163 research outputs found

    AI Enabled-6G: Artificial Intelligence (AI) for Integration of 6G Wireless Communications

    Get PDF
    The research in wireless communication is rapidly shifting to the next generation mobile system, 6G. Fifth-generation mobile network standards are now in use. However, there are still some user criteria that are expected to be satisfied in the sixth-generation communication network. 6G is estimated to enable the unprecedented intelligence Internet of Things with extremely varied stimulating necessities. Currently, artificial intelligence (AI) is considered as a novel paradigm for the designing and optimizing intelligent 6G architectures, standards and functions. By 2030, all of the people would be using 6G. In this paper, we investigate 6G trends, requirements, challenges & potential solutions and how AI-enabled technique can integrate 6G communications. The analysis section provides the need and how AI-empowered technique efficiently and effectively enhances the performance of network. The 6G networks based on intelligent AI architecture used to understand automatic network adjustment, knowledge discovery, intelligent service provisioning, and smart resource management

    Detection performance and mitigation techniques in CR networks

    Get PDF
    Pervasive wireless communications rely enormously on spectrum utilization; the increase in demand for new wireless services and their application has led to spectrum scarcity. Spectrum limitations can be resolved by cognitive radio (CR) which is a technology that allows secondary users (SUs) to use the spectrum when it is not occupied by primary users (PUs). In this thesis, the security issues that decrease CR performance are discussed; there are two major threats i.e. primary user emulation attack (PUEA) and spectrum sensing data falsification attack (SSDF). Firstly, the CR network (CRN) is simulated whereby PUs and SUs are presented in the system with the presence of multiple malicious users that are randomly located within a circle of radius (R). The simulation results, based on an analytical model, show that the false alarm probability is significantly affected by the network radius Rand malicious users' number, and it is proved that there is a range of R over which the PUEAs are most successful. Secondly, a transmitter verification scheme (direct scheme) and indirect trust scheme that considers the users' history are presented; the results proved that if the signal to noise ratio (SNR) is raised, correspondingly the t:rnstworthiness of the PU is considerably increased. Based on these two schemes, the trnstworthiness of the PU is much higher than that of the malicious user and because the indirect scheme considers the historical behaviour of the user, it improves the user's trustworthiness.Finally, cooperative spectrum sensing (CSS) approaches are proposed, namely, a trust based approach, a punishment based approach and a dedicated punishment based approach. It is proved that these proposed CSS approaches outperform the traditional majority scheme despite a high number of malicious users. In addition, the dedicated punishment approaches which punish only the malicious users outperform the other approaches

    A Comprehensive Review of D2D Communication in 5G and B5G Networks

    Get PDF
    The evolution of Device-to-device (D2D) communication represents a significant breakthrough within the realm of mobile technology, particularly in the context of 5G and beyond 5G (B5G) networks. This innovation streamlines the process of data transfer between devices that are in close physical proximity to each other. D2D communication capitalizes on the capabilities of nearby devices to communicate directly with one another, thereby optimizing the efficient utilization of available network resources, reducing latency, enhancing data transmission speed, and increasing the overall network capacity. In essence, it empowers more effective and rapid data sharing among neighboring devices, which is especially advantageous within the advanced landscape of mobile networks such as 5G and B5G. The development of D2D communication is largely driven by mobile operators who gather and leverage short-range communications data to propel this technology forward. This data is vital for maintaining proximity-based services and enhancing network performance. The primary objective of this research is to provide a comprehensive overview of recent progress in different aspects of D2D communication, including the discovery process, mode selection methods, interference management, power allocation, and how D2D is employed in 5G technologies. Furthermore, the study also underscores the unresolved issues and identifies the challenges associated with D2D communication, shedding light on areas that need further exploration and developmen

    Cognitive Radio Systems

    Get PDF
    Cognitive radio is a hot research area for future wireless communications in the recent years. In order to increase the spectrum utilization, cognitive radio makes it possible for unlicensed users to access the spectrum unoccupied by licensed users. Cognitive radio let the equipments more intelligent to communicate with each other in a spectrum-aware manner and provide a new approach for the co-existence of multiple wireless systems. The goal of this book is to provide highlights of the current research topics in the field of cognitive radio systems. The book consists of 17 chapters, addressing various problems in cognitive radio systems

    Antenna aided interference mitigation for cognitive radio

    Get PDF

    Distributed Localization of Active Transmitters in a Wireless Sensor Network

    Get PDF
    In today\u27s military environment, emphasis has been placed on bandwidth efficiency and total use of the available spectrum. Current communication standards divide the spectrum into several different frequency bands, all of which are assigned to one or multiple primary users. Cognitive Radio utilizes potential white spaces that exist between currently defined channels or in time. One under-explored dimension of white space exploration is spatial. If a frequency band is being used in one region, it may be underutilized, or not occupied in another. Using an active localization method can allow for the discovery of spatial white; trying to spatially map all of the frequencies in a large area would become very computationally intensive, and may even be impractical using modern centralized methods. Applying a distributed method and the concepts discussed in Wireless Distributed Computing to the problem can be scaled onto many small wireless sensors and could improve the measuring system\u27s effectiveness. For a bandwidth contested environment that must be spectrally mapped, three metrics stand out: Accuracy, Power Consumption, and Latency. All of these metrics must be explored and measured to determine which method could be most effectively applied to the spectral mapping of a spatial environment

    Spectrum measurement, sensing, analysis and simulation in the context of cognitive radio

    Get PDF
    The radio frequency (RF) spectrum is a scarce natural resource, currently regulated locally by national agencies. Spectrum has been assigned to different services and it is very difficult for emerging wireless technologies to gain access due to rigid spectmm policy and heavy opportunity cost. Current spectrum management by licensing causes artificial spectrum scarcity. Spectrum monitoring shows that many frequencies and times are unused. Dynamic spectrum access (DSA) is a potential solution to low spectrum efficiency. In DSA, an unlicensed user opportunistically uses vacant licensed spectrum with the help of cognitive radio. Cognitive radio is a key enabling technology for DSA. In a cognitive radio system, an unlicensed Secondary User (SU) identifies vacant licensed spectrum allocated to a Primary User (PU) and uses it without harmful interference to the PU. Cognitive radio increases spectrum usage efficiency while protecting legacy-licensed systems. The purpose of this thesis is to bring together a group of CR concepts and explore how we can make the transition from conventional radio to cognitive radio. Specific goals of the thesis are firstly the measurement of the radio spectrum to understand the current spectrum usage in the Humber region, UK in the context of cognitive radio. Secondly, to characterise the performance of cyclostationary feature detectors through theoretical analysis, hardware implementation, and real-time performance measurements. Thirdly, to mitigate the effect of degradation due to multipath fading and shadowing, the use of -wideband cooperative sensing techniques using adaptive sensing technique and multi-bit soft decision is proposed, which it is believed will introduce more spectral opportunities over wider frequency ranges and achieve higher opportunistic aggregate throughput.Understanding spectrum usage is the first step toward the future deployment of cognitive radio systems. Several spectrum usage measurement campaigns have been performed, mainly in the USA and Europe. These studies show locality and time dependence. In the first part of this thesis a spectrum usage measurement campaign in the Humber region, is reported. Spectrum usage patterns are identified and noise is characterised. A significant amount of spectrum was shown to be underutilized and available for the secondary use. The second part addresses the question: how can you tell if a spectrum channel is being used? Two spectrum sensing techniques are evaluated: Energy Detection and Cyclostationary Feature Detection. The performance of these techniques is compared using the measurements performed in the second part of the thesis. Cyclostationary feature detection is shown to be more robust to noise. The final part of the thesis considers the identification of vacant channels by combining spectrum measurements from multiple locations, known as cooperative sensing. Wideband cooperative sensing is proposed using multi resolution spectrum sensing (MRSS) with a multi-bit decision technique. Next, a two-stage adaptive system with cooperative wideband sensing is proposed based on the combination of energy detection and cyclostationary feature detection. Simulations using the system above indicate that the two-stage adaptive sensing cooperative wideband outperforms single site detection in terms of detection success and mean detection time in the context of wideband cooperative sensing

    Opportunistic Spectrum Utilization by Cognitive Radio Networks: Challenges and Solutions

    Get PDF
    Cognitive Radio Network (CRN) is an emerging paradigm that makes use of Dynamic Spectrum Access (DSA) to communicate opportunistically, in the un-licensed Industrial, Scientific and Medical bands or frequency bands otherwise licensed to incumbent users such as TV broadcast. Interest in the development of CRNs is because of severe under-utilization of spectrum bands by the incumbent Primary Users (PUs) that have the license to use them coupled with an ever-increasing demand for unlicensed spectrum for a variety of new mobile and wireless applications. The essence of Cognitive Radio (CR) operation is the cooperative and opportunistic utilization of licensed spectrum bands by the Secondary Users (SUs) that collectively form the CRN without causing any interference to PUs\u27 communications. CRN operation is characterized by factors such as network-wide quiet periods for cooperative spectrum sensing, opportunistic/dynamic spectrum access and non-deterministic operation of PUs. These factors can have a devastating impact on the overall throughput and can significantly increase the control overheads. Therefore, to support the same level of QoS as traditional wireless access technologies, very closer interaction is required between layers of the protocol stack. Opportunistic spectrum utilization without causing interference to the PUs is only possible if the SUs periodically sense the spectrum for the presence of PUs\u27 signal. To minimize the effects of hardware capabilities, terrain features and PUs\u27 transmission ranges, DSA is undertaken in a collaborative manner where SUs periodically carry out spectrum sensing in their respective geographical locations. Collaborative spectrum sensing has numerous security loopholes and can be favorable to malicious nodes in the network that may exploit vulnerabilities associated with DSA such as launching a spectrum sensing data falsification (SSDF) attack. Some CRN standards such as the IEEE 802.22 wireless regional area network employ a two-stage quiet period mechanism based on a mandatory Fast Sensing and an optional Fine Sensing stage for DSA. This arrangement is meant to strike a balance between the conflicting goals of proper protection of incumbent PUs\u27 signals and optimum QoS for SUs so that only as much time is spent for spectrum sensing as needed. Malicious nodes in the CRN however, can take advantage of the two-stage spectrum sensing mechanism to launch smart denial of service (DoS) jamming attacks on CRNs during the fast sensing stage. Coexistence protocols enable collocated CRNs to contend for and share the available spectrum. However, most coexistence protocols do not take into consideration the fact that channels of the available spectrum can be heterogeneous in the sense that they can vary in their characteristics and quality such as SNR or bandwidth. Without any mechanism to enforce fairness in accessing varying quality channels, ensuring coexistence with minimal contention and efficient spectrum utilization for CRNs is likely to become a very difficult task. The cooperative and opportunistic nature of communication has many challenges associated with CRNs\u27 operation. In view of the challenges described above, this dissertation presents solutions including cross-layer approaches, reputation system, optimization and game theoretic approaches to handle (1) degradation in TCP\u27s throughput resulting from packet losses and disruptions in spectrum availability due non-deterministic use of spectrum by the PUs (2) presence of malicious SUs in the CRN that may launch various attacks on CRNs\u27 including SSDF and jamming and (3) sharing of heterogeneous spectrum resources among collocated CRNs without a centralized mechanism to enforce cooperation among otherwise non-cooperative CRN

    IRS-aided UAV for Future Wireless Communications: A Survey and Research Opportunities

    Full text link
    Both unmanned aerial vehicles (UAVs) and intelligent reflecting surfaces (IRS) are gaining traction as transformative technologies for upcoming wireless networks. The IRS-aided UAV communication, which introduces IRSs into UAV communications, has emerged in an effort to improve the system performance while also overcoming UAV communication constraints and issues. The purpose of this paper is to provide a comprehensive overview of IRSassisted UAV communications. First, we provide five examples of how IRSs and UAVs can be combined to achieve unrivaled potential in difficult situations. The technological features of the most recent relevant researches on IRS-aided UAV communications from the perspective of the main performance criteria, i.e., energy efficiency, security, spectral efficiency, etc. Additionally, previous research studies on technology adoption as machine learning algorithms. Lastly, some promising research directions and open challenges for IRS-aided UAV communication are presented

    Spectrum handoff strategy for cognitive radio-based Mac in industrial wirless sensor and actuator networks

    Get PDF
    In this thesis, a Cognitive Radio(CR)-based MAC for Industrial Wireless Sensor and Actuator Network (IWSAN) applications is proposed. IWSANs are typically used for closed-loop control applications, and they demand strict requirements in terms of time and robustness. Low latency and low error rates are required in order not to endanger persons or machinery. Moreover, these applications operate in industrial environments such as factories or transport scenarios (as aeronautics or railway) where multipath fading and shadowing are present due to metal surfaces. Furthermore, interference from other communication systems or industrial machinery is also common in these environments. The proposed MAC, based on the CR paradigm, is capable of ensuring time and robustness requirements in industrial channels. In the process of designing the CR-based MAC for IWSAN applications, a comparison between several non-CR-based MACs and CR-based MACs has been carried out. This comparison, which allows stating the benefits of CR for these applications, is presented in this thesis. The performance of every MAC is determined theoretically using Network Calculus, and it is validated through OPNET simulations. CR solutions, due to their adaptability characteristics, are capable of avoiding interference and ensuring robustness in industrial environments. However, none of the selected MACs are capable of ensuring robustness without comprising time requirements, since interference is avoided but not in a bounded time. On the other hand, the MAC proposed in this thesis is capable of avoiding interference ensuring time and robustness requirements at the same time. This MAC is therefore suitable for IWSAN applications. To ensure a deterministic behavior against interference, a novel handoff algorithm, which detects interference and hops to another channel, has been proposed. This algorithm has been designed to be used jointly with one of the evaluated MACs. The detection of the interference and the hop to another channel is done in a bounded time, because the proposed algorithm detects interference while the system is transmitting. The performance of this proposal is evaluated using Network Calculus and OPNET simulations, and the results are compared with the system without the proposed handoff algorithm. The comparison of the results shows how the evaluated MAC is only capable of ensuring both time and robustness requirements when the proposed handoff strategy is used. Moreover, the spectrum sensing algorithm used to obtain information about the environment is delved and its performance is measured through MATLAB simulations. An energy detector has been chosen due to its simplicity. Also, a cyclostationary Modulation Classifier is presented and a simplification has been carried out allowing its implementation on real hardware. The Modulation Classifier is capable of distinguishing between OFDM, QPSK and GFSK signals. The performance of the algorithm is presented in this thesis for different signals and for different receiver impairments such as frequency offset, DC offset and I/Q imbalance. Finally, a cognitive platform to validate the spectrum sensing algorithms is presented. This platform has been designed using a Xilinx Virtex 6 FPGA by a working group composed of researchers from IK4-Ikerlan and Mondragon Unibertsitatea. The platform, which uses both spectrum sensing algorithms, is an Ethernet-to-RF bridge. It has been designed to replace an Ethernet wired link by a wireless one for IWSAN applications. The proposed platform ensures a reliable communication link against interference. In the proposed implementation, the energy detector is used by the transmitter in order to find a free channel to transmit data, whereas the modulation classifier is used by the receiver in order to distinguish between the signal transmitted by the RF-Ethernet bridge and other signals. In this way the receiver can find the channel where the transmitter is carrying out the communication.En esta tesis se propone una MAC basada en el paradigma de la Radio Cognitiva (RC) para redes de sensores y actuadores inalámbricos industriales. Estas redes se suelen utilizar para aplicaciones de control en lazo cerrado, que exigen requisitos estrictos de tiempo y robustez. Para no poner en peligro la salud de las personas o la maquinaria es necesario que la red asegure una baja latencia y una tasa baja de errores. Además, al trabajar en ambientes industriales como fábricas o transportes (trenes, aviones, etc.), estas redes tienen que hacer frente a canales con mucho desvanecimiento por multitrayecto y efecto sombra debido a las superficies metálicas. También es común en estos entornos que haya interferencias de otros sistemas de comunicaciones o de la propia maquinaria industrial. La MAC propuesta en esta tesis es capaz de asegurar los requisitos temporales y de robustez demandados trabajando en este tipo de entornos. En el proceso de diseño de la MAC basada en RC para redes de sensores y actuadores inalámbricos industriales, se ha llevado a cabo una comparación de diferentes MACs diseñadas para estas redes. Se han evaluado tanto MACs basadas en RC como no basadas en ella, estableciendo las ventajas de la RC para estas aplicaciones. La evaluación se ha llevado a cabo haciendo un estudio teórico mediante Network Calculus, cuyos resultados se han validado mediante simulaciones en OPNET. Los resultados muestran como la RC es capaz de evitar interferencias y asegurar robustez en ambientes industriales. Sin embargo, ninguna de las MACs seleccionadas ha conseguido asegurar ambos requisitos, temporales y de robustez, al mismo tiempo; se puede evitar las interferencias pero no sin comprometer los requisitos temporales de la aplicación. Sin embargo, la MAC propuesta es capaz de evitar interferencias asegurando al mismo tiempo los requisitos temporales y de robustez. Por lo tanto, la MAC propuesta es apropiada para este tipo de redes. Para asegurar el comportamiento determinista del sistema, se ha propuesto un novedoso algoritmo de handoff que es capaz de detectar una interferencia y saltar a otro canal. Este algoritmo se ha diseñado para ser utilizado conjuntamente con una de las MACs previamente evaluadas. La detección de la interferencia y el salto a otro canal se hace en un tiempo determinado de tiempo, ya que es posible detectar interferencias mientras el sistema está transmitiendo. Su rendimiento se ha evaluado mediante Network Calculus y simulaciones en OPNET, y se ha comparado con los resultados obtenidos con la MAC cuando no se utiliza el esquema propuesto. De la comparación se deduce que el esquema de handoff añade a la MAC la capacidad de asegurar a la vez los requisitos temporales y de robustez. Además, en la tesis se explica el algoritmo de spectrum sensing que la MAC utiliza para obtener información del entorno, y su rendimiento se ha estudiado mediante simulaciones en MATLAB. Debido a su simplicidad, se ha optado por un detector de energía para este propósito. También se presenta un clasificador de modulaciones cicloestacionario. Este clasificador ha sido simplificado todo lo posible para posibilitar su implementación en hardware real. El clasificador de modulaciones es capaz de distinguir entre señales OFDM, QPSK y GFSK. Su rendimiento se detalla para diferentes señales y para diferentes deficiencias presentes en el receptor, como son offset de frecuencia, offset de continua o desequilibrios I/Q. Por último, se presenta una plataforma cognitiva que se ha utilizado para validar los algoritmos de spectrum sensing. Un grupo de trabajo compuesto por investigadores de IK4-Ikerlan y Mondragon Unibertsitatea ha diseñado esta plataforma sobre una FPGA Virtex 6 de Xilinx. La plataforma, que utiliza los dos algoritmos de spectrum sensing, es un puente Ethernet-RF. Su objetivo es reemplazar un enlace cableado de Ethernet por uno inalámbrico para aplicaciones de redes de sensores y actuadores industriales. Gracias a los algoritmos de spectrum sensing, la plataforma es capaz de asegurar un enlace robusto ante interferencias. El detector de energía se utiliza en el transmisor para encontrar los posibles canales libres donde transmitir la información. Mientras que el clasificador de modulaciones se utiliza en el receptor para distinguir entre la señal del transmisor y otras posibles señales. Esto permite al receptor saber en qué canal de todos los posibles está el transmisor.Tesi honetan proposatzen da Irrati Kognitiboaren (IK) paradigman oinarritutako MAC bat industriako haririk gabeko sentsore eta eragingailuen sareetarako. Sare horiek begizta itxiko kontrol aplikazioetarako erabili ohi dira, denbora eta sendotasunaren aldetik baldintza ugari eskatzen dute eta. Pertsonen osasuna eta makinak arriskuan ez jartzeko, beharrezkoa da sareak latentzia eta hutsegite tasa txikiak bermatzea. Gainera, industri giroetan lan egiteko direnez, esaterako, lantegietan edo garraioetan (trenak, hegazkinak, etab.), sare horiek gai izan behar dira gainazal metalikoek eragiten dituzten ibilbide aniztunaren eta itzal efektuaren ondorioz asko barreiatzen diren kanalei aurre egiteko. Ingurune horien ohiko ezaugarria da, baita ere, beste komunikazio sistema batzuen edo industriako makinen beraien interferentziak egotea. Tesi honetan proposatzen den MACa gai da honelako inguruetan lan egiteko denborari eta sendotasunari dagokienez eskatzen dituen baldintzak ziurtatzeko. IKan oinarrituta haririk gabeko sentsore eta eragingailu industrialen sareetarako MACa diseinatzeko prozesuan, horrelako sareetarako aurkeztu diren hainbat MAC alderatu dira. IKan oinarritutako MACak zein bestelakoak ebaluatu dira, eta IKak aplikazio hauetarako dituen abantailak ezarri dira. Ebaluaziorako Network Calculus erabili da, zeinaren bidez azterketa teoriko bat egin baita, eta azterketaren emaitzak OPNETen simulazioak eginda baliozkotu dira. Emaitzek erakusten dutenez, IKa gai da industriako inguruneetan interferentziak ekidin eta sendotasuna ziurtatzeko. Halere, aukeratu diren MACetatik batek ere ez du lortu baldintza biak, denborari buruzkoa zein sendotasunari buruzkoa, aldi berean ziurtatzea; interferentziak ekidin daitezke, baina ez aplikazioaren denborari buruzko baldintzak arriskuan jarri gabe. Dena dela, proposatu den MACak portaera determinista bat ziurtatzen du interferentziekiko, eta aldi berean denborari eta sendotasunari buruzko baldintzak ere ziurtatzen ditu. Hortaz, MAC hau egokia da sare mota honetarako. Sistemaren portaera determinista ziurtatzeko, handoff algoritmo berritzailea proposatu da, zeina interferentzia bat antzeman eta beste kanal bat igarotzeko gai den. Algoritmo hori aurretik ebaluatutakoa MACetako batekin batera erabiltzeko diseinatu da. Interferentzia antzeman eta beste kanal batera salto egitea denbora jakin batean egiten da, izan ere, sistema transmititzen ari dela antzeman baitaitezke interferentziak. Network Calculusen bitartez eta OPNETeko simulazioen bitartez ebaluatu da sistemaren errendimendua, eta proposatutako eskema erabiltzen ez denean MACak ematen dituen emaitzekin alderatu da. Alderaketa horretatik ondorioztatzen denez, handoff eskemak denborari eta sendotasunari buruzko baldintzak batera ziurtatzeko ahalmena ematen dio MACari. Gainera, tesiak azaltzen du inguruneari buruzko informazioa eskuratzeko MACak erabiltzen duen spectrum sensing algoritmoa, eta bere errendimendua MATLABen simulazioak eginez aztertu da. Bere sinpletasuna dela eta, energia detektore bat aukeratu da asmo honetarako. Modulazio sailkatzaile zikloegonkor bat ere aurkezten da. Sailkapen hori ahalik eta gehien sinplifikatu da benetako hardwarean inplementatu ahal izateko. Modulazioen sailkatzaileak OFDM, QPSK eta GFSK seinaleak bereizi ditzake. Bere errendimendua hargailuan dauden seinale eta akats desberdinetarako zehazten da, esaterako maiztasunaren offset-a,zuzenaren offset-a edo I/Q desorekak. Bukatzeko, spectrum sensing-eko algoritmoak baliozkotzeko erabili den plataforma kognitibo bat aurkezten da. IK4-Ikerlaneko eta Mondragon Unibertsitateko ikertzailez osatutako lantalde batek diseinatu du plataforma hori Xilinxen Virtex 6 FPGA baten oinarrutz. Plataformak spectrum sensing-eko bi algoritmo erabiltzen ditu eta Ethernet-RF zubi bat da. Bere helburua da Etherneteko kable bidezko lotura bat haririk gabeko batekin ordeztea industriako sentsore eta eragingailuen sareetan aplikatzeko. Spectrum sensing-eko algoritmoei esker, plataformak lotura sendoa bermatu dezake interferentziak gertatzen direnean. Energia detektorea transmisorean erabiltzen da informazioa transmititzeko erabilgarri egon daitezkeen kanalak aurkitzeko. Modulazioen sailkatzailea, berriz, hargailuan erabiltzen da transmisorearen seinalea eta egon daitezkeen beste seinale batzuk bereizteko. Horri esker, hargailuak badaki posible diren kanal guztietatik non dagoen transmisorea
    corecore