1,622 research outputs found
Cooperative wideband spectrum sensing with multi-bit hard decision in cognitive radio
Cognitive radio offers an increasingly attractive solution to overcome the underutilization problem. A sensor network based cooperative wideband spectrum sensing is proposed in this paper. The purpose of the sensor network is to determine the frequencies of the sources and reduced the total sensing time using a multi-resolution sensing technique. The final result is computed by data fusion of multi-bit decisions made by each cooperating secondary user. Simulation results show improved performance in energy efficiency
Cognitive Radio Networks: Realistic or Not?
A large volume of research has been conducted in the cognitive radio (CR)
area the last decade. However, the deployment of a commercial CR network is yet
to emerge. A large portion of the existing literature does not build on real
world scenarios, hence, neglecting various important interactions of the
research with commercial telecommunication networks. For instance, a lot of
attention has been paid to spectrum sensing as the front line functionality
that needs to be completed in an efficient and accurate manner to enable an
opportunistic CR network architecture. This is necessary to detect the
existence of spectrum holes without which no other procedure can be fulfilled.
However, simply sensing (cooperatively or not) the energy received from a
primary transmitter cannot enable correct dynamic spectrum access. For example,
the low strength of a primary transmitter's signal does not assure that there
will be no interference to a nearby primary receiver. In addition, the presence
of a primary transmitter's signal does not mean that CR network users cannot
access the spectrum since there might not be any primary receiver in the
vicinity. Despite the existing elegant and clever solutions to the DSA problem
no robust, implementable scheme has emerged. In this paper, we challenge the
basic premises of the proposed schemes. We further argue that addressing the
technical challenges we face in deploying robust CR networks can only be
achieved if we radically change the way we design their basic functionalities.
In support of our argument, we present a set of real-world scenarios, inspired
by realistic settings in commercial telecommunications networks, focusing on
spectrum sensing as a basic and critical functionality in the deployment of
CRs. We use these scenarios to show why existing DSA paradigms are not amenable
to realistic deployment in complex wireless environments.Comment: Work in progres
Interference Alignment for Cognitive Radio Communications and Networks: A Survey
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).Interference alignment (IA) is an innovative wireless transmission strategy that has shown to be a promising technique for achieving optimal capacity scaling of a multiuser interference channel at asymptotically high-signal-to-noise ratio (SNR). Transmitters exploit the availability of multiple signaling dimensions in order to align their mutual interference at the receivers. Most of the research has focused on developing algorithms for determining alignment solutions as well as proving interference alignment’s theoretical ability to achieve the maximum degrees of freedom in a wireless network. Cognitive radio, on the other hand, is a technique used to improve the utilization of the radio spectrum by opportunistically sensing and accessing unused licensed frequency spectrum, without causing harmful interference to the licensed users. With the increased deployment of wireless services, the possibility of detecting unused frequency spectrum becomes diminished. Thus, the concept of introducing interference alignment in cognitive radio has become a very attractive proposition. This paper provides a survey of the implementation of IA in cognitive radio under the main research paradigms, along with a summary and analysis of results under each system model.Peer reviewe
Enforcement in Dynamic Spectrum Access Systems
The spectrum access rights granted by the Federal government to spectrum users come with the expectation of protection from harmful interference. As a consequence of the growth of wireless demand and services of all types, technical progress enabling smart agile radio networks, and on-going spectrum management reform, there is both a need and opportunity to use and share spectrum more intensively and dynamically. A key element of any framework for managing harmful interference is the mechanism for enforcement of those rights. Since the rights to use spectrum and to protection from harmful interference vary by band (licensed/unlicensed, legacy/newly reformed) and type of use/users (primary/secondary, overlay/underlay), it is reasonable to expect that the enforcement mechanisms may need to vary as well.\ud
\ud
In this paper, we present a taxonomy for evaluating alternative mechanisms for enforcing interference protection for spectrum usage rights, with special attention to the potential changes that may be expected from wider deployment of Dynamic Spectrum Access (DSA) systems. Our exploration of how the design of the enforcement regime interacts with and influences the incentives of radio operators under different rights regimes and market scenarios is intended to assist in refining thinking about appropriate access rights regimes and how best to incentivize investment and growth in more efficient and valuable uses of the radio frequency spectrum
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Enforcement and Spectrum Sharing: Case Studies of Federal-Commercial Sharing
To promote economic growth and unleash the potential of wireless broadband, there is a need to introduce more spectrally efficient technologies and spectrum management regimes. That led to an environment where commercial wireless broadband need to share spectrum with the federal and non-federal operations. Implementing sharing regimes on a non-opportunistic basis means that sharing agreements must be implemented. To have meaning, those agreements must be enforceable.\ud
\ud
With the significant exception of license-free wireless systems, commercial wireless services are based on exclusive use. With the policy change facilitating spectrum sharing, it becomes necessary to consider how sharing might take place in practice. Beyond the technical aspects of sharing, that must be resolved lie questions about how usage rights are appropriately determined and enforced. This paper is reasoning about enforcement in a particular spectrum bands (1695-1710 MHz and 3.5 GHz) that are currently being proposed for sharing between commercial services and incumbent spectrum users in the US. We examine three enforcement approaches, exclusion zones, protection zones and pure ex post and consider their implications in terms of cost elements, opportunity cost, and their adaptability
- …