-
Deep Q-Learning Based Resource Allocation in Interference Systems With Outage Constraint
Authors:
Saniul Alam,
Sadia Islam,
Muhammad R. A. Khandaker,
Risala T. Khan,
Faisal Tariq,
Apriana Toding
Abstract:
This correspondence considers the resource allocation problem in wireless interference channel (IC) under link outage constraints. Since the optimization problem is non-convex in nature, existing approaches to find the optimal power allocation are computationally intensive and thus practically infeasible. Recently, deep reinforcement learning has shown promising outcome in solving non-convex optim…
▽ More
This correspondence considers the resource allocation problem in wireless interference channel (IC) under link outage constraints. Since the optimization problem is non-convex in nature, existing approaches to find the optimal power allocation are computationally intensive and thus practically infeasible. Recently, deep reinforcement learning has shown promising outcome in solving non-convex optimization problems with reduced complexity. In this correspondence, we utilize a deep Q-learning (DQL) approach which interacts with the wireless environment and learns the optimal power allocation of a wireless IC while maximizing overall sum-rate of the system and maintaining reliability requirement of each link. We have used two separate deep Q-networks to remove the inherent instability in learning process. Simulation results demonstrate that the proposed DQL approach outperforms existing geometric programming based solution.
△ Less
Submitted 5 March, 2022;
originally announced March 2022.
-
Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare
Authors:
Shakila Zaman,
Muhammad R. A. Khandaker,
Risala T. Khan,
Faisal Tariq,
Kai-Kit Wong
Abstract:
The Internet-of-Things (IoT) is an emerging and cognitive technology which connects a massive number of smart physical devices with virtual objects operating in diverse platforms through the internet. IoT is increasingly being implemented in distributed settings, making footprints in almost every sector of our life. Unfortunately, for healthcare systems, the entities connected to the IoT networks…
▽ More
The Internet-of-Things (IoT) is an emerging and cognitive technology which connects a massive number of smart physical devices with virtual objects operating in diverse platforms through the internet. IoT is increasingly being implemented in distributed settings, making footprints in almost every sector of our life. Unfortunately, for healthcare systems, the entities connected to the IoT networks are exposed to an unprecedented level of security threats. Relying on a huge volume of sensitive and personal data, IoT healthcare systems are facing unique challenges in protecting data security and privacy. Although blockchain has posed to be the solution in this scenario thanks to its inherent distributed ledger technology (DLT), it suffers from major setbacks of increasing storage and computation requirements with the network size. This paper proposes a holochain-based security and privacy-preserving framework for IoT healthcare systems that overcomes these challenges and is particularly suited for resource constrained IoT scenarios. The performance and thorough security analyses demonstrate that a holochain-based IoT healthcare system is significantly better compared to blockchain and other existing systems.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
-
Gridded UAV Swarm for Secrecy Rate Maximization with Unknown Eavesdropper
Authors:
Christantus O. Nnamani,
Muhammad R. A. Khandaker,
Mathini Sellathurai
Abstract:
This paper considers grid formation of an unmanned aerial vehicle (UAV) swarm for maximizing the secrecy rate in the presence of an unknown eavesdropper. In particular, the UAV swarm performs coordinated beamforming onto the null space of the legitimate channel to jam the eavesdropper located at an unknown location. By nulling the channel between the legitimate receiver and the UAV swarm, we obtai…
▽ More
This paper considers grid formation of an unmanned aerial vehicle (UAV) swarm for maximizing the secrecy rate in the presence of an unknown eavesdropper. In particular, the UAV swarm performs coordinated beamforming onto the null space of the legitimate channel to jam the eavesdropper located at an unknown location. By nulling the channel between the legitimate receiver and the UAV swarm, we obtain an optimal trajectory and jamming power allocation for each UAV enabling wideband single ray beamforming to improve the secrecy rate. Results obtained demonstrate the effectiveness of the proposed UAV-aided jamming scheme as well as the optimal number of UAVs in the swarm necessary to observe a saturation effect in the secrecy rate. We also show the optimal radius of the unknown but constrained location of the eavesdropper.
△ Less
Submitted 5 February, 2021;
originally announced February 2021.
-
Joint Beamforming and Location Optimization for Secure Data Collection in Wireless Sensor Networks with UAV-Carried Intelligent Reflecting Surface
Authors:
Christantus O. Nnamani,
Muhammad R. A. Khandaker,
Mathini Sellathurai
Abstract:
This paper considers unmanned aerial vehicle (UAV)-carried intelligent reflecting surface (IRS) for secure data collection in wireless sensor networks. An eavesdropper (Eve) lurks within the vicinity of the main receiver (Bob) while several randomly placed sensor nodes beamform collaboratively to the UAV-carried IRS that reflects the signal to the main receiver (Bob). The design objective is to ma…
▽ More
This paper considers unmanned aerial vehicle (UAV)-carried intelligent reflecting surface (IRS) for secure data collection in wireless sensor networks. An eavesdropper (Eve) lurks within the vicinity of the main receiver (Bob) while several randomly placed sensor nodes beamform collaboratively to the UAV-carried IRS that reflects the signal to the main receiver (Bob). The design objective is to maximise the achievable secrecy rate in the noisy communication channel by jointly optimizing the collaborative beamforming weights of the sensor nodes, the trajectory of the UAV and the reflection coefficients of the IRS elements. By designing the IRS reflection coefficients with and without the knowledge of the eavesdropper's channel, we develop a non-iterative sub-optimal solution for the secrecy rate maximization problem. It has been shown analytically that the UAV flight time and the randomness in the distribution of the sensor nodes, obtained by varying the sensor distribution area, can greatly affect secrecy performance. In addition, the maximum allowable number of IRS elements as well as a bound on the attainable average secrecy rate of the IRS aided noisy communication channel have also been derived. Extensive simulation results demonstrate the superior performance of the proposed algorithms compared to the existing schemes.
△ Less
Submitted 16 January, 2021;
originally announced January 2021.
-
An Automated Contact Tracing Approach for Controlling Covid-19 Spread Based on Geolocation Data from Mobile Cellular Networks
Authors:
Md. Tanvir Rahman,
Risala T. Khan,
Muhammad R. A. Khandaker,
Md. Sifat Ar Salan
Abstract:
The coronavirus (COVID-19) has appeared as the greatest challenge due to its continuous structural evolution as well as the absence of proper antidotes for this particular virus. The virus mainly spreads and replicates itself among mass people through close contact which unfortunately can happen in many unpredictable ways. Therefore, to slow down the spread of this novel virus, the only relevant i…
▽ More
The coronavirus (COVID-19) has appeared as the greatest challenge due to its continuous structural evolution as well as the absence of proper antidotes for this particular virus. The virus mainly spreads and replicates itself among mass people through close contact which unfortunately can happen in many unpredictable ways. Therefore, to slow down the spread of this novel virus, the only relevant initiatives are to maintain social distance, perform contact tracing, use proper safety gears, and impose quarantine measures. But despite being theoretically possible, these approaches are very difficult to uphold in densely populated countries and areas. Therefore, to control the virus spread, researchers and authorities are considering the use of smartphone based mobile applications (apps) to identify the likely infected persons as well as the highly risky zones to maintain isolation and lockdown measures. However, these methods heavily depend on advanced technological features and expose significant privacy loopholes. In this paper, we propose a new method for COVID-19 contact tracing based on mobile phone users' geolocation data. The proposed method will help the authorities to identify the number of probable infected persons without using smartphone based mobile applications. In addition, the proposed method can help people take the vital decision of when to seek medical assistance by letting them know whether they are already in the list of exposed persons. Numerical examples demonstrate that the proposed method can significantly outperform the smartphone app-based solutions.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Lightweight Cryptography for IoT: A State-of-the-Art
Authors:
Vishal A. Thakor,
M. A. Razzaque,
Muhammad R. A. Khandaker
Abstract:
With the emergence of 5G, Internet of Things (IoT) has become a center of attraction for almost all industries due to its wide range of applications from various domains. The explosive growth of industrial control processes and the industrial IoT, imposes unprecedented vulnerability to cyber threats in critical infrastructure through the interconnected systems. This new security threats could be m…
▽ More
With the emergence of 5G, Internet of Things (IoT) has become a center of attraction for almost all industries due to its wide range of applications from various domains. The explosive growth of industrial control processes and the industrial IoT, imposes unprecedented vulnerability to cyber threats in critical infrastructure through the interconnected systems. This new security threats could be minimized by lightweight cryptography, a sub-branch of cryptography, especially derived for resource-constrained devices such as RFID tags, smart cards, wireless sensors, etc. More than four dozens of lightweight cryptography algorithms have been proposed, designed for specific application(s). These algorithms exhibit diverse hardware and software performances in different circumstances. This paper presents the performance comparison along with their reported cryptanalysis, mainly for lightweight block ciphers, and further shows new research directions to develop novel algorithms with right balance of cost, performance and security characteristics.
△ Less
Submitted 24 June, 2020;
originally announced June 2020.
-
Truly Intelligent Reflecting Surface-Aided Secure Communication Using Deep Learning
Authors:
Yizhuo Song,
Muhammad R. A. Khandaker,
Faisal Tariq,
Kai-Kit Wong,
Apriana Toding
Abstract:
This paper considers machine learning for physical layer security design for communication in a challenging wireless environment. The radio environment is assumed to be programmable with the aid of a meta material-based intelligent reflecting surface (IRS) allowing customisable path loss, multi-path fading and interference effects. In particular, the fine-grained reflections from the IRS elements…
▽ More
This paper considers machine learning for physical layer security design for communication in a challenging wireless environment. The radio environment is assumed to be programmable with the aid of a meta material-based intelligent reflecting surface (IRS) allowing customisable path loss, multi-path fading and interference effects. In particular, the fine-grained reflections from the IRS elements are exploited to create channel advantage for maximizing the secrecy rate at a legitimate receiver. A deep learning (DL) technique has been developed to tune the reflections of the IRS elements in real-time. Simulation results demonstrate that the DL approach yields comparable performance to the conventional approaches while significantly reducing the computational complexity.
△ Less
Submitted 20 February, 2021; v1 submitted 6 April, 2020;
originally announced April 2020.
-
UAV-Aided Jamming for Secure Ground Communication with Unknown Eavesdropper Location
Authors:
Christantus O. Nnamani,
Muhammad R. A. Khandaker,
Mathini Sellathurai
Abstract:
This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown. We assume that the unknown eavesdropper location is within an ellipse characterizing the coverage region of the transmitter. By sequentially optimizing the transmit power, the flight path of the UAV and its jamming…
▽ More
This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown. We assume that the unknown eavesdropper location is within an ellipse characterizing the coverage region of the transmitter. By sequentially optimizing the transmit power, the flight path of the UAV and its jamming power, we aim at maximizing the average secrecy rate with arbitrary eavesdropper location. Simulation results demonstrate that the optimal flight path obtains better secrecy rate performance compared to that using direct UAV flight path encasing the transmitter and the legitimate receiver. Most importantly, even with the unknown eavesdropper location, we obtained a secrecy rate that is comparable to a scenario when the eavesdropper's location is known. However, the average secrecy rate with the unknown eavesdropper location varies depending on the proximity of the eavesdropper to the known location of the transmitter. We also observe that due to the UAV-aided jamming, the average secrecy rate stabilizes at some point even though the average received envelope power of the eavesdropper increases. This essentially demonstrates the effectiveness of the proposed scheme.
△ Less
Submitted 25 November, 2019;
originally announced November 2019.
-
Learning the Wireless V2I Channels Using Deep Neural Networks
Authors:
Tian-Hao Li,
Muhammad R. A. Khandaker,
Faisal Tariq,
Kai-Kit Wong,
Risala T. Khan
Abstract:
For high data rate wireless communication systems, develo** an efficient channel estimation approach is extremely vital for channel detection and signal recovery. With the trend of high-mobility wireless communications between vehicles and vehicles-to-infrastructure (V2I), V2I communications pose additional challenges to obtaining real-time channel measurements. Deep learning (DL) techniques, in…
▽ More
For high data rate wireless communication systems, develo** an efficient channel estimation approach is extremely vital for channel detection and signal recovery. With the trend of high-mobility wireless communications between vehicles and vehicles-to-infrastructure (V2I), V2I communications pose additional challenges to obtaining real-time channel measurements. Deep learning (DL) techniques, in this context, offer learning ability and optimization capability that can approximate many kinds of functions. In this paper, we develop a DL-based channel prediction method to estimate channel responses for V2I communications. We have demonstrated how fast neural networks can learn V2I channel properties and the changing trend. The network is trained with a series of channel responses and known pilots, which then speculates the next channel response based on the acquired knowledge. The predicted channel is then used to evaluate the system performance.
△ Less
Submitted 10 July, 2019;
originally announced July 2019.
-
Deep Neural Network Based Resource Allocation for V2X Communications
Authors:
** Gao,
Muhammad R. A. Khandaker,
Faisal Tariq,
Kai-Kit Wong,
Risala T. Khan
Abstract:
This paper focuses on optimal transmit power allocation to maximize the overall system throughput in a vehicle-to-everything (V2X) communication system. We propose two methods for solving the power allocation problem namely the weighted minimum mean square error (WMMSE) algorithm and the deep learning-based method. In the WMMSE algorithm, we solve the problem using block coordinate descent (BCD) m…
▽ More
This paper focuses on optimal transmit power allocation to maximize the overall system throughput in a vehicle-to-everything (V2X) communication system. We propose two methods for solving the power allocation problem namely the weighted minimum mean square error (WMMSE) algorithm and the deep learning-based method. In the WMMSE algorithm, we solve the problem using block coordinate descent (BCD) method. Then we adopt supervised learning technique for the deep neural network (DNN) based approach considering the power allocation from the WMMSE algorithm as the target output. We exploit an efficient implementation of the mini-batch gradient descent algorithm for training the DNN. Extensive simulation results demonstrate that the DNN algorithm can provide very good approximation of the iterative WMMSE algorithm reducing the computational overhead significantly.
△ Less
Submitted 24 June, 2019;
originally announced June 2019.
-
Secure Full-Duplex Two-Way Relaying for SWIPT
Authors:
Alexander A. Okandeji,
Muhammad R. A. Khandaker,
Kai-Kit Wong,
Gan Zheng,
Yangyang Zhang,
Zhongbin Zheng
Abstract:
This letter studies bi-directional secure information exchange in a simultaneous wireless information and power transfer (SWIPT) system enabled by a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. The AF relay injects artificial noise (AN) in order to confuse the eavesdropper. Specifically, we assume a zeroforcing (ZF) solution constraint to eliminate the res…
▽ More
This letter studies bi-directional secure information exchange in a simultaneous wireless information and power transfer (SWIPT) system enabled by a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. The AF relay injects artificial noise (AN) in order to confuse the eavesdropper. Specifically, we assume a zeroforcing (ZF) solution constraint to eliminate the residual self-interference (RSI). As a consequence, we address the optimal joint design of the ZF matrix and the AN covariance matrix at the relay node as well as the transmit power at the sources. We propose an alternating algorithm utilizing semi-definite programming (SDP) technique and one-dimensional searching to achieve the optimal solution. Simulation results are provided to demonstrate the effectiveness of the proposed algorithm.
△ Less
Submitted 24 September, 2017;
originally announced September 2017.
-
Secure Full-Duplex Device-to-Device Communication
Authors:
Muhammad R. A. Khandaker,
Christos Masouros,
Kai-Kit Wong
Abstract:
This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to li…
▽ More
This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.
△ Less
Submitted 7 September, 2017;
originally announced September 2017.
-
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks
Authors:
Ali Kuhestani,
Abbas Mohammadi,
Kai-Kit Wong,
Phee Lep Yeoh,
Majid Moradikia,
Muhammad Ruhul Amin Khandaker
Abstract:
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA)…
▽ More
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA) system, while the rest are equipped with a single antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming (DBCJ). Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP). We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency (RF) front ends of each node, the system's secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate.
△ Less
Submitted 5 September, 2017;
originally announced September 2017.
-
Energy Harvesting Enabled MIMO Relaying through Time Switching
Authors:
Jialing Liao,
Muhammad R. A. Khandaker,
Kai-Kit Wong
Abstract:
This letter considers simultaneous wireless information and power transfer (SWIPT) for a multiple-input multiple-output (MIMO) relay system. The relay is powered by harvesting energy from the source via time switching (TS) and utilizes the harvested energy to forward the information signal. Our aim is to maximize the rate of the system subject to the power constraints at both the source and relay…
▽ More
This letter considers simultaneous wireless information and power transfer (SWIPT) for a multiple-input multiple-output (MIMO) relay system. The relay is powered by harvesting energy from the source via time switching (TS) and utilizes the harvested energy to forward the information signal. Our aim is to maximize the rate of the system subject to the power constraints at both the source and relay nodes. In the first scenario in which the source covariance matrix is an identity matrix, we present the joint-optimal solution for relaying and the TS ratio in closed form. An iterative scheme is then proposed for jointly optimizing the source and relaying matrices and the TS ratio.
△ Less
Submitted 10 April, 2017;
originally announced April 2017.
-
Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications
Authors:
Amrita Mukherjee,
Tamaghna Acharya,
Muhammad R. A. Khandaker
Abstract:
In this paper, we study a cooperative cognitive radio network (CCRN) where the secondary user-transmitter (SU-Tx) assists bi-directional communication between a pair of primary users (PUs) following the principle of two-way relaying. In return, it gets access to the spectrum of the PUs to enable its own transmission to SU-receiver (SU-Rx). Further, in order to support sustainable operation of the…
▽ More
In this paper, we study a cooperative cognitive radio network (CCRN) where the secondary user-transmitter (SU-Tx) assists bi-directional communication between a pair of primary users (PUs) following the principle of two-way relaying. In return, it gets access to the spectrum of the PUs to enable its own transmission to SU-receiver (SU-Rx). Further, in order to support sustainable operation of the network, SU-Tx is assumed to harvest energy from the RF signals received from the PUs, using the technique of simultaneous wireless information and power transfer (SWIPT). Assuming a decode-and-forward behaviour and power-splitting based relaying protocol at SU-Tx, closed form expressions for outage probability of PU and SU are obtained. Simulation results validate our analytical results and illustrate spectrum-efficiency and energy-efficiency advantages of the proposed system over one-way relaying.
△ Less
Submitted 5 April, 2017;
originally announced April 2017.
-
Interference Exploitation in Full Duplex Communications: Trading Interference Power for Both Uplink and Downlink Power Savings
Authors:
Mahmoud T. Kabir,
Muhammad R. A. Khandaker,
Christos Masouros
Abstract:
This paper considers a multiuser full-duplex (FD) wireless communication system, where a FD radio base station (BS) serves multiple single-antenna half-duplex (HD) uplink and downlink users simultaneously. Unlike conventional interference mitigation approaches, we propose to use the knowledge of the data symbols and the channel state information (CSI) at the FD radio BS to exploit the multi-user i…
▽ More
This paper considers a multiuser full-duplex (FD) wireless communication system, where a FD radio base station (BS) serves multiple single-antenna half-duplex (HD) uplink and downlink users simultaneously. Unlike conventional interference mitigation approaches, we propose to use the knowledge of the data symbols and the channel state information (CSI) at the FD radio BS to exploit the multi-user interference constructively rather than to suppress it. We propose a multi-objective optimisation problem (MOOP) via the weighted Tchebycheff method to study the trade-off between the two desirable system design objectives namely the total downlink transmit power minimisation and the total uplink transmit power minimisation problems at the same time ensuring the required quality-of-service (QoS) for all users. In the proposed MOOP, we adapt the QoS constraints for the downlink users to accommodate constructive interference (CI) for both generic phase shift keying (PSK) modulated signals as well as for quadrature amplitude modulated (QAM) signals. We also extended our work to a robust design to study the system with imperfect uplink, downlink and self-interference CSI. Simulation results and analysis show that, significant power savings can be obtained. More importantly, however, the MOOP approach here allows for the power saved to be traded off for both uplink and downlink power savings, leading to an overall energy efficiency improvement in the wireless link.
△ Less
Submitted 30 March, 2017;
originally announced March 2017.
-
Energy Harvesting Enabled MIMO Relaying through PS
Authors:
Jialing Liao,
Muhammad R. A. Khandaker,
Kai-Kit Wong
Abstract:
This paper considers a multiple-input multiple-output (MIMO) relay system with an energy harvesting relay node. All nodes are equipped with multiple antennas, and the relay node depends on the harvested energy from the received signal to support information forwarding. In particular, the relay node deploys power splitting based energy harvesting scheme. The capacity maximization problem subject to…
▽ More
This paper considers a multiple-input multiple-output (MIMO) relay system with an energy harvesting relay node. All nodes are equipped with multiple antennas, and the relay node depends on the harvested energy from the received signal to support information forwarding. In particular, the relay node deploys power splitting based energy harvesting scheme. The capacity maximization problem subject to power constraints at both the source and relay nodes is considered for both fixed source covariance matrix and optimal source covariance matrix cases. Instead of using existing software solvers, iterative approaches using dual decomposition technique are developed based on the structures of the optimal relay precoding and source covariance matrices. Simulation results demonstrate the performance gain of the joint optimization against the fixed source covariance matrix case.
△ Less
Submitted 30 March, 2017;
originally announced March 2017.
-
One- and Two-Way Relay Optimization for MIMO Interference Networks
Authors:
Muhammad R A Khandaker,
Kai-Kit Wong
Abstract:
This paper considers multiple-input multiple-output (MIMO) relay communication in multi-cellular (interference) systems in which MIMO source-destination pairs communicate simultaneously. It is assumed that due to severe attenuation and/or shadowing effects, communication links can be established only with the aid of a relay node. The aim is to minimize the maximal mean-square-error (MSE) among all…
▽ More
This paper considers multiple-input multiple-output (MIMO) relay communication in multi-cellular (interference) systems in which MIMO source-destination pairs communicate simultaneously. It is assumed that due to severe attenuation and/or shadowing effects, communication links can be established only with the aid of a relay node. The aim is to minimize the maximal mean-square-error (MSE) among all the receiving nodes under constrained source and relay transmit powers. Both one- and two-way amplify-and-forward (AF) relaying mechanisms are considered. Since the exactly optimal solution for this practically appealing problem is intractable, we first propose optimizing the source, relay, and receiver matrices in an alternating fashion. Then we contrive a simplified semidefinite programming (SDP) solution based on the error covariance matrix decomposition technique, avoiding the high complexity of the iterative process. Numerical results reveal the effectiveness of the proposed schemes.
△ Less
Submitted 27 March, 2017;
originally announced March 2017.
-
Truth-Telling Mechanism for Secure Two-Way Relay Communications with Energy-Harvesting Revenue
Authors:
Muhammad R. A. Khandaker,
Kai-Kit Wong,
Gan Zheng
Abstract:
This paper brings the novel idea of paying the utility to the winning agents in terms of some physical entity in cooperative communications. Our setting is a secret two-way communication channel where two transmitters exchange information in the presence of an eavesdropper. The relays are selected from a set of interested parties such that the secrecy sum rate is maximized. In return, the selected…
▽ More
This paper brings the novel idea of paying the utility to the winning agents in terms of some physical entity in cooperative communications. Our setting is a secret two-way communication channel where two transmitters exchange information in the presence of an eavesdropper. The relays are selected from a set of interested parties such that the secrecy sum rate is maximized. In return, the selected relay nodes' energy harvesting requirements will be fulfilled up to a certain threshold through their own payoff so that they have the natural incentive to be selected and involved in the communication. However, relays may exaggerate their private information in order to improve their chance to be selected. Our objective is to develop a mechanism for relay selection that enforces them to reveal the truth since otherwise they may be penalized. We also propose a joint cooperative relay beamforming and transmit power optimization scheme based on an alternating optimization approach. Note that the problem is highly non-convex since the objective function appears as a product of three correlated Rayleigh quotients. While a common practice in the existing literature is to optimize the relay beamforming vector for given transmit power via rank relaxation, we propose a second-order cone programming (SOCP)-based approach in this paper which requires a significantly lower computational task. The performance of the incentive control mechanism and the optimization algorithm has been evaluated through numerical simulations.
△ Less
Submitted 21 March, 2017; v1 submitted 19 March, 2017;
originally announced March 2017.
-
Simultaneous Wireless Information and Power Transfer in MISO Full-Duplex Systems
Authors:
Alexander A. Okandeji,
Muhammad R. A. Khandaker,
Kai-Kit Wong,
Gan Zheng,
Yangyang Zhang,
Zhongbin Zheng
Abstract:
This paper investigates a multiuser multiple-input single-output (MISO) full-duplex (FD) system for simultaneous wireless information and power transfer (SWIPT), in which a multi-antenna base station (BS) simultaneously sends wirelessly information and power to a set of single-antenna mobile stations (MSs) using power splitters (PSs) in the downlink and receives information in the uplink in FD mod…
▽ More
This paper investigates a multiuser multiple-input single-output (MISO) full-duplex (FD) system for simultaneous wireless information and power transfer (SWIPT), in which a multi-antenna base station (BS) simultaneously sends wirelessly information and power to a set of single-antenna mobile stations (MSs) using power splitters (PSs) in the downlink and receives information in the uplink in FD mode. In particular, we address the joint design of the receive PS ratio and the transmit power at the MSs, and the beamforming matrix at the BS under signal-to-interference-plus-noise ratio (SINR) and the harvested power constraints. Using semidefinite relaxation (SDR), we obtain the solution to the problem with imperfect channel state information (CSI) of the self-interfering channels. Furthermore, we propose another suboptimal zero-forcing (ZF) based solution by separating the optimization of the transmit beamforming vector and the PS ratio. Simulation results are provided to evaluate the performance of the proposed beamforming designs.
△ Less
Submitted 16 March, 2017;
originally announced March 2017.
-
Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security
Authors:
Muhammad R. A. Khandaker,
Christos Masouros,
Kai-Kit Wong
Abstract:
Conventionally, interference and noise are treated as catastrophic elements in wireless communications. However, it has been shown recently that exploiting known interference constructively can even contribute to signal detection ability at the receiving end. This paper exploits this concept to design artificial noise (AN) beamformers constructive to the intended receiver (IR) yet kee** AN disru…
▽ More
Conventionally, interference and noise are treated as catastrophic elements in wireless communications. However, it has been shown recently that exploiting known interference constructively can even contribute to signal detection ability at the receiving end. This paper exploits this concept to design artificial noise (AN) beamformers constructive to the intended receiver (IR) yet kee** AN disruptive to possible eavesdroppers (Eves). The scenario considered here is a multiple-input single-output (MISO) wiretap channel with multiple eavesdroppers. Both perfect and imperfect channel information have been considered. The main objective is to improve the receive signal-to-interference and noise ratio (SINR) at IR through exploitation of AN power in an attempt to minimize the total transmit power, while confusing the Eves. Numerical simulations demonstrate that the proposed constructive AN precoding approach yields superior performance over conventional AN schemes in terms of transmit power as well as symbol error rate (SER).
△ Less
Submitted 26 December, 2016;
originally announced December 2016.
-
Joint Transmit Power and Relay Two-Way Beamforming Optimization for Energy-Harvesting Full-Duplex Communications
Authors:
Alexander A. Okandeji,
Muhammad R. A. Khandaker,
Kai-Kit Wong,
Zhongbin Zheng
Abstract:
This paper studies the joint optimization problem of two-way relay beamforming, the receiver power splitting (PS) ratio as well as the transmit power at the sources to maximize the achievable sum-rate of a simultaneous wireless information and power transfer (SWIPT) system with a full-duplex (FD) multiple-input multiple-output (MIMO) amplify and forward (AF) relay, assuming perfect channel state i…
▽ More
This paper studies the joint optimization problem of two-way relay beamforming, the receiver power splitting (PS) ratio as well as the transmit power at the sources to maximize the achievable sum-rate of a simultaneous wireless information and power transfer (SWIPT) system with a full-duplex (FD) multiple-input multiple-output (MIMO) amplify and forward (AF) relay, assuming perfect channel state information (CSI). In particular, our contribution is an iterative algorithm based on the difference of convex programming (DC) and one dimensional searching to achieve the joint solution. Simulation results are provided to demonstrate the effectiveness of the proposed algorithm.
△ Less
Submitted 17 October, 2016; v1 submitted 12 October, 2016;
originally announced October 2016.
-
Probabilistically Robust SWIPT for Secrecy MISOME Systems
Authors:
Muhammad R. A. Khandaker,
Kai-Kit Wong,
Yangyang Zhang,
Zhongbin Zheng
Abstract:
This paper considers simultaneous wireless information and power transfer (SWIPT) in a multiple-input single-output (MISO) downlink system consisting of one multi-antenna transmitter, one single-antenna information receiver (IR), multiple multi-antenna eavesdroppers (Eves) and multiple single-antenna energy-harvesting receivers (ERs). The main objective is to keep the probability of the legitimate…
▽ More
This paper considers simultaneous wireless information and power transfer (SWIPT) in a multiple-input single-output (MISO) downlink system consisting of one multi-antenna transmitter, one single-antenna information receiver (IR), multiple multi-antenna eavesdroppers (Eves) and multiple single-antenna energy-harvesting receivers (ERs). The main objective is to keep the probability of the legitimate user's achievable secrecy rate outage as well as the ERs' harvested energy outage caused by channel state information (CSI) uncertainties below some prescribed thresholds. As is well known, the secrecy rate outage constraints present a significant analytical and computational challenge. Incorporating the energy harvesting (EH) outage constraints only intensifies that challenge. In this paper, we address this challenging issue using convex restriction approaches which are then proved to yield rank-one optimal beamforming solutions. Numerical results reveal the effectiveness of the proposed schemes.
△ Less
Submitted 30 August, 2016;
originally announced August 2016.
-
Two-way relay beamforming optimization for full-duplex SWIPT systems
Authors:
Alexander A. Okandeji,
Muhammad R. A. Khandaker,
Kai-Kit Wong
Abstract:
In this paper, we investigate the problem of two-way relay beamforming optimization to maximize the achievable sum-rate of a simultaneous wireless information and power transfer (SWIPT) system with a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. In particular, we address the optimal joint design of the receiver power splitting (PS) ratio and the beamforming…
▽ More
In this paper, we investigate the problem of two-way relay beamforming optimization to maximize the achievable sum-rate of a simultaneous wireless information and power transfer (SWIPT) system with a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. In particular, we address the optimal joint design of the receiver power splitting (PS) ratio and the beamforming matrix at the relay node given the channel state information (CSI). Our contribution is an iterative algorithm based on difference of convex (DC) programming and one-dimensional searching to achieve the joint optimal solution. Simulation results are provided to demonstrate the effectiveness of the proposed algorithm.
△ Less
Submitted 21 March, 2017; v1 submitted 28 June, 2016;
originally announced June 2016.
-
Wireless Information and Power Transfer in Full-Duplex Communication Systems
Authors:
Alexander A. Okandeji,
Muhammad R. A. Khandaker,
Kai-Kit Wong
Abstract:
This paper considers the problem of maximizing the sum-rate for simultaneous wireless information and power transfer (SWIPT) in a full-duplex bi-directional communication system subject to energy harvesting and transmit power constraints at both nodes. We investigate the optimum design of the receive power splitters and transmit powers for SWIPT in full-duplex mode. Exploiting rate-split method, a…
▽ More
This paper considers the problem of maximizing the sum-rate for simultaneous wireless information and power transfer (SWIPT) in a full-duplex bi-directional communication system subject to energy harvesting and transmit power constraints at both nodes. We investigate the optimum design of the receive power splitters and transmit powers for SWIPT in full-duplex mode. Exploiting rate-split method, an iterative algorithm is derived to solve the non-convex problem. The effectiveness of the proposed algorithm is justified through numerical simulations.
△ Less
Submitted 7 March, 2016;
originally announced March 2016.