• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • Tagged with
  • 4
  • 4
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Constellation Design under Channel Uncertainty

Giese, Jochen January 2005 (has links)
The topic of this thesis is signaling design for data transmission through wireless channels between a transmitter and a receiver that can both be equipped with one or more antennas. In particular, the focus is on channels where the propagation coefficients between each transmitter--receiver antenna pair are only partially known or completetly unknown to the receiver and unknown to the transmitter. A standard signal design approach for this scenario is based on separate training for the acquisition of channel knowledge at the receiver and subsequent error-control coding for data detection over channels that are known or at least approximately known at the receiver. If the number of parameters to estimate in the acquisition phase is high as, e.g., in a frequency-selective multiple-input multiple-output channel, the required amount of training symbols can be substantial. It is therefore of interest to study signaling schemes that minimize the overhead of training or avoid a training sequence altogether. Several approaches for the design of such schemes are considered in this thesis. Two different design methods are investigated based on a signal representation in the time domain. In the first approach, the symbol alphabet is preselected, the design problem is formulated as an integer optimization problem and solutions are found using simulated annealing. The second design method is targeted towards general complex-valued signaling and applies a constrained gradient-search algorithm. Both approaches result in signaling schemes with excellent detection performance, albeit at the cost of significant complexity requirements. A third approach is based on a signal representation in the frequency domain. A low-complexity signaling scheme performing differential space--frequency modulation and detection is described, analyzed in detail and evaluated by simulation examples. The mentioned design approaches assumed that the receiver has no knowledge about the value of the channel coefficients. However, we also investigate a scenario where the receiver has access to an estimate of the channel coefficients with known error statistics. In the case of a frequency-flat fading channel, a design criterion allowing for a smooth transition between the corresponding criteria for known and unknown channel is derived and used to design signaling schemes matched to the quality of the channel estimate. In particular, a constellation design is proposed that offers a high level of flexibility to accomodate various levels of channel knowledge at the receiver. / QC 20101014
2

Constellation Design under Channel Uncertainty

Giese, Jochen January 2005 (has links)
<p>The topic of this thesis is signaling design for data transmission through wireless channels between a transmitter and a receiver that can both be equipped with one or more antennas. In particular, the focus is on channels where the propagation coefficients between each transmitter--receiver antenna pair are only partially known or completetly unknown to the receiver and unknown to the transmitter.</p><p>A standard signal design approach for this scenario is based on separate training for the acquisition of channel knowledge at the receiver and subsequent error-control coding for data detection over channels that are known or at least approximately known at the receiver. If the number of parameters to estimate in the acquisition phase is high as, e.g., in a frequency-selective multiple-input multiple-output channel, the required amount of training symbols can be substantial. It is therefore of interest to study signaling schemes that minimize the overhead of training or avoid a training sequence altogether.</p><p>Several approaches for the design of such schemes are considered in this thesis. Two different design methods are investigated based on a signal representation in the time domain. In the first approach, the symbol alphabet is preselected, the design problem is formulated as an integer optimization problem and solutions are found using simulated annealing. The second design method is targeted towards general complex-valued signaling and applies a constrained gradient-search algorithm. Both approaches result in signaling schemes with excellent detection performance, albeit at the cost of significant complexity requirements.</p><p>A third approach is based on a signal representation in the frequency domain. A low-complexity signaling scheme performing differential space--frequency modulation and detection is described, analyzed in detail and evaluated by simulation examples.</p><p>The mentioned design approaches assumed that the receiver has no knowledge about the value of the channel coefficients. However, we also investigate a scenario where the receiver has access to an estimate of the channel coefficients with known error statistics. In the case of a frequency-flat fading channel, a design criterion allowing for a smooth transition between the corresponding criteria for known and unknown channel is derived and used to design signaling schemes matched to the quality of the channel estimate. In particular, a constellation design is proposed that offers a high level of flexibility to accomodate various levels of channel knowledge at the receiver.</p>
3

Beamforming and Protection Strategies in Gaussian MISO Wiretap Systems with Partial Channel State Information

Engelmann, Sabrina 24 August 2015 (has links) (PDF)
Within this thesis, we investigate the possibilities of physical layer secrecy for two special system models. In detail, we study beamforming and protection strategies in the Multiple-Input Single-Output (MISO) Gaussian Wiretap Channel (WTC) and the Gaussian two-hop relay WTC with multiple antennas at transmitter and receiver. In both system models, we examine the influence of partial Channel State Information (CSI) on the link to the eavesdropper and compare the achievable secrecy rates with the case of full CSI. We show for the MISO WTC that in the fast fading scenario the Beamforming Vector (BV) can be optimized such that the ergodic secrecy rate is maximized with regard to the degree of channel knowledge. Further we show that the ergodic secrecy rate can be significantly increased by usage of Artificial Noise (AN), if applied in a smart way. This means that the degree of channel knowledge on the link to the eavesdropper influences the portion of power that is spent for AN at the transmitter as well as the direction, in which the AN signal is sent. In addition, we apply the same beamforming and protection strategies to the slow fading scenario and find that these techniques also reduce the secrecy outage probability. For the two-hop relay WTC, we introduce Information Leakage Neutralization (IN) as a new protection strategy. If applied to a system model, where the transmitter has full CSI, the instantaneous secrecy rate performs almost as well as the instantaneous capacity of the peaceful system without an eavesdropper. The IN protected scheme outperforms the AN protected approach and performs much better than any beamforming scheme without additional protection mechanism. Another positive aspect of the IN protected scheme in the case of full CSI is that conventional channel codes can be applied instead of wiretap codes. For the case of partial CSI, where the transmitter has only an outdated estimate on the channel between relay and the eavesdropper, we show that the IN protected scheme can also be applied. Here, it strongly depends on the channel realizations and the delay of the estimate, whether the IN or the AN protection scheme should be applied. / In dieser Arbeit wird das Leistungsvermögen der Sicherheit auf der physikalischen Schicht anhand von zwei speziellen Systemmodellen untersucht. Im Detail werden Beamforming- und Absicherungsstrategien im gaußschen Multiple-Input Single-Output (MISO) Wiretap Channel (WTC) und dem gaußschen Two-hop Relay WTC mit mehreren Antennen am Sender und Empfänger studiert. In beiden Systemmodellen wird der Einfluss von partieller Kanalkenntnis zum Abhörer betrachtet und die so erreichbaren Sicherheitsraten mit denen verglichen, die bei voller Kanalkenntnis erreichbar sind. Für den MISO WTC kann gezeigt werden, dass für Kanäle mit schnellem Schwund der Beamforming-Vektor in Hinblick auf die ergodische Sicherheitsrate unter Berücksichtigung des Grades der Kanalkenntnis optimiert werden kann. Zudem kann durch die intelligente Verwendung von künstlichem Rauschen (Artificial Noise, AN) die ergodische Sicherheitsrate signifikant erhöht werden. Hierbei nimmt der Grad der Kanalkenntnis direkt Einfluss auf die Aufteilung der Leistung zwischen Daten- und AN-Signal am Sender sowie auch auf die Richtung, in der das AN-Signal gesendet wird. Zudem kann gezeigt werden, dass dieselben Beamforming- und Absicherungsstrategien ebenfalls die Sicherheitsausfallwahrscheinlichkeit für Kanäle mit langsamem Schwund minimieren. Im gaußschen Two-hop Relay WTC wird Information Leakage Neutralization (IN) als neuartige Absicherungsstrategie eingeführt. Diese Absicherungsstrategie erreicht nahezu dieselben instantanen Raten wie ein friedvolles System ohne Abhörer, wenn es bei voller Kanalkenntnis am Sender eingesetzt wird. Weiterhin sind durch die IN-Absicherungsstrategie höhere Raten erreichbar als durch den Einsatz von AN. Zusätzlich kann im Fall von voller Kanalkenntnis auf den Einsatz von Wiretap-Codes verzichtet werden. Auch im Fall partieller Kanalkenntnis, wo der Sender nur eine veraltete Schätzung des Kanals zwischen Relay und Abhörer besitzt, kann gezeigt werden, dass die IN-Absicherungsstrategie angewendet werden kann. Hierbei hängt es jedoch stark von den Kanalrealisierungen und dem Alter der Kanalschätzung ab, ob die IN- oder die AN-Absicherungsstrategie bessere Ergebnisse bringt und daher angewandt werden sollte.
4

Beamforming and Protection Strategies in Gaussian MISO Wiretap Systems with Partial Channel State Information

Engelmann, Sabrina 29 June 2015 (has links)
Within this thesis, we investigate the possibilities of physical layer secrecy for two special system models. In detail, we study beamforming and protection strategies in the Multiple-Input Single-Output (MISO) Gaussian Wiretap Channel (WTC) and the Gaussian two-hop relay WTC with multiple antennas at transmitter and receiver. In both system models, we examine the influence of partial Channel State Information (CSI) on the link to the eavesdropper and compare the achievable secrecy rates with the case of full CSI. We show for the MISO WTC that in the fast fading scenario the Beamforming Vector (BV) can be optimized such that the ergodic secrecy rate is maximized with regard to the degree of channel knowledge. Further we show that the ergodic secrecy rate can be significantly increased by usage of Artificial Noise (AN), if applied in a smart way. This means that the degree of channel knowledge on the link to the eavesdropper influences the portion of power that is spent for AN at the transmitter as well as the direction, in which the AN signal is sent. In addition, we apply the same beamforming and protection strategies to the slow fading scenario and find that these techniques also reduce the secrecy outage probability. For the two-hop relay WTC, we introduce Information Leakage Neutralization (IN) as a new protection strategy. If applied to a system model, where the transmitter has full CSI, the instantaneous secrecy rate performs almost as well as the instantaneous capacity of the peaceful system without an eavesdropper. The IN protected scheme outperforms the AN protected approach and performs much better than any beamforming scheme without additional protection mechanism. Another positive aspect of the IN protected scheme in the case of full CSI is that conventional channel codes can be applied instead of wiretap codes. For the case of partial CSI, where the transmitter has only an outdated estimate on the channel between relay and the eavesdropper, we show that the IN protected scheme can also be applied. Here, it strongly depends on the channel realizations and the delay of the estimate, whether the IN or the AN protection scheme should be applied. / In dieser Arbeit wird das Leistungsvermögen der Sicherheit auf der physikalischen Schicht anhand von zwei speziellen Systemmodellen untersucht. Im Detail werden Beamforming- und Absicherungsstrategien im gaußschen Multiple-Input Single-Output (MISO) Wiretap Channel (WTC) und dem gaußschen Two-hop Relay WTC mit mehreren Antennen am Sender und Empfänger studiert. In beiden Systemmodellen wird der Einfluss von partieller Kanalkenntnis zum Abhörer betrachtet und die so erreichbaren Sicherheitsraten mit denen verglichen, die bei voller Kanalkenntnis erreichbar sind. Für den MISO WTC kann gezeigt werden, dass für Kanäle mit schnellem Schwund der Beamforming-Vektor in Hinblick auf die ergodische Sicherheitsrate unter Berücksichtigung des Grades der Kanalkenntnis optimiert werden kann. Zudem kann durch die intelligente Verwendung von künstlichem Rauschen (Artificial Noise, AN) die ergodische Sicherheitsrate signifikant erhöht werden. Hierbei nimmt der Grad der Kanalkenntnis direkt Einfluss auf die Aufteilung der Leistung zwischen Daten- und AN-Signal am Sender sowie auch auf die Richtung, in der das AN-Signal gesendet wird. Zudem kann gezeigt werden, dass dieselben Beamforming- und Absicherungsstrategien ebenfalls die Sicherheitsausfallwahrscheinlichkeit für Kanäle mit langsamem Schwund minimieren. Im gaußschen Two-hop Relay WTC wird Information Leakage Neutralization (IN) als neuartige Absicherungsstrategie eingeführt. Diese Absicherungsstrategie erreicht nahezu dieselben instantanen Raten wie ein friedvolles System ohne Abhörer, wenn es bei voller Kanalkenntnis am Sender eingesetzt wird. Weiterhin sind durch die IN-Absicherungsstrategie höhere Raten erreichbar als durch den Einsatz von AN. Zusätzlich kann im Fall von voller Kanalkenntnis auf den Einsatz von Wiretap-Codes verzichtet werden. Auch im Fall partieller Kanalkenntnis, wo der Sender nur eine veraltete Schätzung des Kanals zwischen Relay und Abhörer besitzt, kann gezeigt werden, dass die IN-Absicherungsstrategie angewendet werden kann. Hierbei hängt es jedoch stark von den Kanalrealisierungen und dem Alter der Kanalschätzung ab, ob die IN- oder die AN-Absicherungsstrategie bessere Ergebnisse bringt und daher angewandt werden sollte.

Page generated in 0.1983 seconds