scholarly journals Contract Theory-Based Incentive Mechanism for Full Duplex Cooperative NOMA with SWIPT Communication Networks

Author(s):  
Zhenwei Zhang ◽  
Hua Qu ◽  
Jihong Zhao ◽  
Wei Wang

Cooperative Non-Orthogonal Multiple Access (NOMA) with Simultaneous Wireless Information and Power Transfer (SWIPT) communication can effectively improve the spectrum efficiency and energy efficiency of the wireless networks with extend coverage. An important design issue is to incentivize a relaying center user to participate in the cooperative process and achieve a win-win situation to both the BS and the center user. Some private information of the center users are hidden from the BS in the networks. We apply a contract theory-based incentive mechanism under such asymmetric information scenario to incentives center user to join the cooperative communication to maximize the BS profit utility and to guarantee the center user’s expect payoff. A match theory-based Gale-Shapley algorithm is proposed to obtain the optimal strategy with low computation complexity. Simulation results indicated the network performance of our proposed cooperative transmission is much better than the conventional NOMA transmission and the benefit utility of the BS with the stable match strategy is nearly close to the complete channel state information multi-users scenario while the center users get the satisfied expect payoffs.

Entropy ◽  
2021 ◽  
Vol 23 (9) ◽  
pp. 1161
Author(s):  
Zhenwei Zhang ◽  
Hua Qu ◽  
Jihong Zhao ◽  
Wei Wang

Cooperative Non-Orthogonal Multiple Access (NOMA) with Simultaneous Wireless Information and Power Transfer (SWIPT) communication can not only effectively improve the spectrum efficiency and energy efficiency of wireless networks but also extend their coverage. An important design issue is to incentivize a full duplex (FD) relaying center user to participate in the cooperative process and achieve a win–win situation for both the base station (BS) and the center user. Some private information of the center users are hidden from the BS in the network. A contract theory-based incentive mechanism under this asymmetric information scenario is applied to incentivize the center user to join the cooperative communication to maximize the BS’s benefit utility and to guarantee the center user’s expected payoff. In this work, we propose a matching theory-based Gale–Shapley algorithm to obtain the optimal strategy with low computation complexity in the multi-user pairing scenario. Simulation results indicate that the network performance of the proposed FD cooperative NOMA and SWIPT communication is much better than the conventional NOMA communication, and the benefit utility of the BS with the stable match strategy is nearly close to the multi-user pairing scenario with complete channel state information (CSI), while the center users get the satisfied expected payoffs.


2016 ◽  
Vol 6 (2) ◽  
pp. 1-10
Author(s):  
Chaima Bensaid ◽  
Sofiane Boukli Hacene ◽  
Kamel Mohamed Faraoun

Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, the authors present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. The authors' approaches have been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Phu Tran Tin ◽  
Phan Van-Duc ◽  
Tan N. Nguyen ◽  
Le Anh Vu

In this paper, we investigate the full-duplex (FD) decode-and-forward (DF) cooperative relaying system, whereas the relay node can harvest energy from radiofrequency (RF) signals of the source and then utilize the harvested energy to transfer the information to the destination. Specifically, a hybrid time-power switching-based relaying method is adopted, which leverages the benefits of time-switching relaying (TSR) and power-splitting relaying (PSR) protocols. While energy harvesting (EH) helps to reduce the limited energy at the relay, full-duplex is one of the most important techniques to enhance the spectrum efficiency by its capacity of transmitting and receiving signals simultaneously. Based on the proposed system model, the performance of the proposed relaying system in terms of the ergodic capacity (EC) is analyzed. Specifically, we derive the exact closed form for upper bound EC by applying some special function mathematics. Then, the Monte Carlo simulations are performed to validate the mathematical analysis and numerical results.


Author(s):  
S. Yuness ◽  
E.S. Lobusov

The use of communication networks in control systems has several important advantages, such as the ability of information transfer and remote control of various objects, the possibility of modifications and maintenance. On the other hand, the time between reading measurements from the sensor and sending a control signal to the actuator depends on the network characteristics (topology and routing scheme), and such a time delay can greatly affect the overall network performance. Delays, distortions and loss of transmitted data not only degrade the performance of the network management system, but also destabilize it. The paper considers the use of Petri nets as a method for modeling networked control systems (NCS) on the example of designing an active suspension control system for a car. When modeling, the star and common bus topologies were used, the comparison of which revealed that control systems with the common bus topology function 40% faster than systems with the star topology.


2020 ◽  
Vol 16 (2) ◽  
pp. 155014772090703 ◽  
Author(s):  
Haifeng Lin ◽  
Fuquan Zhang

It is expected that all the nodes try their best to store and forward the messages in the intermittent connection network. However, due to the limited resources, such as memory, power, and transient communication chance, selfish nodes may relay the messages without responsibility. Stimulating selfish to behave normally could improve network performance. However, usually, it is difficult to distinguish the selfish behavior from the inability to relaying the message. By monitoring the behavior of relay nodes that messages are forwarding through, this article proposes a scheme that relays messages according to the reputation of intermediate nodes. The proposed reputation estimation scheme combines selfish behavior and inability behavior, and reveals very little private information for the protocol practice. There is a trade-off between the threshold and the performance. Too low value may not distinguish the selfish nodes. On the contrary, some normal nodes may excluded and cannot join the relaying and processing. Simulation effectively demonstrates that the reputation affects the node’s performance, and an appropriate reputation threshold value is useful for improving the network performance.


2020 ◽  
Vol 69 (6) ◽  
pp. 6463-6472 ◽  
Author(s):  
Zhi Mao ◽  
Fengye Hu ◽  
Dayang Sun ◽  
Shaodan Ma ◽  
Xiaolan Liu

Sign in / Sign up

Export Citation Format

Share Document