• Title/Summary/Keyword: Cognitive Network

Search Result 683, Processing Time 0.024 seconds

Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective

  • Gan, Jipeng;Wu, Jun;Zhang, Jia;Chen, Zehao;Chen, Ze
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4224-4243
    • /
    • 2021
  • Cognitive radio (CR) is a feasible intelligent technology and can be used as an effective solution to spectrum scarcity and underutilization. As the key function of CR, cooperative spectrum sensing (CSS) is able to effectively prevent the harmful interference with primary users (PUs) and identify the available spectrum resources by exploiting the spatial diversity of multiple secondary users (SUs). However, the open nature of the cognitive radio networks (CRNs) framework makes CSS face many security threats, such as, the malicious user (MU) launches Byzantine attack to undermine CRNs. For this aim, we make an in-depth analysis of the motive and purpose from the MU's perspective in the interweave CR system, aiming to provide the future guideline for defense strategies. First, we formulate a dynamic Byzantine attack model by analyzing Byzantine behaviors in the process of CSS. On the basis of this, we further make an investigation on the condition of making the fusion center (FC) blind when the fusion rule is unknown for the MU. Moreover, the throughput and interference to the primary network are taken into consideration to evaluate the impact of Byzantine attack on the interweave CR system, and then analyze the optimal strategy of Byzantine attack when the fusion rule is known. Finally, theoretical proofs and simulation results verify the correctness and effectiveness of analyses about the impact of Byzantine attack strategy on the throughput and interference.

Positive ageing: A conceptual framework

  • Sik Hung Ng;Jean Woo;Alex Kwan;Alice Chong
    • Korean Journal of Culture and Social Issue
    • /
    • v.12 no.5_spc
    • /
    • pp.29-43
    • /
    • 2006
  • With longevity (75 years plus and still increasing) now commonly achievable, the new challenge for individuals and society is less concerned with adding more years to life, though that remains important, and more with adding life to years. To explore the quality of long life more fully, a concept broader than healthy ageing or active ageing is needed. For this purpose, the present article describes a framework of Positive Ageing, also known as Successful Ageing, which views the quality of long life as comprising good health, physical and cognitive functional independence, and meaningful engagement with life. Narrowly defined, it refers to old people ageing well in all these aspects. More broadly defined, it refers to ageing well from midlife on. The framework also identifiesvariables that may affect the process of ageing positively. These variables include the social-cognitive styles of control, humour and future-time perspective on the one hand, and on the other hand, resources based on finance, social network and lifestyle.

HiMang: Highly Manageable Network and Service Architecture for New Generation

  • Choi, Tae-Sang;Lee, Tae-Ho;Kodirov, Nodir;Lee, Jae-Gi;Kim, Do-Yeon;Kang, Joon-Myung;Kim, Sung-Su;Strassner, John;Hong, James Won-Ki
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.552-566
    • /
    • 2011
  • The Internet is a very successful modern technology and is considered to be one of the most important means of communication. Despite that success, fundamental architectural and business limitations exist in the Internet's design. Among these limitations, we focus on a specific issue, the lack of manageability, in this paper. Although it is generally understood that management is a significant and important part of network and service design, it has not been considered as an integral part in their design phase. We address this problem with our future Internet management architecture called highly manageable network and service architecture for new generation (HiMang), which is a novel architecture that aims at integrating management capabilities into network and service design. HiMang is highly manageable in the sense that it is autonomous, scalable, robust, and evolutionary while reducing the complexity of network management. Unlike any other management framework, HiMang provides management support for the revolutionary networks of the future while maintaining backward compatibility for existing networks.

Knowledge Structure of Posttraumatic Growth Research: A Network Analysis (네트워크 분석을 통한 외상 후 성장 지식구조 연구)

  • Shin, JooYeon;Kwon, Sunyoung;Bae, Ka Ryeong
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.61-69
    • /
    • 2022
  • Posttraumatic growth literature has been rapidly expanding in multiple academic disciplines. Purpose of this study is to examine the knowledge structure of posttraumatic growth utilizing a network analysis. Papers published between 1996 and 2018 were searched on the Web of Science, focusing on terms related to posttraumatic growth. One thousand six-hundred and fifty-nine keywords were published 6,343 times in 1,780 papers; thus, a total of 322 keywords (5,195 appearances) were selected for the final analysis. The network analysis and network visualization tool used were NodeXL and PFnet, respectively. The keywords which appeared the most frequently were "Posttraumatic growth," followed by "Posttraumatic Stress Disease," "Cancer," and "Trauma." A total of 322 nodes have been reduced to 175 nodes and divided into a total of five groups. The five groups were "Posttraumatic Growth in Cancer, Chronic/Serious Illness, and Disability," "Posttraumatic Growth-related Psychological Variables and Psychotherapy," "Posttraumatic Growth in the Context of Death," "Cognitive Mechanisms of Posttraumatic Growth," and "Vicarious Posttraumatic Growth." This study provides a systematic overview on the knowledge structure of posttraumatic growth by quantitatively network analysis.

Dynamic Spectrum Sensing and Channel Access Mechanism in Frequency Hopping Based Cognitive Radio Ad-hoc Networks (주파수 홉핑 기반 인지무선 애드 혹 네트워크에서 동적 스펙트럼 센싱 및 채널 엑세스 방안)

  • Won, Jong-Min;Yoo, Sang-Jo;Seo, Myunghwan;Cho, Hyung-Weon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2305-2315
    • /
    • 2015
  • Frequency resource value is growing more and more with the development of the wireless communication. With the advent of the current information society comes a serious shortage of frequency resource, as the amount of supply is far from meeting its demands. Thus, cognitive radio (CR) technique is receiving more attention as a way to make use of the temporarily unoccupied frequency resource. In this paper we propose a novel out-of-band spectrum sensing and dynamic channel access scheme for frequency hopping-based cognitive radio ad-hoc networks. At the beginning of each current channel hopping time, member nodes perform spectrum sensing for the next hopping channel. Based on the proposed collision free primary detection notification, member nodes can determine whether they should execute a hopping time extension procedure of the current channel or not. When the primary detected hopping channel is re-idled, the hopping pattern recovery procedure is performed. In this paper we evaluated the performance of the proposed dynamic sensing and hopping channel extension mechanism for the various wireless network conditions. As a result, we show that the proposed method can increase channel utilization and provide reliable channel management operation.

Bibliometric analysis of source memory in human episodic memory research (계량서지학 방법론을 활용한 출처기억 연구분석: 인간 일화기억 연구를 중심으로)

  • Bak, Yunjin;Yu, Sumin;Nah, Yoonjin;Han, Sanghoon
    • Korean Journal of Cognitive Science
    • /
    • v.33 no.1
    • /
    • pp.23-50
    • /
    • 2022
  • Source memory is a cognitive process that combines the representation of the origin of the episodic experience with an item. By studying this daily process, researchers have made fundamental discoveries that make up the foundation of brain and behavior research, such as executive function and binding. In this paper, we review and conduct a bibliometric analysis on source memory papers published from 1989 to 2020. This review is based on keyword co-occurrence networks and author citation networks, providing an in-depth overview of the development of source memory research and future directions. This bibliometric analysis discovers a change in the research trends: while research prior to 2010 focused on individuality of source memory as a cognitive function, more recent papers focus more on the implication of source memory as it pertains to connectivity between disparate brain regions and to social neuroscience. Keyword network analysis shows that aging and executive function are continued topics of interest, although frameworks in which they are viewed have shifted to include developmental psychology and meta memory. The use of theories and models provided by source memory research seem essential for the future development of cognitive enhancement tools within and outside of the field of Psychology.

Cognitive Radio MAC Protocol for Hidden Incumbent System Detection (무선 인지 기술 기반의 WRAN 시스템에서 숨겨진 인컴번트 시스템 검출 MAC 프로토콜)

  • Kim, Hyun-Ju;Jo, Kyoung-Jin;Hyon, Tae-In;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1058-1067
    • /
    • 2006
  • In this paper, we propose a inband/outband broadcast method for hidden incumbent system detection of medium access control layer for wireless regional area network systems using cognitive radio technology. Through some extra channels that are not currently used, a short message is broadcasted. The message allows CPE detecting an appearance of incumbent system to send sensing report to CR BS. For the hidden incumbent system report message, the BS needs a process or method for allocation of upstream resource to CPEs. And transmitting multiple out-band signals has a possibility to collide with out-band signals of other co-located WRAN BSs. To avoid out-band signal collision, BSs randomly select it out-band signal broadcasting time within the pre-defined explicit out-band signaling, period. And fractional Bandwidth Usage allows WRAN BSs to efficiently use bandwidth.

Delegation-based Authentication Protocol for Cognitive Radio Network (인지무선네트워크를 위한 위임기반 인증 프로토콜)

  • Kim, Hyunsung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.79-86
    • /
    • 2015
  • Cognitive radio networks (CRNs) offer the promise of intelligent radios that can learn from and adapt to their environment. CRN permits unlicensed users to utilize the idle spectrum as long as it does not introduce interference to the primary users due to the Federal Communications Commission's recent regulatory policies. Thereby, the security aspects in CRNs should be different with the other networks. The purpose of this paper is to devise a new delegation-based authentication protocol (NDAP) by extracting out the security aspects for unlicensed user authentication over CRNs from Tsai et al's delegation-based authentication protocol (TDAP). First of all, we will provide security analyses on the TDAP and set design goal for unlicensed user authentication. Then, we will propose a NDAP as a remedy mechanism for the TDAP and a new protocol for CRNs. The NDAP could be used as a security building block for the CRNs and various convergence applications.

Fuzzy-based Dynamic Packet Scheduling Algorithm for Multimedia Cognitive Radios (멀티미디어 무선인지 시스템을 위한 퍼지 기반의 동적 패킷 스케줄링 알고리즘)

  • Tung, Nguyen Thanh;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.1-7
    • /
    • 2012
  • Cognitive radio, a new paradigm for wireless communication, is being recently expected to support various types of multimedia traffics. To guarantee Quality of Service (QoS) from SUs, a static packet priority policy can be considered. However, this approach can easily satisfy Quality of Service of high priority application while that of lower priority applications is being degraded. In the paper, we propose a fuzzy-based dynamic packet scheduling algorithm to support multimedia traffics in which the dynamic packet scheduler modifies priorities of packets according to Fuzzy-rules with the information of priority and delay deadline of each packet, and determines which packet would be transmitted through the channel of the primary user in the next time slot in order to reduce packet loss rate. Our simulation result shows that packet loss rate can be improved through the proposed scheme when overall traffic load is not heavy.

Performance Analysis of D2D system Considering users' locations under the Overlay Convergent Networks of Cognitive Networking (인지기반 중첩 융합 네트워크에서 위치정보에 기반한 D2D 시스템의 성능분석)

  • Kim, Jeong-Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.3-10
    • /
    • 2014
  • In this paper, the performances of the presented D2D (device-to-device) systems under the environment of the cognitive convergent overlay networks are evaluated based upon the locations of the D2D users' terminals, the power consumptions of the terminals and the reductions of the interference levels. As the capabilities of the users' terminals improve, the optimization of the system is crucial to the efficient utilization of the radio resources of the individual networks considering their mobility and the features of their networks. Users' mobility model is given for the performance evaluation of the D2D system. In this paper, the performances of the D2D systems are evaluated in terms of the performance index of the FER (frame error rate) employing multiantenna techniques (MIMO:multiple input multiple output) for the various network environments.