19 research outputs found

    Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks

    Get PDF
    The implementation of device-to-device (D2D) underlaying or overlaying pre-existing cellular networks has received much attention due to the potential of enhancing the total cell throughput, reducing power consumption and increasing the instantaneous data rate. In this paper we propose a distributed power allocation scheme for D2D OFDMA communications and, in particular, we consider the two operating modes amenable to a distributed implementation: dedicated and reuse modes. The proposed schemes address the problem of maximizing the users' sum rate subject to power constraints, which is known to be nonconvex and, as such, extremely difficult to be solved exactly. We propose here a fresh approach to this well-known problem, capitalizing on the fact that the power allocation problem can be modeled as a potential game. Exploiting the potential games property of converging under better response dynamics, we propose two fully distributed iterative algorithms, one for each operation mode considered, where each user updates sequentially and autonomously its power allocation. Numerical results, computed for several different user scenarios, show that the proposed methods, which converge to one of the local maxima of the objective function, exhibit performance close to the maximum achievable optimum and outperform other schemes presented in the literature

    Effect of Location Accuracy and Shadowing on the Probability of Non-Interfering Concurrent Transmissions in Cognitive Ad Hoc Networks

    Get PDF
    Cognitive radio ad hoc systems can coexist with a primary network in a scanning-free region, which can be dimensioned by location awareness. This coexistence of networks improves system throughput and increases the efficiency of radio spectrum utilization. However, the location accuracy of real positioning systems affects the right dimensioning of the concurrent transmission region. Moreover, an ad hoc connection may not be able to coexist with the primary link due to the shadowing effect. In this paper we investigate the impact of location accuracy on the concurrent transmission probability and analyze the reliability of concurrent transmissions when shadowing is taken into account. A new analytical model is proposed, which allows to estimate the resulting secure region when the localization uncertainty range is known. Computer simulations show the dependency between the location accuracy and the performance of the proposed topology, as well as the reliability of the resulting secure region

    Opportunistic Spectrum Utilization by Cognitive Radio Networks: Challenges and Solutions

    Get PDF
    Cognitive Radio Network (CRN) is an emerging paradigm that makes use of Dynamic Spectrum Access (DSA) to communicate opportunistically, in the un-licensed Industrial, Scientific and Medical bands or frequency bands otherwise licensed to incumbent users such as TV broadcast. Interest in the development of CRNs is because of severe under-utilization of spectrum bands by the incumbent Primary Users (PUs) that have the license to use them coupled with an ever-increasing demand for unlicensed spectrum for a variety of new mobile and wireless applications. The essence of Cognitive Radio (CR) operation is the cooperative and opportunistic utilization of licensed spectrum bands by the Secondary Users (SUs) that collectively form the CRN without causing any interference to PUs\u27 communications. CRN operation is characterized by factors such as network-wide quiet periods for cooperative spectrum sensing, opportunistic/dynamic spectrum access and non-deterministic operation of PUs. These factors can have a devastating impact on the overall throughput and can significantly increase the control overheads. Therefore, to support the same level of QoS as traditional wireless access technologies, very closer interaction is required between layers of the protocol stack. Opportunistic spectrum utilization without causing interference to the PUs is only possible if the SUs periodically sense the spectrum for the presence of PUs\u27 signal. To minimize the effects of hardware capabilities, terrain features and PUs\u27 transmission ranges, DSA is undertaken in a collaborative manner where SUs periodically carry out spectrum sensing in their respective geographical locations. Collaborative spectrum sensing has numerous security loopholes and can be favorable to malicious nodes in the network that may exploit vulnerabilities associated with DSA such as launching a spectrum sensing data falsification (SSDF) attack. Some CRN standards such as the IEEE 802.22 wireless regional area network employ a two-stage quiet period mechanism based on a mandatory Fast Sensing and an optional Fine Sensing stage for DSA. This arrangement is meant to strike a balance between the conflicting goals of proper protection of incumbent PUs\u27 signals and optimum QoS for SUs so that only as much time is spent for spectrum sensing as needed. Malicious nodes in the CRN however, can take advantage of the two-stage spectrum sensing mechanism to launch smart denial of service (DoS) jamming attacks on CRNs during the fast sensing stage. Coexistence protocols enable collocated CRNs to contend for and share the available spectrum. However, most coexistence protocols do not take into consideration the fact that channels of the available spectrum can be heterogeneous in the sense that they can vary in their characteristics and quality such as SNR or bandwidth. Without any mechanism to enforce fairness in accessing varying quality channels, ensuring coexistence with minimal contention and efficient spectrum utilization for CRNs is likely to become a very difficult task. The cooperative and opportunistic nature of communication has many challenges associated with CRNs\u27 operation. In view of the challenges described above, this dissertation presents solutions including cross-layer approaches, reputation system, optimization and game theoretic approaches to handle (1) degradation in TCP\u27s throughput resulting from packet losses and disruptions in spectrum availability due non-deterministic use of spectrum by the PUs (2) presence of malicious SUs in the CRN that may launch various attacks on CRNs\u27 including SSDF and jamming and (3) sharing of heterogeneous spectrum resources among collocated CRNs without a centralized mechanism to enforce cooperation among otherwise non-cooperative CRN

    Opportunistic device-to-device communication in cellular networks: from theory to practice

    Get PDF
    Mención Internacional en el título de doctorCellular service providers have been struggling with users’ demand since the emergence of mobile Internet. As a result, each generation of cellular network prevailed over its predecessors mainly in terms of connection speed. However, the fifth generation (5G) of cellular network promises to go beyond this trend by revolutionizing the network architecture. Device-to-Device (D2D) communication is one of the revolutionary changes that enables mobile users to communicate directly without traversing a base station. This feature is being actively studied in 3GPP with special focus on public safety as it allows mobiles to operate in adhoc mode. Although under the (partial) control of the network, D2D communications open the door to many other use-cases. This dissertation studies different aspects of D2D communications and its impact on the key performance indicators of the network. We design an architecture for the collaboration of cellular users by means of timely exploited D2D opportunities. We begin by presenting the analytical study on opportunistic outband D2D communications. The study reveals the great potential of opportunistic outband D2D communications for enhancing energy efficiency, fairness, and capacity of cellular networks when groups of D2D users can be form and managed in the cellular network. Then we introduce a protocol that is compatible with the latest release of IEEE and 3GPP standards and allows for implementation of our proposal in a today’s cellular network. To validate our analytical findings, we use our experimental Software Defined Radio (SDR)-based testbed to further study our proposal in a real world scenario. The experimental results confirm the outstanding potential of opportunistic outband D2D communications. Finally, we investigate the performance merits and disadvantages of different D2D “modes”. Our investigation reveals, despite the common belief, that all D2D modes are complementary and their merits are scenario based.This work has been supported by IMDEA Networks Institute.Programa Oficial de Doctorado en Ingeniería TelemáticaPresidente: Douglas Leith.- Secretario: Albert Banchs Roca.- Vocal: Carla Fabiana Chiasserin

    Resource-on-demand schemes in 802.11 WLANs with non-zero start-up times

    Get PDF
    Increasing the density of access points is one of the most effective mechanisms to cope with the growing traffic demand in wireless networks. To prevent energy wastage at low loads, a resource-on-demand (RoD) scheme is required to opportunistically (de)activate access points as network traffic varies. While previous publications have analytically modeled these schemes in the past, they have assumed that resources are immediately available when activated, an assumption that leads to inaccurate results and might result in inappropriate configurations of the RoD scheme. In this paper, we analyze a general RoD scenario with N access points and non-zero start-up times. We first present an exact analytical model that accurately predicts performance but has a high computational complexity, and then derive a simplified analysis that sacrifices some accuracy in exchange for a much lower computational cost. To illustrate the practicality of this model, we present the design of a simple configuration algorithm for RoD. Simulation results confirm the validity of the analyses, and the effectiveness of the configuration algorithm

    Energy Efficiency and Privacy Protection in Cellular Networks

    Get PDF
    Smartphones have become an essential part of our society. The benefits of having an always present, highly capable device cannot be overstated. As more aspects of our life depend on our smartphones, it is more important than ever to ensure the availability of those devices. However, their big advantages also come with big risks. The fact that we have our smartphones with us all the time means that it is easier than ever to collect our information, sometimes without our consent. In this dissertation, we study the two pressing concerns in cellular communications: energy efficiency and privacy protection. We focus on LTE networks, the current most advanced global standard for cellular communications. In the first part of the dissertation, we study the energy efficiency problem from both device and network perspectives. From the device point of view, we introduce a new angle to address the battery life concern. We recognize that the value of battery for the users is not always the same, and that it depends on the user usage. We also identify, and show in real network, diversity of usage, the phenomenon that at any instant, there is a diverse distribution of smartphone usage among cellular users. We propose ``Battery Deposit Service'' (BDS), a cooperative system which makes use of device-to-device (D2D) communications underlaying cellular networks to provide energy sharing in the form of load sharing. We design BDS to take advantage of diversity of usage to maximize the utility of smartphone battery. We show that our system increases battery life of cellular users, at almost no cost to the rest of the network. BDS is designed to be compatible to LTE architecture. From the network point of view, we design an energy efficient D2D relay system underlaying LTE networks. We minimize transmission power of smartphones by considering relay selection, resource allocation and power control. The overall problem is prohibited due to its exponential search space. We develop a divide-and-conquer strategy which splits the overall problem into small sub-problems. We relate these sub-problems to well-studied graph theoretic problems, and take advantage of existing fast algorithms. We show that our algorithms meet the runtime requirement of real-time LTE operations. In the second part of the dissertation, we address a privacy concern in LTE networks. In particular, we show that user location can be leaked in current LTE paging architecture. We propose a mechanism based on signal processing to remedy this vulnerability. Our method makes use of physical layer identification, which are low-power tags embedded on the wireless waveform, to signal paging messages to user devices. We show that our method is stealthy and robust, and that it mitigates the aforementioned privacy issue

    Recent Advances in Cellular D2D Communications

    Get PDF
    Device-to-device (D2D) communications have attracted a great deal of attention from researchers in recent years. It is a promising technique for offloading local traffic from cellular base stations by allowing local devices, in physical proximity, to communicate directly with each other. Furthermore, through relaying, D2D is also a promising approach to enhancing service coverage at cell edges or in black spots. However, there are many challenges to realizing the full benefits of D2D. For one, minimizing the interference between legacy cellular and D2D users operating in underlay mode is still an active research issue. With the 5th generation (5G) communication systems expected to be the main data carrier for the Internet-of-Things (IoT) paradigm, the potential role of D2D and its scalability to support massive IoT devices and their machine-centric (as opposed to human-centric) communications need to be investigated. New challenges have also arisen from new enabling technologies for D2D communications, such as non-orthogonal multiple access (NOMA) and blockchain technologies, which call for new solutions to be proposed. This edited book presents a collection of ten chapters, including one review and nine original research works on addressing many of the aforementioned challenges and beyond

    Opportunistic Spectrum Utilization for Vehicular Communication Networks

    Get PDF
    Recently, vehicular networks (VANETs), has become the key technology of the next-generation intelligent transportation systems (ITS). By incorporating wireless communication and networking capabilities into automobiles, information can be efficiently and reliably disseminated among vehicles, road side units, and infrastructure, which enables a number of novel applications enhancing the road safety and providing the drivers/passengers with an information-rich environment. With the development of mobile Internet, people want to enjoy the Internet access in vehicles just as anywhere else. This fact, along with the soaring number of connected vehicles and the emerging data-craving applications and services, has led to a problem of spectrum scarcity, as the current spectrum bands for VANETs are difficult to accommodate the increasing mobile data demands. In this thesis, we aim to solve this problem by utilizing extra spectrum bands, which are not originally allocated for vehicular communications. In this case, the spectrum usage is based on an opportunistic manner, where the spectrum is not available if the primary system is active, or the vehicle is outside the service coverage due to the high mobility. We will analyze the features of such opportunistic spectrum, and design efficient protocols to utilize the spectrum for VANETs. Firstly, the application of cognitive radio technologies in VANETs, termed CR-VANETs, is proposed and analyzed. In CR-VANETs, the channel availability is severely affected by the street patterns and the mobility features of vehicles. Therefore, we theoretically analyze the channel availability in urban scenario, and obtain its statistics. Based on the knowledge of channel availability, an efficient channel access scheme for CR-VANETs is then designed and evaluated. Secondly, using WiFi to deliver mobile data, named WiFi offloading, is employed to deliver the mobile data on the road, in order to relieve the burden of the cellular networks, and provide vehicular users with a cost-effective data pipe. Using queueing theory, we analyze the offloading performance with respect to the vehicle mobility model and the users' QoS preferences. Thirdly, we employ device-to-device (D2D) communications in VANETs to further improve the spectrum efficiency. In a vehicular D2D (V-D2D) underlaying cellular network, proximate vehicles can directly communicate with each other with a relatively small transmit power, rather than traversing the base station. Therefore, many current transmissions can co-exist on one spectrum resource block. By utilizing the spatial diversity, the spectrum utilization is greatly enhanced. We study the performance of the V-D2D underlaying cellular network, considering the vehicle mobility and the street pattern. We also investigate the impact of the preference of D2D/cellular mode on the interference and network throughput, and obtain the theoretical results. In summary, the analysis and schemes developed in this thesis are useful to understand the future VANETs with heterogeneous access technologies, and provide important guidelines for designing and deploying such networks
    corecore