415 research outputs found
Effect of Primary Interference on Cognitive Relay Network
Cognitive relay network is a method for optimizing frequency spectrum utilization. What’s important in these networks is to transmit data such that none of primary and secondary users cause destructive interference to other users. Although primary interference affect cognitive network performance, but is neglected in former researches. In this paper, we show cognitive network performance by calculating outage probability. We consider both primary and secondary interference links. Finally, our study is corroborated by representative numerical example. Simulation results demonstrate that increasing interference threshold increase outage probability and increasing data transmit rate cause outage probability increase
Performance study of an underlay cognitive radio network in the presence of co-channel interference
PhD ThesisMassive innovation in all aspects of the wireless communication network
has been witnessed over the last few decades. The demand for data
throughput is continuously growing, as such, the current regulations for
allocating frequency spectrum are not able to respond to this exponential growth. Cognitive radio (CR), has been proposed as a solution to
this problem. One of the possible scenarios of the implementation of CR
is underlay cognitive radio. In this thesis the performance of an underlay cognitive radio network (UCRN) in the presence of the co-channel
interference (CCI) is assessed.
Firstly, the impact of CCI on the dual-hop cooperative UCRN is investigated over Rayleigh fading channels. In order to do this, the exact outage
probability (OP), average error probability (AEP) and the ergodic capacity (EC) are studied. In addition, simple and asymptotic expressions
for the OP and AEP are derived. Furthermore, the optimal power allocation is investigated to enhance the network performance. Moreover,
the performance of a multi-user scenario is studied by considering the
opportunistic SNR-based selection technique.
Secondly, the effect of both primary network interference and CCI on
the dual-hop UCRN over Rayleigh fading channels are studied. The
equivalent signal-to-interference-plus-noise ratio (SINR) for this network
scenario is obtained by considering multi-antenna schemes at all receiver
nodes. The different signal combinations at the receiver nodes are investigated and compared, such as selection combining (SC) and maximum
ratio combining (MRC) techniques. Then, the equivalent probability
density function (PDF) and cumulative distribution function (CDF) of
the network’s equivalent SINR are derived and discussed. Furthermore,
expressions for the exact OP, AEP, and EC are derived and reviewed.
In addition, asymptotic OP expressions are obtained for different case
scenarios to gain an insight into the network parameters.
Thirdly, multiple-input multiple-output (MIMO) UCRN is investigated
under the influence of primary transmitter interference and CCI over
Rayleigh fading channels. The transmit antenna selection and maximum
ratio combining (TAS/MRC) techniques are considered for examining
the performance of the secondary network. At first the equivalent SINR
for the system is derived, then the exact and approximate expressions
for the OP are derived and discussed.
Fourthly, considering Nakagami-m fading channels, the performance of
the UCRN is thoroughly studied with the consideration of the impact
of primary network interference and CCI. The equivalent SINR for the
secondary system is derived. Then, the system equivalent PDF and CDF
are derived and discussed. Furthermore, the OP and AEP performances
are investigated.
Finally, for the cases mentioned above, numerical examples in conjunction with MatLab Monte Carlo simulations are provided to validate the
derived results. The results show that CCI is one of the factors that
severely reduces the UCRN performance. This can be more observable
when the CCI power increases linearly with the transmission power of
the secondary transmitter nodes. Furthermore, it was found that in
a multi-user scenario the opportunistic SNR-based selection technique
consideration can improve the performance of the network. Moreover,
adaptive power allocation is found to give better results than equal power
allocation. In addition, cooperative communication can be considered to
be an effective way to combat the impact of transmission power limitation of the secondary network and interference power constraint. The
multi-antenna schemes are another important consideration for enhancing the overall performance. In fact, despite the interference from the
CCI and primary user sources, the multi-antennas scheme does not lose
its advantage in the UCRN performance improvementHigher Committee for Education Development in Iraq (HCED). I am also grateful to
the Ministry of Transportation and Communication, Kurdistan Regional
Government-Iraq
Relay Selection Strategies for Multi-hop Cooperative Networks
In this dissertation we consider several relay selection strategies for multi-hop cooperative networks. The relay selection strategies we propose do not require a central controller (CC). Instead, the relay selection is on a hop-by-hop basis. As such, these strategies can be implemented in a distributed manner. Therefore, increasing the number of hops in the network would not increase the complexity or time consumed for the relay selection procedure of each hop. We first investigate the performance of a hop-by-hop relay selection strategy for multi-hop decode-and-forward (DF) cooperative networks. In each relay cluster, relays that successfully receive and decode the message from the previous hop form a decoding set for relaying, and the relay which has the highest signal-to-noise ratio (SNR) link to the next hop is then selected for retransmission. We analyze the performance of this method in terms of end-to-end outage probability, and we derive approximations for the ergodic capacity and the effective ergodic capacity of this strategy. Next we propose a novel hop-by-hop relay selection strategy where the relay in the decoding set with the largest number of ``good\u27\u27 channels to the next stage is selected for retransmission. We analyze the performance of this method in terms of end-to-end outage probability in the case of perfect and imperfect channel state information (CSI). We also investigate relay selection strategies in underlay spectrum sharing cognitive relay networks. We consider a two-hop DF cognitive relay network with a constraint on the interference to the primary user. The outage probability of the secondary user and the interference probability at the primary user are analyzed under imperfect CSI scenario. Finally we introduce a hop-by-hop relay selection strategy for underlay spectrum sharing multi-hop relay networks. Relay selection in each stage is only based on the CSI in that hop. It is shown that in terms of outage probability, the performance of this method is nearly optimal
On the Calculation of the Incomplete MGF with Applications to Wireless Communications
(c) 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. DOI: 10.1109/TCOMM.2016.2626440The incomplete moment generating function (IMGF) has paramount relevance in communication theory, since it appears in a plethora of scenarios when analyzing the performance of communication systems. We here present a general method for calculating the IMGF of any arbitrary fading distribution. Then, we provide exact closed-form expressions for the IMGF of the very general κ-μ shadowed fading model, which includes the popular κ-μ, η-μ, Rician shadowed, and other classical models as particular cases. We illustrate the practical applicability of this result by analyzing several scenarios of interest in wireless communications: 1) physical layer security in the presence of an eavesdropper; 2) outage probability analysis with interference and background noise; 3) channel capacity with side information at the transmitter and the receiver; and 4) average bit-error rate with adaptive modulation, when the fading on the desired link can be modeled by any of the aforementioned distributions.Universidad de Málaga. Campus de Execelencia Internacional. AndalucÃa Tech
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Recommended from our members
Performance analysis of energy detector over generalised wireless channels in cognitive radio
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University London.This thesis extensively analyses the performance of an energy detector which is
widely employed to perform spectrum sensing in cognitive radio over different generalised
channel models. In this analysis, both the average probability of detection and
the average area under the receiver operating characteristic curve (AUC) are derived
using the probability density function of the received instantaneous signal to noise
ratio (SNR). The performance of energy detector over an ŋ --- µ fading, which is used
to model the Non-line-of-sight (NLoS) communication scenarios is provided. Then,
the behaviour of the energy detector over к --- µ shadowed fading channel, which is
a composite of generalized multipath/shadowing fading channel to model the lineof-
sight (LoS) communication medium is investigated. The analysis of the energy
detector over both ŋ --- µ and к --- µ shadowed fading channels are then extended to
include maximal ratio combining (MRC), square law combining (SLC) and square
law selection (SLS) with independent and non-identically (i:n:d) diversity branches.
To overcome the problem of mathematical intractability in analysing the energy
detector over i:n:d composite fading channels with MRC and selection combining
(SC), two different unified statistical properties models for the sum and the maximum
of mixture gamma (MG) variates are derived. The first model is limited by the value
of the shadowing severity index, which should be an integer number and has been
employed to study the performance of energy detector over composite α --- µ /gamma
fading channel. This channel is proposed to represent the non-linear prorogation
environment. On the other side, the second model is general and has been utilised to
analyse the behaviour of energy detector over composite ŋ --- µ /gamma fading channel.
Finally, a special filter-bank transform which is called slantlet packet transform
(SPT) is developed and used to estimate the uncertain noise power. Moreover, signal
denoising based on hybrid slantlet transform (HST) is employed to reduce the noise
impact on the performance of energy detector. The combined SPT-HST approach
improves the detection capability of energy detector with 97% and reduces the total
computational complexity by nearly 19% in comparison with previously implemented
work using filter-bank transforms. The aforementioned percentages are measured at
specific SNR, number of selected samples and levels of signal decompositionMartyrs Foundatio
Vehicular Dynamic Spectrum Access: Using Cognitive Radio for Automobile Networks
Vehicular Dynamic Spectrum Access (VDSA) combines the advantages of dynamic spectrum access to achieve higher spectrum efficiency and the special mobility pattern of vehicle fleets. This dissertation presents several noval contributions with respect to vehicular communications, especially vehicle-to-vehicle communications. Starting from a system engineering aspect, this dissertation will present several promising future directions for vehicle communications, taking into consideration both the theoretical and practical aspects of wireless communication deployment. This dissertation starts with presenting a feasibility analysis using queueing theory to model and estimate the performance of VDSA within a TV whitespace environment. The analytical tool uses spectrum measurement data and vehicle density to find upper bounds of several performance metrics for a VDSA scenario in TVWS. Then, a framework for optimizing VDSA via artificial intelligence and learning, as well as simulation testbeds that reflect realistic spectrum sharing scenarios between vehicle networks and heterogeneous wireless networks including wireless local area networks and wireless regional area networks. Detailed experimental results justify the testbed for emulating a mobile dynamic spectrum access environment composed of heterogeneous networks with four dimensional mutual interference. Vehicular cooperative communication is the other proposed technique that combines the cooperative communication technology and vehicle platooning, an emerging concept that is expected to both increase highway utilization and enhance both driver experience and safety. This dissertation will focus on the coexistence of multiple vehicle groups in shared spectrum, where intra-group cooperation and inter-group competition are investigated in the aspect of channel access. Finally, a testbed implementation VDSA is presented and a few applications are developed within a VDSA environment, demonstrating the feasibility and benefits of some features in a future transportation system
Enhancing physical layer security in wireless networks with cooperative approaches
Motivated by recent developments in wireless communication, this thesis aims to
characterize the secrecy performance in several types of typical wireless networks.
Advanced techniques are designed and evaluated to enhance physical layer security in
these networks with realistic assumptions, such as signal propagation loss, random node
distribution and non-instantaneous channel state information (CSI).
The first part of the thesis investigates secret communication through relay-assisted
cognitive interference channel. The primary and secondary base stations (PBS and SBS)
communicate with the primary and secondary receivers (PR and SR) respectively in the
presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with
the PBS over the same spectrum instead of waiting for an idle channel. To improve
security, cognitive relays transmit cooperative jamming (CJ) signals to create additional
interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to
improve the secrecy rate of cognitive interference channels depending on the structure of
cooperative relays. In the scheme where the multiple-antenna relay transmits weighted
jamming signals, the combined approach of CJ and beamforming is investigated. In
the scheme with multiple relays transmitting weighted jamming signals, the combined
approach of CJ and relay selection is analyzed. Numerical results show that both these
two schemes are effective in improving physical layer security of cognitive interference
channel.
In the second part, the focus is shifted to physical layer security in a random wireless
network where both legitimate and eavesdropping nodes are randomly distributed. Three
scenarios are analyzed to investigate the impact of various factors on security. In
scenario one, the basic scheme is studied without a protected zone and interference. The
probability distribution function (PDF) of channel gain with both fading and path loss
has been derived and further applied to derive secrecy connectivity and ergodic secrecy
capacity. In the second scenario, we studied using a protected zone surrounding the source
node to enhance security where interference is absent. Both the cases that eavesdroppers
are aware and unaware of the protected zone boundary are investigated. Based on the
above scenarios, further deployment of the protected zones at legitimate receivers is
designed to convert detrimental interference into a beneficial factor. Numerical results
are investigated to check the reliability of the PDF for reciprocal of channel gain and to
analyze the impact of protected zones on secrecy performance.
In the third part, physical layer security in the downlink transmission of cellular network
is studied. To model the repulsive property of the cellular network planning, we assume
that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while
the eavesdroppers are deployed as an independent Poisson point process (PPP). The
distribution function of the distances from a typical point to the nodes of the HCPP is
derived. The noise-limited and interference-limited cellular networks are investigated
by applying the fractional frequency reuse (FFR) in the system. For the noise-limited
network, we derive the secrecy outage probability with two different strategies, i.e. the
best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For
the interference-limited network with the nearest BS serve, two transmission schemes are
analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both
the schemes of transmitting with the best BS and the application of the FFR are beneficial
for physical layer security in the downlink cellular networks, while the improvement du
Secrecy Performance Analysis of Mixed α - μ and Exponentiated Weibull RF-FSO Cooperative Relaying System
Funding Information: This work was supported in part by the National Research Foundation of Korea—Grant funded by the Korean Government under Grant Ministry of Science and ICT-NRF-2020R1A2B5B02002478, and in part by Sejong University through its Faculty Research Program under Grant 20212023.Peer reviewedPublisher PD
- …