primary receiver
Recently Published Documents


TOTAL DOCUMENTS

22
(FIVE YEARS 4)

H-INDEX

4
(FIVE YEARS 1)

2021 ◽  
Vol 15 ◽  
pp. 6-9
Author(s):  
Sami Touati ◽  
Hatem Boujemaa ◽  
Nazha Abed

In this paper, optimal and sub-optimal routing protocols are proposed for cognitive radio networks. We first investigate optimal routing that consists in searching among all paths, the one that minimizes the end-to-end outage while verifying interference constraint to primary receiver. A sub-optimal one-hop routing is proposed where the best relay is selected in each hop. The last routing protocol consists in decomposing the network in many sub-networks composed of K hops. Then the best route is determined in each of these sub-networks so that the K hops-outage probability is minimized. The proposed K-hops routing allows a good compromise between complexity and performance. The performance of different routing protocols are evaluated through simulation results in terms of outage probability.


2020 ◽  
Vol 2020 ◽  
pp. 1-17
Author(s):  
Pham Ngoc Son ◽  
Tran Trung Duy ◽  
Khuong Ho-Van

In this paper, we propose an underlay two-way relaying scheme with the successive interference cancellation (SIC) solution in which two secondary sources transmit simultaneously their data to each other through secondary relays. The proposed scheme is operated in only two time slots and under an interference constraint of a primary receiver, denoted as the UTW-2TS scheme. In the UTW-2TS scheme, the secondary relays employ the SIC operation to decode successively the data from received broadcast signals and then encode these data by two techniques: digital network coding (DNC) enforced by XOR operations (denoted as the UTW-2TS-DNC protocol) and superposition coding (SC) enforced by power domain additions (denoted as the UTW-2TS-SC protocol). A selected secondary relay which subjects to maximize decoding capacities and to minimize collection time of channel state information in two protocols UTW-2TS-DNC and UTW-2TS-SC experiences residual interferences from imperfect SIC operations. Outage probabilities and throughputs are solved in terms of exact closed-form expressions to evaluate the system performance of the proposed protocols. Simulation and analysis results provide performance enhancement of the proposed protocols UTW-2TS-DNC and UTW-2TS-SC owing to increase the number of the cooperative secondary relays, the interference constraints, and the distances from the secondary network to the primary receiver. The best throughputs are pointed at optimal interference power allocation coefficients and optimal locations of the selected secondary relay. Considering the same power consumption, the UTW-2TS-DNC protocol outperforms the UTW-2TS-SC protocol. Finally, the simulation results are collected to confirm the exact analysis values of the outage probabilities and throughputs.


2020 ◽  
Vol 36 (3) ◽  
pp. 205-231
Author(s):  
Ngoc Pham Thi Dan ◽  
Khuong Ho Van ◽  
Hanh Dang Ngoc ◽  
Thiem Do Dac ◽  
Phong Nguyen Huu ◽  
...  

This paper investigates a cognitive radio network where a secondary sender assists a primarytransmitter in relaying primary information to a primary receiver and also transmits its own information toa secondary recipient. This sender is capable of jamming to protect secondary and/or primary informationagainst an eavesdropper and self-powering by harvesting radio frequency energy of primary signals.Security capability of both secondary and primary networks are analyzed in terms of secrecy outageprobability. Numerous results corroborate the proposed analysis which serves as a design guidelineto quickly assess and optimize security performance. More importantly, security capability trade-offbetween secondary and primary networks can be totally controlled with appropriate selection of systemparameters.


Author(s):  
Wei Wu ◽  
Yujing Wang ◽  
Jianlin Mo ◽  
Jian Liu

AbstractIn this paper, we considered a robust beamforming design problem for a proactive eavesdropping via jamming, in which a full-duplex legitimate monitor tries to eavesdrop on a suspicious communication link between the secondary pairs in an unmanned aerial vehicle (UAV)-enabled cognitive radio network. Due to the channel estimation errors, we assume that the channel state information is not perfectly known. To ensure the successful eavesdropping, jamming signals are designed to disrupt the suspicious receivers and the primary receiver at the same time, which should have the good tradeoff between those two effects. We aimed to maximize the achievable eavesdropping rate under the transmitting power constraint at the legitimate monitor and the interference temperature constraint at the primary receiver, which was formulated as a non-convex problem with infinite constraints. We firstly transform the original problem into a simplified one with finite constraints. Then, an analytical solution in significant low-complexity is proposed by decomposing the simplified problem. Numerical results are finally presented to evaluate the performance of our proposed schemes in UAV-enabled wireless communication networking.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 1224-1235 ◽  
Author(s):  
Xiaoshi Song ◽  
Xiangbo Meng ◽  
Xile Shen ◽  
Chao Jia

Sign in / Sign up

Export Citation Format

Share Document