298 research outputs found

    Secrecy Outage and Diversity Analysis of Cognitive Radio Systems

    Full text link
    In this paper, we investigate the physical-layer security of a multi-user multi-eavesdropper cognitive radio system, which is composed of multiple cognitive users (CUs) transmitting to a common cognitive base station (CBS), while multiple eavesdroppers may collaborate with each other or perform independently in intercepting the CUs-CBS transmissions, which are called the coordinated and uncoordinated eavesdroppers, respectively. Considering multiple CUs available, we propose the round-robin scheduling as well as the optimal and suboptimal user scheduling schemes for improving the security of CUs-CBS transmissions against eavesdropping attacks. Specifically, the optimal user scheduling is designed by assuming that the channel state information (CSI) of all links from CUs to CBS, to primary user (PU) and to eavesdroppers are available. By contrast, the suboptimal user scheduling only requires the CSI of CUs-CBS links without the PU's and eavesdroppers' CSI. We derive closed-form expressions of the secrecy outage probability of these three scheduling schemes in the presence of the coordinated and uncoordinated eavesdroppers. We also carry out the secrecy diversity analysis and show that the round-robin scheduling achieves the diversity order of only one, whereas the optimal and suboptimal scheduling schemes obtain the full secrecy diversity, no matter whether the eavesdroppers collaborate or not. In addition, numerical secrecy outage results demonstrate that for both the coordinated and uncoordinated eavesdroppers, the optimal user scheduling achieves the best security performance and the round-robin scheduling performs the worst. Finally, upon increasing the number of CUs, the secrecy outage probabilities of the optimal and suboptimal user scheduling schemes both improve significantly.Comment: 16 pages, 5 figures, accepted to appear, IEEE Journal on Selected Areas in Communications, 201

    Hybrid Spectrum Sharing in mmWave Cellular Networks

    Full text link
    While spectrum at millimeter wave (mmWave) frequencies is less scarce than at traditional frequencies below 6 GHz, still it is not unlimited, in particular if we consider the requirements from other services using the same band and the need to license mmWave bands to multiple mobile operators. Therefore, an efficient spectrum access scheme is critical to harvest the maximum benefit from emerging mmWave technologies. In this paper, we introduce a new hybrid spectrum access scheme for mmWave networks, where data is aggregated through two mmWave carriers with different characteristics. In particular, we consider the case of a hybrid spectrum scheme between a mmWave band with exclusive access and a mmWave band where spectrum is pooled between multiple operators. To the best of our knowledge, this is the first study proposing hybrid spectrum access for mmWave networks and providing a quantitative assessment of its benefits. Our results show that this approach provides major advantages with respect to traditional fully licensed or fully unlicensed spectrum access schemes, though further work is needed to achieve a more complete understanding of both technical and non technical implications

    Spectrum Matching in Licensed Spectrum

    Get PDF
    Spectrum sharing is one of the promising solutions to meet the spectrum demand in 5G networks that results from the emerging services like machine to machine and vehicle to infrastructure communication. The idea is to allow a set of entities access the spectrum whenever and wherever it is unused by the licensed users. In the proposed framework, different spectrum provider (SP) networks with surplus spectrum available may rank the operators requiring the spectrum, called spectrum users (SUs) hereafter, differently in terms of their preference to lease spectrum, based for example on target business market considerations of the SUs. Similarly, SUs rank SPs depending on a number of criteria, for example based on coverage and availability in a service area. Ideally, both SPs and SUs prefer to provide/get spectrum to/from the operator of their first choice, but this is not necessarily always possible due to conflicting preferences. We apply matching theory algorithms with the aim to resolve the conflicting preferences of the SPs and SUs and quantify the effect of the proposed matching theory approach on establishing preferred (spectrum) provider-user network pairs. We discuss both one-to-one and many-to-one spectrum sharing scenarios and evaluate the performance using Monte Carlo simulations. The results show that comprehensive gains in terms of preferred matching of the provider-user network pairs can be achieved by applying matching theory for spectrum sharing as compared to uncoordinated spectrum allocation of the available spectrum to the SUs
    • …
    corecore