• Title/Summary/Keyword: Primary-secondary user

Search Result 199, Processing Time 0.019 seconds

Or-Rule Based Cooperative Spectrum Sensing Scheme Considering Reporting Error in Cognitive Radio Networks (인지 무선 네트워크에서 보고 오류를 고려한 OR 규칙 기반의 협력 스펙트럼 센싱 기법)

  • Choe, Romi;Byun, Youn-Shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.1
    • /
    • pp.19-27
    • /
    • 2014
  • As frequency resource has taken on greater importance, Cognitive Radio(CR) technology has been considered as the solution to improve spectrum utilization by allowing a secondary user to utilize a licensed band when the primary user is absent. So spectrum sensing is significant part of CR for high performance. Recently, cooperative spectrum sensing that secondary users share each sensing results is proposed to improve spectrum sensing accuracy. In this paper, OR rule based cooperative spectrum sensing scheme using reporting error probability which occurs in user to fusion center(FC) channel The simulation results show that proposed scheme mitigates false alarm probability limitation which appears in existing cooperative spectrum sensing scheme by restricting the number of cooperating users using reporting error probability.

Spectrum Sensing for Cognitive Radio Networks Based on Blind Source Separation

  • Ivrigh, Siavash Sadeghi;Sadough, Seyed Mohammad-Sajad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.613-631
    • /
    • 2013
  • Cognitive radio (CR) is proposed as a key solution to improve spectral efficiency and overcome the spectrum scarcity. Spectrum sensing is an important task in each CR system with the aim of identifying the spectrum holes and using them for secondary user's (SU) communications. Several conventional methods for spectrum sensing have been proposed such as energy detection, matched filter detection, etc. However, the main limitation of these classical methods is that the CR network is not able to communicate with its own base station during the spectrum sensing period and thus a fraction of the available primary frame cannot be exploited for data transmission. The other limitation in conventional methods is that the SU data frames should be synchronized with the primary network data frames. To overcome the above limitations, here, we propose a spectrum sensing technique based on blind source separation (BSS) that does not need time synchronization between the primary network and the CR. Moreover, by using the proposed technique, the SU can maintain its transmission with the base station even during spectrum sensing and thus higher rates are achieved by the CR network. Simulation results indicate that the proposed method outperforms the accuracy of conventional BSS-based spectrum sensing techniques.

The BBA based Power Allocation Method for the User in Outside Service Area in Cognitive Radio (Cognitive Radio에서 서비스 영역 외부의 사용자를 위한 BBA 기반의 전력할당기법)

  • Cho, Ju-Phil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.123-127
    • /
    • 2009
  • Cognitive Radio rules provide that the user outside service region should not utilize communication system in Cognitive Radio environment. The reason why main user should use service without any loss and interference. If this rule is guaranteed, CR users are able to be offered enough services outside service region. In this paper, we target the issue which can operate practical cognitive systems even without causing excessive interference to legacy users. Also, we focus use on non-interference to the primary system rather than realizable benefits for the secondary systems, and using the proposed device. In this paper, we present the possible scheme using Bi-directional Beamforming Antenna.

  • PDF

Energy Outage Probability and Achievable Throughput of 2-Channel Sensing Secondary Users in RF Powered Cognitive Radio Networks (RF 충전 인지 무선 네트워크에서 2-채널 센싱 2차 사용자의 Energy Outage 확률 및 패킷 전송 성능)

  • Wu, Shanai;Shin, Yoan;Kim, Dong In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1044-1053
    • /
    • 2016
  • In this paper, we consider the secondary users (SUs) who are capable of harvesting energy from ambient radio frequency (RF) signals and are allowed to sequentially sense up to 2 different channels to find out idle channels not occupied by the primary users (PUs). The EH SUs are permitted to transmit data packets only if both idle channels and sufficient energy are available. Compared with traditional SUs, the EH SUs consume energy with data transmission and also harvest energy without additional energy supply. Consequently, the battery state is expected to be fluctuated due to energy consumption and harvesting, and therefore we develop a Markov battery model to provide energy variations at the 2-channel sensing EH SUs. With the proposed battery model, we derive the steady-state probability that the EH SUs completely run out of energy, and the achievable throughput of EH SUs is derived accordingly. To evaluate the proposed Markov battery model, the Monte-Carlo simulation was performed to validate the accuracy of energy outage probability and achievable throughput at the 2-channel sensing EH SUs.

Enhanced Robust Cooperative Spectrum Sensing in Cognitive Radio

  • Zhu, Feng;Seo, Seung-Woo
    • Journal of Communications and Networks
    • /
    • v.11 no.2
    • /
    • pp.122-133
    • /
    • 2009
  • As wireless spectrum resources become more scarce while some portions of frequency bands suffer from low utilization, the design of cognitive radio (CR) has recently been urged, which allows opportunistic usage of licensed bands for secondary users without interference with primary users. Spectrum sensing is fundamental for a secondary user to find a specific available spectrum hole. Cooperative spectrum sensing is more accurate and more widely used since it obtains helpful reports from nodes in different locations. However, if some nodes are compromised and report false sensing data to the fusion center on purpose, the accuracy of decisions made by the fusion center can be heavily impaired. Weighted sequential probability ratio test (WSPRT), based on a credit evaluation system to restrict damage caused by malicious nodes, was proposed to address such a spectrum sensing data falsification (SSDF) attack at the price of introducing four times more sampling numbers. In this paper, we propose two new schemes, named enhanced weighted sequential probability ratio test (EWSPRT) and enhanced weighted sequential zero/one test (EWSZOT), which are robust against SSDF attack. By incorporating a new weight module and a new test module, both schemes have much less sampling numbers than WSPRT. Simulation results show that when holding comparable error rates, the numbers of EWSPRT and EWSZOT are 40% and 75% lower than WSPRT, respectively. We also provide theoretical analysis models to support the performance improvement estimates of the new schemes.

Game Theory based Dynamic Spectrum Allocation for Secondary Users in the Cell Edge of Cognitive Radio Networks

  • Jang, Sungjin;Kim, Jongbae;Byun, Jungwon;Shin, Yongtae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2231-2245
    • /
    • 2014
  • Cognitive Radio (CR) has very promising potential to improve spectrum utilization by allowing unlicensed Secondary Users (SUs) to access the spectrum dynamically without disturbing licensed Primary Users (PUs). Mitigating interference is a fundamental problem in CR scenarios. This is particularly problematic for deploying CR in cellular networks, when users are located at the cell edge, as the inter-cell interference mitigation and frequency reuse are critical requirements for both PUs and SUs. Further cellular networks require higher cell edge performance, then SUs will meet more challenges than PUs. To solve the performance decrease for SUs at the cell edge, a novel Dynamic Spectrum Allocation (DSA) scheme based on Game Theory is proposed in this paper. Full frequency reuse can be realized as well as inter-cell interference mitigated according to SUs' sensing, measurement and interaction in this scheme. A joint power/channel allocation algorithm is proposed to improve both cell-edge user experience and network performance through distributed pricing calculation and exchange based on game theory. Analytical proof is presented and simulation results show that the proposed scheme achieves high efficiency of spectrum usage and improvement of cell edge SUs' performance.

Complexity Reduced CP Length Pre-decision Algorithm for SSS Detection at Initial Cell Searcher of 3GPP LTE Downlink System (3GPP LTE 하향링크 시스템의 초기 셀 탐색기 SSS 검출 시 복잡도 최소화를 위한 CP 길이 선 결정 알고리즘)

  • Kim, Young-Bum;Kim, Jong-Hun;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9A
    • /
    • pp.656-663
    • /
    • 2009
  • In 3GPP LTE system downlink, PSS (primary synchronization signal) and SSS (secondary synchronization signal) sequences are used for initial cell search and synchronization. UE (user equipment) detects slot timing, frequency offset, and cell ID by using PSS. After that it should detect frame timing, cell group ID, and CP length by using SSS. But in 3GPP LTE, there are two kinds of CP length, so we should operate FFT twice. In this paper, to minimize SSS detection complexity in cell searcher, we propose a CP length pre-decision algorithm that reduces the arithmetical complexity by half at most, with negligible performance degradation.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective

  • Gan, Jipeng;Wu, Jun;Zhang, Jia;Chen, Zehao;Chen, Ze
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4224-4243
    • /
    • 2021
  • Cognitive radio (CR) is a feasible intelligent technology and can be used as an effective solution to spectrum scarcity and underutilization. As the key function of CR, cooperative spectrum sensing (CSS) is able to effectively prevent the harmful interference with primary users (PUs) and identify the available spectrum resources by exploiting the spatial diversity of multiple secondary users (SUs). However, the open nature of the cognitive radio networks (CRNs) framework makes CSS face many security threats, such as, the malicious user (MU) launches Byzantine attack to undermine CRNs. For this aim, we make an in-depth analysis of the motive and purpose from the MU's perspective in the interweave CR system, aiming to provide the future guideline for defense strategies. First, we formulate a dynamic Byzantine attack model by analyzing Byzantine behaviors in the process of CSS. On the basis of this, we further make an investigation on the condition of making the fusion center (FC) blind when the fusion rule is unknown for the MU. Moreover, the throughput and interference to the primary network are taken into consideration to evaluate the impact of Byzantine attack on the interweave CR system, and then analyze the optimal strategy of Byzantine attack when the fusion rule is known. Finally, theoretical proofs and simulation results verify the correctness and effectiveness of analyses about the impact of Byzantine attack strategy on the throughput and interference.

Projection of Spatial Correlation-Based Antenna Selection for Cognitive Radio Systems in Correlated Channels (인지무선 시스템의 상관채널에서 공간 상관 행렬 사영을 이용한 안테나 선택기법)

  • Cho, Jae-Bum;Jang, Sung-Jeen;Jung, Won-Sik;Kim, Jae-Moung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1A
    • /
    • pp.8-16
    • /
    • 2012
  • Recent work has been shown that cognitive radio systems with multiple antenna at both transmitter and receiver are able to improve performance of secondary users. In such system, the main drawback is the increased complexity and raised cost as the number of antennas increase. It is desirable to apply antenna selection which select a subset of the available antennas so as to solve these problems. In this paper, we consider antenna selection method for cognitive radio systems in correlated channel from the IEEE 802.11n. For a multiple-input multiple-output(MIMO) system with more antennas at transmitter than the receiver, we select the same number of transmit antennas as that of receive antennas. The exhaustive search for optimal antenna becomes impractical. We present criterion for selecting subset in terms of projection of channel correlation vector to increase performance of secondary user with decreasing interference at primary user.