• Title/Summary/Keyword: underlay

Search Result 64, Processing Time 0.022 seconds

Cognitive UWB-OFDM: Pushing Ultra-Wideband Beyond Its Limit via Opportunistic Spectrum Usage

  • Arslan Huseyin;Sahin Mustafa E.
    • Journal of Communications and Networks
    • /
    • v.8 no.2
    • /
    • pp.151-157
    • /
    • 2006
  • In a continuously expanding wireless world, the number of radio systems increases every day and efficient spectrum usage becomes a more significant requirement. Ultra-wideband (UWB) and cognitive radio are two exciting technologies that offer new approaches to the spectrum usage. The main objective of this paper is to shed the first light on the marriage of these two important approaches. The strength of orthogonal frequency division multiplexing (OFDM) based UWB in co-existing with licensed systems is investigated. The opportunity concept is defined, and the requirements of the opportunistic spectrum usage are explained. It is proposed to take the UWB-OFDM from the current underlay implementation, and evolve it to a combined underlay and opportunistic spectrum usage technology, leading to cognitive UWB-OFDM. This way, we aim at making UWB more competitive in the wireless market with extended range, higher capacity, better performance, and a wide variety of applications.

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

  • Wang, Songqing;Xu, Xiaoming;Yang, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.260-279
    • /
    • 2015
  • In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.

Performance Improvement for Device-to-Device (D2D) Users in Underlay Cellular Communication Networks

  • Bin Zhong ;Hehong Lin;Liang Chen ;Zhongshan Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2805-2817
    • /
    • 2024
  • This study focuses on the performance of device-to-device (D2D) communications in underlay cellular networks by analyzing key metrics such as successful transmission probability, coverage probability, and throughput. Under the homogeneous Poisson point process (PPP) spatial distribution of full-duplex (FD)-D2D users in cellular networks, stochastic geometry tools are used to derive approximate expressions for D2D users' coverage probability and throughput. In comparison to the conventional half-duplex (HD) communication mode, when the self-interference cancellation factor β reaches -95 dB, there is a substantial improvement in the throughput of FD-D2D users, nearly doubling their gain. Additionally, experimental results demonstrate that the Newton iterative algorithm can be used to optimize the targeted signal-to-interference-plus-noise-ratio (SINR) threshold of users within the range of (10, 20) dB.

Cooperative Power Control Scheme for a Spectrum Sharing System

  • Ban, Tae-Won;Jung, Bang-Chul
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.641-646
    • /
    • 2011
  • In this paper, we investigate a power control problem which is very critical in underlay-based spectrum sharing systems. Although an underlay-based spectrum sharing system is more efficient compared to an overlay-based spectrum sharing system in terms of spectral utilization, some practical problems obstruct its commercialization. One of them is a real-time-based power adaptation of secondary transmitters. In the underlay-based spectrum sharing system, it is essential to adapt secondary user's transmit power to interference channel states to secure primary users' communication. Thus, we propose a practical power control scheme for secondary transmitters. The feedback overhead of our proposed scheme is insignificant because it requires one-bit signaling, while the optimal power control scheme requires the perfect information of channel states. In addition, the proposed scheme is robust to feedback delay. We compare the performance of the optimal and proposed schemes in terms of primary user's outage probability and secondary user's throughput. Our simulation results show that the proposed scheme is almost optimal in terms of both primary user's outage probability and secondary user's throughput when the secondary user's transmit power is low. As the secondary user's transmit power increases, the primary user's outage probability of the proposed scheme is degraded compared with the optimal scheme while the secondary user's throughput still approaches that of the optimal scheme. If the feedback delay is considered, however, the proposed scheme approaches the optimal scheme in terms of both the primary user's outage probability and secondary user's throughput regardless of the secondary user's transmit power.

Cooperative Relaying Protocol using Fountain Codes under Interference Constraint Networks (간섭 제약 네트워크에서 파운틴 코드를 사용한 협동 릴레이 프로토콜 설계)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.39-45
    • /
    • 2013
  • In this paper, we propose a cooperative relaying protocol using Fountain codes for secondary network under interference constraint. In the proposed protocol, a secondary source uses Fountain codes to transmit its message to a secondary destination with help of a secondary relay. The secondary source and relay operate in the underlay model, in which they must adapt their transmit power so that the interference caused at a primary user is lower than an allowable threshold. To evaluate performance of the proposed protocol, we derive the expressions of average number of transmission times over Rayleigh fading channel. Various Monte-Carlo simulations are presented to verify the derivations.

Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections

  • Tin, Phu Tran;Nam, Pham Minh;Duy, Tran Trung;Voznak, Miroslav
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.3
    • /
    • pp.200-209
    • /
    • 2017
  • In this paper, we investigate the tradeoff between security and reliability for a multi-hop protocol in cluster-based underlay cognitive radio networks. In the proposed protocol, a secondary source communicates with a secondary destination via the multi-hop relay method in the presence of a secondary eavesdropper. To enhance system performance under the joint impact of interference constraint required by multiple primary users and hardware impairments, the best relay node is selected at each hop to relay the source data to the destination. Moreover, the destination is equipped with multiple antennas and employs a selection combining (SC) technique to combine the received data. We derive closed-form expressions of the intercept probability (IP) for the eavesdropping links and the outage probability (OP) for the data links over a Rayleigh fading channel. Finally, the correction of our derivations is verified by Monte-Carlo simulations.

Improvement of Underlay Cooperative Cognitive Networks Bandwidth Efficiency under Interference and Power Constraints

  • Al-Mishmish, Hameed R.M.;Preveze, Barbaros;Alkhayyat, Ahmed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5335-5353
    • /
    • 2019
  • The definition of the bandwidth efficiency (BE) of cognitive cooperative network (CCN) is the ratio between a number of the licensed slot(s) or sub-channel(s) used by the unlicensed users to transmit a single data packet from the unlicensed transmitter to unlicensed destination, and from unlicensed relay(s) to unlicensed destination. This paper analyzes and improves the BE in the underlay CCN with a new reactive relay selection under interference and power constraints. In other words, this paper studies how unlicensed cooperative users use the licensed network slot(s) or sub-channel(s) efficiently. To this end, a reactive relay selection method named as Relay Automatic Repeat Request (RARQ) is proposed and utilized with a CCN under interference and power constraints. It is shown that the BE of CCN is higher than that of cooperative transmission (CT) due to the interference and power constraint. Furthermore, the BE of CCN is affected by the distance of the interference links which are between the unlicensed transmitter to the licensed destination and unlicensed relay to the licensed destination. In addition, the BE for multiple relays selection over a CCN under interference and power constraints is also analyzed and studied, and it is shown that the BE of CCN decreases as the number of relays increases.

User Selection Scheme for the Performance Improvement of the Secondary System in Cognitive Radio Systems using Underlay Mode (후 순위 시스템의 성능 향상을 위한 언더레이 기반의 인지 무선 시스템의 사용자 선택 기법)

  • Choe, Romi;Byun, Youn-Shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.3
    • /
    • pp.249-257
    • /
    • 2013
  • Recently, data traffic is significantly increased by high rate data service. As a result, radio spectrum is considered one of the most scarce and valuable resources for wireless communications. For the solution of this problem, cognitive radio(CR) has been proposed as an efficient means to opportunistic spectrum sharing between primary (licensed) users and cognitive radio users. In this paper, user selection scheme in CR networks is proposed for additional consideration of secondary system. The proposed user selection scheme mitigates interference to primary user by using orthogonal channel vectors while improves performance of secondary system. Simulation results show that the proposed scheme achieves 1.62bps/Hz higher average throughput of whole system than one of the existing scheme.