maximum transmit power
Recently Published Documents


TOTAL DOCUMENTS

16
(FIVE YEARS 7)

H-INDEX

3
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Vaibhav Kumar ◽  
Mark F. Flanagan ◽  
Daniel B. da Costa ◽  
Le-Nam Tran

<div>In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing non-orthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.</div>


2021 ◽  
Author(s):  
Vaibhav Kumar ◽  
Mark F. Flanagan ◽  
Daniel B. da Costa ◽  
Le-Nam Tran

<div>In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing non-orthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.</div>


2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

This study suggests an energy-scavenging capable unlicensed relay not only to retain communications between an unlicensed sender-recipient pair in underlay cognitive networks but also to secure these communications against eavesdropping of malicious users. Message-securing capability of such a network configuration is assessed through secrecy outage probability (SOP). For this purpose, a precise closed-form formula of the SOP accounting for interference power restriction, Nakagami-m fading, and maximum transmit power restriction is first proposed. Then, the proposed formula is validated by computer simulations. Ultimately, various results are supplied to contrive that the relay position, the time percentage, and the power percentage of the energy-scavenging technique should be appropriately chosen for achieving the best security performance. Moreover, the SOP decreases with lower severity fading level and is constant in the range of high maximum interference power or high maximum transmit power.


Electronics ◽  
2019 ◽  
Vol 8 (7) ◽  
pp. 796 ◽  
Author(s):  
Amir Haider ◽  
Seung-Hoon Hwang

To furnish the network with small cells, it is vital to consider parameters like cell size, interference in the network, and deployment strategies to maximize the network’s performance gains expected from small cells. With a small cell network, it is critical to analyze the impact of the uplink power control parameters on the network’s performance. In particular, the maximum transmit power (Pmax) for user equipment (UE) needs to be revisited for small cells, since it is a major contributor towards interference. In this work, the network performance was evaluated for different Pmax values for the small cell uplink. Various deployment scenarios for furnishing the existing macro layer in LTE networks with small cells were considered. The Pmax limit for a small cell uplink was evaluated for both homogenous small cell and heterogeneous networks (HetNet). The numerical results showed that it would be appropriate to adopt Pmax = 18 dBm in uniformly distributed small cells rather than Pmax = 23 dBm, as in macro environments. The choice of Pmax = 18 dBm was further validated for three HetNet deployment scenarios. A decrease of 0.52 dBm and an increase of 0.03 dBm and 3.29 dBm in the proposed Pmax = 18 dBm were observed for the three HetNet deployments, respectively. Furthermore, we propose that the fractional power control mode can be employed instead of the full compensation mode in small cell uplinks.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

This paper exploits a self-powered secondary relay to not only maintain but also secure communications between a secondary source and a secondary destination in cognitive radio networks when source-destination channel is unavailable. The relay scavenges energy from radio frequency (RF) signals of the primary transmitter and the secondary source and consumes the scavenged energy for its relaying activity. Under the maximum transmit power constraint, Rayleigh fading, the primary outage constraint, and the interference from the primary transmitter, this paper suggests an accurate closed-form expression of the secrecy outage probability to promptly assess the security performance of relaying communications in energy scavenging cognitive networks. The validity of the proposed expression is verified by computer simulations. Numerous results demonstrate the security performance saturation in the range of large maximum transmit power or high required outage probability of primary users. Moreover, the security performance is a function of several system parameters among which the relay’s position, the power splitting factor, and the time splitting factor can be optimized to achieve the minimum secrecy outage probability.


2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

Cognitive radio networks (CRNs) allow coexistence of unlicensed users (UUs) and licensed users (LUs) and hence, mutual interference between UUs and LUs is neither ignored nor considered as Gaussian-distributed quantity. Additionally, exploiting jamming signals to purposely interfere with signal reception of eavesdroppers is a feasible solution to improve security performance of CRNs. This paper analyzes reliability-security trade-off, which accounts for maximum transmit power constraint, interference power constraint, jamming signal, and Rayleigh fading, and considers interference from LUs as non-Gaussian-distributed quantity. Toward this end, exact closed-form expressions of successful detection probability and successful eavesdropping probability, from which reliability-security trade-off is straightforwardly visible, are first suggested and then validated by Monte-Carlo simulations. Various results demonstrate that interference from LUs considerably decreases both probabilities while jamming signal enlarges the difference between them, emphasizing its effectiveness in improving security performance.


2016 ◽  
Vol 2016 ◽  
pp. 1-10 ◽  
Author(s):  
Jie Chen ◽  
Chang Liu ◽  
Husheng Li ◽  
Xulong Li ◽  
Shaoqian Li

Device-to-Device (D2D) communications are considered one of the key technologies for 5G wireless communication systems. In this paper, a resource sharing mechanism, which applies different policies for different cases (thus being categorized), is proposed. In this scheme, all D2D pairs are divided into three groups by comparing the minimum transmit power with the maximum transmit power of each cellular UE. The proposed mechanism enables multiple D2D pairs in the second group to share the resource with cellular user equipment (UE) simultaneously, by adjusting the transmit powers of these D2D transmitters. At the same time, D2D pairs in the first group and the third group share resource with cellular UE based on the transmit power minimization principle. Simulation results show that the proposed scheme can achieve relatively higher network throughput and lower transmit power consumption of the D2D system.


2015 ◽  
Vol 18 (3) ◽  
pp. 29-38
Author(s):  
Khuong Van Ho ◽  
Son Que Vo ◽  
Tra Thanh Luu ◽  
Lien Hong Pham

This paper proposes an outage analysis framework for cooperative cognitive networks with proactive relay selection and selection combining (SC) under licensed outage constraint, maximum transmit power constraint, independent non-identical (i.n.i) fading distributions, erroneous channel information, and licensed users’ interference. Towards this end, we firstly suggest power allocation for unlicensed transmitters to satisfy power constraints and account for erroneous channel information and licensed users’ interference. Then, we propose an exact closed-form outage probability formula for the unlicensed network to promptly evaluate system performance and provide useful insights into performance limits. Multiple results show performance trade-off between the unlicensed network and the licensed network, error floor in the unlicensed network, considerable system performance degradation owing to erroneous channel information and licensed users’ interference, and significant performance enhancement due to the increase in the number of relays.


Sign in / Sign up

Export Citation Format

Share Document