99 research outputs found

    Entropy and Energy Detection-based Spectrum Sensing over F Composite Fading Channels

    Get PDF
    In this paper, we investigate the performance of energy detection-based spectrum sensing over F composite fading channels. To this end, an analytical expression for the average detection probability is firstly derived. This expression is then extended to account for collaborative spectrum sensing, square-law selection diversity reception and noise power uncertainty. The corresponding receiver operating characteristics (ROC) are analyzed for different conditions of the average signal-to-noise ratio (SNR), noise power uncertainty, time-bandwidth product, multipath fading, shadowing, number of diversity branches and number of collaborating users. It is shown that the energy detection performance is sensitive to the severity of the multipath fading and amount of shadowing, whereby even small variations in either of these physical phenomena can significantly impact the detection probability. As a figure of merit to evaluate the detection performance, the area under the ROC curve (AUC) is derived and evaluated for different multipath fading and shadowing conditions. Closed-form expressions for the Shannon entropy and cross entropy are also formulated and assessed for different average SNR, multipath fading and shadowing conditions. Then the relationship between the Shannon entropy and ROC/AUC is examined where it is found that the average number of bits required for encoding a signal becomes small (i.e., low Shannon entropy) when the detection probability is high or when the AUC is large. The difference between composite and traditional small-scale fading is emphasized by comparing the cross entropy for Rayleigh and Nakagami-m fading. A validation of the analytical results is provided through a careful comparison with the results of some simulations.Comment: 30 pages, 11 figures, 1 table, Submitted to IEEE TCO

    Wideband Spectrum Sensing for Dynamic Spectrum Sharing

    Get PDF
    The proliferation of wireless devices grows exponentially, demanding more and more data communication capacity over wireless links. Radio spectrum is a scarce resource, and traditional wireless networks deployed by Mobile Network Operators (MNO) are based on an exclusive spectrum band allocation. However, underutilization of some licensed bands in time and geographic domains has been reported, especially in rural areas or areas away from high population density zones. This coexistence of increasingly high data communication needs and spectrum underutilization is an incomprehensible scenario. A more rational and efficient use of the spectrum is the possibility of Licensed Users (known as Primary Users – PU) to lease the spectrum, when not in use, to Unlicensed Users (known as Secondary Users – SU), or allowing the SU to opportunistically use the spectrum after sensing and verifying that the PU is idle. In this latter case, the SU must stop transmitting when the PU becomes active. This thesis addresses the spectrum sensing task, which is essential to provide dynamic spectrum sharing between PUs and SUs. We show that the Spectral Correlation Function (SCF) and the Spectral Coherence Function (SCoF) can provide a robust signal detection algorithm by exploiting the cyclostationary characteristics of the data communication signal. We enhance the most used algorithm to compute de SCF - the FAM (FFT Accumulation Method) algorithm – to efficiently compute the SCF in a local/zoomed region of the support ( ; ) plane (frequency/cycle frequency plane). This will provide the quick identification of spectral bands in use by PUs or free, in a wideband sampling scenario. Further, the characterization of the probability density of the estimates of the SCF and SCoF when only noise is present, using the FAM algorithm, will allow the definition of an adaptive threshold to develop a blind (with respect to the noise statistics) Constant False Alarm Rate (CFAR) detector (using the SCoF) and also a CFAR and a Constant Detection Rate (CDR) detector when that characterization is used to obtain an estimate of the background noise variance (using the SCF).A proliferação de dispositivos sem fios cresce de forma exponencial, exigindo cada vez mais capacidade de comunicação de dados através de ligações sem fios. O espectro radioelétrico é um recurso escasso, e as redes sem fios tradicionais implantadas pelos Operadores de Redes Móveis baseiam-se numa atribuição exclusiva de bandas do espectro. No entanto, tem sido relatada a subutilização de algumas bandas licenciadas quer ao longo do tempo, quer na sua localização geográfica, especialmente em áreas rurais, e em áreas longe de zonas de elevada densidade populacional. A coexistência da necessidade cada vez maior de comunicação de dados, e a subutilização do espectro é um cenário incompreensível. Uma utilização mais racional e eficiente do espectro pressupõe a possibilidade dos Utilizadores Licenciados (conhecidos como Utilizadores Primários – Primary Users - PU) alugarem o espectro, quando este não está a ser utilizado, a Utilizadores Não Licenciados (conhecidos como Utilizadores Secundários – Secondary Users - SU), ou permitir ao SU utilizar oportunisticamente o espectro após a deteção e verificação de que o PU está inativo. Neste último caso, o SU deverá parar de transmitir quando o PU ficar ativo. Nesta tese é abordada a tarefa de deteção espectral, que é essencial para proporcionar a partilha dinâmica do espectro entre PUs e SUs. Mostra-se que a Função de Correlação Espectral (Spectral Correlation Function - SCF) e a Função de Coerência Espectral (Spectral Coherence Function - SCoF) permitem o desenvolvimento de um algoritmo robusto de deteção de sinal, explorando as características ciclo-estacionárias dos sinais de comunicação de dados. Propõe-se uma melhoria ao algoritmo mais utilizado para cálculo da SCF – o método FAM (FFT Accumulation Method) - para permitir o cálculo mais eficiente da SCF numa região local/ampliada do plano de suporte / (plano de frequência/frequência de ciclo). Esta melhoria permite a identificação rápida de bandas espectrais em uso por PUs ou livres, num cenário de amostragem de banda larga. Adicionalmente, é feita a caracterização da densidade de probabilidade das estimativas da SCF e SCoF quando apenas o ruído está presente, o que permite a definição de um limiar adaptativo, para desenvolver um detetor de Taxa de Falso Alarme Constante (Constant False Alarm Rate – CFAR) sem conhecimento do ruído de fundo (usando a SCoF) e também um detetor CFAR e Taxa de Deteção Constante (Constant Detection Rate – CDR), quando se utiliza aquela caracterização para obter uma estimativa da variância do ruído de fundo (usando a SCF)

    Outage performance of underlay cognitive radio networks over mix fading environment

    Get PDF
    In this paper, the underlay cognitive radio network over mix fading environment is presented and investigated. A cooperative cognitive system with a secondary source node S, a secondary destination node D, secondary relay node Relay, and a primary node P are considered. In this model system, we consider the mix fading environment in two scenarios as Rayleigh/Nakagami-m and Nakagami-m/Rayleigh Fading channels. For system performance analysis, the closed-form expression of the system outage probability (OP) and the integral-formed expression of the ergodic capacity (EC) are derived in connection with the system's primary parameters. Finally, we proposed the Monte Carlo simulation for convincing the correctness of the system performance

    Vehicle Communication using Secrecy Capacity

    Full text link
    We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network. For example, we examine the relationship between vehicle speed and secrecy capacity, the relationship between the response time and secrecy capacity of an autonomous vehicle, and the relationship between transmission power and secrecy capacity. In particular, the autonomous vehicle has set the system modeling on the assumption that the speed of the vehicle is related to the safety distance. We propose new vehicle communication to maintain a certain level of secrecy capacity according to various parameters. As a result, we can expect safer communication security of autonomous vehicles in 5G communications.Comment: 17 Pages, 12 Figure

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments

    Get PDF
    In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.Web of Science212art. no. 21
    corecore