Professional Documents
Culture Documents
Sample1 2column
Sample1 2column
Sample1 2column
Abstract—In this paper1 , we propose a novel cooperative existing MA-DCSK systems, cooperative communication (CC)
scheme to enhance the performance of multiple-access (MA) technique has never been applied, for which the cooperative
differential-chaos-shift-keying (DCSK) systems. We provide the method developed in [5], [6] is not applicable.
bit-error-rate (BER) performance and throughput analyses for
the new system with a decode-and-forward (DF) protocol over In this paper, we propose a novel cooperative scheme for
Nakagami-m fading channels. Our simulated results not only the MA-DCSK systems, forming a MA-DCSK-CC system,
show that this system significantly improves the BER per- to improve the performance of communications. We analyze
formance as compared to the existing DCSK non-cooperative the bit-error-rate (BER) performance and the throughput of
(DCSK-NC) system and the multiple-input multiple-output
the new system under a decode-and-forward (DF) relaying
DCSK (MIMO-DCSK) system, but also verify the theoretical
analyses. Furthermore, we show that the throughput of this protocol over Nakagami-m fading channels. Both theoreti-
system approximately equals that of the DCSK-NC system, both cal analyses and computer simulations demonstrate that the
of which have prominent improvements over the MIMO-DCSK proposed system has significant performance improvement
system. We thus believe that the proposed system can be a good in comparison with the DCSK non-cooperative (DCSK-NC)
framework for chaos-modulation-based wireless communications.
system and the MIMO-DCSK system. Moreover, we show that
E
the throughput of the proposed system is almost the same as
I. I NTRODUCTION that of the DCSK-NC system, superior to that of the MIMO-
DCSK system.
L
In wireless communication applications, such as wireless
personal area networks (WPAN) and sensor networks (WSN),
multipath fading is a major factor that deteriorates the quality II. S YSTEM M ODEL
P
of information transmission. As a spread-spectrum modula- A. Overview of MA-DCSK System
tion, differential chaos shift keying (DCSK) offers a promising
solution to mitigate the effect of fading in such systems [1]. For an N -user MA-DCSK system, the orthogonal Walsh
M
The DCSK communication system can be easily imple- code sequences are adopted to eliminate interference among
mented in hardware since it can work without synchronization users (i.e., there is no interference among users if Walsh code
nor channel estimation but requiring only frame and symbol is used) [8]. In such a system, the 2n -order Walsh code is
A
rate samplings, which makes it very promising in WPAN and defined to accommodate N users, where
WSN applications [2]. In recent years, some variants of the
W2n−1 W2n−1
W 2n = , n = 1, 2, ... (1)
S
DCSK modulation technique have been proposed [3], [4]. W2n−1 −W2n−1
Aiming to further overcome the signal fading arising from
multipath propagation, cooperative diversity has been applied in which 2n = 2N and W20 = W1 = 1.
to the conventional DCSK system to construct a two-user Each DCSK modulated signal includes 2N sub-segments.
cooperative DCSK system [5], [6]. Let β denote the length of each carrier segment (i.e., sub-
Another desirable application of DCSK is to be com- spreading factor). Then, the global spreading factor is kept at
bined with multiple-access (MA) techniques. Recently, a large 2N β. The lth transmitted signal of the Kth user is given by
amount of research work have been devoted to MA-DCSK 2N −1
systems [7], [8]. In particular, the Walsh code has been used T
sK,bl = w2K−bl ,j c t − j , 0 < t < T (2)
to ensure the orthogonality of DCSK channels [8], so that the j=0 2N
interference among different users can be avoided. In [9], the
where bl = {0, 1} represents the lth transmitted symbol, wi,j
multiply-antenna relay was adopted in the MA-DCSK system
represents the (i, j)th element of the 2N -order Walsh code,
(i.e., MIMO-DCSK system) to increase the robustness against
and c(t) represents the chaotic carrier.
signal fading. However, to the best of our knowledge, in all
At the receiver, we assume perfect timing synchronization
1 This work was supported by China NSF under Grants 61001073, 61102134 and utilize the generalized maximum likelihood (GML) detec-
and 61271241. tor [10] to demodulate the received signals.
¦ X k (t )
(m1 = m2 = · · · = mL = m) are kept constant for all path-
UN UN
1st phase
kzN
2nd phase
components. Also,assume that Lthe receiver can capture all
paths power, i.e., l=1 Ωl = l=1 E(αl2 ) = 1.
L
Fig. 1. Basic model of the N -user MA-DCSK-CC system.
User
a transmission period
III. P ERFORMANCE A NALYSES
Number #
UN XN(t) ¦
N
kzN
X k (t) XN(t) ¦
N
k zN
(t)
Xk
In this section, the BER performance and throughput of
. .
. . the proposed MA-DCSK-CC system are analyzed over a
. .
UK XK(t) ¦
N
(t)
X XK(t) ¦
N
X k (t)
Nakagami-m fading channel. To simplify the analysis, assum-
kzK k kzK
.
.
. .
ing that the energy per bit of each user is constant, denoted by
.
.
N N Eb , and the energy is allocated uniformly to every transmission
U1 X1(t) ¦ kz1
X k (t) X1(t) ¦ kz1
X k (t)
t phase. Moreover, we assume that the time delay τl is much
Fig. 2. Cooperative scheme of the N -user MA-DCSK-CC system. shorter than the bit duration (2N βTs τl , where Ts is the
sampling period) such that the inter-symbol interference can
B. MA-DCSK-CC System be ignored. Also, the equal-gain combiner (EGC) is employed
The full-duplex system model is shown in Fig. 1. Refer- at the receiver for easy implementation.
ring to this figure, the transmission period is divided into A. BER Performance
two phases, namely 1st phase and 2nd phase. In the 1st
phase, the Kth (K = 1 ∼ N ) user UK broadcasts its Here, we derive the BER expression of UK in the N -user
message XK (t) to other terminals. In the 2nd phase, UK MA-DCSK system, since all users in such a scenario have
helps the remainder N − 1 to forward their messages. Us- the same error performance. Let dSD , dSR , dRD denote the
ing the DF protocol, UK transmits the reconstructed sig- distance from source to destination (S → D), source to relay
1 (t), · · · , X
nals, i.e., F (X K−1 (t), X
K+1 (t), · · · , X
N (t)) = (S → R) and relay to destination (R → D) links, respectively;
N hence, dSD : dSR : dRD represents the geometric positions of
k=K Xk (t) (Xk (t) is the reconstructed signal of Xk (t)),
all terminals. The path loss of a (S → D) link is defined by
to the destination if it decodes correctly; otherwise, it remains
P LSD = 1/d2SD .
idling. Based on the above description, the cooperative scheme
The total BER under the DF protocol is described as
of the system is illustrated in Fig. 2. According to such a
scheme, the received signals are expressed as BERCC−DF = BERSR ·BERSD +(1−BERSR )·BERD (8)
N
1 1 where BERSR , BERSD , and BERD denote the BERs at the
rK (t) = Hk,K ⊗ Xk (t) + ZK (t) (3)
k=K
N relay receiver with the signal from source, at the destination
1 1
rD (t) = Hk,D ⊗ Xk (t) + ZD (t) (4) receiver with the signal from source, and at the destination
k=1
N receiver with all signals from source and relays, respectively.
N Let γ denote the received signal-to-noise ratio (SNR) of
2
rD (t) = HK,D ⊗ Xk (t) + ZD 2
(t) (5)
k=K a link. Then, the BER of such a link can be obtained by
K=1
averaging the conditional BER of γ, as follows:
Here, the superscripts “1” and “2” denote the 1st phase and ∞
the 2nd phase, respectively; [K, k] = 1 ∼ N ; ⊗ denotes BER = BER(γ)f (γ)dγ (9)
1
convolution; rK (t) represents the received signals at UK in 0
i
the 1st phase while rD (t) (i = 1, 2) represents the received where BER(γ) and f (γ) are the conditional BER and PDF
i i
signals at destination in the ith phase; ZR (t) and ZD (t) are of the received SNR. Specifically, BER(γ) is given by [11]
white Gaussian noise random variables (RV) with zero mean − 12
and variance N0 /2; Hk,K , Hk,D , and HK,D are the channel 1 4 β
BER(γ) = erfc 1+ (10)
impulse responses of links Uk → UK , Uk → D, and UK → D, 2 γ 2γ
respectively, which can be represented as
To obtain the explicit expressions of BERSR , BERSD and
L
H= αl δ(t − τl ) (6) BERD . We firstly need to deduce the PDF of received SNRs
l=1 of the three links: f (γSR ), f (γSD ) and f (γRD ).
where αl and τl are the attenuation and time delay of the lth In the 1st phase, the received SNR of link S → Rk (i.e.,
path, respectively, and L is the number of multipaths. More- UK → Uk , k = K) can be written as
over, the attenuation αl follows a Nakagami-ml distribution, L L
with the probability density function (PDF) given by γSRk = γl = (Eb /N0 )(2d2SRk ) αl2 (11)
l=1 l=1
ml
2 ml ml where Eb is the bit energy (the energy consumed in the 1st
f|αl | (x) = x2ml −1 exp − x2 (7)
Γ(ml ) Ωl Ωl phase is Eb /2), and γl is the instantaneous SNR of the lth path.
278
It is well known that the square of a Nakagami-m-distributed Substituting (10) and (16) into (9) yields
RV follows a gamma distribution, denoted as G(m, Ω/m), ∞
with the PDF as follows: BERD = BER(γD )f (γD )dγD (18)
0
m−1 −x/(Ω/m)
x e
f (x) = , x>0 (12) Similarly, with the help of (10) (the conditional BER expres-
(Ω/m)m Γ(m) sions of different links are identical), BERSR and BERSD
Based on the Nakagami-ml -distributed RV αl , we obtain the can be calculated by substituting (13) and (14) into (9),
PDF of γl , as γl = 2N0Edb2 αl2 ∼ G(ml , 2N0EmblΩdl2 ). Hence, respectively, giving
SRk
γSR is further derived as [9]
SRk
∞
BERSR = BER(γSR )f (γSR )dγSR (19)
L Eb L Ωl 0
γSRk ∼ G l=1 ml , 2N0 d2SR
l=1
L
l=1 ml ∞
k (13) BERSD = BER(γSD )f (γSD )dγSD (20)
Eb /N0
= G mL, 2mLd2 = G(x1 , y1 ) 0
SRk
Finally, by combining (18), (19), (20), and (8), the BER of
Here, ml = m, d2SRk = d2SR , x1 and y1 are used as short-hand the proposed system, i.e., BERCC−DF , is formulated.
notations for mL and (Eb /N0 )/(2mLd2SRk ), respectively. As
the N − 1 relays decode the received signal independently, the B. Throughput
equivalent received SNR of link S → R equals γSRk , namely, Assume that the normalized throughput is defined as the
γSR = γSRk . average number of successfully received bits/symbols after
Likewise, the received SNR of link S → D is expressed by error detection in each transmission period (as in [13]). Conse-
quently, the throughput η is a decreasing function of the BER.
Eb L
Eb /N0
γSD = α 2
∼ G mL, = G(x2 , y2 ) Based on such a definition, the normalized throughput of the
2N0 d2SD l
2mLd2SD proposed system is given by
l=1
(14)
ηCC = 1 − BERCC−DF (21)
where x2 and y2 are short-hand notations for mL and
(Eb /N0 )/(2mLd2SD ), respectively. Also, the normalized throughput of the MA-DCSK-NC system
Moreover, in the 2nd phase, one can get the distribu- [8] and MIMO-DCSK system [9] are as follows:
tion of the received SNR of link Rk → D as γRk D ∼
ηNC = 1 − BERNC−DF (22)
Eb /N0
G(mL, 2(N −1)mLd 2 ), where d2Rk D = d2RD . Adopting the
Rk D N −1
EGC method, γRD is readily obtained through combining all ηMIMO = (1 − BERMIMO−DF ) (23)
N − 1 received SNR at the destination receiver, resulting in N
N where the BER expressions of the DCSK-NC system,
Eb /N0
γRD = k=K γRk D ∼ G (N − 1)mL, 2(N −1)mLd 2 i.e., BERNC−DF , and the MIMO-DCSK system, i.e.,
RD
279
0
0
10 10
10
−1 m=1,2,3,4
−1
10
−2
10
−2
10 −3
10
BER
BER
−4
−3 10
10
Simulated DCSK−NC
−5
Theoretical DCSK−NC 10
−4 Simulated MIMO−DCSK
10
Theoretical MIMO−DCSK −6
10 Simulated DCSK−CC
Simulated DCSK−CC
Theoretical DCSK−CC Theoretical DCSK−CC
−5 −7
10 10
0 2 4 6 8 10 12 14 16 18 20 22 24 0 2 4 6 8 10 12 14 16 18 20 22
Eb/No (dB) Eb/No (dB)
Fig. 3. BER performance of the three MA-DCSK systems. Fig. 5. BER performance of the MA-DCSK-CC system with different fading
depths.
1
DCSK−NC
0.9
MIMO−DCSK
DCSK−CC
the DF protocol over Nakagami-m fading channels, which
agree with the simulation results almost perfectly. Comparing
0.8
with the existing DCSK-NC and MIMO-DCSK systems, the
0.7 proposed system not only shows excellent BER performance
η
280