-
Cooperative Localization in Massive Networks
Authors:
Yifeng Xiong,
Nan Wu,
Yuan Shen,
Moe Z. Win
Abstract:
Network localization is capable of providing accurate and ubiquitous position information for numerous wireless applications. This paper studies the accuracy of cooperative network localization in large-scale wireless networks. Based on a decomposition of the equivalent Fisher information matrix (EFIM), we develop a random-walk-inspired approach for the analysis of EFIM, and propose a position inf…
▽ More
Network localization is capable of providing accurate and ubiquitous position information for numerous wireless applications. This paper studies the accuracy of cooperative network localization in large-scale wireless networks. Based on a decomposition of the equivalent Fisher information matrix (EFIM), we develop a random-walk-inspired approach for the analysis of EFIM, and propose a position information routing interpretation of cooperative network localization. Using this approach, we show that in large lattice and stochastic geometric networks, when anchors are uniformly distributed, the average localization error of agents grows logarithmically with the reciprocal of anchor density in an asymptotic regime. The results are further illustrated using numerical examples.
△ Less
Submitted 15 October, 2021;
originally announced October 2021.
-
Cramér-Rao Bounds for Near-Field Localization
Authors:
Andrea De Jesus Torres,
Antonio Alberto D'Amico,
Luca Sanguinetti,
Moe Z. Win
Abstract:
Multiple antenna arrays play a key role in wireless networks for communications but also localization and sensing. The use of large antenna arrays pushes towards a propagation regime in which the wavefront is no longer plane but spherical. This allows to infer the position and orientation of an arbitrary source from the received signal without the need of using multiple anchor nodes. To understand…
▽ More
Multiple antenna arrays play a key role in wireless networks for communications but also localization and sensing. The use of large antenna arrays pushes towards a propagation regime in which the wavefront is no longer plane but spherical. This allows to infer the position and orientation of an arbitrary source from the received signal without the need of using multiple anchor nodes. To understand the fundamental limits of large antenna arrays for localization, this paper fusions wave propagation theory with estimation theory, and computes the Cram{é}r-Rao Bound (CRB) for the estimation of the three Cartesian coordinates of the source on the basis of the electromagnetic vector field, observed over a rectangular surface area. To simplify the analysis, we assume that the source is a dipole, whose center is located on the line perpendicular to the surface center, with an orientation a priori known. Numerical and asymptotic results are given to quantify the CRBs, and to gain insights into the effect of various system parameters on the ultimate estimation accuracy. It turns out that surfaces of practical size may guarantee a centimeter-level accuracy in the mmWave bands.
△ Less
Submitted 3 December, 2021; v1 submitted 30 April, 2021;
originally announced April 2021.
-
Massive Uncoordinated Multiple Access for Beyond 5G
Authors:
Mostafa Mohammadkarimi,
Octavia A. Dobre,
Moe Z. Win
Abstract:
Existing wireless communication systems have been mainly designed to provide substantial gain in terms of data rates. However, 5G and Beyond will depart from this scheme, with the objective not only to provide services with higher data rates. One of the main goals is to support massive machine-type communications (mMTC) in the IoT applications. Supporting massive uplink (UP) communications for dev…
▽ More
Existing wireless communication systems have been mainly designed to provide substantial gain in terms of data rates. However, 5G and Beyond will depart from this scheme, with the objective not only to provide services with higher data rates. One of the main goals is to support massive machine-type communications (mMTC) in the IoT applications. Supporting massive uplink (UP) communications for devices with sporadic traffic pattern and short-packet size, as it is in many mMTC use cases, is a challenging task, particularly when the control signaling is not negligible in size compared to the payload. Also, channel estimation is challenging for sporadic and short-packet transmission due to the limited number of employed pilots. In this paper, a new UP multiple access (MA) scheme is proposed for mMTC, which can support a large number of uncoordinated IoT devices with short-packet and sporadic traffic. The proposed UP MA scheme removes the overheads associated with the device identifier as well as pilots related to channel estimation. An alternative mechanism for device identification is proposed, where a unique spreading code is dedicated to each IoT device. This unique code is simultaneously used for the spreading purpose and device identification. Two IoT device identification algorithms which employ sparse signal reconstruction methods are proposed to determine the active IoT devices prior to data detection. Specifically, the BIC model order selection method is employed to develop an IoT device identification algorithm for unknown and time-varying probability of device activity. Our proposed MA scheme benefits from a non-coherent multiuser detection algorithm based on machine learning to enable data detection without a priori knowledge on channel state information. The effectiveness of the proposed MA scheme for known and unknown probability of activity is supported by simulation results.
△ Less
Submitted 25 March, 2024; v1 submitted 30 September, 2020;
originally announced October 2020.
-
Peregrine: Network Localization and Navigation with Scalable Inference and Efficient Operation
Authors:
Bryan Teague,
Zhenyu Liu,
Florian Meyer,
Andrea Conti,
Moe Z. Win
Abstract:
Location-aware networks will enable new services and applications in fields such as autonomous driving, smart cities, and the Internet-of-Things. One promising solution for ubiquitous localization is network localization and navigation (NLN), where devices form a network that cooperatively localizes itself, reducing the infrastructure needed for accurate localization. This paper introduces a real-…
▽ More
Location-aware networks will enable new services and applications in fields such as autonomous driving, smart cities, and the Internet-of-Things. One promising solution for ubiquitous localization is network localization and navigation (NLN), where devices form a network that cooperatively localizes itself, reducing the infrastructure needed for accurate localization. This paper introduces a real-time NLN system named Peregrine, which combines distributed NLN algorithms with commercially available ultra-wideband (UWB) sensing and communication technology. The Peregrine software application, for the first time, integrates three NLN algorithms to jointly perform the tasks of localization and network operation in a technology agnostic manner, leveraging both spatial and temporal cooperation. Peregrine hardware is composed of low-cost, compact devices that comprise a microprocessor and a commercial UWB radio. This paper presents the design of the Peregrine system and characterizes the performance impact of each algorithmic component. Indoor experiments validate that our approach to realizing NLN is both reliable and scalable, and maintains sub-meter-level accuracy even in challenging indoor scenarios.
△ Less
Submitted 30 January, 2020;
originally announced January 2020.
-
Molecular Communication in H-Diffusion
Authors:
Dung Phuong Trinh,
Youngmin Jeong,
Hyundong Shin,
Moe Z. Win
Abstract:
The random propagation of molecules in a fluid medium is characterized by the spontaneous diffusion law as well as the interaction between the environment and molecules. In this paper, we embody the anomalous diffusion theory for modeling and analysis in molecular communication. We employ H-diffusion to model a non-Fickian behavior of molecules in diffusive channels. H-diffusion enables us to mode…
▽ More
The random propagation of molecules in a fluid medium is characterized by the spontaneous diffusion law as well as the interaction between the environment and molecules. In this paper, we embody the anomalous diffusion theory for modeling and analysis in molecular communication. We employ H-diffusion to model a non-Fickian behavior of molecules in diffusive channels. H-diffusion enables us to model anomalous diffusion as the subordinate relationship between self-similar parent and directing processes and their corresponding probability density functions with two H-variates in a unified fashion. In addition, we introduce standard H-diffusion to make a bridge of normal diffusion across well-known anomalous diffusions such as space-time fractional diffusion, Erdelyi-Kober fractional diffusion, grey Brownian motion, fractional Brownian motion, and Brownian motion. We then characterize the statistical properties of uncertainty of the random propagation time of a molecule governed by H-diffusion laws by introducing a general class of molecular noise---called H-noise. Since H-noise can be an algebraic tailed process, we provide a concept of H-noise power using finite logarithm moments based on zero-order statistics. Finally, we develop a unifying framework for error probability analysis in a timing-based molecular communication system with a concept of signal-to-noise power ratio.
△ Less
Submitted 4 November, 2019;
originally announced November 2019.
-
Molecular Communication with Anomalous Diffusion in Stochastic Nanonetworks
Authors:
Dung Phuong Trinh,
Youngmin Jeong,
Hyundong Shin,
Moe Z. Win
Abstract:
Molecular communication in nature can incorporate a large number of nano-things in nanonetworks as well as demonstrate how nano-things communicate. This paper presents molecular communication where transmit nanomachines deliver information molecules to a receive nanomachine over an anomalous diffusion channel. By considering a random molecule concentration in a space-time fractional diffusion chan…
▽ More
Molecular communication in nature can incorporate a large number of nano-things in nanonetworks as well as demonstrate how nano-things communicate. This paper presents molecular communication where transmit nanomachines deliver information molecules to a receive nanomachine over an anomalous diffusion channel. By considering a random molecule concentration in a space-time fractional diffusion channel, an analytical expression is derived for the first passage time (FPT) of the molecules. Then, the bit error rate of the lth nearest molecular communication with timing binary modulation is derived in terms of Fox's H-function. In the presence of interfering molecules, the mean and variance of the number of the arrived interfering molecules in a given time interval are presented. Using these statistics, a simple mitigation scheme for timing modulation is provided. The results in this paper provide the network performance on the error probability by averaging over a set of random distances between the communicating links as well as a set of random FPTs caused by the anomalous diffusion of molecules. This result will help in designing and develo** molecular communication systems for various design purposes.
△ Less
Submitted 4 November, 2019;
originally announced November 2019.
-
Optimal Coverage and Rate in Downlink Cellular Networks: A SIR Meta-Distribution Based Approach
Authors:
A. M. Hayajneh,
S. A. R. Zaidi,
Des. C. McLernon,
M. Z. Win,
A. Imran,
M. Ghogho
Abstract:
In this paper, we present a detailed analysis of the coverage and spectral efficiency of a downlink cellular network. Rather than relying on the first order statistics of received signal-to-interference-ratio (SIR) such as coverage probability, we focus on characterizing its meta-distribution. Our analysis is based on the alpha-beta-gamma (ABG) path-loss model which provides us with the flexibilit…
▽ More
In this paper, we present a detailed analysis of the coverage and spectral efficiency of a downlink cellular network. Rather than relying on the first order statistics of received signal-to-interference-ratio (SIR) such as coverage probability, we focus on characterizing its meta-distribution. Our analysis is based on the alpha-beta-gamma (ABG) path-loss model which provides us with the flexibility to analyze urban macro (UMa) and urban micro (UMi) deployments. With the help of an analytical framework, we demonstrate that selection of underlying degrees-of-freedom such as BS height for optimization of first order statistics such as coverage probability is not optimal in the network-wide sense. Consequently, the SIR meta-distribution must be employed to select appropriate operational points which will ensure consistent user experiences across the network. Our design framework reveals that the traditional results which advocate lowering of BS heights or even optimal selection of BS height do not yield consistent service experience across users. By employing the developed framework we also demonstrate how available spectral resources in terms of time slots/channel partitions can be optimized by considering the meta-distribution of the SIR.
△ Less
Submitted 17 August, 2018;
originally announced August 2018.
-
Doppler Spread Estimation in MIMO Frequency-selective Fading Channels
Authors:
Mostafa Mohammadkarimi,
Ebrahim Karami,
Octavia A. Dobre,
Moe Z. Win
Abstract:
One of the main challenges in high-speed mobile communications is the presence of large Doppler spreads. Thus, accurate estimation of maximum Doppler spread (MDS) plays an important role in improving the performance of the communication link. In this paper, we derive the data-aided (DA) and non-data-aided (NDA) Cramer-Rao lower bounds (CRLBs) and maximum likelihood estimators (MLEs) for the MDS in…
▽ More
One of the main challenges in high-speed mobile communications is the presence of large Doppler spreads. Thus, accurate estimation of maximum Doppler spread (MDS) plays an important role in improving the performance of the communication link. In this paper, we derive the data-aided (DA) and non-data-aided (NDA) Cramer-Rao lower bounds (CRLBs) and maximum likelihood estimators (MLEs) for the MDS in multiple-input multiple-output (MIMO) frequency-selective fading channel. Moreover, a lowcomplexity NDA-moment-based estimator (MBE) is proposed. The proposed NDA-MBE relies on the second- and fourth-order moments of the received signal, which are employed to estimate the normalized squared autocorrelation function of the fading channel. Then, the problem of MDS estimation is formulated as a non-linear regression problem, and the least-squares curvefitting optimization technique is applied to determine the estimate of the MDS. This is the first time in the literature when DAand NDA-MDS estimation is investigated for MIMO frequency-selective fading channel. Simulation results show that there is no significant performance gap between the derived NDA-MLE and NDA-CRLB even when the observation window is relatively small. Furthermore, the significant reduced-complexity in the NDA-MBE leads to low root-mean-square error (NRMSE) over a wide range of MDSs when the observation window is selected large enough.
△ Less
Submitted 8 February, 2018;
originally announced February 2018.
-
A Belief Propagation Algorithm for Multipath-Based SLAM
Authors:
Erik Leitinger,
Florian Meyer,
Franz Hlawatsch,
Klaus Witrisal,
Fredrik Tufvesson,
Moe Z. Win
Abstract:
We present a simultaneous localization and map** (SLAM) algorithm that is based on radio signals and the association of specular multipath components (MPCs) with geometric features. Especially in indoor scenarios, robust localization from radio signals is challenging due to diffuse multipath propagation, unknown MPC-feature association, and limited visibility of features. In our approach, specul…
▽ More
We present a simultaneous localization and map** (SLAM) algorithm that is based on radio signals and the association of specular multipath components (MPCs) with geometric features. Especially in indoor scenarios, robust localization from radio signals is challenging due to diffuse multipath propagation, unknown MPC-feature association, and limited visibility of features. In our approach, specular reflections at flat surfaces are described in terms of virtual anchors (VAs) that are mirror images of the physical anchors (PAs). The positions of these VAs and possibly also of the PAs are unknown. We develop a Bayesian model of the SLAM problem and represent it by a factor graph, which enables the use of belief propagation (BP) for efficient marginalization of the joint posterior distribution. The resulting BP-based SLAM algorithm detects the VAs associated with the PAs and estimates jointly the time-varying position of the mobile agent and the positions of the VAs and possibly also of the PAs, thereby leveraging the MPCs in the radio signal for improved accuracy and robustness of agent localization. The algorithm has a low computational complexity and scales well in all relevant system parameters. Experimental results using both synthetic measurements and real ultra-wideband radio signals demonstrate the excellent performance of the algorithm in challenging indoor environments.
△ Less
Submitted 29 August, 2019; v1 submitted 13 January, 2018;
originally announced January 2018.
-
Cooperative Network Synchronization: Asymptotic Analysis
Authors:
Yifeng Xiong,
Nan Wu,
Yuan Shen,
Moe Z. Win
Abstract:
Accurate clock synchronization is required for collaborative operations among nodes across wireless networks. Compared with traditional layer-by-layer methods, cooperative network synchronization techniques lead to significant improvement in performance, efficiency, and robustness. This paper develops a framework for the performance analysis of cooperative network synchronization. We introduce the…
▽ More
Accurate clock synchronization is required for collaborative operations among nodes across wireless networks. Compared with traditional layer-by-layer methods, cooperative network synchronization techniques lead to significant improvement in performance, efficiency, and robustness. This paper develops a framework for the performance analysis of cooperative network synchronization. We introduce the concepts of cooperative dilution intensity (CDI) and relative CDI to characterize the interaction between agents, which can be interpreted as properties of a random walk over the network. Our approach enables us to derive closed-form asymptotic expressions of performance limits, relating them to the quality of observations as well as network topology.
△ Less
Submitted 14 November, 2017; v1 submitted 16 September, 2017;
originally announced September 2017.
-
Modeling and Analysis of Cellular Networks using Stochastic Geometry: A Tutorial
Authors:
Hesham ElSawy,
Ahmed Sultan-Salem,
Mohamed-Slim Alouini,
Moe Z. Win
Abstract:
This paper presents a tutorial on stochastic geometry (SG) based analysis for cellular networks. This tutorial is distinguished by its depth with respect to wireless communication details and its focus on cellular networks. The paper starts by modeling and analyzing the baseband interference in a basic cellular network model. Then, it characterizes signal-to-interference-plus-noise-ratio (SINR) an…
▽ More
This paper presents a tutorial on stochastic geometry (SG) based analysis for cellular networks. This tutorial is distinguished by its depth with respect to wireless communication details and its focus on cellular networks. The paper starts by modeling and analyzing the baseband interference in a basic cellular network model. Then, it characterizes signal-to-interference-plus-noise-ratio (SINR) and its related performance metrics. In particular, a unified approach to conduct error probability, outage probability, and rate analysis is presented. Although the main focus of the paper is on cellular networks, the presented unified approach applies for other types of wireless networks that impose interference protection around receivers. The paper then extends the baseline unified approach to capture cellular network characteristics (e.g., frequency reuse, multiple antenna, power control, etc.). It also presents numerical examples associated with demonstrations and discussions. Finally, we point out future research directions.
△ Less
Submitted 13 April, 2016;
originally announced April 2016.
-
Group-blind detection with very large antenna arrays in the presence of pilot contamination
Authors:
Guido Carlo Ferrante,
Giovanni Geraci,
Tony Q. S. Quek,
Moe Z. Win
Abstract:
Massive MIMO is, in general, severely affected by pilot contamination. As opposed to traditional detectors, we propose a group-blind detector that takes into account the presence of pilot contamination. While sticking to the traditional structure of the training phase, where orthogonal pilot sequences are reused, we use the excess antennas at each base station to partially remove interference duri…
▽ More
Massive MIMO is, in general, severely affected by pilot contamination. As opposed to traditional detectors, we propose a group-blind detector that takes into account the presence of pilot contamination. While sticking to the traditional structure of the training phase, where orthogonal pilot sequences are reused, we use the excess antennas at each base station to partially remove interference during the uplink data transmission phase. We analytically derive the asymptotic SINR achievable with group-blind detection, and confirm our findings by simulations. We show, in particular, that in an interference-limited scenario with one dominant interfering cell, the SINR can be doubled compared to non-group-blind detection.
△ Less
Submitted 11 October, 2015;
originally announced October 2015.
-
Indoor Localization Algorithm For Smartphones
Authors:
Kaiqing Zhang,
Hong Hu,
Wenhan Dai,
Yuan Shen,
Moe Z. Win
Abstract:
Increasing sources of sensor measurements and prior knowledge have become available for indoor localization on smartphones. How to effectively utilize these sources for enhancing localization accuracy is an important yet challenging problem. In this paper, we present an area state-aided localization algorithm that exploits various sources of information. Specifically, we introduce the concept of a…
▽ More
Increasing sources of sensor measurements and prior knowledge have become available for indoor localization on smartphones. How to effectively utilize these sources for enhancing localization accuracy is an important yet challenging problem. In this paper, we present an area state-aided localization algorithm that exploits various sources of information. Specifically, we introduce the concept of area state to indicate the area where the user is on an indoor map. The position of the user is then estimated using inertial measurement unit (IMU) measurements with the aid of area states. The area states are in turn updated based on the position estimates. To avoid accumulated errors of IMU measurements, our algorithm uses WiFi received signal strength indicator (RSSI) to indicate the vicinity of the user to the routers. The experiment results show that our system can achieve satisfactory localization accuracy in a typical indoor environment.
△ Less
Submitted 26 March, 2015;
originally announced March 2015.
-
Generalized Interference Alignment --- Part II: Application to Wireless Secrecy
Authors:
Liangzhong Ruan,
Vincent K. N. Lau,
Moe Z. Win
Abstract:
In contrast to its wired counterpart, wireless communication is highly susceptible to eavesdrop** due to the broadcast nature of the wireless propagation medium. Recent works have proposed the use of interference to reduce eavesdrop** capabilities in wireless wiretap networks. However, the concurrent effect of interference on both eavesdrop** receivers (ERs) and legitimate receivers (LRs) ha…
▽ More
In contrast to its wired counterpart, wireless communication is highly susceptible to eavesdrop** due to the broadcast nature of the wireless propagation medium. Recent works have proposed the use of interference to reduce eavesdrop** capabilities in wireless wiretap networks. However, the concurrent effect of interference on both eavesdrop** receivers (ERs) and legitimate receivers (LRs) has not been thoroughly investigated, and carefully engineering the network interference is required to harness the full potential of interference for wireless secrecy. This two part paper addresses this issue by proposing a generalized interference alignment (GIA) technique, which jointly designs the transceivers at the legitimate partners to impede the ERs without interfering with LRs. In Part I, we have established a theoretical framework for the GIA technique. In Part II, we will first propose an efficient GIA algorithm that is applicable to large-scale networks and then evaluate the performance of this algorithm in stochastic wireless wiretap network via both analysis and simulation. These results reveal insights into when and how GIA contributes to wireless secrecy.
△ Less
Submitted 21 March, 2015;
originally announced March 2015.
-
Generalized Interference Alignment --- Part I: Theoretical Framework
Authors:
Liangzhong Ruan,
Vincent K. N. Lau,
Moe Z. Win
Abstract:
Interference alignment (IA) has attracted enormous research interest as it achieves optimal capacity scaling with respect to signal to noise ratio on interference networks. IA has also recently emerged as an effective tool in engineering interference for secrecy protection on wireless wiretap networks. However, despite the numerous works dedicated to IA, two of its fundamental issues, i.e., feasib…
▽ More
Interference alignment (IA) has attracted enormous research interest as it achieves optimal capacity scaling with respect to signal to noise ratio on interference networks. IA has also recently emerged as an effective tool in engineering interference for secrecy protection on wireless wiretap networks. However, despite the numerous works dedicated to IA, two of its fundamental issues, i.e., feasibility conditions and transceiver design, are not completely addressed in the literature. In this two part paper, a generalised interference alignment (GIA) technique is proposed to enhance the IA's capability in secrecy protection. A theoretical framework is established to analyze the two fundamental issues of GIA in Part I and then the performance of GIA in large-scale stochastic networks is characterized to illustrate how GIA benefits secrecy protection in Part II. The theoretical framework for GIA adopts methodologies from algebraic geometry, determines the necessary and sufficient feasibility conditions of GIA, and generates a set of algorithms that can solve the GIA problem. This framework sets up a foundation for the development and implementation of GIA.
△ Less
Submitted 21 March, 2015;
originally announced March 2015.
-
Performance Limits and Geometric Properties of Array Localization
Authors:
Yanjun Han,
Yuan Shen,
Xiao-** Zhang,
Moe Z. Win,
Huadong Meng
Abstract:
Location-aware networks are of great importance and interest in both civil and military applications. This paper determines the localization accuracy of an agent, which is equipped with an antenna array and localizes itself using wireless measurements with anchor nodes, in a far-field environment. In view of the Cramér-Rao bound, we first derive the localization information for static scenarios an…
▽ More
Location-aware networks are of great importance and interest in both civil and military applications. This paper determines the localization accuracy of an agent, which is equipped with an antenna array and localizes itself using wireless measurements with anchor nodes, in a far-field environment. In view of the Cramér-Rao bound, we first derive the localization information for static scenarios and demonstrate that such information is a weighed sum of Fisher information matrices from each anchor-antenna measurement pair. Each matrix can be further decomposed into two parts: a distance part with intensity proportional to the squared baseband effective bandwidth of the transmitted signal and a direction part with intensity associated with the normalized anchor-antenna visual angle. Moreover, in dynamic scenarios, we show that the Doppler shift contributes additional direction information, with intensity determined by the agent velocity and the root mean squared time duration of the transmitted signal. In addition, two measures are proposed to evaluate the localization performance of wireless networks with different anchor-agent and array-antenna geometries, and both formulae and simulations are provided for typical anchor deployments and antenna arrays.
△ Less
Submitted 21 December, 2015; v1 submitted 17 May, 2014;
originally announced May 2014.
-
Power Optimization for Network Localization
Authors:
Yuan Shen,
Wenhan Dai,
Moe Z. Win
Abstract:
Reliable and accurate localization of mobile objects is essential for many applications in wireless networks. In range-based localization, the position of the object can be inferred using the distance measurements from wireless signals exchanged with active objects or reflected by passive ones. Power allocation for ranging signals is important since it affects not only network lifetime and through…
▽ More
Reliable and accurate localization of mobile objects is essential for many applications in wireless networks. In range-based localization, the position of the object can be inferred using the distance measurements from wireless signals exchanged with active objects or reflected by passive ones. Power allocation for ranging signals is important since it affects not only network lifetime and throughput but also localization accuracy. In this paper, we establish a unifying optimization framework for power allocation in both active and passive localization networks. In particular, we first determine the functional properties of the localization accuracy metric, which enable us to transform the power allocation problems into second-order cone programs (SOCPs). We then propose the robust counterparts of the problems in the presence of parameter uncertainty and develop asymptotically optimal and efficient near-optimal SOCP-based algorithms. Our simulation results validate the efficiency and robustness of the proposed algorithms.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
Modified CRB for Location and Velocity Estimation using Signals of Opportunity
Authors:
Mei Leng,
Wee Peng Tay,
Chong Meng Samson See,
Sirajudeen Gulam Razul,
Moe Z. Win
Abstract:
We consider the problem of localizing two sensors using signals of opportunity from beacons with known positions. Beacons and sensors have asynchronous local clocks or oscillators with unknown clock skews and offsets. We model clock skews as random, and analyze the biases introduced by clock asynchronism in the received signals. By deriving the equivalent Fisher information matrix for the modified…
▽ More
We consider the problem of localizing two sensors using signals of opportunity from beacons with known positions. Beacons and sensors have asynchronous local clocks or oscillators with unknown clock skews and offsets. We model clock skews as random, and analyze the biases introduced by clock asynchronism in the received signals. By deriving the equivalent Fisher information matrix for the modified Bayesian Cramér-Rao lower bound (CRLB) of sensor position and velocity estimation, we quantify the errors caused by clock asynchronism.
△ Less
Submitted 6 September, 2013; v1 submitted 4 June, 2013;
originally announced June 2013.
-
Robust power allocation for energy-efficient location aware networks
Authors:
William Wei-Liang Li,
Yuan Shen,
Ying Jun,
Zhang,
Moe Z. Win
Abstract:
In wireless location-aware networks, mobile nodes (agents) typically obtain their positions through ranging with respect to nodes with known positions (anchors). Transmit power allocation not only affects network lifetime, throughput, and interference, but also determines localization accuracy. In this paper, we present an optimization framework for robust power allocation in network localization…
▽ More
In wireless location-aware networks, mobile nodes (agents) typically obtain their positions through ranging with respect to nodes with known positions (anchors). Transmit power allocation not only affects network lifetime, throughput, and interference, but also determines localization accuracy. In this paper, we present an optimization framework for robust power allocation in network localization to tackle imperfect knowledge of network parameters. In particular, we formulate power allocation problems to minimize the squared position error bound (SPEB) and the maximum directional position error bound (mDPEB), respectively, for a given power budget. We show that such formulations can be efficiently solved via conic programming. Moreover, we design an efficient power allocation scheme that allows distributed computations among agents. The simulation results show that the proposed schemes significantly outperform uniform power allocation, and the robust schemes outperform their non-robust counterparts when the network parameters are subject to uncertainty.
△ Less
Submitted 26 May, 2013;
originally announced May 2013.
-
On the Performance Limits of Map-Aware Localization
Authors:
Francesco Montorsi,
Santiago Mazuelas,
Giorgio M. Vitetta,
Moe Z. Win
Abstract:
Establishing bounds on the accuracy achievable by localization techniques represents a fundamental technical issue. Bounds on localization accuracy have been derived for cases in which the position of an agent is estimated on the basis of a set of observations and, possibly, of some a priori information related to them (e.g., information about anchor positions and properties of the communication c…
▽ More
Establishing bounds on the accuracy achievable by localization techniques represents a fundamental technical issue. Bounds on localization accuracy have been derived for cases in which the position of an agent is estimated on the basis of a set of observations and, possibly, of some a priori information related to them (e.g., information about anchor positions and properties of the communication channel). In this manuscript new bounds are derived under the assumption that the localization system is map-aware, i.e., it can benefit not only from the availability of observations, but also from the a priori knowledge provided by the map of the environment where it operates. Our results show that: a) map-aware estimation accuracy can be related to some features of the map (e.g., its shape and area) even though, in general, the relation is complicated; b) maps are really useful in the presence of some combination of low signal-to-noise ratios and specific geometrical features of the map (e.g., the size of obstructions); c) in most cases, there is no need of refined maps since additional details do not improve estimation accuracy.
△ Less
Submitted 10 March, 2013;
originally announced March 2013.
-
The Feasibility Conditions for Interference Alignment in MIMO Networks
Authors:
Liangzhong Ruan,
Vincent K. N. Lau,
Moe Z. Win
Abstract:
Interference alignment (IA) has attracted great attention in the last few years for its breakthrough performance in interference networks. However, despite the numerous works dedicated to IA, the feasibility conditions of IA remains unclear for most network topologies. The IA feasibility analysis is challenging as the IA constraints are sets of high-degree polynomials, for which no systematic tool…
▽ More
Interference alignment (IA) has attracted great attention in the last few years for its breakthrough performance in interference networks. However, despite the numerous works dedicated to IA, the feasibility conditions of IA remains unclear for most network topologies. The IA feasibility analysis is challenging as the IA constraints are sets of high-degree polynomials, for which no systematic tool to analyze the solvability conditions exists. In this work, by develo** a new mathematical framework that maps the solvability of sets of polynomial equations to the linear independence of their first-order terms, we propose a sufficient condition that applies to MIMO interference networks with general configurations. We have further proved that this sufficient condition matches with the necessary conditions under a wide range of configurations. These results further consolidate the theoretical basis of IA.
△ Less
Submitted 14 November, 2012;
originally announced November 2012.
-
Cooperative Network Navigation: Fundamental Limit and its Geometrical Interpretation
Authors:
Yuan Shen,
Santiago Mazuelas,
Moe Z. Win
Abstract:
Localization and tracking of moving nodes via network navigation gives rise to a new paradigm, where nodes exploit both temporal and spatial cooperation to infer their positions based on intra- and inter-node measurements. While such cooperation can significantly improve the performance, it imposes intricate information processing that impedes network design and operation. In this paper, we establ…
▽ More
Localization and tracking of moving nodes via network navigation gives rise to a new paradigm, where nodes exploit both temporal and spatial cooperation to infer their positions based on intra- and inter-node measurements. While such cooperation can significantly improve the performance, it imposes intricate information processing that impedes network design and operation. In this paper, we establish a theoretical framework for cooperative network navigation and determine the fundamental limits of navigation accuracy using equivalent Fisher information analysis. We then introduce the notion of carry-over information, and provide a geometrical interpretation of the navigation information and its evolution in time. Our framework unifies the navigation information obtained from temporal and spatial cooperation, leading to a deep understanding of information evolution in the network and benefit of cooperation.
△ Less
Submitted 15 December, 2011;
originally announced December 2011.
-
Wireless Secrecy in Large-Scale Networks
Authors:
Pedro C. Pinto,
Joao Barros,
Moe Z. Win
Abstract:
The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper provides an overview of the main properties of…
▽ More
The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper provides an overview of the main properties of this new class of random graphs. We first analyze the local properties of the iS-graph, namely the degree distributions and their dependence on fading, target secrecy rate, and eavesdropper collusion. To mitigate the effect of the eavesdroppers, we propose two techniques that improve secure connectivity. Then, we analyze the global properties of the iS-graph, namely percolation on the infinite plane, and full connectivity on a finite region. These results help clarify how the presence of eavesdroppers can compromise secure communication in a large-scale network.
△ Less
Submitted 17 February, 2011;
originally announced February 2011.
-
Percolation and Connectivity in the Intrinsically Secure Communications Graph
Authors:
Pedro C. Pinto,
Moe Z. Win
Abstract:
The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper aims to characterize the global properties of t…
▽ More
The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper aims to characterize the global properties of the iS-graph in terms of: (i) percolation on the infinite plane, and (ii) full connectivity on a finite region. First, for the Poisson iS-graph defined on the infinite plane, the existence of a phase transition is proven, whereby an unbounded component of connected nodes suddenly arises as the density of legitimate nodes is increased. This shows that long-range secure communication is still possible in the presence of eavesdroppers. Second, full connectivity on a finite region of the Poisson iS-graph is considered. The exact asymptotic behavior of full connectivity in the limit of a large density of legitimate nodes is characterized. Then, simple, explicit expressions are derived in order to closely approximate the probability of full connectivity for a finite density of legitimate nodes. The results help clarify how the presence of eavesdroppers can compromise long-range secure communication.
△ Less
Submitted 24 August, 2010;
originally announced August 2010.
-
Techniques for Enhanced Physical-Layer Security
Authors:
Pedro C. Pinto,
Joao Barros,
Moe Z. Win
Abstract:
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems. Within this paradigm, we explore strategies to improve secure connectivity in a wireless network. We first consider the intrinsically secure communications graph (i…
▽ More
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems. Within this paradigm, we explore strategies to improve secure connectivity in a wireless network. We first consider the intrinsically secure communications graph (iS-graph), a convenient representation of the links that can be established with information-theoretic security on a large-scale network. We then propose and characterize two techniques--sectorized transmission and eavesdropper neutralization--which are shown to dramatically enhance the connectivity of the iS-graph.
△ Less
Submitted 22 August, 2010;
originally announced August 2010.
-
Continuum Percolation in the Intrinsically Secure Communications Graph
Authors:
Pedro C. Pinto,
Moe Z. Win
Abstract:
The intrinsically secure communications graph (iS-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence of eavesdroppers. It is based on principles of information-theoretic security, widely accepted as the strictest notion of security. In this paper, we are interested in characterizing the global properties of the iS-gr…
▽ More
The intrinsically secure communications graph (iS-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence of eavesdroppers. It is based on principles of information-theoretic security, widely accepted as the strictest notion of security. In this paper, we are interested in characterizing the global properties of the iS-graph in terms of percolation on the infinite plane. We prove the existence of a phase transition in the Poisson iS-graph, whereby an unbounded component of securely connected nodes suddenly arises as we increase the density of legitimate nodes. Our work shows that long-range communication in a wireless network is still possible when a secrecy constraint is present.
△ Less
Submitted 22 July, 2010;
originally announced July 2010.
-
A Unifying Framework for Local Throughput in Wireless Networks
Authors:
Pedro C. Pinto,
Moe Z. Win
Abstract:
With the increased competition for the electromagnetic spectrum, it is important to characterize the impact of interference in the performance of a wireless network, which is traditionally measured by its throughput. This paper presents a unifying framework for characterizing the local throughput in wireless networks. We first analyze the throughput of a probe link from a connectivity perspective,…
▽ More
With the increased competition for the electromagnetic spectrum, it is important to characterize the impact of interference in the performance of a wireless network, which is traditionally measured by its throughput. This paper presents a unifying framework for characterizing the local throughput in wireless networks. We first analyze the throughput of a probe link from a connectivity perspective, in which a packet is successfully received if it does not collide with other packets from nodes within its reach (called the audible interferers). We then characterize the throughput from a signal-to-interference-plus-noise ratio (SINR) perspective, in which a packet is successfully received if the SINR exceeds some threshold, considering the interference from all emitting nodes in the network. Our main contribution is to generalize and unify various results scattered throughout the literature. In particular, the proposed framework encompasses arbitrary wireless propagation effects (e.g, Nakagami-m fading, Rician fading, or log-normal shadowing), as well as arbitrary traffic patterns (e.g., slotted-synchronous, slotted-asynchronous, or exponential-interarrivals traffic), allowing us to draw more general conclusions about network performance than previously available in the literature.
△ Less
Submitted 16 July, 2010;
originally announced July 2010.
-
Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Authors:
William Weiliang Li,
Ying Jun,
Zhang,
Anthony Man-Cho So,
Moe Z. Win
Abstract:
Adaptive OFDMA has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wireless systems. The research over the last decade on adaptive OFDMA systems has focused on adapting the allocation of radio resources, such as subcarriers and power, to the instantaneous channel conditions of all users. However, such "fast" adaptation requires high comp…
▽ More
Adaptive OFDMA has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wireless systems. The research over the last decade on adaptive OFDMA systems has focused on adapting the allocation of radio resources, such as subcarriers and power, to the instantaneous channel conditions of all users. However, such "fast" adaptation requires high computational complexity and excessive signaling overhead. This hinders the deployment of adaptive OFDMA systems worldwide. This paper proposes a slow adaptive OFDMA scheme, in which the subcarrier allocation is updated on a much slower timescale than that of the fluctuation of instantaneous channel conditions. Meanwhile, the data rate requirements of individual users are accommodated on the fast timescale with high probability, thereby meeting the requirements except occasional outage. Such an objective has a natural chance constrained programming formulation, which is known to be intractable. To circumvent this difficulty, we formulate safe tractable constraints for the problem based on recent advances in chance constrained programming. We then develop a polynomial-time algorithm for computing an optimal solution to the reformulated problem. Our results show that the proposed slow adaptation scheme drastically reduces both computational cost and control signaling overhead when compared with the conventional fast adaptive OFDMA. Our work can be viewed as an initial attempt to apply the chance constrained programming methodology to wireless system designs. Given that most wireless systems can tolerate an occasional dip in the quality of service, we hope that the proposed methodology will find further applications in wireless communications.
△ Less
Submitted 22 June, 2010;
originally announced June 2010.
-
Fundamental Limits of Wideband Localization - Part II: Cooperative Networks
Authors:
Yuan Shen,
Henk Wymeersch,
Moe Z. Win
Abstract:
The availability of positional information is of great importance in many commercial, governmental, and military applications. Localization is commonly accomplished through the use of radio communication between mobile devices (agents) and fixed infrastructure (anchors). However, precise determination of agent positions is a challenging task, especially in harsh environments due to radio blockage…
▽ More
The availability of positional information is of great importance in many commercial, governmental, and military applications. Localization is commonly accomplished through the use of radio communication between mobile devices (agents) and fixed infrastructure (anchors). However, precise determination of agent positions is a challenging task, especially in harsh environments due to radio blockage or limited anchor deployment. In these situations, cooperation among agents can significantly improve localization accuracy and reduce localization outage probabilities. A general framework of analyzing the fundamental limits of wideband localization has been developed in Part I of the paper. Here, we build on this framework and establish the fundamental limits of wideband cooperative location-aware networks. Our analysis is based on the waveforms received at the nodes, in conjunction with Fisher information inequality. We provide a geometrical interpretation of equivalent Fisher information for cooperative networks. This approach allows us to succinctly derive fundamental performance limits and their scaling behaviors, and to treat anchors and agents in a unified way from the perspective of localization accuracy. Our results yield important insights into how and when cooperation is beneficial.
△ Less
Submitted 4 June, 2010;
originally announced June 2010.
-
Fundamental Limits of Wideband Localization - Part I: A General Framework
Authors:
Yuan Shen,
Moe Z. Win
Abstract:
The availability of positional information is of great importance in many commercial, public safety, and military applications. The coming years will see the emergence of location-aware networks with sub-meter accuracy, relying on accurate range measurements provided by wide bandwidth transmissions. In this two-part paper, we determine the fundamental limits of localization accuracy of wideband wi…
▽ More
The availability of positional information is of great importance in many commercial, public safety, and military applications. The coming years will see the emergence of location-aware networks with sub-meter accuracy, relying on accurate range measurements provided by wide bandwidth transmissions. In this two-part paper, we determine the fundamental limits of localization accuracy of wideband wireless networks in harsh multipath environments. We first develop a general framework to characterize the localization accuracy of a given node here and then extend our analysis to cooperative location-aware networks in Part II.
In this paper, we characterize localization accuracy in terms of a performance measure called the squared position error bound (SPEB), and introduce the notion of equivalent Fisher information to derive the SPEB in a succinct expression. This methodology provides insights into the essence of the localization problem by unifying localization information from individual anchors and information from a priori knowledge of the agent's position in a canonical form. Our analysis begins with the received waveforms themselves rather than utilizing only the signal metrics extracted from these waveforms, such as time-of-arrival and received signal strength. Hence, our framework exploits all the information inherent in the received waveforms, and the resulting SPEB serves as a fundamental limit of localization accuracy.
△ Less
Submitted 4 June, 2010;
originally announced June 2010.
-
Communication in a Poisson Field of Interferers -- Part II: Channel Capacity and Interference Spectrum
Authors:
Pedro C. Pinto,
Moe Z. Win
Abstract:
In Part I of this paper, we presented a mathematical model for communication subject to both network interference and noise, where the interferers are scattered according to a spatial Poisson process, and are operating asynchronously in a wireless environment subject to path loss, shadowing, and multipath fading. We determined the distribution of the aggregate interference and the error performa…
▽ More
In Part I of this paper, we presented a mathematical model for communication subject to both network interference and noise, where the interferers are scattered according to a spatial Poisson process, and are operating asynchronously in a wireless environment subject to path loss, shadowing, and multipath fading. We determined the distribution of the aggregate interference and the error performance of the link. In this second part, we characterize the capacity of the link subject to both network interference and noise. Then, we put forth the concept of spectral outage probability (SOP), a new characterization of the aggregate radio-frequency emission generated by communicating nodes in a wireless network. We present some applications of the SOP, namely the establishment of spectral regulations and the design of covert military networks. The proposed framework captures all the essential physical parameters that affect the aggregate network emission, yet is simple enough to provide insights that may be of value in the design and deployment of wireless networks.
△ Less
Submitted 25 January, 2010;
originally announced January 2010.
-
Communication in a Poisson Field of Interferers -- Part I: Interference Distribution and Error Probability
Authors:
Pedro C. Pinto,
Moe Z. Win
Abstract:
We present a mathematical model for communication subject to both network interference and noise. We introduce a framework where the interferers are scattered according to a spatial Poisson process, and are operating asynchronously in a wireless environment subject to path loss, shadowing, and multipath fading. We consider both cases of slow and fast-varying interferer positions. The paper is co…
▽ More
We present a mathematical model for communication subject to both network interference and noise. We introduce a framework where the interferers are scattered according to a spatial Poisson process, and are operating asynchronously in a wireless environment subject to path loss, shadowing, and multipath fading. We consider both cases of slow and fast-varying interferer positions. The paper is comprised of two separate parts. In Part I, we determine the distribution of the aggregate network interference at the output of a linear receiver. We characterize the error performance of the link, in terms of average and outage probabilities. The proposed model is valid for any linear modulation scheme (e.g., M-ary phase shift keying or M-ary quadrature amplitude modulation), and captures all the essential physical parameters that affect network interference. Our work generalizes the conventional analysis of communication in the presence of additive white Gaussian noise and fast fading, allowing the traditional results to be extended to include the effect of network interference. In Part II of the paper, we derive the capacity of the link when subject to network interference and noise, and characterize the spectrum of the aggregate interference.
△ Less
Submitted 25 January, 2010;
originally announced January 2010.
-
Secure Communication in Stochastic Wireless Networks
Authors:
Pedro C. Pinto,
Joao Barros,
Moe Z. Win
Abstract:
Information-theoretic security -- widely accepted as the strictest notion of security -- relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless n…
▽ More
Information-theoretic security -- widely accepted as the strictest notion of security -- relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless networks. Based on a general model in which legitimate nodes and potential eavesdroppers are randomly scattered in space, the intrinsically secure communications graph (iS-graph) is defined from the point of view of information-theoretic security. Conclusive results are provided for the local connectivity of the Poisson iS-graph, in terms of node degrees and isolation probabilities. It is shown how the secure connectivity of the network varies with the wireless propagation effects, the secrecy rate threshold of each link, and the noise powers of legitimate nodes and eavesdroppers. Sectorized transmission and eavesdropper neutralization are explored as viable strategies for improving the secure connectivity. Lastly, the maximum secrecy rate between a node and each of its neighbours is characterized, and the case of colluding eavesdroppers is studied. The results help clarify how the spatial density of eavesdroppers can compromise the intrinsic security of wireless networks.
△ Less
Submitted 20 January, 2010;
originally announced January 2010.
-
Power-Bandwidth Tradeoff in Multiuser Relay Channels with Opportunistic Scheduling
Authors:
Ozgur Oyman,
Moe Z. Win
Abstract:
The goal of this paper is to understand the key merits of multihop relaying techniques jointly in terms of their energy efficiency and spectral efficiency advantages in the presence of multiuser diversity gains from opportunistic (i.e., channel-aware) scheduling and identify the regimes and conditions in which relay-assisted multiuser communication provides a clear advantage over direct multiuse…
▽ More
The goal of this paper is to understand the key merits of multihop relaying techniques jointly in terms of their energy efficiency and spectral efficiency advantages in the presence of multiuser diversity gains from opportunistic (i.e., channel-aware) scheduling and identify the regimes and conditions in which relay-assisted multiuser communication provides a clear advantage over direct multiuser communication. For this purpose, we use Shannon-theoretic tools to analyze the tradeoff between energy efficiency and spectral efficiency (known as the power-bandwidth tradeoff) over a fading multiuser relay channel with $K$ users in the asymptotic regime of large (but finite) number of users (i.e., dense network). Benefiting from the extreme-value theoretic results of \cite{Oyman_isit07}, we characterize the power-bandwidth tradeoff and the associated energy and spectral efficiency measures of the bandwidth-limited high signal-to-noise ratio (SNR) and power-limited low SNR regimes, and utilize them in investigating the large system behavior of the multiuser relay channel as a function of the number of users and physical channel SNRs. Our analysis results in very accurate closed-form formulas in the large (but finite) $K$ regime that quantify energy and spectral efficiency performance, and provides insights on the impact of multihop relaying and multiuser diversity techniques on the power-bandwidth tradeoff.
△ Less
Submitted 28 October, 2008;
originally announced October 2008.
-
MIMO Networks: the Effects of Interference
Authors:
Marco Chiani,
Moe Z. Win,
Hyundong Shin
Abstract:
Multiple-input/multiple-output (MIMO) systems promise enormous capacity increase and are being considered as one of the key technologies for future wireless networks. However, the decrease in capacity due to the presence of interferers in MIMO networks is not well understood. In this paper, we develop an analytical framework to characterize the capacity of MIMO communication systems in the prese…
▽ More
Multiple-input/multiple-output (MIMO) systems promise enormous capacity increase and are being considered as one of the key technologies for future wireless networks. However, the decrease in capacity due to the presence of interferers in MIMO networks is not well understood. In this paper, we develop an analytical framework to characterize the capacity of MIMO communication systems in the presence of multiple MIMO co-channel interferers and noise. We consider the situation in which transmitters have no information about the channel and all links undergo Rayleigh fading. We first generalize the known determinant representation of hypergeometric functions with matrix arguments to the case when the argument matrices have eigenvalues of arbitrary multiplicity. This enables the derivation of the distribution of the eigenvalues of Gaussian quadratic forms and Wishart matrices with arbitrary correlation, with application to both single user and multiuser MIMO systems. In particular, we derive the ergodic mutual information for MIMO systems in the presence of multiple MIMO interferers. Our analysis is valid for any number of interferers, each with arbitrary number of antennas having possibly unequal power levels. This framework, therefore, accommodates the study of distributed MIMO systems and accounts for different positions of the MIMO interferers.
△ Less
Submitted 8 October, 2009; v1 submitted 5 February, 2008;
originally announced February 2008.
-
Gallager's Exponent for MIMO Channels: A Reliability-Rate Tradeoff
Authors:
Hyundong Shin,
Moe Z. Win
Abstract:
In this paper, we derive Gallager's random coding error exponent for multiple-input multiple-output (MIMO) channels, assuming no channel-state information (CSI) at the transmitter and perfect CSI at the receiver. This measure gives insight into a fundamental tradeoff between the communication reliability and information rate of MIMO channels, enabling to determine the required codeword length to…
▽ More
In this paper, we derive Gallager's random coding error exponent for multiple-input multiple-output (MIMO) channels, assuming no channel-state information (CSI) at the transmitter and perfect CSI at the receiver. This measure gives insight into a fundamental tradeoff between the communication reliability and information rate of MIMO channels, enabling to determine the required codeword length to achieve a prescribed error probability at a given rate below the channel capacity. We quantify the effects of the number of antennas, channel coherence time, and spatial fading correlation on the MIMO exponent. In addition, general formulae for the ergodic capacity and the cutoff rate in the presence of spatial correlation are deduced from the exponent expressions. These formulae are applicable to arbitrary structures of transmit and receive correlation, encompassing all the previously known results as special cases of our expressions.
△ Less
Submitted 20 July, 2006;
originally announced July 2006.
-
MIMO Diversity in the Presence of Double Scattering
Authors:
Hyundong Shin,
Moe Z. Win
Abstract:
The potential benefits of multiple-antenna systems may be limited by two types of channel degradations rank deficiency and spatial fading correlation of the channel. In this paper, we assess the effects of these degradations on the diversity performance of multiple-input multiple-output (MIMO) systems, with an emphasis on orthogonal space-time block codes, in terms of the symbol error probabilit…
▽ More
The potential benefits of multiple-antenna systems may be limited by two types of channel degradations rank deficiency and spatial fading correlation of the channel. In this paper, we assess the effects of these degradations on the diversity performance of multiple-input multiple-output (MIMO) systems, with an emphasis on orthogonal space-time block codes, in terms of the symbol error probability, the effective fading figure (EFF), and the capacity at low signal-to-noise ratio (SNR). In particular, we consider a general family of MIMO channels known as double-scattering channels, which encompasses a variety of propagation environments from independent and identically distributed Rayleigh to degenerate keyhole or pinhole cases by embracing both rank-deficient and spatial correlation effects. It is shown that a MIMO system with $n_T$ transmit and $n_R$ receive antennas achieves the diversity of order $\frac{\n_T n_S n_R}{\max(n_T,n_S,n_R)}$ in a double-scattering channel with $n_S$ effective scatterers. We also quantify the combined effect of the spatial correlation and the lack of scattering richness on the EFF and the low-SNR capacity in terms of the correlation figures of transmit, receive, and scatterer correlation matrices. We further show the monotonicity properties of these performance measures with respect to the strength of spatial correlation, characterized by the eigenvalue majorization relations of the correlation matrices.
△ Less
Submitted 31 August, 2006; v1 submitted 6 November, 2005;
originally announced November 2005.
-
On the Capacity of Doubly Correlated MIMO Channels
Authors:
Hyundong Shin,
Moe Z. Win,
Jae Hong Lee,
Marco Chiani
Abstract:
In this paper, we analyze the capacity of multiple-input multiple-output (MIMO) Rayleigh-fading channels in the presence of spatial fading correlation at both the transmitter and the receiver, assuming that the channel is unknown at the transmitter and perfectly known at the receiver. We first derive the determinant representation for the exact characteristic function of the capacity, which is t…
▽ More
In this paper, we analyze the capacity of multiple-input multiple-output (MIMO) Rayleigh-fading channels in the presence of spatial fading correlation at both the transmitter and the receiver, assuming that the channel is unknown at the transmitter and perfectly known at the receiver. We first derive the determinant representation for the exact characteristic function of the capacity, which is then used to determine the trace representations for the mean, variance, skewness, kurtosis, and other higher-order statistics (HOS). These results allow us to exactly evaluate two relevant information-theoretic capacity measures--ergodic capacity and outage capacity--and the HOS of the capacity for such a MIMO channel. The analytical framework presented in the paper is valid for arbitrary numbers of antennas and generalizes the previously known results for independent and identically distributed or one-sided correlated MIMO channels to the case when fading correlation exists on both sides. We verify our analytical results by comparing them with Monte Carlo simulations for a correlation model based on realistic channel measurements as well as a classical exponential correlation model.
△ Less
Submitted 26 September, 2005; v1 submitted 26 September, 2005;
originally announced September 2005.