5,832 research outputs found

    Energy-Efficient Cooperative Cognitive Relaying Schemes for Cognitive Radio Networks

    Full text link
    We investigate a cognitive radio network in which a primary user (PU) may cooperate with a cognitive radio user (i.e., a secondary user (SU)) for transmissions of its data packets. The PU is assumed to be a buffered node operating in a time-slotted fashion where the time is partitioned into equal-length slots. We develop two schemes which involve cooperation between primary and secondary users. To satisfy certain quality of service (QoS) requirements, users share time slot duration and channel frequency bandwidth. Moreover, the SU may leverage the primary feedback message to further increase both its data rate and satisfy the PU QoS requirements. The proposed cooperative schemes are designed such that the SU data rate is maximized under the constraint that the PU average queueing delay is maintained less than the average queueing delay in case of non-cooperative PU. In addition, the proposed schemes guarantee the stability of the PU queue and maintain the average energy emitted by the SU below a certain value. The proposed schemes also provide more robust and potentially continuous service for SUs compared to the conventional practice in cognitive networks where SUs transmit in the spectrum holes and silence sessions of the PUs. We include primary source burstiness, sensing errors, and feedback decoding errors to the analysis of our proposed cooperative schemes. The optimization problems are solved offline and require a simple 2-dimensional grid-based search over the optimization variables. Numerical results show the beneficial gains of the cooperative schemes in terms of SU data rate and PU throughput, average PU queueing delay, and average PU energy savings

    Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks

    Full text link
    In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network receiving nodes have MPR capability. We aim at maximizing the throughput of the individual SUs such that the PU's queue is maintained stable. Moreover, we are interested in providing an energy-efficient cognitive scheme. Therefore, we include energy constraints on the PU and SU average transmitted energy to the optimization problem. Each SU accesses the medium with certain probability that depends on the PU's activity, i.e., active or inactive. The numerical results show the advantage in terms of SU throughput of the proposed scheme over the conventional access scheme, where the SUs access the channel randomly with fixed power when the PU is sensed to be idle

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Performance of DF Incremental Relaying with Energy Harvesting Relays in Underlay CRNs

    Full text link
    In this paper, we analyze the throughput performance of incremental relaying using energy harvesting (EH) decode-and-forward (DF) relays in underlay cognitive radio networks (CRNs). The destination combines the direct and relayed signals when the direct link is in outage. From the derived closed-form expressions, we present an expression for the power-splitting parameter of the EH relay that optimizes the throughput performance. We demonstrate that relaying using EH DF relays results in better performance than direct signalling without a relay only when the destination combines the direct signal from the source with the relayed signal. Computer simulations demonstrate accuracy of the derived expressions
    • …
    corecore