Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (9)

Search Parameters:
Keywords = worst-case SINR

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 7435 KiB  
Article
Reconfigurable Intelligent Surface-Aided Security Enhancement for Vehicle-to-Vehicle Visible Light Communications
by Xiaoqiong Jing, Yating Wu, Fei Yu, Yuru Xu and Xiaoyong Wang
Photonics 2024, 11(12), 1151; https://doi.org/10.3390/photonics11121151 - 6 Dec 2024
Cited by 1 | Viewed by 1063
Abstract
Vehicle-to-vehicle (V2V) visible light communication (VLC) systems are increasingly being deployed for real-time data exchange in intelligent transportation systems (ITS). However, these systems are highly vulnerable to eavesdropping, especially in scenarios such as road intersections where signals may be exposed to unauthorized receivers. [...] Read more.
Vehicle-to-vehicle (V2V) visible light communication (VLC) systems are increasingly being deployed for real-time data exchange in intelligent transportation systems (ITS). However, these systems are highly vulnerable to eavesdropping, especially in scenarios such as road intersections where signals may be exposed to unauthorized receivers. To address these security challenges, we propose a novel reconfigurable intelligent surface (RIS)-assisted security enhancement scheme for V2V VLC networks. The proposed scheme leverages RIS to improve the reception of legitimate signals at the destination vehicle while simultaneously introducing artificial noise (AN) to interfere with potential eavesdroppers. Optimization problems are formulated to maximize the SINR of the destination vehicle and simultaneously minimize the worst-case SINR of eavesdroppers. The simulation results demonstrate that the proposed scheme achieves a notable improvement in the system’s secrecy rate by 1.64 bit/s/Hz and enhances the overall security performance, offering a robust solution to the security challenges in V2V VLC systems. Full article
Show Figures

Figure 1

21 pages, 2928 KiB  
Article
Robust Multi-UAV Cooperative Trajectory Planning and Power Control for Reliable Communication in the Presence of Uncertain Jammers
by Fan Wang, Zhiqiang Zhang, Lingyun Zhou, Tao Shang and Rongqing Zhang
Drones 2024, 8(10), 558; https://doi.org/10.3390/drones8100558 - 8 Oct 2024
Cited by 2 | Viewed by 1254
Abstract
Unmanned aerial vehicles (UAVs) have become a promising application for future communication and spectrum awareness due to their favorable features such as low cost, high mobility, and ease of deployment. Nevertheless, the jamming resistance appears to be a new challenge in multi-UAV cooperative [...] Read more.
Unmanned aerial vehicles (UAVs) have become a promising application for future communication and spectrum awareness due to their favorable features such as low cost, high mobility, and ease of deployment. Nevertheless, the jamming resistance appears to be a new challenge in multi-UAV cooperative communication scenarios. This paper focuses on designing trajectory planning and power allocation for efficient control and reliable communication in a ground control unit (GCU)-controlled UAV network, where the GCU coordinates multi-UAV systems to execute tasks amidst multiple jammers with imperfect location and power information. Specifically, this paper formulates a nonconvex semi-infinite optimization problem to maximize the average worst-case signal-to-interference-plus-noise ratio (SINR) among multiple UAVs by designing robust flight paths and power control strategy under stringent energy and mobility constraints. To efficiently address this issue, this paper proposes a powerful iterative algorithm utilizing the S-procedure and the successive convex approximation (SCA) method. Extensive simulations validate the effectiveness of the proposed strategy. Full article
Show Figures

Figure 1

12 pages, 1710 KiB  
Article
A Robust Adaptive Objective Power Allocation in Cognitive NOMA Networks
by Mingyue Zhou and Xingang Guo
Sensors 2023, 23(9), 4279; https://doi.org/10.3390/s23094279 - 26 Apr 2023
Cited by 1 | Viewed by 1739
Abstract
Cognitive radio (CR) is a candidate for opportunistic spectrum implementation in wireless communications, allowing secondary users (SUs) to share the spectrum with primary users (PUs). In this paper, a robust adaptive target power allocation strategy for cognitive nonorthogonal multiple access (NOMA) networks is [...] Read more.
Cognitive radio (CR) is a candidate for opportunistic spectrum implementation in wireless communications, allowing secondary users (SUs) to share the spectrum with primary users (PUs). In this paper, a robust adaptive target power allocation strategy for cognitive nonorthogonal multiple access (NOMA) networks is proposed, which involves the maximum transmission power of each SU and interference power threshold under PU constraints. By introducing the signal-to-interference-plus-noise ratio (SINR) adjustment factor, the strategy enables single-station communication to achieve energy efficiency (EE) or high throughput (HT), thus making the target function more flexible. In the same communication scenario, different cognitive users can choose different communication targets that meet their needs. Different QoS can be selected by the same cognitive user at different times. In the case of imperfect channel state information (CSI), semi-infinite (SI) constraints with bounded uncertainty sets are transformed into an optimization problem under the worst case, which is solved by the dual decomposition method. Simulation results show that this strategy has good adaptive selectivity and robustness. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

22 pages, 2964 KiB  
Article
SINR- and MI-Based Double-Robust Waveform Design
by Fengming Xin, Jing Li, Yan Wang and Mingfeng Zhang
Entropy 2022, 24(12), 1841; https://doi.org/10.3390/e24121841 - 17 Dec 2022
Cited by 2 | Viewed by 1915
Abstract
Owing to cognitive radar breaking the open-loop receiving–transmitting mode of traditional radar, adaptive waveform design for cognitive radar has become a central issue in radar system research. In this paper, the method of radar transmitted waveform design in the presence of clutter is [...] Read more.
Owing to cognitive radar breaking the open-loop receiving–transmitting mode of traditional radar, adaptive waveform design for cognitive radar has become a central issue in radar system research. In this paper, the method of radar transmitted waveform design in the presence of clutter is studied. Since exact characterizations of the target and clutter spectra are uncommon in practice, a single-robust transmitted waveform design method is introduced to solve the problem of the imprecise target spectrum or the imprecise clutter spectrum. Furthermore, considering that radar cannot simultaneously obtain precise target and clutter spectra, a novel double-robust transmitted waveform design method is proposed. In this method, the signal-to-interference-plus-noise ratio and mutual information are used as the objective functions, and the optimization models for the double-robust waveform are established under the transmitted energy constraint. The Lagrange multiplier method was used to solve the optimal double-robust transmitted waveform. The simulation results show that the double-robust transmitted waveform can maximize SINR and MI in the worst case; the performance of SINR and MI will degrade if other transmitted waveforms are employed in the radar system. Full article
Show Figures

Figure 1

15 pages, 462 KiB  
Technical Note
Robust MIMO Waveform Design in the Presence of Unknown Mutipath Return
by Chongyi Fan, Zhuang Xie, Jian Wang, Zhou Xu and Xiaotao Huang
Remote Sens. 2022, 14(17), 4356; https://doi.org/10.3390/rs14174356 - 2 Sep 2022
Cited by 1 | Viewed by 1932
Abstract
Assuming uncertain multipath return, this paper considers the robust joint transmit waveform and the receiving filter bank design of a multiple-input–multiple-output (MIMO) radar for multipath exploitation. The actual multipath return is considered to belong to an uncertain set, and we focus on the [...] Read more.
Assuming uncertain multipath return, this paper considers the robust joint transmit waveform and the receiving filter bank design of a multiple-input–multiple-output (MIMO) radar for multipath exploitation. The actual multipath return is considered to belong to an uncertain set, and we focus on the worst-case optimization of the signal-to-interference-plus-noise ratio (SINR) in the output of the filter bank. The design is cast as a non-convex max–min problem, which is very hard to solve. To tackle it, an equivalent reformulation is utilized and a cyclic optimization paradigm is devised. At each iteration, the filter’s optimization problem is equal to a set of separate solvable problems, the closed-form solution to which can be given directly. Moreover, we have shown that the max–min problem for the waveform optimization belongs to the area of generalized fractional programming, and it can be globally solved by resorting to Dinkelbach’s algorithm. Through simulations, the superiority of the proposed algorithm is demonstrated via a number of examples. Full article
(This article belongs to the Special Issue Theory and Applications of MIMO Radar)
Show Figures

Graphical abstract

32 pages, 4427 KiB  
Article
Solution for Interference in Hotspot Scenarios Applying Q-Learning on FFR-Based ICIC Techniques
by Iago Diógenes do Rego and Vicente A. de Sousa
Sensors 2021, 21(23), 7899; https://doi.org/10.3390/s21237899 - 27 Nov 2021
Cited by 2 | Viewed by 2785
Abstract
This work explores interference coordination techniques (inter-cell interference coordination, ICIC) based on fractional frequency reuse (FFR) as a solution for a multi-cellular scenario with user concentration varying over time. Initially, we present the problem of high user concentration along with their consequences. Next, [...] Read more.
This work explores interference coordination techniques (inter-cell interference coordination, ICIC) based on fractional frequency reuse (FFR) as a solution for a multi-cellular scenario with user concentration varying over time. Initially, we present the problem of high user concentration along with their consequences. Next, the use of multiple-input multiple-output (MIMO) and small cells are discussed as classic solutions to the problem, leading to the introduction of fractional frequency reuse and existing ICIC techniques that use FFR. An exploratory analysis is presented in order to demonstrate the effectiveness of ICIC techniques in reducing co-channel interference, as well as to compare different techniques. A statistical study was conducted using one of the techniques from the first analysis in order to identify which of its parameters are relevant to the system performance. Additionally, another study is presented to highlight the impact of high user concentration in the proposed scenario. Because of the dynamic aspect of the system, this work proposes a solution based on machine learning. It consists of changing the ICIC parameters automatically to maintain the best possible signal-to-interference-plus-noise ratio (SINR) in a scenario with hotspots appearing over time. All investigations are based on ns-3 simulator prototyping. The results show that the proposed Q-Learning algorithm increases the average SINR from all users and hotspot users when compared with a scenario without Q-Learning. The SINR from hotspot users is increased by 11.2% in the worst case scenario and by 180% in the best case. Full article
(This article belongs to the Special Issue D2D Communications in 6G Heterogeneous Ultra Dense Networks)
Show Figures

Figure 1

19 pages, 8428 KiB  
Article
An Adaptive Multi-Target Jamming Waveform Design Based on Power Minimization
by Jing Gao, Rihan Wu and Jinde Zhang
Entropy 2020, 22(5), 508; https://doi.org/10.3390/e22050508 - 29 Apr 2020
Cited by 10 | Viewed by 3367
Abstract
With increasing complexity of electronic warfare environments, smart jammers are beginning to play an important role. This study investigates a method of power minimization-based jamming waveform design in the presence of multiple targets, in which the performance of a radar system can be [...] Read more.
With increasing complexity of electronic warfare environments, smart jammers are beginning to play an important role. This study investigates a method of power minimization-based jamming waveform design in the presence of multiple targets, in which the performance of a radar system can be degraded according to the jammers’ different tasks. By establishing an optimization model, the power consumption of the designed jamming spectrum is minimized. The jamming spectrum with power control is constrained by a specified signal-to-interference-plus-noise ratio (SINR) or mutual information (MI) requirement. Considering that precise characterizations of the radar-transmitted spectrum are rare in practice, a single-robust jamming waveform design method is proposed. Furthermore, recognizing that the ground jammer is not integrated with the target, a double-robust jamming waveform design method is studied. Simulation results show that power minimization-based single-robust jamming spectra can maximize the power-saving performance of smart jammers in the local worst-case scenario. Moreover, double-robust jamming spectra can minimize the power consumption in the global worst-case scenario and provide useful guidance for the waveform design of ground jammers. Full article
Show Figures

Figure 1

20 pages, 3726 KiB  
Article
SINR- and MI-Based Maximin Robust Waveform Design
by Bin Wang, Xu Chen, Fengming Xin and Xin Song
Entropy 2019, 21(1), 33; https://doi.org/10.3390/e21010033 - 7 Jan 2019
Cited by 10 | Viewed by 4458
Abstract
Due to the uncertainties of radar target prior information in the actual scene, the waveform designed based on radar target prior information cannot meet the needs of detection and parameter estimation performance. In this paper, the optimal waveform design techniques under energy constraints [...] Read more.
Due to the uncertainties of radar target prior information in the actual scene, the waveform designed based on radar target prior information cannot meet the needs of detection and parameter estimation performance. In this paper, the optimal waveform design techniques under energy constraints for different tasks are considered. To improve the detection performance of radar systems, a novel waveform design method which can maximize the signal-to-interference-plus-noise ratio (SINR) for known and random extended targets is proposed. To improve the performance of parameter estimation, another waveform design method which can maximize the mutual information (MI) between the radar echo and the random-target spectrum response is also considered. Most of the previous waveform design researches assumed that the prior information of the target spectrum is completely known. However, in the actual scene, the real target spectrum cannot be accurately captured. To simulate this scenario, the real target spectrum was assumed to be within an uncertainty range where the upper and lower bounds are known. Then, the SINR- and MI-based maximin robust waveforms were designed, which could optimize the performance under the most unfavorable conditions. The simulation results show that the designed optimal waveforms based on these two criteria are different, which provides useful guidance for waveform energy allocation in different transmission tasks. However, under the constraint of limited energy, we also found that the performance improvement of SINR or MI in the worst case for single targets is less significant than that of multiple targets. Full article
(This article belongs to the Special Issue Information Theory Applications in Signal Processing)
Show Figures

Figure 1

19 pages, 888 KiB  
Article
Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks
by Zhen Li, Tao Jing, Liran Ma, Yan Huo and Jin Qian
Sensors 2016, 16(3), 339; https://doi.org/10.3390/s16030339 - 7 Mar 2016
Cited by 23 | Viewed by 6929
Abstract
The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely [...] Read more.
The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR) at the eavesdropper subject to the Quality of Service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI). By using Semi-Definite Programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be achieved. Simulation results demonstrate the effective performance of the cooperative jamming scheme and the auction framework. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

Back to TopTop