In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocol...In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocols, in the proposed protocol, a secondary source attempts to transmit its signal to a secondary destination with help of two secondary relays. One secondary relay always operates in AF mode, while the remaining one always operates in DF mode. Moreover, we also propose a relay selection method, which relies on the decoding status at the DF relay. For performance evaluation and comparison, we derive the exact and approximate closedform expressions of the outage probability for the proposed protocol over Rayleigh fading channel. Finally, we run Monte Carlo simulations to verify the derivations. Results presented that the proposed protocol obtains a diversity order of three and the outage performance of our scheme is between that of the conventional underlay DF protocol and that of the conventional underlay AF protocol.展开更多
We investigate the secrecy outage performance of maximal ratio combining(MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user(S...We investigate the secrecy outage performance of maximal ratio combining(MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user(SU-TX) that transmits confidential messages to another secondary user(SU-RX) equipped with M(M ≥ 1)antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper equipped with N(N ≥ 1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability.展开更多
基金supported by the 2016 research fund of University of Ulsan
文摘In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocols, in the proposed protocol, a secondary source attempts to transmit its signal to a secondary destination with help of two secondary relays. One secondary relay always operates in AF mode, while the remaining one always operates in DF mode. Moreover, we also propose a relay selection method, which relies on the decoding status at the DF relay. For performance evaluation and comparison, we derive the exact and approximate closedform expressions of the outage probability for the proposed protocol over Rayleigh fading channel. Finally, we run Monte Carlo simulations to verify the derivations. Results presented that the proposed protocol obtains a diversity order of three and the outage performance of our scheme is between that of the conventional underlay DF protocol and that of the conventional underlay AF protocol.
基金Project supported in part by the National Natural Science Foundation of China(Nos.61401372 and 61531016)the Research Fund for the Doctoral Program of Higher Education of China(No.20130182120017)+1 种基金the Natural Science Foundation of CQ CSTC(No.cstc2013jcyj A40040)the Fundamental Research Funds for the Central Universities,China(No.XDJK2015B023)
文摘We investigate the secrecy outage performance of maximal ratio combining(MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user(SU-TX) that transmits confidential messages to another secondary user(SU-RX) equipped with M(M ≥ 1)antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper equipped with N(N ≥ 1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability.