Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247165
N. Mahmood, Gilberto Berardinelli, K. Pedersen, P. Mogensen
An ultra-dense deployment of small cells with multi-antenna nodes is expected to be the solution for coping with the huge traffic growth expected in near future. Mutual interference among coexisting users is one of the main performance bottlenecks in such dense deployment scenarios. A distributed transmission technique that can efficiently manage the interference in an uncoordinated dense small cell network is investigated in this work. The proposed interference aware scheme only requires instantaneous channel state information at the transmitter end towards the desired receiver. Motivated by penalty methods in optimisation studies, an interference dependent weighting factor is introduced to control the number of parallel transmission streams. The proposed scheme can outperform a more complex benchmark precoding scheme in terms of the sum network throughput in certain scenarios and with realistic channel estimation errors, while delivering close to the benchmark performance under general conditions.
{"title":"An interference-aware distributed transmission technique for dense small cell networks","authors":"N. Mahmood, Gilberto Berardinelli, K. Pedersen, P. Mogensen","doi":"10.1109/ICCW.2015.7247165","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247165","url":null,"abstract":"An ultra-dense deployment of small cells with multi-antenna nodes is expected to be the solution for coping with the huge traffic growth expected in near future. Mutual interference among coexisting users is one of the main performance bottlenecks in such dense deployment scenarios. A distributed transmission technique that can efficiently manage the interference in an uncoordinated dense small cell network is investigated in this work. The proposed interference aware scheme only requires instantaneous channel state information at the transmitter end towards the desired receiver. Motivated by penalty methods in optimisation studies, an interference dependent weighting factor is introduced to control the number of parallel transmission streams. The proposed scheme can outperform a more complex benchmark precoding scheme in terms of the sum network throughput in certain scenarios and with realistic channel estimation errors, while delivering close to the benchmark performance under general conditions.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"38 1","pages":"119-124"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88616557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247247
D. Zheng, Chen He, Ling-ge Jiang, Jianfeng Ding, Qian Zhang, Qi Xi
This paper studies the resource allocation for multi-D2D (Device-to-Device) communications in heterogeneous networks with quality-of-service (QoS) guarantees for both cellular and D2D links. To improve the achievable rate of D2D communication and the spectrum utilization, one D2D pair is allowed to reuse multiple cellular spectrum resources. However, this scheme introduces more interference so that a proper resource allocation strategy is needed to control the interference and guarantee the QoS for communication links. We propose a novel algorithm to conduct the resource allocation, which is formulated as a mixed integer programming (MIP) problem. Then the optimality condition of the algorithm is analyzed. Numerical results reveal that our algorithm reduces the power consumption of D2D networks.
{"title":"QoS-based resource allocation for multi-D2D communications in heterogeneous networks","authors":"D. Zheng, Chen He, Ling-ge Jiang, Jianfeng Ding, Qian Zhang, Qi Xi","doi":"10.1109/ICCW.2015.7247247","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247247","url":null,"abstract":"This paper studies the resource allocation for multi-D2D (Device-to-Device) communications in heterogeneous networks with quality-of-service (QoS) guarantees for both cellular and D2D links. To improve the achievable rate of D2D communication and the spectrum utilization, one D2D pair is allowed to reuse multiple cellular spectrum resources. However, this scheme introduces more interference so that a proper resource allocation strategy is needed to control the interference and guarantee the QoS for communication links. We propose a novel algorithm to conduct the resource allocation, which is formulated as a mixed integer programming (MIP) problem. Then the optimality condition of the algorithm is analyzed. Numerical results reveal that our algorithm reduces the power consumption of D2D networks.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"1 1","pages":"602-607"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79684433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247546
Torsten Lorenzen, H. Tchouankem
Vehicle-to-vehicle (V2V) road safety applications assume a correct, reliable and time-critical exchange of information between nodes to ensure cooperative awareness between vehicles and their neighborhood. While these safety-based applications rely on the single-hop broadcast of status information shared among vehicles on a single channel, in high network load conditions the channel will suffer from severe congestion which subsequently leads to a degradation of the communication performance. In this paper we investigate the capabilities of the awareness control algorithm proposed by European Telecommunications Standards Institute (ETSI) in ETSI EN 302 637-2 by comparing its performance with a traditional static periodic approach through a profound simulation study. Although the awareness control approach outperforms the traditional periodic generation method, this algorithm will be limited in highway scenarios due to the high dynamic mobility of nodes.
车对车(V2V)道路安全应用假设节点之间的信息交换是正确、可靠和时间关键的,以确保车辆与周围环境之间的合作意识。虽然这些基于安全的应用程序依赖于在单个信道上共享车辆之间的状态信息的单跳广播,但在高网络负载条件下,信道将遭受严重的拥塞,从而导致通信性能下降。本文对欧洲电信标准协会(ETSI)在ETSI EN 302 637-2中提出的感知控制算法的性能进行了深入的仿真研究,并将其性能与传统的静态周期方法进行了比较。尽管感知控制方法优于传统的周期生成方法,但由于节点的高动态移动性,该算法在高速公路场景下将受到限制。
{"title":"Evaluation of an awareness control algorithm for VANETs based on ETSI EN 302 637-2 V1.3.2","authors":"Torsten Lorenzen, H. Tchouankem","doi":"10.1109/ICCW.2015.7247546","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247546","url":null,"abstract":"Vehicle-to-vehicle (V2V) road safety applications assume a correct, reliable and time-critical exchange of information between nodes to ensure cooperative awareness between vehicles and their neighborhood. While these safety-based applications rely on the single-hop broadcast of status information shared among vehicles on a single channel, in high network load conditions the channel will suffer from severe congestion which subsequently leads to a degradation of the communication performance. In this paper we investigate the capabilities of the awareness control algorithm proposed by European Telecommunications Standards Institute (ETSI) in ETSI EN 302 637-2 by comparing its performance with a traditional static periodic approach through a profound simulation study. Although the awareness control approach outperforms the traditional periodic generation method, this algorithm will be limited in highway scenarios due to the high dynamic mobility of nodes.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"45 1","pages":"2458-2464"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89795328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247153
Uzma Siddique, H. Tabassum, E. Hossain
Recent advancements in the self-interference (SI) cancellation capability of low-power wireless devices pave the way of implementing full-duplex (FD) self-backhauling in small-cell networks. FD self-backhauling allows exploiting the radio spectrum used by the radio access network (RAN) for backhaul links as well as access links concurrently. This paper characterizes the performance of FD self-backhauling for both downlink and uplink transmissions in a two-tier macrocell-small cell network and compares it against half-duplex (HD) selfbackhauling. The performance of small cell base stations (SBSs) with adaptive FD scheme that switches between HD and FD modes depending on the network parameters such as the distance of backhaul link (i.e., link between the macrocell base station and SBS), SI cancellation value at the SBS, and the distance of the served user from the SBS is then numerically analyzed for two different user selection schemes used by the SBS. Numerical results show the usefulness of adaptive FD self-backhauling over FD self-backhauling, especially in fairness-constrained scheduling schemes.
{"title":"Adaptive in-band self-backhauling for full-duplex small cells","authors":"Uzma Siddique, H. Tabassum, E. Hossain","doi":"10.1109/ICCW.2015.7247153","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247153","url":null,"abstract":"Recent advancements in the self-interference (SI) cancellation capability of low-power wireless devices pave the way of implementing full-duplex (FD) self-backhauling in small-cell networks. FD self-backhauling allows exploiting the radio spectrum used by the radio access network (RAN) for backhaul links as well as access links concurrently. This paper characterizes the performance of FD self-backhauling for both downlink and uplink transmissions in a two-tier macrocell-small cell network and compares it against half-duplex (HD) selfbackhauling. The performance of small cell base stations (SBSs) with adaptive FD scheme that switches between HD and FD modes depending on the network parameters such as the distance of backhaul link (i.e., link between the macrocell base station and SBS), SI cancellation value at the SBS, and the distance of the served user from the SBS is then numerically analyzed for two different user selection schemes used by the SBS. Numerical results show the usefulness of adaptive FD self-backhauling over FD self-backhauling, especially in fairness-constrained scheduling schemes.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"16 1","pages":"44-49"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90323407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247313
T. Bento, Luís Bernardo, R. Dinis, Rodolfo Oliveira, Paulo Pinto, Pedro Amaral
In-Band Full-Duplex (FDX) and MultiPacket Reception (MPR) are two transmission technologies that can be used together to improve the overall network capacity. However, the FDX Self-Interference Cancellation (SIC) techniques only filter part of the transmitted signal from the reception. This paper analyses how the FDX SIC residual noise influences the performance of MPR systems. It considers power diversity MPR, based on interference cancellation (IC) techniques, and time/frequency spreading MPR, such as code division multiple access or network diversity multiple access. The FDX coverage range is related with the FDX SIC attenuation. It is shown that the aggregate throughput can be increased by a factor P + 1 for P MTs when IC-based MPR is used for short range communications, but broader ranges require other less efficient MPR approaches. It is also shown that half-duplex can coexist with the FDX communications, providing an enlarged coverage outside the FDX communication range.
{"title":"Multipacket reception performance in the presence of in-band full duplex communication","authors":"T. Bento, Luís Bernardo, R. Dinis, Rodolfo Oliveira, Paulo Pinto, Pedro Amaral","doi":"10.1109/ICCW.2015.7247313","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247313","url":null,"abstract":"In-Band Full-Duplex (FDX) and MultiPacket Reception (MPR) are two transmission technologies that can be used together to improve the overall network capacity. However, the FDX Self-Interference Cancellation (SIC) techniques only filter part of the transmitted signal from the reception. This paper analyses how the FDX SIC residual noise influences the performance of MPR systems. It considers power diversity MPR, based on interference cancellation (IC) techniques, and time/frequency spreading MPR, such as code division multiple access or network diversity multiple access. The FDX coverage range is related with the FDX SIC attenuation. It is shown that the aggregate throughput can be increased by a factor P + 1 for P MTs when IC-based MPR is used for short range communications, but broader ranges require other less efficient MPR approaches. It is also shown that half-duplex can coexist with the FDX communications, providing an enlarged coverage outside the FDX communication range.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"18 1","pages":"1036-1041"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90457813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247197
Tongyun Li, R. Penty, I. White
Digital radio over fibre (RoF) technology has been suggested as a promising solution to replace conventional analogue RoF technology for multi-service in-building wireless coverage. However in conventional digital RoF, digitisation leads to high data rates which in turn results in high capital expenditure (CAPEX) and operational expenditure (OPEX). This paper investigates a novel methodology to transmit efficiently a digitised radio service over an optical link to provide wireless coverage. We demonstrate a digital processing technique that is able to compress the digitised 20MHz bandwidth Long Term Evolution (LTE) data stream to a much lower level than in a conventional link without impairing its radio performance.
{"title":"Novel digital radio over fibre for 4G-LTE","authors":"Tongyun Li, R. Penty, I. White","doi":"10.1109/ICCW.2015.7247197","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247197","url":null,"abstract":"Digital radio over fibre (RoF) technology has been suggested as a promising solution to replace conventional analogue RoF technology for multi-service in-building wireless coverage. However in conventional digital RoF, digitisation leads to high data rates which in turn results in high capital expenditure (CAPEX) and operational expenditure (OPEX). This paper investigates a novel methodology to transmit efficiently a digitised radio service over an optical link to provide wireless coverage. We demonstrate a digital processing technique that is able to compress the digitised 20MHz bandwidth Long Term Evolution (LTE) data stream to a much lower level than in a conventional link without impairing its radio performance.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"22 1","pages":"312-317"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77931218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247295
Osama Amin, E. Bedeer, M. Ahmed, O. Dobre, Mohamed-Slim Alouini
Recently, much attention has been paid to the green design of wireless communication systems using energy efficiency (EE) metrics that should capture all energy consumption sources to deliver the required data. In this paper, we formulate an accurate EE metric for cooperative two-hop systems that use the amplify-and-forward relaying scheme. Different from the existing research that assumes the availability of perfect channel state information (CSI) at the communication cooperative nodes, we assume a practical scenario, where training pilots are used to estimate the channels. The estimated CSI can be used to adapt the available resources of the proposed system in order to maximize the EE. Two estimation strategies are assumed namely disintegrated channel estimation, which assumes the availability of channel estimator at the relay, and cascaded channel estimation, where the relay is not equipped with channel estimator and only forwards the received pilot(s) in order to let the destination estimate the cooperative link. The channel estimation cost is reflected on the EE metric by including the estimation error in the signal-to-noise term and considering the energy consumption during the estimation phase. Based on the formulated EE metric, we propose an energy-aware power allocation algorithm to maximize the EE of the cooperative system with channel estimation. Furthermore, we study the impact of the estimation parameters on the optimized EE performance via simulation examples.
{"title":"Energy-efficient power allocation of two-hop cooperative systems with imperfect channel estimation","authors":"Osama Amin, E. Bedeer, M. Ahmed, O. Dobre, Mohamed-Slim Alouini","doi":"10.1109/ICCW.2015.7247295","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247295","url":null,"abstract":"Recently, much attention has been paid to the green design of wireless communication systems using energy efficiency (EE) metrics that should capture all energy consumption sources to deliver the required data. In this paper, we formulate an accurate EE metric for cooperative two-hop systems that use the amplify-and-forward relaying scheme. Different from the existing research that assumes the availability of perfect channel state information (CSI) at the communication cooperative nodes, we assume a practical scenario, where training pilots are used to estimate the channels. The estimated CSI can be used to adapt the available resources of the proposed system in order to maximize the EE. Two estimation strategies are assumed namely disintegrated channel estimation, which assumes the availability of channel estimator at the relay, and cascaded channel estimation, where the relay is not equipped with channel estimator and only forwards the received pilot(s) in order to let the destination estimate the cooperative link. The channel estimation cost is reflected on the EE metric by including the estimation error in the signal-to-noise term and considering the energy consumption during the estimation phase. Based on the formulated EE metric, we propose an energy-aware power allocation algorithm to maximize the EE of the cooperative system with channel estimation. Furthermore, we study the impact of the estimation parameters on the optimized EE performance via simulation examples.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"187 1","pages":"931-936"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75129929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247458
Yeali S. Sun, Yu-Feng Chen, Meng Chang Chen
To sustain a good viewing experience of Internet live event broadcast service for users, application performance management in the presence of highly dynamic and unpredictable demand relies on a close grasp of the demand behavior characteristics and an accurate prediction model of them. In this paper, we propose a learning-based behavior profiling model which takes event-related temporal information into account, and separately characterized and classified the demand behavior of event periods rather than for the entire event as a whole. We also propose a run-time prediction algorithm based on the generated demand characteristic profiles and the state transition probability matrix to support an accurate forecast of the external demand in dynamic resource allocation for target performance management. The results show that our proposed model can well capture the demand temporal dynamics and changes, as well as minimize the probability of target performance violation while making a good utilization of resources in the presence of an unpredictable and highly dynamic workload.
{"title":"Profiling temporal event behavior for demand prediction in cloud application performance management","authors":"Yeali S. Sun, Yu-Feng Chen, Meng Chang Chen","doi":"10.1109/ICCW.2015.7247458","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247458","url":null,"abstract":"To sustain a good viewing experience of Internet live event broadcast service for users, application performance management in the presence of highly dynamic and unpredictable demand relies on a close grasp of the demand behavior characteristics and an accurate prediction model of them. In this paper, we propose a learning-based behavior profiling model which takes event-related temporal information into account, and separately characterized and classified the demand behavior of event periods rather than for the entire event as a whole. We also propose a run-time prediction algorithm based on the generated demand characteristic profiles and the state transition probability matrix to support an accurate forecast of the external demand in dynamic resource allocation for target performance management. The results show that our proposed model can well capture the demand temporal dynamics and changes, as well as minimize the probability of target performance violation while making a good utilization of resources in the presence of an unpredictable and highly dynamic workload.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"33 1","pages":"1902-1908"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74544856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247414
Xinyu Wang, Min Jia, Qing Guo, Xuemai Gu
Cognitive radio is able to effectively increase spectral utilization. However, cooperative spectrum sensing gives malicious users chances to interfere with its decision processes. If a mobile secondary user's energy detection results become unreliable, conventional trust-value based cooperative spectrum sensing algorithms, which are used to resist malicious attacks, cannot distinguish whether it's caused by a reliable user moving into a deep-fading area or it attacking maliciously. This is the main reason why the detection performances of conventional algorithms are terribly bad when secondary users are mobile. This paper proposes a trust-value based cooperative spectrum sensing algorithm aiming at mobile secondary users. We divide the whole region into cells according to different areas' actual channel conditions so that the detected results of users in any one of cells are very close to each other but those in different cells are quite different. Our proposed approach removes malicious users independently in each cell based upon their trust values. And larger weighting coefficients are given to cells with better channel conditions. Then this paper analyzes the effects of the average velocity of secondary users on the detection performance. Simulation results show that when secondary users are mobile, the detection performance of our algorithm is much better than that of conventional trust-value based cooperative spectrum sensing algorithms proposed for static secondary users and is better than that of a trusted collaborative spectrum sensing for mobile cognitive radio networks based upon location reliability and malicious intention which also takes location channel differences into considerations.
{"title":"A trust-value based cooperative spectrum sensing algorithm for mobile secondary users","authors":"Xinyu Wang, Min Jia, Qing Guo, Xuemai Gu","doi":"10.1109/ICCW.2015.7247414","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247414","url":null,"abstract":"Cognitive radio is able to effectively increase spectral utilization. However, cooperative spectrum sensing gives malicious users chances to interfere with its decision processes. If a mobile secondary user's energy detection results become unreliable, conventional trust-value based cooperative spectrum sensing algorithms, which are used to resist malicious attacks, cannot distinguish whether it's caused by a reliable user moving into a deep-fading area or it attacking maliciously. This is the main reason why the detection performances of conventional algorithms are terribly bad when secondary users are mobile. This paper proposes a trust-value based cooperative spectrum sensing algorithm aiming at mobile secondary users. We divide the whole region into cells according to different areas' actual channel conditions so that the detected results of users in any one of cells are very close to each other but those in different cells are quite different. Our proposed approach removes malicious users independently in each cell based upon their trust values. And larger weighting coefficients are given to cells with better channel conditions. Then this paper analyzes the effects of the average velocity of secondary users on the detection performance. Simulation results show that when secondary users are mobile, the detection performance of our algorithm is much better than that of conventional trust-value based cooperative spectrum sensing algorithms proposed for static secondary users and is better than that of a trusted collaborative spectrum sensing for mobile cognitive radio networks based upon location reliability and malicious intention which also takes location channel differences into considerations.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"30 1","pages":"1635-1639"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74686458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247255
Keeth Jayasinghe, P. Jayasinghe, Nandana Rajatheva, M. Latva-aho
This paper presents a secure beamforming design to prevent eavesdropping on multiple-input multiple-output (MIMO) device-to-device (D2D) communication. The devices communicate via a trusted relay which performs physical layer network coding (PNC), and multiple eavesdroppers are trying to intercept the device information. The beamforming design is based on minimizing mean square error of the D2D communication while employing signal-to-interference-plus-noise ratio (SINR) threshold constraints to prevent possible eavesdropping. The channel state information of the device-to-eavesdropper and relay-to-eavesdropper channels is imperfect at the devices and relay. The channel estimation errors are assumed with Gaussian Markov uncertainty model. Consequently, robust optimization problems are formulated considering the multiple access and broadcasting stages of the D2D communication. These problems are non-convex, and two algorithms are proposed to solve them. In the numerical analysis, we discuss the convergence of the proposed algorithms, impact of the number of eavesdroppers on the performance, and the SINR distributions at eavesdroppers.
{"title":"Physical layer security for relay assisted MIMO D2D communication","authors":"Keeth Jayasinghe, P. Jayasinghe, Nandana Rajatheva, M. Latva-aho","doi":"10.1109/ICCW.2015.7247255","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247255","url":null,"abstract":"This paper presents a secure beamforming design to prevent eavesdropping on multiple-input multiple-output (MIMO) device-to-device (D2D) communication. The devices communicate via a trusted relay which performs physical layer network coding (PNC), and multiple eavesdroppers are trying to intercept the device information. The beamforming design is based on minimizing mean square error of the D2D communication while employing signal-to-interference-plus-noise ratio (SINR) threshold constraints to prevent possible eavesdropping. The channel state information of the device-to-eavesdropper and relay-to-eavesdropper channels is imperfect at the devices and relay. The channel estimation errors are assumed with Gaussian Markov uncertainty model. Consequently, robust optimization problems are formulated considering the multiple access and broadcasting stages of the D2D communication. These problems are non-convex, and two algorithms are proposed to solve them. In the numerical analysis, we discuss the convergence of the proposed algorithms, impact of the number of eavesdroppers on the performance, and the SINR distributions at eavesdroppers.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"2 1","pages":"651-656"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74774489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}