1,636 research outputs found

    Investigation of Security and Spectrum Management Issues in Cognitive Radio Aided by Machine Learning

    Full text link
    University of Technology Sydney. Faculty of Engineering and Information Technology.Cognitive Radio (CR) is an intelligent and adaptive radio and network technology that allows transceivers to sense available frequency spectrum and change its parameters, to switch to available channels (frequency bands) without interruption to other connected transceivers. It is primarily a technology to resolve spectrum scarcity problems using Dynamic Spectrum Access (DSA). The potential aspects and applications of Cognitive radio are far superior to DSA alone. CR abilities and CR reconfiguration abilities are essential components for electronic warfare (communications). It provides capabilities for developing and deploying advanced anti-jamming methods, by assisting in the development of advanced intelligent, self-reconfiguration methods to alleviate the effects of jamming. This thesis examines the effects of jamming and other attacks on Cognitive Radio Networks and provides methods and processes to overcome those effects. Cognitive Radio architecture simulation was applied so that policies and their application correlate to Cognitive Radio jamming and anti-jamming issues. Simulation is employed for testing Multi-Armed Bandit and machine learning strategies/solutions as shown by this thesis. The central part of the thesis is the mitigation of jamming outcomes on Cognitive Radio Networks by using proactive steps to increase communication robustness and contentiousness. The thesis utilizes game theory (i.e. the Multi-Armed Bandit problem) and protection using Machine Learning (ProML) design for analysing jamming behavior on Cognitive Radio systems. MAB experiment show MAB approach is effective giants random attack, whereas, the proposed machine learning has its own merits to overcome constant and reactive jamming

    Resource Allocation for Interference Management in Wireless Networks

    Get PDF
    Interference in wireless networks is a major problem that impacts system performance quite substantially. Combined with the fact that the spectrum is limited and scarce, the performance and reliability of wireless systems significantly deteriorates and, hence, communication sessions are put at the risk of failure. In an attempt to make transmissions resilient to interference and, accordingly, design robust wireless systems, a diverse set of interference mitigation techniques are investigated in this dissertation. Depending on the rationale motivating the interfering node, interference can be divided into two categories, communication and jamming. For communication interference such as the interference created by legacy users(e.g., primary user transmitters in a cognitive radio network) at non-legacy or unlicensed users(e.g.,secondary user receivers), two mitigation techniques are presented in this dissertation. One exploits permutation trellis codes combined with M-ary frequency shift keying in order to make SU transmissions resilient to PUs’ interference, while the other utilizes frequency allocation as a mitigation technique against SU interference using Matching theory. For jamming interference, two mitigation techniques are also investigated here. One technique exploits time and structures a jammer mitigation framework through an automatic repeat request protocol. The other one utilizes power and, following a game-theoretic framework, employs a defense strategy against jamming based on a strategic power allocation. Superior performance of all of the proposed mitigation techniques is shown via numerical results
    corecore