260 research outputs found

    Exact Outage Probability Analysis for Relay-aided Underlay Cognitive Communications

    No full text
    International audienceIn a spectrum sharing underlay context, we investigatethe exact derivation of the outage probability for relay-aided cognitiveradio communications. To give more degrees of freedom to thesecondary system in acquiring a targeted quality-of-service (QoS)under the primary system interference constraint, the secondary linkis assisted by a set of relays acting in a two-hop decode-and-forwardselective relaying mode. By means of the cumulative distributionfunctions of the received signal-to-noise ratio (SNR) at the secondaryreceiver, we derive the end-to-end outage probability of the secondarysystem in its closed form. The analytical and simulation results arethen compared and interestingly shown to perfectly match over theentire interference threshold region

    Outage Analysis of Energy Harvested Relay-Aided Device-to-Device Communications in Nakagami Channel

    Get PDF
    In this paper, we obtain a low-complexity closed-form formula for the outage probability of the energy-harvested decode-and-forward (DF) relay-aided underlay Device-to-device (D2D) communications in Nakagami fading channel. By proposing a new idea which finds the power splitting factor in simultaneous wireless information and power transfer (SWIPT) energy-harvesting system such that the transmit power of the relay node in the second time slot is fixed in a pre-defined value, the obtained closed-form expression is valid for both energy-harvested and non-energy-harvested scenarios. This formula is based on n-point generalized Gauss-Laguerre and m-point Gauss-Legendre solutions. It is shown that n is more effective than m for reducing the formula complexity. In addition to a good agreement between the simulation results and numerical analysis based on normalized mean square error (NMSE), it is indicated that (n, m)=(1, 4) and (n, m)=(1, 2) are the appropriate choices, respectively for 0.5≤ µ <0.7 and µ ≥0.7, where µ is the fading factor. As shown in this investigation, increasing the average distance between D2D pairs and cellular user (lower interference), is the reason for decreasing the outage probability. Furthermore, it is clear that increasing the Nakagami fading factor is the reason for decreasing the outage probability

    Security-Reliability Tradeoff Analysis for Underlay Cognitive Two-Way Relay Networks

    Get PDF
    We consider an underlay wiretap cognitive two-way relay network (CTWRN), where two secondary sources exchange their messages via multiple secondary decode-and-forward digital network coding relays in the presence of an eavesdropper by using a three-phase time division broadcast protocol and sharing the licensed spectrum of primary users. To mitigate eavesdropping attacks, an artificial noise (AN)-aided opportunistic relay selection scheme, called generalized max-min (GMM) relay selection is proposed to enhance physical layer security for the wiretap CTWRNs. The performance of the GMM scheme is analyzed, and evaluated by the exact closed-form outage probability and intercept probability. Additionally, we also provide asymptotic approximations for the outage probability and intercept probability at high signal-to-noise ratio. For comparison, we analyze the performance of the conventional max-min (MM) relay selection scheme as well. It is shown that the GMM scheme outperforms the MM scheme in terms of the security-reliability tradeoff (SRT), where the security and reliability are quantified by the intercept probability and outage probability, respectively. Moreover, the SRTs of the MM and GMM schemes can be substantially improved by increasing the number of secondary relays, while the improvement of the GMM scheme is more evident than that of the MM scheme

    Spectrally-efficient SIMO relay-aided underlay communications: An exact outage analysis

    No full text
    International audienceIn this paper, we carry out an exact outage analysis for a secondary (unlicensed) system operating under a strict primary (licensed) system outage constraint. We focus on single-user singleinput multiple-output (SIMO) secondary communications where the direct link is being assisted by a cluster of single-antenna decodeand-forward (DF) relay nodes acting in a half-duplex selective-andincremental relaying mode. Firstly, we derive a transmit power model for the secondary system where the source and relays adapt their transmit power based on: 1) a perfect acquisition of the underlying interference channel state information (I-CSI), and 2) an interference constraint that is either fixed or proportional to the primary system outage probability. Secondly, the cumulative distribution functions (CDF)s of the received signal-to-noise ratio (SNR) at the secondary receiving nodes are devised in a recursive and tractable closed-form expressions. These statistics are used to derive the exact end-to-end secondary system outage probability. The analytical and simulation results are then compared and interestingly shown to perfectly match, while revealing that with a moderate number of primary and secondary receive antennas, the secondary system spectral efficiency is amply enhanced as opposed to being severely degraded in the single receive antenna case

    Performance enhancement solutions in wireless communication networks

    Get PDF
    In this dissertation thesis, we study the new relaying protocols for different wireless network systems. We analyze and evaluate an efficiency of the transmission in terms of the outage probability over Rayleigh fading channels by mathematical analyses. The theoretical analyses are verified by performing Monte Carlo simulations. First, we study the cooperative relaying in the Two-Way Decode-and-Forward (DF) and multi-relay DF scheme for a secondary system to obtain spectrum access along with a primary system. In particular, we proposed the Two-Way DF scheme with Energy Harvesting, and the Two-Way DF Non-orthogonal Multiple Access (NOMA) scheme with digital network coding. Besides, we also investigate the wireless systems with multi-relay; the best relay selection is presented to optimize the effect of the proposed scheme. The transmission protocols of the proposed schemes EHAF (Energy Harvesting Amplify and Forward) and EHDF (Energy Harvesting Decode and Forward) are compared together in the same environment and in term of outage probability. Hence, with the obtained results, we conclude that the proposed schemes improve the performance of the wireless cooperative relaying systems, particularly their throughput. Second, we focus on investigating the NOMA technology and proposing the optimal solutions (protocols) to advance the data rate and to ensure the Quality of Service (QoS) for the users in the next generation of wireless communications. In this thesis, we propose a Two-Way DF NOMA scheme (called a TWNOMA protocol) in which an intermediate relay helps two source nodes to communicate with each other. Simulation and analysis results show that the proposed protocol TWNOMA is improving the data rate when comparing with a conventional Two-Way scheme using digital network coding (DNC) (called a TWDNC protocol), Two-Way scheme without using DNC (called a TWNDNC protocol) and Two-Way scheme in amplify-and-forward(AF) relay systems (called a TWANC protocol). Finally, we considered the combination of the NOMA and physical layer security (PLS) in the Underlay Cooperative Cognitive Network (UCCN). The best relay selection strategy is investigated, which uses the NOMA and considers the PLS to enhance the transmission efficiency and secrecy of the new generation wireless networks.V této dizertační práci je provedena studie nových přenosových protokolů pro různé bezdrátové síťové systémy. S využitím matematické analýzy jsme analyzovali a vyhodnotili efektivitu přenosu z hlediska pravděpodobnosti výpadku přes Rayleighův kanál. Teoretické analýzy jsou ověřeny provedenými simulacemi metodou Monte Carlo. Nejprve došlo ke studii kooperativního přenosu ve dvoucestném dekóduj-a-předej (Two-Way Decode-and-Forward–TWDF) a vícecestném DF schématu s větším počtem přenosových uzlů pro sekundární systém, kdy takto byl získán přístup ke spektru spolu s primárním systémem. Konkrétně jsme navrhli dvoucestné DF schéma se získáváním energie a dvoucestné DF neortogonální schéma s mnohonásobným přístupem (Non-orthogonal Multiple Access–NOMA) s digitálním síťovým kódováním. Kromě toho rovněž zkoumáme bezdrátové systémy s větším počtem přenosových uzlů, kde je přítomen výběr nejlepšího přenosového uzlu pro optimalizaci efektivnosti navrženého schématu. Přenosové protokoly navržených schémat EHAF (Energy Harvesting Amplify and Forward) a EHDF(Energy Harvesting Decode and Forward) jsou společně porovnány v identickém prostředí z pohledu pravděpodobnosti výpadku. Následně, na základě získaných výsledků, jsme dospěli k závěru, že navržená schémata vylepšují výkonnost bezdrátových kooperativních systémů, konkrétně jejich propustnost. Dále jsme se zaměřili na zkoumání NOMA technologie a navrhli optimální řešení (protokoly) pro urychlení datového přenosu a zajištění QoS v další generaci bezdrátových komunikací. V této práci jsme navrhli dvoucestné DF NOMA schéma (nazýváno jako TWNOMA protokol), ve kterém mezilehlý přenosový uzel napomáhá dvěma zdrojovým uzlům komunikovat mezi sebou. Výsledky simulace a analýzy ukazují, že navržený protokol TWNOMA vylepšuje dosaženou přenosovou rychlost v porovnání s konvenčním dvoucestným schématem používajícím DNC (TWDNC protokol), dvoucestným schématem bez použití DNC (TWNDNC protokol) a dvoucestným schématem v zesil-a-předej (amplify-and-forward) přenosových systémech (TWANC protokol). Nakonec jsme zvážili využití kombinace NOMA a zabezpečení fyzické vrstvy (Physical Layer Security–PLS) v podpůrné kooperativní kognitivní síti (Underlay Cooperative Cognitive Network–UCCN). Zde je zde zkoumán výběr nejlepšího přenosového uzlu, který užívá NOMA a bere v úvahu PLS pro efektivnější přenos a zabezpečení nové generace bezdrátových sítí.440 - Katedra telekomunikační technikyvyhově

    Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection

    Get PDF
    In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116
    corecore