4 research outputs found

    Comprehensive survey on quality of service provisioning approaches in cognitive radio networks : part one

    Get PDF
    Much interest in Cognitive Radio Networks (CRNs) has been raised recently by enabling unlicensed (secondary) users to utilize the unused portions of the licensed spectrum. CRN utilization of residual spectrum bands of Primary (licensed) Networks (PNs) must avoid harmful interference to the users of PNs and other overlapping CRNs. The coexisting of CRNs depends on four components: Spectrum Sensing, Spectrum Decision, Spectrum Sharing, and Spectrum Mobility. Various approaches have been proposed to improve Quality of Service (QoS) provisioning in CRNs within fluctuating spectrum availability. However, CRN implementation poses many technical challenges due to a sporadic usage of licensed spectrum bands, which will be increased after deploying CRNs. Unlike traditional surveys of CRNs, this paper addresses QoS provisioning approaches of CRN components and provides an up-to-date comprehensive survey of the recent improvement in these approaches. Major features of the open research challenges of each approach are investigated. Due to the extensive nature of the topic, this paper is the first part of the survey which investigates QoS approaches on spectrum sensing and decision components respectively. The remaining approaches of spectrum sharing and mobility components will be investigated in the next part

    Fast two-stage spectrum detector for cognitive radios in uncertain noise channels

    No full text
    An enormous influx of wireless services and devices coupled with inefficient usage of electromagnetic spectrum has led to an apparent scarcity of usable radio bandwidth. Cognitive radio is leading the trend for increasing the spectrum efficiency by utilising the vacancy in the radio spectrum created by absence of the licensed primary user. This paradigm shift can only take place if the means to detect the primary user are well established so that an ecosystem can be created where both primary and secondary users can co-exist without interfering with each other. In this study the authors propose a two-stage detection mechanism which gives an improved performance over conventional single-stage detectors yet optimises the usage of the second stage, thereby reducing the sensing time as compared to conventional two-stage spectrum sensing algorithms. A hardware implementation of the algorithm has also been done to quantify the area and power consumption values. By utilising the second-stage optimally, the algorithm presented in this study helps in reducing the sensing time by 86% as compared with the conventional two-stage detector. By not activating the second stage at high SNRs, the proposed algorithm saves 0.915%W of dynamic power out of a total of 1.09%W, thus effectively reducing the dynamic power consumption by 84%

    Towards realisation of spectrum sharing of cognitive radio networks

    Get PDF
    Cognitive radio networks (CRN) have emerged as a promising solution to spectrum shortcoming, thanks to Professor Mitola who coined Cognitive Radios. To enable efficient communications, CRNs need to avoid interference to both Primary (licensee) Users (PUs), and among themselves (called self-coexistence). In this thesis, we focus on self-coexistence issues. Very briefly, the problems are categorised into intentional and unintentional interference. Firstly, unintentional interference includes: 1) CRNs administration; 2) Overcrowded CRNs Situation; 3) Missed spectrum detection; 4) Inter-cell Interference (ICI); and 5) Inability to model Secondary Users’ (SUs) activity. In intentional interference there is Primary User Emulation Attack (PUEA). To administer CRN operations (Prob. 1), in our first contribution, we proposed CogMnet, which aims to manage the spectrum sharing of centralised networks. CogMnet divides the country into locations. It then dedicates a real-time database for each location to record CRNs’ utilisations in real time, where each database includes three storage units: Networks locations storage unit; Real-time storage unit; and Historical storage unit. To tackle Prob. 2, our second contribution is CRNAC, a network admission control algorithm that aims to calculate the maximum number of CRNs allowed in any location. CRNAC has been tested and evaluated using MATLAB. To prevent research problems 3, 4, and to tackle research problem (5), our third contribution is RCNC, a new design for an infrastructure-based CRN core. The architecture of RCNC consists of two engines: Monitor and Coordinator Engine (MNCE) and Modified Cognitive Engine (MCE). Comprehensive simulation scenarios using ICS Designer (by ATDI) have validated some of RCNC’s components. In the last contribution, to deter PUEA (the intentional interference type), we developed a PUEA Deterrent (PUED) algorithm capable of detecting PUEAs commission details. PUED must be implemented by a PUEA Identifier Component in the MNCE in RCNC after every spectrum handing off. Therefore, PUED works like a CCTV system. According to criminology, robust CCTV systems have shown a significant prevention of clear visible theft, reducing crime rates by 80%. Therefore, we believe that our algorithm will do the same. Extensive simulations using a Vienna simulator showed the effectiveness of the PUED algorithm in terms of improving CRNs’ performance
    corecore