Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
2016 (engelsk)Doktoravhandling, med artikler (Annet vitenskapelig)
Abstract [en]

The cognitive radio network (CRN) concept has been proposed as a solution to the growing demand and underutilization of the radio spectrum. To improve the radio spectrum utilization, CRN technology allows the coexistence of licensed and unlicensed systems over the same spectrum. In an underlay spectrum sharing system, secondary users (SUs) transmit simultaneously with the primary users (PUs) in the same frequency band given that the interference caused by the SU to the PU remains below a tolerable interference limit. Besides the transmission power limitation, a secondary network is subject to distinct channel impairments such as fading and interference from the primary transmissions. Also, CRNs face new security threats and challenges due to their unique cognitive characteristics.This thesis analyzes the performance of underlay CRNs and underlay cognitive relay networks under spectrum sharing constraints and security constraints. Distinct SU transmit power policies are obtained considering various interference constraints such as PU outage constraint or PU peak interference power constraint.

The thesis is divided into an introduction and two research parts based on peer-reviewed publications. The introduction provides an overview of radio spectrum management, basic concepts of CRNs, and physical layer security. In the first research part, we study the performance of underlay CRNs with emphasis on a multiuser environment.In Part I-A, we consider a secondary network with delay-tolerant applications and analyze the ergodic capacity. Part I-B analyzes the secondary outage capacity which characterises the maximum data rate that can be achieved over a channel for a given outage probability. In Part I-C, we consider a secondary network with delay constrained applications, and derive expressions of the outage probability and delay-limited throughput. Part I-D presents a queueing model that provides an analytical tool to evaluate the secondary packet-level performance with multiple classes of traffic considering general interarrival and service time distributions. Analytical expressions of the SU average packet transmission time, waiting time in the queue, andtime spent in the system are provided.In the second research part, we analyze the physical layer security for underlay CRNs and underlay cognitive relay networks. Analytical expressions of the probability of non-zero secrecy capacity and secrecy outage probability are derived.Part II-A considers a single hop underlay CRN in the presence of multiple eavesdroppers (EAVs) and multiple SU-Rxs. In Part II-B, an underlay cognitive relay network in the presence of multiple secondary relays and multiple EAVs is studied.Numerical examples illustrate that it is possible to exploit the physical layer characteristics to achieve both security and quality of service in CRNs while satisfying spectrum sharing constraints.

sted, utgiver, år, opplag, sider
Karlskrona: Blekinge Tekniska Högskola, 2016.
Serie
Blekinge Institute of Technology Doctoral Dissertation Series, ISSN 1653-2090 ; 3
Emneord [en]
Underlay cognitive radio networks, spectrum sharing constraints, physical layer security
HSV kategori
Identifikatorer
URN: urn:nbn:se:bth-11739ISBN: 978-91-7295-324-6 (tryckt)OAI: oai:DiVA.org:bth-11739DiVA, id: diva2:912492
Disputas
2016-05-12, J1650, Campus Gräsvik, Karlskrona, 10:15 (engelsk)
Opponent
Veileder
Tilgjengelig fra: 2016-03-17 Laget: 2016-03-16 Sist oppdatert: 2016-08-09bibliografisk kontrollert
Delarbeid
1. Ergodic Capacity of Multiuser Scheduling in Cognitive Radio Networks: Analysis and Comparison
Åpne denne publikasjonen i ny fane eller vindu >>Ergodic Capacity of Multiuser Scheduling in Cognitive Radio Networks: Analysis and Comparison
(engelsk)Artikkel i tidsskrift (Fagfellevurdert) Submitted
HSV kategori
Identifikatorer
urn:nbn:se:bth-11735 (URN)
Tilgjengelig fra: 2016-03-16 Laget: 2016-03-16 Sist oppdatert: 2017-05-22bibliografisk kontrollert
2. On the Outage Capacity of an Underlay Cognitive Radio Network
Åpne denne publikasjonen i ny fane eller vindu >>On the Outage Capacity of an Underlay Cognitive Radio Network
2015 (engelsk)Inngår i: 2015 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), IEEE Press, 2015, s. 1-7-Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

In this paper, we consider a point-to-multipoint underlay cognitive radio network under the joint constraint of the primary user peak interference power and maximum transmit power limit of the secondary user (SU). Analytical expressions for the secondary outage capacity are obtained based on exact as well as approximate expressions of the first and second moments of the channel capacity. Numerical results are provided to assess the effect of the number of SU receivers and a given SU outage probability. We also evaluate the impact of the primary network parameters on the secondary network performance.

sted, utgiver, år, opplag, sider
IEEE Press, 2015
Emneord
MULTIUSER DIVERSITY; SYSTEMS
HSV kategori
Identifikatorer
urn:nbn:se:bth-11733 (URN)10.1109/ICSPCS.2015.7391726 (DOI)000380405700007 ()
Konferanse
9th International Conference on Signal Processing and Communication Systems (ICSPCS), Cairns, Australia
Tilgjengelig fra: 2016-03-16 Laget: 2016-03-16 Sist oppdatert: 2018-01-17bibliografisk kontrollert
3. Performance Analysis of Opportunistic Scheduling with HARQ for Cognitive Radio Networks
Åpne denne publikasjonen i ny fane eller vindu >>Performance Analysis of Opportunistic Scheduling with HARQ for Cognitive Radio Networks
2015 (engelsk)Inngår i: IEEE Wireless Communications and Networking Conference, New Orleans, USA: IEEE Computer Society, 2015, s. 411-416-Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

This paper analyzes the secondary network performance under the joint constraint of the primary user (PU) peak interference power and maximum transmit power limit of the secondary user (SU). In particular, N SU transmitters (SU-Txs) communicate with an SU receiver in the presence of a primary network with a PU transmitter and multiple PU receivers. Moreover, we exploit opportunistic scheduling where the SU-Tx with the best channel condition is scheduled for transmission. Analytical expressions of the outage probability and symbol error probability of the SU are obtained considering either perfect or statistical knowledge of the PU channel gains. Furthermore, we analyze the SU throughput for delay constrained applications with two hybrid automatic repeat request protocols, namely, repetition time diversity and incremental redundancy. Numerical results are provided to assess the effect of the number of SU-Txs and number of packet retransmissions on the secondary network performance. In addition, the impact of the primary network parameters on the secondary network is investigated.

sted, utgiver, år, opplag, sider
New Orleans, USA: IEEE Computer Society, 2015
Serie
IEEE Wireless Communications and Networking Conference, ISSN 1525-3511
Emneord
MULTIUSER DIVERSITY; CELLULAR NETWORKS; POWER ALLOCATION; FADING CHANNELS; THROUGHPUT; SELECTION; SYSTEMS
HSV kategori
Identifikatorer
urn:nbn:se:bth-11738 (URN)10.1109/WCNC.2015.7127505 (DOI)000380909600071 ()978-1-4799-8406-0 (ISBN)
Konferanse
IEEE Wireless Communications and Networking Conference (WCNC), New Orleans
Tilgjengelig fra: 2016-03-16 Laget: 2016-03-16 Sist oppdatert: 2017-05-22bibliografisk kontrollert
4. A Framework for Packet Delay Analysis of Point-to-Multipoint Underlay Cognitive Radio Networks
Åpne denne publikasjonen i ny fane eller vindu >>A Framework for Packet Delay Analysis of Point-to-Multipoint Underlay Cognitive Radio Networks
2017 (engelsk)Inngår i: IEEE Transactions on Mobile Computing, ISSN 1536-1233, E-ISSN 1558-0660, Vol. 16, nr 9, s. 2408-2421Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

This paper presents a queueing analytical framework for the performance evaluation of the secondary user (SU) packet transmission with service differentiation in a point-to-multipoint underlay cognitive radio network. The transmit power of the SU transmitter is subject to the joint outage constraint imposed by the primary user receivers (PU-Rxs) and the SU maximum transmit power limit. The analysis considers a queueing model for secondary traffic with multiple classes, and different types of arrival and service processes under a non-preemptive priority service discipline. The SU quality of service (QoS) is characterized by a packet timeout threshold and target bit error rate. Given these settings, analytical expressions of the packet timeout probability and average transmission time are derived for opportunistic and multicast scheduling. Moreover, expressions of the average packet waiting time in the queue and the total time in the system for each class of traffic are obtained. Numerical examples are provided to illustrate the secondary network performance with respect to various parameters such as number of PU-Rxs and SU receivers, SU packet arrival process, QoS requirements, and the impact of interference from the primary network to the secondary network.

sted, utgiver, år, opplag, sider
IEEE Computer Society, 2017
Emneord
Cognitive radio network; opportunistic and multicast scheduling; packet transmission time; arrival process; delay performance analysis
HSV kategori
Identifikatorer
urn:nbn:se:bth-11736 (URN)10.1109/TMC.2016.2621760 (DOI)000407399100002 ()
Tilgjengelig fra: 2016-03-16 Laget: 2016-03-16 Sist oppdatert: 2017-09-29bibliografisk kontrollert
5. On Physical Layer Security for Reactive DF Cognitive Relay Networks
Åpne denne publikasjonen i ny fane eller vindu >>On Physical Layer Security for Reactive DF Cognitive Relay Networks
2014 (engelsk)Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

This paper analyzes the physical layer security for cognitive relay networks under the peak interference power constraint of the primary user receiver. In particular, a secondary user (SU) transmitter communicates with an SU receiver through the help of multiple secondary relays (SRs) using a decode-and- forward (DF) protocol. There exist multiple eavesdroppers (EAVs) who illegally listen to the secondary network communication. We consider a reactive DF scheme, and only the SRs that satisfy a decoding threshold participate in the relay selection. Analytical expressions of the probability of existence of secrecy capacity and secrecy outage probability are obtained. Numerical results are provided to evaluate the impact of the number of SRs, number of EAVs and channel mean powers on the secondary system security. We also investigate the effect of the interference from the primary network to the secondary network performance. Moreover, the performance of proactive DF is analyzed for the purpose of comparison.

sted, utgiver, år, opplag, sider
Austin, USA: IEEE, 2014
Emneord
Physical Layer Security, Reactive Decode-and-forwardm, Cognitive Relay Networks
HSV kategori
Identifikatorer
urn:nbn:se:bth-6561 (URN)000381558700216 ()oai:bth.se:forskinfoD600175EFB472F3DC1257D91003908B3 (Lokal ID)oai:bth.se:forskinfoD600175EFB472F3DC1257D91003908B3 (Arkivnummer)oai:bth.se:forskinfoD600175EFB472F3DC1257D91003908B3 (OAI)
Konferanse
IEEE Global Communications Conference
Tilgjengelig fra: 2014-11-17 Laget: 2014-11-15 Sist oppdatert: 2018-01-16bibliografisk kontrollert
6. On Physical Layer Security for Cognitive Radio Networks with Primary User Interference
Åpne denne publikasjonen i ny fane eller vindu >>On Physical Layer Security for Cognitive Radio Networks with Primary User Interference
2015 (engelsk)Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

In this paper, we investigate the secondary network physical layer security under the outage constraint of the primary user (PU) receiver and interference from the PU transmitter to the secondary network. In particular, a secondary user (SU) transmitter sends confidential messages to trusted multiple SU receivers (SU-Rxs) in the presence of multiple eavesdroppers (EAVs). Further, we exploit multiuser diversity where the SU-Rx with best channel condition is scheduled for transmission. Then, analytical expressions of the probability of existence of non-zero secrecy capacity and secrecy outage probability are obtained. Analytical and simulation results are provided to evaluate the effect of the number of SU-Rxs and number of EAVs on the secondary system. Interestingly, the numerical results show that the interference from the primary network to the secondary network is an important parameter to improve the secondary network security.

sted, utgiver, år, opplag, sider
IEEE, 2015
HSV kategori
Identifikatorer
urn:nbn:se:bth-11734 (URN)10.1109/MILCOM.2015.7357456 (DOI)000371395200048 ()
Konferanse
IEEE Military Communications Conference, (MILCOM), Tampa, Florida
Tilgjengelig fra: 2016-03-16 Laget: 2016-03-16 Sist oppdatert: 2017-05-22bibliografisk kontrollert

Open Access i DiVA

fulltext(2440 kB)887 nedlastinger
Filinformasjon
Fil FULLTEXT02.pdfFilstørrelse 2440 kBChecksum SHA-512
ee60e6d1159f7df30c151cdbe74a29abf245aaaa670e3745621b570b50bae6991f769c4dc8043a0920cb4a4c3f5eda5b0cc81e01b5d0160f227afee14af42a90
Type fulltextMimetype application/pdf

Personposter BETA

Sibomana, Louis

Søk i DiVA

Av forfatter/redaktør
Sibomana, Louis
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar
Totalt: 1089 nedlastinger
Antall nedlastinger er summen av alle nedlastinger av alle fulltekster. Det kan for eksempel være tidligere versjoner som er ikke lenger tilgjengelige

isbn
urn-nbn

Altmetric

isbn
urn-nbn
Totalt: 1142 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf