2,253 research outputs found

    Dynamic Spectrum Sharing in Cognitive Radio and Device-to-Device Systems

    Get PDF
    abstract: Cognitive radio (CR) and device-to-device (D2D) systems are two promising dynamic spectrum access schemes in wireless communication systems to provide improved quality-of-service, and efficient spectrum utilization. This dissertation shows that both CR and D2D systems benefit from properly designed cooperation scheme. In underlay CR systems, where secondary users (SUs) transmit simultaneously with primary users (PUs), reliable communication is by all means guaranteed for PUs, which likely deteriorates SUs’ performance. To overcome this issue, cooperation exclusively among SUs is achieved through multi-user diversity (MUD), where each SU is subject to an instantaneous interference constraint at the primary receiver. Therefore, the active number of SUs satisfying this constraint is random. Under different user distributions with the same mean number of SUs, the stochastic ordering of SU performance metrics including bit error rate (BER), outage probability, and ergodic capacity are made possible even without observing closed form expressions. Furthermore, a cooperation is assumed between primary and secondary networks, where those SUs exceeding the interference constraint facilitate PU’s transmission by relaying its signal. A fundamental performance trade-off between primary and secondary networks is observed, and it is illustrated that the proposed scheme outperforms non-cooperative underlay CR systems in the sense of system overall BER and sum achievable rate. Similar to conventional cellular networks, CR systems suffer from an overloaded receiver having to manage signals from a large number of users. To address this issue, D2D communications has been proposed, where direct transmission links are established between users in close proximity to offload the system traffic. Several new cooperative spectrum access policies are proposed allowing coexistence of multiple D2D pairs in order to improve the spectral efficiency. Despite the additional interference, it is shown that both the cellular user’s (CU) and the individual D2D user's achievable rates can be improved simultaneously when the number of D2D pairs is below a certain threshold, resulting in a significant multiplexing gain in the sense of D2D sum rate. This threshold is quantified for different policies using second order approximations for the average achievable rates for both the CU and the individual D2D user.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201

    Capacity and Delay of Unmanned Aerial Vehicle Networks with Mobility

    Full text link
    Unmanned aerial vehicles (UAVs) are widely exploited in environment monitoring, search-and-rescue, etc. However, the mobility and short flight duration of UAVs bring challenges for UAV networking. In this paper, we study the UAV networks with n UAVs acting as aerial sensors. UAVs generally have short flight duration and need to frequently get energy replenishment from the control station. Hence the returning UAVs bring the data of the UAVs along the returning paths to the control station with a store-carry-and-forward (SCF) mode. A critical range for the distance between the UAV and the control station is discovered. Within the critical range, the per-node capacity of the SCF mode is O(n/log n) times higher than that of the multi-hop mode. However, the per-node capacity of the SCF mode outside the critical range decreases with the distance between the UAV and the control station. To eliminate the critical range, a mobility control scheme is proposed such that the capacity scaling laws of the SCF mode are the same for all UAVs, which improves the capacity performance of UAV networks. Moreover, the delay of the SCF mode is derived. The impact of the size of the entire region, the velocity of UAVs, the number of UAVs and the flight duration of UAVs on the delay of SCF mode is analyzed. This paper reveals that the mobility and short flight duration of UAVs have beneficial effects on the performance of UAV networks, which may motivate the study of SCF schemes for UAV networks.Comment: 14 pages, 10 figures, IEEE Internet of Things Journa

    Technology Implications of UWB on Wireless Sensor Network-A detailed Survey

    Get PDF
    In today’s high tech “SMART” world sensor based networks are widely used. The main challenge with wireless-based sensor networks is the underneath physical layer. In this survey, we have identified core obstacles of wireless sensor network when UWB is used at PHY layer. This research was done using a systematic approach to assess UWB’s effectiveness (for WSN) based on information taken from various research papers, books, technical surveys and articles. Our aim is to measure the UWB’s effectiveness for WSN and analyze the different obstacles allied with its implementation. Starting from existing solutions to proposed theories. Here we have focused only on the core concerns, e.g. spectrum, interference, synchronization etc.Our research concludes that despite all the bottlenecks and challenges, UWB’s efficient capabilities makes it an attractive PHY layer scheme for the WSN, provided we can control interference and energy problems. This survey gives a fresh start to the researchers and prototype designers to understand the technological concerns associated with UWB’s implementatio

    Performance analysis of Unmanned Aerial Vehicles-enabled Wireless Networks

    Full text link
    University of Technology Sydney. Faculty of Engineering and Information Technology.As an indispensable part of mobile communication systems, Unmanned Aerial Vehicles (UAVs) can be leveraged to complement terrestrial networks by providing coverage to areas where infrastructures are scarce. Equipped with self-navigation and strong automation, UAVs have extensive applications to environmental monitoring, disaster recovery, search and rescue, owing to their excellent agility and autonomy. As a result, an increasing demand arises for ubiquitous connectivity and reliable communication for data exchange between UAVs, and between UAVs and ground stations. Since UAVs operate in three-dimensional (3D) space with strong manoeuvrability, random trajectories and wireless propagation environment can pose significant challenges to the study on coverage and capacity of UAV networks. On the other hand, UAVs are increasingly posing threats to information security. UAVs can be potentially used to eavesdrop and jam wireless transmissions between legitimate terrestrial transceivers. It is of practical interest to understand the robustness of terrestrial wireless communications under exposure to new threats from aerial adversaries. This thesis studies the coverage and capacity, including secure coverage and secrecy capacity, of UAV-enabled wireless networks with UAVs flying under 3D random trajectories based on stochastic geometry and measure convergence theory. The detailed contributions of this thesis are summarised as: • Capacity analysis of UAV networks under random trajectories. We geometrically derive probability distributions of UAV-to-UAV distances and closed-form bounds for the capacity can be obtained by exploiting the Jensen's inequality. We extrapolate the idea to dense UAV networks and analyse the impact of network densification and imperfect channel state information on the capacity. • Connectivity analysis of uncoordinated UAV swarms. New closed-form bounds are derived for the outage probability of individual UAVs, and broadcast connectivity of each UAV which evaluates the reliability of broadcast across the swarm. The qualifying conditions of the bounds on 3D coverage and impact of ground interference on the outage are identified. • Secure connectivity analysis in UAV networks. We propose a trust model based on UAVs’ behaviour and mobility pattern and characteristics of inter-UAV channels. We derive analytical expressions of both physical and secure connectivity probabilities with/without considering Doppler shift. • Secrecy capacity analysis against aerial eavesdroppers. We analyse ergodic and ϵ-outage secrecy capacities of ground link in the presence of cooperative aerial eavesdroppers. The “cut-off” density of eavesdroppers under which the secrecy capacities vanish is identified. By decoupling the analysis of random trajectories from random channel fading, closed-form approximations with almost sure convergence to the secrecy capacities are devised
    • …
    corecore