Optimal power allocation in cognitive radio based machine-to-machine network

被引:2
|
作者
Yao, Haipeng [1 ]
Huang, Tao [1 ]
Zhao, Chenglin [1 ]
Kang, Xiaoyong [2 ]
Liu, Zhongya [3 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] China Transport Telecommun & Informat Ctr, Beijing 100876, Peoples R China
[3] State Radio Monitoring Ctr, Beijing 100876, Peoples R China
关键词
Machine to machine; Cognitive radio; Interference constrains; Optimal power allocation; Admission control;
D O I
10.1186/1687-1499-2014-82
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate the optimal power allocation strategy in a cognitive radio-based machine-to-machine (M2M) network where a licensed primary user and multiple unlicensed M2M devices coexist and operate in the same licensed spectrum. We develop a connectivity establishment mechanism in M2M network based on the cognitive radio scheme and propose an optimal power allocation scheme which achieves the maximum system utility while satisfying the QoS requirement of M2M devices and interference constraints of the primary user. The simulation results show that the proposed algorithm achieves better performance.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Code-expanded radio access protocol for machine-to-machine communications
    Thomsen, Henning
    Pratas, Nuno K.
    Stefanovic, Cedomir
    Popovski, Petar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2013, 24 (04): : 355 - 365
  • [42] Polarization Angle Diversity for Highly-Reliable Machine-to-Machine Radio
    Takei, K.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 825 - 828
  • [43] A limited feedback based network coding retransmission scheme for machine-to-machine wireless broadcasting
    Wang, Jian
    Xu, Youyun
    Wang, Cong
    Xu, Kui
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2016, 27 (12): : 1612 - 1627
  • [44] Railway Security Through Novel Machine-to-Machine Network Implementation
    Suman, Chitra
    Tharani, Lokesh
    Maheshwari, Saurabh
    COMPUTING AND NETWORK SUSTAINABILITY, 2017, 12 : 379 - 388
  • [45] Priority-Based Machine-To-Machine Overlay Network over LTE for a Smart City
    Khan, Nargis
    Misic, Jelena
    Misic, Vojislav B.
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2018, 7 (03):
  • [46] In-Network Computations of Machine-to-Machine Communications for Wireless Robotics
    Fan-Min Tseng
    Chi-Heng Lin
    Kwang-Cheng Chen
    Wireless Personal Communications, 2013, 70 : 1097 - 1119
  • [47] Power-Efficient System Design for Cellular-Based Machine-to-Machine Communications
    Dhillon, Harpreet S.
    Huang, Howard C.
    Viswanathan, Harish
    Valenzuela, Reinaldo A.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (11) : 5740 - 5753
  • [48] Multiple Access Rateless Network Coding for Machine-to-Machine Communications
    JIAO Jian
    Rana Abbas
    LI Yonghui
    ZHANG Qinyu
    ZTE Communications, 2016, 14 (04) : 35 - 41
  • [49] In-Network Computations of Machine-to-Machine Communications for Wireless Robotics
    Tseng, Fan-Min
    Lin, Chi-Heng
    Chen, Kwang-Cheng
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (03) : 1097 - 1119
  • [50] A security authentication scheme in machine-to-machine home network service
    Sun, Xuebin
    Men, Shuang
    Zhao, Chenglin
    Zhou, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2678 - 2686