研究生: |
江威震 Chiang, Wei-Cheng |
---|---|
論文名稱: |
用於無線多輸入多輸出系統之差異性通道估測及訓練序列設計 Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems |
指導教授: |
祁忠勇
Chi, Chong-Yung 張縱輝 Chang, Tsung-Hui |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 通訊工程研究所 Communications Engineering |
論文出版年: | 2010 |
畢業學年度: | 98 |
語文別: | 英文 |
論文頁數: | 46 |
中文關鍵詞: | 通道訓練序列設計 、多輸入多輸出系統通道估測 、秘密通訊 、服務質量差異 、人造雜訊 |
外文關鍵詞: | training sequence design, MIMO channel estimation, secret communications, QoS discrimination, artificial noise |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
This thesis proposes a training-based channel estimation
scheme for achieving quality-of-service discrimination between legitimate and unauthorized receivers in wireless multiple-input multiple-output (MIMO) channels. The proposed method has applications ranging from user discrimination in wireless TV broadcast systems to the prevention of eavesdropping in secret communications. By considering a wireless MIMO system that consists of a multiple-antenna transmitter, a legitimate receiver (LR) and an unauthorized receiver (UR), we propose a multi-stage training-based discriminatory channel estimation (DCE) scheme that aims to optimize the channel estimation performance of the LR while limiting the channel estimation performance of the UR. The key idea is to exploit the channel estimate fed back from the LR at the beginning of each stage to enable the judicious use of artificial noise (AN) in the training signal. Specifically, with knowledge of the LR's channel, AN can be properly superimposed on the training data to degrade the UR's channel estimation performance without causing strong interference on the LR. The channel estimation performance of the LR in earlier stages may not be satisfactory due to the inaccuracy of
the channel estimate and constraints on the UR's estimation
performance, but can improve rapidly in later stages as the quality of channel estimate improves. The training data power and AN power are optimally allocated by minimizing the normalized mean squared error (NMSE) of the LR subject to a lower limit constraint on the NMSE of the UR. The proposed DCE scheme is then extended to the case with multiple LRs and multiple URs. Simulation results are presented to demonstrate the effectiveness of the proposed DCE scheme.
[1] R. M. Needham and M. D. Schroeder, “Using encryption for authentication in
large networks of computers,” Communs. the ACM, vol. 21, no. 12, pp. 993–999,
Dec. 1978.
[2] C. E. Landwehr and D. M. Goldschlag, “Secure issues in networks with internet
access,” Proc. IEEE, vol. 85, pp. 2034–2051, Dec. 1997.
[3] L. Mucchi, L. S. Ronga, and E. D. Re, “A novel approach for physical layer
cryptography in wireless networks,” Wireless Personal Communications, vol. 53,
no. 3, pp. 329–347, May 2010.
[4] ——, “Design and implementation of physical layer private key setting for wireless
networks,” in Proc. IEEE ICC, Dresden, Germany, 2009, pp. 1–5.
[5] A. D. Wyner, “The wiretap channel,” Bell System Technical Journal, vol. 54,
pp. 1355–1387, 1975.
[6] P. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,”
IEEE. Trans. Inform. Theory, vol. 54, no. 10, pp. 4687–4698, Oct. 2008.
[7] A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas: The
MISOME wiretap channel,” to appear in IEEE Trans. Inform. Theory, 2010.
[8] ——, “Secure transmission with multiple antennas: The MIMOME wiretap
channel,” to appear in IEEE Trans. Inform. Theory, 2010.
[9] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,”
in Proc. IEEE ISIT, Toronto, ON, Canada, July 6-11, 2008, pp. 524–528.
[10] X. Li and J. Hwu, “Using antenna array redundancy and channel diversity for
secure wireless transmissions,” Journal of Commun., vol. 2, no. 3, pp. 24–32,
May 2007.
[11] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE. Trans.
Wireless Commun., vol. 7, no. 6, pp. 2180–2189, June 2008.
[12] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Amplify-and-forward based
cooperation for secure wireless communications,” in ICASSP 2009, April 2009,
pp. 2613–2616.
[13] ——, “Secure wireless communications via cooperation,” in Proc. Allerton Conference
on Communication, Control, and Computing, Monticello, IL, USA, Sept.
23-26, 2008, pp. 1132–1138.
[14] A. Mukherjee and A. L. Swindlehurst, “Fixed-rate power allocation strategies for
enhanced secrecy in MIMO wiretap channels,” in Proc. IEEE SPAWC, Perugia,
Italy, June 21-24, 2009, pp. 344–348.
[15] A. L. Swindlehurst, “Fixed SINR solutions for the MIMO wiretap channel,” in
Proc. IEEE ICASSP, Taipei, Taiwan, April 19-24, 2009, pp. 2437–2440.
[16] A. O. Hero, “Secure space-time communication,” IEEE. Trans. Inform. Theory,
vol. 49, no. 12, pp. 3235–3249, Dec. 2003.
[17] T. F. Wong and B. Park, “Training sequence optimization in MIMO systems
with colored interference,” IEEE Trans. Commun., vol. 52, no. 11, pp. 1939–
1947, Nov. 2004.
[18] J. H. Kotecha and A. M. Sayeed, “Training signal design for optimal estimation
of correlated MIMO channels,” IEEE Trans. Signal Process., vol. 55, no. 2, pp.
546–557, Feb. 2004.
[19] Y.-L. Liang, Y.-S. Wang, T.-H. Chang, Y.-W. Hong, and C.-Y. Chi, “On the
impact of quantized channel feedback in guaranteeing secrecy using artificial
noise,” in Proc. IEEE ISIT, Seoul, Korea, June 28-July 3, 2009, pp. 2351–2355.
[20] S. Boyd, S.-J. Kim, L. Vandenberghe, and A. Hassibi, “A tutorial on geometric
programming,” Optim. Eng., vol. 8, pp. 67–127, April 2007.
[21] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, UK: Cambridge
University Press, 2004.
[22] T.-H. Chang, W.-Y. Hong, and C.-Y. Chi, “Training signal design for discriminatory
channel estimation,” in Proc. IEEE GLOBECOM, Honolulu, Hawaii, USA,
Nov. 30-Dec. 4, 2009, pp. 1–6.
[23] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory.
New Jersey: Prentice Hall International, 1993.
[24] M. Chiang, C.-W. Tan, D. P. Palomar, D. ONeill, and D. Julian, Power Control
by Geometric Programming, Chapter 13 of Resource Allocation in Next Generation
Wireless Networks, W. Li and Y. Pan, Editors, Nova Sciences Publishers,
2005.
[25] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming,”
http://stanford.edu/∼boyd/cvx, June 2009.
[26] IEEE 802.11 Working Group on Broadband Wireless Access, IEEE Standard for
Local and Metropolitan Area Networks- Part 11: Wireless LAN medium access
control (MAC) and physical layer (PHY) specifications: High-speed physical
layer in the 5 GHZ Band, Sept. 1999.
[27] E. G. Larsson and P. Stoica, Space-Time Block Coding for Wireless Communications.
Cambridge, UK: Cambridge University Press, 2003.
[28] J. Via and I. Santamaria, “On the blind identifiability of orthogonal space-time
block codes from second order statistics,” IEEE Trans. Inform. Theory, vol. 54,
no. 2, pp. 709–722, Feb. 2008.
[29] J. G. Proakis, Digital Communications. 4th Edition, New York: McGraw-Hill
Companies, Inc., 2001.
[30] IEEE 802.16 Working Group on Broadband Wireless Access, IEEE Standard for
Local and Metropolitan Area Networks- Part 16: Air interface for fixed broadband
wireless access systems, June 2004.
[31] N. Jindal, “MIMO broadcast channels with finite-rate feedback,” IEEE. Trans.
Inform. Theory, vol. 52, no. 11, pp. 5045–5060, Nov. 2006.
[32] S. Haykin, Adaptive Filter Theory. 4th Edition, New Jersey: Prentice Hall
International, 2001.