57 research outputs found

    Relay Selections for Cooperative Underlay CR Systems with Energy Harvesting

    Get PDF
    In this work, we consider a cooperative underlay cognitive radio system in which one secondary user (S) transmits its data to a secondary receiver with the assistance of multiple relays. In the considered underlay spectrum sharing scenario, the transmit power levers at S and forwarding relays are adjusted simultaneously according to a given threshold interference power that the primary user can tolerate. We also consider that relays adopt threshold decode-and-forward relay scheme and harvest energy from the primary transmitter with finite energy storage capacity under time switching scheme. Three best relay selection schemes, optimal source-relay link with wireless energy harvesting (WEH), optimal relay-destination link with WEH and optimal source-relay-destination link with WEH schemes, are proposed and studied. Closed-form analytical expressions for the outage probability of these three best relay selection schemes are derived, respectively. Finally, our analytical results are verified by Monte-Carlo simulations

    Performance enhancement solutions in wireless communication networks

    Get PDF
    In this dissertation thesis, we study the new relaying protocols for different wireless network systems. We analyze and evaluate an efficiency of the transmission in terms of the outage probability over Rayleigh fading channels by mathematical analyses. The theoretical analyses are verified by performing Monte Carlo simulations. First, we study the cooperative relaying in the Two-Way Decode-and-Forward (DF) and multi-relay DF scheme for a secondary system to obtain spectrum access along with a primary system. In particular, we proposed the Two-Way DF scheme with Energy Harvesting, and the Two-Way DF Non-orthogonal Multiple Access (NOMA) scheme with digital network coding. Besides, we also investigate the wireless systems with multi-relay; the best relay selection is presented to optimize the effect of the proposed scheme. The transmission protocols of the proposed schemes EHAF (Energy Harvesting Amplify and Forward) and EHDF (Energy Harvesting Decode and Forward) are compared together in the same environment and in term of outage probability. Hence, with the obtained results, we conclude that the proposed schemes improve the performance of the wireless cooperative relaying systems, particularly their throughput. Second, we focus on investigating the NOMA technology and proposing the optimal solutions (protocols) to advance the data rate and to ensure the Quality of Service (QoS) for the users in the next generation of wireless communications. In this thesis, we propose a Two-Way DF NOMA scheme (called a TWNOMA protocol) in which an intermediate relay helps two source nodes to communicate with each other. Simulation and analysis results show that the proposed protocol TWNOMA is improving the data rate when comparing with a conventional Two-Way scheme using digital network coding (DNC) (called a TWDNC protocol), Two-Way scheme without using DNC (called a TWNDNC protocol) and Two-Way scheme in amplify-and-forward(AF) relay systems (called a TWANC protocol). Finally, we considered the combination of the NOMA and physical layer security (PLS) in the Underlay Cooperative Cognitive Network (UCCN). The best relay selection strategy is investigated, which uses the NOMA and considers the PLS to enhance the transmission efficiency and secrecy of the new generation wireless networks.V této dizertační práci je provedena studie nových přenosových protokolů pro různé bezdrátové síťové systémy. S využitím matematické analýzy jsme analyzovali a vyhodnotili efektivitu přenosu z hlediska pravděpodobnosti výpadku přes Rayleighův kanál. Teoretické analýzy jsou ověřeny provedenými simulacemi metodou Monte Carlo. Nejprve došlo ke studii kooperativního přenosu ve dvoucestném dekóduj-a-předej (Two-Way Decode-and-Forward–TWDF) a vícecestném DF schématu s větším počtem přenosových uzlů pro sekundární systém, kdy takto byl získán přístup ke spektru spolu s primárním systémem. Konkrétně jsme navrhli dvoucestné DF schéma se získáváním energie a dvoucestné DF neortogonální schéma s mnohonásobným přístupem (Non-orthogonal Multiple Access–NOMA) s digitálním síťovým kódováním. Kromě toho rovněž zkoumáme bezdrátové systémy s větším počtem přenosových uzlů, kde je přítomen výběr nejlepšího přenosového uzlu pro optimalizaci efektivnosti navrženého schématu. Přenosové protokoly navržených schémat EHAF (Energy Harvesting Amplify and Forward) a EHDF(Energy Harvesting Decode and Forward) jsou společně porovnány v identickém prostředí z pohledu pravděpodobnosti výpadku. Následně, na základě získaných výsledků, jsme dospěli k závěru, že navržená schémata vylepšují výkonnost bezdrátových kooperativních systémů, konkrétně jejich propustnost. Dále jsme se zaměřili na zkoumání NOMA technologie a navrhli optimální řešení (protokoly) pro urychlení datového přenosu a zajištění QoS v další generaci bezdrátových komunikací. V této práci jsme navrhli dvoucestné DF NOMA schéma (nazýváno jako TWNOMA protokol), ve kterém mezilehlý přenosový uzel napomáhá dvěma zdrojovým uzlům komunikovat mezi sebou. Výsledky simulace a analýzy ukazují, že navržený protokol TWNOMA vylepšuje dosaženou přenosovou rychlost v porovnání s konvenčním dvoucestným schématem používajícím DNC (TWDNC protokol), dvoucestným schématem bez použití DNC (TWNDNC protokol) a dvoucestným schématem v zesil-a-předej (amplify-and-forward) přenosových systémech (TWANC protokol). Nakonec jsme zvážili využití kombinace NOMA a zabezpečení fyzické vrstvy (Physical Layer Security–PLS) v podpůrné kooperativní kognitivní síti (Underlay Cooperative Cognitive Network–UCCN). Zde je zde zkoumán výběr nejlepšího přenosového uzlu, který užívá NOMA a bere v úvahu PLS pro efektivnější přenos a zabezpečení nové generace bezdrátových sítí.440 - Katedra telekomunikační technikyvyhově

    Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints

    Get PDF
    Recently, the combination of cognitive radio networks with the nonorthogonal multiple access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also supporting large numbers of wireless communication connections. However, cognitive NOMA networks are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome this drawback, many techniques have been proposed, such as optimal power allocation and interference cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station and the leakage probability for the eavesdropper are obtained with imperfect channel state information. Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance. Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN) and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput of the secondary network. These optimization algorithms guarantee not only the performance of the primary users but also the security constraints of the secondary users. Finally, simulations are presented to validate our research results and provide insights into how various factors affect system performance

    Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints

    Get PDF
    Recently, the combination of cognitive radio networks with the nonorthogonal multiple access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also supporting large numbers of wireless communication connections. However, cognitive NOMA networks are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome this drawback, many techniques have been proposed, such as optimal power allocation and interference cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station and the leakage probability for the eavesdropper are obtained with imperfect channel state information. Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance. Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN) and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput of the secondary network. These optimization algorithms guarantee not only the performance of the primary users but also the security constraints of the secondary users. Finally, simulations are presented to validate our research results and provide insights into how various factors affect system performance

    Security Improvement for Energy Harvesting based Overlay Cognitive Networks with Jamming-Assisted Full-Duplex Destinations

    Get PDF
    This work investigates the secrecy capability of energy harvesting based overlay cognitive networks (EHOCNs). To this end, we assume that a message by a licensed transmitter is relayed by an unlicensed sender. Critically, the unlicensed sender uses energy harvested from licensed signals, enhancing the overall energy efficiency and maintaining the integrity of licensed communications. To secure messages broadcast by the unlicensed sender against the wire-tapper, full-duplex destinations - unlicensed recipient and licensed receiver - jam the eavesdropper at the same time they receive signals from the unlicensed sender. To this effect, we derive closed-form formulas for the secrecy outage probability, which then quantify the security performance of both unlicensed and licensed communications for EHOCNs with jamming-assisted full-duplex destinations, namely EHOCNwFD. In addition, optimum operating parameters are established, which can serve as essential design guidelines of such systems.acceptedVersionPeer reviewe

    New Approaches Using Cognitive Radio in Green Networking

    Get PDF
    The green networks are energy-efficient network architectures and we consider them as the basis of the wireless communication optimizing energy usage. Indeed, future communication technologies are moving in this direction, meaning that they will be less energy-intensive and, in some cases, even energy self-sufficient. Specifically, cognitive radio (CR) networks, cooperative relay networks, and non-orthogonal multiple access (NOMA) techniques have been considered as effective means to facilitate energy harvesting (EH) and a power spectrum allocation for the minimization of total transmit power, hence, making the wireless communication greener. The dissertation consists of three research sections corresponding to the aims. The first aim deals with an radio frequency (RF) wireless energy transfer model for D2D systems. In order to harvest more energy, a multiple-antenna base station and a power beacon are adopted for the D2D transmission network. We derive expressions outage probability in closed-forms. Further, independent simulations are used to validate the exactness of the theoretical expressions. In the second aim, new cooperative system models are proposed and studied. To reach the second aim, the secondary source acts as a relay and employs Amplify and Forward (AF) mode to serve distant NOMA users under a given interference constraint. To provide a detailed examination of the system performance metrics, we derived closed-form formulas for the outage probability and average throughput of the multi-users in the presence of interference constraints. In the last aim of the dissertation, we designed a new system model for a hybrid satellite-terrestrial cognitive network (HSTCN) relying on NOMA interconnecting a satellite and multiple terrestrial nodes. Reliability and security of transmission were studied to minimize the total transmit power. To reach the third aim, we examined the following performance factors: outage probability, hardware impairment, intercept probability, and average throughput. The novel closed-forms expressions of these performance factors are derived. The last but not at least, we simulated the new HSTCN system model. The achieved results figured that the new proposed approaches make it possible to take into account service quality requirements and are applicable in future green networking.Zelené sítě jsou energeticky efektivní síťové architektury a považujeme je za základ bezdrátové komunikace optimalizující spotřebu energie. Tímto směrem se ubírají budoucí komunikační technologie, což znamená, že budou méně energeticky náročné a v některých případech dokonce energeticky soběstačné. Kognitivní rádiové (CR) sítě, kooperativní relay sítě a neortogonální vícenásobné přístupové (NOMA) techniky jsou považovány za účinný prostředek k usnadnění získávání energie (EH) a přidělování výkonového spektra pro minimalizaci celkového vysílacího výkonu, díky čemuž je bezdrátová komunikace zelenější. Disertační práce se skládá ze tří výzkumných částí odpovídajících cílům. První cíl se zabývá modelem bezdrátového přenosu radiofrekvenční (RF) energie pro systémy D2D. Aby bylo možné získat více energie, jsou pro přenosovou D2D síť použity základnové stanice s více anténami a napájecím radiomajákem. Pro navržený model jsou odvozeny pravděpodobnosti výpadků, kdy tyto výrazy jsou v uzavřené formě. Dále jsou k ověření platnosti získaných teoretických výrazů použity nezávislé simulace. Ve druhém cíli jsou navrženy a zkoumány nové modely kooperativního systému. Aby bylo dosaženo druhého cíle, sekundární zdroj funguje jako relay uzel a využívá režim AF (Amplify and Forward), který slouží vzdáleným NOMA uživatelům za specifických interferenčních podmínek. Abychom poskytli podrobné zhodnocení výkonnostních metrik systému, odvodili jsme vztahy v uzavřené formě pro pravděpodobnost výpadků a průměrnou propustnost více uživatelů za přítomnosti interferenčních omezení. V posledním cíli disertační práce jsme navrhli nový systémový model pro hybridní satelitně-terestrickou kognitivní síť (HSTCN) založenou na neortogonálním vícenásobném přístupu (NOMA) propojující satelit a více terestrických uzlů. Zkoumána byla spolehlivost a zabezpečení přenosu s důrazem na minimalizaci celkového vysílacího výkonu. Pro dosažení třetího cíle jsme zkoumali následující výkonnostní faktory: pravděpodobnost výpadku, poškození hardwaru, pravděpodobnost zachycení a průměrnou propustnost. Pro tyto výkonnostní faktory jsou odvozeny v uzavřených formách nové výrazy. V neposlední řadě jsme rovněž simulovali nový systémový HSTCN model. Dosažené výsledky potvrdily, že nově navržené přístupy umožňují zohledňovat požadavky na kvalitu služeb a jsou použitelné v budoucích zelených sítích.440 - Katedra telekomunikační technikyvyhově

    Physical layer security in 5G and beyond wireless networks enabling technologies

    Get PDF
    Information security has always been a critical concern for wireless communications due to the broadcast nature of the open wireless medium. Commonly, security relies on cryptographic encryption techniques at higher layers to ensure information security. However, traditional cryptographic methods may be inadequate or inappropriate due to novel improvements in the computational power of devices and optimization approaches. Therefore, supplementary techniques are required to secure the transmission data. Physical layer security (PLS) can improve the security of wireless communications by exploiting the characteristics of wireless channels. Therefore, we study the PLS performance in the fifth generation (5G) and beyond wireless networks enabling technologies in this thesis. The thesis consists of three main parts. In the first part, the PLS design and analysis for Device-to-Device (D2D) communication is carried out for several scenarios. More specifically, in this part, we study the underlay relay-aided D2D communications to improve the PLS of the cellular network. We propose a cooperative scheme, whereby the D2D pair, in return for being allowed to share the spectrum band of the cellular network, serves as a friendly jammer using full-duplex (FD) and half-duplex (HD) transmissions and relay selection to degrade the wiretapped signal at an eavesdropper. This part aims to show that spectrum sharing is advantageous for both D2D communications and cellular networks concerning reliability and robustness for the former and PLS enhancement for the latter. Closed-form expressions for the D2D outage probability, the secrecy outage probability (SOP), and the probability of non-zero secrecy capacity (PNSC) are derived to assess the proposed cooperative system model. The results show enhancing the robustness and reliability of D2D communication while simultaneously improving the cellular network’s PLS by generating jamming signals towards the eavesdropper. Furthermore, intensive Monte-Carlo simulations and numerical results are provided to verify the efficiency of the proposed schemes and validate the derived expressions’ accuracy. In the second part, we consider a secure underlay cognitive radio (CR) network in the presence of a primary passive eavesdropper. Herein, a secondary multi-antenna full-duplex destination node acts as a jammer to the primary eavesdropper to improve the PLS of the primary network. In return for this favor, the energy-constrained secondary source gets access to the primary network to transmit its information so long as the interference to the latter is below a certain level. As revealed in our analysis and simulation, the reliability and robustness of the CR network are improved, while the security level of the primary network is enhanced concurrently. Finally, we investigate the PLS design and analysis of reconfigurable intelligent surface (RIS)-aided wireless communication systems in an inband underlay D2D communication and the CR network. An RIS is used to adjust its reflecting elements to enhance the data transmission while improving the PLS concurrently. Furthermore, we investigate the design of active elements in RIS to overcome the double-fading problem introduced in the RISaided link in a wireless communications system. Towards this end, each active RIS element amplifies the reflected incident signal rather than only reflecting it as done in passive RIS modules. As revealed in our analysis and simulation, the use of active elements leads to a drastic reduction in the size of RIS to achieve a given performance level. Furthermore, a practical design for active RIS is proposed
    corecore