Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access

We investigate the spatial spectrum sharing mechanism design in fog-aided cognitive radio (CR) networks with the methods of guard zone and interference cancellation. Particularly, it is assumed that the studied CR network is comprised of a library of multimedia files <inline-formula> <tex-m...

Full description

Bibliographic Details
Main Authors: Chao Jia, Xiaoshi Song, Xiangbo Meng
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8489845/
id doaj-8df9146597194dbfa77891b3eea4845f
record_format Article
spelling doaj-8df9146597194dbfa77891b3eea4845f2021-03-29T21:40:44ZengIEEEIEEE Access2169-35362018-01-016591825919110.1109/ACCESS.2018.28755968489845Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum AccessChao Jia0Xiaoshi Song1https://orcid.org/0000-0003-1784-7710Xiangbo Meng2School of Computer Science and Engineering, Northeastern University, Shenyang, ChinaSchool of Computer Science and Engineering, Northeastern University, Shenyang, ChinaSchool of Computer Science and Engineering, Northeastern University, Shenyang, ChinaWe investigate the spatial spectrum sharing mechanism design in fog-aided cognitive radio (CR) networks with the methods of guard zone and interference cancellation. Particularly, it is assumed that the studied CR network is comprised of a library of multimedia files <inline-formula> <tex-math notation="LaTeX">$\mathcal {F}$ </tex-math></inline-formula> with size <inline-formula> <tex-math notation="LaTeX">$F$ </tex-math></inline-formula> and two types of users, namely the primary and secondary users, with fog computing capability. The primary users are authorized devices and have privilege to preferentially utilize the bandwidth resources. The secondary users, on the other hand, are unauthorized devices and can access the spectrum only if the primary transmissions are unaffected. To constrain the unintended secondary interference at the active primary receivers (PRs) while enhance the spectrum accessibility of the secondary users, the guard zone and interference cancellation-based opportunistic spectrum access (GZ-IC OSA) protocol is proposed and analyzed. Under the GZ-IC OSA protocol, by exploiting the cached content as side information, the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file sent by a secondary transmitter (ST) can be effectively cancelled at the unintended active PRs which cache the same file. As such, under the GZ-IC OSA protocol, a ST is allowed to transmit the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file in <inline-formula> <tex-math notation="LaTeX">$\mathcal {F}$ </tex-math></inline-formula> as long as it is outside the union of the guard zones of all active PRs which cache other files except the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file. Assuming decentralized probabilistic caching, under the GZ-IC OSA protocol, we derive the first-order moment measure of the access probabilities of primary transmitters (PTs) and STs, respectively. Further, we capture the conditional spatial distributions of active PTs and STs as piecewise functions with respect to the radius <inline-formula> <tex-math notation="LaTeX">$R_{d}$ </tex-math></inline-formula> of the guard zone. Finally, we evaluate the performance of the proposed GZ-IC OSA protocol in terms of coverage performance and spatial throughput based on the derived conditional spatial distributions.https://ieeexplore.ieee.org/document/8489845/Fog-aided CR networksinterference cancellationguard zoneopportunistic spectrum accessside informationcoverage probability
collection DOAJ
language English
format Article
sources DOAJ
author Chao Jia
Xiaoshi Song
Xiangbo Meng
spellingShingle Chao Jia
Xiaoshi Song
Xiangbo Meng
Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access
IEEE Access
Fog-aided CR networks
interference cancellation
guard zone
opportunistic spectrum access
side information
coverage probability
author_facet Chao Jia
Xiaoshi Song
Xiangbo Meng
author_sort Chao Jia
title Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access
title_short Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access
title_full Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access
title_fullStr Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access
title_full_unstemmed Fog-Aided Cognitive Radio Networks With Guard Zone and Interference Cancellation Based Opportunistic Spectrum Access
title_sort fog-aided cognitive radio networks with guard zone and interference cancellation based opportunistic spectrum access
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description We investigate the spatial spectrum sharing mechanism design in fog-aided cognitive radio (CR) networks with the methods of guard zone and interference cancellation. Particularly, it is assumed that the studied CR network is comprised of a library of multimedia files <inline-formula> <tex-math notation="LaTeX">$\mathcal {F}$ </tex-math></inline-formula> with size <inline-formula> <tex-math notation="LaTeX">$F$ </tex-math></inline-formula> and two types of users, namely the primary and secondary users, with fog computing capability. The primary users are authorized devices and have privilege to preferentially utilize the bandwidth resources. The secondary users, on the other hand, are unauthorized devices and can access the spectrum only if the primary transmissions are unaffected. To constrain the unintended secondary interference at the active primary receivers (PRs) while enhance the spectrum accessibility of the secondary users, the guard zone and interference cancellation-based opportunistic spectrum access (GZ-IC OSA) protocol is proposed and analyzed. Under the GZ-IC OSA protocol, by exploiting the cached content as side information, the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file sent by a secondary transmitter (ST) can be effectively cancelled at the unintended active PRs which cache the same file. As such, under the GZ-IC OSA protocol, a ST is allowed to transmit the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file in <inline-formula> <tex-math notation="LaTeX">$\mathcal {F}$ </tex-math></inline-formula> as long as it is outside the union of the guard zones of all active PRs which cache other files except the <inline-formula> <tex-math notation="LaTeX">$f$ </tex-math></inline-formula>-th file. Assuming decentralized probabilistic caching, under the GZ-IC OSA protocol, we derive the first-order moment measure of the access probabilities of primary transmitters (PTs) and STs, respectively. Further, we capture the conditional spatial distributions of active PTs and STs as piecewise functions with respect to the radius <inline-formula> <tex-math notation="LaTeX">$R_{d}$ </tex-math></inline-formula> of the guard zone. Finally, we evaluate the performance of the proposed GZ-IC OSA protocol in terms of coverage performance and spatial throughput based on the derived conditional spatial distributions.
topic Fog-aided CR networks
interference cancellation
guard zone
opportunistic spectrum access
side information
coverage probability
url https://ieeexplore.ieee.org/document/8489845/
work_keys_str_mv AT chaojia fogaidedcognitiveradionetworkswithguardzoneandinterferencecancellationbasedopportunisticspectrumaccess
AT xiaoshisong fogaidedcognitiveradionetworkswithguardzoneandinterferencecancellationbasedopportunisticspectrumaccess
AT xiangbomeng fogaidedcognitiveradionetworkswithguardzoneandinterferencecancellationbasedopportunisticspectrumaccess
_version_ 1724192450497478656