A novel metaheuristic based Interference Alignment for K-User Interference Channel: A comparative study

Author(s):  
Lysa Ait Messaoud ◽  
Fatiha Merazka ◽  
Daniel Massicotte
2014 ◽  
Vol 548-549 ◽  
pp. 1368-1376
Author(s):  
Xue Lei Lv ◽  
Guo Mei Zhang ◽  
Guo Bing Li ◽  
Gang Ming Lv ◽  
Chao Zhang

Partial interference alignment (PIA) strategies for the K-user interference channel are considered. Two schemes are proposed to align the partial interference for the downlink interference channel in the case ofK>3. In the first scheme, strong interferences are limited as much as possible by aligning the two strongest interferers into a same subspace at the receiver. While the second scheme is to design its precoding matrix (or vector) by selecting the precoder pair which maximizes the chordal distance between designed signal subspace and interference signal subspace in the set of pecoding matrices (or vectors) at each transmitter. Simulation results show that compared with the existing schemes which don’t optimize the precoder, such as Fixed-PIA, the proposed schemes can improve the sum rates significantly by selecting IA forms in multi-input multi-output (MIMO) systems.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 97253-97263 ◽  
Author(s):  
Xiaqing Miao ◽  
Shaoshi Yang ◽  
Changhong Wang ◽  
Shuai Wang ◽  
Lajos Hanzo

Entropy ◽  
2019 ◽  
Vol 21 (11) ◽  
pp. 1092
Author(s):  
Mohamed Seif ◽  
Ravi Tandon ◽  
Ming Li

In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT). We propose a novel secure retrospective interference alignment scheme in which the transmitters carefully mix information symbols with artificial noises to ensure confidentiality. Achieving positive secure degrees of freedom (SDoF) is challenging due to the delayed nature of CSIT, and the distributed nature of the transmitters. Our scheme works over two phases: Phase one, in which each transmitter sends information symbols mixed with artificial noises, and repeats such transmission over multiple rounds. In the next phase, each transmitter uses the delayed CSIT of the previous phase and sends a function of the net interference and artificial noises (generated in previous phase), which is simultaneously useful for all receivers. These phases are designed to ensure the decodability of the desired messages while satisfying the secrecy constraints. We present our achievable scheme for three models, namely: (1) K-user interference channel with confidential messages (IC-CM), and we show that 1 2 ( K - 6 ) SDoF is achievable; (2) K-user interference channel with an external eavesdropper (IC-EE); and 3) K-user IC with confidential messages and an external eavesdropper (IC-CM-EE). We show that for the K-user IC-EE, 1 2 ( K - 3 ) SDoF is achievable, and for the K-user IC-CM-EE, 1 2 ( K - 6 ) is achievable. To the best of our knowledge, this is the first result on the K-user interference channel with secrecy constrained models and delayed CSIT that achieves an SDoF which scales with K , square-root of number of users.


Sign in / Sign up

Export Citation Format

Share Document