Capacity Results for a Primary MAC in the Presence of a Cognitive Radio

The capacity region of the Gaussian cognitive interference network consisting of a primary multiple access channel and a secondary point-to-point system is considered. Its capacity region with weak interference is known. In this paper, the capacity region of a sub-regime of the strong interference regime is studied. An outer bound on the capacity region of this setup with strong interference is derived. An inner bound is shown to coincide with the strong interference outer bound under some conditions, thus characterizing the capacity of this setup for a set of channel parameters.

[1]  Daniela Tuninetti,et al.  The capacity region of Gaussian cognitive radio channels to within 1.81 bits , 2010, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).

[2]  Patrick Mitran,et al.  Cognitive multiple access networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[3]  S. Shamai,et al.  On the capacity of cognitive radios in multiple access networks , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[4]  Hiroshi Sato,et al.  The capacity of the Gaussian interference channel under strong interference , 1981, IEEE Trans. Inf. Theory.

[5]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[6]  Patrick Mitran,et al.  Achievable rates in cognitive radio channels , 2006, IEEE Transactions on Information Theory.

[7]  Daniela Tuninetti,et al.  New results on the capacity of the Gaussian cognitive interference channel , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[8]  Wei Wu,et al.  Capacity of a Class of Cognitive Radio Channels: Interference Channels With Degraded Message Sets , 2007, IEEE Transactions on Information Theory.

[9]  Roy D. Yates,et al.  Capacity of Interference Channels With Partial Transmitter Cooperation , 2007, IEEE Transactions on Information Theory.

[10]  Aydin Sezgin,et al.  On the Capacity of the 2-user Gaussian MAC Interfering with a P2P Link , 2011, EW.

[11]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.