{"title":"An amplify-and-forward scheme for cognitive radios","authors":"F. Verde, A. Scaglione, D. Darsena, G. Gelli","doi":"10.1109/ICASSP.2014.6854095","DOIUrl":null,"url":null,"abstract":"In this paper, we propose an opportunistic amplify-and-forward relaying scheme for a cognitive radio network, which is aimed at allowing a secondary user (SU) to transmit over the same time-frequency slot of a primary user (PU). In our scheme, the SU amplifies and transmits the PU signal it receives, by using as relaying gain the information symbols that the SU wishes to transmit towards its own secondary receiver. The information theoretic limits of the proposed protocol are investigated by showing that, in some operative conditions of practical interest, the SU can embed its information symbols in the PU signal, without violating the cognitive radio principle of protecting the PU transmission and, at the same time, by attaining low transmission rates.","PeriodicalId":6545,"journal":{"name":"2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","volume":"36 1","pages":"2724-2728"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASSP.2014.6854095","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In this paper, we propose an opportunistic amplify-and-forward relaying scheme for a cognitive radio network, which is aimed at allowing a secondary user (SU) to transmit over the same time-frequency slot of a primary user (PU). In our scheme, the SU amplifies and transmits the PU signal it receives, by using as relaying gain the information symbols that the SU wishes to transmit towards its own secondary receiver. The information theoretic limits of the proposed protocol are investigated by showing that, in some operative conditions of practical interest, the SU can embed its information symbols in the PU signal, without violating the cognitive radio principle of protecting the PU transmission and, at the same time, by attaining low transmission rates.