Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Ergodic Capacity of Multiuser Scheduling in Cognitive Radio Networks: Analysis and Comparison
College of Science and Technology, RWA.
Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.ORCID iD: 0000-0003-3604-2766
2016 (English)In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 16, no 16, p. 2759-2774Article in journal (Refereed) Published
Abstract [en]

This paper analyzes the ergodic capacity of secondary point-to-multipoint communications under the outage constraint of multiple primary user receivers (PU-Rxs) and the secondary user (SU) maximum transmit power limit. We first derive analytical expressions of the ergodic capacity for three scheduling schemes, that is, round robin, Max-signal-to-interference-plus-noise-ratio (Max-SINR) and Min-SINR, and compare their performance. Numerical examples show that when the number of SU receivers (SU-Rxs) increases in the presence of a single PU-Rx and at high SINR, the Min-SINR outperforms the Max-SINR scheme. As the number of PU-Rxs increases, the Max-SINR performs better than the Min-SINR scheduling. When the number of SU-Rxs becomes large, the system capacity is enhanced but so is the feedback load. To exploit the Max-SINR transmission while reducing the feedback load, we assume a threshold based on the channel quality where the SU-Rxs with the instantaneous SINR above the threshold participate in the Max-SINR scheduling; otherwise, an SU-Rx is selected randomly. Then, an analytical expression of the average capacity is derived. Numerical results illustrate that the capacity with limited feedback is approximately the same as for the case of Max-SINR with full feedback when the SU threshold for feedback condition is set to low and medium values.

Place, publisher, year, edition, pages
Wiley-Blackwell, 2016. Vol. 16, no 16, p. 2759-2774
Keywords [en]
Channel capacity; Routers; Scheduling; Signal interference; Signal to noise ratio; Spurious signal noise, Analytical expressions; Cognitive radio network; Ergodic capacity; Multiuser scheduling; Point-to-multipoint communication; Scheduling schemes; Signal to interference plus noise ratio; Underlay cognitive radios, Cognitive radio
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:bth-11735DOI: 10.1002/wcm.2722ISI: 000389367700024Scopus ID: 2-s2.0-84987668024OAI: oai:DiVA.org:bth-11735DiVA, id: diva2:912457
Note

open access

Available from: 2016-03-16 Created: 2016-03-16 Last updated: 2022-11-23Bibliographically approved
In thesis
1. Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints
Open this publication in new window or tab >>Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints
2016 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The cognitive radio network (CRN) concept has been proposed as a solution to the growing demand and underutilization of the radio spectrum. To improve the radio spectrum utilization, CRN technology allows the coexistence of licensed and unlicensed systems over the same spectrum. In an underlay spectrum sharing system, secondary users (SUs) transmit simultaneously with the primary users (PUs) in the same frequency band given that the interference caused by the SU to the PU remains below a tolerable interference limit. Besides the transmission power limitation, a secondary network is subject to distinct channel impairments such as fading and interference from the primary transmissions. Also, CRNs face new security threats and challenges due to their unique cognitive characteristics.This thesis analyzes the performance of underlay CRNs and underlay cognitive relay networks under spectrum sharing constraints and security constraints. Distinct SU transmit power policies are obtained considering various interference constraints such as PU outage constraint or PU peak interference power constraint.

The thesis is divided into an introduction and two research parts based on peer-reviewed publications. The introduction provides an overview of radio spectrum management, basic concepts of CRNs, and physical layer security. In the first research part, we study the performance of underlay CRNs with emphasis on a multiuser environment.In Part I-A, we consider a secondary network with delay-tolerant applications and analyze the ergodic capacity. Part I-B analyzes the secondary outage capacity which characterises the maximum data rate that can be achieved over a channel for a given outage probability. In Part I-C, we consider a secondary network with delay constrained applications, and derive expressions of the outage probability and delay-limited throughput. Part I-D presents a queueing model that provides an analytical tool to evaluate the secondary packet-level performance with multiple classes of traffic considering general interarrival and service time distributions. Analytical expressions of the SU average packet transmission time, waiting time in the queue, andtime spent in the system are provided.In the second research part, we analyze the physical layer security for underlay CRNs and underlay cognitive relay networks. Analytical expressions of the probability of non-zero secrecy capacity and secrecy outage probability are derived.Part II-A considers a single hop underlay CRN in the presence of multiple eavesdroppers (EAVs) and multiple SU-Rxs. In Part II-B, an underlay cognitive relay network in the presence of multiple secondary relays and multiple EAVs is studied.Numerical examples illustrate that it is possible to exploit the physical layer characteristics to achieve both security and quality of service in CRNs while satisfying spectrum sharing constraints.

Place, publisher, year, edition, pages
Karlskrona: Blekinge Tekniska Högskola, 2016
Series
Blekinge Institute of Technology Doctoral Dissertation Series, ISSN 1653-2090 ; 3
Keywords
Underlay cognitive radio networks, spectrum sharing constraints, physical layer security
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-11739 (URN)978-91-7295-324-6 (ISBN)
Public defence
2016-05-12, J1650, Campus Gräsvik, Karlskrona, 10:15 (English)
Opponent
Supervisors
Available from: 2016-03-17 Created: 2016-03-16 Last updated: 2016-08-09Bibliographically approved

Open Access in DiVA

fulltext(1663 kB)25 downloads
File information
File name FULLTEXT01.pdfFile size 1663 kBChecksum SHA-512
d41dbb0d6bb59fd242fa0df30c54750581b0abe1eff3ec2c390bb9072f9154a565d7d80a783269c8ec401655212440015ddfcb2b4c09648056b5d4d6074c66d4
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Louis, SibomanaHans-Jürgen, Zepernick

Search in DiVA

By author/editor
Louis, SibomanaHans-Jürgen, Zepernick
By organisation
Department of Communication Systems
In the same journal
Wireless Communications & Mobile Computing
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 25 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 343 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf