Change search
Link to record
Permanent link

Direct link
BETA
Sibomana, Louis
Alternative names
Publications (10 of 23) Show all publications
Louis, S., Hans-Jürgen, Z., Hung, T. & Charles, K. (2017). A Framework for Packet Delay Analysis of Point-to-Multipoint Underlay Cognitive Radio Networks. IEEE Transactions on Mobile Computing, 16(9), 2408-2421
Open this publication in new window or tab >>A Framework for Packet Delay Analysis of Point-to-Multipoint Underlay Cognitive Radio Networks
2017 (English)In: IEEE Transactions on Mobile Computing, ISSN 1536-1233, E-ISSN 1558-0660, Vol. 16, no 9, p. 2408-2421Article in journal (Refereed) Published
Abstract [en]

This paper presents a queueing analytical framework for the performance evaluation of the secondary user (SU) packet transmission with service differentiation in a point-to-multipoint underlay cognitive radio network. The transmit power of the SU transmitter is subject to the joint outage constraint imposed by the primary user receivers (PU-Rxs) and the SU maximum transmit power limit. The analysis considers a queueing model for secondary traffic with multiple classes, and different types of arrival and service processes under a non-preemptive priority service discipline. The SU quality of service (QoS) is characterized by a packet timeout threshold and target bit error rate. Given these settings, analytical expressions of the packet timeout probability and average transmission time are derived for opportunistic and multicast scheduling. Moreover, expressions of the average packet waiting time in the queue and the total time in the system for each class of traffic are obtained. Numerical examples are provided to illustrate the secondary network performance with respect to various parameters such as number of PU-Rxs and SU receivers, SU packet arrival process, QoS requirements, and the impact of interference from the primary network to the secondary network.

Place, publisher, year, edition, pages
IEEE Computer Society, 2017
Keywords
Cognitive radio network; opportunistic and multicast scheduling; packet transmission time; arrival process; delay performance analysis
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-11736 (URN)10.1109/TMC.2016.2621760 (DOI)000407399100002 ()
Available from: 2016-03-16 Created: 2016-03-16 Last updated: 2017-09-29Bibliographically approved
Tran, H., Kaddoum, G., Gagnon, F. & Sibomana, L. (2017). Cognitive radio network with secrecy and interference constraints. Physical Communication, 22, 32-41
Open this publication in new window or tab >>Cognitive radio network with secrecy and interference constraints
2017 (English)In: Physical Communication, ISSN 1874-4907, Vol. 22, p. 32-41Article in journal (Refereed) Published
Abstract [en]

In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multiple antennas. In order to protect the PU communication from the interference of the SU and the risks of eavesdropping, the SU must have a reasonable adaptive transmission power which is set on the basis of channel state information, interference and security constraints of the PU. Accordingly, an upper bound and lower bound for the SU transmission power are derived. Furthermore, a power allocation policy, which is calculated on the convex combination of the upper and lower bound of the SU transmission power, is proposed. On this basis, we investigate the impact of the PU transmission power and channel mean gains on the security and system performance of the SU. Closed-form expressions for the outage probability, probability of non-zero secrecy capacity, and secrecy outage probability are obtained. Interestingly, our results show that the strong channel mean gain of the PU transmitter to the PU's eavesdropper in the primary network can enhance the SU performance.

Place, publisher, year, edition, pages
Elsevier, 2017
Keywords
Cognitive radio networks, Physical layer security, Power allocation, Security constraint, Channel capacity, Channel state information, Cognitive radio, Communication channels (information theory), Network layers, Outages, Probability, Radio, Radio systems, Secure communication, Cognitive radio network, Cognitive radio networks (CRNs), Interference constraints, Power allocations, Secrecy outage probabilities, Single input multiple outputs, Network security
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:bth-13793 (URN)10.1016/j.phycom.2016.12.001 (DOI)000395610400005 ()
Available from: 2017-01-20 Created: 2017-01-20 Last updated: 2018-01-13Bibliographically approved
Huu, T. P., Quach, T. X., Tran, H., Zepernick, H.-J. & Sibomana, L. (2017). On Proactive Attacks for Coping With Cooperative Attacks in Relay Networks. In: 2017 23RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC): BRIDGING THE METROPOLITAN AND THE REMOTE. Paper presented at 23rd Asia-Pacific Conference on Communications (APCC) - Bridging the Metropolitan and the Remote, DEC 11-13, 2017, Perth, AUSTRALIA (pp. 220-225).
Open this publication in new window or tab >>On Proactive Attacks for Coping With Cooperative Attacks in Relay Networks
Show others...
2017 (English)In: 2017 23RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC): BRIDGING THE METROPOLITAN AND THE REMOTE, 2017, p. 220-225Conference paper, Published paper (Refereed)
Abstract [en]

Cooperative communications in which relays assist the transmission of signals from source to destination offer extended radio coverage and improved link reliable. However, transmitting signals with the help of a relay network may also open additional avenues for eavesdropper to overhear confidential information. Further, as jammers and eavesdroppers may cooperate to attack the relay network, offering secure communications becomes a challenging problem. To cope and reduce the effect of such cooperative attacks, we propose a proactive attack scheme in which the legitimate users generate jamming signals in an attempt to counteract such hostile cooperative attacks. In order to assess the security performance of the proactive attack scheme compared to a non-protection scheme, an analytical expression of the secrecy outage probability is derived. Numerical results for different system settings are provided showing that the proactive attack scheme can indeed significantly improve the security performance of the considered relay networks.

Series
Asia-Pacific Conference on Communications, ISSN 2163-0771
Keywords
PHYSICAL-LAYER SECURITY; MIMO WIRETAP CHANNEL; WIRELESS NETWORKS; ARTIFICIAL-NOISE; SECRECY; TRANSMISSION; SELECTION
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-16758 (URN)000434794800039 ()978-1-7405-2390-5 (ISBN)
Conference
23rd Asia-Pacific Conference on Communications (APCC) - Bridging the Metropolitan and the Remote, DEC 11-13, 2017, Perth, AUSTRALIA
Available from: 2018-07-09 Created: 2018-07-09 Last updated: 2018-07-10Bibliographically approved
Sibomana, L. (2016). Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints. (Doctoral dissertation). Karlskrona: Blekinge Tekniska Högskola
Open this publication in new window or tab >>Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints
2016 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The cognitive radio network (CRN) concept has been proposed as a solution to the growing demand and underutilization of the radio spectrum. To improve the radio spectrum utilization, CRN technology allows the coexistence of licensed and unlicensed systems over the same spectrum. In an underlay spectrum sharing system, secondary users (SUs) transmit simultaneously with the primary users (PUs) in the same frequency band given that the interference caused by the SU to the PU remains below a tolerable interference limit. Besides the transmission power limitation, a secondary network is subject to distinct channel impairments such as fading and interference from the primary transmissions. Also, CRNs face new security threats and challenges due to their unique cognitive characteristics.This thesis analyzes the performance of underlay CRNs and underlay cognitive relay networks under spectrum sharing constraints and security constraints. Distinct SU transmit power policies are obtained considering various interference constraints such as PU outage constraint or PU peak interference power constraint.

The thesis is divided into an introduction and two research parts based on peer-reviewed publications. The introduction provides an overview of radio spectrum management, basic concepts of CRNs, and physical layer security. In the first research part, we study the performance of underlay CRNs with emphasis on a multiuser environment.In Part I-A, we consider a secondary network with delay-tolerant applications and analyze the ergodic capacity. Part I-B analyzes the secondary outage capacity which characterises the maximum data rate that can be achieved over a channel for a given outage probability. In Part I-C, we consider a secondary network with delay constrained applications, and derive expressions of the outage probability and delay-limited throughput. Part I-D presents a queueing model that provides an analytical tool to evaluate the secondary packet-level performance with multiple classes of traffic considering general interarrival and service time distributions. Analytical expressions of the SU average packet transmission time, waiting time in the queue, andtime spent in the system are provided.In the second research part, we analyze the physical layer security for underlay CRNs and underlay cognitive relay networks. Analytical expressions of the probability of non-zero secrecy capacity and secrecy outage probability are derived.Part II-A considers a single hop underlay CRN in the presence of multiple eavesdroppers (EAVs) and multiple SU-Rxs. In Part II-B, an underlay cognitive relay network in the presence of multiple secondary relays and multiple EAVs is studied.Numerical examples illustrate that it is possible to exploit the physical layer characteristics to achieve both security and quality of service in CRNs while satisfying spectrum sharing constraints.

Place, publisher, year, edition, pages
Karlskrona: Blekinge Tekniska Högskola, 2016
Series
Blekinge Institute of Technology Doctoral Dissertation Series, ISSN 1653-2090 ; 3
Keywords
Underlay cognitive radio networks, spectrum sharing constraints, physical layer security
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-11739 (URN)978-91-7295-324-6 (ISBN)
Public defence
2016-05-12, J1650, Campus Gräsvik, Karlskrona, 10:15 (English)
Opponent
Supervisors
Available from: 2016-03-17 Created: 2016-03-16 Last updated: 2016-08-09Bibliographically approved
Tran, H., Zepernick, H.-J. & Sibomana, L. (2016). Performance of cognitive radio networks under interference constraints of multiple primary users. In: 2016, 10th International Conference on Signal Processing and Communication Systems, ICSPCS 2016 - Proceedings: . Paper presented at 10th International Conference on Signal Processing and Communication Systems, (ICSPCS), Surfers Paradise, Australia. IEEE
Open this publication in new window or tab >>Performance of cognitive radio networks under interference constraints of multiple primary users
2016 (English)In: 2016, 10th International Conference on Signal Processing and Communication Systems, ICSPCS 2016 - Proceedings, IEEE, 2016Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we study the performance of point-to-point communication in spectrum sharing systems under the peak interference power constraint of multiple primary users. In particular, we assume that the channels undergo independent but not necessarily identically distributed Nakagami-m fading with integer values of fading severity parameter m. The cumulative distribution function and probability density function for the signal-to-noise ratio are derived. Based on these formulas, we obtain analytical expressions for the outage probability, the ergodic capacity, and the symbol error probability. Numerical results are also provided to investigate the impact of the peak interference power-to-noise ratio, the number of primary users, and fading parameters on the performance of the secondary network. © 2016 IEEE.

Place, publisher, year, edition, pages
IEEE, 2016
Keywords
Cognitive radio, Distribution functions, Fading (radio), Probability, Probability distributions, Signal processing, Signal to noise ratio, Analytical expressions, Cognitive radio network, Cumulative distribution function, Interference constraints, Interference power constraints, Point-to-point communication, Spectrum sharing systems, Symbol error probabilities (SEP), Probability density function
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-14064 (URN)10.1109/ICSPCS.2016.7843365 (DOI)000399233100067 ()2-s2.0-85015236692 (Scopus ID)9781509009411 (ISBN)
Conference
10th International Conference on Signal Processing and Communication Systems, (ICSPCS), Surfers Paradise, Australia
Available from: 2017-03-30 Created: 2017-03-30 Last updated: 2017-05-22Bibliographically approved
Sibomana, L., Tran, H. & Tran, Q. A. (2015). Impact of secondary user communication on security communication of primary user. Security and Communication Networks, 8(18), 4177-4190
Open this publication in new window or tab >>Impact of secondary user communication on security communication of primary user
2015 (English)In: Security and Communication Networks, ISSN 1939-0114, E-ISSN 1939-0122, Vol. 8, no 18, p. 4177-4190Article in journal (Refereed) Published
Abstract [en]

Cognitive radio network concept has been considered as a promising solution to improve the spectrum utilization. However, it may be vulnerable to security problems as the primary user (PU) and secondary user (SU) access the same resource. In this paper, we consider a system model where an eavesdropper (EAV) illegally listens to the PU communication in the presence of a SU transmitter (SU-Tx) communicating with a SU receiver (SU-Rx). The SU-Tx transmit power is subject to the peak transmit power constraint of the SU and outage probability constraint of the PU. Given this context, the effect of the interference from the SU-Tx to the EAV on the primary system security is investigated. In particular, analytical expressions of the probability of existence of non-zero secrecy capacity and secrecy outage probability of the PU are derived. Moreover, the performance analysis of the secondary network is examined where closed-form expressions of the symbol error probability and achievable rate are presented. Numerical examples are provided to evaluate the impact of the primary system parameters and channel conditions among users on the system performance of secondary and primary networks. Interestingly, our results reveal a fact that the security of the primary network strongly depends on the channel condition of the SU-Tx to the EAV link and the transmit power policy of the SU-Tx. Copyright (C) 2015 John Wiley & Sons, Ltd.

Place, publisher, year, edition, pages
Wiley-Blackwell, 2015
Keywords
cognitive radio network, symbol error probability, secrecy capacity, secrecy outage probability, achievable rate
National Category
Communication Systems Computer Systems
Identifiers
urn:nbn:se:bth-11668 (URN)10.1002/sec.1333 (DOI)000367922500069 ()
Available from: 2016-03-02 Created: 2016-02-29 Last updated: 2017-05-22Bibliographically approved
Sibomana, L., Tran, H. & Zepernick, H.-J. (2015). On Physical Layer Security for Cognitive Radio Networks with Primary User Interference. In: : . Paper presented at IEEE Military Communications Conference, (MILCOM), Tampa, Florida (pp. 281-286). IEEE
Open this publication in new window or tab >>On Physical Layer Security for Cognitive Radio Networks with Primary User Interference
2015 (English)Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we investigate the secondary network physical layer security under the outage constraint of the primary user (PU) receiver and interference from the PU transmitter to the secondary network. In particular, a secondary user (SU) transmitter sends confidential messages to trusted multiple SU receivers (SU-Rxs) in the presence of multiple eavesdroppers (EAVs). Further, we exploit multiuser diversity where the SU-Rx with best channel condition is scheduled for transmission. Then, analytical expressions of the probability of existence of non-zero secrecy capacity and secrecy outage probability are obtained. Analytical and simulation results are provided to evaluate the effect of the number of SU-Rxs and number of EAVs on the secondary system. Interestingly, the numerical results show that the interference from the primary network to the secondary network is an important parameter to improve the secondary network security.

Place, publisher, year, edition, pages
IEEE, 2015
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-11734 (URN)10.1109/MILCOM.2015.7357456 (DOI)000371395200048 ()
Conference
IEEE Military Communications Conference, (MILCOM), Tampa, Florida
Available from: 2016-03-16 Created: 2016-03-16 Last updated: 2017-05-22Bibliographically approved
Louis, S., Hans-Jürgen, Z. & Hung, T. (2015). On the Outage Capacity of an Underlay Cognitive Radio Network. In: 2015 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS): . Paper presented at 9th International Conference on Signal Processing and Communication Systems (ICSPCS), Cairns, Australia (pp. 1-7). IEEE Press
Open this publication in new window or tab >>On the Outage Capacity of an Underlay Cognitive Radio Network
2015 (English)In: 2015 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), IEEE Press, 2015, p. 1-7-Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we consider a point-to-multipoint underlay cognitive radio network under the joint constraint of the primary user peak interference power and maximum transmit power limit of the secondary user (SU). Analytical expressions for the secondary outage capacity are obtained based on exact as well as approximate expressions of the first and second moments of the channel capacity. Numerical results are provided to assess the effect of the number of SU receivers and a given SU outage probability. We also evaluate the impact of the primary network parameters on the secondary network performance.

Place, publisher, year, edition, pages
IEEE Press, 2015
Keywords
MULTIUSER DIVERSITY; SYSTEMS
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-11733 (URN)10.1109/ICSPCS.2015.7391726 (DOI)000380405700007 ()
Conference
9th International Conference on Signal Processing and Communication Systems (ICSPCS), Cairns, Australia
Available from: 2016-03-16 Created: 2016-03-16 Last updated: 2018-01-17Bibliographically approved
Tran, H., Zepernick, H.-J., Phan, H. & Sibomana, L. (2015). Performance Analysis of a Cognitive Radio Network with a Buffered Relay. IEEE Transactions on Vehicular Technology, 64(2), 566-579
Open this publication in new window or tab >>Performance Analysis of a Cognitive Radio Network with a Buffered Relay
2015 (English)In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 64, no 2, p. 566-579Article in journal (Refereed) Published
Abstract [en]

In this paper, we analyze the packet transmission time in a cognitive cooperative radio network (CCRN) where a secondary transmitter (SU-Tx) sends packets to a secondary receiver (SU-Rx) through the help of a secondary relay (SR). In particular, we assume that the SU-Tx and SR are subject to the joint constraint of the timeout probability of the primary user (PU) and the peak transmit powers of the secondary users. On this basis, we investigate the impact of the transmit power of the PUs and channel mean powers on the packet transmission time of the CCRN. Utilizing the concept of timeout, adaptive transmit power allocation policies for the SU-Tx and SR are considered. More importantly, analytical expressions for the endto- end throughput, end-to-end packet transmission time, and stable condition for the SR operation are obtained. Our results indicate that the second hop of the considered CCRN is not a bottleneck if the channel mean powers of the interference links of the networks are small and the SR peak transmit power is set to a high value.

Place, publisher, year, edition, pages
IEEE, 2015
Keywords
Cognitive Radio Network, Relaying, Performance
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-6394 (URN)10.1109/TVT.2014.2323338 (DOI)000349715000013 ()oai:bth.se:forskinfo19F1B49E3EE73AA9C1257CD80024F8EA (Local ID)oai:bth.se:forskinfo19F1B49E3EE73AA9C1257CD80024F8EA (Archive number)oai:bth.se:forskinfo19F1B49E3EE73AA9C1257CD80024F8EA (OAI)
Available from: 2015-03-20 Created: 2014-05-14 Last updated: 2017-05-22Bibliographically approved
Louis, S. & Hans-Jürgen, Z. (2015). Performance Analysis of Opportunistic Scheduling with HARQ for Cognitive Radio Networks. In: IEEE Wireless Communications and Networking Conference: . Paper presented at IEEE Wireless Communications and Networking Conference (WCNC), New Orleans (pp. 411-416). New Orleans, USA: IEEE Computer Society
Open this publication in new window or tab >>Performance Analysis of Opportunistic Scheduling with HARQ for Cognitive Radio Networks
2015 (English)In: IEEE Wireless Communications and Networking Conference, New Orleans, USA: IEEE Computer Society, 2015, p. 411-416-Conference paper, Published paper (Refereed)
Abstract [en]

This paper analyzes the secondary network performance under the joint constraint of the primary user (PU) peak interference power and maximum transmit power limit of the secondary user (SU). In particular, N SU transmitters (SU-Txs) communicate with an SU receiver in the presence of a primary network with a PU transmitter and multiple PU receivers. Moreover, we exploit opportunistic scheduling where the SU-Tx with the best channel condition is scheduled for transmission. Analytical expressions of the outage probability and symbol error probability of the SU are obtained considering either perfect or statistical knowledge of the PU channel gains. Furthermore, we analyze the SU throughput for delay constrained applications with two hybrid automatic repeat request protocols, namely, repetition time diversity and incremental redundancy. Numerical results are provided to assess the effect of the number of SU-Txs and number of packet retransmissions on the secondary network performance. In addition, the impact of the primary network parameters on the secondary network is investigated.

Place, publisher, year, edition, pages
New Orleans, USA: IEEE Computer Society, 2015
Series
IEEE Wireless Communications and Networking Conference, ISSN 1525-3511
Keywords
MULTIUSER DIVERSITY; CELLULAR NETWORKS; POWER ALLOCATION; FADING CHANNELS; THROUGHPUT; SELECTION; SYSTEMS
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-11738 (URN)10.1109/WCNC.2015.7127505 (DOI)000380909600071 ()978-1-4799-8406-0 (ISBN)
Conference
IEEE Wireless Communications and Networking Conference (WCNC), New Orleans
Available from: 2016-03-16 Created: 2016-03-16 Last updated: 2017-05-22Bibliographically approved
Organisations

Search in DiVA

Show all publications