Exploiting user ordering in non-iterative interference alignment transceiver design in MIMO interfering broadcast channel

Author(s):  
Chiao-En Chen ◽  
Po-Kai Chuang
Information ◽  
2021 ◽  
Vol 12 (8) ◽  
pp. 335
Author(s):  
Yuan Ren ◽  
Xuewei Zhang ◽  
Meruyert Makhanbet

In this work, we jointly investigate the issues of node scheduling and transceiver design in a sensor network with multiple clusters, which is endowed with simultaneous wireless information and power transfer. In each cluster of the observed network, S out of N nodes are picked, each of which is capable of performing information transmission (IT) via uplink communications. As for the remaining idle nodes, they can harvest energy from radio-frequency signals around their ambient wireless environments. Aiming to boost the intra-cluster performance, we advocate an interference alignment enabled opportunistic communication (IAOC) scheme. This scheme can yield better tradeoffs between IT and wireless power transfer (WPT). With the aid of IAOC scheme, the signal projected onto the direction of the receive combining vector is adopted as the accurate measurement of effective signal strength, and then the high-efficiency scheduling metric for each node can be accordingly obtained. Additionally, an algorithm, based on alternative optimization and dedicated for transceiver design, is also put forward, which is able to promote the achievable sum rate performance as well as the total harvested power. Our simulation results verify the effectiveness of the designed IAOC scheme in terms of improving the performance of IT and WPT in multi-cluster scenarios.


Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 496
Author(s):  
Gustavo Anjos ◽  
Daniel Castanheira ◽  
Adão Silva ◽  
Atílio Gameiro

This work addresses the security of a two-user broadcast channel. The challenge of protecting a broadcast channel is associated with the necessity of securing the system, not only against eavesdropping attacks originating from external nodes, but also to ensure that the inside users do not eavesdrop on each other’s information. To address this issue, the present work proposes a cooperative jamming scheme that provides protection against eavesdropping attacks carried out simultaneously by inside users and external eavesdroppers. To achieve this goal, the developed scheme combines real interference alignment with a blind cooperative jamming technique defined in the literature. An information theoretical analysis shows that positive secure degrees of freedom are achievable using the proposed solution.


2012 ◽  
Vol 58 (5) ◽  
pp. 2896-2910 ◽  
Author(s):  
Meisam Razaviyayn ◽  
Maziar Sanjabi ◽  
Zhi-Quan Luo

Sign in / Sign up

Export Citation Format

Share Document