-
RadYOLOLet: Radar Detection and Parameter Estimation Using YOLO and WaveLet
Authors:
Shamik Sarkar,
Dongning Guo,
Danijela Cabric
Abstract:
Detection of radar signals without assistance from the radar transmitter is a crucial requirement for emerging and future shared-spectrum wireless networks like Citizens Broadband Radio Service (CBRS). In this paper, we propose a supervised deep learning-based spectrum sensing approach called RadYOLOLet that can detect low-power radar signals in the presence of interference and estimate the radar…
▽ More
Detection of radar signals without assistance from the radar transmitter is a crucial requirement for emerging and future shared-spectrum wireless networks like Citizens Broadband Radio Service (CBRS). In this paper, we propose a supervised deep learning-based spectrum sensing approach called RadYOLOLet that can detect low-power radar signals in the presence of interference and estimate the radar signal parameters. The core of RadYOLOLet is two different convolutional neural networks (CNN), RadYOLO and Wavelet-CNN, that are trained independently. RadYOLO operates on spectrograms and provides most of the capabilities of RadYOLOLet. However, it suffers from low radar detection accuracy in the low signal-to-noise ratio (SNR) regime. We develop Wavelet-CNN specifically to deal with this limitation of RadYOLO. Wavelet-CNN operates on continuous Wavelet transform of the captured signals, and we use it only when RadYOLO fails to detect any radar signal. We thoroughly evaluate RadYOLOLet using different experiments corresponding to different types of interference signals. Based on our evaluations, we find that RadYOLOLet can achieve 100% radar detection accuracy for our considered radar types up to 16 dB SNR, which cannot be guaranteed by other comparable methods. RadYOLOLet can also function accurately under interference up to 16 dB SINR.
△ Less
Submitted 21 September, 2023;
originally announced September 2023.
-
REM-U-net: Deep Learning Based Agile REM Prediction with Energy-Efficient Cell-Free Use Case
Authors:
Hazem Sallouha,
Shamik Sarkar,
Enes Krijestorac,
Danijela Cabric
Abstract:
Radio environment maps (REMs) hold a central role in optimizing wireless network deployment, enhancing network performance, and ensuring effective spectrum management. Conventional REM prediction methods are either excessively time-consuming, e.g., ray tracing, or inaccurate, e.g., statistical models, limiting their adoption in modern inherently dynamic wireless networks. Deep-learning-based REM p…
▽ More
Radio environment maps (REMs) hold a central role in optimizing wireless network deployment, enhancing network performance, and ensuring effective spectrum management. Conventional REM prediction methods are either excessively time-consuming, e.g., ray tracing, or inaccurate, e.g., statistical models, limiting their adoption in modern inherently dynamic wireless networks. Deep-learning-based REM prediction has recently attracted considerable attention as an appealing, accurate, and time-efficient alternative. However, existing works on REM prediction using deep learning are either confined to 2D maps or use a limited dataset. In this paper, we introduce a runtime-efficient REM prediction framework based on u-nets, trained on a large-scale 3D maps dataset. In addition, data preprocessing steps are investigated to further refine the REM prediction accuracy. The proposed u-net framework, along with preprocessing steps, are evaluated in the context of the 2023 IEEE ICASSP Signal Processing Grand Challenge, namely, the First Pathloss Radio Map Prediction Challenge. The evaluation results demonstrate that the proposed method achieves an average normalized root-mean-square error (RMSE) of 0.045 with an average of 14 milliseconds (ms) runtime. Finally, we position our achieved REM prediction accuracy in the context of a relevant cell-free massive multiple-input multiple-output (CF-mMIMO) use case. We demonstrate that one can obviate consuming energy on large-scale fading measurements and rely on predicted REM instead to decide on which sleep access points (APs) to switch on in a CF-mMIMO network that adopts a minimum propagation loss AP switch ON/OFF strategy.
△ Less
Submitted 21 September, 2023;
originally announced September 2023.
-
ProSpire: Proactive Spatial Prediction of Radio Environment Using Deep Learning
Authors:
Shamik Sarkar,
Dongning Guo,
Danijela Cabric
Abstract:
Spatial prediction of the radio propagation environment of a transmitter can assist and improve various aspects of wireless networks. The majority of research in this domain can be categorized as 'reactive' spatial prediction, where the predictions are made based on a small set of measurements from an active transmitter whose radio environment is to be predicted. Emerging spectrum-sharing paradigm…
▽ More
Spatial prediction of the radio propagation environment of a transmitter can assist and improve various aspects of wireless networks. The majority of research in this domain can be categorized as 'reactive' spatial prediction, where the predictions are made based on a small set of measurements from an active transmitter whose radio environment is to be predicted. Emerging spectrum-sharing paradigms would benefit from 'proactive' spatial prediction of the radio environment, where the spatial predictions must be done for a transmitter for which no measurement has been collected.
This paper proposes a novel, supervised deep learning-based framework, ProSpire, that enables spectrum sharing by leveraging the idea of proactive spatial prediction. We carefully address several challenges in ProSpire, such as designing a framework that conveniently collects training data for learning, performing the predictions in a fast manner, enabling operations without an area map, and ensuring that the predictions do not lead to undesired interference. ProSpire relies on the crowdsourcing of transmitters and receivers during their normal operations to address some of the aforementioned challenges. The core component of ProSpire is a deep learning-based image-to-image translation method, which we call RSSu-net. We generate several diverse datasets using ray tracing software and numerically evaluate ProSpire. Our evaluations show that RSSu-net performs reasonably well in terms of signal strength prediction, 5 dB mean absolute error, which is comparable to the average error of other relevant methods. Importantly, due to the merits of RSSu-net, ProSpire creates proactive boundaries around transmitters such that they can be activated with 97% probability of not causing interference. In this regard, the performance of RSSu-net is 19% better than that of other comparable methods.
△ Less
Submitted 20 August, 2023;
originally announced August 2023.
-
Real-time Wireless Transmitter Authorization: Adapting to Dynamic Authorized Sets with Information Retrieval
Authors:
Samurdhi Karunaratne,
Samer Hanna,
Danijela Cabric
Abstract:
As the Internet of Things (IoT) continues to grow, ensuring the security of systems that rely on wireless IoT devices has become critically important. Deep learning-based passive physical layer transmitter authorization systems have been introduced recently for this purpose, as they accommodate the limited computational and power budget of such devices. These systems have been shown to offer excel…
▽ More
As the Internet of Things (IoT) continues to grow, ensuring the security of systems that rely on wireless IoT devices has become critically important. Deep learning-based passive physical layer transmitter authorization systems have been introduced recently for this purpose, as they accommodate the limited computational and power budget of such devices. These systems have been shown to offer excellent outlier detection accuracies when trained and tested on a fixed authorized transmitter set. However in a real-life deployment, a need may arise for transmitters to be added and removed as the authorized set of transmitters changes. In such cases, the system could experience long down-times, as retraining the underlying deep learning model is often a time-consuming process. In this paper, we draw inspiration from information retrieval to address this problem: by utilizing feature vectors as RF fingerprints, we first demonstrate that training could be simplified to indexing those feature vectors into a database using locality sensitive hashing (LSH). Then we show that approximate nearest neighbor search could be performed on the database to perform transmitter authorization that matches the accuracy of deep learning models, while allowing for more than 100x faster retraining. Furthermore, dimensionality reduction techniques are used on the feature vectors to show that the authorization latency of our technique could be reduced to approach that of traditional deep learning-based systems.
△ Less
Submitted 3 November, 2021;
originally announced November 2021.
-
Open Set RF Fingerprinting using Generative Outlier Augmentation
Authors:
Samurdhi Karunaratne,
Samer Hanna,
Danijela Cabric
Abstract:
RF devices can be identified by unique imperfections embedded in the signals they transmit called RF fingerprints. The closed set classification of such devices, where the identification must be made among an authorized set of transmitters, has been well explored. However, the much more difficult problem of open set classification, where the classifier needs to reject unauthorized transmitters whi…
▽ More
RF devices can be identified by unique imperfections embedded in the signals they transmit called RF fingerprints. The closed set classification of such devices, where the identification must be made among an authorized set of transmitters, has been well explored. However, the much more difficult problem of open set classification, where the classifier needs to reject unauthorized transmitters while recognizing authorized transmitters, has only been recently visited. So far, efforts at open set classification have largely relied on the utilization of signal samples captured from a known set of unauthorized transmitters to aid the classifier learn unauthorized transmitter fingerprints. Since acquiring new transmitters to use as known transmitters is highly expensive, we propose to use generative deep learning methods to emulate unauthorized signal samples for the augmentation of training datasets. We develop two different data augmentation techniques, one that exploits a limited number of known unauthorized transmitters and the other that does not require any unauthorized transmitters. Experiments conducted on a dataset captured from a WiFi testbed indicate that data augmentation allows for significant increases in open set classification accuracy, especially when the authorized set is small.
△ Less
Submitted 30 August, 2021;
originally announced August 2021.
-
Signal Processing Based Deep Learning for Blind Symbol Decoding and Modulation Classification
Authors:
Samer Hanna,
Chris Dick,
Danijela Cabric
Abstract:
Blindly decoding a signal requires estimating its unknown transmit parameters, compensating for the wireless channel impairments, and identifying the modulation type. While deep learning can solve complex problems, digital signal processing (DSP) is interpretable and can be more computationally efficient. To combine both, we propose the dual path network (DPN). It consists of a signal path of DSP…
▽ More
Blindly decoding a signal requires estimating its unknown transmit parameters, compensating for the wireless channel impairments, and identifying the modulation type. While deep learning can solve complex problems, digital signal processing (DSP) is interpretable and can be more computationally efficient. To combine both, we propose the dual path network (DPN). It consists of a signal path of DSP operations that recover the signal, and a feature path of neural networks that estimate the unknown transmit parameters. By interconnecting the paths over several recovery stages, later stages benefit from the recovered signals and reuse all the previously extracted features. The proposed design is demonstrated to provide 5% improvement in modulation classification compared to alternative designs lacking either feature sharing or access to recovered signals. The estimation results of DPN along with its blind decoding performance are shown to outperform a blind signal processing algorithm for BPSK and QPSK on a simulated dataset. An over-the-air software-defined-radio capture was used to verify DPN results at high SNRs. DPN design can process variable length inputs and is shown to outperform relying on fixed length inputs with prediction averaging on longer signals by up to 15% in modulation classification.
△ Less
Submitted 25 October, 2021; v1 submitted 19 June, 2021;
originally announced June 2021.
-
UAV Swarm Position Optimization for High Capacity MIMO Backhaul
Authors:
Samer Hanna,
Enes Krijestorac,
Danijela Cabric
Abstract:
A swarm of cooperating UAVs communicating with a distant multiantenna ground station can leverage MIMO spatial multiplexing to scale the capacity. Due to the line-of-sight propagation between the swarm and the ground station, the MIMO channel is highly correlated, leading to limited multiplexing gains. In this paper, we optimize the UAV positions to attain the maximum MIMO capacity given by the si…
▽ More
A swarm of cooperating UAVs communicating with a distant multiantenna ground station can leverage MIMO spatial multiplexing to scale the capacity. Due to the line-of-sight propagation between the swarm and the ground station, the MIMO channel is highly correlated, leading to limited multiplexing gains. In this paper, we optimize the UAV positions to attain the maximum MIMO capacity given by the single user bound. An infinite set of UAV placements that attains the capacity bound is first derived. Given an initial swarm placement, we formulate the problem of minimizing the distance traveled by the UAVs to reach a placement within the capacity maximizing set of positions. An offline centralized solution to the problem using block coordinate descent is developed assuming known initial positions of UAVs. We also propose an online distributed algorithm, where the UAVs iteratively adjust their positions to maximize the capacity. Our proposed approaches are shown to significantly increase the capacity at the expense of a bounded translation from the initial UAV placements. This capacity increase persists when using a massive MIMO ground station. Using numerical simulations, we show the robustness of our approaches in a Rician channel under UAV motion disturbances.
△ Less
Submitted 28 April, 2021;
originally announced April 2021.
-
Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack
Authors:
Samurdhi Karunaratne,
Enes Krijestorac,
Danijela Cabric
Abstract:
Physical layer authentication relies on detecting unique imperfections in signals transmitted by radio devices to isolate their fingerprint. Recently, deep learning-based authenticators have increasingly been proposed to classify devices using these fingerprints, as they achieve higher accuracies compared to traditional approaches. However, it has been shown in other domains that adding carefully…
▽ More
Physical layer authentication relies on detecting unique imperfections in signals transmitted by radio devices to isolate their fingerprint. Recently, deep learning-based authenticators have increasingly been proposed to classify devices using these fingerprints, as they achieve higher accuracies compared to traditional approaches. However, it has been shown in other domains that adding carefully crafted perturbations to legitimate inputs can fool such classifiers. This can undermine the security provided by the authenticator. Unlike adversarial attacks applied in other domains, an adversary has no control over the propagation environment. Therefore, to investigate the severity of this type of attack in wireless communications, we consider an unauthorized transmitter attempting to have its signals classified as authorized by a deep learning-based authenticator. We demonstrate a reinforcement learning-based attack where the impersonator--using only the authenticator's binary authentication decision--distorts its signals in order to penetrate the system. Extensive simulations and experiments on a software-defined radio testbed indicate that at appropriate channel conditions and bounded by a maximum distortion level, it is possible to fool the authenticator reliably at more than 90% success rate.
△ Less
Submitted 3 November, 2020;
originally announced November 2020.
-
Hybrid Vehicular and Cloud Distributed Computing: A Case for Cooperative Perception
Authors:
Enes Krijestorac,
Agon Memedi,
Takamasa Higuchi,
Seyhan Ucar,
Onur Altintas,
Danijela Cabric
Abstract:
In this work, we propose the use of hybrid offloading of computing tasks simultaneously to edge servers (vertical offloading) via LTE communication and to nearby cars (horizontal offloading) via V2V communication, in order to increase the rate at which tasks are processed compared to local processing. Our main contribution is an optimized resource assignment and scheduling framework for hybrid off…
▽ More
In this work, we propose the use of hybrid offloading of computing tasks simultaneously to edge servers (vertical offloading) via LTE communication and to nearby cars (horizontal offloading) via V2V communication, in order to increase the rate at which tasks are processed compared to local processing. Our main contribution is an optimized resource assignment and scheduling framework for hybrid offloading of computing tasks. The framework optimally utilizes the computational resources in the edge and in the micro cloud, while taking into account communication constraints and task requirements. While cooperative perception is the primary use case of our framework, the framework is applicable to other cooperative vehicular applications with high computing demand and significant transmission overhead. The framework is tested in a simulated environment built on top of car traces and communication rates exported from the Veins vehicular networking simulator. We observe a significant increase in the processing rate of cooperative perception sensor frames when hybrid offloading with optimized resource assignment is adopted. Furthermore, the processing rate increases with V2V connectivity as more computing tasks can be offloaded horizontally.
△ Less
Submitted 8 October, 2020;
originally announced October 2020.
-
Spectrum Sharing for Massive Access in Ultra-Narrowband IoT Systems
Authors:
Ghaith Hattab,
Petar Popovski,
Danijela Cabric
Abstract:
Ultra-narrowband (UNB) communications has become a signature feature for many emerging low-power wide-area (LPWA) networks. Specifically, using extremely narrowband signals helps the network connect more Internet-of-things (IoT) devices within a given band. It also improves robustness to interference, extending the coverage of the network. In this paper, we study the coexistence capability of UNB…
▽ More
Ultra-narrowband (UNB) communications has become a signature feature for many emerging low-power wide-area (LPWA) networks. Specifically, using extremely narrowband signals helps the network connect more Internet-of-things (IoT) devices within a given band. It also improves robustness to interference, extending the coverage of the network. In this paper, we study the coexistence capability of UNB networks and their scalability to enable massive access. To this end, we develop a stochastic geometry framework to analyze and model UNB networks on a large scale. The framework captures the unique characteristics of UNB communications, including the asynchronous time-frequency access, signal repetition, and the absence of base station (BS) association. Closed-form expressions of the transmission success probability and network connection density are presented for several UNB protocols. We further discuss multiband access for UNB networks, proposing a low-complexity protocol. Our analysis reveals several insights on the geographical diversity achieved when devices do not connect to a single BS, the optimal number of signal repetitions, and how to utilize multiple bands without increasing the complexity of BSs. Simulation results are provided to validate the analysis, and they show that UNB communications enables a single BS to connect thousands of devices even when the spectrum is shared with other networks.
△ Less
Submitted 18 July, 2020; v1 submitted 30 January, 2020;
originally announced January 2020.
-
User Association in Dense mmWave Networks based on Rate Requirements
Authors:
Veljko Boljanovic,
Forough Yaghoubi,
Danijela Cabric
Abstract:
Commonly considered user association frameworks in millimeter-wave communications are based on the sum rate maximization, and they essentially neglect user specific rate and service requirements. Furthermore, new features of millimeter-wave communications including spatial multiplexing, connectivity to multiple coordinated base stations and dense base station deployment are not considered. In this…
▽ More
Commonly considered user association frameworks in millimeter-wave communications are based on the sum rate maximization, and they essentially neglect user specific rate and service requirements. Furthermore, new features of millimeter-wave communications including spatial multiplexing, connectivity to multiple coordinated base stations and dense base station deployment are not considered. In this work, we propose a two-step optimization framework for single-shot user association in dense millimeter-wave networks which takes into account users' rate requirements, multi-connectivity, and hybrid transceiver architecture for spatial multiplexing. The proposed framework considers multiple RF chains at each base station and assigns them to different users that also have multiple RF chains for connectivity with more than one base station. In the first step, the objective of the user association is to maximize the number of users with satisfied rate requirements while minimizing network underutilization. In the second step, remaining RF chains are assigned to users, whose rate requirement has not been met, such that network sum rate is maximized. This is a novel problem formulation for user associate in millimeter-wave networks. We propose low complexity sub-optimal user association algorithms based on this formulation, numerically evaluate the optimal and sub-optimal solutions, and compare them to the conventional association approaches in terms of the number of associated users and network sum rate.
△ Less
Submitted 10 May, 2019;
originally announced May 2019.
-
Downlink transceiver beamforming and admission control for massive MIMO cognitive radio networks
Authors:
Shailesh Chaudhari,
Danijela Cabric
Abstract:
In this paper, an optimization framework is proposed for joint transceiver beamforming and admission control in massive MIMO cognitive radio networks. The objective of the optimization problem is to support maximum number of secondary users in downlink transmission with constraints on the total power allocated to users, the rate achieved at secondary users and the interference at the primary nodes…
▽ More
In this paper, an optimization framework is proposed for joint transceiver beamforming and admission control in massive MIMO cognitive radio networks. The objective of the optimization problem is to support maximum number of secondary users in downlink transmission with constraints on the total power allocated to users, the rate achieved at secondary users and the interference at the primary nodes. The proposed framework takes into account the imperfect knowledge of the channels between the secondary and the primary nodes and also mitigates the interference caused by the primary users at secondary receivers. In order to solve the underlying NP-hard problem, we propose a three-step algorithm with two alternative schemes for power allocation, namely: equal power and equal rate. In addition, we provide a solution by reducing the problem to an Integer Linear Program (ILP). The performances of equal rate, equal power, and ILP methods are studied in under different constraints.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
Feasibility of Serving K Secondary Users in Underlay Cognitive Radio Networks using Massive MIMO
Authors:
Shailesh Chaudhari,
Danijela Cabric
Abstract:
In this paper, we analyze the feasibility of serving K secondary users (SUs) on the downlink using a secondary base station (SBS), equipped with a large antenna array, in an underlay cognitive radio (CR) network. First, we formulate a feasibility problem in order to compute beamforming vectors and power allocations for K SUs with constraints on the maximum allowable interference to primary users (…
▽ More
In this paper, we analyze the feasibility of serving K secondary users (SUs) on the downlink using a secondary base station (SBS), equipped with a large antenna array, in an underlay cognitive radio (CR) network. First, we formulate a feasibility problem in order to compute beamforming vectors and power allocations for K SUs with constraints on the maximum allowable interference to primary users (PUs), required minimum rate at SUs, and maximum transmit power from SBS. The problem formulation takes into account the imperfect channel state information between SUs and PUs. We propose a two step approach to solve the non-convex problem. In the first step, beamforming vectors are computed using one of the two alternative schemes: maximum eigenmode beamforming (MEB) or zero forcing beamforming (ZFB). We show that the power allocations can be computed by solving a linear programming feasibility problem. Further, we provide theoretical feasibility analysis of serving K SUs with equal power allocation by deriving the distributions of SINR at SUs and interference to PUs, thereby computing the probability of serving K SUs as a function of the constraints. The analytical and simulation results are presented to demonstrate the impact of constraints on the feasibility of serving K SUs in the CR network.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
QoS Aware Power Allocation and User Selection in Massive MIMO Underlay Cognitive Radio Networks
Authors:
Shailesh Chaudhari,
Danijela Cabric
Abstract:
We address the problem of power allocation and secondary user (SU) selection in the downlink from a secondary base station (SBS) equipped with a large number of antennas in an underlay cognitive radio network. A new optimization framework is proposed in order to select the maximum number of SUs and compute power allocations in order to satisfy instantaneous rate or QoS requirements of SUs. The opt…
▽ More
We address the problem of power allocation and secondary user (SU) selection in the downlink from a secondary base station (SBS) equipped with a large number of antennas in an underlay cognitive radio network. A new optimization framework is proposed in order to select the maximum number of SUs and compute power allocations in order to satisfy instantaneous rate or QoS requirements of SUs. The optimization framework also aims to restrict the interference to primary users (PUs) below a predefined threshold using available imperfect CSI at the SBS. In order to obtain a feasible solution for power allocation and user selection, we propose a low-complexity algorithm called DeleteSU-with-Maximum-Power-allocation (DMP). Theoretical analysis is provided to compute the interference to PUs and the number of SUs exceeding the required rate. The analysis and simulations show that the proposed DMP algorithm outperforms the stateof-the art selection algorithm in terms of serving more users with minimum rate constraints, and it approaches the optimal solution if the number of antennas is an order of magnitude greater than the number of users.
△ Less
Submitted 14 March, 2019;
originally announced March 2019.
-
Power Control and Frequency Band Selection Policies for Underlay MIMO Cognitive Radio
Authors:
Shailesh Chaudhari,
Danijela Cabric
Abstract:
We study power control and frequency band selection policies for multi-band underlay MIMO cognitive radio with the objective of maximizing the rate of a secondary user (SU) link while limiting the interference leakage towards primary users (PUs) below a threshold. The goal of the SU in each policy is to select one frequency band in each time slot and determine the transmit power. To limit the inte…
▽ More
We study power control and frequency band selection policies for multi-band underlay MIMO cognitive radio with the objective of maximizing the rate of a secondary user (SU) link while limiting the interference leakage towards primary users (PUs) below a threshold. The goal of the SU in each policy is to select one frequency band in each time slot and determine the transmit power. To limit the interference towards PU in time-varying channels, we propose fixed and dynamic transmit power control schemes which depend on PU traffic and the temporal correlation of channels between the SU and the PU. We study the performance of frequency band selection policies that use fixed or dynamic power control. We show that dynamic frequency band selection policies, e.g., policies based on multi-armed bandit framework, wherein SU selects a different frequency band in each slot, result in higher interference towards PU as compared to the fixed band policy wherein SU stays on one band. We also provide an expression for the gap between the rate achieved by SU under a clairvoyant policy and the fixed band policy. It is observed that this gap reduces with increased temporal correlation and with increased number of SU antennas.
△ Less
Submitted 14 March, 2019;
originally announced March 2019.
-
Unlicensed Spectrum Sharing for Massive Internet-of-Things Communications
Authors:
Ghaith Hattab,
Danijela Cabric
Abstract:
The unlicensed spectrum, although free, has become an invaluable resource toward enabling massive Internet-of-things (IoT) applications, where Internet-enabled devices are deployed at a large scale. However, realizing massive IoT connectivity over unlicensed bands requires efficient spectrum sharing among IoT devices and fair coexistence with other wireless networks. In this article, we discuss se…
▽ More
The unlicensed spectrum, although free, has become an invaluable resource toward enabling massive Internet-of-things (IoT) applications, where Internet-enabled devices are deployed at a large scale. However, realizing massive IoT connectivity over unlicensed bands requires efficient spectrum sharing among IoT devices and fair coexistence with other wireless networks. In this article, we discuss several spectrum sharing methods to address these intra- and inter-network sharing issues. To this end, we first consider ALOHA-based networks that avoid spectrum sensing, yet rely on diversity to improve connection density of random access. Then, we present sensing-based solutions such as unlicensed cellular access that help support a wider range of applications with different rate requirements and connection densities. Finally, we highlight future research directions for massive IoT connectivity over the unlicensed spectrum.
△ Less
Submitted 4 March, 2019;
originally announced March 2019.
-
Performance Analysis of Uplink Cellular IoT Using Different Deployments of Data Aggregators
Authors:
Ghaith Hattab,
Danijela Cabric
Abstract:
Data aggregation is an effective solution to enable cellular support of Internet-of-things (IoT) communications. Indeed, it helps alleviate channel congestion, reduce the communication range, and extend battery-lifetime. In this paper, we use stochastic geometry to analyze the performance of uplink cellular IoT using different deployment strategies of aggregators, including terrestrial and aerial…
▽ More
Data aggregation is an effective solution to enable cellular support of Internet-of-things (IoT) communications. Indeed, it helps alleviate channel congestion, reduce the communication range, and extend battery-lifetime. In this paper, we use stochastic geometry to analyze the performance of uplink cellular IoT using different deployment strategies of aggregators, including terrestrial and aerial ones, e.g., drones or unmanned aerial vehicles. We focus on IoT-specific performance metrics, that are typically used by 3GPP. Specifically, we derive closed-form expressions of the average transmit power consumption, which is key to determine the lifetime of IoT devices, as well as the maximum coupling loss, which is essential to determine the maximum coverage the cellular system can support. Simulation results are presented to validate the derived theoretical expressions. It is shown that aerial aggregators can significantly extend the device lifetime and provide superior coverage compared to other deployment strategies. In addition, random deployment performs well when aggregators are densely deployed, whereas optimizing the location of a single terrestrial aggregator is beneficial when devices are more clustered.
△ Less
Submitted 4 December, 2018;
originally announced December 2018.
-
Energy-Efficient Massive IoT Shared Spectrum Access over UAV-enabled Cellular Networks
Authors:
Ghaith Hattab,
Danijela Cabric
Abstract:
Data aggregation has become an emerging paradigm to support massive Internet-of-things (IoT), a new and critical use case for fifth-generation new radio (5G-NR). Indeed, data aggregators can complement cellular base stations and process IoT traffic to reduce network congestion. In this paper, we consider using mobile data aggregators, e.g., drones, that collect IoT traffic and aggregate them to th…
▽ More
Data aggregation has become an emerging paradigm to support massive Internet-of-things (IoT), a new and critical use case for fifth-generation new radio (5G-NR). Indeed, data aggregators can complement cellular base stations and process IoT traffic to reduce network congestion. In this paper, we consider using mobile data aggregators, e.g., drones, that collect IoT traffic and aggregate them to the network. Specifically, we first discuss how the spectrum can be shared between cellular users (UEs) and IoT devices in the presence of drones, proposing a time-division duplexing protocol. We use stochastic geometry to analyze this protocol, comparing it to the standard spectrum sharing and orthogonal allocation protocols. We then formulate a stochastic optimization problem to optimize the nominal IoT transmit power, maximizing the average energy-efficiency (EE) of the IoT device subject to interference constraints to protect UEs. Simulations are presented to validate the theoretical insights and the effectiveness of the proposed protocol. It is shown that using drones, to aggregate IoT traffic, improves the EE of IoT devices, yet the EE degrades as their altitudes increases. Equally important, optimizing the transmit power is critical to further improve the EE, while ensuring fair coexistence with UEs.
△ Less
Submitted 25 May, 2020; v1 submitted 24 August, 2018;
originally announced August 2018.
-
Learning Wireless Networks' Topologies Using Asymmetric Granger Causality
Authors:
Mihir Laghate,
Danijela Cabric
Abstract:
Sharing spectrum with a communicating incumbent user (IU) network requires avoiding interference to IU receivers. But since receivers are passive when in the receive mode and cannot be detected, the network topology can be used to predict the potential receivers of a currently active transmitter. For this purpose, this paper proposes a method to detect the directed links between IUs of time multip…
▽ More
Sharing spectrum with a communicating incumbent user (IU) network requires avoiding interference to IU receivers. But since receivers are passive when in the receive mode and cannot be detected, the network topology can be used to predict the potential receivers of a currently active transmitter. For this purpose, this paper proposes a method to detect the directed links between IUs of time multiplexing communication networks from their transmission start and end times. It models the response mechanism of commonly used communication protocols using Granger causality: the probability of an IU starting a transmission after another IU's transmission ends increases if the former is a receiver of the latter. This paper proposes a non-parametric test statistic for detecting such behavior. To help differentiate between a response and the opportunistic access of available spectrum, the same test statistic is used to estimate the response time of each link. The causal structure of the response is studied through a discrete time Markov chain that abstracts the IUs' medium access protocol and focuses on the response time and response probability of 2 IUs. Through NS-3 simulations, it is shown that the proposed algorithm outperforms existing methods in accurately learning the topologies of infrastructure-based networks and that it can infer the directed data flow in ad hoc networks with finer time resolution than an existing method.
△ Less
Submitted 20 December, 2017; v1 submitted 26 October, 2017;
originally announced October 2017.
-
Channel Access Method Classification For Cognitive Radio Applications
Authors:
Mihir Laghate,
Paulo Urriza,
Danijela Cabric
Abstract:
Motivated by improved detection and prediction of temporal holes, we propose a two stage algorithm to classify the channel access method used by a primary network. The first stage extends an existing fourth-order cumulant-based modulation classifier to distinguish between TDMA, OFDMA, and CDMA. The second stage proposes a novel collision detector using the sample variance of the same cumulant to d…
▽ More
Motivated by improved detection and prediction of temporal holes, we propose a two stage algorithm to classify the channel access method used by a primary network. The first stage extends an existing fourth-order cumulant-based modulation classifier to distinguish between TDMA, OFDMA, and CDMA. The second stage proposes a novel collision detector using the sample variance of the same cumulant to detect contention-based channel access methods. Our proposed method is blind and independent of the received SNR. Simulations show that our classification of TDMA, OFDMA, and CDMA is robust to network load while detection of contention outperforms existing methods.
△ Less
Submitted 16 September, 2017;
originally announced September 2017.
-
Compressive Detection of Random Subspace Signals
Authors:
Alireza Razavi,
Mikko Valkama,
Danijela Cabric
Abstract:
The problem of compressive detection of random subspace signals is studied. We consider signals modeled as $\mathbf{s} = \mathbf{H} \mathbf{x}$ where $\mathbf{H}$ is an $N \times K$ matrix with $K \le N$ and $\mathbf{x} \sim \mathcal{N}(\mathbf{0}_{K,1},σ_x^2 \mathbf{I}_K)$. We say that signal $\mathbf{s}$ lies in or leans toward a subspace if the largest eigenvalue of $\mathbf{H} \mathbf{H}^T$ is…
▽ More
The problem of compressive detection of random subspace signals is studied. We consider signals modeled as $\mathbf{s} = \mathbf{H} \mathbf{x}$ where $\mathbf{H}$ is an $N \times K$ matrix with $K \le N$ and $\mathbf{x} \sim \mathcal{N}(\mathbf{0}_{K,1},σ_x^2 \mathbf{I}_K)$. We say that signal $\mathbf{s}$ lies in or leans toward a subspace if the largest eigenvalue of $\mathbf{H} \mathbf{H}^T$ is strictly greater than its smallest eigenvalue. We first design a measurement matrix $\mathbfΦ=[\mathbfΦ_s^T,\mathbfΦ_o^T]^T$ comprising of two sub-matrices $\mathbfΦ_s$ and $\mathbfΦ_o$ where $\mathbfΦ_s$ projects the signals to the strongest left-singular vectors, i.e., the left-singular vectors corresponding to the largest singular values, of subspace matrix $\mathbf{H}$ and $\mathbfΦ_o$ projects it to the weakest left-singular vectors. We then propose two detectors which work based on the difference in energies of the samples measured by two sub-matrices $\mathbfΦ_s$ and $\mathbfΦ_o$ and prove their optimality. Simplified versions of the proposed detectors for the case when the variance of noise is known are also provided. Furthermore, we study the performance of the detector when measurements are imprecise and show how imprecision can be compensated by employing more measurement devices. The problem is then re-formulated for the case when the signal lies in the union of a finite number of linear subspaces instead of a single linear subspace. Finally, we study the performance of the proposed methods by simulation examples.
△ Less
Submitted 30 December, 2015; v1 submitted 10 July, 2015;
originally announced July 2015.
-
Compressive Identification of Active OFDM Subcarriers in Presence of Timing Offset
Authors:
Alireza Razavi,
Mikko Valkama,
Danijela Cabric
Abstract:
In this paper we study the problem of identifying active subcarriers in an OFDM signal from compressive measurements sampled at sub-Nyquist rate. The problem is of importance in Cognitive Radio systems when secondary users (SUs) are looking for available spectrum opportunities to communicate over them while sensing at Nyquist rate sampling can be costly or even impractical in case of very wide ban…
▽ More
In this paper we study the problem of identifying active subcarriers in an OFDM signal from compressive measurements sampled at sub-Nyquist rate. The problem is of importance in Cognitive Radio systems when secondary users (SUs) are looking for available spectrum opportunities to communicate over them while sensing at Nyquist rate sampling can be costly or even impractical in case of very wide bandwidth. We first study the effect of timing offset and derive the necessary and sufficient conditions for signal recovery in the oracle-assisted case when the true active sub-carriers are assumed known. Then we propose an Orthogonal Matching Pursuit (OMP)-based joint sparse recovery method for identifying active subcarriers when the timing offset is known. Finally we extend the problem to the case of unknown timing offset and develop a joint dictionary learning and sparse approximation algorithm, where in the dictionary learning phase the timing offset is estimated and in the sparse approximation phase active subcarriers are identified. The obtained results demonstrate that active subcarrier identification can be carried out reliably, by using the developed framework.
△ Less
Submitted 9 July, 2015;
originally announced July 2015.
-
Improved Eigenvalue-based Spectrum Sensing via Sensor Signal Overlapping
Authors:
Liping Du,
Mihir Laghate,
Chun-Hao Liu,
Danijela Cabric
Abstract:
Eigenvalue-based detectors are considered as an important method of spectrum sensing since they do not require the information about the primary user (PU) signal. In this paper we propose a method to improve the performance of the eigenvalue-based detector. The proposed method introduces a new test statistic based on combinatorial matrix with components which are overlapping subgroups extracted fr…
▽ More
Eigenvalue-based detectors are considered as an important method of spectrum sensing since they do not require the information about the primary user (PU) signal. In this paper we propose a method to improve the performance of the eigenvalue-based detector. The proposed method introduces a new test statistic based on combinatorial matrix with components which are overlapping subgroups extracted from the array of received signals. As a result, its covariance matrix has a larger maximum eigenvalue and trace value than the one without overlapping. Simulation results show that our proposed method can further improve the detection performance of the optimal eigenvalue-based detector. The paper also shows the effect of different overlapping methods on the receiver operating characteristic curve.
△ Less
Submitted 29 April, 2015;
originally announced April 2015.
-
Covariance-Based OFDM Spectrum Sensing with Sub-Nyquist Samples
Authors:
Alireza Razavi,
Mikko Valkama,
Danijela Cabric
Abstract:
In this paper, we propose a feature-based method for spectrum sensing of OFDM signals from sub-Nyquist samples over a single band. We exploit the structure of the covariance matrix of OFDM signals to convert an underdetermined set of covariance-based equations to an overdetermined one. The statistical properties of sample covariance matrix are analyzed and then based on that an approximate General…
▽ More
In this paper, we propose a feature-based method for spectrum sensing of OFDM signals from sub-Nyquist samples over a single band. We exploit the structure of the covariance matrix of OFDM signals to convert an underdetermined set of covariance-based equations to an overdetermined one. The statistical properties of sample covariance matrix are analyzed and then based on that an approximate Generalized Likelihood Ratio Test (GLRT) for detection of OFDM signals from sub-Nyquist samples is derived. The method is also extended to the frequency-selective channels.
△ Less
Submitted 10 January, 2015;
originally announced January 2015.
-
Robust Cooperative Spectrum Sensing Scheduling Optimization in Multi-Channel Dynamic Spectrum Access Networks
Authors:
Chun-Hao Liu,
Arash Azarfar,
Jean-Francois Frigon,
Brunilde Sanso,
Danijela Cabric
Abstract:
Dynamic spectrum access (DSA) enables secondary networks to find and efficiently exploit spectrum opportunities. A key factor to design a DSA network is the spectrum sensing algorithms for multiple channels with multiple users. Multi-user cooperative channel sensing reduces the sensing time, and thus it increases transmission throughput. However, in a multi-channel system, the problem becomes more…
▽ More
Dynamic spectrum access (DSA) enables secondary networks to find and efficiently exploit spectrum opportunities. A key factor to design a DSA network is the spectrum sensing algorithms for multiple channels with multiple users. Multi-user cooperative channel sensing reduces the sensing time, and thus it increases transmission throughput. However, in a multi-channel system, the problem becomes more complex since the benefits of assigning users to sense channels in parallel must also be considered. A sensing schedule, indicating to each user the channel that it should sense at different sensing moments, must be thus created to optimize system performance. In this paper, we formulate the general sensing scheduling optimization problem and then propose several sensing strategies to schedule the users according to network parameters with homogeneous sensors. Later on we extend the results to heterogeneous sensors and propose a robust scheduling design when we have traffic and channel uncertainty. We propose three sensing strategies, and, within each one of them, several solutions, striking a balance between throughput performance and computational complexity, are proposed. In addition, we show that a sequential channel sensing strategy is the one to be preferred when the sensing time is small, the number of channels is large, and the number of users is small. For all the other cases, a parallel channel sensing strategy is recommended in terms of throughput performance. We also show that a proposed hybrid sequential-parallel channel sensing strategy achieves the best performance in all scenarios at the cost of extra memory and computation complexity.
△ Less
Submitted 19 May, 2015; v1 submitted 15 December, 2014;
originally announced December 2014.
-
Primary User Traffic Classification in Dynamic Spectrum Access Networks
Authors:
Chun-Hao Liu,
Przemysław Pawełczak,
Danijela Cabric
Abstract:
This paper focuses on analytical studies of the primary user (PU) traffic classification problem. Observing that the gamma distribution can represent positively skewed data and exponential distribution (popular in communication networks performance analysis literature) it is considered here as the PU traffic descriptor. We investigate two PU traffic classifiers utilizing perfectly measured PU acti…
▽ More
This paper focuses on analytical studies of the primary user (PU) traffic classification problem. Observing that the gamma distribution can represent positively skewed data and exponential distribution (popular in communication networks performance analysis literature) it is considered here as the PU traffic descriptor. We investigate two PU traffic classifiers utilizing perfectly measured PU activity (busy) and inactivity (idle) periods: (i) maximum likelihood classifier (MLC) and (ii) multi-hypothesis sequential probability ratio test classifier (MSPRTC). Then, relaxing the assumption on perfect period measurement, we consider a PU traffic observation through channel sampling. For a special case of negligible probability of PU state change in between two samplings, we propose a minimum variance PU busy/idle period length estimator. Later, relaxing the assumption of the complete knowledge of the parameters of the PU period length distribution, we propose two PU traffic classification schemes: (i) estimate-then-classify (ETC), and (ii) average likelihood function (ALF) classifiers considering time domain fluctuation of the PU traffic parameters. Numerical results show that both MLC and MSPRTC are sensitive to the periods measurement errors when the distance among distribution hypotheses is small, and to the distribution parameter estimation errors when the distance among hypotheses is large. For PU traffic parameters with a partial prior knowledge of the distribution, the ETC outperforms ALF when the distance among hypotheses is small, while the opposite holds when the distance is large.
△ Less
Submitted 3 September, 2014;
originally announced September 2014.
-
Blind Estimation of Primary User Traffic Parameters Under Sensing Errors
Authors:
Wesam Gabran,
Przemysław Pawełczak,
Chun-Hao Liu,
Danijela Cabric
Abstract:
In this work we investigate the bounds on the estimation accuracy of Primary User (PU) traffic parameters with exponentially distributed busy and idle times. We derive closed-form expressions for the Cramer-Rao bounds on the mean squared estimation error for the blind joint estimation of the PU traffic parameters, specifically, the duty cycle, and the mean arrival and departure rates. Moreover, we…
▽ More
In this work we investigate the bounds on the estimation accuracy of Primary User (PU) traffic parameters with exponentially distributed busy and idle times. We derive closed-form expressions for the Cramer-Rao bounds on the mean squared estimation error for the blind joint estimation of the PU traffic parameters, specifically, the duty cycle, and the mean arrival and departure rates. Moreover, we present the corresponding maximum-likelihood estimators for the traffic parameters. In addition, we derive a modified likelihood function for the joint estimation of traffic parameters when spectrum sensing errors are considered, and we present the impact of spectrum sensing errors on the estimation error via simulations. Finally, we consider a duty cycle estimator, common in traffic estimation literature, that is based on averaging the traffic samples. We derive, in closed-form, the mean squared estimation error of the considered estimator under spectrum sensing errors.
△ Less
Submitted 22 February, 2013;
originally announced February 2013.
-
Optimal Discriminant Functions Based On Sampled Distribution Distance for Modulation Classification
Authors:
Paulo Urriza,
Eric Rebeiz,
Danijela Cabric
Abstract:
In this letter, we derive the optimal discriminant functions for modulation classification based on the sampled distribution distance. The proposed method classifies various candidate constellations using a low complexity approach based on the distribution distance at specific testpoints along the cumulative distribution function. This method, based on the Bayesian decision criteria, asymptoticall…
▽ More
In this letter, we derive the optimal discriminant functions for modulation classification based on the sampled distribution distance. The proposed method classifies various candidate constellations using a low complexity approach based on the distribution distance at specific testpoints along the cumulative distribution function. This method, based on the Bayesian decision criteria, asymptotically provides the minimum classification error possible given a set of testpoints. Testpoint locations are also optimized to improve classification performance. The method provides significant gains over existing approaches that also use the distribution of the signal features.
△ Less
Submitted 19 February, 2013;
originally announced February 2013.
-
Multiple Antenna Cyclostationary Spectrum Sensing Based on the Cyclic Correlation Significance Test
Authors:
Paulo Urriza,
Eric Rebeiz,
Danijela Cabric
Abstract:
In this paper, we propose and analyze a spectrum sensing method based on cyclostationarity specifically targeted for receivers with multiple antennas. This detection method is used for determining the presence or absence of primary users in cognitive radio networks based on the eigenvalues of the cyclic covariance matrix of received signals. In particular, the cyclic correlation significance test…
▽ More
In this paper, we propose and analyze a spectrum sensing method based on cyclostationarity specifically targeted for receivers with multiple antennas. This detection method is used for determining the presence or absence of primary users in cognitive radio networks based on the eigenvalues of the cyclic covariance matrix of received signals. In particular, the cyclic correlation significance test is used to detect a specific signal-of-interest by exploiting knowledge of its cyclic frequencies. Analytical expressions for the probability of detection and probability of false-alarm under both spatially uncorrelated or spatially correlated noise are derived and verified by simulation. The detection performance in a Rayleigh flat-fading environment is found and verified through simulations. One of the advantages of the proposed method is that the detection threshold is shown to be independent of both the number of samples and the noise covariance, effectively eliminating the dependence on accurate noise estimation. The proposed method is also shown to provide higher detection probability and better robustness to noise uncertainty than existing multiple-antenna cyclostationary-based spectrum sensing algorithms under both AWGN as well as a quasi-static Rayleigh fading channel.
△ Less
Submitted 1 November, 2012;
originally announced November 2012.
-
Eigenvalue-based Cyclostationary Spectrum Sensing Using Multiple Antennas
Authors:
Paulo Urriza,
Eric Rebeiz,
Danijela Cabric
Abstract:
In this paper, we propose a signal-selective spectrum sensing method for cognitive radio networks and specifically targeted for receivers with multiple-antenna capability. This method is used for detecting the presence or absence of primary users based on the eigenvalues of the cyclic covariance matrix of received signals. In particular, the cyclic correlation significance test is used to detect a…
▽ More
In this paper, we propose a signal-selective spectrum sensing method for cognitive radio networks and specifically targeted for receivers with multiple-antenna capability. This method is used for detecting the presence or absence of primary users based on the eigenvalues of the cyclic covariance matrix of received signals. In particular, the cyclic correlation significance test is used to detect a specific signal-of-interest by exploiting knowledge of its cyclic frequencies. The analytical threshold for achieving constant false alarm rate using this detection method is presented, verified through simulations, and shown to be independent of both the number of samples used and the noise variance, effectively eliminating the dependence on accurate noise estimation. The proposed method is also shown, through numerical simulations, to outperform existing multiple-antenna cyclostationary-based spectrum sensing algorithms under a quasi-static Rayleigh fading channel, in both spatially correlated and uncorrelated noise environments. The algorithm also has significantly lower computational complexity than these other approaches.
△ Less
Submitted 30 October, 2012;
originally announced October 2012.
-
When Channel Bonding is Beneficial for Opportunistic Spectrum Access Networks
Authors:
Shaunak Joshi,
Przemysław Pawełczak,
Danijela Čabrić,
John Villasenor
Abstract:
Transmission over multiple frequency bands combined into one logical channel speeds up data transfer for wireless networks. On the other hand, the allocation of multiple channels to a single user decreases the probability of finding a free logical channel for new connections, which may result in a network-wide throughput loss. While this relationship has been studied experimentally, especially in…
▽ More
Transmission over multiple frequency bands combined into one logical channel speeds up data transfer for wireless networks. On the other hand, the allocation of multiple channels to a single user decreases the probability of finding a free logical channel for new connections, which may result in a network-wide throughput loss. While this relationship has been studied experimentally, especially in the WLAN configuration, little is known on how to analytically model such phenomena. With the advent of Opportunistic Spectrum Access (OSA) networks, it is even more important to understand the circumstances in which it is beneficial to bond channels occupied by primary users with dynamic duty cycle patterns. In this paper we propose an analytical framework which allows the investigation of the average channel throughput at the medium access control layer for OSA networks with channel bonding enabled. We show that channel bonding is generally beneficial, though the extent of the benefits depend on the features of the OSA network, including OSA network size and the total number of channels available for bonding. In addition, we show that performance benefits can be realized by adaptively changing the number of bonded channels depending on network conditions. Finally, we evaluate channel bonding considering physical layer constraints, i.e. throughput reduction compared to the theoretical throughput of a single virtual channel due to a transmission power limit for any bonding size.
△ Less
Submitted 29 August, 2012;
originally announced August 2012.
-
Cramer-Rao Bounds for Joint RSS/DoA-Based Primary-User Localization in Cognitive Radio Networks
Authors:
Jun Wang,
Jianshu Chen,
Danijela Cabric
Abstract:
Knowledge about the location of licensed primary-users (PU) could enable several key features in cognitive radio (CR) networks including improved spatio-temporal sensing, intelligent location-aware routing, as well as aiding spectrum policy enforcement. In this paper we consider the achievable accuracy of PU localization algorithms that jointly utilize received-signal-strength (RSS) and direction-…
▽ More
Knowledge about the location of licensed primary-users (PU) could enable several key features in cognitive radio (CR) networks including improved spatio-temporal sensing, intelligent location-aware routing, as well as aiding spectrum policy enforcement. In this paper we consider the achievable accuracy of PU localization algorithms that jointly utilize received-signal-strength (RSS) and direction-of-arrival (DoA) measurements by evaluating the Cramer-Rao Bound (CRB). Previous works evaluate the CRB for RSS-only and DoA-only localization algorithms separately and assume DoA estimation error variance is a fixed constant or rather independent of RSS. We derive the CRB for joint RSS/DoA-based PU localization algorithms based on the mathematical model of DoA estimation error variance as a function of RSS, for a given CR placement. The bound is compared with practical localization algorithms and the impact of several key parameters, such as number of nodes, number of antennas and samples, channel shadowing variance and correlation distance, on the achievable accuracy are thoroughly analyzed and discussed. We also derive the closed-form asymptotic CRB for uniform random CR placement, and perform theoretical and numerical studies on the required number of CRs such that the asymptotic CRB tightly approximates the numerical integration of the CRB for a given placement.
△ Less
Submitted 5 July, 2012;
originally announced July 2012.
-
Primary User Traffic Estimation for Dynamic Spectrum Access
Authors:
Wesam Gabran,
Chun-Hao Liu,
Przemysław Pawełczak,
Danijela Cabric
Abstract:
Accurate estimation of licensed channel Primary User's (PU) temporal statistics is important for Dynamic Spectrum Access (DSA) systems. With accurate estimation of the mean duty cycle, u, and the mean off- and on-times of PUs, DSA systems can more efficiently assign PU resources to its subscribers, thus, increasing channel utilization. This paper presents a mathematical analysis of the accuracy of…
▽ More
Accurate estimation of licensed channel Primary User's (PU) temporal statistics is important for Dynamic Spectrum Access (DSA) systems. With accurate estimation of the mean duty cycle, u, and the mean off- and on-times of PUs, DSA systems can more efficiently assign PU resources to its subscribers, thus, increasing channel utilization. This paper presents a mathematical analysis of the accuracy of estimating u, as well as the PU mean off- and on-times, where the estimation accuracy is expressed as the mean squared estimation error. The analysis applies for the traffic model assuming exponentially distributed PU off- and on-times, which is a common model in traffic literature. The estimation accuracy is quantified as a function of the number of samples and observation window length, hence, this work provides guidelines on traffic parameters estimation for both energy-constrained and delay-constrained applications. For estimating u, we consider uniform, non-uniform, and weighted sample stream averaging, as well as maximum likelihood estimation. The estimation accuracy of the mean PU off- and on-times is studied when maximum likelihood estimation is employed. Furthermore, we develop algorithms for the blind estimation of the traffic parameters based on the derived theoretical estimation accuracy expressions. We show that the estimation error for all traffic parameters is lower bounded for a fixed observation window length due to the correlation between the traffic samples. Moreover, we prove that for estimating u, maximum likelihood estimation can yield the same estimation error as weighted sample averaging using only half the observation window length.
△ Less
Submitted 8 November, 2012; v1 submitted 11 March, 2012;
originally announced March 2012.
-
Computationally Efficient Modulation Level Classification Based on Probability Distribution Distance Functions
Authors:
Paulo Urriza,
Eric Rebeiz,
Przemysław Pawełczak,
Danijela Čabrić
Abstract:
We present a novel modulation level classification (MLC) method based on probability distribution distance functions. The proposed method uses modified Kuiper and Kolmogorov-Smirnov distances to achieve low computational complexity and outperforms the state of the art methods based on cumulants and goodness-of-fit tests. We derive the theoretical performance of the proposed MLC method and verify i…
▽ More
We present a novel modulation level classification (MLC) method based on probability distribution distance functions. The proposed method uses modified Kuiper and Kolmogorov-Smirnov distances to achieve low computational complexity and outperforms the state of the art methods based on cumulants and goodness-of-fit tests. We derive the theoretical performance of the proposed MLC method and verify it via simulations. The best classification accuracy, under AWGN with SNR mismatch and phase jitter, is achieved with the proposed MLC method using Kuiper distances.
△ Less
Submitted 18 February, 2011; v1 submitted 23 December, 2010;
originally announced December 2010.
-
Weighted Centroid Algorithm for Estimating Primary User Location: Theoretical Analysis and Distributed Implementation
Authors:
Jun Wang,
Paulo Urriza,
Yuxing Han,
Danijela Čabrić
Abstract:
Information about primary transmitter location is crucial in enabling several key capabilities in cognitive radio networks, including improved spatio-temporal sensing, intelligent location-aware routing, as well as aiding spectrum policy enforcement. Compared to other proposed non-interactive localization algorithms, the weighted centroid localization (WCL) scheme uses only the received signal str…
▽ More
Information about primary transmitter location is crucial in enabling several key capabilities in cognitive radio networks, including improved spatio-temporal sensing, intelligent location-aware routing, as well as aiding spectrum policy enforcement. Compared to other proposed non-interactive localization algorithms, the weighted centroid localization (WCL) scheme uses only the received signal strength information, which makes it simple to implement and robust to variations in the propagation environment. In this paper we present the first theoretical framework for WCL performance analysis in terms of its localization error distribution parameterized by node density, node placement, shadowing variance, correlation distance and inaccuracy of sensor node positioning. Using this analysis, we quantify the robustness of WCL to various physical conditions and provide design guidelines, such as node placement and spacing, for the practical deployment of WCL. We also propose a power-efficient method for implementing WCL through a distributed cluster-based algorithm, that achieves comparable accuracy with its centralized counterpart.
△ Less
Submitted 9 May, 2011; v1 submitted 10 November, 2010;
originally announced November 2010.
-
Throughput and Collision Analysis of Multi-Channel Multi-Stage Spectrum Sensing Algorithms
Authors:
Wesam Gabran,
Przemysław Pawełczak,
Danijela Čabrić
Abstract:
Multi-stage sensing is a novel concept that refers to a general class of spectrum sensing algorithms that divide the sensing process into a number of sequential stages. The number of sensing stages and the sensing technique per stage can be used to optimize performance with respect to secondary user throughput and the collision probability between primary and secondary users. So far, the impact of…
▽ More
Multi-stage sensing is a novel concept that refers to a general class of spectrum sensing algorithms that divide the sensing process into a number of sequential stages. The number of sensing stages and the sensing technique per stage can be used to optimize performance with respect to secondary user throughput and the collision probability between primary and secondary users. So far, the impact of multi-stage sensing on network throughput and collision probability for a realistic network model is relatively unexplored. Therefore, we present the first analytical framework which enables performance evaluation of different multi-channel multi-stage spectrum sensing algorithms for Opportunistic Spectrum Access networks. The contribution of our work lies in studying the effect of the following parameters on performance: number of sensing stages, physical layer sensing techniques and durations per each stage, single and parallel channel sensing and access, number of available channels, primary and secondary user traffic, buffering of incoming secondary user traffic, as well as MAC layer sensing algorithms. Analyzed performance metrics include the average secondary user throughput and the average collision probability between primary and secondary users. Our results show that when the probability of primary user mis-detection is constrained, the performance of multi-stage sensing is, in most cases, superior to the single stage sensing counterpart. Besides, prolonged channel observation at the first stage of sensing decreases the collision probability considerably, while keeping the throughput at an acceptable level. Finally, in realistic primary user traffic scenarios, using two stages of sensing provides a good balance between secondary users throughput and collision probability while meeting successful detection constraints subjected by Opportunistic Spectrum Access communication.
△ Less
Submitted 29 August, 2012; v1 submitted 30 September, 2010;
originally announced October 2010.
-
Analysis Framework for Opportunistic Spectrum OFDMA and its Application to the IEEE 802.22 Standard
Authors:
Jihoon Park,
Przemysław Pawełczak,
Pål Grønsund,
Danijela Čabrić
Abstract:
We present an analytical model that enables throughput evaluation of Opportunistic Spectrum Orthogonal Frequency Division Multiple Access (OS-OFDMA) networks. The core feature of the model, based on a discrete time Markov chain, is the consideration of different channel and subchannel allocation strategies under different Primary and Secondary user types, traffic and priority levels. The analytica…
▽ More
We present an analytical model that enables throughput evaluation of Opportunistic Spectrum Orthogonal Frequency Division Multiple Access (OS-OFDMA) networks. The core feature of the model, based on a discrete time Markov chain, is the consideration of different channel and subchannel allocation strategies under different Primary and Secondary user types, traffic and priority levels. The analytical model also assesses the impact of different spectrum sensing strategies on the throughput of OS-OFDMA network. The analysis applies to the IEEE 802.22 standard, to evaluate the impact of two-stage spectrum sensing strategy and varying temporal activity of wireless microphones on the IEEE 802.22 throughput. Our study suggests that OS-OFDMA with subchannel notching and channel bonding could provide almost ten times higher throughput compared with the design without those options, when the activity and density of wireless microphones is very high. Furthermore, we confirm that OS-OFDMA implementation without subchannel notching, used in the IEEE 802.22, is able to support real-time and non-real-time quality of service classes, provided that wireless microphones temporal activity is moderate (with approximately one wireless microphone per 3,000 inhabitants with light urban population density and short duty cycles). Finally, two-stage spectrum sensing option improves OS-OFDMA throughput, provided that the length of spectrum sensing at every stage is optimized using our model.
△ Less
Submitted 29 August, 2012; v1 submitted 28 July, 2010;
originally announced July 2010.
-
Impact of Connection Admission Process on the Direct Retry Load Balancing Algorithm in Cellular Network
Authors:
Przemysław Pawełczak,
Shaunak Joshi,
Sateesh Addepalli,
John Villasenor,
Danijela Čabrić
Abstract:
We present an analytical framework for modeling a priority-based load balancing scheme in cellular networks based on a new algorithm called direct retry with truncated offloading channel resource pool (DR$_{K}$). The model, developed for a baseline case of two cell network, differs in many respects from previous works on load balancing. Foremost, it incorporates the call admission process, through…
▽ More
We present an analytical framework for modeling a priority-based load balancing scheme in cellular networks based on a new algorithm called direct retry with truncated offloading channel resource pool (DR$_{K}$). The model, developed for a baseline case of two cell network, differs in many respects from previous works on load balancing. Foremost, it incorporates the call admission process, through random access. In specific, the proposed model implements the Physical Random Access Channel used in 3GPP network standards. Furthermore, the proposed model allows the differentiation of users based on their priorities. The quantitative results illustrate that, for example, cellular network operators can control the manner in which traffic is offloaded between neighboring cells by simply adjusting the length of the random access phase. Our analysis also allows for the quantitative determination of the blocking probability individual users will experience given a specific length of random access phase. Furthermore, we observe that the improvement in blocking probability per shared channel for load balanced users using DR$_{K}$ is maximized at an intermediate number of shared channels, as opposed to the maximum number of these shared resources. This occurs because a balance is achieved between the number of users requesting connections and those that are already admitted to the network. We also present an extension of our analytical model to a multi-cell network (by means of an approximation) and an application of the proposed load balancing scheme in the context of opportunistic spectrum access.
△ Less
Submitted 31 August, 2012; v1 submitted 4 April, 2010;
originally announced April 2010.
-
Performance of Joint Spectrum Sensing and MAC Algorithms for Multichannel Opportunistic Spectrum Access Ad Hoc Networks
Authors:
Jihoon Park,
Przemysław Pawełczak,
Danijela Čabrić
Abstract:
We present an analytical framework to assess the link layer throughput of multichannel Opportunistic Spectrum Access (OSA) ad hoc networks. Specifically, we focus on analyzing various combinations of collaborative spectrum sensing and Medium Access Control (MAC) protocol abstractions. We decompose collaborative spectrum sensing into layers, parametrize each layer, classify existing solutions, and…
▽ More
We present an analytical framework to assess the link layer throughput of multichannel Opportunistic Spectrum Access (OSA) ad hoc networks. Specifically, we focus on analyzing various combinations of collaborative spectrum sensing and Medium Access Control (MAC) protocol abstractions. We decompose collaborative spectrum sensing into layers, parametrize each layer, classify existing solutions, and propose a new protocol called Truncated Time Division Multiple Access (TTDMA) that supports efficient distribution of sensing results in "k out of N" fusion rule. In case of multichannel MAC protocols we evaluate two main approaches of control channel design with (i) dedicated and (ii) hopping channel. We propose to augment these protocols with options of handling secondary user (SU) connections preempted by primary user (PU) by (i) connection buffering until PU departure and (ii) connection switching to a vacant PU channel. By comparing and optimizing different design combinations we show that (i) it is generally better to buffer preempted SU connections than to switch them to PU vacant channels and (ii) TTDMA is a promising design option for collaborative spectrum sensing process when k does not change over time.
△ Less
Submitted 29 November, 2012; v1 submitted 24 October, 2009;
originally announced October 2009.