• Blind enumeration of the number of transmit antennas and blind identification of multiple-input multiple-output (MIMO) schemes are two pivotal steps in MIMO signal identification for both military and commercial applications. Conventional approaches treat them as two independent problems, namely the source number enumeration and the presence detection of space-time redundancy, respectively. In this paper, we develop a joint blind identification algorithm to determine the number of transmit antennas and MIMO scheme simultaneously. By restructuring the received signals, we derive three quantified features based on the signal subspace to determine the number of transmit antennas and identify space-time redundancy. Then, a Gerschgorin radii-based method and a feed-forward neural network are employed to calculate these three features, and a minimal weighted norm-1 distance metric is utilized for decision making. In particular, our approach can identify additional MIMO schemes, which most previous works have not considered, and is compatible with both single-carrier and orthogonal frequency division multiplexing (OFDM) systems. Simulation results verify the viability of our proposed approach for single-carrier and OFDM systems and demonstrate its favorable identification performance for a short observation period with acceptable complexity.
  • Blind signal identification has important applications in both civilian and military communications. Previous investigations on blind identification of space-frequency block codes (SFBCs) only considered identifying Alamouti and spatial multiplexing transmission schemes. In this paper, we propose a novel algorithm to identify SFBCs by analyzing discriminating features for different SFBCs, calculated by separating the signal subspace and noise subspace of the received signals at different adjacent OFDM subcarriers. Relying on random matrix theory, this algorithm utilizes a serial hypothesis test to determine the decision boundary according to the maximum eigenvalue in the noise subspace. Then, a decision tree of a special distance metric is employed for decision making. The proposed algorithm does not require prior knowledge of the signal parameters such as the number of transmit antennas, channel coefficients, modulation mode and noise power. Simulation results verify the viability of the proposed algorithm for a reduced observation period with an acceptable computational complexity.
  • This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdropping clusters, we consider artificial-noise-aided beamforming at the source node. Moreover, FD relay jamming is adopted to improve the system's security. To maintain secure communications against the untrusted relay node, a FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. Numerical results show that the optimal power allocation factor between data and artificial noise depends on the total number of antennas of the different colluding eavesdropping clusters.
  • We investigate the physical layer security of wireless single-input single-output orthogonal-division multiplexing (OFDM) when a transmitter, which we refer to as Alice, sends her information to a receiver, which we refer to as Bob, in the presence of an eavesdropping node, Eve. To prevent information leakage, Alice sends an artificial-noise (AN) signal superimposed over her information signal. We investigate the impact of the channel delay spread, OFDM cyclic prefix, information/AN power allocation, and information and AN precoders design on the achievable average secrecy rate. We consider the two cases of known and unknown channel state information (CSI) at Alice. Furthermore, we compare both cases of per-sub-channel processing and joint sub-channels processing at Eve's receiver. Our numerical results show the gain of AN injection in terms of average secrecy rate for different OFDM operating conditions. Moreover, based on our new insights, we demonstrate that the AN-aided scheme is effective and achieves almost the same average secrecy rate as the full-CSI case without the need for Eve's instantaneous CSI at Alice.
  • We propose a new scheme to enhance the physical-layer security of wireless single-input single-output orthogonal-frequency division-multiplexing (OFDM) transmissions from an electric vehicle, Alice, to the aggregator, Bob, in the presence of an eavesdropper, Eve. To prevent information leakage to Eve, Alice exploits the wireless channel randomness to extract secret key symbols that are used to encrypt some data symbols which are then multiplexed in the frequency domain with the remaining unencrypted data symbols. To secure the unencrypted data symbols, Alice transmits an artificial-noise (AN) signal superimposed over her data signal. We propose a three-level optimization procedure to increase the average secrecy rate of this wiretap channel by optimizing the transmit power allocation between the encrypted data symbols, unencrypted data symbols and the AN symbols. Our numerical results show that the proposed scheme achieves considerable secrecy rate gains compared to the benchmark cases
  • Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a secrecy rate maximization problem under energy transfer rate constraints. Although the secrecy rate maximization problem is non-convex, we solve it via semidefinite relaxation and a two-dimensional search. We prove the optimality of our proposed algorithm and demonstrate its performance via simulations.
  • Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a sum information transmission rate (SITR) maximization problem under information-leakage and energy constraints. In addition, we consider the fairness issue between the uplink and downlink information transmission rates by formulating a \mbox{fairness-aware} SITR-maximization problem. Although the formulated \mbox{SITR-maximization} and \mbox{fairness-aware} \mbox{SITR-maximization} problems are non-convex, we solve them via semidefinite relaxation and one-dimensional search. The optimality of our proposed algorithms is theoretically proved, and the computation complexities are established. Moreover, we propose two suboptimal solutions to the formulated optimization problems. In terms of the SITR-maximization problem, numerical results show that the performance achieved by one of the two suboptimal algorithms is close to the performance of the optimal algorithm with increasing maximum transmission power of the FD-BST.
  • Conventional correlation-based frame synchronization techniques can suffer significant performance degradation over multi-path frequency-selective channels. As a remedy, in this paper we consider joint frame synchronization and channel estimation. This, however, increases the length of the resulting combined channel and its estimation becomes more challenging. On the other hand, since the combined channel is a sparse vector, sparse channel estimation methods can be applied. We propose a joint frame synchronization and channel estimation method using the orthogonal matching pursuit (OMP) algorithm which exploits the sparsity of the combined channel vector. Subsequently, the channel estimate is used to design the equalizer. Our simulation results and experimental outcomes using software defined radios show that the proposed approach improves the overall system performance in terms of the mean square error (MSE) between the transmitted and the equalized symbols compared to the conventional method.
  • In-phase/quadrature-phase Imbalance (IQI) is considered a major performance-limiting impairment in direct-conversion transceivers. Its effects become even more pronounced at higher carrier frequencies such as the millimeter-wave frequency bands being considered for 5G systems. In this paper, we quantify the effects of IQI on the performance of different modulation schemes under multipath fading channels. This is realized by developing a general framework for the symbol error rate (SER) analysis of coherent phase shift keying, noncoherent differential phase shift keying and noncoherent frequency shift keying under IQI effects. In this context, the moment generating function of the signal-to-interference-plus-noise-ratio is first derived for both single-carrier and multi-carrier systems suffering from transmitter (TX) IQI only, receiver (RX) IQI only and joint TX/RX IQI. Capitalizing on this, we derive analytic expressions for the SER of the different modulation schemes. These expressions are corroborated by comparisons with corresponding results from computer simulations and they provide insights into the dependence of IQI on the system parameters. We demonstrate that the effects of IQI differ considerably depending on the considered system as some cases of single-carrier transmission appear robust to IQI, whereas multi-carrier systems experiencing IQI at the RX require compensation in order to achieve a reliable communication link.
  • We derive closed-form expressions for the achievable rates of a buffer-aided full-duplex (FD) multiple-input multiple-output (MIMO) Gaussian relay channel. The FD relay still suffers from residual self-interference (RSI) after the application of self-interference mitigation techniques. We investigate both cases of a slow-RSI channel where the RSI is fixed over the entire codeword, and a fast-RSI channel where the RSI changes from one symbol duration to another within the codeword. We show that the RSI can be completely eliminated in the slow-RSI case when the FD relay is equipped with a buffer while the fast RSI cannot be eliminated. For the fixed-rate data transmission scenario, we derive the optimal transmission strategy that should be adopted by the source node and relay node to maximize the system throughput. We verify our analytical findings through simulations.
  • This paper investigates artificial noise injection into the temporal and spatial dimensions of a legitimate wireless communication system to secure its transmissions from potential eavesdropping. We consider a multiple-input single-output (MISO) orthogonal frequency division multiplexing (OFDM) system in the presence of a single-antenna passive eavesdropper and derive both the secrecy rate and average secrecy rate of the legitimate system. It is assumed that the legitimate transmitter knows the full channel information of the legitimate transceivers but does not know the instantaneous channel state information of the passive eavesdropper. Closed-form expressions for the secrecy rate and average secrecy rate are derived for the asymptotic case with a large number of transmit antennas. We also investigate 1) the power allocation between the data and the AN; 2) the power allocation between the spatial and the temporal AN. Computer simulations are carried out to evaluate the performance of our proposed artificial noise scheme.
  • We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper. We show that even without the need for an external energy source, the attacker can still degrade the security of the legitimate system. We show that the random data arrival behavior at the transmitter and the channel randomness of the legitimate link can improve the system's security. Moreover, we design a jamming scheme for the attacker and investigate its impact on the secure throughput of the legitimate system. The attacker designs his power splitting parameter and jamming/eavesdropping probability based on the energy state of the attacker's battery to minimize the secure throughput of the legitimate system.
  • This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.
  • In this paper, we propose a general framework that transforms the problems of designing sparse finite-impulseresponse linear equalizers and non-linear decision-feedback equalizers, for multiple antenna systems, into the problem of sparsestapproximation of a vector in different dictionaries. In addition, we investigate several choices of the sparsifying dictionaries under this framework. Furthermore, the worst-case coherences of these dictionaries, which determine their sparsifying effectiveness, are analytically and/or numerically evaluated. Moreover, we show how to reduce the computational complexity of the designed sparse equalizer filters by exploiting the asymptotic equivalence of Toeplitz and circulant matrices. Finally, the superiority of our proposed framework over conventional methods is demonstrated through numerical experiments.
  • Differential space time block coding (STBC) achieves full spatial diversity and avoids channel estimation overhead. Over highly frequency-selective channels, STBC is integrated with orthogonal frequency division multiplexing (OFDM) to efficiently mitigate intersymbol interference effects. However, low-cost implementation of STBC-OFDM with direct-conversion transceivers is sensitive to In-phase/Quadrature-phase imbalance (IQI). In this paper, we quantify the performance impact of IQI at both the transmitter and receiver radio frequency front-ends on differential STBC-OFDM systems which has not been investigated before in the literature. In addition, we propose a widely-linear compensation algorithm at the receiver to mitigate the performance degradation caused by the IQI at the transmitter and receiver ends. Moreover, a parameter-based generalized algorithm is proposed to extract the IQI parameters and improve the performance under high-mobility. The adaptive compensation algorithms are blind and work in a decision-directed manner without using known pilots or training sequences. Numerical results show that our proposed compensation algorithms can effectively mitigate IQI in differential STBC-OFDM.
  • Differential space time block coding (STBC) achieves full spatial diversity and avoids channel estimation overhead. Over highly frequency-selective channels, STBC is integrated with orthogonal frequency division multiplexing (OFDM) to achieve high performance. However, low-cost implementation of differential STBC-OFDM using direct-conversion transceivers is sensitive to In-phase/Quadrature-phase imbalance (IQI). In this paper, we quantify the performance impact of IQI at the receiver front-end on differential STBC-OFDM systems and propose a compensation algorithm to mitigate its effect. The proposed receiver IQI compensation works in an adaptive decision-directed manner without using known pilots or training sequences, which reduces the rate loss due to training overhead. Our numerical results show that our proposed compensation algorithm can effectively mitigate receive IQI in differential STBC-OFDM.
  • We propose a simple yet efficient scheme for a set of energy-harvesting sensors to establish secure communication with a common destination (a master node). An eavesdropper attempts to decode the data sent from the sensors to their common destination. We assume a single modulation scheme that can be implemented efficiently for energy-limited applications. We design a multiple-access scheme for the sensors under secrecy and limited-energy constraints. In a given time slot, each energy-harvesting sensor chooses between sending its packet or remaining idle. The destination assigns a set of data time slots to each sensor. The optimization problem is formulated to maximize the secrecy sum-throughput.
  • We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter is assumed to be an energy-harvesting node. We propose a three-stage cooperative transmission protocol. During the first stage, the primary user releases a portion of its time slot to the secondary nodes to send their data and to power the energy-harvesting primary transmitter from the secondary radio-frequency signals. During the second stage, the primary transmitter sends its data to its destination and to the secondary nodes. During the third stage, the secondary nodes amplify and forward the primary data. We propose five different schemes for secondary access and powering the primary transmitter. We derive closed-form expressions for the primary and secondary rates for all the proposed schemes. Two of the proposed schemes use distributed beamforming to power the primary transmitter. We design a sparsity-aware relay-selection scheme based on the compressive sensing principles. Our numerical results demonstrate the gains of our proposed schemes for both the primary and secondary systems.
  • We propose a new artificial-noise aided hybrid time-switching/power-splitting scheme for orthogonal frequency-division multiplexing (OFDM) systems to securely transmit data and transfer energy to a legitimate receiving node. In our proposed scheme, the cyclic prefix has two more benefits in addition to the cancellation of the inter-symbol interference between the OFDM blocks. Firstly, it enables the legitimate transmitter to send artificial-noise (AN) vectors in a way such that the interference can be canceled at the legitimate receiver prior to information decoding. Secondly, its power is used to energize the legitimate receiver. We optimize the cyclic prefix length, the time-switching and power-splitting parameters, and the power allocation ratio between the data and AN signals at the legitimate transmitter to maximize the average secrecy rate subject to a constraint on the average energy transfer rate at the legitimate receiver. Our numerical results demonstrate that our proposed scheme can achieve up to 23% average secrecy rate gain relative to a pure power-splitting scheme.
  • This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying strategies, namely randomize-and-forward and decode-and-forward relaying strategies, to improve the security of the legitimate system. In the first relaying strategy, Rooney uses a codebook different from that used at Alice. In the second relaying strategy, Rooney and Alice use the same codebooks. In addition, Rooney switches between half-duplex and full-duplex modes to further enhance the security of the legitimate system. The numerical results demonstrate that our proposed scheme achieves a significant average secrecy end-to-end throughput improvement relative to the conventional bufferless full-duplex relaying scheme.
  • In this letter, we investigate the security of a single-antenna rechargeable source node in the presence of a multi-antenna rechargeable cooperative jammer and a potential single-antenna eavesdropper. The batteries at the legitimate transmitting nodes (i.e. the source node and the jamming node) are assumed to be limited in capacity and are modeled as queueing systems. We investigate the impact of the energy arrival rates at the batteries on the achievable secrecy rates. In our energy-constrained network, we propose an efficient scheme to enhance the system's security by optimizing the transmission times of the source node. The jammer uses a subset of its antennas (and transmit radio-frequency chains) to create a beamformer which maximizes the system's secrecy rate while completely canceling the artificial noise at the legitimate destination. Our numerical results demonstrate the significant average secrecy rate gain of our proposed scheme.
  • We consider a relay-assisted wireless network, where the energy-harvesting buffer-aided relay node is powered by radio-frequency signals from a source node wishing to communicate with its destination. We propose two secure cooperative protocols for a network composed of a source node equipped with a data buffer communicating with its destination in the presence of a buffer-aided relay node and an eavesdropper. Our proposed protocols are designed based on the channel state information and the buffer state information at the source and relay nodes. The burstiness of data at the source node queue (buffer) and the energy recycling process at the relay are taken into account in our analysis. In addition, we take the decoding and signal processing circuit power consumption constraints into consideration. For the limiting case of an infinite-size battery at the relay, we derive a sufficient condition for the energy queue to saturate. Our numerical results demonstrate the throughput gains of our proposed protocols.
  • This paper proposes efficient multiple-access schemes for large wireless networks based on the transmitters' buffer state information and their transceivers' duplex transmission capability. First, we investigate the case of half-duplex nodes where a node can either transmit or receive in a given time instant. The network is said to be naturally sparse if the number of nonempty-queue transmitters in a given frame is much smaller than the number of users, which is the case when the arrival rates to the queues are very small and the number of users is large. If the network is not naturally sparse, we design the user requests to be sparse such that only few requests are sent to the destination. We refer to the detected nonempty-queue transmitters in a given frame as frame owners. Our design goal is to minimize the nodes' total transmit power in a given frame. In the case of unslotted-time data transmission, the optimization problem is shown to be a convex optimization program. We propose an approximate formulation to simplify the problem and obtain a closed-form expression for the assigned time durations to the nodes. The solution of the approximate optimization problem demonstrates that the time duration assigned to a node in the set of frame owners is the ratio of the square-root of the buffer occupancy of that node to the sum of the square-roots of each occupancy of all the frame owners. We then investigate the slotted-time data transmission scenario, where the time durations assigned for data transmission are slotted. In addition, we show that the full-duplex capability of a node increases the data transmission portion of the frame and enables a distributed implementation of the proposed schemes.
  • We investigate the performance of multihop-intervehicular communication systems with regenerative and nonregenerative relaying. We consider the so-called "n*Rayleigh distribution" as an adequate multipath fading channel model for vehicle-to-vehicle communication scenarios. We derive a novel approximation for the outage probability of maximum ratio combining (MRC) diversity reception. In addition, we analyze the amount of fading and optimize the power allocation for the investigated scenario. Numerical results show that regenerative systems are more efficient than nonregenerative systems when the cascading order (n) is small; however, for large n, our results demonstrate that the performance of both relaying techniques is rather similar.
  • A major performance and complexity limitation in broadband communications is the long channel delay spread which results in a highly-frequency-selective channel frequency response. Channel shortening equalizers (CSEs) are used to ensure that the cascade of a long channel impulse response (CIR) and the CSE is approximately equivalent to a target impulse response (TIR) with much shorter delay spread. In this paper, we propose a general framework that transforms the problems of design of sparse CSE and TIR finite impulse response (FIR) filters into the problem of sparsest-approximation of a vector in different dictionaries. In addition, we compare several choices of sparsifying dictionaries under this framework. Furthermore, the worst-case coherence of these dictionaries, which determines their sparsifying effectiveness, are analytically and/or numerically evaluated. Finally, the usefulness of the proposed framework for the design of sparse CSE and TIR filters is validated through numerical experiments.