• Title/Summary/Keyword: Cognitive Radio Networks

Search Result 393, Processing Time 0.024 seconds

Adaptive Spectrum Sensing for Throughput Maximization of Cognitive Radio Networks in Fading Channels

  • Ban, Tae-Won;Kim, Jun-Su;Jung, Bang-Chul
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.3
    • /
    • pp.251-255
    • /
    • 2011
  • In this paper, we investigate an adaptive cognitive radio (CR) scheme where a sensing duration and a detection threshold for spectrum sensing are adaptively determined according to the channel condition in a fading channel. We optimize the sensing duration and detection threshold of a secondary user to maximize the performance of the secondary user guaranteeing a primary user's secure communication. In addition, we analyze the effect of channel fading on the optimization of the sensing duration and detection threshold. Our numerical results show that the performance of the adaptive CR scheme can be drastically improved if a secondary user can take the advantage of channel information between primary and secondary users.

Minimum BER Power Allocation for OFDM-based Cognitive Radio Networks

  • Xu, Ding;Li, Qun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2338-2353
    • /
    • 2015
  • In this paper, the optimal power allocation algorithm that minimizes the aggregate bit error rate (BER) of the secondary user (SU) in a downlink orthogonal frequency division multiplexing (OFDM) based cognitive radio (CR) system, while subjecting to the interference power constraint and the transmit power constraint, is investigated under the assumption that the instantaneous channel state information (CSI) of the interference links between the secondary transmitter and the primary receiver, and between the primary transmitter and the secondary receiver is perfectly known. Besides, a suboptimal algorithm with less complexity is also proposed. In order to deal with more practical situations, we further assume that only the channel distribution information (CDI) of the interference links is available and propose heuristic power allocation algorithms based on bisection search method to minimize the aggregate BER under the interference outage constraint and the transmit power constraint. Simulation results are presented to verify the effectiveness of the proposed algorithms.

Resolving Security Issues of Cognitive Radio Networks

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.797-799
    • /
    • 2012
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, as the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because law breakers could abuse the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

Transaction Signing-based Authentication Scheme for Secure Distributed Spectrum Sensing in Cognitive Radio Networks (인지 라디오 네트워크의 안전한 분산 스펙트럼 센싱을 위한 트랜잭션 서명기법)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.75-83
    • /
    • 2011
  • Cognitive radio (CR) technology is to maximize the spectrum utilization by allocating the unused spectrums to the unlicensed users. This technology enables the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis after sensing the vacant channel and as a result, it is possible to harness wireless frequency more efficiently. To enhance the accuracy of sensing, RDSS was suggested. It is a fusion mechanism based on the reputation of sensing nodes and WSPRT (weighted sequential probability ratio test). However, in RDSS, the execution number of WSPRT could increase according to the order of inputted sensing values, and the fast defense against the forged values is difficult. In this paper, we propose a transaction signing-based authentication scheme for secure distributed spectrum sensing to response the forged values. The validity of proposed scheme is provided by BAN logic.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

Interference and noise analysis for hybrid FSO/RF-based 6G mobile backhaul

  • Soyinka Nath;Shree Prakash Singh;Sujata Sengar
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.966-976
    • /
    • 2022
  • Optical wireless communication, or free space optics, is a promising solution for backhauls in sixth-generation mobile systems. However, the susceptibility of optical links to weather conditions has led to FSO links being furnished with radio frequency (RF) backups. These Hybrid FSO/RF systems provide enhanced link availability but lead to RF resource wastage. Cognitive radio technology, in contrast, is well known for its optimal use of RF resources and may be combined with an FSO link to create a Cognitive Hybrid FSO/RF system. This work uses such a system to analyze a configuration for a mobile backhaul in sixth-generation mobile systems. This configuration can seamlessly coexist with established large scale RF cellular networks. The performance of this configuration is analyzed with respect to outage probability and average bit error by considering the impact of optical channel turbulence, misalignment loss, RF interference, and noise. Mathematical closed-form expressions are verified by simulations.

MODELING AND ANALYSIS FOR OPPORTUNISTIC SPECTRUM ACCESS

  • Lee, Yu-Tae;Sim, Dong-Bo
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.5_6
    • /
    • pp.1295-1302
    • /
    • 2011
  • We present an analytic model of an unslotted opportunistic spectrum access (OSA) network and evaluate its performance such as interruption probability, service completion time, and throughput of secondary users. Numerical examples are given to show the performance of secondary users in cognitive networks. The developed modeling and analysis method can be used to evaluate the performance of various OSA networks.

Mixed-Integer Programming based Techniques for Resource Allocation in Underlay Cognitive Radio Networks: A Survey

  • Alfa, Attahiru S.;Maharaj, B.T.;Lall, Shruti;Pal, Sougata
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.744-761
    • /
    • 2016
  • For about the past decade and a half research efforts into cognitive radio networks (CRNs) have increased dramatically. This is because CRN is recognized as a technology that has the potential to squeeze the most out of the existing spectrum and hence virtually increase the effective capacity of a wireless communication system. The resulting increased capacity is still a limited resource and its optimal allocation is a critical requirement in order to realize its full benefits. Allocating these additional resources to the secondary users (SUs) in a CRN is an extremely challenging task and integer programming based optimization tools have to be employed to achieve the goals which include, among several aspects, increasing SUs throughput without interfering with the activities of primary users. The theory of the optimization tools that can be used for resource allocations (RA) in CRN have been well established in the literature; convex programming is one of them, in fact the major one. However when it comes to application and implementation, it is noticed that the practical problems do not fit exactly into the format of well established tools and researchers have to apply approximations of different forms to assist in the process. In this survey paper, the optimization tools that have been applied to RA in CRNs are reviewed. In some instances the limitations of techniques used are pointed out and creative tools developed by researchers to solve the problems are identified. Some ideas of tools to be considered by researchers are suggested, and direction for future research in this area in order to improve on the existing tools are presented.

A Control Channel Access Scheme for Clustered Multi-interface Multi-hop Cognitive Radio Networks (클러스터 형태의 다중 인터페이스 다중 홉 인지 라디오 네트워크를 위한 제어 채널 접근 기법)

  • Lee, Ji-Wun;Jeon, Wha-Sook;Jeong, Dong-Geun
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.4
    • /
    • pp.301-306
    • /
    • 2010
  • We propose the control channel access scheme for multi-interface multi-hop cognitive radio (CR) environment having a cluster structure. Due to the difficulty of obtaining common channels across the entire CR network, most multi-interface multi-hop CR networks put the control channel outside the CR bandwidth and dedicate one network interface to it in order to exchange the control information such as the activation of licensed users. However, this will be the waste of the network interface. Our focus is how to alternate between the control and the data channel without multichannel hidden node problem under the cluster structure where CR nodes connect with neighbors through multiple data channels. By using simulation, we evaluate the performance of the proposed scheme. The results show that the proposed scheme achieves higher network throughput than the dedicated scheme where one network interface card should dedicate to the control channel and cannot be used for data transmission.

Spectrum Sensing Technique in Cognitive Radio Systems Based on Ad-Hoc Networks (애드 혹 네트워크기반 무선인지 시스템에서 스펙트럼 센싱)

  • Lee, So-Young;Kim, Eun-Cheol;Cha, Jae-Sang;Hwang, Sung-Ho;Min, Joon-Ki;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.5
    • /
    • pp.121-127
    • /
    • 2009
  • Wireless devices can communicate between each other without existing infrastructure in mobile Ad-hod network. Ad hoc networks can be used under difficult conditions, where it is difficult to construct infrastructures, such as shadowing areas, disaster areas, war area, and so on. In order to support to considerable and various wireless services, more spectrum resources are needed. However, efficient utilization of the frequency resource is difficult because of spectrum scarcity and the conventional frequency regulation. Ad-hoc networks employing cognitive radio (CR) system that guarantee high spectrum utilization provide effective way to increase the network capacity. In this paper, we simulate and compare the performance of conventional single and cooperative spectrum sensing with CR system using ad-hoc networks. And we demonstrate performance improvement by analyzing the system performance.

  • PDF