Browsing by Subject "Network layers"
Now showing 1 - 7 of 7
- Results Per Page
- Sort Options
Item Open Access Cooperative precoding and artificial noise design for security over interference channels(Institute of Electrical and Electronics Engineers Inc., 2015) Özçelikkale, A.; Duman, T. M.We focus on linear precoding strategies as a physical layer technique for providing security in Gaussian interference channels. We consider an artificial noise aided scheme where transmitters may broadcast noise in addition to data in order to confuse eavesdroppers. We formulate the problem of minimizing the total mean-square error at the legitimate receivers while keeping the error values at the eavesdroppers above target levels. This set-up leads to a non-convex problem formulation. Hence, we propose a coordinate block descent technique based on a tight semi-definite relaxation and design linear precoders as well as spatial distribution of the artificial noise. Our results illustrate that artificial noise can provide significant performance gains especially when the secrecy levels required at the eavesdroppers are demanding. © 1994-2012 IEEE.Item Open Access Cooperative underwater acoustic communications(IEEE, 2013) Al-Dharrab, S.; Uysal, M.; Duman, T.This article presents a contemporary overview of underwater acoustic communication (UWAC) and investigates physical layer aspects on cooperative transmission techniques for future UWAC systems. Taking advantage of the broadcast nature of wireless transmission, cooperative communication realizes spatial diversity advantages in a distributed manner. The current literature on cooperative communication focuses on terrestrial wireless systems at radio frequencies with sporadic results on cooperative UWAC. In this article, we summarize initial results on cooperative UWAC and investigate the performance of a multicarrier cooperative UWAC considering the inherent unique characteristics of the underwater channel. Our simulation results demonstrate the superiority of cooperative UWAC systems over their point-to-point counterparts. © 1979-2012 IEEE.Item Open Access Decoding strategies at the relay with physical-layer network coding(Institute of Electrical and Electronics Engineers, 2012) Bhat, U.; Duman, T. M.A two-way relay channel is considered where two users exchange information via a common relay in two transmission phases using physical-layer network coding (PNC). We consider an optimal decoding strategy at the relay to decode the network coded sequence during the first transmission phase, which is approximately implemented using a list decoding (LD) algorithm. The algorithm jointly decodes the codewords transmitted by the two users and sorts the L most likely pair of sequences in the order of decreasing a-posteriori probabilities, based on which, estimates of the most likely network coded sequences and the decoding results are obtained. Using several examples, it is observed that a lower complexity alternative, that jointly decodes the two transmitted codewords, has a performance similar to the LD based decoding and offers a near-optimal performance in terms of the error rates corresponding to the XOR of the two decoded sequences. To analyze the error rate at the relay, an analytical approximation of the word-error rate using the joint decoding (JD) scheme is evaluated over an AWGN channel using an approach that remains valid for the general case of two users adopting different codebooks and using different power levels. We further extend our study to frequency selective channels where two decoding approaches at the relay are investigated, namely; a trellis based joint channel detector/physical-layer network coded sequence decoder (JCD/PNCD) which is shown to offer a near-optimal performance, and a reduced complexity channel detection based on a linear receiver with minimum mean squared error (MMSE) criterion which is particularly useful where the number of channel taps is large.Item Open Access Effects of physical channel separation on application flows in a multi-radio multi-hop wireless mesh network: an experimental study on BilMesh testbed(Academic Press, 2014) Ulucinar, A. R.; Korpeoglu, I.; Karasan, E.In this paper, we introduce BilMesh, an indoor 802.11 b/g mesh networking testbed we established, and we report about our performance experiments conducted on multi-hop topologies with single-radio and multi-radio relay nodes. We investigate and report the effects of using multi-radio, multi-channel relay nodes in the mesh networking infrastructure in terms of network and application layer performance metrics. We also study the effects of physical channel separation on achievable end-to-end goodput perceived by the applications in the multi-radio case by varying the channel separation between the radio interfaces of a multi-radio relay node. We have observed that the difference between TCP and UDP goodput performances together with the delay and jitter performance depends on the hop count. We also observed that assigning overlapping channels with a central frequency separation of 5-15 MHz may render the CSMA mechanism used in 802.11 MAC ineffective and hence reduce the overall network performance. Finally, we provide some suggestions that can be considered while designing related protocols and algorithms to deal with the observed facts.Item Open Access Jamming bandits-a novel learning method for optimal jamming(Institute of Electrical and Electronics Engineers Inc., 2016) Amuru, S.; Tekin, C.; Van Der Schaar, M.; Buehrer, R.M.Can an intelligent jammer learn and adapt to unknown environments in an electronic warfare-type scenario? In this paper, we answer this question in the positive, by developing a cognitive jammer that adaptively and optimally disrupts the communication between a victim transmitter-receiver pair. We formalize the problem using a multiarmed bandit framework where the jammer can choose various physical layer parameters such as the signaling scheme, power level and the on-off/pulsing duration in an attempt to obtain power efficient jamming strategies. We first present online learning algorithms to maximize the jamming efficacy against static transmitter-receiver pairs and prove that these algorithms converge to the optimal (in terms of the error rate inflicted at the victim and the energy used) jamming strategy. Even more importantly, we prove that the rate of convergence to the optimal jamming strategy is sublinear, i.e., the learning is fast in comparison to existing reinforcement learning algorithms, which is particularly important in dynamically changing wireless environments. Also, we characterize the performance of the proposed bandit-based learning algorithm against multiple static and adaptive transmitter-receiver pairs.Item Open Access A novel queue-aware wireless link adaptation mechanism and its fixed-point analytical model(SpringerOpen, 2015) Ozturk, O.; Akar, N.A point-to-point (PTP) wireless link is studied that carries long-lived TCP flows and is controlled with active queue management (AQM). A cross-layer queue-aware adaptive modulation and coding (AMC)-based link adaptation (LA) mechanism is proposed for this wireless link to improve the TCP-level throughput relative to the case where AMC decisions are made based solely on the physical layer (PHY) parameters. The proposed simple-to-implement LA mechanism involves the use of an aggressive modulation and coding scheme (MCS) with high spectral efficiency and high block error rates when the queue occupancy exceeds a certain threshold, but otherwise a relatively conservative MCS with lower spectral efficiency and lower block error rates. A fixed-point analytical model is proposed to obtain the aggregate TCP throughput attained at this wireless link and the model is validated by ns-3 simulations. Numerical experimentation with the proposed analytical model applied to an IEEE 802.16-based wireless link demonstrates the effectiveness of the proposed queue-aware LA (QAWLA) mechanism in a wide variety of scenarios including cases where the channel information is imperfect. The impact of the choice of the queue occupancy threshold of QAWLA is extensively studied with respect to the choice of AQM parameters in order to provide engineering guidelines for the provisioning of the wireless link.Item Open Access On secrecy rate analysis of spatial modulation and space shift keying(IEEE, 2015) Aghdam, Sina Rezaei; Duman, Tolga M.; Di Renzo, M.Spatial modulation (SM) and space shift keying (SSK) represent transmission methods for low-complexity implementation of multiple-input multiple-output (MIMO) wireless systems in which antenna indices are employed for data transmission. In this paper, we focus our attention on the secrecy behavior of SSK and SM. Using an information-theoretic framework, we derive expressions for the mutual information and consequently compute achievable secrecy rates for SSK and SM via numerical evaluations. We also characterize the secrecy behavior of SSK by showing the effects of increasing the number of antennas at the transmitter as well as the number of antennas at the legitimate receiver and the eavesdropper. We further evaluate the secrecy rates achieved by SM with different sizes of the underlying signal constellation and compare the secrecy performance of this scheme with those of general MIMO and SIMO systems. The proposed framework unveils that SM is capable of achieving higher secrecy rates than the conventional single-antenna transmission schemes. However, it underperfoms compared to a general MIMO system in terms of the achievable secrecy rates.