Yo-Won JEONG Kwang-Deok SEO Kyu Ho PARK
Joint source-channel coding (JSCC) is a method to jointly allocate the given total transmission bitrate to the source coding and channel coding to maximize the video quality at the receiving end. In this paper, we propose a practical model for efficiently determining a near-optimal code rate for JSCC in real-time video communications. The conventional code rate decision schemes using analytical source coding distortion model and channel-induced distortion model are usually complex, and typically employ the process of model parameter training which involves potentially high computational complexity and implementation cost. To avoid the complex modeling procedure, we introduce a very simple video quality model based on the playable bitrate which is defined as the total bit amount per unit time that is not affected by the channel loss during transmission including correctly recovered bits by the channel decoder. Because the video quality at the receiving end is clearly commensurate with the playable bitrate, we can easily determine the quality-oriented near-optimal code rate by finding the code rate that maximizes the playable bitrate at the sender side. The proposed playable bitrate model is very simple because it does not require the complex training procedure for obtaining model parameters, which is usually required in the conventional code rate decision method. It is shown by simulations that the proposed code rate decision scheme based on the playable bitrate model can efficiently determine the near-optimal code rate for JSCC in terms of high accuracy on the optimal code rate.
Linglong DAI Jintao WANG Zhaocheng WANG Jun WANG
To realize transmit diversity for the time domain synchronous OFDM (TDS-OFDM) system, this letter proposes the space-time-frequency orthogonal training sequence and the corresponding flexible channel estimation methods. Simulation results indicate that an significant performance improvement could be achieved for low-density parity-check code (LDPC) coded TDS-OFDM system over multi-path fading channels.
Kyungmin PARK Chungha KOH Kangjin YOON Youngyong KIM
In femto/macro cellular networks, the stability and fairness problems caused by the unplanned and random characteristic of femtocells must be solved. By applying queueing theory in IP based femto/macro cellular networks, we found the stability condition, and described two kinds of cell section policies of users. As a main contribution, we provided the adaptive channel distribution algorithm which minimizes the average packet sojourn time at transmitting systems and keeps the whole systems stable and fair among cells. Through experiments in various environments, we analyzed the influence of channel reuse factor, cell selection policies, and the number of femtocells on system performance.
Lei WANG Yueming CAI Weiwei YANG
In this paper, we analyze the impact of channel estimation errors for both decode-and-forward (DF) and amplify-and-forward (AF) cooperative communication systems over Nakagami-m fading channels. Firstly, we derive the exact one-integral and the approximate expressions of the symbol error rate (SER) for DF and AF relay systems with different modulations. We also present expressions showing the limitations of SER under channel estimation errors. Secondly, in order to quantify the impact of channel estimation errors, the average signal-to-noise-ratio (SNR) gap ratio is investigated for the two types of cooperative communication systems. Numerical results confirm that our theoretical analysis for SER is very efficient and accurate. Comparison of the average SNR gap ratio shows that DF model is less susceptible to channel estimation errors than AF model.
Kazutaka NISHINO Shinji TANI Ikuo OKA Shingo ATA
A path diversity is an effective technique to get highly reliable communications in the sensor network. In this paper, the path diversity is examined for a tree network composed of binary symmetric channels (BSC) from the view point of bit error probability (BEP). End-nodes of the network are connected to a fusion center, which sums up the received data. The probability density function (pdf) of decision variable conditioned on a source node data is derived by an iterative algorithm to obtain BEP. Numerical results show that in the case of a majority decision, BEP at the fusion center is almost the same as the BSC crossover probability due to the path diversity effects, even if the number of relay links increases.
Kazushi MURAOKA Kazuhiko FUKAWA Hiroshi SUZUKI Satoshi SUYAMA
This paper proposes a new approach for the joint processing of signal detection and channel estimation based on the expectation-maximization (EM) algorithm in orthogonal frequency division multiplexing (OFDM) mobile communications. Conventional schemes based on the EM algorithm estimate a channel impulse response using Kalman filter, and employ the random walk model or the first-order autoregressive (AR) model to derive the process equation for the filter. Since these models assume that the time-variation of the impulse response is white noise without considering any autocorrelation property, the accuracy of the channel estimation deteriorates under fast-fading conditions, resulting in an increased packet error rate (PER). To improve the accuracy of the estimation of fast-fading channels, the proposed scheme employs a differential model that allows the correlated time-variation to be considered by introducing the first- and higher-order time differentials of the channel impulse response. In addition, this paper derives a forward recursive form of the channel estimation along both the frequency and time axes in order to reduce the computational complexity. Computer simulations of channels under fast multipath fading conditions demonstrate that the proposed method is superior in PER to the conventional schemes that employ the random walk model.
Kai LIU Jinhua GUO Ning LU Fuqiang LIU Xinhong WANG Ping WANG
Dedicated Short Range Communication (DSRC) employs one control channel for safety-oriented applications and six service channels for non-safety commercial applications. However, most existing multi-channel schemes require all neighboring vehicles periodically (e.g. every 100 milliseconds) tune to the control channel for a full update of safety-oriented data before they can switch to the service channels for non-safety services. The safety exchange interval increases with the increase of traffic density. Consequently, under high traffic densities, the service channels are often completely idle while the control channel is congested. We propose a RSU Assisted Multi-channel Coordination MAC (RAMC) protocol that fully utilizes all channels to provide simultaneous safety and non-safety communications. Within the radio range of a roadside unit (RSU), vehicles are free to tune to any service channel. The RSU monitors all the safety messages being transmitted in both the control and service channels. Periodically, the RSU broadcasts a consolidated traffic view report to all neighboring vehicles in all channels. Therefore, a vehicle can operate in a service channel as long as it needs to achieve high throughput for non-safety applications, while maintaining adequate and timely safety awareness. Our simulation results show that the proposed RAMC protocol consistently achieves very high percentage of non-safety usage, while maintaining high safety message delivery ratios in various traffic density conditions.
Kyongkuk CHO Jaeyoon LEE Dongweon YOON
In OFDM systems, in-phase and quadrature (I/Q) imbalances generated in the analog front-end introduce inter-channel interference and, consequently, error performance degradation. This letter provides an exact expression involving the two-dimensional (2-D) Gaussian Q-function for the error probability of an arbitrary 2-D modulated OFDM signal with I/Q imbalances. The effects of I/Q imbalances on the distribution of an AWGN and the error performance are analyzed.
Xin NIE Jianhua ZHANG Ping ZHANG
Relay, which promises to enhance the performance of future communication networks, is one of the most promising techniques for IMT-Advanced systems. In this paper, multiple-input multiple-output (MIMO) relay channels based on outdoor measurements are investigated. We focus on the link between the base station (BS) and the relay station (RS) as well as the link between the RS and the mobile station (MS). First of all, the channels were measured employing a real-time channel sounder in IMT-Advanced frequency band (2.35 GHz with 50 MHz bandwidth). Then, the parameters of multipath components (MPCs) are extracted utilizing space-alternating generalized expectation algorithm. MPC parameters of the two links are statistically analyzed and compared. The polarization and spatial statistics are gotten. The trends of power azimuth spectrum (PAS) and cross-polarization discrimination (XPD) with the separation between the RS and the MS are investigated. Based on the PAS, the propagation mechanisms of line-of-sight and non-line-of-sight scenarios are analyzed. Furthermore, an approximate closed-form expression of channel correlation is derived. The impacts of PAS and XPD on the channel correlation are studied. Finally, some guidelines for the antenna configurations of the BS, the RS and the MS are presented. The results reveal the different characteristics of relay channels and provide the basis for the practical deployment of relay systems.
Yang LI Kazuo SAKIYAMA Shinichi KAWAMURA Kazuo OHTA
This paper shows two power analysis attacks against a software implementation of a first-order DPA resistant S-box algorithm that is based on the discrete Fourier Transform (DFT). The DPA resistant S-box algorithm based on DFT was proposed by Prouff et al. in 2006 and improved by Coron et al. in 2008, respectively. In our attacks against the improved one, we pre-process the power traces by separating them into two subgroups, so that each has a biased mask. For the separated power traces, two post analysis methods are proposed to identify the key. One is based on DPA attack against one subgroup, and the other utilizes the difference of means for two subgroups and a pattern matching. Finally, we compare these two attack methods and propose an algorithm-level countermeasure to enhance the security of S-box calculation based on the DFT.
Seigo NAKAO Tomohumi TAKATA Daichi IMAMURA Katsuhiko HIRAMATSU
Hybrid automatic repeat request (HARQ) is employed for the Evolved Universal Terrestrial Radio Access (E-UTRA) downlink. The base station not only decodes the ACK/NACK signals from the user equipment (UE), but also detects a termination of the transmission (DTX) of the ACK/NACK signals caused by the mis-detection of the downlink control information (DCI) at the UE side. Since ACK/NACK signals from UEs are multiplexed by CDMA, there are sometimes severe inter-code interference (ICI) effects, which significantly degrade the performance of ACK/NACK signals. In order to mitigate such ICI effects, in [1],[2], we proposed a novel phase rotation scheme on the constellations of the uplink ACK/NACK signals, and confirmed the effects on the ACK/NACK bit error rate performance; however, the previous paper did not analyze the effects of the phase rotation on the DTX detection performance. Hence, in this paper, we further analyze the effects of the phase rotation for the ACK/NACK signals in conjunction with a new DTX detection scheme which utilizes equalizer outputs, and investigate the performance of the proposed scheme by means of computer simulations.
Jianqing WANG Kenichiro MASAMI Qiong WANG
The objective of this study is to investigate the feasibility of an ultra wideband (UWB) impulse radio system for in-body to off-body wireless communication for biomedical applications. At first, a UWB antenna is designed in the UWB low band for implant use in the chest. Then the channel model is extracted and established based on the finite difference time domain (FDTD) simulation with an anatomical human body model. The established channel model consists of a small set of parameters for generating discrete time impulse responses. The generated model shows good agreement with the FDTD-calculated result in terms of key communication metrics. For effective communication over the multipath-affected channel, the pulse position modulation is employed and a 2-finger RAKE structure with a constant temporal delay is proposed in the receiver. The bit error rate performance has shown the validity of the system in the in-body to off-body chest channel.
Haiming WANG Xiqi GAO Bin JIANG Xiaohu YOU Wei HONG
In this letter, an improved channel estimator for MIMO-SCBT systems is proposed. Pilot blocks are constructed using quadriphase complementary sequences (QCSs) which enable both one-sided (OSD) and two-sided (TSD) channel estimation (CE). And OSD-CE and TSD-CE are combined to provide improved performance in frequency-selective fast and slow fading channels and to maintain low-complexity implementations. Simulation results demonstrate the performance merits of the proposed scheme.
Chih-Cheng KUO Wern-Ho SHEEN Chang-Lung HSIAO
Channel-factorization aided detector (CFAD) is one of the important low-complexity detectors used in multiple input, multiple output (MIMO) receivers. Through channel factorization, this method transforms the original MIMO system into an equivalent system with a better-conditioned channel where detection is performed with a low-complexity detector; the estimate is then transferred back to the original system to obtain the final decision. Traditionally, the channel factorization is done with the lattice reduction algorithms such as the Lenstra-Lenstra-Lovasz (LLL) and Seysen's algorithms with no consideration of the low-complexity detector used. In this paper, we propose a different approach: the channel factorization is designed specifically for the minimum mean-square-error (MMSE) detector that is a popular low-complexity detector in CFADs. Two new types of factorization algorithms are proposed. Type-I is LLL based, where the well-known DLLL-extended algorithm, the LLL algorithm working on the dual matrix of the extended channel matrix, is a member of this type but with a higher complexity. DLLL-extended is the best-performed factorization algorithm found in the literature, Type-II is greedy-search based where its members are differentiated with different algorithm's parameters. Type-II algorithms can provide around 0.5-1.0 dB gain over Type-I algorithms and have a fixed computational complexity which is advantageous in hardware implementation.
Hironobu YAMAMOTO Masato KOIWAI Takehiko KOBAYASHI
This paper describes ultra wideband (UWB) radio propagation measurements and modeling for wireless body area network (WBAN) applications in different environments. Several propagation measurement campaigns and associated modelings were carried out in either a radio anechoic chamber or a specific room type; however, dependence of the radio propagation on surrounding environments was not studied. Multipaths (mainly reflected from floor, ceiling, and walls) highly depend on the environment. To address this problem, radio propagation around the human body was measured in a radio anechoic chamber and four different-sized rooms. Parameters in a conventional loss model derived from the measurements were found to significantly diverge and depend on room volume and line-of-sight (LOS)/non-LOS (NLOS) cases. A modified model considering the impact of room volume has been proposed for the LOS/NLOS cases. Different propagation mechanisms were discussed along with parameter derivation. Probability distributions for the UWB propagation losses were also examined.
Ryuta NARA Kei SATOH Masao YANAGISAWA Tatsuo OHTSUKI Nozomu TOGAWA
Scan-based side-channel attacks retrieve a secret key in a cryptography circuit by analyzing scanned data. Since they must be considerable threats to a cryptosystem LSI, we have to protect cryptography circuits from them. RSA is one of the most important cryptography algorithms because it effectively realizes a public-key cryptography system. RSA is extensively used but conventional scan-based side-channel attacks cannot be applied to it because it has a complicated algorithm. This paper proposes a scan-based side-channel attack which enables us to retrieve a secret key in an RSA circuit. The proposed method is based on detecting intermediate values calculated in an RSA circuit. We focus on a 1-bit time-sequence which is specific to some intermediate values. By monitoring the 1-bit time-sequence in the scan path, we can find out the register position specific to the intermediate value and we can know whether this intermediate value is calculated or not in the target RSA circuit. We can retrieve a secret key one-bit by one-bit from MSB to LSB. The experimental results demonstrate that a 1,024-bit secret key used in the target RSA circuit can be retrieved using 30.2 input messages within 98.3 seconds and its 2,048-bit secret key can be retrieved using 34.4 input within 634.0 seconds.
Ian Dexter GARCIA Kei SAKAGUCHI Kiyomichi ARAKI
A Gaussian MIMO broadcast channel (GMBC) models the MIMO transmission of Gaussian signals from a transmitter to one or more receivers. Its capacity region and different precoding schemes for it have been well investigated, especially for the case wherein there are only transmit power constraints. In this paper, a special case of GMBC is investigated, wherein receive power constraints are also included. By imposing receive power constraints, the model, called protected GMBC (PGMBC), can be applied to certain scenarios in spatial spectrum sharing, secretive communications, mesh networks and base station cooperation. The sum capacity, capacity region, and application examples for the PGMBC are discussed in this paper. Sub-optimum precoding algorithms are also proposed for the PGMBC, where standard user precoding techniques are performed over a BC with a modified channel, which we refer to as the "protection-implied BC." In the protection-implied BC, the receiver protection constraints have been implied in the channel, which means that by satisfying the transmit power constraints on the protection implied channel, receiver protection constraints are guaranteed to be met. Any standard single-user or multi-user MIMO precoding scheme may then be performed on the protection-implied channel. When SINR-matching duality-based precoding is applied on the protection-implied channel, sum-capacity under full protection constraints (zero receive power), and near-sum-capacity under partial protection constraints (limited non-zero receive power) are achieved, and were verified by simulations.
Naohiko IWAKIRI Takehiko KOBAYASHI
A multiband system can flexibly create spectral holes to avoid interference between different systems. When two systems within the same frequency band coexist, the multiband system must immediately detect the signals from all users to remove unwanted interference. The complication of creating spectral holes is to obtain an occupied frequency band and an angle-of-arrival of interfering system. These parameters must be measured at the receiver of multiband system and then fed back to the transmitter. This paper presents a channel estimator with an interference detector that is developed to implement and test it's functionality in a multiband system. The proposed estimator can precisely detect the parameters before demodulation, and quickly feed back the interfering system parameters to transmitter. The effective design and the detection error rate were evaluated via verification tests in an anechoic chamber and computer simulations. The results of the proposed technique show an ability of interference detection as well as channel estimation.
We present an orthogonal frequency division multiple access (OFDMA) based multichannel slotted ALOHA for cognitive radio networks (OMSA-CR). The performance of an infinite population based OMSA-CR system is analyzed in terms of channel capacity, throughput, delay, and packet capture effect. We investigate the channel capacity for OMSA-CR with perfect or imperfect spectrum sensing. We introduce the proposed CR MAC based on two channel selection schemes: non-agile channel selection (NCS) and agile channel selection (ACS). Comparing them, we show the tradeoff between complexity and system performance. We verify the proposed CR system model using numerical analysis. In particular, using simulation with a finite populated linear feedback model, we observe the OMSA-CR MAC tradeoff between throughput and minimum delay whose results matched those of the analytical framework. Numerical results for the proposed system throughput are also compared to conventional MACs, including pure ALOHA based CR MAC.
Daisuke SUZUKI Minoru SAEKI Koichi SHIMIZU Akashi SATOH Tsutomu MATSUMOTO
A design methodology of Random Switching Logic (RSL) using CMOS standard cell libraries is proposed to counter power analysis attacks against cryptographic hardware modules. The original RSL proposed in 2004 requires a unique RSL-gate for random data masking and glitch suppression to prevent secret information leakage through power traces. In contrast, our new methodology enables to use general logic gates supported by standard cell libraries. In order to evaluate its practical performance in hardware size and speed as well as resistance against power analysis attacks, an AES circuit with the RSL technique was implemented as a cryptographic LSI using 130-nm and 90-nm CMOS standard cell library. From the results of attack experiments that used a million traces, we confirmed that the RSL-AES circuit has very high DPA and CPA resistance thanks to the contributions of both the masking function and the glitch suppressing function.