176 research outputs found

    Survey of Spectrum Sharing for Inter-Technology Coexistence

    Full text link
    Increasing capacity demands in emerging wireless technologies are expected to be met by network densification and spectrum bands open to multiple technologies. These will, in turn, increase the level of interference and also result in more complex inter-technology interactions, which will need to be managed through spectrum sharing mechanisms. Consequently, novel spectrum sharing mechanisms should be designed to allow spectrum access for multiple technologies, while efficiently utilizing the spectrum resources overall. Importantly, it is not trivial to design such efficient mechanisms, not only due to technical aspects, but also due to regulatory and business model constraints. In this survey we address spectrum sharing mechanisms for wireless inter-technology coexistence by means of a technology circle that incorporates in a unified, system-level view the technical and non-technical aspects. We thus systematically explore the spectrum sharing design space consisting of parameters at different layers. Using this framework, we present a literature review on inter-technology coexistence with a focus on wireless technologies with equal spectrum access rights, i.e. (i) primary/primary, (ii) secondary/secondary, and (iii) technologies operating in a spectrum commons. Moreover, we reflect on our literature review to identify possible spectrum sharing design solutions and performance evaluation approaches useful for future coexistence cases. Finally, we discuss spectrum sharing design challenges and suggest future research directions

    Enhanced Dynamic Frequency Hopping Performance in Cognitive Radio IEEE 802.22 Standard

    Get PDF
    IEEE 802.22 is a Cognitive Radio based standard designed for Wireless Regional Area Networks (WRAN) for the purpose of providing wireless broadband access to rural and remote areas. The standard relies on the utilization of the unoccupied spectrum that became available after the TV signal was converted from analog to digital. In this thesis, we present an enhanced scheme for the operation of the Dynamic Frequency Hopping (DFH) technique in the IEEE 802.22 standard for WRANs. The performance of the DFH is analyzed thoroughly for various types of channels and for a Multiple-input Multiple-output (MIMO) systems. The core of this research is based on the coexistence of the incumbent users and the WRANs in the TV white spaces (TVWS). The proposed technique, aims at protecting the licensed users from interfering with the cognitive broadband access in the TV spectrum. In order to achieve that, spectrum sensing is performed in the intended working channel in DFH while spectrum monitoring with the energy-ratio (ER) algorithm is applied during the WRAN data transmission in the currently working channel. Hence, in the DFH-ER algorithm the reappearance of an incumbent user in a band occupied by the WRANs would be detected immediately, providing interference free performance for the licensed user as well as reliable data transmission for the unlicensed one. Simulation results of the proposed DFH-ER technique compared to the conventional DFH scenario exemplify the enhancement of the WRAN data transmission while protecting the incumbent users

    A Review and Evaluation of Queue Based Control Power Efficient Spectrum Allocation Method for LTE Networks

    Full text link
    The cognitive radio based wireless regional area networks (WRAN) is nothing but IEEE-802.22 standard. IEEE 802.22 standard enables opportunistic access to in-use or free 900 MHz TV sub bands by secondary networks. There are many other standards presented; however there is no efficient methods for cognitive networks like LTE for channel access and bandwidth utilization. The existing methods for spectrum access in LTE networks, however most of methods are not flexible, power consuming. Also in literature, we studied that existing methods of spectrum allocation in LTE networks does not efficiently achieve the tradeoff between network QoS (Quality of Service) and power efficiency. The goal of this paper is to present the review on such different spectrum efficiency techniques for LTE networks and then evaluate the recent Queue Based Control (QBC) for power efficient spectrum allocation with its limitations and benefits. QBC approach helps in solving the research problem related to the energy efficiency as well as QoS efficiency to some extent. There are two variants of QBC method such as QBC1 and QBC2 with different objectives and configurations. We are evaluating both this approach on LTE network which is composed of Spectrum Manager (SM), evolved Nodes B (eNBs) and number of user’s. The experimental work is conducted using network simulator (NS2) for delay and energy consumption parameters

    Spectrum Sensing and Security Challenges and Solutions: Contemporary Affirmation of the Recent Literature

    Get PDF
    Cognitive radio (CR) has been recently proposed as a promising technology to improve spectrum utilization by enabling secondary access to unused licensed bands. A prerequisite to this secondary access is having no interference to the primary system. This requirement makes spectrum sensing a key function in cognitive radio systems. Among common spectrum sensing techniques, energy detection is an engaging method due to its simplicity and efficiency. However, the major disadvantage of energy detection is the hidden node problem, in which the sensing node cannot distinguish between an idle and a deeply faded or shadowed band. Cooperative spectrum sensing (CSS) which uses a distributed detection model has been considered to overcome that problem. On other dimension of this cooperative spectrum sensing, this is vulnerable to sensing data falsification attacks due to the distributed nature of cooperative spectrum sensing. As the goal of a sensing data falsification attack is to cause an incorrect decision on the presence/absence of a PU signal, malicious or compromised SUs may intentionally distort the measured RSSs and share them with other SUs. Then, the effect of erroneous sensing results propagates to the entire CRN. This type of attacks can be easily launched since the openness of programmable software defined radio (SDR) devices makes it easy for (malicious or compromised) SUs to access low layer protocol stacks, such as PHY and MAC. However, detecting such attacks is challenging due to the lack of coordination between PUs and SUs, and unpredictability in wireless channel signal propagation, thus calling for efficient mechanisms to protect CRNs. Here in this paper we attempt to perform contemporary affirmation of the recent literature of benchmarking strategies that enable the trusted and secure cooperative spectrum sensing among Cognitive Radios

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    A survey on MAC protocols for complex self-organizing cognitive radio networks

    Get PDF
    Complex self-organizing cognitive radio (CR) networks serve as a framework for accessing the spectrum allocation dynamically where the vacant channels can be used by CR nodes opportunistically. CR devices must be capable of exploiting spectrum opportunities and exchanging control information over a control channel. Moreover, CR nodes should intelligently coordinate their access between different cognitive radios to avoid collisions on the available spectrum channels and to vacate the channel for the licensed user in timely manner. Since inception of CR technology, several MAC protocols have been designed and developed. This paper surveys the state of the art on tools, technologies and taxonomy of complex self-organizing CR networks. A detailed analysis on CR MAC protocols form part of this paper. We group existing approaches for development of CR MAC protocols and classify them into different categories and provide performance analysis and comparison of different protocols. With our categorization, an easy and concise view of underlying models for development of a CR MAC protocol is provided

    Adaptive and autonomous protocol for spectrum identification and coordination in ad hoc cognitive radio network

    Get PDF
    The decentralised structure of wireless Ad hoc networks makes them most appropriate for quick and easy deployment in military and emergency situations. Consequently, in this thesis, special interest is given to this form of network. Cognitive Radio (CR) is defined as a radio, capable of identifying its spectral environment and able to optimally adjust its transmission parameters to achieve interference free communication channel. In a CR system, Dynamic Spectrum Access (DSA) is made feasible. CR has been proposed as a candidate solution to the challenge of spectrum scarcity. CR works to solve this challenge by providing DSA to unlicensed (secondary) users. The introduction of this new and efficient spectrum management technique, the DSA, has however, opened up some challenges in this wireless Ad hoc Network of interest; the Cognitive Radio Ad Hoc Network (CRAHN). These challenges, which form the specific focus of this thesis are as follows: First, the poor performance of the existing spectrum sensing techniques in low Signal to Noise Ratio (SNR) conditions. Secondly the lack of a central coordination entity for spectrum allocation and information exchange in the CRAHN. Lastly, the existing Medium Access Control (MAC) Protocol such as the 802.11 was designed for both homogeneous spectrum usage and static spectrum allocation technique. Consequently, this thesis addresses these challenges by first developing an algorithm comprising of the Wavelet-based Scale Space Filtering (WSSF) algorithm and the Otsu's multi-threshold algorithm to form an Adaptive and Autonomous WaveletBased Scale Space Filter (AWSSF) for Primary User (PU) sensing in CR. These combined algorithms produced an enhanced algorithm that improves detection in low SNR conditions when compared to the performance of EDs and other spectrum sensing techniques in the literature. Therefore, the AWSSF met the performance requirement of the IEEE 802.22 standard as compared to other approaches and thus considered viable for application in CR. Next, a new approach for the selection of control channel in CRAHN environment using the Ant Colony System (ACS) was proposed. The algorithm reduces the complex objective of selecting control channel from an overtly large spectrum space,to a path finding problem in a graph. We use pheromone trails, proportional to channel reward, which are computed based on received signal strength and channel availability, to guide the construction of selection scheme. Simulation results revealed ACS as a feasible solution for optimal dynamic control channel selection. Finally, a new channel hopping algorithm for the selection of a control channel in CRAHN was presented. This adopted the use of the bio-mimicry concept to develop a swarm intelligence based mechanism. This mechanism guides nodes to select a common control channel within a bounded time for the purpose of establishing communication. Closed form expressions for the upper bound of the time to rendezvous (TTR) and Expected TTR (ETTR) on a common control channel were derived for various network scenarios. The algorithm further provides improved performance in comparison to the Jump-Stay and Enhanced Jump-Stay Rendezvous Algorithms. We also provided simulation results to validate our claim of improved TTR. Based on the results obtained, it was concluded that the proposed system contributes positively to the ongoing research in CRAHN

    Novel Approaches for the Performance Enhancement of Cognitive Radio Networks

    Full text link
    This research is dedicated to the study of the challenges faced by Cognitive Radio (CR) networks, which include self-coexistence of the networks in the spectral environment, security and performance threats from malicious entities, and fairness in spectrum contention and utilization. We propose novel channel acquisition schemes that allow decentralized CR networks to have multiple channel access with minimal spectrum contentions. The multiple channel acquisition schemes facilitate fast spectrum access especially in cases where networks cannot communicate with each other. These schemes enable CR networks to self-organize and adapt to the dynamically changing spectral environment. We also present a self-coexistence mechanism that allows CR networks to coexist via the implementation of a risk-motivated channel selection based deference structure (DS). By forming DS coalitions, CR networks are able to have better access to preferred channels and can defer transmission to one another, thereby mitigating spectrum conflicts. CR networks are also known to be susceptible to Sybil threats from smart malicious radios with either monopolistic or disruptive intentions. We formulate novel threat and defense mechanisms to combat Sybil threats and minimize their impact on the performance of CR networks. A dynamic reputation system is proposed that considerably minimizes the effectiveness of intelligent Sybil attacks and improves the accuracy of spectrum-based decision-making processes. Finally, we present a distributed and cheat-proof spectrum contention protocol as an enhancement of the adaptive On-Demand Spectrum Contention (ODSC) protocol. The Modified On-Demand Spectrum Contention (MODSC) protocol enhances fairness and efficiency of spectrum access. We also show that there is substantial improvement in spectrum utilization with the incorporation of channel reuse into the MODSC protocol

    Spectrum Sensing Techniqes in Cognitive Radio: Cyclostationary Method

    Get PDF
    Cognitive Radios promise to be a major shift in wireless communications based on developing a novel approach which attempt to reduce spectrum scarcity that growing up in the past and waited to increase in the future. Since formulating stages for increasing interest in wireless application proves to be extremely challenging, it is growing rapidly. Initially this growth leads to huge demand for the radio spectrum. The novelty of this approach needs to optimize the spectrum utilization and find the efficient way for sharing the radio frequencies through spectrum sensing process. Spectrum sensing is one of the most significant tasks that allow cognitive radio functionality to implement and one of the most challenging tasks. A main challenge in sensing process arises from the fact that, detecting signals with a very low SNR in back ground of noise or severely masked by interference in specific time based on high reliability. This thesis describes the fundamental cognitive radio system aspect based on design and implementation by connecting between the theoretical and practical issue. Efficient method for sensing and detecting are studied and discussed through two fast methods of computing the spectral correlation density function, the FFT Accumulation Method and the Strip Spectral Correlation Algorithm. Several simulations have been performed to show the ability and performance of studied algorithms.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format
    • …
    corecore