5,799 research outputs found

    Cognitive Radio Networks: Realistic or Not?

    Full text link
    A large volume of research has been conducted in the cognitive radio (CR) area the last decade. However, the deployment of a commercial CR network is yet to emerge. A large portion of the existing literature does not build on real world scenarios, hence, neglecting various important interactions of the research with commercial telecommunication networks. For instance, a lot of attention has been paid to spectrum sensing as the front line functionality that needs to be completed in an efficient and accurate manner to enable an opportunistic CR network architecture. This is necessary to detect the existence of spectrum holes without which no other procedure can be fulfilled. However, simply sensing (cooperatively or not) the energy received from a primary transmitter cannot enable correct dynamic spectrum access. For example, the low strength of a primary transmitter's signal does not assure that there will be no interference to a nearby primary receiver. In addition, the presence of a primary transmitter's signal does not mean that CR network users cannot access the spectrum since there might not be any primary receiver in the vicinity. Despite the existing elegant and clever solutions to the DSA problem no robust, implementable scheme has emerged. In this paper, we challenge the basic premises of the proposed schemes. We further argue that addressing the technical challenges we face in deploying robust CR networks can only be achieved if we radically change the way we design their basic functionalities. In support of our argument, we present a set of real-world scenarios, inspired by realistic settings in commercial telecommunications networks, focusing on spectrum sensing as a basic and critical functionality in the deployment of CRs. We use these scenarios to show why existing DSA paradigms are not amenable to realistic deployment in complex wireless environments.Comment: Work in progres

    Information reuse in dynamic spectrum access

    Get PDF
    Dynamic spectrum access (DSA), where the permission to use slices of radio spectrum is dynamically shifted (in time an in different geographical areas) across various communications services and applications, has been an area of interest from technical and public policy perspectives over the last decade. The underlying belief is that this will increase spectrum utilization, especially since many spectrum bands are relatively unused, ultimately leading to the creation of new and innovative services that exploit the increase in spectrum availability. Determining whether a slice of spectrum, allocated or licensed to a primary user, is available for use by a secondary user at a certain time and in a certain geographic area is a challenging task. This requires 'context information' which is critical to the operation of DSA. Such context information can be obtained in several ways, with different costs, and different quality/usefulness of the information. In this paper, we describe the challenges in obtaining this context information, the potential for the integration of various sources of context information, and the potential for reuse of such information for related and unrelated purposes such as localization and enforcement of spectrum sharing. Since some of the infrastructure for obtaining finegrained context information is likely to be expensive, the reuse of this infrastructure/information and integration of information from less expensive sources are likely to be essential for the economical and technological viability of DSA. © 2013 IEEE

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Breaking the Area Spectral Efficiency Wall in Cognitive Underlay Networks

    Get PDF
    In this article, we develop a comprehensive analytical framework to characterize the area spectral efficiency of a large scale Poisson cognitive underlay network. The developed framework explicitly accommodates channel, topological and medium access uncertainties. The main objective of this study is to launch a preliminary investigation into the design considerations of underlay cognitive networks. To this end, we highlight two available degrees of freedom, i.e., shaping medium access or transmit power. While from the primary user's perspective tuning either to control the interference is equivalent, the picture is different for the secondary network. We show the existence of an area spectral efficiency wall under both adaptation schemes. We also demonstrate that the adaptation of just one of these degrees of freedom does not lead to the optimal performance. But significant performance gains can be harnessed by jointly tuning both the medium access probability and the transmission power of the secondary networks. We explore several design parameters for both adaptation schemes. Finally, we extend our quest to more complex point-to-point and broadcast networks to demonstrate the superior performance of joint tuning policies

    Cellular Interference Alignment

    Full text link
    Interference alignment promises that, in Gaussian interference channels, each link can support half of a degree of freedom (DoF) per pair of transmit-receive antennas. However, in general, this result requires to precode the data bearing signals over a signal space of asymptotically large diversity, e.g., over an infinite number of dimensions for time-frequency varying fading channels, or over an infinite number of rationally independent signal levels, in the case of time-frequency invariant channels. In this work we consider a wireless cellular system scenario where the promised optimal DoFs are achieved with linear precoding in one-shot (i.e., over a single time-frequency slot). We focus on the uplink of a symmetric cellular system, where each cell is split into three sectors with orthogonal intra-sector multiple access. In our model, interference is "local", i.e., it is due to transmitters in neighboring cells only. We consider a message-passing backhaul network architecture, in which nearby sectors can exchange already decoded messages and propose an alignment solution that can achieve the optimal DoFs. To avoid signaling schemes relying on the strength of interference, we further introduce the notion of \emph{topologically robust} schemes, which are able to guarantee a minimum rate (or DoFs) irrespectively of the strength of the interfering links. Towards this end, we design an alignment scheme which is topologically robust and still achieves the same optimum DoFs

    Dynamic Resource Allocation in Cognitive Radio Networks: A Convex Optimization Perspective

    Full text link
    This article provides an overview of the state-of-art results on communication resource allocation over space, time, and frequency for emerging cognitive radio (CR) wireless networks. Focusing on the interference-power/interference-temperature (IT) constraint approach for CRs to protect primary radio transmissions, many new and challenging problems regarding the design of CR systems are formulated, and some of the corresponding solutions are shown to be obtainable by restructuring some classic results known for traditional (non-CR) wireless networks. It is demonstrated that convex optimization plays an essential role in solving these problems, in a both rigorous and efficient way. Promising research directions on interference management for CR and other related multiuser communication systems are discussed.Comment: to appear in IEEE Signal Processing Magazine, special issue on convex optimization for signal processin

    Mobile Communication Networks and Digital Television Broadcasting Systems in the Same Frequency Bands – Advanced Co-Existence Scenarios

    Get PDF
    The increasing demand for wireless multimedia services provided by modern communication systems with stable services is a key feature of advanced markets. On the other hand, these systems can many times operate in a neighboring or in the same frequency bands. Therefore, numerous unwanted co-existence scenarios can occur. The aim of this paper is to summarize our results which were achieved during exploration and measurement of the co-existences between still used and upcoming mobile networks (from GSM to LTE) and digital terrestrial television broadcasting (DVB) systems. For all of these measurements and their evaluation universal measurement testbed has been proposed and used. Results presented in this paper are a significant part of our activities in work package WP5 in the ENIAC JU project “Agile RF Transceivers and Front-Ends for Future Smart Multi-Standard Communications Applications (ARTEMOS)”
    corecore