• 제목/요약/키워드: Underlay protocol

검색결과 10건 처리시간 0.02초

On Performance Evaluation of Hybrid Decode-Amplify-Forward Relaying Protocol with Partial Relay Selection in Underlay Cognitive Networks

  • Duy, Tran Trung;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • 제16권5호
    • /
    • pp.502-511
    • /
    • 2014
  • In this paper, we evaluate performance of a hybrid decode-amplify-forward relaying protocol in underlay cognitive radio. In the proposed protocol, a secondary relay which is chosen by partial relay selection method helps a transmission between a secondary source and a secondary destination. In particular, if the chosen relay decodes the secondary source's signal successfully, it will forward the decoded signal to the secondary destination. Otherwise, it will amplify the signal received from the secondary source and will forward the amplified signal to the secondary destination. We evaluate the performance of our scheme via theory and simulation. Results show that the proposed protocol outperforms the amplify-and-forward and decode-and-forward protocols in terms of outage probability.

Cooperative Relaying with Interference Cancellation for Secondary Spectrum Access

  • Dai, Zeyang;Liu, Jian;Long, Keping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권10호
    • /
    • pp.2455-2472
    • /
    • 2012
  • Although underlay spectrum sharing has been shown as a promising technique to promote the spectrum utilization in cognitive radio networks (CRNs), it may suffer bad secondary performance due to the strict power constraints imposed at secondary systems and the interference from primary systems. In this paper, we propose a two-phase based cooperative transmission protocol with the interference cancellation (IC) and best-relay selection to improve the secondary performance in underlay models under stringent power constraints while ensuring the primary quality-of-service (QoS). In the proposed protocol, IC is employed at both the secondary relays and the secondary destination, where the IC-based best-relay selection and cooperative relaying schemes are well developed to reduce the interference from primary systems. The closed-form expression of secondary outage probability is derived for the proposed protocol over Rayleigh fading channels. Simulation results show that, with a guaranteed primary outage probability, the proposed protocol can achieve not only lower secondary outage probability but also higher secondary diversity order than the traditional underlay case.

언더레이 인지기술에서 양방향 릴레이 증분 협력 전송에 관한 연구 (Incremental Cooperative Transmission of Bidirectional Relaying Schemes in Underlay Cognitive Radio)

  • 공형윤
    • 한국인터넷방송통신학회논문지
    • /
    • 제13권3호
    • /
    • pp.47-53
    • /
    • 2013
  • 본 논문에서는, 양 방향 언더레이 인지 네트워크의 점진적 협력 전송을 제안한다. 제안된 프로토콜은 두 2차 소스가 간섭 조건에 따라 보조 릴레이의 도움으로 서로의 패킷을 전송하려 시도하는 것이다. 성능 평가를 위해, 레일리히 페이딩 채널의 평균 정전 확률에 대한 폐구간의 정확한 식을 유도한다. 또한, 유도된 식을 확인하기 위해 몬테카를로 시뮬레이션을 수행한다. 그 결과, 시뮬레이션과 이론적 결과가 일치하며, 제안된 프로토콜의 정전 확률은 양방향 직접 통신 프로토콜보다 더욱 우수하다.

Short packet communication in underlay cognitive network assisted by an intelligent reflecting surface

  • Pham Ngoc Son;Tran Trung Duy;Pham Viet Tuan;Tan-Phuoc Huynh
    • ETRI Journal
    • /
    • 제45권1호
    • /
    • pp.28-44
    • /
    • 2023
  • We propose short packet communication in an underlay cognitive radio network assisted by an intelligent reflecting surface (IRS) composed of multiple reconfigurable reflectors. This scheme, called the IRS protocol, operates in only one time slot (TS) using the IRS. The IRS adjusts its phases to give zero received cumulative phase at the secondary destination, thereby enhancing the end-to-end signal-to-noise ratio. The transmitting power of the secondary source is optimized to simultaneously satisfy the multi-interference constraints, hardware limitations, and performance improvement. Simulation and analysis results of the average block error rates (BLERs) show that the performance can be enhanced by installing more reconfigurable reflectors, increasing the blocklength, lowering the number of required primary receivers, or sending fewer information bits. Moreover, the proposed IRS protocol always outperforms underlay relaying protocols using two TSs for data transmission, and achieves the best average BLER at identical transmission distances between the secondary source and secondary destination. The theoretical analyses are confirmed by Monte Carlo simulations.

간섭 제약 네트워크에서 파운틴 코드를 사용한 협동 릴레이 프로토콜 설계 (Cooperative Relaying Protocol using Fountain Codes under Interference Constraint Networks)

  • 공형윤
    • 한국인터넷방송통신학회논문지
    • /
    • 제13권3호
    • /
    • pp.39-45
    • /
    • 2013
  • 본 논문에서는, 간섭 조건의 2차 네트워크에서 파운틴 코드를 사용하는 협력 릴레이 프로토콜을 제안한다. 제안된 프로토콜에서 2차 소스는 2차 릴레이의 도움으로 2차 목적지까지 파운틴 코드로 메시지를 전송한다. 2차 소스와 릴레이는 언더레이 모델에서 작동하며, 1차 사용자에 의해 발생된 간섭의 경우, 허용된 임계 값보다 낮기 때문에 2차 소스와 릴레이의 전송 전력에 적응해야한다. 제안된 프로토콜의 성능 평가를 위해, 레일리히 페이딩 채널환경에서 평균 전송 시간의 식을 유도한다. 또한, 몬테-카를로 시뮬레이션을 통하여 유도된 식을 검증 하였다.

Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections

  • Tin, Phu Tran;Nam, Pham Minh;Duy, Tran Trung;Voznak, Miroslav
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제6권3호
    • /
    • pp.200-209
    • /
    • 2017
  • In this paper, we investigate the tradeoff between security and reliability for a multi-hop protocol in cluster-based underlay cognitive radio networks. In the proposed protocol, a secondary source communicates with a secondary destination via the multi-hop relay method in the presence of a secondary eavesdropper. To enhance system performance under the joint impact of interference constraint required by multiple primary users and hardware impairments, the best relay node is selected at each hop to relay the source data to the destination. Moreover, the destination is equipped with multiple antennas and employs a selection combining (SC) technique to combine the received data. We derive closed-form expressions of the intercept probability (IP) for the eavesdropping links and the outage probability (OP) for the data links over a Rayleigh fading channel. Finally, the correction of our derivations is verified by Monte-Carlo simulations.

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung;Son, Pham Ngoc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4623-4643
    • /
    • 2015
  • This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.

Hybrid Spectrum Sharing with Cooperative Secondary User Selection in Cognitive Radio Networks

  • Kader, Md. Fazlul;Asaduzzaman, Asaduzzaman;Hoque, Md. Moshiul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권9호
    • /
    • pp.2081-2100
    • /
    • 2013
  • In this paper, we propose a cooperative hybrid spectrum sharing protocol by jointly considering interweave (opportunistic) and underlay schemes. In the proposed protocol, secondary users can access the licensed spectrum along with the primary system. Our network scenario comprises a single primary transmitter-receiver (PTx-PRx) pair and a group of M secondary transmitter-receiver (STx-SRx) pairs within the transmission range of the primary system. Secondary transmitters are divided into two groups: active and inactive. A secondary transmitter that gets an opportunity to access the secondary spectrum is called "active". One of the idle or inactive secondary transmitters that achieves the primary request target rate $R_{PT}$ will be selected as a best decode-and-forward (DF) relay (Re) to forward the primary information when the data rate of the direct link between PTx and PRx falls below $R_{PT}$. We investigate the ergodic capacity and outage probability of the primary system with cooperative relaying and outage probability of the secondary system. Our theoretical and simulation results show that both the primary and secondary systems are able to achieve performance improvement in terms of outage probability. It is also shown that ergodic capacity and outage probability improve when the active secondary transmitter is located farther away from the PRx.

물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석 (Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security)

  • 팜옥손;공형윤
    • 한국인터넷방송통신학회논문지
    • /
    • 제14권1호
    • /
    • pp.179-187
    • /
    • 2014
  • 언더레이 프로토콜은 2차 시스템이나 인지된 사용자가 1차 사용자의 품질 저하 없이 동일한 주파수를 사용하는 인지 기술이다. 또한, 무선 환경의 중계 특성으로 인해, 몇몇 노드는 도청 노드라고 불리며, 다른 통신 링크를 위한 정보를 수신한다. 이러한 이유로, 물리 계층의 보안은 도청의 발생을 막기 위해 보안 성취율을 고려하여 응용된다. 본 논문에서는, 물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능을 협력 통신 노드를 이용하여 분석한다. 이 모델에서, 중계기는 송신단에서 수신단으로의 신호 전송을 돕기 위해 증폭 후 전송 기법을 사용한다. 우수한 중계기는 기회주의적 중계기 선택 기법으로 선정되며, 단 대 단 보안 성취율을 기초로 한다. 시스템 성능은 보안 성취율의 정전 확률로 평가된다. 정전 확률의 상향, 하향 한계는 국제 통계 채널 상태 정보(CSI)에 기초하며, 또한, 닫힌계로 유도한다. 시뮬레이션 결과는 인지 네트워크는 1차 사용자로부터 충분히 멀 때, 중계기에서 도청 노드까지의 거리가 중계기에서 수신단까지의 거리보다 큰 경우 시스템 성능이 향상된 것을 보여준다.

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks

  • Xu, Xiaorong;Hu, Andi;Yao, Yingbiao;Feng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.1-19
    • /
    • 2020
  • In an underlay cognitive simultaneous wireless information and power transfer (SWIPT) network, communication from secondary user (SU) to secondary destination (SD) is accomplished with decode-and-forward (DF) relays. Multiple energy-constrained relays are assumed to harvest energy from SU via power splitting (PS) protocol and complete SU secure information transmission with beamforming. Hence, physical layer security (PLS) is investigated in cognitive SWIPT network. In order to interfere with eavesdropper and improve relay's energy efficiency, a destination-assisted jamming scheme is proposed. Namely, SD transmits artificial noise (AN) to interfere with eavesdropping, while jamming signal can also provide harvested energy to relays. Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization. We solve this non-convex optimization problem via a general two-stage procedure. Firstly, we obtain the optimal beamforming vector through semi-definite relaxation (SDR) method with a fixed power splitting ratio. Secondly, the best power splitting ratio can be obtained by one-dimensional search. We provide simulation results to verify the proposed solution. Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks.