Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access
We investigate the spatial spectrum sharing mechanism design in fog-aided cognitive radio (CR) networks with the methods of guard zone and interference cancellation. Particularly, it is assumed that the studied CR network is comprised of a library of multimedia files <inline-formula> <tex-m...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8489845/ |
id |
doaj-8df9146597194dbfa77891b3eea4845f |
---|---|
record_format |
Article |
spelling |
doaj-8df9146597194dbfa77891b3eea4845f2021-03-29T21:40:44ZengIEEEIEEE Access2169-35362018-01-016591825919110.1109/ACCESS.2018.28755968489845Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum AccessChao Jia0Xiaoshi Song1https://orcid.org/0000-0003-1784-7710Xiangbo Meng2School of Computer Science and Engineering, Northeastern University, Shenyang, ChinaSchool of Computer Science and Engineering, Northeastern University, Shenyang, ChinaSchool of Computer Science and Engineering, Northeastern University, Shenyang, ChinaWe investigate the spatial spectrum sharing mechanism design in fog-aided cognitive radio (CR) networks with the methods of guard zone and interference cancellation. Particularly, it is assumed that the studied CR network is comprised of a library of multimedia files <inline-formula> <tex-math notation="LaTeX">$\mathcal {F}$ </tex-math></inline-formula> with size <inline-formula> <tex-math notation="LaTeX">$F$ </tex-math></inline-formula> and two types of users, namely the primary and secondary users, with fog computing capability. The primary users are authorized devices and have privilege to preferentially utilize the bandwidth resources. The secondary users, on the other hand, are unauthorized devices and can access the spectrum only if the primary transmissions are unaffected. To constrain the unintended secondary interference at the active primary receivers (PRs) while enhance the spectrum accessibility of the secondary users, the guard zone and interference cancellation-based opportunistic spectrum access (GZ-IC OSA) protocol is proposed and analyzed. Under the GZ-IC OSA protocol, by exploiting the cached content as side information, the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file sent by a secondary transmitter (ST) can be effectively cancelled at the unintended active PRs which cache the same file. As such, under the GZ-IC OSA protocol, a ST is allowed to transmit the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file in <inline-formula> <tex-math notation="LaTeX">$\mathcal {F}$ </tex-math></inline-formula> as long as it is outside the union of the guard zones of all active PRs which cache other files except the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file. Assuming decentralized probabilistic caching, under the GZ-IC OSA protocol, we derive the first-order moment measure of the access probabilities of primary transmitters (PTs) and STs, respectively. Further, we capture the conditional spatial distributions of active PTs and STs as piecewise functions with respect to the radius <inline-formula> <tex-math notation="LaTeX">$R_{d}$ </tex-math></inline-formula> of the guard zone. Finally, we evaluate the performance of the proposed GZ-IC OSA protocol in terms of coverage performance and spatial throughput based on the derived conditional spatial distributions.https://ieeexplore.ieee.org/document/8489845/Fog-aided CR networksinterference cancellationguard zoneopportunistic spectrum accessside informationcoverage probability |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Chao Jia Xiaoshi Song Xiangbo Meng |
spellingShingle |
Chao Jia Xiaoshi Song Xiangbo Meng Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access IEEE Access Fog-aided CR networks interference cancellation guard zone opportunistic spectrum access side information coverage probability |
author_facet |
Chao Jia Xiaoshi Song Xiangbo Meng |
author_sort |
Chao Jia |
title |
Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access |
title_short |
Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access |
title_full |
Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access |
title_fullStr |
Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access |
title_full_unstemmed |
Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access |
title_sort |
fog-aided cognitive radio networks with guard zone and interference cancellation based opportunistic spectrum access |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
We investigate the spatial spectrum sharing mechanism design in fog-aided cognitive radio (CR) networks with the methods of guard zone and interference cancellation. Particularly, it is assumed that the studied CR network is comprised of a library of multimedia files <inline-formula> <tex-math notation="LaTeX">$\mathcal {F}$ </tex-math></inline-formula> with size <inline-formula> <tex-math notation="LaTeX">$F$ </tex-math></inline-formula> and two types of users, namely the primary and secondary users, with fog computing capability. The primary users are authorized devices and have privilege to preferentially utilize the bandwidth resources. The secondary users, on the other hand, are unauthorized devices and can access the spectrum only if the primary transmissions are unaffected. To constrain the unintended secondary interference at the active primary receivers (PRs) while enhance the spectrum accessibility of the secondary users, the guard zone and interference cancellation-based opportunistic spectrum access (GZ-IC OSA) protocol is proposed and analyzed. Under the GZ-IC OSA protocol, by exploiting the cached content as side information, the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file sent by a secondary transmitter (ST) can be effectively cancelled at the unintended active PRs which cache the same file. As such, under the GZ-IC OSA protocol, a ST is allowed to transmit the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file in <inline-formula> <tex-math notation="LaTeX">$\mathcal {F}$ </tex-math></inline-formula> as long as it is outside the union of the guard zones of all active PRs which cache other files except the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file. Assuming decentralized probabilistic caching, under the GZ-IC OSA protocol, we derive the first-order moment measure of the access probabilities of primary transmitters (PTs) and STs, respectively. Further, we capture the conditional spatial distributions of active PTs and STs as piecewise functions with respect to the radius <inline-formula> <tex-math notation="LaTeX">$R_{d}$ </tex-math></inline-formula> of the guard zone. Finally, we evaluate the performance of the proposed GZ-IC OSA protocol in terms of coverage performance and spatial throughput based on the derived conditional spatial distributions. |
topic |
Fog-aided CR networks interference cancellation guard zone opportunistic spectrum access side information coverage probability |
url |
https://ieeexplore.ieee.org/document/8489845/ |
work_keys_str_mv |
AT chaojia fogaidedcognitiveradionetworkswithguardzoneandinterferencecancellationbasedopportunisticspectrumaccess AT xiaoshisong fogaidedcognitiveradionetworkswithguardzoneandinterferencecancellationbasedopportunisticspectrumaccess AT xiangbomeng fogaidedcognitiveradionetworkswithguardzoneandinterferencecancellationbasedopportunisticspectrumaccess |
_version_ |
1724192450497478656 |