scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Journal on Selected Areas in Communications in 2011"


Journal ArticleDOI
TL;DR: The Internet Topology Zoo is a store of network data created from the information that network operators make public, and is the most accurate large-scale collection of network topologies available, and includes meta-data that couldn't have been measured.
Abstract: The study of network topology has attracted a great deal of attention in the last decade, but has been hampered by a lack of accurate data. Existing methods for measuring topology have flaws, and arguments about the importance of these have overshadowed the more interesting questions about network structure. The Internet Topology Zoo is a store of network data created from the information that network operators make public. As such it is the most accurate large-scale collection of network topologies available, and includes meta-data that couldn't have been measured. With this data we can answer questions about network structure with more certainty than ever before - we illustrate its power through a preliminary analysis of the PoP-level topology of over 140 networks. We find a wide range of network designs not conforming as a whole to any obvious model.

1,333 citations


Journal ArticleDOI
TL;DR: In this paper, the authors consider a point-to-point data transmission with an energy harvesting transmitter which has a limited battery capacity, communicating in a wireless fading channel, and they consider two objectives: maximizing the throughput by a deadline, and minimizing the transmission completion time of the communication session.
Abstract: Wireless systems comprised of rechargeable nodes have a significantly prolonged lifetime and are sustainable. A distinct characteristic of these systems is the fact that the nodes can harvest energy throughout the duration in which communication takes place. As such, transmission policies of the nodes need to adapt to these harvested energy arrivals. In this paper, we consider optimization of point-to-point data transmission with an energy harvesting transmitter which has a limited battery capacity, communicating in a wireless fading channel. We consider two objectives: maximizing the throughput by a deadline, and minimizing the transmission completion time of the communication session. We optimize these objectives by controlling the time sequence of transmit powers subject to energy storage capacity and causality constraints. We, first, study optimal offline policies. We introduce a directional water-filling algorithm which provides a simple and concise interpretation of the necessary optimality conditions. We show the optimality of an adaptive directional water-filling algorithm for the throughput maximization problem. We solve the transmission completion time minimization problem by utilizing its equivalence to its throughput maximization counterpart. Next, we consider online policies. We use stochastic dynamic programming to solve for the optimal online policy that maximizes the average number of bits delivered by a deadline under stochastic fading and energy arrival processes with causal channel state feedback. We also propose near-optimal policies with reduced complexity, and numerically study their performances along with the performances of the offline and online optimal policies under various different configurations.

1,130 citations


Journal ArticleDOI
TL;DR: A total cost minimization is formulated that allows for a flexible tradeoff between flow-level performance and energy consumption and a simple greedy-on and greedy-off algorithms are proposed that are inspired by the mathematical background of submodularity maximization problem.
Abstract: Energy-efficiency, one of the major design goals in wireless cellular networks, has received much attention lately, due to increased awareness of environmental and economic issues for network operators. In this paper, we develop a theoretical framework for BS energy saving that encompasses dynamic BS operation and the related problem of user association together. Specifically, we formulate a total cost minimization that allows for a flexible tradeoff between flow-level performance and energy consumption. For the user association problem, we propose an optimal energy-efficient user association policy and further present a distributed implementation with provable convergence. For the BS operation problem (i.e., BS switching on/off), which is a challenging combinatorial problem, we propose simple greedy-on and greedy-off algorithms that are inspired by the mathematical background of submodularity maximization problem. Moreover, we propose other heuristic algorithms based on the distances between BSs or the utilizations of BSs that do not impose any additional signaling overhead and thus are easy to implement in practice. Extensive simulations under various practical configurations demonstrate that the proposed user association and BS operation algorithms can significantly reduce energy consumption.

479 citations


Journal ArticleDOI
TL;DR: This paper designs a monopolist-dominated quality-price contract, which is offered by the PO and contains a set of quality- price combinations each intended for a consumer type, and derives the optimal contract,Which is feasible and maximizes the utility of the PO, for both discrete- consumer-type model and continuous-consumer- type model.
Abstract: Cognitive radio is a promising paradigm to achieve efficient utilization of spectrum resource by allowing the unlicensed users (i.e., secondary users, SUs) to access the licensed spectrum. Market-driven spectrum trading is an efficient way to achieve dynamic spectrum accessing/sharing. In this paper, we consider the problem of spectrum trading with single primary spectrum owner (or primary user, PO) selling his idle spectrum to multiple SUs. We model the trading process as a monopoly market, in which the PO acts as monopolist who sets the qualities and prices for the spectrum he sells, and the SUs act as consumers who choose the spectrum with appropriate quality and price for purchasing. We design a monopolist-dominated quality-price contract, which is offered by the PO and contains a set of quality-price combinations each intended for a consumer type. A contract is feasible if it is incentive compatible (IC) and individually rational (IR) for each SU to purchase the spectrum with the quality-price intended for his type. We propose the necessary and sufficient conditions for the contract to be feasible. We further derive the optimal contract, which is feasible and maximizes the utility of the PO, for both discrete-consumer-type model and continuous-consumer-type model. Moreover, we analyze the social surplus, i.e., the aggregate utility of both PO and SUs, and we find that, depending on the distribution of consumer types, the social surplus under the optimal contract may be less than or close to the maximum social surplus.

407 citations


Journal ArticleDOI
TL;DR: It is shown that by modeling the vehicles as obstacles, significant realism can be added to existing simulators with clear implications on the design of upper layer protocols.
Abstract: A thorough understanding of the communications channel between vehicles is essential for realistic modeling of Vehicular Ad Hoc Networks (VANETs) and the development of related technology and applications. The impact of vehicles as obstacles on vehicle-to-vehicle (V2V) communication has been largely neglected in VANET research, especially in simulations. Useful models accounting for vehicles as obstacles must satisfy a number of requirements, most notably accurate positioning, realistic mobility patterns, realistic propagation characteristics, and manageable complexity. We present a model that satisfies all of these requirements. Vehicles are modeled as physical obstacles affecting the V2V communication. The proposed model accounts for vehicles as three-dimensional obstacles and takes into account their impact on the LOS obstruction, received signal power, and the packet reception rate. We utilize two real world highway datasets collected via stereoscopic aerial photography to test our proposed model, and we confirm the importance of modeling the effects of obstructing vehicles through experimental measurements. Our results show considerable obstruction of LOS due to vehicles. By obstructing the LOS, vehicles induce significant attenuation and packet loss. The algorithm behind the proposed model allows for computationally efficient implementation in VANET simulators. It is also shown that by modeling the vehicles as obstacles, significant realism can be added to existing simulators with clear implications on the design of upper layer protocols.

360 citations


Journal ArticleDOI
TL;DR: In this article, the authors considered the problem of distributed learning and channel access in a cognitive network with multiple secondary users, where the availability statistics of the channels are initially unknown to the secondary users and are estimated using sensing decisions.
Abstract: The problem of distributed learning and channel access is considered in a cognitive network with multiple secondary users. The availability statistics of the channels are initially unknown to the secondary users and are estimated using sensing decisions. There is no explicit information exchange or prior agreement among the secondary users and sensing and access decisions are undertaken by them in a completely distributed manner. We propose policies for distributed learning and access which achieve order-optimal cognitive system throughput (number of successful secondary transmissions) under self play, i.e., when implemented at all the secondary users. Equivalently, our policies minimize the sum regret in distributed learning and access, which is the loss in secondary throughput due to learning and distributed access. For the scenario when the number of secondary users is known to the policy, we prove that the total regret is logarithmic in the number of transmission slots. This policy achieves order-optimal regret based on a logarithmic lower bound for regret under any uniformly-good learning and access policy. We then consider the case when the number of secondary users is fixed but unknown, and is estimated at each user through feedback. We propose a policy whose sum regret grows only slightly faster than logarithmic in the number of transmission slots.

335 citations


Journal ArticleDOI
TL;DR: This work proposes a new statistical model for aggregate interference of a cognitive network, which accounts for the sensing procedure, secondary spatial reuse protocol, and environment-dependent conditions such as path loss, shadowing, and channel fading, and demonstrates the effectiveness of this model in evaluating the system performance of cognitive networks.
Abstract: Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately detect and rapidly react to varying spectrum usage. Therefore, it is important to characterize the effect of cognitive network interference due to such secondary spectrum reuse. In this paper, we propose a new statistical model for aggregate interference of a cognitive network, which accounts for the sensing procedure, secondary spatial reuse protocol, and environment-dependent conditions such as path loss, shadowing, and channel fading. We first derive the characteristic function and cumulants of the cognitive network interference at a primary user. Using the theory of truncated-stable distributions, we then develop the statistical model for the cognitive network interference. We further extend this model to include the effect of power control and demonstrate the use of our model in evaluating the system performance of cognitive networks. Numerical results show the effectiveness of our model for capturing the statistical behavior of the cognitive network interference. This work provides essential understanding of interference for successful deployment of future cognitive networks.

330 citations


Journal ArticleDOI
TL;DR: The proposed stationary policy in the anti-jamming game is shown to achieve much better performance than the policy obtained from myopic learning, which only maximizes each stage's payoff, and a random defense strategy, since it successfully accommodates the environment dynamics and the strategic behavior of the cognitive attackers.
Abstract: Various spectrum management schemes have been proposed in recent years to improve the spectrum utilization in cognitive radio networks. However, few of them have considered the existence of cognitive attackers who can adapt their attacking strategy to the time-varying spectrum environment and the secondary users' strategy. In this paper, we investigate the security mechanism when secondary users are facing the jamming attack, and propose a stochastic game framework for anti-jamming defense. At each stage of the game, secondary users observe the spectrum availability, the channel quality, and the attackers' strategy from the status of jammed channels. According to this observation, they will decide how many channels they should reserve for transmitting control and data messages and how to switch between the different channels. Using the minimax-Q learning, secondary users can gradually learn the optimal policy, which maximizes the expected sum of discounted payoffs defined as the spectrum-efficient throughput. The proposed stationary policy in the anti-jamming game is shown to achieve much better performance than the policy obtained from myopic learning, which only maximizes each stage's payoff, and a random defense strategy, since it successfully accommodates the environment dynamics and the strategic behavior of the cognitive attackers.

310 citations


Journal ArticleDOI
TL;DR: This paper develops a practical framework for obtaining a uniform sample of users in an online social network by crawling its social graph by considering and comparing several candidate crawling techniques and introduces online formal convergence diagnostics to assess sample quality during the data collection process.
Abstract: Our goal in this paper is to develop a practical framework for obtaining a uniform sample of users in an online social network (OSN) by crawling its social graph. Such a sample allows to estimate any user property and some topological properties as well. To this end, first, we consider and compare several candidate crawling techniques. Two approaches that can produce approximately uniform samples are the Metropolis-Hasting random walk (MHRW) and a re-weighted random walk (RWRW). Both have pros and cons, which we demonstrate through a comparison to each other as well as to the "ground truth." In contrast, using Breadth-First-Search (BFS) or an unadjusted Random Walk (RW) leads to substantially biased results. Second, and in addition to offline performance assessment, we introduce online formal convergence diagnostics to assess sample quality during the data collection process. We show how these diagnostics can be used to effectively determine when a random walk sample is of adequate size and quality. Third, as a case study, we apply the above methods to Facebook and we collect the first, to the best of our knowledge, representative sample of Facebook users. We make it publicly available and employ it to characterize several key properties of Facebook.

272 citations


Journal ArticleDOI
TL;DR: This paper focuses on the energy efficiency of a cognitive radio network, in which a secondary user senses the channels licensed to some primary users sequentially before it decides to transmit, and develops an algorithm to find the optimal sensing-access strategies for the original problem.
Abstract: Energy-efficient design has become increasingly important to battery-powered wireless devices. In this paper, we focus on the energy efficiency of a cognitive radio network, in which a secondary user senses the channels licensed to some primary users sequentially before it decides to transmit. Energy is consumed in both the channel sensing and transmission processes. The energy-efficient design calls for a careful design in the sensing-access strategies and the sensing order, with the sensing strategy specifying when to stop sensing and start transmission, the access strategy specifying the power level to be used upon transmission, and the sensing order specifying the sequence of channel sensing. Hence, the objective of this paper is to identify the sensing-access strategies and the sensing order that achieve the maximum energy efficiency. We first investigate the design when the channel sensing order is given and formulate the above design problem as a stochastic sequential decision-making problem. To solve it, we study another parametric formulation of the original problem, which rewards transmission throughput and penalizes energy consumption. Dynamic programming can be applied to identify the optimal strategy for the parametric problem. Then, by exploring the relationship between the two formulations and making use of the monotonicity property of the parametric formulation, we develop an algorithm to find the optimal sensing-access strategies for the original problem. Furthermore, we study the joint design of the channel sensing order and the sensing-access strategies. Lastly, the performance of the proposed designs is evaluated through numerical results.

270 citations


Journal ArticleDOI
Huiling Zhu1
TL;DR: Numerical results show that the average spectrum efficiency per sector and the cell edge spectrum efficiency in the microcellular system are better than those in the DAS without frequency reuse, however, when the frequency reuse is considered in theDAS, the Das outperforms the micro cellular system in both of the average and cell edge Spectrum efficiencies.
Abstract: The microcellular system and distributed antenna system (DAS) are two promising systems for future high data rate wireless communications, since both systems can reduce the radio transmission distance between the transmitter and the receiver. This paper aims to compare the average spectrum efficiency and the cell edge spectrum efficiency between the two cellular systems in the downlink transmission. In order to achieve high spectrum efficiency, frequency reuse and/or spatial diversity are exploited in these two systems. The performances between the two cellular systems are theoretically compared in a network topology with seven macrocells, each of which has seven hexagonal sectors (or microcells). Moreover, the approach of antenna unit selection in the DAS for spatial diversity is presented. Numerical results show that the average spectrum efficiency per sector and the cell edge spectrum efficiency in the microcellular system are better than those in the DAS without frequency reuse. However, when the frequency reuse is considered in the DAS, the DAS outperforms the microcellular system in both of the average and cell edge spectrum efficiencies.

Journal ArticleDOI
TL;DR: This paper studies the multihop packet delivery delay in a low density vehicular ad hoc network (VANET) and presents an analytical framework, which takes into account the randomness of vehicle data traffic and the statistical variation of the disrupted communication channel.
Abstract: This paper studies the multihop packet delivery delay in a low density vehicular ad hoc network (VANET). We address a disrupted vehicle-to-infrastructure communication scenario, where an end-to-end path is unlikely to exist between a vehicle and the nearest road side unit (RSU). We present an analytical framework, which takes into account the randomness of vehicle data traffic and the statistical variation of the disrupted communication channel. Our framework employs the effective bandwidth theory and its dual, the effective capacity concept, in order to obtain the maximum distance between RSUs that stochastically limits the worst case packet delivery delay to a certain bound (i.e., allows only an arbitrarily small fraction of the packets received by the farthest vehicle from the RSU to exceed a required delay bound). Our study also investigates the effect of the vehicle density, transmission range, and speed difference between vehicles on the end-to-end packet delivery delay. Extensive simulation results validate our analytical framework.

Journal ArticleDOI
TL;DR: In this paper, the minimization of transmission completion time for a given number of bits per user in an energy harvesting communication system, where energy harvesting instants are known in an offline manner is considered.
Abstract: The minimization of transmission completion time for a given number of bits per user in an energy harvesting communication system, where energy harvesting instants are known in an offline manner is considered. An achievable rate region with structural properties satisfied by the 2-user AWGN Broadcast Channel capacity region is assumed. It is shown that even though all data are available at the beginning, a non-negative amount of energy from each energy harvest is deferred for later use such that the transmit power starts at its lowest value and rises as time progresses. The optimal scheduler ends the transmission to both users at the same time. Exploiting the special structure in the problem, the iterative offline algorithm, FlowRight, from earlier literature, is adapted and proved to solve this problem. The solution has polynomial complexity in the number of harvests used, and is observed to converge quickly on numerical examples.

Journal ArticleDOI
TL;DR: Simulations are carried out using NS2 to evaluate the performance of the envisioned architecture incorporating the proposed mechanisms, and encouraging results are obtained in terms of high data packet delivery ratios and throughput, reduced control packet overhead, and minimized delay and packet drop rates.
Abstract: Coupling the high data rates of IEEE 802.11p-based VANETs and the wide coverage area of 3GPP networks (e.g., UMTS), this paper envisions a VANET-UMTS integrated network architecture. In this architecture, vehicles are dynamically clustered according to different related metrics. From these clusters, a minimum number of vehicles, equipped with IEEE 802.11p and UTRAN interfaces, are selected as vehicular gateways to link VANET to UMTS. Issues pertaining to gateway selection, gateway advertisement and discovery, service migration between gateways (i.e., when serving gateways lose their optimality) are all addressed and an adaptive mobile gateway management mechanism is proposed. Simulations are carried out using NS2 to evaluate the performance of the envisioned architecture incorporating the proposed mechanisms. Encouraging results are obtained in terms of high data packet delivery ratios and throughput, reduced control packet overhead, and minimized delay and packet drop rates.

Journal ArticleDOI
TL;DR: A distributed CR routing protocol for ad hoc networks (CRP) is proposed that makes the following contributions: explicit protection for PU receivers that are generally not detected during spectrum sensing, allowing multiple classes of routes based on service differentiation in CR networks, and scalable, joint route-spectrum selection.
Abstract: Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operation must not interfere with the transmissions of the licensed or primary users (PUs), and this is generally achieved by incurring a trade-off in the CR network performance. In order to evaluate this trade-off, a distributed CR routing protocol for ad hoc networks (CRP) is proposed that makes the following contributions: (i) explicit protection for PU receivers that are generally not detected during spectrum sensing, (ii) allowing multiple classes of routes based on service differentiation in CR networks, and (iii) scalable, joint route-spectrum selection. A key novelty of CRP is the mapping of spectrum selection metrics, and local PU interference observations to a packet forwarding delay over the control channel. This allows the route formation undertaken over a control channel to capture the environmental and spectrum information for all the intermediate nodes, thereby reducing the computational overhead at the destination. Results reveal the importance of formulating the routing problem from the viewpoint of safeguarding the PU communication, which is a unique feature in CR networks.

Journal ArticleDOI
TL;DR: It is shown by simulations that the derived new power allocation strategies can achieve substantial capacity gains for the secondary user over the conventional methods based on the interference temperature (IT) constraint, with the same resultant primary user outage probability.
Abstract: In this paper, we consider a cognitive radio (CR) network where a secondary (cognitive) user shares the spectrum for transmission with a primary (non-cognitive) user over block-fading (BF) channels. It is assumed that the primary user has a constant-rate, constant-power transmission, while the secondary user is able to adapt transmit power and rate allocation over different fading states based on the channel state information (CSI) of the CR network. We study a new type of constraint imposed over the secondary transmission to protect the primary user by limiting the maximum transmission outage probability of the primary user to be below a desired target. We derive the optimal power allocation strategies for the secondary user to maximize its ergodic/outage capacity, under the average/peak transmit power constraint along with the proposed primary user outage probability constraint. It is shown by simulations that the derived new power allocation strategies can achieve substantial capacity gains for the secondary user over the conventional methods based on the interference temperature (IT) constraint to protect the primary transmission, with the same resultant primary user outage probability.

Journal ArticleDOI
TL;DR: This paper shows that the time-reversal signal transmission is an ideal paradigm for green wireless communications because of its inherent nature to fully harvest energy from the surrounding environment by exploiting the multi-path propagation to re-collect all the signal energy that would have otherwise been lost in most existing communication paradigms.
Abstract: Green wireless communications have received considerable attention recently in hope of finding novel solutions to improve energy efficiency for the ubiquity of wireless applications In this paper, we argue and show that the time-reversal (TR) signal transmission is an ideal paradigm for green wireless communications because of its inherent nature to fully harvest energy from the surrounding environment by exploiting the multi-path propagation to re-collect all the signal energy that would have otherwise been lost in most existing communication paradigms A green wireless technology must ensure low energy consumption and low radio pollution to others than the intended user In this paper, we show through theoretical analysis, numerical simulations and experiment measurements that the TR wireless communications, compared to the conventional direct transmission using a Rake receiver, reveals significant transmission power reduction, achieves high interference alleviation ratio, and exhibits large multi-path diversity gain As such it is an ideal paradigm for the development of green wireless systems The theoretical analysis and numerical simulations show an order of magnitude improvement in terms of transmit power reduction and interference alleviation Experimental measurements in a typical indoor environment also demonstrate that the transmit power with TR based transmission can be as low as 20% of that without TR, and the average radio interference (thus radio pollution) even in a nearby area can be up to 6dB lower A strong time correlation is found to be maintained in the multi-path channel even when the environment is varying, which indicates high bandwidth efficiency can be achieved in TR radio communications

Journal ArticleDOI
TL;DR: In CodeOn, a novel push-based PCD scheme where contents are actively broadcasted to vehicles from road side access points and further distributed among vehicles using a cooperative VANET, a recent technique, symbol level network coding (SLNC) is employed to combat the lossy wireless transmissions.
Abstract: Driven by both safety concerns and commercial interests, one of the key services offered by vehicular networks is popular content distribution (PCD). The fundamental challenges to achieve high speed content downloading come from the highly dynamic topology of vehicular ad hoc network (VANET) and the lossy nature of the vehicular wireless communications. In this paper, we introduce CodeOn, a novel push-based PCD scheme where contents are actively broadcasted to vehicles from road side access points and further distributed among vehicles using a cooperative VANET. In CodeOn, we employ a recent technique, symbol level network coding (SLNC) to combat the lossy wireless transmissions. Through exploiting symbol level diversity, SLNC is robust to transmission errors and encourages more aggressive concurrent transmissions. In order to fully enjoy the benefits of SLNC, we propose a suite of techniques to maximize the downloading rate, including a prioritized and localized relay selection mechanism where the selection criteria is based on the usefulness of vehicles' possessed contents, and a lightweight medium access protocol that naturally exploits the abundant concurrent transmission opportunities. We also propose additional mechanisms to reduce the protocol overhead without sacrificing the performance. Extensive simulation results show that, under a wide range of scenarios, CodeOn significantly outperforms a state-of-the-art PCD scheme based on network coding.

Journal ArticleDOI
TL;DR: Security protocols for the scheme which are able to detect compromised RSUs and their colluding malicious vehicles are developed and the issue of large computation overhead due to the group signature implementation is addressed.
Abstract: In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key management is expected to facilitate the revocation of malicious vehicles, maintenance of the system, and heterogeneous security policies, compared with the centralized key management assumed by the existing group signature schemes. In our framework, each road side unit (RSU) acts as the key distributor for the group, where a new issue incurred is that the semi-trust RSUs may be compromised. Thus, we develop security protocols for the scheme which are able to detect compromised RSUs and their colluding malicious vehicles. Moreover, we address the issue of large computation overhead due to the group signature implementation. A practical cooperative message authentication protocol is thus proposed to alleviate the verification burden, where each vehicle just needs to verify a small amount of messages. Details of possible attacks and the corresponding solutions are discussed. We further develop a medium access control (MAC) layer analytical model and carry out NS2 simulations to examine the key distribution delay and missed detection ratio of malicious messages, with the proposed key management framework being implemented over 802.11 based VANETs.

Journal ArticleDOI
TL;DR: Results show that the proposed identification methods can be effective, even for short data records and relatively low signal-to-noise ratios, when exploiting imperfections of commercially used RF transmitters.
Abstract: Variations in the RF chain of radio transmitters can be used as a signature to uniquely associate wireless devices with a given transmission. Previous approaches, which have varied from transient analysis to machine learning, do not provide verifiable accuracy, which is essential for admissibility of the methods in the court. Here we detail a first step toward a model-based approach, which uses statistical models of RF transmitter components that are amenable for analysis. Algorithms based on statistical signal processing methods are developed to exploit non-linearities of wireless transmitters for the purpose of user identification in wireless systems. The decision rules are derived and their performance is analyzed. In order to establish the viability of the proposed approach, the practical variations of transmitter chain components are analyzed based on simulations, measurements and manufacturers' specifications. Results show that the proposed identification methods can be effective, even for short data records and relatively low signal-to-noise ratios, when exploiting imperfections of commercially used RF transmitters.

Journal ArticleDOI
TL;DR: The proposed approach, called Quorum-based Channel Hopping (QCH) system, can be used for implementing rendezvous protocols in CR networks that are robust against link breakage caused by the appearance of incumbent user signals and outperform existing schemes under various network conditions.
Abstract: In decentralized cognitive radio (CR) networks, enabling the radios to establish a control channel (i.e., "rendezvous" to establish a link) is a challenging problem. The use of a dedicated common control channel simplifies the rendezvous process but may not be feasible in many opportunistic spectrum sharing scenarios due to the dynamically changing availability of all the channels, including the control channel. To address this problem, researchers have proposed the use of channel hopping protocols for enabling rendezvous in CR networks. Most, if not all, of the existing channel hopping schemes only provide ad hoc approaches for generating channel hopping sequences and evaluating their properties. In this paper, we present a systematic approach, based on quorum systems, for designing and analyzing channel hopping protocols for the purpose of control channel establishment. The proposed approach, called Quorum-based Channel Hopping (QCH) system, can be used for implementing rendezvous protocols in CR networks that are robust against link breakage caused by the appearance of incumbent user signals. We describe two synchronous QCH systems under the assumption of global clock synchronization, and two asynchronous channel hopping systems that do not require global clock synchronization. Our analytical and simulation results show that the proposed channel hopping schemes outperform existing schemes under various network conditions.

Journal ArticleDOI
TL;DR: This work proposes two decoding approaches, one based on matrix completion and the other based on joint sparsity recovery, both of which allow exact recovery from incomplete reports and validate the effectiveness and robustness of these approaches.
Abstract: Spectrum sensing, which aims at detecting spectrum holes, is the precondition for the implementation of cognitive radio (CR). Collaborative spectrum sensing among the cognitive radio nodes is expected to improve the ability of checking complete spectrum usage. Due to hardware limitations, each cognitive radio node can only sense a relatively narrow band of radio spectrum. Consequently, the available channel sensing information is far from being sufficient for precisely recognizing the wide range of unoccupied channels. Aiming at breaking this bottleneck, we propose to apply matrix completion and joint sparsity recovery to reduce sensing and transmission requirements and improve sensing results. Specifically, equipped with a frequency selective filter, each cognitive radio node senses linear combinations of multiple channel information and reports them to the fusion center, where occupied channels are then decoded from the reports by using novel matrix completion and joint sparsity recovery algorithms. As a result, the number of reports sent from the CRs to the fusion center is significantly reduced. We propose two decoding approaches, one based on matrix completion and the other based on joint sparsity recovery, both of which allow exact recovery from incomplete reports. The numerical results validate the effectiveness and robustness of our approaches. In particular, in small-scale networks, the matrix completion approach achieves exact channel detection with a number of samples no more than 50% of the number of channels in the network, while joint sparsity recovery achieves similar performance in large-scale networks.

Journal ArticleDOI
TL;DR: This work proposes a novel low-complex and fully distributed IM scheme, called REFIM (REFerence based Interference Management), in the downlink of heterogeneous multi-cell networks and presents that as long as interference is managed well, the spectrum sharing policy can outperform the best spectrum splitting policy where the number of subchannels is optimally divided between macro and femto cells.
Abstract: Due to the increasing demand of capacity in wireless cellular networks, the small cells such as pico and femto cells are becoming more popular to enjoy a spatial reuse gain, and thus cells with different sizes are expected to coexist in a complex manner. In such a heterogeneous environment, the role of interference management (IM) becomes of more importance, but technical challenges also increase, since the number of cell-edge users, suffering from severe interference from the neighboring cells, will naturally grow. In order to overcome low performance and/or high complexity of existing static and other dynamic IM algorithms, we propose a novel low-complex and fully distributed IM scheme, called REFIM (REFerence based Interference Management), in the downlink of heterogeneous multi-cell networks. We first formulate a general optimization problem that turns out to require intractable computation complexity for global optimality. To have a practical solution with low computational and signaling overhead, which is crucial for low-cost small-cell solutions, e.g., femto cells, in REFIM, we decompose it into per-BS (base station) problems based on the notion of reference user and reduce feedback overhead over backhauls both temporally and spatially. We evaluate REFIM through extensive simulations under various configurations, including the scenarios from a real deployment of BSs. We show that, compared to the schemes without IM, REFIM can yield more than 40% throughput improvement of cell-edge users while increasing the overall performance by 10~107%. This is equal to about 95% performance of the existing centralized IM algorithm (MC-IIWF) that is known to be near-optimal but hard to implement in practice due to prohibitive complexity. We also present that as long as interference is managed well, the spectrum sharing policy can outperform the best spectrum splitting policy where the number of subchannels is optimally divided between macro and femto cells.

Journal ArticleDOI
TL;DR: This paper proposes an adaptive and cross-layer framework for reliable and energy-efficient data collection in WSNs based on the IEEE 802.15.4/ZigBee standards, and proposes a low-complexity distributed algorithm, called ADaptive Access Parameters Tuning (ADAPT), that can effectively meet the application-specific reliability under a wide range of operating conditions.
Abstract: A major concern in wireless sensor networks (WSNs) is energy conservation, since battery-powered sensor nodes are expected to operate autonomously for a long time, e.g., for months or even years. Another critical aspect of WSNs is reliability, which is highly application-dependent. In most cases it is possible to trade-off energy consumption and reliability in order to prolong the network lifetime, while satisfying the application requirements. In this paper we propose an adaptive and cross-layer framework for reliable and energy-efficient data collection in WSNs based on the IEEE 802.15.4/ZigBee standards. The framework involves an energy-aware adaptation module that captures the application's reliability requirements, and autonomously configures the MAC layer based on the network topology and the traffic conditions in order to minimize the power consumption. Specifically, we propose a low-complexity distributed algorithm, called ADaptive Access Parameters Tuning (ADAPT), that can effectively meet the application-specific reliability under a wide range of operating conditions, for both single-hop and multi-hop networking scenarios. Our solution can be integrated into WSNs based on IEEE 802.15.4/ZigBee without requiring any modification to the standards. Simulation results show that ADAPT is very energy-efficient, with near-optimal performance.

Journal ArticleDOI
TL;DR: By presenting a BGP-focused state-of-the-art treatment of the aspects that are critical for a rigorous study of this inter-domain topology, this paper demystify in this paper many "controversial" observations reported in the existing literature and illustrate the benefits and richness of new scientific approaches to measuring, modeling, and analyzing the inter- domain topology.
Abstract: Formally, the Internet inter-domain routing system is a collection of networks, their policies, peering relationships and organizational affiliations, and the addresses they advertize. It also includes components like Internet exchange points. By its very definition, each and every aspect of this system is impacted by BGP, the de-facto standard inter-domain routing protocol. The element of this inter-domain routing system that has attracted the single-most attention within the research community has been the "inter-domain topology". Unfortunately, almost from the get go, the vast majority of studies of this topology, from definition, to measurement, to modeling and analysis, have ignored the central role of BGP in this problem. The legacy is a set of specious findings, unsubstantiated claims, and ill-conceived ideas about the Internet as a whole. By presenting a BGP-focused state-of-the-art treatment of the aspects that are critical for a rigorous study of this inter-domain topology, we demystify in this paper many "controversial" observations reported in the existing literature. At the same time, we illustrate the benefits and richness of new scientific approaches to measuring, modeling, and analyzing the inter-domain topology that are faithful to the BGP-specific nature of this problem domain.

Journal ArticleDOI
TL;DR: A simple channel sensing order for secondary users in multi-channel CRNs without a priori knowledge of primary user activities is proposed, and it is observed that the total throughput and resource utilization increase with the number of secondary user pairs due to increased transmission opportunities and multi-user diversity.
Abstract: In cognitive radio networks (CRNs), effective and efficient channel exploitation is imperative for unlicensed secondary users to seize available network resources and improve resource utilization In this paper, we propose a simple channel sensing order for secondary users in multi-channel CRNs without a priori knowledge of primary user activities By sensing the channels according to the descending order of their achievable rates with optimal stopping, we show that the proposed channel exploitation approach is efficient yet effective in elevating throughput and resource utilization Simulation results show that our proposed channel exploitation approach outperforms its counterparts by up to 18% in a single-secondary user pair scenario In addition, we investigate the probability of packet transmission collision in a multi-secondary user pair scenario, and show that the probability of collision decreases as the number of channels increases and/or the number of secondary user pairs decreases It is observed that the total throughput and resource utilization increase with the number of secondary user pairs due to increased transmission opportunities and multi-user diversity Our results also demonstrate that resource utilization can be further improved via the proposed channel exploitation approach when the number of secondary user pairs approaches the number of channels

Journal ArticleDOI
TL;DR: The RACS scheme prolongs network life-time while employing a simple and distributed scheme which eliminates the need for scheduling, and is suitable for long-term deployment of large underwater networks.
Abstract: Inspired by the theory of compressed sensing and employing random channel access, we propose a distributed energy-efficient sensor network scheme denoted by Random Access Compressed Sensing (RACS). The proposed scheme is suitable for long-term deployment of large underwater networks, in which saving energy and bandwidth is of crucial importance. During each frame, a randomly chosen subset of nodes participate in the sensing process, then share the channel using random access. Due to the nature of random access, packets may collide at the fusion center. To account for the packet loss that occurs due to collisions, the network design employs the concept of sufficient sensing probability. With this probability, sufficiently many data packets - as required for field reconstruction based on compressed sensing - are to be received. The RACS scheme prolongs network life-time while employing a simple and distributed scheme which eliminates the need for scheduling.

Journal ArticleDOI
TL;DR: This paper models the required decoding power and investigates the minimization of total system power from two complementary perspectives, using new lower bounds on the complexity of message-passing decoding to show there is a fundamental tradeoff between transmit and decoding power.
Abstract: Traditional communication theory focuses on minimizing transmit power. However, communication links are increasingly operating at shorter ranges where transmit power can be significantly smaller than the power consumed in decoding. This paper models the required decoding power and investigates the minimization of total system power from two complementary perspectives. First, an isolated point-to-point link is considered. Using new lower bounds on the complexity of message-passing decoding, lower bounds are derived on decoding power. These bounds show that 1) there is a fundamental tradeoff between transmit and decoding power; 2) unlike the implications of the traditional "waterfall" curve which focuses on transmit power, the total power must diverge to infinity as error probability goes to zero; 3) Regular LDPCs, and not their known capacity-achieving irregular counterparts, can be shown to be power order optimal in some cases; and 4) the optimizing transmit power is bounded away from the Shannon limit. Second, we consider a collection of links. When systems both generate and face interference, coding allows a system to support a higher density of transmitter-receiver pairs (assuming interference is treated as noise). However, at low densities, uncoded transmission may be more power-efficient in some cases.

Journal ArticleDOI
TL;DR: This work considers the problem of maximizing the weighted sum-rate of a wireless cellular network via coordinated scheduling and discrete power control and presents two distributed iterative algorithms which require limited information exchange and data processing at each base station.
Abstract: Inter-cell interference mitigation is a key challenge in the next generation wireless networks which are expected to use an aggressive frequency reuse factor and a high-density base station deployment to improve coverage and spectral efficiency. In this work, we consider the problem of maximizing the weighted sum-rate of a wireless cellular network via coordinated scheduling and discrete power control. We present two distributed iterative algorithms which require limited information exchange and data processing at each base station. Both algorithms provably converge to a solution where no base station can unilaterally modify its status (i.e., transmit power and user selection) to improve the weighted sum-rate of the network. Numerical studies are carried out to assess the performance of the proposed schemes in a realistic system based on the IEEE 802.16m specifications. Simulation results show that the proposed algorithms achieve a significant rate gain over uncoordinated transmission strategies for both cell-edge and inner users.

Journal ArticleDOI
TL;DR: The proposed GLRT detector exploits the non-stationary correlation structure of the OFDM signal and does not require any knowledge of the noise power or the signal power, and is compared to state-of-the-art OfDM signal detectors, and shown to improve the detection performance with 5 dB SNR in relevant cases.
Abstract: We consider spectrum sensing of OFDM signals in an AWGN channel. For the case of completely known noise and signal powers, we set up a vector-matrix model for an OFDM signal with a cyclic prefix and derive the optimal Neyman-Pearson detector from first principles. The optimal detector exploits the inherent correlation of the OFDM signal incurred by the repetition of data in the cyclic prefix, using knowledge of the length of the cyclic prefix and the length of the OFDM symbol. We compare the optimal detector to the energy detector numerically. We show that the energy detector is near-optimal (within 1 dB SNR) when the noise variance is known. Thus, when the noise power is known, no substantial gain can be achieved by using any other detector than the energy detector. For the case of completely unknown noise and signal powers, we derive a generalized likelihood ratio test (GLRT) based on empirical second-order statistics of the received data. The proposed GLRT detector exploits the non-stationary correlation structure of the OFDM signal and does not require any knowledge of the noise power or the signal power. The GLRT detector is compared to state-of-the-art OFDM signal detectors, and shown to improve the detection performance with 5 dB SNR in relevant cases.