Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Keonkook Lee is active.

Publication


Featured researches published by Keonkook Lee.


personal, indoor and mobile radio communications | 2013

Energy efficiency analysis with circuit power consumption in massive MIMO systems

Daehan Ha; Keonkook Lee; Joonhyuk Kang

It was shown that the required transmit power to support a target achievable rate is inversely proportional to the number of antennas in massive multiple-input multiple-output (MIMO) systems [1]. However, the consumed power of the massive MIMO systems should include not only transmit power but also the fundamental power for operating the circuit at the transmitter, because the effect of circuit power consumption is more serious when the transmitter is equipped with massive number of antennas. Hence, to analyze the exact power consumption of massive MIMO systems, we investigate the energy efficiency for multiple cellular systems with large-scale antenna arrays under a consideration of circuit power consumption of each antenna. In particular, we propose a new power consumption model that considers not only transmit power on the power amplifier but also circuit power dissipated by analog devices and residually lossy factors in base stations (BSs). Through new energy efficiency formulation based on the proposed power consumption model, we analyze the tendency of the energy efficiency as the number of antennas increases and can see that the energy efficiency becomes a quasi-concave function with respect to the number of antennas. Finally, from the derived function of the energy efficiency, we determine the number of antennas to provide the maximum energy efficiency.


IEEE Transactions on Vehicular Technology | 2013

Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy

Keonkook Lee; Chan-Byoung Chae; Joonhyuk Kang

Spectrum leasing via cooperation refers to the possibility for primary users to lease part of the spectral resources to secondary users in exchange for cooperation. This paper proposes a novel implementation of this concept in which secondary cooperation aims at improving the secrecy of the primary link. In particular, a secondary transmission with multiple antennas creates interference on both primary and eavesdropping receivers but an appropriately designed beamformer may impair more the eavesdroppers reception and thus enhance primary secrecy. Design of the secondary beamformer that maximizes the primary secrecy rate while guaranteeing a minimal secondary rate is studied. It is proved that the problem can be solved in a domain that includes only two real numbers irrespective of the number of antennas. Numerical results show that the proposed spectrum leasing strategy increases the primary secrecy rate compared to the case of no spectrum leasing for a wide range of secondary minimum rate constraints.


IEEE Transactions on Wireless Communications | 2011

MIMO Transceiver Designs for Spatial Sensing in Cognitive Radio Networks

Keonkook Lee; Chan-Byoung Chae; Robert W. Heath; Joonhyuk Kang

We propose transceiver algorithms in cognitive radio networks where the cognitive users are equipped with multiple antennas. Prior work has focused on the design of precoding matrices to suppress interference to the primary receivers. This work considers designs of precoding and decoding matrices for spatial sensing to achieve two objectives: (i) to prevent interference to the primary receivers and (ii) to remove the interference, due to primary transmissions, at the secondary receiver. With single antenna primary terminals and two antenna cognitive terminals, a linear transceiver design has been introduced under a global channel state information (CSI) assumption . In this letter, multiple antenna primary and cognitive terminals and three different CSI scenarios depending upon the amount of CSI are studied: (i) local CSI, (ii) global CSI, and (iii) local CSI with side information. When local CSI is available, we leverage prior work and employ the projected-channel singular value decomposition (P-SVD). In the global CSI scenario, we propose a joint transmitter-receiver design under the assumption of full CSI of all the users at the secondary transceiver. To reduce the feedback overhead, we also propose a new iterative algorithm that exploits only local CSI with side information. In this algorithm, the secondary transmitter and receiver iteratively update precoding and decoding matrices based on the local CSI and side information (precoding/decoding matrices at the previous iteration step) to maximize the rate of the secondary link while maintaining the zero-interference constraint. Convergence is established in the special case of single stream beamforming. Numerical results confirm that the proposed joint design and the iterative algorithm show better achievable rate performance than the P-SVD technique at the expense, respectively, of CSI knowledge and side information.


IEEE Communications Letters | 2009

A novel orthogonal space-time-frequency block code for OFDM systems

Keonkook Lee; Youngok Kim; Joonhyuk Kang

In this letter, we propose an orthogonal spacetime- frequency block code for orthogonal frequency division multiplexing (STFBC-OFDM) systems, newly designed to be robust against both time- and frequency-selective fading. The performance of the proposed system is analyzed in spatially uncorrelated time-varying multipath Rayleigh-fading channels. The analytic results, which closely match the numerical results, show that the proposed system outperforms STBC-OFDM in time-varying channels and SFBC-OFDM in frequency-selective fading channels.


military communications conference | 2012

Cooperative jammer design in cellular network with internal eavesdroppers

Seongah Jeong; Keonkook Lee; Joonhyuk Kang; Youngseok Baek; Bontae Koo

In this paper, we consider a cooperative jammer to improve secrecy of the wireless transmission in a cellular downlink network. The private message intended for a single user should be kept from the remainder of the users who are regarded as internal eavesdroppers. To improve the secrecy of the intended user, we propose an employment of a helper with multiple antennas and design its optimal transmit beamforming vector. Specifically, the helper node generates the artificial interference to the internal eavesdroppers and so enhances the security by increasing the ambiguity at the eavesdroppers. Based on a framework of power gain region in [1], we optimize the transmission strategy for the helper which maximizes the secrecy capacity of the intended user. The analytical and simulation results show that the proposed scheme enhances the secrecy capacity. In addition, all users whose secrecy rates are zero with no helpers cooperation can achieve the positive secrecy rate by the proposed scheme.


global communications conference | 2014

Advanced Limited Feedback Designs for FD-MIMO Using Uniform Planar Arrays

Junil Choi; Keonkook Lee; David J. Love; Tae-Young Kim; Robert W. Heath

Massive multiple-input multiple-output (MIMO) with uniform planar arrays (UPAs), which is often referred to as full-dimension (FD) MIMO, is being strongly considered for future wireless communication standards. FD-MIMO can control transmit and receive beams in both the horizontal and vertical domains and fully exploit the large number of antennas of massive MIMO. It is widely accepted that Kronecker-product codebooks using a discrete Fourier transform (DFT) structure are suitable to quantize the downlink channel at the user for FD-MIMO systems relying on frequency division duplexing (FDD). In this paper, we numerically study the characteristics of FD-MIMO channels using a three-dimensional (3D) channel model that captures realistic channel properties. Based on the study, we identify a limitation of conventional Kronecker-product codebooks and propose advanced channel quantization techniques that can further improve channel quantization quality.


Journal of Communications and Networks | 2012

Cognitive beamforming based smart metering for coexistence with wireless local area networks

Keonkook Lee; Chan-Byoung Chae; Tae-Kyung Sung; Joonhyuk Kang

The ZigBee network has been considered to monitor electricity usage of home appliances in the smart grid network. Zig-Bee, however, may suffer from a coexistence problem with wireless local area network (WLAN). In this paper, to resolve the coexistence problem between ZigBee network and WLAN, we propose a new protocol constructing a cognitive smart grid network for supporting monitoring of home appliances. In the proposed protocol, home appliances first estimates the transmission timing and channel information of WLAN by reading request to send/clear to send (RTS/CTS) frames of WLAN. Next, based on the estimated information, home appliances transmit a data at the same time as WLAN transmission. To manage the interference between WLAN and smart grid network, we propose a cognitive beamforming algorithm. The beamforming algorithm is designed to guaranteeing zero interference to WLAN while satisfying a required rate for smart metering. We also propose an energy efficient rate adaptation algorithm. By slowing down the transmission rate while satisfying an imperceptible impact of quality of service (QoS) of the receiver, the home appliance can significantly save transmit power. Numerical results show that the proposed multiple antenna technique provides reliable communications for smart metering with reduced power comparing to the simple transmission technique.


IEEE Wireless Communications Letters | 2013

Secure Transmission in Downlink Cellular Network with a Cooperative Jammer

Seongah Jeong; Keonkook Lee; Heon Huh; Joonhyuk Kang

In this paper, a novel transmission scheme is proposed to improve the security of downlink cellular network. The confidential message intended to one of K mobile users (MUs) should be securely kept from the undesired recipients. In this work, the K-1 remaining users are regarded as potential eavesdroppers and called as internal eavesdroppers. For the security enhancement, we propose an adaptation of a single cooperative jammer (CJ) to increase the ambiguity at all malicious users by distracting them with artificial interference. With the help of CJ, we derive the optimal joint transmission scheme by beamforming solution to maximize the secrecy rate of the intended user. Numerical results show the performance improvement of the proposed scheme.


military communications conference | 2008

Adaptive switching between space-time and space-frequency block coded OFDM systems

Keonkook Lee; Youngok Kim; Nam-Jeong Lee; Joonhyuk Kang

In this paper, we propose an adaptive transmission technique for MIMO-OFDM systems which selects one of space-time block coded OFDM (STBC-OFDM) and space-frequency block coded OFDM (SFBC-OFDM). STBC-OFDM and SFBC-OFDM undergo severe performance degradation in time-varying and frequency-selective channel, respectively. In the adaptive scheme, either STBC-OFDM or SFBC-OFDM is selected by using the proposed switching criteria. Two selection criteria, correlation of the channel and magnitude of the interference, are proposed for transmission mode selection. In criterion I, based on the observation of the theoretical performance in (D.B. lin et al., 2005), correlation between successive OFDM symbols for STBC-OFDM and correlation between neighboring subcarriers for SFBC-OFDM are compared and the mode which has higher correlation value is selected to maximize the SNR. Next, in criterion II, we choose the mode which has smaller interference to reduce the performance degradation due to the interference. Simulation results show that the proposed adaptive switching system outperforms the nonadaptive system.


consumer communications and networking conference | 2012

Transmit beamforming with imperfect CSIT in spectrum leasing for physical-layer security

Seongah Jeong; Keonkook Lee; Joonhyuk Kang; Youngseok Baek; Bontae Koo

In spectrum leasing, primary users (PUs) lease the part of their spectral resources to secondary users (SUs) in exchange for appropriate remuneration. In this paper, we consider spectrum leasing via cooperation for physical-layer security that the secondary cooperation exists for improving the primary secrecy rate while maintaining its quality of service (QoS). Unlike the previous researches with the perfect channel state information (CSI) at transmitter (CSIT) assumption, we study when no information regarding the eavesdropper is available at the transmitter. This imperfect CSIT makes the SUs transmission strategy limited. To find the optimal transmission technique for the SU, we formulate a problem appropriate for the imperfect CSIT case. By using the proposed problem, we design the optimal transmit beamforming for the SU. Also, we analyze the ergodic rate of the secondary link at high signal-to-noise ratio (SNR) when the secondary cooperation focuses only on maximizing the primary secrecy rate for the viable choice of the secondary QoS level. The numerical result shows that the primary secrecy rate by the proposed transmit beamforming is comparable to that based on the perfect CSIT.

Collaboration


Dive into the Keonkook Lee's collaboration.

Researchain Logo
Decentralizing Knowledge