559 results on '"Hjorungnes, A."'
Search Results
2. Adaptive Decision Feedback Reduced-Rank Equalization Based on Joint Iterative Optimization of Adaptive Estimation Algorithms for Multi-Antenna Systems
- Author
-
de Lamare, Rodrigo C., Hjorungnes, Are, and Sampaio-Neto, Raimundo
- Subjects
Computer Science - Information Theory - Abstract
This paper presents a novel adaptive reduced-rank multi-input-multi-output (MIMO) decision feedback equalization structure based on joint iterative optimization of adaptive estimators. The novel reduced-rank equalization structure consists of a joint iterative optimization of two equalization stages, namely, a projection matrix that performs dimensionality reduction and a reduced-rank estimator that retrieves the desired transmitted symbol. The proposed reduced-rank structure is followed by a decision feedback scheme that is responsible for cancelling the inter-antenna interference caused by the associated data streams. We describe least squares (LS) expressions for the design of the projection matrix and the reduced-rank estimator along with computationally efficient recursive least squares (RLS) adaptive estimation algorithms. Simulations for a MIMO equalization application show that the proposed scheme outperforms the state-of-the-art reduced-rank and the conventional estimation algorithms at about the same complexity., Comment: 6 figures. arXiv admin note: substantial text overlap with arXiv:1301.2697
- Published
- 2013
3. A Unified Approach to Joint and Iterative Adaptive Interference Cancellation and Parameter Estimation for CDMA Systems in Multipath Channels
- Author
-
de Lamare, Rodrigo C., Hjorungnes, Are, and Sampaio-Neto, Raimundo
- Subjects
Computer Science - Information Theory - Abstract
This paper proposes a unified approach to joint adaptive parameter estimation and interference cancellation (IC) for direct sequence code-division-multiple-access (DS-CDMA) systems in multipath channels. A unified framework is presented in which the IC problem is formulated as an optimization problem with extra degrees of freedom of an IC parameter vector for each stage and user. We propose a joint optimization method for estimating the IC parameter vector, the linear receiver filter front-end, and the channel along with minimum mean squared error (MMSE) expressions for the estimators. Based on the proposed joint optimization approach, we derive low-complexity stochastic gradient (SG) algorithms for estimating the desired parameters. Simulation results for the uplink of a synchronous DS-CDMA system show that the proposed methods significantly outperform the best known IC receivers., Comment: 4 figures
- Published
- 2013
4. Coalitional Games in Partition Form for Joint Spectrum Sensing and Access in Cognitive Radio Networks
- Author
-
Saad, Walid, Han, Zhu, Zheng, Rong, Hjørungnes, Are, Başar, Tamer, and Poor, H. Vincent
- Subjects
Computer Science - Information Theory - Abstract
Unlicensed secondary users (SUs) in cognitive radio networks are subject to an inherent tradeoff between spectrum sensing and spectrum access. Although each SU has an incentive to sense the primary user (PU) channels for locating spectrum holes, this exploration of the spectrum can come at the expense of a shorter transmission time, and, hence, a possibly smaller capacity for data transmission. This paper investigates the impact of this tradeoff on the cooperative strategies of a network of SUs that seek to cooperate in order to improve their view of the spectrum (sensing), reduce the possibility of interference among each other, and improve their transmission capacity (access). The problem is modeled as a coalitional game in partition form and an algorithm for coalition formation is proposed. Using the proposed algorithm, the SUs can make individual distributed decisions to join or leave a coalition while maximizing their utilities which capture the average time spent for sensing as well as the capacity achieved while accessing the spectrum. It is shown that, by using the proposed algorithm, the SUs can self-organize into a network partition composed of disjoint coalitions, with the members of each coalition cooperating to jointly optimize their sensing and access performance. Simulation results show the performance improvement that the proposed algorithm yields with respect to the non-cooperative case. The results also show how the algorithm allows the SUs to self-adapt to changes in the environment such as the change in the traffic of the PUs, or slow mobility., Comment: IEEE Journal on Selected Topics in Signal Processing (JSTSP), Special Issue on Game Theory, to appear, 2012
- Published
- 2012
- Full Text
- View/download PDF
5. Network Formation Games Among Relay Stations in Next Generation Wireless Networks
- Author
-
Saad, Walid, Han, Zhu, Başar, Tamer, Debbah, Mérouane, and Hjørungnes, Are
- Subjects
Computer Science - Information Theory - Abstract
The introduction of relay station (RS) nodes is a key feature in next generation wireless networks such as 3GPP's long term evolution advanced (LTE-Advanced), or the forthcoming IEEE 802.16j WiMAX standard. This paper presents, using game theory, a novel approach for the formation of the tree architecture that connects the RSs and their serving base station in the \emph{uplink} of the next generation wireless multi-hop systems. Unlike existing literature which mainly focused on performance analysis, we propose a distributed algorithm for studying the \emph{structure} and \emph{dynamics} of the network. We formulate a network formation game among the RSs whereby each RS aims to maximize a cross-layer utility function that takes into account the benefit from cooperative transmission, in terms of reduced bit error rate, and the costs in terms of the delay due to multi-hop transmission. For forming the tree structure, a distributed myopic algorithm is devised. Using the proposed algorithm, each RS can individually select the path that connects it to the BS through other RSs while optimizing its utility. We show the convergence of the algorithm into a Nash tree network, and we study how the RSs can adapt the network's topology to environmental changes such as mobility or the deployment of new mobile stations. Simulation results show that the proposed algorithm presents significant gains in terms of average utility per mobile station which is at least 17.1% better relatively to the case with no RSs and reaches up to 40.3% improvement compared to a nearest neighbor algorithm (for a network with 10 RSs). The results also show that the average number of hops does not exceed 3 even for a network with up to 25 RSs., Comment: IEEE Transactions on Communications, vol. 59, no. 9, pp. 2528-2542, September 2011
- Published
- 2012
- Full Text
- View/download PDF
6. Approximate ML Decision Feedback Block Equalizer for Doubly Selective Fading Channels
- Author
-
Song, Lingyang, de Lamare, Rodrigo C., Hjorungnes, Are, and Burr, Alister G.
- Subjects
Computer Science - Information Theory - Abstract
In order to effetively suppress intersymbol interference (ISI) at low complexity, we propose in this paper an approximate maximum likelihood (ML) decision feedback block equalizer (A-ML-DFBE) for doubly selective (frequency-selective, time-selective) fading channels. The proposed equalizer design makes efficient use of the special time-domain representation of the multipath channels through a matched filter, a sliding window, a Gaussian approximation, and a decision feedback. The A-ML-DFBE has the following features: 1) It achieves performance close to maximum likelihood sequence estimation (MLSE), and significantly outperforms the minimum mean square error (MMSE) based detectors; 2) It has substantially lower complexity than the conventional equalizers; 3) It easily realizes the complexity and performance tradeoff by adjusting the length of the sliding window; 4) It has a simple and fixed-length feedback filter. The symbol error rate (SER) is derived to characterize the behaviour of the A-ML-DFBE, and it can also be used to find the key parameters of the proposed equalizer. In addition, we further prove that the A-ML-DFBE obtains full multipath diversity., Comment: 20 pages, 5 figures, 2 tables
- Published
- 2011
7. Secure Satellite Communication Systems Design with Individual Secrecy Rate Constraints
- Author
-
Lei, Jiang, Han, Zhu, Vázquez-Castro, M. A., and Hjørungnes, Are
- Subjects
Computer Science - Information Theory ,Computer Science - Cryptography and Security ,Computer Science - Networking and Internet Architecture - Abstract
In this paper, we study multibeam satellite secure communication through physical (PHY) layer security techniques, i.e., joint power control and beamforming. By first assuming that the Channel State Information (CSI) is available and the beamforming weights are fixed, a novel secure satellite system design is investigated to minimize the transmit power with individual secrecy rate constraints. An iterative algorithm is proposed to obtain an optimized power allocation strategy. Moreover, sub-optimal beamforming weights are obtained by completely eliminating the co-channel interference and nulling the eavesdroppers' signal simultaneously. In order to obtain jointly optimized power allocation and beamforming strategy in some practical cases, e.g., with certain estimation errors of the CSI, we further evaluate the impact of the eavesdropper's CSI on the secure multibeam satellite system design. The convergence of the iterative algorithm is proven under justifiable assumptions. The performance is evaluated by taking into account the impact of the number of antenna elements, number of beams, individual secrecy rate requirement, and CSI. The proposed novel secure multibeam satellite system design can achieve optimized power allocation to ensure the minimum individual secrecy rate requirement. The results show that the joint beamforming scheme is more favorable than fixed beamforming scheme, especially in the cases of a larger number of satellite antenna elements and higher secrecy rate requirement. Finally, we compare the results under the current satellite air-interface in DVB-S2 and the results under Gaussian inputs., Comment: 34 pages, 10 figures, 1 table, submitted to "Transactions on Information Forensics and Security"
- Published
- 2011
- Full Text
- View/download PDF
8. Opportunistic Relaying for Space-Time Coded Cooperation with Multiple Antenna Terminals
- Author
-
Maham, Behrouz and Hjørungnes, Are
- Subjects
Computer Science - Information Theory - Abstract
We consider a wireless relay network with multiple antenna terminals over Rayleigh fading channels, and apply distributed space-time coding (DSTC) in amplify-and-forward (A&F) mode. The A&F scheme is used in a way that each relay transmits a scaled version of the linear combination of the received symbols. It turns out that, combined with power allocation in the relays, A&F DSTC results in an opportunistic relaying scheme, in which only the best relay is selected to retransmit the source's space-time coded signal. Furthermore, assuming the knowledge of source-relay CSI at the source node, we design an efficient power allocation which outperforms uniform power allocation across the source antennas. Next, assuming M-PSK or M-QAM modulations, we analyze the performance of the proposed cooperative diversity transmission schemes in a wireless relay networks with the multiple-antenna source and destination. We derive the probability density function (PDF) of the received SNR at the destination. Then, the PDF is used to determine the symbol error rate (SER) in Rayleigh fading channels. We derived closed-form approximations of the average SER in the high SNR scenario, from which we find the diversity order of system RminfNs;Ndg, where R, Ns, and Nd are the number of the relays, source antennas, and destination antennas, respectively. Simulation results show that the proposed system obtain more than 6 dB gain in SNR over A&F MIMO DSTC for BER 10^{-4}, when R = 2, Ns = 2, and Nd = 1.
- Published
- 2011
9. Cognitive Multiple Access Network with Outage Margin in the Primary System
- Author
-
Maham, Behrouz, Popovski, Petar, Zhou, Xiangyun, and Hjørungnes, Are
- Subjects
Computer Science - Information Theory - Abstract
This paper investigates the problem of spectrally efficient operation of a multiuser uplink cognitive radio system in the presence of a single primary link. The secondary system applies opportunistic interference cancelation (OIC) and decode the primary signal when such an opportunity is created. We derive the achievable rate in the secondary system when OIC is used. This scheme has a practical significance, since it enables rate adaptation without requiring any action from the primary system. The \emph{exact} expressions for outage probability of the primary user are derived, when the primary system is exposed to interference from secondary users. Moreover, approximated formulas and tight lower and upper bounds for the ergodic sum-rate capacity of the secondary network are found. Next, the power allocation is investigated in the secondary system for maximizing the sum-rate under an outage constraint at the primary system. We formulate the power optimization problem in various scenarios depending on the availability of channel state information and the type of power constraints, and propose a set of simple solutions. Finally, the analytical results are confirmed by simulations, indicating both the accuracy of the analysis, and the fact that the spectral-efficient, low-complexity, flexible, and high-performing cognitive radio can be designed based on the proposed schemes.
- Published
- 2011
10. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks
- Author
-
Zhou, Xiangyun, Ganti, Radha Krishna, Andrews, Jeffrey G., and Hjørungnes, Are
- Subjects
Computer Science - Information Theory - Abstract
This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. We consider random networks where the legitimate nodes and the eavesdroppers are distributed according to independent two-dimensional Poisson point processes. The transmission capacity framework is used to characterize the area spectral efficiency of secure transmissions with constraints on both the quality of service (QoS) and the level of security. This framework illustrates the dependence of the network throughput on key system parameters, such as the densities of legitimate nodes and eavesdroppers, as well as the QoS and security constraints. One important finding is that the throughput cost of achieving a moderate level of security is quite low, while throughput must be significantly sacrificed to realize a highly secure network. We also study the use of a secrecy guard zone, which is shown to give a significant improvement on the throughput of networks with high security requirements., Comment: Accepted for publication in IEEE Transactions on Wireless Communications
- Published
- 2010
- Full Text
- View/download PDF
11. Coalition Formation Games for Collaborative Spectrum Sensing
- Author
-
Saad, Walid, Han, Zhu, Basar, Tamer, Debbah, Merouane, and Hjørungnes, Are
- Subjects
Computer Science - Information Theory ,Computer Science - Computer Science and Game Theory - Abstract
Collaborative Spectrum Sensing (CSS) between secondary users (SUs) in cognitive networks exhibits an inherent tradeoff between minimizing the probability of missing the detection of the primary user (PU) and maintaining a reasonable false alarm probability (e.g., for maintaining a good spectrum utilization). In this paper, we study the impact of this tradeoff on the network structure and the cooperative incentives of the SUs that seek to cooperate for improving their detection performance. We model the CSS problem as a non-transferable coalitional game, and we propose distributed algorithms for coalition formation. First, we construct a distributed coalition formation (CF) algorithm that allows the SUs to self-organize into disjoint coalitions while accounting for the CSS tradeoff. Then, the CF algorithm is complemented with a coalitional voting game for enabling distributed coalition formation with detection probability guarantees (CF-PD) when required by the PU. The CF-PD algorithm allows the SUs to form minimal winning coalitions (MWCs), i.e., coalitions that achieve the target detection probability with minimal costs. For both algorithms, we study and prove various properties pertaining to network structure, adaptation to mobility and stability. Simulation results show that CF reduces the average probability of miss per SU up to 88.45% relative to the non-cooperative case, while maintaining a desired false alarm. For CF-PD, the results show that up to 87.25% of the SUs achieve the required detection probability through MWC, Comment: IEEE Transactions on Vehicular Technology, to appear
- Published
- 2010
- Full Text
- View/download PDF
12. Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
- Author
-
Saad, Walid, Han, Zhu, Basar, Tamer, Debbah, Merouane, and Hjørungnes, Are
- Subjects
Computer Science - Information Theory ,Computer Science - Computer Science and Game Theory - Abstract
Autonomous wireless agents such as unmanned aerial vehicles or mobile base stations present a great potential for deployment in next-generation wireless networks. While current literature has been mainly focused on the use of agents within robotics or software applications, we propose a novel usage model for self-organizing agents suited to wireless networks. In the proposed model, a number of agents are required to collect data from several arbitrarily located tasks. Each task represents a queue of packets that require collection and subsequent wireless transmission by the agents to a central receiver. The problem is modeled as a hedonic coalition formation game between the agents and the tasks that interact in order to form disjoint coalitions. Each formed coalition is modeled as a polling system consisting of a number of agents which move between the different tasks present in the coalition, collect and transmit the packets. Within each coalition, some agents can also take the role of a relay for improving the packet success rate of the transmission. The proposed algorithm allows the tasks and the agents to take distributed decisions to join or leave a coalition, based on the achieved benefit in terms of effective throughput, and the cost in terms of delay. As a result of these decisions, the agents and tasks structure themselves into independent disjoint coalitions which constitute a Nash-stable network partition. Moreover, the proposed algorithm allows the agents and tasks to adapt the topology to environmental changes such as the arrival/removal of tasks or the mobility of the tasks. Simulation results show how the proposed algorithm improves the performance, in terms of average player (agent or task) payoff, of at least 30.26% (for a network of 5 agents with up to 25 tasks) relatively to a scheme that allocates nearby tasks equally among agents., Comment: to appear, IEEE Transactions on Mobile Computing
- Published
- 2010
- Full Text
- View/download PDF
13. Coalition Formation Games for Distributed Cooperation Among Roadside Units in Vehicular Networks
- Author
-
Saad, Walid, Han, Zhu, Hjørungnes, Are, Niyato, Dusit, and Hossain, Ekram
- Subjects
Computer Science - Information Theory ,Computer Science - Computer Science and Game Theory ,Computer Science - Systems and Control - Abstract
Vehicle-to-roadside (V2R) communications enable vehicular networks to support a wide range of applications for enhancing the efficiency of road transportation. While existing work focused on non-cooperative techniques for V2R communications between vehicles and roadside units (RSUs), this paper investigates novel cooperative strategies among the RSUs in a vehicular network. We propose a scheme whereby, through cooperation, the RSUs in a vehicular network can coordinate the classes of data being transmitted through V2R communications links to the vehicles. This scheme improves the diversity of the information circulating in the network while exploiting the underlying content-sharing vehicle-to-vehicle communication network. We model the problem as a coalition formation game with transferable utility and we propose an algorithm for forming coalitions among the RSUs. For coalition formation, each RSU can take an individual decision to join or leave a coalition, depending on its utility which accounts for the generated revenues and the costs for coalition coordination. We show that the RSUs can self-organize into a Nash-stable partition and adapt this partition to environmental changes. Simulation results show that, depending on different scenarios, coalition formation presents a performance improvement, in terms of the average payoff per RSU, ranging between 20.5% and 33.2%, relative to the non-cooperative case., Comment: accepted and to appear in IEEE Journal on Selected Areas in Communications (JSAC), Special issue on Vehicular Communications and Networks
- Published
- 2010
14. Distributed Coalition Formation Games for Secure Wireless Transmission
- Author
-
Saad, Walid, Han, Zhu, Basar, Tamer, Debbah, Merouane, and Hjørungnes, Are
- Subjects
Computer Science - Information Theory - Abstract
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. While existing PHY security literature answered the question ``what are the link-level secrecy rate gains from cooperation?'', this paper attempts to answer the question of ``how to achieve those gains in a practical decentralized wireless network and in the presence of a cost for information exchange?''. For this purpose, we model the PHY security cooperation problem as a coalitional game with non-transferable utility and propose a distributed algorithm for coalition formation. Through the proposed algorithm, the wireless users can cooperate and self-organize into disjoint independent coalitions, while maximizing their secrecy rate taking into account the security costs during information exchange. We analyze the resulting coalitional structures for both decode-and-forward and amplify-and-forward cooperation and study how the users can adapt the network topology to environmental changes such as mobility. Through simulations, we assess the performance of the proposed algorithm and show that, by coalition formation using decode-and-forward, the average secrecy rate per user is increased of up to 25.3 % and 24.4 % (for a network with 45 users) relative to the non-cooperative and amplify-and-forward cases, respectively., Comment: Invited paper
- Published
- 2009
15. Training-Embedded, Single-Symbol ML-Decodable, Distributed STBCs for Relay Networks
- Author
-
Harshan, J., Rajan, B. Sundar, and Hjørungnes, Are
- Subjects
Computer Science - Information Theory - Abstract
Recently, a special class of complex designs called Training-Embedded Complex Orthogonal Designs (TE-CODs) has been introduced to construct single-symbol Maximum Likelihood (ML) decodable (SSD) distributed space-time block codes (DSTBCs) for two-hop wireless relay networks using the amplify and forward protocol. However, to implement DSTBCs from square TE-CODs, the overhead due to the transmission of training symbols becomes prohibitively large as the number of relays increase. In this paper, we propose TE-Coordinate Interleaved Orthogonal Designs (TE-CIODs) to construct SSD DSTBCs. Exploiting the block diagonal structure of TE-CIODs, we show that, the overhead due to the transmission of training symbols to implement DSTBCs from TE-CIODs is smaller than that for TE-CODs. We also show that DSTBCs from TE-CIODs offer higher rate than those from TE-CODs for identical number of relays while maintaining the SSD and full-diversity properties., Comment: 7 pages, 2 figures
- Published
- 2009
16. High-Rate, Distributed Training-Embedded Complex Orthogonal Designs for Relay Networks
- Author
-
Harshan, J., Rajan, B. Sundar, and Hjørungnes, Are
- Subjects
Computer Science - Information Theory - Abstract
Distributed Space-Time Block Codes (DSTBCs) from Complex Orthogonal Designs (CODs) (both square and non-square CODs other than the Alamouti design) are known to lose their single-symbol ML decodable (SSD) property when used in two-hop wireless relay networks using amplify and forward protocol. For such a network, in this paper, a new class of high rate, training-embedded (TE) SSD DSTBCs are constructed from TE-CODs. The proposed codes include the training symbols in the structure of the code which is shown to be the key point to obtain high rate as well as the SSD property. TE-CODs are shown to offer full-diversity for arbitrary complex constellations. Non-square TE-CODs are shown to provide higher rates (in symbols per channel use) compared to the known SSD DSTBCs for relay networks with number of relays less than $10.$, Comment: 6 pages, 2 figures
- Published
- 2009
17. Physical Layer Security: Coalitional Games for Distributed Cooperation
- Author
-
Saad, Walid, Han, Zhu, Basar, Tamer, Debbah, Merouane, and Hjørungnes, Are
- Subjects
Computer Science - Information Theory ,Computer Science - Computer Science and Game Theory - Abstract
Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers. While existing physical layer security literature answered the question "what are the link-level secrecy capacity gains from cooperation?", this paper attempts to answer the question of "how to achieve those gains in a practical decentralized wireless network and in the presence of a secrecy capacity cost for information exchange?". For this purpose, we model the physical layer security cooperation problem as a coalitional game with non-transferable utility and propose a distributed algorithm for coalition formation. Through the proposed algorithm, the wireless users can autonomously cooperate and self-organize into disjoint independent coalitions, while maximizing their secrecy capacity taking into account the security costs during information exchange. We analyze the resulting coalitional structures, discuss their properties, and study how the users can self-adapt the network topology to environmental changes such as mobility. Simulation results show that the proposed algorithm allows the users to cooperate and self-organize while improving the average secrecy capacity per user up to 25.32% relative to the non-cooperative case., Comment: Best paper Award at Wiopt 2009
- Published
- 2009
18. Coalitional Game Theory for Communication Networks: A Tutorial
- Author
-
Saad, Walid, Han, Zhu, Debbah, Merouane, Hjørungnes, Are, and Basar, Tamer
- Subjects
Computer Science - Information Theory ,Computer Science - Computer Science and Game Theory - Abstract
Game theoretical techniques have recently become prevalent in many engineering applications, notably in communications. With the emergence of cooperation as a new communication paradigm, and the need for self-organizing, decentralized, and autonomic networks, it has become imperative to seek suitable game theoretical tools that allow to analyze and study the behavior and interactions of the nodes in future communication networks. In this context, this tutorial introduces the concepts of cooperative game theory, namely coalitional games, and their potential applications in communication and wireless networks. For this purpose, we classify coalitional games into three categories: Canonical coalitional games, coalition formation games, and coalitional graph games. This new classification represents an application-oriented approach for understanding and analyzing coalitional games. For each class of coalitional games, we present the fundamental components, introduce the key properties, mathematical techniques, and solution concepts, and describe the methodologies for applying these games in several applications drawn from the state-of-the-art research in communications. In a nutshell, this article constitutes a unified treatment of coalitional game theory tailored to the demands of communications and network engineers., Comment: IEEE Signal Processing Magazine, Special Issue on Game Theory, to appear, 2009. IEEE Signal Processing Magazine, Special Issue on Game Theory, to appear, 2009
- Published
- 2009
- Full Text
- View/download PDF
19. Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks
- Author
-
Saad, Walid, Han, Zhu, Debbah, Merouane, Hjørungnes, Are, and Başar, Tamer
- Subjects
Computer Science - Computer Science and Game Theory ,Computer Science - Information Theory - Abstract
Collaborative spectrum sensing among secondary users (SUs) in cognitive networks is shown to yield a significant performance improvement. However, there exists an inherent trade off between the gains in terms of probability of detection of the primary user (PU) and the costs in terms of false alarm probability. In this paper, we study the impact of this trade off on the topology and the dynamics of a network of SUs seeking to reduce the interference on the PU through collaborative sensing. Moreover, while existing literature mainly focused on centralized solutions for collaborative sensing, we propose distributed collaboration strategies through game theory. We model the problem as a non-transferable coalitional game, and propose a distributed algorithm for coalition formation through simple merge and split rules. Through the proposed algorithm, SUs can autonomously collaborate and self-organize into disjoint independent coalitions, while maximizing their detection probability taking into account the cooperation costs (in terms of false alarm). We study the stability of the resulting network structure, and show that a maximum number of SUs per formed coalition exists for the proposed utility model. Simulation results show that the proposed algorithm allows a reduction of up to 86.6% of the average missing probability per SU (probability of missing the detection of the PU) relative to the non-cooperative case, while maintaining a certain false alarm level. In addition, through simulations, we compare the performance of the proposed distributed solution with respect to an optimal centralized solution that minimizes the average missing probability per SU. Finally, the results also show how the proposed algorithm autonomously adapts the network topology to environmental changes such as mobility., Comment: in proceedings of IEEE INFOCOM 2009
- Published
- 2009
- Full Text
- View/download PDF
20. A Distributed Merge and Split Algorithm for Fair Cooperation in Wireless Networks
- Author
-
Saad, Walid, Han, Zhu, Debbah, Merouane, and Hjørungnes, Are
- Subjects
Computer Science - Information Theory ,Computer Science - Computer Science and Game Theory - Abstract
This paper introduces a novel concept from coalitional game theory which allows the dynamic formation of coalitions among wireless nodes. A simple and distributed merge and split algorithm for coalition formation is constructed. This algorithm is applied to study the gains resulting from the cooperation among single antenna transmitters for virtual MIMO formation. The aim is to find an ultimate transmitters coalition structure that allows cooperating users to maximize their utilities while accounting for the cost of coalition formation. Through this novel game theoretical framework, the wireless network transmitters are able to self-organize and form a structured network composed of disjoint stable coalitions. Simulation results show that the proposed algorithm can improve the average individual user utility by 26.4% as well as cope with the mobility of the distributed users., Comment: This paper is accepted for publication at the IEEE ICC Workshop on Cooperative Communications and Networking
- Published
- 2008
- Full Text
- View/download PDF
21. Non-atomic Games for Multi-User Systems
- Author
-
Bonneau, Nicolas, Debbah, Mérouane, Altman, Eitan, and Hjørungnes, Are
- Subjects
Computer Science - Information Theory ,Computer Science - Computer Science and Game Theory - Abstract
In this contribution, the performance of a multi-user system is analyzed in the context of frequency selective fading channels. Using game theoretic tools, a useful framework is provided in order to determine the optimal power allocation when users know only their own channel (while perfect channel state information is assumed at the base station). We consider the realistic case of frequency selective channels for uplink CDMA. This scenario illustrates the case of decentralized schemes, where limited information on the network is available at the terminal. Various receivers are considered, namely the Matched filter, the MMSE filter and the optimum filter. The goal of this paper is to derive simple expressions for the non-cooperative Nash equilibrium as the number of mobiles becomes large and the spreading length increases. To that end two asymptotic methodologies are combined. The first is asymptotic random matrix theory which allows us to obtain explicit expressions of the impact of all other mobiles on any given tagged mobile. The second is the theory of non-atomic games which computes good approximations of the Nash equilibrium as the number of mobiles grows., Comment: 17 pages, 4 figures, submitted to IEEE JSAC Special Issue on ``Game Theory in Communication Systems''
- Published
- 2007
- Full Text
- View/download PDF
22. Hierarchical Coalition Formation Game of Relay Transmission in IEEE 802.16m
- Author
-
Niyato, Dusit, Zhou, Xiangyun, Hjørungnes, Are, Wang, Ping, Li, Yifan, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Jain, Rahul, editor, and Kannan, Rajgopal, editor
- Published
- 2012
- Full Text
- View/download PDF
23. Improved interference cancellation scheme for two - user detection of alamouti code
- Author
-
Bhatnagar, M.R. and Hjorungnes, A.
- Subjects
Antennas (Electronics) -- Usage ,Signal processing -- Usage ,MIMO communications -- Innovations ,Digital signal processor ,Technology application ,Business ,Computers ,Electronics ,Electronics and electrical industries - Published
- 2010
24. Minimum SER block precoding and equalization for frequency-selective fading channels
- Author
-
Lingyang Song de Lamare, R.C., Hjorungnes, A., Burr, A.G., and Bhatnagar, M.R.
- Subjects
Fading channels -- Analysis ,Gaussian processes -- Analysis ,Business ,Electronics ,Electronics and electrical industries ,Transportation industry - Published
- 2010
25. Approximate ML decision-feedback block equalizer for doubly selective fading channels
- Author
-
Song, Lingyang, Caiado de Lamare, Rodrigo, Hjorungnes, Are, and Burr, Alister G.
- Subjects
Maximum likelihood estimates (Statistics) -- Methods ,Communications circuits -- Design and construction ,Equalizers (Electronics) -- Usage ,Business ,Electronics ,Electronics and electrical industries ,Transportation industry - Abstract
To effectively suppress intersymbol interference (ISI) at low complexity, in this paper, we propose an approximate maximum-likelihood decision-feedback block equalizer (A-ML-DFBE) for doubly selective (frequency- and time-selective) fading channels. The proposed equalizer design makes efficient use of the special time-domain representation of multipath channels through a matched filter, a sliding window, a Gaussian approximation, and a decision feedback. The A-ML-DFBE has the following features: 1) It achieves a performance that is close that to that of maximum-likelihood sequence estimation (MLSE) and significantly outperforms minimum mean square error (MMSE)-based detectors. 2) It has substantially lower complexity than conventional equalizers. 3) It easily realizes complexity and performance tradeoff by adjusting the length of the sliding window. 4) It has a simple and fixed-length feedback filter. The symbol error rate (SER) is derived to characterize the behavior of the A-ML-DFBE and can also be used to find the key parameters of the proposed equalizer. In addition, we further prove that the A-ML-DFBE obtains full multipath diversity. Index Terms--Doubly selective fading channels, equalization, linear minimum mean square error (MMSE), matched filter, maximum-likelihood sequence estimation (MLSE), MMSE decision-feedback equalizer (MMSE-DFE).
- Published
- 2009
26. Transceiver design for spatial multiplexing based on prewhitening detector
- Author
-
Song, Lingyang, Hjorungnes, Are, Yahampath, Pradeepa, and Bhatnagar, Manav R.
- Subjects
MIMO communications -- Research ,Transceivers -- Research ,Time division multiplexing -- Models ,Transceiver ,Business ,Electronics ,Electronics and electrical industries ,Transportation industry - Abstract
In this paper, we propose a joint-transmitter-and-receiver design for spatial multiplexing based on a novel prewhitening detector (PWD). By using decision feedback equalization (DFE), Gaussian approximation, a prewhitening filter, and a matched filter, the proposed PWD transforms the multiple-input--multiple-output (MIMO) system into several parallel single-input--single-output (SISO) schemes and facilitates single-symbol detection. The proposed scheme achieves near-optimal symbol recovery with a complexity similar to that of a minimum-mean-square-error decision feedback equalizer (MMSE-DFE). The closed-form symbol error rate (SER) of the PWD is derived, which can be used to closely predict the ML performance for uncoded V-BLAST schemes. By assuming full channel knowledge at the transmitter side, we use a preequalizer and a precoder in a downlink scenario. The preequalizer can transfer the feedback part of the DFE to the transmitter side and thus provide better performance in a low signal-to-noise ratio (SNR) with reduced receiver complexity. The precoder designed to minimize the SER of this system can further improve performance without affecting the complexity at the receiver side. Index Terms--Gaussian approximation, maximum likelihood (ML), minimum mean square error decision feedback equalizer (MMSE-DFE), multiple-input multiple-output (MIMO), precoder, preequalizer, spatial multiplexing.
- Published
- 2009
27. Precoded orthogonal space-time block codes over correlated Ricean MIMO channels
- Author
-
Hjorungnes, Are and Gesbert, David
- Subjects
MIMO communications -- Methods ,Functions, Orthogonal -- Usage ,Signal processing -- Methods ,Digital signal processor ,Business ,Computers ,Electronics ,Electronics and electrical industries - Abstract
The design of a precoder for orthogonal space-time block codes (OSTBCs) for correlated Ricean multiple-input multiple-output (MIMO) channels is presented. The properties of the minimum exact precoder are described and an iterative numerical optimization algorithm is proposed for finding the exact minimum symbol error rate (SER) precoder under a power constraint.
- Published
- 2007
28. Jointly optimized transmitter and receiver FIR MIMO filters in the presence of near-end crosstalk
- Author
-
Hjorungnes, Are, De Campos, Marcello L.R., and Ramirez, Paulo Sergio
- Subjects
Iterative methods (Mathematics) -- Analysis ,Signal processing -- Research ,Digital filters -- Analysis ,Digital signal processor ,Business ,Computers ,Electronics ,Electronics and electrical industries - Abstract
Equations are derived for finding jointly optimized transmitter and receiver finite impulse response (FIR) multiple-input multiple-output (MIMO) filters for communication over a power-constrained MIMO channel. Based on the equation, an iterative algorithm was developed and presented which was able to converge to a locally optimal solution.
- Published
- 2005
29. Jointly minimum BER transmitter and receiver FIR MIMO filters for binary signal vectors
- Author
-
Hjorungnes, Are, Diniz, Paulo S.R., and de Campos, Marcello L.R.
- Subjects
Signal processing -- Analysis ,Digital filters -- Analysis ,Error analysis (Mathematics) ,Digital signal processor ,Business ,Computers ,Electronics ,Electronics and electrical industries - Abstract
The theory developed for minimizing the bit error rate (BER) between the desired and decoded signals, with respect to the coefficients of transmitter and receiver finite impulse response (FIR) multiple-input multiple-output (MIMO) filters, is presented. The method specified in this theory yields better results when compared with other methods available in the literature.
- Published
- 2004
30. Asynchronous Compute-and-Forward
- Author
-
Mohamed Oussama Damen, Are Hjorungnes, and Hossein Najafi
- Subjects
Scheme (programming language) ,Asynchronous system ,Computer science ,Stochastic process ,Equalizer ,Data_CODINGANDINFORMATIONTHEORY ,Topology ,Synchronization ,law.invention ,Relay ,law ,Asynchronous communication ,Simple (abstract algebra) ,Key (cryptography) ,Electronic engineering ,Electrical and Electronic Engineering ,computer ,Linear filter ,Computer Science::Information Theory ,computer.programming_language - Abstract
The impact of time asynchronism on the performance of compute-and-forward strategy in relay networks is considered. While the key idea in compute-and-forward is to decode a linear synchronous combination of the transmitted codewords, the relays receive random asynchronous versions of the combinations due to the distributed nature of the network. Over a symbol-asynchronous network, we show that by using a simple equalizer as a part of the signaling scheme, one can transform the asynchronous system into a synchronous one albeit with a smaller channel gain. With frame-asynchronism, we propose to use extra antennas at the relays to efficiently remove the asynchronous delays. By applying a linear filter with a delay-dependent structure before the decoder of compute-and-forward, the achievable rate is maximized at all signal-to-noise-ratios (SNRs).
- Published
- 2013
- Full Text
- View/download PDF
31. Low-Complexity Decoding in DF MIMO Relaying System
- Author
-
Zhu Han, Are Hjorungnes, Ankur Bansal, and Manav R. Bhatnagar
- Subjects
Block code ,Computer Networks and Communications ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,MIMO ,Aerospace Engineering ,Keying ,Data_CODINGANDINFORMATIONTHEORY ,law.invention ,Soft-decision decoder ,Transmission (telecommunications) ,Relay ,law ,Automotive Engineering ,Electronic engineering ,Electrical and Electronic Engineering ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Phase-shift keying ,Mathematics - Abstract
We derive a maximum-likelihood (ML) decoder for decode-and-forward (DF) based multiple-input-multiple-output (MIMO) cooperative systems having an equal number of antennas at the source and relay nodes, and utilizing an arbitrary complex-valued M-ary constellation. The DF-based MIMO cooperative system considered in this paper utilizes orthogonal space-time block codes (OSTBCs) for the transmission of data of the source to the destination. To reduce the decoding complexity, a suboptimal piecewise linear (PL) decoder is also derived, which performs close to the ML decoder. The proposed ML and PL decoders are applicable to arbitrary complex-valued M -ary constellations and require the destination node to possess knowledge of the channel statistics of the source-relay (S-R) links, whereas the existing decoder of multi-antenna-based DF cooperative systems needs to know the exact channel coefficients of the S-R link at the destination. The proposed decoders outperform an amplify-and-forward (AF)-protocol-based multi-antenna cooperative system. We obtain an expression of the average probability of error of the proposed PL decoder using an M-phase-shift keying (M-PSK) constellation and a single MIMO relay. The approximate symbol error rate (SER) of the proposed PL decoder is derived with multiple MIMO relays, M-PSK constellation, and asymptotically high signal-to-noise ratio (SNR) of the S-R links. It is analytically shown that the proposed ML and PL decoders achieve maximum possible diversity in the multi-antenna cooperative system with a single relay.
- Published
- 2013
- Full Text
- View/download PDF
32. Decoding and Performance Bound of Demodulate-and-Forward Based Distributed Alamouti STBC
- Author
-
Are Hjorungnes, Ankur Bansal, and Manav R. Bhatnagar
- Subjects
Block code ,Computer science ,Applied Mathematics ,Real-time computing ,Keying ,Data_CODINGANDINFORMATIONTHEORY ,Communications system ,Upper and lower bounds ,Computer Science Applications ,law.invention ,Space–time block code ,Soft-decision decoder ,Relay ,law ,Diversity gain ,Electrical and Electronic Engineering ,Algorithm ,Pairwise error probability ,Decoding methods - Abstract
In a demodulate-and-forward (DF) based cooperative communication system, erroneous relaying of the data leads to degradation in the performance of the destination receiver. However, a maximum likelihood (ML) decoder in the destination can improve the receiver performance. For achieving a diversity gain, the Alamouti space-time block code (STBC) can be used in the DF based cooperative system in a distributed manner. In this paper, we derive an ML decoder of the distributed Alamouti STBC for the DF based cooperative system with two imperfect relaying nodes. We also consider a DF cooperative communication system in which one out of two relays is in outage. A piece-wise linear (PL) decoder for the DF cooperative system with the distributed Alamouti code and one relay in outage is proposed. The PL decoder provides approximately the same performance as that of the ML decoder with reduced decoding complexity. We derive the pairwise error probability (PEP) of the proposed ML decoder with binary phase-shift keying constellation. An optimized transmit power allocation for the relays is performed by minimizing an upper bound of the PEP. It is shown by simulations that the proposed ML decoder enables the DF protocol based cooperative system to outperform the same rate amplify-and-forward protocol based cooperative system when both systems utilize the distributed Alamouti STBC.
- Published
- 2013
- Full Text
- View/download PDF
33. Physical layer security game: interaction between source, eavesdropper, and friendly jammer
- Author
-
Han, Zhu, Marina, Ninoslav, Debbah, Merouane, and Hjorungnes, Are
- Subjects
Data security issue ,Data security -- Research ,Jamming of communications -- Research - Published
- 2009
34. Guest Editorial Cooperative Networking — Challenges and Applications (Part II)
- Author
-
Xuemin Sherman Shen, Are Hjorungnes, Qian Zhang, P.R. Kumar, and Zhu Han
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering - Published
- 2012
- Full Text
- View/download PDF
35. Impact of Transceiver I/Q Imbalance on Transmit Diversity of Beamforming OFDM Systems
- Author
-
Are Hjorungnes, Olav Tirkkonen, and Behrouz Maham
- Subjects
ta113 ,Beamforming ,Transmit diversity ,ta213 ,Computer science ,Orthogonal frequency-division multiplexing ,ta111 ,Electronic engineering ,Outage probability ,Electrical and Electronic Engineering ,Transceiver ,Interference (wave propagation) ,ta512 - Abstract
One of the serious imperfections affecting OFDM systems is transceiver I/Q imbalance. In this letter, closed-form expressions for the outage probability of beamforming OFDM systems with transmit and receive I/Q imbalances are derived. Moreover, the asymptotic behavior and diversity order of the system is investigated. The analytical results are confirmed by simulations.
- Published
- 2012
- Full Text
- View/download PDF
36. Pilot Contamination for Active Eavesdropping
- Author
-
Are Hjorungnes, Xiangyun Zhou, and Behrouz Maham
- Subjects
Computer science ,Applied Mathematics ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Transmitter ,Physical layer ,Jamming ,Eavesdropping ,Data_CODINGANDINFORMATIONTHEORY ,Computer security ,computer.software_genre ,Precoding ,Computer Science Applications ,Transmission (telecommunications) ,Channel state information ,Electrical and Electronic Engineering ,computer ,Communication channel ,Data transmission - Abstract
Existing studies on physical layer security often assume the availability of perfect channel state information (CSI) and overlook the importance of channel training needed for obtaining the CSI. In this letter, we discuss how an active eavesdropper can attack the training phase in wireless communication to improve its eavesdropping performance. We derive a new security attack from the pilot contamination phenomenon, which targets at systems using reverse training to obtain the CSI at the transmitter for precoder design. This attack changes the precoder used by the legitimate transmitter in a controlled manner to strengthen the signal reception at the eavesdropper during data transmission. Furthermore, we discuss an efficient use of the transmission energy of an advanced full-duplex eavesdropper to simultaneously achieve a satisfactory eavesdropping performance whilst degrading the detection performance of the legitimate receiver.
- Published
- 2012
- Full Text
- View/download PDF
37. Guest Editorial Cooperative Networking — Challenges and Applications (Part I)
- Author
-
Qian Zhang, Xuemin Sherman Shen, P. R. Kumar, Are Hjorungnes, and Zhu Han
- Subjects
Multimedia ,Computer Networks and Communications ,Wireless network ,business.industry ,Computer science ,Physical layer ,Network layer ,computer.software_genre ,law.invention ,Relay ,law ,Next-generation network ,Electrical and Electronic Engineering ,Telecommunications ,business ,computer - Abstract
The 28 papers in this special issue focus on cooperative networking. The papers can be divided into three categories. The ten papers in the first category focus on relay selection and routing in the network layer. The nine papers in the second category deal with coding and power allocation in the physical layer. The nine papers in the third category study application performance.
- Published
- 2012
- Full Text
- View/download PDF
38. Opportunistic Relaying for MIMO Amplify-and-Forward Cooperative Networks
- Author
-
Are Hjorungnes and Behrouz Maham
- Subjects
business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,MIMO ,Data_CODINGANDINFORMATIONTHEORY ,Topology ,Computer Science Applications ,law.invention ,Cooperative diversity ,Relay ,law ,Computer Science::Networking and Internet Architecture ,Wireless ,Electrical and Electronic Engineering ,business ,Computer Science::Information Theory ,Computer network ,Rayleigh fading ,Communication channel - Abstract
We consider a wireless relay network with multiple antenna terminals over Rayleigh fading channels, and apply distributed space-time coding (DSTC) in amplify-and-forward (A&F) mode. The A&F scheme is used in a way that each relay transmits a scaled version of the linear combination of the received symbols. It turns out that, combined with power allocation in the relays, A&F DSTC results in an opportunistic relaying scheme, in which only the best relay is selected to retransmit the source's space-time coded signal. Furthermore, assuming the knowledge of source-relay CSI at the source node, we design an efficient power allocation which outperforms uniform power allocation across the source antennas. Next, assuming M-PSK or M-QAM modulations, we analyze the performance of the proposed cooperative diversity transmission schemes in a wireless relay networks with the multiple-antenna source and destination. We derive the probability density function (PDF) of the received SNR at the destination. Then, the PDF is used to determine the symbol error rate (SER) in Rayleigh fading channels. We derived closed-form approximations of the average SER in the high SNR scenario, from which we find the diversity order of system R min{N s , N d }, where R, N s , and N d are the number of the relays, source antennas, and destination antennas, respectively. Simulation results show that the proposed system obtain more than 6 dB gain in SNR over A&F MIMO DSTC for BER 10?4, when R = 2, N s = 2, and N d = 1.
- Published
- 2012
- Full Text
- View/download PDF
39. Differential Coding for MAC Based Two-User MIMO Communication Systems
- Author
-
Are Hjorungnes and Manav R. Bhatnagar
- Subjects
Code division multiple access ,Computer science ,Applied Mathematics ,MIMO ,Real-time computing ,Data_CODINGANDINFORMATIONTHEORY ,Upper and lower bounds ,Computer Science Applications ,Telecommunications link ,Electrical and Electronic Engineering ,Differential coding ,Algorithm ,Pairwise error probability ,Decoding methods ,Computer Science::Information Theory ,Data transmission ,Communication channel ,Phase-shift keying - Abstract
In this paper, we explain how to implement differential modulation in multiple access channel (MAC) based uplink two-user multiple-input multiple-output (MIMO) communication system. It is assumed that the users cannot exchange their information and transmit data over uplink MAC channels simultaneously in the same frequency band and without any orthogonal signatures (no CDMA). We derive two types of differential decoders for two-user MIMO MAC system namely 1) Partial differential decoder, 2) Heuristic based differential decoders. The partial differential decoder is able to avoid the knowledge of the channel gains of one user at the receiver for joint decoding of the data of both users. Whereas, the heuristic differential decoders are obtained heuristically and work without any channel knowledge of both users. For the heuristic differential decoder to work properly, the data of one user must be rotated before transmission. An upper bound of the pairwise error probability (PEP) is derived for the proposed scheme. The upper bound of the PEP is minimized for obtaining an optimized value of the rotation angle.
- Published
- 2012
- Full Text
- View/download PDF
40. Symbol error-rate analysis of OSTB codes and linear precoder design for MIMO correlated keyhole channels
- Author
-
Yahampath, Pradeepa and Hjorungnes, Are
- Subjects
Wireless technology ,Error-correcting codes -- Analysis ,MIMO communications -- Analysis ,Mobile communication systems -- Analysis ,Wireless communication systems -- Analysis - Published
- 2008
41. Minimum BER receiver filters with block memory for uplink DS-CDMA systems
- Author
-
Hjorungnes, Are and Debbah, Merouane
- Subjects
Algorithm ,Code Division Multiple Access technology ,Algorithms -- Analysis ,CDMA technology -- Analysis - Published
- 2008
42. ML Decoder for Decode-and-Forward Based Cooperative Communication System
- Author
-
Are Hjorungnes and Manav R. Bhatnagar
- Subjects
Computer science ,Applied Mathematics ,Real-time computing ,Data_CODINGANDINFORMATIONTHEORY ,Communications system ,Computer Science Applications ,law.invention ,Soft-decision decoder ,Pulse-amplitude modulation ,Relay ,law ,Computer Science::Networking and Internet Architecture ,Electrical and Electronic Engineering ,Algorithm ,Quadrature amplitude modulation ,Decoding methods ,Computer Science::Information Theory ,Phase-shift keying - Abstract
Decode-and-forward (DF) protocol based cooperative communication is vulnerable to the erroneous relaying by the relay. In this paper, we derive a maximum-likelihood (ML) decoder for the DF protocol utilizing arbitrary complex-valued constellations including M-PSK, M-PAM, and M-QAM. A set-up of a single pair of source and destination with one relay is studied. The source and the relay utilize orthogonal uncoded transmissions. The relay performs ML decoding and forwards the decoded symbol to the destination, and it might commit errors in decoding the data. The ML decoder at the destination is obtained by maximizing the probability density function (p.d.f.) of the data received during two orthogonal transmissions at the destination under the assumption that the average probability of error of the source-relay link is known at the destination. The proposed ML decoder is a generalized decoder which is applicable to arbitrary constellations, whereas, one existing DF cooperative decoder is applicable to the real valued constellations like BPSK and M-PAM. One existing decoder is also applicable to M2-QAM constellations. We also derive a low-complexity piecewise linear (PL) decoder for arbitrary complex-valued M-point constellations which performs similar to the ML decoder for all signal-to-noise ratio values. An approximate expression of the symbol error rate (SER) of the PL decoder for M-PSK constellation is derived. By using the approximate SER expressions, it is proved that the proposed ML and PL decoders achieve full diversity of two in the cooperative system studied.
- Published
- 2011
- Full Text
- View/download PDF
43. Energy-Efficient Space-Time Coded Cooperation in Outage-Restricted Multihop Wireless Networks
- Author
-
Ravi Narasimhan, Are Hjorungnes, and Behrouz Maham
- Subjects
Engineering ,Wireless network ,business.industry ,Wireless ad hoc network ,Distributed computing ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Data_CODINGANDINFORMATIONTHEORY ,Spectral efficiency ,law.invention ,Relay ,law ,Computer Science::Networking and Internet Architecture ,Overhead (computing) ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Computer Science::Information Theory ,Computer network ,Efficient energy use - Abstract
Due to the limited energy supplies of nodes in many applications such as wireless sensor networks, energy efficiency is crucial for extending the lifetime of these networks. This paper addresses the cooperative transmission for outage-restricted multihop wireless ad hoc networks. The source node wants to transmit messages to a single destination. Other nodes in the network may operate as relay nodes. In this paper, new multihop cooperative protocol is proposed using the space-time codes for the purpose of energy savings, subject to a required outage probability at the destination. We restrict the cooperation to nodes along a chosen route. Two efficient power allocation schemes are derived, which depend only on the statistics of the channels. Furthermore, three efficient cooperative multihop transmissions are proposed when arbitrary distributed space-time codes are used. The proposed cooperative protocols offer different degrees of energy efficiency, spectral efficiency, complexity, and signalling overhead. Compared to non-cooperative multihop routing, an energy saving of up to 72% is achievable in line networks with 3 relays and an outage probability constraint of 10-3 at the destination.
- Published
- 2011
- Full Text
- View/download PDF
44. Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
- Author
-
Are Hjorungnes, Walid Saad, Zhu Han, Merouane Debbah, and Tamer Basar
- Subjects
FOS: Computer and information sciences ,Computer Networks and Communications ,business.industry ,Wireless network ,Network packet ,Computer science ,Information Theory (cs.IT) ,Computer Science - Information Theory ,Stochastic game ,Network partition ,Throughput ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,law.invention ,Base station ,Task (computing) ,Computer Science - Computer Science and Game Theory ,Polling system ,Relay ,law ,Wireless ,Electrical and Electronic Engineering ,business ,Software ,Computer Science and Game Theory (cs.GT) ,Computer network - Abstract
Autonomous wireless agents such as unmanned aerial vehicles or mobile base stations present a great potential for deployment in next-generation wireless networks. While current literature has been mainly focused on the use of agents within robotics or software applications, we propose a novel usage model for self-organizing agents suited to wireless networks. In the proposed model, a number of agents are required to collect data from several arbitrarily located tasks. Each task represents a queue of packets that require collection and subsequent wireless transmission by the agents to a central receiver. The problem is modeled as a hedonic coalition formation game between the agents and the tasks that interact in order to form disjoint coalitions. Each formed coalition is modeled as a polling system consisting of a number of agents which move between the different tasks present in the coalition, collect and transmit the packets. Within each coalition, some agents can also take the role of a relay for improving the packet success rate of the transmission. The proposed algorithm allows the tasks and the agents to take distributed decisions to join or leave a coalition, based on the achieved benefit in terms of effective throughput, and the cost in terms of delay. As a result of these decisions, the agents and tasks structure themselves into independent disjoint coalitions which constitute a Nash-stable network partition. Moreover, the proposed algorithm allows the agents and tasks to adapt the topology to environmental changes such as the arrival/removal of tasks or the mobility of the tasks. Simulation results show how the proposed algorithm improves the performance, in terms of average player (agent or task) payoff, of at least 30.26% (for a network of 5 agents with up to 25 tasks) relatively to a scheme that allocates nearby tasks equally among agents., to appear, IEEE Transactions on Mobile Computing
- Published
- 2011
- Full Text
- View/download PDF
45. Optimizing Training-Based Transmission Against Smart Jamming
- Author
-
Dusit Niyato, Xiangyun Zhou, and Are Hjorungnes
- Subjects
Engineering ,Mathematical optimization ,Channel allocation schemes ,Computer Networks and Communications ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,MIMO ,Transmitter ,Aerospace Engineering ,Jamming ,Data_CODINGANDINFORMATIONTHEORY ,Channel state information ,Automotive Engineering ,Electronic engineering ,Fading ,Electrical and Electronic Engineering ,business ,Computer Science::Information Theory ,Communication channel ,Data transmission - Abstract
We consider training-based transmissions over multiple-input-multiple-output (MIMO) fading channels in the presence of jamming. Each transmission block consists of a training phase and a data transmission phase. From an information-theoretic viewpoint, we study the optimal energy allocation between the two phases for both the legitimate user of the channel and the jammer. For a fixed jamming strategy, we derive a closed-form solution of the optimal transmit energy allocation for the legitimate user and show that the optimal training length is equal to the number of transmit antennas. On the other hand, if the jammer has optimized its strategy, the best choice for the training length is shown to be larger than the number of transmit antennas and approaches half of the block length at low signal-to-jamming-and-noise ratio (SJNR). From the jammer's perspective, we derive closed-form solutions of the optimal jamming energy allocation. Numerical results demonstrate 30%-50% performance gains by using optimal designs in various scenarios. We also model the energy allocation problem as a zero-sum game and prove the existence and uniqueness of the Nash equilibrium when the training length is fixed. Furthermore, we extend our analysis to the case where the channel state information (CSI) is available at the transmitter. We show that many results found for systems with no transmitter CSI are also valid for systems with full transmitter CSI.
- Published
- 2011
- Full Text
- View/download PDF
46. Coalition Formation Games for Collaborative Spectrum Sensing
- Author
-
Are Hjorungnes, Merouane Debbah, Walid Saad, Zhu Han, Tamer Basar, University of Oslo (UiO), University of Houston, University of Illinois at Urbana-Champaign [Urbana], University of Illinois System, Chaire Radio Flexible Alcatel-Lucent/Supélec (Chaire Radio Flexible), and Ecole Supérieure d'Electricité - SUPELEC (FRANCE)-Alcatel-Lucent
- Subjects
FOS: Computer and information sciences ,Mathematical optimization ,Computer Networks and Communications ,Computer science ,Computer Science - Information Theory ,media_common.quotation_subject ,Stability (learning theory) ,Aerospace Engineering ,02 engineering and technology ,Disjoint sets ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Computer Science - Computer Science and Game Theory ,Voting ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,media_common ,Information Theory (cs.IT) ,020206 networking & telecommunications ,Cognitive network ,Incentive ,Cognitive radio ,Distributed algorithm ,Game theory cognitive radio ,Automotive Engineering ,020201 artificial intelligence & image processing ,Game theory ,Computer Science and Game Theory (cs.GT) - Abstract
Collaborative Spectrum Sensing (CSS) between secondary users (SUs) in cognitive networks exhibits an inherent tradeoff between minimizing the probability of missing the detection of the primary user (PU) and maintaining a reasonable false alarm probability (e.g., for maintaining a good spectrum utilization). In this paper, we study the impact of this tradeoff on the network structure and the cooperative incentives of the SUs that seek to cooperate for improving their detection performance. We model the CSS problem as a non-transferable coalitional game, and we propose distributed algorithms for coalition formation. First, we construct a distributed coalition formation (CF) algorithm that allows the SUs to self-organize into disjoint coalitions while accounting for the CSS tradeoff. Then, the CF algorithm is complemented with a coalitional voting game for enabling distributed coalition formation with detection probability guarantees (CF-PD) when required by the PU. The CF-PD algorithm allows the SUs to form minimal winning coalitions (MWCs), i.e., coalitions that achieve the target detection probability with minimal costs. For both algorithms, we study and prove various properties pertaining to network structure, adaptation to mobility and stability. Simulation results show that CF reduces the average probability of miss per SU up to 88.45% relative to the non-cooperative case, while maintaining a desired false alarm. For CF-PD, the results show that up to 87.25% of the SUs achieve the required detection probability through MWC, Comment: IEEE Transactions on Vehicular Technology, to appear
- Published
- 2011
- Full Text
- View/download PDF
47. Exploiting Mobility Diversity in Sharing Wireless Access: A Game Theoretic Approach
- Author
-
Ekram Hossain, Walid Saad, Ping Wang, Are Hjorungnes, and Dusit Niyato
- Subjects
Wi-Fi array ,Computer science ,Network packet ,business.industry ,Applied Mathematics ,Quality of service ,Stochastic game ,Mobile computing ,Computer Science Applications ,Base station ,Wireless ,Mobile telephony ,Electrical and Electronic Engineering ,business ,Communication channel ,Computer network - Abstract
We propose a wireless access scheme which is based on a channel reservation sharing method for a group of mobile users. This proposed scheme exploits the mobility diversity of the mobile users in order to reduce the cost of wireless access. Another aspect of the proposed scheme is contention resolution among mobile users belonging to the same group in order to access the reserved channel while they are at the same location. A game theoretic model is developed for this wireless access scheme through which the rational mobile users can minimize the cost of wireless access while satisfying their quality-of-service (QoS) requirements (e.g., packet loss rate and average packet waiting time). The proposed game model consists of two interrelated formulations: a coalitional game for channel reservation and a stochastic game for channel access. The stable coalitional structure and equilibrium channel access policy are obtained from this game model.
- Published
- 2010
- Full Text
- View/download PDF
48. Distributed Coalition Formation Games for Secure Wireless Transmission
- Author
-
Zhu Han, Are Hjorungnes, Merouane Debbah, Tamer Basar, Walid Saad, University of Oslo (UiO), University of Houston, Coordinated Science Libratory [University of Illinois] (CSL), University of Illinois System, Chaire Radio Flexible Alcatel-Lucent/Supélec (Chaire Radio Flexible), and Ecole Supérieure d'Electricité - SUPELEC (FRANCE)-Alcatel-Lucent
- Subjects
FOS: Computer and information sciences ,Computer Networks and Communications ,Computer science ,Computer Science - Information Theory ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Computer security ,computer.software_genre ,Network topology ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Secure communication ,Secrecy ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Information exchange ,Computer Science::Information Theory ,Computer Science::Cryptography and Security ,Wireless network ,business.industry ,Information Theory (cs.IT) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Physical layer ,020206 networking & telecommunications ,Hardware and Architecture ,Distributed algorithm ,020201 artificial intelligence & image processing ,business ,Game theory ,computer ,Software ,Information Systems ,Computer network - Abstract
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. While existing PHY security literature answered the question ``what are the link-level secrecy rate gains from cooperation?'', this paper attempts to answer the question of ``how to achieve those gains in a practical decentralized wireless network and in the presence of a cost for information exchange?''. For this purpose, we model the PHY security cooperation problem as a coalitional game with non-transferable utility and propose a distributed algorithm for coalition formation. Through the proposed algorithm, the wireless users can cooperate and self-organize into disjoint independent coalitions, while maximizing their secrecy rate taking into account the security costs during information exchange. We analyze the resulting coalitional structures for both decode-and-forward and amplify-and-forward cooperation and study how the users can adapt the network topology to environmental changes such as mobility. Through simulations, we assess the performance of the proposed algorithm and show that, by coalition formation using decode-and-forward, the average secrecy rate per user is increased of up to 25.3 % and 24.4 % (for a network with 45 users) relative to the non-cooperative and amplify-and-forward cases, respectively., Comment: Invited paper
- Published
- 2010
- Full Text
- View/download PDF
49. Improved Interference Cancellation Scheme for Two-User Detection of Alamouti Code
- Author
-
Manav R. Bhatnagar and Are Hjorungnes
- Subjects
Block code ,business.industry ,MIMO ,Array processing ,Communications system ,Single antenna interference cancellation ,Signal Processing ,Electrical and Electronic Engineering ,Telecommunications ,business ,Algorithm ,Pairwise error probability ,Decoding methods ,Computer Science::Information Theory ,Diversity scheme ,Mathematics - Abstract
In this correspondence, we propose an improved interference cancellation method for two-user multiple access based MIMO communication system. It is shown in the correspondence, that by using the proposed receiver array processing technique a diversity order of 2M can be achieved in a two-user interference cancellation system with two transmit and more than two (M > 2) receive antennas. We derive pairwise error probability (PEP) bounds for different number of receive antennas and prove the diversity order for different cases theoretically. The proposed scheme provides better diversity than one existing interference cancellation scheme.
- Published
- 2010
- Full Text
- View/download PDF
50. Differential Decoder for MAC Based Two-User Communication Systems
- Author
-
Manav R. Bhatnagar and Are Hjorungnes
- Subjects
Code division multiple access ,Applied Mathematics ,Real-time computing ,MIMO ,Time division multiple access ,Data_CODINGANDINFORMATIONTHEORY ,Soft-decision decoder ,Signal Processing ,Telecommunications link ,Electrical and Electronic Engineering ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Mathematics ,Communication channel ,Phase-shift keying - Abstract
We derive a decoder for differential data of two multiple access channel (MAC) based uplink users. Both users utilize differential modulation for transmitting their data. It is assumed that the users cannot exchange their information. In addition, it is assumed that the users transmit data over multiple access uplink channels simultaneously in the same frequency band and without any orthogonal signatures (no CDMA). Their transmissions are assumed to be perfectly synchronized in time, phase, and frequency. The decoder is obtained by maximizing the joint probability distribution function (p.d.f.) of consecutively received data samples. We first obtain a partially differential decoder which avoids the knowledge of channel of one user at the base-station. Then we derive a heuristic differential decoder which completely avoids the knowledge of the channels of both users. For the heuristic differential decoder to work properly, both users must use rotated constellations. Optimized values of rotation angles for different M-PSK constellations are numerically obtained. It is further shown by simulations that the proposed differential decoders perform better than a same rate existing TDMA based two-user transmission scheme.
- Published
- 2010
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.