skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: A Miniaturized Reconfigurable CRLH Leaky-Wave Antenna Using Complementary Split-Ring Resonators
Composite Right-/Left-Handed (CRLH) Leaky-Wave Antennas (LWAs) are a class of radiating elements characterized by an electronically steerable radiation pattern. The design is comprised of a cascade of CRLH unit cells populated with varactor diodes. By varying the voltage across the varactor diodes, the antenna can steer its directional beam from broadside to backward and forward end-fire directions. In this paper, we discuss the design and experimental analysis of a miniaturized CRLH Leaky-Wave Antenna for the 2.4 GHz WiFi band. The miniaturization is achieved by etching Complementary Split-Ring Resonator (CSRR) underneath each CRLH unit cell. As opposed to the conventional LWA designs, we take advantage of a LWA layout that does not require thin interdigital capacitors; thus we significantly reduce the PCB manufacturing constraints required to achieve size reduction. The experimental results were compared with a nonminiaturized prototype in order to evaluate the differences in impedance and radiation characteristics. The proposed antenna is a significant achievement because it will enable CRLH LWAs to be a viable technology not only for wireless access points, but also potentially for mobile devices.  more » « less
Award ID(s):
1422964
PAR ID:
10226580
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
Journal of Electrical and Computer Engineering
Volume:
2018
ISSN:
2090-0147
Page Range / eLocation ID:
1 to 12
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract This article presents a nonlinear leaky wave antenna (LWA) with frequency dependent parametric radiation based on a fundamentally slow‐wave transmission line (TL) structure. Unlike a conventional LWA that radiates at the excitation frequency, the radiation for the proposed travelling wave structure relies on the parametric frequencies based on the injected pump signals. The proposed nonlinear fundamentally slow wave structure utilizes a periodic sharply bend TL loaded by varactor diodes as nonlinear elements. By utilizing then = −1 spatial harmonic, the fundamentally slow wave structure can enter the leaky wave region at higher frequencies, where the parametric radiation results from the bifurcation of the injected pump signals. Such TL‐based nonlinear LWA reduces the design complexity and fabrication difficulty. The resulting parametric frequency radiation can be used for beam steering, which provides additional degree of design freedom. 
    more » « less
  2. null (Ed.)
    Reconfigurable antenna systems have gained much attention for potential use in the next generation wireless systems. However, conventional direction-of-arrival (DoA) estimation algorithms for antenna arrays cannot be used directly in reconfigurable antennas due to different design of the antennas. In this paper, we present an adjacent pattern power ratio (APPR) algorithm for two-port composite right/left-handed (CRLH) reconfigurable leaky-wave antennas (LWAs). Additionally, we compare the performances of the APPR algorithm and LWA-based MUSIC algorithms. We study how the computational complexity and the performance of the algorithms depend on number of selected radiation patterns. In addition, we evaluate the performance of the APPR and MUSIC algorithms with numerical simulations as well as with real world indoor measurements having both line-of-sight and non-line-of-sight components. Our performance evaluations show that the DoA estimates are in a considerably good agreement with the real DoAs, especially with the APPR algorithm. In summary, the APPR and MUSIC algorithms for DoA estimation along with the planar and compact LWA layout can be a valuable solution to enhance the performance of the wireless communication in the next generation systems. 
    more » « less
  3. Abstract Recent advancement in digital coding metasurfaces incorporating spatial and temporal modulation has enabled simultaneous control of electromagnetic (EM) waves in both space and frequency domains by manipulating incident EM waves in a transmissive or reflective fashion, resulting in time-reversal asymmetry. Here we show in theory and experiment that a digitally space-time-coded metamaterial (MTM) antenna with spatiotemporal modulation at its unit cell level can be regarded as a radiating counterpart of such digital metasurface, which will enable nonreciprocal EM wave transmission and reception via surface-to-leaky-wave transformation and harmonic frequency generation. Operating in the fast wave (radiation) region, the space-time-coded MTM antenna is tailored in a way such that the propagation constant of each programmable unit cell embedded with varactor diodes can toggle between positive and negative phases, which is done through providing digital sequences by using a field-programmable gate array (FPGA). Owing to the time-varying coding sequence, harmonic frequencies are generated with different main beam directions. Furthermore, the space time modulation of the digitally coded MTM antenna allows for nonreciprocal transmission and reception of EM waves by breaking the time-reversal symmetry, which may enable many applications, such as simultaneous transmitting and receiving, unidirectional transmission, radar sensing, and multiple-input and multiple-output (MIMO) beamformer. 
    more » « less
  4. This paper presents a highly efficient single-layer substrate-integrated waveguide (SIW) based leaky-wave antenna (LWA) for the millimeter-wave unmanned aerial vehicle (UAV) communication system. The leaky wave-based radiating part of the unit cell includes a combination of two Y-shaped slots with 46° stretched V etched on the top SIW, resulting in a W-shaped structure. The proposed array achieves a high gain of 13.47 dBi for the frequency range of 56.3 GHz to 63.4 GHz covering the unlicensed band, with a fine matching level below -21 dB. Using the leaky wave antenna's frequency scanning capability, the proposed antenna exhibits a scanning range of 38°. The designed antenna shows a promising solution for the UAV-to-UAV applications due to its low profile and compactness and is well-suited for the single-layer low-cost printed circuit board fabrication process using Rogers RT 5880 as substrate. The radiation pattern for the achieved bandwidth shows an average half-power angular beamwidth of 12.1°, resulting in a radiation efficiency of more than 62% for the elements arranged uniformly at a distance of 0.456λ . Following an overall low-profile compact size of 6.48×4 λ corresponding to 3.24×0.2 cm and improved performance, the antenna achieves an elliptical polarization at 60 GHz for an axial ratio equal to 3.5 dBi. 
    more » « less
  5. Novel transmission schemes, enabled by recent advances in the fields of metamaterial (MTM), leaky-wave antenna (LWA) and directional modulation, are proposed for enhancing the physical layer (PHY) security. MTM-LWAs, which offer compact, integrated, and cost-effective alternatives to the classic phased-array architectures, are particularly of interest for emerging wireless communication systems including Internet-of-Things (IoT). The proposed secure schemes are devised to accomplish the functionalities of directional modulation (DM) transmitters for orthogonal frequency-division multiplexing (OFDM) and non-contiguous (NC) OFDM transmissions, while enjoying the implementation benefits of MTM-LWAs. Specifically, transmitter architectures based on the idea of time-modulated MTM-LWA have been put forth as a promising solution for PHY security for the first time. The PHY security for the proposed schemes are investigated from the point of view of both passive and active attacks where an adversary aims to decode secret information and feed spurious data to the legitimate receiver, respectively. Numerical simulations reveal that even when the adversary employs sophisticated state-of-the-art deep learning based attacks, the proposed transmission schemes are resistant to these attacks and reliably guarantee system security. 
    more » « less