FIGURE 3 - uploaded by Jehad M. Hamamreh
Content may be subject to copyright.
Source publication
Beyond 5G (B5G) and future 6G systems are expected to serve a massive number of interconnection links between base stations and Internet of Thing (IoT) devices. Thus, it is critical to develop new effective multiple access techniques, which can serve the demands of this massive number of connections. In this regard, power domain non-orthogonal mult...
Contexts in source publication
Context 1
... receiver of the proposed design is shown in Fig.3. below where the signal reception is analyzed at the legitimate nodes U E 1 and U E 2 and at the external eavesdropping node, U E X . ...
Context 2
... the signal reception at the receiver, conventional OFDM operations such as CP removal and performing FFT are carried out. Then, the symbols are demodulated as shown in the receiver in Fig.3. where the legitimate users are able to recover their data while the decoding of the eavesdropper signal is extremely challenging as it involves the combination of many variables that are unknown to U E X . ...
Context 3
... the receiver in Fig.3. and the derivation of the received signal at the eavesdropper node, U E X , we can see that the decoding of the received signal is a very complex operation for U E X . ...
Context 4
... receiver of the proposed design is shown in Fig.3. below where the signal reception is analyzed at the legitimate nodes U E 1 and U E 2 and at the external eavesdropping node, U E X . ...
Context 5
... the signal reception at the receiver, conventional OFDM operations such as CP removal and performing FFT are carried out. Then, the symbols are demodulated as shown in the receiver in Fig.3. where the legitimate users are able to recover their data while the decoding of the eavesdropper signal is extremely challenging as it involves the combination of many variables that are unknown to U E X . ...
Similar publications
Abstract In this era of 5G technology, the ever‐increasing demands for high data rates lead researchers to develop hybrid satellite‐terrestrial (HST) networks as a substitution to the conventional cellular terrestrial systems. Since an HST network suffers from a masking effect which can be mitigated by adopting the terrestrial relaying strategy, in...
Citations
... The cheap and ubiquitous power line system is not perfect. How to enhance the security of the communication system based on power line is a serious problem with the electromagnetic radiation in the power line and the existence of malicious wired users 38,39 . Despite the incorporation of relays and in-band full duplex (IBFD) communication, long-distance power line communication (PLC) systems are inherently more vulnerable to security risks compared to conventional wireless communication. ...
Enhancing information security has become increasingly significant in the digital age. This paper investigates the concept of physical layer security (PLS) within a relay-aided power line communication (PLC) system operating over a multiple-input multiple-output (MIMO) channel based on MK model. Specifically, we examine the transmission of confidential signals between a source and a distant destination while accounting for the presence of multiple eavesdroppers, both colluding and non-colluding. We propose a two-phase jamming scheme that leverages a full-duplex (FD) amplify-and-forward (AF) relay to address this challenge. Our primary objective is to maximize the secrecy rate, which necessitates the optimization of the jamming precoding and transmitting precoding matrices at both the source and the relay while adhering to transmit power constraints. We present a formulation of this problem and demonstrate that it can be efficiently solved using an effective block coordinate descent (BCD) algorithm. Simulation results are conducted to validate the convergence and performance of the proposed algorithm. These findings confirm the effectiveness of our approach. Furthermore, the numerical analysis reveals that our proposed algorithm surpasses traditional schemes that lack jamming to achieve higher secrecy rates. As a result, the proposed algorithm offers the benefit of guaranteeing secure communications in a realistic channel model, even in scenarios involving colluding eavesdroppers.
... The first term in (31) is the desired term concerning Rx 2 and the rest of the expressions are unwanted. Equations (15) and (19) represent the received signals at Rx 1 and Rx 2 during round r 1 , respectively. While, in round r 2 the signals received by Rx 1 and Rx 2 are denoted by equations (27) and (31), respectively. ...
... Condition for a 1 and a 2 during r 1 : For a 1 and a 2 the second, third, and fourth terms in the equation (15) and the first, third and fourth expressions in equation (19) are equated to null matrix O which further can be formulated as a system of equations ...
... Using the system of equations such as (33) and (35), the unwanted terms and the effects of the channel are eliminated during rounds r 1 and r 2 . Therefore, during r 1 the equations (15) and (19) become ...
In this study, we present a novel multi-user scheme in which space-time block coding (STBC) is exploited for transmitting data in two rounds in a multiple-input multiple-output (MIMO) fashion while orthogonal frequency division multiplexing (OFDM) is utilized as a transmission framework to serve multiple users on the premises that all the resources remain the same. This new scheme labeled as modified multi-user STBC (MMU-STBC) is an enhanced version of conventional STBC-MIMO in terms of providing exceptionally higher throughput and reliability. Furthermore, uniquely designed auxiliary signals are superimposed on top of users' data during the two transmission rounds (time slots) to intelligently cancel inter-user interference and channel effects at the receiver while keeping the reception process much simpler and less power-consuming. Moreover, we also present a simple equalization step to recover the signals at the receiver while reducing the complexity significantly, resulting in low latency and less processing at the receiver. Additionally, the proposed scheme's performance is inspected and examined by utilizing performance metrics such as bit error rate (BER), throughput error rate (TER), and peak-to-average power ratio (PAPR) while comparing it with the performance of conventional MIMO systems. FULL ARTICLE PDF: https://rs-ojict.pubpub.org/pub/ev4icpzz/
... After the duration of t 1 and t 2 , the modified received signals are represented by equations (17), (18), (19), and (20) are equalized at the respective receivers to remove the channel effects and get the desired data at the legitimate user which is done by simply multiplying each equation by the inverse of the sum of channels experienced by the received signals as shown below ...
... To analyze the BER performance of the proposed scheme, since BPSK is used as a modulation in the scheme, the BER can be expressed in terms of [35] as where erfc(·) denotes the complementary error function, P γ b (γ b ) is concerned with instantaneous SNR of the appropriate user as well as fading distribution and is termed as probability distribution function (PDF) as in [36]. ...
... In Eq. (36), α denotes the effective channel of the concerned UE. For user 1 the effective channel is shown below: ...
... In Eq. (36), Ω is the mean square of the channel fading amplitude Ω = E{α 2 } while γ b is the average SNR. Figs. 5 and 6 illustrate the distributions of effective fading channels of the two users, different distributions are fitted by using data fitting methods. ...
A wireless network can utilize its entire resources to serve users without any allocation and provide upgraded performances such as enhanced throughput and high reliability without interference among users. However, previous wireless communication technologies could not bring the full utilization of network resources and overcome the challenge of forgoing scheduling among users. Therefore, to address these requirements, we propose and develop a novel design coined as Precoded Universal MIMO Superposition Transmission (PU-MIMO-ST) that can also be applicable for the most challenging and worst case interference scenario where the number of antenna points (APs) and the number of user equipment (UEs) is equal. In the considered system model, the APs are linked to a central processing unit (CPU) via backhaul and the UEs receive cooperation from the network resulting in achieving the optimal usage of network resources. The results obtained from computer simulations proof and verify the effectiveness of the proposed design called PU-MIMO-ST compared with other competitive works in terms of reliability, throughput, reduced complexity on the reception side, as well as power conservation.
... Each of the proposed techniques was studied separately in detail as in [12]- [15]. Particularly, MU-AS-ST was studied in [16] where its performance was analyzed in detail using mathematical derivations and computer simulations. MU-AS-ST was shown to surpass power domain NOMA in terms of BER performance and security due to the use of specially designed auxiliary signals superimposed on top of the users' data. ...
... In publications [16] and [18], the authors have detailed the analysis on the performance of both techniques where it can be seen that MU-AS-ST performs better than OFDM-SPM in terms of reliability due to its merits of interference cancellation through the special design of the auxiliary signals and transmit diversity. On the other hand, OFDM-SPM was designed to enhance the spectral efficiency by exploring the power of the subcarriers as an extra dimension, however; this power exploration puts a limitation on the reliability performance where it has sufficient transmission reliability but it is not to the level of MU-AS-ST where, in this latter, very low transmission errors are encountered due to the mentioned reasons above. ...
The world of today is characterized by a very huge inter-connectivity of data-hungry devices. This imposes on wireless system designers not only developing techniques that are spectrally efficient at the area level where many users are served with the same resources simultaneously but also developing techniques that are spectrally efficient at the device level as well. For addressing this problem, we propose in this paper a technique that is capable of doubling the spectral efficiency per area and per device by modulating a recently developed multiple access design called multi-user auxiliary signal superposition transmission (MU-AS-ST) through a multi-dimensional OFDM technique termed OFDM with subcarrier power modulation (OFDM-SPM). This integration results in the technique proposed in this paper and yields, with doubling the spectral efficiency, merits such as robust security, low complexity, and enhanced transmission reliability. Article PDF: https://rs-ojict.pubpub.org/pub/d5qg7po3
... To analyze the BER performance of the proposed scheme, since BPSK is used as a modulation in the scheme, the BER can be expressed in terms of [35] as where erfc(·) denotes the complementary error function, P γ b (γ b ) is concerned with instantaneous SNR of the appropriate user as well as fading distribution and is termed as probability distribution function (PDF) as in [36]. ...
... In Eq. (36), α denotes the effective channel of the concerned UE. For user 1 the effective channel is shown below: ...
... In Eq. (36), Ω is the mean square of the channel fading amplitude Ω = E{α 2 } while γ b is the average SNR. Figs. 5 and 6 illustrate the distributions of effective fading channels of the two users, different distributions are fitted by using data fitting methods. ...
A wireless network can utilize its complete resources to serve users without sharing and offer services like enhancing spectral efficiency, and providing an unprecedented reliable performance without interference among users. Previous wireless communication technologies could not offer the full utilization of a network’s resources and overcome the challenge of forgoing scheduling. Therefore, to address these requirements and proclaim that a wireless network can utilize its full capabilities to serve every user in a network without sharing a shred of its resource, we propose a novel design known as PU-MIMO-ST (Precoded Universal MIMO Superposition Transmission) to provide usage of a network’s complete resources and capabilities to every user without any interference and sharing at all. This framework involves two geographically distributed antennas that serve two user equipments (UEs) concurrently with superimposed user data signals. The antennas termed antenna points (APs) form a link to a central processing unit (CPU) via a backhaul, and the UEs receive full cooperation from the network because the number of APs equals the number of UEs. Thus, the proposed design achieves the optimal usage of networks resources. The results obtained from the computer simulation point out the effectiveness of PUMIMO-ST compared with other similar works in terms of reliability, throughput, reduced complexity on the reception side, and saving of power. Keywords: MIMO, multi-user MIMO, massive MIMO, network MIMO, distributed MIMO, distributed antenna system, multi-cell MIMO, DIDO, cell-free massive MIMO, pCell, 6G and Beyond.