108 research outputs found

    Improving performance of far users in cognitive radio: Exploiting NOMA and wireless power transfer

    Get PDF
    In this paper, we examine non-orthogonal multiple access (NOMA) and relay selection strategy to benefit extra advantage from traditional cognitive radio (CR) relaying systems. The most important requirement to prolong lifetime of such network is employing energy harvesting in the relay to address network with limited power constraint. In particular, we study such energy harvesting CR-NOMA using amplify-and-forward (AF) scheme to improve performance far NOMA users. To further address such problem, two schemes are investigated in term of number of selected relays. To further examine system performance, the outage performance needs to be studied for such wireless powered CR-NOMA network over Rayleigh channels. The accurate expressions for the outage probability are derived to perform outage comparison of primary network and secondary network. The analytical results show clearly that position of these nodes, transmit signal to noise ratio (SNR) and power allocation coefficients result in varying outage performance. As main observation, performance gap between primary and secondary destination is decided by both power allocation factors and selection mode of single relay or multiple relays. Numerical studies were conducted to verify our derivations.Web of Science1211art. no. 220

    On the performance of energy harvesting AF partial relay selection with TAS and outdated channel state information over identical channels

    Get PDF
    Energy scarcity has been known to be one of the most noticeable challenges in wireless communication system. In this paper, the performance of an energy harvesting based partial relay selection (PRS) cooperative system with transmit antenna selection (TAS) and outdated channel state information (CSI) is investigated. The system dual-hops links are assumed to follow Rayleigh distribution and the relay selection is based on outdated CSI of the first link. To realize the benefit of multiple antenna, the amplified-and-forward (AF) relay nodes then employs the TAS technique for signal transmission and signal reception is achieved at the destination through maximum ratio combining (MRC) scheme. Thus, the closed-form expression for the system equivalent end-to-end cumulative distribution function (CDF) is derived. Based on this, the analytical closed-form expressions for the outage probability, average bit error rate, and throughput for the delay-limited transmission mode are then obtained. The results illustrated that the energy harvesting time, relay distance, channel correlation coefficient, the number of relay transmit antennas and destination received antenna have significant effect on the system performance. Monte-carol simulation is employed to validate the accuracy of the derived expressions

    A Study Of Cooperative Spectrum Sharing Schemes For Internet Of Things Systems

    Get PDF
    The Internet of Things (IoT) has gained much attention in recent years with the massive increase in the number of connected devices. Cognitive Machine-to-Machine (CM2M) communications is a hot research topic in which a cognitive dimension allows M2M networks to overcome the challenges of spectrum scarcity, interference, and green requirements. In this paper, we propose a Generalized Cooperative Spectrum Sharing (GCSS) scheme for M2M communication. Cooperation extends the coverage of wireless networks as well as increasing their throughput while reducing the energy consumption of the connected low power devices. We study the outage performance of the proposed GCSS scheme for M2M system and derive exact expressions for the outage probability. We also analyze the effect of varying transmission powers on the performance of the system

    On Secrecy Performance for Energy-Harvesting Multi-Antenna Relaying Networks with a Dual-Use Source

    Get PDF
    This paper studies the secrecy performance of an energy-harvesting relaying system in the presence of a dual-use source node and an eavesdropper. Specifically, the source has dual roles in the dual-hop communication: 1) to transmit confidential information in the first hop; 2) to generate jamming signal to interfere the eavesdropper in the second hop. Moreover, the multi-antenna relay deploys a power-splitting harvesting scheme to coordinate the information receiving and energy harvesting, and adopts maximal ratio combining technique to process the multiple copies of signals. Considering decode-and-forward protocol and transmit antenna selection scheme, we derive an analytical expression for secrecy outage probability, and perform Monte Carlo simulation to validate the analysis. Analytical results show that the SOP performance with the dual-use source node can be effectively improved when the relay-destination channel does not have absolute advantage over the relay-eavesdropper channel

    Outage Analysis of Energy Harvested Relay-Aided Device-to-Device Communications in Nakagami Channel

    Get PDF
    In this paper, we obtain a low-complexity closed-form formula for the outage probability of the energy-harvested decode-and-forward (DF) relay-aided underlay Device-to-device (D2D) communications in Nakagami fading channel. By proposing a new idea which finds the power splitting factor in simultaneous wireless information and power transfer (SWIPT) energy-harvesting system such that the transmit power of the relay node in the second time slot is fixed in a pre-defined value, the obtained closed-form expression is valid for both energy-harvested and non-energy-harvested scenarios. This formula is based on n-point generalized Gauss-Laguerre and m-point Gauss-Legendre solutions. It is shown that n is more effective than m for reducing the formula complexity. In addition to a good agreement between the simulation results and numerical analysis based on normalized mean square error (NMSE), it is indicated that (n, m)=(1, 4) and (n, m)=(1, 2) are the appropriate choices, respectively for 0.5≤ µ <0.7 and µ ≥0.7, where µ is the fading factor. As shown in this investigation, increasing the average distance between D2D pairs and cellular user (lower interference), is the reason for decreasing the outage probability. Furthermore, it is clear that increasing the Nakagami fading factor is the reason for decreasing the outage probability

    Wireless powered communication networks using peer harvesting

    Get PDF
    For an energy-constrained wireless network, energy harvesting (EH) is a promising technology to prolong the network life. Whether traditional near-field wireless power transfer (WPT) using inductive and resonant coupling or far-field WPT via radiated electromagnetic waves, both of them draw considerable research interests these years [1], [2]. In particular, the far-field WPT is meaningful for wireless powered communication (WPC) networks. A fundamental tradeoff was first studied for simultaneous wireless information and power transfer (SWIPT) in [3], [4]. These results aroused the interest of researchers. Subsequently, wireless communication with EH technology was presented in [5], [6]

    Joint Spatial and Spectrum Cooperation in Wireless Network.

    Get PDF
    PhDThe sky-rocketing growth of multimedia infotainment applications and broadband-hungry mobile devices exacerbate the stringent demand for ultra high data rate and more spectrum resources. Along with it, the unbalanced temporal and geographical variations of spectrum usage further inspires those spectral-efficient networks, namely, cognitive radio and heterogeneous cellular networks (HCNs). This thesis focuses on the system design and performance enhancement of cognitive radio (CR) and HCNs. Three different aspects of performance improvement are considered, including link reliability of cognitive radio networks (CNs), security enhancement of CNs, and energy efficiency improvement of CNs and HCNs. First, generalized selection combining (GSC) is proposed as an effective receiver design for interference reduction and reliability improvement of CNs with outdated CSI. A uni- ed way for deriving the distribution of received signal-to-noise ratio (SNR) is developed in underlay spectrum sharing networks subject to interference from the primary trans- mitter (PU-Tx) to the secondary receiver (SU-Rx), maximum transmit power constraint at the secondary transmitter (SU-Tx), and peak interference power constraint at the PU receiver (PU-Rx), is developed. Second, transmit antenna selection with receive generalized selection combining (TAS/GSC) in multi-antenna relay-aided communica- tion is introduced in CNs under Rayleigh fading and Nakagami-m fading. Based on newly derived complex statistical properties of channel power gain of TAS/GSC, exact ergodic capacity and high SNR ergodic capacity are derived over Nakagami-m fading. Third, beamforming and arti cial noise generation (BF&AN) is introduced as a robust scheme to enhance the secure transmission of large-scale spectrum sharing networks with multiple randomly located eavesdroppers (Eves) modeled as homogeneous Poisson Point Process (PPP). Stochastic geometry is applied to model and analyze the impact of i BF&AN on this complex network. Optimal power allocation factor for BF&AN which maximizes the average secrecy rate is further studied under the outage probability con- straint of primary network. Fourth, a new wireless energy harvesting protocol is proposed for underlay cognitive relay networks with the energy-constrained SU-Txs. Exact and asymptotic outage probability, delay-sensitive throughput, and delay-tolerant through- put are derived to explore the tradeoff between the energy harvested from the PU-Txs and the interference caused by the PU-Txs. Fifth, a harvest-then-transmit protocol is proposed in K-tier HCNs with randomly located multiple-antenna base stations (BSs) and single antenna mobile terminals (MTs) modeled as homogeneous PPP. The average received power at MT, the uplink (UL) outage probability, and the UL average ergodic rate are derived to demonstrate the intrinsic relationship between the energy harvested from BSs in the downlink (DL) and the MT performance in the UL. Throughout the thesis, it is shown that link reliability, secrecy performance, and energy efficiency of CNs and HCNs can be signi cantly leveraged by taking advantage of multiple antennas, relays, and wireless energy harvesting

    Performance Analysis for 5G cellular networks: Millimeter Wave and UAV Assisted Communications

    Get PDF
    Recent years have witnessed exponential growth in mobile data and traffic. Limited available spectrum in microwave (μ\muWave) bands does not seem to be capable of meeting this demand in the near future, motivating the move to new frequency bands. Therefore, operating with large available bandwidth at millimeter wave (mmWave) frequency bands, between 30 and 300 GHz, has become an appealing choice for the fifth generation (5G) cellular networks. In addition to mmWave cellular networks, the deployment of unmanned aerial vehicle (UAV) base stations (BSs), also known as drone BSs, has attracted considerable attention recently as a possible solution to meet the increasing data demand. UAV BSs are expected to be deployed in a variety of scenarios including public safety communications, data collection in Internet of Things (IoT) applications, disasters, accidents, and other emergencies and also temporary events requiring substantial network resources in the short-term. In these scenarios, UAVs can provide wireless connectivity rapidly. In this thesis, analytical frameworks are developed to analyze and evaluate the performance of mmWave cellular networks and UAV assisted cellular networks. First, the analysis of average symbol error probability (ASEP) in mmWave cellular networks with Poisson Point Process (PPP) distributed BSs is conducted using tools from stochastic geometry. Secondly, we analyze the energy efficiency of relay-assisted downlink mmWave cellular networks. Then, we provide an stochastic geometry framework to study heterogeneous downlink mmWave cellular networks consisting of KK tiers of randomly located BSs, assuming that each tier operates in a mmWave frequency band. We further study the uplink performance of the mmWave cellular networks by considering the coexistence of cellular and potential D2D user equipments (UEs) in the same band. In addition to mmWave cellular networks, the performance of UAV assisted cellular networks is also studied. Signal-to-interference-plus-noise ratio (SINR) coverage performance analysis for UAV assisted networks with clustered users is provided. Finally, we study the energy coverage performance of UAV energy harvesting networks with clustered users

    Enhancing physical layer security in wireless networks with cooperative approaches

    Get PDF
    Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information (CSI). The first part of the thesis investigates secret communication through relay-assisted cognitive interference channel. The primary and secondary base stations (PBS and SBS) communicate with the primary and secondary receivers (PR and SR) respectively in the presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with the PBS over the same spectrum instead of waiting for an idle channel. To improve security, cognitive relays transmit cooperative jamming (CJ) signals to create additional interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to improve the secrecy rate of cognitive interference channels depending on the structure of cooperative relays. In the scheme where the multiple-antenna relay transmits weighted jamming signals, the combined approach of CJ and beamforming is investigated. In the scheme with multiple relays transmitting weighted jamming signals, the combined approach of CJ and relay selection is analyzed. Numerical results show that both these two schemes are effective in improving physical layer security of cognitive interference channel. In the second part, the focus is shifted to physical layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly distributed. Three scenarios are analyzed to investigate the impact of various factors on security. In scenario one, the basic scheme is studied without a protected zone and interference. The probability distribution function (PDF) of channel gain with both fading and path loss has been derived and further applied to derive secrecy connectivity and ergodic secrecy capacity. In the second scenario, we studied using a protected zone surrounding the source node to enhance security where interference is absent. Both the cases that eavesdroppers are aware and unaware of the protected zone boundary are investigated. Based on the above scenarios, further deployment of the protected zones at legitimate receivers is designed to convert detrimental interference into a beneficial factor. Numerical results are investigated to check the reliability of the PDF for reciprocal of channel gain and to analyze the impact of protected zones on secrecy performance. In the third part, physical layer security in the downlink transmission of cellular network is studied. To model the repulsive property of the cellular network planning, we assume that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while the eavesdroppers are deployed as an independent Poisson point process (PPP). The distribution function of the distances from a typical point to the nodes of the HCPP is derived. The noise-limited and interference-limited cellular networks are investigated by applying the fractional frequency reuse (FFR) in the system. For the noise-limited network, we derive the secrecy outage probability with two different strategies, i.e. the best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For the interference-limited network with the nearest BS serve, two transmission schemes are analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both the schemes of transmitting with the best BS and the application of the FFR are beneficial for physical layer security in the downlink cellular networks, while the improvement du
    corecore