scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Transactions on Wireless Communications in 2009"


Journal ArticleDOI
TL;DR: Space shift keying concepts are extended to incorporate channel coding, where in particular, they are considered a bit interleaved coded modulation (BICM) system using iterative decoding for both convolutional and turbo codes.
Abstract: In this paper, we present space shift keying (SSK) as a new modulation scheme, which is based on spatial modulation (SM) concepts. Fading is exploited for multiple-input multiple-output(MIMO) channels to provide better performance over conventional amplitude/phase modulation (APM) techniques. In SSK, it is the antenna index used during transmission that relays information, rather than the transmitted symbols themselves. This absence of symbol information eliminates the transceiver elements necessary for APM transmission and detection (such as coherent detectors). As well, the simplicity involved in modulation reduces the detection complexity compared to that of SM, while achieving almost identical performance gains. Throughout the paper, we illustrate SSK's strength by studying its interaction with the fading channel. We obtain tight upper bounds on bit error probability, and discuss SSK's performance under some non-ideal channel conditions (estimation error and spatial correlation). Analytical and simulation results show performance gains over APM systems (3 dB at a bit error rate of 10-5), making SSK an interesting candidate for future wireless applications. We then extend SSK concepts to incorporate channel coding, where in particular, we consider a bit interleaved coded modulation (BICM) system using iterative decoding for both convolutional and turbo codes. Capacity results are derived, and improvements over APM are illustrated (up to 1 bits/s/Hz), with performance gains of up to 5 dB.

932 citations


Journal ArticleDOI
TL;DR: A fundamental relation is derived providing the largest feasible cellular Signal-to-Interference-Plus-Noise Ratio (SINR), given any set of feasible femtocell SINRs, which motivate design of power control schemes requiring minimal network overhead in two-tier networks with shared spectrum.
Abstract: In a two tier cellular network - comprised of a central macrocell underlaid with shorter range femtocell hotspots - cross-tier interference limits overall capacity with universal frequency reuse. To quantify near-far effects with universal frequency reuse, this paper derives a fundamental relation providing the largest feasible cellular Signal-to-Interference-Plus-Noise Ratio (SINR), given any set of feasible femtocell SINRs. We provide a link budget analysis which enables simple and accurate performance insights in a two-tier network. A distributed utility- based SINR adaptation at femtocells is proposed in order to alleviate cross-tier interference at the macrocell from cochannel femtocells. The Foschini-Miljanic (FM) algorithm is a special case of the adaptation. Each femtocell maximizes their individual utility consisting of a SINR based reward less an incurred cost (interference to the macrocell). Numerical results show greater than 30% improvement in mean femtocell SINRs relative to FM. In the event that cross-tier interference prevents a cellular user from obtaining its SINR target, an algorithm is proposed that reduces transmission powers of the strongest femtocell interferers. The algorithm ensures that a cellular user achieves its SINR target even with 100 femtocells/cell-site (with typical cellular parameters) and requires a worst case SINR reduction of only 16% at femtocells. These results motivate design of power control schemes requiring minimal network overhead in two-tier networks with shared spectrum.

785 citations


Journal ArticleDOI
TL;DR: The optimal voting rule for any detector applied to cooperative spectrum sensing is derived and the detection threshold when energy detection is employed, and a fast spectrum sensing algorithm is proposed for a large network which requires fewer than the total number of cognitive radios while satisfying a given error bound.
Abstract: We consider cooperative spectrum sensing in which multiple cognitive radios collaboratively detect the spectrum holes through energy detection and investigate the optimality of cooperative spectrum sensing with an aim to optimize the detection performance in an efficient and implementable way. We derive the optimal voting rule for any detector applied to cooperative spectrum sensing. We also optimize the detection threshold when energy detection is employed. Finally, we propose a fast spectrum sensing algorithm for a large network which requires fewer than the total number of cognitive radios in cooperative spectrum sensing while satisfying a given error bound.

744 citations


Journal ArticleDOI
TL;DR: Several SNR-suboptimal multiple relay selection schemes are proposed, whose complexity is linear in the number of relays and are proved to achieve full diversity.
Abstract: This paper is on relay selection schemes for wireless relay networks. First, we derive the diversity of many single-relay selection schemes in the literature. Then, we generalize the idea of relay selection by allowing more than one relay to cooperate. The SNR-optimal multiple relay selection scheme can be achieved by exhaustive search, whose complexity increases exponentially in the network size. To reduce the complexity, several SNR-suboptimal multiple relay selection schemes are proposed, whose complexity is linear in the number of relays. They are proved to achieve full diversity. Simulation shows that they perform much better than the corresponding single relay selection methods and very close to the SNR-optimal multiple relay selection scheme. In addition, for large networks, these multiple relay selection schemes require the same amount of feedback bits from the receiver as single relay selection schemes.

739 citations


Journal ArticleDOI
TL;DR: It is shown that there is a capacity gain for SU under the average over the peak transmit/interference power constraint and that fading for the channel between SU transmitter and PU receiver is usually a beneficial factor for enhancing the SU channel capacities.
Abstract: A cognitive radio network (CRN) is formed by either allowing the secondary users (SUs) in a secondary communication network (SCN) to opportunistically operate in the frequency bands originally allocated to a primary communication network (PCN) or by allowing SCN to coexist with the primary users (PUs) in PCN as long as the interference caused by SCN to each PU is properly regulated. In this paper, we consider the latter case, known as spectrum sharing, and study the optimal power allocation strategies to achieve the ergodic capacity and the outage capacity of the SU fading channel under different types of power constraints and fading channel models. In particular, besides the interference power constraint at PU, the transmit power constraint of SU is also considered. Since the transmit power and the interference power can be limited either by a peak or an average constraint, various combinations of power constraints are studied. It is shown that there is a capacity gain for SU under the average over the peak transmit/interference power constraint. It is also shown that fading for the channel between SU transmitter and PU receiver is usually a beneficial factor for enhancing the SU channel capacities.

648 citations


Journal ArticleDOI
TL;DR: This letter presents a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.
Abstract: Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.

627 citations


Journal ArticleDOI
TL;DR: In this article, a clustered base transceiver station (BTS) coordination strategy is proposed for a large cellular MIMO network, which includes full intra-cluster coordination to enhance the sum rate and limited inter-clusters coordination to reduce interference for the cluster edge users.
Abstract: A clustered base transceiver station (BTS) coordination strategy is proposed for a large cellular MIMO network, which includes full intra-cluster coordination-to enhance the sum rate-and limited inter-cluster coordination-to reduce interference for the cluster edge users. Multi-cell block diagonalization is used to coordinate the transmissions across multiple BTSs in the same cluster. To satisfy per-BTS power constraints, three combined precoder and power allocation algorithms are proposed with different performance and complexity tradeoffs. For inter-cluster coordination, the coordination area is chosen to balance fairness for edge users and the achievable sum rate. It is shown that a small cluster size (about 7 cells) is sufficient to obtain most of the sum rate benefits from clustered coordination while greatly relieving channel feedback requirement. Simulations show that the proposed coordination strategy efficiently reduces interference and provides a considerable sum rate gain for cellular MIMO networks.

592 citations


Journal ArticleDOI
TL;DR: In this paper, the uplink capacity analysis and interference avoidance strategy in a two-tier CDMA network were developed to evaluate a network-wide area spectral efficiency metric called the operating contour (OC) defined as the feasible combinations of the average number of active macrocell users and femtocell base stations per cell-site that satisfy a target outage constraint.
Abstract: Two-tier femtocell networks- comprising a conventional cellular network plus embedded femtocell hotspots- offer an economically viable solution to achieving high cellular user capacity and improved coverage. With universal frequency reuse and DS-CDMA transmission however, the ensuing cross-tier interference causes unacceptable outage probability. This paper develops an uplink capacity analysis and interference avoidance strategy in such a two-tier CDMA network. We evaluate a network-wide area spectral efficiency metric called the operating contour (OC) defined as the feasible combinations of the average number of active macrocell users and femtocell base stations (BS) per cell-site that satisfy a target outage constraint. The capacity analysis provides an accurate characterization of the uplink outage probability, accounting for power control, path loss and shadowing effects. Considering worst case interference at a corner femtocell, results reveal that interference avoidance through a time-hopped CDMA physical layer and sectorized antennas allows about a 7x higher femtocell density, relative to a split spectrum two-tier network with omnidirectional femtocell antennas. A femtocell exclusion region and a tier selection based handoff policy offers modest improvements in the OCs. These results provide guidelines for the design of robust shared spectrum two-tier networks.

514 citations


Journal ArticleDOI
TL;DR: The proposed scheme enables an opportunistic selection of two relay nodes to increase security against eavesdroppers and jointly protects the primary destination against interference and eavesdropping and jams the reception of the eavesdropper.
Abstract: This paper deals with relay selection in cooperative networks with secrecy constraints. The proposed scheme enables an opportunistic selection of two relay nodes to increase security against eavesdroppers. The first relay operates as a conventional mode and assists a source to deliver its data to a destination via a decode-and-forward strategy. The second relay is used in order to create intentional interference at the eavesdropper nodes. The proposed selection technique jointly protects the primary destination against interference and eavesdropping and jams the reception of the eavesdropper. The new approach is analyzed for different complexity requirements based on instantaneous and average knowledge of the eavesdropper channels. In addition an investigation of an hybrid security scheme which switches between jamming and non-jamming protection is discussed in the paper. It is proven that an appropriate application of these two modes further improves security. The enhancements of the proposed selection techniques are demonstrated analytically and with simulation results.

508 citations


Journal ArticleDOI
TL;DR: This paper investigates the error rate performance of FSO systems for K-distributed atmospheric turbulence channels and discusses potential advantages of spatial diversity deployments at the transmitter and/or receiver, and presents efficient approximated closed-form expressions for the average bit-error rate (BER) of single-input multiple-output (SIMO) FSO Systems.
Abstract: Optical wireless, also known as free-space optics, has received much attention in recent years as a cost-effective, license-free and wide-bandwidth access technique for high data rates applications. The performance of free-space optical (FSO) communication, however, severely suffers from turbulence-induced fading caused by atmospheric conditions. Multiple laser transmitters and/or receivers can be placed at both ends to mitigate the turbulence fading and exploit the advantages of spatial diversity. Spatial diversity is particularly crucial for strong turbulence channels in which single-input single-output (SISO) link performs extremely poor. Atmospheric-induced strong turbulence fading in outdoor FSO systems can be modeled as a multiplicative random process which follows the K distribution. In this paper, we investigate the error rate performance of FSO systems for K-distributed atmospheric turbulence channels and discuss potential advantages of spatial diversity deployments at the transmitter and/or receiver. We further present efficient approximated closed-form expressions for the average bit-error rate (BER) of single-input multiple-output (SIMO) FSO systems. These analytical tools are reliable alternatives to time-consuming Monte Carlo simulation of FSO systems where BER targets as low as 10-9 are typically aimed to achieve.

458 citations


Journal ArticleDOI
TL;DR: The paper provides a full characterization of the Markov Chain describing the protocol behavior and a closed form expression for the stationary distribution of the chain and exact computation or tight approximations for the outage probabilities for all states of theChain are derived.
Abstract: We propose a two-phase protocol based on cooperative decode-and-forward relaying for a secondary system to achieve spectrum access along with a primary system. The primary and secondary systems comprise of a transmitter-receiver pair, PT-PR and ST-SR, respectively. In the first transmission phase, PT transmits the primary signal to PR, which is also received by ST and SR, where it is decoded. At ST, the primary signal is regenerated and linearly combined with the secondary signal by assigning fractions alpha and (1 - alpha) of the available power to the primary and secondary signals respectively. This combined signal is then broadcasted by ST in the second transmission phase. We show that as long as ST is located within a critical radius from PT, there exists a threshold value for alpha above which the outage probability of the primary system will be equal to or lower than the case without spectrum sharing. We also determine the outage probability achieved by the secondary system. Theoretical and simulation results confirm the efficiency of the proposed spectrum sharing scheme.

Journal ArticleDOI
TL;DR: A new wideband multiple-input-multiple-output (MIMO) model for VTV channels based on extensive MIMO channel measurements performed at 5.2 GHz in highway and rural environments in Lund, Sweden is presented.
Abstract: Vehicle-to-vehicle (VTV) wireless communications have many envisioned applications in traffic safety and congestion avoidance, but the development of suitable communications systems and standards requires accurate models for the VTV propagation channel. In this paper, we present a new wideband multiple-input-multiple-output (MIMO) model for VTV channels based on extensive MIMO channel measurements performed at 5.2 GHz in highway and rural environments in Lund, Sweden. The measured channel characteristics, in particular the nonstationarity of the channel statistics, motivate the use of a geometry-based stochastic channel model (GSCM) instead of the classical tapped-delay line model. We introduce generalizations of the generic GSCM approach and techniques for parameterizing it from measurements and find it suitable to distinguish between diffuse and discrete scattering contributions. The time-variant contribution from discrete scatterers is tracked over time and delay using a high resolution algorithm, and our observations motivate their power being modeled as a combination of a (deterministic) distance decay and a slowly varying stochastic process. The paper gives a full parameterization of the channel model and supplies an implementation recipe for simulations. The model is verified by comparison of MIMO antenna correlations derived from the channel model to those obtained directly from the measurements.

Journal ArticleDOI
TL;DR: A novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other, which can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.
Abstract: Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small portion of its neighbors. Key management is a fundamental security operation. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. In this paper, we adopt a Heterogeneous Sensor Network (HSN) model for better performance and security. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key management scheme for sensor nodes. The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.

Journal ArticleDOI
TL;DR: Findings show that the HLRT suffers from very high complexity, whereas the QHLRT provides a reasonable solution, and an upper bound on the performance of QHL RT-based algorithms, which employ unbiased and normally distributed non-data aided estimates of the unknown parameters, is proposed.
Abstract: In this paper, likelihood-based algorithms are explored for linear digital modulation classification. Hybrid likelihood ratio test (HLRT)- and quasi HLRT (QHLRT)- based algorithms are examined, with signal amplitude, phase, and noise power as unknown parameters. The algorithm complexity is first investigated, and findings show that the HLRT suffers from very high complexity, whereas the QHLRT provides a reasonable solution. An upper bound on the performance of QHLRT-based algorithms, which employ unbiased and normally distributed non-data aided estimates of the unknown parameters, is proposed. This is referred to as the QHLRT-Upper Bound (QHLRT-UB). Classification of binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK) signals is presented as a case study. The Cramer-Rao Lower Bounds (CRBs) of non-data aided joint estimates of signal amplitude and phase, and noise power are derived for BPSK and QPSK signals, and further employed to obtain the QHLRT-UB. An upper bound on classification performance of any likelihood-based algorithms is also introduced. Method-of-moments (MoM) estimates of the unknown parameters are investigated and used to develop the QHLRT-based algorithm. Classification performance of this algorithm is compared with the upper bounds, as well as with the quasi Log-Likelihood Ratio (qLLR) and fourth-order cumulant based algorithms.

Journal ArticleDOI
TL;DR: The proposed online algorithm is a simple mixture of inter- and intra-cell handover mechanisms for existing users and user association control and cell-site selection mechanisms for newly arriving users, and uses a notion of expected throughput as the decision making metric in conventional systems.
Abstract: Next-generation cellular networks will provide higher cell capacity by adopting advanced physical layer techniques and broader bandwidth. Even in such networks, boundary users would suffer from low throughput due to severe intercell interference and unbalanced user distributions among cells, unless additional schemes to mitigate this problem are employed. In this paper, we tackle this problem by jointly optimizing partial frequency reuse and load-balancing schemes in a multicell network. We formulate this problem as a network-wide utility maximization problem and propose optimal offline and practical online algorithms to solve this. Our online algorithm turns out to be a simple mixture of inter- and intra-cell handover mechanisms for existing users and user association control and cell-site selection mechanisms for newly arriving users. A remarkable feature of the proposed algorithm is that it uses a notion of expected throughput as the decision making metric, as opposed to signal strength in conventional systems. Extensive simulations demonstrate that our online algorithm can not only closely approximate network-wide proportional fairness but also provide two types of gain, interference avoidance gain and load balancing gain, which yield 20~100% throughput improvement of boundary users (depending on traffic load distribution), while not penalizing total system throughput.We also demonstrate that this improvement cannot be achieved by conventional systems using universal frequency reuse and signal strength as the decision making metric.

Journal ArticleDOI
TL;DR: A dynamic programming approach to the search for an optimal sensing order with adaptive modulation is presented and it is proved that a simple optimal sensing Order does exist.
Abstract: This paper investigates the optimal sensing order problem in multi-channel cognitive medium access control with opportunistic transmissions. The scenario in which the availability probability of each channel is known is considered first. In this case, when the potential channels are identical (except for the availability probabilities) and independent, it is shown that, although the intuitive sensing order (i.e., descending order of the channel availability probabilities) is optimal when adaptive modulation is not used, it does not lead to optimality in general with adaptive modulation. Thus, a dynamic programming approach to the search for an optimal sensing order with adaptive modulation is presented. For some special cases, it is proved that a simple optimal sensing order does exist. More complex scenarios are then considered, e.g., in which the availability probability of each channel is unknown. Optimal strategies are developed to address the challenges created by this additional uncertainty. Finally, a scheme is developed to address the issue of sensing errors.

Journal ArticleDOI
TL;DR: This paper derives the fading channel capacity of a secondary user subject to both average and peak received-power constraints at the primary's receiver and derives the capacity and optimum power allocation scheme for three different capacity notions, namely, ergodic, outage, and minimum-rate.
Abstract: This paper investigates the fundamental capacity limits of opportunistic spectrum-sharing channels in fading environments. The concept of opportunistic spectrum access is motivated by the frontier technology of cognitive radio which offers a tremendous potential to improve the utilization of the radio spectrum by implementing efficient sharing of the licensed spectrum. In this spectrum-sharing technology, a secondary user may utilize the primary user's licensed band as long as its interference to the primary receiver remains below a tolerable level. Herein, we consider that the secondary user's transmission has to adhere to limitations on the ensuing received power at the primary's receiver, and investigate the capacity gains offered by this spectrum-sharing approach in a Rayleigh fading environment. Specifically, we derive the fading channel capacity of a secondary user subject to both average and peak received-power constraints at the primary's receiver. In particular, considering flat Rayleigh fading, we derive the capacity and optimum power allocation scheme for three different capacity notions, namely, ergodic, outage, and minimum-rate, and provide closed-form expressions for these capacity metrics. Numerical simulations are conducted to corroborate our theoretical results.

Journal ArticleDOI
TL;DR: A non-site-specific statistical propagation model is presented which accounts for the correlations that exist in shadow fading between links in multi-hop networks and shows that independent shadowing models can underestimate the probability of route failure by a factor of two or greater.
Abstract: Accurate representation of the physical layer is required for analysis and simulation of multi-hop networking in sensor, ad hoc, and mesh networks. Radio links that are geographically proximate often experience similar environmental shadowing effects and thus have correlated shadowing. This paper presents and analyzes a non-site-specific statistical propagation model which accounts for the correlations that exist in shadow fading between links in multi-hop networks. We describe two measurement campaigns to measure a large number of multi-hop networks in an ensemble of environments. The measurements show statistically significant correlations among shadowing experienced on different links in the network, with correlation coefficients up to 0.33. Finally, we analyze multi-hop paths in three and four node networks using both correlated and independent shadowing models and show that independent shadowing models can underestimate the probability of route failure by a factor of two or greater.

Journal ArticleDOI
TL;DR: Simulation results show that both schemes effectively compensate the uplink throughput degradation of the macrocell BS due to the cross-tier interference and that the closed- loop control provides better femtocell throughput than the open-loop control at a minimal cost of macrocell throughput.
Abstract: This paper proposes two interference mitigation strategies that adjust the maximum transmit power of femtocell users to suppress the cross-tier interference at a macrocell base station (BS). The open-loop and the closed-loop control suppress the cross-tier interference less than a fixed threshold and an adaptive threshold based on the noise and interference (NI) level at the macrocell BS, respectively. Simulation results show that both schemes effectively compensate the uplink throughput degradation of the macrocell BS due to the cross-tier interference and that the closed-loop control provides better femtocell throughput than the open-loop control at a minimal cost of macrocell throughput.

Journal ArticleDOI
TL;DR: In terms of various forms of capacity limits achievable for the PR fading channel, e.g., the ergodic and outage capacities, the AIP constraint is also superior over the PIP, based upon an interesting interference diversity phenomenon.
Abstract: This paper considers spectrum sharing for wireless communication between a cognitive radio (CR) link and a primary radio (PR) link. It is assumed that the CR protects the PR transmission by applying the so-called ldquointerference-temperaturerdquo constraint, whereby the CR is allowed to transmit regardless of the PR's on/off status provided that the resultant interference power level at the PR receiver is kept below some predefined threshold. For the fading PR and CR channels, the interference-power constraint at the PR receiver is usually one of the following two types: one is to regulate the average interference power (AIP) over all different fading states, while the other is to limit the peak interference power (PIP) at each fading state. From the CR's perspective, given the same average and peak power threshold, the AIP constraint is more favorable than the PIP counterpart because of its more flexibility for dynamically allocating transmit powers over different fading states. On the contrary, from the perspective of protecting the PR, the more restrictive PIP constraint appears at a first glance to be a better option than the AIP. Some surprisingly, this paper shows that in terms of various forms of capacity limits achievable for the PR fading channel, e.g., the ergodic and outage capacities, the AIP constraint is also superior over the PIP. This result is based upon an interesting interference diversity phenomenon, where randomized interference powers over the fading states in the AIP case are more advantageous over deterministic ones in the PIP case for minimizing the resultant PR capacity losses. Therefore, the AIP constraint results in larger fading channel capacities than the PIP for both the CR and PR transmissions.

Journal ArticleDOI
TL;DR: This model is the first GBSM that has the ability to study the impact of the vehicular traffic density on channel characteristics and close agreement is achieved between the theoretical results and measured data, demonstrating the utility of the proposed model.
Abstract: In this paper, a generic and adaptive geometrybased stochastic model (GBSM) is proposed for non-isotropic multiple-input multiple-output (MIMO) mobile-to-mobile (M2M) Ricean fading channels. The proposed model employs a combined two-ring model and ellipse model, where the received signal is constructed as a sum of the line-of-sight, single-, and doublebounced rays with different energies. This makes the model sufficiently generic and adaptable to a variety of M2M scenarios (macro-, micro-, and pico-cells). More importantly, our model is the first GBSM that has the ability to study the impact of the vehicular traffic density on channel characteristics. From the proposed model, the space-time-frequency correlation function and the corresponding space-Doppler-frequency power spectral density (PSD) of any two sub-channels are derived for a non-isotropic scattering environment. Based on the detailed investigation of correlations and PSDs, some interesting observations and useful conclusions are obtained. These observations and conclusions can be considered as a guidance for setting important parameters of our model appropriately and building up more purposeful measurement campaigns in the future. Finally, close agreement is achieved between the theoretical results and measured data, demonstrating the utility of the proposed model.

Journal ArticleDOI
TL;DR: The numerical and analytical results show that the multiuser diversity gain in a spectrum sharing system increases differently according to conditions given by the transmit power of secondary users, P, and a predetermined interference temperature, Q.
Abstract: We investigate the effects of multi-user diversity in a spectrum sharing system where secondary users restrictively utilize a spectrum licensed to primary users only if interference perceived at primary users is regulated below a predetermined level. This interference regulation affects the characteristics of multiuser diversity gains previously known in non-spectrum sharing systems. Our numerical and analytical results show that the multiuser diversity gain in a spectrum sharing system increases differently according to conditions given by the transmit power of secondary users, P, and a predetermined interference temperature, Q - if P is sufficiently larger than Q, the multiuser diversity gain in terms of capacity scales like log2 (W (Ns)) similarly to a previously known scaling law in the non-spectrum sharing systems, where W(middot) and Ns denote a Lambert W function and the number of secondary transmitters, respectively. However, the scaling law of multiuser diversity gain becomes log2(Ns) as P becomes sufficiently larger such that P Gt QNs.

Journal ArticleDOI
TL;DR: It is proven that previously proposed relay selection criteria for multi-relay scenarios become inefficient in the presence of interference and two extensions to the conventional max-min selection scheme suitable for different system setups are proposed.
Abstract: In this paper, an amplify-and-forward (AF) cooperative strategy for interference limited networks is considered. In contrast to previously reported work, where the effect of interference is ignored, the effect of multi-user interference in AF schemes is analyzed. It is shown that the interference changes the statistical description of the conventional AF protocol and a statistical expression is subsequently derived. Asymptotic analysis of the expression shows that interference limits the diversity gain of the system and the related channel capacity is bounded by a stationary point. In addition, it is proven that previously proposed relay selection criteria for multi-relay scenarios become inefficient in the presence of interference. Based on consideration of the interference term, two extensions to the conventional max-min selection scheme suitable for different system setups are proposed. The extensions investigated are appropriate for legacy architectures with limitations on their flexibility where the max-min operation is pre-designed. A theoretical framework for selecting when to apply the proposed selection criteria is also presented. The algorithm investigated is based on some welldefined capacity approximations and incorporates the outage probabilities averaged over the fading statistics. Analytical results and simulation studies reveal enhancements of the proposed algorithm.

Journal ArticleDOI
TL;DR: This work considers scheduling and resource allocation for the downlink of a OFDM-based wireless network, and gives optimal and sub-optimal algorithms for its solution.
Abstract: We consider scheduling and resource allocation for the downlink of a cellular OFDM system, with various practical considerations including integer tone allocations, different sub-channelization schemes, maximum SNR constraint per tone, and "self-noise" due to channel estimation errors and phase noise. During each time-slot a subset of users must be scheduled, and the available tones and transmission power must be allocated among them. Employing a gradient-based scheduling scheme presented in earlier papers reduces this to an optimization problem to be solved in each time-slot. Using a dual formulation, we give an optimal algorithm for this problem when multiple users can time-share each tone. We then give several low complexity heuristics that enforce integer tone allocations. Simulations are used to compare the performance of different algorithms.

Journal ArticleDOI
TL;DR: The impact of the choice of the interference model is investigated, on the conclusions that can be drawn regarding the performance of wireless networks, by comparing different wireless interference models and feels that an SINR-based model is the minimum level of detail that should be employed to model wireless channel interference in a networking context.
Abstract: In wireless communications, the desired wireless signal is typically decoded by treating the sum of all the other ongoing signal transmissions as noise. In the networking literature, this phenomenon is typically abstracted using a wireless channel interference model. The level of detail in the interference model, evidently determines the accuracy of the results based upon the model. Several works in the networking literature have made use of simplistic interference models, e.g., fixed ranges for communication and interference, the capture threshold model (used in the ns2 network simulator), the protocol model, and so on. At the same time, fairly complex interference models such as those based on the SINR (signal-to-interference-and-noise ratio) have also been proposed and used. We investigate the impact of the choice of the interference model, on the conclusions that can be drawn regarding the performance of wireless networks, by comparing different wireless interference models. We find that both in the case of random access networks, as well as in the case of scheduled networks (where node transmissions are scheduled to be completely conflict-free), different interference models can produce significantly different results. Therefore, a lot of caution should be exercised before accepting or interpreting results based on simplified interference models. Further, we feel that an SINR-based model is the minimum level of detail that should be employed to model wireless channel interference in a networking context.

Journal ArticleDOI
TL;DR: This paper proposes an algorithm, MAPEL, which globally converges to a global optimal solution of the WTM problem in the general SINR regime and provides an important benchmark for performance evaluation of other heuristic algorithms targeting the same problem.
Abstract: Achieving weighted throughput maximization (WTM) through power control has been a long standing open problem in interference-limited wireless networks. The complicated coupling between the mutual interferences of links gives rise to a non-convex optimization problem. Previous work has considered the WTM problem in the high signal to interference-and-noise ratio (SINR) regime, where the problem can be approximated and transformed into a convex optimization problem through proper change of variables. In the general SINR regime, however, the approximation and transformation approach does not work. This paper proposes an algorithm, MAPEL, which globally converges to a global optimal solution of the WTM problem in the general SINR regime. The MAPEL algorithm is designed based on three key observations of the WTM problem: (1) the objective function is monotonically increasing in SINR, (2) the objective function can be transformed into a product of exponentiated linear fraction functions, and (3) the feasible set of the equivalent transformed problem is always ldquonormalrdquo, although not necessarily convex. The MAPEL algorithm finds the desired optimal power control solution by constructing a series of polyblocks that approximate the feasible SINR region in an increasing precision. Furthermore, by tuning the approximation factor in MAPEL, we could engineer a desirable tradeoff between optimality and convergence time. MAPEL provides an important benchmark for performance evaluation of other heuristic algorithms targeting the same problem. With the help of MAPEL, we evaluate the performance of several existing algorithms through extensive simulations.

Journal ArticleDOI
TL;DR: A generic mathematical framework is proposed to characterize the policy for single hop transmission over a replenishable sensor network, and a Markov chain model is introduced to describe different modes of energy renewal.
Abstract: Energy harvesting from the working environment has received increasing attention in the research of wireless sensor networks. Recent developments in this area can be used to replenish the power supply of sensors. However, power management is still a crucial issue for such networks due to the uncertainty of stochastic replenishment. In this paper, we propose a generic mathematical framework to characterize the policy for single hop transmission over a replenishable sensor network. Firstly, we introduce a Markov chain model to describe different modes of energy renewal. Then, we derive the optimal transmission policy for sensors with different energy budgets. Depending on the energy status of a sensor and the reward for successfully transmitting a message, we prove the existence of optimal thresholds that maximize the average reward rate. Our results are quite general since the reward values can be made application-specific for different design objectives. Compared with the unconditional transmit-all policy, which transmits every message as long as the energy storage is positive, the proposed optimal transmission policy is shown to achieve significant gains in the average reward rate.

Journal ArticleDOI
TL;DR: It is demonstrated that the diversity order of the system is reduced to 1 when CSI is outdated, being this behavior independent of the level of CSI accuracy.
Abstract: In this paper, we analyze the outage probability and diversity order of opportunistic relay selection in a scenario based on decode and forward and where the available channel state information (CSI) is outdated. The study is conducted analytically by obtaining a closed-form expression for the outage probability, which is defined as the probability that the instantaneous capacity is below a target value. We derive high-SNR approximations for the outage probability. By doing so, we demonstrate that the diversity order of the system is reduced to 1 when CSI is outdated, being this behavior independent of the level of CSI accuracy. A physical explanation for this extreme loss of diversity is provided along with numerical results to support the analytical study.

Journal ArticleDOI
TL;DR: UWMAC, a distributed Medium Access Control protocol designed for UW-ASNs, is introduced, which is a transmitter-based Code Division Multiple Access (CDMA) scheme that incorporates a novel closed-loop distributed algorithm to jointly set the optimal transmit power and code length.
Abstract: UnderWater Acoustic Sensor Networks (UW-ASNs) consist of sensors and Autonomous Underwater Vehicles (AUVs) performing collaborative monitoring tasks. In this article, UWMAC, a distributed Medium Access Control (MAC) protocol designed for UW-ASNs, is introduced. The proposed MAC protocol is a transmitter-based Code Division Multiple Access (CDMA) scheme that incorporates a novel closed-loop distributed algorithm to jointly set the optimal transmit power and code length. CDMA is the most promising physical layer and multiple access technique for UW-ASNs because it is robust to frequency-selective fading, it compensates for the effect of multipath at the receiver, and it allows receivers to distinguish among signals simultaneously transmitted by multiple devices. UW-MAC aims at achieving three objectives, i.e., guarantee i) high network throughput, ii) low channel access delay, and iii) low energy consumption. It is demonstrated that UW-MAC simultaneously achieves these three objectives in deep water communications (where the ocean depth is more than 100 m), which are usually not severely affected by multipath. In shallow water communications, which may be heavily affected by multipath, it dynamically finds the optimal trade-off among these objectives according to the application requirements. UW-MAC is the first protocol that leverages CDMA properties to achieve multiple access to the scarce underwater bandwidth, while other protocols tailored for this environment have considered CDMA merely from a physical layer perspective. Experiments show that UW-MAC outperforms many existing MAC protocols tuned for the underwater environment under different architecture scenarios and simulation settings.

Journal ArticleDOI
TL;DR: A dynamic fractional frequency reused cell architecture that simplifies the problem of subcarrier allocation with frequency reuse in multicell OFDMA networks and proposes an efficient hierarchical solution to realize the proposed architecture.
Abstract: This paper proposes a dynamic fractional frequency reused cell architecture that simplifies the problem of subcarrier allocation with frequency reuse in multicell OFDMA networks. The architecture divides the cell surface into two overlapping geographical regions and orthogonally allocates subcarriers, which are called super and regular group of subcarriers, to the regions. The proposed architecture allows a frequency reuse factor of 1 with reduced inter-cell interference and increased trunking gain, while satisfying minimum data rate requirements. We also propose an efficient hierarchical solution to realize the proposed architecture. The solution first allocates subcarriers to the groups so that long term performance is maximized and next opportunistically schedules subcarriers to the users. The opportunistic scheduling is performed at the base stations considering the fairness requirements of the users. Simulation results illustrate the performance improvements of the proposed solution in comparison to the traditional frequency allocation schemes.