189 research outputs found
Performance Analysis of Arbitrarily-Shaped Underlay Cognitive Networks: Effects of Secondary User Activity Protocols
This paper analyzes the performance of the primary and secondary users (SUs)
in an arbitrarily-shaped underlay cognitive network. In order to meet the
interference threshold requirement for a primary receiver (PU-Rx) at an
arbitrary location, we consider different SU activity protocols which limit the
number of active SUs. We propose a framework, based on the moment generating
function (MGF) of the interference due to a random SU, to analytically compute
the outage probability in the primary network, as well as the average number of
active SUs in the secondary network. We also propose a cooperation-based SU
activity protocol in the underlay cognitive network which includes the existing
threshold-based protocol as a special case. We study the average number of
active SUs for the different SU activity protocols, subject to a given outage
probability constraint at the PU and we employ it as an analytical approach to
compare the effect of different SU activity protocols on the performance of the
primary and secondary networks.Comment: submitted to possible IEEE Transactions publicatio
A Novel User Pairing Scheme for Functional Decode-and-Forward Multi-way Relay Network
In this paper, we consider a functional decode and forward (FDF) multi-way
relay network (MWRN) where a common user facilitates each user in the network
to obtain messages from all other users. We propose a novel user pairing
scheme, which is based on the principle of selecting a common user with the
best average channel gain. This allows the user with the best channel
conditions to contribute to the overall system performance. Assuming lattice
code based transmissions, we derive upper bounds on the average common rate and
the average sum rate with the proposed pairing scheme. Considering M-ary
quadrature amplitude modulation with square constellation as a special case of
lattice code transmission, we derive asymptotic average symbol error rate (SER)
of the MWRN. We show that in terms of the achievable rates, the proposed
pairing scheme outperforms the existing pairing schemes under a wide range of
channel scenarios. The proposed pairing scheme also has lower average SER
compared to existing schemes. We show that overall, the MWRN performance with
the proposed pairing scheme is more robust, compared to existing pairing
schemes, especially under worst case channel conditions when majority of users
have poor average channel gains.Comment: 30 pages, 6 figures, submitted for journal publicatio
Optimal Compression and Transmission Rate Control for Node-Lifetime Maximization
We consider a system that is composed of an energy constrained sensor node
and a sink node, and devise optimal data compression and transmission policies
with an objective to prolong the lifetime of the sensor node. While applying
compression before transmission reduces the energy consumption of transmitting
the sensed data, blindly applying too much compression may even exceed the cost
of transmitting raw data, thereby losing its purpose. Hence, it is important to
investigate the trade-off between data compression and transmission energy
costs. In this paper, we study the joint optimal compression-transmission
design in three scenarios which differ in terms of the available channel
information at the sensor node, and cover a wide range of practical situations.
We formulate and solve joint optimization problems aiming to maximize the
lifetime of the sensor node whilst satisfying specific delay and bit error rate
(BER) constraints. Our results show that a jointly optimized
compression-transmission policy achieves significantly longer lifetime (90% to
2000%) as compared to optimizing transmission only without compression.
Importantly, this performance advantage is most profound when the delay
constraint is stringent, which demonstrates its suitability for low latency
communication in future wireless networks.Comment: accepted for publication in IEEE Transactions on Wireless
Communicaiton
Underlay Drone Cell for Temporary Events: Impact of Drone Height and Aerial Channel Environments
Providing seamless connection to a large number of devices is one of the
biggest challenges for the Internet of Things (IoT) networks. Using a drone as
an aerial base station (ABS) to provide coverage to devices or users on ground
is envisaged as a promising solution for IoT networks. In this paper, we
consider a communication network with an underlay ABS to provide coverage for a
temporary event, such as a sporting event or a concert in a stadium. Using
stochastic geometry, we propose a general analytical framework to compute the
uplink and downlink coverage probabilities for both the aerial and the
terrestrial cellular system. Our framework is valid for any aerial channel
model for which the probabilistic functions of line-of-sight (LOS) and
non-line-of-sight (NLOS) links are specified. The accuracy of the analytical
results is verified by Monte Carlo simulations considering two commonly adopted
aerial channel models. Our results show the non-trivial impact of the different
aerial channel environments (i.e., suburban, urban, dense urban and high-rise
urban) on the uplink and downlink coverage probabilities and provide design
guidelines for best ABS deployment height.Comment: This work is accepted to appear in IEEE Internet of Things Journal
Special Issue on UAV over IoT. Copyright may be transferred without notice,
after which this version may no longer be accessible. arXiv admin note: text
overlap with arXiv:1801.0594
Secure Communication with a Wireless-Powered Friendly Jammer
In this paper, we propose to use a wireless-powered friendly jammer to enable
secure communication between a source node and destination node, in the
presence of an eavesdropper. We consider a two-phase communication protocol
with fixed-rate transmission. In the first phase, wireless power transfer is
conducted from the source to the jammer. In the second phase, the source
transmits the information-bearing signal under the protection of a jamming
signal sent by the jammer using the harvested energy in the first phase. We
analytically characterize the long-time behavior of the proposed protocol and
derive a closed-form expression for the throughput. We further optimize the
rate parameters for maximizing the throughput subject to a secrecy outage
probability constraint. Our analytical results show that the throughput
performance differs significantly between the single-antenna jammer case and
the multi-antenna jammer case. For instance, as the source transmit power
increases, the throughput quickly reaches an upper bound with single-antenna
jammer, while the throughput grows unbounded with multi-antenna jammer. Our
numerical results also validate the derived analytical results.Comment: accepted for publication in IEEE Transactions on Wireless
Communication
- …