Table of Contents Author Guidelines Submit a Manuscript
International Journal of Antennas and Propagation
Volume 2015 (2015), Article ID 594791, 12 pages
http://dx.doi.org/10.1155/2015/594791
Research Article

Aligned Space Time Block Codes for the 2-User X Channel with Secrecy Constraints

Department of EEC Engineering, Korea Tech, Cheonan 330-708, Republic of Korea

Received 18 March 2015; Revised 29 June 2015; Accepted 1 July 2015

Academic Editor: Junping Geng

Copyright © 2015 Manar Mohaisen. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Iyer, C. Rosenberg, and A. Karnik, “What is the right model for wireless channel interference?” IEEE Transactions on Wireless Communications, vol. 8, no. 5, pp. 2662–2671, 2009. View at Publisher · View at Google Scholar · View at Scopus
  2. J. H. Lee, D. Toumpakaris, and W. Yu, “Interference mitigation via joint detection,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 6, pp. 1172–1184, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. W. Chen, K. B. Letaief, and Z. Cao, “Network interference cancellation,” IEEE Transactions on Wireless Communications, vol. 8, no. 12, pp. 5982–5995, 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Mohaisen and K. H. Chang, “Maximum-likelihood co-channel interference cancellation with power control for cellular OFDM networks,” in Proceedings of the IEEE International Symposium on Communications and Information Technologies (ISCIT '07), pp. 198–202, October 2007.
  5. S. A. Jafar and S. Shamai, “Degrees of freedom region of the MIMO X channel,” IEEE Transactions on Information Theory, vol. 54, no. 1, pp. 151–170, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. S. M. Alamouti, “A simple transmit diversity technique for wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 8, pp. 1451–1458, 1998. View at Publisher · View at Google Scholar · View at Scopus
  7. V. Tarokh, H. Jafarkhani, and A. R. Calderbank, “Space-time block codes from orthogonal designs,” IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1456–1467, 1999. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. H. El Gamal and R. Hammons Jr., “On the design of algebraic space-time codes for MIMO block-fading channels,” IEEE Transactions on Information Theory, vol. 49, no. 1, pp. 151–163, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. L. Li, H. Jafarkhani, and S. Jafar, “When Alamouti codes meet interference alignment: transmission schemes for two-user X channel,” in Proceedings of the IEEE International Symposium on Information Theory Proceedings (ISIT '11), pp. 2717–2721, July 2011.
  10. M. Mohaisen and K. H. Chang, “Fixed-complexity sphere encoder for multi-user MIMO systems,” Journal of Communications and Networks, vol. 13, no. 1, pp. 63–69, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. E. Ekrem and S. Ulukus, “The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel,” IEEE Transactions on Information Theory, vol. 57, no. 4, pp. 2083–2114, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. G. Geraci, J. Yuan, A. Razi, and I. B. Collings, “Secrecy sum-rates for multi-user MIMO linear precoding,” in Proceedings of the 8th International Symposium on Wireless Communication Systems (ISWCS '11), pp. 286–290, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. S. A. Fakoorian, H. Jafarkhani, and A. L. Swindlehurst, “Secure space-time block coding via artificial noise alignment,” in Proceedings of the Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers (ASILOMAR '11), pp. 651–655, November 2011.
  14. T. Allen, J. Cheng, and N. Al-Dhahir, “Secure space-time block coding without transmitter CSI,” IEEE Wireless Communications Letters, vol. 3, no. 6, pp. 573–576, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. A. T. Parameswaran, M. I. Husain, and S. Upadhyaya, “Is RSSI a reliable in sensor localization algorithms an experimental study,” in Proceedings of the International Symposium on Reliable Distributed Systems, pp. 1–5, Niagara Falls, NY, USA, September 2009.
  16. S. Oliveira and O. Zaïane, “Privacy preserving clustering by data transformation,” in Proceedings of the Brazilian Symposium on Databases (SBBD '03), pp. 304–318, 2003.
  17. A. Mohaisen and D. Hong, “Mitigating the ICA attack against rotation-based transformation for privacy preserving clustering,” ETRI Journal, vol. 30, no. 6, pp. 868–870, 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Guo and X. Wu, “Deriving private information from arbitrarily projected data,” in Proceedings of the 11th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD '07), pp. 84–95, 2007.
  19. F. Khan, LTE for 4G Mobile Broadband: Air Interface and Performance, Cambridge University Press, Cambridge, UK, 2009. View at Publisher · View at Google Scholar