343 research outputs found

    A novel MAC Protocol for Cognitive Radio Networks

    Get PDF
    In Partial Fulfilment of the Requirements for the Degree Doctor of Philosophy from the University of BedfordshireThe scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting transmission characteristics. In this thesis, recent research and survey about the advances in theory and applications of cognitive radio technology has been reviewed. The thesis starts with the essential background on cognitive radio techniques and systems and discusses those characteristics of CR technology, such as standards, applications and challenges that all can help make software radio more personal. It then presents advanced level material by extensively reviewing the work done so far in the area of cognitive radio networks and more specifically in medium access control (MAC) protocol of CR. The list of references will be useful to both researchers and practitioners in this area. Also, it can be adopted as a graduate-level textbook for an advanced course on wireless communication networks. The development of new technologies such as Wi-Fi, cellular phones, Bluetooth, TV broadcasts and satellite has created immense demand for radio spectrum which is a limited natural resource ranging from 30KHz to 300GHz. For every wireless application, some portion of the radio spectrum needs to be purchased, and the Federal Communication Commission (FCC) allocates the spectrum for some fee for such services. This static allocation of the radio spectrum has led to various problems such as saturation in some bands, scarcity, and lack of radio resources to new wireless applications. Most of the frequencies in the radio spectrum have been allocated although many studies have shown that the allocated bands are not being used efficiently. The CR technology is one of the effective solutions to the shortage of spectrum and the inefficiency of its utilization. In this thesis, a detailed investigation on issues related to the protocol design for cognitive radio networks with particular emphasis on the MAC layer is presented. A novel Dynamic and Decentralized and Hybrid MAC (DDH-MAC) protocol that lies between the CR MAC protocol families of globally available common control channel (GCCC) and local control channel (non-GCCC). First, a multi-access channel MAC protocol, which integrates the best features of both GCCC and non-GCCC, is proposed. Second, an enhancement to the protocol is proposed by enabling it to access more than one control channel at the same time. The cognitive users/secondary users (SUs) always have access to one control channel and they can identify and exploit the vacant channels by dynamically switching across the different control channels. Third, rapid and efficient exchange of CR control information has been proposed to reduce delays due to the opportunistic nature of CR. We have calculated the pre-transmission time for CR and investigate how this time can have a significant effect on nodes holding a delay sensitive data. Fourth, an analytical model, including a Markov chain model, has been proposed. This analytical model will rigorously analyse the performance of our proposed DDH-MAC protocol in terms of aggregate throughput, access delay, and spectrum opportunities in both the saturated and non-saturated networks. Fifth, we develop a simulation model for the DDH-MAC protocol using OPNET Modeler and investigate its performance for queuing delays, bit error rates, backoff slots and throughput. It could be observed from both the numerical and simulation results that when compared with existing CR MAC protocols our proposed MAC protocol can significantly improve the spectrum utilization efficiency of wireless networks. Finally, we optimize the performance of our proposed MAC protocol by incorporating multi-level security and making it energy efficient

    Secure MAC protocols for cognitive radio networks

    Get PDF
    A thesis submitted in partial fulfilment for the degree of Doctor of PhilosophyWith the rapid increase in wireless devices, an effective improvement in the demand of efficient spectrum utilisation for gaining better connectivity is needed. Cognitive Radio (CR) is an emerging technology that exploits the inefficient utilisation of the unused spectrum dynamically. Since spectrum sharing is responsible for coordinating channels’ access for Cognitive Users (CUs), the Common Control Channel (CCC) is one of the existing methods used to exchange the control information between CUs. However, the unique characteristics and parameters of Cognitive Radio Networks (CRNs) present several possible threats targeting spectrum sensing, spectrum management, spectrum sharing, and spectrum mobility leading to the deterioration of the network performance. Thus, protection and detection security mechanisms are essential to maintaining the CRNs. This thesis presents a novel decentralised CR MAC protocol that successfully utilises the unused portion of the licensed band. The protocol achieves improved performance; communication time and throughput when compared to two benchmark protocols. Less communication time and higher throughput are accomplished by the protocol due to performing fast switching to the selected available data channel for initiating data transmission. The proposed protocol is then extended to two different versions based on two authentication approaches applied to it; one using Digital Signature and another is based on Shared-Key. The two proposed secure protocols address the security requirements in CRNs leading to subsequent secure communication among CUs. The protocols function effectively in providing defence against several attacks related to the MAC layer such as; Spectrum Sensing Data Manipulation/Falsification, Data Tempering and Modification, Jamming attacks, Eavesdropping, Forgery and Fake control information attacks, MAC address spoofing, and unauthorised access attacks. The associated security algorithms ensure the successful secure communication between CUs in a cooperative approach. Moreover, the security protocols are investigated and analysed in terms of security flows by launching unauthorised access and modification attacks on the transmitted information. The testing results demonstrated that two protocols perform successful detection of threats and ensure secure communication in CRNs

    Facilitating Flexible Link Layer Protocols for Future Wireless Communication Systems

    Get PDF
    This dissertation addresses the problem of designing link layer protocols which are flexible enough to accommodate the demands offuture wireless communication systems (FWCS).We show that entire link layer protocols with diverse requirements and responsibilities can be composed out of reconfigurable and reusable components.We demonstrate this by designing and implementinga novel concept termed Flexible Link Layer (FLL) architecture.Through extensive simulations and practical experiments, we evaluate a prototype of the suggested architecture in both fixed-spectrumand dynamic spectrum access (DSA) networks. FWCS are expected to overcome diverse challenges including the continual growthin traffic volume and number of connected devices.Furthermore, they are envisioned to support a widerange of new application requirements and operating conditions.Technology trends, including smart homes, communicating machines, and vehicularnetworks, will not only grow on a scale that once was unimaginable, they will also become the predominant communication paradigm, eventually surpassing today's human-produced network traffic. In order for this to become reality, today's systems have to evolve in many ways.They have to exploit allocated resources in a more efficient and energy-conscious manner.In addition to that, new methods for spectrum access and resource sharingneed to be deployed.Having the diversification of applications and network conditions in mind, flexibility at all layers of a communication system is of paramount importance in order to meet the desired goals. However, traditional communication systems are often designed with specific and distinct applications in mind. Therefore, system designers can tailor communication systems according to fixedrequirements and operating conditions, often resulting in highly optimized but inflexible systems.Among the core problems of such design is the mix of data transfer and management aspects.Such a combination of concerns clearly hinders the reuse and extension of existing protocols. To overcome this problem, the key idea explored in this dissertation is a component-based design to facilitate the development of more flexible and versatile link layer protocols.Specifically, the FLL architecture, suggested in this dissertation, employs a generic, reconfigurable data transfer protocol around which one or more complementary protocols, called link layer applications, are responsible for management-related aspects of the layer. To demonstrate the feasibility of the proposed approach, we have designed andimplemented a prototype of the FLL architecture on the basis ofa reconfigurable software defined radio (SDR) testbed.Employing the SDR prototype as well as computer simulations, thisdissertation describes various experiments used to examine a range of link layerprotocols for both fixed-spectrum and DSA networks. This dissertation firstly outlines the challenges faced by FWCSand describes DSA as a possible technology component for their construction.It then specifies the requirements for future DSA systemsthat provide the basis for our further considerations.We then review the background on link layer protocols, surveyrelated work on the construction of flexible protocol frameworks,and compare a range of actual link layer protocols and algorithms.Based on the results of this analysis, we design, implement, and evaluatethe FLL architecture and a selection of actual link layer protocols. We believe the findings of this dissertation add substantively to the existing literature on link layer protocol design and are valuable for theoreticians and experimentalists alike

    Spectrum handoff strategy for cognitive radio-based Mac in industrial wirless sensor and actuator networks

    Get PDF
    In this thesis, a Cognitive Radio(CR)-based MAC for Industrial Wireless Sensor and Actuator Network (IWSAN) applications is proposed. IWSANs are typically used for closed-loop control applications, and they demand strict requirements in terms of time and robustness. Low latency and low error rates are required in order not to endanger persons or machinery. Moreover, these applications operate in industrial environments such as factories or transport scenarios (as aeronautics or railway) where multipath fading and shadowing are present due to metal surfaces. Furthermore, interference from other communication systems or industrial machinery is also common in these environments. The proposed MAC, based on the CR paradigm, is capable of ensuring time and robustness requirements in industrial channels. In the process of designing the CR-based MAC for IWSAN applications, a comparison between several non-CR-based MACs and CR-based MACs has been carried out. This comparison, which allows stating the benefits of CR for these applications, is presented in this thesis. The performance of every MAC is determined theoretically using Network Calculus, and it is validated through OPNET simulations. CR solutions, due to their adaptability characteristics, are capable of avoiding interference and ensuring robustness in industrial environments. However, none of the selected MACs are capable of ensuring robustness without comprising time requirements, since interference is avoided but not in a bounded time. On the other hand, the MAC proposed in this thesis is capable of avoiding interference ensuring time and robustness requirements at the same time. This MAC is therefore suitable for IWSAN applications. To ensure a deterministic behavior against interference, a novel handoff algorithm, which detects interference and hops to another channel, has been proposed. This algorithm has been designed to be used jointly with one of the evaluated MACs. The detection of the interference and the hop to another channel is done in a bounded time, because the proposed algorithm detects interference while the system is transmitting. The performance of this proposal is evaluated using Network Calculus and OPNET simulations, and the results are compared with the system without the proposed handoff algorithm. The comparison of the results shows how the evaluated MAC is only capable of ensuring both time and robustness requirements when the proposed handoff strategy is used. Moreover, the spectrum sensing algorithm used to obtain information about the environment is delved and its performance is measured through MATLAB simulations. An energy detector has been chosen due to its simplicity. Also, a cyclostationary Modulation Classifier is presented and a simplification has been carried out allowing its implementation on real hardware. The Modulation Classifier is capable of distinguishing between OFDM, QPSK and GFSK signals. The performance of the algorithm is presented in this thesis for different signals and for different receiver impairments such as frequency offset, DC offset and I/Q imbalance. Finally, a cognitive platform to validate the spectrum sensing algorithms is presented. This platform has been designed using a Xilinx Virtex 6 FPGA by a working group composed of researchers from IK4-Ikerlan and Mondragon Unibertsitatea. The platform, which uses both spectrum sensing algorithms, is an Ethernet-to-RF bridge. It has been designed to replace an Ethernet wired link by a wireless one for IWSAN applications. The proposed platform ensures a reliable communication link against interference. In the proposed implementation, the energy detector is used by the transmitter in order to find a free channel to transmit data, whereas the modulation classifier is used by the receiver in order to distinguish between the signal transmitted by the RF-Ethernet bridge and other signals. In this way the receiver can find the channel where the transmitter is carrying out the communication.En esta tesis se propone una MAC basada en el paradigma de la Radio Cognitiva (RC) para redes de sensores y actuadores inalámbricos industriales. Estas redes se suelen utilizar para aplicaciones de control en lazo cerrado, que exigen requisitos estrictos de tiempo y robustez. Para no poner en peligro la salud de las personas o la maquinaria es necesario que la red asegure una baja latencia y una tasa baja de errores. Además, al trabajar en ambientes industriales como fábricas o transportes (trenes, aviones, etc.), estas redes tienen que hacer frente a canales con mucho desvanecimiento por multitrayecto y efecto sombra debido a las superficies metálicas. También es común en estos entornos que haya interferencias de otros sistemas de comunicaciones o de la propia maquinaria industrial. La MAC propuesta en esta tesis es capaz de asegurar los requisitos temporales y de robustez demandados trabajando en este tipo de entornos. En el proceso de diseño de la MAC basada en RC para redes de sensores y actuadores inalámbricos industriales, se ha llevado a cabo una comparación de diferentes MACs diseñadas para estas redes. Se han evaluado tanto MACs basadas en RC como no basadas en ella, estableciendo las ventajas de la RC para estas aplicaciones. La evaluación se ha llevado a cabo haciendo un estudio teórico mediante Network Calculus, cuyos resultados se han validado mediante simulaciones en OPNET. Los resultados muestran como la RC es capaz de evitar interferencias y asegurar robustez en ambientes industriales. Sin embargo, ninguna de las MACs seleccionadas ha conseguido asegurar ambos requisitos, temporales y de robustez, al mismo tiempo; se puede evitar las interferencias pero no sin comprometer los requisitos temporales de la aplicación. Sin embargo, la MAC propuesta es capaz de evitar interferencias asegurando al mismo tiempo los requisitos temporales y de robustez. Por lo tanto, la MAC propuesta es apropiada para este tipo de redes. Para asegurar el comportamiento determinista del sistema, se ha propuesto un novedoso algoritmo de handoff que es capaz de detectar una interferencia y saltar a otro canal. Este algoritmo se ha diseñado para ser utilizado conjuntamente con una de las MACs previamente evaluadas. La detección de la interferencia y el salto a otro canal se hace en un tiempo determinado de tiempo, ya que es posible detectar interferencias mientras el sistema está transmitiendo. Su rendimiento se ha evaluado mediante Network Calculus y simulaciones en OPNET, y se ha comparado con los resultados obtenidos con la MAC cuando no se utiliza el esquema propuesto. De la comparación se deduce que el esquema de handoff añade a la MAC la capacidad de asegurar a la vez los requisitos temporales y de robustez. Además, en la tesis se explica el algoritmo de spectrum sensing que la MAC utiliza para obtener información del entorno, y su rendimiento se ha estudiado mediante simulaciones en MATLAB. Debido a su simplicidad, se ha optado por un detector de energía para este propósito. También se presenta un clasificador de modulaciones cicloestacionario. Este clasificador ha sido simplificado todo lo posible para posibilitar su implementación en hardware real. El clasificador de modulaciones es capaz de distinguir entre señales OFDM, QPSK y GFSK. Su rendimiento se detalla para diferentes señales y para diferentes deficiencias presentes en el receptor, como son offset de frecuencia, offset de continua o desequilibrios I/Q. Por último, se presenta una plataforma cognitiva que se ha utilizado para validar los algoritmos de spectrum sensing. Un grupo de trabajo compuesto por investigadores de IK4-Ikerlan y Mondragon Unibertsitatea ha diseñado esta plataforma sobre una FPGA Virtex 6 de Xilinx. La plataforma, que utiliza los dos algoritmos de spectrum sensing, es un puente Ethernet-RF. Su objetivo es reemplazar un enlace cableado de Ethernet por uno inalámbrico para aplicaciones de redes de sensores y actuadores industriales. Gracias a los algoritmos de spectrum sensing, la plataforma es capaz de asegurar un enlace robusto ante interferencias. El detector de energía se utiliza en el transmisor para encontrar los posibles canales libres donde transmitir la información. Mientras que el clasificador de modulaciones se utiliza en el receptor para distinguir entre la señal del transmisor y otras posibles señales. Esto permite al receptor saber en qué canal de todos los posibles está el transmisor.Tesi honetan proposatzen da Irrati Kognitiboaren (IK) paradigman oinarritutako MAC bat industriako haririk gabeko sentsore eta eragingailuen sareetarako. Sare horiek begizta itxiko kontrol aplikazioetarako erabili ohi dira, denbora eta sendotasunaren aldetik baldintza ugari eskatzen dute eta. Pertsonen osasuna eta makinak arriskuan ez jartzeko, beharrezkoa da sareak latentzia eta hutsegite tasa txikiak bermatzea. Gainera, industri giroetan lan egiteko direnez, esaterako, lantegietan edo garraioetan (trenak, hegazkinak, etab.), sare horiek gai izan behar dira gainazal metalikoek eragiten dituzten ibilbide aniztunaren eta itzal efektuaren ondorioz asko barreiatzen diren kanalei aurre egiteko. Ingurune horien ohiko ezaugarria da, baita ere, beste komunikazio sistema batzuen edo industriako makinen beraien interferentziak egotea. Tesi honetan proposatzen den MACa gai da honelako inguruetan lan egiteko denborari eta sendotasunari dagokienez eskatzen dituen baldintzak ziurtatzeko. IKan oinarrituta haririk gabeko sentsore eta eragingailu industrialen sareetarako MACa diseinatzeko prozesuan, horrelako sareetarako aurkeztu diren hainbat MAC alderatu dira. IKan oinarritutako MACak zein bestelakoak ebaluatu dira, eta IKak aplikazio hauetarako dituen abantailak ezarri dira. Ebaluaziorako Network Calculus erabili da, zeinaren bidez azterketa teoriko bat egin baita, eta azterketaren emaitzak OPNETen simulazioak eginda baliozkotu dira. Emaitzek erakusten dutenez, IKa gai da industriako inguruneetan interferentziak ekidin eta sendotasuna ziurtatzeko. Halere, aukeratu diren MACetatik batek ere ez du lortu baldintza biak, denborari buruzkoa zein sendotasunari buruzkoa, aldi berean ziurtatzea; interferentziak ekidin daitezke, baina ez aplikazioaren denborari buruzko baldintzak arriskuan jarri gabe. Dena dela, proposatu den MACak portaera determinista bat ziurtatzen du interferentziekiko, eta aldi berean denborari eta sendotasunari buruzko baldintzak ere ziurtatzen ditu. Hortaz, MAC hau egokia da sare mota honetarako. Sistemaren portaera determinista ziurtatzeko, handoff algoritmo berritzailea proposatu da, zeina interferentzia bat antzeman eta beste kanal bat igarotzeko gai den. Algoritmo hori aurretik ebaluatutakoa MACetako batekin batera erabiltzeko diseinatu da. Interferentzia antzeman eta beste kanal batera salto egitea denbora jakin batean egiten da, izan ere, sistema transmititzen ari dela antzeman baitaitezke interferentziak. Network Calculusen bitartez eta OPNETeko simulazioen bitartez ebaluatu da sistemaren errendimendua, eta proposatutako eskema erabiltzen ez denean MACak ematen dituen emaitzekin alderatu da. Alderaketa horretatik ondorioztatzen denez, handoff eskemak denborari eta sendotasunari buruzko baldintzak batera ziurtatzeko ahalmena ematen dio MACari. Gainera, tesiak azaltzen du inguruneari buruzko informazioa eskuratzeko MACak erabiltzen duen spectrum sensing algoritmoa, eta bere errendimendua MATLABen simulazioak eginez aztertu da. Bere sinpletasuna dela eta, energia detektore bat aukeratu da asmo honetarako. Modulazio sailkatzaile zikloegonkor bat ere aurkezten da. Sailkapen hori ahalik eta gehien sinplifikatu da benetako hardwarean inplementatu ahal izateko. Modulazioen sailkatzaileak OFDM, QPSK eta GFSK seinaleak bereizi ditzake. Bere errendimendua hargailuan dauden seinale eta akats desberdinetarako zehazten da, esaterako maiztasunaren offset-a,zuzenaren offset-a edo I/Q desorekak. Bukatzeko, spectrum sensing-eko algoritmoak baliozkotzeko erabili den plataforma kognitibo bat aurkezten da. IK4-Ikerlaneko eta Mondragon Unibertsitateko ikertzailez osatutako lantalde batek diseinatu du plataforma hori Xilinxen Virtex 6 FPGA baten oinarrutz. Plataformak spectrum sensing-eko bi algoritmo erabiltzen ditu eta Ethernet-RF zubi bat da. Bere helburua da Etherneteko kable bidezko lotura bat haririk gabeko batekin ordeztea industriako sentsore eta eragingailuen sareetan aplikatzeko. Spectrum sensing-eko algoritmoei esker, plataformak lotura sendoa bermatu dezake interferentziak gertatzen direnean. Energia detektorea transmisorean erabiltzen da informazioa transmititzeko erabilgarri egon daitezkeen kanalak aurkitzeko. Modulazioen sailkatzailea, berriz, hargailuan erabiltzen da transmisorearen seinalea eta egon daitezkeen beste seinale batzuk bereizteko. Horri esker, hargailuak badaki posible diren kanal guztietatik non dagoen transmisorea

    Medium access control design for distributed opportunistic radio networks

    Get PDF
    Existing wireless networks are characterized by a fixed spectrum assignment policy. However, the scarcity of available spectrum and its inefficient usage demands for a new communication paradigm to exploit the existing spectrum opportunistically. Future Cognitive Radio (CR) devices should be able to sense unoccupied spectrum and will allow the deployment of real opportunistic networks. Still, traditional Physical (PHY) and Medium Access Control (MAC) protocols are not suitable for this new type of networks because they are optimized to operate over fixed assigned frequency bands. Therefore, novel PHY-MAC cross-layer protocols should be developed to cope with the specific features of opportunistic networks. This thesis is mainly focused on the design and evaluation of MAC protocols for Decentralized Cognitive Radio Networks (DCRNs). It starts with a characterization of the spectrum sensing framework based on the Energy-Based Sensing (EBS) technique considering multiple scenarios. Then, guided by the sensing results obtained by the aforementioned technique, we present two novel decentralized CR MAC schemes: the first one designed to operate in single-channel scenarios and the second one to be used in multichannel scenarios. Analytical models for the network goodput, packet service time and individual transmission probability are derived and used to compute the performance of both protocols. Simulation results assess the accuracy of the analytical models as well as the benefits of the proposed CR MAC schemes

    Mobile ad hoc networks in transportation data collection and dissemination

    Get PDF
    The field of transportation is rapidly changing with new opportunities for systems solutions and emerging technologies. The global economic impact of congestion and accidents are significant. Improved means are needed to solve them. Combined with the increasing numbers of vehicles on the road, the net economic impact is measured in the many billions of dollars. Promising methodologies explored in this thesis include the use of the Internet of Things (IoT) and Mobile Ad Hoc Networks (MANET). Interconnecting vehicles using Dedicated Short Range Communication technology (DSRC) brings many benefits. Integrating DSRC into roadway vehicles offers the promise of reducing the problems of congestion and accidents; however, it comes with risks such as loss of connectivity due to power outages as well as controlling and managing loading in such networks. Energy consumption of vehicle communication equipment is a crucial factor in high availability sensor networks. Sending critical emergency messaged through linked vehicles requires that there always be energy and communication reserves. Two algorithms are described. The first controls energy consumption to guarantee an energy reserve for sending alert signals. The second exploits Long Term Evolution (LTE) to guarantee a reliable communication path

    Enhanced multichannel routing protocols in MANET

    Get PDF
    Utilising multiple non-overlapping channels in MANET networking can improve performance and capacity. Most multichannel MAC and routing protocols rely on an extra radio interface, a common control channel or time synchronisation to support channel selection and routing, but only at the expense of hardware and power consumption costs. This thesis considers an alternative type of multichannel wireless network where each node has a single half-duplex radio interface and does not rely on a common control channel or time synchronisation. Multichannel MAC and routing protocols that adopt the Receiver Directed Transmission (RDT) communication scheme are investigated to assess their ability to implement a multichannel MANET. A novel multipath multichannel routing protocol called RMMMC is proposed to enhance reliability and fault-tolerance in the MANET. RMMMC introduces new route discovery and recovery processes. The former establishes multiple node and channel disjointed paths in different channels and accumulates them to acquire a full multi-hop path to each destination. The latter detects broken links and repairs them using pre-discovered backup routes. To enhance communication reliability, a novel cross-layer multichannel MAC mechanism called RIVC is proposed. It mitigates transmitting/rerouting data packets to a node that does not have an updated route information towards a destination and only allows data packets with valid routes to occupy the medium. The optional access mode in the MAC protocol is modified to early detect invalid routes at intermediate nodes and switchover to an alternative path. A new cross-layer multichannel MAC mechanism called MB is proposed to reduce contention in a busy channel and enhance load balancing. MB modifies the MAC back-off algorithm to let a transmitter node invoke an alternative path in the alternative channel when the retry count threshold is reached. The proposed multichannel protocols are implemented and evaluated by extensive NS2 simulation studies
    corecore