{"title":"Secrecy analysis of a NOMA system with Full Duplex and Half Duplex Relay","authors":"Omid Abbasi, A. Ebrahimi","doi":"10.1109/IWCIT.2017.7947676","DOIUrl":"https://doi.org/10.1109/IWCIT.2017.7947676","url":null,"abstract":"In 5G wireless communication networks, Non-Orthogonal Multiple Access (NOMA) has attracted much attention in recent years. This paper investigates physical layer security of a NOMA system with Full Duplex Relay (FDR) and Half Duplex Relay (HDR). This system consists of one eavesdropper and two legal NOMA users where a dedicated FDR (or HDR) assists far user. In order to characterize the secrecy performance of the considered scenario, new exact expressions are derived for the Secrecy Outage Probability (SOP) of both FDR and HDR systems. Monte Carlo simulations are provided to verify the derived analytical results. Simulations demonstrate that, the NOMA-FDR system attains better performance compared to the NOMA-HDR system for both users. Also, we find that far user has always poor secrecy against near user.","PeriodicalId":243813,"journal":{"name":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evaluation of the coverage region for downlink Non-Orthogonal Multiple Access (NOMA) based on Power Allocation Factor","authors":"Faramarz Ajami Khales, G. Hodtani","doi":"10.1109/IWCIT.2017.7947675","DOIUrl":"https://doi.org/10.1109/IWCIT.2017.7947675","url":null,"abstract":"Non-Orthogonal Multiple Access (NOMA) is known as one of the promising techniques in the fifth generation of wireless communication. The classification of users in (NOMA) is based on power, while it is based on time, frequency and code in Orthogonal Multiple Access (OMA). In this study the downlink NOMA includes two users, one strong and one weak. The comparison of NOMA and OMA properties shows a range of Power Allocation Factors (PAF) for the two users within which NOMA properties have proved to be better than OMA. It was also shown that the achieved PAF is a function of channel gains of two users. Then, the coverage region is defined for multiple access channel; and by considering the Base Station (BS) as a fixed one in the center of the cell, the coverage region for both NOMA and OMA is calculated. The theoretical and analytical results show that the achieved coverage region of NOMA for both weak and strong users has been increased compared to OMA.","PeriodicalId":243813,"journal":{"name":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130510716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical derivation of channel capacity in uncompensated optical space-division multiplexing systems","authors":"A. Mirani, H. Beyranvand, J. Salehi","doi":"10.1109/IWCIT.2017.7947674","DOIUrl":"https://doi.org/10.1109/IWCIT.2017.7947674","url":null,"abstract":"In this paper, we present a detailed analytical approach to obtain the channel capacity of optical space-division multiplexing (SDM) systems. To this aim, the nonlinearity effects of optical fiber are modeled as additive white Gaussian noise (GN) process, and accordingly a closed-form formula is derived for SDM capacity. Furthermore, we extend our result to a more generalized case, which includes different bandwidth, center frequency, and transmission powers.","PeriodicalId":243813,"journal":{"name":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On secure degrees of freedom for three-user MISO broadcast channel with three messages","authors":"Mohammad Amin Alipour, Sadaf Salehkalaibar","doi":"10.1109/IWCIT.2017.7947670","DOIUrl":"https://doi.org/10.1109/IWCIT.2017.7947670","url":null,"abstract":"We study a three-user multiple-input single-output (MISO) broadcast channel with confidential messages (BCCM). We have three messages where each of them is intended to the corresponding receiver. We impose confidentiality constraints for two of the messages at the receiving terminals. Half of the time, the channel state information (CSI) of all receivers are known perfectly at the transmitter. At the other half, the CSI of one of the receivers is available with some delay. The main contribution of this paper is to find the sum secure degrees of freedom (SDoF) of the proposed channel. We utilize the alternating CSIT scheme to design the precoding matrices. The proof of the converse is challenging for this model. The idea of the converse proof is to adapt the well known statistical equivalent property (SEP) lemma for our model.","PeriodicalId":243813,"journal":{"name":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123884351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of cognitive two-way AF relaying systems with wireless energy harvesting over Nakagami-m fading channels","authors":"Sepideh Javadi, Ehsan Soleimani","doi":"10.1109/IWCIT.2017.7947673","DOIUrl":"https://doi.org/10.1109/IWCIT.2017.7947673","url":null,"abstract":"Wireless energy harvesting (EH) is regarded as a promising energy supply alternative for energy-constrained wireless networks. In this paper, a new wireless EH protocol is proposed for an underlay cognitive radio (CR) network with multiple transceivers in a primary network (PN). Utilizing two-way amplify-and-forward (AF) relaying system as a secondary network (SN), both end-sources can harvest energy from relay. Closed-form expression for outage probability (OP) of this system is derived by considering CR interference temperature over independent and non-identically distributed (i.n.i.d.) Nakagami-m fading channels. To simplify our analysis, we consider the asymptotically low outage regime and derive the OP at high signal-to-noise-ratios (SNRs). The numerical results have demonstrated that the wireless EH, compared to the conventional scenarios, enhances the outage performance significantly.","PeriodicalId":243813,"journal":{"name":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131174331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensitivity of the secrecy capacity of a wiretap channel to the channel gains with imperfect channel information","authors":"Mahboobeh Sedighizad, Hamid G. Bafghi, B. Seyfe","doi":"10.1109/IWCIT.2017.7947669","DOIUrl":"https://doi.org/10.1109/IWCIT.2017.7947669","url":null,"abstract":"In this paper, the impact of a small variations in the channel gains on the secrecy rate of the wiretap channel is studied, in which it is assumed that the imperfect channel knowledge is available at the transmitter. First, we consider general additive noise model for both legitimate and eavesdropper channels in the wiretap channel, and compute the variation of the secrecy rate resulting from the small variations in the channel gains. Then, we focus on the Gaussian wiretap channel, as a special case and calculate the sensitivity of the secrecy capacity to the channel gains with imperfect channel knowledge. Interestingly, it is shown that in some situations the effect of the channel variation on the secrecy capacity can be canceled out.","PeriodicalId":243813,"journal":{"name":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124107929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radio resource allocation for physical-layer security in OFDMA based HetNets with unknown mode of adversary","authors":"Saeed Sheikhzadeh, M. Javan, N. Mokari","doi":"10.1109/IWCIT.2017.7947671","DOIUrl":"https://doi.org/10.1109/IWCIT.2017.7947671","url":null,"abstract":"Consider an orthogonal frequency division multiple access (OFDMA)-based heterogeneous cellular network (HetNet) in which a macrocell is underlaid with several small cells overheard by eavesdropper and jamming by jammer. In this paper, our goal is to design a transmission strategy, such that the achievable secrecy rate is maximized subject to the individual transmit power constraints for the macrocell base station (MBS) and each small-cell base station (SBS) and a constraint for the interference caused by SBSs to the macrocell user equipments (MUEs). There exists an adversary which can choose between two functional modes: eavesdropping the transmission between the legitimate parties or jamming it, but not both at the same time. We assume that the mode of adversary on each sub-carrier is unknown. To solve this non-convex problem, we employ an iterative approach in which sub-carriers and transmit powers of each base stations are alternatively assigned and optimized at every step. To handle the non-convexity of the power allocation, we adopt the successive convex approximation (SCA) approach by exploiting arithmetic-geometric mean (AGM) and logarithmic and difference-of-two-concave-functions (D.C.) approximations to transform problem into a sequence of convex subproblems. Simulation results demonstrate the close-to-optimal performance of the proposed schemes.","PeriodicalId":243813,"journal":{"name":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121769779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint transfer of energy and information in a two-hop relay channel","authors":"Ali H. Abdollahi Bafghi, M. Mirmohseni, M. Aref","doi":"10.1109/IWCIT.2017.7947672","DOIUrl":"https://doi.org/10.1109/IWCIT.2017.7947672","url":null,"abstract":"We study the problem of joint information and energy transfer in a two-hop channel with a Radio frequency (RF) energy harvesting relay. We consider a finite battery size at the relay and deterministic energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memory. We model the energy saved in battery as channel state with the challenge that the receiver does not know the channel state. First, we consider the problem without any channel noise and derive an achievable rate. Next, we extend the results to the case with an independent and identically distributed noise in the second hop (the relay-receiver link).","PeriodicalId":243813,"journal":{"name":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gholamali Aminian, Hamid Ghourchian, A. Gohari, M. Mirmohseni, M. Nasiri-Kenari
{"title":"On the capacity of signal dependent noise channels","authors":"Gholamali Aminian, Hamid Ghourchian, A. Gohari, M. Mirmohseni, M. Nasiri-Kenari","doi":"10.1109/IWCIT.2017.7947677","DOIUrl":"https://doi.org/10.1109/IWCIT.2017.7947677","url":null,"abstract":"In some applications, the variance of measurement noise depends on the signal that we aim to measure. For instance, additive Gaussian signal-dependent noise (AGSDN) channel models are used in molecular and optical communication. Herein we provide lower and upper bounds on the capacity of additive signal dependent noise (ASDN) channels. We also provide sufficient conditions under which the capacity becomes infinity.","PeriodicalId":243813,"journal":{"name":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132013373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}