2,026 research outputs found

    Underlay Cognitive Radio with Full or Partial Channel Quality Information

    Get PDF
    Underlay cognitive radios (UCRs) allow a secondary user to enter a primary user's spectrum through intelligent utilization of multiuser channel quality information (CQI) and sharing of codebook. The aim of this work is to study two-user Gaussian UCR systems by assuming the full or partial knowledge of multiuser CQI. Key contribution of this work is motivated by the fact that the full knowledge of multiuser CQI is not always available. We first establish a location-aided UCR model where the secondary user is assumed to have partial CQI about the secondary-transmitter to primary-receiver link as well as full CQI about the other links. Then, new UCR approaches are proposed and carefully analyzed in terms of the secondary user's achievable rate, denoted by C2C_2, the capacity penalty to primary user, denoted by ΔC1\Delta C_1, and capacity outage probability. Numerical examples are provided to visually compare the performance of UCRs with full knowledge of multiuser CQI and the proposed approaches with partial knowledge of multiuser CQI.Comment: 29 Pages, 8 figure

    Band Allocation for Cognitive Radios with Buffered Primary and Secondary Users

    Full text link
    In this paper, we study band allocation of Ms\mathcal{M}_s buffered secondary users (SUs) to Mp\mathcal{M}_p orthogonal primary licensed bands, where each primary band is assigned to one primary user (PU). Each SU is assigned to one of the available primary bands with a certain probability designed to satisfy some specified quality of service (QoS) requirements for the SUs. In the proposed system, only one SU is assigned to a particular band. The optimization problem used to obtain the stability region's envelope (closure) is shown to be a linear program. We compare the stability region of the proposed system with that of a system where each SU chooses a band randomly with some assignment probability. We also compare with a fixed (deterministic) assignment system, where only one SU is assigned to one of the primary bands all the time. We prove the advantage of the proposed system over the other systems.Comment: Accepted in WCNC 201

    On Orthogonal Band Allocation for Multi-User Multi-Band Cognitive Radio Networks: Stability Analysis

    Full text link
    In this work, we study the problem of band allocation of MsM_s buffered secondary users (SUs) to MpM_p primary bands licensed to (owned by) MpM_p buffered primary users (PUs). The bands are assigned to SUs in an orthogonal (one-to-one) fashion such that neither band sharing nor multi-band allocations are permitted. In order to study the stability region of the secondary network, the optimization problem used to obtain the stability region's envelope (closure) is established and is shown to be a linear program which can be solved efficiently and reliably. We compare our orthogonal allocation system with two typical low-complexity and intuitive band allocation systems. In one system, each cognitive user chooses a band randomly in each time slot with some assignment probability designed such that the system maintained stable, while in the other system fixed (deterministic) band assignment is adopted throughout the lifetime of the network. We derive the stability regions of these two systems. We prove mathematically, as well as through numerical results, the advantages of our proposed orthogonal system over the other two systems.Comment: Conditional Acceptance in IEEE Transactions on Communication

    Improving performance of far users in cognitive radio: Exploiting NOMA and wireless power transfer

    Get PDF
    In this paper, we examine non-orthogonal multiple access (NOMA) and relay selection strategy to benefit extra advantage from traditional cognitive radio (CR) relaying systems. The most important requirement to prolong lifetime of such network is employing energy harvesting in the relay to address network with limited power constraint. In particular, we study such energy harvesting CR-NOMA using amplify-and-forward (AF) scheme to improve performance far NOMA users. To further address such problem, two schemes are investigated in term of number of selected relays. To further examine system performance, the outage performance needs to be studied for such wireless powered CR-NOMA network over Rayleigh channels. The accurate expressions for the outage probability are derived to perform outage comparison of primary network and secondary network. The analytical results show clearly that position of these nodes, transmit signal to noise ratio (SNR) and power allocation coefficients result in varying outage performance. As main observation, performance gap between primary and secondary destination is decided by both power allocation factors and selection mode of single relay or multiple relays. Numerical studies were conducted to verify our derivations.Web of Science1211art. no. 220

    A General MIMO Framework for NOMA Downlink and Uplink Transmission Based on Signal Alignment

    Get PDF
    The application of multiple-input multiple-output (MIMO) techniques to non-orthogonal multiple access (NOMA) systems is important to enhance the performance gains of NOMA. In this paper, a novel MIMO-NOMA framework for downlink and uplink transmission is proposed by applying the concept of signal alignment. By using stochastic geometry, closed-form analytical results are developed to facilitate the performance evaluation of the proposed framework for randomly deployed users and interferers. The impact of different power allocation strategies, such as fixed power allocation and cognitive radio inspired power allocation, on the performance of MIMO-NOMA is also investigated. Computer simulation results are provided to demonstrate the performance of the proposed framework and the accuracy of the developed analytical results

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201
    • …
    corecore