• Title/Summary/Keyword: underlay scheme

Search Result 27, Processing Time 0.02 seconds

User Selection Scheme for the Performance Improvement of the Secondary System in Cognitive Radio Systems using Underlay Mode (후 순위 시스템의 성능 향상을 위한 언더레이 기반의 인지 무선 시스템의 사용자 선택 기법)

  • Choe, Romi;Byun, Youn-Shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.3
    • /
    • pp.249-257
    • /
    • 2013
  • Recently, data traffic is significantly increased by high rate data service. As a result, radio spectrum is considered one of the most scarce and valuable resources for wireless communications. For the solution of this problem, cognitive radio(CR) has been proposed as an efficient means to opportunistic spectrum sharing between primary (licensed) users and cognitive radio users. In this paper, user selection scheme in CR networks is proposed for additional consideration of secondary system. The proposed user selection scheme mitigates interference to primary user by using orthogonal channel vectors while improves performance of secondary system. Simulation results show that the proposed scheme achieves 1.62bps/Hz higher average throughput of whole system than one of the existing scheme.

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

  • Wang, Songqing;Xu, Xiaoming;Yang, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.260-279
    • /
    • 2015
  • In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung;Son, Pham Ngoc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4623-4643
    • /
    • 2015
  • This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.

Two-Tier Interference Elimination for Femtocells Based on Cognitive Radio Centralized Spectrum Management

  • Yi, Leng-Gan;Lu, Yi-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1514-1531
    • /
    • 2014
  • Femtocell provides better coverage and higher spectrum efficiency in areas rarely covered by macrocells. However, serious two-tier interference emerging from randomly deploying femtocells may create dead zones where the service is unavailable for macro-users. In this paper, we present adopting cognitive radio spectrum overlay to avoid intra-tier interference and incorporating spectrum underlay and overlay to coordinate cross-tier interference. It is a novel centralized control strategy appropriate for both uplink and downlink transmission. We introduce the application of proper spectrum sharing strategy plus optimal power allocation to address the issue of OFDM-based femtocells interference-limited downlink transmission, along with, a low-complexity suboptimal solution proposed. Simulation results illustrate the proposed optimal scheme achieves the highest transmission rate on successfully avoiding two-tier interference, and outperforms the traditional spectrum underlay or spectrum overlay, via maximizing the opportunity to transmit. Moreover, the strength of our proposed schemes is further demonstrated by comparison with previous classic power allocation methods, in terms of transmission rate, computational complexity and signal peak-to-average power ratio.

Energy-Efficient Power Allocation for Cognitive Radio Networks with Joint Overlay and Underlay Spectrum Access Mechanism

  • Zuo, Jiakuo;Zhao, Li;Bao, Yongqiang;Zou, Cairong
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.471-479
    • /
    • 2015
  • Traditional designs of cognitive radio (CR) focus on maximizing system throughput. In this paper, we study the joint overlay and underlay power allocation problem for orthogonal frequency-division multiple access-based CR. Instead of maximizing system throughput, we aim to maximize system energy efficiency (EE), measured by a "bit per Joule" metric, while maintaining the minimal rate requirement of a given CR system, under the total power constraint of a secondary user and interference constraints of primary users. The formulated energy-efficient power allocation (EEPA) problem is nonconvex; to make it solvable, we first transform the original problem into a convex optimization problem via fractional programming, and then the Lagrange dual decomposition method is used to solve the equivalent convex optimization problem. Finally, an optimal EEPA allocation scheme is proposed. Numerical results show that the proposed method can achieve better EE performance.

Joint Subcarrier and Bit Allocation for Secondary User with Primary Users' Cooperation

  • Xu, Xiaorong;Yao, Yu-Dong;Hu, Sanqing;Yao, Yingbiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3037-3054
    • /
    • 2013
  • Interference between primary user (PU) and secondary user (SU) transceivers should be mitigated in order to implement underlay spectrum sharing in cognitive radio networks (CRN). Considering this scenario, an improved joint subcarrier and bit allocation scheme for cognitive user with primary users' cooperation (PU Coop) in CRN is proposed. In this scheme, the optimization problem is formulated to minimize the average interference power level at the PU receiver via PU Coop, which guarantees a higher primary signal to interference plus noise ratio (SINR) while maintaining the secondary user total rate constraint. The joint optimal scheme is separated into subcarrier allocation and bit assignment in each subcarrier via arith-metric geo-metric (AM-GM) inequality with asymptotical optimization solution. Moreover, the joint subcarrier and bit optimization scheme, which is evaluated by the available SU subcarriers and the allocated bits, is analyzed in the proposed PU Coop model. The performance of cognitive spectral efficiency and the average interference power level are investigated. Numerical analysis indicates that the SU's spectral efficiency increases significantly compared with the PU non-cooperation scenario. Moreover, the interference power level decreases dramatically for the proposed scheme compared with the traditional Hughes-Hartogs bit allocation scheme.

Joint Resource Allocation for Cellular and D2D Multicast Based on Cognitive Radio

  • Wu, Xiaolu;Chen, Yueyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.91-107
    • /
    • 2014
  • Device-to-device (D2D) communication is an excellent technology to improve the system capacity by sharing the spectrum resources of cellular networks. Multicast service is considered as an effective transmission mode for the future mobile social contact services. Therefore, multicast based on D2D technology can exactly improve the spectrum resource efficiency. How to apply D2D technology to support multicast service is a new issue. In this paper, a resource allocation scheme based on cognitive radio (CR) for D2D underlay multicast communication (CR-DUM) is proposed to improve system performance. In the cognitive cellular system, the D2D users as secondary users employing multicast service form a group and reuse the cellular resources to accomplish a multicast transmission. The proposed scheme includes two steps. First, a channel allocation rule aiming to reduce the interference from cellular networks to receivers in D2D multicast group is proposed. Next, to maximize the total system throughput under the condition of interference and noise impairment, we formulate an optimal transmission power allocation jointly for the cellular and D2D multicast communications. Based on the channel allocation, optimal power solution is in a closed form and achieved by searching from a finite set and the interference between cellular and D2D multicast communication is coordinated. The simulation results show that the proposed method can not only ensure the quality of services (QoS), but also improve the system throughput.

Popularity-Based Adaptive Content Delivery Scheme with In-Network Caching

  • Kim, Jeong Yun;Lee, Gyu Myoung;Choi, Jun Kyun
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.819-828
    • /
    • 2014
  • To solve the increasing popularity of video streaming services over the Internet, recent research activities have addressed the locality of content delivery from a network edge by introducing a storage module into a router. To employ in-network caching and persistent request routing, this paper introduces a hybrid content delivery network (CDN) system combining novel content routers in an underlay together with a traditional CDN server in an overlay. This system first selects the most suitable delivery scheme (that is, multicast or broadcast) for the content in question and then allocates an appropriate number of channels based on a consideration of the content's popularity. The proposed scheme aims to minimize traffic volume and achieve optimal delivery cost, since the most popular content is delivered through broadcast channels and the least popular through multicast channels. The performance of the adaptive scheme is clearly evaluated and compared against both the multicast and broadcast schemes in terms of the optimal in-network caching size and number of unicast channels in a content router to observe the significant impact of our proposed scheme.

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks

  • Xu, Xiaorong;Hu, Andi;Yao, Yingbiao;Feng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.1-19
    • /
    • 2020
  • In an underlay cognitive simultaneous wireless information and power transfer (SWIPT) network, communication from secondary user (SU) to secondary destination (SD) is accomplished with decode-and-forward (DF) relays. Multiple energy-constrained relays are assumed to harvest energy from SU via power splitting (PS) protocol and complete SU secure information transmission with beamforming. Hence, physical layer security (PLS) is investigated in cognitive SWIPT network. In order to interfere with eavesdropper and improve relay's energy efficiency, a destination-assisted jamming scheme is proposed. Namely, SD transmits artificial noise (AN) to interfere with eavesdropping, while jamming signal can also provide harvested energy to relays. Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization. We solve this non-convex optimization problem via a general two-stage procedure. Firstly, we obtain the optimal beamforming vector through semi-definite relaxation (SDR) method with a fixed power splitting ratio. Secondly, the best power splitting ratio can be obtained by one-dimensional search. We provide simulation results to verify the proposed solution. Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks.

Scheduling Scheme for Underlay-based D2D Direct Communications in Cellular Networks (셀룰러 네트워크에서 언더레이 기반의 단말간 직접통신을 위한 스케쥴링 방법)

  • Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2800-2804
    • /
    • 2015
  • Recently, device-to-device (D2D) direct communication is attracting much interest and many researches have been conducted. In this paper, we investigated an algorithm to support the D2D direct communication in cellular mobile communication networks. We investigated the optimal D2D scheduling algorithm which can achieve the maximal sum-rate in cellular uplink frequency. We also proposed a simple scheduling algorithm which can considerably reduce the computational complexity, compared to the optimal scheme. Finally, we analyzed the performance of the proposed scheme based on computer simulations.