4,045 research outputs found

    A Novel Algorithm for Cooperative Distributed Sequential Spectrum Sensing in Cognitive Radio

    Full text link
    This paper considers cooperative spectrum sensing in Cognitive Radios. In our previous work we have developed DualSPRT, a distributed algorithm for cooperative spectrum sensing using Sequential Probability Ratio Test (SPRT) at the Cognitive Radios as well as at the fusion center. This algorithm works well, but is not optimal. In this paper we propose an improved algorithm- SPRT-CSPRT, which is motivated from Cumulative Sum Procedures (CUSUM). We analyse it theoretically. We also modify this algorithm to handle uncertainties in SNR's and fading.Comment: This paper has been withdrawn by the author due to the submission of detailed journal version of the same paper, to arXi

    A Distributed Scheduling Algorithm to Provide Quality-of-Service in Multihop Wireless Networks

    Full text link
    Control of multihop Wireless networks in a distributed manner while providing end-to-end delay requirements for different flows, is a challenging problem. Using the notions of Draining Time and Discrete Review from the theory of fluid limits of queues, an algorithm that meets delay requirements to various flows in a network is constructed. The algorithm involves an optimization which is implemented in a cyclic distributed manner across nodes by using the technique of iterative gradient ascent, with minimal information exchange between nodes. The algorithm uses time varying weights to give priority to flows. The performance of the algorithm is studied in a network with interference modelled by independent sets

    Previous Messages Provide the Key to Achieve Shannon Capacity in a Wiretap Channel

    Full text link
    We consider a wiretap channel and use previously transmitted messages to generate a secret key which increases the secrecy capacity. This can be bootstrapped to increase the secrecy capacity to the Shannon capacity without using any feedback or extra channel while retaining the strong secrecy of the wiretap channel.Comment: Accepted for IEEE International Conference on Communications Workshop (ICC) 2013, Budapest, Hungary. arXiv admin note: text overlap with arXiv:1404.570
    corecore