Cognitive radio is being widely discussed,and resource allocation scheme is drawing a lot of attention.Although the existed resource allocation strategies have successfully enhanced spectrum efficiency,some critical c...Cognitive radio is being widely discussed,and resource allocation scheme is drawing a lot of attention.Although the existed resource allocation strategies have successfully enhanced spectrum efficiency,some critical challenges still remain unanswered such as the jointly consideration of the efficiency and fairness,the rational description of the spectrum resources,and the execution mode of the spectrum allocation.This paper presents a system level dynamic frequency spectrum allocation scheme based on a central heterogeneous network architecture,evaluates the matching degree of the spectrum demand and the available spectrum resources with corresponding matrices,jointly considers the efficiency and fairness of different cognitive radio systems.Simulation results and the application scenario are also presented and analyzed.展开更多
The major challenge faced by wireless mesh networks is the capacity reduction caused by interference,and interference can be reduced or even eliminated through appropriate channel assignment.This article presents a co...The major challenge faced by wireless mesh networks is the capacity reduction caused by interference,and interference can be reduced or even eliminated through appropriate channel assignment.This article presents a comprehensive survey of channel assignment schemes for multicast in multi-radio multi-channel wireless mesh networks.We analyze the state-of-the-art channel assignment schemes for multicast and provide comprehensive taxonomy of the latest work.In general,we classify the channel assignment schemes for multicast into two types,that is,sequential multicast routing and channel assignment(SMRCA)and joint multicast routing and channel assignment(JMRCA).Detailed review of channel assignment schemes in each category is provided.Possible future research directions and corresponding solutions are also explored to motivate research interests in the field of channel assignment for multicast in wireless mesh networks.展开更多
In this study,an explicit adaptive traffic allocation scheme for Machine-to-Machine(M2M)service is proposed to achieve optimum distribution in heterogeneous networks.Based on the characteristics of M2M services,the pr...In this study,an explicit adaptive traffic allocation scheme for Machine-to-Machine(M2M)service is proposed to achieve optimum distribution in heterogeneous networks.Based on the characteristics of M2M services,the presented scheme is formulated as a convex optimization problem that maximises the utility of the M2M service,and then determines how to allocate the total rate among the multiple access networks.The analysis and numerical simulations indicate that the proposed scheme makes a significant improvement in performance compared with the traditional schemes.展开更多
This paper has developed the argument that live radio soccer commentary (LRSC) is a representation of soccer match events at one level but a performance of dominant socio-cultural and political trends of the societi...This paper has developed the argument that live radio soccer commentary (LRSC) is a representation of soccer match events at one level but a performance of dominant socio-cultural and political trends of the societies at another level that produce and consume them. This echoes Reaser's (2003) and Ryan's (1993) perceptions of sports announcer's talk as a complex performance form based on but not limited to the "verbal imitation" of live sport events. We have understood the performativity of the LRSCs in the light of Schechner's (2006) emphasis of what he termed "restored behaviour" in understanding performance. In our context, we have treated the interpenetration of Kenyan soccer, politics, and society as the "restored behaviour" upon which the script of the LRSCs are based. The methodological apparatus of this paper is largely qualitative, consisting in the critical analysis of audio-recordings of Kenyan LRSCs. Focus is made on the Kenyan society of the 1980s, an era perceived to have been characterized by a close interaction between soccer, society, and politics. The analysis is informed by Fabian's (1997) inter-textual approach to the "reading" and interpretation of performance texts. This approach seems to echo a wider discourse of the social nature of media-text interpretation that has been proposed by Burn and Parker (1985). Conclusions drawn from the analysis reveal what Muponde and Zegeye (2011) had described as a soccer "ecosystem" involving soccer as a sport, and the socio-cultural realities of its immediate context. This paper has argued thatLRSC is one of the channels through which this ecosystem is expressed.展开更多
Transmission among the cognitive users(CUs)' is always interrupted by the primary users(PUs)' reclaim of the spectrum and the fading effect of wireless channels.To maintain reliable continuous communication am...Transmission among the cognitive users(CUs)' is always interrupted by the primary users(PUs)' reclaim of the spectrum and the fading effect of wireless channels.To maintain reliable continuous communication among CUs,an efficient scheme for link maintenance in OFDM-based cognitive radio Ad Hoc networks is proposed in this paper.In the scheme,redundant sub-channels(RSC) are employed by CUs to tackle the outage problem caused by the PUs' reclaim of the spectrum and wireless fading effect in the transmission.Meanwhile,backup sub-channels(BSC) are arranged to help select sub-channels with better channel quality.Additionally,to lower the overhead and improve the accuracy of the spectrum sensing,a partial sensing module is designed to enable the CUs to inherit and update the original idle spectrum list until it expires.Simulation results show that the proposed scheme can realize higher throughput and lower sensing overhead with slight reduction of the forced termination probability(FTP) performance compared to the existing approaches.展开更多
The new measurement scheme of IP performance metrics is for the mobile network in heterogeneous wireless network environment. In the proposed scheme, when Mobile Nodes (MNs) inside the mobile network needs to under...The new measurement scheme of IP performance metrics is for the mobile network in heterogeneous wireless network environment. In the proposed scheme, when Mobile Nodes (MNs) inside the mobile network needs to understand the condition of multiple comrmunicatinn paths outside the mobile netwtrk, they can get IP performance metrics, such as delay, jitter, bandwidth, packet loss, etc., irrespective of the preserre or absence of measurement functionality. At the same time, the proposed scheme dees not require the MN to he involved in measuring IP performance metrice. The Multihomed Mobile Router (MMR) with heterogeneons wireless interfaces measures IP performance metrics on behalf of the MNs inside the mobile network. Then, MNs can get measured IP perfonmnce metries from the MMR using L3 messages. The proposed scheme can reduce burden and power consumption of MNs with limited resource and batty power since MNs don' t measure IP performance metrics directly. In addition, it can reduce considerably traffic overhead over wireless links on multiple measurement paths since signaling messages and injeeted testing traffic are reduced.展开更多
In this paper,an Interference Alignment and Cancellation(IAC)based transmission and scheduling scheme is proposed for an infrastructured Cognitive Radio(CR)Multiple-Input Multiple-Output(MIMO)system with multiple seco...In this paper,an Interference Alignment and Cancellation(IAC)based transmission and scheduling scheme is proposed for an infrastructured Cognitive Radio(CR)Multiple-Input Multiple-Output(MIMO)system with multiple secondary users.With the cooperation of Primary Base Station(PBS)and Secondary Base Station(SBS),a signal processing procedure is designed to guarantee the priority of the primary transmission.As a reward for offering help to the PBS,the SBS is granted communication opportunity.The transmission difference of various spatial channels is exploited in Secondary User(SU)scheduling.With the proposed scheme,interferencefree concurrent transmission of both PBS and SBS is implemented.Spatial channel resources can be effectively utilised compared with a traditional Interference Alignment(IA)based strategy.Simulation results show that the achievable data for primary transmission is enhanced by cooperative signal processing at the SBS.With respect to the SBS,its data rate grows with an increasing number of SUs by exploiting the multiuser diversity gain.展开更多
In spectrum aggregation(SA), two or more component carriers(CCs) of different bandwidths in different bands can be aggregated to support wider transmission bandwidth. The current resource scheduling schemes for spectr...In spectrum aggregation(SA), two or more component carriers(CCs) of different bandwidths in different bands can be aggregated to support wider transmission bandwidth. The current resource scheduling schemes for spectrum aggregation are not optimal or suitable for CR based heterogeneous networks(Het Nets). Consequently, the authors propose a novel resource scheduling scheme for spectrum aggregation in CR based Het Nets, termed as cognitive radio based resource scheduling(CR-RS) scheme. CR-RS has a three-level structure. Under a dynamic traffic model, an equivalent throughput of the CCs based on the knowledge of primary users(PUs) is given. On this basis, the CR users data transmission time of each CC is equal in CR-RS. The simulation results show that CR-RS has the better performance than the current resource scheduling schemes in the CR based Het Nets. Meanwhile, CR-RS is also effective in other spectrum aggregation systems which are not CR based HetNets.展开更多
In order to reduce cost and complexity,fiber-wireless(FiWi) networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a...In order to reduce cost and complexity,fiber-wireless(FiWi) networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a long way to go before taking fiber and wireless systems as fully integrated networks.In this paper,we propose a network visualization based seamless networking scheme for FiWi networks,including hierarchical model,service model,service implementation and dynamic bandwidth assignment(DBA).Then,we evaluate the performance changes after network virtualization is introduced.Throughput for nodes,bandwidth for links and overheads leaded by network virtualization are analyzed.The performance of our proposed networking scheme is evaluated by simulation and real implementations,respectively.The results show that,compared to traditional networking scheme,our scheme has a better performance.展开更多
A novel text independent speaker identification system is proposed. In the proposed system, the 12-order perceptual linear predictive cepstrum and their delta coefficients in the span of five frames are extracted from...A novel text independent speaker identification system is proposed. In the proposed system, the 12-order perceptual linear predictive cepstrum and their delta coefficients in the span of five frames are extracted from the segmented speech based on the method of pitch synchronous analysis. The Fisher ratios of the original coefficients then be calculated, and the coefficients whose Fisher ratios are bigger are selected to form the 13-dimensional feature vectors of speaker. The Gaussian mixture model is used to model the speakers. The experimental results show that the identification accuracy of the proposed system is obviously better than that of the systems based on other conventional coefficients like the linear predictive cepstral coefficients and the Mel-frequency cepstral coefficients.展开更多
The transmission capacity of Mobile Ad Hoc Networking (MANET) is constrained by the mutual interference of concurrent transmissions between nodes. First, the transmission capacity of MANET is studied by the view of in...The transmission capacity of Mobile Ad Hoc Networking (MANET) is constrained by the mutual interference of concurrent transmissions between nodes. First, the transmission capacity of MANET is studied by the view of information flow between nodes. At the same time, the problem that the interference between nodes affects the transmission capacity of MANET is also studied by the tool of the event conflict graph. Secondly, the paper presents the method to compute the maximum ex- pectant achievable capacity for the given conflict graph, and concludes and proves an sufficient con- dition that the information flow transmit successfully between nodes. At last, the results are simulated and a fitting equation of transmission capacity between nodes is given.展开更多
In cognitive relay networks, the transmission of Secondary Users (SUs) suffers from the activity of Primary Users (PUs) and wireless channel fading. Therefore, how to achieve robust transmission for cognitive rela...In cognitive relay networks, the transmission of Secondary Users (SUs) suffers from the activity of Primary Users (PUs) and wireless channel fading. Therefore, how to achieve robust transmission for cognitive relay networks is a challenging task. In this paper, we propose a relaying transmission scheme which exploits robust beamforming at the physical layer and rateless codes at higher layers. We derive the optirml beamforng weight vector and analyze the perforrmnce of the pro- posed scheme when the channel estirmtion is not accurate between two SU nodes. We also study how the anaount of channel information between SU and PU impacts the system perforroance. Sinlation results validate our theoretical analysis and demonstrate that the proposed scheme can signifi- cantly enhance the system throughput.展开更多
Privacy is becoming one of the most notable challenges threatening wireless sensor networks(WSNs).Adversaries may use RF(radio frequency) localization techniques to perform hop-by-hop trace back to the source sensor...Privacy is becoming one of the most notable challenges threatening wireless sensor networks(WSNs).Adversaries may use RF(radio frequency) localization techniques to perform hop-by-hop trace back to the source sensor's location.A multiple k-hop clusters based routing strategy(MHCR) is proposed to preserve source-location privacy as well as enhance energy efficiency for WSNs.Owing to the inherent characteristics of intra-cluster data aggregation,each sensor of the interference clusters is able to act as a fake source to confuse the adversary.Moreover,dummy traffic could be filtered efficiently by the cluster heads during the data aggregation,ensuring no energy consumption be burdened in the hotspot of the network.Through careful analysis and calculation on the distribution and the number of interference clusters,energy efficiency is significantly enhanced without reducing the network lifetime.Finally,the security and delay performance of MHCR scheme are theoretically analyzed.Extensive analysis and simulation results demonstrate that MHCR scheme can improve both the location privacy security and energy efficiency markedly,especially in large-scale WSNs.展开更多
A traffic sensitive spectrum access scheme is proposed to satisfy the traffic load requirement of secondary users (SUs). In the proposed design, SU only accesses available channels which can meet the traffic demand....A traffic sensitive spectrum access scheme is proposed to satisfy the traffic load requirement of secondary users (SUs). In the proposed design, SU only accesses available channels which can meet the traffic demand. To achieve this, the expected transmission time (E3W) of the SU is calcu- lated first based on the delivery ratio. Then, the channel idle time is estimated based on the activity of primary users (PUs). Therefore, available channels with estimated idle time longer than ETr could be chosen. With high probability, the SU can finish transmission on these channels without disruption, thereby satisfying the traffic load demand of the SU. Finally, our method is extended to the multi-channel scenario where each SU can access multiple channels simultaneously. Performance analysis shows that our method satisfies the requirement of SUs while effectively improving the throughput.展开更多
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optim...In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping.展开更多
文摘Cognitive radio is being widely discussed,and resource allocation scheme is drawing a lot of attention.Although the existed resource allocation strategies have successfully enhanced spectrum efficiency,some critical challenges still remain unanswered such as the jointly consideration of the efficiency and fairness,the rational description of the spectrum resources,and the execution mode of the spectrum allocation.This paper presents a system level dynamic frequency spectrum allocation scheme based on a central heterogeneous network architecture,evaluates the matching degree of the spectrum demand and the available spectrum resources with corresponding matrices,jointly considers the efficiency and fairness of different cognitive radio systems.Simulation results and the application scenario are also presented and analyzed.
基金supported by the National Natural Science Foundation of China under Grants No.61373124
文摘The major challenge faced by wireless mesh networks is the capacity reduction caused by interference,and interference can be reduced or even eliminated through appropriate channel assignment.This article presents a comprehensive survey of channel assignment schemes for multicast in multi-radio multi-channel wireless mesh networks.We analyze the state-of-the-art channel assignment schemes for multicast and provide comprehensive taxonomy of the latest work.In general,we classify the channel assignment schemes for multicast into two types,that is,sequential multicast routing and channel assignment(SMRCA)and joint multicast routing and channel assignment(JMRCA).Detailed review of channel assignment schemes in each category is provided.Possible future research directions and corresponding solutions are also explored to motivate research interests in the field of channel assignment for multicast in wireless mesh networks.
基金supported by the National Natural Science Foundation of Chinaunder Grant No.60971125the National Science and Technology Major Project of the Ministry of Science and Technology of Chinaunder Grant No.2012ZX03005-010the China Scholarship Council
文摘In this study,an explicit adaptive traffic allocation scheme for Machine-to-Machine(M2M)service is proposed to achieve optimum distribution in heterogeneous networks.Based on the characteristics of M2M services,the presented scheme is formulated as a convex optimization problem that maximises the utility of the M2M service,and then determines how to allocate the total rate among the multiple access networks.The analysis and numerical simulations indicate that the proposed scheme makes a significant improvement in performance compared with the traditional schemes.
文摘This paper has developed the argument that live radio soccer commentary (LRSC) is a representation of soccer match events at one level but a performance of dominant socio-cultural and political trends of the societies at another level that produce and consume them. This echoes Reaser's (2003) and Ryan's (1993) perceptions of sports announcer's talk as a complex performance form based on but not limited to the "verbal imitation" of live sport events. We have understood the performativity of the LRSCs in the light of Schechner's (2006) emphasis of what he termed "restored behaviour" in understanding performance. In our context, we have treated the interpenetration of Kenyan soccer, politics, and society as the "restored behaviour" upon which the script of the LRSCs are based. The methodological apparatus of this paper is largely qualitative, consisting in the critical analysis of audio-recordings of Kenyan LRSCs. Focus is made on the Kenyan society of the 1980s, an era perceived to have been characterized by a close interaction between soccer, society, and politics. The analysis is informed by Fabian's (1997) inter-textual approach to the "reading" and interpretation of performance texts. This approach seems to echo a wider discourse of the social nature of media-text interpretation that has been proposed by Burn and Parker (1985). Conclusions drawn from the analysis reveal what Muponde and Zegeye (2011) had described as a soccer "ecosystem" involving soccer as a sport, and the socio-cultural realities of its immediate context. This paper has argued thatLRSC is one of the channels through which this ecosystem is expressed.
基金supported in part by program for National Natural Science Foundation of China under Grant No.61271184863 Program of China under Grant No.2013AA013301New Century Excellent Talents in University under Grant No.NCET-11-0594
文摘Transmission among the cognitive users(CUs)' is always interrupted by the primary users(PUs)' reclaim of the spectrum and the fading effect of wireless channels.To maintain reliable continuous communication among CUs,an efficient scheme for link maintenance in OFDM-based cognitive radio Ad Hoc networks is proposed in this paper.In the scheme,redundant sub-channels(RSC) are employed by CUs to tackle the outage problem caused by the PUs' reclaim of the spectrum and wireless fading effect in the transmission.Meanwhile,backup sub-channels(BSC) are arranged to help select sub-channels with better channel quality.Additionally,to lower the overhead and improve the accuracy of the spectrum sensing,a partial sensing module is designed to enable the CUs to inherit and update the original idle spectrum list until it expires.Simulation results show that the proposed scheme can realize higher throughput and lower sensing overhead with slight reduction of the forced termination probability(FTP) performance compared to the existing approaches.
文摘The new measurement scheme of IP performance metrics is for the mobile network in heterogeneous wireless network environment. In the proposed scheme, when Mobile Nodes (MNs) inside the mobile network needs to understand the condition of multiple comrmunicatinn paths outside the mobile netwtrk, they can get IP performance metrics, such as delay, jitter, bandwidth, packet loss, etc., irrespective of the preserre or absence of measurement functionality. At the same time, the proposed scheme dees not require the MN to he involved in measuring IP performance metrice. The Multihomed Mobile Router (MMR) with heterogeneons wireless interfaces measures IP performance metrics on behalf of the MNs inside the mobile network. Then, MNs can get measured IP perfonmnce metries from the MMR using L3 messages. The proposed scheme can reduce burden and power consumption of MNs with limited resource and batty power since MNs don' t measure IP performance metrics directly. In addition, it can reduce considerably traffic overhead over wireless links on multiple measurement paths since signaling messages and injeeted testing traffic are reduced.
基金supported by the National Natural Science Foundation of China under Grants No. 61102057,No. 61231008the National Key Basic Research Program of China (973 Program) under Grant No. 2009CB320404+4 种基金the National Science and Technology Major Project under Grant No. 2012ZX-03003005-005the 111 Project under Grant No.B08038the Program for Changjiang Scholars and Innovative Research Team in University under Grant No. IRT0852the ISN Project under Grant No. ISN1103005the Fundamental Research Funds for the Central Universities under Grant No. K5051301014
文摘In this paper,an Interference Alignment and Cancellation(IAC)based transmission and scheduling scheme is proposed for an infrastructured Cognitive Radio(CR)Multiple-Input Multiple-Output(MIMO)system with multiple secondary users.With the cooperation of Primary Base Station(PBS)and Secondary Base Station(SBS),a signal processing procedure is designed to guarantee the priority of the primary transmission.As a reward for offering help to the PBS,the SBS is granted communication opportunity.The transmission difference of various spatial channels is exploited in Secondary User(SU)scheduling.With the proposed scheme,interferencefree concurrent transmission of both PBS and SBS is implemented.Spatial channel resources can be effectively utilised compared with a traditional Interference Alignment(IA)based strategy.Simulation results show that the achievable data for primary transmission is enhanced by cooperative signal processing at the SBS.With respect to the SBS,its data rate grows with an increasing number of SUs by exploiting the multiuser diversity gain.
基金supported by Major National Science and Technology Project(2014ZX03004003-005)Municipal Exceptional Academic Leaders Foundation (2014RFXXJ002)China Postdoctoral Science Foundation (2014M561347)
文摘In spectrum aggregation(SA), two or more component carriers(CCs) of different bandwidths in different bands can be aggregated to support wider transmission bandwidth. The current resource scheduling schemes for spectrum aggregation are not optimal or suitable for CR based heterogeneous networks(Het Nets). Consequently, the authors propose a novel resource scheduling scheme for spectrum aggregation in CR based Het Nets, termed as cognitive radio based resource scheduling(CR-RS) scheme. CR-RS has a three-level structure. Under a dynamic traffic model, an equivalent throughput of the CCs based on the knowledge of primary users(PUs) is given. On this basis, the CR users data transmission time of each CC is equal in CR-RS. The simulation results show that CR-RS has the better performance than the current resource scheduling schemes in the CR based Het Nets. Meanwhile, CR-RS is also effective in other spectrum aggregation systems which are not CR based HetNets.
基金supported by National Natural Science Foundation of China under Grant No.61240040
文摘In order to reduce cost and complexity,fiber-wireless(FiWi) networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a long way to go before taking fiber and wireless systems as fully integrated networks.In this paper,we propose a network visualization based seamless networking scheme for FiWi networks,including hierarchical model,service model,service implementation and dynamic bandwidth assignment(DBA).Then,we evaluate the performance changes after network virtualization is introduced.Throughput for nodes,bandwidth for links and overheads leaded by network virtualization are analyzed.The performance of our proposed networking scheme is evaluated by simulation and real implementations,respectively.The results show that,compared to traditional networking scheme,our scheme has a better performance.
文摘A novel text independent speaker identification system is proposed. In the proposed system, the 12-order perceptual linear predictive cepstrum and their delta coefficients in the span of five frames are extracted from the segmented speech based on the method of pitch synchronous analysis. The Fisher ratios of the original coefficients then be calculated, and the coefficients whose Fisher ratios are bigger are selected to form the 13-dimensional feature vectors of speaker. The Gaussian mixture model is used to model the speakers. The experimental results show that the identification accuracy of the proposed system is obviously better than that of the systems based on other conventional coefficients like the linear predictive cepstral coefficients and the Mel-frequency cepstral coefficients.
文摘The transmission capacity of Mobile Ad Hoc Networking (MANET) is constrained by the mutual interference of concurrent transmissions between nodes. First, the transmission capacity of MANET is studied by the view of information flow between nodes. At the same time, the problem that the interference between nodes affects the transmission capacity of MANET is also studied by the tool of the event conflict graph. Secondly, the paper presents the method to compute the maximum ex- pectant achievable capacity for the given conflict graph, and concludes and proves an sufficient con- dition that the information flow transmit successfully between nodes. At last, the results are simulated and a fitting equation of transmission capacity between nodes is given.
基金Acknowledgements The authors would like to thank the editor and anonymous reviewers for their detailed reviews and constructive comments, which have helped to greatly improve the quality of this paper. This work was supported by the National Natural Science Foundation of China under Grants No. 60832008, No. 60902001 Beijing Natural Science Foundation Program and Scientific Research Key Program of Beijing Municipal Commission of Education under Grant No. KZ201010009009 the Tsinghua National Laboratory for Infomation Science and Technology (TNList) Cross-discipline Foundation.
文摘In cognitive relay networks, the transmission of Secondary Users (SUs) suffers from the activity of Primary Users (PUs) and wireless channel fading. Therefore, how to achieve robust transmission for cognitive relay networks is a challenging task. In this paper, we propose a relaying transmission scheme which exploits robust beamforming at the physical layer and rateless codes at higher layers. We derive the optirml beamforng weight vector and analyze the perforrmnce of the pro- posed scheme when the channel estirmtion is not accurate between two SU nodes. We also study how the anaount of channel information between SU and PU impacts the system perforroance. Sinlation results validate our theoretical analysis and demonstrate that the proposed scheme can signifi- cantly enhance the system throughput.
基金Project(2013DFB10070)supported by the International Science & Technology Cooperation Program of ChinaProject(2012GK4106)supported by the Hunan Provincial Science & Technology Program,ChinaProject(12MX15)supported by the Mittal Innovation Project of Central South University,China
文摘Privacy is becoming one of the most notable challenges threatening wireless sensor networks(WSNs).Adversaries may use RF(radio frequency) localization techniques to perform hop-by-hop trace back to the source sensor's location.A multiple k-hop clusters based routing strategy(MHCR) is proposed to preserve source-location privacy as well as enhance energy efficiency for WSNs.Owing to the inherent characteristics of intra-cluster data aggregation,each sensor of the interference clusters is able to act as a fake source to confuse the adversary.Moreover,dummy traffic could be filtered efficiently by the cluster heads during the data aggregation,ensuring no energy consumption be burdened in the hotspot of the network.Through careful analysis and calculation on the distribution and the number of interference clusters,energy efficiency is significantly enhanced without reducing the network lifetime.Finally,the security and delay performance of MHCR scheme are theoretically analyzed.Extensive analysis and simulation results demonstrate that MHCR scheme can improve both the location privacy security and energy efficiency markedly,especially in large-scale WSNs.
基金Supported by the National High Technology Research and Development Programme of China(No.2011AA010503)the National Natural Science Foundation of China(No.60903192)
文摘A traffic sensitive spectrum access scheme is proposed to satisfy the traffic load requirement of secondary users (SUs). In the proposed design, SU only accesses available channels which can meet the traffic demand. To achieve this, the expected transmission time (E3W) of the SU is calcu- lated first based on the delivery ratio. Then, the channel idle time is estimated based on the activity of primary users (PUs). Therefore, available channels with estimated idle time longer than ETr could be chosen. With high probability, the SU can finish transmission on these channels without disruption, thereby satisfying the traffic load demand of the SU. Finally, our method is extended to the multi-channel scenario where each SU can access multiple channels simultaneously. Performance analysis shows that our method satisfies the requirement of SUs while effectively improving the throughput.
基金supported by the Natural Science Foundation of Anhui Provincial Education Department under Grant No.KJ2013Z048the Natural Science Foundation of Anhui Provincial Colleges and Universities under Grant No.KJ2014A234
文摘In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping.