簡易檢索 / 詳目顯示

研究生: 江威震
Chiang, Wei-Cheng
論文名稱: 用於無線多輸入多輸出系統之差異性通道估測及訓練序列設計
Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems
指導教授: 祁忠勇
Chi, Chong-Yung
張縱輝
Chang, Tsung-Hui
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 通訊工程研究所
Communications Engineering
論文出版年: 2010
畢業學年度: 98
語文別: 英文
論文頁數: 46
中文關鍵詞: 通道訓練序列設計多輸入多輸出系統通道估測秘密通訊服務質量差異人造雜訊
外文關鍵詞: training sequence design, MIMO channel estimation, secret communications, QoS discrimination, artificial noise
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • This thesis proposes a training-based channel estimation
    scheme for achieving quality-of-service discrimination between legitimate and unauthorized receivers in wireless multiple-input multiple-output (MIMO) channels. The proposed method has applications ranging from user discrimination in wireless TV broadcast systems to the prevention of eavesdropping in secret communications. By considering a wireless MIMO system that consists of a multiple-antenna transmitter, a legitimate receiver (LR) and an unauthorized receiver (UR), we propose a multi-stage training-based discriminatory channel estimation (DCE) scheme that aims to optimize the channel estimation performance of the LR while limiting the channel estimation performance of the UR. The key idea is to exploit the channel estimate fed back from the LR at the beginning of each stage to enable the judicious use of artificial noise (AN) in the training signal. Specifically, with knowledge of the LR's channel, AN can be properly superimposed on the training data to degrade the UR's channel estimation performance without causing strong interference on the LR. The channel estimation performance of the LR in earlier stages may not be satisfactory due to the inaccuracy of
    the channel estimate and constraints on the UR's estimation
    performance, but can improve rapidly in later stages as the quality of channel estimate improves. The training data power and AN power are optimally allocated by minimizing the normalized mean squared error (NMSE) of the LR subject to a lower limit constraint on the NMSE of the UR. The proposed DCE scheme is then extended to the case with multiple LRs and multiple URs. Simulation results are presented to demonstrate the effectiveness of the proposed DCE scheme.


    Table of Contents Chinese Abstract ii Abstract iii Acknowledgments v List of Figures viii 1 Introduction 1 2 Problem Statement and Signal Model 5 3 Discriminatory Channel Estimation for K = 1 9 3.0.1 NMSE Analysis and Design Criterion . . . . . . . . . . . . . . 9 3.0.2 Optimal Power Allocation . . . . . . . . . . . . . . . . . . . . 14 4 Discriminatory Channel Estimation for K >1 17 5 Discriminatory Channel Estimation with Multiple LRs and URs 21 6 Simulation Results and Discussions 24 7 Conclusions and Future Works 32 8 Proof of Proposition 1 34 9 Condensation Method for Problem (4.7) 37 Bibliography 43

    [1] R. M. Needham and M. D. Schroeder, “Using encryption for authentication in
    large networks of computers,” Communs. the ACM, vol. 21, no. 12, pp. 993–999,
    Dec. 1978.
    [2] C. E. Landwehr and D. M. Goldschlag, “Secure issues in networks with internet
    access,” Proc. IEEE, vol. 85, pp. 2034–2051, Dec. 1997.
    [3] L. Mucchi, L. S. Ronga, and E. D. Re, “A novel approach for physical layer
    cryptography in wireless networks,” Wireless Personal Communications, vol. 53,
    no. 3, pp. 329–347, May 2010.
    [4] ——, “Design and implementation of physical layer private key setting for wireless
    networks,” in Proc. IEEE ICC, Dresden, Germany, 2009, pp. 1–5.
    [5] A. D. Wyner, “The wiretap channel,” Bell System Technical Journal, vol. 54,
    pp. 1355–1387, 1975.
    [6] P. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,”
    IEEE. Trans. Inform. Theory, vol. 54, no. 10, pp. 4687–4698, Oct. 2008.
    [7] A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas: The
    MISOME wiretap channel,” to appear in IEEE Trans. Inform. Theory, 2010.
    [8] ——, “Secure transmission with multiple antennas: The MIMOME wiretap
    channel,” to appear in IEEE Trans. Inform. Theory, 2010.
    [9] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,”
    in Proc. IEEE ISIT, Toronto, ON, Canada, July 6-11, 2008, pp. 524–528.
    [10] X. Li and J. Hwu, “Using antenna array redundancy and channel diversity for
    secure wireless transmissions,” Journal of Commun., vol. 2, no. 3, pp. 24–32,
    May 2007.
    [11] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE. Trans.
    Wireless Commun., vol. 7, no. 6, pp. 2180–2189, June 2008.
    [12] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Amplify-and-forward based
    cooperation for secure wireless communications,” in ICASSP 2009, April 2009,
    pp. 2613–2616.
    [13] ——, “Secure wireless communications via cooperation,” in Proc. Allerton Conference
    on Communication, Control, and Computing, Monticello, IL, USA, Sept.
    23-26, 2008, pp. 1132–1138.
    [14] A. Mukherjee and A. L. Swindlehurst, “Fixed-rate power allocation strategies for
    enhanced secrecy in MIMO wiretap channels,” in Proc. IEEE SPAWC, Perugia,
    Italy, June 21-24, 2009, pp. 344–348.
    [15] A. L. Swindlehurst, “Fixed SINR solutions for the MIMO wiretap channel,” in
    Proc. IEEE ICASSP, Taipei, Taiwan, April 19-24, 2009, pp. 2437–2440.
    [16] A. O. Hero, “Secure space-time communication,” IEEE. Trans. Inform. Theory,
    vol. 49, no. 12, pp. 3235–3249, Dec. 2003.
    [17] T. F. Wong and B. Park, “Training sequence optimization in MIMO systems
    with colored interference,” IEEE Trans. Commun., vol. 52, no. 11, pp. 1939–
    1947, Nov. 2004.
    [18] J. H. Kotecha and A. M. Sayeed, “Training signal design for optimal estimation
    of correlated MIMO channels,” IEEE Trans. Signal Process., vol. 55, no. 2, pp.
    546–557, Feb. 2004.
    [19] Y.-L. Liang, Y.-S. Wang, T.-H. Chang, Y.-W. Hong, and C.-Y. Chi, “On the
    impact of quantized channel feedback in guaranteeing secrecy using artificial
    noise,” in Proc. IEEE ISIT, Seoul, Korea, June 28-July 3, 2009, pp. 2351–2355.
    [20] S. Boyd, S.-J. Kim, L. Vandenberghe, and A. Hassibi, “A tutorial on geometric
    programming,” Optim. Eng., vol. 8, pp. 67–127, April 2007.
    [21] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, UK: Cambridge
    University Press, 2004.
    [22] T.-H. Chang, W.-Y. Hong, and C.-Y. Chi, “Training signal design for discriminatory
    channel estimation,” in Proc. IEEE GLOBECOM, Honolulu, Hawaii, USA,
    Nov. 30-Dec. 4, 2009, pp. 1–6.
    [23] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory.
    New Jersey: Prentice Hall International, 1993.
    [24] M. Chiang, C.-W. Tan, D. P. Palomar, D. ONeill, and D. Julian, Power Control
    by Geometric Programming, Chapter 13 of Resource Allocation in Next Generation
    Wireless Networks, W. Li and Y. Pan, Editors, Nova Sciences Publishers,
    2005.
    [25] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming,”
    http://stanford.edu/∼boyd/cvx, June 2009.
    [26] IEEE 802.11 Working Group on Broadband Wireless Access, IEEE Standard for
    Local and Metropolitan Area Networks- Part 11: Wireless LAN medium access
    control (MAC) and physical layer (PHY) specifications: High-speed physical
    layer in the 5 GHZ Band, Sept. 1999.
    [27] E. G. Larsson and P. Stoica, Space-Time Block Coding for Wireless Communications.
    Cambridge, UK: Cambridge University Press, 2003.
    [28] J. Via and I. Santamaria, “On the blind identifiability of orthogonal space-time
    block codes from second order statistics,” IEEE Trans. Inform. Theory, vol. 54,
    no. 2, pp. 709–722, Feb. 2008.
    [29] J. G. Proakis, Digital Communications. 4th Edition, New York: McGraw-Hill
    Companies, Inc., 2001.
    [30] IEEE 802.16 Working Group on Broadband Wireless Access, IEEE Standard for
    Local and Metropolitan Area Networks- Part 16: Air interface for fixed broadband
    wireless access systems, June 2004.
    [31] N. Jindal, “MIMO broadcast channels with finite-rate feedback,” IEEE. Trans.
    Inform. Theory, vol. 52, no. 11, pp. 5045–5060, Nov. 2006.
    [32] S. Haykin, Adaptive Filter Theory. 4th Edition, New Jersey: Prentice Hall
    International, 2001.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE