scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Journal on Selected Areas in Communications in 2008"


Journal ArticleDOI
TL;DR: This tutorial provides a broad look at the field of limited feedback wireless communications, and reviews work in systems using various combinations of single antenna, multiple antenna, narrowband, broadband, single-user, and multiuser technology.
Abstract: It is now well known that employing channel adaptive signaling in wireless communication systems can yield large improvements in almost any performance metric. Unfortunately, many kinds of channel adaptive techniques have been deemed impractical in the past because of the problem of obtaining channel knowledge at the transmitter. The transmitter in many systems (such as those using frequency division duplexing) can not leverage techniques such as training to obtain channel state information. Over the last few years, research has repeatedly shown that allowing the receiver to send a small number of information bits about the channel conditions to the transmitter can allow near optimal channel adaptation. These practical systems, which are commonly referred to as limited or finite-rate feedback systems, supply benefits nearly identical to unrealizable perfect transmitter channel knowledge systems when they are judiciously designed. In this tutorial, we provide a broad look at the field of limited feedback wireless communications. We review work in systems using various combinations of single antenna, multiple antenna, narrowband, broadband, single-user, and multiuser technology. We also provide a synopsis of the role of limited feedback in the standardization of next generation wireless systems.

1,605 citations


Journal ArticleDOI
Hang Su1, Xi Zhang1
TL;DR: The Markov chain model and the M/GY/1-based queueing model are developed to characterize the performance of the proposed multi-channel MAC protocols under the two types of channel-sensing policies for the saturation network and the non-saturation network scenarios, respectively.
Abstract: We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet scheduling at MAC layer, for the wireless ad hoc networks. Specifically, the MAC protocols enable the secondary users to identify and utilize the leftover frequency spectrum in a way that constrains the level of interference to the primary users. In our proposed protocols, each secondary user is equipped with two transceivers. One transceiver is tuned to the dedicated control channel, while the other is designed specifically as a cognitive radio that can periodically sense and dynamically use the identified un-used channels. To obtain the channel state accurately, we propose two collaborative channel spectrum-sensing policies, namely, the random sensing policy and the negotiation-based sensing policy, to help the MAC protocols detect the availability of leftover channels. Under the random sensing policy, each secondary user just randomly selects one of the channels for sensing. On the other hand, under the negotiation-based sensing policy, different secondary users attempt to select the distinct channels to sense by overhearing the control packets over the control channel. We develop the Markov chain model and the M/GY/1-based queueing model to characterize the performance of our proposed multi-channel MAC protocols under the two types of channel-sensing policies for the saturation network and the non-saturation network scenarios, respectively. In the non-saturation network case, we quantitatively identify the tradeoff between the aggregate traffic throughput and the packet transmission delay, which can provide the insightful guidelines to improve the delay-QoS provisionings over cognitive radio wireless networks.

779 citations


Journal ArticleDOI
TL;DR: A transmitter verification scheme, called LocDef (localization-based defense), which verifies whether a given signal is that of an incumbent transmitter by estimating its location and observing its signal characteristics, and suggests that LocDef is effective in identifying PUE attacks under certain conditions.
Abstract: Cognitive radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in licensed spectrum bands while causing no interference to incumbent communications. Spectrum sensing is one of the essential mechanisms of CRs and its operational aspects are being investigated actively. However, the security aspects of spectrum sensing have garnered little attention. In this paper, we identify a threat to spectrum sensing, which we call the primary user emulation (PUE) attack. In this attack, an adversary's CR transmits signals whose characteristics emulate those of incumbent signals. The highly flexible, software-based air interface of CRs makes such an attack possible. Our investigation shows that a PUE attack can severely interfere with the spectrum sensing process and significantly reduce the channel resources available to legitimate unlicensed users. To counter this threat, we propose a transmitter verification scheme, called LocDef (localization-based defense), which verifies whether a given signal is that of an incumbent transmitter by estimating its location and observing its signal characteristics. To estimate the location of the signal transmitter, LocDef employs a non-interactive localization scheme. Our security analysis and simulation results suggest that LocDef is effective in identifying PUE attacks under certain conditions.

695 citations


Journal ArticleDOI
TL;DR: A hardware-constrained cognitive MAC, HC-MAC, is proposed to conduct efficient spectrum sensing and spectrum access decision in ad hoc cognitive radio networks while taking the hardware constraints into consideration.
Abstract: Radio spectrum resource is of fundamental importance for wireless communication. Recent reports show that most available spectrum has been allocated. While some of the spectrum bands (e.g., unlicensed band, GSM band) have seen increasingly crowded usage, most of the other spectrum resources are underutilized. This drives the emergence of open spectrum and dynamic spectrum access concepts, which allow unlicensed users equipped with cognitive radios to opportunistically access the spectrum not used by primary users. Cognitive radio has many advanced features, such as agilely sensing the existence of primary users and utilizing multiple spectrum bands simultaneously. However, in practice such capabilities are constrained by hardware cost. In this paper, we discuss how to conduct efficient spectrum management in ad hoc cognitive radio networks while taking the hardware constraints (e.g., single radio, partial spectrum sensing and spectrum aggregation limit) into consideration. A hardware-constrained cognitive MAC, HC-MAC, is proposed to conduct efficient spectrum sensing and spectrum access decision. We identify the issue of optimal spectrum sensing decision for a single secondary transmission pair, and formulate it as an optimal stopping problem. A decentralized MAC protocol is then proposed for the ad hoc cognitive radio networks. Simulation results are presented to demonstrate the effectiveness of our proposed protocol.

674 citations


Journal ArticleDOI
TL;DR: Analysis and numerical results show that spectrum leasing based on trading secondary spectrum access for cooperation is a promising framework for cognitive radio.
Abstract: The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resource by allowing the coexistence of licensed (primary) and unlicensed (secondary) users in the same bandwidth. According to the property-rights model of cognitive radio, the primary terminals own a given bandwidth and may decide to lease it for a fraction of time to secondary nodes in exchange for appropriate remuneration. In this paper, we propose and analyze an implementation of this framework, whereby a primary link has the possibility to lease the owned spectrum to an ad hoc network of secondary nodes in exchange for cooperation in the form of distributed space-time coding. On one hand, the primary link attempts to maximize its quality of service in terms of either rate or probability of outage, accounting for the possible contribution from cooperation. On the other hand, nodes in the secondary ad hoc network compete among themselves for transmission within the leased time-slot following a distributed power control mechanism. The investigated model is conveniently cast in the framework of Stackelberg games. We consider both a baseline scenario with full channel state information and information-theoretic transmission strategies, and a more practical model with long-term channel state information and randomized distributed space-time coding. Analysis and numerical results show that spectrum leasing based on trading secondary spectrum access for cooperation is a promising framework for cognitive radio.

614 citations


Journal ArticleDOI
TL;DR: How cyclostationary signatures can be exploited to overcome a number of the challenges associated with network coordination in emerging cognitive radio applications and spectrum sharing regimes is demonstrated.
Abstract: We define a cyclostationary signature as a feature which may be intentionally embedded in a digital communications signal, detected through cyclostationary analysis and used as a unique identifier. The purpose of this paper is to demonstrate how cyclostationary signatures can be exploited to overcome a number of the challenges associated with network coordination in emerging cognitive radio applications and spectrum sharing regimes. In particular we show their uses for signal detection, network identification and rendezvous and discuss these in the context of dynamic spectrum access. We present a theoretical discussion followed by application-oriented examples of the cyclostationary signatures used in practical cognitive radio and dynamic spectrum usage scenarios. We focus on orthogonal frequency division multiplexing (OFDM) based systems and present an analysis of a transceiver implementation employing these techniques developed on a cognitive radio test platform.

592 citations


Journal ArticleDOI
TL;DR: A repeated game among primary service providers is formulated to show that the collusion can be maintained if all of thePrimary service providers are aware of this punishment mechanism, and therefore, properly weight their profits to be obtained in the future.
Abstract: We address the problem of spectrum pricing in a cognitive radio network where multiple primary service providers compete with each other to offer spectrum access opportunities to the secondary users. By using an equilibrium pricing scheme, each of the primary service providers aims to maximize its profit under quality of service (QoS) constraint for primary users. We formulate this situation as an oligopoly market consisting of a few firms and a consumer. The QoS degradation of the primary services is considered as the cost in offering spectrum access to the secondary users. For the secondary users, we adopt a utility function to obtain the demand function. With a Bertrand game model, we analyze the impacts of several system parameters such as spectrum substitutability and channel quality on the Nash equilibrium (i.e., equilibrium pricing adopted by the primary services). We present distributed algorithms to obtain the solution for this dynamic game. The stability of the proposed dynamic game algorithms in terms of convergence to the Nash equilibrium is studied. However, the Nash equilibrium is not efficient in the sense that the total profit of the primary service providers is not maximized. An optimal solution to gain the highest total profit can be obtained. A collusion can be established among the primary services so that they gain higher profit than that for the Nash equilibrium. However, since one or more of the primary service providers may deviate from the optimal solution, a punishment mechanism may be applied to the deviating primary service provider. A repeated game among primary service providers is formulated to show that the collusion can be maintained if all of the primary service providers are aware of this punishment mechanism, and therefore, properly weight their profits to be obtained in the future.

557 citations


Journal ArticleDOI
TL;DR: It is proved that optimizing the consensus matrix for fastest convergence and using the centralized optimal gain is not necessarily the optimal strategy if the number of exchanged messages per sampling time is small.
Abstract: In this paper, we consider the problem of estimating the state of a dynamical system from distributed noisy measurements. Each agent constructs a local estimate based on its own measurements and on the estimates from its neighbors. Estimation is performed via a two stage strategy, the first being a Kalman-like measurement update which does not require communication, and the second being an estimate fusion using a consensus matrix. In particular we study the interaction between the consensus matrix, the number of messages exchanged per sampling time, and the Kalman gain for scalar systems. We prove that optimizing the consensus matrix for fastest convergence and using the centralized optimal gain is not necessarily the optimal strategy if the number of exchanged messages per sampling time is small. Moreover, we show that although the joint optimization of the consensus matrix and the Kalman gain is in general a non-convex problem, it is possible to compute them under some relevant scenarios. We also provide some numerical examples to clarify some of the analytical results and compare them with alternative estimation strategies.

515 citations


Journal ArticleDOI
TL;DR: SocialCast is proposed, a routing framework for publish-subscribe that exploits predictions based on metrics of social interaction to identify the best information carriers and shows that prediction of colocation and node mobility allow for maintaining a very high and steady event delivery with low overhead and latency.
Abstract: Applications involving the dissemination of information directly relevant to humans (e.g., service advertising, news spreading, environmental alerts) often rely on publish-subscribe, in which the network delivers a published message only to the nodes whose subscribed interests match it. In principle, publish- subscribe is particularly useful in mobile environments, since it minimizes the coupling among communication parties. However, to the best of our knowledge, none of the (few) works that tackled publish-subscribe in mobile environments has yet addressed intermittently-connected human networks. Socially-related people tend to be co-located quite regularly. This characteristic can be exploited to drive forwarding decisions in the interest-based routing layer supporting the publish-subscribe network, yielding not only improved performance but also the ability to overcome high rates of mobility and long-lasting disconnections. In this paper we propose SocialCast, a routing framework for publish-subscribe that exploits predictions based on metrics of social interaction (e.g., patterns of movements among communities) to identify the best information carriers. We highlight the principles underlying our protocol, illustrate its operation, and evaluate its performance using a mobility model based on a social network validated with real human mobility traces. The evaluation shows that prediction of colocation and node mobility allow for maintaining a very high and steady event delivery with low overhead and latency, despite the variation in density, number of replicas per message or speed.

513 citations


Journal ArticleDOI
TL;DR: It is expected that key management, handling of congestion, multicasting capability, and routing will remain active areas of research and development, and that DTN may continue to be an active research endeavor for at least the next few years.
Abstract: We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a focus on deep space to a broader class of heterogeneous networks that may suffer disruptions, affected design decisions spanning naming and addressing, message formats, data encoding methods, routing, congestion management and security. Having now achieved relative stability with the design, additional experience is required in long-running operational environments in order to fine tune our understanding of DTN concepts and the types of capabilities that are worth the investment in implementation complexity. We expect key management, handling of congestion, multicasting capability, and routing to remain active areas of research and development, and that DTN may continue to be an active research endeavor for at least the next few years.

470 citations


Journal ArticleDOI
TL;DR: This paper studies single-input multiple output multiple access multiple access channels (SIMO-MAC) for the CR network, and proposed algorithms to derive the optimal power allocation solution and numerical simulations to compare the performances of different power allocation schemes.
Abstract: A cognitive radio (CR) network refers to a secondary network operating in a frequency band originally licensed/allocated to a primary network consisting of one or multiple primary users (PUs). A fundamental challenge for realizing such a system is to ensure the quality of service (QoS) of the PUs as well as to maximize the throughput or ensure the QoS, such as signal-to-interference-plus-noise ratios (SINRs), of the secondary users (SUs). In this paper, we study single-input multiple output multiple access channels (SIMO-MAC) for the CR network. Subject to interference constraints for the PUs as well as peak power constraints for the SUs, two optimization problems involving a joint beamforming and power allocation for the CR network are considered: the sum-rate maximization problem and the SINR balancing problem. For the sum-rate maximization problem, zero-forcing based decision feedback equalizers are used to decouple the SIMO-MAC, and a capped multi-level (CML) water-filling algorithm is proposed to maximize the achievable sum-rate of the SUs for the single PU case. When multiple PUs exist, a recursive decoupled power allocation algorithm is proposed to derive the optimal power allocation solution. For the SINR balancing problem, it is shown that, using linear minimum mean-square-error receivers, each of the interference constraints and peak power constraints can be completely decoupled, and thus the multi-constraint optimization problem can be solved through multiple single-constraint sub-problems. Theoretical analysis for the proposed algorithms is presented, together with numerical simulations which compare the performances of different power allocation schemes.

Journal ArticleDOI
TL;DR: This presentation will focus on random algorithms, reviewing some algorithms present in the literature and proposing some new ones, and establishing some probabilistic concentration results which will give a stronger significance to previous results.
Abstract: Various randomized consensus algorithms have been proposed in the literature. In some case randomness is due to the choice of a randomized network communication protocol. In other cases, randomness is simply caused by the potential unpredictability of the environment in which the distributed consensus algorithm is implemented. Conditions ensuring the convergence of these algorithms have already been proposed in the literature. As far as the rate of convergence of such algorithms, two approaches can be proposed. One is based on a mean square analysis, while a second is based on the concept of Lyapunov exponent. In this paper, by some concentration results, we prove that the mean square convergence analysis is the right approach when the number of agents is large. Differently from the existing literature, in this paper we do not stick to average preserving algorithms. Instead, we allow to reach consensus at a point which may differ from the average of the initial states. The advantage of such algorithms is that they do not require bidirectional communication among agents and thus they apply to more general contexts. Moreover, in many important contexts it is possible to prove that the displacement from the initial average tends to zero, when the number of agents goes to infinity.

Journal ArticleDOI
TL;DR: It is argued that there is a fundamental need for base station cooperation when performing spectrum sharing with multiple transmit antennas, and compute numerically the Nash bargaining solution, which is a likely resolution of the resource conflict assuming that the players are rational.
Abstract: We consider the problem of coordinating two competing multiple-antenna wireless systems (operators) that operate in the same spectral band. We formulate a rate region which is achievable by scalar coding followed by power allocation and beamforming. We show that all interesting points on the Pareto boundary correspond to transmit strategies where both systems use the maximum available power. We then argue that there is a fundamental need for base station cooperation when performing spectrum sharing with multiple transmit antennas. More precisely, we show that if the systems do not cooperate, there is a unique Nash equilibrium which is inefficient in the sense that the achievable rate is bounded by a constant, regardless of the available transmit power. An extension of this result to the case where the receivers use successive interference cancellation (SIC) is also provided. Next we model the problem of agreeing on beamforming vectors as a non-transferable utility (NTU) cooperative gametheoretic problem, with the two operators as players. Specifically we compute numerically the Nash bargaining solution, which is a likely resolution of the resource conflict assuming that the players are rational. Numerical experiments indicate that selfish but cooperating operators may achieve a performance which is close to the maximum-sum-rate bound.

Journal ArticleDOI
TL;DR: Two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion are proposed and the existence and uniqueness of the Nash Equilibrium are proved.
Abstract: Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.

Journal ArticleDOI
TL;DR: This work considers a limited feedback system where each receiver knows its channel perfectly, but the transmitter is only provided with a finite number of channel feedback bits from each receiver, and quantizes the throughput loss due to imperfect channel knowledge as a function of the feedback level.
Abstract: Block diagonalization is a linear preceding technique for the multiple antenna broadcast (downlink) channel that involves transmission of multiple data streams to each receiver such that no multi-user interference is experienced at any of the receivers. This low-complexity scheme operates only a few dB away from capacity but requires very accurate channel knowledge at the transmitter. We consider a limited feedback system where each receiver knows its channel perfectly, but the transmitter is only provided with a finite number of channel feedback bits from each receiver. Using a random quantization argument, we quantify the throughput loss due to imperfect channel knowledge as a function of the feedback level. The quality of channel knowledge must improve proportional to the SNR in order to prevent interference-limitations, and we show that scaling the number of feedback bits linearly with the system SNR is sufficient to maintain a bounded rate loss. Finally, we compare our quantization strategy to an analog feedback scheme and show the superiority of quantized feedback.

Journal ArticleDOI
TL;DR: A near-optimal algorithm is designed to solve the important problem of multi-hop networking with CR nodes based on a novel sequential fixing procedure, where the integer variables are determined iteratively via a sequence of linear programs.
Abstract: Cognitive radio (CR) capitalizes advances in signal processing and radio technology and is capable of reconfiguring RF and switching to desired frequency bands. It is a frequency-agile data communication device that is vastly more powerful than recently proposed multi-channel multi-radio (MC-MR) technology. In this paper, we investigate the important problem of multi-hop networking with CR nodes. For such a network, each node has a pool of frequency bands (typically of unequal size) that can be used for communication. The potential difference in the bandwidth among the available frequency bands prompts the need to further divide these bands into sub-bands for optimal spectrum sharing. We characterize the behavior and constraints for such a multi-hop CR network from multiple layers, including modeling of spectrum sharing and sub-band division, scheduling and interference constraints, and flow routing. We develop a mathematical formulation with the objective of minimizing the required network-wide radio spectrum resource for a set of user sessions. Since the formulated model is a mixed-integer non-linear program (MINLP), which is NP-hard in general, we develop a lower bound for the objective by relaxing the integer variables and using a linearization technique. Subsequently, we design a near-optimal algorithm to solve this MINLP problem. This algorithm is based on a novel sequential fixing procedure, where the integer variables are determined iteratively via a sequence of linear programs. Simulation results show that solutions obtained by this algorithm are very close to the lower bounds obtained via the proposed relaxation, thus suggesting that the solution produced by the algorithm is near-optimal.

Journal ArticleDOI
TL;DR: This paper presents the modeling of an underwater wireless optical communication channel using the vector radiative transfer theory, and investigates the polarization behavior of light in the underwater environment, showing the significance of the cross-polarization component when the light encounters more scattering.
Abstract: This paper presents the modeling of an underwater wireless optical communication channel using the vector radiative transfer theory. The vector radiative transfer equation captures the multiple scattering nature of natural water, and also includes the polarization behavior of light. Light propagation in an underwater environment encounters scattering effect creating dispersion which introduces inter-symbol-interference to the data communication. The attenuation effect further reduces the signal to noise ratio. Both scattering and absorption have adverse effects on underwater data communication. Using a channel model based on radiative transfer theory, we can quantify the scattering effect as a function of distance and bit rate by numerical Monte Carlo simulations. We also investigate the polarization behavior of light in the underwater environment, showing the significance of the cross-polarization component when the light encounters more scattering.

Journal ArticleDOI
TL;DR: A low-complexity detector which achieves uncoded near-exponential diversity performance for hundreds of antennas with an average per-bit complexity of just O(NtNr), where Nt and Nr denote the number of transmit and receive antennas, respectively is presented.
Abstract: We consider large MIMO systems, where by 'large' we mean number of transmit and receive antennas of the order of tens to hundreds. Such large MIMO systems will be of immense interest because of the very high spectral efficiencies possible in such systems. We present a low-complexity detector which achieves uncoded near-exponential diversity performance for hundreds of antennas (i.e., achieves near SISO AWGN performance in a large MIMO fading environment) with an average per-bit complexity of just O(NtNr), where Nt and Nr denote the number of transmit and receive antennas, respectively. With an outer turbo code, the proposed detector achieves good coded bit error performance as well. For example, in a 600 transmit and 600 receive antennas V-BLAST system with a high spectral efficiency of 450 bps/Hz (using BPSK and rate-3/4 turbo code), our simulation results show that the proposed detector performs to within about 7 dB from capacity. This practical feasibility of the proposed high-performance, low-complexity detector could potentially trigger wide interest in the theory and implementation of large MIMO systems. We also illustrate the applicability of the proposed detector in the low-complexity detection of high-rate, non-orthogonal space-time block codes and large multicarrier CDMA (MC-CDMA) systems. In large MC-CDMA systems with hundreds of users, the proposed detector is shown to achieve near single-user performance at an average per-bit complexity linear in number of users, which is quite appealing for its use in practical CDMA systems.

Journal ArticleDOI
TL;DR: A cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint is designed and it is shown that optimal CMA admits structured solutions, simplifying practical implementations.
Abstract: In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is characterized by measurement and coexistence is enhanced by predicting the WLAN's behavior based on a continuous-time Markov chain model. Cognitive medium access (CMA) is derived from this model by recasting the problem as one of constrained Markov decision processes. Solutions are obtained by linear programming. Furthermore, we show that optimal CMA admits structured solutions, simplifying practical implementations. Preliminary results for the partially observable case are presented. The performance of the proposed schemes is evaluated for a typical WLAN coexistence setup and shows a significant performance improvement.

Journal ArticleDOI
TL;DR: A unified view of the state-of- the-art results is provided, showing that most of the techniques proposed in the literature to study the game, even though apparently different, can be unified using the recent interpretation of the waterfilling operator as a projection onto a proper polyhedral set.
Abstract: This paper considers the noncooperative maximization of mutual information in the Gaussian interference channel in a fully distributed fashion via game theory. This problem has been studied in a number of papers during the past decade for the case of frequency-selective channels. A variety of conditions guaranteeing the uniqueness of the Nash Equilibrium (NE) and convergence of many different distributed algorithms have been derived. In this paper we provide a unified view of the state-of- the-art results, showing that most of the techniques proposed in the literature to study the game, even though apparently different, can be unified using our recent interpretation of the waterfilling operator as a projection onto a proper polyhedral set. Based on this interpretation, we then provide a mathematical framework, useful to derive a unified set of sufficient conditions guaranteeing the uniqueness of the NE and the global convergence of waterfilling based asynchronous distributed algorithms. The proposed mathematical framework is also instrumental to study the extension of the game to the more general MIMO case, for which only few results are available in the current literature. The resulting algorithm is, similarly to the frequency-selective case, an iterative asynchronous MIMO waterfilling algorithm. The proof of convergence hinges again on the interpretation of the MIMO waterfilling as a matrix projection, which is the natural generalization of our results obtained for the waterfilling mapping in the frequency-selective case.

Journal ArticleDOI
TL;DR: A new approach for spectrum sensing is devised without any change to the working of existing de facto mesh protocols, and an analytical model is proposed that allows MRs to estimate the power in a given channel and location due to neighboring wireless LAN traffic, thus creating a virtual map in space and frequency domains.
Abstract: Wireless Mesh Networks (WMNs) are envisaged to extend Internet access and other networking services in personal, local, campus, and metropolitan areas. Mesh routers (MR) form the connectivity backbone while performing the dual tasks of packet forwarding as well as providing network access to the mesh clients. However, the performance of such networks is limited by traffic congestion, as only limited bandwidth is available for supporting the large number of nodes in close proximity. This problem can be alleviated by the cognitive radio paradigm that aims at devising spectrum sensing and management techniques, thereby allowing radios to intelligently locate and use frequencies other than those in the 2.4 GHz ISM band. These promising technologies are integrated in our proposed Cognitive Mesh NETwork (COMNET) algorithmic framework, thus realizing an intelligent frequency-shifting self-managed mesh network. The contribution of this paper is threefold: (1) A new approach for spectrum sensing is devised without any change to the working of existing de facto mesh protocols. (2) An analytical model is proposed that allows MRs to estimate the power in a given channel and location due to neighboring wireless LAN traffic, thus creating a virtual map in space and frequency domains. (3) These models are used to formulate the task of channel assignment within the mesh network as an optimization problem, which is solved in a decentralized manner. Our analytical models are validated through simulation study, and results reveal the benefits of load sharing by adopting unused frequencies for WMN traffic.

Journal ArticleDOI
TL;DR: The CFNC approach is general enough to allow for transmissions from sources to a common destination as well as simultaneous information exchanges among sources, and achieves full diversity gain regardless of the underlying signal-to-noise-ratio and the constellation used.
Abstract: Multi-source relay-based cooperative communications can achieve spatial diversity gains, enhance coverage and potentially increase capacity when multiuser detection is used to effect maximum likelihood demodulation. If considered for large networks, traditional relaying entails loss in spectral efficiency that can be mitigated through network coding at the physical layer. These considerations motivate the complex field network coding (CFNC) approach introduced in this paper. Different from network coding over the Galois field, where wireless throughput is limited as the number of sources increases, CFNC always achieves throughput as high as 1/2 symbol per source per channel use. In addition to improved throughput, CFNC- based relaying achieves full diversity gain regardless of the underlying signal-to-noise-ratio (SNR) and the constellation used. Furthermore, the CFNC approach is general enough to allow for transmissions from sources to a common destination as well as simultaneous information exchanges among sources.

Journal ArticleDOI
TL;DR: It is shown that the source and the relay should map their signals to the dominant right singular vectors of the source-relay and relay-destination channels, and the appropriateness of Grassmannian codebooks for quantizing the optimal source beamforming vector based on its distribution is justified.
Abstract: We consider the problem of beamforming codebook design for limited feedback half-duplex multiple-input multiple output (MIMO) amplify-and-forward (AF) relay system. In the first part of the paper, the direct link between the source and the destination is ignored. Assuming perfect channel state information (CSI), we show that the source and the relay should map their signals to the dominant right singular vectors of the source-relay and relay-destination channels. For the limited feedback scenario, we prove the appropriateness of Grassmannian codebooks as the source and relay beamforming codebooks based on the distributions of the optimal source and relay beamforming vectors. In the second part of the paper, the direct link is considered in the problem model. Assuming perfect CSI, we derive the optimization problem that identifies the optimal source beamforming vector and show that the solution to this problem is uniformly distributed on the unit sphere for independent and identically distributed (i.i.d) Rayleigh channels. For the limited feedback scenario, we justify the appropriateness of Grassmannian codebooks for quantizing the optimal source beamforming vector based on its distribution. Finally, a modified quantization scheme is presented, which introduces a negligible penalty in the system performance but significantly reduces the required number of feedback bits.

Journal ArticleDOI
TL;DR: This paper devise relay selection methods to recover the multiplexing loss in decode-and-forward (DF) relay networks, while requiring very little feedback (merely bits/relay), which is a marked improvement over previous DF methods.
Abstract: This paper addresses the multiplexing loss that occurs in relay networks due to causality of relays and the half-duplex constraint. We devise relay selection methods to recover the multiplexing loss in decode-and-forward (DF) relay networks, while requiring very little feedback (merely bits/relay). Two network topologies are studied: First the case is considered where a direct link is available between the source and destination, in addition to the relayed links. For this configuration, an incremental transmission scheme is proposed, and comprehensively analyzed, which uses limited feedback to improve both diversity as well as multiplexing gain. Then, the case without a direct link is considered, for which efficient non-orthogonal DF protocols are produced and analyzed. An interesting feature of the latter methods is unequal error protection capability via a family of embedded diversity-multiplexing (DMT) curves, which can be very useful for practical applications. Even considering this method's minimal DMT, a marked improvement over previous DF methods is observed, especially in high spectral efficiencies.

Journal ArticleDOI
TL;DR: To enable practical implementation, a new limited feedback algorithm is proposed that exploits the structure of the algorithm to avoid full channel quantization and performs close to the sum capacity of the MIMO broadcast channel even with limited feedback.
Abstract: In this paper, we propose a new joint optimization of linear transmit beamforming and receive combining vectors for the multiple-input multiple-output (MIMO) broadcast channel. We consider the transmission of a single information stream to two users with two or more receive antennas. Unlike past work in which iterative computation is required to design the beamformers, we derive specific formulations for the transmit beamformers for two active users via a power iteration and a generalized eigen analysis. To enable practical implementation, a new limited feedback algorithm is proposed that exploits the structure of the algorithm to avoid full channel quantization. The feedback overhead of the proposed algorithm is independent of the number of receive antennas. Monte Carlo simulations are used to evaluate the bit error rate and the sum rate performances of the proposed algorithm. Simulation results show that the proposed method performs close to the sum capacity of the MIMO broadcast channel even with limited feedback.

Journal ArticleDOI
TL;DR: A new paradigm of CDMA with sparse spreading sequences enables near-optimal multiuser detection using belief propagation (BP) with low-complexity, and it is shown that BP-based detection is optimal in the large-system limit under many practical circumstances.
Abstract: Code-division multiple access (CDMA) is the basis of a family of advanced air interfaces in current and future generation networks. The benefits promised by CDMA have not been fully realized partly due to the prohibitive complexity of optimal detection and decoding of many users communicating simultaneously using the same frequency band. From both theoretical and practical perspectives, this paper advocates a new paradigm of CDMA with sparse spreading sequences, which enables near-optimal multiuser detection using belief propagation (BP) with low-complexity. The scheme is in part inspired by capacity-approaching low-density parity-check (LDPC) codes and the success of iterative decoding techniques. Specifically, it is shown that BP-based detection is optimal in the large-system limit under many practical circumstances, which is a unique advantage of sparsely spread CDMA systems. Moreover, it is shown that, from the viewpoint of an individual user, the CDMA channel is asymptotically equivalent to a scalar Gaussian channel with some degradation in the signal-to-noise ratio (SNR). The degradation factor, known as the multiuser efficiency, can be determined from a fixed-point equation. The results in this paper apply to a broad class of sparse, semi-regular CDMA systems with arbitrary input and power distribution. Numerical results support the theoretical findings for systems of moderate size, which further demonstrate the appeal of sparse spreading in practical applications.

Journal ArticleDOI
TL;DR: It is shown that the capacity of wireless communication systems can be increased using compact parasitic antenna architectures and a single RF front end at the transmitter, thus paving the way for integrating MIMO systems in cost and size sensitive wireless devices such as mobile terminals and mobile personal digital assistants.
Abstract: In this paper we introduce a new perspective to the implementation of wireless MIMO transmission systems with increased bandwidth efficiency. Unlike traditional spatial multiplexing techniques in MIMO systems, where additional information can be sent through the wireless channel by feeding uncorrelated antenna elements with diverse bitstreams, we use the idea of mapping diverse bitstreams onto orthogonal bases defined in the beamspace domain of the transmitting array far-field region. Using this approach we show that we can increase the capacity of wireless communication systems using compact parasitic antenna architectures and a single RF front end at the transmitter, thus paving the way for integrating MIMO systems in cost and size sensitive wireless devices such as mobile terminals and mobile personal digital assistants.

Journal ArticleDOI
TL;DR: A class of energy-efficient routing protocols for underwater sensor networks are designed based on the insights gained in an in-depth analysis of the impacts of fundamental differences between underwater acoustic propagation and terrestrial radio propagation.
Abstract: Interest in underwater acoustic networks has grown rapidly with the desire to monitor the large portion of the world covered by oceans. Fundamental differences between underwater acoustic propagation and terrestrial radio propagation may call for new criteria for the design of networking protocols. In this paper, we focus on some of these fundamental differences, including attenuation and noise, propagation delays, and the dependence of usable bandwidth and transmit power on distance (which has not been extensively considered before in protocol design studies). Furthermore, the relationship between the energy consumptions of acoustic modems in various modes (i.e., transmit, receive, and idle) is different than that of their terrestrial radio counterparts, which also impacts the design of energy-efficient protocols. The main contribution of this work is an in-depth analysis of the impacts of these unique relationships. We present insights that are useful in guiding both protocol design and network deployment. We design a class of energy-efficient routing protocols for underwater sensor networks based on the insights gained in our analysis. These protocols are tested in a number of relevant network scenarios, and shown to significantly outperform other commonly used routing strategies and to provide near optimal total path energy consumption. Finally, we implement in ns2 a detailed model of the underwater acoustic channel, and study the performance of routing choices when used with a simple MAC protocol and a realistic PHY model, with special regard to such issues as interference and medium access.

Journal ArticleDOI
TL;DR: In connected networks with time-invariant topologies, this work uses observability theory to show that after running the linear iteration for a finite number of time-steps with almost any choice of weight matrix, each node obtains enough information to calculate any arbitrary function of the initial node values.
Abstract: Given an arbitrary network of interconnected nodes, we develop and analyze a distributed strategy that enables a subset of the nodes to calculate any given function of the node values. Our scheme utilizes a linear iteration where, at each time-step, each node updates its value to be a weighted average of its own previous value and those of its neighbors. We show that this approach can be viewed as a linear dynamical system, with dynamics that are given by the weight matrix of the linear iteration, and with outputs for each node that are captured by the set of values that are available to that node at each time-step. In connected networks with time-invariant topologies, we use observability theory to show that after running the linear iteration for a finite number of time-steps with almost any choice of weight matrix, each node obtains enough information to calculate any arbitrary function of the initial node values. The problem of distributed consensus via linear iterations, where all nodes in the network calculate the same function, is treated as a special case of our approach. In particular, our scheme allows nodes in connected networks with time-invariant topologies to reach consensus on any arbitrary function of the initial node values in a finite number of steps for almost any choice of weight matrix.

Journal ArticleDOI
Ji Zhu1, K.J.R. Liu1
TL;DR: This paper proposes a pricing-based collusion-resistant dynamic spectrum allocation approach to optimize overall spectrum efficiency, while not only keeping the participating incentives of the selfish users but also combating possible user collusion.
Abstract: In order to fully utilize scarce spectrum resources, dynamic spectrum allocation becomes a promising approach to increase the spectrum efficiency for wireless networks. However, the collusion among selfish network users may seriously deteriorate the efficiency of dynamic spectrum sharing. The network users' behaviors and dynamics need to be taken into consideration for efficient and robust spectrum allocation. In this paper, we model the spectrum allocation in wireless networks with multiple selfish legacy spectrum holders and unlicensed users as multi-stage dynamic games. In order to combat user collusion, we propose a pricing-based collusion-resistant dynamic spectrum allocation approach to optimize overall spectrum efficiency, while not only keeping the participating incentives of the selfish users but also combating possible user collusion. The simulation results show that the proposed scheme achieves high efficiency of spectrum usage even with the presence of severe user collusion.