12 research outputs found

    DDH-MAC: a novel dynamic de-centralized hybrid MAC protocol for cognitive radio networks

    Get PDF
    The radio spectrum (3kHz - 300GHz) has become saturated and proven to be insufficient to address the proliferation of new wireless applications. Cognitive Radio Technology which is an opportunistic network and is equipped with fully programmable wireless devices that empowers the network by OODA cycle and then make intelligent decisions by adapting their MAC and physical layer characteristics such as waveform, has appeared to be the only solution for current low spectrum availability and under utilization problem. In this paper a novel Dynamic De-Centralized Hybrid “DDH-MAC” protocol for Cognitive Radio Networks has been presented which lies between Global Common Control Channel (GCCC) and non-GCCC categories of cognitive radio MAC protocols. DDH-MAC is equipped with the best features of GCCC MAC protocols but also overcomes the saturation and security issues in GCCC. To the best of authors' knowledge, DDH-MAC is the first protocol which is hybrid between GCCC and non-GCCC family of protocols. DDH-MAC provides multiple levels of security and partially use GCCC to transmit beacon which sets and announces local control channel for exchange of free channel list (FCL) sensed by the co-operatively communicating cognitive radio nodes, subsequently providing secure transactions among participating nodes over the decided local control channel. This paper describes the framework of the DDH-MAC protocol in addition to its pseudo code for implementation; it is shown that the pre-transmission time for DDH-MAC is on average 20% better while compared to other cognitive radio MAC protocols

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    A survey on MAC protocols for complex self-organizing cognitive radio networks

    Get PDF
    Complex self-organizing cognitive radio (CR) networks serve as a framework for accessing the spectrum allocation dynamically where the vacant channels can be used by CR nodes opportunistically. CR devices must be capable of exploiting spectrum opportunities and exchanging control information over a control channel. Moreover, CR nodes should intelligently coordinate their access between different cognitive radios to avoid collisions on the available spectrum channels and to vacate the channel for the licensed user in timely manner. Since inception of CR technology, several MAC protocols have been designed and developed. This paper surveys the state of the art on tools, technologies and taxonomy of complex self-organizing CR networks. A detailed analysis on CR MAC protocols form part of this paper. We group existing approaches for development of CR MAC protocols and classify them into different categories and provide performance analysis and comparison of different protocols. With our categorization, an easy and concise view of underlying models for development of a CR MAC protocol is provided

    Rádio cognitivo: aspectos de segurança

    Get PDF
    Describes how Cognitive Radio Networks are becoming a very important part of the wireless technology, due to the scarcity of spectrum resources. Cognitive radio is expected to operate in licensed frequency band opportunistically without cause interference to licensed or primary users. As many other new techniques, the security factors are out of focus. The cognitive radio paradigm introduces entirely new classes of security threats and challenges, and providing strong security may be difficult when compared with traditional wireless networks. Wireless devices that can learn from their environment can also to be taught be malicious elements. As the state space for a cognitive radio is made up for a variety of learned beliefs and current sensor inputs, we can modify future behavior of the device just manipulating radio sensor inputs. This work presents the key challenges in providing security in cognitive networks, discusses the emerging IEEE 802.22 cognitive radio standard, and identifies potentials threats along with potential mitigation approaches.Descreve como Redes de Rádios Cognitivos estão se tornando parte muito importante da tecnologia wireless, devido à escassez do espectro de frequência livre de interferência. Rádio cognitivo tem por concepção operar oportunisticamente em faixas de frequência licenciadas, sem causar interferência em usuários primários. Contudo, assim como em várias outras tecnologias, os aspectos de segurança não são o foco principal. O paradigma do rádio cognitivo introduz várias novas classes de ameaças de segurança e novos desafios, sendo mais difícil prover alta segurança, quando comparado com redes sem fio tradicionais. Dispositivos wireless que têm capacidade de aprendizado de acordo com o seu ambiente podem também ser ensinados por elementos maliciosos. Como a tabela de estados do rádio cognitivo é composta com fatos aprendidos do passado e medições atuais do sensor, o comportamento futuro do dispositivo pode ser modificado apenas manipulando os dados de entrada do sensor. Ainda nesse trabalho são apresentados os maiores desafios para prover segurança em redes cognitivas; é apresentado o padrão de rádio cognitivo IEEE 802.22, e são identificadas as potenciais ameaças junto com abordagens de mitigação

    A reliable and energy efficient cognitive radio multichannel MAC protocol for ad-hoc networks

    Get PDF
    A thesis submitted in partial ful llment for the degree of Doctor of Philosophy in the Department of Computer Science and Technology, University of BedfordshireRecent research has shown that several spectrum bands are mostly underutilised. To resolve the issue of underutilisation of spectrum bands across the networks, the concept of Cognitive Radio (CR) technology was envisaged. The CR technology allows Secondary Users (SUs) to acquire opportunistic access to large parts of the underutilised spectrum bands on wireless networks. In CR networks, SUs may scan and identify the vacant channels in the wireless spectrum bands and then dynamically tune their receivers to identify vacant channels and transmitters, and commence communication among themselves without causing interference to Primary/Licensed Users (PUs). Despite the developments in the eld of CR technology, recent research shows that still there are many challenges unaddressed in the eld. Thus, there is a need to reduce additional handshaking over control and data channels, to minimise large sized control frames and to introduce reliable channel selection process and maintenance of SUs' communication when PUs return to a licensed channel. A fundamental challenge a ecting this technology is the identi cation of reliable Data Channels (DCHs) for SUs communication among available channels and the continuation of communication when the PU returns. This doctoral research investigates in detail how to resolve issues related to the protocol design for Cognitive Radio Networks (CRNs) on Medium Access Layers (MAC) for Ad-Hoc networks. As a result, a novel Reliable and Energy e cient Cognitive Radio multi-channel MAC protocol (RECR-MAC) for Ad-Hoc networks is proposed to overcome the shortcomings mentioned. After discussing the background, operation and architecture of CR technology, this research proposes numerous platforms and testbeds for the deployment of personal and commercial applications of the CRNs. Side by side, optimised control frames and a reduced number of handshakes over the CCH are suggested to extend the transmitting time for data communication. In addition, the reliable channel selection process is introduced instead of random selection of DCHs for successful data communication among the SUs. In RECR-MAC, the objective of every SU is to select reliable DCHs, thereby ensuring high connectivity and exchanging the successful data frames across the cognitive network. Moreover, the selection criteria of the DCHs are based on multiple factors, such as an initial selection based on the maximum free time recorded by the SUs over the DCH channel ranking, which is proportional to the number of positive/negative acknowledgements, and the past history of DCHs. If more than two DCHs have an equal value during the second, third and following iterations, then the DCHs are selected based upon the maximum free time. The priorities of the DCHs are then assigned based on Reliable Data Channels, that is, RDCH 1, RDCH 2, RDCH 3, and RDCH 4 respectively (where RDCH 1 and RDCH 2 have the highest priority, DRCH 3 and RDCH 4 have the next priority, and so on). The impacts of channel selection process and Backup Data Channel (BDC) over the proposed RECR-MAC protocol are analysed in combination with comparative benchmark CR-MAC protocols based on the timing diagrams proposed. Finally, the RECR-MAC protocol is validated by using a MATLAB simulator with PU impact over the DCHs, both with and without BDC, and by comparing results, such as communication time, transmitting energy and throughput, with benchmark CR-MAC protocols

    A novel MAC Protocol for Cognitive Radio Networks

    Get PDF
    In Partial Fulfilment of the Requirements for the Degree Doctor of Philosophy from the University of BedfordshireThe scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting transmission characteristics. In this thesis, recent research and survey about the advances in theory and applications of cognitive radio technology has been reviewed. The thesis starts with the essential background on cognitive radio techniques and systems and discusses those characteristics of CR technology, such as standards, applications and challenges that all can help make software radio more personal. It then presents advanced level material by extensively reviewing the work done so far in the area of cognitive radio networks and more specifically in medium access control (MAC) protocol of CR. The list of references will be useful to both researchers and practitioners in this area. Also, it can be adopted as a graduate-level textbook for an advanced course on wireless communication networks. The development of new technologies such as Wi-Fi, cellular phones, Bluetooth, TV broadcasts and satellite has created immense demand for radio spectrum which is a limited natural resource ranging from 30KHz to 300GHz. For every wireless application, some portion of the radio spectrum needs to be purchased, and the Federal Communication Commission (FCC) allocates the spectrum for some fee for such services. This static allocation of the radio spectrum has led to various problems such as saturation in some bands, scarcity, and lack of radio resources to new wireless applications. Most of the frequencies in the radio spectrum have been allocated although many studies have shown that the allocated bands are not being used efficiently. The CR technology is one of the effective solutions to the shortage of spectrum and the inefficiency of its utilization. In this thesis, a detailed investigation on issues related to the protocol design for cognitive radio networks with particular emphasis on the MAC layer is presented. A novel Dynamic and Decentralized and Hybrid MAC (DDH-MAC) protocol that lies between the CR MAC protocol families of globally available common control channel (GCCC) and local control channel (non-GCCC). First, a multi-access channel MAC protocol, which integrates the best features of both GCCC and non-GCCC, is proposed. Second, an enhancement to the protocol is proposed by enabling it to access more than one control channel at the same time. The cognitive users/secondary users (SUs) always have access to one control channel and they can identify and exploit the vacant channels by dynamically switching across the different control channels. Third, rapid and efficient exchange of CR control information has been proposed to reduce delays due to the opportunistic nature of CR. We have calculated the pre-transmission time for CR and investigate how this time can have a significant effect on nodes holding a delay sensitive data. Fourth, an analytical model, including a Markov chain model, has been proposed. This analytical model will rigorously analyse the performance of our proposed DDH-MAC protocol in terms of aggregate throughput, access delay, and spectrum opportunities in both the saturated and non-saturated networks. Fifth, we develop a simulation model for the DDH-MAC protocol using OPNET Modeler and investigate its performance for queuing delays, bit error rates, backoff slots and throughput. It could be observed from both the numerical and simulation results that when compared with existing CR MAC protocols our proposed MAC protocol can significantly improve the spectrum utilization efficiency of wireless networks. Finally, we optimize the performance of our proposed MAC protocol by incorporating multi-level security and making it energy efficient

    Secure MAC protocols for cognitive radio networks

    Get PDF
    A thesis submitted in partial fulfilment for the degree of Doctor of PhilosophyWith the rapid increase in wireless devices, an effective improvement in the demand of efficient spectrum utilisation for gaining better connectivity is needed. Cognitive Radio (CR) is an emerging technology that exploits the inefficient utilisation of the unused spectrum dynamically. Since spectrum sharing is responsible for coordinating channels’ access for Cognitive Users (CUs), the Common Control Channel (CCC) is one of the existing methods used to exchange the control information between CUs. However, the unique characteristics and parameters of Cognitive Radio Networks (CRNs) present several possible threats targeting spectrum sensing, spectrum management, spectrum sharing, and spectrum mobility leading to the deterioration of the network performance. Thus, protection and detection security mechanisms are essential to maintaining the CRNs. This thesis presents a novel decentralised CR MAC protocol that successfully utilises the unused portion of the licensed band. The protocol achieves improved performance; communication time and throughput when compared to two benchmark protocols. Less communication time and higher throughput are accomplished by the protocol due to performing fast switching to the selected available data channel for initiating data transmission. The proposed protocol is then extended to two different versions based on two authentication approaches applied to it; one using Digital Signature and another is based on Shared-Key. The two proposed secure protocols address the security requirements in CRNs leading to subsequent secure communication among CUs. The protocols function effectively in providing defence against several attacks related to the MAC layer such as; Spectrum Sensing Data Manipulation/Falsification, Data Tempering and Modification, Jamming attacks, Eavesdropping, Forgery and Fake control information attacks, MAC address spoofing, and unauthorised access attacks. The associated security algorithms ensure the successful secure communication between CUs in a cooperative approach. Moreover, the security protocols are investigated and analysed in terms of security flows by launching unauthorised access and modification attacks on the transmitted information. The testing results demonstrated that two protocols perform successful detection of threats and ensure secure communication in CRNs
    corecore