Loading...
Search for: cognitive-radios
0.013 seconds
Total 87 records

    Opportunistic spectral access in cooperative cognitive radio networks

    , Article IEEE Vehicular Technology Conference ; 14-17 September , 2014 ; ISSN: 15502252 ; ISBN: 9781479944491 Liang, W ; Ng, S. X ; Bayat, S ; Li, Y ; Hanzo, L ; Sharif University of Technology
    Abstract
    A pragmatic distributed algorithm (PDA) is proposed for supporting the ef-cient spectral access of multiple Primary Users (PUs) and Cognitive Users (CUs) in cooperative Cognitive Radio (CR) networks. The CUs may serve as relay nodes for relaying the signal received from the PUs to their destinations, while both the PUs' and the CUs' minimum rate requirements are satis-ed. The key idea of our PDA is that the PUs negotiate with the CUs concerning the speci-c amount of relaying and transmission time, whilst reducing the required transmission power or increasing the transmission rate of the PU. Our results show that the cooperative spectral access based on our PDA reaches an equilibrium, when it... 

    A location privacy-preserving method for spectrum sharing in database-driven cognitive radio networks

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 3687-3711 ; 09296212 (ISSN) Salami, Z ; Ahmadian Attari, M ; Jannati, H ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    The great attention to cognitive radio networks (CRNs) in recent years, as a revolutionary communication paradigm that aims to solve the problem of spectrum scarcity, prompts serious investigation on security issues of these networks. One important security concern in CRNs is the preservation of users location privacy, which is under the shadow of threat, especially in database-driven CRNs. To this end, in this paper, we propose a Location Privacy Preserving Database-Driven Spectrum-Sharing (L-PDS 2) protocol for sharing the spectrum between PUs and SUs in a database-driven CRN, while protecting location privacy of both primary and secondary users, simultaneously. We also present two... 

    Preventing the transmission of harmful cognitive radio users in the presence of primary users

    , Article Proceedings - 2009 1st UK-India International Workshop on Cognitive Wireless Systems, UKIWCWS 2009, 11 December 2009 through 12 December 2009, New Delhi ; 2009 ; 9781457701832 (ISBN) Fathollahi, M ; Soleimanipour, M ; Sharif University of Technology
    Abstract
    A cognitive radio provides access to a licensed spectrum for unlicensed users opportunistically provided that they are not harmful for licensed users (primary users). We call a cognitive radio user (CR user) harmful, when it generates interference for primary users (PU) or occupies spectrum holes excessively. This paper discusses the spectrum management policy against harmful CR users. For this, we design a jammer signal which ruins transmission of harmful CR users and forces them to leave the spectrum without damaging the communication of PUs. This signal is designed using group subspace technique for both synchronous and asynchronous channels. Our simulation results show that the designed... 

    Cognitive radio networks spectrum allocation: An ACS perspective

    , Article Scientia Iranica ; Volume 19, Issue 3 , 2012 , Pages 767-773 ; 10263098 (ISSN) Koroupi, F ; Talebi, S ; Salehinejad, H ; Sharif University of Technology
    2012
    Abstract
    Cognitive Radio (CR) is a promised solution to the lack of spectrum, as well as spectrum inefficiency, in current communication networks. A major demand of this technology is for fair spectrum assignment to unlicensed (secondary) users. This paper addresses a new approach to this challenge in CR networks, based on the Graph Coloring Problem (GCP) and the Ant Colony System (ACS). In addition, we compare the performance of the proposed algorithm with Color Sensitive Graph Coloring (CSGC) and Particle Swarm Optimization (PSO) based techniques  

    A new spectrum sensing circuit for cognitive radio applications

    , Article Proceedings - CIMSim 2011: 3rd International Conference on Computational Intelligence, Modelling and Simulation, 20 September 2011 through 22 September 2011, Langkawi ; 2011 , Pages 404-407 ; 9780769545622 (ISBN) Vahidpoor, Z ; Forooraghi, K ; Atlasbaf, Z ; Ahmadi, A. F ; Sharif University of Technology
    2011
    Abstract
    Fast, accurate and efficient sensing is of important aspects in cognitive radio technology. A new sensing circuit is proposed using a phase frequency detector for cognitive radio applications. Using this method, spectral sensing can be done in a very short time by a low cost, low power circuit, compared with available implemented methods. The PFD circuit resolves different frequencies without the need of variable filter bandwidth or the banks of filters. Also it accelerates sensing procedure because of short time needed to detect the signal. Simulations show the accurate operation of this method and comparison with other methods shows faster sweep rates  

    Interference efficiency: A new concept to analyze the performance of cognitive radio networks

    , Article 2017 IEEE International Conference on Communications Workshops, ICC Workshops 2017, 21 May 2017 through 25 May 2017 ; 2017 , Pages 1105-1110 ; 9781509015252 (ISBN) Mili, M. R ; Musavian, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, we develop and analyze a novel performance metric, called interference efficiency (IE), that shows the number of transmitted bits per unit of interference energy imposed on the primary users (PUs) in an underlay cognitive radio network (CRN). Specifically, we develop a framework to maximize the IE of a CRN with multiple secondary users (SUs) while satisfying target constraints on the average interference power on PU receiver, total SUs transmit power and minimum ergodic rate for the SUs. In doing so, we formulate a multiobjective optimization problem (MOP), that aims to achieve the maximum ergodic sum rate of multiple SUs and the minimum average interference power on the... 

    Multi-user opportunistic spectrum access with channel impairments

    , Article AEU - International Journal of Electronics and Communications ; Volume 67, Issue 11 , 2013 , Pages 955-966 ; 14348411 (ISSN) Majd, S. A ; Salehkaleybar, S ; Pakravan, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we study the impact of sensing error and channel fading on the decision process of a multiple secondary user network in a primary network whose channel occupancy states are modelled as a Bernoulli process. We present a randomized access strategy to maximize total secondary network throughput. The proposed method guarantees that the probability of collision between primary and secondary users in each channel is less than the predefined value of P c = ξ. To find the optimal access strategy, we formulate secondary network throughput as an optimization problem. Then, using the KKT method to find the solution, we break the original problem into multiple sub-problems. Then, we... 

    Three-user cognitive interference channel: Capacity region with strong interference

    , Article IET Communications ; Volume 6, Issue 13 , 2012 , Pages 2099-2107 ; 17518628 (ISSN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    IET  2012
    Abstract
    This study investigates the capacity region of a three-user cognitive radio network with two primary users and one cognitive user. A three-user cognitive interference channel (C-IFC) is proposed by considering a three-user interference channel (IFC) where one of the transmitters has cognitive capabilities and knows the messages of the other two transmitters in a non-causal manner. First, two inner bounds on the capacity region of the three-user C-IFC are obtained based on using the schemes which allow all receivers to decode all messages with two different orders. Next, two sets of conditions are derived, under which the capacity region of the proposed model coincides with the capacity... 

    Optimal probabilistic initial and target channel selection for spectrum handoff in cognitive radio networks

    , Article IEEE Transactions on Wireless Communications ; Volume 14, Issue 1 , 2015 , Pages 570-584 ; 15361276 (ISSN) Sheikholeslami, F ; Nasiri Kenari, M ; Ashtiani, F ; Sharif University of Technology
    Abstract
    Spectrum mobility in cognitive radio networks not only enables the secondary users to guarantee the desired QoS of the primary users but also grants an efficient exploitation of the available spectrum holes in the network. In this paper, we propose a probabilistic approach in determining the initial and target channels for the handoff procedure in a single secondary user network. To characterize the network, a queuing theoretical framework is introduced, and 'stay' and 'change' handoff policies are both addressed. The performance of the secondary user in terms of average sojourn and extended service times for secondary connections is analyzed, and convex optimization problems with the... 

    Compress-and-forward strategy for causal cognitive interference channel

    , Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 1088-1095 ; 9781424469406 (ISBN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we consider Causal Cognitive Interference Channel (CC-IFC), wherein the cognitive user overhears the channel and exploits knowledge of the primary user's message from the causally received signals. We propose a coding scheme which combines Compress-and-Forward (CF) strategy with Marton coding with common information at the cognitive user. Rate splitting for messages at both transmitters is used to have a collaborative strategy. Moreover, the cognitive user compresses its channel observation using Wyner-Ziv coding and splits the index of its compressed signal. Then, the cognitive user having common information to both receivers and private information to each of them, jointly... 

    Multi-user opportunistic spectrum access with channel impairments [electronic resource]

    , Article AEU - International Journal of Electronics and Communications ; Volume 67, Issue 11, November 2013, Pages 955–966 Majd, A. (Sayyed Arash) ; Salehkalybar, S ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    In this paper, we study the impact of sensing error and channel fading on the decision process of a multiple secondary user network in a primary network whose channel occupancy states are modelled as a Bernoulli process. We present a randomized access strategy to maximize total secondary network throughput. The proposed method guarantees that the probability of collision between primary and secondary users in each channel is less than the predefined value of Pc = ξ. To find the optimal access strategy, we formulate secondary network throughput as an optimization problem. Then, using the KKT method to find the solution, we break the original problem into multiple sub-problems. Then, we employ... 

    Performance comparison of the neyman-pearson fusion rule with counting rules for spectrum sensing in cognitive radio

    , Article Iranian Journal of Science and Technology - Transactions of Electrical Engineering ; Volume 36, Issue E1 , 2012 , Pages 1-17 ; 22286179 (ISSN) Mosleh, S ; Tadaion, A. A ; Derakhtian, M ; Aref, M. R ; Sharif University of Technology
    2012
    Abstract
    Distributed spectrum sensing (DSS) is of great importance in Cognitive Radio, especially under fading or shadowing effects. In order to evaluate the performance of a distributed system, it is commonly compared with the centralized system as an upper performance bound. Now the question is whether or not one can obtain a distributed strategy serving as an upper bound to benchmark any distributed strategy, tighter than that of the centralized scheme. Here, we suggest employing the Neyman-Pearson (NP) fusion rule to achieve an upper bound. Furthermore, the analysis of a randomized fusion rule has been provided, which is a long-existing problem in this field. For this purpose, theoretical... 

    Using game theory to battle jammer in control channels of cognitive radio ad hoc networks

    , Article 2016 IEEE International Conference on Communications, ICC 2016, 22 May 2016 through 27 May 2016 ; 2016 ; 9781479966646 (ISBN) Oskoui, M. G ; Khorramshahi, P ; Salehi, J. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Because of opportunistic spectrum access, cognitive radio networks is a promising solution for spectrum scarcity problem. In cognitive radio networks, users need to communicate through control channels in order to cooperate for sharing sensing information, channel sharing and spectrum management. As a result control channels security is of a great importance. If control channels get jammed, network's performance degrades dramatically; therefore, the jammers primary target in cognitive radio networks is to demolish control channels in order to disturb the network's performance. Traditionally hopping sequences were used to battle this problem but considering cognitive radio networks... 

    Interference efficiency: A new metric to analyze the performance of cognitive radio networks

    , Article IEEE Transactions on Wireless Communications ; Volume 16, Issue 4 , 2017 , Pages 2123-2138 ; 15361276 (ISSN) Mili, M. R ; Musavian, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, we develop and analyze a novel performance metric, called interference efficiency, which shows the number of transmitted bits per unit of interference energy imposed on the primary users (PUs) in an underlay cognitive radio network (CRN). Specifically, we develop a framework to maximize the interference efficiency of a CRN with multiple secondary users (SUs) while satisfying target constraints on the average interference power, total transmit power, and minimum ergodic rate for the SUs. In doing so, we formulate a multiobjective optimization problem (MOP) that aims to maximize ergodic sum rate of SUs and to minimize average interference power on the primary receiver. We solve... 

    Spectrally encoded code-division multiple access for cognitive radio networks

    , Article IET Communications ; Vol. 8, Issue. 2 , 2014 , Pages 184-196 ; ISSN: 17518628 Najafi, S ; Shayesteh, M. G ; Sharif University of Technology
    Abstract
    Recent studies have revealed that spectrum congestion is due to the inefficient usage of spectrum against the availability. Cognitive radio is viewed as an approach for improving the utilisation of radio spectrum. The spectrally encoded (spread-time) code-division multiple access (SE-CDMA) technique (which is regarded as the dual of spread spectrum CDMA) is considered and its performance in cognitive radio networks is studied. In cognitive network spectrum, overlay and underlay techniques are employed to enable the primary and secondary users to coexist while improving the overall spectrum efficiency. It is shown that SE-CDMA provides considerable flexibility to design overlay and underlay... 

    Resource allocation using fragmented-spectrum synchronous OFDM-CDMA in cognitive radio networks

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; May , 2014 ; ISBN: 9781479948772 Akhoondi, F ; Poursaeed, O ; Salehi, J. A ; Sharif University of Technology
    Abstract
    This paper presents a fragmented-spectrum synchronous OFDM-CDMA modulation and utilize it as secondary users modulation in a cognitive radio-based network to provide high data rate by efficiently exploiting available spectrum bands in a target spectral range while simultaneously offering multiple-access capability. In particular, given preexisting communications in the spectrum where the system is operating, a channel sensing and estimation method is used to obtain information of subcarrier availability. Given this information, some three-level codes are provided for emerging new cognitive radio users. Furthermore, analytical results of the system performance in a typical cognitive radio... 

    Delay analysis and buffer management for random access in cognitive radio networks

    , Article 2013 Iran Workshop on Communication and Information Theory ; May , 2013 , Page(s): 1 - 6 ; 9781467350235 (ISBN) Salehkaleybar, S ; Majd, S. A ; Pakravan, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we consider a cognitive radio network in which multiple Secondary Users (SUs) contend to access primary network's channels with a random access scheme. Our goal is to analyze SUs' queuing delay performance in terms of mean queue lengths and find a minimum buffer space for which the overflow probability is less than a desired threshold. In general, the considered network can be modeled as a multidimensional Markov chain. However, the enormous state space makes the numerical analysis intractable. Nevertheless, the state space can be reduced to a two-dimensional Markov chain in the symmetric channel condition. By this approach, the optimal contention probability that minimizes... 

    On degrees of freedom of the cognitive mimo two-interfering multiple-access channels

    , Article IEEE Transactions on Vehicular Technology ; Volume 62, Issue 5 , 2013 , Pages 2052-2068 ; 00189545 (ISSN) Ayoughi, S. A ; Nasiri Kenari, M ; Khalaj, B. H ; Sharif University of Technology
    2013
    Abstract
    This paper characterizes the exact spatial Degrees of Freedom (DoF) region of the two-user multiple-input-multiple-output two-interfering multiple-access channels (2-IMACs), which models the uplink transmission in cellular networks, for three scenarios. The first scenario is the 2-IMAC without cognition, for which the achievability is generalized for more than two transmitters in each multiple-access channel. The two-user 2-IMACs' DoF regions are also derived for two different genie-aided cognition scenarios. Here, zero forcing by transmitters and interference alignment are studied in a network with more than two transmitters, whereas previous works dealt with two-transmitter networks. We... 

    A new spectrum sensing method using output analysis of the PFD

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; Volume 60, Issue 6 , 2013 , Pages 366-370 ; 15497747 (ISSN) Vahidpoor, Z ; Fotowat Ahmady, A ; Forooraghi, K ; Atlasbaf, Z ; Sharif University of Technology
    2013
    Abstract
    In this brief, a new blind spectrum sensing method is proposed based on frequency comparison using a phase frequency detector (PFD). The PFD output patterns are utilized in a way to sense the spectrum with no knowledge of incoming signals, noise, or channel parameters. The detection and false alarm error probabilities are analytically calculated for additive white Gaussian noise and sine-wave input and are simulated for different inputs. It is shown that the required detection and false alarm probabilities can be achieved by changing the system parameters. The results show that the proposed method has lower complexity and outperforms the previous single-antenna blind method over flat fading... 

    Distributed multiuser sequential channel sensing schemes in multichannel cognitive radio networks

    , Article IEEE Transactions on Wireless Communications ; Volume 12, Issue 5 , 2013 , Pages 2055-2067 ; 15361276 (ISSN) Shokri Ghadikolaei, H ; Sheikholeslami, F ; Nasiri Kenari, M ; Sharif University of Technology
    2013
    Abstract
    Effective spectrum sensing strategies enable cognitive radios (CRs) to identify and opportunistically transmit on under-utilized spectral resources. In this paper, sequential channel sensing problems for single and multiple secondary users (SUs) networks are effectively modeled through finite state Markovian processes. More specifically, a model for single user case is introduced and its performance is validated through analytical analysis. Then, in order to address multiple SUs case, this model is extended to include the modified p-persistent access (MPPA) protocol. Since the scheme utilized experiences a high level of collision among the SUs, to mitigate the problem appropriately,...