614 research outputs found
Spectrum sharing security and attacks in CRNs: a review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of
the common control channel, more attention is paid to the
security of the common control channel by looking into its
security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges
Recommended from our members
Game theory for dynamic spectrum sharing cognitive radio
This thesis was submitted for the degree of Doctor of Philosophy and was awarded by Brunel University on 21 June 2010.âGame Theoryâ is the formal study of conflict and cooperation. The theory is based on a set of tools that have been developed in order to assist with the modelling and analysis of individual, independent decision makers. These actions potentially affect any decisions, which are made by other competitors. Therefore, it is well suited and capable of addressing the various issues linked to wireless communications. This work presents a Green Game-Based Hybrid Vertical Handover Model. The model is used for heterogeneous wireless networks, which combines both dynamic (Received Signal Strength and Node Mobility) and static (Cost, Power Consumption and Bandwidth) factors. These factors control the handover decision process; whereby the mechanism successfully eliminates any unnecessary handovers, reduces delay and overall number of handovers to 50% less and 70% less dropped packets and saves 50% more energy in comparison to other mechanisms. A novel Game-Based Multi-Interface Fast-Handover MIPv6 protocol is introduced in this thesis as an extension to the Multi-Interface Fast-handover MIPv6 protocol. The protocol works when the mobile node has more than one wireless interface. The protocol controls the handover decision process by deciding whether a handover is necessary and helps the node to choose the right access point at the right time. In addition, the protocol switches the mobile nodes interfaces âONâ and âOFFâ when needed to control the mobile nodeâs energy consumption and eliminate power lost of adding another interface. The protocol successfully reduces the number of handovers to 70%, 90% less dropped packets, 40% more received packets and acknowledgments and 85% less end-to-end delay in comparison to other Protocols. Furthermore, the thesis adapts a novel combination of both game and auction theory in dynamic resource allocation and price-power-based routing in wireless Ad-Hoc networks. Under auction schemes, destinations nodes bid the information data to access to the data stored in the server node. The server will allocate the data to the winner who values it most. Once the data has been allocated to the winner, another mechanism for dynamic routing is adopted. The routing mechanism is based on the source-destination cooperation, power consumption and source-compensation to the intermediate nodes. The mechanism dramatically increases the sellerâs revenue to 50% more when compared to random allocation scheme and briefly evaluates the reliability of predefined route with respect to data prices, source and destination cooperation for different network settings. Last but not least, this thesis adjusts an adaptive competitive second-price pay-to-bid sealed auction game and a reputation-based game. This solves the fairness problems associated with spectrum sharing amongst one primary user and a large number of secondary users in a cognitive radio environment. The proposed games create a competition between the bidders and offers better revenue to the players in terms of fairness to more than 60% in certain scenarios. The proposed game could reach the maximum total profit for both primary and secondary users with better fairness; this is illustrated through numerical results
Multiband Spectrum Access: Great Promises for Future Cognitive Radio Networks
Cognitive radio has been widely considered as one of the prominent solutions
to tackle the spectrum scarcity. While the majority of existing research has
focused on single-band cognitive radio, multiband cognitive radio represents
great promises towards implementing efficient cognitive networks compared to
single-based networks. Multiband cognitive radio networks (MB-CRNs) are
expected to significantly enhance the network's throughput and provide better
channel maintenance by reducing handoff frequency. Nevertheless, the wideband
front-end and the multiband spectrum access impose a number of challenges yet
to overcome. This paper provides an in-depth analysis on the recent
advancements in multiband spectrum sensing techniques, their limitations, and
possible future directions to improve them. We study cooperative communications
for MB-CRNs to tackle a fundamental limit on diversity and sampling. We also
investigate several limits and tradeoffs of various design parameters for
MB-CRNs. In addition, we explore the key MB-CRNs performance metrics that
differ from the conventional metrics used for single-band based networks.Comment: 22 pages, 13 figures; published in the Proceedings of the IEEE
Journal, Special Issue on Future Radio Spectrum Access, March 201
Efficient spectrum-handoff schemes for cognitive radio networks
Radio spectrum access is important for terrestrial wireless networks, commercial earth observations and terrestrial radio astronomy observations. The services offered by terrestrial wireless networks, commercial earth observations and terrestrial radio astronomy observations have evolved due to technological advances. They are expected to meet increasing users' demands which will require more spectrum. The increasing demand for high throughput by users necessitates allocating additional spectrum to terrestrial wireless networks. Terrestrial radio astronomy observations s require additional bandwidth to observe more spectral windows. Commercial earth observation requires more spectrum for enhanced transmission of earth observation data. The evolution of terrestrial wireless networks, commercial earth observations and terrestrial radio astronomy observations leads to the emergence of new interference scenarios. For instance, terrestrial wireless networks pose interference risks to mobile ground stations; while inter-satellite links can interfere with terrestrial radio astronomy observations. Terrestrial wireless networks, commercial earth observations and terrestrial radio astronomy observations also require mechanisms that will enhance the performance of their users. This thesis proposes a framework that prevents interference between terrestrial wireless networks, commercial earth observations and terrestrial radio astronomy observations when they co-exist; and enhance the performance of their users. The framework uses the cognitive radio; because it is capable of multi-context operation. In the thesis, two interference avoidance mechanisms are presented. The first mechanism prevents interference between terrestrial radio astronomy observations and inter-satellite links. The second mechanism prevent interference between terrestrial wireless networks and the commercial earth observation ground segment. The first interference reductionmechanism determines the inter-satellite link transmission duration. Analysis shows that interference-free inter-satellite links transmission is achievable during terrestrial radio astronomy observation switching for up to 50.7 seconds. The second mechanism enables the mobile ground station, with a trained neural network, to predict the terrestrial wireless network channel idle state. The prediction of the TWN channel idle state prevents interference between the terrestrial wireless network and the mobile ground station. Simulation shows that incorporating prediction in the mobile ground station enhances uplink throughput by 40.6% and reduces latency by 18.6%. In addition, the thesis also presents mechanisms to enhance the performance of the users in terrestrial wireless network, commercial earth observations and terrestrial radio astronomy observations. The thesis presents mechanisms that enhance user performance in homogeneous and heterogeneous terrestrial wireless networks. Mechanisms that enhance the performance of LTE-Advanced users with learning diversity are also presented. Furthermore, a future commercial earth observation network model that increases the accessible earth climatic data is presented. The performance of terrestrial radio astronomy observation users is enhanced by presenting mechanisms that improve angular resolution, power efficiency and reduce infrastructure costs
Comprehensive survey on quality of service provisioning approaches in cognitive radio networks : part one
Much interest in Cognitive Radio Networks (CRNs) has been raised recently by enabling unlicensed (secondary) users to utilize the unused portions of the licensed spectrum. CRN utilization of residual spectrum bands of Primary (licensed) Networks (PNs) must avoid harmful interference to the users of PNs and other overlapping CRNs. The coexisting of CRNs depends on four components: Spectrum Sensing, Spectrum Decision, Spectrum Sharing, and Spectrum Mobility. Various approaches have been proposed to improve Quality of Service (QoS) provisioning in CRNs within fluctuating spectrum availability. However, CRN implementation poses many technical challenges due to a sporadic usage of licensed spectrum bands, which will be increased after deploying CRNs. Unlike traditional surveys of CRNs, this paper addresses QoS provisioning approaches of CRN components and provides an up-to-date comprehensive survey of the recent improvement in these approaches. Major features of the open research challenges of each approach are investigated. Due to the extensive nature of the topic, this paper is the first part of the survey which investigates QoS approaches on spectrum sensing and decision components respectively. The remaining approaches of spectrum sharing and mobility components will be investigated in the next part
Robust provisioning of multicast sessions in cognitive radio networks
Today\u27s wireless networks use fixed spectrum over long term and fixed geographical regions. However, spectrum utilization varies by time and location, which leads to temporal and special spectrum underutilization. Therefore, new ways to improve spectrum utilization are needed. Cognitive radio is an emerging technology that enables dynamic sharing of the spectrum in order to overcome spectrum underutilization problem. Users in cognitive radio networks are either primary or secondary users. A primary user is the user who is licensed to use a channel, and has priority to use it over any other user. The secondary user uses a licensed spectrum channel opportunistically when a primary user is idle. Hence, it has to vacate the channel within a certain tolerable interference time when the primary user appears. As a result of this, the secondary user needs to find backup channels to protect the links it is using from primary user\u27s interruption.
In this thesis, we concentrate on supporting the multicast service mode using cognitive radio networks. Moreover, we are concerned with supporting this mode of service such that it is robust in the face of failures. The type of failures we are interested in is channel disappearance due to the resumption of activities by primary users. We develop three algorithms which provide robust multicasting in such networks. Our three proposed algorithms are: 1) multicast sessions protection without link-sharing, 2) multicast sessions protection with link-sharing and 3) multicast sessions protection using rings. These algorithms provision multiple multicast sessions, and protect them against single primary user interruption at a time. They also take into account that the activities of a primary user may disrupt communication in several groups, of secondary users, which are referred to as Shared Primary User Risk Group (SPURG). The objective of the proposed algorithms is to increase the number of sessions that can be accommodated in the network and minimize the cost of provisioning the sessions. Multicast sessions protection with/without link-sharing algorithms generate a primary tree for each multicast session, and protect each link of it using a backup tree. Multicast sessions protection with link-sharing allows backup trees to share some links of the primary tree within the same session, and share some links within backup trees for any session. In the third algorithm, a ring is generated where it starts and ends at the source node, and passes through all destination nodes. Also, we compare the performances of our three proposed algorithms. Simulation results show that the number of accommodated sessions in the network increases and the cost of multicast sessions decreases when the number of available channels increases or the session size decreases. Also, multicast sessions protection with link-sharing algorithm outperforms the other two algorithms in terms of the number of sessions in the network. On the other hand, multicast sessions protection using rings achieves the lowest cost for multicast sessions compared with the other two proposed algorithms
- âŠ