1,359 research outputs found

    Power-Optimal Feedback-Based Random Spectrum Access for an Energy Harvesting Cognitive User

    Full text link
    In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with Energy Harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that exploits the primary link's feedback and requires less average sensing time. Unlike previous works proposed earlier in literature, we do not assume perfect feedback. Instead, we take into account the more practical possibilities of overhearing unreliable feedback signals and accommodate spectrum sensing errors. Moreover, we assume an interference-based channel model where the receivers are equipped with multi-packet reception (MPR) capability. Furthermore, we perform power allocation at the SU with the objective of maximizing the secondary throughput under constraints that maintain certain quality-of-service (QoS) measures for the primary user (PU)

    Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks

    Full text link
    In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network receiving nodes have MPR capability. We aim at maximizing the throughput of the individual SUs such that the PU's queue is maintained stable. Moreover, we are interested in providing an energy-efficient cognitive scheme. Therefore, we include energy constraints on the PU and SU average transmitted energy to the optimization problem. Each SU accesses the medium with certain probability that depends on the PU's activity, i.e., active or inactive. The numerical results show the advantage in terms of SU throughput of the proposed scheme over the conventional access scheme, where the SUs access the channel randomly with fixed power when the PU is sensed to be idle

    Energy-Efficient Cooperative Cognitive Relaying Schemes for Cognitive Radio Networks

    Full text link
    We investigate a cognitive radio network in which a primary user (PU) may cooperate with a cognitive radio user (i.e., a secondary user (SU)) for transmissions of its data packets. The PU is assumed to be a buffered node operating in a time-slotted fashion where the time is partitioned into equal-length slots. We develop two schemes which involve cooperation between primary and secondary users. To satisfy certain quality of service (QoS) requirements, users share time slot duration and channel frequency bandwidth. Moreover, the SU may leverage the primary feedback message to further increase both its data rate and satisfy the PU QoS requirements. The proposed cooperative schemes are designed such that the SU data rate is maximized under the constraint that the PU average queueing delay is maintained less than the average queueing delay in case of non-cooperative PU. In addition, the proposed schemes guarantee the stability of the PU queue and maintain the average energy emitted by the SU below a certain value. The proposed schemes also provide more robust and potentially continuous service for SUs compared to the conventional practice in cognitive networks where SUs transmit in the spectrum holes and silence sessions of the PUs. We include primary source burstiness, sensing errors, and feedback decoding errors to the analysis of our proposed cooperative schemes. The optimization problems are solved offline and require a simple 2-dimensional grid-based search over the optimization variables. Numerical results show the beneficial gains of the cooperative schemes in terms of SU data rate and PU throughput, average PU queueing delay, and average PU energy savings

    Optimal Spectrum Access for Cognitive Radios

    Full text link
    In this paper, we investigate a time-slotted cognitive setting with buffered primary and secondary users. In order to alleviate the negative effects of misdetection and false alarm probabilities, a novel design of spectrum access mechanism is proposed. We propose two schemes. First, the SU senses primary channel to exploit the periods of silence, if the PU is declared to be idle, the SU randomly accesses the channel with some access probability asa_s. Second, in addition to accessing the channel if the PU is idle, the SU possibly accesses the channel if it is declared to be busy with some access probability bsb_s. The access probabilities as function of the misdetection, false alarm and average primary arrival rate are obtained via solving an optimization problem designed to maximize the secondary service rate given a constraint on primary queue stability. In addition, we propose a variable sensing duration schemes where the SU optimizes over the optimal sensing time to achieve the maximum stable throughput of the network. The results reveal the performance gains of the proposed schemes over the conventional sensing scheme. We propose a method to estimate the mean arrival rate and the outage probability of the PU based on the primary feedback channel, i.e., acknowledgments (ACKs) and negative-acknowledgments (NACKs) messages.Comment: arXiv admin note: substantial text overlap with arXiv:1206.615

    Effective Capacity Analysis for Cognitive Networks under QoS Satisfaction

    Get PDF
    Spectrum sensing and dynamic spectrum access (DSA) techniques in cognitive radio networks (CRN) have been extensively investigated since last decade. Recently, satisfaction of quality-of-service (QoS) demands for secondary users (SU) has attracted great attention. The SU can not only discover the transmission opportunities, but also cognitively adapts the dynamic spectrum access strategies to its own QoS requirement and the environment variations. In this paper, we study how the delay QoS requirement affects the strategy on network performance. We first treat the delay-QoS in interference constrained cognitive radio network by applying the effective capacity concept, focusing on the two dominant DSA schemes: underlay and overlay. We obtain the effective capacity of the secondary network and determine the power allocation policies that maximize the throughput of the cognitive user. The underlay and overlay approaches may have their respective advantages under diverse propagation environment and system parameters. If the cognitive network can dynamically choose the DSA strategy under different environment, its performance could be further improved. We propose a selection criterion to determine whether to use underlay or overlay scheme under the given QoS constraint and the PUs’ spectrum-occupancy probability. Thus, the throughput of the CRN could be increased. Performance analysis and numerical evaluations are provided to demonstrate the effective capacity of CRN based on the underlay and the overlay schemes, taking into consideration the impact of delay QoS requirement and other related parameters

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Effective Capacity of Cognitive Radio Links: Accessing Primary Feedback Erroneously

    Get PDF
    We study the performance of a cognitive system modeled by one secondary and one primary link and operating under statistical quality of service (QoS) delay constraints. We analyze the effective capacity (EC) to quantify the secondary user (SU) performance under delay constraints. The SU intends to maximize the benefit of the feedback messages on the primary link to reduce SU interference for primary user (PU) and makes opportunistic use of the channel to transmit his packets. We assume that SU has erroneous access to feedback information of PU. We propose a three power level scheme and study the tradeoff between degradation in EC of SU and reliability of PU defined as the success rate of the transmitted packets. Our analysis shows that increase in error in feedback access causes more interference to PU and packet success rate decreases correspondingly.Comment: Accepted for publication in International Symposium on Wireless Communication Systems (ISWCS) 201
    • …
    corecore