The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security threats such as jamming and route manipulation can have significant consequences on the performance of modern wireless networks. To increase the efficacy and stealthiness of such threats, a number of extremely challenging, next-generation cross-layer attacks have been recently unveiled. Although existing research has thoroughly addressed many single-layer attacks, the problem of detecting...
In traditional physical interference model for Wireless Mesh Networks (WMNs) or wireless networks, a message transmitted by a node v to the intended node w within v′ transmission range can be successfully received at w if only if in this step w is listening and the interference power received at w due to simultaneous transmissions from other nodes within w′ interference range is less than the predefined...
This paper investigates the resource allocation problem in heterogeneous cognitive radio networks (HCRNs). In this paper, two types of users, i.e., multi-homing and single-network cognitive radio users (CRUs), are considered to coexist in HCRNs. Multi-homing CRUs can access multiple networks simultaneously, while single-network CRUs can be served by only one network at a time. With the aim of maximizing...
In cellular mobile wireless networks, nonlinear channel fading is always a critical factor which will scientifically deteriorate the Quality of Service (QoS) for the users. However, it is difficult to describe the nonlinear channel fading by precise mathematical model because of its complexity. So, the control of wireless networks becomes an especial tough work. In this paper, a power and rate control...
Inter-Cell Interference Coordination (ICIC) techniques are proposed as solutions to alleviate the negative impact of interference on system performance, while enhancing the provided Quality of Service (QoS). Typically, the available bandwidth is divided into inner and edge sub-bands. Users are also classified into interior and edge users. The available resources in each zone are exclusively allocated...
In the paper, we studied the solution of resource allocation problem with Coordinated Multi-Point(CoMP) in heterogeneous wireless networks. The utilization of CoMP technology enhances channel quality of users at the edge of cells, but it also brings more complexity to resource management of the network. To reduce this pressure, we exploited a feedback-based method to determine the allocation of users...
In this paper, we consider a two-hop cooperative relaying network in a randomly distributed interference environment, where the source communicates with the destination, assisted by N decode-and-forward (DF) relays. We consider the interference-limited environments, where the received signals at the relays and the destination are degraded by random interference nodes distributed according to homogeneous...
Considering a small-scale fading environment in a dense random wireless network, we investigate the impact of the carrier-sensing threshold on the link performance under the premise of a fixed carrier-sensing range. At first, we assume a close transmitter-receiver distance and model the network nodes as a homogeneous Poisson point process (PPP). Then we present a simple analysis model of the conditional...
We propose novel resource allocation algorithms that have the objective of finding a good tradeoff between resource reuse and interference avoidance in wireless networks. To this end, we first study properties of functions that relate the resource budget available to network elements to the optimal utility and to the optimal resource efficiency obtained by solving max-min utility optimization problems...
The information transmission problem in a class of wireless multi-user single-antenna half-duplex relay interference networks is studied. In these networks there are multiple clusters of sources. All the terminals in each source cluster desire to transmit independent messages to a single destination, through multiple layers of intermediate half-duplex relays. We adopt a cluster successive relaying...
The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns. To support the IoT traffic, several technologies are evolving to support low power wide area (LPWA) wireless communications. However, LPWA networks rely on variations of uncoordinated spectrum access, either for data transmissions or scheduling requests, thus imposing a scalability problem...
Recent advances in self-interference cancellation (SIC) techniques have made the implementation of Full Duplex (FD) possible. FD technology promises doubling the capacity of wireless networks without needing new frequencies, by enabling communication devices to receive and transmit at the same time and frequency. However, when considering the overall communication networks, gains may be less significant...
Aiming at the problem that the dynamic arrival of the virtual network requests in the wireless network environment leads to the unbalanced allocation of the substrate network resources and the low acceptance rate of the subsequent requests, a topology-aware wireless virtual network embedding algorithm (WVNEA-TA) is proposed. By analyzing the dynamic topological attributes of the virtual network and...
In this paper, we study the link scheduling problem considering the fluctuating fading effect in transmissions. We extend the previous deterministic physical interference model to the Rayleigh-fading model that uses the stochastic propagation to address fading effects. Based on this model, we formulate a problem called Fading-Resistant Link Scheduling (Fading-R-LS) problem, which aims to maximize...
Ultra-dense cellular networks are emerging as one key characteristic of 5G wireless networks. In this context, frequency reuse is a fundamental technology enabler for efficient utilization of limited spectrum resources. In this paper, we investigate the in-band Full-Duplex (FD) self-backhauling architecture, in which Base Stations (BSs) operate on the same spectrum used by the users to access the...
This paper presents the extensions of the bounded-input bounded-output (BIBO) stability analysis of the power control in multiple coexisting wireless networks from L2 gain to both L1 and L∞ gains. By making use of the linear positive system theory, this study derives the sufficient conditions of BIBO stability for the considered power control, which can examine by nature whether the power control...
The individual applications of network coded opportunistic routing and successive interference cancellation have been proven with significant improvement on throughput performance of wireless multi-hop networks, but there lacks practical optimization on their combination application. Based on a TDMA system, this paper models the throughput maximization as network utility function maximization problem...
In this paper, the problem of joint users' uplink transmission power and rate allocation in NOMA wireless networks is studied, under the scenario that each user is simultaneously requesting multiple services. Each user is associated with a two-variable utility function that represents his satisfaction from his allocated resources (i.e., power and rate). In order to appropriately reflect the combined...
Information dissemination protocols for ad-hoc wireless networks frequently use a minimal subset of the available communication links, defining a rooted Broadcast Tree. In this work, we focus on the core challenge of disseminating from one layer to the next one of such tree. We call this problem Layer Dissemination. We study Layer Dissemination under a generalized model of interference, called Affectance...
This paper investigates the secrecy rates and optimal power allocation schemes of a decode-and-forward (DF) wiretap relay channel where a relay operates in a full-duplex (FD) mode. A practical self-interference model is adopted to take into account the effect of residual self-interference. At first, we demonstrate that while the optimal power allocation schemes between the source and the relay are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.