42 research outputs found

    Study of relay selection in a multi-cell cognitive network

    Get PDF
    This paper studies best relay selection in a multi-cell cognitive network with amplify-and-forward (AF) relays. We derive the analytical integral-form expression of the cumulative distribution function (CDF) for the received signal-to-noise-plus-interference-ratio (SINR) at the destination node, based on which the closed-form of the outage probability is obtained. Analysis shows that the proposed relay selection scheme achieves the best SINR at the destination node with interference to the primary user being limited by a pre-defined level. Simulation results are also presented to verify the analysis. The proposed relay selection approach is an attractive way to obtain diversity gain in a multi-cell cognitive network

    Dual antenna selection in secure cognitive radio networks

    Get PDF
    This paper investigates data transmission and physical layer secrecy in cognitive radio network. We propose to apply full duplex transmission and dual antenna selection at secondary destination node. With the full duplex transmission, the secondary destination node can simultaneously apply the receiving and jamming antenna selection to improve the secondary data transmission and primary secrecy performance respectively. This describes an attractive scheme in practice: unlike that in most existing approaches, the secrecy performance improvement in the CR network is no longer at the price of the data transmission loss. The outage probabilities for both the data transmission and physical layer secrecy are analyzed. Numerical simulations are also included to verify the performance of the proposed scheme

    Decode-and-forward buffer-aided relay selection in cognitive relay networks

    Get PDF
    This paper investigates decode-and-forward (DF) buffer-aided relay selection for underlay cognitive relay networks (CRNs) in the presence of both primary transmitter and receiver. We propose a novel buffer-aided relay selection scheme for the CRN, where the best relay is selected with the highest signal-to-interference ratio (SIR) among all available source-to-relay and relay-to-destination links while keeping the interference to the primary destination within a certain level. A new closed-form expression for the outage probability of the proposed relay selection scheme is obtained. Both simulation and theoretical results are shown to confirm performance advantage over the conventional max-min relay selection scheme, making the proposed scheme attractive for CRNs

    Comment on "Relay selection for secure cooperative networks with jamming"

    Get PDF
    It is the purpose of the note to point out that the Cumulative Distribution Function (CDF) (Eq. (23)) in Appendix A in the paper "Relay Selection for Secure Cooperative Networks with Jamming" by Krikidis et al. (IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009) is not the exact expression but an approximation. We provide the exact solution of the CDF in two forms: one using Beta and hypergeometric functions and the second exploiting a recurrence relationshi

    Secrecy Outage Analysis in Random Wireless Networks With Antenna Selection and User Ordering

    Full text link
    This letter investigates the secrecy outage probability in the downlink with ordered user equipment (UE) based on two ordering metrics. UEs and independently acting eavesdroppers (EDs) are positioned randomly according to a Poisson point process. We consider a transmit antenna selection (TAS) scheme at the base station (BS) to enhance secrecy performance and propose two metrics to order the UEs: one based on long-term average channel gain information from the BS to the UEs, and the other based on instantaneous channel gains. We derive closed form expressions for the secrecy outage probability subject to each of these ordering policies and verify our calculations through Monte Carlo simulations. Our results show that while TAS yields a performance improvement relative to single-antenna systems, the secrecy outage probability for TAS systems actually increases with the path loss exponent. Furthermore, we show that the importance of the specific user ordering policy that is adopted in these systems is reduced for high path loss environments or situations where large numbers of antennas are employed

    Using Buffers in Trust Aware Relay Selection Networks with Spatially Random Relays

    Get PDF
    IEEE It is well recognized that using buffers in relay networks significantly improves the transmission reliability, which is often at the price of higher packet delay. Existing buffer-aided relay networks are all based on the physical links among cooperative nodes. This may however lead to performance degradation in practice, because that cooperative nodes may not trust each other for cooperation even though their physical connection are strong. In this paper, we propose a novel buffer-aided relay selection scheme to align data transmission with both strong and trusted links. By maintaining the buffer lengths as close as possible to the newly introduced target buffer lengths, the proposed scheme is able to balance the outage performance and packet delay. Both the outage probability and average packet delay are analyzed for spatially random relays. Particularly we show that outage performance may have error floors because of the trusts. The analysis shows that using buffers in trust aware relay networks is able to either increase the diversity order or lower the error floor of the outage probability

    Resource Allocation for Full-Duplex Relay-Assisted Device-to-Device Multicarrier Systems

    Full text link
    This letter analyzes the resource allocation problem for full-duplex relay-assisted device-to-device (D2D) multicarrier systems, where multiple D2D user groups (UGs) coexist in an underlaying manner. We formulate the optimization problem, which takes the maximization of the system throughput as an objective. Two resources, i.e., subcarrier and transmit power are considered to be appropriately allocated to UGs in order to meet the objective. The formulated problem can be independently divided into a quasi-concave problem and a mixed binary integer programming (MBIP) problem. The MBIP problem is NP-hard. Therefore, to solve this problem efficiently by standard optimization techniques, we propose an alternative algorithm, which is the linear relaxation of the MBIP problem. Then, we mathematically prove and numerically verify the equivalence of the MBIP problem and its linear relaxation. By this way, the resource allocation for UGs can be carried out by a small amount of computational overhead

    Delay constrained buffer-aided relay selection in the internet of things with decision-assisted reinforcement learning

    No full text
    IEEE This paper investigates the reinforcement learning for the relay selection in the delay-constrained buffer-aided networks. The buffer-aided relay selection significantly improves the outage performance but often at the price of higher latency. On the other hand, modern communication systems such as the Internet of Things often have strict requirement on the latency. It is thus necessary to find relay selection policies to achieve good throughput performance in the buffer-aided relay network while stratifying the delay constraint. With the buffers employed at the relays and delay constraints imposed on the data transmission, obtaining the best relay selection becomes a complicated high-dimensional problem, making it hard for the reinforcement learning to converge. In this paper, we propose the novel decision-assisted deep reinforcement learning to improve the convergence. This is achieved by exploring the a-priori information from the buffer-aided relay system. The proposed approaches can achieve high throughput subject to delay constraints. Extensive simulation results are provided to verify the proposed algorithms

    Optimal Routing for Multi-Hop Social-Based D2D Communications in the Internet of Things

    Full text link
    With the development of wireless communications and the intellectualization of machines, the Internet of things (IoT) has been of interest to both industry and academia. Multi-hop routing and relaying are key technologies that will underpin IoT mesh networks in the future. This paper investigates optimal routing based on the trusted connectivity probability (T-CP) for multi-hop, underlay, device-to-device (D2D) communications with decode-and-forward (DF) relaying. Both random and fixed locations for base stations (BSs) are considered, where the former case assumes that the locations of the BSs are modeled as a Poisson point process (PPP). First, we derive two expressions for the connectivity probability (CP): a tight lower bound and an exact closed-form. Analysis is carried out for the cases where the channel state information (CSI) between BSs and the D2D transmitter is known (CSI-aware) and unknown (no-CSI). Interference from active cellular users (CUEs) is characterized by modeling CUE locations as a PPP. Moreover, motivated by results that have shown that social behavior leads to D2D devices communicating with nearby neighbours, we derive the trust probability (TP) for D2D connections by using a rank-based model. Finally, we propose a novel routing algorithm that can achieve the highest T-CP for any pair of D2D devices in a distributed manner. The derived analytical results are verified by Monte Carlo simulations. We show that the proposed routing algorithm achieves almost the same performance as that attained through an exhaustive search. When BSs are located randomly, the optimal path based on the CP is the shortest path between the D2D transmitter and receiver. However, for fixed BSs, the optimal path selection depends on the locations of the BSs, which provides a very useful insight in designing the multi-hop D2D system for 5G IoT

    Physical Layer Security in Visible Light Communication Systems with Randomly Located Colluding Eavesdroppers

    Full text link
    This letter investigates the secrecy performance in visible light communication (VLC) in the presence of randomly located colluding eavesdroppers (EDs). Colluding EDs can combine their observations and degrade the secrecy performance of the VLC systems. Utilizing the numerical inversion of a characteristic function, the probability distribution of the combined signal-to-noise ratio of colluding EDs is analyzed. The closed-form expression of the secrecy outage probability is derived and verified by Monte Carlo simulations
    corecore