-
Reconfigurable Intelligent Surface (RIS)-Assisted Entanglement Distribution in FSO Quantum Networks
Authors:
Mahdi Chehimi,
Mohamed Elhattab,
Walid Saad,
Gayane Vardoyan,
Nitish K. Panigrahy,
Chadi Assi,
Don Towsley
Abstract:
Quantum networks (QNs) relying on free-space optical (FSO) quantum channels can support quantum applications in environments wherein establishing an optical fiber infrastructure is challenging and costly. However, FSO-based QNs require a clear line-of-sight (LoS) between users, which is challenging due to blockages and natural obstacles. In this paper, a reconfigurable intelligent surface (RIS)-as…
▽ More
Quantum networks (QNs) relying on free-space optical (FSO) quantum channels can support quantum applications in environments wherein establishing an optical fiber infrastructure is challenging and costly. However, FSO-based QNs require a clear line-of-sight (LoS) between users, which is challenging due to blockages and natural obstacles. In this paper, a reconfigurable intelligent surface (RIS)-assisted FSO-based QN is proposed as a cost-efficient framework providing a virtual LoS between users for entanglement distribution. A novel modeling of the quantum noise and losses experienced by quantum states over FSO channels defined by atmospheric losses, turbulence, and pointing errors is derived. Then, the joint optimization of entanglement distribution and RIS placement problem is formulated, under heterogeneous entanglement rate and fidelity constraints. This problem is solved using a simulated annealing metaheuristic algorithm. Simulation results show that the proposed framework effectively meets the minimum fidelity requirements of all users' quantum applications. This is in stark contrast to baseline algorithms that lead to a drop of at least 83% in users' end-to-end fidelities. The proposed framework also achieves a 64% enhancement in the fairness level between users compared to baseline rate maximizing frameworks. Finally, the weather conditions, e.g., rain, are observed to have a more significant effect than pointing errors and turbulence.
△ Less
Submitted 19 January, 2024;
originally announced January 2024.
-
A Data-Driven Framework for Improving Public EV Charging Infrastructure: Modeling and Forecasting
Authors:
Nassr Al-Dahabreh,
Mohammad Ali Sayed,
Khaled Sarieddine,
Mohamed Elhattab,
Maurice Khabbaz,
Ribal Atallah,
Chadi Assi
Abstract:
This work presents an investigation and assessment framework, which, supported by realistic data, aims at provisioning operators with in-depth insights into the consumer-perceived Quality-of-Experience (QoE) at public Electric Vehicle (EV) charging infrastructures. Motivated by the unprecedented EV market growth, it is suspected that the existing charging infrastructure will soon be no longer capa…
▽ More
This work presents an investigation and assessment framework, which, supported by realistic data, aims at provisioning operators with in-depth insights into the consumer-perceived Quality-of-Experience (QoE) at public Electric Vehicle (EV) charging infrastructures. Motivated by the unprecedented EV market growth, it is suspected that the existing charging infrastructure will soon be no longer capable of sustaining the rapidly growing charging demands; let alone that the currently adopted ad hoc infrastructure expansion strategies seem to be far from contributing any quality service sustainability solutions that tangibly reduce (ultimately mitigate) the severity of this problem. Without suitable QoE metrics, operators, today, face remarkable difficulty in assessing the performance of EV Charging Stations (EVCSs) in this regard. This paper aims at filling this gap through the formulation of novel and original critical QoE performance metrics that provide operators with visibility into the per-EVCS operational dynamics and allow for the optimization of these stations' respective utilization. Such metrics shall then be used as inputs to a Machine Learning model finely tailored and trained using recent real-world data sets for the purpose of forecasting future long-term EVCS loads. This will, in turn, allow for making informed optimal EV charging infrastructure expansions that will be capable of reliably co** with the rising EV charging demands and maintaining acceptable QoE levels. The model's accuracy has been tested and extensive simulations are conducted to evaluate the achieved performance in terms of the above listed metrics and show the suitability of the recommended infrastructure expansions.
△ Less
Submitted 8 December, 2023;
originally announced December 2023.
-
Reconfigurable Intelligent Surface-Aided Full-Duplex mmWave MIMO: Channel Estimation, Passive and Hybrid Beamforming
Authors:
Songjie Yang,
Wanting Lyu,
Yunis Xanthos,
Zhongpei Zhang,
Chadi Assi,
Chau Yuen
Abstract:
Millimeter wave (mmWave) full-duplex (FD) is a promising technique for improving capacity by maximizing the utilization of both time and the rich mmWave frequency resources. Still, it has restrictions due to FD self-interference (SI) and mmWave's limited coverage. Therefore, this study dives into FD mmWave MIMO with the assistance of reconfigurable intelligent surfaces (RIS) for capacity improveme…
▽ More
Millimeter wave (mmWave) full-duplex (FD) is a promising technique for improving capacity by maximizing the utilization of both time and the rich mmWave frequency resources. Still, it has restrictions due to FD self-interference (SI) and mmWave's limited coverage. Therefore, this study dives into FD mmWave MIMO with the assistance of reconfigurable intelligent surfaces (RIS) for capacity improvement. First, we demonstrate the angular-domain reciprocity of FD antenna arrays under the far-field planar wavefront assumption. Accordingly, a strategy for joint downlink-uplink (DL-UL) channel estimation is presented. For estimating the SI channel, the direct channel, and the cascaded channel, the Khatri-Rao product-based compressive sensing (KR-CS), distributed CS (D-CS), and two-stage multiple measurement vector-based D-CS (M-D-CS) frameworks are proposed, respectively. Additionally, we propose a passive beamforming optimization solution based on the angular-domain cascaded channel. With hybrid beamforming architectures, a novel hybrid weighted minimum mean squared error method for SI cancellation (H-WMMSE-SIC) is proposed. Simulations have revealed that joint DL-UL processing significantly improves estimation performance in comparison to separate DL/UL channel estimation. Particularly, when the interference-to-noise ratio is less than 35 dB, our proposed H-WMMSE-SIC offers spectral efficiency performance comparable to fully-digital WMMSE-SIC. Finally, the computational complexity is analyzed for our proposed methods.
△ Less
Submitted 25 March, 2023;
originally announced March 2023.
-
Edge-Based Detection and Localization of Adversarial Oscillatory Load Attacks Orchestrated By Compromised EV Charging Stations
Authors:
Khaled Sarieddine,
Mohammad Ali Sayed,
Sadegh Torabi,
Ribal Atallah,
Chadi Assi
Abstract:
In this paper, we investigate an edge-based approach for the detection and localization of coordinated oscillatory load attacks initiated by exploited EV charging stations against the power grid. We rely on the behavioral characteristics of the power grid in the presence of interconnected EVCS while combining cyber and physical layer features to implement deep learning algorithms for the effective…
▽ More
In this paper, we investigate an edge-based approach for the detection and localization of coordinated oscillatory load attacks initiated by exploited EV charging stations against the power grid. We rely on the behavioral characteristics of the power grid in the presence of interconnected EVCS while combining cyber and physical layer features to implement deep learning algorithms for the effective detection of oscillatory load attacks at the EVCS. We evaluate the proposed detection approach by building a real-time test bed to synthesize benign and malicious data, which was generated by analyzing real-life EV charging data collected during recent years. The results demonstrate the effectiveness of the implemented approach with the Convolutional Long-Short Term Memory model producing optimal classification accuracy (99.4\%). Moreover, our analysis results shed light on the impact of such detection mechanisms towards building resiliency into different levels of the EV charging ecosystem while allowing power grid operators to localize attacks and take further mitigation measures. Specifically, we managed to decentralize the detection mechanism of oscillatory load attacks and create an effective alternative for operator-centric mechanisms to mitigate multi-operator and MitM oscillatory load attacks against the power grid. Finally, we leverage the created test bed to evaluate a distributed mitigation technique, which can be deployed on public/private charging stations to average out the impact of oscillatory load attacks while allowing the power system to recover smoothly within 1 second with minimal overhead.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security
Authors:
Khaled Sarieddine,
Mohammad Ali Sayed,
Danial Jafarigiv,
Ribal Atallah,
Mourad Debbabi,
Chadi Assi
Abstract:
Faced with the threat of climate change, the world is rapidly adopting Electric Vehicles (EVs). The EV ecosystem, however, is vulnerable to cyber-attacks putting it and the power grid at risk. In this article, we present a security-oriented real-time Co-simulation Testbed for the EV ecosystem and the power grid.
Faced with the threat of climate change, the world is rapidly adopting Electric Vehicles (EVs). The EV ecosystem, however, is vulnerable to cyber-attacks putting it and the power grid at risk. In this article, we present a security-oriented real-time Co-simulation Testbed for the EV ecosystem and the power grid.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
Investigating the Security of EV Charging Mobile Applications As an Attack Surface
Authors:
K. Sarieddine,
M. A. Sayed,
S. Torabi,
R. Atallah,
C. Assi
Abstract:
In this paper, we study the security posture of the EV charging ecosystem against a new type of remote that exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile ap…
▽ More
In this paper, we study the security posture of the EV charging ecosystem against a new type of remote that exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile applications including their interactions with various components such as cloud management systems. The attack, scenarios that exploit these vulnerabilities were verified on a real-time co-simulation test bed. Our discoveries indicate the lack of user/vehicle verification and improper authorization for critical functions, which allow adversaries to remotely hijack charging sessions and launch attacks against the connected critical infrastructure. The attacks were demonstrated using the EVCS mobile applications showing the feasibility and the applicability of our attacks. Indeed, we discuss specific remote attack scenarios and their impact on EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant economical and operational implications. Finally, we propose countermeasures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.
△ Less
Submitted 26 February, 2023; v1 submitted 19 November, 2022;
originally announced November 2022.
-
Energy Consumption Optimization in RIS-Assisted Cooperative RSMA Cellular Networks
Authors:
Shreya Khisa,
Mohamad Elhattab,
Chadi Assi,
Sanaa Sharafeddine
Abstract:
This paper presents a downlink reconfigurable intelligent surface (RIS)-assisted half-duplex (HD) cooperative rate splitting multiple access (C-RSMA) networks. The proposed system model is built up considering one base station (BS), one RIS, and two users. With the goal of minimizing the network energy consumption, a joint framework to optimize the precoding vectors at the BS, common stream split,…
▽ More
This paper presents a downlink reconfigurable intelligent surface (RIS)-assisted half-duplex (HD) cooperative rate splitting multiple access (C-RSMA) networks. The proposed system model is built up considering one base station (BS), one RIS, and two users. With the goal of minimizing the network energy consumption, a joint framework to optimize the precoding vectors at the BS, common stream split, relaying device transmit power, the time slot allocation, and the passive beamforming at the RIS subject to the power budget constraints at both the BS and the relaying node, the quality of service (QoS) constraints at both users, and common stream rate constraint is proposed. The formulated problem is a non-convex optimization problem due to the high coupling among the optimization variables. To tackle this challenge, an efficient algorithm is presented by invoking the alternating optimization technique, which decomposes the original problem into two sub-problems; namely, sub-problem-1 and sub-problem-2, which are alternatively solved. Specifically, sub-problem-1 is to jointly optimize the precoding vectors, common stream split, and relaying device power. Meanwhile, sub-problem-2 is to optimize the phase shift matrix at the RIS. In order to solve sub-problem-1, an efficient low-complexity solution based on the successive convex approximation (SCA) is proposed. Meanwhile, and with the aid of difference-of-convex rank-one representation and the SCA approach, an efficient solution for the phase shift matrix at the RIS is obtained. The simulation results demonstrate that the proposed RIS-assisted HD C-RSMA achieves a significant gain in minimizing the total energy consumption compared to the RIS-assisted RSMA scheme, RIS-assisted HD cooperative non-orthogonal multiple access (C-NOMA), RIS-assisted NOMA, HD C-RSMA without RIS, and HD C-NOMA without RIS.
△ Less
Submitted 13 August, 2022;
originally announced August 2022.
-
Optimizing Information Freshness Leveraging Multi-RISs in NOMA-based IoT Networks
Authors:
Ali Muhammad,
Mohamed Elhattab,
Mohamed Amine Arfaoui,
Chadi Assi
Abstract:
This paper investigates the benefits of integrating multiple reconfigurable intelligent surfaces (RISs) in enhancing the timeliness performance of uplink Internet-of-Things (IoT) network, where IoT devices (IoTDs) upload their time-stamped status update information to a base station (BS) using non-orthogonal multiple access (NOMA). Accounting to the potential unreliable wireless channels due to th…
▽ More
This paper investigates the benefits of integrating multiple reconfigurable intelligent surfaces (RISs) in enhancing the timeliness performance of uplink Internet-of-Things (IoT) network, where IoT devices (IoTDs) upload their time-stamped status update information to a base station (BS) using non-orthogonal multiple access (NOMA). Accounting to the potential unreliable wireless channels due to the impurities of the propagation environments, such as deep fading, blockages, etc., multiple RISs are deployed in the considered IoT network to mitigate the propagation-induced impairments, to enhance the quality of the wireless links, and to ensure that the required freshness of information is achieved. In this setup, an optimization problem has been formulated to minimize the average sum Age of Information (AoI) by optimizing the transmit power of the IoTDs, the IoTDs clustering policy, and the RISs configurations. The formulated problem ends up to be a mixed-integer non-convex problem. In order to tackle this challenge, the RISs configurations are first obtained by adopting a semi-definite relaxation (SDR) approach. Then, the joint power allocation and user-clustering problem is solved using the concept of bi-level optimization, where the original problem is decomposed into an outer IoTDs clustering problem and an inner power allocation problem. Optimal closed-form expressions are derived for the inner problem and the Hungarian method is invoked to solve the outer problem. Numerical results demonstrate that our proposed approach achieves lowest AoI compared to the other baseline approaches.
△ Less
Submitted 1 September, 2022; v1 submitted 2 August, 2022;
originally announced August 2022.
-
On Optimizing the Power Allocation and the Decoding Order in Uplink Cooperative NOMA
Authors:
Mohamed Elhattab,
Mohamed Amine Arfaoui,
Chadi Assi,
Ali Ghrayeb,
Marwa Qaraqe
Abstract:
In this paper, we investigate for the first time the dynamic power allocation and decoding order at the base station (BS) of two-user uplink (UL) cooperative non-orthogonal multiple access (C-NOMA)-based cellular networks. In doing so, we formulate a joint optimization problem aiming at maximizing the minimum user achievable rate, which is a non-convex optimization problem and hard to be directly…
▽ More
In this paper, we investigate for the first time the dynamic power allocation and decoding order at the base station (BS) of two-user uplink (UL) cooperative non-orthogonal multiple access (C-NOMA)-based cellular networks. In doing so, we formulate a joint optimization problem aiming at maximizing the minimum user achievable rate, which is a non-convex optimization problem and hard to be directly solved. To tackle this issue, an iterative algorithm based on successive convex approximation (SCA) is proposed. The numerical results reveal that the proposed scheme provides superior performance in comparison with the traditional UL NOMA. In addition, we demonstrated that in UL C-NOMA, decoding the far NOMA user first at the BS provides the best performance.
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
Optimizing Information Freshness in RIS-assisted NOMA-based IoT Networks
Authors:
Ali Muhammad,
Mohamed Elhattab,
Mohamed Amine Arfaoui,
Chadi Assi
Abstract:
This paper investigates the benefits of integrating reconfigurable intelligent surface (RIS) on minimizing the average sum age of information (AoI) in uplink non-orthogonal multiple access-based Internet-of-Things (IoT) networks. In this setup, an optimization problem is formulated to optimize the RIS configuration, the transmit power per IoT device and the clustering policy of IoT devices. The fo…
▽ More
This paper investigates the benefits of integrating reconfigurable intelligent surface (RIS) on minimizing the average sum age of information (AoI) in uplink non-orthogonal multiple access-based Internet-of-Things (IoT) networks. In this setup, an optimization problem is formulated to optimize the RIS configuration, the transmit power per IoT device and the clustering policy of IoT devices. The formulated problem is a mixed-integer non-convex one, and in order to solve it we obtain first the RIS configuration by adopting a semi-definite relaxation (SDR) approach. Afterwards, the joint power allocation and user-clustering problem is solved using the concept of bi-level optimization and is decomposed into an outer user clustering problem and an inner power allocation problem. Optimal closed-form expressions are derived for the inner problem and the Hungarian method is employed to solve the outer one. Numerical results demonstrate the performance superiority of our approach.
△ Less
Submitted 28 February, 2022;
originally announced February 2022.
-
A Low-Complexity Framework for Joint User Pairing and Power Control for Cooperative NOMA in 5G and Beyond Cellular Networks
Authors:
Phuc Dinh,
Mohamed Amine Arfaoui,
Sanaa Sharafeddine,
Chadi Assi,
Ali Ghrayeb
Abstract:
This paper investigates the performance of cooperative non-orthogonal multiple access (C-NOMA) in a cellular downlink system. The system model consists of a base station (BS) serving multiple users, where users with good channel quality can assist the transmissions between the BS and users with poor channel quality through either half-duplex (HD) or full-duplex (FD) device-to-device (D2D) communic…
▽ More
This paper investigates the performance of cooperative non-orthogonal multiple access (C-NOMA) in a cellular downlink system. The system model consists of a base station (BS) serving multiple users, where users with good channel quality can assist the transmissions between the BS and users with poor channel quality through either half-duplex (HD) or full-duplex (FD) device-to-device (D2D) communications. We formulate and solve a novel optimization problem that jointly determines the optimal D2D user pairing and the optimal power control scheme, where the objective is maximizing the achievable sum rate of the whole system while guaranteeing a certain quality of service (QoS) for all users. The formulated problem is a mixed-integer non-linear program (MINLP) which is generally NPhard. To overcome this issue, we reconstruct the original problem into a bi-level optimization problem that can be decomposed into two sub-problems to be solved independently. The outer problem is a linear assignment problem which can be efficiently handled by the well-known Hungarian method. The inner problem is still a non-convex optimization problem for which finding the optimal solution is challenging. However, we derive the optimal power control policies for both the HD and the FD schemes in closedform expressions, which makes the computational complexity of the inner problems polynomial for every possible pairing configurations. These findings solve ultimately the original MILNP in a timely manner that makes it suitable for real-time and low latency applications. Our simulation results show that the proposed framework outperforms a variety of proposed schemes in the literature and that it can obtain the optimal pairing and power control policies for a network with 100 users in a negligible computational time.
△ Less
Submitted 14 February, 2020;
originally announced February 2020.
-
Beamforming Learning for mmWave Communication: Theory and Experimental Validation
Authors:
ohaned Chraiti,
Dmitry Chizhik,
**feng Du,
Reinaldo A. Valenzuela,
Ali Ghrayeb,
Chadi Assi
Abstract:
To establish reliable and long-range millimeter-wave (mmWave) communication, beamforming is deemed to be a promising solution. Although beamforming can be done in the digital and analog domains, both approaches are hindered by several constraints when it comes to mmWave communications. For example, performing fully digital beamforming in mmWave systems involves using many radio frequency (RF) chai…
▽ More
To establish reliable and long-range millimeter-wave (mmWave) communication, beamforming is deemed to be a promising solution. Although beamforming can be done in the digital and analog domains, both approaches are hindered by several constraints when it comes to mmWave communications. For example, performing fully digital beamforming in mmWave systems involves using many radio frequency (RF) chains, which are expensive and consume high power. This necessitates finding more efficient ways for using fewer RF chains while taking advantage of the large antenna arrays. One way to overcome this challenge is to employ (partially or fully) analog beamforming through proper configuration of phase-shifters. Existing works on mmWave analog beam design either rely on the knowledge of the channel state information (CSI) per antenna within the array, require a large search time (e.g., exhaustive search) or do not guarantee a minimum beamforming gain (e.g., codebook based beamforming). In this paper, we propose a beam design technique that reduces the search time and does not require CSI while guaranteeing a minimum beamforming gain. The key idea derives from observations drawn from real-life measurements. It was observed that for a given propagation environment (e.g., coverage area of a mmWave BS) the azimuthal angles of dominant signals could be more probable from certain angles than others. Thus, pre-collected measurements could used to build a beamforming codebook that regroups the most probable beam designs. We invoke Bayesian learning for measurements clustering. We evaluate the efficacy of the proposed scheme in terms of building the codebook and assessing its performance through real-life measurements. We demonstrate that the training time required by the proposed scheme is only 5% of that of exhaustive search. This crucial gain is obtained while achieving a minimum targeted beamforming gain.
△ Less
Submitted 28 December, 2019;
originally announced December 2019.
-
Software Defined Networks based Smart Grid Communication: A Comprehensive Survey
Authors:
Mubashir Husain Rehmani,
Alan Davy,
Brendan Jennings,
Chadi Assi
Abstract:
The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG). The key features that distinguish SG from the conventional electrical power grid are its capability to perform two-way communication, demand side management, and real time pric…
▽ More
The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG). The key features that distinguish SG from the conventional electrical power grid are its capability to perform two-way communication, demand side management, and real time pricing. Despite all these advantages that SG will bring, there are certain issues which are specific to SG communication system. For instance, network management of current SG systems is complex, time consuming, and done manually. Moreover, SG communication (SGC) system is built on different vendor specific devices and protocols. Therefore, the current SG systems are not protocol independent, thus leading to interoperability issue. Software defined network (SDN) has been proposed to monitor and manage the communication networks globally. This article serves as a comprehensive survey on SDN-based SGC. In this article, we first discuss taxonomy of advantages of SDNbased SGC.We then discuss SDN-based SGC architectures, along with case studies. Our article provides an in-depth discussion on routing schemes for SDN-based SGC. We also provide detailed survey of security and privacy schemes applied to SDN-based SGC. We furthermore present challenges, open issues, and future research directions related to SDN-based SGC.
△ Less
Submitted 27 March, 2019; v1 submitted 14 January, 2018;
originally announced January 2018.
-
On the Achievable Secrecy Diversity of Cooperative Networks with Untrusted Relays
Authors:
Mohaned Chraiti,
Ali Ghrayeb,
Chadi Assi,
Mazen O. Hasna
Abstract:
Cooperative relaying is often deployed to enhance the communication reliability (i.e., diversity order) and consequently the end-to-end achievable rate. However, this raises several security concerns when the relays are untrusted since they may have access to the relayed message. In this paper, we study the achievable secrecy diversity order of cooperative networks with untrusted relays. In partic…
▽ More
Cooperative relaying is often deployed to enhance the communication reliability (i.e., diversity order) and consequently the end-to-end achievable rate. However, this raises several security concerns when the relays are untrusted since they may have access to the relayed message. In this paper, we study the achievable secrecy diversity order of cooperative networks with untrusted relays. In particular, we consider a network with an N-antenna transmitter (Alice), K single-antenna relays, and a single-antenna destination (Bob). We consider the general scenario where there is no relation between N and K, and therefore K can be larger than N. Alice and Bob are assumed to be far away from each other, and all communication is done through the relays, i.e., there is no direct link. Providing secure communication while enhancing the diversity order has been shown to be very challenging. In fact, it has been shown in the literature that the maximum achievable secrecy diversity order for the adopted system model is one (while using artificial noise jamming). In this paper, we adopt a nonlinear interference alignment scheme that we have proposed recently to transmit the signals from Alice to Bob. We analyze the proposed scheme in terms of the achievable secrecy rate and secrecy diversity order. Assuming Gaussian inputs, we derive an explicit expression for the achievable secrecy rate and show analytically that a secrecy diversity order of up to min(N,K)-1 can be achieved using the proposed technique. We provide several numerical examples to validate the obtained analytical results and demonstrate the superiority of the proposed technique to its counterparts that exist in the literature.
△ Less
Submitted 12 January, 2017;
originally announced January 2017.
-
Nonlinear Interference Alignment in a One-dimensional Space
Authors:
Mohaned Chraiti,
Ali Ghrayeb,
Chadi Assi
Abstract:
Real interference alignment is efficient in breaking-up a one-dimensional space over time-invariant channels into fractional dimensions. As such, multiple symbols can be simultaneously transmitted with fractional degrees-of-freedom (DoF). Of particular interest is when the one dimensional space is partitioned into two fractional dimensions. In such scenario, the interfering signals are confined to…
▽ More
Real interference alignment is efficient in breaking-up a one-dimensional space over time-invariant channels into fractional dimensions. As such, multiple symbols can be simultaneously transmitted with fractional degrees-of-freedom (DoF). Of particular interest is when the one dimensional space is partitioned into two fractional dimensions. In such scenario, the interfering signals are confined to one sub-space and the intended signal is confined to the other sub-space. Existing real interference alignment schemes achieve near-capacity performance at high SNR for time-invariant channels. However, such techniques yield poor achievable rate at finite SNR, which is of interest from a practical point of view. In this paper, we propose a radically novel nonlinear interference alignment technique, which we refer to as Interference Dissolution (ID). ID allows to break-up a one-dimensional space into two fractional dimensions while achieving near-capacity performance for the entire SNR range. This is achieved by aligning signals by signals, as opposed to aligning signals by the channel. We introduce ID by considering a time-invariant MISO channel. This channel has a one-dimensional space and offers one DoF. We show that, by breaking-up the one dimensional space into two sub-spaces, ID achieves a rate of two symbols per channel use while providing $\frac{1}{2}$ DoF for each symbol. We analyze the performance of the proposed ID scheme in terms of the achievable rate and the symbol error rate. In characterizing the achievable rate of ID for the entire SNR range, we prove that, assuming Gaussian signals, the sum achievable rate is at most one bit away from the capacity. We present numerical examples to validate the theoretical analysis. We also compare the performance of ID in terms of the achievable rate performance to that of existing schemes and demonstrate ID's superiority.
△ Less
Submitted 5 August, 2016; v1 submitted 20 June, 2016;
originally announced June 2016.