On outage analysis of nonlinear radio frequency energy harvesting based cooperative communication in cognitive radio network

Author(s):  
Sutanu Ghosh
Author(s):  
Jie Tian ◽  
He Xiao ◽  
Yimao Sun ◽  
Dong Hou ◽  
Xianglu Li

Abstract How to achieve energy-efficient transmission in radio frequency energy harvesting cognitive radio network (RF-CRN) is of great importance when nodes in CRN are self-maintained. This paper presents a radio frequency (RF) energy harvesting hardware-based underlay cognitive radio network (RH-CRN) structure, where a secondary transmitter (ST) first harvests energy from RF signals source originating from the primary network, and then communicates with a secondary receiver (SR) in underlay mode by using the harvested energy. The total consumed energy by the secondary user (SU) must be equal to or less than the total harvested energy referred to as energy causality constraint, In addition, the ST possesses some initial energy which may be the residual energy from the former transmission blocks, and we consider the energy loss of energy harvesting circuit as a systematic factor as well. Our goal is to achieve the maximum energy efficiency (EE) of the secondary network by jointly optimizing transmitting time and power. To guarantee the quality of service (QoS) of secondary transceiver, a minimum requirement of throughput constraint is imposed on the ST in the process of EE maximization. As the EE maximization is a nonlinear fractional programming problem, a quick iterative algorithm based on Dinkelbach’s method is proposed to achieve the optimal resource allocation. Simulation results show that the proposed strategy has fast convergence and can improve the system EE greatly while ensuring the QoS.


2020 ◽  
Vol 36 (3) ◽  
pp. 205-231
Author(s):  
Ngoc Pham Thi Dan ◽  
Khuong Ho Van ◽  
Hanh Dang Ngoc ◽  
Thiem Do Dac ◽  
Phong Nguyen Huu ◽  
...  

This paper investigates a cognitive radio network where a secondary sender assists a primarytransmitter in relaying primary information to a primary receiver and also transmits its own information toa secondary recipient. This sender is capable of jamming to protect secondary and/or primary informationagainst an eavesdropper and self-powering by harvesting radio frequency energy of primary signals.Security capability of both secondary and primary networks are analyzed in terms of secrecy outageprobability. Numerous results corroborate the proposed analysis which serves as a design guidelineto quickly assess and optimize security performance. More importantly, security capability trade-offbetween secondary and primary networks can be totally controlled with appropriate selection of systemparameters.


2017 ◽  
Vol 11 (16) ◽  
pp. 2466-2475 ◽  
Author(s):  
Soumen Mondal ◽  
Sanjay Dhar Roy ◽  
Sumit Kundu

2015 ◽  
Vol 76 (1) ◽  
Author(s):  
Fawad Salam Khan ◽  
Talha Naqash ◽  
Muhammad Ibrar Khatak ◽  
Raja Masood Larik

Facilities for different sight and sound provisions in remote systems requests extra transmission capacity in the radio frequency range. Effective range administration calculations are important to accomplish massive accomplishment in remote correspondences. Usage of licensed spectrum is increasing day by day so Cognitive Radio is proposed as a solution to meet the demands. CR is a symbolization procedure that distributes the authorized range (the licensed spectrum) despite the fact that facing least obstruction to the authorized clients. In this paper, we investigate the versatile qualities of cognitive radio in secure and dependable correspondence. Anyway the inquiry is the way to make the correspondence dependable such that there happens no spying and data spillage. The conceivable results incorporate coordinating the benefits of spread range balance, utilizing encryption calculations (Encryption keys), and its possibility to switch over different recurrence groups. We concentrate on the different requisitions of CR and the various philosophies which empower a safe Communication system. 


Sign in / Sign up

Export Citation Format

Share Document