303 research outputs found
Secrecy Outage and Diversity Analysis of Cognitive Radio Systems
In this paper, we investigate the physical-layer security of a multi-user
multi-eavesdropper cognitive radio system, which is composed of multiple
cognitive users (CUs) transmitting to a common cognitive base station (CBS),
while multiple eavesdroppers may collaborate with each other or perform
independently in intercepting the CUs-CBS transmissions, which are called the
coordinated and uncoordinated eavesdroppers, respectively. Considering multiple
CUs available, we propose the round-robin scheduling as well as the optimal and
suboptimal user scheduling schemes for improving the security of CUs-CBS
transmissions against eavesdropping attacks. Specifically, the optimal user
scheduling is designed by assuming that the channel state information (CSI) of
all links from CUs to CBS, to primary user (PU) and to eavesdroppers are
available. By contrast, the suboptimal user scheduling only requires the CSI of
CUs-CBS links without the PU's and eavesdroppers' CSI. We derive closed-form
expressions of the secrecy outage probability of these three scheduling schemes
in the presence of the coordinated and uncoordinated eavesdroppers. We also
carry out the secrecy diversity analysis and show that the round-robin
scheduling achieves the diversity order of only one, whereas the optimal and
suboptimal scheduling schemes obtain the full secrecy diversity, no matter
whether the eavesdroppers collaborate or not. In addition, numerical secrecy
outage results demonstrate that for both the coordinated and uncoordinated
eavesdroppers, the optimal user scheduling achieves the best security
performance and the round-robin scheduling performs the worst. Finally, upon
increasing the number of CUs, the secrecy outage probabilities of the optimal
and suboptimal user scheduling schemes both improve significantly.Comment: 16 pages, 5 figures, accepted to appear, IEEE Journal on Selected
Areas in Communications, 201
Hybrid Spectrum Sharing in mmWave Cellular Networks
While spectrum at millimeter wave (mmWave) frequencies is less scarce than at
traditional frequencies below 6 GHz, still it is not unlimited, in particular
if we consider the requirements from other services using the same band and the
need to license mmWave bands to multiple mobile operators. Therefore, an
efficient spectrum access scheme is critical to harvest the maximum benefit
from emerging mmWave technologies. In this paper, we introduce a new hybrid
spectrum access scheme for mmWave networks, where data is aggregated through
two mmWave carriers with different characteristics. In particular, we consider
the case of a hybrid spectrum scheme between a mmWave band with exclusive
access and a mmWave band where spectrum is pooled between multiple operators.
To the best of our knowledge, this is the first study proposing hybrid spectrum
access for mmWave networks and providing a quantitative assessment of its
benefits. Our results show that this approach provides major advantages with
respect to traditional fully licensed or fully unlicensed spectrum access
schemes, though further work is needed to achieve a more complete understanding
of both technical and non technical implications
Spectrum Matching in Licensed Spectrum
Spectrum sharing is one of the promising solutions to meet the spectrum demand in 5G networks that results from the emerging services like machine to machine and vehicle to infrastructure communication. The idea is to allow a set of entities access the spectrum whenever and wherever it is unused by the licensed users. In the proposed framework, different spectrum provider (SP) networks with surplus spectrum available may rank the operators requiring the spectrum, called spectrum users (SUs) hereafter, differently in terms of their preference to lease spectrum, based for example on target business market considerations of the SUs. Similarly, SUs rank SPs depending on a number of criteria, for example based on coverage and availability in a service area. Ideally, both SPs and SUs prefer to provide/get spectrum to/from the operator of their first choice, but this is not necessarily always possible due to conflicting preferences. We apply matching theory algorithms with the aim to resolve the conflicting preferences of the SPs and SUs and quantify the effect of the proposed matching theory approach on establishing preferred (spectrum) provider-user network pairs. We discuss both one-to-one and many-to-one spectrum sharing scenarios and evaluate the performance using Monte Carlo simulations. The results show that comprehensive gains in terms of preferred matching of the provider-user network pairs can be achieved by applying matching theory for spectrum sharing as compared to uncoordinated spectrum allocation of the available spectrum to the SUs
- …