4,954 research outputs found
Spectral Efficiency of Multi-User Adaptive Cognitive Radio Networks
In this correspondence, the comprehensive problem of joint power, rate, and
subcarrier allocation have been investigated for enhancing the spectral
efficiency of multi-user orthogonal frequency-division multiple access (OFDMA)
cognitive radio (CR) networks subject to satisfying total average transmission
power and aggregate interference constraints. We propose novel optimal radio
resource allocation (RRA) algorithms under different scenarios with
deterministic and probabilistic interference violation limits based on a
perfect and imperfect availability of cross-link channel state information
(CSI). In particular, we propose a probabilistic approach to mitigate the total
imposed interference on the primary service under imperfect cross-link CSI. A
closed-form mathematical formulation of the cumulative density function (cdf)
for the received signal-to-interference-plus-noise ratio (SINR) is formulated
to evaluate the resultant average spectral efficiency (ASE). Dual decomposition
is utilized to obtain sub-optimal solutions for the non-convex optimization
problems. Through simulation results, we investigate the achievable performance
and the impact of parameters uncertainty on the overall system performance.
Furthermore, we present that the developed RRA algorithms can considerably
improve the cognitive performance whilst abide the imposed power constraints.
In particular, the performance under imperfect cross-link CSI knowledge for the
proposed `probabilistic case' is compared to the conventional scenarios to show
the potential gain in employing this scheme
Cognitive Interference Alignment for OFDM Two-tiered Networks
In this contribution, we introduce an interference alignment scheme that
allows the coexistence of an orthogonal frequency division multiplexing (OFDM)
macro-cell and a cognitive small-cell, deployed in a two-tiered structure and
transmitting over the same bandwidth. We derive the optimal linear strategy for
the single antenna secondary base station, maximizing the spectral efficiency
of the opportunistic link, accounting for both signal sub-space structure and
power loading strategy. Our analytical and numerical findings prove that the
precoder structure proposed is optimal for the considered scenario in the face
of Rayleigh and exponential decaying channels.Comment: 5 pages, 4 figures. Accepted and presented at the IEEE 13th
International Workshop on Signal Processing Advances in Wireless
Communications (SPAWC), 2012. Authors' final version. Copyright transferred
to IEE
Regulatory and Policy Implications of Emerging Technologies to Spectrum Management
This paper provides an overview of the policy implications of technological developments, and how these technologies can accommodate an increased level of market competition. It is based on the work carried out in the SPORT VIEWS (Spectrum Policies and Radio Technologies Viable In Emerging Wireless Societies) research project for the European Commission (FP6)spectrum, new radio technologies, UWB, SDR, cognitive radio, Telecommunications, regulation, Networks, Interconnection
A survey of self organisation in future cellular networks
This article surveys the literature over the period of the last decade on the emerging field of self organisation as applied to wireless cellular communication networks. Self organisation has been extensively studied and applied in adhoc networks, wireless sensor networks and autonomic computer networks; however in the context of wireless cellular networks, this is the first attempt to put in perspective the various efforts in form of a tutorial/survey. We provide a comprehensive survey of the existing literature, projects and standards in self organising cellular networks. Additionally, we also aim to present a clear understanding of this active research area, identifying a clear taxonomy and guidelines for design of self organising mechanisms. We compare strength and weakness of existing solutions and highlight the key research areas for further development. This paper serves as a guide and a starting point for anyone willing to delve into research on self organisation in wireless cellular communication networks
Interference-constrained adaptive simultaneous spectrum sensing and data transmission scheme for unslotted cognitive radio network
Cognitive radio (CR) is widely recognized as a novel approach to improve the spectrum efficiency. However, there exists one problem needed to be resolved urgently, that is the two conflicting goals in CR network: one is to minimize the interference to primary (licensed) system; the other is to maximize the throughput of secondary (unlicensed) system. Meanwhile, the secondary user (SU) has to monitor the spectrum continuously to avoid the interference to primary user (PU), thus the throughput of the secondary system is affected by how often and how long the spectrum sensing is performed. Aiming to balance the two conflicting goals, this article proposes a novel Interference-Constrained Adaptive Simultaneous spectrum Sensing and data Transmission (ICASST) scheme for unslotted CR network, where SUs are not synchronized with PUs. In the ICASST scheme, taking advantage of the statistic information of PU's activities, the data transmission time is adaptively adjusted to avoid the interference peculiar to unslotted CR network; the operation of spectrum sensing is moved to SU receiver from SU transmitter to increase the data transmission time and hence improve the throughput of SU. Simulation results validate the efficiency of ICASST scheme, which significantly increases the throughput of secondary system and decreases the interference to PU simultaneously. © 2012 Yang et al
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …