Distributed PHY-layer mesh networks

被引:1
|
作者
Dohler, M [1 ]
Aghyami, H [1 ]
机构
[1] Kings Coll London, Ctr Telecommun Res, London WC2R 2LS, England
关键词
D O I
10.1109/PIMRC.2003.1259184
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mesh connectivity is traditionally dealt with at IP-layer. where packets are relayed to adjacent network nodes according to prior specified rules. Recently, the concept of data relaying at PHY-layer has gained widespread interest, where regenerative and transparent relaying are feasible (1). In parallel, investigations into MIMO systems have become mature. The Current paper introduces a generalised concept of data relaying at PHY layer, where relaying is combined with MIMO technology. The thus created distributed PHY-layer mesh network is a natural generalisation of previously introduced Virtual Antenna Arrays [2]-[8].
引用
收藏
页码:2543 / 2547
页数:5
相关论文
共 50 条
  • [1] Distributed PHY-layer mesh networks
    Centre for Telecommunications Research, King's College London, United Kingdom
    [J]. IEEE Int Symp Person Indoor Mobile Radio Commun PIMRC, 1600, (2543-2547):
  • [2] Capacity of distributed PHY-layer sensor networks
    Dohler, M
    Gkelias, A
    Aghvami, AH
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (02) : 622 - 639
  • [3] Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks
    Soosahabi, Reza
    Naraghi-Pour, Mort
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1118 - 1126
  • [4] Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks
    Soosahabi, Reza
    Naraghi-Pour, Mort
    [J]. 2012 IEEE VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2012,
  • [5] Detecting PHY-Layer Spoofing Attack in Wireless Networks
    Chang, Bo
    Zhao, Guodong
    Chen, Zhi
    Dan, Jiangxun
    [J]. 2017 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2017,
  • [6] PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
    Xiao, Liang
    Li, Yan
    Han, Guoan
    Liu, Guolong
    Zhuang, Weihua
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (12) : 10037 - 10047
  • [7] Learning-Based PHY-Layer Authentication for Underwater Sensor Networks
    Xiao, Liang
    Sheng, Geyi
    Wan, Xiaoyue
    Su, Wei
    Cheng, Peng
    [J]. IEEE COMMUNICATIONS LETTERS, 2019, 23 (01) : 60 - 63
  • [8] PHY-Layer Resiliency in OFDM Communications: A Tutorial
    Shahriar, Chowdhury
    La Pan, Matt
    Lichtman, Marc
    Clancy, T. Charles
    McGwier, Robert
    Tandon, Ravi
    Sodagari, Shabnam
    Reed, Jeffrey H.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (01): : 292 - 314
  • [9] PHY-Layer Key Exchange for Wireless Communication
    Roogi, Shashikala B.
    Kounte, Manjunath R.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 293 - 299
  • [10] Opinion: PHY-Layer Security is no Alternative to Cryptography
    Robyns, Pieter
    Quax, Peter
    Lamotte, Wim
    [J]. PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 160 - 162