Data rate and energy efficiency decrement caused by the transmission of reference and data carrier signals in equal portions constitute the major drawback of differential chaos shift keying (DCSK) ...systems. To overcome this dominant drawback, a short reference DCSK system (SR-DCSK) is proposed. In SRDCSK, the number of chaotic samples that constitute the reference signal is shortened to R such that it occupies less than half of the bit duration. To build the transmitted data signal, P concatenated replicas of R are used to spread the data. This operation increases data rate and enhances energy efficiency without imposing extra complexity onto the system structure. The receiver uses its knowledge of the integers R and P to recover the data. The proposed system is analytically studied and the enhanced data rate and bit energy saving percentages are computed. Furthermore, theoretical performance for AWGN and multipath fading channels are derived and validated via simulation. In addition, optimising the length of the reference signal R is exposed to detailed discussion and analysis. Finally, the application of the proposed short reference technique to the majority of transmit reference systems such as DCSK, multicarrier DCSK, and quadratic chaos shift keying enhances the overall performance of this class of chaotic modulations and is, therefore, promising.
In this article, we develop an end-to-end wireless communication system using deep neural networks (DNNs), where DNNs are employed to perform several key functions, including encoding, decoding, ...modulation, and demodulation. However, an accurate estimation of instantaneous channel transfer function, i.e. , channel state information (CSI), is needed in order for the transmitter DNN to learn to optimize the receiver gain in decoding. This is very much a challenge since CSI varies with time and location in wireless communications and is hard to obtain when designing transceivers. We propose to use a conditional generative adversarial net (GAN) to represent channel effects and to bridge the transmitter DNN and the receiver DNN so that the gradient of the transmitter DNN can be back-propagated from the receiver DNN. In particular, a conditional GAN is employed to model the channel effects in a data-driven way, where the received signal corresponding to the pilot symbols is added as a part of the conditioning information of the GAN. To address the curse of dimensionality when the transmit symbol sequence is long, convolutional layers are utilized. From the simulation results, the proposed method is effective on additive white Gaussian noise (AWGN) channels, Rayleigh fading channels, and frequency-selective channels, which opens a new door for building data-driven DNNs for end-to-end communication systems.
In this work, we study the secrecy performance of a reconfigurable intelligent surfaces (RIS)-aided wireless communication system in the presence of an eavesdropping user. Specifically, we assume ...that the RIS is placed between the source and the legitimate user and is used to improve the link security. In particular, analytical results for the secrecy outage probability (SOP) are derived. We also provide an asymptotic analysis to investigate the effect of the main parameters on the secrecy performance of our proposed system, such as the number of tunable elements of the RIS and the average signal-to-noise ratios. Finally, we verify our analytical results via simulations. Results show the positive effect of utilizing RISs for enhancing the secrecy performance in wireless systems.
An intelligent reflecting surface (IRS) can adaptively adjust the phase shifts of its reflecting units to strengthen the desired signal and/or suppress the undesired signal. In this letter, we ...investigate an IRS-aided secure wireless communication system where a multi-antenna access point (AP) sends confidential messages to a single-antenna user in the presence of a single-antenna eavesdropper. In particular, we consider the challenging scenario where the eavesdropping channel is stronger than the legitimate communication channel and they are also highly correlated in space. We maximize the secrecy rate of the legitimate communication link by jointly designing the AP's transmit beamforming and the IRS's reflect beamforming. While the resultant optimization problem is difficult to solve, we propose an efficient algorithm to obtain high-quality suboptimal solution for it by applying the alternating optimization, and semidefinite relaxation methods. Simulation results show that the proposed design significantly improves the secrecy communication rate for the considered setup over the case without using the IRS, and outperforms a heuristic scheme.
A new end-to-end communication system is proposed to increase transmission speed, robustness, and security in order to meet the requirements of mobile systems that know an exponentially increasing ...data amount over time. The design relies on the use of compressed sensing-source coding instead of the supported speech coding standards in actual mobile communication systems. The proposed compressed sensing-source coding method allows reducing the speech coding complexity by using simple quantisation and binary encoding, saving communication system resources, and encrypting communications without additional costs. The performance of the resulting communication system is evaluated for speech communication via 10 dB Rayleigh environment in terms of perceptual evaluation of speech quality (PESQ) scores and coherence speech intelligibility index (CSII) when convolutional coding, orthogonal frequency division multiplexing, and diversity schemes are used. Results report that for a bit rate of 12.8 kbit/s the proposed scheme achieves fair speech intelligibility justified by a CSII value of 0.5, and offers good output speech quality measure, providing a PESQ of 3.33 for the same bit rate.
An important ingredient of the future 5G systems will be ultra-reliable low-latency communication (URLLC). A way to offer URLLC without intervention in the baseband/PHY layer design is to use ...interface diversity and integrate multiple communication interfaces, each interface based on a different technology. In this paper, we propose to use coding to seamlessly distribute coded payload and redundancy data across multiple available communication interfaces. We formulate an optimization problem to find the payload allocation weights that maximize the reliability at specific target latency values. In order to estimate the performance in terms of latency and reliability of such an integrated communication system, we propose an analysis framework that combines traditional reliability models with technology-specific latency probability distributions. Our model is capable to account for failure correlation among interfaces/technologies. By considering different scenarios, we find that the optimized strategies can in some cases significantly outperform strategies based on k-out-of-n erasure codes, where the latter do not account for the characteristics of the different interfaces. The model has been validated through simulation and is supported by experimental results.
LPD communication has recently emerged as a new transmission technology to address privacy and security in wireless networks. Recent studies have established the fundamental limits of LPD ...communication in terms of the amount of information that can be conveyed from a transmitter to a receiver subject to a constraint on a warden's detection error probability. The established information- theoretic metric enables analytical studies on the design and performance of LPD communication under various channel conditions. In this article, we present the key features of LPD communication and discuss various important design considerations. First, we clarify the differences between LPD communication and well-known physical-layer security. Then, from an information-theoretic point of view, we discuss the optimal signaling strategies for transmitting the message-carrying signal and artificial noise signal for LPD communication. Finally, we identify the key challenges in the design of practical LPD communication systems and point out future research directions in this context. This article provides guidelines for designing practical LPD communication strategies in wireless systems and networks.
Virtualization is a topic of great interest in the area of mobile and wireless communication systems. However, the term virtualization is used in an inexact manner which makes it difficult to compare ...and contrast work that has been carried out to date. The purpose of this paper is twofold. In the first place, this paper develops a formal theory for defining virtualization. In the second instance, this theory is used as a way of surveying a body of work in the field of wireless link virtualization, a subspace of wireless network virtualization. The formal theory provides a means for distinguishing work that should be classed as resource allocation as distinct from virtualization. It also facilitates a further classification of the representation level at which the virtualization occurs, which makes comparison of work more meaningful. This paper provides a comprehensive survey and highlights gaps in the research that make for fruitful future work.
6G and beyond will fulfill the requirements of a fully connected world and provide ubiquitous wireless connectivity for all. Transformative solutions are expected to drive the surge for accommodating ...a rapidly growing number of intelligent devices and services. Major technological breakthroughs to achieve connectivity goals within 6G include: (i) a network operating at the THz band with much wider spectrum resources, (ii) intelligent communication environments that enable a wireless propagation environment with active signal transmission and reception, (iii) pervasive artificial intelligence, (iv) large-scale network automation, (v) an all-spectrum reconfigurable front-end for dynamic spectrum access, (vi) ambient backscatter communications for energy savings, (vii) the Internet of Space Things enabled by CubeSats and UAVs, and (viii) cell-free massive MIMO communication networks. In this roadmap paper, use cases for these enabling techniques as well as recent advancements on related topics are highlighted, and open problems with possible solutions are discussed, followed by a development timeline outlining the worldwide efforts in the realization of 6G. Going beyond 6G, promising early-stage technologies such as the Internet of NanoThings, the Internet of BioNanoThings, and quantum communications, which are expected to have a far-reaching impact on wireless communications, have also been discussed at length in this paper.