1,359 research outputs found
Power-Optimal Feedback-Based Random Spectrum Access for an Energy Harvesting Cognitive User
In this paper, we study and analyze cognitive radio networks in which
secondary users (SUs) are equipped with Energy Harvesting (EH) capability. We
design a random spectrum sensing and access protocol for the SU that exploits
the primary link's feedback and requires less average sensing time. Unlike
previous works proposed earlier in literature, we do not assume perfect
feedback. Instead, we take into account the more practical possibilities of
overhearing unreliable feedback signals and accommodate spectrum sensing
errors. Moreover, we assume an interference-based channel model where the
receivers are equipped with multi-packet reception (MPR) capability.
Furthermore, we perform power allocation at the SU with the objective of
maximizing the secondary throughput under constraints that maintain certain
quality-of-service (QoS) measures for the primary user (PU)
Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks
In this paper, we propose a new optimization-based access strategy of
multipacket reception (MPR) channel for multiple secondary users (SUs)
accessing the primary user (PU) spectrum opportunistically. We devise an
analytical model that realizes the multipacket access strategy of SUs that
maximizes the throughput of individual backlogged SUs subject to queue
stability of the PU. All the network receiving nodes have MPR capability. We
aim at maximizing the throughput of the individual SUs such that the PU's queue
is maintained stable. Moreover, we are interested in providing an
energy-efficient cognitive scheme. Therefore, we include energy constraints on
the PU and SU average transmitted energy to the optimization problem. Each SU
accesses the medium with certain probability that depends on the PU's activity,
i.e., active or inactive. The numerical results show the advantage in terms of
SU throughput of the proposed scheme over the conventional access scheme, where
the SUs access the channel randomly with fixed power when the PU is sensed to
be idle
Energy-Efficient Cooperative Cognitive Relaying Schemes for Cognitive Radio Networks
We investigate a cognitive radio network in which a primary user (PU) may
cooperate with a cognitive radio user (i.e., a secondary user (SU)) for
transmissions of its data packets. The PU is assumed to be a buffered node
operating in a time-slotted fashion where the time is partitioned into
equal-length slots. We develop two schemes which involve cooperation between
primary and secondary users. To satisfy certain quality of service (QoS)
requirements, users share time slot duration and channel frequency bandwidth.
Moreover, the SU may leverage the primary feedback message to further increase
both its data rate and satisfy the PU QoS requirements. The proposed
cooperative schemes are designed such that the SU data rate is maximized under
the constraint that the PU average queueing delay is maintained less than the
average queueing delay in case of non-cooperative PU. In addition, the proposed
schemes guarantee the stability of the PU queue and maintain the average energy
emitted by the SU below a certain value. The proposed schemes also provide more
robust and potentially continuous service for SUs compared to the conventional
practice in cognitive networks where SUs transmit in the spectrum holes and
silence sessions of the PUs. We include primary source burstiness, sensing
errors, and feedback decoding errors to the analysis of our proposed
cooperative schemes. The optimization problems are solved offline and require a
simple 2-dimensional grid-based search over the optimization variables.
Numerical results show the beneficial gains of the cooperative schemes in terms
of SU data rate and PU throughput, average PU queueing delay, and average PU
energy savings
Optimal Spectrum Access for Cognitive Radios
In this paper, we investigate a time-slotted cognitive setting with buffered
primary and secondary users. In order to alleviate the negative effects of
misdetection and false alarm probabilities, a novel design of spectrum access
mechanism is proposed. We propose two schemes. First, the SU senses primary
channel to exploit the periods of silence, if the PU is declared to be idle,
the SU randomly accesses the channel with some access probability .
Second, in addition to accessing the channel if the PU is idle, the SU possibly
accesses the channel if it is declared to be busy with some access probability
. The access probabilities as function of the misdetection, false alarm
and average primary arrival rate are obtained via solving an optimization
problem designed to maximize the secondary service rate given a constraint on
primary queue stability. In addition, we propose a variable sensing duration
schemes where the SU optimizes over the optimal sensing time to achieve the
maximum stable throughput of the network. The results reveal the performance
gains of the proposed schemes over the conventional sensing scheme. We propose
a method to estimate the mean arrival rate and the outage probability of the PU
based on the primary feedback channel, i.e., acknowledgments (ACKs) and
negative-acknowledgments (NACKs) messages.Comment: arXiv admin note: substantial text overlap with arXiv:1206.615
Effective Capacity Analysis for Cognitive Networks under QoS Satisfaction
Spectrum sensing and dynamic spectrum access (DSA) techniques in cognitive radio networks (CRN) have been extensively investigated since last decade. Recently, satisfaction of quality-of-service (QoS) demands for secondary users (SU) has attracted great attention. The SU can not only discover the transmission opportunities, but also cognitively adapts the dynamic spectrum access strategies to its own QoS requirement and the environment variations. In this paper, we study how the delay QoS requirement affects the strategy on network performance. We first treat the delay-QoS in interference constrained cognitive radio network by applying the effective capacity concept, focusing on the two dominant DSA schemes: underlay and overlay. We obtain the effective capacity of the secondary network and determine the power allocation policies that maximize the throughput of the cognitive user. The underlay and overlay approaches may have their respective advantages under diverse propagation environment and system parameters. If the cognitive network can dynamically choose the DSA strategy under different environment, its performance could be further improved. We propose a selection criterion to determine whether to use underlay or overlay scheme under the given QoS constraint and the PUs’ spectrum-occupancy probability. Thus, the throughput of the CRN could be increased. Performance analysis and numerical evaluations are provided to demonstrate the effective capacity of CRN based on the underlay and the overlay schemes, taking into consideration the impact of delay QoS requirement and other related parameters
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Effective Capacity of Cognitive Radio Links: Accessing Primary Feedback Erroneously
We study the performance of a cognitive system modeled by one secondary and
one primary link and operating under statistical quality of service (QoS) delay
constraints. We analyze the effective capacity (EC) to quantify the secondary
user (SU) performance under delay constraints. The SU intends to maximize the
benefit of the feedback messages on the primary link to reduce SU interference
for primary user (PU) and makes opportunistic use of the channel to transmit
his packets. We assume that SU has erroneous access to feedback information of
PU. We propose a three power level scheme and study the tradeoff between
degradation in EC of SU and reliability of PU defined as the success rate of
the transmitted packets. Our analysis shows that increase in error in feedback
access causes more interference to PU and packet success rate decreases
correspondingly.Comment: Accepted for publication in International Symposium on Wireless
Communication Systems (ISWCS) 201
- …