Sunteți pe pagina 1din 4

Next generation cellular networks not only demand high user and cell

capacity but also require improved coverage, energy efficiency, quality of


service as well as security of wireless communications. In past few years,
growing demands of higher data rates in next generation cellular
environment led to an extensive research in heterogeneous networks
(HetNets). In this paper, we compare the two different two-tier base station
deployment strategies (Two-tier pico only and Two-tier femto only) with
three-tier heterogeneous network for resource allocation and user
association. Here, the convex problem is to minimize the amount of
resource required to satisfy each users data rate demand. Three tier
network uses a distributed algorithm based on dual ascent method for
determining rate bias values used for resource allocation by base station. In
addition, use of a heuristic distributed algorithm along with smoothing
algorithm provide better results when compared with both the two-tier
networks. Numerical results are presented to illustrate the results.
\documentclass[conference]{IEEEtran}
\usepackage{cite}
\ifCLASSINFOpdf
\usepackage[pdftex]{graphicx}
\graphicspath{./Images/}
\DeclareGraphicsExtensions{.pdf,.jpeg,.png,.eps}
\else
\usepackage[dvips]{graphicx}
\graphicspath{{./Images/}}
\DeclareGraphicsExtensions{.eps}
\fi
\usepackage[cmex10]{amsmath}
% *** SPECIALIZED LIST PACKAGES ***
%
%\usepackage{algorithmic}
% The latest version and documentation of algorithmic.sty can be obtained
at:
% http://www.ctan.org/tex-archive/macros/latex/contrib/algorithms/
% There is also a support site at:
% http://algorithms.berlios.de/index.html
% Also of interest may be the (relatively newer and more customizable)
% algorithmicx.sty package by Szasz Janos:
% http://www.ctan.org/tex-archive/macros/latex/contrib/algorithmicx/
\hyphenation{op-tical net-works semi-conduc-tor}
\begin{document}
\title{Distributed Convex Optimizing for Resource Allocation in Networks}
\author{\IEEEauthorblockN{Ajay Dagar(14204262)\IEEEauthorrefmark{1} and
Udit Kumar(14104179)\IEEEauthorrefmark{2}}

\IEEEauthorblockA{Depatment of Electrical Engineering, Indian Institute


of Technology Kanpur\\
Kanpur, Uttar Pradesh, India.\\
Email: \IEEEauthorrefmark{1}ojpandey@iitk.ac.in,
\IEEEauthorrefmark{2}vishnuv@iitk.ac.in}
}
\maketitle
\begin{abstract}

Next generation cellular networks not only demand high user and cell
capacity but also require improved coverage, energy efficiency, quality of
service as well as security of wireless communications. In past few years,
growing demands of higher data rates in next generation cellular
environment led to an extensive research in heterogeneous networks
(HetNets). In this paper, we compare the two different two-tier base station
deployment strategies (Two-tier pico only and Two-tier femto only) with
three-tier heterogeneous network for resource allocation and user
association. Here, the convex problem is to minimize the amount of
resource required to satisfy each users data rate demand. Three tier
network uses a distributed algorithm based on dual ascent method for
determining rate bias values used for resource allocation by base station. In
addition, use of a heuristic distributed algorithm along with smoothing
algorithm provide better results when compared with both the two-tier
networks. Numerical results are presented to illustrate the results.
\smallskip \smallskip
\\{\indent\textit{Index Terms}\textemdash }.
\end{abstract}

\begin{thebibliography}{1}

\bibitem{a}
Suhas~Mathur, Alex~Reznik, Chunxuan~Ye, Rajat~Mukherjee, Akbar~Rahman,
Yogendra~Shah, and Wade~Trappe, ``Exploiting the physical layer for
enhanced security [security and privacy in emerging wireless
networks]'' \emph{Wireless Communications, IEEE Journal}, vol.17, no.5,
pp.63-70, October 2010.
\bibitem{b}
LAN/MAN Standards Committee and others, ``IEEE Standards for Local and
Metropolitan Area Network: Part 16: Air Interface for Fixed Broadband
Wireless Access Systems]'' \emph{IEEE Computer Society and IEEE Microwave
Theory and Techniques Society}, 2004.

\bibitem{c}
Nachiketh R.~Potlapally, Srivaths~Ravi, Anand~Raghunathan, and Niraj
K.~Jha, ``A study of the energy consumption characteristics of
cryptographic algorithms and security protocols'' \emph{Mobile Computing,
IEEE Transactions on}, vol.5, no.2, pp.128-143, February 2006.
\bibitem{d}
Rezki, Zouheir and Alouini, M-S, ``Secure diversity-multiplexing tradeoff
of zero-forcing transmit scheme at finite-SNR'' \emph{Communications,
IEEE Transactions on}, vol.60, no.4, pp.1138-1147, April 2012.
\bibitem{e}
Paul L.~Yu, John S.~Baras, and Brian M.~Sadler, ``Physical-layer
authentication'' \emph{Information Forensics and Security, IEEE
Transactions on}, vol.3, no.1, pp.38-51, March 2008.
\bibitem{f}
Liang~Xiao, Larry J.~Greenstein, Narayan B.~Mandayam, and Wade~Trappe,
``Using the physical layer for wireless authentication in time-variant
channels'' \emph{Wireless Communications, IEEE Transactions on}, vol.7,
no.7, pp.2571-2579, July 2008.
\bibitem{g}
Paolo~Baracca, Nicola~Laurenti and Stefano~Tomasin, ``Physical layer
authentication over MIMO fading wiretap channels,'' \emph{Wireless
Communications, IEEE Transactions on}, vol.11, no.7, pp.2564--2573, July
2012.
\bibitem{h}
Fiona Jiazi~Liu, Xianbin Wang, and Helen Tang, ``Robust physical layer
authentication using inherent properties of channel impulse response''
\emph{Military Communications Conference, IEEE MILCOM }, pp.538--542,
September 2011.

\bibitem{i}
Kai Zeng, Kannan Govindan, and Prasant Mohapatra, ``Non-cryptographic
authentication and identification in wireless networks,'' \emph{network
security, IEEE Journal on}, vol.1, no.3, pp.1--8, 2010.
\bibitem{j}
Weikun~Hou, Xianbin~Wang, and J~Chouinard, ``Physical layer
authentication in OFDM systems based on hypothesis testing of CFO
estimates,'' \emph{Communications (ICC), 2012 IEEE International
Conference on}, pp.3559--3563, June 2012.
\bibitem{k}
Weikun~Hou, Xianbin~Wang, J~Chouinard, and Ahmed~Refaey, ``Physical Layer
Authentication for Mobile Systems with Time-Varying Carrier Frequency
Offsets,'' \emph{Communications, IEEE Transactions on}, vol.62, no.5,
pp.1658-1668, May 2014.

\bibitem{l}
Yan Shi, and Michael A. Jensen, ``Improved radiometric identification of
wireless devices using mimo transmission'' \emph{Information Forensics
and Security, IEEE Transactions on },vol.6, no.4, pp.1346--1354, December
2011.
\bibitem{m}
Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, and Wade Trappe,
``Channel-based spoofing detection in frequency-selective Rayleigh
channels'' \emph{Wireless Communications, IEEE Transactions on },vol.8,
no.12, pp.5948--5956, December 2009.
\bibitem{n}
William C. Jakes, and Donald C. Cox, ``Microwave mobile
communications'' \emph{Wiley-IEEE Press }, 1994.
\bibitem{O}
Y. Shi and M. A. Jensen, ``Improved radiometric identification of
wireless devices using MIMO transmission'' \emph{IEEE Trans. Inf.
Forensics Security,},vol.6, no. 4, pp.13461354, December 2011.
\bibitem{p}
E. P. Simon, L. Ros, H. Hijazi, J. Fang, D. P. Gaillot, and M. Berbineau,
``Joint carrier frequency offset and fast time-varying channel estimation
for MIMO-OFDM systems,'' \emph{IEEE Trans. Veh. Technology},vol. 60, no.
3, pp. 955-965, March 2011.
\bibitem{q}
S. L. Talbot and B. Farhang-Boroujeny, ``Time-varying carrier offsets in
mobile OFDM,'' \emph{IEEE Trans. on Communication},vol. 57, no. 9, pp.
2790-2798, September 2009.
\bibitem{r}
Paul H Moose``A technique for orthogonal frequency division multiplexing
frequency offset correction'' \emph{Communications, IEEE Trans.
on},vol.42, no.10, pp. 2908--2914, October 1994.
\bibitem{r}
S. M. Kay, ``Fundamentals of Statistical Signal Processing: Estimation
Theory'' Prentice-Hall, 1998.

\end{thebibliography}
\end{document}

S-ar putea să vă placă și