite support and the channel state information is only available at the receiver side, there is a unique input distribution that achieves the channel capacity and this input distribution is discrete with a finite number of mass points.Item Open Access An overview of physical layer security with finite-alphabet signaling(Institute of Electrical and Electronics Engineers Inc., 2019) Aghdam, Sina Rezaei; Nooraiepour, A.; Duman, Tolga M.Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step toward a practical implementation of physical layer security. With this motivation, this paper reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research.Item Open Access Performance analysis of turbo codes over Rician fading channels with impulsive noise(IEEE, 2007) Ali, Syed Amjad; Ince, E.A.The statistical characteristics of impulsive noise differ greatly from those of Gaussian noise. Hence, the performance of conventional decoders, optimized for additive white Gaussian noise (AWGN) channels is not promising in non-Gaussian environments. In order to achieve improved performance in impulsive environments the decoder structure needs to be modified in accordance with the impulsive noise model. This paper provides performance analysis of turbo codes over fully interleaved Rician fading channels with Middleton's additive white Class-A impulsive noise (MAWCAIN). Simulation results for the memoryless Rician fading channels using coherent BPSK signaling for both the cases of ideal channel state information (ICSI) and no channel state information (NCSI) at the decoder are provided. An eight state turbo encoder having (1, 13/15, 13/15) generator polynomial is used throughout the analysis. The novelty of this work lies in the fact that this is an initial attempt to provide a detailed analysis of turbo codes over Rician fading channels with impulsive noise rather than AWGN. ©2007 IEEE.Item Open Access Physical layer security for space shift keying transmission with precoding(Institute of Electrical and Electronics Engineers Inc., 2016) Aghdam, S. R.; Duman, T. M.We investigate the effect of transmitter side channel state information on the achievable secrecy rates of space shift keying. Through derivation of the gradient of the secrecy rate, we formulate an iterative algorithm to maximize the achievable secrecy rates. We also introduce two lower complexity signal design algorithms for different scenarios based on the number of antennas at the eavesdropper. Our results illustrate the effectiveness of the proposed precoding techniques in attaining positive secrecy rates over a wide range of signal to noise ratios. © 2016 IEEE.Item Open Access Search-free precoder selection for 5G new radio using neural networks(IEEE, 2020-12) Akyıldız, Talha; Duman, Tolga M.We propose a search-free precoder selection method with neural networks motivated by the fact that large codebook sizes are adopted in 5G New Radio (5G-NR). The proposed method does not require an explicit codebook search unlike the traditional selection algorithms. Instead, it aims at finding the precoder matrix index that maximizes the corresponding channel capacity using a neural network directly. The network is trained off-line using extensive simulated data with the underlying channel statistics; however, the actual selection algorithm is based on simple calculations with the neural network, hence it is feasible for real time implementation. We demonstrate that the proposed search-free selection algorithm is highly efficient, i.e., it results in a performance very close to optimal precoder in the codebook while its complexity is significantly lower. Simulations with realistic channel models of 5G-NR corroborate these observations as well. We also show that pruning of the trained neural network gives a way to achieve further complexity reduction with a very small reduction in the system performance.Item Open Access Secure multi-antenna transmission with finite-alphabet signaling(2017-12) Aghdam, Sina RezaeiWith the ever-growing demand for services that rely on transmission over wireless networks, a challenging issue is the security of the transmitted information. Due to its open nature, wireless communications is prone to eavesdropping attacks. Typically, secrecy of the transmitted information is ensured with the aid of cryptographic techniques, which are deployed on upper layers of the network protocol stack. However, due to the need for key distribution and management, cryptographic solutions are difficult to implement in decentralized networks. Moreover, the security provided by key based solutions is not provable from a mathematical point of view. Physical layer security is an alternative or complement to the cryptographic techniques, which can resolve the complexities associated with key distribution and management. The basic principle of physical layer security is to exploit the randomness of the communication channels to allow a transmitter deliver its message to an intended receiver reliably while guaranteeing that a third party cannot infer any information about it. Much of the existing research in physical layer security focuses on investigating the information theoretic limits of secure communications. Among different techniques proposed, multiple-antenna based solutions have been shown to exhibit a high potential for enhancing security. Furthermore, Gaussian inputs are proved to be the optimal input distributions in a variety of scenarios. However, due to the high detection complexity, Gaussian signaling is not used in practice, and the transmission is carried out with the aid of symbols drawn from standard signal constellations. In this thesis, we develop several secure multi-antenna transmission techniques under the practical finite-alphabet input assumption. We first consider multipleinput multiple-output (MIMO) wiretap channels under finite-alphabet input constraints. We assume that the statistical channel state information (CSI) of the eavesdropper is available at the transmitter, and study two different scenarios regarding the transmitter's knowledge on the main channel CSI (MCSI) including availability of perfect and statistical MCSI at the transmitter. In each scenario, we introduce iterative algorithms for joint optimization of data precoder and arti ficial noise. We also propose different strategies to reduce the computational complexity associated with the transmit signal design. Moreover, we consider the setups with simultaneous wireless information and power transfer (SWIPT), and propose transmission schemes for achieving the trade-off between the secrecy rate and the harvested power. We demonstrate the efficacy of the proposed transmit signal design algorithms via extensive numerical examples. We also introduce several secure transmission schemes with spatial modulation and space shift keying (SSK). We derive an expression for the achievable secrecy rate, and develop precoder optimization algorithms for its maximization using transmitter side CSI. Furthermore, we introduce a group of secure SSK transmission schemes, which rely on dynamic antenna index assignment over reciprocal channels. Our results reveal that the fundamentally different working principle of SSK opens up new avenues for secure multi-antenna transmission.Item Open Access Stochastic signaling in the presence of channel state information uncertainty(Elsevier, 2013) Goken, C.; Gezici, Sinan; Arıkan, OrhanIn this paper, stochastic signaling is studied for power-constrained scalar valued binary communications systems in the presence of uncertainties in channel state information (CSI). First, stochastic signaling based on the available imperfect channel coefficient at the transmitter is analyzed, and it is shown that optimal signals can be represented by a randomization between at most two distinct signal levels for each symbol. Then, performance of stochastic signaling and conventional deterministic signaling is compared for this scenario, and sufficient conditions are derived for improvability and nonimprovability of deterministic signaling via stochastic signaling in the presence of CSI uncertainty. Furthermore, under CSI uncertainty, two different stochastic signaling strategies, namely, robust stochastic signaling and stochastic signaling with averaging, are proposed. For the robust stochastic signaling problem, sufficient conditions are derived for reducing the problem to a simpler form. It is shown that the optimal signal for each symbol can be expressed as a randomization between at most two distinct signal values for stochastic signaling with averaging, as well as for robust stochastic signaling under certain conditions. Finally, two numerical examples are presented to explore the theoretical results.