-
An Unsupervised Learning Approach for Spectrum Allocation in Terahertz Communication Systems
Authors:
Akram Shafie,
Chunhui Li,
Nan Yang,
Xiangyun Zhou,
Trung Q. Duong
Abstract:
We propose a new spectrum allocation strategy, aided by unsupervised learning, for multiuser terahertz communication systems. In this strategy, adaptive sub-band bandwidth is considered such that the spectrum of interest can be divided into sub-bands with unequal bandwidths. This strategy reduces the variation in molecular absorption loss among the users, leading to the improved data rate performa…
▽ More
We propose a new spectrum allocation strategy, aided by unsupervised learning, for multiuser terahertz communication systems. In this strategy, adaptive sub-band bandwidth is considered such that the spectrum of interest can be divided into sub-bands with unequal bandwidths. This strategy reduces the variation in molecular absorption loss among the users, leading to the improved data rate performance. We first formulate an optimization problem to determine the optimal sub-band bandwidth and transmit power, and then propose the unsupervised learning-based approach to obtaining the near-optimal solution to this problem. In the proposed approach, we first train a deep neural network (DNN) while utilizing a loss function that is inspired by the Lagrangian of the formulated problem. Then using the trained DNN, we approximate the near-optimal solutions. Numerical results demonstrate that comparing to existing approaches, our proposed unsupervised learning-based approach achieves a higher data rate, especially when the molecular absorption coefficient within the spectrum of interest varies in a highly non-linear manner.
△ Less
Submitted 6 August, 2022;
originally announced August 2022.
-
Novel Secret-Key-Assisted Schemes for Secure MISOME-OFDM Systems
Authors:
Mohamed Marzban,
Ahmed El Shafie,
Naofal Al-Dhahir
Abstract:
We propose a new secure transmission scheme for uplink multiple-input single-output (MISO) orthogonal-frequency multiplexing (OFDM) systems in the presence of multiple eavesdroppers. Our proposed scheme utilizes the sub-channels orthogonality of OFDM systems to simultaneously transmit data and secret key symbols. The base station, Bob, shares secret key symbols with the legitimate user, Alice, usi…
▽ More
We propose a new secure transmission scheme for uplink multiple-input single-output (MISO) orthogonal-frequency multiplexing (OFDM) systems in the presence of multiple eavesdroppers. Our proposed scheme utilizes the sub-channels orthogonality of OFDM systems to simultaneously transmit data and secret key symbols. The base station, Bob, shares secret key symbols with the legitimate user, Alice, using wiretap coding over a portion of the sub-channels. Concurrently, Alice uses the accumulated secret keys in her secret-key queue to encrypt data symbols using a one time pad (OTP) cipher and transmits them to Bob over the remaining sub-channels. if Alice did not accumulate sufficient keys in her secret-key queue, she employs wiretap coding to secure her data transmissions. We propose fixed and dynamic sub-channel allocation schemes to divide the sub-channels between data and secret keys. We derive the secrecy outage probability (SOP) and the secure throughput for the proposed scheme. We quantify the system's security under practical non-Gaussian transmissions where discrete signal constellation points are transmitted by the legitimate source nodes. Numerical results validate our theoretical findings and quantify the impact of different system design parameters.
△ Less
Submitted 16 October, 2021;
originally announced October 2021.
-
Securing Full-Duplex Amplify-and-Forward Relay-Aided Transmissions Through Processing-Time Optimization
Authors:
Mohamed Marzban,
Ahmed El Shafie,
Ahmed Sultan,
Naofal Al-Dhahir
Abstract:
We investigate physical-layer security of the full-duplex (FD) amplify-and-forward (AF) relay channel. We provide a new perspective on the problem and show that the processing time (delay) at the relay can be exploited to improve the system's security. We show that the FD AF relay channel can be seen as an intersymbol-interference (ISI) channel, hence, the discrete-Fourier transform (DFT) can be u…
▽ More
We investigate physical-layer security of the full-duplex (FD) amplify-and-forward (AF) relay channel. We provide a new perspective on the problem and show that the processing time (delay) at the relay can be exploited to improve the system's security. We show that the FD AF relay channel can be seen as an intersymbol-interference (ISI) channel, hence, the discrete-Fourier transform (DFT) can be used for data modulation and demodulation to convert the frequency-selective channel into flat-fading channel per sub-channel/sub-carrier. By exploiting the fact that the channel memory needs to be cleared by inserting the cyclic-prefix, Alice injects an artificial-noise (AN) signal that hurts the eavesdrop** nodes only. The strength of this AN signal and its interference rank are controlled by the relay's processing time.
△ Less
Submitted 25 January, 2021;
originally announced January 2021.
-
Securing OFDM-Based NOMA SWIPT Systems
Authors:
Ahmed Badawy,
Ahmed El Shafie
Abstract:
In this paper, we present a physical-layer security scheme that exploits artificial noise (AN) to secure the downlink legitimate communications and transfer energy to nodes operating under non-cooperative non-orthogonal multiple-access (NOMA) scenario. The nodes employ a joint time-switching and power-switching scheme to maximize the harvested energy. We provide necessary analysis and derivations…
▽ More
In this paper, we present a physical-layer security scheme that exploits artificial noise (AN) to secure the downlink legitimate communications and transfer energy to nodes operating under non-cooperative non-orthogonal multiple-access (NOMA) scenario. The nodes employ a joint time-switching and power-switching scheme to maximize the harvested energy. We provide necessary analysis and derivations for the optimization parameters and find the optimized transmission parameters that maximize the minimum secrecy rate among users while meeting constraints on minimum transferred energy and outage probabilities at the nodes through an exhaustive grid-based search. Our analysis and simulations prove the feasibility of securing the communication among NOMA nodes, while transferring energy and meeting outage probability constraints.
△ Less
Submitted 16 August, 2020;
originally announced August 2020.
-
Multi-Connectivity for Indoor Terahertz Communication with Self and Dynamic Blockage
Authors:
Akram Shafie,
Nan Yang,
Chong Han
Abstract:
We derive new expressions for the connection probability and the average ergodic capacity to evaluate the performance achieved by multi-connectivity (MC) in an indoor ultra-wideband terahertz (THz) communication system. In this system, the user is affected by both self-blockage and dynamic human blockers. We first build up a three-dimensional propagation channel in this system to characterize the…
▽ More
We derive new expressions for the connection probability and the average ergodic capacity to evaluate the performance achieved by multi-connectivity (MC) in an indoor ultra-wideband terahertz (THz) communication system. In this system, the user is affected by both self-blockage and dynamic human blockers. We first build up a three-dimensional propagation channel in this system to characterize the impact of molecular absorption loss and the shrinking usable bandwidth nature of the ultra-wideband THz channel. We then carry out new performance analysis for two MC strategies: 1) Closest line-of-sight (LOS) access point (AP) MC (C-MC), and 2) Reactive MC (R- MC). With numerical results, we validate our analysis and show the considerable improvement achieved by both MC strategies in the connection probability. We further show that the C-MC and R-MC strategies provide significant and marginal capacity gain relative to the single connectivity strategy, respectively, and increasing the number of the users associated APs imposes completely different affects on the capacity gain achieved by the C-MC and R-MC strategies. Additionally, we clarify that our analysis allows us to determine the optimal density of APs in order to maximize the capacity gain.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
Coverage Analysis for 3D Terahertz Communication Systems with Blockage and Directional Antennas
Authors:
Akram Shafie,
Nan Yang,
Zhuo Sun,
Salman Durrani
Abstract:
The scarcity of spectrum resources in current wireless communication systems has sparked enormous research interest in the terahertz (THz) frequency band. This band is characterized by fundamentally different propagation properties resulting in different interference structures from what we have observed so far at lower frequencies. In this paper, we derive a new expression for the coverage probab…
▽ More
The scarcity of spectrum resources in current wireless communication systems has sparked enormous research interest in the terahertz (THz) frequency band. This band is characterized by fundamentally different propagation properties resulting in different interference structures from what we have observed so far at lower frequencies. In this paper, we derive a new expression for the coverage probability of downlink transmission in THz communication systems within a three-dimensional (3D) environment. First, we establish a 3D propagation model which considers the molecular absorption loss, 3D directional antennas at both access points (APs) and user equipments (UEs), interference from nearby APs, and dynamic blockages caused by moving humans. Then, we develop a novel easy-to-use analytical framework based on the dominant interferer analysis to evaluate the coverage probability, the novelty of which lies in the incorporation of the instantaneous interference and the vertical height of THz devices. Our numerical results demonstrate the accuracy of our analysis and reveal that the coverage probability significantly decreases when the transmission distance increases. We also show the increasing blocker density and increasing AP density impose different impacts on the coverage performance when the UE-AP link of interest is in line-of-sight. We further show that the coverage performance improvement brought by increasing the antenna directivity at APs is higher than that brought by increasing the antenna directivity at UEs.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
On the Performance of Quickest Detection Spectrum Sensing: The Case of Cumulative Sum
Authors:
Ahmed Badawy,
Ahmed El Shafie,
Tamer Khattab
Abstract:
Quickest change detection (QCD) is a fundamental problem in many applications. Given a sequence of measurements that exhibits two different distributions around a certain flip** point, the goal is to detect the change in distribution around the flip** point as quickly as possible. The QCD problem appears in many practical applications, e.g., quality control, power system line outage detection,…
▽ More
Quickest change detection (QCD) is a fundamental problem in many applications. Given a sequence of measurements that exhibits two different distributions around a certain flip** point, the goal is to detect the change in distribution around the flip** point as quickly as possible. The QCD problem appears in many practical applications, e.g., quality control, power system line outage detection, spectrum reuse, and resource allocation and scheduling. In this paper, we focus on spectrum sensing as our application since it is a critical process for proper functionality of cognitive radio networks. Relying on the cumulative sum (CUSUM), we derive the probability of detection and the probability of false alarm of CUSUM based spectrum sensing. We show the correctness of our derivations using numerical simulations.
△ Less
Submitted 21 January, 2020;
originally announced January 2020.
-
Security-Enhanced SC-FDMA Transmissions Using Temporal Artificial-Noise and Secret-Key Aided Schemes
Authors:
Mohamed F. Marzban,
Ahmed El Shafie,
Naofal Al-Dhahir,
Ridha Hamila
Abstract:
We investigate the physical layer security of uplink single-carrier frequency-division multiple-access (SC-FDMA) systems. Multiple users, Alices, send confidential messages to a common legitimate base-station, Bob, in the presence of an eavesdropper, Eve. To secure the legitimate transmissions, each user superimposes an artificial noise (AN) signal on the time-domain SC-FDMA data block. We reduce…
▽ More
We investigate the physical layer security of uplink single-carrier frequency-division multiple-access (SC-FDMA) systems. Multiple users, Alices, send confidential messages to a common legitimate base-station, Bob, in the presence of an eavesdropper, Eve. To secure the legitimate transmissions, each user superimposes an artificial noise (AN) signal on the time-domain SC-FDMA data block. We reduce the computational and storage requirements at Bob's receiver by assuming simple per-subchannel detectors. We assume that Eve has global channel knowledge of all links in addition to high computational capabilities, where she adopts high-complexity detectors such as single-user maximum likelihood (ML), multiuser minimum-mean-square-error (MMSE), and multiuser ML. We analyze the correlation properties of the time-domain AN signal and illustrate how Eve can exploit them to reduce the AN effects. We prove that the number of useful AN streams that can degrade Eve's signal-to-noise ratio (SNR) is dependent on the channel memories of Alices-Bob and Alices-Eve links. Furthermore, we enhance the system security for the case of partial Alices-Bob channel knowledge at Eve, where Eve only knows the precoding matrices of the data and AN signals instead of knowing the entire Alices-Bob channel matrices, and propose a hybrid scheme that integrates temporal AN with channel-based secret-key extraction.
△ Less
Submitted 12 May, 2018;
originally announced May 2018.
-
Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers
Authors:
Ahmed El Shafie,
Asma Mabrouk,
Kamel Tourki,
Naofal Al-Dhahir,
Mazen O. Hasna
Abstract:
This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdrop** setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdrop** cluster…
▽ More
This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdrop** setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdrop** clusters, we consider artificial-noise-aided beamforming at the source node. Moreover, FD relay jamming is adopted to improve the system's security. To maintain secure communications against the untrusted relay node, a FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. Numerical results show that the optimal power allocation factor between data and artificial noise depends on the total number of antennas of the different colluding eavesdrop** clusters.
△ Less
Submitted 6 March, 2018;
originally announced March 2018.
-
Securing OFDM-Based Wireless Links Using Temporal Artificial-Noise Injection
Authors:
Mohamed F. Marzban,
Ahmed El Shafie,
Rakan Chabaan,
Naofal Al-Dhahir
Abstract:
We investigate the physical layer security of wireless single-input single-output orthogonal-division multiplexing (OFDM) when a transmitter, which we refer to as Alice, sends her information to a receiver, which we refer to as Bob, in the presence of an eavesdrop** node, Eve. To prevent information leakage, Alice sends an artificial-noise (AN) signal superimposed over her information signal. We…
▽ More
We investigate the physical layer security of wireless single-input single-output orthogonal-division multiplexing (OFDM) when a transmitter, which we refer to as Alice, sends her information to a receiver, which we refer to as Bob, in the presence of an eavesdrop** node, Eve. To prevent information leakage, Alice sends an artificial-noise (AN) signal superimposed over her information signal. We investigate the impact of the channel delay spread, OFDM cyclic prefix, information/AN power allocation, and information and AN precoders design on the achievable average secrecy rate. We consider the two cases of known and unknown channel state information (CSI) at Alice. Furthermore, we compare both cases of per-sub-channel processing and joint sub-channels processing at Eve's receiver. Our numerical results show the gain of AN injection in terms of average secrecy rate for different OFDM operating conditions. Moreover, based on our new insights, we demonstrate that the AN-aided scheme is effective and achieves almost the same average secrecy rate as the full-CSI case without the need for Eve's instantaneous CSI at Alice.
△ Less
Submitted 28 February, 2018;
originally announced March 2018.
-
A Hybrid Artificial-Noise and Secret-Key Scheme for Securing OFDM Transmissions in V2G Networks
Authors:
Ahmed El Shafie,
Mohamed F. Marzban,
Rakan Chabaan,
Naofal Al-Dhahir
Abstract:
We propose a new scheme to enhance the physical-layer security of wireless single-input single-output orthogonal-frequency division-multiplexing (OFDM) transmissions from an electric vehicle, Alice, to the aggregator, Bob, in the presence of an eavesdropper, Eve. To prevent information leakage to Eve, Alice exploits the wireless channel randomness to extract secret key symbols that are used to enc…
▽ More
We propose a new scheme to enhance the physical-layer security of wireless single-input single-output orthogonal-frequency division-multiplexing (OFDM) transmissions from an electric vehicle, Alice, to the aggregator, Bob, in the presence of an eavesdropper, Eve. To prevent information leakage to Eve, Alice exploits the wireless channel randomness to extract secret key symbols that are used to encrypt some data symbols which are then multiplexed in the frequency domain with the remaining unencrypted data symbols. To secure the unencrypted data symbols, Alice transmits an artificial-noise (AN) signal superimposed over her data signal. We propose a three-level optimization procedure to increase the average secrecy rate of this wiretap channel by optimizing the transmit power allocation between the encrypted data symbols, unencrypted data symbols and the AN symbols. Our numerical results show that the proposed scheme achieves considerable secrecy rate gains compared to the benchmark cases
△ Less
Submitted 28 February, 2018;
originally announced March 2018.
-
Secure Beamforming in Full-Duplex SWIPT Systems With Loopback Self-Interference Cancellation
Authors:
Yanjie Dong,
Ahmed El Shafie,
Md. Jahangir Hossain,
Julian Cheng,
Naofal Al-Dhahir,
Victor C. M. Leung
Abstract:
Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting p…
▽ More
Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a secrecy rate maximization problem under energy transfer rate constraints. Although the secrecy rate maximization problem is non-convex, we solve it via semidefinite relaxation and a two-dimensional search. We prove the optimality of our proposed algorithm and demonstrate its performance via simulations.
△ Less
Submitted 8 January, 2018;
originally announced January 2018.
-
On the Monetary Loss Due to Passive and Active Attacks on MIMO Smart Grid Communications
Authors:
Ahmed El Shafie,
Hamadi Chihaoui,
Ridha Hamila,
Naofal Al-Dhahir,
Adel Gastli,
Lazhar Ben-Brahim
Abstract:
We consider multiple source nodes (consumers) communicating wirelessly their energy demands to the meter data-management system (MDMS) over the subarea gateway(s). We quantify the impacts of passive and active security attacks on the wireless communications system's reliability and security as well as the energy-demand estimation-error cost in dollars paid by the utility. We adopt a multiple-input…
▽ More
We consider multiple source nodes (consumers) communicating wirelessly their energy demands to the meter data-management system (MDMS) over the subarea gateway(s). We quantify the impacts of passive and active security attacks on the wireless communications system's reliability and security as well as the energy-demand estimation-error cost in dollars paid by the utility. We adopt a multiple-input multiple-output multi-antenna-eavesdropper (MIMOME) wiretap channel model. To secure the MIMO wireless communication system, the legitimate nodes generate artificial noise (AN) vectors to mitigate the effect of the passive eavesdrop** attacks. In addition, we propose a redundant design where multiple gateways are assumed to coexist in each subarea to forward the consumers' energy-demand messages. We quantify the redundant designs impact on the communication reliability between the consumers and the MDMS and on the energy-demand estimation-error cost.
△ Less
Submitted 19 November, 2017; v1 submitted 6 November, 2017;
originally announced November 2017.
-
An Artificial-Noise-Aided Secure Scheme for Hybrid Parallel PLC/Wireless OFDM Systems
Authors:
Ahmed El Shafie,
Mohamed F. Marzban,
Rakan Chabaan,
Naofal Al-Dhahir
Abstract:
We investigate the physical-layer security of indoor hybrid parallel power-line/wireless orthogonal-frequency division-multiplexing (OFDM) communication systems. We propose an artificial-noise (AN) aided scheme to enhance the system's security in the presence of an eavesdropper by exploiting the decoupled nature of the power-line and wireless communication media. The proposed scheme does not requi…
▽ More
We investigate the physical-layer security of indoor hybrid parallel power-line/wireless orthogonal-frequency division-multiplexing (OFDM) communication systems. We propose an artificial-noise (AN) aided scheme to enhance the system's security in the presence of an eavesdropper by exploiting the decoupled nature of the power-line and wireless communication media. The proposed scheme does not require the instantaneous channel state information of the eavesdropper's links to be known at the legitimate nodes. In our proposed scheme, the legitimate transmitter (Alice) and the legitimate receiver (Bob) cooperate to secure the hybrid system where an AN signal is shared from Bob to Alice on the link with the lower channel-to-noise ratio (CNR) while the information stream in addition to a noisy-amplified version of the received AN signal is transmitted from Alice to Bob on the link with higher CNR at each OFDM sub-channel. In addition, we investigate the effect of the transmit power levels at both Alice and Bob and the power allocation ratio between the data and AN signals at Alice on the secure throughput. We investigate both single-link eavesdrop** attacks, where only one link is exposed to eavesdrop** attacks, and two-link eavesdrop** attacks, where the two links are exposed to eavesdrop** attacks.
△ Less
Submitted 30 October, 2017;
originally announced October 2017.
-
Secure Beamforming in Full-Duplex SWIPT Systems
Authors:
Yanjie Dong,
Ahmed El Shafie,
Md. Jahangir Hossain,
Julian Cheng,
Naofal Al-Dhahir,
Victor C. M. Leung
Abstract:
Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT…
▽ More
Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a sum information transmission rate (SITR) maximization problem under information-leakage and energy constraints. In addition, we consider the fairness issue between the uplink and downlink information transmission rates by formulating a \mbox{fairness-aware} SITR-maximization problem. Although the formulated \mbox{SITR-maximization} and \mbox{fairness-aware} \mbox{SITR-maximization} problems are non-convex, we solve them via semidefinite relaxation and one-dimensional search. The optimality of our proposed algorithms is theoretically proved, and the computation complexities are established. Moreover, we propose two suboptimal solutions to the formulated optimization problems. In terms of the SITR-maximization problem, numerical results show that the performance achieved by one of the two suboptimal algorithms is close to the performance of the optimal algorithm with increasing maximum transmission power of the FD-BST.
△ Less
Submitted 19 September, 2017;
originally announced September 2017.
-
Thresholds Optimization for One-Bit Feedback Multi-User Scheduling
Authors:
Mohammed Hafez,
Ahmed El Shafie,
Mohammed Shaqfeh,
Tamer Khattab,
Hussein Alnuweiri,
Huseyin Arslan
Abstract:
We propose a new one-bit feedback scheme with scheduling decision based on the maximum expected weighted rate. We show the concavity of the $2$-user case and provide the optimal solution which achieves the maximum weighted rate of the users. For the general asymmetric M-user case, we provide a heuristic method to achieve the maximum expected weighted rate. We show that the sum rate of our proposed…
▽ More
We propose a new one-bit feedback scheme with scheduling decision based on the maximum expected weighted rate. We show the concavity of the $2$-user case and provide the optimal solution which achieves the maximum weighted rate of the users. For the general asymmetric M-user case, we provide a heuristic method to achieve the maximum expected weighted rate. We show that the sum rate of our proposed scheme is very close to the sum rate of the full channel state information case, which is the upper bound performance.
△ Less
Submitted 30 August, 2017;
originally announced August 2017.
-
Hybrid Spatio-Temporal Artificial Noise Design for Secure MIMOME-OFDM Systems
Authors:
Ahmed El Shafie,
Zhiguo Ding,
Naofal Al-Dhahir
Abstract:
This paper investigates artificial noise injection into the temporal and spatial dimensions of a legitimate wireless communication system to secure its transmissions from potential eavesdrop**. We consider a multiple-input single-output (MISO) orthogonal frequency division multiplexing (OFDM) system in the presence of a single-antenna passive eavesdropper and derive both the secrecy rate and ave…
▽ More
This paper investigates artificial noise injection into the temporal and spatial dimensions of a legitimate wireless communication system to secure its transmissions from potential eavesdrop**. We consider a multiple-input single-output (MISO) orthogonal frequency division multiplexing (OFDM) system in the presence of a single-antenna passive eavesdropper and derive both the secrecy rate and average secrecy rate of the legitimate system. It is assumed that the legitimate transmitter knows the full channel information of the legitimate transceivers but does not know the instantaneous channel state information of the passive eavesdropper. Closed-form expressions for the secrecy rate and average secrecy rate are derived for the asymptotic case with a large number of transmit antennas. We also investigate 1) the power allocation between the data and the AN; 2) the power allocation between the spatial and the temporal AN. Computer simulations are carried out to evaluate the performance of our proposed artificial noise scheme.
△ Less
Submitted 19 June, 2017;
originally announced June 2017.
-
Probabilistic Jamming/Eavesdrop** Attacks to Confuse a Buffer-Aided Transmitter-Receiver Pair
Authors:
Ahmed El Shafie,
Kamel Tourki,
Zhiguo Ding,
Naofal Al-Dhahir
Abstract:
We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper. We show that even without the need for an external energy source, the attacker can still degrade the security of the legitimate system. We show that the…
▽ More
We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper. We show that even without the need for an external energy source, the attacker can still degrade the security of the legitimate system. We show that the random data arrival behavior at the transmitter and the channel randomness of the legitimate link can improve the system's security. Moreover, we design a jamming scheme for the attacker and investigate its impact on the secure throughput of the legitimate system. The attacker designs his power splitting parameter and jamming/eavesdrop** probability based on the energy state of the attacker's battery to minimize the secure throughput of the legitimate system.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks
Authors:
Ahmed El Shafie,
Ahmed Sultan,
Asma Mabrouk,
Kamel Tourki,
Naofal Al-Dhahir
Abstract:
This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been…
▽ More
This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.
△ Less
Submitted 11 June, 2017;
originally announced June 2017.
-
Achievable Rates of Buffer-Aided Full-Duplex Gaussian Relay Channels
Authors:
Ahmed El Shafie,
Ahmed Sultan,
Ioannis Krikidis,
Naofal Al-Dhahir,
Ridha Hamila
Abstract:
We derive closed-form expressions for the achievable rates of a buffer-aided full-duplex (FD) multiple-input multiple-output (MIMO) Gaussian relay channel. The FD relay still suffers from residual self-interference (RSI) after the application of self-interference mitigation techniques. We investigate both cases of a slow-RSI channel where the RSI is fixed over the entire codeword, and a fast-RSI c…
▽ More
We derive closed-form expressions for the achievable rates of a buffer-aided full-duplex (FD) multiple-input multiple-output (MIMO) Gaussian relay channel. The FD relay still suffers from residual self-interference (RSI) after the application of self-interference mitigation techniques. We investigate both cases of a slow-RSI channel where the RSI is fixed over the entire codeword, and a fast-RSI channel where the RSI changes from one symbol duration to another within the codeword. We show that the RSI can be completely eliminated in the slow-RSI case when the FD relay is equipped with a buffer while the fast RSI cannot be eliminated. For the fixed-rate data transmission scenario, we derive the optimal transmission strategy that should be adopted by the source node and relay node to maximize the system throughput. We verify our analytical findings through simulations.
△ Less
Submitted 1 August, 2017; v1 submitted 9 April, 2017;
originally announced April 2017.
-
Cooperative Access Schemes for Efficient SWIPT Transmissions in Cognitive Radio Networks
Authors:
Ahmed El Shafie,
Naofal Al-Dhahir,
Ridha Hamila
Abstract:
We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter is assumed to be an energy-harvesting node. We propose a three-stage cooperative transmission protocol. During the first stage, the primary user releases a portion of its time sl…
▽ More
We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter is assumed to be an energy-harvesting node. We propose a three-stage cooperative transmission protocol. During the first stage, the primary user releases a portion of its time slot to the secondary nodes to send their data and to power the energy-harvesting primary transmitter from the secondary radio-frequency signals. During the second stage, the primary transmitter sends its data to its destination and to the secondary nodes. During the third stage, the secondary nodes amplify and forward the primary data. We propose five different schemes for secondary access and powering the primary transmitter. We derive closed-form expressions for the primary and secondary rates for all the proposed schemes. Two of the proposed schemes use distributed beamforming to power the primary transmitter. We design a sparsity-aware relay-selection scheme based on the compressive sensing principles. Our numerical results demonstrate the gains of our proposed schemes for both the primary and secondary systems.
△ Less
Submitted 23 December, 2016;
originally announced December 2016.
-
A Secure Multiple-Access Scheme for Rechargeable Wireless Sensors in the Presence of an Eavesdropper
Authors:
Ahmed El Shafie,
Naofal Al-Dhahir
Abstract:
We propose a simple yet efficient scheme for a set of energy-harvesting sensors to establish secure communication with a common destination (a master node). An eavesdropper attempts to decode the data sent from the sensors to their common destination. We assume a single modulation scheme that can be implemented efficiently for energy-limited applications. We design a multiple-access scheme for the…
▽ More
We propose a simple yet efficient scheme for a set of energy-harvesting sensors to establish secure communication with a common destination (a master node). An eavesdropper attempts to decode the data sent from the sensors to their common destination. We assume a single modulation scheme that can be implemented efficiently for energy-limited applications. We design a multiple-access scheme for the sensors under secrecy and limited-energy constraints. In a given time slot, each energy-harvesting sensor chooses between sending its packet or remaining idle. The destination assigns a set of data time slots to each sensor. The optimization problem is formulated to maximize the secrecy sum-throughput.
△ Less
Submitted 23 December, 2016;
originally announced December 2016.
-
An Artificial-Noise-Aided Hybrid TS/PS Scheme for OFDM-Based SWIPT Systems
Authors:
Ahmed El Shafie,
Kamel Tourki,
Naofal Al-Dhahir
Abstract:
We propose a new artificial-noise aided hybrid time-switching/power-splitting scheme for orthogonal frequency-division multiplexing (OFDM) systems to securely transmit data and transfer energy to a legitimate receiving node. In our proposed scheme, the cyclic prefix has two more benefits in addition to the cancellation of the inter-symbol interference between the OFDM blocks. Firstly, it enables t…
▽ More
We propose a new artificial-noise aided hybrid time-switching/power-splitting scheme for orthogonal frequency-division multiplexing (OFDM) systems to securely transmit data and transfer energy to a legitimate receiving node. In our proposed scheme, the cyclic prefix has two more benefits in addition to the cancellation of the inter-symbol interference between the OFDM blocks. Firstly, it enables the legitimate transmitter to send artificial-noise (AN) vectors in a way such that the interference can be canceled at the legitimate receiver prior to information decoding. Secondly, its power is used to energize the legitimate receiver. We optimize the cyclic prefix length, the time-switching and power-splitting parameters, and the power allocation ratio between the data and AN signals at the legitimate transmitter to maximize the average secrecy rate subject to a constraint on the average energy transfer rate at the legitimate receiver. Our numerical results demonstrate that our proposed scheme can achieve up to 23% average secrecy rate gain relative to a pure power-splitting scheme.
△ Less
Submitted 19 December, 2016;
originally announced December 2016.
-
Secure Communications in the Presence of a Buffer-Aided Wireless-Powered Relay With Self-Energy Recycling
Authors:
Ahmed El Shafie,
Naofal Al-Dhahir
Abstract:
We consider a relay-assisted wireless network, where the energy-harvesting buffer-aided relay node is powered by radio-frequency signals from a source node wishing to communicate with its destination. We propose two secure cooperative protocols for a network composed of a source node equipped with a data buffer communicating with its destination in the presence of a buffer-aided relay node and an…
▽ More
We consider a relay-assisted wireless network, where the energy-harvesting buffer-aided relay node is powered by radio-frequency signals from a source node wishing to communicate with its destination. We propose two secure cooperative protocols for a network composed of a source node equipped with a data buffer communicating with its destination in the presence of a buffer-aided relay node and an eavesdropper. Our proposed protocols are designed based on the channel state information and the buffer state information at the source and relay nodes. The burstiness of data at the source node queue (buffer) and the energy recycling process at the relay are taken into account in our analysis. In addition, we take the decoding and signal processing circuit power consumption constraints into consideration. For the limiting case of an infinite-size battery at the relay, we derive a sufficient condition for the energy queue to saturate. Our numerical results demonstrate the throughput gains of our proposed protocols.
△ Less
Submitted 18 December, 2016;
originally announced December 2016.
-
Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks
Authors:
Ahmed El Shafie,
Dusit Niyato,
Naofal Al-Dhahir
Abstract:
In this letter, we investigate the security of a single-antenna rechargeable source node in the presence of a multi-antenna rechargeable cooperative jammer and a potential single-antenna eavesdropper. The batteries at the legitimate transmitting nodes (i.e. the source node and the jamming node) are assumed to be limited in capacity and are modeled as queueing systems. We investigate the impact of…
▽ More
In this letter, we investigate the security of a single-antenna rechargeable source node in the presence of a multi-antenna rechargeable cooperative jammer and a potential single-antenna eavesdropper. The batteries at the legitimate transmitting nodes (i.e. the source node and the jamming node) are assumed to be limited in capacity and are modeled as queueing systems. We investigate the impact of the energy arrival rates at the batteries on the achievable secrecy rates. In our energy-constrained network, we propose an efficient scheme to enhance the system's security by optimizing the transmission times of the source node. The jammer uses a subset of its antennas (and transmit radio-frequency chains) to create a beamformer which maximizes the system's secrecy rate while completely canceling the artificial noise at the legitimate destination. Our numerical results demonstrate the significant average secrecy rate gain of our proposed scheme.
△ Less
Submitted 18 December, 2016;
originally announced December 2016.
-
Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying~System
Authors:
Ahmed El Shafie,
Ahmed Sultan,
Naofal Al-Dhahir
Abstract:
This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying strategies, namely randomize-and-forward and decode-and-forward relaying strategies,…
▽ More
This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying strategies, namely randomize-and-forward and decode-and-forward relaying strategies, to improve the security of the legitimate system. In the first relaying strategy, Rooney uses a codebook different from that used at Alice. In the second relaying strategy, Rooney and Alice use the same codebooks. In addition, Rooney switches between half-duplex and full-duplex modes to further enhance the security of the legitimate system. The numerical results demonstrate that our proposed scheme achieves a significant average secrecy end-to-end throughput improvement relative to the conventional bufferless full-duplex relaying scheme.
△ Less
Submitted 18 December, 2016;
originally announced December 2016.
-
Sparsity-Cognizant Multiple-Access Schemes for Large Wireless Networks With Node Buffers
Authors:
Ahmed El Shafie,
Naofal Al-Dhahir,
Ridha Hamila
Abstract:
This paper proposes efficient multiple-access schemes for large wireless networks based on the transmitters' buffer state information and their transceivers' duplex transmission capability. First, we investigate the case of half-duplex nodes where a node can either transmit or receive in a given time instant. The network is said to be naturally sparse if the number of nonempty-queue transmitters i…
▽ More
This paper proposes efficient multiple-access schemes for large wireless networks based on the transmitters' buffer state information and their transceivers' duplex transmission capability. First, we investigate the case of half-duplex nodes where a node can either transmit or receive in a given time instant. The network is said to be naturally sparse if the number of nonempty-queue transmitters in a given frame is much smaller than the number of users, which is the case when the arrival rates to the queues are very small and the number of users is large. If the network is not naturally sparse, we design the user requests to be sparse such that only few requests are sent to the destination. We refer to the detected nonempty-queue transmitters in a given frame as frame owners. Our design goal is to minimize the nodes' total transmit power in a given frame. In the case of unslotted-time data transmission, the optimization problem is shown to be a convex optimization program. We propose an approximate formulation to simplify the problem and obtain a closed-form expression for the assigned time durations to the nodes. The solution of the approximate optimization problem demonstrates that the time duration assigned to a node in the set of frame owners is the ratio of the square-root of the buffer occupancy of that node to the sum of the square-roots of each occupancy of all the frame owners. We then investigate the slotted-time data transmission scenario, where the time durations assigned for data transmission are slotted. In addition, we show that the full-duplex capability of a node increases the data transmission portion of the frame and enables a distributed implementation of the proposed schemes.
△ Less
Submitted 17 December, 2016;
originally announced December 2016.
-
Cognitive Access Protocol for Alleviating Sensing Errors in Cognitive Multiple-Access Systems
Authors:
Ahmed El Shafie
Abstract:
This letter studies a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. We propose a novel secondary access protocol which alleviates sensing errors and detects the availability of primary channels with the highest ability of detection. Under the proposed protocol, the SU may access the channel at one of a predefined instants…
▽ More
This letter studies a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. We propose a novel secondary access protocol which alleviates sensing errors and detects the availability of primary channels with the highest ability of detection. Under the proposed protocol, the SU may access the channel at one of a predefined instants within the time slot each of which associated with a certain access probability that changes based on the sensing outcome. There is also a possibility of accessing the channel at the beginning of the time slot without channel sensing. The optimization problem is stated such that the secondary throughput is maximized under stability of the primary queue and a constraint on the primary queueing delay. Numerical results demonstrate the beneficial gains of the proposed protocol in terms of secondary throughput.
△ Less
Submitted 28 October, 2016;
originally announced October 2016.
-
Optimal Spectrum Access for a Rechargeable Cognitive Radio User Based on Energy Buffer State
Authors:
Ahmed El Shafie,
Mahmoud Ashour,
Amr Mohamed,
Tamer Khattab
Abstract:
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources, e.g., solar, wind and acoustic noise. We propose a probabilistic access strategy by the SU based on the number of packets at its energy queue. We inv…
▽ More
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources, e.g., solar, wind and acoustic noise. We propose a probabilistic access strategy by the SU based on the number of packets at its energy queue. We investigate the effect of the energy arrival rate, the amount of energy per energy packet, and the capacity of the energy queue on the SU throughput under fading channels. Results reveal that the proposed access strategy can enhance the performance of the SU.
△ Less
Submitted 3 September, 2014;
originally announced September 2014.
-
On Spectrum Sharing Between Energy Harvesting Cognitive Radio Users and Primary Users
Authors:
Ahmed El Shafie,
Mahmoud Ashour,
Tamer Khattab,
Amr Mohamed
Abstract:
This paper investigates the maximum secondary throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources and primary radio frequency (RF) transmissions. We propose a power allocation policy at the PU and analyze its effect on the throughput of b…
▽ More
This paper investigates the maximum secondary throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources and primary radio frequency (RF) transmissions. We propose a power allocation policy at the PU and analyze its effect on the throughput of both the PU and SU. Furthermore, we study the impact of the bursty arrivals at the PU on the energy harvested by the SU from RF transmissions. Moreover, we investigate the impact of the rate of energy harvesting from natural resources on the SU throughput. We assume fading channels and compute exact closed-form expressions for the energy harvested by the SU under fading. Results reveal that the proposed power allocation policy along with the implemented RF energy harvesting at the SU enhance the throughput of both primary and secondary links.
△ Less
Submitted 30 July, 2014; v1 submitted 27 July, 2014;
originally announced July 2014.
-
Power-Optimal Feedback-Based Random Spectrum Access for an Energy Harvesting Cognitive User
Authors:
Mahmoud Ashour,
Ahmed El Shafie,
Amr Mohamed,
Tamer Khattab
Abstract:
In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with Energy Harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that exploits the primary link's feedback and requires less average sensing time. Unlike previous works proposed earlier in literature, we do not assume perfect feedback. Instead, we take…
▽ More
In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with Energy Harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that exploits the primary link's feedback and requires less average sensing time. Unlike previous works proposed earlier in literature, we do not assume perfect feedback. Instead, we take into account the more practical possibilities of overhearing unreliable feedback signals and accommodate spectrum sensing errors. Moreover, we assume an interference-based channel model where the receivers are equipped with multi-packet reception (MPR) capability. Furthermore, we perform power allocation at the SU with the objective of maximizing the secondary throughput under constraints that maintain certain quality-of-service (QoS) measures for the primary user (PU).
△ Less
Submitted 24 June, 2014;
originally announced June 2014.
-
Energy-Efficient Cooperative Cognitive Relaying Schemes for Cognitive Radio Networks
Authors:
Ahmed El Shafie,
Tamer Khattab,
Amr El-Keyi
Abstract:
We investigate a cognitive radio network in which a primary user (PU) may cooperate with a cognitive radio user (i.e., a secondary user (SU)) for transmissions of its data packets. The PU is assumed to be a buffered node operating in a time-slotted fashion where the time is partitioned into equal-length slots. We develop two schemes which involve cooperation between primary and secondary users. To…
▽ More
We investigate a cognitive radio network in which a primary user (PU) may cooperate with a cognitive radio user (i.e., a secondary user (SU)) for transmissions of its data packets. The PU is assumed to be a buffered node operating in a time-slotted fashion where the time is partitioned into equal-length slots. We develop two schemes which involve cooperation between primary and secondary users. To satisfy certain quality of service (QoS) requirements, users share time slot duration and channel frequency bandwidth. Moreover, the SU may leverage the primary feedback message to further increase both its data rate and satisfy the PU QoS requirements. The proposed cooperative schemes are designed such that the SU data rate is maximized under the constraint that the PU average queueing delay is maintained less than the average queueing delay in case of non-cooperative PU. In addition, the proposed schemes guarantee the stability of the PU queue and maintain the average energy emitted by the SU below a certain value. The proposed schemes also provide more robust and potentially continuous service for SUs compared to the conventional practice in cognitive networks where SUs transmit in the spectrum holes and silence sessions of the PUs. We include primary source burstiness, sensing errors, and feedback decoding errors to the analysis of our proposed cooperative schemes. The optimization problems are solved offline and require a simple 2-dimensional grid-based search over the optimization variables. Numerical results show the beneficial gains of the cooperative schemes in terms of SU data rate and PU throughput, average PU queueing delay, and average PU energy savings.
△ Less
Submitted 26 October, 2017; v1 submitted 9 June, 2014;
originally announced June 2014.
-
Maximum Throughput of a Secondary User Cooperating with an Energy-Aware Primary User
Authors:
Ahmed El Shafie,
Ahmed Sultan,
Tamer Khattab
Abstract:
This paper proposes a cooperation protocol between a secondary user (SU) and a primary user (PU) which dedicates a free frequency subband for the SU if cooperation results in energy saving. Time is slotted and users are equipped with buffers. Under the proposed protocol, the PU releases portion of its bandwidth for secondary transmission. Moreover, it assigns a portion of the time slot duration fo…
▽ More
This paper proposes a cooperation protocol between a secondary user (SU) and a primary user (PU) which dedicates a free frequency subband for the SU if cooperation results in energy saving. Time is slotted and users are equipped with buffers. Under the proposed protocol, the PU releases portion of its bandwidth for secondary transmission. Moreover, it assigns a portion of the time slot duration for the SU to relay primary packets and achieve a higher successful packet reception probability at the primary receiver. We assume that the PU has three states: idle, forward, and retransmission states. At each of these states, the SU accesses the channel with adaptive transmission parameters. The PU cooperates with the SU if and only if the achievable average number of transmitted primary packets per joule is higher than the number of transmitted packets per joule when it operates alone. The numerical results show the beneficial gains of the proposed cooperative cognitive protocol.
△ Less
Submitted 12 May, 2014;
originally announced May 2014.
-
On Orthogonal Band Allocation for Multi-User Multi-Band Cognitive Radio Networks: Stability Analysis
Authors:
Ahmed El Shafie,
Tamer Khattab
Abstract:
In this work, we study the problem of band allocation of $M_s$ buffered secondary users (SUs) to $M_p$ primary bands licensed to (owned by) $M_p$ buffered primary users (PUs). The bands are assigned to SUs in an orthogonal (one-to-one) fashion such that neither band sharing nor multi-band allocations are permitted. In order to study the stability region of the secondary network, the optimization p…
▽ More
In this work, we study the problem of band allocation of $M_s$ buffered secondary users (SUs) to $M_p$ primary bands licensed to (owned by) $M_p$ buffered primary users (PUs). The bands are assigned to SUs in an orthogonal (one-to-one) fashion such that neither band sharing nor multi-band allocations are permitted. In order to study the stability region of the secondary network, the optimization problem used to obtain the stability region's envelope (closure) is established and is shown to be a linear program which can be solved efficiently and reliably. We compare our orthogonal allocation system with two typical low-complexity and intuitive band allocation systems. In one system, each cognitive user chooses a band randomly in each time slot with some assignment probability designed such that the system maintained stable, while in the other system fixed (deterministic) band assignment is adopted throughout the lifetime of the network. We derive the stability regions of these two systems. We prove mathematically, as well as through numerical results, the advantages of our proposed orthogonal system over the other two systems.
△ Less
Submitted 27 July, 2014; v1 submitted 12 May, 2014;
originally announced May 2014.
-
Probabilistic Band-Splitting for a Buffered Cooperative Cognitive Terminal
Authors:
Ahmed El Shafie,
Ahmed Sultan,
Tamer Khattab
Abstract:
In this paper, we propose a cognitive protocol that involves cooperation between the primary and secondary users. In addition to its own queue, the secondary user (SU) has a queue to store, and then relay, the undelivered primary packets. When the primary queue is nonempty, the SU remains idle and attempts to decode the primary packet. When the primary queue is empty, the SU splits the total chann…
▽ More
In this paper, we propose a cognitive protocol that involves cooperation between the primary and secondary users. In addition to its own queue, the secondary user (SU) has a queue to store, and then relay, the undelivered primary packets. When the primary queue is nonempty, the SU remains idle and attempts to decode the primary packet. When the primary queue is empty, the SU splits the total channel bandwidth into two orthogonal subbands and assigns each to a queue probabilistically. We show the advantage of the proposed protocol over the prioritized cognitive relaying (PCR) protocol in which the SU assigns a priority in transmission to the primary packets over its own packets. We present two problem formulations, one based on throughput and the other on delay. Both optimization problems are shown to be linear programs for a given bandwidth assignment. Numerical results demonstrate the benefits of the proposed protocol.
△ Less
Submitted 8 July, 2014; v1 submitted 12 May, 2014;
originally announced May 2014.
-
Cooperative Cognitive Relaying Under Primary and Secondary Quality of Service Satisfaction
Authors:
Ahmed El Shafie,
Tamer Khattab
Abstract:
This paper proposes a new cooperative protocol which involves cooperation between primary and secondary users. We consider a cognitive setting with one primary user and multiple secondary users. The time resource is partitioned into discrete time slots. Each time slot, a secondary user is scheduled for transmission according to time division multiple access, and the remainder of the secondary user…
▽ More
This paper proposes a new cooperative protocol which involves cooperation between primary and secondary users. We consider a cognitive setting with one primary user and multiple secondary users. The time resource is partitioned into discrete time slots. Each time slot, a secondary user is scheduled for transmission according to time division multiple access, and the remainder of the secondary users, which we refer to as secondary relays, attempt to decode the primary packet. Afterwards, the secondary relays employ cooperative beamforming to forward the primary packet and to provide protection to the secondary destination of the secondary source scheduled for transmission from interference. We characterize the diversity-multiplexing tradeoff of the primary source under the proposed protocol. We consider certain quality of service for each user specified by its required throughput. The optimization problem is stated under such condition. It is shown that the optimization problem is linear and can be readily solved. We show that the sum of the secondary required throughputs must be less than or equal to the probability of correct packets reception.
△ Less
Submitted 1 July, 2014; v1 submitted 26 April, 2014;
originally announced April 2014.
-
Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks
Authors:
Ahmed H. Anwar,
Ahmed El Shafie,
Amr Mohamed,
Tamer ElBatt,
Mohsen Guizani
Abstract:
In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network rec…
▽ More
In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network receiving nodes have MPR capability. We aim at maximizing the throughput of the individual SUs such that the PU's queue is maintained stable. Moreover, we are interested in providing an energy-efficient cognitive scheme. Therefore, we include energy constraints on the PU and SU average transmitted energy to the optimization problem. Each SU accesses the medium with certain probability that depends on the PU's activity, i.e., active or inactive. The numerical results show the advantage in terms of SU throughput of the proposed scheme over the conventional access scheme, where the SUs access the channel randomly with fixed power when the PU is sensed to be idle.
△ Less
Submitted 8 July, 2014; v1 submitted 3 April, 2014;
originally announced April 2014.
-
Optimal Cooperative Cognitive Relaying and Spectrum Access for an Energy Harvesting Cognitive Radio: Reinforcement Learning Approach
Authors:
Ahmed El Shafie,
Tamer Khattab,
Hussien Saad,
Amr Mohamed
Abstract:
In this paper, we consider a cognitive setting under the context of cooperative communications, where the cognitive radio (CR) user is assumed to be a self-organized relay for the network. The CR user and the PU are assumed to be energy harvesters. The CR user cooperatively relays some of the undelivered packets of the primary user (PU). Specifically, the CR user stores a fraction of the undeliver…
▽ More
In this paper, we consider a cognitive setting under the context of cooperative communications, where the cognitive radio (CR) user is assumed to be a self-organized relay for the network. The CR user and the PU are assumed to be energy harvesters. The CR user cooperatively relays some of the undelivered packets of the primary user (PU). Specifically, the CR user stores a fraction of the undelivered primary packets in a relaying queue (buffer). It manages the flow of the undelivered primary packets to its relaying queue using the appropriate actions over time slots. Moreover, it has the decision of choosing the used queue for channel accessing at idle time slots (slots where the PU's queue is empty). It is assumed that one data packet transmission dissipates one energy packet. The optimal policy changes according to the primary and CR users arrival rates to the data and energy queues as well as the channels connectivity. The CR user saves energy for the PU by taking the responsibility of relaying the undelivered primary packets. It optimally organizes its own energy packets to maximize its payoff as time progresses.
△ Less
Submitted 8 July, 2014; v1 submitted 30 March, 2014;
originally announced March 2014.
-
Maximum Throughput of a Cooperative Energy Harvesting Cognitive Radio User
Authors:
Ahmed El Shafie,
Tamer Khattab,
H. Vincent Poor
Abstract:
In this paper, we investigate the maximum throughput of a saturated rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU harvests energy packets (tokens) from the environment with a certain harvesting rate. All transmitters are assumed to have data buffers to store the incoming data packets. In addition to its own traffic buffer, the SU has a buffer for storing th…
▽ More
In this paper, we investigate the maximum throughput of a saturated rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU harvests energy packets (tokens) from the environment with a certain harvesting rate. All transmitters are assumed to have data buffers to store the incoming data packets. In addition to its own traffic buffer, the SU has a buffer for storing the admitted primary packets for relaying; and a buffer for storing the energy tokens harvested from the environment. We propose a new cooperative cognitive relaying protocol that allows the SU to relay a fraction of the undelivered primary packets. We consider an interference channel model (or a multipacket reception (MPR) channel model), where concurrent transmissions can survive from interference with certain probability characterized by the complement of channel outages. The proposed protocol exploits the primary queue burstiness and receivers' MPR capability. In addition, it efficiently expends the secondary energy tokens under the objective of secondary throughput maximization. Our numerical results show the benefits of cooperation, receivers' MPR capability, and secondary energy queue arrival rate on the system performance from a network layer standpoint.
△ Less
Submitted 8 July, 2014; v1 submitted 14 January, 2014;
originally announced January 2014.
-
Comments on "Optimal Utilization of a Cognitive Shared Channel with a Rechargeable Primary Source Node"
Authors:
Ahmed El Shafie,
Ahmed Sultan
Abstract:
In a recent paper [1], the authors investigated the maximum stable throughput region of a network composed of a rechargeable primary user and a secondary user plugged to a reliable power supply. The authors studied the cases of an infinite and a finite energy queue at the primary transmitter. However, the results of the finite case are incorrect. We show that under the proposed energy queue model…
▽ More
In a recent paper [1], the authors investigated the maximum stable throughput region of a network composed of a rechargeable primary user and a secondary user plugged to a reliable power supply. The authors studied the cases of an infinite and a finite energy queue at the primary transmitter. However, the results of the finite case are incorrect. We show that under the proposed energy queue model (a decoupled ${\rm M/D/1}$ queueing system with Bernoulli arrivals and the consumption of one energy packet per time slot), the energy queue capacity does not affect the stability region of the network.
△ Less
Submitted 14 January, 2014;
originally announced January 2014.
-
On the Design of Relay--Assisted Primary--Secondary Networks
Authors:
Ahmed El Shafie,
Tamer Khattab,
Ahmed Sultan,
H. Vincent Poor
Abstract:
The use of $N$ cognitive relays to assist primary and secondary transmissions in a time-slotted cognitive setting with one primary user (PU) and one secondary user (SU) is investigated. An overlapped spectrum sensing strategy is proposed for channel sensing, where the SU senses the channel for $τ$ seconds from the beginning of the time slot and the cognitive relays sense the channel for $2 τ$ seco…
▽ More
The use of $N$ cognitive relays to assist primary and secondary transmissions in a time-slotted cognitive setting with one primary user (PU) and one secondary user (SU) is investigated. An overlapped spectrum sensing strategy is proposed for channel sensing, where the SU senses the channel for $τ$ seconds from the beginning of the time slot and the cognitive relays sense the channel for $2 τ$ seconds from the beginning of the time slot, thus providing the SU with an intrinsic priority over the relays. The relays sense the channel over the interval $[0,τ]$ to detect primary activity and over the interval $[τ,2τ]$ to detect secondary activity. The relays help both the PU and SU to deliver their undelivered packets and transmit when both are idle. Two optimization-based formulations with quality of service constraints involving queueing delay are studied. Both cases of perfect and imperfect spectrum sensing are investigated. These results show the benefits of relaying and its ability to enhance both primary and secondary performance, especially in the case of no direct link between the PU and the SU transmitters and their respective receivers. Three packet decoding strategies at the relays are also investigated and their performance is compared.
△ Less
Submitted 20 May, 2014; v1 submitted 14 January, 2014;
originally announced January 2014.
-
Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users
Authors:
Ahmed El Shafie,
Tamer Khattab
Abstract:
We investigate a cognitive radio scenario involving a single cognitive transmitter equipped with $\mathcal{K}$ antennas sharing the spectrum with $\mathcal{M}$ primary users (PUs) transmitting over orthogonal bands. Each terminal has a queue to store its incoming traffic. We propose a novel protocol where the cognitive user transmits its packet over a channel formed by the aggregate of the inactiv…
▽ More
We investigate a cognitive radio scenario involving a single cognitive transmitter equipped with $\mathcal{K}$ antennas sharing the spectrum with $\mathcal{M}$ primary users (PUs) transmitting over orthogonal bands. Each terminal has a queue to store its incoming traffic. We propose a novel protocol where the cognitive user transmits its packet over a channel formed by the aggregate of the inactive primary bands. We study the impact of the number of PUs, sensing errors, and the number of antennas on the maximum secondary stable throughput.
△ Less
Submitted 9 June, 2014; v1 submitted 9 January, 2014;
originally announced January 2014.
-
Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
Authors:
Ahmed El Shafie
Abstract:
We consider a secondary user (SU) with energy harvesting capability. We design access schemes for the SU which incorporate random spectrum sensing and random access, and which make use of the primary automatic repeat request (ARQ) feedback. We study two problem-formulations. In the first problem-formulation, we characterize the stability region of the proposed schemes. The sensing and access proba…
▽ More
We consider a secondary user (SU) with energy harvesting capability. We design access schemes for the SU which incorporate random spectrum sensing and random access, and which make use of the primary automatic repeat request (ARQ) feedback. We study two problem-formulations. In the first problem-formulation, we characterize the stability region of the proposed schemes. The sensing and access probabilities are obtained such that the secondary throughput is maximized under the constraints that both the primary and secondary queues are stable. Whereas in the second problem-formulation, the sensing and access probabilities are obtained such that the secondary throughput is maximized under the stability of the primary queue and that the primary queueing delay is kept lower than a specified value needed to guarantee a certain quality of service (QoS) for the primary user (PU). We consider spectrum sensing errors and assume multipacket reception (MPR) capabilities. Numerical results show the enhanced performance of our proposed systems.
△ Less
Submitted 27 April, 2014; v1 submitted 1 January, 2014;
originally announced January 2014.
-
Band Allocation for Cognitive Radios with Buffered Primary and Secondary Users
Authors:
Ahmed El Shafie,
Ahmed Sultan,
Tamer Khattab
Abstract:
In this paper, we study band allocation of $\mathcal{M}_s$ buffered secondary users (SUs) to $\mathcal{M}_p$ orthogonal primary licensed bands, where each primary band is assigned to one primary user (PU). Each SU is assigned to one of the available primary bands with a certain probability designed to satisfy some specified quality of service (QoS) requirements for the SUs. In the proposed system,…
▽ More
In this paper, we study band allocation of $\mathcal{M}_s$ buffered secondary users (SUs) to $\mathcal{M}_p$ orthogonal primary licensed bands, where each primary band is assigned to one primary user (PU). Each SU is assigned to one of the available primary bands with a certain probability designed to satisfy some specified quality of service (QoS) requirements for the SUs. In the proposed system, only one SU is assigned to a particular band. The optimization problem used to obtain the stability region's envelope (closure) is shown to be a linear program. We compare the stability region of the proposed system with that of a system where each SU chooses a band randomly with some assignment probability. We also compare with a fixed (deterministic) assignment system, where only one SU is assigned to one of the primary bands all the time. We prove the advantage of the proposed system over the other systems.
△ Less
Submitted 31 December, 2013;
originally announced January 2014.
-
Protocol Design and Stability Analysis of Cooperative Cognitive Radio Users
Authors:
Ahmed El Shafie,
Tamer Khattab,
H. Vincent Poor
Abstract:
A single cognitive radio transmitter--receiver pair shares the spectrum with two primary users communicating with their respective receivers. Each primary user has a local traffic queue, whereas the cognitive user has three queues; one storing its own traffic while the other two are relaying queues used to store primary relayed packets admitted from the two primary users. A new cooperative cogniti…
▽ More
A single cognitive radio transmitter--receiver pair shares the spectrum with two primary users communicating with their respective receivers. Each primary user has a local traffic queue, whereas the cognitive user has three queues; one storing its own traffic while the other two are relaying queues used to store primary relayed packets admitted from the two primary users. A new cooperative cognitive medium access control protocol for the described network is proposed, where the cognitive user exploits the idle periods of the primary spectrum bands. Traffic arrival to each relaying queue is controlled using a tuneable admittance factor, while relaying queues service scheduling is controlled via channel access probabilities assigned to each queue based on the band of operation. The stability region of the proposed protocol is characterized shedding light on its maximum expected throughput. Numerical results demonstrate the performance gains of the proposed cooperative cognitive protocol.
△ Less
Submitted 18 January, 2014; v1 submitted 12 November, 2013;
originally announced November 2013.
-
Optimal Selection of Spectrum Sensing Duration for an Energy Harvesting Cognitive Radio
Authors:
Ahmed El Shafie,
Ahmed Sultan
Abstract:
In this paper, we consider a time-slotted cognitive radio (CR) setting with buffered and energy harvesting primary and CR users. At the beginning of each time slot, the CR user probabilistically chooses the spectrum sensing duration from a predefined set. If the primary user (PU) is sensed to be inactive, the CR user accesses the channel immediately. The CR user optimizes the sensing duration prob…
▽ More
In this paper, we consider a time-slotted cognitive radio (CR) setting with buffered and energy harvesting primary and CR users. At the beginning of each time slot, the CR user probabilistically chooses the spectrum sensing duration from a predefined set. If the primary user (PU) is sensed to be inactive, the CR user accesses the channel immediately. The CR user optimizes the sensing duration probabilities in order to maximize its mean data service rate with constraints on the stability of the primary and cognitive queues. The optimization problem is split into two subproblems. The first is a linear-fractional program, and the other is a linear program. Both subproblems can be solved efficiently.
△ Less
Submitted 24 September, 2013;
originally announced September 2013.
-
On the Coexistence of a Primary User with an Energy Harvesting Secondary User: A Case of Cognitive Cooperation
Authors:
Ahmed El Shafie,
Tamer Khattab,
Amr El-Keyi,
Mohamed Nafie
Abstract:
In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for sto…
▽ More
In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for storing its own packets and the other for storing the fraction of the undelivered primary packets accepted for relaying. The secondary source is assumed to be a battery-based node which harvests energy packets from the environment. In addition to its data queues, the SU has an energy queue to store the harvested energy packets. The secondary energy packets are used for primary packets decoding and data packets transmission. More specifically, if the secondary energy queue is empty, the secondary source can neither help the primary source nor transmit a packet from the data queues. The energy queue is modeled as a discrete time queue with Markov arrival and service processes. Due to the interaction of the queues, we provide inner and outer bounds on the stability region of the proposed system. We investigate the impact of the energy arrival rate on the stability region. Numerical results show the significant gain of cooperation.
△ Less
Submitted 27 July, 2014; v1 submitted 6 July, 2013;
originally announced July 2013.
-
Independent Component Analysis for Filtering Airwaves in Seabed Logging Application
Authors:
Adeel Ansari,
Afza Bt Shafie,
Abas B Md Said,
Seema Ansari
Abstract:
Marine controlled source electromagnetic (CSEM) sensing method used for the detection of hydrocarbons based reservoirs in seabed logging application does not perform well due to the presence of the airwaves (or sea-surface). These airwaves interfere with the signal that comes from the subsurface seafloor and also tend to dominate in the receiver response at larger offsets. The task is to identify…
▽ More
Marine controlled source electromagnetic (CSEM) sensing method used for the detection of hydrocarbons based reservoirs in seabed logging application does not perform well due to the presence of the airwaves (or sea-surface). These airwaves interfere with the signal that comes from the subsurface seafloor and also tend to dominate in the receiver response at larger offsets. The task is to identify these air waves and the way they interact, and to filter them out. In this paper, a popular method for counteracting with the above stated problem scenario is Independent Component Analysis (ICA). Independent component analysis (ICA) is a statistical method for transforming an observed multidimensional or multivariate dataset into its constituent components (sources) that are statistically as independent from each other as possible. ICA-type de-convolution algorithm that is FASTICA is considered for mixed signals de-convolution and considered convenient depending upon the nature of the source and noise model. The results from the FASTICA algorithm are shown and evaluated. In this paper, we present the FASTICA algorithm for the seabed logging application.
△ Less
Submitted 4 March, 2013;
originally announced March 2013.
-
Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio
Authors:
Ahmed El Shafie,
Ahmed Sultan
Abstract:
We consider a secondary user with energy harvesting capability. We design access schemes for the secondary user which incorporate random spectrum sensing and random access, and which make use of the primary automatic repeat request (ARQ) feedback. The sensing and access probabilities are obtained such that the secondary throughput is maximized under the constraints that both the primary and second…
▽ More
We consider a secondary user with energy harvesting capability. We design access schemes for the secondary user which incorporate random spectrum sensing and random access, and which make use of the primary automatic repeat request (ARQ) feedback. The sensing and access probabilities are obtained such that the secondary throughput is maximized under the constraints that both the primary and secondary queues are stable and that the primary queueing delay is kept lower than a specified value needed to guarantee a certain quality of service (QoS) for the primary user. We consider spectrum sensing errors and assume multipacket reception (MPR) capabilities. Numerical results are presented to show the enhanced performance of our proposed system over a random access system, and to demonstrate the benefit of leveraging the primary feedback.
△ Less
Submitted 28 August, 2012;
originally announced August 2012.
-
Cooperative Cognitive Relaying with Ordered Cognitive Multiple Access
Authors:
Ahmed El Shafie,
Ahmed Sultan
Abstract:
We investigate a cognitive radio system with two secondary users who can cooperate with the primary user in relaying its packets to the primary receiver. In addition to its own queue, each secondary user has a queue to keep the primary packets that are not received correctly by the primary receiver. The secondary users accept the unreceived primary packets with a certain probability and transmit r…
▽ More
We investigate a cognitive radio system with two secondary users who can cooperate with the primary user in relaying its packets to the primary receiver. In addition to its own queue, each secondary user has a queue to keep the primary packets that are not received correctly by the primary receiver. The secondary users accept the unreceived primary packets with a certain probability and transmit randomly from either of their queues if both are nonempty. These probabilities are optimized to expand the maximum stable throughput region of the system. Moreover, we suggest a secondary multiple access scheme in which one secondary user senses the channel for $τ$ seconds from the beginning of the time slot and transmits if the channel is found to be free. The other secondary user senses the channel over the period $[0,2τ]$ to detect the possible activity of the primary user and the first-ranked secondary user. It transmits, if possible, starting after $2τ$ seconds from the beginning of the time slot. It compensates for the delayed transmission by increasing its transmission rate so that it still transmits one packet during the time slot. We show the potential advantage of this ordered system over the conventional random access system. We also show the benefit of cooperation in enhancing the network's throughput.
△ Less
Submitted 28 August, 2012;
originally announced August 2012.