415 research outputs found

    Effect of Primary Interference on Cognitive Relay Network

    Get PDF
    Cognitive relay network is a method for optimizing frequency spectrum utilization. What’s important in these networks is to transmit data such that none of primary and secondary users cause destructive interference to other users. Although primary interference affect cognitive network performance, but is neglected in former researches. In this paper, we show cognitive network performance by calculating outage probability. We consider both primary and secondary interference links. Finally, our study is corroborated by representative numerical example. Simulation results demonstrate that increasing interference threshold increase outage probability and increasing data transmit rate cause outage probability increase

    Performance study of an underlay cognitive radio network in the presence of co-channel interference

    Get PDF
    PhD ThesisMassive innovation in all aspects of the wireless communication network has been witnessed over the last few decades. The demand for data throughput is continuously growing, as such, the current regulations for allocating frequency spectrum are not able to respond to this exponential growth. Cognitive radio (CR), has been proposed as a solution to this problem. One of the possible scenarios of the implementation of CR is underlay cognitive radio. In this thesis the performance of an underlay cognitive radio network (UCRN) in the presence of the co-channel interference (CCI) is assessed. Firstly, the impact of CCI on the dual-hop cooperative UCRN is investigated over Rayleigh fading channels. In order to do this, the exact outage probability (OP), average error probability (AEP) and the ergodic capacity (EC) are studied. In addition, simple and asymptotic expressions for the OP and AEP are derived. Furthermore, the optimal power allocation is investigated to enhance the network performance. Moreover, the performance of a multi-user scenario is studied by considering the opportunistic SNR-based selection technique. Secondly, the effect of both primary network interference and CCI on the dual-hop UCRN over Rayleigh fading channels are studied. The equivalent signal-to-interference-plus-noise ratio (SINR) for this network scenario is obtained by considering multi-antenna schemes at all receiver nodes. The different signal combinations at the receiver nodes are investigated and compared, such as selection combining (SC) and maximum ratio combining (MRC) techniques. Then, the equivalent probability density function (PDF) and cumulative distribution function (CDF) of the network’s equivalent SINR are derived and discussed. Furthermore, expressions for the exact OP, AEP, and EC are derived and reviewed. In addition, asymptotic OP expressions are obtained for different case scenarios to gain an insight into the network parameters. Thirdly, multiple-input multiple-output (MIMO) UCRN is investigated under the influence of primary transmitter interference and CCI over Rayleigh fading channels. The transmit antenna selection and maximum ratio combining (TAS/MRC) techniques are considered for examining the performance of the secondary network. At first the equivalent SINR for the system is derived, then the exact and approximate expressions for the OP are derived and discussed. Fourthly, considering Nakagami-m fading channels, the performance of the UCRN is thoroughly studied with the consideration of the impact of primary network interference and CCI. The equivalent SINR for the secondary system is derived. Then, the system equivalent PDF and CDF are derived and discussed. Furthermore, the OP and AEP performances are investigated. Finally, for the cases mentioned above, numerical examples in conjunction with MatLab Monte Carlo simulations are provided to validate the derived results. The results show that CCI is one of the factors that severely reduces the UCRN performance. This can be more observable when the CCI power increases linearly with the transmission power of the secondary transmitter nodes. Furthermore, it was found that in a multi-user scenario the opportunistic SNR-based selection technique consideration can improve the performance of the network. Moreover, adaptive power allocation is found to give better results than equal power allocation. In addition, cooperative communication can be considered to be an effective way to combat the impact of transmission power limitation of the secondary network and interference power constraint. The multi-antenna schemes are another important consideration for enhancing the overall performance. In fact, despite the interference from the CCI and primary user sources, the multi-antennas scheme does not lose its advantage in the UCRN performance improvementHigher Committee for Education Development in Iraq (HCED). I am also grateful to the Ministry of Transportation and Communication, Kurdistan Regional Government-Iraq

    Relay Selection Strategies for Multi-hop Cooperative Networks

    Get PDF
    In this dissertation we consider several relay selection strategies for multi-hop cooperative networks. The relay selection strategies we propose do not require a central controller (CC). Instead, the relay selection is on a hop-by-hop basis. As such, these strategies can be implemented in a distributed manner. Therefore, increasing the number of hops in the network would not increase the complexity or time consumed for the relay selection procedure of each hop. We first investigate the performance of a hop-by-hop relay selection strategy for multi-hop decode-and-forward (DF) cooperative networks. In each relay cluster, relays that successfully receive and decode the message from the previous hop form a decoding set for relaying, and the relay which has the highest signal-to-noise ratio (SNR) link to the next hop is then selected for retransmission. We analyze the performance of this method in terms of end-to-end outage probability, and we derive approximations for the ergodic capacity and the effective ergodic capacity of this strategy. Next we propose a novel hop-by-hop relay selection strategy where the relay in the decoding set with the largest number of ``good\u27\u27 channels to the next stage is selected for retransmission. We analyze the performance of this method in terms of end-to-end outage probability in the case of perfect and imperfect channel state information (CSI). We also investigate relay selection strategies in underlay spectrum sharing cognitive relay networks. We consider a two-hop DF cognitive relay network with a constraint on the interference to the primary user. The outage probability of the secondary user and the interference probability at the primary user are analyzed under imperfect CSI scenario. Finally we introduce a hop-by-hop relay selection strategy for underlay spectrum sharing multi-hop relay networks. Relay selection in each stage is only based on the CSI in that hop. It is shown that in terms of outage probability, the performance of this method is nearly optimal

    On the Calculation of the Incomplete MGF with Applications to Wireless Communications

    Get PDF
    (c) 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. DOI: 10.1109/TCOMM.2016.2626440The incomplete moment generating function (IMGF) has paramount relevance in communication theory, since it appears in a plethora of scenarios when analyzing the performance of communication systems. We here present a general method for calculating the IMGF of any arbitrary fading distribution. Then, we provide exact closed-form expressions for the IMGF of the very general κ-μ shadowed fading model, which includes the popular κ-μ, η-μ, Rician shadowed, and other classical models as particular cases. We illustrate the practical applicability of this result by analyzing several scenarios of interest in wireless communications: 1) physical layer security in the presence of an eavesdropper; 2) outage probability analysis with interference and background noise; 3) channel capacity with side information at the transmitter and the receiver; and 4) average bit-error rate with adaptive modulation, when the fading on the desired link can be modeled by any of the aforementioned distributions.Universidad de Málaga. Campus de Execelencia Internacional. Andalucía Tech

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Vehicular Dynamic Spectrum Access: Using Cognitive Radio for Automobile Networks

    Get PDF
    Vehicular Dynamic Spectrum Access (VDSA) combines the advantages of dynamic spectrum access to achieve higher spectrum efficiency and the special mobility pattern of vehicle fleets. This dissertation presents several noval contributions with respect to vehicular communications, especially vehicle-to-vehicle communications. Starting from a system engineering aspect, this dissertation will present several promising future directions for vehicle communications, taking into consideration both the theoretical and practical aspects of wireless communication deployment. This dissertation starts with presenting a feasibility analysis using queueing theory to model and estimate the performance of VDSA within a TV whitespace environment. The analytical tool uses spectrum measurement data and vehicle density to find upper bounds of several performance metrics for a VDSA scenario in TVWS. Then, a framework for optimizing VDSA via artificial intelligence and learning, as well as simulation testbeds that reflect realistic spectrum sharing scenarios between vehicle networks and heterogeneous wireless networks including wireless local area networks and wireless regional area networks. Detailed experimental results justify the testbed for emulating a mobile dynamic spectrum access environment composed of heterogeneous networks with four dimensional mutual interference. Vehicular cooperative communication is the other proposed technique that combines the cooperative communication technology and vehicle platooning, an emerging concept that is expected to both increase highway utilization and enhance both driver experience and safety. This dissertation will focus on the coexistence of multiple vehicle groups in shared spectrum, where intra-group cooperation and inter-group competition are investigated in the aspect of channel access. Finally, a testbed implementation VDSA is presented and a few applications are developed within a VDSA environment, demonstrating the feasibility and benefits of some features in a future transportation system

    Enhancing physical layer security in wireless networks with cooperative approaches

    Get PDF
    Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information (CSI). The first part of the thesis investigates secret communication through relay-assisted cognitive interference channel. The primary and secondary base stations (PBS and SBS) communicate with the primary and secondary receivers (PR and SR) respectively in the presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with the PBS over the same spectrum instead of waiting for an idle channel. To improve security, cognitive relays transmit cooperative jamming (CJ) signals to create additional interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to improve the secrecy rate of cognitive interference channels depending on the structure of cooperative relays. In the scheme where the multiple-antenna relay transmits weighted jamming signals, the combined approach of CJ and beamforming is investigated. In the scheme with multiple relays transmitting weighted jamming signals, the combined approach of CJ and relay selection is analyzed. Numerical results show that both these two schemes are effective in improving physical layer security of cognitive interference channel. In the second part, the focus is shifted to physical layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly distributed. Three scenarios are analyzed to investigate the impact of various factors on security. In scenario one, the basic scheme is studied without a protected zone and interference. The probability distribution function (PDF) of channel gain with both fading and path loss has been derived and further applied to derive secrecy connectivity and ergodic secrecy capacity. In the second scenario, we studied using a protected zone surrounding the source node to enhance security where interference is absent. Both the cases that eavesdroppers are aware and unaware of the protected zone boundary are investigated. Based on the above scenarios, further deployment of the protected zones at legitimate receivers is designed to convert detrimental interference into a beneficial factor. Numerical results are investigated to check the reliability of the PDF for reciprocal of channel gain and to analyze the impact of protected zones on secrecy performance. In the third part, physical layer security in the downlink transmission of cellular network is studied. To model the repulsive property of the cellular network planning, we assume that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while the eavesdroppers are deployed as an independent Poisson point process (PPP). The distribution function of the distances from a typical point to the nodes of the HCPP is derived. The noise-limited and interference-limited cellular networks are investigated by applying the fractional frequency reuse (FFR) in the system. For the noise-limited network, we derive the secrecy outage probability with two different strategies, i.e. the best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For the interference-limited network with the nearest BS serve, two transmission schemes are analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both the schemes of transmitting with the best BS and the application of the FFR are beneficial for physical layer security in the downlink cellular networks, while the improvement du

    Secrecy Performance Analysis of Mixed α - μ and Exponentiated Weibull RF-FSO Cooperative Relaying System

    Get PDF
    Funding Information: This work was supported in part by the National Research Foundation of Korea—Grant funded by the Korean Government under Grant Ministry of Science and ICT-NRF-2020R1A2B5B02002478, and in part by Sejong University through its Faculty Research Program under Grant 20212023.Peer reviewedPublisher PD
    • …
    corecore