26,483 research outputs found
On Providing Downlink Services in Collocated Spectrum-Sharing Macro and Femto Networks
Femtocells have been considered by the wireless industry as a cost-effective
solution not only to improve indoor service providing, but also to unload
traffic from already overburdened macro networks. Due to spectrum availability
and network infrastructure considerations, a macro network may have to share
spectrum with overlaid femtocells. In spectrum-sharing macro and femto
networks, inter-cell interference caused by different transmission powers of
macrocell base stations (MBS) and femtocell access points (FAP), in conjunction
with potentially densely deployed femtocells, may create dead spots where
reliable services cannot be guaranteed to either macro or femto users. In this
paper, based on a thorough analysis of downlink (DL) outage probabilities (OP)
of collocated spectrum-sharing orthogonal frequency division multiple access
(OFDMA) based macro and femto networks, we devise a decentralized strategy for
an FAP to self-regulate its transmission power level and usage of radio
resources depending on its distance from the closest MBS. Simulation results
show that the derived closed-form lower bounds of DL OPs are tight, and the
proposed decentralized femtocell self-regulation strategy is able to guarantee
reliable DL services in targeted macro and femto service areas while providing
superior spatial reuse, for even a large number of spectrum-sharing femtocells
deployed per cell site
Decentralized Dynamic Hop Selection and Power Control in Cognitive Multi-hop Relay Systems
In this paper, we consider a cognitive multi-hop relay secondary user (SU)
system sharing the spectrum with some primary users (PU). The transmit power as
well as the hop selection of the cognitive relays can be dynamically adapted
according to the local (and causal) knowledge of the instantaneous channel
state information (CSI) in the multi-hop SU system. We shall determine a low
complexity, decentralized algorithm to maximize the average end-to-end
throughput of the SU system with dynamic spatial reuse. The problem is
challenging due to the decentralized requirement as well as the causality
constraint on the knowledge of CSI. Furthermore, the problem belongs to the
class of stochastic Network Utility Maximization (NUM) problems which is quite
challenging. We exploit the time-scale difference between the PU activity and
the CSI fluctuations and decompose the problem into a master problem and
subproblems. We derive an asymptotically optimal low complexity solution using
divide-and-conquer and illustrate that significant performance gain can be
obtained through dynamic hop selection and power control. The worst case
complexity and memory requirement of the proposed algorithm is O(M^2) and
O(M^3) respectively, where is the number of SUs
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the
spectrum sensing data falsification (SSDF) attack in the literature, is one of
the key adversaries to the success of cognitive radio networks (CRNs). In the
past couple of years, the research on the Byzantine attack and defense
strategies has gained worldwide increasing attention. In this paper, we provide
a comprehensive survey and tutorial on the recent advances in the Byzantine
attack and defense for CSS in CRNs. Specifically, we first briefly present the
preliminaries of CSS for general readers, including signal detection
techniques, hypothesis testing, and data fusion. Second, we analyze the spear
and shield relation between Byzantine attack and defense from three aspects:
the vulnerability of CSS to attack, the obstacles in CSS to defense, and the
games between attack and defense. Then, we propose a taxonomy of the existing
Byzantine attack behaviors and elaborate on the corresponding attack
parameters, which determine where, who, how, and when to launch attacks. Next,
from the perspectives of homogeneous or heterogeneous scenarios, we classify
the existing defense algorithms, and provide an in-depth tutorial on the
state-of-the-art Byzantine defense schemes, commonly known as robust or secure
CSS in the literature. Furthermore, we highlight the unsolved research
challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
Double-Directional Information Azimuth Spectrum and Relay Network Tomography for a Decentralized Wireless Relay Network
A novel channel representation for a two-hop decentralized wireless relay
network (DWRN) is proposed, where the relays operate in a completely
distributive fashion. The modeling paradigm applies an analogous approach to
the description method for a double-directional multipath propagation channel,
and takes into account the finite system spatial resolution and the extended
relay listening/transmitting time. Specifically, the double-directional
information azimuth spectrum (IAS) is formulated to provide a compact
representation of information flows in a DWRN. The proposed channel
representation is then analyzed from a geometrically-based statistical modeling
perspective. Finally, we look into the problem of relay network tomography
(RNT), which solves an inverse problem to infer the internal structure of a
DWRN by using the instantaneous doubledirectional IAS recorded at multiple
measuring nodes exterior to the relay region
- …