DOI QR코드

DOI QR Code

Distributed Matching Algorithms for Spectrum Access: A Comparative Study and Further Enhancements

  • Received : 2017.03.28
  • Accepted : 2017.11.07
  • Published : 2018.04.30

Abstract

In this paper, we consider a spectrum access scenario which consists of two groups of users, namely Primary Users (PUs) and Secondary Users (SUs) in Cooperative Cognitive Radio Networks (CCRNs). SUs cooperatively relay PUs messages based on Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative techniques, in exchange for accessing some of the spectrum for their secondary communications. From the literatures, we found that the Conventional Distributed Algorithm (CDA) and Pragmatic Distributed Algorithm (PDA) aim to maximize the PU sum-rate resulting in a lower sum-rate for the SU. In this contribution, we have investigated a suit of distributed matching algorithms. More specifically, we investigated SU-based CDA (CDA-SU) and SU-based PDA (PDA-SU) that maximize the SU sum-rate. We have also proposed the All User-based PDA (PDA-ALL), for maximizing the sum-rates of both PU and SU groups. A comparative study of CDA, PDA, CDA-SU, PDA-SU and PDA-ALL is conducted, and the strength of each scheme is highlighted. Different schemes may be suitable for different applications. All schemes are investigated under the idealistic scenario involving perfect coding and perfect modulation, as well as under practical scenario involving actual coding and actual modulation. Explicitly, our practical scenario considers the adaptive coded modulation based DF schemes for transmission flexibility and efficiency. More specifically, we have considered the Self-Concatenated Convolutional Code (SECCC), which exhibits low complexity, since it invokes only a single encoder and a single decoder. Furthermore, puncturing has been employed for enhancing the bandwidth efficiency of SECCC. As another enhancement, physical layer security has been applied to our system by introducing a unique Advanced Encryption Standard (AES) based puncturing to our SECCC scheme.

Keywords

References

  1. S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201-220, Feb 2005. https://doi.org/10.1109/JSAC.2004.839380
  2. A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognitive radios: An information theoretic perspective," Proceedings of the IEEE, vol. 97, no. 5, pp. 894-914, May 2009. https://doi.org/10.1109/JPROC.2009.2015717
  3. W. D. Horne, "Adaptive spectrum access: Using the full spectrum space," The MITRE Corporation McLean, VA, Tech. Rep., 2003.
  4. R. Gibbons, "Game Theory for Applied Economist," Princeton University Press, 1992.
  5. M. Shubik, "Game Theory in the Social Sciences," MIT Press, 1982.
  6. A. J. McKenzie, "Evolutionary Game Theory," The Stanford Encyclopedia of Philosophy, 2009.
  7. Z. Han,Y. Gu, and W. Saad, Matching Theory for Wireless Networks, Springer International Publishing, 2017.
  8. E. C. van der Meulen, "Three-terminal communication channels," Advances in Applied Probability, vol. 3, no. 1, pp. 120-154, 1971. https://doi.org/10.2307/1426331
  9. J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062-3080, Dec 2004. https://doi.org/10.1109/TIT.2004.838089
  10. T. Luan, F. Gao, X. D. Zhang, J. C. F. Li, and M. Lei, "Rate maximization and beamforming design for relay-aided multiuser cognitive networks," IEEE Transactions on Vehicular Technology, vol. 61, no. 4, pp. 1940-1945, May 2012. https://doi.org/10.1109/TVT.2012.2184312
  11. K. Lee and A. Yener, "CTH17-4: Outage performance of cognitive wireless relay networks," in Proc. of IEEE Globecom 2006, Nov 2006, pp. 1-5.
  12. J. Jia, J. Zhang, and Q. Zhang, "Cooperative relay for cognitive radio networks," in Proc. of INFOCOM 2009, IEEE, April 2009, pp. 2304-2312.
  13. P. Lin, J. Jia, Q. Zhang, and M. Hamdi, "Dynamic spectrum sharing with multiple primary and secondary users," IEEE Transactions on Vehicular Technology, vol. 60, no. 4, pp. 1756-1765, May 2011. https://doi.org/10.1109/TVT.2011.2132156
  14. S. Bayat, R. H. Y. Louie, Y. Li and B. Vucetic, "Cognitive radio relay networks with multiple primary and secondary users: distributed stable matching algorithms for spectrum access," in Proc. of 2011 IEEE International Conference on Communications (ICC), Kyoto, pp. 1-6, 2011.
  15. S. Bayat, R. H. Y. Louie, B. Vucetic, and Y. Li, "Dynamic decentralised algorithms for cognitive radio relay networks with multiple primary and secondary users utilising matching theory," Transactions on Emerging Telecommunications Technologies, vol. 24, no. 5, pp. 486-502, 2013. https://doi.org/10.1002/ett.2663
  16. W. Liang, S. X. Ng, J. Feng, and L. Hanzo, "Pragmatic distributed algorithm for spectral access in cooperative cognitive radio networks," IEEE Transactions on Communications, vol. 62, no. 4, pp. 1188-1200, April 2014. https://doi.org/10.1109/TCOMM.2014.030214.130326
  17. P. Rawat, M. Haddad, and E. Altman, "Towards Efficient Disaster Management: 5G and Device to Device Communication," in Proc. of 2015 2nd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), Rennes, pp. 79-87, 2015.
  18. G. Baldini, S. Karanasios, D. Allen, and F. Vergari, "Survey of Wireless Communication Technologies for Public Safety," IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 619-641, Second Quarter 2014. https://doi.org/10.1109/SURV.2013.082713.00034
  19. A. Orsino, L. Militano, G. Araniti, A. Molinaro, and A. Iera, "Efficient Data Uploading Supported by D2D Communications in LTE-A Systems," in Proc. of Proceedings of European Wireless 2015; 21th European Wireless Conference, Budapest, Hungary, 2015, pp. 1-6.
  20. H. Tang and S. Watson, "Cognitive Radio Networks for Tactical Wireless Communications," Scientific Report, No. DRDC-RDDC-2014-R185, Defence Research and Development Canada-Ottawa Research Centre Ottawa, Ontario Canada, 2014.
  21. Y. Saleem, M. H. Rehmani, and S. Zeadally, "Integration of Cognitive Radio Technology with Unmanned Aerial Vehicles: Issues, Opportunities, and Future Research Challenges," Journal of Network and Computer Applications, vol. 50, pp. 15-31, 2015. https://doi.org/10.1016/j.jnca.2014.12.002
  22. S. Ghafoor, P. D. Sutton, C. J. Sreenan, and K. N. Brown, "Cognitive Radio for Disaster Response Networks: Survey, Potential, and Challenges," IEEE Wireless Communications, vol. 21, no. 5, pp. 70-80, 2015. https://doi.org/10.1109/MWC.2014.6940435
  23. A. Medeisis and O. Holland, "Cognitive Radio Policy and Regulation: Techno-Economic Studies to Facilitate Dynamic Spectrum Access," Springer, 2014.
  24. R. Doost-Mohammady and K. R. Chowdhury, "Transforming Healthcare and Medical Telemetry through Cognitive Radio Networks," IEEE Wireless Communications, vol. 19, no. 4, pp. 67-73, August 2012. https://doi.org/10.1109/MWC.2012.6272425
  25. R. Chavez-Santiago et al., "Cognitive Radio for Medical Body Area Networks using Ultra Wideband," IEEE Wireless Communications, vol. 19, no. 4, pp. 74-81, August 2012. https://doi.org/10.1109/MWC.2012.6272426
  26. A. K. Sadek, W. Yu, and K. J. R. Liu, "On the energy efficiency of cooperative communications in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 6, no. 1, pp. 5:1-5:21, Jan. 2010.
  27. Z. Sheng and C. H. Liu, "Energy Efficient Cooperative Wireless Communication and Networks," CRC Press, 2014.
  28. W. Fang, F. Liu, F. Yang, L. Shu, and S. Nishio, "Energy-efficient cooperative communication for data transmission in wireless sensor networks," IEEE Transactions on Consumer Electronics, vol. 56, no. 4, pp. 2185-2192, November 2010. https://doi.org/10.1109/TCE.2010.5681089
  29. M. Nasim and S. Qaisar, "Cooperative Communication for Energy Efficiency in Mobile Wireless Sensor Networks," Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 159-172, 2011.
  30. X. Feng, G. Sun, X. Gan, F. Yang, X. Tian, X. Wang, and M. Guizani, "Cooperative Spectrum Sharing in Cognitive Radio Networks: A Distributed Matching Approach," IEEE Transactions on Communications, vol. 62, no. 8, pp. 2651-2664, Aug. 2014. https://doi.org/10.1109/TCOMM.2014.2322352
  31. D. Liu, Y. Xu, L. Shen, and Y. Xu, "Self-Organizing Multiuser Matching in Cellular Networks: A Score-Based Mutually Beneficial Approach," IET Communications, vol. 10, no. 15, pp. 1928-1937, Oct. 2016. https://doi.org/10.1049/iet-com.2016.0129
  32. S. X. Ng and L. Hanzo, "On the MIMO channel capacity of multidimensional signal sets," IEEE Transactions on Vehicular Technology, vol. 55, no. 2, pp. 528-536, March 2006. https://doi.org/10.1109/TVT.2005.863357
  33. L. Hanzo, T. H. Liew, B. L. Yeap, R. Y. S. Tee, S. X. Ng, "Turbo Coding, Turbo Equalisation and Space-Time Coding: EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels, 2nd Edition," John Wiley and Sons, Mar 1, 2011.
  34. M. F. U. Butt, S. X. Ng, and L. Hanzo, "EXIT chart aided design of near-capacity self-concatenated trellis coded modulation using iterative decoding," in Proc. of 67th IEEE Vehicular Technology Conference, Singapore, pp.734-738, May 2008.
  35. M. F. U. Butt, S. X. Ng, and L. Hanzo, "Self-concatenated code design and its application in power-efficient cooperative communications," IEEE Communications Surveys Tutorials, vol. 14, no. 3, pp. 858-883, Third 2012.
  36. D. Divsalar and F. Pollara, "Serial and hybrid concatenated codes with applications," in Proc. of Intl. Symp. Turbo Codes and Appls, pp.80-87, 1997.
  37. D. Divsalar and F. Pollara, "Hybrid concatenated codes and iterative decoding," in Proc. of Proceedings of IEEE International Symposium on Information Theory, Ulm, 1997.
  38. A. Payandeh, M. Ahmadian, and M. R. Aref, "A secure channel coding scheme for efficient transmission of remote sensing data over the LEO satellite channels," in Proc. of 2007 3rd International Conference on Recent Advances in Space Technologies, June 2007, pp. 510-514.
  39. A. Payandeh, M. Ahmadian, and M. R. Aref, "Adaptive secure channel coding based on punctured turbo codes," IEE Proceedings - Communications, vol. 153, no. 2, pp. 313-316, April 2006.
  40. A. A. S. Afshar, T. Eghlidos, and M. R. Aref, "Efficient secure channel coding based on quasi-cyclic low-density parity-check codes," IET Communications, vol. 3, no. 2, pp. 279-292, February 2009. https://doi.org/10.1049/iet-com:20080050
  41. J. L. Massey, "An introduction to contemporary cryptology," Proceedings of the IEEE, vol. 76, no. 5, pp. 533-549, May 1988. https://doi.org/10.1109/5.4440
  42. A. Zaidan, B. Zaidan, M. Abdulrazzaq, R. Raji, and S. Mohammed, "Implementation stage for high securing cover-file of hidden data using computation between cryptography and steganography," International Association of Computer Science and Information Technology (IACSIT), indexing by Nielsen, Thomson ISI (ISTP), IACSIT Database, British Library and EI Compendex, vol. 20, 2009.
  43. FIPS Pub 46, "Data Encryption Standard (DES)," National Institute of Standards and Technology (NIST), 15 January 1977.
  44. E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems," Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 2-21, 1991.
  45. FIPS 197, "Announcing the Advanced Encryption Standard (AES)," National Institute of Standards and Technology (NIST), 26 November 2001.
  46. T. Li, J. Ren, Q. Ling, and A. Jain, "Physical layer built-in security analysis and enhancement of CDMA systems," in Proc. of MILCOM 2005 - 2005 IEEE Military Communications Conference, Oct 2005, pp. 956-962 Vol. 2.
  47. T. Dean and A. Goldsmith, "Physical-layer cryptography through massive MIMO," in Proc. of Information Theory Workshop (ITW), 2013 IEEE, Sept 2013, pp. 1-5.
  48. L. Mucchi, L. S. Ronga, and E. Del Re, "A novel approach for physical layer cryptography in wireless networks," Wireless Personal Communications, vol. 53, no. 3, pp. 329-347, 2010. https://doi.org/10.1007/s11277-010-9950-6
  49. A. Zuquete and J. Barros, "Physical-layer encryption with stream ciphers," in Proc. of 2008 IEEE International Symposium on Information Theory, July 2008, pp. 106-110.
  50. A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Communications Surveys Tutorials, vol. 16, no. 3, pp. 1550-1573, Third 2014. https://doi.org/10.1109/SURV.2014.012314.00178
  51. S. A. A. Fakoorian and A. L. Swindlehurst, "On the optimality of polar codes for the deterministic wiretap channel," in Proc. of 2013 Asilomar Conference on Signals, Systems and Computers, pp. 2089-2093, Nov 2013.
  52. R. A. Chou, M. R. Bloch, and E. Abbe, "Polar coding for secret-key generation," CoRR, vol. abs/1305.4746, 2013.
  53. R. J. Aumann and M. Maschler, "Repeated Games with Incomplete Information," The MIT press, 1995.
  54. Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, "Repeated open spectrum sharing game with cheat-proof strategies," IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1922-1933, April 2009. https://doi.org/10.1109/T-WC.2008.080182
  55. M. F. U. Butt, R. A. Riaz, S. X. Ng, and L. Hanzo, "Near-capacity iteratively decoded binary self-concatenated code design using EXIT charts," in Proc. of IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, Nov 2008, pp. 1-5.
  56. S. Benedetto, D. Divsalar, G. Montorsi, and F. Pollara, "A soft-input soft-output app module for iterative decoding of concatenated codes," IEEE Communications Letters, vol. 1, no. 1, pp. 22-24, Jan 1997. https://doi.org/10.1109/4234.552145