首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 500 毫秒
1.
In this paper, we investigate the physical layer security of a hybrid cognitive relay network using an energy harvesting relay in presence of an eavesdropper. In the hybrid scheme, a secondary user (SU) as well as a cognitive relay works either in underlay or in overlay mode. In underlay, the transmit power of the SU as well as the relay is limited by the maximum acceptable interference at primary user (PU) receiver as required by an outage constraint of PU, a quality of service for PU. The secondary network consists of a decode and forward relay that harvests energy from radio frequency signal of secondary transmitter as well as PU transmitter to assist the SU in forwarding the information signal to the destination. A time switching relaying protocol is used at the relay. We evaluate the secrecy outage probability of secondary relay network assuming that channel state information of the interfering links from both the SU and relay transmitter to PU receiver is imperfect. Our results reveal the impact of imperfect channel state information, energy harvesting time, tolerable interference threshold, and PU outage constraint on the secrecy outage probability of SU.  相似文献   

2.
For multiple-input multiple-output cognitive radio systems, we propose an optimal single transmit and receive antenna selection scheme which maximizes the signal-to-interference-and-noise ratio. Considering peak interference power constraint, peak transmit power constraint, and interference from primary transmitter to cognitive receiver, we theoretically derive the exact system outage probability. It is shown that the theoretical results match simulation results.  相似文献   

3.
This paper considers cooperative non‐orthogonal multiple access (NOMA) scheme in an underlay cognitive radio (CR) network. A single‐cell downlink cooperative NOMA system has been considered for the secondary network, consisting of a base station (BS) and two secondary users, ie, a far user and a near user. The BS employs NOMA signaling to send messages for the two secondary users where the near user is enabled to act as a half‐duplex decode‐and‐forward (DF) relay for the far user. We derive exact expressions for the outage probability experienced by both the users and the outage probability of the secondary system assuming the links to experience independent, nonidentically distributed Rayleigh fading. Further, we analyze the ergodic rates of both the users and the ergodic sum rate of the secondary network. The maximum transmit power constraint of the secondary nodes and the tolerable interference power constraint at the primary receiver are considered for the analysis. Further, the interference caused by the primary transmitter (PT) on the secondary network is also considered for the analysis. The performance of the proposed CR NOMA network has been observed to be significantly better than a CR network that uses conventional orthogonal multiple access (OMA) scheme. The analytical results are validated by extensive simulation studies.  相似文献   

4.
This paper investigates the power allocation problem in decode‐and‐forward cognitive dual‐hop systems over Rayleigh fading channels. In order to optimize the performance of the secondary network in terms of power consumption, an outage‐constrained power allocation scheme is proposed. The secondary nodes adjust their transmit power subject to an average interference constraint at the primary receiver and an outage probability constraint for the secondary receivers while having only statistical channel knowledge with respect to the primary nodes. We compare this approach with a power allocation scheme based on instantaneous channel state information under a peak interference constraint. Analytical and numerical results show that the proposed approach, without requiring the constant interchange of channel state information, can achieve a similar performance in terms of outage probability as that of power allocation based on instantaneous channel knowledge. Moreover, the transmit power allocated by the proposed approach is considerably smaller than the power allocated by the method based on instantaneous channel knowledge in more than 50% of the time. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

5.
Recently, cooperative relaying techniques have been integrated into spectrum‐sharing systems in an effort to yield higher spectral efficiency. Many investigations on such systems have assumed that the channel state information between the secondary transmitter and primary receiver used to calculate the maximum allowable transmit secondary user transmit power to limit the interference is known to be perfect. However, because of feedback delay from the primary receiver or the time‐varying properties of the channel, the channel information may be outdated, which is an important scenario to cognitive radio systems. In this paper, we investigate the impact of outdated channel state information for relay selection on the performance of partial relay selection with amplify and forward in underlay spectrum‐sharing systems. We begin by deriving a closed‐form expression for the outage probability of the secondary network in a Rayleigh fading channel along with peak received interference power constraint and maximum allowable secondary user transmit power. We also provide a closed‐form expression for the average bit‐error rate of the underlying system. Moreover, we present asymptotic expressions for both the outage probability and average bit‐error rate in the high signal‐to‐noise ratio regime that reveal practical insights on the achievable diversity gain. Finally, we confirm our results through comparisons with computer simulations. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

6.
Substantial spectrum gains have been demonstrated with the introduction of cognitive radio however; such gains are usually short lived due to the increased level of interference to licensed users of the spectrum. The interference management problem is herein tackled from the transmitter power control perspective so that transmissions by cognitive radio network does not violate the interference threshold levels at the primary users as well as maintain the QoS requirements of cognitive radio users. We model the cognitive radio network for mobile and immobile users and propose algorithms exploiting primary radio environment knowledge (spectrum use), called power control with primary protection via spectrum sensing. The algorithm is briefly introduced for time invariant systems and demonstrated that it has the ability to satisfy tight QoS constraints for cognitive radios as well as meet the interference constraints for licensed users. We, however, further show that such assumption of terminal immobility in the power control algorithm would fail in cases where user mobility is considered, resulting in increased levels of interference to the primary as well as increased outages in cognitive radio network. We model the link gain evolution process as a distance dependent shadow fading process and scale-up the target signal to interference ratio to cope with user mobility. Since mobility driven power control algorithms for cognitive radios have not been investigated before, we therefore, propose a mobility driven power control framework for cognitive radios based on spectrum sensing, which ensures that the interference limit at the primary receiver is unperturbed at all times, while concurrently maintaining the QoS within the cognitive radio network as compared to static user cases. We also corroborate our algorithms with proof of convergence.  相似文献   

7.

In this paper, we investigate the impact of diversity and antenna correlations on the secrecy capacity and outage performance of a cognitive radio multicast network over Nakagami-m fading channels analytically. The proposed network consists of single primary and secondary user, multiple primary and secondary receivers, and multiple eavesdroppers. It is assumed that each user is equipped with single antenna while all the primary and secondary receivers, and eavesdroppers are equipped with multiple antennas. The primary and secondary users transmit their common messages to the respective receivers in the presence of multiple eavesdroppers. A mathematical model is developed to ensure successful reception of confidential information to the primary receivers protecting the activities of eavesdroppers neglecting the effect of interference due to secondary user. In order to analyze the security of the proposed model, closed-form analytical expressions have been derived for the secrecy multicast capacity, the secure outage probability for multicasting and the probability of non-zero secrecy multicast capacity. Analytical results are justified via Monte-Carlo simulations.

  相似文献   

8.
王松青  许晓明  高瞻  杨炜伟  蔡跃明 《信号处理》2014,30(11):1267-1274
协同中继传输不仅能改善认知用户的传输可靠性,而且也能增强认知用户物理层安全性。针对Underlay模式下多中继协同频谱共享认知无线网络,本文设计了基于选择译码转发和分布式迫零波束成形(SDF-DZFB)的物理层安全传输方案,其中,假设存在单个被动窃听节点窃听中继节点的发送信号,在认知用户发送端同时考虑峰值干扰温度约束和最大发射功率约束,中继和认知用户目的端都受到主用户干扰。在此情况下,分析了认知用户发送端分别到目的端(称为主链路)和到窃听节点(称为窃听链路)的等效信干噪比的统计特性,进而推导出系统安全中断概率性能的闭式表达式。为了揭示所提物理层安全传输方案的安全分集度性能,本文进一步分析了高信噪比条件下安全中断概率的渐近表达式。计算机仿真验证了本文的理论分析结果。   相似文献   

9.
We propose decentralized cognitive MAC protocols that allow secondary users to independently search for spectrum opportunities without a central coordinator or a dedicated communication channel. Recognizing hardware and energy constraints, we assume that a secondary user may not be able to perform full-spectrum sensing or may not be willing to monitor the spectrum when it has no data to transmit. We develop an analytical framework for opportunistic spectrum access based on the theory of partially observable Markov decision process (POMDP). This decision-theoretic approach integrates the design of spectrum access protocols at the MAC layer with spectrum sensing at the physical layer and traffic statistics determined by the application layer of the primary network. It also allows easy incorporation of spectrum sensing error and constraint on the probability of colliding with the primary users. Under this POMDP framework, we propose cognitive MAC protocols that optimize the performance of secondary users while limiting the interference perceived by primary users. A suboptimal strategy with reduced complexity yet comparable performance is developed. Without additional control message exchange between the secondary transmitter and receiver, the proposed decentralized protocols ensure synchronous hopping in the spectrum between the transmitter and the receiver in the presence of collisions and spectrum sensing errors  相似文献   

10.
This paper considers a cognitive radio network where a secondary user (SU) coexists with a primary user (PU). The interference outage constraint is applied to protect the primary transmission. The power allocation problem to jointly maximize the ergodic capacity and minimize the outage probability of the SU, subject to the average transmit power constraint and the interference outage constraint, is studied. Suppose that the perfect knowledge of the instantaneous channel state information (CSI) of the interference link between the SU transmitter and the PU receiver is available at the SU, the optimal power allocation strategy is then proposed. Additionally, to manage more practical situations, we further assume only the interference link channel distribution is known and derive the corresponding optimal power allocation strategy. Extensive simulation results are given to verify the effectiveness of the proposed strategies. It is shown that the proposed strategies achieve high ergodic capacity and low outage probability simultaneously, whereas optimizing the ergodic capacity (or outage probability) only leads to much higher outage probability (or lower ergodic capacity). It is also shown that the SU performance is not degraded due to partial knowledge of the interference link CSI if tight transmit power constraint is applied.  相似文献   

11.
In this paper, considering the interferences from primary transmitter to secondary receiver and from secondary transmitter to primary receiver, we derive the upper and lower bounds of outage probability for underlay cognitive opportunistic multi-relay networks. Theoretical and simulation results show the upper and lower bounds converge to the exact outage probability at high interference-to-noise (INR) region. Because the interference from primary transmitter to secondary receiver is considered, an outage floor at high signal-to-noise ratio (SNR) occurs when INR increases proportionally with SNR.  相似文献   

12.
This paper evaluates the outage performance of cognitive relay networks with mutual interference between secondary users and primary users under the underlay approach, while adhering to the interference constraint on the primary user. A network path selection criterion, suitable for cognitive relay networks, is provided, from which we derive the outage probability expression of cognitive relay networks. It is shown that the outage probability considering the interference to secondary user from primary user is higher than that without considering the interference to secondary user from primary user. In addition, the outage probability is affected by key network parameters. We analyze network path selection method based on outage probability and prove that the interference to secondary user from primary user has a significant effect on the network path selection and can not be ignored in practical wireless communication environments. Simulation investigation is also provided and used to verify the theoretical analysis.  相似文献   

13.
In this paper, we analyze the tradeoff between outage probability (OP) and intercept probability (IP) for a multi‐hop relaying scheme in cognitive radio (CR) networks. In the proposed protocol, a multi‐antenna primary transmitter (PT) communicates with a multi‐antenna primary receiver (PR), using transmit antenna selection (TAS) / selection combining (SC) technique, while a secondary source attempts to transmit its data to a secondary destination via a multi‐hop approach in presence of a secondary eavesdropper. The secondary transmitters such as source and relays have to adjust their transmit power to satisfy total interference constraint given by PR. We consider an asymmetric fading channel model, where the secondary channels are Rician fading, while the remaining ones experience the Rayleigh fading. Moreover, an optimal interference allocation method is proposed to minimize OP of the primary network. For the secondary network, we derive exact expressions of end‐to‐end OP and IP which are verified by Monte Carlo simulations.  相似文献   

14.
In this paper, we propose secondary relaying schemes in cognitive spectrum leasing. In the proposed protocols, a primary transmitter uses rateless code to transmit its data to a primary receiver. In the secondary network, \(M\) secondary transmitters are ready to help the primary transmitter forward the data to a primary receiver so that they can find opportunities to transmit their data. For performance evaluation, we derive the average outage probability, the average number of encoded packets transmitted by the primary transmitter, the average number of remaining time slots for secondary network and the average capacity of the secondary network over Rayleigh fading channels. Various Monte-Carlo simulations are presented to verify the derivations.  相似文献   

15.
In this paper, a novel beamforming method is proposed for a more realistic cognitive radio system with several secondary transmitters and receivers, a number of relays, and 1 primary transmitter and receiver. When the primary user link is idle, all secondary transmitters access temporal spectrum holes to simultaneously broadcast their information to the relays each associated with an infinite buffer. In the next stage, the relays transmit the information to the secondary receivers using a cooperative beamforming method no matter whether primary user link is silent or not. The proposed method of designing the beamforming vector enables the system to maximize the power received by the secondary users while maintaining the interference plus noise power at the primary user receiver below a predefined threshold. Results of simulations confirm validity of the method and improved performance compared to the zero‐forcing beamforming. The impact of channel quality between nodes on the performance of the system is also investigated.  相似文献   

16.
The communication efficiency of primary networks in cognitive radio depends on wireless environments, such as obstacles (e.g. buildings), distances between transmitter and receiver, and limited transmit power. A cooperative model between primary and secondary networks has the potential to overcome these problems. In this paper, we propose and analyze the performance of a decode-and-forward scheme with relay ordering for secondary spectrum access. In this scheme, a primary transmitter communicates with a primary receiver with the help of two secondary transmitters. Each secondary transmitter relays primary signals from the primary transmitter to primary receiver, and follows an optimal order to ensure the best communication capacity of the primary network and to find opportunities to transmit its own signals. The performance of primary and secondary networks is evaluated by theoretical analysis in terms of outage probability. Monte Carlo simulations are presented to verify the theoretical analysis and to compare the performance of the proposed protocol with that of a direct transmission protocol and a decode-and-forward protocol with a relay selection scheme.  相似文献   

17.
In this paper we have studied the subcarrier and optimal power allocation strategy for OFDM-based cognitive radio (CR) networks. Firstly, in order to protect the primary user communication from the interference of the cognitive user transmissions in fading wireless channels, we design an opportunistic power control scheme to maximize the cognitive user capacity without degrading primary user’s QoS. The mathematical optimization problem is formulated as maximizing the capacity of the secondary users under the interference constraint at the primary receiver and the Lagrange method is applied to obtain the optimal solution. Secondly, in order to limit the outage probability within primary user’s tolerable range we analyze the outage probability of the primary user with respect to the interference power of the secondary user for imperfect CSI. Finally, in order to get the better tradeoff between fairness and system capacity in cognitive radio networks, we proposed an optimal algorithm of jointing subcarrier and power allocation scheme among multiple secondary users in OFDM-based cognitive radio networks. Simulation results demonstrate that our scheme can improve the capacity performance and efficiently guarantee the fairness of secondary users.  相似文献   

18.
Using Multiple Input Multiple Output (MIMO) architecture in cognitive radio (CR) secondary users improves the system performance in terms of interference cancellation and data rate enhancement but at the expense of adding complexity and cost. A solution to reduce this complexity is employing radio frequency (RF) beamforming networks at the transmitter/receiver front-ends. In this paper, we consider a MIMO secondary user equipped with such RF beamforming network. Moreover, we find the transmit/receive optimum RF beamforming network for a MIMO spatial multiplexing system. We evaluate the performance of the optimally designed RF beamforming technique over a Rician channel via computer simulations. The simulation results are assessed for different RF beamforming structures and the number of primary transmitters which cause interference on the secondary receiver.  相似文献   

19.
In this study, we investigate the outage capacity of a cooperative relaying based cognitive radio network in slow fading channel. Our network scenario consists of a primary transmitter (PT) and primary receiver (PR) as well as a group of \(M\) secondary transmitter (ST)–receiver (SR) pairs. We grouped STs into active and inactive. Only one active ST may transmit data at a time in parallel with the PT satisfying a predefined interference threshold \(I_{th}\) to the PR. Due to fading/shadowing or interference caused by ST to the PR, primary user (PU) may fail to achieve its target rate \(R_{{\textit{PT}}}\) over a direct link. To overcome this, we can boost up primary capacity by using inactive STs as cooperative relay (Re) nodes for the PU. In addition, one of the inactive STs that achieves \(R_{{\textit{PT}}}\) will be act as a best decode-and-forward relay to forward the primary information. In this paper, a closed-form expression of the outage capacity is derived. Results show that outage capacity improves with increasing cooperative nodes as well as when the active ST is located farther away from the PR.  相似文献   

20.
The two main constraints on the transmit power allocation of the secondary service in a spectrum sharing scheme are the received interference threshold at the primary receiver, and the maximum transmit power of the secondary user. We obtain a critical system parameter which relates these two constraints and enables the system designer to eliminate the interference threshold constraint by adjusting the maximum transmit power of the secondary users. Eliminating the interference threshold constraint significantly reduces the system complexity by making the power allocation of the secondary service independent from the channel state information between the secondary transmitter and the primary receiver; thus removes the need for signaling between primary and secondary systems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号