Abstract:
Rate Optimization and Resource Allocation in Cooperative
Cognitive Radio Networks
The phenomenal rise in the number of connected devices and the demand for service
quality and channel capacity in wireless networks is severely limited by the scarcity
of available resources such as energy and bandwidth. New communications and networking
paradigms such as cooperative communication and cognitive radio networks
have emerged in recent years which can intelligently and efficiently utilize these resources.
Cognitive radio enables the cognitive nodes or Secondary Users (SUs) to sense
any opportunity for transmission without degrading the Primary Users (PUs) transmission.
This helps in efficient utilization of the available radio spectrum. Cooperation
among PUs and SUs can greatly enhance the performance of the cognitive radio network.
In this thesis, we have considered various spectrum access strategies in Cooperative
Cognitive Radio Networks (CCRNs) using distributed matching algorithms in
order to optimize the PU and/or SU sum-rate. SUs cooperatively relay PUs messages
based on Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative techniques,
in exchange for accessing some of the spectrum for their secondary communications.
From the literatures, we found that the Conventional Distributed Algorithm
(CDA) and Pragmatic Distributed Algorithm (PDA) aim to maximize the PU sum-rate
resulting in a lower sum-rate for the SU. In this contribution, we have investigated a
suit of distributed matching algorithms. More specifically, we investigated SU-based
CDA (CDA-SU) and SU-based PDA (PDA-SU) that maximize the SU sum-rate. We
have also proposed the All User-based PDA (PDA-ALL), for maximizing the sum-rates
of both PU and SU groups. All schemes are investigated under the idealistic scenario
involving perfect coding and perfect modulation, as well as under practical scenario
involving actual coding and actual modulation. Explicitly, our practical scenario considers
the adaptive coded modulation based DF schemes for transmission flexibility and
efficiency. More specifically, we have considered the Self-Concatenated Convolutional
Code (SECCC), which exhibits low complexity, since it invokes only a single encoder
and a single decoder. Furthermore, puncturing has been employed for enhancing the
bandwidth efficiency of SECCC. As another enhancement, physical layer security has
been applied to our system by introducing a unique Advanced Encryption Standard
(AES) based puncturing to our SECCC scheme.
Furthermore, we present a secrecy sum-rate maximization based matching algorithm
between PUs and SU cooperative jammers in the presence of an eavesdropper. We
present the achievable secrecy regions by employing friendly jammers which transmit
noise to impair the eavesdropper’s ability to decode the message. The cooperative jammers
are allocated a fraction of the bandwidth in compensation for their help to transmit
jamming signals towards the eavesdropper, which in our case is an untrusted relay node.
We provide results for the secrecy rate regions, where we consider only relaying link
between the source and the destination. We also provide results for the secrecy rate
regions when we consider a direct link between the source and destination in addition
to the relaying link. The Conventional Distributed Algorithm (CDA) and the Pragmatic
Distributed Algorithm (PDA), which were originally designed for maximizing
the user’s sum rate, are modified and adapted for maximizing the secrecy sum-rate for
the primary user.
In the end we considered a scenario such that a single PU can acquire help from multiple
SUs. More explicitly, we consider an untrusted relay scenario, where the relay
is a potential eavesdropper. The transmission of the proposed scheme is divided into
three time slots, i.e., broadcast and jamming phase, relaying phase and the jammer’s
secondary transmission phase or utility phase. We employ multiple jammers where
we first fix the position of two jammers and study the behavior of introducing another
moving jammer to maximize the secrecy further. We consider a leader-follower game
theoretic model where the primary user (source) is the leader and the secondary users
(jammers) are the followers. To facilitate the behavior of cooperative jammers, a Nash
equilibrium based power control mechanism is employed. We consider two scenarios
for our power control mechanism, where in the first case the jammers simultaneously
transmit their information (non-orthogonal) during the jammer’s utility phase, while in
the second case the jammer’s utility time slot is divided equally among the participating
jammers (orthogonal) to mitigate interference caused by the participating jammers.