-
Error Rate and Ergodic Capacity of RF-FSO System with Partial Relay Selection in the Presence of Pointing Errors
Authors:
Milica I. Petkovic,
Imran Shafique Ansari,
Goran T. Djordjevic,
Khalid A. Qaraqe
Abstract:
This paper presents an analysis of a multiple dual-hop relaying system, which is composed of km-class radio frequency (RF)-free-space optical (FSO) links. Partial relay selection based on outdated channel state information (CSI) is employed in order to select active relay for further transmission. Amplify-and-forward relaying protocol is utilized. The RF links are assumed to be subject to Rayleigh…
▽ More
This paper presents an analysis of a multiple dual-hop relaying system, which is composed of km-class radio frequency (RF)-free-space optical (FSO) links. Partial relay selection based on outdated channel state information (CSI) is employed in order to select active relay for further transmission. Amplify-and-forward relaying protocol is utilized. The RF links are assumed to be subject to Rayleigh fading, and the FSO links are influenced by both Gamma-Gamma atmospheric turbulence and pointing errors. On the basis of our previously derived expression for cumulative distribution function of the equivalent signal-to-noise ratio of the whole system, we derive novel analytical expressions for the average bit-error rate (BER) and ergodic capacity that are presented in terms of the Meijer's G-function and extended generalized bivariate Meijer's G-function, respectively. The numerical results are confirmed by Monte Carlo simulations. Considering the effect of time-correlation between outdated CSI and actual CSI related to the RF channel at the time of transmission, the average BER and the ergodic capacity dependence on various system and channel parameters are observed and discussed. The results illustrate that the temporal correlation between outdated and actual CSI has strong effect on system performance, particularly on BER values, when FSO hop is influenced by favorable conditions. Keywords: Bit error rate, ergodic capacity, free-space optical systems, partial relay selection, radio frequency systems.
△ Less
Submitted 28 September, 2022; v1 submitted 27 September, 2022;
originally announced September 2022.
-
Can Artificial Noise Boost Further the Secrecy of Dual-hop RIS-aided Networks?
Authors:
Elmehdi Illi,
Marwa K. Qaraqe,
Faissal El Bouanani,
Saif M. Al-Kuwari
Abstract:
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wireless communication system assisted by reconfigurable intelligent surfaces (RISs). In particular, the setup consists of a source node communicating with a destination node via a regenerative relay. In this setup, a RIS is installed in each hop to increase the source-relay and relay-destination commu…
▽ More
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wireless communication system assisted by reconfigurable intelligent surfaces (RISs). In particular, the setup consists of a source node communicating with a destination node via a regenerative relay. In this setup, a RIS is installed in each hop to increase the source-relay and relay-destination communications reliability, where the RISs' phase shifts are subject to quantization errors. The legitimate transmission is performed under the presence of a malicious eavesdropper attempting to compromise the legitimate transmissions by overhearing the broadcasted signal from the relay. To overcome this problem, we incorporate a jammer to increase the system's secrecy by disrupting the eavesdropper through a broadcasted jamming signal. Leveraging the well-adopted Gamma and Exponential distributions approximations, the system's secrecy level is quantified by deriving approximate and asymptotic expressions of the secrecy intercept probability (IP) metric in terms of the main network parameters. The results show that the secrecy is enhanced significantly by increasing the jamming power and/or the number of reflective elements (REs). In particular, an IP of approximately $10^{-4}$ can be reached with $40$ REs and $10$ dB of jamming power-to-noise ratio even when the legitimate links' average signal-to-noise ratios are $10$-dB less than the eavesdropper's one. We show that cooperative jamming is very helpful in strong eavesdrop** scenarios with a fixed number of REs, and the number of quantization bits does not influence the secrecy when exceeding $3$ bits. All the analytical results are endorsed by Monte Carlo simulations.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
On the Physical Layer Security of a Dual-Hop UAV-based Network in the Presence of per-hop Eavesdrop** and Imperfect CSI
Authors:
Elmehdi Illi,
Marwa K. Qaraqe,
F. El Bouanani,
Saif M. Al-Kuwari
Abstract:
In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$, in the presence of two wiretappers $\left(E_{1},E_{2}\right)$ independently trying to co…
▽ More
In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$, in the presence of two wiretappers $\left(E_{1},E_{2}\right)$ independently trying to compromise the two hops. Furthermore, the transmit nodes $\left(S,R\right) $ have a single transmit antenna, while the receivers $\left(R,D,E_{1},E_{2}\right) $ are equipped with multiple receive antennas. Based on the per-hop signal-to-noise ratios (SNRs) and correlated secrecy capacities' statistics, a closed-form expression for the secrecy intercept probability (IP) metric is derived, in terms of key system parameters. Additionally, asymptotic expressions are revealed for two scenarios, namely (i) mobile nodes with imperfect CSI and (ii) static nodes with perfect CSI. The results show that a zero secrecy diversity order is manifested for the first scenario, due to the presence of a ceiling value of the average SNR, while the IP drops linearly at high average SNR in the second one, where the achievable diversity order depends on the fading parameters and number of antennas of the legitimate links/nodes. Furthermore, for static nodes, the system can be castigated by a $15$ dB secrecy loss at IP$=3\times10^{-3},$ when the CSI imperfection power raises from $0$ to $10^{-3}$. Lastly, the higher the legitimate nodes' speed, carrier frequency, delay, and/or relay's decoding threshold SNR, the worse is the system's secrecy. Monte Carlo simulations endorse the derived analytical results.
△ Less
Submitted 15 May, 2022;
originally announced May 2022.
-
On the Effective Capacity of IRS-assisted wireless communication
Authors:
Waqas Aman,
M. Mahboob Ur Rahman,
Shuja Ansari,
Ali Arshad Nasir,
Khalid Qaraqe,
M. Ali Imran,
Qammer H. Abbasi
Abstract:
We consider futuristic, intelligent reflecting surfaces (IRS)-aided communication between a base station (BS) and a user equipment (UE) for two distinct scenarios: a single-input, single-output (SISO) system whereby the BS has a single antenna, and a multi-input, single-output (MISO) system whereby the BS has multiple antennas. For the considered IRS-assisted downlink, we compute the effective cap…
▽ More
We consider futuristic, intelligent reflecting surfaces (IRS)-aided communication between a base station (BS) and a user equipment (UE) for two distinct scenarios: a single-input, single-output (SISO) system whereby the BS has a single antenna, and a multi-input, single-output (MISO) system whereby the BS has multiple antennas. For the considered IRS-assisted downlink, we compute the effective capacity (EC), which is a quantitative measure of the statistical quality-of-service (QoS) offered by a communication system experiencing random fading. For our analysis, we consider the two widely-known assumptions on channel state information (CSI) -- i.e., perfect CSI and no CSI, at the BS. Thereafter, we first derive the distribution of the signal-to-noise ratio (SNR) for both SISO and MISO scenarios, and subsequently derive closed-form expressions for the EC under perfect CSI and no CSI cases, for both SISO and MISO scenarios. Furthermore, for the SISO and MISO systems with no CSI, it turns out that the EC could be maximized further by searching for an optimal transmission rate $r^*$, which is computed by exploiting the iterative gradient-descent method. We provide extensive simulation results which investigate the impact of the various system parameters, e.g., QoS exponent, power budget, number of transmit antennas at the BS, number of reflective elements at the IRS etc., on the EC of the system.
△ Less
Submitted 21 January, 2021; v1 submitted 14 July, 2020;
originally announced July 2020.
-
Spectrum Sensing and Signal Identification with Deep Learning based on Spectral Correlation Function
Authors:
Kürşat Tekbıyık,
Özkan Akbunar,
Ali Rıza Ekti,
Ali Görçin,
Güneş Karabulut Kurt,
Khalid A. Qaraqe
Abstract:
Spectrum sensing is one of the means of utilizing the scarce source of wireless spectrum efficiently. In this paper, a convolutional neural network (CNN) model employing spectral correlation function which is an effective characterization of cyclostationarity property, is proposed for wireless spectrum sensing and signal identification. The proposed method classifies wireless signals without a pri…
▽ More
Spectrum sensing is one of the means of utilizing the scarce source of wireless spectrum efficiently. In this paper, a convolutional neural network (CNN) model employing spectral correlation function which is an effective characterization of cyclostationarity property, is proposed for wireless spectrum sensing and signal identification. The proposed method classifies wireless signals without a priori information and it is implemented in two different settings entitled CASE1 and CASE2. In CASE1, signals are jointly sensed and classified. In CASE2, sensing and classification are conducted in a sequential manner. In contrary to the classical spectrum sensing techniques, the proposed CNN method does not require a statistical decision process and does not need to know the distinct features of signals beforehand. Implementation of the method on the measured overthe-air real-world signals in cellular bands indicates important performance gains when compared to the signal classifying deep learning networks available in the literature and against classical sensing methods. Even though the implementation herein is over cellular signals, the proposed approach can be extended to the detection and classification of any signal that exhibits cyclostationary features. Finally, the measurement-based dataset which is utilized to validate the method is shared for the purposes of reproduction of the results and further research and development.
△ Less
Submitted 28 April, 2021; v1 submitted 17 March, 2020;
originally announced March 2020.
-
Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Authors:
Mahmoud Nabil,
Muhammad Ismail,
Mohamed Mahmoud,
Mostafa Shahin,
Khalid Qaraqe,
Erchin Serpedin
Abstract:
Modern smart grids rely on advanced metering infrastructure (AMI) networks for monitoring and billing purposes. However, such an approach suffers from electricity theft cyberattacks. Different from the existing research that utilizes shallow, static, and customer-specific-based electricity theft detectors, this paper proposes a generalized deep recurrent neural network (RNN)-based electricity thef…
▽ More
Modern smart grids rely on advanced metering infrastructure (AMI) networks for monitoring and billing purposes. However, such an approach suffers from electricity theft cyberattacks. Different from the existing research that utilizes shallow, static, and customer-specific-based electricity theft detectors, this paper proposes a generalized deep recurrent neural network (RNN)-based electricity theft detector that can effectively thwart these cyberattacks. The proposed model exploits the time series nature of the customers' electricity consumption to implement a gated recurrent unit (GRU)-RNN, hence, improving the detection performance. In addition, the proposed RNN-based detector adopts a random search analysis in its learning stage to appropriately fine-tune its hyper-parameters. Extensive test studies are carried out to investigate the detector's performance using publicly available real data of 107,200 energy consumption days from 200 customers. Simulation results demonstrate the superior performance of the proposed detector compared with state-of-the-art electricity theft detectors.
△ Less
Submitted 5 September, 2018;
originally announced September 2018.
-
From D2D to Ds2D: Prolonging the Battery Life of Mobile Devices via Ds2D Communications
Authors:
Muhammad Z. Shakir,
Muhammad Ismail,
Xianbin Wang,
Khalid A. Qaraqe,
Erchin Serpedin
Abstract:
Emerging device centric systems (DCS) such as device-to-device (D2D) communications are considered as a standard part of future mobile networks, where operators/consumers involve the devices in direct communication to improve the cellular system throughput, latency, fairness, and energy efficiency. However, battery life of mobile devices involved in such communications is crucial for 5G smartphone…
▽ More
Emerging device centric systems (DCS) such as device-to-device (D2D) communications are considered as a standard part of future mobile networks, where operators/consumers involve the devices in direct communication to improve the cellular system throughput, latency, fairness, and energy efficiency. However, battery life of mobile devices involved in such communications is crucial for 5G smartphone users to explore the emerging applications in DCS. It is anticipated that the owners of 5G-enabled smartphones use their devices more extensively to talk, text, email, and surf the Web more often than do customers with 4G smartphones or traditional handsets, which puts a significantly higher demand on the battery life. Smartphones are currently equipped with multiple radio interfaces that enable them to access different types of wireless networks including LTE-direct and Wi-Fi-direct, besides cellular networks. Such a capability is not well explored within the context of DCS. This article proposes a new scheme to support the emerging features in DCS where a D2D-enabled mobile device (sink device or a file/content requester) aggregates the radio resources of multiple mobile devices (source devices or file/content providers) via its multiple radio interfaces such that the scheme is referred to as devices-to-device (Ds2D) communications. Ds2D communication scheme ensures an optimal packet split among the source mobile devices to improve the file/content transfer latency (FTL), energy efficiency, and battery life. Simulation results demonstrate that the proposed optimal packet split scheme among multiple source devices participating in Ds2D communication scheme guarantees an improvement in mobile battery life over wide range of data rate levels in comparison with the random packet split strategy and traditional D2D communication paradigm between the sink and source mobile devices.
△ Less
Submitted 30 March, 2017;
originally announced March 2017.
-
Cooperative In-Vivo Nano-Network Communication at Terahertz Frequencies
Authors:
Qammer H. Abbasi,
Ali Arshad Nasir,
Ke Yang,
Khalid Qaraqe,
Akram Alomainy
Abstract:
Nano devices have great potential to play a vital role in future medical diagnostics and treatment technologies because of its non-invasive nature and ability to reach delicate body sites easily as compared to conventional devices. In this paper, a novel concept of cooperative communication for in-vivo nano-network is presented to enhance the communication among these devices. The effect on the sy…
▽ More
Nano devices have great potential to play a vital role in future medical diagnostics and treatment technologies because of its non-invasive nature and ability to reach delicate body sites easily as compared to conventional devices. In this paper, a novel concept of cooperative communication for in-vivo nano-network is presented to enhance the communication among these devices. The effect on the system outage probability performance is conducted for various parameters including relay lacement, number of relays, transmit power, bandwidth and carrier frequency. Results show approximately a 10-fold increase in the system outage performance whenever an additional relay is included in the cooperative network, hence show a great potential of using cooperative communication to enhance the performance of nano-network at terahertz frequencies.
△ Less
Submitted 22 March, 2017;
originally announced March 2017.
-
Performance of Opportunistic Fixed Gain Bidirectional Relaying With Outdated CSI
Authors:
Fahd Ahmed Khan,
Kamel Tourki,
Mohamed-Slim Alouini,
Khalid A. Qaraqe
Abstract:
This paper studies the impact of using outdated channel state information for relay selection on the performance of a network where two sources communicate with each other via fixed-gain amplifyand- forward relays. For a Rayleigh faded channel, closed-form expressions for the outage probability, moment generating function and symbol error rate are derived. Simulations results are also presented to…
▽ More
This paper studies the impact of using outdated channel state information for relay selection on the performance of a network where two sources communicate with each other via fixed-gain amplifyand- forward relays. For a Rayleigh faded channel, closed-form expressions for the outage probability, moment generating function and symbol error rate are derived. Simulations results are also presented to corroborate the derived analytical results. It is shown that adding relays does not improve the performance if the channel is substantially outdated. Furthermore, relay location is also taken into consideration and it is shown that the performance can be improved by placing the relay closer to the source whose channel is more outdated.
△ Less
Submitted 25 May, 2013;
originally announced May 2013.
-
Gaussian Assumption: the Least Favorable but the Most Useful
Authors:
Sangwoo Park,
Erchin Serpedin,
Khalid Qaraqe
Abstract:
This paper focuses on three contributions. First, a connection between the result, proposed by Stoica and Babu, and the recent information theoretic results, the worst additive noise lemma and the isoperimetric inequality for entropies, is illustrated. Second, information theoretic and estimation theoretic justifications for the fact that the Gaussian assumption leads to the largest Cramér-Rao low…
▽ More
This paper focuses on three contributions. First, a connection between the result, proposed by Stoica and Babu, and the recent information theoretic results, the worst additive noise lemma and the isoperimetric inequality for entropies, is illustrated. Second, information theoretic and estimation theoretic justifications for the fact that the Gaussian assumption leads to the largest Cramér-Rao lower bound (CRLB) is presented. Third, a slight extension of this result to the more general framework of correlated observations is shown.
△ Less
Submitted 20 November, 2012;
originally announced November 2012.
-
A Unifying Variational Perspective on Some Fundamental Information Theoretic Inequalities
Authors:
Sangwoo Park,
Erchin Serpedin,
Khalid Qaraqe
Abstract:
This paper proposes a unifying variational approach for proving and extending some fundamental information theoretic inequalities. Fundamental information theory results such as maximization of differential entropy, minimization of Fisher information (Cramér-Rao inequality), worst additive noise lemma, entropy power inequality (EPI), and extremal entropy inequality (EEI) are interpreted as functio…
▽ More
This paper proposes a unifying variational approach for proving and extending some fundamental information theoretic inequalities. Fundamental information theory results such as maximization of differential entropy, minimization of Fisher information (Cramér-Rao inequality), worst additive noise lemma, entropy power inequality (EPI), and extremal entropy inequality (EEI) are interpreted as functional problems and proved within the framework of calculus of variations. Several applications and possible extensions of the proposed results are briefly mentioned.
△ Less
Submitted 4 February, 2016; v1 submitted 20 November, 2012;
originally announced November 2012.
-
Random Subcarrier Allocation in OFDM-Based Cognitive Radio Networks
Authors:
Sabit Ekin,
Mohamed M. Abdallah,
Khalid A. Qaraqe,
Erchin Serpedin
Abstract:
This paper investigates the performance of an orthogonal frequency-division multiplexing (OFDM)-based cognitive radio (CR) spectrum sharing communication system that assumes random allocation and absence of the primary user's (PU) channel occupation information, i.e., no spectrum sensing is employed to acquire information about the availability of unused subcarriers. In case of a single secondary…
▽ More
This paper investigates the performance of an orthogonal frequency-division multiplexing (OFDM)-based cognitive radio (CR) spectrum sharing communication system that assumes random allocation and absence of the primary user's (PU) channel occupation information, i.e., no spectrum sensing is employed to acquire information about the availability of unused subcarriers. In case of a single secondary user (SU) in the secondary network, due to the lack of information of PUs' activities, the SU randomly allocates the subcarriers of the primary network and collide with the PUs' subcarriers with a certain probability. To maintain the quality of service (QoS) requirement of PUs, the interference that SU causes onto PUs is controlled by adjusting SU's transmit power below a predefined threshold, referred to as interference temperature. In this work, the average capacity of SU with subcarrier collisions is employed as performance measure to investigate the proposed random allocation scheme for both general and Rayleigh channel fading models. Bounds and scaling laws of average capacity with respect to the number of SU's, PUs' and available subcarriers are derived. In addition, in the presence of multiple SUs, the multiuser diversity gain of SUs assuming an opportunistic scheduling is also investigated. To avoid the interference at the SUs that might be caused by the random allocation scheme and obtain the maximum sum rate for SUs based on the available subcarriers, an efficient centralized sequential algorithm based on the opportunistic scheduling and random allocation (utilization) methods is proposed to ensure the orthogonality of assigned subcarriers.
△ Less
Submitted 2 July, 2012;
originally announced July 2012.
-
On the equivalence between Stein and de Bruijn identities
Authors:
Sangwoo Park,
Erchin Serpedin,
Khalid Qaraqe
Abstract:
This paper focuses on proving the equivalence between Stein's identity and de Bruijn's identity. Given some conditions, we prove that Stein's identity is equivalent to de Bruijn's identity. In addition, some extensions of de Bruijn's identity are presented. For arbitrary but fixed input and noise distributions, there exist relations between the first derivative of the differential entropy and the…
▽ More
This paper focuses on proving the equivalence between Stein's identity and de Bruijn's identity. Given some conditions, we prove that Stein's identity is equivalent to de Bruijn's identity. In addition, some extensions of de Bruijn's identity are presented. For arbitrary but fixed input and noise distributions, there exist relations between the first derivative of the differential entropy and the posterior mean. Moreover, the second derivative of the differential entropy is related to the Fisher information for arbitrary input and noise distributions. Several applications are presented to support the usefulness of the developed results in this paper.
△ Less
Submitted 22 July, 2012; v1 submitted 31 January, 2012;
originally announced February 2012.
-
An Alternative Proof of an Extremal Entropy Inequality
Authors:
Sangwoo Park,
Erchin Serpedin,
Khalid Qaraqe
Abstract:
This paper first focuses on deriving an alternative approach for proving an extremal entropy inequality (EEI), originally presented in [11]. The proposed approach does not rely on the channel enhancement technique, and has the advantage that it yields an explicit description of the optimal solution as opposed to the implicit approach of [11]. Compared with the proofs in [11], the proposed alternat…
▽ More
This paper first focuses on deriving an alternative approach for proving an extremal entropy inequality (EEI), originally presented in [11]. The proposed approach does not rely on the channel enhancement technique, and has the advantage that it yields an explicit description of the optimal solution as opposed to the implicit approach of [11]. Compared with the proofs in [11], the proposed alternative proof is also simpler, more direct, more information-theoretic, and has the additional advantage that it offers a new perspective for establishing novel as well as known challenging results such the capacity of the vector Gaussian broadcast channel, the lower bound of the achievable rate for distributed source coding with a single quadratic distortion constraint, and the secrecy capacity of the Gaussian wire-tap channel. The second part of this paper is devoted to some novel applications of the proposed mathematical results. The proposed mathematical techniques are further exploited to obtain a more simplified proof of the EEI without using the entropy power inequality (EPI), to build the optimal solution for a special class of broadcasting channels with private messages and to obtain a mutual information-based performance bound for the mean square-error of a linear Bayesian estimator of a Gaussian source embedded in an additive noise channel.
△ Less
Submitted 20 November, 2012; v1 submitted 31 January, 2012;
originally announced January 2012.
-
Time Delay Estimation in Cognitive Radio Systems
Authors:
Fatih Kocak,
Hasari Celebi,
Sinan Gezici,
Khalid A. Qaraqe,
Huseyin Arslan,
H. Vincent Poor
Abstract:
In cognitive radio systems, secondary users can utilize multiple dispersed bands that are not used by primary users. In this paper, time delay estimation of signals that occupy multiple dispersed bands is studied. First, theoretical limits on time delay estimation are reviewed. Then, two-step time delay estimators that provide trade-offs between computational complexity and performance are inves…
▽ More
In cognitive radio systems, secondary users can utilize multiple dispersed bands that are not used by primary users. In this paper, time delay estimation of signals that occupy multiple dispersed bands is studied. First, theoretical limits on time delay estimation are reviewed. Then, two-step time delay estimators that provide trade-offs between computational complexity and performance are investigated. In addition, asymptotic optimality properties of the two-step time delay estimators are discussed. Finally, simulation results are presented to explain the theoretical results.
△ Less
Submitted 24 October, 2009;
originally announced October 2009.