Partner selection strategies in cooperative wireless networks with optimal power distribution

There have been several results that illustrate the best performance that a network can get through cooperation of relay nodes. For practical purposes, not all nodes in the network should be involved at the same time in every transmission. Therefore, optimal partner selection protocols in cooperative wireless networks are believed to be the first important thing that should be paid attention to. This problem in our article is considered in the context of regenerative nodes and non-altruistic cooperation (no pure relay exists; all nodes have their own data to transmit). For each transmission, the protocol must provide the user (source node) a ‘best partner’ (relay node) to cooperate with (for network simplicity and less transmission signals here, assume that each user has only one cooperative node). A criterion is essentially needed when defining what a ‘best partner’ is; in this article, two factors, i.e,. the successful transmission probability and the transmission power, are considered. Three optimal partner selection strategies with different goals are proposed and analyzed respectively. The simulation results show that these are all supposed to be good tradeoffs between power consumption and transmission performance.

[1]  Aria Nosratinia,et al.  Grouping and partner selection in cooperative wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[2]  Heejo Lee,et al.  On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[3]  Dawn Xiaodong Song,et al.  Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..

[4]  Qinghua Wang,et al.  Protocol for the application of cooperative MIMO based on clustering in sparse wireless sensor networks , 2007 .

[5]  Dawn Xiaodong Song,et al.  Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[6]  Rocky K. C. Chang,et al.  Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..

[7]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[8]  Yan Chen,et al.  Optimal Partner Selection Strategies in Wireless Cooperative Networks with Fixed and Variable Transmit Power , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[9]  David J. Goodman,et al.  Power control for wireless data based on utility and pricing , 1998, Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361).

[10]  Laurence B. Milstein,et al.  Statistical channel knowledge-based optimum power allocation for relaying protocols in the high SNR regime , 2007, IEEE Journal on Selected Areas in Communications.

[11]  Aria Nosratinia,et al.  Diversity through coded cooperation , 2006, IEEE Transactions on Wireless Communications.