Browse > Article
http://dx.doi.org/10.3837/tiis.2018.04.011

Distributed Matching Algorithms for Spectrum Access: A Comparative Study and Further Enhancements  

Ali, Bakhtiar (Department of Electrical Engineering, COMSATS IIT)
Zamir, Nida (Department of Electrical Engineering, COMSATS IIT)
Ng, Soon Xin (Department of Electronics and Computer Science, University of Southampton)
Butt, Muhammad Fasih Uddin (Department of Electrical Engineering, COMSATS IIT)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.4, 2018 , pp. 1594-1617 More about this Journal
Abstract
In this paper, we consider a spectrum access scenario which consists of two groups of users, namely Primary Users (PUs) and Secondary Users (SUs) in Cooperative Cognitive Radio Networks (CCRNs). SUs cooperatively relay PUs messages based on Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative techniques, in exchange for accessing some of the spectrum for their secondary communications. From the literatures, we found that the Conventional Distributed Algorithm (CDA) and Pragmatic Distributed Algorithm (PDA) aim to maximize the PU sum-rate resulting in a lower sum-rate for the SU. In this contribution, we have investigated a suit of distributed matching algorithms. More specifically, we investigated SU-based CDA (CDA-SU) and SU-based PDA (PDA-SU) that maximize the SU sum-rate. We have also proposed the All User-based PDA (PDA-ALL), for maximizing the sum-rates of both PU and SU groups. A comparative study of CDA, PDA, CDA-SU, PDA-SU and PDA-ALL is conducted, and the strength of each scheme is highlighted. Different schemes may be suitable for different applications. All schemes are investigated under the idealistic scenario involving perfect coding and perfect modulation, as well as under practical scenario involving actual coding and actual modulation. Explicitly, our practical scenario considers the adaptive coded modulation based DF schemes for transmission flexibility and efficiency. More specifically, we have considered the Self-Concatenated Convolutional Code (SECCC), which exhibits low complexity, since it invokes only a single encoder and a single decoder. Furthermore, puncturing has been employed for enhancing the bandwidth efficiency of SECCC. As another enhancement, physical layer security has been applied to our system by introducing a unique Advanced Encryption Standard (AES) based puncturing to our SECCC scheme.
Keywords
Cognitive radio networks; cooperative communications; physical layer security; matching algorithm; SECCC; spectrum access strategy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201-220, Feb 2005.   DOI
2 L. Hanzo, T. H. Liew, B. L. Yeap, R. Y. S. Tee, S. X. Ng, "Turbo Coding, Turbo Equalisation and Space-Time Coding: EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels, 2nd Edition," John Wiley and Sons, Mar 1, 2011.
3 M. F. U. Butt, S. X. Ng, and L. Hanzo, "EXIT chart aided design of near-capacity self-concatenated trellis coded modulation using iterative decoding," in Proc. of 67th IEEE Vehicular Technology Conference, Singapore, pp.734-738, May 2008.
4 M. F. U. Butt, S. X. Ng, and L. Hanzo, "Self-concatenated code design and its application in power-efficient cooperative communications," IEEE Communications Surveys Tutorials, vol. 14, no. 3, pp. 858-883, Third 2012.
5 D. Divsalar and F. Pollara, "Serial and hybrid concatenated codes with applications," in Proc. of Intl. Symp. Turbo Codes and Appls, pp.80-87, 1997.
6 D. Divsalar and F. Pollara, "Hybrid concatenated codes and iterative decoding," in Proc. of Proceedings of IEEE International Symposium on Information Theory, Ulm, 1997.
7 A. Payandeh, M. Ahmadian, and M. R. Aref, "A secure channel coding scheme for efficient transmission of remote sensing data over the LEO satellite channels," in Proc. of 2007 3rd International Conference on Recent Advances in Space Technologies, June 2007, pp. 510-514.
8 A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognitive radios: An information theoretic perspective," Proceedings of the IEEE, vol. 97, no. 5, pp. 894-914, May 2009.   DOI
9 W. D. Horne, "Adaptive spectrum access: Using the full spectrum space," The MITRE Corporation McLean, VA, Tech. Rep., 2003.
10 R. Gibbons, "Game Theory for Applied Economist," Princeton University Press, 1992.
11 M. Shubik, "Game Theory in the Social Sciences," MIT Press, 1982.
12 A. J. McKenzie, "Evolutionary Game Theory," The Stanford Encyclopedia of Philosophy, 2009.
13 Z. Han,Y. Gu, and W. Saad, Matching Theory for Wireless Networks, Springer International Publishing, 2017.
14 E. C. van der Meulen, "Three-terminal communication channels," Advances in Applied Probability, vol. 3, no. 1, pp. 120-154, 1971.   DOI
15 J. Jia, J. Zhang, and Q. Zhang, "Cooperative relay for cognitive radio networks," in Proc. of INFOCOM 2009, IEEE, April 2009, pp. 2304-2312.
16 J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062-3080, Dec 2004.   DOI
17 T. Luan, F. Gao, X. D. Zhang, J. C. F. Li, and M. Lei, "Rate maximization and beamforming design for relay-aided multiuser cognitive networks," IEEE Transactions on Vehicular Technology, vol. 61, no. 4, pp. 1940-1945, May 2012.   DOI
18 K. Lee and A. Yener, "CTH17-4: Outage performance of cognitive wireless relay networks," in Proc. of IEEE Globecom 2006, Nov 2006, pp. 1-5.
19 A. A. S. Afshar, T. Eghlidos, and M. R. Aref, "Efficient secure channel coding based on quasi-cyclic low-density parity-check codes," IET Communications, vol. 3, no. 2, pp. 279-292, February 2009.   DOI
20 A. Payandeh, M. Ahmadian, and M. R. Aref, "Adaptive secure channel coding based on punctured turbo codes," IEE Proceedings - Communications, vol. 153, no. 2, pp. 313-316, April 2006.
21 J. L. Massey, "An introduction to contemporary cryptology," Proceedings of the IEEE, vol. 76, no. 5, pp. 533-549, May 1988.   DOI
22 A. Zaidan, B. Zaidan, M. Abdulrazzaq, R. Raji, and S. Mohammed, "Implementation stage for high securing cover-file of hidden data using computation between cryptography and steganography," International Association of Computer Science and Information Technology (IACSIT), indexing by Nielsen, Thomson ISI (ISTP), IACSIT Database, British Library and EI Compendex, vol. 20, 2009.
23 FIPS Pub 46, "Data Encryption Standard (DES)," National Institute of Standards and Technology (NIST), 15 January 1977.
24 E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems," Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 2-21, 1991.
25 FIPS 197, "Announcing the Advanced Encryption Standard (AES)," National Institute of Standards and Technology (NIST), 26 November 2001.
26 T. Li, J. Ren, Q. Ling, and A. Jain, "Physical layer built-in security analysis and enhancement of CDMA systems," in Proc. of MILCOM 2005 - 2005 IEEE Military Communications Conference, Oct 2005, pp. 956-962 Vol. 2.
27 T. Dean and A. Goldsmith, "Physical-layer cryptography through massive MIMO," in Proc. of Information Theory Workshop (ITW), 2013 IEEE, Sept 2013, pp. 1-5.
28 S. Bayat, R. H. Y. Louie, B. Vucetic, and Y. Li, "Dynamic decentralised algorithms for cognitive radio relay networks with multiple primary and secondary users utilising matching theory," Transactions on Emerging Telecommunications Technologies, vol. 24, no. 5, pp. 486-502, 2013.   DOI
29 L. Mucchi, L. S. Ronga, and E. Del Re, "A novel approach for physical layer cryptography in wireless networks," Wireless Personal Communications, vol. 53, no. 3, pp. 329-347, 2010.   DOI
30 S. Bayat, R. H. Y. Louie, Y. Li and B. Vucetic, "Cognitive radio relay networks with multiple primary and secondary users: distributed stable matching algorithms for spectrum access," in Proc. of 2011 IEEE International Conference on Communications (ICC), Kyoto, pp. 1-6, 2011.
31 W. Liang, S. X. Ng, J. Feng, and L. Hanzo, "Pragmatic distributed algorithm for spectral access in cooperative cognitive radio networks," IEEE Transactions on Communications, vol. 62, no. 4, pp. 1188-1200, April 2014.   DOI
32 P. Rawat, M. Haddad, and E. Altman, "Towards Efficient Disaster Management: 5G and Device to Device Communication," in Proc. of 2015 2nd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), Rennes, pp. 79-87, 2015.
33 P. Lin, J. Jia, Q. Zhang, and M. Hamdi, "Dynamic spectrum sharing with multiple primary and secondary users," IEEE Transactions on Vehicular Technology, vol. 60, no. 4, pp. 1756-1765, May 2011.   DOI
34 G. Baldini, S. Karanasios, D. Allen, and F. Vergari, "Survey of Wireless Communication Technologies for Public Safety," IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 619-641, Second Quarter 2014.   DOI
35 A. Orsino, L. Militano, G. Araniti, A. Molinaro, and A. Iera, "Efficient Data Uploading Supported by D2D Communications in LTE-A Systems," in Proc. of Proceedings of European Wireless 2015; 21th European Wireless Conference, Budapest, Hungary, 2015, pp. 1-6.
36 H. Tang and S. Watson, "Cognitive Radio Networks for Tactical Wireless Communications," Scientific Report, No. DRDC-RDDC-2014-R185, Defence Research and Development Canada-Ottawa Research Centre Ottawa, Ontario Canada, 2014.
37 R. A. Chou, M. R. Bloch, and E. Abbe, "Polar coding for secret-key generation," CoRR, vol. abs/1305.4746, 2013.
38 A. Zuquete and J. Barros, "Physical-layer encryption with stream ciphers," in Proc. of 2008 IEEE International Symposium on Information Theory, July 2008, pp. 106-110.
39 A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Communications Surveys Tutorials, vol. 16, no. 3, pp. 1550-1573, Third 2014.   DOI
40 S. A. A. Fakoorian and A. L. Swindlehurst, "On the optimality of polar codes for the deterministic wiretap channel," in Proc. of 2013 Asilomar Conference on Signals, Systems and Computers, pp. 2089-2093, Nov 2013.
41 R. J. Aumann and M. Maschler, "Repeated Games with Incomplete Information," The MIT press, 1995.
42 Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, "Repeated open spectrum sharing game with cheat-proof strategies," IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1922-1933, April 2009.   DOI
43 M. F. U. Butt, R. A. Riaz, S. X. Ng, and L. Hanzo, "Near-capacity iteratively decoded binary self-concatenated code design using EXIT charts," in Proc. of IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, Nov 2008, pp. 1-5.
44 A. K. Sadek, W. Yu, and K. J. R. Liu, "On the energy efficiency of cooperative communications in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 6, no. 1, pp. 5:1-5:21, Jan. 2010.
45 S. Benedetto, D. Divsalar, G. Montorsi, and F. Pollara, "A soft-input soft-output app module for iterative decoding of concatenated codes," IEEE Communications Letters, vol. 1, no. 1, pp. 22-24, Jan 1997.   DOI
46 Y. Saleem, M. H. Rehmani, and S. Zeadally, "Integration of Cognitive Radio Technology with Unmanned Aerial Vehicles: Issues, Opportunities, and Future Research Challenges," Journal of Network and Computer Applications, vol. 50, pp. 15-31, 2015.   DOI
47 S. Ghafoor, P. D. Sutton, C. J. Sreenan, and K. N. Brown, "Cognitive Radio for Disaster Response Networks: Survey, Potential, and Challenges," IEEE Wireless Communications, vol. 21, no. 5, pp. 70-80, 2015.   DOI
48 A. Medeisis and O. Holland, "Cognitive Radio Policy and Regulation: Techno-Economic Studies to Facilitate Dynamic Spectrum Access," Springer, 2014.
49 R. Doost-Mohammady and K. R. Chowdhury, "Transforming Healthcare and Medical Telemetry through Cognitive Radio Networks," IEEE Wireless Communications, vol. 19, no. 4, pp. 67-73, August 2012.   DOI
50 R. Chavez-Santiago et al., "Cognitive Radio for Medical Body Area Networks using Ultra Wideband," IEEE Wireless Communications, vol. 19, no. 4, pp. 74-81, August 2012.   DOI
51 Z. Sheng and C. H. Liu, "Energy Efficient Cooperative Wireless Communication and Networks," CRC Press, 2014.
52 W. Fang, F. Liu, F. Yang, L. Shu, and S. Nishio, "Energy-efficient cooperative communication for data transmission in wireless sensor networks," IEEE Transactions on Consumer Electronics, vol. 56, no. 4, pp. 2185-2192, November 2010.   DOI
53 M. Nasim and S. Qaisar, "Cooperative Communication for Energy Efficiency in Mobile Wireless Sensor Networks," Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 159-172, 2011.
54 S. X. Ng and L. Hanzo, "On the MIMO channel capacity of multidimensional signal sets," IEEE Transactions on Vehicular Technology, vol. 55, no. 2, pp. 528-536, March 2006.   DOI
55 X. Feng, G. Sun, X. Gan, F. Yang, X. Tian, X. Wang, and M. Guizani, "Cooperative Spectrum Sharing in Cognitive Radio Networks: A Distributed Matching Approach," IEEE Transactions on Communications, vol. 62, no. 8, pp. 2651-2664, Aug. 2014.   DOI
56 D. Liu, Y. Xu, L. Shen, and Y. Xu, "Self-Organizing Multiuser Matching in Cellular Networks: A Score-Based Mutually Beneficial Approach," IET Communications, vol. 10, no. 15, pp. 1928-1937, Oct. 2016.   DOI