• Title/Summary/Keyword: Underlay networks

Search Result 44, Processing Time 0.038 seconds

Joint Scheduling and Flow Control for Multi-hop Cognitive Radio Network with Spectrum Underlay

  • Quang, Nguyen Tran;Dang, Duc Ngoc Minh;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.297-299
    • /
    • 2012
  • In this paper, we introduce a joint flow control and scheduling algorithm for multi-hop cognitive radio networks with spectrum underlay. Our proposed algorithm maximizes the total utility of secondary users while stabilizing the cognitive radio network and still satisfies the total interference from secondary users to primary network is less than an accepted level. Based on Lyapunov optimization technique, we show that our scheme is arbitrarily close to the optimal.

Throughput maximization for underlay CR multicarrier NOMA network with cooperative communication

  • Manimekalai, Thirunavukkarasu;Joan, Sparjan Romera;Laxmikandan, Thangavelu
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.846-858
    • /
    • 2020
  • The non-orthogonal multiple access (NOMA) technique offers throughput improvement to meet the demands of the future generation of wireless communication networks. The objective of this work is to further improve the throughput by including an underlay cognitive radio network with an existing multi-carrier NOMA network, using cooperative communication. The throughput is maximized by optimal resource allocation, namely, power allocation, subcarrier assignment, relay selection, user pairing, and subcarrier pairing. Optimal power allocation to the primary and secondary users is accomplished in a way that target rate constraints of the primary users are not affected. The throughput maximization is a combinatorial optimization problem, and the computational complexity increases as the number of users and/or subcarriers in the network increases. To this end, to reduce the computational complexity, a dynamic network resource allocation algorithm is proposed for combinatorial optimization. The simulation results show that the proposed network improves the throughput.

Cooperative Relaying with Interference Cancellation for Secondary Spectrum Access

  • Dai, Zeyang;Liu, Jian;Long, Keping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2455-2472
    • /
    • 2012
  • Although underlay spectrum sharing has been shown as a promising technique to promote the spectrum utilization in cognitive radio networks (CRNs), it may suffer bad secondary performance due to the strict power constraints imposed at secondary systems and the interference from primary systems. In this paper, we propose a two-phase based cooperative transmission protocol with the interference cancellation (IC) and best-relay selection to improve the secondary performance in underlay models under stringent power constraints while ensuring the primary quality-of-service (QoS). In the proposed protocol, IC is employed at both the secondary relays and the secondary destination, where the IC-based best-relay selection and cooperative relaying schemes are well developed to reduce the interference from primary systems. The closed-form expression of secondary outage probability is derived for the proposed protocol over Rayleigh fading channels. Simulation results show that, with a guaranteed primary outage probability, the proposed protocol can achieve not only lower secondary outage probability but also higher secondary diversity order than the traditional underlay case.

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

  • Wang, Songqing;Xu, Xiaoming;Yang, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.260-279
    • /
    • 2015
  • In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung;Son, Pham Ngoc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4623-4643
    • /
    • 2015
  • This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.

Resource Allocation based on Hybrid Sharing Mode for Heterogeneous Services of Cognitive Radio OFDM Systems

  • Lei, Qun;Chen, Yueyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.149-168
    • /
    • 2015
  • In cognitive radio networks (CRNs), hybrid overlay and underlay sharing transmission mode is an effective technique for improving the efficiency of radio spectrum. Unlike existing works in the literature, where only one secondary user (SU) uses overlay and underlay modes, the different transmission modes should be allocated to different SUs, according to their different quality of services (QoS), to achieve the maximal efficiency of radio spectrum. However, hybrid sharing mode allocation for heterogeneous services is still a challenge in CRNs. In this paper, we propose a new resource allocation method for hybrid sharing transmission mode of overlay and underlay (HySOU), to achieve more potential resources for SUs to access the spectrum without interfering with the primary users. We formulate the HySOU resource allocation as a mixed-integer programming problem to optimize the total system throughput, satisfying heterogeneous QoS. To decrease the algorithm complexity, we divide the problem into two sub-problems: subchannel allocation and power allocation. Cutset is used to achieve the optimal subchannel allocation, and the optimal power allocation is obtained by Lagrangian dual function decomposition and subgradient algorithm. Simulation results show that the proposed algorithm further improves spectrum utilization with a simultaneous fairness guarantee, and the achieved HySOU diversity gain is a satisfactory improvement.

Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections

  • Tin, Phu Tran;Nam, Pham Minh;Duy, Tran Trung;Voznak, Miroslav
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.3
    • /
    • pp.200-209
    • /
    • 2017
  • In this paper, we investigate the tradeoff between security and reliability for a multi-hop protocol in cluster-based underlay cognitive radio networks. In the proposed protocol, a secondary source communicates with a secondary destination via the multi-hop relay method in the presence of a secondary eavesdropper. To enhance system performance under the joint impact of interference constraint required by multiple primary users and hardware impairments, the best relay node is selected at each hop to relay the source data to the destination. Moreover, the destination is equipped with multiple antennas and employs a selection combining (SC) technique to combine the received data. We derive closed-form expressions of the intercept probability (IP) for the eavesdropping links and the outage probability (OP) for the data links over a Rayleigh fading channel. Finally, the correction of our derivations is verified by Monte-Carlo simulations.

Cognitive UWB-OFDM: Pushing Ultra-Wideband Beyond Its Limit via Opportunistic Spectrum Usage

  • Arslan Huseyin;Sahin Mustafa E.
    • Journal of Communications and Networks
    • /
    • v.8 no.2
    • /
    • pp.151-157
    • /
    • 2006
  • In a continuously expanding wireless world, the number of radio systems increases every day and efficient spectrum usage becomes a more significant requirement. Ultra-wideband (UWB) and cognitive radio are two exciting technologies that offer new approaches to the spectrum usage. The main objective of this paper is to shed the first light on the marriage of these two important approaches. The strength of orthogonal frequency division multiplexing (OFDM) based UWB in co-existing with licensed systems is investigated. The opportunity concept is defined, and the requirements of the opportunistic spectrum usage are explained. It is proposed to take the UWB-OFDM from the current underlay implementation, and evolve it to a combined underlay and opportunistic spectrum usage technology, leading to cognitive UWB-OFDM. This way, we aim at making UWB more competitive in the wireless market with extended range, higher capacity, better performance, and a wide variety of applications.

Performance Analysis of Cognitive Relay Networks with Multiple Primary Users (다수의 주 사용자가 존재하는 무선인지 네트워크의 중계 전송 성능 평가)

  • Lee, Je-Min;Wang, Han-O;Noh, Go-San;Hong, Dae-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.5
    • /
    • pp.25-32
    • /
    • 2010
  • This paper evaluates the outage probability of cognitive relay networks with cooperation between secondary users based on the underlay approach, when multiple primary receivers coexist with secondary users. Using an appropriate relay selection criterion in cognitive radio networks, we derive the outage probability of secondary user. It is shown that the outage probability increases as the number of primary receivers increases and we quantify the increase. Through the simulation results, we verify that the performance of relaying transmission is varied more sensitively compared to that of direct transmission as the number of primary receivers increases. In addition, the relaying transmission can be less efficient than the direct transmission when multiple primary receiver exist but it can be more efficient than the direct transmission by increasing the relay selection diversity.

Cooperative Relaying Protocol using Fountain Codes under Interference Constraint Networks (간섭 제약 네트워크에서 파운틴 코드를 사용한 협동 릴레이 프로토콜 설계)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.39-45
    • /
    • 2013
  • In this paper, we propose a cooperative relaying protocol using Fountain codes for secondary network under interference constraint. In the proposed protocol, a secondary source uses Fountain codes to transmit its message to a secondary destination with help of a secondary relay. The secondary source and relay operate in the underlay model, in which they must adapt their transmit power so that the interference caused at a primary user is lower than an allowable threshold. To evaluate performance of the proposed protocol, we derive the expressions of average number of transmission times over Rayleigh fading channel. Various Monte-Carlo simulations are presented to verify the derivations.