SSyyrraaccuussee UUnniivveerrssiittyy SSUURRFFAACCEE Dissertations - ALL SURFACE August 2016 RReessoouurrccee AAllllooccaattiioonn ffoorr IInntteerrffeerreennccee MMaannaaggeemmeenntt iinn WWiirreelleessss NNeettwwoorrkkss Raghed El Bardan Syracuse University Follow this and additional works at: https://surface.syr.edu/etd Part of the Engineering Commons RReeccoommmmeennddeedd CCiittaattiioonn El Bardan, Raghed, "Resource Allocation for Interference Management in Wireless Networks" (2016). Dissertations - ALL. 663. https://surface.syr.edu/etd/663 This Dissertation is brought to you for free and open access by the SURFACE at SURFACE. It has been accepted for inclusion in Dissertations - ALL by an authorized administrator of SURFACE. For more information, please contact [email protected]. ABSTRACT Interference in wireless networks is a major problem that impacts system performance quite substantially. Combined with the fact that the spectrum is limited and scarce, the performance and reliability of wireless systems significantly deteriorates and, hence, communication sessions are put at the risk of failure. In an attempt to make transmissions resilient to interference and, accordingly,designrobustwirelesssystems,adiversesetofinterferencemitigationtechniquesare investigatedinthisdissertation. Dependingontherationalemotivatingtheinterferingnode,interferencecanbedividedintotwo categories,communicationandjamming. Forcommunicationinterferencesuchastheinterference createdbylegacyusers(e.g.,primaryusertransmittersinacognitiveradionetwork)atnon-legacy orunlicensedusers(e.g.,secondaryuserreceivers),twomitigationtechniquesarepresentedinthis dissertation. One exploits permutation trellis codes combined with M-ary frequency shift keying inordertomakeSUtransmissionsresilienttoPUs’interference,whiletheotherutilizesfrequency allocation as a mitigation technique against SU interference using Matching theory. For jamming interference, two mitigation techniques are also investigated here. One technique exploits time and structures a jammer mitigation framework through an automatic repeat request protocol. The other one utilizes power and, following a game-theoretic framework, employs a defense strategy againstjammingbasedonastrategicpowerallocation. Superiorperformanceofalloftheproposed mitigationtechniquesisshownvianumericalresults. RESOURCE ALLOCATION FOR INTERFERENCE MANAGEMENT IN WIRELESS NETWORKS By Raghed Ahmad El Bardan B.E.,LebaneseAmericanUniversity,2007 M.Sc.,LebaneseAmericanUniversity,2009 DISSERTATION Submittedinpartialfulfillmentoftherequirementsforthedegreeof DoctorofPhilosophyinElectricalandComputerEngineering SyracuseUniversity August 2016 Copyright⃝c 2016RaghedAhmadElBardan Allrightsreserved A CKNOWLEDGMENTS IwouldliketothankmyPh.Dadvisor,ProfessorPramodK.Varshney,forsupportingme duringthepastcoupleofyears. Iamtrulyfortunatetohavehadtheopportunitytowork withhim. Iamgratefultohimforhisscientificknowledge,methodicaladvice,andmany keensuggestionsanddiscussions. ProfessorVarshneyissomeoneyouwillinstantlylove andneverforget. HeisthefunniestadvisorandoneofthesmartestpeopleIknow. Ihope that I could be as spirited and exuberant as him and to someday be able to command an audienceaswellashecan. Iwillforeverbethankfultohim. I would also like to thank my committee members, Professors Mustafa Cenk Gursoy, Yingbin Liang, Jian Tang, Qi Cheng, and H. Ezzat Khalifa for the thought-instigating suggestions,constructivefeedback,valuableguidance,andgenuinecollegialitythateach of them provided. Along the same lines, I would like to recognize the faculty members inthedepartmentofElectricalEngineeringandComputerScienceatSyracuseUniversity with whom I interacted, for the contributions that they made to my intellectual growth duringmyyearsofstudyatSyracuseUniversity. I am also thankful to a handful of collaborators, Drs. Yunghsiang Sam Han, Walid Saad, Swastik Brahma, Engin Masazade, and Onur Ozdemir, for their insightful discus- sionsandfeedbackaboutmyresearch. Furthermore, I was lucky enough to be a member of the "Sensor Fusion" Lab at Syra- cuseUniversity. IamverygratefultoAditya,Arun,Bhavya,Hao,Nianxia,Sid,Sijia,and allthecurrentandpastmembersoftheLab. Ourfriendshipmeansalottome. I especially thank my mom, dad, and brother. My parents have sacrificed their lives iv for my brother and I and have always provided unconditional love and care. In simple words, I would not have made it this far without them. I know that I always have them tocounton. v ToMarwa,Ahmad,andRawad fortheirendlesssupportandunconditionallove. T C ABLE OF ONTENTS Acknowledgments v ListofTables x ListofFigures xi 1 Introduction 1 1.1 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 State-of-the-artDefenseTechniques . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2.1 ForwardError-correctionCoding . . . . . . . . . . . . . . . . . . . . . . 5 1.2.2 Re-transmissionProtocols . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.2.3 Power/FrequencyAllocation . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.3 MajorContributionsandDissertationOutline . . . . . . . . . . . . . . . . . . . . 6 1.4 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2 MitigationofPrimaryUserInterferenceviaPermutationTrellisCodes 10 2.1 LiteratureReview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.2 Motivation,Novelty,andContributions . . . . . . . . . . . . . . . . . . . . . . . . 13 2.3 SystemModel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.4 BitErrorRateAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 2.4.1 ComputationoflikelihoodsintheabsenceofPU . . . . . . . . . . . . . . 27 2.4.2 ComputationoflikelihoodsinthepresenceofPU . . . . . . . . . . . . . . 28 2.5 ThroughputAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 vii 2.5.1 LicensedChannelDynamicOccupancyModel . . . . . . . . . . . . . . . 30 2.5.2 ThroughputAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 2.6 NumericalResultsandDiscussion . . . . . . . . . . . . . . . . . . . . . . . . . . 32 2.6.1 ApproximateBERwithSinglePermanentPUInterference . . . . . . . . . 32 2.6.2 ThroughputAnalysisof H-FSK . . . . . . . . . . . . . . . . . . . . . . . 34 2.6.3 SULink’sResiliencyinthePresenceofMultiplePUs . . . . . . . . . . . 38 2.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3 MitigationofSUInterferenceviaaMatching-basedFrequencyAllocation 42 3.1 LiteratureReview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 3.2 Motivation,Novelty,andContributions . . . . . . . . . . . . . . . . . . . . . . . . 44 3.3 SystemModel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 3.4 SpectrumAllocationasaMatchingGame . . . . . . . . . . . . . . . . . . . . . . 49 3.4.1 MatchingConcepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 3.4.2 PreferencesandProposalsoftheSUs . . . . . . . . . . . . . . . . . . . . 50 3.4.3 PreferencesofthePUs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 3.5 SolutionConceptandProposedAlgorithm . . . . . . . . . . . . . . . . . . . . . . 52 3.6 NumericalResults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 3.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 4 MitigationofJammingInterferenceviaARQProtocols 59 4.1 LiteratureReview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 4.2 Motivation,Novelty,andContributions . . . . . . . . . . . . . . . . . . . . . . . . 60 4.3 SystemModelandProblemFormulation . . . . . . . . . . . . . . . . . . . . . . . 61 4.3.1 ProblemFormulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 4.4 ApproximateMinimaxEnergyAllocationsforafixedT . . . . . . . . . . . . . . 63 4.4.1 Upper-bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 4.4.2 Lower-bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 viii 4.4.3 EquilibriumAnalysisofProblem4.P2-B . . . . . . . . . . . . . . . . . . 68 4.4.4 Discussion: ImpactofRetransmissionsonSystem-Performance . . . . . . 69 4.5 Minimization of the Number of Transmission Attempts for Successful Communi- cation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 4.6 NumericalResults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 4.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 5 MitigationofJammingInterferenceviaaStrategicPowerAllocation 74 5.1 LiteratureReview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 5.2 Motivation,Novelty,andContributions . . . . . . . . . . . . . . . . . . . . . . . . 77 5.3 SystemModelandProblemFormulation . . . . . . . . . . . . . . . . . . . . . . . 78 5.4 EquilibriumAnalysis: Channelsareavailable . . . . . . . . . . . . . . . . . . . . 82 5.4.1 Solutionof5.P1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 5.4.2 Solutionof5.P2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 5.5 OptimalPowerAllocationforDifferentInstantiationsandKnowledgeLevel . . . . 86 5.5.1 Multi-pathFadingModelwithIncompleteKnowledgeofChannelGains . 88 5.5.2 SimplifiedPath-LossModelandIncompleteKnowledgeofd . . . . . . . 90 Ji 5.6 Sensing-basedSpectrumAccess . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 5.6.1 ProblemFormulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 5.6.2 EquilibriumAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 5.7 NumericalResults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 5.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 6 Conclusion 106 6.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 6.2 FutureWork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 References 110 ix
Description: