Cognitive radio networks, a.k.a. dynamic spectrum access networks, offer a promising solution to the problems of spectrum scarcity and under-utilization. In this paper, we consider two single-user links: primary and secondary links. To increase secondary user (SU) transmission opportunities and increase primary user (PU) throughput, we consider a cognitive relay network where a SU relays PU packets that are unsuccessfully received at the primary receiver (PR). At the PR side, two protocols are suggested: i) energy accumulation (EA), and ii) mutual-information accumulation (MIA). The average stable throughput of the secondary link is derived under these protocols for a specific throughput selected by the primary link. Results show that EA and MIA can significantly improve the secondary throughput compared with the no accumulation scenario, especially under extreme environment. 
                        more » 
                        « less   
                    
                            
                            Cognitive Overlay for Inter-system Cellular Dynamic Spectrum Sharing in the Downlink
                        
                    
    
            This paper assesses the feasibility of a novel dynamic spectrum sharing approach for a cellular downlink based on cognitive overlay to allow non-orthogonal cellular transmissions from a primary and a secondary radio access technology concurrently on the same radio resources. The 2-user Gaussian cognitive interference channel is used to model a downlink scenario in which the primary and secondary base stations are co-located. A system architecture is defined that addresses practical challenges associated with cognitive overlay, in particular the noncausal knowledge of the primary user message at the cognitive transmitter. A cognitive overlay scheme is applied that combines superposition coding with dirty paper coding, and a primary user protection criterion is derived that is specific to a scenario in which the primary system is 4G while the secondary system is 5G. Simulation is used to evaluate the achievable signal-to-interference-plus-noise ratio (SINR) at the 4G and 5G receivers, as well as the cognitive power allocation parameter as a function of distance. Results suggest that the cognitive overlay scheme is feasible when the distance to the 5G receiver is relatively small, even when a large majority of the secondary user transmit power is allocated to protecting the primary user transmission. Achievable link distances for the 5G receiver are on the order of hundreds of meters for an urban macrocell or a few kilometers for a rural macrocell. 
        more » 
        « less   
        
    
                            - Award ID(s):
- 2034616
- PAR ID:
- 10293939
- Date Published:
- Journal Name:
- IEEE International Conference on Communications workshops
- ISSN:
- 2694-2941
- Page Range / eLocation ID:
- 1-6
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
- 
            
- 
            Overlay cognitive radio (CR) networks include a primary and cognitive base station (BS) sharing the same frequency band. This paper focuses on designing a robust symbol-level pre-coding (SLP) scheme where the primary BS shares data and quantized channel state information (CSI) with the cognitive BS. The proposed approach minimizes the cognitive BS transmission power under symbol-wise Safety Margin (SM) constraints for both the primary and cognitive systems. We apply the additive quantization noise model to describe the statistics of the quantized PBS CSI and employ a stochastic constraint to formulate the optimization problem, which is then converted to be deterministic. Simulation results show that the robust SLP protects the primary users from the effect of the imperfect CSI and simultaneously offers significantly improved energy efficiency compared to nonrobust methods.more » « less
- 
            In order to secure wireless communications, we consider the usage of physical-layer security (PLS) mechanisms (i.e., coding for secrecy mechanisms) combined with self-interference generation. We present a prototype implementation of a scrambled coding for secrecy mechanisms with interference generation by the legitimate receiver and the cancellation of the effect of self-interference (SI). Regarding the SI cancellation, four state-of-the-art algorithms were considered: Least mean square (LMS), normalized least mean square (NLMS), recursive least squares (RLS) and QR decomposition recursive least squares (QRDRLS). The prototype implementation is performed in real-world software-defined radio (SDR) devices using GNU-Radio, showing that the LMS outperforms all other algorithms considered (NLMS, RLS and QRDRLS), being the best choice to use in this situation (SI cancellation). It was also shown that it is possible to secure communication using only noise generation by the legitimate receiver, though a variation of the packet loss rate (PLR) and the bit error rate (BER) gaps is observed when moving from the fairest to an advantageous or a disadvantageous scenario. Finally, when noise generation was combined with the adapted scrambled coding for secrecy with a hidden key scheme, a noteworthy security improvement was observed resulting in an increased BER for Eve with minor interference to Bob.more » « less
- 
            5G New Radio cellular networks are designed to provide high Quality of Service for application on wirelessly connected devices. However, changing conditions of the wireless last hop can degrade application performance, and the applications have no visibility into the 5G Radio Access Network (RAN). Most 5G network operators run closed networks, limiting the potential for co-design with the wider-area internet and user applications. This paper demonstrates NR-Scope, a passive, incrementally-deployable, and independently-deployable Standalone 5G network telemetry system that can passively measure fine-grained RAN capacity, latency, and retransmission information. Application servers can take advantage of the measurements to achieve better millisecond scale, application-level decisions on offered load and bit rate adaptation than end-to-end latency measurements or end-to-end packet losses currently permit. We demonstrate the performance of NR-Scope by decoding the downlink control information (DCI) for downlink and uplink traffic of a 5G Standalone base station in real-time.more » « less
- 
            This paper focuses on designing robust symbol-level precoding (SLP) in an overlay cognitive radio (CR) network, where the primary and secondary networks transmit signals concurrently. When the primary base station (PBS) shares data and perfect channel state information (CSI) with the cognitive base station (CBS), we derive an SLP approach that minimizes the CR transmission power and satisfies symbol-wise Safety Margin (SM) constraints of both primary users (PUs) and cognitive users (CUs). The resulting optimization has a quadratic objective and linear inequality (LI) constraints, which can be solved by standard convex methods. For the case of imperfect CSI from the PBS, we propose robust SLP schemes. First, with a norm-bounded CSI error model to approximate the uncertain channels, we adopt a max-min philosophy to conservatively achieve robust SLP constraints. Second, we use the additive quantization noise model (AQNM) to describe the quantized PBS CSI and employ a stochastic constraint to formulate the problem. Both robust approaches also result in a quadratic objective with LI constraints. Simulation results show that, rather than simply trying to eliminate the network’s cross-interference, the proposed robust SLP schemes enable the primary and secondary networks to aid each other in meeting their quality of service constraints.more » « less
 An official website of the United States government
An official website of the United States government 
				
			 
					 
					
 
                                    