• Title/Summary/Keyword: Cognitive radio(CR)

Search Result 312, Processing Time 0.021 seconds

TV 대역의 Spectrum Overlay 기술의 Spectral Efficiency 분석

  • Im, Cha-Sik;Lee, Jae-Yong;Gang, Hyeon-Deok;Kim, Chang-Ju;Kim, Bong-Seok;Gang, Seong-Cheol
    • Information and Communications Magazine
    • /
    • v.24 no.9
    • /
    • pp.15-21
    • /
    • 2007
  • 유비쿼터스 사회의 도래에 따른 전파자원의 부족현상을 해결하고 스펙트럼 이용효율을 증가시키기 위해 cognitive radio(CR) 기술을 이용하여 전파특성이 우수한 V/UHF 주파수 자원을 공유하는 기술이 최근에 각광을 받고 있다. 본 논문에서는 CR기술에 대한 소개와 더불어 IEEE802.22 WRAN working group에서 검토되고 있는 CR기술을 이용한 V/UHF 대역의 주파수 자원 공유를 통해 얻을 수 있는 스펙트럼 이용효율을 분석하였다. DTV 및 WRAN 시스템 파라미터와 제안된 공유 시나리오를 바탕으로 시뮬레이션을 통해 분석한 결과, CR 기술 도입시 스펙트럼 효율은 수백 배 이상이 향상되고, 커버리지 효율도 배 이상 향상됨을 알 수 있었다.

Design and Implementation of a Polar Transmitter (폴라송신기의 설계 및 구현)

  • Kang, Sanggee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.55-59
    • /
    • 2014
  • Multi-band and multi-mode transmitters are needed for SDR and CR. Recently many types of polar transmitters have been studied in order to implement a multi-band and multi-mode transmitter. Polar transmitters have many advantages, such as a simple structure, high efficiency and etc. In this paper we consider the number of D/A bit and the effects of a delay mismatch as design parameters for implementing polar transmitters. From the simulation we know that a 10 bit D/A is sufficient and a delay mismatch must be maintained small than 1/64 chip for satisfying the spectrum mask characteristics. We implement a polar transmitter based on the design parameters and the measured output signal meet the spectrum mask of 800MHz CDMA.

Underlay Cooperative Cognitive Networks with Imperfect Nakagami-m Fading Channel Information and Strict Transmit Power Constraint: Interference Statistics and Outage Probability Analysis

  • Ho-Van, Khuong;Sofotasios, Paschalis C.;Freear, Steven
    • Journal of Communications and Networks
    • /
    • v.16 no.1
    • /
    • pp.10-17
    • /
    • 2014
  • This work investigates two important performance metrics of underlay cooperative cognitive radio (CR) networks: Interference cumulative distribution function of licensed users and outage probability of unlicensed users. These metrics are thoroughly analyzed in realistic operating conditions such as imperfect fading channel information and strict transmit power constraint, which satisfies interference power constraint and maximum transmit power constraint, over Nakagami-m fading channels. Novel closed-form expressions are derived and subsequently validated extensively through comparisons with respective results from computer simulations. The proposed expressions are rather long but straightforward to handle both analytically and numerically since they are expressed in terms of well known built-in functions. In addition, the offered results provide the following technical insights: i) Channel information imperfection degrades considerably the performance of both unlicensed network in terms of OP and licensed network in terms of interference levels; ii) underlay cooperative CR networks experience the outage saturation phenomenon; iii) the probability that the interference power constraint is satisfied is relatively low and depends significantly on the corresponding fading severity conditions as well as the channel estimation quality; iv) there exists a critical performance trade-off between unlicensed and licensed networks.

Malicious Users Detection and Nullifying their Effects on Cooperative Spectrum Sensing

  • Prasain, Prakash;Choi, Dong-You
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.167-178
    • /
    • 2016
  • Spectrum sensing in cognitive radio (CR) has a great role in order to utilize idle spectrum opportunistically, since it is responsible for making available dynamic spectrum access efficiently. In this research area, collaboration among multiple cognitive radio users has been proposed for the betterment of detection reliability. Even though cooperation among them improves the spectrum sensing performance, some falsely reporting malicious users may degrade the performance rigorously. In this article, we have studied the detection and nullifying the harmful effects of such malicious users by applying some well known outlier detection methods based on Grubb's test, Boxplot method and Dixon's test in cooperative spectrum sensing. Initially, the performance of each technique is compared and found that Boxplot method outperforms both Grubb's and Dixon's test for the case where multiple malicious users are present. Secondly, a new algorithm based on reputation and weight is developed to identify malicious users and cancel out their negative impact in final decision making. Simulation results demonstrate that the proposed scheme effectively identifies the malicious users and suppress their harmful effects at the fusion center to decide whether the spectrum is idle.

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung;Son, Pham Ngoc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4623-4643
    • /
    • 2015
  • This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.

Interference Analysis based on the Monte-Carlo Method (Monte-Carlo 기반의 간섭분석에 관한 연구)

  • Kim, Seong-Kweon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.2
    • /
    • pp.58-64
    • /
    • 2008
  • In this paper, we proposed the methodology of interference analysis based on monte-carlo method for effective use of Industrial, Scientific, Medical (ISM) band. The interference scenario is divided according to the distance and density. The simulation of interference analysis evaluates the interference probability according to distribution density of Interfering Transmitters (It) in the Secure Interference Area (SIA). The SIA is gained from the Interference Efficiency Range that satisfied to Interference Permissible Range of Victim Receiver (Vr). Simulation result that apply the proposed interference scenario to the WLAN and bluetooth, Interference Permissible Range was 60~400m. And the WLAN was acceptable within interference permissible range to six bluetooth that exist in the SIA. In the same condition, when applied Listen Before Talk (LBT) based on Cognitive Radio (CR) to the bluetooth using Frequency Hopping (FH), interference probability was decreased sharply. The Spectrum Engineering Advanced Monte Carlo Analysis Tool (SEAMCAT) that has been developed based on the monte-carlo method by European Radio-communications Office (ERO) were used to the interference simulation.

  • PDF

A Channel Selection Algorithm Based on Fuzzy Logic and Learning Automata for Cognitive Radio Sensor Networks (무선 인지 센서 네트워크를 위한 퍼지 및 러닝 오토메타 기반의 채널 선택 기법)

  • Truong, Anh Tuan;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.23-28
    • /
    • 2011
  • In this paper, we propose a channel selection scheme for secondary users in cognitive radio sensor networks, which includes learning automata and fuzzy logic system (FLS). In the proposed scheme, FLS is used as the channel selection mechanism while the learning automata algorithm is being used to learn the radio environment such as channel link quality. Signal to noise ratio of the link between primary user (PU) and secondary user (SU), the probability of choosing channel, and signal to noise ratio of the link between secondary users are chosen as input parameters for the FLS to decide one data channel among multiple channels. Simulation results show that the proposed scheme does indeed provide advantages in improving the throughput of CR networks, in comparison with some other previous schemes.

Price-based Resource Allocation for Virtualized Cognitive Radio Networks

  • Li, Qun;Xu, Ding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4748-4765
    • /
    • 2016
  • We consider a virtualized cognitive radio (CR) network, where multiple virtual network operators (VNOs) who own different virtual cognitive base stations (VCBSs) share the same physical CBS (PCBS) which is owned by an infrastructure provider (InP), sharing the spectrum with the primary user (PU). The uplink scenario is considered where the secondary users (SUs) transmit to the VCBSs. The PU is protected by constraining the interference power from the SUs. Such constraint is applied by the InP through pricing the interference. A Stackelberg game is formulated to jointly maximize the revenue of the InP and the individual utilities of the VNOs, and then the Stackelberg equilibrium is investigated. Specifically, the optimal interference price and channel allocation for the VNOs to maximize the revenue of the InP and the optimal power allocation for the SUs to maximize the individual utilities of the VNOs are derived. In addition, a low‐complexity ±‐optimal solution is also proposed for obtaining the interference price and channel allocation for the VNOs. Simulations are provided to verify the proposed strategies. It is shown that the proposed strategies are effective in resource allocation and the ±‐optimal strategy achieves practically the same performance as the optimal strategy can achieve. It is also shown that the InP will not benefit from a large interference power limit, and selecting VNOs with higher unit rate utility gain to share the resources of the InP is beneficial to both the InP and the VNOs.

VHF/UHF 주파수 대역을 위한 AWBN(Adaptive Wireless Broadband Network) 시스템 개발

  • Hwang, Seong-Ho;Lee, Jeong-Seok;Kim, Gi-Hong;Min, Jun-Gi;Park, Yong-Un
    • Broadcasting and Media Magazine
    • /
    • v.12 no.3
    • /
    • pp.14-36
    • /
    • 2007
  • 다양한 무선 통신 서비스의 등장으로 주파수 자원의 수요가 급증하여 스펙트럼 이용 효율을 극대화하기 위한 새로운 기술 개발의 필요성이 대두되고 있으며, 이에 대한 기술로 Cognitive Radio (CR) 기술이 주목받고 있다. CR 기술은 선택된 주파수 대역에 최적의 QoS를 제공하기 위해서는 먼저 주파수 환경에 적응성을 갖는 스펙트럼 센싱 (Spectrum Sensing) 기술이 필요하며, CR 기술이 적용된 무선 브로드밴드 네트워크 (AWBN : Adaptive Wireless Broadband Network) 모듈은 최근 각광받고 있는 방통융합 솔루션의 Hot Issue인 QoS 보장 홈네트워크 기반의 멀티미디어 전송(TV Portal Service)용 네트워크에 최적화된 솔루션으로 활용될 것으로 기대하고 있을 뿐만 아니라, IEEE 802.22 그룹에서 연구되고 있는 비어있는 TV 대역 및 마이크로폰 대역에 활용될 뿐만 아니라, 기존의 Mobile WiMax에 의한 브로드밴드 네트워크에도 활용 가능하다. 본 고에서는 IEEE 802.22/16d 시스템 규격에 의해 개발된 AWBN 시스템 개발 내용을 기술한다.

Performance Analysis of Energy Detection Spectrum Sensing Using Adaptive Threshold through Controlling False alarms (오경보 확률 제어를 통한 적응적 임계치 사용 에너지 검출 스펙트럼 센싱의 성능 분석)

  • Seo, SungIl;Lee, MiSun;Kim, Jinyoung
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.1
    • /
    • pp.61-65
    • /
    • 2013
  • In this paper, we propose system model to solve conventional threshold problem of using fixed false alarm for energy spectrum sensing. Spectrum sensing reliability is ensured when Secondary user have high SNR. Thus, it is not reasonable using fixed optional false alarm without considering CR user's SNR. So, we propose adaptive threshold method. adaptive threshold is decided by controling FA according to CR user's SNR.