• Title/Summary/Keyword: Primary User

Search Result 632, Processing Time 0.021 seconds

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

Active Secondary User Selection Algorithm of Opportunistic Spatial Orthogonalization Considering Interference by a Primary User (주 사용자의 간섭을 고려한 Opportunistic Spatial Orthogonalization의 활성 부 사용자 선택 알고리즘)

  • Yoo, Kang-Hyun;Kim, Yong-Hwa;Lee, Han-Byul;Kim, Seong-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11A
    • /
    • pp.892-902
    • /
    • 2011
  • The opportunistic spatial orthogonalization (OSO) scheme, proposed by Cong Shen and Michael P. Fitz, allows the existence of secondary users during the period in which the primary user is occupying all licensed bands. This paper introduces an active secondary user selection algorithm which mitigates the interference from the primary user transmitter to the secondary user receiver based on single-input multi-output system without altering a primary user's transmission strategy. A proposed algorithm guarantees the minimum average throughput of the primary user and overcomes the average sum throughput of a conventional OSO. We have numerically analyzed the average throughput under various constraints.

Cognitive radio system based on channel list for efficient channel searching (효과적 채널 검색을 위한 채널 목록 기반 무선 인지 시스템)

  • Lee, Young-Du;Koo, In-Soo
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.284-286
    • /
    • 2009
  • In this paper, we consider a cognitive radio system operating as secondary user. It uses an empty channel that is not currently used by primary users having the license to the channel. In the previous works, secondary user looks for an empty channel by choosing any channel in order or randomly and by sensing the channel to distinguish whether primary users are using. But if primary user is fixed type, we will find an empty channel faster than the mentioned channel selecting methods by using a method considering prior information about cases that primary user used the channel, since it is possible to analogize the channel access possibility of primary user according to regular time and position. Therefore, we propose a channel searching method based on the channel list for the purpose of reducing the channel searching time and improving throughput of secondary users. Firstly, we determine a weighting value of each channel based on the history of channel activities of primary users. This value is added to current channel state buffer and we search an empty channel from channel with smallest value to one with the biggest value. Finally, we compare the performances of the proposed method with those of the sequential channel searching and the random channel searching methods in terms of the average channel searching time and the average number of transmissions of secondary user.

  • PDF

Cooperative Power Control Scheme for a Spectrum Sharing System

  • Ban, Tae-Won;Jung, Bang-Chul
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.641-646
    • /
    • 2011
  • In this paper, we investigate a power control problem which is very critical in underlay-based spectrum sharing systems. Although an underlay-based spectrum sharing system is more efficient compared to an overlay-based spectrum sharing system in terms of spectral utilization, some practical problems obstruct its commercialization. One of them is a real-time-based power adaptation of secondary transmitters. In the underlay-based spectrum sharing system, it is essential to adapt secondary user's transmit power to interference channel states to secure primary users' communication. Thus, we propose a practical power control scheme for secondary transmitters. The feedback overhead of our proposed scheme is insignificant because it requires one-bit signaling, while the optimal power control scheme requires the perfect information of channel states. In addition, the proposed scheme is robust to feedback delay. We compare the performance of the optimal and proposed schemes in terms of primary user's outage probability and secondary user's throughput. Our simulation results show that the proposed scheme is almost optimal in terms of both primary user's outage probability and secondary user's throughput when the secondary user's transmit power is low. As the secondary user's transmit power increases, the primary user's outage probability of the proposed scheme is degraded compared with the optimal scheme while the secondary user's throughput still approaches that of the optimal scheme. If the feedback delay is considered, however, the proposed scheme approaches the optimal scheme in terms of both the primary user's outage probability and secondary user's throughput regardless of the secondary user's transmit power.

Performance Analysis and Evaluation of Mean Value-based Power Allocation in Spectrum Sharing Systems with Interference from the Primary Transmitter (주파수 공유 시스템에서 일차 사용자에 의한 간섭이 존재할 때 채널 평균값 기반 전력 할당 기법의 성능 분석 및 평가)

  • Lim, Sung-Mook;Hong, Dae-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.8
    • /
    • pp.77-83
    • /
    • 2012
  • In this paper, when interference caused by the primary user exists, the capacity performance of the mean value-based power allocation scheme is analyzed and evaluated under the outdated channel environment in spectrum sharing systems. When interference due to the primary transmitter affects the secondary receiver, we derive the upper bound of the ergodic capacity of the mean value-based power allocation scheme in a closed form. Furthermore, based on that, we investigate how interference due to the primary transmitter degrades the ergodic capacity of the secondary user. In simulation results, we show the performance degradation of the secondary user due to interference caused by the primary user. In addition, we show that the region where the mean value-based power allocation scheme outperforms the outdated channel information-based power allocation scheme is reduced as interference by the primary user increases.

Optimal Price and Auction Period Decision Method Based on Auction Game Theory for Spectrum Allocation in Cognitive Radio Networks (인지무선 주파수 분배 과정에서 옥션게임을 이용한 최적 가격 및 옥션 주기 결정 방법)

  • Park, Jin-Seok;Kang, Keon-Kyu;Lee, Sang-Young;Baek, Sun-Woo;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.11
    • /
    • pp.944-954
    • /
    • 2013
  • Cognitive radio technology gives secondary users chances that they can use specific spectrum of the primary user when the primary user doesn't use it. This paper proposes the algorithm that maximizes the benefit of the primary user considering spectrum price and auction period by using the auction game theory. According to the ratio of spectrum that secondary users bid, primary user allocates spectrum to secondary users. In the process of repeated auction, the primary user gets to find the optimal price of spectrum. Using the price and the proposed utility function of primary user, we derive the optimal auction period. At the same time, the primary user finally determines the price of spectrum appropriate for the optimal period.

On the Capacity for the Secondary User with Primary Full Duplex Relay Network in Spectrum Sharing Systems (주파수 공유 시스템에서 일차 사용자가 양방향 중계기를 사용할 때의 이차 사용자의 통신 용량 분석)

  • Kim, Hyung-Jong;Hong, Dae-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.8
    • /
    • pp.39-45
    • /
    • 2012
  • This paper investigates the capacity for the secondary user with the primary full duplex relay (FDR) network in spectrum sharing systems. For sharing the spectrum of the primary user, sharing scheme under the various primary network should be investigated. However, the conventional works only consider the point-to-point primary communication system. When the FDR node is used for the primary networks, both primary relay and destination suffer the interference from the secondary transmitter simultaneously. Thus, the strict interference constraint should be considered to share the spectrum of the primary user. Therefore, we investigate the capacity of the secondary user with the primary FDR network under the average and peak received-power constraints. In addition, we analyze the performance degradation by the selection of the worst interference channels to consider interference constraint in this system. Through the numerical results, the capacities of the primary and secondary users under the average received-power is superior to the that under the peak received-power constraint.

Interference Temperature Multiple Access Technique for Coexistence with Primary Users (주사용자와의 공존을 위한 간섭온도 다중접속 기술)

  • Park, Jae-Suk;Choi, Joo-Pyoung;Park, Soon-Kyu;Lee, Su-Bok;Ahn, Dong-Myung;Lee, Won-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11C
    • /
    • pp.1119-1126
    • /
    • 2007
  • In this paper, we examine the scheme that the CR (Cognitive Radio) user can coexist with primary user with obeying the concept of interference temperature proposed by FCC. Regarding to the capability of classifying the signals of primary user after the spectrum sensing, the interference temperature model can be discriminated by the ideal and generalized ones. And then, about each model, it can optimize the bandwidth and transmit power with satisfying predetermined capacity of CR user. Especially, it has been considered to allocate to CR user not to interfere to primary users for proper coexistence in conventional interference temperature multiple access technique, proposed by T. Clancy, but this paper proposes the scheme that considering QoS of not only primary users, but also CR user. The hill-climbing algorithm is employed to produce the bandwidth and transmit power subject to satisfying the required capacity.

Entropy-based Spectrum Sensing for Cognitive Radio Networks in the Presence of an Unauthorized Signal

  • So, Jaewoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.20-33
    • /
    • 2015
  • Spectrum sensing is a key component of cognitive radio. The prediction of the primary user status in a low signal-to-noise ratio is an important factor in spectrum sensing. However, because of noise uncertainty, secondary users have difficulty distinguishing between the primary signal and an unauthorized signal when an unauthorized user exists in a cognitive radio network. To resolve the sensitivity to the noise uncertainty problem, we propose an entropy-based spectrum sensing scheme to detect the primary signal accurately in the presence of an unauthorized signal. The proposed spectrum sensing uses the conditional entropy between the primary signal and the unauthorized signal. The ability to detect the primary signal is thus robust against noise uncertainty, which leads to superior sensing performance in a low signal-to-noise ratio. Simulation results show that the proposed spectrum sensing scheme outperforms the conventional entropy-based spectrum sensing schemes in terms of the primary user detection probability.

Joint Subcarrier and Bit Allocation for Secondary User with Primary Users' Cooperation

  • Xu, Xiaorong;Yao, Yu-Dong;Hu, Sanqing;Yao, Yingbiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3037-3054
    • /
    • 2013
  • Interference between primary user (PU) and secondary user (SU) transceivers should be mitigated in order to implement underlay spectrum sharing in cognitive radio networks (CRN). Considering this scenario, an improved joint subcarrier and bit allocation scheme for cognitive user with primary users' cooperation (PU Coop) in CRN is proposed. In this scheme, the optimization problem is formulated to minimize the average interference power level at the PU receiver via PU Coop, which guarantees a higher primary signal to interference plus noise ratio (SINR) while maintaining the secondary user total rate constraint. The joint optimal scheme is separated into subcarrier allocation and bit assignment in each subcarrier via arith-metric geo-metric (AM-GM) inequality with asymptotical optimization solution. Moreover, the joint subcarrier and bit optimization scheme, which is evaluated by the available SU subcarriers and the allocated bits, is analyzed in the proposed PU Coop model. The performance of cognitive spectral efficiency and the average interference power level are investigated. Numerical analysis indicates that the SU's spectral efficiency increases significantly compared with the PU non-cooperation scenario. Moreover, the interference power level decreases dramatically for the proposed scheme compared with the traditional Hughes-Hartogs bit allocation scheme.