• ### Next Generation Backscatter Communication: Systems, Techniques and Applications(1701.07588)

March 27, 2019 cs.IT, math.IT
The rapid growth of IoT driven by recent advancements in consumer electronics, 5G communication technologies, and cloud-computing enabled big-data analytics, has recently attracted tremendous attention from both the industry and academia. One of the major open challenges for IoT is the limited network lifetime due to massive IoT devices being powered by batteries with finite capacities. The low-power and low-complexity backscatter communications (BackCom), which simply relies on passive reflection and modulation of an incident radio-frequency (RF) wave, has emerged to be a promising technology for tackling this challenge. However, the contemporary BackCom has several major limitations, such as short transmission range, low data rate, and uni-directional information transmission. The article aims at introducing the recent advances in the active area of BackCom. Specifically, we provide a systematic introduction of the next generation BackCom covering basic principles, systems, techniques besides IoT applications. Lastly, we describe the IoT application scenarios with the next generation BackCom.
• ### Covert Communication Achieved by A Greedy Relay in Wireless Networks(1708.00905)

Sept. 10, 2018 cs.IT, math.IT
Covert communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this work, we examine the possibility and achievable performance of covert communication in one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding the source's message, while the source tries to detect this covert transmission to discover the illegitimate usage of the resource (e.g., power, spectrum) allocated only for the purpose of forwarding source's information. We propose two strategies for the relay to transmit its covert information, namely fixed-rate and fixed-power transmission schemes, for which the source's detection limits are analysed in terms of the false alarm and miss detection rates and the achievable effective covert rates from the relay to destination are derived. Our examination determines the conditions under which the fixed-rate transmission scheme outperforms the fixed-power transmission scheme, and vice versa, which enables the relay to achieve the maximum effective covert rate. Our analysis indicates that the relay has to forward the source's message to shield its covert transmission and the effective covert rate increases with its forwarding ability (e.g., its maximum transmit power).
• ### Optimal Compression and Transmission Rate Control for Node-Lifetime Maximization(1803.08650)

April 8, 2018 cs.IT, math.IT
We consider a system that is composed of an energy constrained sensor node and a sink node, and devise optimal data compression and transmission policies with an objective to prolong the lifetime of the sensor node. While applying compression before transmission reduces the energy consumption of transmitting the sensed data, blindly applying too much compression may even exceed the cost of transmitting raw data, thereby losing its purpose. Hence, it is important to investigate the trade-off between data compression and transmission energy costs. In this paper, we study the joint optimal compression-transmission design in three scenarios which differ in terms of the available channel information at the sensor node, and cover a wide range of practical situations. We formulate and solve joint optimization problems aiming to maximize the lifetime of the sensor node whilst satisfying specific delay and bit error rate (BER) constraints. Our results show that a jointly optimized compression-transmission policy achieves significantly longer lifetime (90% to 2000%) as compared to optimizing transmission only without compression. Importantly, this performance advantage is most profound when the delay constraint is stringent, which demonstrates its suitability for low latency communication in future wireless networks.
• ### Covert Wireless Communications with Channel Inversion Power Control in Rayleigh Fading(1803.07812)

March 21, 2018 cs.IT, math.IT
Considering Rayleigh fading channels, in this work we adopt channel inversion power control to achieve covert communications, where a transmitter can possibly hide itself from a warden while transmitting information to a receiver. Specifically, we examine the performance of the achieved covert communications in two scenarios in terms of the effective covert rate (ECR), which quantifies the amount of information that the transmitter can reliably convey to the receiver subject to the warden's detection error probability being no less than some specific value. In the first scenario, the noise uncertainty at the warden serves as the enabler of covert communications and our examination shows that increasing the noise uncertainty at the warden and the receiver simultaneously may not continuously improve the ECR. In the second scenario, covert communications are aided by a full-duplex receiver, which always transmits artificial noise (AN) with a random power. Our analysis indicates that the achieved ECR approaches to an upper bound as the transmit power of AN approaches to infinity. This work provides useful guidelines and performance limits on achieving covert communications and potentially hiding a transmitter in practical Rayleigh fading channels.
• ### Error Bounds for Uplink and Downlink 3D Localization in 5G mmWave Systems(1704.03234)

March 4, 2018 cs.IT, math.IT
Location-aware communication systems are expected to play a pivotal part in the next generation of mobile communication networks. Therefore, there is a need to understand the localization limits in these networks, particularly, using millimeter-wave technology (mmWave). Towards that, we address the uplink and downlink localization limits in terms of 3D position and orientation error bounds for mmWave multipath channels. We also carry out a detailed analysis of the dependence of the bounds of different systems parameters. Our key findings indicate that the uplink and downlink behave differently in two distinct ways. First of all, the error bounds have different scaling factors with respect to the number of antennas in the uplink and downlink. Secondly, uplink localization is sensitive to the orientation angle of the user equipment (UE), whereas downlink is not. Moreover, in the considered outdoor scenarios, the non-line-of-sight paths generally improve localization when a line-of-sight path exists. Finally, our numerical results show that mmWave systems are capable of localizing a UE with sub-meter position error, and sub-degree orientation error.
• ### A Novel Receiver Design with Joint Coherent and Non-Coherent Processing(1704.05614)

April 19, 2017 cs.IT, math.IT
In this paper, we propose a novel splitting receiver, which involves joint processing of coherently and non-coherently received signals. Using a passive RF power splitter, the received signal at each receiver antenna is split into two streams which are then processed by a conventional coherent detection (CD) circuit and a power-detection (PD) circuit, respectively. The streams of the signals from all the receiver antennas are then jointly used for information detection. We show that the splitting receiver creates a three-dimensional received signal space, due to the joint coherent and non-coherent processing. We analyze the achievable rate of a splitting receiver, which shows that the splitting receiver provides a rate gain of $3/2$ compared to either the conventional (CD-based) coherent receiver or the PD-based non-coherent receiver in the high SNR regime. We also analyze the symbol error rate (SER) for practical modulation schemes, which shows that the splitting receiver achieves asymptotic SER reduction by a factor of at least $\sqrt{M}-1$ for $M$-QAM compared to either the conventional (CD-based) coherent receiver or the PD-based non-coherent receiver.
• ### Full-Duplex Backscatter Interference Networks Based on Time-Hopping Spread Spectrum(1609.00062)

April 19, 2017 cs.IT, math.IT
Future Internet-of-Things (IoT) is expected to wirelessly connect billions of low-complexity devices. For wireless information transfer (WIT) in IoT, high density of IoT devices and their ad hoc communication result in strong interference which acts as a bottleneck on WIT. Furthermore, battery replacement for the massive number of IoT devices is difficult if not infeasible, making wireless energy transfer (WET) desirable. This motivates: (i) the design of full-duplex WIT to reduce latency and enable efficient spectrum utilization, and (ii) the implementation of passive IoT devices using backscatter antennas that enable WET from one device (reader) to another (tag). However, the resultant increase in the density of simultaneous links exacerbates the interference issue. This issue is addressed in this paper by proposing the design of full-duplex backscatter communication (BackCom) networks, where a novel multiple-access scheme based on time-hopping spread-spectrum (TH-SS) is designed to enable both one-way WET and two-way WIT in coexisting backscatter reader-tag links. Comprehensive performance analysis of BackCom networks is presented in this paper, including forward/backward bit-error rates and WET efficiency and outage probabilities, which accounts for energy harvesting at tags, non-coherent and coherent detection at tags and readers, respectively, and the effects of asynchronous transmissions.
• ### Covert Communication in Wireless Relay Networks(1704.04946)

April 17, 2017 cs.IT, math.IT
Covert communication aims to shield the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this work, for the first time we examine the possibility and achievable performance of covert communication in one-way relay networks. Specifically, the relay opportunistically transmits its own information to the destination covertly on top of forwarding the source's message, while the source tries to detect this covert transmission to discover the illegitimate usage of the recourse (e.g., power, spectrum) allocated only for the purpose of forwarding source's information. The necessary condition that the relay can transmit covertly without being detected is identified and the source's detection limit is derived in terms of the false alarm and miss detection rates. Our analysis indicates that boosting the forwarding ability of the relay (e.g., increasing its maximum transmit power) also increases its capacity to perform the covert communication in terms of achieving a higher effective covert rate subject to some specific requirement on the source's detection performance.
• ### Massive Machine Type Communication with Data Aggregation and Resource Scheduling(1611.03183)

April 13, 2017 cs.IT, math.IT
To enable massive machine type communication (mMTC), data aggregation is a promising approach to reduce the congestion caused by a massive number of machine type devices (MTDs). In this work, we consider a two-phase cellular-based mMTC network where MTDs transmit to aggregators (i.e., aggregation phase) and the aggregated data is then relayed to base stations (i.e., relaying phase). Due to the limited resources, the aggregators not only aggregate data, but also schedule resources among MTDs. We consider two scheduling schemes: random resource scheduling (RRS) and channel-aware resource scheduling (CRS). By leveraging the stochastic geometry, we present a tractable analytical framework to investigate the signal-to-interference ratio (SIR) for each phase, thereby computing the MTD success probability, the average number of successful MTDs and probability of successful channel utilization, which are the key metrics characterizing the overall mMTC performance. Our numerical results show that, although the CRS outperforms the RRS in terms of SIR at the aggregation phase, the simpler RRS has almost the same performance as the CRS for most cases with regards to the overall mMTC performance. Furthermore, the provision of more resources at the aggregation phase is not always beneficial to the mMTC performance.
• ### Covert Communication in Fading Channels under Channel Uncertainty(1703.02169)

March 7, 2017 cs.IT, math.IT
A covert communication system under block fading channels is considered where users experience uncertainty about their channel knowledge. The transmitter seeks to hide the covert communication to a private user by exploiting a legitimate public communication link while the warden tries to detect this covert communication by using a radiometer. We derive the exact expression for the radiometers optimal threshold which determines the performance limit of the wardens detector. Furthermore for given transmission outage constraints the achievable rates for legitimate and covert users are analyzed while maintaining a specific level of covertness. Our numerical results illustrate how the achievable performance is affected by the channel uncertainty and required level of covertness.
• ### Covert Communication with Finite Blocklength in AWGN Channels(1701.08891)

Jan. 31, 2017 cs.IT, math.IT, cs.CR
Covert communication is to achieve a reliable transmission from a transmitter to a receiver while guaranteeing an arbitrarily small probability of this transmission being detected by a warden. In this work, we study the covert communication in AWGN channels with finite blocklength, in which the number of channel uses is finite. Specifically, we analytically prove that the entire block (all available channel uses) should be utilized to maximize the effective throughput of the transmission subject to a predetermined covert requirement. This is a nontrivial result because more channel uses results in more observations at the warden for detecting the transmission. We also determine the maximum allowable transmit power per channel use, which is shown to decrease as the blocklength increases. Despite the decrease in the maximum allowable transmit power per channel use, the maximum allowable total power over the entire block is proved to increase with the blocklength, which leads to the fact that the effective throughput increases with the blocklength.
• ### On Covert Communication with Noise Uncertainty(1612.09027)

Dec. 29, 2016 cs.IT, math.IT
Prior studies on covert communication with noise uncertainty adopted a worst-case approach from the warden's perspective. That is, the worst-case detection performance of the warden is used to assess covertness, which is overly optimistic. Instead of simply considering the worst limit, in this work, we take the distribution of noise uncertainty into account to evaluate the overall covertness in a statistical sense. Specifically, we define new metrics for measuring the covertness, which are then adopted to analyze the maximum achievable rate for a given covertness requirement under both bounded and unbounded noise uncertainty models.
• ### Rate-Achieving Policy in Finite-Horizon Throughput Region for Multi-User Interference Channels(1612.04005)

Dec. 13, 2016 cs.IT, math.IT
This paper studies a wireless network consisting of multiple transmitter-receiver pairs sharing the same spectrum where interference is regarded as noise. Previously, the throughput region of such a network was characterized for either one time slot or an infinite time horizon. This work aims to close the gap by investigating the throughput region for transmissions over a finite time horizon. We derive an efficient algorithm to examine the achievability of any given rate in the finite-horizon throughput region and provide the rate-achieving policy. The computational efficiency of our algorithm comes from the use of A* search with a carefully chosen heuristic function and a tree pruning strategy. We also show that the celebrated max-weight algorithm which finds all achievable rates in the infinite-horizon throughput region fails to work for the finite-horizon throughput region.
• ### Event-Trigger Based Robust-Optimal Control for Energy Harvesting Transmitter(1508.00962)

Nov. 12, 2016 cs.IT, math.IT
This paper studies an online algorithm for an energy harvesting transmitter, where the transmission (completion) time is considered as the system performance. Unlike the existing online algorithms which more or less require the knowledge on the future behavior of the energy-harvesting rate, we consider a practical but significantly more challenging scenario where the energy-harvesting rate is assumed to be totally unknown. Our design is formulated as a robust-optimal control problem which aims to optimize the worst-case performance. The transmit power is designed only based on the current battery energy level and the data queue length directly monitored by the transmitter itself. Specifically, we apply an event-trigger approach in which the transmitter continuously monitors the battery energy and triggers an event when a significant change occurs. Once an event is triggered, the transmit power is updated according to the solution to the robust-optimal control problem, which is given in a simple analytic form. We present numerical results on the transmission time achieved by the proposed design and demonstrate its robust-optimality.
• ### Artificial-Noise-Aided Secure Transmission in Wiretap Channels with Transmitter-Side Correlation(1611.01939)

Nov. 7, 2016 cs.IT, math.IT
This work for the first time examines the impact of transmitter-side correlation on the artificial-noise-aided secure transmission, based on which a new power allocation strategy for artificial noise (AN) is devised for physical layer security enhancement. Specifically, we design a correlation-based power allocation (CPA) for AN, of which the optimality in terms of achieving the minimum secrecy outage probability is analytically proved in the large system regime with the number of transmit antennas approaching infinity. In order to fully reveal the benefits of the CPA, we derive easy-to-evaluate expressions for the secrecy outage probability achieved by the CPA. Our study demonstrates that the CPA is nearly optimal and significantly outperforms the widely-used uniform power allocation (UPA) even for a moderately small number of correlated transmit antennas. Furthermore, our numerical results reveal a fundamental difference between the CPA and UPA. That is when the number of correlated transmit antennas increases, the secrecy outage probability of the CPA always reduces while the secrecy outage probability of the UPA suffers from a saturation point.
• ### Finite-Horizon Throughput Region for Wireless Multi-User Interference Channels(1611.01969)

Nov. 7, 2016 cs.IT, math.IT
This paper studies a wireless network consisting of multiple transmitter-receiver pairs where interference is treated as noise. Previously, the throughput region of such networks was characterized for either one time slot or an infinite time horizon. We aim to fill the gap by investigating the throughput region for transmissions over a finite time horizon. Unlike the infinite-horizon throughput region, which is simply the convex hull of the throughput region of one time slot, the finite-horizon throughput region is generally non-convex. Instead of directly characterizing all achievable rate-tuples in the finite-horizon throughput region, we propose a metric termed the rate margin, which not only determines whether any given rate-tuple is within the throughput region (i.e., achievable or unachievable), but also tells the amount of scaling that can be done to the given achievable (unachievable) rate-tuple such that the resulting rate-tuple is still within (brought back into) the throughput region. Furthermore, we derive an efficient algorithm to find the rate-achieving policy for any given rate-tuple in the finite-horizon throughput region.
• ### Device-to-Device Communication Underlaying a Finite Cellular Network Region(1510.03162)

Oct. 27, 2016 cs.IT, math.IT
Underlay in-band device-to-device (D2D) communication can improve the spectrum efficiency of cellular networks. However, the coexistence of D2D and cellular users causes inter-cell and intra-cell interference. The former can be effectively managed through inter-cell interference coordination and, therefore, is not considered in this work. Instead, we focus on the intra-cell interference and propose a D2D mode selection scheme to manage it inside a finite cellular network region. The potential D2D users are controlled by the base station (BS) to operate in D2D mode based on the average interference generated to the BS. Using stochastic geometry, we study the outage probability experienced at the BS and a D2D receiver, and spectrum reuse ratio, which quantifies the average fraction of successfully transmitting D2D users. The analysis shows that the outage probability at the D2D receiver varies for different locations. Additionally, without impairing the performance at the BS, if the path-loss exponent on the cellular link is slightly lower than that on the D2D link, the spectrum reuse ratio can have negligible decrease while the D2D users' average number of successful transmissions increases with increasing D2D node density. This indicates that an increasing level of D2D communication can be beneficial in future networks..
• ### Offline Delay-Optimal Transmission for Energy Harvesting Nodes(1607.07508)

July 26, 2016 cs.IT, math.IT
This paper investigates the offline packet-delay-minimization problem for an energy harvesting transmitter. To overcome the non-convexity of the problem, we propose a C2-diffeomorphic transformation and provide the necessary and sufficient condition for the transformed problem to a standard convex optimization problem. Based on this condition, a simple choice of the transformation is determined which allows an analytically tractable solution of the original non-convex problem to be easily obtained once the transformed convex problem is solved. We further study the structure of the optimal transmission policy in a special case and find it to follow a weighted-directional-water-filling structure. In particular, the optimal policy tends to allocate more power in earlier time slots and less power in later time slots. Our analytical insight is verified by simulation results.
• ### On Secrecy Metrics for Physical Layer Security over Quasi-Static Fading Channels(1607.05457)

July 19, 2016 cs.IT, math.IT
Theoretical studies on physical layer security often adopt the secrecy outage probability as the performance metric for wireless communications over quasi-static fading channels. The secrecy outage probability has two limitations from a practical point of view: a) it does not give any insight into the eavesdropper's decodability of confidential messages; b) it cannot characterize the amount of information leakage to the eavesdropper when an outage occurs. Motivated by the limitations of the secrecy outage probability, we propose three new secrecy metrics for secure transmissions over quasi-static fading channels. The first metric establishes a link between the concept of secrecy outage and the decodability of messages at the eavesdropper. The second metric provides an error-probability-based secrecy metric which is typically used for the practical implementation of secure wireless systems. The third metric characterizes how much or how fast the confidential information is leaked to the eavesdropper. We show that the proposed secrecy metrics collectively give a more comprehensive understanding of physical layer security over fading channels and enable one to appropriately design secure communication systems with different views on how secrecy is measured.
• ### Mode Selection, Resource Allocation and Power Control for D2D-Enabled Two-Tier Cellular Network(1509.00123)

April 7, 2016 cs.IT, math.IT
This paper proposes a centralized decision making framework at the macro base station (MBS) for device to device (D2D) communication underlaying a two-tier cellular network. We consider a D2D pair in the presence of an MBS and a femto access point, each serving a user, with quality of service constraints for all users. Our proposed solution encompasses mode selection (choosing between cellular or reuse or dedicated mode), resource allocation (in cellular and dedicated mode) and power control (in reuse mode) within a single framework. The framework prioritizes D2D dedicated mode if the D2D pair are close to each other and orthogonal resources are available. Otherwise, it allows D2D reuse mode if the D2D satisfies both the maximum distance and an additional interference criteria. For reuse mode, we present a geometric vertex search approach to solve the power allocation problem. We analytically prove the validity of this approach and show that it achieves near optimal performance. For cellular and dedicated modes, we show that frequency sharing maximizes sum rate and solve the resource allocation problem in closed form. Our simulations demonstrate the advantages of the proposed framework in terms of the performance gains achieved in D2D mode.
• ### Energy Harvesting Wireless Sensor Networks: Delay Analysis Considering Energy Costs of Sensing and Transmission(1509.06089)

March 15, 2016 cs.IT, math.IT
Energy harvesting (EH) provides a means of greatly enhancing the lifetime of wireless sensor nodes. However, the randomness inherent in the EH process may cause significant delay for performing sensing operation and transmitting the sensed information to the sink. Unlike most existing studies on the delay performance of EH sensor networks, where only the energy consumption of transmission is considered, we consider the energy costs of both sensing and transmission. Specifically, we consider an EH sensor that monitors some status environmental property and adopts a harvest-then-use protocol to perform sensing and transmission. To comprehensively study the delay performance, we consider two complementary metrics and analytically derive their statistics: (i) update age - measuring the time taken from when information is obtained by the sensor to when the sensed information is successfully transmitted to the sink, i.e., how timely the updated information at the sink is, and (ii) update cycle - measuring the time duration between two consecutive successful transmissions, i.e., how frequently the information at the sink is updated. Our results show that the consideration of sensing energy cost leads to an important tradeoff between the two metrics: more frequent updates result in less timely information available at the sink.
• ### Secure Routing in Multihop Wireless Ad-hoc Networks with Decode-and-Forward Relaying(1510.00082)

Dec. 26, 2015 cs.IT, math.IT
In this paper, we study the problem of secure routing in a multihop wireless ad-hoc network in the presence of randomly distributed eavesdroppers. Specifically, the locations of the eavesdroppers are modeled as a homogeneous Poisson point process (PPP) and the source-destination pair is assisted by intermediate relays using the decode-and-forward (DF) strategy. We analytically characterize the physical layer security performance of any chosen multihop path using the end-to-end secure connection probability (SCP) for both colluding and non-colluding eavesdroppers. To facilitate finding an efficient solution to secure routing, we derive accurate approximations of the SCP. Based on the SCP approximations, we study the secure routing problem which is defined as finding the multihop path having the highest SCP. A revised Bellman-Ford algorithm is adopted to find the optimal path in a distributed manner. Simulation results demonstrate that the proposed secure routing scheme achieves nearly the same performance as exhaustive search.
• ### Secure Communication with a Wireless-Powered Friendly Jammer(1412.0349)

Aug. 26, 2015 cs.IT, math.IT
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission. In the first phase, wireless power transfer is conducted from the source to the jammer. In the second phase, the source transmits the information-bearing signal under the protection of a jamming signal sent by the jammer using the harvested energy in the first phase. We analytically characterize the long-time behavior of the proposed protocol and derive a closed-form expression for the throughput. We further optimize the rate parameters for maximizing the throughput subject to a secrecy outage probability constraint. Our analytical results show that the throughput performance differs significantly between the single-antenna jammer case and the multi-antenna jammer case. For instance, as the source transmit power increases, the throughput quickly reaches an upper bound with single-antenna jammer, while the throughput grows unbounded with multi-antenna jammer. Our numerical results also validate the derived analytical results.
• ### Achieving secrecy without knowing the number of eavesdropper antennas(1508.00105)

Aug. 1, 2015 cs.IT, math.IT
The existing research on physical layer security commonly assumes the number of eavesdropper antennas to be known. Although this assumption allows one to easily compute the achievable secrecy rate, it can hardly be realized in practice. In this paper, we provide an innovative approach to study secure communication systems without knowing the number of eavesdropper antennas by introducing the concept of spatial constraint into physical layer security. Specifically, the eavesdropper is assumed to have a limited spatial region to place (possibly an infinite number of) antennas. From a practical point of view, knowing the spatial constraint of the eavesdropper is much easier than knowing the number of eavesdropper antennas. We derive the achievable secrecy rates of the spatially-constrained system with and without friendly jamming. We show that a non-zero secrecy rate is achievable with the help of a friendly jammer, even if the eavesdropper places an infinite number of antennas in its spatial region. Furthermore, we find that the achievable secrecy rate does not monotonically increase with the jamming power, and hence, we obtain the closed-form solution of the optimal jamming power that maximizes the secrecy rate.
• ### Interference Prediction in Mobile Ad Hoc Networks with a General Mobility Model(1503.08889)

April 2, 2015 cs.IT, math.IT
In a mobile ad hoc network (MANET), effective prediction of time-varying interferences can enable adaptive transmission designs and therefore improve the communication performance. This paper investigates interference prediction in MANETs with a finite number of nodes by proposing and using a general-order linear model for node mobility. The proposed mobility model can well approximate node dynamics of practical MANETs. In contrast to previous studies on interference statistics, we are able through this model to give a best estimate of the time-varying interference at any time rather than long-term average effects. Specifically, we propose a compound Gaussian point process functional as a general framework to obtain analytical results on the mean value and moment-generating function of the interference prediction. With a series form of this functional, we give the necessary and sufficient condition for when the prediction is essentially equivalent to that from a Binomial Point Process (BPP) network in the limit as time goes to infinity. These conditions permit one to rigorously determine when the commonly used BPP approximations are valid. Finally, our simulation results corroborate the effectiveness and accuracy of the analytical results on interference prediction and also show the advantages of our method in dealing with complex mobilities.