191 research outputs found

    A study on social-based cooperative sensing in cognitive radio networks

    Get PDF
    A cognitive radio (CR) is an intelligent radio that reuses frequency band based on dynamic spectrum access (DSA). CR implements spectrum sensing to detect primary users' (PU) presence, and exploits available spectrum without interfering PU. In contrast with local spectrum sensing, cooperative sensing which is implemented by multiple CRs, is more efficient and effective generally. Previous work on cooperative spectrum sensing in cognitive radio (CR) assumes a default mode that CRs are willing to cooperate for others unconditionally. While this situation does not always hold, the requested CR might reject the cooperation request due to its insufficient energy, or security concerns. In this thesis, we propose a social-based cooperative sensing scheme (SBC) that exploits social ties of CRs on their cooperative sensing. Simulation results show that SBC fulfills improved sensing quality, and the sensing performance of CRs correlate to the social degree and social network topology

    MIMO-OFDM Based Energy Harvesting Cooperative Communications Using Coalitional Game Algorithm

    Get PDF
    This document is the Accepted Manuscript version. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.In this paper, we consider the problem of cooperative communication between relays and base station in an advanced MIMO-OFDM framework, under the assumption that the relays are supplied by electric power drawn from energy harvesting (EH) sources. In particular, we focus on the relay selection, with the goal to guarantee the required performance in terms of capacity. In order to maximize the data throughput under the EH constraint, we model the transmission scheme as a non-transferable coalition formation game, with characteristic function based on an approximated capacity expression. Then, we introduce a powerful mathematical tool inherent to coalitional game theory, namely: the Shapley value (Sv) to provide a reliable solution concept to the game. The selected relays will form a virtual dynamically-configuredMIMO network that is able to transmit data to destination using efficient space-time coding techniques. Numerical results, obtained by simulating the EH-powered cooperativeMIMO-OFDMtransmission with Algebraic Space-Time Coding (ASTC), prove that the proposed coalitional game-based relay selection allows to achieve performance very close to that obtained by the same system operated by guaranteed power supply. The proposed methodology is finally compared with some recent related state-of-the-art techniques showing clear advantages in terms of link performance and goodput.Peer reviewe

    Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying

    Full text link

    Security for 5G Mobile Wireless Networks

    Get PDF
    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key management and privacy. The paper further discusses the new security features involving different technologies applied to 5G such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software defined networks and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantage of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized

    Cross-layer optimization for cooperative content distribution in multihop device-to-device networks

    Get PDF
    With the ubiquity of wireless network and the intelligentization of machines, Internet of Things (IoT) has come to people's horizon. Device-to-device (D2D), as one advanced technique to achieve the vision of IoT, supports a high speed peer-to-peer transmission without fixed infrastructure forwarding which can enable fast content distribution in local area. In this paper, we address the content distribution problem by multihop D2D communication with decentralized content providers locating in the networks. We consider a cross-layer multidimension optimization involving frequency, space, and time, to minimize the network average delay. Considering the multicast feature, we first formulate the problem as a coalitional game based on the payoffs of content requesters, and then, propose a time-varying coalition formation-based algorithm to spread the popular content within the shortest possible time. Simulation results show that the proposed approach can achieve a fast content distribution across the whole area, and the performance on network average delay is much better than other heuristic approaches

    Design of medium access control techniques for cooperative wireless networks

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Device-to-device communications: a performance analysis in the context of social comparison-based relaying

    Get PDF
    Device-to-device (D2D) communications are recognized as a key enabler of future cellular networks which will help to drive improvements in spectral efficiency and assist with the offload of network traffic. Among the transmission modes of D2D communications are single-hop and relay assisted multi-hop transmission. Relay-assisted D2D communications will be essential when there is an extended distance between the source and destination or when the transmit power of D2D user equipments (UEs) is constrained below a certain level. Although a number of works on relay-assisted D2D communications have been presented in the literature, most of those assume that relay nodes cooperate unequivocally. In reality, this cannot be assumed since there is little incentive to cooperate without a guarantee of future reciprocal behavior. Cooperation is a social behavior that depends on various factors, such as peer comparison, incentives, the cost to the donor and the benefit to the recipient. To incorporate the social behavior of D2D relay nodes, we consider the decision to relay using the donation game based on social comparison and characterize the probability of cooperation in an evolutionary context. We then apply this within a stochastic geometric framework to evaluate the outage probability and transmission capacity of relay assisted D2D communications. Through numerical evaluations, we investigate the performance gap between the ideal case of 100% cooperation and practical scenarios with a lower cooperation probability. It shows that practical scenarios achieve lower transmission capacity and higher outage probability than idealistic network views which assume full cooperation. After a sufficient number of generations, however, the cooperation probability follows the natural rules of evolution and the transmission performance of practical scenarios approach that of the full cooperation case, indicating that all D2D relay nodes adopt the same dominant cooperative strategy based on social comparison, without the need for enforcement by an external authority
    corecore