76,445 research outputs found

    Trust-based mechanisms for secure communication in cognitive radio networks

    Get PDF
    Cognitive radio (CR) technology was introduced to solve the problem of spectrum scarcity to support the growth of wireless communication. However, the inherent properties of CR technology make such networks more vulnerable to attacks. This thesis is an effort to develop a trust-based framework to ensure secure communication in CRN by authenticating trustworthy nodes to share spectrum securely and increasing system's availability and reliability by selecting the trustworthy key nodes in CRNs

    Autonomous functionalities for cognitive radio

    Get PDF
    This paper provides an overview on the research activities in autonomous functionalities for cognitive radio and networks, carried out in FP7/E3-project. The identified main research areas within this topic include opportunistic spectrum access and autonomous self-x functionalities for communication nodes. Opportunistic spectrum access delineates innovative topics concerning distributed cooperative spectrum sensing, collaborative MAC algorithms, distributed radio resource management algorithms, and control mechanisms for the opportunistic spectrum access. In autonomous self-x functionalities the research covers cognitive device management, autonomous RAT and operator selection and self-x features for autonomous elements, including autonomous decision making functionalities for RAT protocol configuration, negotiation on missing RAT protocol components, and functionality for dynamic configuration of RAT protocol components.Postprint (published version

    Dynamics Spectrum Sharing Environment Using Deep Learning Techniques

    Get PDF
    The recent fast expansion of mobile communication services has resulted in a scarcity of spectrum resources. The challenge of multidimensional resource allocation in cognitive radio systems is addressed in this work. Complicated and dynamic Spectrum Sharing SS systems might be vulnerable to a variety of possible security and privacy vulnerabilities, necessitating protection techniques that are adaptable, dependable, and scalable. Methods based on machine learning (ML) have repeatedly been proposed to overcome these challenges. We present a complete assessment of the current progress of ML-based SS approaches, the most crucial security challenges, and the accompanying protection mechanisms in this paper. We develop cutting-edge methodologies for improving the performance of SS communication systems in a variety of critical areas, such as ML-based cognitive radio networks (CRNs), ML-based database assisted SS networks, ML-based LTE-U networks, ML-based ambient backscatter networks, and other ML-based SS solutions. The results of the simulation trials show that the suggested strategy may successfully boost the user's incentive while reducing collisions. In terms of reward, the suggested strategy beats opportunistic multichannel ALOHA by around 10% and 30%, respectively, for the single SU and multi-SU scenarios.&nbsp

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Green Cellular Networks: A Survey, Some Research Issues and Challenges

    Full text link
    Energy efficiency in cellular networks is a growing concern for cellular operators to not only maintain profitability, but also to reduce the overall environment effects. This emerging trend of achieving energy efficiency in cellular networks is motivating the standardization authorities and network operators to continuously explore future technologies in order to bring improvements in the entire network infrastructure. In this article, we present a brief survey of methods to improve the power efficiency of cellular networks, explore some research issues and challenges and suggest some techniques to enable an energy efficient or "green" cellular network. Since base stations consume a maximum portion of the total energy used in a cellular system, we will first provide a comprehensive survey on techniques to obtain energy savings in base stations. Next, we discuss how heterogeneous network deployment based on micro, pico and femto-cells can be used to achieve this goal. Since cognitive radio and cooperative relaying are undisputed future technologies in this regard, we propose a research vision to make these technologies more energy efficient. Lastly, we explore some broader perspectives in realizing a "green" cellular network technologyComment: 16 pages, 5 figures, 2 table
    • …
    corecore