Performance bound of Ad hoc device-to-device communications using cognitive radio

Oluwaseyi Omotere, Qian Lijun, Du Xiaojiang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

The aim of this paper is to study the achievable throughput of an ad hoc Device-to-Device (D2D) communications with cognitive radio capabilities coexisting with cellular user equipment (UE) in the same macrocell. Specifically, we consider ad hoc D2D systems with non-orthogonal resources sharing instead of D2D with infrastructure support. The main objective is to find out how much throughput a device in a D2D pair can achieve in the presence of another D2D pair and a cellular user over fading channels. A closed-form expression for statistics, the Moment Generating Function (MGF) and Complementary Cumulative Distribution Function (CCDF) of multiple interferers in Nakagami-m fading channels in cellular system are presented. By using these expressions, we derive the device throughput for multiple D2D systems in a cellular system. Furthermore, the upper bound for the probability of false alarm, which is required to achieve a certain throughput is deduced. The results of this paper illustrate how the transmission probability and sensing performance affect the achievable throughput in cognitive D2D systems. In addition, these results serve as guidance for the deployment of cognitive D2D systems without infrastructure support.

Original languageEnglish
Title of host publication2013 IEEE Globecom Workshops, GC Wkshps 2013
Pages654-659
Number of pages6
DOIs
StatePublished - 2013
Event2013 IEEE Globecom Workshops, GC Wkshps 2013 - Atlanta, GA, United States
Duration: 9 Dec 201313 Dec 2013

Publication series

Name2013 IEEE Globecom Workshops, GC Wkshps 2013

Conference

Conference2013 IEEE Globecom Workshops, GC Wkshps 2013
Country/TerritoryUnited States
CityAtlanta, GA
Period9/12/1313/12/13

Fingerprint

Dive into the research topics of 'Performance bound of Ad hoc device-to-device communications using cognitive radio'. Together they form a unique fingerprint.

Cite this