Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yansha Deng is active.

Publication


Featured researches published by Yansha Deng.


european signal processing conference | 2016

On secrecy outage of MISO SWIPT systems in the presence of imperfect CSI

Gaofeng Pan; Hongjiang Lei; Yansha Deng; Lisheng Fan; Yunfei Chen; Zhiguo Ding

In this work, a multiple-input single-output (MISO) simultaneous wireless information and power transfer (SWIPT) system including one base station (BS) equipped with multiple antennas, one desired single-antenna information receiver (IR) and N (N > 1) single-antenna energy-harvesting receivers (ERs) is considered. By considering that the information signal of the desired IR may be eavesdropped by ERs if ERs are malicious, we investigate the secrecy performance of the target MISO SWIPT system when imperfect channel state information (CSI) is available and adopted for transmit antenna selection at the BS. Considering that each eavesdropping link experiences independent not necessarily identically distributed Rayleigh fading, the closed-form expressions for the exact and the asymptotic secrecy outage probability are derived and verified by simulation results.


IEEE Transactions on Wireless Communications | 2016

Wireless Energy Harvesting in a Cognitive Relay Network

Yuanwei Liu; S. Ali Mousavifar; Yansha Deng; Cyril Leung; Maged Elkashlan

Wireless energy harvesting is regarded as a promising energy supply alternative for energy-constrained wireless networks. In this paper, a new wireless energy harvesting protocol is proposed for an underlay cognitive relay network with multiple primary user (PU) transceivers. In this protocol, the secondary nodes can harvest energy from the primary network (PN) while sharing the licensed spectrum of the PN. In order to assess the impact of different system parameters on the proposed network, we first derive an exact expression for the outage probability for the secondary network (SN) subject to three important power constraints: 1) the maximum transmit power at the secondary source (SS) and at the secondary relay (SR); 2) the peak interference power permitted at each PU receiver; and 3) the interference power from each PU transmitter to the SR and to the secondary destination (SD). To obtain practical design insights into the impact of different parameters on successful data transmission of the SN, we derive throughput expressions for both the delay-sensitive and the delay-tolerant transmission modes. We also derive asymptotic closed-form expressions for the outage probability and the delay-sensitive throughput and an asymptotic analytical expression for the delay-tolerant throughput as the number of PU transceivers goes to infinity. The results show that the outage probability improves when PU transmitters are located near SS and sufficiently far from SR and SD. Our results also show that when the number of PU transmitters is large, the detrimental effect of interference from PU transmitters outweighs the benefits of energy harvested from the PU transmitters.


IEEE Transactions on Communications | 2016

On Secrecy Performance of MISO SWIPT Systems With TAS and Imperfect CSI

Gaofeng Pan; Hongjiang Lei; Yansha Deng; Lisheng Fan; Jing Yang; Yunfei Chen; Zhiguo Ding

In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power transfer (SWIPT) system, including one base station (BS) equipped with multiple antennas, one desired single-antenna information receiver (IR), and N (N > 1) single-antenna energy-harvesting receivers (ERs) is considered. Assuming that the information signal to the desired IR may be eavesdropped by ERs if ERs are malicious, we investigate the secrecy performance of the target MISO SWIPT system when imperfect channel state information (CSI) is available and adopted for transmit antenna selection at the BS. Considering that each eavesdropping link experiences independent but not necessarily identically distributed Rayleigh fading, the closed-form expressions for the exact and the asymptotic secrecy outage probability, and the average secrecy capacity are derived and verified by simulations. Furthermore, the optimal power splitting factor is derived for each ER to realize the tradeoff between the energy harvesting and the information eavesdropping. Our results reveal the impact of the imperfect CSI on the secrecy performance of MISO SWIPT systems in the presence of multiple wiretap channels.


IEEE Transactions on Signal Processing | 2015

Generalized Selection Combining for Cognitive Relay Networks Over Nakagami-

Yansha Deng; Lifeng Wang; Maged Elkashlan; Kyeong Jin Kim; Trung Quang Duong

We consider transmit antenna selection with receive generalized selection combining (TAS/GSC) for cognitive decode-and-forward (DF) relaying in Nakagami- m fading channels. In an effort to assess the performance, the probability density function and the cumulative distribution function of the end-to-end SNR are derived using the moment generating function, from which new exact closed-form expressions for the outage probability and the symbol error rate are derived. We then derive a new closed-form expression for the ergodic capacity. More important, by deriving the asymptotic expressions for the outage probability and the symbol error rate, as well as the high SNR approximations of the ergodic capacity, we establish new design insights under the two distinct constraint scenarios: 1) proportional interference power constraint, and 2) fixed interference power constraint. Several pivotal conclusions are reached. For the first scenario, the full diversity order of the outage probability and the symbol error rate is achieved, and the high SNR slope of the ergodic capacity is 1/2. For the second scenario, the diversity order of the outage probability and the symbol error rate is zero with error floors, and the high SNR slope of the ergodic capacity is zero with capacity ceiling.


IEEE Transactions on Information Forensics and Security | 2016

m

Yansha Deng; Lifeng Wang; Maged Elkashlan; Arumugam Nallanathan; Ranjan K. Mallik

This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks (WSNs) using stochastic geometry. In such networks, the sensing data from the remote sensors are collected by sinks with the help of access points, and the external eavesdroppers intercept the data transmissions. We focus on the secure transmission in two scenarios: 1) the active sensors transmit their sensing data to the access points and 2) the active access points forward the data to the sinks. We derive new compact expressions for the average secrecy rate in these two scenarios. We also derive a new compact expression for the overall average secrecy rate. Numerical results corroborate our analysis and show that multiple antennas at the access points can enhance the security of three-tier WSNs. Our results show that increasing the number of access points decreases the average secrecy rate between the access point and its associated sink. However, we find that increasing the number of access points first increases the overall average secrecy rate, with a critical value beyond which the overall average secrecy rate then decreases. When increasing the number of active sensors, both the average secrecy rate between the sensor and its associated access point, and the overall average secrecy rate decrease. In contrast, increasing the number of sinks improves both the average secrecy rate between the access point and its associated sink, and the overall average secrecy rate.


IEEE Transactions on Wireless Communications | 2016

Fading

Sunila Akbar; Yansha Deng; Arumugam Nallanathan; Maged Elkashlan; A.H. Aghvami

In this paper, we develop a tractable model for joint downlink (DL) and uplink (UL) transmission of K -tier heterogeneous cellular networks (HCNs) with simultaneous wireless information and power transfer (SWIPT) for efficient spectrum and energy utilization. In the DL, the mobile users (MUs) with power splitting receiver architecture decode information and harvest energy based on SWIPT. While in the UL, the MUs use the harvested energy for information transmission. Since cell association greatly affects the energy harvesting in the DL and the performance of wireless powered HCNs in the UL, we compare the DL and UL performance of a random MU in HCNs with nearest base station (NBS) cell association to that with maximum received power (MRP) cell association. We first derive the DL average received power for the MU with the NBS and the MRP cell associations. To evaluate the system performance, we then derive the outage probability and the average ergodic rate in the DL and UL of a random MU in HCNs with the NBS and MRP cell associations. Our results show that increasing the small cell base station (BS) density, the BS transmit power, the time allocation factor, and the energy conversion efficiency, weakly affects the DL and UL performance of both the cell associations. However, the UL performance of both the cell associations can be improved by increasing the fraction of the DL received power used for energy harvesting.


IEEE Transactions on Communications | 2016

Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach

Yansha Deng; Lifeng Wang; Maged Elkashlan; Marco Di Renzo; Jinhong Yuan

In this paper, we model and analyze the downlink (DL) wireless power transfer and uplink (UL) information transmission of K-tier heterogeneous cellular networks (HCNs) with randomly located base stations (BSs) and mobile terminals (MTs). In the DL and UL, each energy-constrained MT pairs up with its corresponding BS, which provides the maximum received power at the MT. Due to the densely located BSs and universal frequency reuse between all tiers in HCNs, the typical MT is allowed to harvest energy from the serving BS by direct beamforming as well as from the other interfering BSs. Equipped with large storage battery, the typical MT utilizes the harvested energy to provide constant transmit power for the UL information transmission. Stochastic geometry is used to model and evaluate the intrinsic relationship between the energy harvested from the BSs in the DL and the information transmission performance in the UL. To well evaluate the system performance, we first derive exact expressions for the maximum transmit power at MT, the UL outage probability, and the UL average ergodic rate per MT. As the number of BS antennas goes to infinity, we further derive asymptotic expressions for the maximum transmit power at MT, the UL outage probability, and the UL average ergodic rate per MT. Our results show that the UL outage probability per MT first decreases and then increases with increasing the time allocation factor (the fraction of time allocated to the DL), and the UL outage probability, and the UL average ergodic rate per MT, can be largely improved by using the massive antenna arrays at the BSs.


IEEE Transactions on Wireless Communications | 2014

Simultaneous Wireless Information and Power Transfer in

Yansha Deng; Maged Elkashlan; Phee Lep Yeoh; Nan Yang; Ranjan K. Mallik

We propose transmit antenna selection with receive generalized selection combining in dual-hop cognitive decode-and-forward relay networks with spectrum sharing for reliability enhancement and interference relaxation. In this network, a single antenna, which maximizes the receive signal-to-noise ratio (SNR) is selected at the secondary transmitter, and a subset of receive antennas with the highest SNRs is combined at the secondary receiver. To demonstrate the advantages of our proposed framework, we derive new exact closed-form expressions for the outage probability and the symbol error rate of the secondary network in Rayleigh fading. We also derive easy-to-evaluate asymptotic expressions in the high-SNR regime to gain practical insights. Several important design insights are reached. Under the proportional interference power constraint, the full diversity gain is achieved and is entirely determined by the total number of antennas available in the secondary network. This result is independent of the number of receive antennas combined and the number of primary users. The positive impact of the number of receive antennas combined and the negative impact of the number of primary users on the secondary network are showcased in the SNR gain. Under the fixed interference power constraint, error floors are displayed, and the diversity gain is lost.


international conference on wireless communications and signal processing | 2015

K

Yansha Deng; Lifeng Wang; Kai-Kit Wong; Arumugam Nallanathan; Maged Elkashlan; Sangarapillai Lambotharan

This paper exploits the potential of physical layer security in massive multiple-input multiple-output (MIMO) aided two-tier heterogeneous networks (HetNets). We focus on the downlink secure transmission in the presence of multiple eavesdroppers. We first address the impact of massive MIMO on the maximum receive power based user association. We then derive the tractable upper bound expressions for the secrecy outage probability of a HetNets user. We show that the implementation of massive MIMO significantly improves the secrecy performance, which indicates that physical layer security could be a promising solution for safeguarding massive MIMO HetNets. Furthermore, we show that the secrecy outage probability of HetNets user first degrades and then improves with increasing the density of PBSs.


IEEE Transactions on Vehicular Technology | 2015

-Tier Heterogeneous Cellular Networks

Yansha Deng; Maged Elkashlan; Nan Yang; Phee Lep Yeoh; Ranjan K. Mallik

We propose cognitive spectrum sharing with generalized selection combining (GSC) at the secondary user (SU) in the presence of multiple primary transceivers with outdated channel information. Our main motivation is to determine the impact of GSC and outdated channel information on the outage probability of cognitive spectrum sharing subject to two practical power constraints: 1) maximum transmit power at the SU transmitter and 2) peak interference temperature at the primary user (PU) receiver. We derive new closed-form expressions for the exact and asymptotic outage probability in Rayleigh fading. Our expressions provide concise representations of the diversity order and the array gain. We confirm that the diversity order of GSC is entirely dependent on the secondary network and is equal to the available number of receiver antennas at the SU. This result is consistent with those of maximal-ratio combining (MRC) and selection combining (SC) in cognitive spectrum sharing. More importantly, our results show that the outage probability decreases with the increasing correlation coefficient of the outdated channel.

Collaboration


Dive into the Yansha Deng's collaboration.

Top Co-Authors

Avatar

Arumugam Nallanathan

Queen Mary University of London

View shared research outputs
Top Co-Authors

Avatar

Maged Elkashlan

Queen Mary University of London

View shared research outputs
Top Co-Authors

Avatar

Lifeng Wang

University College London

View shared research outputs
Top Co-Authors

Avatar

Weisi Guo

University of Warwick

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jie Jia

Northeastern University

View shared research outputs
Top Co-Authors

Avatar

Jian Chen

Northeastern University

View shared research outputs
Top Co-Authors

Avatar

Nan Jiang

Queen Mary University of London

View shared research outputs
Top Co-Authors

Avatar

Trung Quang Duong

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge