OFDM in emerging wireless networks: synchronization algorithms and physical layer security

作者: Francesco Renna , None

DOI:

关键词: Wireless networkCommunication channelMulti-user MIMOCyclic prefixMIMOElectronic engineeringOrthogonal frequency-division multiplexingFadingTransmitterEngineering

摘要: In the last decade, OFDM has been chosen as physical layer solution for a large variety of wireless, high data rates communication standards. The reasons this success are found in possibility coping with frequency selective channels simple and efficiently implemented transceivers, achieving spectral efficiency. order to push performance these systems close their limit, emerging wireless networks need efficient methods time synchronization, since an erroneous choice symbol timing residual offsets clock carrier frequencies at transmitter receiver can highly impair transmissions due effects ISI ICI. In first part thesis we focus on synchronization algorithms UWB MB systems. First, consider problem analyze case when channel delay spread is larger than cyclic prefix length determined by standard, that ICI not be completely avoided proper timing. case, identify appropriate target maximization ratio total useful received power over all subcarriers given realization. We also present practical low-complexity scheme show its tops results obtained best existing correlation-based estimators. Moreover, very transmission rate MB-OFDM architectures asks offset estimators moderate complexity fast acquisition times. Then, formulate based upon domain symbols, where both observed, jointly estimate them either linear least squares or maximum likelihood approach. assessed through simulation realistic scenario compared previous literature results. In parallel request rates, use sensitive communications raised increasing demand confidentiality (and security general) transmitted information. Physical valuable tool future secure information directly exploiting diversity legitimate nodes attacker. In second thesis, how information-theoretic adapted applied adopt modulation format. multicarrier architecture modeled particular instance MIMO channel. way, able evaluate capabilities system transmitting confidential messages leveraging presented Gaussian wiretap secrecy achievable transmitter/receiver pair presence eavesdropper might structure choose more complex architecture. The features used only transmit secret but share keys. general secret-key agreement (of which seen case) establish closed-form expressions capacity low-power high-power regimes. regime, optimal signaling strategy independent eavesdropper's fading By combining reconciliation privacy amplification, one obtains semi-blind key-distillation knowledge required amplification alone. A similar approach study jamming game environment. scenario, attacker active objective disrupt between users signal. setup zero-sum payoff function represented mutual receiver. Optimal strategies jammer, Nash equilibrium DMT FMT architectures.

参考文章(78)
Zang Li, Roy Yates, Wade Trappe, Secrecy capacity of independent parallel channels allerton conference on communication, control, and computing. pp. 1- 18 ,(2009) , 10.1007/978-1-4419-1385-2_1
Harri Holma, Antti Toskala, LTE for UMTS - OFDMA and SC-FDMA Based Radio Access Wiley Publishing. ,(2009)
A.J. Best, B. Natarajan, The effect of jamming on the performance of carrier interferometry/OFDM wireless and mobile computing, networking and communications. ,vol. 1, pp. 66- 70 ,(2005) , 10.1109/WIMOB.2005.1512818
Lajos Hanzo, T. Keller, M. Muenster, B-J. Choi, OFDM and MC-CDMA for Broadband Multi-User Communications, WLANs and Broadcasting ,(2003)
F.J. Block, Comparison of jamming robustness of airborne networking waveforms military communications conference. pp. 2119- 2125 ,(2005) , 10.1109/MILCOM.2005.1605983
Richard van Nee, Ramjee Prasad, OFDM for Wireless Multimedia Communications ,(1999)
Gregory W. Wornell, Ashish Khisti, The MIMOME Channel arXiv: Information Theory. ,(2007)
Alan V. Oppenheim, Ronald W. Schafer, Discrete-Time Signal Processing ,(1989)
Ueli Maurer, Stefan Wolf, Information-theoretic key agreement: from weak to strong secrecy for free theory and application of cryptographic techniques. pp. 351- 368 ,(2000) , 10.1007/3-540-45539-6_24
K. Png, Xiaoming Peng, Hongyi Fu, F. Chin, Two-Dimensional Iterative Sampling Frequency Offset Estimation for MB-OFDM System vehicular technology conference. ,vol. 3, pp. 1344- 1348 ,(2006) , 10.1109/VETECS.2006.1683053