To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
If the mind is in tranquility, time and space cease to exist.
Essence of Buddhism
Brief overview
This book provides the principles of digital communication and studies techniques to design and analyze digital communication systems for point-to-point and point-to-multipoint transmission and reception. Other than for radio broadcasting, modern communication systems are going digital, and in the USA the conversion of analog TV broadcasting into digital HDTV broadcasting at the beginning of 2009 signified the coming end of analog communications. Communications between living beings began with the voice, and the three biggest voice systems in the world are the telephone, and the cellular and radio broadcasting systems.
The dissemination of visual activities then propelled the development of TV broadcasting systems. The pioneer telephone network and radio broadcasting systems employed analog communication techniques, such as AM and FM, for transmission of analog voice, as did the analog TV broadcasting systems, which employed VSB-AM for picture transmission. The quality of the message, such as voice and images, at the analog receiver depends on how well the waveform that carries the message over the physical channel (twisted-pair telephone wires, coaxial and fiber-optic cables, space, and water) can be reproduced. In addition, the fidelity of the received message depends on the signal-to-noise ratio at the receiver input. For good analog communications, the signal-to-noise ratio must be large, and this requires high-power transmitters, such as are used in AM radio and TV broadcasting.
In this chapter, opportunistic multiple access to the under-utilized channel resources is investigated. By exploiting source burstiness, secondary cognitive nodes utilize primary nodes' periods of silence to access the channel and transmit their packets. Cognitive relays could also make use of these silent periods to offer spatial diversity without incurring losses of bandwidth efficiency. First, we consider the cognitive cooperation protocol and discuss two different relay-assignment schemes. A comparison of the two schemes is carried out through a maximum stable throughput analysis of the network. Then, secondary nodes' access to the remaining idle channel resources is considered. Queueing-theoretic analysis and numerical results reveal that, despite the fact that relays occupy part of the idle resources to provide cooperation, secondary nodes surprisingly achieve higher throughput in the presence of relays. The rationale is that relays help primary nodes empty their queues at faster rates; therefore, secondary nodes observe increased channel access opportunities. Moreover, the scenario where secondary nodes present themselves as relays to the primary network is also presented. By working as relays, secondary nodes further help primary nodes empty their queues, hence increasing their channel access opportunities and achieving higher throughput, as is revealed by our analytical and numerical results.
Introduction
The scarcity of energy and bandwidth, the two fundamental resources for communications, imposes severe limitations on the development of communications networks in terms of capacity and performance.
A spread spectrum modulated signal has a bandwidth much larger than the bandwidth of its narrowband counterpart for transmitting the message signal. For example, a spread spectrum PSK signal employed in the forward link of the 2G cellular standard IS-95 carrying a coded message signal of symbol rate 19.2 ksps has a bandwidth of 1.25 MHz. The narrowband PSK signal would only require a bandwidth of 19.53 kHz. This is an increase of bandwidth by a factor of 64. What is the reason behind the use of spread spectrum modulation? Historically, spread spectrum modulation originated from military applications. The purpose is to protect the received signal's integrity by reducing the effectiveness of a jamming signal. In order to jam a spread spectrum signal, the jamming signal must distribute its fixed transmitted power over a larger spread bandwidth. This would lower the magnitude of its power spectral density and correspondingly its jamming power in the smaller message bandwidth. There are basically two types of spread spectrum modulated signals: direct sequence (DS) and frequency hop (FH).
Direct sequence modulation
In direct sequence modulation the data 0s and 1s of bit rate Rb = 1/Tb are used to modulate a periodic pseudo-noise (PN) sequence of N chip 0s and 1s. The chip rate is Rc = 1/Tc = NRb, and the sequence period is the same as the bit time.
Various spectrum management schemes have been proposed in recent years to improve the spectrum utilization in cognitive radio networks. However, few of them have considered the existence of cognitive attackers who can adapt their attacking strategy to the time-varying spectrum environment and the secondary users' strategy. In this chapter, we investigate the security mechanism when secondary users are facing a jamming attack, and consider a stochastic game framework for anti-jamming defense. At each stage of the game, secondary users observe the spectrum availability, the channel quality, and the attackers' strategy from the status of jammed channels. According to this observation, they will decide how many channels they should reserve for transmitting control and data messages and how to switch between the different channels. Using minimax-Q learning, secondary users can gradually learn the optimal policy, which maximizes the expected sum of discounted payoffs defined as the spectrum-efficient throughput. The optimal stationary policy in the anti-jamming game is shown to achieve much better performance than the policy obtained from myopic learning, which maximizes only each stage's payoff, and a random defense strategy, since it successfully accommodates the environment dynamics and the strategic behavior of the cognitive attackers.
Introduction
In order to utilize the spectrum resources efficiently, various spectrum management approaches have been considered in the literature and in previous chapters.
Besides the intersymbol interference (ISI) that occurs via channel filtering, a digitally modulated signal can also have ISI when it is transmitted over a multipath fading channel. This type of channel is encountered in all forms of mobile wireless communication. In a multipath fading channel, the transmitted signal arrives at the receiver via multiple paths. These paths generally arise via signal reflection from the ground, hills, buildings, and any other large structures. They also arise from signal diffraction via bending around the corners of buildings or sliding across rooftops. They also can arise via signal scattering from small objects such as vehicles, lamp posts, trees, etc. Each signal path results in a randomly delayed, attenuated, and phase-shifted copy of the transmitted signal. These multipath copies combine at the receiver to give rise to a received signal whose envelope may be described by a Rayleigh fading process (no line-of-sight path), or a Rice fading process (one line-of-sight path), or a Nakagami fading process. Also, because the arrival times of the multipath copies are random, especially in a mobile environment, the multipath copies might overlap the next bit or symbol and hence cause intersymbol interference. This type of ISI cannot be eliminated by pulse shaping dictated by the Nyquist criterion for zero ISI, but can be alleviated by equalization (as discussed in Chapter 9). The above effects are collectively called fading. A fading channel that exhibits ISI is called a frequency-selective fading channel.
In self-organized mobile ad hoc networks (MANETs), where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this chapter, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game-theoretic framework for dynamic pricing-based routing in MANETs is considered to maximize the sender/receiver's payoff by invoking the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services on the basis of auction rules and introducing a cartel-maintenance enforcing mechanism. The simulation results illustrate that the dynamic pricing-based routing approach provides significant performance gains over the existing static pricing approaches.
Introduction
In recent years, MANETs have received much attention due to their potential applications and the proliferation of mobile devices. In general, MANETs wireless multi-hop networks formed by a set of mobile nodes without requiring centralized administration or fixed network infrastructure, in which nodes can communicate with other nodes located beyond their direct-transmission ranges through cooperatively forwarding packets for each other. In traditional crisis or military situations, the nodes in a MANET usually belong to the same authority and work in a fully cooperative way of unconditionally forwarding packets for each other to achieve their common goals.
In a cognitive radio network, collusion among selfish users may have seriously deleterious effects on the efficiency of dynamic spectrum sharing. The network users' behaviors and dynamics need to be taken into consideration for efficient and robust spectrum allocation. In this chapter, we model spectrum allocation in wireless networks with multiple selfish legacy spectrum holders and unlicensed users as multi-stage dynamic games. In order to combat user collusion, we present a pricing-based collusion-resistant approach for dynamic spectrum allocation to optimize overall spectrum efficiency, while not only keeping the incentives to participate of the selfish users but also combating possible user collusion. The simulation results show that the scheme achieves a high efficiency of spectrum usage even with severe user collusion.
Introduction
Traditional network-wide spectrum assignment is carried out by a central server, namely a spectrum broker. Distributed spectrum allocation approaches that enable efficient spectrum sharing solely on the basis of local observations have recently been studied. From the economic point of view, the deregulation of spectrum use further encourages market mechanisms for implementing efficient spectrum allocation.
Because of the spectrum dynamics and lack of centralized authority, the spectrum allocation needs to distributively adapt to the dynamics of wireless networks due to node mobility, channel variations or varying wireless traffic on the basis of local observed information. From the game-theoretic point of view, first of all, the spectrum allocation needs to be studied in a multi-stage dynamic game framework instead of the static game approach.
Cooperative spectrum sensing has been shown to be able to greatly improve the sensing performance in cognitive radio networks. However, if cognitive users belong to different service providers, they tend to contribute less to sensing in order to increase their own throughput. In this chapter, we discuss an evolutionary game framework to answer the question of “how to collaborate” in multiuser decentralized cooperative spectrum sensing, because evolutionary game theory provides an excellent means to address the strategic uncertainty that a user/player may face by exploring different actions, adaptively learning during the strategic interactions, and approaching the best response strategy under changing conditions and environments using replicator dynamics. We derive the behavior dynamics and the evolutionarily stable strategy (ESS) of the secondary users. We then prove that the dynamics converge to the ESS, which makes possible a decentralized implementation of the proposed sensing game. Employing the dynamics, we further develop a distributed learning algorithm so that the secondary users approach the ESS solely on the basis of their own payoff observations. Simulation results show that the average throughput achieved in the proposed cooperative sensing game is higher than that in the case in which secondary users sense the primary user individually without cooperation. The proposed game is demonstrated to converge to the ESS, and to achieve a higher system throughput than that of the fully cooperative scenario, in which all users contribute to sensing in every time slot.
With the rapid deployment of new wireless devices and applications, the last decade has witnessed a growing demand for wireless radio spectrum. However, the policy of fixed spectrum assignment produces a bottleneck for more efficient spectrum utilization, such that a great portion of the licensed spectrum is severely under-utilized. The inefficient usage of the limited spectrum resources has motivated the regulatory bodies to review their policy and start to seek innovative communication technology that can exploit the wireless spectrum in a more intelligent and flexible way. The concept of cognitive radio was proposed to address the issue of spectrum efficiency and has been receiving increasing attention in recent years, since it equips wireless users with the capability to optimally adapt their operating parameters according to the interactions with the surrounding radio environment. There have been many significant developments in the past few years concerning cognitive radios. In this chapter, the fundamentals of cognitive radio technology, including the architecture of a cognitive radio network and its applications, are introduced. The existing works on spectrum sensing are reviewed, and important issues in dynamic spectrum allocation and sharing are discussed in detail. Finally, an overview on implementation of cognitive radio platforms and standards for cognitive radio technology is provided.
Introduction
The usage of radio spectrum resources and the regulation of radio emissions are coordinated by national regulatory bodies such as the Federal Communications Commission (FCC).
Recent increases in demand for cognitive radio technology have driven researchers and technologists to rethink the implications of the traditional engineering designs and approaches to communications and networking. One issue is that the traditional thinking is that one should try to have more bandwidth, more resources, and more of everything, while we have come to the realization that the problem is not that we do not have enough bandwidth or resources. It is rather that the bandwidth/resource utilization rates in many cases are too low. For example, the TV bandwidth utilization nowadays in the USA is less than 6%, which is quite similar to that in most developed countries. So why continue wanting to obtain more new bandwidth when it is indeed a scarce commodity already? Why not just utilize the wasted resource in a more effective way?
Another reconsideration is that often one can find the optimization tools and solutions employed in engineering problems being too rigid, without offering much flexibility, adaptation, and learning. The super highway is a typical example in that, during traffic hours, one direction is completely jammed with bumper-to-bumper cars, while the other direction has few cars with mostly empty four-lane way. That is almost the case for networking as well. Rigid, inflexible protocols and strategies often leave wasted resources that could otherwise be efficiently utilized by others. It was recognized that traditional communication and networking paradigms have taken little or no situational information into consideration by offering cognitive processing, reasoning, learning, and adaptation.
Since in ad hoc networks nodes need to cooperatively forward packets for each other, without necessary countermeasures, such networks are extremely vulnerable to traffic-injection attacks, especially to those attacks launched by insider attackers. Injecting an overwhelming amount of traffic into the network can easily cause network congestion and decrease the network lifetime. In this chapter we focus on traffic-injection attacks launched by insider attackers. After investigating the possible types of traffic-injection attacks, we present two sets of defense mechanisms to combat such attacks. The first set of defense mechanisms is fully distributed, whereas the second is centralized with decentralized implementation. The detection performance of each of the mechanisms is also formally analyzed. Both theoretical analysis and experimental studies have demonstrated that, with such defense mechanisms, there is hardly any gain to be obtained by launching traffic-injection attacks from the attackers' point of view.
Introduction
In this chapter, we study a class of powerful attacks: traffic-injection attacks. Specifically, attackers inject an overwhelming amount of traffic into the network in an attempt to consume valuable network resources, and consequently degrade the network performance. Since, in ad hoc networks, nodes need to cooperatively forward packets for other nodes, such networks are extremely vulnerable to traffic-injection attacks, especially those launched by insider attackers.
Roughly speaking, traffic-injection attacks can be classified into two types: query-flooding attacks and injecting-data-packets attacks (IDPAs). Owing to the changing topology or traffic pattern, nodes in ad hoc networks may need to frequently update their routes, which may require broadcasting route-query messages.