• All Technologies Work Together for Good: A Glance to Future Mobile Networks(1804.05963)

April 16, 2018 cs.IT, math.IT, cs.NI
The astounding capacity requirements of 5G have motivated researchers to investigate the feasibility of many potential technologies, such as massive multiple-input multiple-output, millimeter wave, full-duplex, non-orthogonal multiple access, carrier aggregation, cognitive radio, and network ultra-densification. The benefits and challenges of these technologies have been thoroughly studied either individually or in a combination of two or three. It is not clear, however, whether all potential technologies operating together lead to fulfilling the requirements posed by 5G. This paper explores the potential benefits and challenges when all technologies coexist in an ultra-dense cellular environment. The sum rate of the network is investigated with respect to the increase in the number of small-cells and results show the capacity gains achieved by the coexistence.
• A New Design Paradigm for Secure Full-Duplex Multiuser Systems(1801.00963)

April 15, 2018 cs.IT, math.IT
We consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed to simultaneously serve both downlink (DL) and uplink (UL) users in the presence of half-duplex eavesdroppers (Eves). The problem is to maximize the minimum (max-min) secrecy rate (SR) among all legitimate users, where the information signals at the FD-BS are accompanied with artificial noise to debilitate the Eves' channels. To enhance the max-min SR, a major part of the power budget should be allocated to serve the users with poor channel qualities, such as those far from the FD-BS, undermining the SR for other users, and thus compromising the SR per-user. In addition, the main obstacle in designing an FD system is due to the self-interference (SI) and co-channel interference (CCI) among users. We therefore propose an alternative solution, where the FD-BS uses a fraction of the time block to serve near DL users and far UL users, and the remaining fractional time to serve other users. The proposed scheme mitigates the harmful effects of SI, CCI and multiuser interference, and provides system robustness. The SR optimization problem has a highly nonconcave and nonsmooth objective, subject to nonconvex constraints. For the case of perfect channel state information (CSI), we develop a low-complexity path-following algorithm, which involves only a simple convex program of moderate dimension at each iteration. We show that our path-following algorithm guarantees convergence at least to a local optimum. Then, we extend the path-following algorithm to the cases of partially known Eves' CSI, where only statistics of CSI for the Eves are known, and worst-case scenario in which Eves can employ a more advanced linear decoder. The merit of our proposed approach is further demonstrated by extensive numerical results.
• Joint Blind Identification of the Number of Transmit Antennas and MIMO Schemes Using Gerschgorin Radii and FNN(1803.10849)

March 28, 2018 eess.SP
Blind enumeration of the number of transmit antennas and blind identification of multiple-input multiple-output (MIMO) schemes are two pivotal steps in MIMO signal identification for both military and commercial applications. Conventional approaches treat them as two independent problems, namely the source number enumeration and the presence detection of space-time redundancy, respectively. In this paper, we develop a joint blind identification algorithm to determine the number of transmit antennas and MIMO scheme simultaneously. By restructuring the received signals, we derive three quantified features based on the signal subspace to determine the number of transmit antennas and identify space-time redundancy. Then, a Gerschgorin radii-based method and a feed-forward neural network are employed to calculate these three features, and a minimal weighted norm-1 distance metric is utilized for decision making. In particular, our approach can identify additional MIMO schemes, which most previous works have not considered, and is compatible with both single-carrier and orthogonal frequency division multiplexing (OFDM) systems. Simulation results verify the viability of our proposed approach for single-carrier and OFDM systems and demonstrate its favorable identification performance for a short observation period with acceptable complexity.
• Distributed Energy and Resource Management for Full-Duplex Dense Small Cells for 5G(1803.09175)

March 24, 2018 eess.SP
We consider a multi-carrier and densely deployed small cell network, where small cells are powered by renewable energy source and operate in a full-duplex mode. We formulate an energy and traffic aware resource allocation optimization problem, where a joint design of the beamformers, power and sub-carrier allocation, and users scheduling is proposed. The problem minimizes the sum data buffer lengths of each user in the network by using the harvested energy. A practical uplink user rate-dependent decoding energy consumption is included in the total energy consumption at the small cell base stations. Hence, harvested energy is shared with both downlink and uplink users. Owing to the non-convexity of the problem, a faster convergence sub-optimal algorithm based on successive parametric convex approximation framework is proposed. The algorithm is implemented in a distributed fashion, by using the alternating direction method of multipliers, which offers not only the limited information exchange between the base stations, but also fast convergence. Numerical results advocate the redesigning of the resource allocation strategy when the energy at the base station is shared among the downlink and uplink transmissions.
• Blind Identification of SFBC-OFDM Signals Using Subspace Decompositions and Random Matrix Theory(1803.05053)

March 13, 2018 eess.SP
Blind signal identification has important applications in both civilian and military communications. Previous investigations on blind identification of space-frequency block codes (SFBCs) only considered identifying Alamouti and spatial multiplexing transmission schemes. In this paper, we propose a novel algorithm to identify SFBCs by analyzing discriminating features for different SFBCs, calculated by separating the signal subspace and noise subspace of the received signals at different adjacent OFDM subcarriers. Relying on random matrix theory, this algorithm utilizes a serial hypothesis test to determine the decision boundary according to the maximum eigenvalue in the noise subspace. Then, a decision tree of a special distance metric is employed for decision making. The proposed algorithm does not require prior knowledge of the signal parameters such as the number of transmit antennas, channel coefficients, modulation mode and noise power. Simulation results verify the viability of the proposed algorithm for a reduced observation period with an acceptable computational complexity.
• Identification of GSM and LTE Signals Using Their Second-order Cyclostationarity(1803.04573)

March 12, 2018 eess.SP
Automatic signal identification (ASI) has various millitary and commercial applications, such as spectrum surveillance and cognitive radio. In this paper, a novel ASI algorithm is proposed for the identification of GSM and LTE signals, which is based on the pilot-induced second-order cyclostationarity. The proposed algorithm provides a very good performance at low signal-to-noise ratios and short observation times, with no need for channel estimation, and timing and frequency synchronization. Simulations and off-the-air signals acquired with the ThinkRF WSA4000 receiver are used to confirm the findings.
• Secrecy Outage of Proactive Relay Selection by Eavesdropper(1803.01065)

March 2, 2018 eess.SP
In this paper, we consider an active eavesdropping scenario in a cooperative system consisting of a source, a destination, and an active eavesdropper with multiple decode-and-forward relays. Considering an existing assumption in which an eavesdropper is also a part of network, a proactive relay selection by the eavesdropper is proposed. The best relay which maximizes the eavesdropping rate is selected by the eavesdropper. A relay selection scheme is also proposed to improve the secrecy of the system by minimizing the eavesdropping rate. Performances of these schemes are compared with two passive eavesdropping scenarios in which the eavesdropper performs selection and maximal ratio combining on the relayed links. A realistic channel model with independent non-identical links between nodes and direct links from the source to both the destination and eavesdropper are assumed. Closed-form expressions for the secrecy outage probability (SOP) of these schemes in Rayleigh fading channel are obtained. It is shown that the relay selection by the proactive eavesdropper is most detrimental to the system as not only the SOP increases with the increase in the number of relays, but its diversity also remains unchanged.
• Full-Duplex Communications: Performance in Ultra-Dense Small-Cell Wireless Networks(1803.00473)

March 1, 2018 eess.SP
Theoretically, full-duplex (FD) communications can double the spectral-efficiency (SE) of a wireless link if the problem of self-interference (SI) is completely eliminated. Recent developments towards SI cancellation techniques have allowed to realize the FD communications on low-power transceivers, such as small-cell (SC) base stations. Consequently, the FD technology is being considered as a key enabler of 5G and beyond networks. In the context of 5G, FD communications have been initially investigated in a single SC and then into multiple SC environments. Due to FD operations, a single SC faces residual SI and intra-cell co-channel interference (CCI), whereas multiple SCs face additional inter-cell CCI, which grows with the number of neighboring cells. The surge of interference in the multi-cell environment poses the question of the feasibility of FD communications. In this article, we first review the FD communications in single and multiple SC environments and then provide the state-of-the-art for the CCI mitigation techniques, as well as FD feasibility studies in a multi-cell environment. Further, through numerical simulations, the SE performance gain of the FD communications in ultra-dense massive multiple input multiple-output enabled millimeter wave SCs is presented. Finally, potential open research challenges of multi-cell FD communications are highlighted.
• Joint Inter-flow Network Coding and Opportunistic Routing in Multi-hop Wireless Mesh Networks: A Comprehensive Survey(1803.00474)

March 1, 2018 cs.NI
Network coding and opportunistic routing are two recognized innovative ideas to improve the performance of wireless networks by utilizing the broadcast nature of the wireless medium. In the last decade, there has been considerable research on how to synergize inter-flow network coding and opportunistic routing in a single joint protocol outperforming each in any scenario. This paper explains the motivation behind the integration of these two techniques, and highlights certain scenarios in which the joint approach may even degrade the performance, emphasizing the fact that their synergistic effect cannot be accomplished with a naive and perfunctory combination. This survey paper also provides a comprehensive taxonomy of the joint protocols in terms of their fundamental components and associated challenges, and compares existing joint protocols. We also present concluding remarks along with an outline of future research directions.
• Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying(1803.00621)

March 1, 2018 cs.IT, math.IT, eess.SP
This paper considers secrecy of a three node cooperative wireless system in the presence of a passive eavesdropper. The threshold-selection decode-and-forward (DF) relay is considered, which can decode the source message correctly only if a predefined signal-to-noise ratio (SNR) is achieved. The effects of channel state information (CSI) availability on secrecy outage probability (SOP) and ergodic secrecy rate (ESR) are investigated, and closed-form expressions are derived. Diversity is achieved from the direct and relaying paths both at the destination and at the eavesdropper by combinations of maximal-ratio combining (MRC) and selection combining (SC) schemes. An asymptotic analysis is provided when each hop SNR is the same in the balanced case and when it is different in the unbalanced case. The analysis shows that both hops can be a bottleneck for secure communication; however, they do not affect the secrecy identically. While it is observed that CSI knowledge can improve secrecy, the amount of improvement for SOP is more when the required rate is low and for ESR when the operating SNR is also low. It is also shown that the source to eavesdropper link SNR is more crucial for secure communication.
• On the Performance of Network NOMA in Uplink CoMP Systems: A Stochastic Geometry Approach(1803.00168)

March 1, 2018 cs.IT, math.IT
To improve the system throughput, this paper proposes a network non-orthogonal multiple access (N-NOMA) technique for the uplink coordinated multi-point transmission (CoMP). In the considered scenario, multiple base stations collaborate with each other to serve a single user, referred to as the CoMP user, which is the same as for conventional CoMP. However, unlike conventional CoMP, each base station in N-NOMA opportunistically serves an extra user, referred to as the NOMA user, while serving the CoMP user at the same bandwidth. The CoMP user is typically located at the cell-edge, whereas users close to the base stations are scheduled as NOMA users. Hence, the channel conditions of the two kind of users are very distinctive, which facilitates the implementation of NOMA. Compared to the conventional orthogonal multiple access based CoMP scheme, where multiple base stations serve a single CoMP user only, the proposed N-NOMA scheme can support larger connectivity by serving the extra NOMA users, and improve the spectral efficiency by avoiding the CoMP user solely occupying the spectrum. A stochastic geometry approach is applied to model the considered N-NOMA scenario as a Poisson cluster process, based on which closed-form analytical expressions for outage probabilities and ergodic rates are obtained. Numerical results are presented to show the accuracy of the analytical results and also demonstrate the superior performance of the proposed N-NOMA scheme.

Feb. 8, 2018 cs.IT, math.IT, eess.SP
One of the main challenges in high-speed mobile communications is the presence of large Doppler spreads. Thus, accurate estimation of maximum Doppler spread (MDS) plays an important role in improving the performance of the communication link. In this paper, we derive the data-aided (DA) and non-data-aided (NDA) Cramer-Rao lower bounds (CRLBs) and maximum likelihood estimators (MLEs) for the MDS in multiple-input multiple-output (MIMO) frequency-selective fading channel. Moreover, a lowcomplexity NDA-moment-based estimator (MBE) is proposed. The proposed NDA-MBE relies on the second- and fourth-order moments of the received signal, which are employed to estimate the normalized squared autocorrelation function of the fading channel. Then, the problem of MDS estimation is formulated as a non-linear regression problem, and the least-squares curvefitting optimization technique is applied to determine the estimate of the MDS. This is the first time in the literature when DAand NDA-MDS estimation is investigated for MIMO frequency-selective fading channel. Simulation results show that there is no significant performance gap between the derived NDA-MLE and NDA-CRLB even when the observation window is relatively small. Furthermore, the significant reduced-complexity in the NDA-MBE leads to low root-mean-square error (NRMSE) over a wide range of MDSs when the observation window is selected large enough.
• Is Self-Interference in Full-Duplex Communications a Foe or a Friend?(1802.00866)

Feb. 2, 2018 cs.IT, math.IT
This paper studies the potential of harvesting energy from the self-interference of a full-duplex base station. The base station is equipped with a self-interference cancellation switch, which is turned-off for a fraction of the transmission period for harvesting the energy from the self-interference that arises due to the downlink transmission. For the remaining transmission period, the switch is on such that the uplink transmission takes place simultaneously with the downlink transmission. A novel energy-efficiency maximization problem is formulated for the joint design of downlink beamformers, uplink power allocations and transmission time-splitting factor. The optimization problem is nonconvex, and hence, a rapidly converging iterative algorithm is proposed by employing the successive convex approximation approach. Numerical simulation results show significant improvement in the energy-efficiency by allowing self-energy recycling.

Jan. 12, 2018 eess.SP
In this letter, a novel low complexity bit and power loading algorithm is formulated for multicarrier communication systems. The proposed algorithm jointly maximizes the throughput and minimizes the transmit power through a weighting coefficient $\alpha$, while meeting constraints on the target bit error rate (BER) per subcarrier and on the total transmit power. The optimization problem is solved by the Lagrangian multiplier method if the initial $\alpha$ causes the transmit power not to violate the power constraint; otherwise, a bisection search is used to find the appropriate $\alpha$. Closed-form expressions are derived for the close-to-optimal bit and power allocations per subcarrier, average throughput, and average transmit power. Simulation results illustrate the performance of the proposed algorithm and demonstrate its superiority with respect to existing allocation algorithms. Furthermore, the results show that the performance of the proposed algorithm approaches that of the exhaustive search for the discrete optimal allocations.

Jan. 12, 2018 cs.IT, math.IT, eess.SP
In this paper, we propose a novel algorithm to optimize the energy-efficiency (EE) of orthogonal frequency division multiplexing-based cognitive radio systems under channel uncertainties. We formulate an optimization problem that guarantees a minimum required rate and a specified power budget for the secondary user (SU), while restricting the interference to primary users (PUs) in a statistical manner. The optimization problem is non-convex and it is transformed to an equivalent problem using the concept of fractional programming. Unlike all related works in the literature, we consider the effect of imperfect channel-stateinformation (CSI) on the links between the SU transmitter and receiver pairs and we additionally consider the effect of limited sensing capabilities of the SU. Since the interference constraints are met statistically, the SU transmitter does not require perfect CSI feedback from the PUs receivers. Simulation results sho w that the EE deteriorates as the channel estimation error increases. Comparisons with relevant works from the literature show that the interference thresholds at the PUs receivers can be severely exceeded and the EE is slightly deteriorated if the SU does no t account for spectrum sensing errors.
• A Novel Algorithm for Rate/Power Allocation in OFDM-based Cognitive Radio Systems with Statistical Interference Constraints(1801.07566)

Jan. 11, 2018 eess.SP
In this paper, we adopt a multiobjective optimization approach to jointly optimize the rate and power in OFDM-based cognitive radio (CR) systems. We propose a novel algorithm that jointly maximizes the OFDM-based CR system throughput and minimizes its transmit power, while guaranteeing a target bit error rate per subcarrier and a total transmit power threshold for the secondary user (SU), and restricting both co-channel and adjacent channel interferences to existing primary users (PUs) in a statistical manner. Since the interference constraints are met statistically, the SU transmitter does not require perfect channel-state-information (CSI) feedback from the PUs receivers. Closed-form expressions are derived for bit and power allocations per subcarrier. Simulation results illustrate the performance of the proposed algorithm and compare it to the case of perfect CSI. Further, the results show that the performance of the proposed algorithm approaches that of an exhaustive search for the discrete global optimal allocations with significantly reduced computational complexity.
• A Novel Algorithm for Joint Bit and Power Loading for OFDM Systems with Unknown Interference(1801.07567)

Jan. 11, 2018 eess.SP
In this paper, a novel low complexity bit and power loading algorithm is formulated for orthogonal frequency division multiplexing (OFDM) systems operating in fading environments and in the presence of unknown interference. The proposed non-iterative algorithm jointly maximizes the throughput and minimizes the transmitted power, while guaranteeing a target bit error rate (BER) per subcarrier. Closed-form expressions are derived for the optimal bit and power distributions per subcarrier. The performance of the proposed algorithm is investi- gated through extensive simulations. A performance comparison with the algorithm in [1] shows the superiority of the proposed algorithm with reduced computational effort.
• Optimal Bit and Power Loading for OFDM Systems with Average BER and Total Power Constraints(1801.07568)

Jan. 11, 2018 eess.SP
In this paper, a novel joint bit and power loading algorithm is proposed for orthogonal frequency division multi- plexing (OFDM) systems operating in fading environments. The algorithm jointly maximizes the throughput and minimizes the transmitted power, while guaranteeing a target average bit error rate (BER) and meeting a constraint on the total transmit power. Simulation results are described that illustrate the performance of the proposed scheme and demonstrate its superiority when compared to the algorithm in [1].
• Constrained Joint Bit and Power Allocation for Multicarrier Systems(1801.07569)

Jan. 11, 2018 eess.SP
This paper proposes a novel low complexity joint bit and power suboptimal allocation algorithm for multicarrier systems operating in fading environments. The algorithm jointly maximizes the throughput and minimizes the transmitted power, while guaranteeing a target bit error rate (BER) per subcarrier and meeting a constraint on the total transmit power. Simulation results are described that illustrate the performance of the proposed scheme and demonstrate its superiority when compared to the algorithm in [4] with similar or reduced computational complexity. Furthermore, the results show that the performance of the proposed suboptimal algorithm approaches that of an optimal exhaustive search with significantly lower computational complexity.

Jan. 10, 2018 cs.IT, math.IT, eess.SP
In cognitive radio (CR) networks, secondary users (SUs) are allowed to opportunistically access the primary users (PUs) spectrum to improve the spectrum utilization; however, this increases the interference levels at the PUs. In this paper, we consider an orthogonal frequency division multiplexing OFDM-based CR network and investigate the tradeoff between increasing the SU transmission rate (hence improving the spectrum utilization) and reducing the interference levels at the PUs. We formulate a new multiobjective optimization (MOOP) problem that jointly maximizes the SU transmission rate and minimizes its transmit power, while imposing interference thresholds to the PUs. Further, we propose an algorithm to strike a balance between the SU transmission rate and the interference levels to the PUs. The proposed algorithm considers the practical scenario of knowing partial channel state information (CSI) of the links between the SU transmitter and the PUs receivers. Simulation results illustrate the performance of the proposed algorithm and its superiority when compared to the work in the literature.
• Network Coding with Link Layer Cooperation in Wireless Mesh Networks(1801.02117)

Jan. 7, 2018 cs.NI
In recent years, network coding has emerged as an innovative method that helps wireless network approaches its maximum capacity, by combining multiple unicasts in one broadcast. However, the majority of research conducted in this area is yet to fully utilize the broadcasting nature of wireless networks, and still assumes fixed route between the source and destination that every packet should travel through. This assumption not only limits coding opportunities, but can also cause buffer overflow in some specific intermediate nodes. Although some studies considered scattering of the flows dynamically in the network, they still face some limitations. This paper explains pros and cons of some prominent research in network coding and proposes FlexONC (Flexible and Opportunistic Network Coding) as a solution to such issues. The performance results show that FlexONC outperforms previous methods especially in worse quality networks, by better utilizing redundant packets spread in the network.
• Throughput Analysis of Network Coding in Multi-Hop Wireless Mesh Networks Using Queueing Theory(1801.02119)

Jan. 7, 2018 cs.NI
In recent years, a significant amount of research has been conducted to explore the benefits of network coding in different scenarios, from both theoretical and simulation perspectives. In this paper, we utilize queueing theory to propose an analytical framework for bidirectional unicast flows in multi-hop wireless mesh networks, and study throughput of inter-flow network coding. We analytically determine performance metrics such as the probability of successful transmission in terms of collision probability, and feedback mechanism and retransmission. Regarding the coding process, our model uses a multi-class queueing network where coded packets are separated from native packets and have a non-preemptive higher priority over native packets, and both queues are in a stable state. Finally, we use simulations to verify the accuracy of our analytical model.
• Network Coding Implementation Details: A Guidance Document(1801.02120)

Jan. 7, 2018 cs.IT, math.IT, cs.NI
In recent years, network coding has become one of the most interesting fields and has attracted considerable attention from both industry and academia. The idea of network coding is based on the concept of allowing intermediate nodes to encode and combine incoming packets instead of only copy and forward them. This approach, by augmenting the multicast and broadcast efficiency of multi-hop wireless networks, increases the capacity of the network and improves its throughput and robustness. While a wide variety of papers described applications of network coding in different types of networks such as delay tolerant networks, peer to peer networks and wireless sensor networks, the detailed practical implementation of network coding has not been noted in most papers. Since applying network coding in real scenarios requires an acceptable understanding of mathematics and algebra, especially linear equations, reduced row echelon matrices, field and its operations, this paper provides a comprehensive guidance for the implementation of almost all required concepts in network coding. The paper explains the implementation details of network coding in real scenarios and describes the effect of the field size on network coding.
• FlexONC: Joint Cooperative Forwarding and Network Coding with Precise Encoding Conditions(1801.02134)

Jan. 7, 2018 cs.NI
In recent years, network coding has emerged as an innovative method that helps a wireless network approach its maximum capacity, by combining multiple unicasts in one broadcast. However, the majority of research conducted in this area is yet to fully utilize the broadcasting nature of wireless networks, and still assumes fixed route between the source and destination that every packet should travel through. This assumption not only limits coding opportunities, but can also cause buffer overflow in some specific intermediate nodes. Although some studies considered scattering of the flows dynamically in the network, they still face some limitations. This paper explains pros and cons of some prominent research in network coding and proposes a Flexible and Opportunistic Network Coding scheme (FlexONC) as a solution to such issues. Furthermore, this research discovers that the conditions used in previous studies to combine packets of different flows are overly optimistic and would affect the network performance adversarially. Therefore, we provide a more accurate set of rules for packet encoding. The experimental results show that FlexONC outperforms previous methods especially in networks with high bit error rate, by better utilizing redundant packets spread in the network.
• Performance Analysis of Network Coding with IEEE 802.11 DCF in Multi-Hop Wireless Networks(1801.02221)

Jan. 7, 2018 cs.NI
Network coding is an effective idea to boost the capacity of wireless networks, and a variety of studies have explored its advantages in different scenarios. However, there is not much analytical study on throughput and end-to-end delay of network coding in multi-hop wireless networks considering the specifications of IEEE 802.11 Distributed Coordination Function. In this paper, we utilize queuing theory to propose an analytical framework for bidirectional unicast flows in multi-hop wireless mesh networks. We study the throughput and end-to-end delay of inter-flow network coding under the IEEE 802.11 standard with CSMA/CA random access and exponential back-off time considering clock freezing and virtual carrier sensing, and formulate several parameters such as the probability of successful transmission in terms of bit error rate and collision probability, waiting time of packets at nodes, and retransmission mechanism. Our model uses a multi-class queuing network with stable queues, where coded packets have a non-preemptive higher priority over native packets, and forwarding of native packets is not delayed if no coding opportunities are available. Finally, we use computer simulations to verify the accuracy of our analytical model.