
Blind enumeration of the number of transmit antennas and blind identification
of multipleinput multipleoutput (MIMO) schemes are two pivotal steps in MIMO
signal identification for both military and commercial applications.
Conventional approaches treat them as two independent problems, namely the
source number enumeration and the presence detection of spacetime redundancy,
respectively. In this paper, we develop a joint blind identification algorithm
to determine the number of transmit antennas and MIMO scheme simultaneously. By
restructuring the received signals, we derive three quantified features based
on the signal subspace to determine the number of transmit antennas and
identify spacetime redundancy. Then, a Gerschgorin radiibased method and a
feedforward neural network are employed to calculate these three features, and
a minimal weighted norm1 distance metric is utilized for decision making. In
particular, our approach can identify additional MIMO schemes, which most
previous works have not considered, and is compatible with both singlecarrier
and orthogonal frequency division multiplexing (OFDM) systems. Simulation
results verify the viability of our proposed approach for singlecarrier and
OFDM systems and demonstrate its favorable identification performance for a
short observation period with acceptable complexity.

Blind signal identification has important applications in both civilian and
military communications. Previous investigations on blind identification of
spacefrequency block codes (SFBCs) only considered identifying Alamouti and
spatial multiplexing transmission schemes. In this paper, we propose a novel
algorithm to identify SFBCs by analyzing discriminating features for different
SFBCs, calculated by separating the signal subspace and noise subspace of the
received signals at different adjacent OFDM subcarriers. Relying on random
matrix theory, this algorithm utilizes a serial hypothesis test to determine
the decision boundary according to the maximum eigenvalue in the noise
subspace. Then, a decision tree of a special distance metric is employed for
decision making. The proposed algorithm does not require prior knowledge of the
signal parameters such as the number of transmit antennas, channel
coefficients, modulation mode and noise power. Simulation results verify the
viability of the proposed algorithm for a reduced observation period with an
acceptable computational complexity.

This letter investigates the physical layer security in a wireless
cooperative network where communication is assisted by a fullduplex (FD)
untrusted relay in the presence of multiple external eavesdroppers. A
clusterbased colluding eavesdropping setting is considered, where illegitimate
nodes with common interests are grouped in a cluster. In order to confuse the
different eavesdropping clusters, we consider artificialnoiseaided
beamforming at the source node. Moreover, FD relay jamming is adopted to
improve the system's security. To maintain secure communications against the
untrusted relay node, a FD destination jamming scheme is adopted. Our proposed
scheme is designed based on the channel state information of the legitimate
nodes only. Numerical results show that the optimal power allocation factor
between data and artificial noise depends on the total number of antennas of
the different colluding eavesdropping clusters.

We investigate the physical layer security of wireless singleinput
singleoutput orthogonaldivision multiplexing (OFDM) when a transmitter, which
we refer to as Alice, sends her information to a receiver, which we refer to as
Bob, in the presence of an eavesdropping node, Eve. To prevent information
leakage, Alice sends an artificialnoise (AN) signal superimposed over her
information signal. We investigate the impact of the channel delay spread, OFDM
cyclic prefix, information/AN power allocation, and information and AN
precoders design on the achievable average secrecy rate. We consider the two
cases of known and unknown channel state information (CSI) at Alice.
Furthermore, we compare both cases of persubchannel processing and joint
subchannels processing at Eve's receiver. Our numerical results show the gain
of AN injection in terms of average secrecy rate for different OFDM operating
conditions. Moreover, based on our new insights, we demonstrate that the
ANaided scheme is effective and achieves almost the same average secrecy rate
as the fullCSI case without the need for Eve's instantaneous CSI at Alice.

We propose a new scheme to enhance the physicallayer security of wireless
singleinput singleoutput orthogonalfrequency divisionmultiplexing (OFDM)
transmissions from an electric vehicle, Alice, to the aggregator, Bob, in the
presence of an eavesdropper, Eve. To prevent information leakage to Eve, Alice
exploits the wireless channel randomness to extract secret key symbols that are
used to encrypt some data symbols which are then multiplexed in the frequency
domain with the remaining unencrypted data symbols. To secure the unencrypted
data symbols, Alice transmits an artificialnoise (AN) signal superimposed over
her data signal. We propose a threelevel optimization procedure to increase
the average secrecy rate of this wiretap channel by optimizing the transmit
power allocation between the encrypted data symbols, unencrypted data symbols
and the AN symbols. Our numerical results show that the proposed scheme
achieves considerable secrecy rate gains compared to the benchmark cases

Security is a critical issue in full duplex (FD) communication systems due to
the broadcast nature of wireless channels. In this paper, joint design of
information and artificial noise beamforming vectors is proposed for the FD
simultaneous wireless information and power transferring (FDSWIPT) systems
with loopback selfinterference cancellation. To guarantee high security and
energy harvesting performance of the FDSWIPT system, the proposed design is
formulated as a secrecy rate maximization problem under energy transfer rate
constraints. Although the secrecy rate maximization problem is nonconvex, we
solve it via semidefinite relaxation and a twodimensional search. We prove the
optimality of our proposed algorithm and demonstrate its performance via
simulations.

Physical layer security is a key issue in the full duplex (FD) communication
systems due to the broadcast nature of wireless channels. In this paper, the
joint design of information and artificial noise beamforming vectors is
proposed for the FD simultaneous wireless information and power transferring
(FDSWIPT) systems. To guarantee high security and energy harvesting
performance of the FDSWIPT system, the proposed design is formulated as a sum
information transmission rate (SITR) maximization problem under
informationleakage and energy constraints. In addition, we consider the
fairness issue between the uplink and downlink information transmission rates
by formulating a \mbox{fairnessaware} SITRmaximization problem. Although the
formulated \mbox{SITRmaximization} and \mbox{fairnessaware}
\mbox{SITRmaximization} problems are nonconvex, we solve them via
semidefinite relaxation and onedimensional search. The optimality of our
proposed algorithms is theoretically proved, and the computation complexities
are established. Moreover, we propose two suboptimal solutions to the
formulated optimization problems. In terms of the SITRmaximization problem,
numerical results show that the performance achieved by one of the two
suboptimal algorithms is close to the performance of the optimal algorithm with
increasing maximum transmission power of the FDBST.

Conventional correlationbased frame synchronization techniques can suffer
significant performance degradation over multipath frequencyselective
channels. As a remedy, in this paper we consider joint frame synchronization
and channel estimation. This, however, increases the length of the resulting
combined channel and its estimation becomes more challenging. On the other
hand, since the combined channel is a sparse vector, sparse channel estimation
methods can be applied. We propose a joint frame synchronization and channel
estimation method using the orthogonal matching pursuit (OMP) algorithm which
exploits the sparsity of the combined channel vector. Subsequently, the channel
estimate is used to design the equalizer. Our simulation results and
experimental outcomes using software defined radios show that the proposed
approach improves the overall system performance in terms of the mean square
error (MSE) between the transmitted and the equalized symbols compared to the
conventional method.

Inphase/quadraturephase Imbalance (IQI) is considered a major
performancelimiting impairment in directconversion transceivers. Its effects
become even more pronounced at higher carrier frequencies such as the
millimeterwave frequency bands being considered for 5G systems. In this paper,
we quantify the effects of IQI on the performance of different modulation
schemes under multipath fading channels. This is realized by developing a
general framework for the symbol error rate (SER) analysis of coherent phase
shift keying, noncoherent differential phase shift keying and noncoherent
frequency shift keying under IQI effects. In this context, the moment
generating function of the signaltointerferenceplusnoiseratio is first
derived for both singlecarrier and multicarrier systems suffering from
transmitter (TX) IQI only, receiver (RX) IQI only and joint TX/RX IQI.
Capitalizing on this, we derive analytic expressions for the SER of the
different modulation schemes. These expressions are corroborated by comparisons
with corresponding results from computer simulations and they provide insights
into the dependence of IQI on the system parameters. We demonstrate that the
effects of IQI differ considerably depending on the considered system as some
cases of singlecarrier transmission appear robust to IQI, whereas
multicarrier systems experiencing IQI at the RX require compensation in order
to achieve a reliable communication link.

We derive closedform expressions for the achievable rates of a bufferaided
fullduplex (FD) multipleinput multipleoutput (MIMO) Gaussian relay channel.
The FD relay still suffers from residual selfinterference (RSI) after the
application of selfinterference mitigation techniques. We investigate both
cases of a slowRSI channel where the RSI is fixed over the entire codeword,
and a fastRSI channel where the RSI changes from one symbol duration to
another within the codeword. We show that the RSI can be completely eliminated
in the slowRSI case when the FD relay is equipped with a buffer while the fast
RSI cannot be eliminated. For the fixedrate data transmission scenario, we
derive the optimal transmission strategy that should be adopted by the source
node and relay node to maximize the system throughput. We verify our analytical
findings through simulations.

This paper investigates artificial noise injection into the temporal and
spatial dimensions of a legitimate wireless communication system to secure its
transmissions from potential eavesdropping. We consider a multipleinput
singleoutput (MISO) orthogonal frequency division multiplexing (OFDM) system
in the presence of a singleantenna passive eavesdropper and derive both the
secrecy rate and average secrecy rate of the legitimate system. It is assumed
that the legitimate transmitter knows the full channel information of the
legitimate transceivers but does not know the instantaneous channel state
information of the passive eavesdropper. Closedform expressions for the
secrecy rate and average secrecy rate are derived for the asymptotic case with
a large number of transmit antennas. We also investigate 1) the power
allocation between the data and the AN; 2) the power allocation between the
spatial and the temporal AN. Computer simulations are carried out to evaluate
the performance of our proposed artificial noise scheme.

We assume that a bufferaided transmitter communicates with a receiving node
in the presence of an attacker. We investigate the impact of a radiofrequency
energyharvesting attacker that probabilistically operates as a jammer or an
eavesdropper. We show that even without the need for an external energy source,
the attacker can still degrade the security of the legitimate system. We show
that the random data arrival behavior at the transmitter and the channel
randomness of the legitimate link can improve the system's security. Moreover,
we design a jamming scheme for the attacker and investigate its impact on the
secure throughput of the legitimate system. The attacker designs his power
splitting parameter and jamming/eavesdropping probability based on the energy
state of the attacker's battery to minimize the secure throughput of the
legitimate system.

This paper proposes a new scheme to secure the transmissions in an untrusted
decodeandforward (DF) relaying network. A legitimate source node, Alice,
sends her data to a legitimate destination node, Bob, with the aid of an
untrusted DF relay node, Charlie. To secure the transmissions from Charlie
during relaying time slots, each data codeword is secured using a secretkey
codeword that has been previously shared between Alice and Bob during the
perfectly secured time slots (i.e., when the channel secrecy rate is positive).
The secretkey bits exchanged between Alice and Bob are stored in a
finitelength buffer and are used to secure data transmission whenever needed.
We model the secretkey buffer as a queueing system and analyze its Markov
chain. Our numerical results show the gains of our proposed scheme relative to
benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure
throughput.

In this paper, we propose a general framework that transforms the problems of
designing sparse finiteimpulseresponse linear equalizers and nonlinear
decisionfeedback equalizers, for multiple antenna systems, into the problem of
sparsestapproximation of a vector in different dictionaries. In addition, we
investigate several choices of the sparsifying dictionaries under this
framework. Furthermore, the worstcase coherences of these dictionaries, which
determine their sparsifying effectiveness, are analytically and/or numerically
evaluated. Moreover, we show how to reduce the computational complexity of the
designed sparse equalizer filters by exploiting the asymptotic equivalence of
Toeplitz and circulant matrices. Finally, the superiority of our proposed
framework over conventional methods is demonstrated through numerical
experiments.

Differential space time block coding (STBC) achieves full spatial diversity
and avoids channel estimation overhead. Over highly frequencyselective
channels, STBC is integrated with orthogonal frequency division multiplexing
(OFDM) to efficiently mitigate intersymbol interference effects. However,
lowcost implementation of STBCOFDM with directconversion transceivers is
sensitive to Inphase/Quadraturephase imbalance (IQI). In this paper, we
quantify the performance impact of IQI at both the transmitter and receiver
radio frequency frontends on differential STBCOFDM systems which has not been
investigated before in the literature. In addition, we propose a widelylinear
compensation algorithm at the receiver to mitigate the performance degradation
caused by the IQI at the transmitter and receiver ends. Moreover, a
parameterbased generalized algorithm is proposed to extract the IQI parameters
and improve the performance under highmobility. The adaptive compensation
algorithms are blind and work in a decisiondirected manner without using known
pilots or training sequences. Numerical results show that our proposed
compensation algorithms can effectively mitigate IQI in differential STBCOFDM.

Differential space time block coding (STBC) achieves full spatial diversity
and avoids channel estimation overhead. Over highly frequencyselective
channels, STBC is integrated with orthogonal frequency division multiplexing
(OFDM) to achieve high performance. However, lowcost implementation of
differential STBCOFDM using directconversion transceivers is sensitive to
Inphase/Quadraturephase imbalance (IQI). In this paper, we quantify the
performance impact of IQI at the receiver frontend on differential STBCOFDM
systems and propose a compensation algorithm to mitigate its effect. The
proposed receiver IQI compensation works in an adaptive decisiondirected
manner without using known pilots or training sequences, which reduces the rate
loss due to training overhead. Our numerical results show that our proposed
compensation algorithm can effectively mitigate receive IQI in differential
STBCOFDM.

We propose a simple yet efficient scheme for a set of energyharvesting
sensors to establish secure communication with a common destination (a master
node). An eavesdropper attempts to decode the data sent from the sensors to
their common destination. We assume a single modulation scheme that can be
implemented efficiently for energylimited applications. We design a
multipleaccess scheme for the sensors under secrecy and limitedenergy
constraints. In a given time slot, each energyharvesting sensor chooses
between sending its packet or remaining idle. The destination assigns a set of
data time slots to each sensor. The optimization problem is formulated to
maximize the secrecy sumthroughput.

We investigate joint information and energy cooperative schemes in a
slottedtime cognitive radio network with a primary transmitterreceiver pair
and a set of secondary transmitterreceiver pairs. The primary transmitter is
assumed to be an energyharvesting node. We propose a threestage cooperative
transmission protocol. During the first stage, the primary user releases a
portion of its time slot to the secondary nodes to send their data and to power
the energyharvesting primary transmitter from the secondary radiofrequency
signals. During the second stage, the primary transmitter sends its data to its
destination and to the secondary nodes. During the third stage, the secondary
nodes amplify and forward the primary data. We propose five different schemes
for secondary access and powering the primary transmitter. We derive
closedform expressions for the primary and secondary rates for all the
proposed schemes. Two of the proposed schemes use distributed beamforming to
power the primary transmitter. We design a sparsityaware relayselection
scheme based on the compressive sensing principles. Our numerical results
demonstrate the gains of our proposed schemes for both the primary and
secondary systems.

We propose a new artificialnoise aided hybrid timeswitching/powersplitting
scheme for orthogonal frequencydivision multiplexing (OFDM) systems to
securely transmit data and transfer energy to a legitimate receiving node. In
our proposed scheme, the cyclic prefix has two more benefits in addition to the
cancellation of the intersymbol interference between the OFDM blocks. Firstly,
it enables the legitimate transmitter to send artificialnoise (AN) vectors in
a way such that the interference can be canceled at the legitimate receiver
prior to information decoding. Secondly, its power is used to energize the
legitimate receiver. We optimize the cyclic prefix length, the timeswitching
and powersplitting parameters, and the power allocation ratio between the data
and AN signals at the legitimate transmitter to maximize the average secrecy
rate subject to a constraint on the average energy transfer rate at the
legitimate receiver. Our numerical results demonstrate that our proposed scheme
can achieve up to 23% average secrecy rate gain relative to a pure
powersplitting scheme.

This letter proposes a novel hybrid half/fullduplex relaying scheme to
enhance the relay channel security. A source node (Alice) communicates with her
destination node (Bob) in the presence of a bufferaided fullduplex relay node
(Rooney) and a potential eavesdropper (Eve). Rooney adopts two different
relaying strategies, namely randomizeandforward and decodeandforward
relaying strategies, to improve the security of the legitimate system. In the
first relaying strategy, Rooney uses a codebook different from that used at
Alice. In the second relaying strategy, Rooney and Alice use the same
codebooks. In addition, Rooney switches between halfduplex and fullduplex
modes to further enhance the security of the legitimate system. The numerical
results demonstrate that our proposed scheme achieves a significant average
secrecy endtoend throughput improvement relative to the conventional
bufferless fullduplex relaying scheme.

In this letter, we investigate the security of a singleantenna rechargeable
source node in the presence of a multiantenna rechargeable cooperative jammer
and a potential singleantenna eavesdropper. The batteries at the legitimate
transmitting nodes (i.e. the source node and the jamming node) are assumed to
be limited in capacity and are modeled as queueing systems. We investigate the
impact of the energy arrival rates at the batteries on the achievable secrecy
rates. In our energyconstrained network, we propose an efficient scheme to
enhance the system's security by optimizing the transmission times of the
source node. The jammer uses a subset of its antennas (and transmit
radiofrequency chains) to create a beamformer which maximizes the system's
secrecy rate while completely canceling the artificial noise at the legitimate
destination. Our numerical results demonstrate the significant average secrecy
rate gain of our proposed scheme.

We consider a relayassisted wireless network, where the energyharvesting
bufferaided relay node is powered by radiofrequency signals from a source
node wishing to communicate with its destination. We propose two secure
cooperative protocols for a network composed of a source node equipped with a
data buffer communicating with its destination in the presence of a
bufferaided relay node and an eavesdropper. Our proposed protocols are
designed based on the channel state information and the buffer state
information at the source and relay nodes. The burstiness of data at the source
node queue (buffer) and the energy recycling process at the relay are taken
into account in our analysis. In addition, we take the decoding and signal
processing circuit power consumption constraints into consideration. For the
limiting case of an infinitesize battery at the relay, we derive a sufficient
condition for the energy queue to saturate. Our numerical results demonstrate
the throughput gains of our proposed protocols.

This paper proposes efficient multipleaccess schemes for large wireless
networks based on the transmitters' buffer state information and their
transceivers' duplex transmission capability. First, we investigate the case of
halfduplex nodes where a node can either transmit or receive in a given time
instant. The network is said to be naturally sparse if the number of
nonemptyqueue transmitters in a given frame is much smaller than the number of
users, which is the case when the arrival rates to the queues are very small
and the number of users is large. If the network is not naturally sparse, we
design the user requests to be sparse such that only few requests are sent to
the destination. We refer to the detected nonemptyqueue transmitters in a
given frame as frame owners. Our design goal is to minimize the nodes' total
transmit power in a given frame. In the case of unslottedtime data
transmission, the optimization problem is shown to be a convex optimization
program. We propose an approximate formulation to simplify the problem and
obtain a closedform expression for the assigned time durations to the nodes.
The solution of the approximate optimization problem demonstrates that the time
duration assigned to a node in the set of frame owners is the ratio of the
squareroot of the buffer occupancy of that node to the sum of the squareroots
of each occupancy of all the frame owners. We then investigate the slottedtime
data transmission scenario, where the time durations assigned for data
transmission are slotted. In addition, we show that the fullduplex capability
of a node increases the data transmission portion of the frame and enables a
distributed implementation of the proposed schemes.

We investigate the performance of multihopintervehicular communication
systems with regenerative and nonregenerative relaying. We consider the
socalled "n*Rayleigh distribution" as an adequate multipath fading channel
model for vehicletovehicle communication scenarios. We derive a novel
approximation for the outage probability of maximum ratio combining (MRC)
diversity reception. In addition, we analyze the amount of fading and optimize
the power allocation for the investigated scenario. Numerical results show that
regenerative systems are more efficient than nonregenerative systems when the
cascading order (n) is small; however, for large n, our results demonstrate
that the performance of both relaying techniques is rather similar.

A major performance and complexity limitation in broadband communications is
the long channel delay spread which results in a highlyfrequencyselective
channel frequency response. Channel shortening equalizers (CSEs) are used to
ensure that the cascade of a long channel impulse response (CIR) and the CSE is
approximately equivalent to a target impulse response (TIR) with much shorter
delay spread. In this paper, we propose a general framework that transforms the
problems of design of sparse CSE and TIR finite impulse response (FIR) filters
into the problem of sparsestapproximation of a vector in different
dictionaries. In addition, we compare several choices of sparsifying
dictionaries under this framework. Furthermore, the worstcase coherence of
these dictionaries, which determines their sparsifying effectiveness, are
analytically and/or numerically evaluated. Finally, the usefulness of the
proposed framework for the design of sparse CSE and TIR filters is validated
through numerical experiments.