透過您的圖書館登入
IP:18.224.54.168
  • 學位論文

用於無線多輸入多輸出系統之差異性通道估測及訓練序列設計

Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems

指導教授 : 祁忠勇 張縱輝

摘要


This thesis proposes a training-based channel estimation scheme for achieving quality-of-service discrimination between legitimate and unauthorized receivers in wireless multiple-input multiple-output (MIMO) channels. The proposed method has applications ranging from user discrimination in wireless TV broadcast systems to the prevention of eavesdropping in secret communications. By considering a wireless MIMO system that consists of a multiple-antenna transmitter, a legitimate receiver (LR) and an unauthorized receiver (UR), we propose a multi-stage training-based discriminatory channel estimation (DCE) scheme that aims to optimize the channel estimation performance of the LR while limiting the channel estimation performance of the UR. The key idea is to exploit the channel estimate fed back from the LR at the beginning of each stage to enable the judicious use of artificial noise (AN) in the training signal. Specifically, with knowledge of the LR's channel, AN can be properly superimposed on the training data to degrade the UR's channel estimation performance without causing strong interference on the LR. The channel estimation performance of the LR in earlier stages may not be satisfactory due to the inaccuracy of the channel estimate and constraints on the UR's estimation performance, but can improve rapidly in later stages as the quality of channel estimate improves. The training data power and AN power are optimally allocated by minimizing the normalized mean squared error (NMSE) of the LR subject to a lower limit constraint on the NMSE of the UR. The proposed DCE scheme is then extended to the case with multiple LRs and multiple URs. Simulation results are presented to demonstrate the effectiveness of the proposed DCE scheme.

參考文獻


[2] C. E. Landwehr and D. M. Goldschlag, “Secure issues in networks with internet
access,” Proc. IEEE, vol. 85, pp. 2034–2051, Dec. 1997.
[4] ——, “Design and implementation of physical layer private key setting for wireless
[5] A. D. Wyner, “The wiretap channel,” Bell System Technical Journal, vol. 54,
pp. 1355–1387, 1975.

延伸閱讀