Table Of ContentSSyyrraaccuussee UUnniivveerrssiittyy
SSUURRFFAACCEE
Dissertations - ALL SURFACE
August 2016
RReessoouurrccee AAllllooccaattiioonn ffoorr IInntteerrffeerreennccee MMaannaaggeemmeenntt iinn WWiirreelleessss
NNeettwwoorrkkss
Raghed El Bardan
Syracuse University
Follow this and additional works at: https://surface.syr.edu/etd
Part of the Engineering Commons
RReeccoommmmeennddeedd CCiittaattiioonn
El Bardan, Raghed, "Resource Allocation for Interference Management in Wireless Networks" (2016).
Dissertations - ALL. 663.
https://surface.syr.edu/etd/663
This Dissertation is brought to you for free and open access by the SURFACE at SURFACE. It has been accepted for
inclusion in Dissertations - ALL by an authorized administrator of SURFACE. For more information, please contact
surface@syr.edu.
ABSTRACT
Interference in wireless networks is a major problem that impacts system performance quite
substantially. Combined with the fact that the spectrum is limited and scarce, the performance
and reliability of wireless systems significantly deteriorates and, hence, communication sessions
are put at the risk of failure. In an attempt to make transmissions resilient to interference and,
accordingly,designrobustwirelesssystems,adiversesetofinterferencemitigationtechniquesare
investigatedinthisdissertation.
Dependingontherationalemotivatingtheinterferingnode,interferencecanbedividedintotwo
categories,communicationandjamming. Forcommunicationinterferencesuchastheinterference
createdbylegacyusers(e.g.,primaryusertransmittersinacognitiveradionetwork)atnon-legacy
orunlicensedusers(e.g.,secondaryuserreceivers),twomitigationtechniquesarepresentedinthis
dissertation. One exploits permutation trellis codes combined with M-ary frequency shift keying
inordertomakeSUtransmissionsresilienttoPUs’interference,whiletheotherutilizesfrequency
allocation as a mitigation technique against SU interference using Matching theory. For jamming
interference, two mitigation techniques are also investigated here. One technique exploits time
and structures a jammer mitigation framework through an automatic repeat request protocol. The
other one utilizes power and, following a game-theoretic framework, employs a defense strategy
againstjammingbasedonastrategicpowerallocation. Superiorperformanceofalloftheproposed
mitigationtechniquesisshownvianumericalresults.
RESOURCE ALLOCATION FOR INTERFERENCE
MANAGEMENT IN WIRELESS NETWORKS
By
Raghed Ahmad El Bardan
B.E.,LebaneseAmericanUniversity,2007
M.Sc.,LebaneseAmericanUniversity,2009
DISSERTATION
Submittedinpartialfulfillmentoftherequirementsforthedegreeof
DoctorofPhilosophyinElectricalandComputerEngineering
SyracuseUniversity
August 2016
Copyright⃝c 2016RaghedAhmadElBardan
Allrightsreserved
A
CKNOWLEDGMENTS
IwouldliketothankmyPh.Dadvisor,ProfessorPramodK.Varshney,forsupportingme
duringthepastcoupleofyears. Iamtrulyfortunatetohavehadtheopportunitytowork
withhim. Iamgratefultohimforhisscientificknowledge,methodicaladvice,andmany
keensuggestionsanddiscussions. ProfessorVarshneyissomeoneyouwillinstantlylove
andneverforget. HeisthefunniestadvisorandoneofthesmartestpeopleIknow. Ihope
that I could be as spirited and exuberant as him and to someday be able to command an
audienceaswellashecan. Iwillforeverbethankfultohim.
I would also like to thank my committee members, Professors Mustafa Cenk Gursoy,
Yingbin Liang, Jian Tang, Qi Cheng, and H. Ezzat Khalifa for the thought-instigating
suggestions,constructivefeedback,valuableguidance,andgenuinecollegialitythateach
of them provided. Along the same lines, I would like to recognize the faculty members
inthedepartmentofElectricalEngineeringandComputerScienceatSyracuseUniversity
with whom I interacted, for the contributions that they made to my intellectual growth
duringmyyearsofstudyatSyracuseUniversity.
I am also thankful to a handful of collaborators, Drs. Yunghsiang Sam Han, Walid
Saad, Swastik Brahma, Engin Masazade, and Onur Ozdemir, for their insightful discus-
sionsandfeedbackaboutmyresearch.
Furthermore, I was lucky enough to be a member of the "Sensor Fusion" Lab at Syra-
cuseUniversity. IamverygratefultoAditya,Arun,Bhavya,Hao,Nianxia,Sid,Sijia,and
allthecurrentandpastmembersoftheLab. Ourfriendshipmeansalottome.
I especially thank my mom, dad, and brother. My parents have sacrificed their lives
iv
for my brother and I and have always provided unconditional love and care. In simple
words, I would not have made it this far without them. I know that I always have them
tocounton.
v
ToMarwa,Ahmad,andRawad
fortheirendlesssupportandunconditionallove.
T C
ABLE OF ONTENTS
Acknowledgments v
ListofTables x
ListofFigures xi
1 Introduction 1
1.1 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 State-of-the-artDefenseTechniques . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.1 ForwardError-correctionCoding . . . . . . . . . . . . . . . . . . . . . . 5
1.2.2 Re-transmissionProtocols . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.3 Power/FrequencyAllocation . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 MajorContributionsandDissertationOutline . . . . . . . . . . . . . . . . . . . . 6
1.4 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2 MitigationofPrimaryUserInterferenceviaPermutationTrellisCodes 10
2.1 LiteratureReview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2 Motivation,Novelty,andContributions . . . . . . . . . . . . . . . . . . . . . . . . 13
2.3 SystemModel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.4 BitErrorRateAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.4.1 ComputationoflikelihoodsintheabsenceofPU . . . . . . . . . . . . . . 27
2.4.2 ComputationoflikelihoodsinthepresenceofPU . . . . . . . . . . . . . . 28
2.5 ThroughputAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
vii
2.5.1 LicensedChannelDynamicOccupancyModel . . . . . . . . . . . . . . . 30
2.5.2 ThroughputAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.6 NumericalResultsandDiscussion . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.6.1 ApproximateBERwithSinglePermanentPUInterference . . . . . . . . . 32
2.6.2 ThroughputAnalysisof H-FSK . . . . . . . . . . . . . . . . . . . . . . . 34
2.6.3 SULink’sResiliencyinthePresenceofMultiplePUs . . . . . . . . . . . 38
2.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3 MitigationofSUInterferenceviaaMatching-basedFrequencyAllocation 42
3.1 LiteratureReview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.2 Motivation,Novelty,andContributions . . . . . . . . . . . . . . . . . . . . . . . . 44
3.3 SystemModel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.4 SpectrumAllocationasaMatchingGame . . . . . . . . . . . . . . . . . . . . . . 49
3.4.1 MatchingConcepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.4.2 PreferencesandProposalsoftheSUs . . . . . . . . . . . . . . . . . . . . 50
3.4.3 PreferencesofthePUs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.5 SolutionConceptandProposedAlgorithm . . . . . . . . . . . . . . . . . . . . . . 52
3.6 NumericalResults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
3.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4 MitigationofJammingInterferenceviaARQProtocols 59
4.1 LiteratureReview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.2 Motivation,Novelty,andContributions . . . . . . . . . . . . . . . . . . . . . . . . 60
4.3 SystemModelandProblemFormulation . . . . . . . . . . . . . . . . . . . . . . . 61
4.3.1 ProblemFormulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.4 ApproximateMinimaxEnergyAllocationsforafixedT . . . . . . . . . . . . . . 63
4.4.1 Upper-bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.4.2 Lower-bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
viii
4.4.3 EquilibriumAnalysisofProblem4.P2-B . . . . . . . . . . . . . . . . . . 68
4.4.4 Discussion: ImpactofRetransmissionsonSystem-Performance . . . . . . 69
4.5 Minimization of the Number of Transmission Attempts for Successful Communi-
cation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.6 NumericalResults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
5 MitigationofJammingInterferenceviaaStrategicPowerAllocation 74
5.1 LiteratureReview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
5.2 Motivation,Novelty,andContributions . . . . . . . . . . . . . . . . . . . . . . . . 77
5.3 SystemModelandProblemFormulation . . . . . . . . . . . . . . . . . . . . . . . 78
5.4 EquilibriumAnalysis: Channelsareavailable . . . . . . . . . . . . . . . . . . . . 82
5.4.1 Solutionof5.P1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
5.4.2 Solutionof5.P2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
5.5 OptimalPowerAllocationforDifferentInstantiationsandKnowledgeLevel . . . . 86
5.5.1 Multi-pathFadingModelwithIncompleteKnowledgeofChannelGains . 88
5.5.2 SimplifiedPath-LossModelandIncompleteKnowledgeofd . . . . . . . 90
Ji
5.6 Sensing-basedSpectrumAccess . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.6.1 ProblemFormulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.6.2 EquilibriumAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.7 NumericalResults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
5.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
6 Conclusion 106
6.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
6.2 FutureWork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
References 110
ix
Description:interference, two mitigation techniques are also investigated here. and structures a jammer mitigation framework through an automatic repeat .. the jammer share the same communication medium and band. IEEE Global Conference on Signal and Information Processing, Atlanta, GA, 2014, pp.