SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "(swepub) pers:(Ottersten Björn 1961) lar1:(kth) pers:(Zheng Gan) srt2:(2013)"

Sökning: (swepub) pers:(Ottersten Björn 1961) lar1:(kth) pers:(Zheng Gan) > (2013)

  • Resultat 1-4 av 4
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Kapetanovic, Dzevdan, et al. (författare)
  • Detection of pilot contamination attack using random training and massive MIMO
  • 2013
  • Ingår i: Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposium on. ; , s. 13-18
  • Konferensbidrag (refereegranskat)abstract
    • Channel estimation attacks can degrade the performance of the legitimate system and facilitate eavesdropping. It is known that pilot contamination can alter the legitimate transmit precoder design and strengthen the quality of the received signal at the eavesdropper, without being detected. In this paper, we devise a technique which employs random pilots chosen from a known set of phase-shift keying (PSK) symbols to detect pilot contamination. The scheme only requires two training periods without any prior channel knowledge. Our analysis demonstrates that using the proposed technique in a massive MIMO system, the detection probability of pilot contamination attacks can be made arbitrarily close to 1. Simulation results reveal that the proposed technique can significantly increase the detection probability and is robust to noise power as well as the eavesdropper's power.
  •  
2.
  • Zheng, Gan, et al. (författare)
  • Cooperative Cognitive Networks : Optimal, Distributed and Low-Complexity Algorithms
  • 2013
  • Ingår i: IEEE Transactions on Signal Processing. - 1053-587X .- 1941-0476. ; 61:11, s. 2778-2790
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper considers the cooperation between a cognitive system and a primary system where multiple cognitive base stations (CBSs) relay the primary user's (PU) signals in exchange for more opportunity to transmit their own signals. The CBSs use amplify-and-forward (AF) relaying and coordinated beamforming to relay the primary signals and transmit their own signals. The objective is to minimize the overall transmit power of the CBSs given the rate requirements of the PU and the cognitive users (CUs). We show that the relaying matrices have unity rank and perform two functions: Matched filter receive beamforming and transmit beamforming. We then develop two efficient algorithms to find the optimal solution. The first one has a linear convergence rate and is suitable for distributed implementation, while the second one enjoys superlinear convergence but requires centralized processing. Further, we derive the beamforming vectors for the linear conventional zero-forcing (CZF) and prior zero-forcing (PZF) schemes, which provide much simpler solutions. Simulation results demonstrate the improvement in terms of outage performance due to the cooperation between the primary and cognitive systems.
  •  
3.
  • Zheng, Gan, et al. (författare)
  • Cooperative Communications against Jamming with Half-Duplex and Full-Duplex Relaying
  • 2013
  • Ingår i: Proceedings of IEEE 77th Vehicular Technology Conference. - : IEEE. - 9781467363372 ; , s. 6692490-
  • Konferensbidrag (refereegranskat)abstract
    • This paper studies the impact of jamming on the design of three-node two-hop cooperative amplify-and-forward (AF) communications with both half-duplex and full-duplex relaying. For the half-duplex relaying, the jammer is smart such that it can optimally allocate jamming power between listening and forwarding phases. Given separate source and relay power constraints, we derive the optimal jamming power allocation; with a total source and relay power constraint, we model the interaction between the legitimate system and the jammer as a noncooperative game and prove the existence and uniqueness of the Nash Equilibrium (NE). It is found that due to the fact that the end performance is limited by the weaker phase, the legitimate systems tries to balance the performance of two phases while the jammer attacks the system by making the two hops imbalanced. While for the full-duplex relaying, we show that if the self-interference can be properly controlled, it can bring substantial performance gain. Simulation results verify our analysis.
  •  
4.
  • Zheng, Gan, et al. (författare)
  • Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers
  • 2013
  • Ingår i: IEEE Transactions on Signal Processing. - 1053-587X .- 1941-0476. ; 61:20, s. 4962-4974
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-4 av 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy