31,875 research outputs found

    L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks

    Get PDF
    Channel availability probability (CAP) and channel quality (CQ) are two key metrics that can be used to efficiently design a channel selection strategy in cognitive radio networks. For static scenarios, i.e., where all the users are immobile, the CAP metric depends only on the primary users' activity whereas the CQ metric remains relatively constant. In contrast, for mobile scenarios, the values of both metrics fluctuate not only with time (time-variant) but also over different links between users (link-variant) due to the dynamic variation of primary- and secondary-users' relative positions. As an attempt to address this dynamic fluctuation, this paper proposes L-CAQ: a link-oriented channel-availability and channel-quality based channel selection strategy that aims to maximize the link throughput. The L-CAQ scheme considers accurate estimation of the aforementioned two channel selection metrics, which are governed by the mobility-induced non-stationary network topology, and endeavors to select a channel that jointly maximizes the CAP and CQ. The benefits of the proposed scheme are demonstrated through numerical simulation for mobile cognitive radio networks

    Cooperative sensing of spectrum opportunities

    Get PDF
    Reliability and availability of sensing information gathered from local spectrum sensing (LSS) by a single Cognitive Radio is strongly affected by the propagation conditions, period of sensing, and geographical position of the device. For this reason, cooperative spectrum sensing (CSS) was largely proposed in order to improve LSS performance by using cooperation between Secondary Users (SUs). The goal of this chapter is to provide a general analysis on CSS for cognitive radio networks (CRNs). Firstly, the theoretical system model for centralized CSS is introduced, together with a preliminary discussion on several fusion rules and operative modes. Moreover, three main aspects of CSS that substantially differentiate the theoretical model from realistic application scenarios are analyzed: (i) the presence of spatiotemporal correlation between decisions by different SUs; (ii) the possible mobility of SUs; and (iii) the nonideality of the control channel between the SUs and the Fusion Center (FC). For each aspect, a possible practical solution for network organization is presented, showing that, in particular for the first two aspects, cluster-based CSS, in which sensing SUs are properly chosen, could mitigate the impact of such realistic assumptions

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges
    • …
    corecore