• Title/Summary/Keyword: Cognitive radio technology

Search Result 293, Processing Time 0.022 seconds

Survey of Cognitive Radio VANET

  • He, Xinxin;Shi, Weisen;Luo, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3837-3859
    • /
    • 2014
  • Vehicular Ad hoc Networks (VANET) becomes more popular in industry, academia and government. However, Typical VANET is challenged by high speed mobility and insufficient spectrum resources over congested scenarios. To address those serious problems, some articles have introduced Cognitive Radio (CR) technology into VANET and formed CR-VANET. In this article, we propose an overview of CR-VANET by exploring different architectures and features. Moreover, we provide taxonomy of state-of-the-art papers in this emerging field and the key articles are well analyzed respectively. In addition, we illustrate both research and application frameworks of CR-VANET based on our works, and propose some open research issues for inspiring future work.

Modified 802.11-Based Opportunistic Spectrum Access in Cognitive Radio Networks

  • Zhai, Linbo;Zhang, Xiaomin
    • ETRI Journal
    • /
    • v.34 no.2
    • /
    • pp.276-279
    • /
    • 2012
  • In this letter, a modified 802.11-based opportunistic spectrum access is proposed for single-channel cognitive radio networks where primary users operate on a slot-by-slot basis. In our opportunistic spectrum access, control frames are used to reduce the slot-boundary impact and achieve channel reservation to improve throughput of secondary users. An absorbing Markov chain model is used to analyze the throughput of secondary users. Simulation results show that the analysis accurately predicts the saturation throughput.

Exact Outage Probability Analysis of Proactive Relay Selection in Cognitive Radio Networks with MRC Receivers

  • Ho-Van, Khuong
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.288-298
    • /
    • 2016
  • Proactive relay selection in cognitive radio networks has recently received considerable attention. However, its outage probability analysis is limited to partially-identical fading distributions, uncorrelation among received signal-to-noise ratios (SNRs), and no direct channel. This paper completes this literature deficiency by generalizing the existing analysis for non-identical fading distributions, correlation among received SNRs, and with direct channel. Numerous results demonstrate that relay selection with a direct channel achieves a higher diversity order and superior performance than that without a direct channel at virtually no cost of power and bandwidth. Further, proactive relay selection suffers an error floor at either a large maximum transmit power or large maximum interference power; however, the error floor level can be significantly remedied with an increase in the number of relays.

Asymptotic Capacity Analysis in Multipoint-to-Point Cognitive Radio Networks with an Arbitrary Peak Power

  • Ji, Jianbo;Chen, Wen;Sun, Shanlin
    • Journal of Communications and Networks
    • /
    • v.15 no.6
    • /
    • pp.576-580
    • /
    • 2013
  • In this paper, we investigate the capacity of a multipoint-to-point cognitive radio network. In existing works, the asymptotic capacity is only obtained in the high peak power region at secondary transmitter (ST) or obtained without considering the interference from primary transmitter (PT) for easy analysis. Here, we analyze the asymptotic capacity by considering an arbitrary peak power at the ST and the interference from the PT based on extreme value theory. Simulation results show that our approximated capacity is well-matched to the exact capacity. Furthermore, the scaling law of our capacity is found to be double logarithm of the number of secondary users.

Cognitive Radio Technology and IEEE 802.22 Standardization Trends (Cognitive Radio 기술 및 IEEE 802.22 표준화 동향)

  • Lee, Sang-Heon;Kang, Heau-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.215-218
    • /
    • 2005
  • 무선통신 및 방송 기술의 발달과 함께 주파수 자원의 효율적 활용에 대한 관심이 더욱 높아지고 있다. 또한 향후 유비쿼터스 센서 네트워크, 이동 및 고정 무선통신, 무선방송 등 다양한 무선 응용 기술들이 혼재된 상황은 주파수 자원의 효율적 이용에 대한 요구를 강화할 것으로 예상된다. 본 논문에서는 다양한 무선자원을 능동적으로 인지하여 동적으로 변화하는 사용자의 요구 및 상황에 적합하도록 유휴 무선자원을 지능적으로 활용하는 제반 기술인 Cognitive Radio의 필요성 및 발전 방향과 IEEE 802.22 표준화 동향을 알아본다.

  • PDF

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

MSMA/CA: Multiple Access Control Protocol for Cognitive Radio-Based IoT Networks

  • Muhammad Shafiq;Jin-Ghoo Choi
    • Journal of Internet Technology
    • /
    • v.20 no.1
    • /
    • pp.301-313
    • /
    • 2019
  • In this paper, we propose a new MAC protocol for Cognitive Radio (CR)-based IoT networks, called MSMA/CA. We extend the standard CSMA/CA, adopted in IEEE 802.11 WLANs, to the CR networks with the minimal modification since it works well in the real world. We resolve the classical hidden/exposed terminal problems by a variant of RTS/CTS mechanism and further, the hidden primary terminal problem by the mutual spectrum sensing at the transmitter and the receiver. We also modify the backoff process of CSMA/CA to incorporate the blocking of secondary transmitters, with the aim of protecting ongoing primary transmissions from aggressive secondary users. We analyze the throughput and delay of our proposed scheme using the Markov chain model on the backoff procedure, and verify its accuracy by simulations. Simulation results demonstrate that our protocol is suitable for IoT networks since the performance is insensitive to the number of users or devices.

Channel Reservation Scheme Using Wiener Prediction Theory for Cognitive Radio Networks (무선 인지 네트워크에서 위너예측 이론에 의한 예약채널 할당기법)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.757-763
    • /
    • 2011
  • This paper presents a channel reservation scheme using Wiener prediction model in order to reduce the rate of forced termination of cognitive users in cognitive radio networks. The proposed method uses Wiener prediction model to predict the number of radio channel required by the reappearance of primary users, and then calculates and reserves the number of channels that cognitive users demand for their spectrum handoff. Through the simulation we investigate cognitive users' forced termination rate and blocking rate with and without channel reservation. In addition we show the bandwidth utilization efficiency for both cases. The results show that the proposed scheme can reduce the forced termination rate of cognitive users at the cost of slightly increasing in blocking rate. Also it is seen that there is little difference in bandwidth utilization efficiency for both cases.

Uplink Relaying Scheme for Efficient Frequency Usage in Cognitive Radio Networks (인지 무선 네트워크 환경에서 효율적인 주파수 활용을 위한 상향링크 릴레이 기법)

  • Kim, Se-Woong;Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4A
    • /
    • pp.356-368
    • /
    • 2011
  • While most of the public radio spectrum bands are allocated to licensed users, cognitive radio has been considered as a promising technology for the efficient spectrum utilization. In this new technology, secondary users opportunistically use the temporally underutilized licensed bands as long as they do not give the harmful interference to primary users. In this paper, we focus on the infra-structured network condition in which the cognitive radio network consists of a cognitive radio base station and multiple secondary users. Upon detecting a primary user, the entire cognitive radio network generally switches to another available channel, even if most of the on-going communications still does not interfere with the primary user. Moreover, the network re-entry process on a new channel causes the service disruption of the on-going communications. For this reason, in this paper, we propose a relaying scheme for efficient frequency usage, in which the secondary user out of the interference range of a primary user performs as a relaying node for the secondary user possibly interfering with a primary user. The entire spectrum switching is not required, and thus, we can avoid the service disruption of the on-going communications as much as possible.