The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Content dissemination, in particular small-volume popular content dissemination, represents a killer application of vehicular networks, which is also fundamental to the delivery of advanced infotainment applications, such as vehicular social networks, road traffic alerts, etc. The content dissemination in vehicular networks relies on moving vehicles to relay and propagate contents. Due to challenges...
Abstract-We explore the physical-layer security for a multisource multi-relay wireless network in the presence of an eavesdropper, in which one of multiple sources is scheduled to send its message to a destination with the assistance of multiple decode-and-forward (DF) relays. One eavesdropper is considered at the receiver side, and assumed to be capable of overhearing the transmission from relays...
Device-to-device (D2D) communication is one of the most promising solutions to the dramatic increase of wireless networks traffic load. In D2D communications, mobile nodes can communicate in a semi-autonomous way, with minimal or no control by the base station (BS). In this context, we address the problem of the coexistence of cellular and D2D tiers in the uplink frequencies, where a D2D source is...
Cooperation among network devices is a promising solution to improve network throughput and network service quality. In addition, it can be used to enhance network survivability against failures. In this paper, we study the user cooperation solution of multipath streaming application on wireless user equipments (UEs) using auction theory. We assume that UEs use multipath transport layer service, and...
In this paper, the security of multi-input single- output (MISO) amplify-and-forward relaying network with untrustworthy relay nodes is considered, where the untrustworthy nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such kind of smarter Eves, relay selection is adopted and both...
Motivated by the observation that energy harvesting (EH) from radio-frequency (RF) signal is subject to fluctuations, multiple EH-enabled relays are employed to collaboratively enhance data communications in a device-to-device (D2D) network underlying a cellular system. Each relay is equipped with a single antenna and unable to harvest energy and transmit data simultaneously. Thus, the D2D user equipment...
Wireless sensor networks are valuable assets to both the commercial and military communities with applications ranging from industrial control on a factory floor to reconnaissance of a hostile border. In most applications, the sensors act as data sources and forward information generated by event triggers to a central sink or base station (BS). The unique role of the BS makes it a natural target for...
In this paper, relay selection is considered to enhance security of a cooperative system with multiple threshold-selection decode-and-forward (DF) relays. Threshold-selection DF relays are the relays in which a predefined signal-to-noise ratio is set for the condition of successful decoding of the source message. We focus on the practical and general scenario where the channels suffer from independent...
The trustworthiness of nodes in a network is practically a complicated concept and strongly depends on the social relationship among the nodes. For a certain model of trustworthiness, the scheme can be optimized to achieve the highest average secrecy rate based on pre-defined information about possibly malicious nodes. In such a scheme, the secrecy rate is considered as a function of the maximum achievable...
This paper conducts outage analysis for cooperative hybrid automatic repeat request with incremental redundancy (C-HARQ-IR). A general time-correlated Nakagami fading channel including fast fading and Rayleigh fading as special cases is considered. An efficient truncated inverse moment matching method is developed to derive the outage probability in closed- form. The accuracy of the analytical results...
In this paper, we present a stochastic geometry based framework to analyze the coverage probability and ergodic rate with different channel allocations for device-to-device (D2D) communications. Different from existing works, we assume there are two different kinds of users, cellular users and D2D users, in the muti-channel uplink cellular network. Specifically, cellular users can upload data to the...
Maximizing the lifetime is an important issue in the design of applications and protocols for wireless sensor networks (WSNs). Clustering sensor nodes is an effective topology control approach helping achieve this goal. In this paper, we present an energy efficiency protocol to prolong the network lifetime based on an improved particle swarm optimization (PSO) algorithm. The protocol takes both energy...
In this paper, we study the optimal degrees of freedom (DoF) region for the two-pair MIMO two-way relay channel (TWRC) with asymmetric antenna setting, where two pairs of users exchange information with the help of a common relay. First, we derive an outer bound of the DoF region by using the cut-set theorem and the genie-message approach. Then, we propose a new transmission scheme to achieve the...
This paper focuses on linear precoding designs in multi-user multiple-input multiple-output block diagonalization (BD) relay systems with limited feedback. A base station employs spatial multiplexing transmission based on quantized channel state information (CSI) obtained from a relay. Then the relay transmits the received signal to users equipped with multiple antennas. In this paper, we propose...
We address the resource allocation problem for energy- harvesting (EH) based OFDMA cooperative overlay cognitive radio networks with multiple primary users (PUs) and multiple secondary users (SUs), where PUs and SUs cooperate in terms of both information transmission and energy harvesting. Specifically, SU transmitters first apply the power splitting tech- nique to harvest energy from signals radiated...
Energy harvesting (EH) is an attractive solution to prolong the lifetime of wireless devices. With EH capability, an intermediate node, acting as the relay, can extract energy from the signal of a source node and use the harvested energy to perform information relaying, enabling a self-sustainable cooperative network. To efficiently use the harvested energy, it is important to select proper relays...
Radio frequency (RF) recharging can extend maintenance-free operation of wireless sensor networks. However, the period between recharging is limited by the distance between the most distant sensor node and the master which sends out recharging pulses. To increase this period, we propose a scheme in which nodes are logically grouped into circular zones centered at the master, so that nodes in a given...
We investigate the outage and decoding-delay performances for full-duplex (FD) decode-forward (DF) relaying with backward and sliding window decoding. In our analysis, we consider a block fading channel with full channel state information (CSI) availability at receivers and with limited CSI at transmitters. For backward decoding where the destination starts decoding from the last transmission block,...
In this paper, we propose a new joint relay and jammer selection (JRJS) scheme to enhance the physical layer security for cooperative wireless networks with multiple intermediate nodes, where the decode-and-forward (DF) protocol is considered. In the proposed JRJS scheme, an ntermediate node is selected as the relay for data transmission, while the others are used to act as friendly jammers for disrupting...
In this paper, an energy-incentive cooperative transmission (EICT) scheme is proposed for wireless ad hoc networks, where a node uses energy as reward to seek for cooperative transmission from neighboring nodes and then the cooperative node adopts a decode-and-forward (DF) protocol to relay data. An optimal time slot and power allocation algorithm is proposed to maximize the sum-rate under the constraints...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.