SlideShare a Scribd company logo
1 of 6
Download to read offline
K. Rajesh et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Secure Communication in Low Snr Regime Over Fading
Channels in Mimo
K. Rajesh*, K. V. Lalitha Bhavani**
*M.Tech (Digital Electronics And Communication Systems) Student, AITAM College, Tekkali in India.
**Associate Professor in ECE Department, AITAM College, Tekkali in India.

ABSTRACT
In this work we consider MIMO fading channels and characterize the reliability function in the low-SNR
regime as a function of the number of transmit and receive antennas. For the case when the fading matrix H has
independent entries, we show that the number of transmit antennas plays a key role in reducing the peakiness in
the input signal required to achive the optimal error exponent for a given communication rate. Further by
considering a correlated channel model, we show that the maximum performance gain is achieved when the
entries of the channel fading matrix are fully correlated. The results we presented in this work in the low- SNR
regime can also be applied to the finite bandwidth regime.
Keywords: MIMO, Bandwidth Allocation, Fading, Low SNR

I.

INTRODUCTION

The use of multiple antennas at the
transmitter and receiver in wireless systems,
popularly known as MIMO (multiple-input
multiple-output) technology, has rapidly gained in
popularity over the past decade due to its powerful
performance-enhancing
capabilities.
Communication in wireless channels is impaired
predominantly by multi-path fading. Multi-path is
the arrival of the transmitted signal at an intended
receiver through differing angles and/or differing
time delays and/or differing frequency (i.e.,
Doppler) shifts due to the scattering of
electromagnetic waves in the environment.
Consequently, the received signal power fluctuates
in space (due to angle spread) and/or frequency
(due to delay spread) and/or time (due to Doppler
spread) through the random superposition of the
impinging multi-path components. This random
fluctuation in signal level, known as fading, can
severely affect the quality and reliability of
wireless
communication.
Additionally,
the
constraints posed by limited power and scarce
frequency bandwidth make the task of designing
high data rate, high reliability wireless
communication systems extremely challenging.
MIMO
technology
constitutes
a
breakthrough in wireless communication system
design. The technology offers a number of benefits
that help meet the challenges posed by both the
impairments in the wireless channel as well as
resource constraints. In addition to the time and
frequency dimensions that are exploited in
conventional single-antenna (single-input singleoutput) wireless systems, the leverages of MIMO
are realized by exploiting the spatial dimension

www.ijera.com

(Provided by the multiple antennas at the
transmitter and the receiver).
The advantages of multiple-input multipleoutput (MIMO) systems have been widely
acknowledged, to the extent that certain transmit
diversity methods (i.e., Alamouti signaling) have
been incorporated into wireless standards.
Although transmit diversity is clearly advantageous
on a cellular base station, it may not be practical for
other scenarios. Specifically, due to size, cost, or
hardware limitations, a wireless agent may not be
able to support multiple transmit antennas.
Examples include most handsets (size) or the nodes
in a wireless sensor network (size, power).

Fig.1:secure communication system
We consider the secure transmission of
information over an ergodic fading channel in the
presence of an eavesdropper. Our eavesdropper can
be viewed as the wireless counterpart of Wyner's
wire tapper. The secrecy capacity of such a system
is characterized under the assumption of
asymptotically long coherence intervals. We first
consider the full channel state information (CSI)
1831 | P a g e
K. Rajesh et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836
case, where the transmitter has access to the
channel gains of the legitimate receiver and the
eavesdropper. The secrecy capacity under this full
CSI assumption serves as an upper bound for the
secrecy capacity when only the CSI of the
legitimate receiver is known at the transmitter,
which is characterized next. In each scenario, the
perfect secrecy capacity is obtained along with the
optimal power and rate allocation strategies. We
then propose a low-complexity on/off power
allocation strategy that achieves near-optimal
performance with only the main channel CSI. More
specifically, this scheme is shown to be
asymptotically optimal as the average signal-tonoise ratio (SNR) goes to infinity, and
interestingly, is shown to attain the secrecy
capacity under the full CSI assumption. Overall,
channel fading has a positive impact on the secrecy
capacity and rate adaptation, based on the main
channel CSI, is critical in facilitating secure
communications over slow fading channels.

channel input-output relations between the
transmitter and legitimate receiver, and the
transmitter and eavesdropper are given by
ym = Hmx + nm , ye = Hex + ne ,
where, x denotes the nT ×1–dimensional
transmitted signal vector. nR×1–dimensional ym
and nE ×1–dimensional ye represent the received
signal vectors at the legitimate receiver and
eavesdropper, respectively. Moreover, nm with
dimension nR×1 and ne with dimension nE × 1 are
independent, zero-mean Gaussian random vectors.
The signal-to-noise ratio is defined as,

SNR 

CHANNEL MODEL

P
nR N m

the channel models, Hm is the nR × nT –
dimensional channel matrix between the transmitter
and legitimate receiver, and He is the nE × nT –
dimensional channel matrix between the transmitter
and eavesdropper.

III.
II.

www.ijera.com

SECRECY IN THE LOW-SNR
REGIME

The channel matrices Hm and He are fixed
for the entire transmission period and are known to
all three terminals. The assumption of perfect
channel knowledge can be justified in scenarios in
which a base station, which knows the channels of
the users, attempt to transmit confidential messages
to a user and hence treat the other users as
eavesdroppers.
In this paper, we concentrate on the lowSNR regime. In this regime, the behavior of the
secrecy capacity can be accurately predicted by its
first and second derivatives with respect to SNR at
SNR = 0:
Fig.2.Channel Model
MIMO is the use of multiple antennas at
both the transmitter and receiver to improve
communication performance. It is one of several
forms of smart antenna technology. Note that the
terms input and output refer to the radio channel
carrying the signal, not to the devices having
antennas. New techniques, which account for the
extra spatial dimension, have been adopted to
realize these gains in new and previously existing
systems.
MIMO technology has attracted attention
in wireless communications, because it offers
significant increases in data throughput and link
range without additional bandwidth or increased
transmit power. The use of multiple dimensions at
both ends of a communication link offers
significant improvements in terms of spectral
efficiency and link reliability.
We consider a MIMO channel model and
assume that the transmitter, legitimate receiver, and
eavesdropper are equipped with nT , nR, and nE
antennas, respectively. We further assume that the
www.ijera.com


C (0)

C S ( SNR)  C S (0) SNR 
SNR 2   ( SNR 2 )
2
Eb
N 0s ,m in

log 2
 
C S ( 0)






2 CS (0)
S0 

 CS (0)

2

N0 s, min denotes the minimum bit energy required
for reliable communication under secrecy
constraints (or equivalently minimum energy per
secret bit), and S0 denotes the wideband slope
which is the slope of the secrecy capacity in
bits/dimension/(3 dB) at the point Eb /N0 s, min.
3.1.1 FIRST AND SECOND DERIVATIVES
OF THE SECRECY CAPACITY
We determine the first and second
derivatives of the secrecy capacity at SNR = 0, and
provide a second-order approximation to the
MIMO secrecy capacity in the low-SNR regime.
Through this analysis, we quantify the impact of
1832 | P a g e
K. Rajesh et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836
secrecy constraints on the performance. We
identify the optimal transmission strategies in the
low-SNR regime. In particular, we determine that
transmission in the maximal-eigenvalue eigenspace
of a certain matrix that depends on the channel
matrices is second-order optimal. In the case in
which the maximum eigenvalue is distinct,
beamforming is shown to be optimal.
Secrecy rate expression given by
I S ( SNR) 

1
nR






1
1
H m K x H m   log det I 
H e K x H  
log det I 
e 



Nm
Ne








The first derivative of the secrecy capacity in with
respect to SNR at SNR = 0.
max( ) if max( )  0


CS (0)  max( ) 
0 else

In the absence of secrecy constraints, the first and
second derivatives of the MIMO capacity at SNR =
0.


C S (0)  m ax ( H m H m )
and C (0)   nR 2 ( H  H )

max
m m
l

Where, l is the multiplicity of


m ax( H m H m )

Hence, the first and second derivatives are achieved
by transmitting in the maximal-eigenvalue
eigenspace of H†mHm, the subspace in which the
transmitter-receiver channel is the strongest.
If there are secrecy constraints, we should at low
SNRs transmit in the direction in which the
transmitter-receiver channel is strongest with
respect to the transmitter-eavesdropper channel
normalized by the ratio of the noise variances.
3.1.2. MINIMUM ENERGY PER SECRET BIT
In this section, we study the energy
required to send information both reliably and
securely. In particular, we investigate the minimum
energy required to send one secret bit. Before
identifying the minimum energy per secret bit, we
first show that the secrecy capacity is concave in
SNR. The secrecy capacity Cs achieved under the
average power constraint E{||x||2} ≤ P is a concave
function of SNR.
The energy per secret bit normalized by the noise
variance at the legitimate receiver is defined as
Eb
SNR

log 2
N 0 C S ( SNR)

www.ijera.com

model. We see, as predicted, that the minimum bit
energy is attained in all cases as SNR and hence
rates approach zero. While the minimum bit energy
is Eb/N0=-6.01dB in the absence of secrecy
constraints, the minimum bit energy per secret bit
is Eb/N0 s,min=-3.71Db.

IV.

THE IMPACT OF FADING

Assume that the channel matrices Hm and
He are random matrices, whose components are
stationary and ergodic random variables, modeling
fading in wireless transmissions. We again assume
that realizations of these matrices are perfectly
known by all the terminals. As discussed fading
channel can be regarded as a set of parallel sub
channels each of which corresponds to a particular
fading realization. Hence, in each sub channel, the
channel matrices are fixed similarly as in the
channel model considered in the previous section.
It is shown that having independent inputs for each
sub channel is optimal and the secrecy capacity of
the set of parallel sub channels is equal to the sum
of the capacities of sub channels. Therefore, the
secrecy capacity of fading channels can be found
by averaging the secrecy capacities attained for
different fading realizations.
We assume that the transmitter is subject
to a short-term power constraint. Hence, for each
channel realization, the same amount of power is
used and we have tr (Kx) ≤ P. With this
assumption, the transmitter is allowed to perform
power adaptation in space across the antennas, but
not across time. Under such constraints, it can
easily be seen from the above discussion that the
average secrecy capacity in fading channels is
given by
𝑚𝑎𝑥
1
𝐾 𝑥≥0
𝐶𝑠 =
𝐸𝐻 𝑚 , 𝐻 𝑒
log det 𝐼
𝑛𝑅
𝑡𝑟 𝐾 𝑥 ≤ 𝑃
1
+
𝐻 𝐾 𝐻+
𝑁𝑚 𝑚 𝑥 𝑚
1
− log 𝑑𝑒𝑡 𝐼 +
𝐻 𝐾 𝐻+
𝑁𝑒 𝑒 𝑥 𝑒
The first derivative of the average secrecy
capacity with respect to SNR = P/nRNm at SNR = 0

lim
Eb
SNR
log 2

log 2 

N 0 SNR  0 C S ( SNR)
C S ( 0)

The minimum bit energy in the absence of
secrecy constraints, the minimum bit energy per
secret bit is calculated. Secrecy constraints lead to
an increase if the minimum energy requirements.
We also note that the energy cost of secrecy
increases as secrecy rates increase.
We plot the secrecy rates in
bits/s/Hz/dimension as a function of the energy per
secret bit under the same assumptions and channel
www.ijera.com

The second derivative of the average secrecy
capacity at SNR = 0 is given by

Above, we have assumed that the fading
coefficients hm and he are independent. Next, we
demonstrate that the gains are still observed even if
the channel coefficients are correlated. We again
1833 | P a g e
K. Rajesh et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836
assume that hm and he are zero-mean, circularly
symmetric Gaussian random variables with
E{|hm|2} = E{|he|2} = 1. Let us denote zm = |hm|2 and
ze = |he|2. Using the bivariate Rayleigh probability
density function given in, we can easily obtain the
bivariate exponential density as
The minimum energy per secret bit is
plotted as a function of the correlation coefficient
ρ. When ρ = 0 and hence the channel coefficients
are independent, we
𝐸𝑏
log 2
=
= 1.419𝑑𝐵
𝑁0 𝑠,𝑚𝑖𝑛
𝑁𝑒
𝑁 𝑚 + 𝑁𝑒
As the correlation increases, the minimum
bit energy value increases. However, note that the
bit energy values are finite unless there is full
correlation. Note further that if there were no
fading, we would have
𝐸𝑏
log 2
=
= 𝑖𝑛𝑓
𝑁0 𝑠,𝑚𝑖𝑛
𝑁 +
1− 𝑚
𝑁𝑒
The minimum energy per secret bit, which
is attained as SNR vanishes, are discussed. In
general, fading is beneficial in terms of energy
efficiency at nonzero SNR levels as well. This is
demonstrated. In this figure, we plot the secrecy
capacity when nT = 1, nR = 5, and nE = 3. We
consider two scenarios: no fading and i.i.d.
Rayleigh fading. In the case in which there is no
fading, we assume that the channel coefficients are
all equal to 1. In the fading scenario, we assume
that the channel vectors hm and he consist of
independent and identically distributed, zero-mean
Gaussian components each with unit variance, i.e.,
E{|hm,i|2} = 1 and E{|he,i|2} = 1 for all i. We
additionally assume that hm and he are independent
of each other. Note that under these assumptions,
||hm||2 and ||he||2 are independent chi-square random
variables with 2nR and 2nE degrees of freedom,
respectively. In Fig. 4, we observe that better
performance is achieved in the presence of fading.
Indeed, energy gains tend to increase at higher
values of secrecy capacity. For instance, when Cs =
0.14 bits/s/Hz/dimension, we have a gain of
approximately 8 dB in Eb/N0 s . Note that this is a
substantial improvement in energy efficiency

www.ijera.com

We consider a general multiple-input and
multiple-output (MIMO) channel model and
identify the optimal transmission strategies in the
low-SNR regime under secrecy constraints. Since
secrecy capacity is in general smaller than the
capacity attained in the absence of confidentiality
concerns. Energy per bit requirements increase due
to security constraints.
This work, quantify these increased
energy costs and address the tradeoff between
secrecy and energy efficiency. The fundamental
benchmarks with which the performance of
practical systems can be compared, and to obtain
design guidelines for energy-efficient and secure
communication.
Observation 1: When nT=3,nR=3,nE=3; Here
the Fig.3. shows that secrecy rates comparison with
reference to signal to noise ratio.

Fig.3: Secrecy rates in nats/s/Hz/dimension vs.
SNR.
Observation 2: Where power allocation at low
SNR condition; Here the Fig.4. shows secrecy
rates comparison with reference to energy per
secret bit and also power allocation scheme in a
network.

4.1 SIMULATION RESULTS
The two critical issues of security and
energy-efficiency jointly, we study the secrecy
capacity in the low-SNR regime. The operation at
low SNRs, in addition to improving the energy
efficiency, is beneficial from a security perspective
as well. In the low-SNR regime, either the
transmission power is small or the bandwidth is
large. In either case, we have low probability of
intercept as it is generally difficult for an
eavesdropper to detect the signals in this regime.

www.ijera.com

1834 | P a g e
K. Rajesh et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836

www.ijera.com

Fig.6: Comparison of different fading channels
with no fading channel
Fig.4: Secrecy rates in bits/s/Hz/dimension vs.
energy per secret bit
Observation 3: Minimum energy per bit Vs
correlation coefficient; Here the Fig.5. shows that
minimum energy calculation with reference to
correlation coefficient and the energy levels
depends on correlation coefficient.

V.

CONCLUSION

In this paper, we investigated the tradeoff
between communication rate and average
probability of decoding error for a non-coherent
multiple antenna fading in a low-SNR regime. We
started with the assumption that the fading matrix
H has i.i.d.entries. In this regime, we showed that
using M transmit antennas and N receive antennas
allow us to realized a performance gain of N and
peakiness gain M. When both the average and peak
power are constrained, having large M can improve
both the channel capacity and the low-SNR
reliability function. In the low-SNR regime,
channel correlation can actually improve the
channel performance. In the extreme case where
the fading is fully correlated, in the sense that the
entries of the fading matrix H are either identical or
differ by a phase shift, we can achieve a
performance gain of M N. Thus, the advantage of
having multiple antennas is best realized when we
have fully correlated fading channels. This suggests
that the antennas should be placed close together in
the low-SNR regime.

REFERENCES
[1]

[2]
Fig. 5. Minimum energy per secret bit Eb/N0 min,s
vs. correlation coefficient ρ
Observation 4: When nT=1,nR=5,nE=3;
Comparison of different fading channels with no
fading; Here the Fig.6. shows that comparison of
different fading channels and no fading condition
in a network.

www.ijera.com

[3]

[4]

A. D. Wyner, ―The wire-tap channel,‖ Bell
Syst. Tech. J., vol. 54, pp. 1355–1367,
Oct. 1975
S. K. Leung-Yan-Cheong and M. E.
Hellman,
―The Gaussian wire-tap
channel,‖ IEEE
Trans. Inf. Theory,
vol. 24, pp. 451–456, July 1978.
I. Csiszár and J. Körner, ―Broadcast
channels with confidential messages,
IEEE Trans. Inf.
Theory, vol. 3, pp.
339–348, May 1978.
Special issue on information-theoretic
security, IEEE Trans. Inf. Theory, vol. 54,
no. 6, June 2008.

1835 | P a g e
K. Rajesh et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836
[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

[13]

[14]

[15]

[16]

A. O. Hero, ―Secure space-time
communication,‖ IEEE Trans. Inf. Theory,
vol. 49, pp. 3235–3249, Dec. 2003.
Z. Li, W. Trappe, and R. D. Yates, ―Secret
communication
via
multiantenna
transmission,‖ 2007 Conf. Inf. Sciences
Syst..
S. Shafiee, N. Liu, and S. Ulukus,
―Towards the secrecy capacity of the
Gaussian MIMO wire-tap channel: the 22-1 channel,‖ IEEE Trans. Inf. Theory,
vol. 55, pp. 4033–4039, Sep. 2009.
A. Khisti and G. W. Wornell, ―Secure
transmission with multiple antennas—part
II: the MIMOME wiretap channel,‖ IEEE
Trans. Inf. Theory, vol. 56, pp. 5515–
5532, Nov. 2010.
F. Oggier and B. Hassibi, ―The secrecy
capacity of the MIMO Wiretap channel.‖
Available: http://arxiv.org/abs/0710.1920.
T. Liu and S. Shamai (Shitz), ―A note on
the secrecy capacity of the multi-antenna
wiretap channel,‖ IEEE Trans. Inf.
Theory, vol. 55, pp. 2547–2553, June
2009.
S. Verdú, ―Spectral efficiency in the
wideband regime,‖ IEEE Trans. Inf.
Theory, vol. 48, pp. 1319–1343, June
2002.
D. P. Palomar and S. Verdú, ―Gradient of
mutual information in linear vector
Gaussian channels,‖ IEEE Trans. Inf.
Theory, vol. 52, pp. 141– 154, Jan. 2006.
Y. Liang, H. V. Poor, and S. Shamai
(Shitz), ―Secure communication over
fading channels,‖ IEEE Trans. Inf.
Theory, vol. 54, pp. 2470–2492, June
2008.
M. Bloch, J. Barros, M. R. D. Rodrigues,
and S. W. McLaughlin, ―Wireless
information-theoretic security,‖ IEEE
Trans. Inf. Theory, vol. 54, pp. 2515–
2534, June 2008.
P. K. Gopala, L. Lai, and H. El Gamal,
―On the secrecy capacity of fading
channels,‖ IEEE Trans. Inf. Theory, vol.
54, pp. 4687–4698, Oct. 2008.
M. El-Halabi, T. Liu, and C. Georghiades,
―On secrecy capacity per unit cost,‖ in
Proc. 2009 IEEE Internation Symp. Inf.
Theory, pp. 2301–2305.

www.ijera.com

[19] M. K. Simon and M.-S. Alouini, Digital
Communication over Fading Channels.
Wiley-Interscience, 2005.

K.Rajesh Obtained B.Tech degree from
D.M.S.S.V.H.College
of
Engineering
at
Matchilipatnam in Andhrapradesh under Acharya
Nagarjuna University Guntur in INDIA and
M.Tech student in AITAM College Tekkali in
Srikakulam district Under JNTU Kakinada in India.
His area of interest is Communication Systems.
Smt K.V.Lalitha Bhavani, Received
the B.Tech degree and M.Tech from
Geetham University in Visakapatnam
in India. She is an Associate
Professor in the Department of ECE,
AITAM College Tekkali in India. Areas of interest
are Communication systems signal and image
processing.

[17]

R. A. Horn and C. R. Johnson, Matrix
Analysis. Cambridge University Press,
1999.
[18] S. Boyd and L. Vandenberghe, Convex
Optimization.
Cambridge
University
Press, 2004.

www.ijera.com

1836 | P a g e

More Related Content

What's hot

Tree Based Collaboration For Target Tracking
Tree Based Collaboration For Target TrackingTree Based Collaboration For Target Tracking
Tree Based Collaboration For Target TrackingChuka Okoye
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksChuka Okoye
 
Narrowband Spectrum Sensing for Different Fading Channels for Cognitive Radio...
Narrowband Spectrum Sensing for Different Fading Channels for Cognitive Radio...Narrowband Spectrum Sensing for Different Fading Channels for Cognitive Radio...
Narrowband Spectrum Sensing for Different Fading Channels for Cognitive Radio...IJMERJOURNAL
 
Approximation of Gaussian derivatives for UWB communication
Approximation of Gaussian derivatives for UWB communicationApproximation of Gaussian derivatives for UWB communication
Approximation of Gaussian derivatives for UWB communicationijsrd.com
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
 
Performance analysis on the basis of a comparative study between multipath ra...
Performance analysis on the basis of a comparative study between multipath ra...Performance analysis on the basis of a comparative study between multipath ra...
Performance analysis on the basis of a comparative study between multipath ra...ijmnct
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
 
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...IOSRJECE
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channeleSAT Publishing House
 
Investigation and Analysis of SNR Estimation in OFDM system
Investigation and Analysis of SNR Estimation in OFDM systemInvestigation and Analysis of SNR Estimation in OFDM system
Investigation and Analysis of SNR Estimation in OFDM systemIOSR Journals
 
Broad-Spectrum Model for Sharing Analysis between IMTAdvanced Systems and FSS...
Broad-Spectrum Model for Sharing Analysis between IMTAdvanced Systems and FSS...Broad-Spectrum Model for Sharing Analysis between IMTAdvanced Systems and FSS...
Broad-Spectrum Model for Sharing Analysis between IMTAdvanced Systems and FSS...IOSRJECE
 
Smart antennas for umts
Smart antennas  for umtsSmart antennas  for umts
Smart antennas for umtsfruruk
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
 

What's hot (20)

Article GSM
Article GSMArticle GSM
Article GSM
 
Tree Based Collaboration For Target Tracking
Tree Based Collaboration For Target TrackingTree Based Collaboration For Target Tracking
Tree Based Collaboration For Target Tracking
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
 
Narrowband Spectrum Sensing for Different Fading Channels for Cognitive Radio...
Narrowband Spectrum Sensing for Different Fading Channels for Cognitive Radio...Narrowband Spectrum Sensing for Different Fading Channels for Cognitive Radio...
Narrowband Spectrum Sensing for Different Fading Channels for Cognitive Radio...
 
1004.0152v1
1004.0152v11004.0152v1
1004.0152v1
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Approximation of Gaussian derivatives for UWB communication
Approximation of Gaussian derivatives for UWB communicationApproximation of Gaussian derivatives for UWB communication
Approximation of Gaussian derivatives for UWB communication
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation in
 
Antijam ipsn09
Antijam ipsn09Antijam ipsn09
Antijam ipsn09
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Performance analysis on the basis of a comparative study between multipath ra...
Performance analysis on the basis of a comparative study between multipath ra...Performance analysis on the basis of a comparative study between multipath ra...
Performance analysis on the basis of a comparative study between multipath ra...
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
 
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
 
Important question bank
Important question bankImportant question bank
Important question bank
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channel
 
Investigation and Analysis of SNR Estimation in OFDM system
Investigation and Analysis of SNR Estimation in OFDM systemInvestigation and Analysis of SNR Estimation in OFDM system
Investigation and Analysis of SNR Estimation in OFDM system
 
Broad-Spectrum Model for Sharing Analysis between IMTAdvanced Systems and FSS...
Broad-Spectrum Model for Sharing Analysis between IMTAdvanced Systems and FSS...Broad-Spectrum Model for Sharing Analysis between IMTAdvanced Systems and FSS...
Broad-Spectrum Model for Sharing Analysis between IMTAdvanced Systems and FSS...
 
Smart antennas for umts
Smart antennas  for umtsSmart antennas  for umts
Smart antennas for umts
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 

Viewers also liked (20)

Kw3618561867
Kw3618561867Kw3618561867
Kw3618561867
 
Kz3618761878
Kz3618761878Kz3618761878
Kz3618761878
 
Ky3618721875
Ky3618721875Ky3618721875
Ky3618721875
 
Kn3618041809
Kn3618041809Kn3618041809
Kn3618041809
 
Kq3618201825
Kq3618201825Kq3618201825
Kq3618201825
 
Kl3617891796
Kl3617891796Kl3617891796
Kl3617891796
 
Ki3617781782
Ki3617781782Ki3617781782
Ki3617781782
 
Kk3617861788
Kk3617861788Kk3617861788
Kk3617861788
 
Kr3618261830
Kr3618261830Kr3618261830
Kr3618261830
 
Kh3617741777
Kh3617741777Kh3617741777
Kh3617741777
 
La3618791882
La3618791882La3618791882
La3618791882
 
Lb3618831892
Lb3618831892Lb3618831892
Lb3618831892
 
Kp3618151819
Kp3618151819Kp3618151819
Kp3618151819
 
Km3617971803
Km3617971803Km3617971803
Km3617971803
 
Kj3617831785
Kj3617831785Kj3617831785
Kj3617831785
 
Trabajo 3
Trabajo 3Trabajo 3
Trabajo 3
 
Identificación Fonema m
Identificación Fonema m Identificación Fonema m
Identificación Fonema m
 
Generaciones del sistema operativo.
Generaciones del sistema operativo.Generaciones del sistema operativo.
Generaciones del sistema operativo.
 
Titan mmorpg game
Titan mmorpg gameTitan mmorpg game
Titan mmorpg game
 
Pengenalan Angka
Pengenalan AngkaPengenalan Angka
Pengenalan Angka
 

Similar to Ks3618311836

Study and Analysis Capacity of MIMO Systems for AWGN Channel Model Scenarios
Study and Analysis Capacity of MIMO Systems for AWGN Channel Model ScenariosStudy and Analysis Capacity of MIMO Systems for AWGN Channel Model Scenarios
Study and Analysis Capacity of MIMO Systems for AWGN Channel Model ScenariosIJERA Editor
 
18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nn18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nnIAESIJEECS
 
Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation IJERA Editor
 
1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...
1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...
1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...INFOGAIN PUBLICATION
 
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelCapacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
 
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelCapacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
 
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...ijsrd.com
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesIOSR Journals
 
New Adaptive Cooperative-MIMO for LTE Technology
New Adaptive Cooperative-MIMO for LTE TechnologyNew Adaptive Cooperative-MIMO for LTE Technology
New Adaptive Cooperative-MIMO for LTE Technologyijtsrd
 
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd Iaetsd
 
Enhancement Of Diversity Gain In Mimo System
Enhancement Of Diversity Gain  In Mimo SystemEnhancement Of Diversity Gain  In Mimo System
Enhancement Of Diversity Gain In Mimo Systemmscs12
 
Ber analysis of 2x2 mimo spatial multiplexing under awgn and rician channels ...
Ber analysis of 2x2 mimo spatial multiplexing under awgn and rician channels ...Ber analysis of 2x2 mimo spatial multiplexing under awgn and rician channels ...
Ber analysis of 2x2 mimo spatial multiplexing under awgn and rician channels ...ijwmn
 
A New Transmission Scheme for MIMO – OFDM
A New Transmission Scheme for MIMO – OFDMA New Transmission Scheme for MIMO – OFDM
A New Transmission Scheme for MIMO – OFDMijsrd.com
 
On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...ijeei-iaes
 
Noise uncertainty effect on multi-channel cognitive radio networks
Noise uncertainty effect on multi-channel cognitive  radio networks Noise uncertainty effect on multi-channel cognitive  radio networks
Noise uncertainty effect on multi-channel cognitive radio networks IJECEIAES
 
Design and Optimization a Circular Shape Network Antenna Micro Strip for Some...
Design and Optimization a Circular Shape Network Antenna Micro Strip for Some...Design and Optimization a Circular Shape Network Antenna Micro Strip for Some...
Design and Optimization a Circular Shape Network Antenna Micro Strip for Some...AIRCC Publishing Corporation
 

Similar to Ks3618311836 (20)

Study and Analysis Capacity of MIMO Systems for AWGN Channel Model Scenarios
Study and Analysis Capacity of MIMO Systems for AWGN Channel Model ScenariosStudy and Analysis Capacity of MIMO Systems for AWGN Channel Model Scenarios
Study and Analysis Capacity of MIMO Systems for AWGN Channel Model Scenarios
 
18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nn18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nn
 
Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation
 
B011120510
B011120510B011120510
B011120510
 
Hg3413361339
Hg3413361339Hg3413361339
Hg3413361339
 
1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...
1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...
1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...
 
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelCapacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
 
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelCapacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
 
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation Techniques
 
New Adaptive Cooperative-MIMO for LTE Technology
New Adaptive Cooperative-MIMO for LTE TechnologyNew Adaptive Cooperative-MIMO for LTE Technology
New Adaptive Cooperative-MIMO for LTE Technology
 
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdma
 
Enhancement Of Diversity Gain In Mimo System
Enhancement Of Diversity Gain  In Mimo SystemEnhancement Of Diversity Gain  In Mimo System
Enhancement Of Diversity Gain In Mimo System
 
U0 vqmt qxodk=
U0 vqmt qxodk=U0 vqmt qxodk=
U0 vqmt qxodk=
 
9517cnc05
9517cnc059517cnc05
9517cnc05
 
Ber analysis of 2x2 mimo spatial multiplexing under awgn and rician channels ...
Ber analysis of 2x2 mimo spatial multiplexing under awgn and rician channels ...Ber analysis of 2x2 mimo spatial multiplexing under awgn and rician channels ...
Ber analysis of 2x2 mimo spatial multiplexing under awgn and rician channels ...
 
A New Transmission Scheme for MIMO – OFDM
A New Transmission Scheme for MIMO – OFDMA New Transmission Scheme for MIMO – OFDM
A New Transmission Scheme for MIMO – OFDM
 
On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...
 
Noise uncertainty effect on multi-channel cognitive radio networks
Noise uncertainty effect on multi-channel cognitive  radio networks Noise uncertainty effect on multi-channel cognitive  radio networks
Noise uncertainty effect on multi-channel cognitive radio networks
 
Design and Optimization a Circular Shape Network Antenna Micro Strip for Some...
Design and Optimization a Circular Shape Network Antenna Micro Strip for Some...Design and Optimization a Circular Shape Network Antenna Micro Strip for Some...
Design and Optimization a Circular Shape Network Antenna Micro Strip for Some...
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Ks3618311836

  • 1. K. Rajesh et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Secure Communication in Low Snr Regime Over Fading Channels in Mimo K. Rajesh*, K. V. Lalitha Bhavani** *M.Tech (Digital Electronics And Communication Systems) Student, AITAM College, Tekkali in India. **Associate Professor in ECE Department, AITAM College, Tekkali in India. ABSTRACT In this work we consider MIMO fading channels and characterize the reliability function in the low-SNR regime as a function of the number of transmit and receive antennas. For the case when the fading matrix H has independent entries, we show that the number of transmit antennas plays a key role in reducing the peakiness in the input signal required to achive the optimal error exponent for a given communication rate. Further by considering a correlated channel model, we show that the maximum performance gain is achieved when the entries of the channel fading matrix are fully correlated. The results we presented in this work in the low- SNR regime can also be applied to the finite bandwidth regime. Keywords: MIMO, Bandwidth Allocation, Fading, Low SNR I. INTRODUCTION The use of multiple antennas at the transmitter and receiver in wireless systems, popularly known as MIMO (multiple-input multiple-output) technology, has rapidly gained in popularity over the past decade due to its powerful performance-enhancing capabilities. Communication in wireless channels is impaired predominantly by multi-path fading. Multi-path is the arrival of the transmitted signal at an intended receiver through differing angles and/or differing time delays and/or differing frequency (i.e., Doppler) shifts due to the scattering of electromagnetic waves in the environment. Consequently, the received signal power fluctuates in space (due to angle spread) and/or frequency (due to delay spread) and/or time (due to Doppler spread) through the random superposition of the impinging multi-path components. This random fluctuation in signal level, known as fading, can severely affect the quality and reliability of wireless communication. Additionally, the constraints posed by limited power and scarce frequency bandwidth make the task of designing high data rate, high reliability wireless communication systems extremely challenging. MIMO technology constitutes a breakthrough in wireless communication system design. The technology offers a number of benefits that help meet the challenges posed by both the impairments in the wireless channel as well as resource constraints. In addition to the time and frequency dimensions that are exploited in conventional single-antenna (single-input singleoutput) wireless systems, the leverages of MIMO are realized by exploiting the spatial dimension www.ijera.com (Provided by the multiple antennas at the transmitter and the receiver). The advantages of multiple-input multipleoutput (MIMO) systems have been widely acknowledged, to the extent that certain transmit diversity methods (i.e., Alamouti signaling) have been incorporated into wireless standards. Although transmit diversity is clearly advantageous on a cellular base station, it may not be practical for other scenarios. Specifically, due to size, cost, or hardware limitations, a wireless agent may not be able to support multiple transmit antennas. Examples include most handsets (size) or the nodes in a wireless sensor network (size, power). Fig.1:secure communication system We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wire tapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full channel state information (CSI) 1831 | P a g e
  • 2. K. Rajesh et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836 case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under this full CSI assumption serves as an upper bound for the secrecy capacity when only the CSI of the legitimate receiver is known at the transmitter, which is characterized next. In each scenario, the perfect secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average signal-tonoise ratio (SNR) goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Overall, channel fading has a positive impact on the secrecy capacity and rate adaptation, based on the main channel CSI, is critical in facilitating secure communications over slow fading channels. channel input-output relations between the transmitter and legitimate receiver, and the transmitter and eavesdropper are given by ym = Hmx + nm , ye = Hex + ne , where, x denotes the nT ×1–dimensional transmitted signal vector. nR×1–dimensional ym and nE ×1–dimensional ye represent the received signal vectors at the legitimate receiver and eavesdropper, respectively. Moreover, nm with dimension nR×1 and ne with dimension nE × 1 are independent, zero-mean Gaussian random vectors. The signal-to-noise ratio is defined as, SNR  CHANNEL MODEL P nR N m the channel models, Hm is the nR × nT – dimensional channel matrix between the transmitter and legitimate receiver, and He is the nE × nT – dimensional channel matrix between the transmitter and eavesdropper. III. II. www.ijera.com SECRECY IN THE LOW-SNR REGIME The channel matrices Hm and He are fixed for the entire transmission period and are known to all three terminals. The assumption of perfect channel knowledge can be justified in scenarios in which a base station, which knows the channels of the users, attempt to transmit confidential messages to a user and hence treat the other users as eavesdroppers. In this paper, we concentrate on the lowSNR regime. In this regime, the behavior of the secrecy capacity can be accurately predicted by its first and second derivatives with respect to SNR at SNR = 0: Fig.2.Channel Model MIMO is the use of multiple antennas at both the transmitter and receiver to improve communication performance. It is one of several forms of smart antenna technology. Note that the terms input and output refer to the radio channel carrying the signal, not to the devices having antennas. New techniques, which account for the extra spatial dimension, have been adopted to realize these gains in new and previously existing systems. MIMO technology has attracted attention in wireless communications, because it offers significant increases in data throughput and link range without additional bandwidth or increased transmit power. The use of multiple dimensions at both ends of a communication link offers significant improvements in terms of spectral efficiency and link reliability. We consider a MIMO channel model and assume that the transmitter, legitimate receiver, and eavesdropper are equipped with nT , nR, and nE antennas, respectively. We further assume that the www.ijera.com  C (0)  C S ( SNR)  C S (0) SNR  SNR 2   ( SNR 2 ) 2 Eb N 0s ,m in log 2   C S ( 0)    2 CS (0) S0    CS (0) 2 N0 s, min denotes the minimum bit energy required for reliable communication under secrecy constraints (or equivalently minimum energy per secret bit), and S0 denotes the wideband slope which is the slope of the secrecy capacity in bits/dimension/(3 dB) at the point Eb /N0 s, min. 3.1.1 FIRST AND SECOND DERIVATIVES OF THE SECRECY CAPACITY We determine the first and second derivatives of the secrecy capacity at SNR = 0, and provide a second-order approximation to the MIMO secrecy capacity in the low-SNR regime. Through this analysis, we quantify the impact of 1832 | P a g e
  • 3. K. Rajesh et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836 secrecy constraints on the performance. We identify the optimal transmission strategies in the low-SNR regime. In particular, we determine that transmission in the maximal-eigenvalue eigenspace of a certain matrix that depends on the channel matrices is second-order optimal. In the case in which the maximum eigenvalue is distinct, beamforming is shown to be optimal. Secrecy rate expression given by I S ( SNR)  1 nR      1 1 H m K x H m   log det I  H e K x H   log det I  e     Nm Ne        The first derivative of the secrecy capacity in with respect to SNR at SNR = 0. max( ) if max( )  0   CS (0)  max( )  0 else In the absence of secrecy constraints, the first and second derivatives of the MIMO capacity at SNR = 0.   C S (0)  m ax ( H m H m ) and C (0)   nR 2 ( H  H )  max m m l Where, l is the multiplicity of  m ax( H m H m ) Hence, the first and second derivatives are achieved by transmitting in the maximal-eigenvalue eigenspace of H†mHm, the subspace in which the transmitter-receiver channel is the strongest. If there are secrecy constraints, we should at low SNRs transmit in the direction in which the transmitter-receiver channel is strongest with respect to the transmitter-eavesdropper channel normalized by the ratio of the noise variances. 3.1.2. MINIMUM ENERGY PER SECRET BIT In this section, we study the energy required to send information both reliably and securely. In particular, we investigate the minimum energy required to send one secret bit. Before identifying the minimum energy per secret bit, we first show that the secrecy capacity is concave in SNR. The secrecy capacity Cs achieved under the average power constraint E{||x||2} ≤ P is a concave function of SNR. The energy per secret bit normalized by the noise variance at the legitimate receiver is defined as Eb SNR  log 2 N 0 C S ( SNR) www.ijera.com model. We see, as predicted, that the minimum bit energy is attained in all cases as SNR and hence rates approach zero. While the minimum bit energy is Eb/N0=-6.01dB in the absence of secrecy constraints, the minimum bit energy per secret bit is Eb/N0 s,min=-3.71Db. IV. THE IMPACT OF FADING Assume that the channel matrices Hm and He are random matrices, whose components are stationary and ergodic random variables, modeling fading in wireless transmissions. We again assume that realizations of these matrices are perfectly known by all the terminals. As discussed fading channel can be regarded as a set of parallel sub channels each of which corresponds to a particular fading realization. Hence, in each sub channel, the channel matrices are fixed similarly as in the channel model considered in the previous section. It is shown that having independent inputs for each sub channel is optimal and the secrecy capacity of the set of parallel sub channels is equal to the sum of the capacities of sub channels. Therefore, the secrecy capacity of fading channels can be found by averaging the secrecy capacities attained for different fading realizations. We assume that the transmitter is subject to a short-term power constraint. Hence, for each channel realization, the same amount of power is used and we have tr (Kx) ≤ P. With this assumption, the transmitter is allowed to perform power adaptation in space across the antennas, but not across time. Under such constraints, it can easily be seen from the above discussion that the average secrecy capacity in fading channels is given by 𝑚𝑎𝑥 1 𝐾 𝑥≥0 𝐶𝑠 = 𝐸𝐻 𝑚 , 𝐻 𝑒 log det 𝐼 𝑛𝑅 𝑡𝑟 𝐾 𝑥 ≤ 𝑃 1 + 𝐻 𝐾 𝐻+ 𝑁𝑚 𝑚 𝑥 𝑚 1 − log 𝑑𝑒𝑡 𝐼 + 𝐻 𝐾 𝐻+ 𝑁𝑒 𝑒 𝑥 𝑒 The first derivative of the average secrecy capacity with respect to SNR = P/nRNm at SNR = 0 lim Eb SNR log 2  log 2   N 0 SNR  0 C S ( SNR) C S ( 0) The minimum bit energy in the absence of secrecy constraints, the minimum bit energy per secret bit is calculated. Secrecy constraints lead to an increase if the minimum energy requirements. We also note that the energy cost of secrecy increases as secrecy rates increase. We plot the secrecy rates in bits/s/Hz/dimension as a function of the energy per secret bit under the same assumptions and channel www.ijera.com The second derivative of the average secrecy capacity at SNR = 0 is given by Above, we have assumed that the fading coefficients hm and he are independent. Next, we demonstrate that the gains are still observed even if the channel coefficients are correlated. We again 1833 | P a g e
  • 4. K. Rajesh et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836 assume that hm and he are zero-mean, circularly symmetric Gaussian random variables with E{|hm|2} = E{|he|2} = 1. Let us denote zm = |hm|2 and ze = |he|2. Using the bivariate Rayleigh probability density function given in, we can easily obtain the bivariate exponential density as The minimum energy per secret bit is plotted as a function of the correlation coefficient ρ. When ρ = 0 and hence the channel coefficients are independent, we 𝐸𝑏 log 2 = = 1.419𝑑𝐵 𝑁0 𝑠,𝑚𝑖𝑛 𝑁𝑒 𝑁 𝑚 + 𝑁𝑒 As the correlation increases, the minimum bit energy value increases. However, note that the bit energy values are finite unless there is full correlation. Note further that if there were no fading, we would have 𝐸𝑏 log 2 = = 𝑖𝑛𝑓 𝑁0 𝑠,𝑚𝑖𝑛 𝑁 + 1− 𝑚 𝑁𝑒 The minimum energy per secret bit, which is attained as SNR vanishes, are discussed. In general, fading is beneficial in terms of energy efficiency at nonzero SNR levels as well. This is demonstrated. In this figure, we plot the secrecy capacity when nT = 1, nR = 5, and nE = 3. We consider two scenarios: no fading and i.i.d. Rayleigh fading. In the case in which there is no fading, we assume that the channel coefficients are all equal to 1. In the fading scenario, we assume that the channel vectors hm and he consist of independent and identically distributed, zero-mean Gaussian components each with unit variance, i.e., E{|hm,i|2} = 1 and E{|he,i|2} = 1 for all i. We additionally assume that hm and he are independent of each other. Note that under these assumptions, ||hm||2 and ||he||2 are independent chi-square random variables with 2nR and 2nE degrees of freedom, respectively. In Fig. 4, we observe that better performance is achieved in the presence of fading. Indeed, energy gains tend to increase at higher values of secrecy capacity. For instance, when Cs = 0.14 bits/s/Hz/dimension, we have a gain of approximately 8 dB in Eb/N0 s . Note that this is a substantial improvement in energy efficiency www.ijera.com We consider a general multiple-input and multiple-output (MIMO) channel model and identify the optimal transmission strategies in the low-SNR regime under secrecy constraints. Since secrecy capacity is in general smaller than the capacity attained in the absence of confidentiality concerns. Energy per bit requirements increase due to security constraints. This work, quantify these increased energy costs and address the tradeoff between secrecy and energy efficiency. The fundamental benchmarks with which the performance of practical systems can be compared, and to obtain design guidelines for energy-efficient and secure communication. Observation 1: When nT=3,nR=3,nE=3; Here the Fig.3. shows that secrecy rates comparison with reference to signal to noise ratio. Fig.3: Secrecy rates in nats/s/Hz/dimension vs. SNR. Observation 2: Where power allocation at low SNR condition; Here the Fig.4. shows secrecy rates comparison with reference to energy per secret bit and also power allocation scheme in a network. 4.1 SIMULATION RESULTS The two critical issues of security and energy-efficiency jointly, we study the secrecy capacity in the low-SNR regime. The operation at low SNRs, in addition to improving the energy efficiency, is beneficial from a security perspective as well. In the low-SNR regime, either the transmission power is small or the bandwidth is large. In either case, we have low probability of intercept as it is generally difficult for an eavesdropper to detect the signals in this regime. www.ijera.com 1834 | P a g e
  • 5. K. Rajesh et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836 www.ijera.com Fig.6: Comparison of different fading channels with no fading channel Fig.4: Secrecy rates in bits/s/Hz/dimension vs. energy per secret bit Observation 3: Minimum energy per bit Vs correlation coefficient; Here the Fig.5. shows that minimum energy calculation with reference to correlation coefficient and the energy levels depends on correlation coefficient. V. CONCLUSION In this paper, we investigated the tradeoff between communication rate and average probability of decoding error for a non-coherent multiple antenna fading in a low-SNR regime. We started with the assumption that the fading matrix H has i.i.d.entries. In this regime, we showed that using M transmit antennas and N receive antennas allow us to realized a performance gain of N and peakiness gain M. When both the average and peak power are constrained, having large M can improve both the channel capacity and the low-SNR reliability function. In the low-SNR regime, channel correlation can actually improve the channel performance. In the extreme case where the fading is fully correlated, in the sense that the entries of the fading matrix H are either identical or differ by a phase shift, we can achieve a performance gain of M N. Thus, the advantage of having multiple antennas is best realized when we have fully correlated fading channels. This suggests that the antennas should be placed close together in the low-SNR regime. REFERENCES [1] [2] Fig. 5. Minimum energy per secret bit Eb/N0 min,s vs. correlation coefficient ρ Observation 4: When nT=1,nR=5,nE=3; Comparison of different fading channels with no fading; Here the Fig.6. shows that comparison of different fading channels and no fading condition in a network. www.ijera.com [3] [4] A. D. Wyner, ―The wire-tap channel,‖ Bell Syst. Tech. J., vol. 54, pp. 1355–1367, Oct. 1975 S. K. Leung-Yan-Cheong and M. E. Hellman, ―The Gaussian wire-tap channel,‖ IEEE Trans. Inf. Theory, vol. 24, pp. 451–456, July 1978. I. Csiszár and J. Körner, ―Broadcast channels with confidential messages, IEEE Trans. Inf. Theory, vol. 3, pp. 339–348, May 1978. Special issue on information-theoretic security, IEEE Trans. Inf. Theory, vol. 54, no. 6, June 2008. 1835 | P a g e
  • 6. K. Rajesh et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1831-1836 [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] A. O. Hero, ―Secure space-time communication,‖ IEEE Trans. Inf. Theory, vol. 49, pp. 3235–3249, Dec. 2003. Z. Li, W. Trappe, and R. D. Yates, ―Secret communication via multiantenna transmission,‖ 2007 Conf. Inf. Sciences Syst.. S. Shafiee, N. Liu, and S. Ulukus, ―Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 22-1 channel,‖ IEEE Trans. Inf. Theory, vol. 55, pp. 4033–4039, Sep. 2009. A. Khisti and G. W. Wornell, ―Secure transmission with multiple antennas—part II: the MIMOME wiretap channel,‖ IEEE Trans. Inf. Theory, vol. 56, pp. 5515– 5532, Nov. 2010. F. Oggier and B. Hassibi, ―The secrecy capacity of the MIMO Wiretap channel.‖ Available: http://arxiv.org/abs/0710.1920. T. Liu and S. Shamai (Shitz), ―A note on the secrecy capacity of the multi-antenna wiretap channel,‖ IEEE Trans. Inf. Theory, vol. 55, pp. 2547–2553, June 2009. S. Verdú, ―Spectral efficiency in the wideband regime,‖ IEEE Trans. Inf. Theory, vol. 48, pp. 1319–1343, June 2002. D. P. Palomar and S. Verdú, ―Gradient of mutual information in linear vector Gaussian channels,‖ IEEE Trans. Inf. Theory, vol. 52, pp. 141– 154, Jan. 2006. Y. Liang, H. V. Poor, and S. Shamai (Shitz), ―Secure communication over fading channels,‖ IEEE Trans. Inf. Theory, vol. 54, pp. 2470–2492, June 2008. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, ―Wireless information-theoretic security,‖ IEEE Trans. Inf. Theory, vol. 54, pp. 2515– 2534, June 2008. P. K. Gopala, L. Lai, and H. El Gamal, ―On the secrecy capacity of fading channels,‖ IEEE Trans. Inf. Theory, vol. 54, pp. 4687–4698, Oct. 2008. M. El-Halabi, T. Liu, and C. Georghiades, ―On secrecy capacity per unit cost,‖ in Proc. 2009 IEEE Internation Symp. Inf. Theory, pp. 2301–2305. www.ijera.com [19] M. K. Simon and M.-S. Alouini, Digital Communication over Fading Channels. Wiley-Interscience, 2005. K.Rajesh Obtained B.Tech degree from D.M.S.S.V.H.College of Engineering at Matchilipatnam in Andhrapradesh under Acharya Nagarjuna University Guntur in INDIA and M.Tech student in AITAM College Tekkali in Srikakulam district Under JNTU Kakinada in India. His area of interest is Communication Systems. Smt K.V.Lalitha Bhavani, Received the B.Tech degree and M.Tech from Geetham University in Visakapatnam in India. She is an Associate Professor in the Department of ECE, AITAM College Tekkali in India. Areas of interest are Communication systems signal and image processing. [17] R. A. Horn and C. R. Johnson, Matrix Analysis. Cambridge University Press, 1999. [18] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, 2004. www.ijera.com 1836 | P a g e