Jianquan Wang, Yuan Li, Wanbin Tang, Xiaoping Li, Shaoqian Li
{"title":"Channel State Information Based Optimal Strategy for Covert Communication","authors":"Jianquan Wang, Yuan Li, Wanbin Tang, Xiaoping Li, Shaoqian Li","doi":"10.1109/WCSP.2019.8928142","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928142","url":null,"abstract":"Covert communication aims at achieving a reliable communication while ensuring an arbitrary small probability of being detected by the adversary. In this paper, we exploit the channel state information (CSI) to further improve the performance of covert communication. We propose two strategies, namely, the Transmission Time Selection Strategy (TTSS) and the Power Control Strategy (PCS). In TTSS the transmission turns on only when the channel is good enough, while in PCS the transmission power changes with the channel gain. Besides, to obtain a positive information rate, a full-duplex receiver is considered, which sends jamming signal to confuse the adversary. The detection performances are analysed and the optimal parameters of the transmission strategies are determined. Numerical results show the relationships between the effective rate and the covert constraint.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115888977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chong Huang, Gaojie Chen, Yu Gong, Jie Tang, J. Chambers
{"title":"Physical Layer Secrecy in the Wireless Power Transfer Network with Full-Duplex Jamming","authors":"Chong Huang, Gaojie Chen, Yu Gong, Jie Tang, J. Chambers","doi":"10.1109/WCSP.2019.8928019","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928019","url":null,"abstract":"This paper investigates the secrecy performance for wireless communications with energy harvesting and full-duplex (FD)jamming. In order to improve the secrecy performance, the receiver works in the FD manner that it receives data and transmit jamming signals simultaneously. The transmit powers for both data and jamming signals are harvested from nearby energy-harvesting-base-stations (EHBSs). The EHBSs and eavesdropper are randomly located, following the Poisson Point Process (PPP)and Binomial Point Process (BPP), respectively. The secrecy outage probability of the proposed system is successfully derived. The analysis is verified with numerical Monte Carlo simulations. The result shows that the applying the full-duplex jamming and energy harvesting enhances the secrecy performance of the wireless network.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124352248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chaofan Wang, Peng Zou, Jiang Chen, Guoqiang Li, N. Chi
{"title":"Internet of Vehicle System Based on Automotive Headlight utilizing Probabilistic Shaping","authors":"Chaofan Wang, Peng Zou, Jiang Chen, Guoqiang Li, N. Chi","doi":"10.1109/WCSP.2019.8928115","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928115","url":null,"abstract":"Internet of Vehicle (IoV) is a flourishing area with numerous possible applications. Combined with visible light communication by utilizing automotive headlight, the potential for high speed Internet of Vehicle system development is enormous. In this paper, we experimentally demonstrate an IoV system based on automotive headlight utilizing probabilistic shaping. We investigated the system performance by calculating the Author(s) who are not already presenters (GMI) versus voltage peak to peak (Vpp), bias current of headlights and free space transmission distance. We also measured the BER versus GMI at a fixed transmission distance to obtain the maximum GMI. Hope to provide reference for the research of IoV VLC system utilizing PS in the future.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114759923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meng Ruan, Ming Jiang, Tao Zou, Yi Sun, Chunming Zhao
{"title":"Near Optimal Decoding of Polar-based Turbo Product Codes","authors":"Meng Ruan, Ming Jiang, Tao Zou, Yi Sun, Chunming Zhao","doi":"10.1109/WCSP.2019.8927852","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8927852","url":null,"abstract":"In this paper, an efficient decoding algorithm for the turbo product code (TPC) with short-block constituent polar codes (polar-TPC) is proposed. We show that the constituent codes can be either systematic or non-systematic, and they can be decoded in parallel. A flipping-based successive cancellation list (SCL) decoder is employed to decode each constituent code and provide a larger code set, from which extrinsic information can be obtained to update the soft input in the next decoding iteration. Simulation results show that the polar-TPC employing our decoding scheme can outperform the BCH-TPC. This decoding scheme, which is compatible with any SCL decoding based acceleration algorithm, offers an effective solution to decrease the decoding latency of long codes while similar decoding performance can be guaranteed.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114829643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongtian Liang, Jiaxin Zhang, Shuai Jiang, Xing Zhang, Jie Wu, Qi Sun
{"title":"Mobile Traffic Prediction Based on Densely Connected CNN for Cellular Networks in Highway Scenarios","authors":"Dongtian Liang, Jiaxin Zhang, Shuai Jiang, Xing Zhang, Jie Wu, Qi Sun","doi":"10.1109/WCSP.2019.8927980","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8927980","url":null,"abstract":"With the explosive growth of communication traffic and the arrival of 5G technologies, wireless big data has become an enabler for operators to manage and improve their wireless communication systems. Although many mobile traffic prediction methods have been proposed in the past few years, few prediction methods combine with the distribution features of base stations to predict the mobile traffic of cellular networks. In this paper, by leveraging on the 4G mobile data collected from one typical city in southeastern China, we propose a mobile traffic prediction approach based on one-dimensional densely connected convolutional neural networks (CNN) to predict the mobile traffic of base stations in highway scenarios. After data acquisition, data analysis and modeling, comparisons are made between the proposed mobile traffic prediction approach and the widely used prediction approaches based on machine learning models like LSTM and SVR, and numerical results show that the proposed mobile traffic prediction approach has outstanding performances.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114840374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shijie Wang, Yuanyuan Gao, Lei Wu, Nan Sha, Sheng Huang, Xiaoyu Wang
{"title":"Cooperative Jamming in Downlink Cellular Networks with Available Eavesdroppers' Location Information","authors":"Shijie Wang, Yuanyuan Gao, Lei Wu, Nan Sha, Sheng Huang, Xiaoyu Wang","doi":"10.1109/WCSP.2019.8927908","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8927908","url":null,"abstract":"In this paper, we enhance physical layer security performance of downlink cellular networks through cooperative jamming technology. Assuming the locations of eavesdroppers (Eve) are available, idle user equipments (UE) are carefully selected to cooperatively transmit jamming signal to confuse eavesdroppers (Eve). Analytical expressions of the connection and secrecy performances are derived, which are validated through Monte Carlo simulations. Simulation results demonstrate that our proposed scheme can improve connection performance, while approaches the secrecy performance of [12]. Furthermore, only 6% idle UEs of [12] are used for cooperative jamming, which helps to decrease energy consumption of network.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114876020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Phase Noise Mitigation Method for Full-Duplex Transceivers","authors":"Xin Quan, Y. Liu, P. Fan, Youxi Tang","doi":"10.1109/WCSP.2019.8927899","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8927899","url":null,"abstract":"Phase noise shows significant impacts on full-duplex (FD) communications, particularly in scenarios with high transmission power and complex multipath self-interference (SI) propagation environments. In this paper, a novel transceiver architecture is proposed to mitigate the phase noise by using two receive chains, where the receiver oscillator signals are originated from the transmitter oscillator with different delays. A self-interference (SI) cancellation algorithm is developed to work with the proposed architecture, and its cancellation capability is derived in closed-form. Analytical and simulation results show that the proposed method performs better in cases with high received SI power and low-quality oscillators.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117105362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Reliable Orbital Angular Momentum Wireless Communications for Space Information Networks","authors":"Runyu Lyu, Wenchi Cheng, Wei Zhang, Hailin Zhang","doi":"10.1109/WCSP.2019.8928116","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928116","url":null,"abstract":"Space wireless communications have been developing for several decades, along with traditional orthogonal resources such as frequency and time widely explored. To further increase the capacity of space information networks, new orthogonal resources are highly expected to be used for space wireless communications. In recent years, electromagnetic (EM) waves carrying orbital angular momentum (OAM), which is a kind of nonplanar EM waves (NEWs), received much attention due to their orthogonal beam structures. However, for space wireless communications, reliability is very crucial, thus challenging the utilization of OAM wireless communications for space information networks. In this paper, we propose the cosine weighting function based NEWs wireless transmission, which is a kind of high reliable OAM based wireless communications, for space information networks. At first, we give the system model of the cosine function based NEWs wireless transmission. Then, we derive the electric fields and array factors of the cosine based NEWs. After that, the orthogonality among cosine based different NEWs-modes is proved. Following that, the analyses for modulation/demodulation, received bit-error-rate, and corresponding capacity are given. Simulation results validate that cosine based NEWs are more reliable than traditional OAM beams for space wireless communications.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117106573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Tone Reservation Method Based on Deep Learning for PAPR Reduction in OFDM System","authors":"Lanping Li, C. Tellambura, Xiaohu Tang","doi":"10.1109/WCSP.2019.8928103","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928103","url":null,"abstract":"This paper utilizes deep learning (DL) in tone reservation (TR) to reduce the peak-to-average power ratio (PAPR) of orthogonal frequency division multiplexing (OFDM). We propose TR based on DL (DL-TR) algorithm by considering each iteration of the classical TR algorithm as a layer of a deep neural network (DNN), and then train the network offline to obtain the clipping ratio of each layer which can minimize the loss function that is the sum of PAPR and the increased transmit power. Compared with the conventional TR method, the simulation results show that the proposed DL-TR provides a better PAPR reduction and bit-error-rate (BER) performance.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"16 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Preamble Grouping and Access Control Scheme in Machine-to-Machine Communication","authors":"Xiaoyan Zhao, Cheng Wang, Weidong Wang","doi":"10.1109/WCSP.2019.8928049","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928049","url":null,"abstract":"In the Internet of Things (Io'T), machine-to-machine (M2M) communication involves a significant number of machine type communication (MTC) devices to support the application of various sensors. With the rapid development of IoT technology, the number of MTC devices has increased dramatically. Random access of devices may lead to packet loss, congestion conflicts, and even make the information to be useless. Therefore, it is crucial to overcome the overload problem caused by random access requests from large-scale MTC devices. This paper presents a preamble grouping scheme and dynamic access class barring (ACB) scheme based on estimating the number of devices. Firstly, the number of devices is estimated according to the preambles in the collision. Secondly, MTC devices are divided into two sets according to the delay-sensitive characteristics. At the same time, the preamble resources are dynamically allocated to each type of M2M service. Finally, the ACB factor is adjusted according to the number of devices. The proposed scheme can improve the successful access performance of M2M network and meet the delay requirements of delay-sensitive devices. To solve the performance degradation caused by large-scale random access when delay sensitivity and delay-tolerant requests coexist. The analysis and simulation prove the validity of the design.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125789946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}