scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Communications and Networks in 2012"


Journal ArticleDOI
TL;DR: A generalized iterative backward waterfilling algorithm is developed and based on the sequence of maximum departure regions at energy arrival instants, the transmission completion time minimization problem is decompose into convex optimization problems and solved efficiently.
Abstract: In this paper, we investigate the optimal packet scheduling problem in a two-user multiple access communication system, where the transmitters are able to harvest energy from the nature. Under a deterministic system setting, we assume that the energy harvesting times and harvested energy amounts are known before the transmission starts. For the packet arrivals, we assume that packets have already arrived and are ready to be transmitted at the transmitter before the transmission starts. Our goal is to minimize the time by which all packets from both users are delivered to the destination through controlling the transmission powers and transmission rates of both users. We first develop a generalized iterative backward waterfilling algorithm to characterize the maximum departure region of the transmitters for any given deadline T. Then, based on the sequence of maximum departure regions at energy arrival instants, we decompose the transmission completion time minimization problem into convex optimization problems and solve the overall problem efficiently.

286 citations


Journal ArticleDOI
TL;DR: A general framework is introduced for the optimization of communication systems in which the transmitter is able to harvest energy from its environment, which includes models with continuous energy arrival as well as battery constraints.
Abstract: Energy harvesting has emerged as a powerful technology for complementing current battery-powered communication systems in order to extend their lifetime. In this paper a general framework is introduced for the optimization of communication systems in which the transmitter is able to harvest energy from its environment. Assuming that the energy arrival process is known non-causally at the transmitter, the structure of the optimal transmission scheme, which maximizes the amount of transmitted data by a given deadline, is identified. Our framework includes models with continuous energy arrival as well as battery constraints. A battery that suffers from energy leakage is studied further, and the optimal transmission scheme is characterized for a constant leakage rate.

250 citations


Journal ArticleDOI
TL;DR: The convergence of the proposed iterative coordinate descent method for the problem is proved and the short-term throughput maximizing offline power allocation policy is found.
Abstract: This paper considers a two-user Gaussian interference channel with energy harvesting transmitters. Different than conventional battery powered wireless nodes, energy harvesting transmitters have to adapt transmission to availability of energy at a particular instant. In this setting, the optimal power allocation problem to maximize the sum throughput with a given deadline is formulated. The convergence of the proposed iterative coordinate descent method for the problem is proved and the short-term throughput maximizing offline power allocation policy is found. Examples for interference regions with known sum capacities are given with directional waterfilling interpretations. Next, stochastic data arrivals are addressed. Finally, online and/or distributed near-optimal policies are proposed. Performance of the proposed algorithms are demonstrated through simulations.

213 citations


Journal ArticleDOI
TL;DR: This paper considers a smart charging and discharging process for multiple PHEVs in a building's garage to optimize the energy consumption profile of the building and proposes a distributed algorithm in which each PHEV independently selects its best strategy to maximize the utility function.
Abstract: Plug-in hybrid electric vehicles (PHEVs) will be widely used in future transportation systems to reduce oil fuel consumption. Therefore, the electrical energy demand will be increased due to the charging of a large number of vehicles. Without intelligent control strategies, the charging process can easily overload the electricity grid at peak hours. In this paper, we consider a smart charging and discharging process for multiple PHEVs in a building's garage to optimize the energy consumption profile of the building. We formulate a centralized optimization problem in which the building controller or planner aims to minimize the square Euclidean distance between the instantaneous energy demand and the average demand of the building by controlling the charging and discharging schedules of PHEVs (or ‘users’). The PHEVs' batteries will be charged during low-demand periods and discharged during high-demand periods in order to reduce the peak load of the building. In a decentralized system, we design an energy cost-sharing model and apply a non-cooperative approach to formulate an energy charging and discharging scheduling game, in which the players are the users, their strategies are the battery charging and discharging schedules, and the utility function of each user is defined as the negative total energy payment to the building. Based on the game theory setup, we also propose a distributed algorithm in which each PHEV independently selects its best strategy to maximize the utility function. The PHEVs update the building planner with their energy charging and discharging schedules. We also show that the PHEV owners will have an incentive to participate in the energy charging and discharging game. Simulation results verify that the proposed distributed algorithm will minimize the peak load and the total energy cost simultaneously.

126 citations


Journal ArticleDOI
TL;DR: In this paper, the authors considered two source-destination pairs and applied the concept of cognitive radio communication in sharing the common channel and obtained a two-dimensional maximum stable throughput region which describes the theoretical limit on rates that we can push into the network while maintaining the queues in the network to be stable.
Abstract: This paper considers the scenario in which a set of nodes share a common channel. Some nodes have a rechargeable battery and the others are plugged to a reliable power supply and, thus, have no energy limitations. We consider two source-destination pairs and apply the concept of cognitive radio communication in sharing the common channel. Specifically, we give high-priority to the energy-constrained source-destination pair, i.e., primary pair, and low-priority to the pair which is free from such constraint, i.e., secondary pair. In contrast to the traditional notion of cognitive radio, in which the secondary transmitter is required to relinquish the channel as soon as the primary is detected, the secondary transmitter not only utilizes the idle slots of primary pair but also transmits along with the primary transmitter with probability p. This is possible because we consider the general multipacket reception model. Given the requirement on the primary pair's throughput, the probability p is chosen to maximize the secondary pair's throughput. To this end, we obtain two-dimensional maximum stable throughput region which describes the theoretical limit on rates that we can push into the network while maintaining the queues in the network to be stable. The result is obtained for both cases in which the capacity of the battery at the primary node is infinite and also finite.

79 citations


Journal ArticleDOI
TL;DR: The use of IEEE 802.11s-based wireless LAN mesh networks as high-speed wireless backbone networks for smart grid infrastructure to provide high scalability and flexibility while ensuring low installation and management costs is suggested.
Abstract: A challenge faced by smart grid systems is providing highly reliable transmissions to better serve different types of electrical applications and improve the energy efficiency of the system. Although wireless networking technologies can provide highspeed and cost-effective solutions, their performance may be impaired by various factors that affect the reliability of smart grid networks. Here, we first suggest the use of IEEE 802.11s-based wireless LAN mesh networks as high-speed wireless backbone networks for smart grid infrastructure to provide high scalability and flexibility while ensuring low installation and management costs. Thereafter, we analyze some vital problems of the IEEE 802.11s default routing protocol (named hybrid wireless mesh protocol; HWMP) from the perspective of transfer reliability, and propose appropriate solutions with a new routing method called HWMP-reliability enhancement to improve the routing reliability of 802.11s-based smart grid mesh networking. A simulation study using ns-3 was conducted to demonstrate the superiorityof the proposed schemes.

79 citations


Journal ArticleDOI
TL;DR: The proposed schemes introduce a selection gain which partially compensates for the decrease in coding gain due to limiting the number of participating relays to two, and show improved secrecy capacities compared to existing physical layer security schemes employing cooperative relays.
Abstract: In this paper, we propose combined relay selection and cooperative beamforming schemes for physical layer security. Generally, high operational complexity is required for cooperative beamforming with multiple relays because of the required information exchange and synchronization among the relays. On the other hand, while it is desirable to reduce the number of relays participating in cooperative beamforming because of the associated complexity problem, doing so may degrade the coding gain of cooperative beamforming. Hence, we propose combined relay selection and cooperative beamforming schemes, where only two of the available relays are selected for beamforming and data transmission. The proposed schemes introduce a selection gain which partially compensates for the decrease in coding gain due to limiting the number of participating relays to two. Both the cases where full and only partial channel state information are available for relay selection and cooperative beamforming are considered. Analytical and simulation results for the proposed schemes show improved secrecy capacities compared to existing physical layer security schemes employing cooperative relays.

65 citations


Journal ArticleDOI
TL;DR: This paper considers a source node that operates over a time varying channel with energy harvesting capability, and proves that the optimal policy is a threshold type policy depending on the state of the channel and the length of the energy queue.
Abstract: In this paper, we consider a source node that operates over a time varying channel with energy harvesting capability. The goal of the source is to maximize the average number of successfully delivered packets per time slot. The source is able to choose whether to transmit a packet or defer the transmission in each time slot. The decision which is chosen by the source depends on the channel information available and the length of the energy queue. We formulate the problem of finding the optimal policy as a Markovian decision problem. We show some properties of the value function that represents the discounted number of successfully delivered packets per time slot. We prove that the optimal policy is a threshold type policy depending on the state of the channel and the length of the energy queue. We also derive an upper bound for the average number of packets per time slots successfully received by the destination. We show using numerical results that this bound is a tight bound on the performance of the optimal policy. And we consider the case of time varying channel but without channel state information (CSI). Then, we study the impact of channel time varying nature and the availability of CSI. In this case, we show that the optimal policy is a greedy policy. The performance of this greedy policy is also calculated.

57 citations


Journal ArticleDOI
TL;DR: Simulation results show that the cooperative smart grid (coopSG) communication model improves the end-to-end packet delivery latency, throughput, and energy efficiency over both the Wang et al. and Niyato etAl.
Abstract: Many studies have investigated the smart grid architecture and communication models in the past few years. However, the communication model and architecture for a smart grid still remain unclear. Today's electric power distribution is very complex and maladapted because of the lack of efficient and cost-effective energy generation, distribution, and consumption management systems. A wireless smart grid communication system can playan important role in achieving these goals. In thispaper, we describe a smart grid communication architecture in which we merge customers and distributors into a single domain. In the proposed architecture, all the home area networks, neighborhood area networks, and local electrical equipment form a local wireless mesh network (LWMN). Each device or meter can act as a source, router, or relay. The data generated in any node (device/meter) reaches the data collector via other nodes. The data collector transmits this data via the access point of a wide area network (WAN). Finally, data is transferred to the service provider or to the control center of the smart grid. We propose a wireless cooperative communication model for the LWMN. We deploy a limited number of smart relays to improve the performance of the network. A novel relay selection mechanism is also proposed to reduce the relay selection overhead. Simulation results show that our cooperative smart grid (coopSG) communication model improves the end-to-end packet delivery latency, throughput, and energy efficiency over both the Wang et al. and Niyato et al. models.

54 citations


Journal ArticleDOI
Min Wei1, Keecheon Kim1
TL;DR: This work proposes a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data that can quickly and precisely predict network traffic.
Abstract: Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.

53 citations


Journal ArticleDOI
TL;DR: This paper assess algorithms to schedule charging of plug-in (hybrid) electric vehicles as to minimize the additional peak load they might cause, and results show that controlled charging reduces peak load, load variability, and deviations from the nominal grid voltage.
Abstract: A potential breakthrough of the electrification of the vehicle fleet will incur a steep rise in the load on the electrical power grid. To avoid huge grid investments, coordinated charging of those vehicles is a must. In this paper, we assess algorithms to schedule charging of plug-in (hybrid) electric vehicles as to minimize the additional peak load they might cause. We first introduce two approaches, one based on a classical optimization approach using quadratic programming, and a second one, market based coordination, which is a multi-agent system that uses bidding on a virtual market to reach an equilibrium price that matches demand and supply. We benchmark these two methods against each other, as well as to a baseline scenario of uncontrolled charging. Our simulation results covering a residential area with 63 households show that controlled charging reduces peak load, load variability, and deviations from the nominal grid voltage.

Journal ArticleDOI
TL;DR: A gateway selection scheme that considers multiple QoS path parameters such as path availability period, available capacity and latency, to select a potential gateway node is proposed and results show that the weighting factors improve the throughput and end-to-end delay compared to the conventional schemes.
Abstract: Several gateway selection schemes have been proposed that select gateway nodes based on a single Quality of Service (QoS) path parameter, for instance path availability period, link capacity or end-to-end delay, etc or on multiple non-QoS parameters, for instance the combination of gateway node speed, residual energy, and number of hops, for Mobile Ad hoc NETworks (MANETs) Each scheme just focuses on the ment of improve only a single network performance, ie, network throughput, packet delivery ratio, end-to-end delay, or packet drop ratio However, none of these schemes improves the overall network performance because they focus on a single QoS path parameter or on set of non-QoS parameters To improve the overall network performance, it is necessary to select a gateway with stable path, a path with the maximum residual load capacity and the minimum latency In this paper, we propose a gateway selection scheme that considers multiple QoS path parameters such as path availability period, available capacity and latency, to select a potential gateway node We improve the path availability computation accuracy, we introduce a feedback system to updated path dynamics to the traffic source node and we propose an efficient method to propagate QoS parameters in our scheme Computer simulations show that our gateway selection scheme improves throughput and packet delivery ratio with less per node energy consumption It also improves the end-to-end delay compared to single QoS path parameter gateway selection schemes In addition, we simulate the proposed scheme by considering weighting factors to gateway selection parameters and results show that the weighting factors improve the throughput and end-to-end delay compared to the conventional schemes

Journal ArticleDOI
TL;DR: Two approaches to solve the problem of unnecessary traffic created due to the duplicated copies of each sent frame in high-availability seamless redundancy by dividing any closed-loop HSR network into several VRing, which results in an enhancement of traffic performance.
Abstract: High-availability seamless redundancy (HSR) is a redundancy protocol for Ethernet networks that provides two frame copies for each frame sent. Each copy will pass through separate physical paths, pursuing zero fault recovery time. This means that even in the case of a node or a link failure, there is no stoppage of network operations whatsoever. HSR is a potential candidate for the communications of a smart grid, but its main drawback is the unnecessary traffic created due to the duplicated copies of each sent frame, which are generated and circulated inside the network. This downside will degrade network performance and might cause network congestion or even stoppage. In this paper, wepresent two approaches to solve the above-mentioned problem. The first approach is called quick removing (QR), and is suited to ring or connected ring topologies. The idea is to remove the duplicated frame copies from the network when all the nodes have received one copy of the sent frame and begin to receive the second copy. Therefore, the forwarding of those frame copies until they reach the source node, as occurs in standard HSR, is not needed in QR. Our example shows a traffic reduction of 37.5% compared to the standard HSR protocol. The second approach is called the virtual ring (VRing), which divides any closed-loop HSR network into several VRings. Each VRing will circulate the traffic of a corresponding group of nodes within it. Therefore, the traffic in that group will not affect any of the other network links or nodes, which results in an enhancement of traffic performance. For our sample network, the VRing approach shows a network traffic reduction in the range of 67.7 to 48.4% in a healthy network case and 89.7 to 44.8% in a faulty network case, compared to standard HSR.

Journal ArticleDOI
TL;DR: In the proposed protocol, whenever destination unsuccessfully receives the source's signal, one of relays that exploit hybrid decode-amplify-forward technique is chosen to retransmit the signal.
Abstract: In this paper, we propose a hybrid decode-amplify-forward incremental cooperative diversity protocol using SNR-based relay selection. In the proposed protocol, whenever destination unsuccessfully receives the source's signal, one of relays that exploit hybrid decode-amplify-forward technique is chosen to retransmit the signal. We derive approximate closed-form expressions of outage probability and average channel capacity. MonteCarlo simulations are presented to verify the theoretical results and compare the performance of the proposed protocol with the direct transmission protocol and conventional incremental relaying protocols.

Journal ArticleDOI
TL;DR: This paper studies the role of cooperative relays to provide and improve secure communication rates through decode-and-forward (DF) strategies in a full-duplex multiple relay network with an eavesdropper and proposes several strategies that implement different versions of this scheme suited for cooperation with multiple relays.
Abstract: In this paper, we study the role of cooperative relays to provide and improve secure communication rates through decode-and-forward (DF) strategies in a full-duplex multiple relay network with an eavesdropper. We consider the DF scheme as a basis for cooperation and propose several strategies that implement different versions of this scheme suited for cooperation with multiple relays. Our goal is to give an efficient cooperation paradigm based on the DF scheme to provide and improve secrecy in a multiple relay network. We first study the DF strategy for secrecy in a single relay network. We propose a suboptimal DF with zero forcing (DF/ZF) strategy for which we obtain the optimal power control policy. Next, we consider the multiple relay problem. We propose three different strategies based on DF/ZF and obtain their achievable secrecy rates. The first strategy is a single hop strategy whereas the other two strategies are multiple hop strategies. In the first strategy, we show that it is possible to eliminate all the relays' signals from the eavesdropper's observation (full ZF), however, the achievable secrecy rate is limited by the worst source-relay channel. Our second strategy overcomes the drawback of the first strategy, however, with the disadvantage of enabling partial ZF only. Our third strategy provides a reasonable compromise between the first two strategies. That is, in this strategy, full ZF is possible and the rate achieved does not suffer from the drawback of the first strategy. We conclude our study by a set of numerical results to illustrate the performance of each of the proposed strategies in terms of the achievable rates in different practical scenarios.

Journal ArticleDOI
TL;DR: This paper considers a delayed feedback system, and investigates the impact of delayed CDI on security by using a transmit beamforming and AN scheme, and results indicate that the achievable secrecy rate with optimal power allocation can be improved significantly as compared to that with fixed power allocation.
Abstract: Utilizing artificial noise (AN) is a good means to guarantee security against eavesdropping in a multi-input multi-output system, where the AN is designed to lie in the null space of the legitimate receiver's channel direction information (CDI). However, imperfect CDI will lead to noise leakage at the legitimate receiver and cause significant loss in the achievable secrecy rate. In this paper, we consider a delayed feedback system, and investigate the impact of delayed CDI on security by using a transmit beamforming and AN scheme. By exploiting the Gauss-Markov fading spectrum to model the feedback delay, we derive a closed-form expression of the upper bound on the secrecy rate loss, where Nt = 2. For a moderate number of antennas where Nt >; 2, two special cases, based on the first-order statistics of the noise leakage and large number theory, are explored to approximate the respective upper bounds. In addition, to maintain a constant signal-to-interference-plus-noise ratio degradation, we analyze the corresponding delay constraint. Furthermore, based on the obtained closed-form expression of the lower bound on the achievable secrecy rate, we investigate an optimal power allocation strategy between the information signal and the AN. The analytical and numerical results obtained based on first-order statistics can be regarded as a good approximation of the capacity that can be achieved at the legitimate receiver with a certain number of antennas, Nt. In addition, for a given delay, we show that optimal power allocation is not sensitive to the number of antennas in a high signal-to-noise ratio regime. The simulation results further indicate that the achievable secrecy rate with optimal power allocation can be improved significantly as compared to that with fixed power allocation. In addition, as the delay increases, the ratio of power allocated to the AN should be decreased to reduce the secrecy rate degradation.

Journal ArticleDOI
TL;DR: This paper presents a framework towards robust key generation from multipath wireless channels, achieving high secret bits generation rate and investigates the effects of delay and mobility on the performance.
Abstract: This paper tackles the problem of generating shared secret keys based on the physical characteristics of the wireless channel. We propose intelligent quantization mechanisms for key generation, achieving high secret bits generation rate. Moreover, some practical issues affecting the performance of the key generation mechanism are deeply investigated. Mainly, we investigate the effects of delay and mobility on the performance and we enhance the key generation mechanism accordingly. As a result, this paper presents a framework towards robust key generation from multipath wireless channels.

Journal ArticleDOI
TL;DR: The proposed multi-objective handover solution considers multiple parameters like signal strength and available bandwidth in the selection of the optimal target cell, which results in a significant increase in the handover success rate, thereby reducing the blocking of handover and new sessions.
Abstract: One of the key elements in the emerging, packet-based long term evolution (LTE) cellular systems is the deployment of multiple femtocells for the improvement of coverage and data rate. However, arbitrary overlaps in the coverage of these femto-cells make the handover operation more complex and challenging. As the existing handover strategy of LTE systems considers only carrier to interference plus noise ratio (CINR), it often suffers from resource constraints in the target femtocell, thereby leading to handover failure. In this paper, we propose a new efficient, multi-objective handover solution for LTE cellular systems. The proposed solution considers multiple parameters like signal strength and available bandwidth in the selection of the optimal target cell. This results in a significant increase in the handover success rate, thereby reducing the blocking of handover and new sessions. The overall handover process is modeled and analyzed by a three-dimensional Markov chain. The analytical results for the major performance metrics closely resemble the simulation results. The simulation results show that the proposed multi-objective handover offers considerable improvement in the session blocking rates, session queuing delay, handover latency, and goodput during handover.

Journal ArticleDOI
TL;DR: It is formally proven that the proposed protocol provides strong AKE-security and tolerates up to n-2 malicious insiders for weak MA- security and resists key control attack under a weak corruption model.
Abstract: Group key agreement protocols allow a group of users, communicating over a public network, to establish a shared secret key to achieve a cryptographic goal. Protocols based on certificateless public key cryptography (CL-PKC) are preferred since CL-PKC does not need certificates to guarantee the authenticity of public keys and does not suffer from key escrow of identity-based cryptography. Most previous certificateless group key agreement protocols deploy signature schemes to achieve authentication and do not have constant rounds. No security model has been presented for group key agreement protocols based on CL-PKC. This paper presents a security model for a certificateless group key agreement protocol and proposes a constant-round group key agreement pro- tocol based on CL-PKC. The proposed protocol does not involve any signature scheme, which increases the efficiency of the protocol. It is formally proven that the proposed protocol provides strong AKE-security and tolerates up to n-2 malicious insiders for weak MA-security. The protocol also resists key control attack under a weak corruption model.

Journal ArticleDOI
TL;DR: By both this and Jang et al.'s methods, an arbitrary binary aperiodic, periodic, or Z-complementary sequence set can be transformed into a quaternary one no matter its length of sub-sequences is odd or even.
Abstract: Based on the known binary sequence sets and Gray mapping, a new method for constructing quaternary sequence sets is presented and the resulting sequence sets' properties are investigated As three direct applications of the proposed method, when we choose the binary aperiodic, periodic, and Z-complementary sequence sets as the known binary sequence sets, the resultant quaternary sequence sets are the quaternary aperiodic, periodic, and Z-complementary sequence sets, respectively In comparison with the method proposed by Jang et al, the new method can cope with either both the aperiodic and periodic cases or both even and odd lengths of sub-sequences, whereas the former is only fit for the periodic case with even length of sub-sequences As a consequence, by both our and Jang et al's methods, an arbitrary binary aperiodic, periodic, or Z-complementary sequence set can be transformed into a quaternary one no matter its length of sub-sequences is odd or even Finally, a table on the existing quaternary periodic complementary sequence sets is given as well

Journal ArticleDOI
TL;DR: This paper investigates a promising solution that exploits the ultra wide band (UWB) technology to let cognitive radio nodes discover each other and exchange control information for establishing a communication link.
Abstract: The implementation of a common control channel is one of the most challenging issues in cognitive radio networks, since a fully reliable control channel cannot be created without reserving bandwidth specifically for this purpose. In this paper, we investigate a promising solution that exploits the ultra wide band (UWB) technology to let cognitive radio nodes discover each other and exchange control information for establishing a communication link. The contribution of this paper is threefold: (i) We define the communication protocol needed to let cognitive radio nodes discover each other and exchange control information for link set up, (ii) we overcome the gap in coverage, which typically exists between UWB and long-medium range technologies, by using multi-hop communication, (iii) we evaluate the performance of our approach by adopting an accurate channel model and show its benefits with respect to an in-band signaling solution.

Journal ArticleDOI
TL;DR: A smart meter is considered and an efficient mutual authentication protocol is proposed that uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter to prove the protocol's security and performance.
Abstract: In a smart grid environment, data for the usage and control of power are transmitted over an Internet protocol (IP)-based network. This data contains very sensitive information about the user or energy service provider (ESP); hence, measures must be taken to prevent data manipulation. Mutual authentication between devices, which can prevent impersonation attacks by verifying the counterpart's identity, is a necessary process for secure communication. However, it is difficult to apply existing signature-based authentication in a smart grid system because smart meters, a component of such systems, are resource-constrained devices. In this paper, we consider a smart meter and propose an efficient mutual authentication protocol. The proposed protocol uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter. To prove this, we analyze the protocol's security and performance.

Journal ArticleDOI
TL;DR: This work considers resource allocation in femto-cell networks to maximize the throughput while minimizing interference to macro-users nearby by allocating spectrum resource in a cognitive radio way and proves the effectiveness of the proposed scheme by computer simulations.
Abstract: We consider resource allocation in femto-cell networks to maximize the throughput while minimizing interference to macro-users nearby. This can be achieved by allocating spectrum resource in a cognitive radio way. The proposed resource allocation is performed in two steps; spectrum sensing and resource scheduling. The femto base station detects idle frequency assignments (FAs) free from the occupation by macro-users and then allocates sub-channels in an idle FA to femto-users, effectively managing the interference problem. Finally, the effectiveness of the proposed scheme is verified by computer simulations.

Journal ArticleDOI
TL;DR: A novel CCC selection protocol is proposed that is implemented in a distributed way according to the appearance patterns of primary systems and connectivity among nodes and minimizes the possibility of CCC disruption by primary user activities and maximizes node connectivity when the control channel is set up.
Abstract: The exponential growth in wireless services has resulted in an overly crowded spectrum. The current state of spectrum al- location indicates that most usable frequencies have already been occupied. This makes one pessimistic about the feasibility of integrating emerging wireless services such as large-scale sensor net- works into the existing communication infrastructure. Cognitive radio is an emerging dynamic spectrum access technology that can be used for flexibly and efficiently achieving open spectrum sharing. Cognitive radio is an intelligent wireless communication system that is aware of its radio environment and that is capable of adapting its operation to statistical variations of the radio frequency. In ad hoc cognitive radio networks, a common control channel (CCC) is usually used for supporting transmission coordination and spectrum-related information exchange. Determining a CCC in distributed networks is a challenging research issue be- cause the spectrum availability at each ad hoc node is quite different and dynamic due to the interference between and coexistence of primary users. In this paper, we propose a novel CCC selection protocol that is implemented in a distributed way according to the appearance patterns of primary systems and connectivity among nodes. The proposed protocol minimizes the possibility of CCC disruption by primary user activities and maximizes node connectivity when the control channel is set up. It also facilitates adaptive recovery of the control channel when the primary user is detected on that channel.

Journal ArticleDOI
TL;DR: The protocol presented can provide an identification (ID)-based authentication service and resist different key attacks and can be further extended to provide the fault tolerant property.
Abstract: Key agreement protocol is a fundamental protocol in cryptography whereby two or more participants can agree on a common conference key in order to communicate securely among themselves. In this situation, the participants can securely send and receive messages with each other. An adversary not having access to the conference key will not be able to decrypt the messages. In this paper, we propose a novel identity-based authenticated multi user key agreement protocol employing a symmetric balanced incomplete block design. Our protocol is built on elliptic curve cryptography and takes advantage of a kind of bilinear map called Weil pairing. The protocol presented can provide an identification (ID)-based authentication service and resist different key attacks. Furthermore, our protocol is efficient and needs only two rounds for generating a common conference key. It is worth noting that the com munication cost for generating a conference key in our protocol is only O(n√n) and the computation cost is only O(nm2), where n implies the number of participants and m denotes the extension degree of the finite field Fpm. In addition, in order to resist the different key attack from malicious participants, our protocol can be further extended to provide the fault tolerant property.

Journal ArticleDOI
TL;DR: A distributed security framework is proposed to protect not only service operations but also data contents in smart grid environments and a security implementation scheme is given for SCADA services.
Abstract: With the smart grid coming near, wide-area supervisory control and data acquisition (SCADA) becomes more and more important. However, traditional SCADA systems are not suitable for the openness and distribution requirements of smart grid. Distributed SCADA services should be openly composable and secure. Event-driven methodology makes service collaborations more realtime and flexible because of the space, time and control decoupling of event producer and consumer, which gives us an appropriate foundation. Our SCADA services are constructed and integrated based on distributed events in this paper. Unfortunately, an event-driven SCADA service does not know who consumes its events, and consumers do not know who produces the events either. In this environment, a SCADA service cannot directly control access because of anonymous and multicast interactions. In this paper, a distributed security framework is proposed to protect not only service operations but also data contents in smart grid environments. Finally, a security implementation scheme is given for SCADA services.

Journal ArticleDOI
TL;DR: This paper considers a decode-and-forward two-way relay system over OFDM with two strategies: A joint subcarrier matching algorithm and a power allocation algorithm operating with a total power constraint for all subcarriers.
Abstract: A decode-and-forward two-way relay system benefits from orthogonal frequency division multiplexing (OFDM) and relay transmission. In this paper, we consider a decode-and-forward two-way relay system over OFDM with two strategies: A joint subcarrier matching algorithm and a power allocation algorithm operating with a total power constraint for all subcarriers. The two strategies are studied based on average capacity using numerical analysis by uniformly allocating power constraints for each subcarrier matching group. An optimal subcarrier matching algorithm is proposed to match subcarriers in order of channel power gain for both transmission sides. Power allocation is defined based on equally distributing the capacity of each hop in each matching group. Afterward, a modified water-filling algorithm is also considered to allocate the power among all matching groups in order to increase the overall capacity of the network. Finally, Monte Carlo simulations are completed to confirm the numerical results and show the advantages of the joint subcarrier matching, power allocation and water filling algorithms, respectively.

Journal ArticleDOI
TL;DR: According to simulation results, the proposed blind algorithm produces superior performance in multi-path communication channels corrupted with impulsive noise and has relatively less sensitivity to channel eigenvalue ratio.
Abstract: In this paper, a new blind signal processing scheme for equalization in fading and impulsive-noise channel environments is introduced based on probability density function matching method and a set of Dirac-delta functions. Gaussian kernel of the proposed blind algorithm has the effect of cutting out the outliers on the difference between the desired level values and impulse-infected outputs. And also the proposed algorithm has relatively less sensitivity to channel eigenvalue ratio and has reduced computational complexity compared to the recently introduced correntropy algorithm. According to these characteristics, simulation results show that the proposed blind algorithm produces superior performance in multi-path communication channels corrupted with impulsive noise.

Journal ArticleDOI
TL;DR: CRLBs of TDOA and TDOA/SS based positioning methods for NLOS environment are derived and theoretical analysis proves that the derived CRLB for TDOA is the same as that of pseudo-range TOA and the TDoa/SS scheme has a lower CRLBs than the TDOA (or SS) scheme.
Abstract: The performance analysis of wireless geolocation in a non-line-of-sight (NLOS) environment is a very important issue. Since Cramer-Rao lower bound (CRLB) determines the physical impossibility of the variance of an unbiased estimator being less than the bound, many studies presented the performance analysis in terms of CRLB. Several CRLBs for time-of-arrival (TOA), pseudo-range TOA, angle-of-arrival (AOA), and signal strength (SS) based positioning methods have been derived for NLOS environment. However, the performance analysis of time difference of arrival (TDOA) and TDOA/SS based geolocation techniques in a NLOS environment is still an opening issue. This paper derives the CRLBs of TDOA and TDOA/SS based positioning methods for NLOS environment. In addition, theoretical analysis proves that the derived CRLB for TDOA is the same as that of pseudo-range TOA and the TDOA/SS scheme has a lower CRLB than the TDOA (or SS) scheme.

Journal ArticleDOI
TL;DR: With a simplified model of multi-hop WSNs with cooperative multi-input single-output scheme, this paper changes the transmission schemes, the sizes and transmission distances of clusters to investigate their effects on the cluster lifetimes.
Abstract: As for cluster-based wireless sensor networks (WSNs), cluster lifetime is one of the most important subjects in recent researches. Besides reducing the energy consumptions of the clusters, it is necessary to make the clusters achieve equal lifetimes so that the whole network can survive longer. In this paper, we focus on the cluster lifetimes in multi-hop WSNs with cooperative multi-input single-output scheme. With a simplified model of multi-hop WSNs, we change the transmission schemes, the sizes and transmission distances of clusters to investigate their effects on the cluster lifetimes. Furthermore, linear and uniform data aggregations are considered in our model. As a result, we analyze the cluster lifetimes in different situations and discuss the requirements on the sizes and transmission distances of clusters for equal lifetimes.