Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  multiple access channels
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
It is commonly known that physical layer security is achieved with a trade-off in terms of the achievable rate. Hence, security constraints generate rate losses in wiretap channels. To mitigate such rate losses in multi-user channels, we propose a coding/decoding scheme for multi-user multiple access wiretap channel (MAC-WT), where previously transmitted messages are used as a secret key to enhance the secrecy rates of the transmitting users, until the usual Shannon capacity region of a multiple access channel (MAC) is achieved without the secrecy constraint. With this coding scheme, all messages transmitted in the recent past are secure with respect to all the information of the eavesdropper till now. To achieve this goal, we introduce secret key buffers at both the users and the legitimate receiver. Finally, we consider a fading MAC-WT and show that with this coding/decoding scheme, we can achieve the capacity region of a fading MAC channel (in the ergodic sense).
EN
This paper considers a fading cognitive multiple access channel (CMAC), where multiple secondary users (SUs), who share the spectrum with a primary user (PU), transmit to a cognitive base station (CBS). A power station is assumed to harvest energy from the nature and then provide power to the SUs. We investigate the power allocation problems for such a CMAC to maximize the SU sum rate under the interference power constraint, the sum transmit power constraint and the peak transmit power constraint of each individual SU. In particular, two scenarios are considered: with successive interference cancellation (SIC) and without SIC. For the first scenario, the optimal power allocation algorithm is derived. For the second scenario, a heuristic algorithm is proposed. We show that the proposed algorithm with SIC outperforms the algorithm without SIC in terms of the SU sum rate, while the algorithm without SIC outperforms the algorithm with SIC in terms of the number of admitted SUs for a high sum transmit power limit and a low peak transmit power limit of each individual SU.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.