62 research outputs found

    Enhanced Dynamic Frequency Hopping Performance in Cognitive Radio IEEE 802.22 Standard

    Get PDF
    IEEE 802.22 is a Cognitive Radio based standard designed for Wireless Regional Area Networks (WRAN) for the purpose of providing wireless broadband access to rural and remote areas. The standard relies on the utilization of the unoccupied spectrum that became available after the TV signal was converted from analog to digital. In this thesis, we present an enhanced scheme for the operation of the Dynamic Frequency Hopping (DFH) technique in the IEEE 802.22 standard for WRANs. The performance of the DFH is analyzed thoroughly for various types of channels and for a Multiple-input Multiple-output (MIMO) systems. The core of this research is based on the coexistence of the incumbent users and the WRANs in the TV white spaces (TVWS). The proposed technique, aims at protecting the licensed users from interfering with the cognitive broadband access in the TV spectrum. In order to achieve that, spectrum sensing is performed in the intended working channel in DFH while spectrum monitoring with the energy-ratio (ER) algorithm is applied during the WRAN data transmission in the currently working channel. Hence, in the DFH-ER algorithm the reappearance of an incumbent user in a band occupied by the WRANs would be detected immediately, providing interference free performance for the licensed user as well as reliable data transmission for the unlicensed one. Simulation results of the proposed DFH-ER technique compared to the conventional DFH scenario exemplify the enhancement of the WRAN data transmission while protecting the incumbent users

    Recent Trends on TV White Space Deployments in Africa

    Get PDF
    In this paper, we presented the effects of Television White Space (TVWS) on digital divide in Africa. The trends in digital divide are found to be wide in most African countries, which are characterized with low internet penetration. Perhaps this is expected because over 60 % of people in Africa reside in the rural area and these areas are characterized with low literacy, poverty level and limited telecommunication infrastructure supports. There have been research efforts and regulations towards the secondary use of TV frequencies. However, findings indicate that there are limited opportunities for such system in Europe: This is due to high internet penetration in Europe, but the situation may be quite different in other part of the world like in Africa. Therefore, the TVWS could be used to provide affordable universal access in rural Africa. The paper also presents some benefits developing countries in Africa will incur from utilizing the TVWS solution. Also, recent trend in the deployment of TVWS and experiences got from African countries that embrace the solution are presented.http://dx.doi.org/10.4314/njt.v34i3.1

    Spectrum Sensing and Security Challenges and Solutions: Contemporary Affirmation of the Recent Literature

    Get PDF
    Cognitive radio (CR) has been recently proposed as a promising technology to improve spectrum utilization by enabling secondary access to unused licensed bands. A prerequisite to this secondary access is having no interference to the primary system. This requirement makes spectrum sensing a key function in cognitive radio systems. Among common spectrum sensing techniques, energy detection is an engaging method due to its simplicity and efficiency. However, the major disadvantage of energy detection is the hidden node problem, in which the sensing node cannot distinguish between an idle and a deeply faded or shadowed band. Cooperative spectrum sensing (CSS) which uses a distributed detection model has been considered to overcome that problem. On other dimension of this cooperative spectrum sensing, this is vulnerable to sensing data falsification attacks due to the distributed nature of cooperative spectrum sensing. As the goal of a sensing data falsification attack is to cause an incorrect decision on the presence/absence of a PU signal, malicious or compromised SUs may intentionally distort the measured RSSs and share them with other SUs. Then, the effect of erroneous sensing results propagates to the entire CRN. This type of attacks can be easily launched since the openness of programmable software defined radio (SDR) devices makes it easy for (malicious or compromised) SUs to access low layer protocol stacks, such as PHY and MAC. However, detecting such attacks is challenging due to the lack of coordination between PUs and SUs, and unpredictability in wireless channel signal propagation, thus calling for efficient mechanisms to protect CRNs. Here in this paper we attempt to perform contemporary affirmation of the recent literature of benchmarking strategies that enable the trusted and secure cooperative spectrum sensing among Cognitive Radios

    Spectrum Map and its Application in Cognitive Radio Networks

    Get PDF
    Recent measurements on radio spectrum usage have revealed the abundance of underutilized bands of spectrum that belong to licensed users. This necessitated the paradigm shift from static to dynamic spectrum access. Cognitive radio based secondary networks that utilize such unused spectrum holes in the licensed band, have been proposed as a possible solution to the spectrum crisis. The idea is to detect times when a particular licensed band is unused and use it for transmission without causing interference to the licensed user. We argue that prior knowledge about occupancy of such bands and the corresponding achievable performance metrics can potentially help secondary networks to devise effective strategies to improve utilization. In this work, we use Shepard\u27s method of interpolation to create a spectrum map that provides a spatial distribution of spectrum usage over a region of interest. It is achieved by intelligently fusing the spectrum usage reports shared by the secondary nodes at various locations. The obtained spectrum map is a continuous and differentiable 2-dimension distribution function in space. With the spectrum usage distribution known, we show how different radio spectrum and network performance metrics like channel capacity, secondary network throughput, spectral efficiency, and bit error rate can be estimated. We show the applicability of the spectrum map in solving the intra-cell channel allocation problem in centralized cognitive radio networks, such as IEEE 802.22. We propose a channel allocation scheme where the base station allocates interference free channels to the consumer premise equipments (CPE) using the spectrum map that it creates by fusing the spectrum usage information shared by some CPEs. The most suitable CPEs for information sharing are chosen on a dynamic basis using an iterative clustering algorithm. Next, we present a contention based media access control (MAC) protocol for distributed cognitive radio network. The unlicensed secondary users contend among themselves over a common control channel. Winners of the contention get to access the available channels ensuring high utilization and minimum collision with primary incumbent. Last, we propose a multi-channel, multi-hop routing protocol with secondary transmission power control. The spectrum map, created and maintained by a set of sensors, acts as the basis of finding the best route for every source destination pair. The proposed routing protocol ensures primary receiver protection and maximizes achievable link capacity. Through simulation experiments we show the correctness of the prediction model and how it can be used by secondary networks for strategic positioning of secondary transmitter-receiver pairs and selecting the best candidate channels. The simulation model mimics realistic distribution of TV stations for urban and non-urban areas. Results validate the nature and accuracy of estimation, prediction of performance metrics, and efficiency of the allocation process in an IEEE 802.22 network. Results for the proposed MAC protocol show high channel utilization with primary quality of service degradation within a tolerable limit. Performance evaluation of the proposed routing scheme reveals that it ensures primary receiver protection through secondary power control and maximizes route capacity

    Performance analysis of contending customer equipment in wireless networks

    Get PDF
    NoInitial ranging is the primary and important process in wireless networks for the customer premise equipments (CPEs) to access the network and establish their connections with the base station. Contention may occur during the initial ranging process. To avoid contention, the mandatory solution defined in the standards is based on a truncated binary exponential random backoff (TBERB) algorithm with a fixed initial contention window size. However, the TBERB algorithm does not take into account the possibility that the number of contended CPEs may change dynamically over time, leading to a dynamically changing collision probability. To the best of our knowledge, this is the first attempt to address this issue. There are three major contributions presented in this paper. First, a comprehensive analysis of initial ranging mechanisms in wireless networks is provided and initial ranging request success probability is derived based on number of contending CPEs and the initial contention window size. Second, the average ranging success delay is derived for the maximum backoff stages. It is found that the collision probability is highly dependent on the size of the initial contention window and the number of contending CPEs. To achieve the higher success probability or to reduce the collision probability among CPEs, the BS needs to adjust the initial contention window size. To keep the collision probability at a specific value for the particular number of contending CPEs, it is necessary for the BS to schedule the required size of the initial contention window to facilitate the maximum number of CPEs to establish their connections with reasonable delay. In our third contribution, the initial window size is optimized to provide the least upper bound that meets the collision probability constraint for a particular number of contending CPEs. The numerical results validate our analysis

    Novel Approaches for the Performance Enhancement of Cognitive Radio Networks

    Full text link
    This research is dedicated to the study of the challenges faced by Cognitive Radio (CR) networks, which include self-coexistence of the networks in the spectral environment, security and performance threats from malicious entities, and fairness in spectrum contention and utilization. We propose novel channel acquisition schemes that allow decentralized CR networks to have multiple channel access with minimal spectrum contentions. The multiple channel acquisition schemes facilitate fast spectrum access especially in cases where networks cannot communicate with each other. These schemes enable CR networks to self-organize and adapt to the dynamically changing spectral environment. We also present a self-coexistence mechanism that allows CR networks to coexist via the implementation of a risk-motivated channel selection based deference structure (DS). By forming DS coalitions, CR networks are able to have better access to preferred channels and can defer transmission to one another, thereby mitigating spectrum conflicts. CR networks are also known to be susceptible to Sybil threats from smart malicious radios with either monopolistic or disruptive intentions. We formulate novel threat and defense mechanisms to combat Sybil threats and minimize their impact on the performance of CR networks. A dynamic reputation system is proposed that considerably minimizes the effectiveness of intelligent Sybil attacks and improves the accuracy of spectrum-based decision-making processes. Finally, we present a distributed and cheat-proof spectrum contention protocol as an enhancement of the adaptive On-Demand Spectrum Contention (ODSC) protocol. The Modified On-Demand Spectrum Contention (MODSC) protocol enhances fairness and efficiency of spectrum access. We also show that there is substantial improvement in spectrum utilization with the incorporation of channel reuse into the MODSC protocol
    corecore