83 research outputs found
Optimal Spectrum Access for a Rechargeable Cognitive Radio User Based on Energy Buffer State
This paper investigates the maximum throughput for a rechargeable secondary
user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable
power supply. The SU maintains a finite energy queue and harvests energy from
natural resources, e.g., solar, wind and acoustic noise. We propose a
probabilistic access strategy by the SU based on the number of packets at its
energy queue. We investigate the effect of the energy arrival rate, the amount
of energy per energy packet, and the capacity of the energy queue on the SU
throughput under fading channels. Results reveal that the proposed access
strategy can enhance the performance of the SU.Comment: arXiv admin note: text overlap with arXiv:1407.726
On Spectrum Sharing Between Energy Harvesting Cognitive Radio Users and Primary Users
This paper investigates the maximum secondary throughput for a rechargeable
secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a
reliable power supply. The SU maintains a finite energy queue and harvests
energy from natural resources and primary radio frequency (RF) transmissions.
We propose a power allocation policy at the PU and analyze its effect on the
throughput of both the PU and SU. Furthermore, we study the impact of the
bursty arrivals at the PU on the energy harvested by the SU from RF
transmissions. Moreover, we investigate the impact of the rate of energy
harvesting from natural resources on the SU throughput. We assume fading
channels and compute exact closed-form expressions for the energy harvested by
the SU under fading. Results reveal that the proposed power allocation policy
along with the implemented RF energy harvesting at the SU enhance the
throughput of both primary and secondary links
Power-Optimal Feedback-Based Random Spectrum Access for an Energy Harvesting Cognitive User
In this paper, we study and analyze cognitive radio networks in which
secondary users (SUs) are equipped with Energy Harvesting (EH) capability. We
design a random spectrum sensing and access protocol for the SU that exploits
the primary link's feedback and requires less average sensing time. Unlike
previous works proposed earlier in literature, we do not assume perfect
feedback. Instead, we take into account the more practical possibilities of
overhearing unreliable feedback signals and accommodate spectrum sensing
errors. Moreover, we assume an interference-based channel model where the
receivers are equipped with multi-packet reception (MPR) capability.
Furthermore, we perform power allocation at the SU with the objective of
maximizing the secondary throughput under constraints that maintain certain
quality-of-service (QoS) measures for the primary user (PU)
Optimal Cooperative Cognitive Relaying and Spectrum Access for an Energy Harvesting Cognitive Radio: Reinforcement Learning Approach
In this paper, we consider a cognitive setting under the context of
cooperative communications, where the cognitive radio (CR) user is assumed to
be a self-organized relay for the network. The CR user and the PU are assumed
to be energy harvesters. The CR user cooperatively relays some of the
undelivered packets of the primary user (PU). Specifically, the CR user stores
a fraction of the undelivered primary packets in a relaying queue (buffer). It
manages the flow of the undelivered primary packets to its relaying queue using
the appropriate actions over time slots. Moreover, it has the decision of
choosing the used queue for channel accessing at idle time slots (slots where
the PU's queue is empty). It is assumed that one data packet transmission
dissipates one energy packet. The optimal policy changes according to the
primary and CR users arrival rates to the data and energy queues as well as the
channels connectivity. The CR user saves energy for the PU by taking the
responsibility of relaying the undelivered primary packets. It optimally
organizes its own energy packets to maximize its payoff as time progresses
Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks
In this paper, we propose a new optimization-based access strategy of
multipacket reception (MPR) channel for multiple secondary users (SUs)
accessing the primary user (PU) spectrum opportunistically. We devise an
analytical model that realizes the multipacket access strategy of SUs that
maximizes the throughput of individual backlogged SUs subject to queue
stability of the PU. All the network receiving nodes have MPR capability. We
aim at maximizing the throughput of the individual SUs such that the PU's queue
is maintained stable. Moreover, we are interested in providing an
energy-efficient cognitive scheme. Therefore, we include energy constraints on
the PU and SU average transmitted energy to the optimization problem. Each SU
accesses the medium with certain probability that depends on the PU's activity,
i.e., active or inactive. The numerical results show the advantage in terms of
SU throughput of the proposed scheme over the conventional access scheme, where
the SUs access the channel randomly with fixed power when the PU is sensed to
be idle
Security-Enhanced SC-FDMA Transmissions Using Temporal Artificial-Noise and Secret Key Aided Schemes
We investigate the physical-layer security of uplink single-carrier frequency-division multiple-access (SC-FDMA) systems. Multiple users, Alices, send confidential messages to a common legitimate base-station, Bob, in the presence of an eavesdropper, Eve. To secure the legitimate transmissions, each user superimposes an artificial noise (AN) signal on the time-domain SC-FDMA data symbol. We reduce the computational and storage requirements at Bob's receiver by assuming simple per-sub-channel detectors. We assume that Eve has global channel knowledge of all links in addition to high computational capabilities, where she adopts high-complexity detectors such as single-user maximum likelihood (ML), multi-user minimum-mean-square-error, and multi-user ML. We analyze the correlation properties of the time-domain AN signal and illustrate how Eve can exploit them to reduce the AN effects. We prove that the number of useful AN streams that can degrade Eve's signal-to-noise ratio is dependent on the channel memories of Alices-Bob and Alices-Eve links. Furthermore, we enhance the system security for the case of partial Alices-Bob channel knowledge at Eve, where Eve only knows the precoding matrices of the data and AN signals instead of knowing the entire Alices-Bob channel matrices, and propose a hybrid security scheme that integrates temporal AN with channel-based secret key extraction. - 2019 IEEE.This work was supported by the Qatar National Research Fund (a member of the Qatar Foundation) through NPRP under Grant 8-627-2-260. The statements made herein are solely the responsibility of the authors.Scopu
- …