5,399 research outputs found
Difference Antenna Selection and Power Allocation for Wireless Cognitive Systems
In this paper, we propose an antenna selection method in a wireless cognitive
radio (CR) system, namely difference selection, whereby a single transmit
antenna is selected at the secondary transmitter out of possible antennas
such that the weighted difference between the channel gains of the data link
and the interference link is maximized. We analyze mutual information and
outage probability of the secondary transmission in a CR system with difference
antenna selection, and propose a method of optimizing these performance metrics
of the secondary data link subject to practical constraints on the peak
secondary transmit power and the average interference power as seen by the
primary receiver. The optimization is performed over two parameters: the peak
secondary transmit power and the difference selection weight . We show that, difference selection using the optimized parameters
determined by the proposed method can be, in many cases of interest, superior
to a so called ratio selection method disclosed in the literature, although
ratio selection has been shown to be optimal, when impractically, the secondary
transmission power constraint is not applied. We address the effects that the
constraints have on mutual information and outage probability, and discuss the
practical implications of the results.Comment: 29 pages, 9 figures, to be submitted to IEEE Transactions on
Communication
Full-Duplex Cognitive Radio: A New Design Paradigm for Enhancing Spectrum Usage
With the rapid growth of demand for ever-increasing data rate, spectrum
resources have become more and more scarce. As a promising technique to
increase the efficiency of the spectrum utilization, cognitive radio (CR)
technique has the great potential to meet such a requirement by allowing
un-licensed users to coexist in licensed bands. In conventional CR systems, the
spectrum sensing is performed at the beginning of each time slot before the
data transmission. This unfortunately results in two major problems: 1)
transmission time reduction due to sensing, and 2) sensing accuracy impairment
due to data transmission. To tackle these problems, in this paper we present a
new design paradigm for future CR by exploring the full-duplex (FD) techniques
to achieve the simultaneous spectrum sensing and data transmission. With FD
radios equipped at the secondary users (SUs), SUs can simultaneously sense and
access the vacant spectrum, and thus, significantly improve sensing
performances and meanwhile increase data transmission efficiency. The aim of
this article is to transform the promising conceptual framework into the
practical wireless network design by addressing a diverse set of challenges
such as protocol design and theoretical analysis. Several application scenarios
with FD enabled CR are elaborated, and key open research directions and novel
algorithms in these systems are discussed
Impact of Power Allocation and Antenna Directivity in the Capacity of a Multiuser Cognitive Ad Hoc Network
This paper studies the benefits that power control and antenna directivity can bring to the capacity of a multiuser cognitive radio network. The main objective is to optimize the secondary network sum rate under the capacity constraint of the primary network. Exploiting location awareness, antenna directivity, and the power control capability, the cognitive radio ad hoc network can broaden its coverage and improve capacity. Computer simulations show that by employing the proposed method the system performance is significantly enhanced compared to conventional fixed power allocation
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …