• Title/Summary/Keyword: user relay scheme

Search Result 81, Processing Time 0.028 seconds

A Reporting Interval Adaptive, Sensor Control Platform for Energy-saving Data Gathering in Wireless Sensor Networks

  • Choi, Wook;Lee, Yong;Kim, Sang-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.247-268
    • /
    • 2011
  • Due to the application-specific nature of wireless sensor networks, the sensitivity to such a requirement as data reporting interval varies according to the type of application. Such considerations require an application-specific, parameter tuning paradigm allowing us to maximize energy conservation prolonging the operational network lifetime. In this paper, we propose a reporting interval adaptive, sensor control platform for energy-saving data gathering in wireless sensor networks. The ultimate goal is to extend the network lifetime by providing sensors with high adaptability to application-dependent or time-varying, reporting interval requirements. The proposed sensor control platform is based upon a two phase clustering (TPC) scheme which constructs two types of links within each cluster - namely, direct link and relay link. The direct links are used for control and time-critical, sensed data forwarding while the relay links are used only for multi-hop data reporting. Sensors opportunistically use the energy-saving relay link depending on the user reporting, interval constraint. We present factors that should be considered in deciding the total number of relay links and how sensors are scheduled for sensed data forwarding within a cluster for a given reporting interval and link quality. Simulation and implementation studies demonstrate that the proposed sensor control platform can help individual sensors save a significant amount of energy in reporting data, particularly in dense sensor networks. Such saving can be realized by the adaptability of the sensor to the reporting interval requirements.

A New Physical Layer Transmission Scheme for LPI and High Throughput in the Cooperative SC-FDMA System

  • Li, Yingshan;Wu, Chao;Sun, Dongyan;Xia, Junli;Ryu, Heung-Gyoon
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.457-463
    • /
    • 2013
  • In recent days, cooperative diversity and communication security become important research issues for wireless communications. In this paper, to achieve low probability of interception (LPI) and high throughput in the cooperative single-carrier frequency division multiple access (SC-FDMA) system, a new physical layer transmission scheme is proposed, where a new encryption algorithm is applied and adaptive modulation is further considered based on channel state information (CSI). By doing so, neither relay node nor eavesdropper can intercept the information signals transmitted from user terminal (UT). Simulation results show above new physical layer transmission scheme brings in high transmission safety and secrecy rate. Furthermore, by applying adaptive modulation and coding (AMC) technique according to CSI, transmission throughput can be increased significantly. Additionally, low peak-to-average power ratio (PAPR) characteristic can still be remained due to the uniform distribution of random coefficients used for encryption algorithm.

User Authentication Scheme for WiFi Access in a WiBro-based BWAN through Nomadic Access Relay Station (와이브로 기반의 광대역 무선 액세스 망에서 WiFi 액세스 사용자 인증 방안 설계 및 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.11
    • /
    • pp.37-44
    • /
    • 2008
  • Recently, there have been intensive researches on the wireless Internet access through WiFi WLAN using WiBro network as backhaul link in the Internet service providing business area. However, in the wireless Internet access method, we need to solve the compatibility problem for different user authentications between licensed WiBro network and unlicensed WiFi network for billing and user management. In this paper, we propose an authentication method for WiFi users by BWAN operators through WiNNERs which is RS connecting the two networks, and discuss the effectiveness of the method.

An Automatic Repeating Protocol in Cooperative Spectrum Sharing (협력적 스펙트럼 공유의 자동 반복 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.101-108
    • /
    • 2013
  • In this paper, we propose a method in which the negative acknowledge (NACK) message is used as command for cooperation and spectrum sharing. This allows for an automatic request for cooperation and sharing when the direct link of the primary user is in outage, and also allows for saving the number of control messages in cooperation-spectrum sharing based paradigm. In the sharing phase, the selected relay shares a power fraction of $1-{\alpha}$ for secondary transmitted signal while the remaining of ${\alpha}$ is for primary retransmitted signal. In the case of no relay collected, primary transmitter uses NACK as a command to retransmit the signal with fully power fraction (${\alpha}=1$). Both systems are assumed to employ BPSK signals. In this scheme, we propose the joint optimal decoding in the secondary user. The frame error rate (FER) performance at both systems is then analyzed. The theoretical and simulation results validate the analysis and confirm the efficiency of the protocol.

Uplink Relaying Scheme for Efficient Frequency Usage in Cognitive Radio Networks (인지 무선 네트워크 환경에서 효율적인 주파수 활용을 위한 상향링크 릴레이 기법)

  • Kim, Se-Woong;Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4A
    • /
    • pp.356-368
    • /
    • 2011
  • While most of the public radio spectrum bands are allocated to licensed users, cognitive radio has been considered as a promising technology for the efficient spectrum utilization. In this new technology, secondary users opportunistically use the temporally underutilized licensed bands as long as they do not give the harmful interference to primary users. In this paper, we focus on the infra-structured network condition in which the cognitive radio network consists of a cognitive radio base station and multiple secondary users. Upon detecting a primary user, the entire cognitive radio network generally switches to another available channel, even if most of the on-going communications still does not interfere with the primary user. Moreover, the network re-entry process on a new channel causes the service disruption of the on-going communications. For this reason, in this paper, we propose a relaying scheme for efficient frequency usage, in which the secondary user out of the interference range of a primary user performs as a relaying node for the secondary user possibly interfering with a primary user. The entire spectrum switching is not required, and thus, we can avoid the service disruption of the on-going communications as much as possible.

Seamless Intra MR-BS Handover Based on IEEE802.16j (IEEE802.16j MR-BS내에서 끊김없는 핸드오버 기술)

  • Lee, Il-Shin;Yoo, Jae-Ho;Lee, Yoon-Ju;Kwon, Dong-Seung;Chung, Jae-Hak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5A
    • /
    • pp.381-390
    • /
    • 2009
  • In this paper, we propose a seamless intra MR-BS handover scheme based on IEEE802.16j transparent. The proposed scheme estimates the outage probability of mobile stations at a base station, finds the optimum relay user, and provides low handover latency for seamless data transmission. The simulation results show that the proposed scheme outperforms the conventional handover schemes in terms of the handover latency by 65% of conventional scheme. Moreover, the proposed scheme exhibits lower packet error rate compared with the conventional handover scheme when a mobile station moves to outside of the cell coverage and reduce both outage probability and the number of handover about 50% from setting forgetting factor and redundant threshold.

Block diagonalization precoding scheme for a multiuser amplify-and-forward MIMO relay system (다중 사용자 증폭재전송 MIMO 중계 시스템을 위한 블록 대각화 기반 프리코딩 기법)

  • Lee, Panhyung;Lee, Jae Hong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.102-103
    • /
    • 2012
  • 본 논문에서는 다중 사용자 증폭재전송(amplify-and-forward) MIMO 중계 시스템을 위한 프리코딩(precoding) 기법을 제안한다. 제안된 프리코딩 기법에서는 블록 대각화(block diagonalization)를 통해 사용자간 간섭(inter-user interfereence)을 제거하고 기지국과 중계기에서의 전송전력(transmit power) 제한을 만족하면서 사용자 데이터 전송률(data rate)의 합이 최대화 되도록 한다. 모의실험결과를 통해 제안된 기법이 기존 기법에 비해 더 높은 사용자 데이터 전송률의 합을 달성함을 보이고 있다.

  • PDF

Performance analysis of SWIPT-assisted adaptive NOMA/OMA system with hardware impairments and imperfect CSI

  • Jing Guo;Jin Lu;Xianghui Wang;Lili Zhou
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.254-266
    • /
    • 2023
  • This paper investigates the effect of hardware impairments (HIs) and imperfect channel state information (ICSI) on a SWIPT-assisted adaptive nonorthogonal multiple access (NOMA)/orthogonal multiple access (OMA) system over independent and nonidentical Rayleigh fading channels. In the NOMA mode, the energy-constrained near users act as a relay to improve the performance for the far users. The OMA transmission mode is adopted to avoid a complete outage when NOMA is infeasible. The best user selection scheme is considered to maximize the energy harvested and avoid error propagation. To characterize the performance of the proposed systems, closed-form and asymptotic expressions of the outage probability for both near and far users are studied. Moreover, exact and approximate expressions of the ergodic rate for near and far users are investigated. Simulation results are provided to verify our theoretical analysis and confirm the superiority of the proposed NOMA/OMA scheme in comparison with the conventional NOMA and OMA protocol with/without HIs and ICSI.

Performance Analysis of Coded Cooperation over Rician Fading Channel (Rician fading 채널에서 협력통신을 위한 coded cooperation의 성능분석)

  • Lee, Jae-Young;Kim, Sung-Il;Im, Hyun-Ho;Heo, Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3A
    • /
    • pp.245-253
    • /
    • 2010
  • In this paper, we derive the performance analysis of the coded cooperation over a Rician fading channel. A new scheme called coded cooperation was suggested by using user cooperation and channel codes simultaneously. In previous works, it was verified that the coded cooperation schemes have better performance than other relay schemes in a Rayleigh fading channel. However, the high speed short range indoor wireless communication system has recently attracted research attention and its channel with very high carrier frequency(60GHz) can be typically modeled as a Rician fading channel. We derive analytical outage probabilities and bit error probabilities of the coded cooperation over the Rician fading channel and prove it to have full diversity order.

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.