motbanner.jpg

Cooperative D2D communications in the uplink of cellular networks with time and power division

Cooperative device-to-device (D2D) communication is proposed as a promising technology to improve the spectral efficiency in crowded communication networks. In this paper, we consider a transmitter-receiver pair, operating in the D2D transmission mode, overlaying the cellular network. The D2D transmitter (DT) acts as a relay for the undelivered packets of cellular user equipment (CUE). We consider the case in which the DT transmits its own data along with the relayed data using superposition coding in the uplink. We investigate how the time slot is split between the cellular network

Software and Communications

Optimization of wireless powered communication networks with heterogeneous nodes

This paper studies optimal resource allocation in a wireless powered communication network with two groups of users; one is assumed to have radio frequency (RF) energy harvesting capability and no other energy sources, while the other group has legacy nodes that are assumed not to have RF energy harvesting capability and are equipped with dedicated energy supplies. First, the base-station (BS) with a constant power supply broadcasts an energizing signal over the downlink. Afterwards, all users transmit their data independently on the uplink using time division multiple access (TDMA). We

Software and Communications

Optimization of energy-constrained wireless powered communication networks with heterogeneous nodes

In this paper, we generalize conventional time division multiple access (TDMA) wireless networks to a new type of wireless networks coined generalized wireless powered communication networks (g-WPCNs). Our prime objective is to optimize the design of g-WPCNs where nodes are equipped with radio frequency (RF) energy harvesting circuitries along with constant energy supplies. This constitutes an important step towards a generalized optimization framework for more realistic systems, beyond prior studies where nodes are solely powered by the inherently limited RF energy harvesting. Towards this

Software and Communications

Band allocation for cognitive radios with buffered primary and secondary users

In this paper, we study band allocation of Ms buffered secondary users (SUs) to Mp orthogonal primary licensed bands, where each primary band is assigned to one primary user (PU). Each SU is assigned to one of the available primary bands with a certain probability designed to satisfy some specified quality of service (QoS) requirements for the SUs. In the proposed system, only one SU is assigned to a particular band. The optimization problem used to obtain the stability region's envelope (closure) is shown to be a linear program. We compare the stability region of the proposed system with that

Software and Communications

Optimal spectrum access for a rechargeable cognitive radio user based on energy buffer state

This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources, e.g., solar, wind and acoustic noise. We propose a probabilistic access strategy by the SU based on the number of packets at its energy queue. In particular, when the energy queue is in a certain state, the SU probabilistically uses a total number of energy packets that is at most equal to the number of packets at its energy queue. The probability

Software and Communications

Fingerprinting with minimum distance decoding

This paper adopts an information-theoretic framework for the design of collusion-resistant coding/decoding schemes for digital fingerprinting. More specifically, the minimum distance decision rule is used to identify 1 out of $t$ pirates. Achievable rates, under this detection rule, are characterized in two scenarios. First, we consider the averaging attack where a random coding argument is used to show that the rate 1/2 is achievable with $t=2$ pirates. Our study is then extended to the general case of arbitrary $t$ highlighting the underlying complexity-performance tradeoff. Overall, these

Software and Communications

Cooperative access in cognitive radio networks: Stable throughput and delay tradeoffs

In this paper, we study and analyze fundamental throughput-delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user (SU) serves either the queue of its own data or the queue of the primary user (PU) relayed data with certain service probabilities. The proposed policy opens room for trading the PU delay for enhanced SU delay. Towards this objective, stability conditions for the queues involved in the system are derived. Furthermore, a moment generating function approach is employed to derive

Software and Communications

Cognitive Radio Networks with Probabilistic Relaying: Stable Throughput and Delay Tradeoffs

This paper studies fundamental throughput and delay tradeoffs in cognitive radio systems with cooperative secondary users. We focus on randomized cooperative policies, whereby the secondary user (SU) serves either its own queue or the primary users (PU) relayed packets queue with certain service probability. The proposed policy opens room for trading the PU delay for enhanced SU delay, and vice versa, depending on the application QoS requirements. Towards this objective, the system's stable throughput region is characterized. Furthermore, the moment generating function approach is employed and

Software and Communications

A source authentication scheme using network coding

In this paper, we explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, we propose a novel Source Authentication using Network Coding (SANC) scheme. Towards this objective, we propose a general framework for embedding the authentication information within the network coding Global Encoding Vector. First, we illustrate the proposed concept using a simple mapping function. Second, we present a detailed security analysis that reveals the security merits of the proposed scheme

Software and Communications

Cache-Aware Source Coding

In this letter, we show that Huffman's source coding method is not optimal for cache-aided networks. To that end, we propose an optimal algorithm for the cache-aided source coding problem. We define cache-aided entropy, which represents a lower bound on the average number of transmitted bits for cached-aided networks. A sub-optimal low-complexity cache-aided coding algorithm is presented. In addition, we propose a novel polynomial-time algorithm that obtains the global-optimal source code for wide range of cache sizes. Simulation results show a reduction in the average number of transmitted

Software and Communications