## Search

Now showing items 1-10 of 11

JavaScript is disabled for your browser. Some features of this site may not work without it.

AuthorAlouini, Mohamed-Slim (10)Yang, Liang (3)Chen, Jianchao (2)Georghiades, Costas (2)Al-Badarneh, Yazan H. (1)View MoreDepartmentComputer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division (11)Electrical Engineering Program (10)EE, KAUST, Thuwal, N/A Saudi Arabia 69000 (7)EE program, King Abdullah University of Science and Technology, Thuwal, Mekkah Province, Saudi Arabia (1)EE, KAUST, Thuwal, Saudi Arabia 69000 (1)Journal

IEEE Transactions on Vehicular Technology (11)

PublisherInstitute of Electrical and Electronics Engineers (IEEE) (11)SubjectPower system reliability (3)Fading channels (2)Network security (2)NOMA (2)Probability (2)View MoreType
Article (11)

Year (Issue Date)
2018 (11)

Item AvailabilityOpen Access (11)

Now showing items 1-10 of 11

- List view
- Grid view
- Sort Options:
- Relevance
- Title Asc
- Title Desc
- Issue Date Asc
- Issue Date Desc
- Submit Date Asc
- Submit Date Desc
- Results Per Page:
- 5
- 10
- 20
- 40
- 60
- 80
- 100

Caching D2D Connections in Small-Cell Networks

Zhao, Nan; Liu, Xiaonan; Chen, Yunfei; Zhang, Shun; Li, Zan; Chen, Bingcai; Alouini, Mohamed-Slim (IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers (IEEE), 2018-10-24) [Article]

Small-cell network is a promising solution to high video traffic. However, with the increasing number of devices, it cannot meet the requirements from all users. Thus, we propose a caching device-to-device (D2D) scheme for small-cell networks, in which caching placement and D2D establishment are combined. In this scheme, a limited cache is equipped at each user, and the popular files can be prefetched at the local cache during off-peak period. Thus, dense D2D connections can be established during peak time aided by these cached users, which will reduce the backhaul pressure significantly. To do this, first, an optimal caching scheme is formulated according to the popularity to maximize the total offloading probability of the D2D system. Thus, most edge users can obtain their required video files from the caches at users nearby, instead from the small-cell base station. Then, the sum rate of D2D links is analyzed in different signal-to-noise ratio (SNR) regions. Furthermore, to maximize the throughput of D2D links with low complexity, three D2D-link scheduling schemes are proposed with the help of bipartite graph theory and Kuhn-Munkres algorithm for low, high and medium SNRs, respectively. Simulation results are presented to show the effectiveness of the proposed scheme.

Physical-Layer Security for Mixed <formula>\n <tex>$\eta-\mu$</tex>\n </formula> and <formula>\n <tex>$\mathcal{M}$</tex>\n </formula>-Distribution Dual-Hop RF/FSO Systems

Yang, Liang; Liu, Ting; Chen, Jianchao; Alouini, Mohamed-Slim (IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers (IEEE), 2018-11-16) [Article]

In this correspondence, we investigate the physical-layer security of a mixed radio frequency/free space optical (RF/FSO) dual-hop communication system for both fixed and variable gain relaying schemes. More specifically, we only assume that the eavesdropping happens at the RF link because the optical link has high security. We assume that all RF channels suffer from <formula><tex>$\eta-\mu$</tex></formula> fading, while the FSO link experiences <formula><tex>$\mathcal{M}$</tex></formula>-distributed fading. Then, we derive some analytical results for the average secrecy rate (ASR) and secrecy outage probability (SOP).

Multiple Antenna Systems With Hardware Impairments: New Performance Limits

Javed, Sidrah; Amin, Osama; Ikki, Salama S.; Alouini, Mohamed-Slim (IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers (IEEE), 2018-12-19) [Article]

In this paper, we accurately model the impact of aggregate hardware impairments (HWIs) in communication systems as improper Gaussian signals (IGS), which can describe the asymmetric characteristics of different HWI sources. The proposed model encourages us to adopt IGS scheme for transmission that represents a general signaling scheme compared with the conventional scheme, proper Gaussian signaling (PGS). Firstly, we express the achievable rate of multiple-input and multiple-output (MIMO) system suffering from various HWIs employing PGS and IGS schemes, when the aggregate effect of HWI is modeled as IGS. Moreover, we tune the transmit IGS statistical characteristics to maximize the achievable rate for HWI-SIMO system with two receiver combining schemes. Then, we propose an adaptive scheme to switch between maximal IGS and PGS schemes under certain conditions to improve the system performance with least computational/optimization overhead. Finally, we validate the analytic expressions through numerical and simulation results and quantify the gain reaped from adopting IGS scheme compared with PGS scheme.

Energy-Efficient Optimization for HARQ Schemes over Time-Correlated Fading Channels

Shi, Zheng; Ma, Shaodan; Yang, Guanghua; Alouini, Mohamed-Slim (IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers (IEEE), 2018-03-19) [Article]

Energy efficiency of three common hybrid automatic repeat request (HARQ) schemes including Type I HARQ, HARQ with chase combining (HARQ-CC) and HARQ with incremental redundancy (HARQ-IR), is analyzed and joint power allocation and rate selection to maximize the energy efficiency is investigated in this paper. Unlike prior literature, time-correlated fading channels is considered and two widely concerned quality of service (QoS) constraints, i.e., outage and goodput constraints, are also considered in the optimization, which further differentiates this work from prior ones. Using a unified expression of asymptotic outage probabilities, optimal transmission powers and optimal rate are derived in closed-forms to maximize the energy efficiency while satisfying the QoS constraints. These closed-form solutions then enable a thorough analysis of the maximal energy efficiencies of various HARQ schemes. It is revealed that with low outage constraint, the maximal energy efficiency achieved by Type I HARQ is <formula><tex>$\frac{1}{4\ln2}$</tex></formula> bits/J, while HARQ-CC and HARQ-IR can achieve the same maximal energy efficiency as <formula><tex>$\frac{\kappa_\infty}{4\ln2}$</tex></formula> bits/J where <formula><tex>$\kappa_\infty = 1.6617$</tex></formula>. Moreover, time correlation in the fading channels has a negative impact on the energy efficiency, while large maximal allowable number of transmissions is favorable for the improvement of energy efficiency. The effectiveness of the energy-efficient optimization is verified by extensive simulations and the results also show that HARQ-CC can achieve the best tradeoff between energy efficiency and spectral efficiency among the three HARQ schemes.

Secrecy Outage of Max-Min TAS Scheme in MIMO-NOMA Systems

Lei, Hongjiang; Zhang, Jianming; Park, Kihong; Xu, Peng; Zhang, Zufan; Pan, Gaofeng; Alouini, Mohamed-Slim (IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers (IEEE), 2018-04-09) [Article]

This paper considers a secure non-orthogonal multiple access system, where confidential messages are transmitted from a base station to multiple legitimate destinations and wiretapped by multiple illegitimate receivers. It is assumed that all the channels experience Nakagami-m fading model and all the nodes are equipped with multiple antennas, respectively. Both non-colluding and colluding eavesdroppers are respectively considered. Max-min (MM) transmit antenna selection (TAS) strategy is adopted to improve the secrecy performance of the target system, in which both users in user paring are considered simultaneously. In particular, closed-form expressions for the cumulative distribution function of the signal-to-interference-noise ratio at the legitimate user are derived firstly. Then we obtain the exact and asymptotic analytical results in a closed form for the secrecy outage probability of MM TAS scheme. Monte-Carlo simulation results are presented to corroborate the correctness of the analysis. The results show that the secrecy diversity order is zero and non-zero for fixed and dynamic power allocations, respectively.

Asymptotic Performance Analysis of Two-Way Relaying FSO Networks with Nonzero Boresight Pointing Errors Over Double-Generalized Gamma Fading Channels

Yang, Liang; Alouini, Mohamed-Slim; Ansari, Imran Shafique (IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers (IEEE), 2018-05-07) [Article]

In this correspondence, an asymptotic performance analysis for two-way relaying free-space optical (FSO) communication systems with nonzero boresight pointing errors over double-generalized gamma fading channels is presented. Assuming amplify-and-forward (AF) relaying, two nodes having the FSO ability can communicate with each other through the optical links. With this setup, an approximate cumulative distribution function (CDF) expression for the overall signal-to-noise ratio (SNR) is presented. With this statistic distribution, we derive the asymptotic analytical results for the outage probability and average bit error rate. Furthermore, we provide the asymptotic average capacity analysis for high SNR by using the momentsbased method.

Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

Shafie, Ahmed El; Salem, Ahmed Sultan; Mabrouk, Asma; Tourki, Kamel; Al-Dhahir, Naofal (IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers (IEEE), 2018-01-30) [Article]

This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

Throughput and Delay Analysis of HARQ with Code Combining over Double Rayleigh Fading Channels

Chelli, Ali; Zedini, Emna; Alouini, Mohamed-Slim; Patzold, Matthias Uwe; Balasingham, Ilangko (IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers (IEEE), 2018-01-15) [Article]

This paper proposes the use of hybrid automatic repeat request (HARQ) with code combining (HARQ-CC) to offer reliable communications over double Rayleigh channels. The double Rayleigh fading channel is of particular interest to vehicle-to-vehicle communication systems as well as amplify-and-forward relaying and keyhole channels. This work studies the performance of HARQ-CC over double Rayleigh channels from an information theoretic perspective. Analytical approximations are derived for the <formula><tex>$\epsilon$</tex></formula>-outage capacity, the average number of transmissions, and the throughput of HARQ-CC. Moreover, we evaluate the delay experienced by Poisson arriving packets for HARQ-CC. We provide analytical expressions for the average waiting time, the packets sojourn time, the average consumed power, and the energy efficiency. In our investigation, we take into account the impact of imperfect feedback on different performance metrics. Additionally, we explore the tradeoff between energy efficiency and the throughput. The proposed scheme is shown to maintain the outage probability below a specified threshold <formula><tex>$\epsilon$</tex></formula> which ensures the link reliability. Meanwhile, HARQ-CC adapts implicitly the transmission rate to the channel conditions such that the throughput is maximized. Our results demonstrate that HARQ-CC allows improving the achievable communication rate compared to fixed time diversity schemes. To maximize the throughput of HARQ-CC, the rate per HARQ round should be less than the rate required to meet the outage constraint. Our investigation of the performance of HARQ-CC over Rayleigh and double Rayleigh channels shows that double Rayleigh channels have a higher severity of fading and result in a larger degradation of the throughput. Our analysis reveals that HARQ with incremental redundancy (HARQ-IR) achieves a larger throughput compared to HARQ-CC, while HARQ-CC is simpler to implement, has a lower decoding complexity, and requires less memory resources.

On the Secrecy Performance of Generalized User Selection for Interference-Limited Multiuser Wireless Networks

Al-Badarneh, Yazan H.; Georghiades, Costas; Radaydeh, Redha M.; Alouini, Mohamed-Slim (IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers (IEEE), 2018-10-25) [Article]

We investigate the secrecy performance of a multiuser diversity scheme for an interference-limited wireless network with a base-station (BS), N legitimate users and an eavesdropper, in the presence of a single dominant interferer. Assuming interference dominates noise power at the eavesdropper and at each legitimate user's receiver, the BS transmits information to the legitimate user with the k-th best (highest) signal-to-interference ratio. We derive a closed-form expression for the secrecy outage probability for an arbitrary N and an asymptotic expression for a fixed k and large N. Furthermore, we derive a closed form asymptotic expression for the ergodic secrecy capacity of the k-th best user and show that it scales like <formula><tex>$O\left(\log(N)\right)$</tex></formula> for a fixed k and large N.

Asymptotic Performance Analysis of the k-th Best Link Selection over Wireless Fading Channels: An Extreme Value Theory Approach

Al-Badarneh, Yazan Hussein; Georghiades, Costas; Alouini, Mohamed-Slim (IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers (IEEE), 2018-01-25) [Article]

We consider a general selection-diversity (SD) scheme in which the k-th best link is selected from a number of links. We use extreme value theory (EVT) to derive simple closed-form asymptotic expressions for the average throughput, effective throughput and average bit error probability (BEP) for the k-th best link over various channel models that are widely used to characterize fading in wireless communication systems. As an application example, we consider the Weibull fading channel model and verify the accuracy of the derived asymptotic expressions through Monte Carlo simulations.

The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

By default, clicking on the export buttons will result in a download of the allowed maximum amount of items. For anonymous users the allowed maximum amount is 50 search results.

To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.