Optimal spectrum access and power control of secondary users in cognitive radio networks

نویسندگان

  • Yang Yang
  • Linglong Dai
  • Jianjun Li
  • Shahid Mumtaz
  • Jonathan Rodriguez
چکیده

In future 5G communication system, radio resources can be effectively reused by cognitive radio networks (CRNs), where a lot of secondary users (SUs) are able to access the spectrum of primary users (PUs). In this paper, we analyze the optimal spectrum access and power control of SUs on multiple bands with the target of maximizing the average sum rate (ASR) of SUs. Specifically, based on the stochastic geometry, the random distributions of PUs and SUs are modeled by Poisson point processes (PPPs), based on which we derive out the closed-form outage probabilities and obtain the ASR of SUs. Then, we formulate the maximization problem of ASR on multiple bands under the constraints of outage probabilities. With the help of convex optimization, the optimal density of SUs is obtained in closed-form when the power of SUs is fixed. The convexity of ASR is also verified, and we evaluate the optimal power of SUs when the density of SUs is fixed. Based on these two obtained results, a spectrum access and power control algorithm is further proposed to maximize the ASR of SUs on multiple bands. Simulation results demonstrate that the proposed algorithm can achieve a higher maximum ASR of SUs over the average power allocation algorithm, and the density and power boundary of SUs are constrained by PUs as well as the interference in the networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Spectrum Assignment in Cognitive Radio Networks Using Fuzzy Logic Empowered Ants

The prevalent communications networks suffer from lack of spectrum and spectrum inefficiency. This has motivated researchers to develop cognitive radio (CR) as a smart and dynamic radio access promised solution. A major challenge to this new technology is how to make fair assignment of available spectrum to unlicensed users, particularly for smart grids communication. This paper introduces an i...

متن کامل

A Novel Cooperative Mechanism for Cognitive Radio Networks

As the demand on frequency spectrum grows rapidly, cognitive radio technique becomes a hot research problem and a promising approach to increase the efficiency of spectrum utilization. In this paper, we consider the problem of spectrum sharing among one primary user and multiple secondary users and secondary user’s power control by a cooperating method, where the primary user select a proper se...

متن کامل

The Impact of Sensing Range on Spatial-Temporal Opportunity

In this paper, we study the impact of secondary user (SU) sensing range on spectrum access opportunity in cognitive radio networks. We first derive a closed-form expression of spectrum access opportunity by taking into account the random variations in number, locations and transmitted powers of primary users (PUs). Then, we show how SU sensing range affects spectrum access opportunity, and the ...

متن کامل

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • EURASIP J. Wireless Comm. and Networking

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017