1,250 research outputs found

    Network performance & Quality of service in data networks involving spectrum utilization techniques

    Get PDF
    This research has developed technique to improve the quality of service in wireless data networks that employ spectrum utilization techniques based on Cognitive Radio. Most multiple dimension implementations focus on maximizing the Successful Communication Probability SCP in order to improve the wireless network utilization. However this usually has a negative impact on the Quality of Service, since increasing the SCP leads to increasing signal interference and Packet Loss, and thus network performance deterioration. The Multiple Dimension Cognitive Radio technique is a new technique, proposed in this thesis, that improves the Cognitive Radio Networks (CRN) efficiency by giving opportunity to secondary users (Unlicensed users) to use several dimension such as time, frequency, modulation, coding, and antenna directionality to increase their opportunity in finding spectrum hole. In order to draw a balance between improving the networking utilization and keeping the network performance at an acceptable level, this thesis proposes a new model of multiple dimension CR which provides a compromise between maximizing the SCP and network throughput from one side and keeping the QoS within the accepted thresholds from the other side. This is important so as to avoid network performance degradation which may result from the high user density in single wireless domain as a result of maximizing the SCP. In this research, a full Cognitive Radio model has been implemented in the OPNET simulator by developing modified nodes with the appropriate coding which include basic functionality. The Purpose of this model is to simulate the CR environment and study the network performance after applying the controlled multi dimension technique presented here. The proposed technique observes the channel throughput on TCP (Transmission Control Protocol) level, also QoS KPIs (Key Performance Index) like Packet Loss and Bit Error rate, during the operation of the CR multi dimension technique and alerts the system when the throughput degrades below a certain level. The proposed technique has interactive cautious nature which keeps monitoring the network performance and once find evident on network performance deterioration it takes corrective action, terminates low priority connections and releases over utilized channels, in order to keep the performance accepted

    Survey of Inter-satellite Communication for Small Satellite Systems: Physical Layer to Network Layer View

    Get PDF
    Small satellite systems enable whole new class of missions for navigation, communications, remote sensing and scientific research for both civilian and military purposes. As individual spacecraft are limited by the size, mass and power constraints, mass-produced small satellites in large constellations or clusters could be useful in many science missions such as gravity mapping, tracking of forest fires, finding water resources, etc. Constellation of satellites provide improved spatial and temporal resolution of the target. Small satellite constellations contribute innovative applications by replacing a single asset with several very capable spacecraft which opens the door to new applications. With increasing levels of autonomy, there will be a need for remote communication networks to enable communication between spacecraft. These space based networks will need to configure and maintain dynamic routes, manage intermediate nodes, and reconfigure themselves to achieve mission objectives. Hence, inter-satellite communication is a key aspect when satellites fly in formation. In this paper, we present the various researches being conducted in the small satellite community for implementing inter-satellite communications based on the Open System Interconnection (OSI) model. This paper also reviews the various design parameters applicable to the first three layers of the OSI model, i.e., physical, data link and network layer. Based on the survey, we also present a comprehensive list of design parameters useful for achieving inter-satellite communications for multiple small satellite missions. Specific topics include proposed solutions for some of the challenges faced by small satellite systems, enabling operations using a network of small satellites, and some examples of small satellite missions involving formation flying aspects.Comment: 51 pages, 21 Figures, 11 Tables, accepted in IEEE Communications Surveys and Tutorial

    Contributions to the security of cognitive radio networks

    Get PDF
    The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this context, Cognitive Radio (CR) technology has been proposed as a possible solution to reuse the spectrum being underutilized by licensed services. CRs are intelligent devices capable of sensing the medium and identifying those portions of the spectrum being unused. Based on their current perception of the environment and on that learned from past experiences, they can optimally tune themselves with regard to parameters such as frequency, coding and modulation, among others. Due to such properties, Cognitive Radio Networks (CRNs) can act as secondary users of the spectrum left unused by their legal owners or primary users, under the requirement of not interfering primary communications. The successful deployment of these networks relies on the proper design of mechanisms in order to efficiently detect spectrum holes, adapt to changing environment conditions and manage the available spectrum. Furthermore, the need for addressing security issues is evidenced by two facts. First, as for any other type of wireless network, the air is used as communications medium and can easily be accessed by attackers. On the other hand, the particular attributes of CRNs offer new opportunities to malicious users, ranging from providing wrong information on the radio environment to disrupting the cognitive mechanisms, which could severely undermine the operation of these networks. In this Ph.D thesis we have approached the challenge of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves not only providing countermeasures for existing attacks but also to identify new potential threats and evaluate their impact on CRNs performance. The main contributions of this thesis can be summarized as follows. First, a critical study on the State of the Art in this area is presented. A qualitative analysis of those threats to CRNs already identified in the literature is provided, and the efficacy of existing countermeasures is discussed. Based on this work, a set of guidelines are designed in order to design a detection system for the main threats to CRNs. Besides, a high level description of the components of this system is provided, being it the second contribution of this thesis. The third contribution is the proposal of a new cross-layer attack to the Transmission Control Protocol (TCP) in CRNs. An analytical model of the impact of this attack on the throughput of TCP connections is derived, and a set of countermeasures in order to detect and mitigate the effect of such attack are proposed. One of the main threats to CRNs is the Primary User Emulation (PUE) attack. This attack prevents CRNs from using available portions of the spectrum and can even lead to a Denial of Service (DoS). In the fourth contribution of this the method is proposed in order to deal with such attack. The method relies on a set of time measures provided by the members of the network and allows estimating the position of an emitter. This estimation is then used to determine the legitimacy of a given transmission and detect PUE attacks. Cooperative methods are prone to be disrupted by malicious nodes reporting false data. This problem is addressed, in the context of cooperative location, in the fifth and last contribution of this thesis. A method based on Least Median Squares (LMS) fitting is proposed in order to detect forged measures and make the location process robust to them. The efficiency and accuracy of the proposed methodologies are demonstrated by means of simulation

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Joint relay scheduling, channel access, and power allocation for green cognitive radio communications

    Get PDF
    PublishedJournal Article© 1983-2012 IEEE. The capacity of cognitive radio (CR) systems can be enhanced significantly by deploying relay nodes to exploit the spatial diversity. However, the inevitable imperfect sensing in CR has vital effects on the policy of relay selection, channel access, and power allocation that play pivotal roles in the system capacity. The increase in transmission power can improve the system capacity, but results in high energy consumption, which incurs the increase of carbon emission and network operational cost. Most of the existing schemes for CR systems have not jointly considered the imperfect sensing scenario and the tradeoff between the system capacity and energy consumption. To fill in this gap, this paper proposes an energy-aware centralized relay selection scheme that takes into account the relay selection, channel access, and power allocation jointly in CR with imperfect sensing. Specifically, the CR system is formulated as a partially observable Markov decision process (POMDP) to achieve the goal of balancing the system capacity and energy consumption as well as maximizing the system reward. The optimal policy for relay selection, channel access, and power allocation is then derived by virtue of a dynamic programming approach. A dimension reduction strategy is further applied to reduce its high computation complexity. Extensive simulation experiments and results are presented and analysed to demonstrate the significant performance improvement compared to the existing schemes. The performance results show that the received reward increases more than 50% and the network lifetime increases more than 35%, but the system capacity is reduced less than 6% only.This work was supported by the National Natural Science Foundation of China under Grants 61201219, 61171111, 61472150, and 61173045 and in part by the Fundamental Research Funds for the Central Universities under Grant 2013QN122

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig
    corecore