2,380 research outputs found

    The Achievable Rate of Interweave Cognitive Radio in the Face of Sensing Errors

    Get PDF
    Cognitive radio (CR) systems are potentially capable of mitigating the spectrum shortage of contemporary wireless systems. In this paper, we provide a brief overview of CR systems and the important research milestones of their evolution, along with their standardization activities, as a result of their research. This is followed by the detailed analysis of the interweave policy-based CR network (CRN) and by a detailed comparison with the family of underlay-based CRNs. In the interweave-based CRN, sensing of the primary user's (PU) spectrum by the secondary user's (SU) has remained a challenge, because the sensing errors prevent us from fulfilling the significant throughput gains that the concept of CR promises. Since missed detection and false alarm errors in real-time spectrum sensing cannot be avoided, based on a new approach, we quantify the achievable rates of the interweave CR by explicitly incorporating the effect of sensing errors. The link between the PU transmitter and the SU transmitter is assumed to be fast fading. Explicitly, the achievable rate degradation imposed by the sensing errors is analyzed for two spectrum sensing techniques, namely, for energy detection and for magnitude squared coherence-based detection. It is demonstrated that when the channel is sparsely occupied by the PU, the reusing techniques that are capable of simultaneously providing low missed detection and false alarm probabilities cause only a minor degradation to the achievable rates. Furthermore, based on the achievable rates derived for underlay CRNs, we compare the interweave CR and the underlay CR paradigms from the perspective of their resilience against spectrum sensing errors. Interestingly, in many practical regimes, the interweave CR paradigm outperforms the underlay CR paradigm in the presence of sensing errors, especially when the SNR at the SU is below 10 dB and when the SNR at the PU is in the range of 10-40 dB. Furthermore, we also provide rules of thumb that identify regimes, where the interweave CR outperforms the underlay CR

    Interference Alignment for Cognitive Radio Communications and Networks: A Survey

    Get PDF
    © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).Interference alignment (IA) is an innovative wireless transmission strategy that has shown to be a promising technique for achieving optimal capacity scaling of a multiuser interference channel at asymptotically high-signal-to-noise ratio (SNR). Transmitters exploit the availability of multiple signaling dimensions in order to align their mutual interference at the receivers. Most of the research has focused on developing algorithms for determining alignment solutions as well as proving interference alignment’s theoretical ability to achieve the maximum degrees of freedom in a wireless network. Cognitive radio, on the other hand, is a technique used to improve the utilization of the radio spectrum by opportunistically sensing and accessing unused licensed frequency spectrum, without causing harmful interference to the licensed users. With the increased deployment of wireless services, the possibility of detecting unused frequency spectrum becomes diminished. Thus, the concept of introducing interference alignment in cognitive radio has become a very attractive proposition. This paper provides a survey of the implementation of IA in cognitive radio under the main research paradigms, along with a summary and analysis of results under each system model.Peer reviewe

    A SURVEY OF IMPLEMENTATION OF OPPORTUNISTIC SPECTRUM ACCESS ATTACK WITH ITS PREVENTIVE SENSING PROTOCOLS IN COGNITIVE RADIO NETWORKS

    Get PDF
    Recently, the expansive growth of wireless services, regulated by governmental agencies assigning spectrum to licensed users, has led to a shortage of radio spectrum. Since the FCC (Federal Communications Commissions) approved unlicensed users to access the unused channels of the reserved spectrum, new research areas seeped in, to develop Cognitive Radio Networks (CRN), in order to improve spectrum efficiency and to exploit this feature by enabling secondary users to gain from the spectrum in an opportunistic manner via optimally distributed traffic demands over the spectrum, so as to reduce the risk for monetary loss, from the unused channels. However, Cognitive Radio Networks become vulnerable to various classes of threats that decrease the bandwidth and spectrum usage efficiency. Hence, this survey deals with defining and demonstrating framework of one such attack called the Primary User Emulation Attack and suggests preventive Sensing Protocols to counteract the same. It presents a scenario of the attack and its prevention using Network Simulator-2 for the attack performances and gives an outlook on the various techniques defined to curb the anomaly

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
    corecore