Loading...
Search for: radio-systems
0.007 seconds
Total 44 records

    Preventing the transmission of harmful cognitive radio users in the presence of primary users

    , Article Proceedings - 2009 1st UK-India International Workshop on Cognitive Wireless Systems, UKIWCWS 2009, 11 December 2009 through 12 December 2009, New Delhi ; 2009 ; 9781457701832 (ISBN) Fathollahi, M ; Soleimanipour, M ; Sharif University of Technology
    Abstract
    A cognitive radio provides access to a licensed spectrum for unlicensed users opportunistically provided that they are not harmful for licensed users (primary users). We call a cognitive radio user (CR user) harmful, when it generates interference for primary users (PU) or occupies spectrum holes excessively. This paper discusses the spectrum management policy against harmful CR users. For this, we design a jammer signal which ruins transmission of harmful CR users and forces them to leave the spectrum without damaging the communication of PUs. This signal is designed using group subspace technique for both synchronous and asynchronous channels. Our simulation results show that the designed... 

    Efficient cooperative spectrum sensing in cognitive radio networks

    , Article 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC'07, Athens, 3 September 2007 through 7 September 2007 ; December , 2007 ; 1424411440 (ISBN); 9781424411443 (ISBN) Taherpour, A ; Nasiri Kenari, M ; Jamshidi, A ; Sharif University of Technology
    2007
    Abstract
    Rcent measurements suggest the possibility of sharing spectrum among different parties subject to interference-protection constraints. In order to enable access to an unused licensed spectrum, a secondary user has to monitor licensed bands and opportunistically transmit whenever no primary signal is detected. In this paper, we study spectrum-sharing between a primary licensee and a group of secondary users. The structure of an asymptotically optimum detector based on the measurements of all secondary users is derived and the effect of the quantization error in such a system is evaluated. The results show the superiority of the proposed detector to other schemes. © 2007 IEEE  

    Power consumption evaluation of sleep mode in the IEEE 802.16e MAC with multi service connections

    , Article 2007 IEEE International Conference on Signal Processing and Communications, ICSPC 2007, Dubai, 14 November 2007 through 27 November 2007 ; 2007 , Pages 1363-1366 ; 9781424412365 (ISBN) Pour Nejatian, N. M ; Nayebi, M. M ; Tadaion, A. A ; Sharif University of Technology
    2007
    Abstract
    In the sleep mode, a Mobile Subscribe Station (MSS) sleeps for a sleep interval and wakes up at the end of this interval in order to check buffered packet(s) at Base Station (BS) destined to it. If there is no packet, the MSS increases the sleep window up to the maximum value or keeps it unchanged and sleeps again. In this paper, we study the effect of presence of multi service connections with different power saving classes (PSCs) on power consumption for IEEE 802.16e nodes while operating in the sleep mode. Using multi service connections may result in overlapping of availability and unavailability intervals and reducing the effectiveness of power saving mode of the subscriber. © 2007 IEEE... 

    Modeling the behavior of contending opportunistic cognitive radios

    , Article 2007 IEEE International Conference on Signal Processing and Communications, ICSPC 2007, Dubai, 14 November 2007 through 27 November 2007 ; 2007 , Pages 720-723 ; 9781424412365 (ISBN) Feizi Khankandi, S ; Ashtiani, F ; Hassani, S. H ; Tootoonchi, P ; Sharif University of Technology
    2007
    Abstract
    In this paper, we propose a new model to evaluate the behavior of cognitive radios (CRs). In this model, we consider a specific number of primary users having independent probabilistic on-off behavior. In addition, a specific number of opportunistic cognitive radios in saturation mode is assumed. We consider contention for CRs in order to occupy an inactive primary channel independently according to a simple MAC scheme. Our model is based on a closed BCMP state-dependent queueing network. We map contention of the CRs and the behavior of primary users on suitable parameters of the queueing network. By solving the network, we obtain the steady state behavior of CRs, then we find the efficient... 

    Asymptotically optimum detection of primary user in cognitive radio networks

    , Article IET Communications ; Volume 1, Issue 6 , December , 2007 , Pages 1138-1145 ; 17518628 (ISSN) Taherpour, A ; Norouzi, Y ; Nasiri Kenari, M ; Jamshidi, A ; Zeinalpour Yazdi, Z ; Sharif University of Technology
    2007
    Abstract
    Traditionally, the frequency spectrum is licensed to users by government agencies in a fixed manner where the licensee has exclusive right to access the allocated band. However, with increasing demand for the spectrum and scarcity of vacant bands, a spectrum policy reform seems inevitable. Meanwhile, recent measurements suggest the possibility of sharing spectrum among different parties subject to interference-protection constraints. In order to enable access to an unused licensed spectrum, a secondary user has to monitor licensed bands and opportunistically transmit whenever no primary signal is detected. Spectrum-sharing between a primary licensee and a group of secondary users has been... 

    Traffic information use modeling in the context of a developing country

    , Article Periodica Polytechnica Transportation Engineering ; Volume 33, Issue 1-2 , 2005 , Pages 125-137 ; 03037800 (ISSN) Mamdoohi, A. R ; Kermanshah, M ; Sharif University of Technology
    Technical University of Budapest  2005
    Abstract
    The use of traffic information in the form of radio reports, as a solution to the problem of congestion, is one of the issues, which are of particular importance for large cities like Tehran. In this study, factors affecting the use of traffic information in the context of a developing country are examined for commuters in the city of Tehran using ordered logit models. Results based on the particular survey designed for this purpose are compared to those of a developed country. Regarding the use of information in the form of listening to the radio traffic reports, the models show that older commuters, commuters who adjust their departure time according to traffic conditions (those who are... 

    Spectrally encoded code-division multiple access for cognitive radio networks

    , Article IET Communications ; Vol. 8, Issue. 2 , 2014 , Pages 184-196 ; ISSN: 17518628 Najafi, S ; Shayesteh, M. G ; Sharif University of Technology
    Abstract
    Recent studies have revealed that spectrum congestion is due to the inefficient usage of spectrum against the availability. Cognitive radio is viewed as an approach for improving the utilisation of radio spectrum. The spectrally encoded (spread-time) code-division multiple access (SE-CDMA) technique (which is regarded as the dual of spread spectrum CDMA) is considered and its performance in cognitive radio networks is studied. In cognitive network spectrum, overlay and underlay techniques are employed to enable the primary and secondary users to coexist while improving the overall spectrum efficiency. It is shown that SE-CDMA provides considerable flexibility to design overlay and underlay... 

    Delay analysis and buffer management for random access in cognitive radio networks

    , Article 2013 Iran Workshop on Communication and Information Theory ; May , 2013 , Page(s): 1 - 6 ; 9781467350235 (ISBN) Salehkaleybar, S ; Majd, S. A ; Pakravan, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we consider a cognitive radio network in which multiple Secondary Users (SUs) contend to access primary network's channels with a random access scheme. Our goal is to analyze SUs' queuing delay performance in terms of mean queue lengths and find a minimum buffer space for which the overflow probability is less than a desired threshold. In general, the considered network can be modeled as a multidimensional Markov chain. However, the enormous state space makes the numerical analysis intractable. Nevertheless, the state space can be reduced to a two-dimensional Markov chain in the symmetric channel condition. By this approach, the optimal contention probability that minimizes... 

    Unified privacy analysis of new-found RFID authentication protocols

    , Article Security and Communication Networks ; Volume 6, Issue 8 , 2013 , Pages 999-1009 ; 19390122 (ISSN) Alagheband, M. R ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    Ubiquitousness of Radio Frequency Identification (RFID) systems with inherent weaknesses has been a cause of concern about their privacy and security. Therefore, secure protocols are essentially necessary for the RFID tags to guarantee privacy and authentication among them and the reader. This paper inspects privacy in the RFID systems. First, we survey four new-found RFID authentication protocols, and then, their weaknesses in formal privacy model are analyzed. Although the authors of the schemes claimed that their protocols completely resist privacy attacks, we formally prove that all of them suffer from the family of traceability attacks. Furthermore, not only are the four improved... 

    Distributed multiuser sequential channel sensing schemes in multichannel cognitive radio networks

    , Article IEEE Transactions on Wireless Communications ; Volume 12, Issue 5 , 2013 , Pages 2055-2067 ; 15361276 (ISSN) Shokri Ghadikolaei, H ; Sheikholeslami, F ; Nasiri Kenari, M ; Sharif University of Technology
    2013
    Abstract
    Effective spectrum sensing strategies enable cognitive radios (CRs) to identify and opportunistically transmit on under-utilized spectral resources. In this paper, sequential channel sensing problems for single and multiple secondary users (SUs) networks are effectively modeled through finite state Markovian processes. More specifically, a model for single user case is introduced and its performance is validated through analytical analysis. Then, in order to address multiple SUs case, this model is extended to include the modified p-persistent access (MPPA) protocol. Since the scheme utilized experiences a high level of collision among the SUs, to mitigate the problem appropriately,... 

    Learning-based spectrum sensing time optimization in cognitive radio systems

    , Article 2012 6th International Symposium on Telecommunications, IST 2012, 6 November 2012 through 8 November 2012 ; November , 2012 , Pages 249-254 ; 9781467320733 (ISBN) Shokri Ghadikolaei, H ; Abdi, Y ; Nasiri-Kenari, M ; Sharif University of Technology
    2012
    Abstract
    Powerful spectrum sensing schemes enable cognitive radios (CRs) to find transmission opportunities in spectral resources allocated exclusively to primary users. In this paper, the problem of maximizing the average throughput of a cognitive radio system through optimizing its spectrum sensing time is investigated, and a systematic neural network-based optimization approach is proposed which avoids challenges associated with the conventional analytical solutions. The proposed method exploits a novel learning and optimization cycle to enable an effective cooperation between two kinds of well-known artificial neural networks and finds the optimum value of the channel sensing time without any... 

    Optimal and suboptimal sensing sequences in multiuser cognitive radio networks

    , Article 2012 6th International Symposium on Telecommunications, IST 2012, 6 November 2012 through 8 November 2012 ; November , 2012 , Pages 243-248 ; 9781467320733 (ISBN) Shokri Ghadikolaei, H ; Nasiri Kenari, M ; Sharif University of Technology
    2012
    Abstract
    Designing proper spectrum decision schemes for cognitive radios (CRs) improves spectral usage efficiency as well as CR network throughput. One of the key effecting factors of the CR network throughput is the spectrum sensing sequences of the secondary users (SUs). In this paper, the SUs throughput maximization through appropriately selecting the sensing sequences of the SUs, called sensing matrix (SM), is investigated. More specifically, first the average throughput of the CR network is evaluated for a given SM in the case of error-free channel sensing. Then, an optimization problem is formulated with the aim to maximize the network throughput by finding the optimal SM. In order to avoid... 

    Joint power control and pricing for underlay relay-based cognitive radio networks

    , Article Proceedings of the International Symposium on Wireless Communication Systems, 6 November 2011 through 9 November 2011 ; November , 2011 , Pages 557-561 ; 21540217 (ISSN) ; 9781612844022 (ISBN) Louni, A ; Khalaj, B. H ; Sharif University of Technology
    2011
    Abstract
    One of the most important issues in cognitive radio networks is to guarantee quality of service (QoS) constraints for primary users. In this paper, a relay-based cognitive radio network is considered in which secondary users compete in a selfish manner to use a relay to improve their utility function, while maintaining interference at the primary receiver to be lower than a certain threshold level. This problem is modeled as a non-cooperative game and by using a proper pricing function in the definition of the utility function, it is shown that despite the selfish behavior of the users, Nash equilibrium (NE) with sub-optimum property is achieved. A distributed and novel algorithm to update... 

    Spectrally encoded code division multiple access-based cognitive relay networks

    , Article IET Communications ; Volume 9, Issue 12 , August , 2015 , Pages 1510-1521 ; 17518628 (ISSN) Najafi, S ; Shayesteh, M. G ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    Cognitive radio and cooperative networks are increasingly regarded as revolutionary technologies that utilise the radio spectrum efficiently. In this study, spectrally encoded (spread-time) code division multiple access (SE-CDMA) scheme is proposed as a flexible and adaptable technique for physical layer of cognitive relay networks. All primary and secondary users transmit their signals to a common base station (BS) and then the BS selects one of the cognitive secondary users based on feedback information to relay the primary user's (PU's) data. To study the efficiency of the system, two scenarios are considered. In the first scenario, the secondary users transmit their information using the... 

    Multiple antenna spectrum sensing in cognitive radios

    , Article IEEE Transactions on Wireless Communications ; Volume 9, Issue 2 , 2010 , Pages 814-823 ; 15361276 (ISSN) Taherpour, A ; Nasiri-Kenari, M ; Gazor, S ; Sharif University of Technology
    2010
    Abstract
    In this paper, we consider the problem of spectrum sensing by using multiple antenna in cognitive radios when the noise and the primary user signal are assumed as independent complex zero-mean Gaussian random signals. The optimal multiple antenna spectrum sensing detector needs to know the channel gains, noise variance, and primary user signal variance. In practice some or all of these parameters may be unknown, so we derive the Generalized Likelihood Ratio (GLR) detectors under these circumstances. The proposed GLR detector, in which all the parameters are unknown, is a blind and invariant detector with a low computational complexity. We also analytically compute the missed detection and... 

    A location privacy-preserving method for spectrum sharing in database-driven cognitive radio networks

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 3687-3711 ; 09296212 (ISSN) Salami, Z ; Ahmadian Attari, M ; Jannati, H ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    The great attention to cognitive radio networks (CRNs) in recent years, as a revolutionary communication paradigm that aims to solve the problem of spectrum scarcity, prompts serious investigation on security issues of these networks. One important security concern in CRNs is the preservation of users location privacy, which is under the shadow of threat, especially in database-driven CRNs. To this end, in this paper, we propose a Location Privacy Preserving Database-Driven Spectrum-Sharing (L-PDS 2) protocol for sharing the spectrum between PUs and SUs in a database-driven CRN, while protecting location privacy of both primary and secondary users, simultaneously. We also present two... 

    Simultaneous Block Iterative Method with Adaptive Thresholding for Cooperative Spectrum Sensing

    , Article IEEE Transactions on Vehicular Technology ; Volume 68, Issue 6 , 2019 , Pages 5598-5605 ; 00189545 (ISSN) Azghani, M ; Abtahi, A ; Marvasti, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    The effective utilization of the spectrum has become an essential goal in the communications field, which is addressed by the Cognitive Radio (CR) systems. The primary task in a CR system is to sense the spectrum to identify its holes to be exploited by the secondary users. In this paper, we tackle the compressed spectrum sensing problem in a cooperative manner. The CRs distributed in an area take the samples of the signal that has been reached to them through a wireless fading channel. The spectrum has the block-sparse structure. Moreover, the spectrum observed by different CRs in an area share the same block-sparse support. Therefore, we suggest to exploit the joint block-sparsity... 

    Secrecy performance of friendly jammer assisted cooperative NOMA systems with internal eavesdroppers

    , Article 31st IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2020, 31 August 2020 through 3 September 2020 ; Volume 2020-August , 2020 Abolpour, M ; Aissa, S ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In non-orthogonal multiple access (NOMA) systems, serving multiple users in shared resource blocks can allow untrusted users to overhear the messages of other users. In this context, we study a network consisting of a base station (BS), a near user and a far user, where the latter attempts to overhear the message of the former. The near user is a full-duplex (FD) node that can also act as a relay. Two operating scenarios are considered: 1) friendly jammer (FJ), where the FD node broadcasts noise for degrading the channel between the BS and the far user, while receiving data from the BS; and 2) friendly jammer relay (FJR), where, in addition to degrading the channel between the BS and the far... 

    Frequency planning of GSM cellular communication network in urban areas including traffic distribution, a practical implementation

    , Article 2008 Asia-Pacific Symposium on Electromagnetic Compatibility and 19th International Zurich Symposium on Electromagnetic Compatibility, APEMC 2008, Suntec, 19 May 2008 through 23 May 2008 ; 2008 , Pages 891-894 ; 9810806280 (ISBN); 9789810806286 (ISBN) Atamanesh, M ; Farzaneh, F ; Sharif University of Technology
    2008
    Abstract
    Using an in-house developed software the signal level, the best server cells, and the amount of interference using standard propagation models are determined in a cellular environment. The program is also able to assign the frequency channels automatically to the TRXs taking into account the carrier to interference and the traffic distribution using a genetic algorithm. In this paper, the cost function is based on the total Carrier to Interference ratio (C/I) and the traffic density of the serving area. The software by means of a genetic algorithm approaches a frequency assignment which increases the overall quality of service throughout the cellular network. The package has been used in a... 

    On the optimization of mobile power-controlled cellular networks regarding practical limitations

    , Article 2006 American Control Conference, Minneapolis, MN, 14 June 2006 through 16 June 2006 ; Volume 2006 , 2006 , Pages 6103-6107 ; 07431619 (ISSN); 1424402107 (ISBN); 9781424402106 (ISBN) Sadati, N ; Yousefi, M. I ; Sharif University of Technology
    2006
    Abstract
    In this paper, the intra-cell link adaptation problem is formulated as a constrained nonconvex nondifferentiable optimization problem to maximize the average link throughput while guaranteeing the best possible coverage reliability. We proceed to solve the resulted nonsmooth optimization problem using proximal point bundle method known in nondifferentiable optimization context. For this purpose, we first exploit the problem structure and reduce the original large scale optimization problem to a sequence of one-dimensional problems coordinated by a master program using direct primal decomposition technique. Proximal bundle method with aggregation policy is then adopted in master program to...