680 research outputs found

    Interference Alignment for Cognitive Radio Communications and Networks: A Survey

    Get PDF
    © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).Interference alignment (IA) is an innovative wireless transmission strategy that has shown to be a promising technique for achieving optimal capacity scaling of a multiuser interference channel at asymptotically high-signal-to-noise ratio (SNR). Transmitters exploit the availability of multiple signaling dimensions in order to align their mutual interference at the receivers. Most of the research has focused on developing algorithms for determining alignment solutions as well as proving interference alignment’s theoretical ability to achieve the maximum degrees of freedom in a wireless network. Cognitive radio, on the other hand, is a technique used to improve the utilization of the radio spectrum by opportunistically sensing and accessing unused licensed frequency spectrum, without causing harmful interference to the licensed users. With the increased deployment of wireless services, the possibility of detecting unused frequency spectrum becomes diminished. Thus, the concept of introducing interference alignment in cognitive radio has become a very attractive proposition. This paper provides a survey of the implementation of IA in cognitive radio under the main research paradigms, along with a summary and analysis of results under each system model.Peer reviewe

    Exact Outage Performance Analysis of Multiuser Multi-relay Spectrum Sharing Cognitive Networks

    Get PDF
    In this paper, we investigate the outage performance of dual-hop multiuser multi-relay cognitive radio networks under spectrum sharing constraints. Using an efficient relay-destination selection scheme, the exact and asymptotic closed-form expressions for the outage probability are derived. From these expressions it is indicated that the achieved diversity order is only determined by the number of secondary user (SU) relays and destinations, and equals to M+N (where M and N are the number of destination nodes and relay nodes, respectively). Further, we find that the coding gain of the SU network will be affected by the interference threshold barIbar I at the primary user (PU) receiver. Specifically, as the increases of the interference threshold, the coding gain of the considered network approaches to that of the multiuser multi-relay system in the non-cognitive network. Finally, our study is corroborated by representative numerical examples

    Cooperative Radar and Communications Signaling: The Estimation and Information Theory Odd Couple

    Full text link
    We investigate cooperative radar and communications signaling. While each system typically considers the other system a source of interference, by considering the radar and communications operations to be a single joint system, the performance of both systems can, under certain conditions, be improved by the existence of the other. As an initial demonstration, we focus on the radar as relay scenario and present an approach denoted multiuser detection radar (MUDR). A novel joint estimation and information theoretic bound formulation is constructed for a receiver that observes communications and radar return in the same frequency allocation. The joint performance bound is presented in terms of the communication rate and the estimation rate of the system.Comment: 6 pages, 2 figures, to be presented at 2014 IEEE Radar Conferenc

    Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks

    Full text link
    In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's quality of service (QoS) constraint while the eavesdroppers attempt to intercept the cognitive transmissions from CUs to CBS. We investigate the physical-layer security against eavesdropping attacks in the cognitive radio network and propose the user scheduling scheme to achieve multiuser diversity for improving the security level of cognitive transmissions with a primary QoS constraint. Specifically, a cognitive user (CU) that satisfies the primary QoS requirement and maximizes the achievable secrecy rate of cognitive transmissions is scheduled to transmit its data packet. For the comparison purpose, we also examine the traditional multiuser scheduling and the artificial noise schemes. We analyze the achievable secrecy rate and intercept probability of the traditional and proposed multiuser scheduling schemes as well as the artificial noise scheme in Rayleigh fading environments. Numerical results show that given a primary QoS constraint, the proposed multiuser scheduling scheme generally outperforms the traditional multiuser scheduling and the artificial noise schemes in terms of the achievable secrecy rate and intercept probability. In addition, we derive the diversity order of the proposed multiuser scheduling scheme through an asymptotic intercept probability analysis and prove that the full diversity is obtained by using the proposed multiuser scheduling.Comment: 12 pages. IEEE Transactions on Communications, 201

    Beacon-Assisted Spectrum Access with Cooperative Cognitive Transmitter and Receiver

    Full text link
    Spectrum access is an important function of cognitive radios for detecting and utilizing spectrum holes without interfering with the legacy systems. In this paper we propose novel cooperative communication models and show how deploying such cooperations between a pair of secondary transmitter and receiver assists them in identifying spectrum opportunities more reliably. These cooperations are facilitated by dynamically and opportunistically assigning one of the secondary users as a relay to assist the other one which results in more efficient spectrum hole detection. Also, we investigate the impact of erroneous detection of spectrum holes and thereof missing communication opportunities on the capacity of the secondary channel. The capacity of the secondary users with interference-avoiding spectrum access is affected by 1) how effectively the availability of vacant spectrum is sensed by the secondary transmitter-receiver pair, and 2) how correlated are the perceptions of the secondary transmitter-receiver pair about network spectral activity. We show that both factors are improved by using the proposed cooperative protocols. One of the proposed protocols requires explicit information exchange in the network. Such information exchange in practice is prone to wireless channel errors (i.e., is imperfect) and costs bandwidth loss. We analyze the effects of such imperfect information exchange on the capacity as well as the effect of bandwidth cost on the achievable throughput. The protocols are also extended to multiuser secondary networks.Comment: 36 pages, 6 figures, To appear in IEEE Transaction on Mobile Computin
    • …
    corecore