-
Power Allocation and User Assignment Scheme for Beyond 5G Heterogeneous Networks
Authors:
Khush Bakht,
Furqan Jameel,
Zain Ali,
Wali Ullah Khan,
Imran Khan,
Guftaar Ahmad Sardar Sidhu,
Jeong Woo Lee
Abstract:
The issue of spectrum scarcity in wireless networks is becoming prominent and critical with each passing year. Although several promising solutions have been proposed to provide a solution to spectrum scarcity, most of them have many associated tradeoffs. In this context, one of the emerging ideas relates to the utilization of cognitive radios (CR) for future heterogeneous networks (HetNets). This…
▽ More
The issue of spectrum scarcity in wireless networks is becoming prominent and critical with each passing year. Although several promising solutions have been proposed to provide a solution to spectrum scarcity, most of them have many associated tradeoffs. In this context, one of the emerging ideas relates to the utilization of cognitive radios (CR) for future heterogeneous networks (HetNets). This paper provides a marriage of two promising candidates (i.e., CR and HetNets) for beyond fifth generation (5G) wireless networks. More specifically, a joint power allocation and user assignment solution for the multi-user underlay CR-based HetNets has been proposed and evaluated. To counter the limiting factors in these networks, the individual power of transmitting nodes and interference temperature protection constraints of the primary networks have been considered. An efficient solution is designed from the dual decomposition approach, where the optimal user assignment is obtained for the optimized power allocation at each node. The simulation results validate the superiority of the proposed optimization scheme against conventional baseline techniques.
△ Less
Submitted 25 October, 2019;
originally announced October 2019.
-
Clustering-Based Codebook Design for MIMO Communication System
Authors:
**g Jiang,
Xiao**g Wang,
Guftaar Ahmad Sardar Sidhu,
Li Zhen,
Runchen Gao
Abstract:
Codebook design is one of the core technologies in limited feedback multi-input multi-output (MIMO) communication systems. However, the conventional codebook designs usually assume MIMO vectors are uniformly distributed or isotropic. Motivated by the excellent classfication and analysis ability of clustering algorithms, we propose a K-means clustering based codebook design. First, large amounts of…
▽ More
Codebook design is one of the core technologies in limited feedback multi-input multi-output (MIMO) communication systems. However, the conventional codebook designs usually assume MIMO vectors are uniformly distributed or isotropic. Motivated by the excellent classfication and analysis ability of clustering algorithms, we propose a K-means clustering based codebook design. First, large amounts of channel state information (CSI) is stored as the input data of the clustering, and finally divided into N clusters according to the minimal distance. The clustering centroids are used as the statistic channel information of the codebook construction which the sum distance is minimal to the real channel information. Simulation results consist with theoretical analysis in terms of the achievable rate, and demonstrate that the proposed codebook design outperforms conventional schemes, especially in the non-uniform distribution of channel scenarios.
△ Less
Submitted 25 February, 2019;
originally announced February 2019.
-
Maximizing Secrecy Rate of an OFDM-based Multi-hop Underwater Acoustic Sensor Network
Authors:
Waqas Aman,
M. Mahboob Ur Rahman,
Zeeshan Haider,
Junaid Qadir,
M. Wasim Nawaz,
Guftaar Ahmad Sardar Sidhu
Abstract:
In this paper, we consider an eavesdrop** attack on a multi-hop, UnderWater Acoustic Sensor Network (UWASN) that consists of $M+1$ underwater sensors which report their sensed data via Orthogonal Frequency Division Multiplexing (OFDM) scheme to a sink node on the water surface. Furthermore, due to the presence of a passive malicious node in nearby vicinity, the multi-hop UnderWater Acoustic (UWA…
▽ More
In this paper, we consider an eavesdrop** attack on a multi-hop, UnderWater Acoustic Sensor Network (UWASN) that consists of $M+1$ underwater sensors which report their sensed data via Orthogonal Frequency Division Multiplexing (OFDM) scheme to a sink node on the water surface. Furthermore, due to the presence of a passive malicious node in nearby vicinity, the multi-hop UnderWater Acoustic (UWA) channel between a sensor node and the sink node is prone to eavesdrop** attack on each hop. Therefore, the problem at hand is to do (helper/relay) node selection (for data forwarding onto the next hop) as well as power allocation (across the OFDM sub-carriers) in a way that the secrecy rate is maximized at each hop. To this end, this problem of Node Selection and Power Allocation (NSPA) is formulated as a mixed binary-integer optimization program, which is then optimally solved via decomposition approach, and by exploiting duality theory along with the Karush-Kuhn-Tucker conditions. We also provide a computationally-efficient, sub-optimal solution to the NSPA problem, where we reformulate it as a mixed-integer linear program and solve it via decomposition and geometric approach. Moreover, when the UWA channel is multipath (and not just line-of-sight), we investigate an additional, machine learning-based approach to solve the NSPA problem. Finally, we compute the computational complexity of all the three proposed schemes (optimal, sub-optimal, and learning-based), and do extensive simulations to compare their performance against each other and against the baseline schemes (which allocate equal power to all the sub-carriers and do depth-based node selection). In a nutshell, this work proposes various (optimal and sub-optimal) methods for providing information-theoretic security at the physical layer of the protocol stack through resource allocation.
△ Less
Submitted 19 July, 2020; v1 submitted 4 July, 2018;
originally announced July 2018.
-
Enhancing Physical Layer Security in AF Relay Assisted Multi-Carrier Wireless Transmission
Authors:
Waqas Aman,
Guftaar Ahmad Sardar Sidhu,
Haji M. Furqan,
Zain Ali
Abstract:
In this paper, we study the physical layer security (PLS) problem in the dual hop orthogonal frequency division multiplexing (OFDM) based wireless communication system. First, we consider a single user single relay system and study a joint power optimization problem at the source and relay subject to individual power constraint at the two nodes. The aim is to maximize the end to end secrecy rate w…
▽ More
In this paper, we study the physical layer security (PLS) problem in the dual hop orthogonal frequency division multiplexing (OFDM) based wireless communication system. First, we consider a single user single relay system and study a joint power optimization problem at the source and relay subject to individual power constraint at the two nodes. The aim is to maximize the end to end secrecy rate with optimal power allocation over different sub-carriers. Later, we consider a more general multi-user multi-relay scenario. Under high SNR approximation for end to end secrecy rate, an optimization problem is formulated to jointly optimize power allocation at the BS, the relay selection, sub-carrier assignment to users and the power loading at each of the relaying node. The target is to maximize the overall security of the system subject to independent power budget limits at each transmitting node and the OFDMA based exclusive sub-carrier allocation constraints. A joint optimization solution is obtained through duality theory. Dual decomposition allows to exploit convex optimization techniques to find the power loading at the source and relay nodes. Further, an optimization for power loading at relaying nodes along with relay selection and sub carrier assignment for the fixed power allocation at the BS is also studied. Lastly, a sub-optimal scheme that explores joint power allocation at all transmitting nodes for the fixed subcarrier allocation and relay assignment is investigated. Finally, simulation results are presented to validate the performance of the proposed schemes.
△ Less
Submitted 11 January, 2018;
originally announced January 2018.
-
Enhancing Physical Layer Security in Dual-Hop Multiuser Transmission
Authors:
Waqas Aman,
Guftaar Ahmad Sardar Sidhu,
Tayyaba Jabeen,
Feifei Gao,
Shi **
Abstract:
In this paper, we consider the Physical Layer Security(PLS) problem in orthogonal frequency division multiple access (OFDMA) based dual-hop system which consists of multiple users, multiple amplify and forward relays, and an eavesdropper. The aim is to enhance PLS of the entire system by maximizing sum secrecy rate of secret users through optimal resource allocation under various practical constra…
▽ More
In this paper, we consider the Physical Layer Security(PLS) problem in orthogonal frequency division multiple access (OFDMA) based dual-hop system which consists of multiple users, multiple amplify and forward relays, and an eavesdropper. The aim is to enhance PLS of the entire system by maximizing sum secrecy rate of secret users through optimal resource allocation under various practical constraints. Specifically, the sub-carrier allocation to different users, the relay assignments, and the power loading over different sub-carriers at transmitting nodes are optimized. The joint optimization problem is modeled as a mixed binary integer programming problem subject to exclusive sub-carrier allocation and separate power budget constraints at each node. A joint optimization solution is obtained through Lagrangian dual decomposition where KKT conditions are exploited to find the optimal power allocation at base station. Further, to reduce the complexity, a sub-optimal scheme is presented where the optimal power allocation is derived under fixed sub-carrier-relay assignment. Simulation results are also provided to validate the performance of proposed schemes.
△ Less
Submitted 19 March, 2017;
originally announced March 2017.