865 research outputs found

    Cognitive radio-enabled Internet of Vehicles (IoVs): a cooperative spectrum sensing and allocation for vehicular communication

    Get PDF
    Internet of Things (IoTs) era is expected to empower all aspects of Intelligent Transportation System (ITS) to improve transport safety and reduce road accidents. US Federal Communication Commission (FCC) officially allocated 75MHz spectrum in the 5.9GHz band to support vehicular communication which many studies have found insufficient. In this paper, we studied the application of Cognitive Radio (CR) technology to IoVs in order to increase the spectrum resource opportunities available for vehicular communication, especially when the officially allocated 75MHz spectrum in 5.9GHz band is not enough due to high demands as a result of increasing number of connected vehicles as already foreseen in the near era of IoTs. We proposed a novel CR Assisted Vehicular NETwork (CRAVNET) framework which empowers CR enabled vehicles to make opportunistic usage of licensed spectrum bands on the highways. We also developed a novel co-operative three-state spectrum sensing and allocation model which makes CR vehicular secondary units (SUs) aware of additional spectrum resources opportunities on their current and future positions and applies optimal sensing node allocation algorithm to guarantee timely acquisition of the available channels within a limited sensing time. The results of the theoretical analyses and simulation experiments have demonstrated that the proposed model can significantly improve the performance of a cooperative spectrum sensing and provide vehicles with additional spectrum opportunities without harmful interference against the Primary Users (PUs) activities

    Performance Analysis of Secondary Users in Heterogeneous Cognitive Radio Network

    Get PDF
    Continuous increase in wireless subscriptions and static allocation of wireless frequency bands to the primary users (PUs) are fueling the radio frequency (RF) shortage problem. Cognitive radio network (CRN) is regarded as a solution to this problem as it utilizes the scarce RF in an opportunisticmanner to increase the spectrumefficiency. InCRN, secondary users (SUs) are allowed to access idle frequency bands opportunistically without causing harmful interference to the PUs. In CRN, the SUs determine the presence of PUs through spectrum sensing and access idle bands by means of dynamic spectrum access. Spectrum sensing techniques available in the literature do not consider mobility. One of the main objectives of this thesis is to include mobility of SUs in spectrum sensing. Furthermore, due to the physical characteristics of CRN where licensed RF bands can be dynamically accessed by various unknown wireless devices, security is a growing concern. This thesis also addresses the physical layer security issues in CRN. Performance of spectrum sensing is evaluated based on probability of misdetection and false alarm, and expected overlapping time, and performance of SUs in the presence of attackers is evaluated based on secrecy rates

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Comprehensive survey on quality of service provisioning approaches in cognitive radio networks : part one

    Get PDF
    Much interest in Cognitive Radio Networks (CRNs) has been raised recently by enabling unlicensed (secondary) users to utilize the unused portions of the licensed spectrum. CRN utilization of residual spectrum bands of Primary (licensed) Networks (PNs) must avoid harmful interference to the users of PNs and other overlapping CRNs. The coexisting of CRNs depends on four components: Spectrum Sensing, Spectrum Decision, Spectrum Sharing, and Spectrum Mobility. Various approaches have been proposed to improve Quality of Service (QoS) provisioning in CRNs within fluctuating spectrum availability. However, CRN implementation poses many technical challenges due to a sporadic usage of licensed spectrum bands, which will be increased after deploying CRNs. Unlike traditional surveys of CRNs, this paper addresses QoS provisioning approaches of CRN components and provides an up-to-date comprehensive survey of the recent improvement in these approaches. Major features of the open research challenges of each approach are investigated. Due to the extensive nature of the topic, this paper is the first part of the survey which investigates QoS approaches on spectrum sensing and decision components respectively. The remaining approaches of spectrum sharing and mobility components will be investigated in the next part

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Intelligent Approaches for Energy-Efficient Resource Allocation in the Cognitive Radio Network

    Get PDF
    The cognitive radio (CR) is evolved as the promising technology to alleviate the spectrum scarcity issues by allowing the secondary users (SUs) to use the licensed band in an opportunistic manner. Various challenges need to be addressed before the successful deployment of CR technology. This thesis work presents intelligent resource allocation techniques for improving energy efficiency (EE) of low battery powered CR nodes where resources refer to certain important parameters that directly or indirectly affect EE. As far as the primary user (PU) is concerned, the SUs are allowed to transmit on the licensed band until their transmission power would not cause any interference to the primary network. Also, the SUs must use the licensed band efficiently during the PU’s absence. Therefore, the two key factors such as protection to the primary network and throughput above the threshold are important from the PU’s and SUs’ perspective, respectively. In deployment of CR, malicious users may be more active to prevent the CR users from accessing the spectrum or cause unnecessary interference to the both primary and secondary transmission. Considering these aspects, this thesis focuses on developing novel approaches for energy-efficient resource allocation under the constraints of interference to the PR, minimum achievable data rate and maximum transmission power by optimizing the resource parameters such as sensing time and the secondary transmission power with suitably selecting SUs. Two different domains considered in this thesis are the soft decision fusion (SDF)-based cooperative spectrum sensing CR network (CRN) models without and with the primary user emulation attack (PUEA). An efficient iterative algorithm called iterative Dinkelbach method (IDM) is proposed to maximize EE with suitable SUs in the absence of the attacker. In the proposed approaches, different constraints are evaluated considering the negative impact of the PUE attacker on the secondary transmission while maximizing EE with the PUE attacker. The optimization problem associated with the non-convex constraints is solved by our proposed iterative resource allocation algorithms (novel iterative resource allocation (NIRA) and novel adaptive resource allocation (NARA)) with suitable selection of SUs for jointly optimizing the sensing time and power allocation. In the CR enhanced vehicular ad hoc network (CR-VANET), the time varying channel responses with the vehicular movement are considered without and with the attacker. In the absence of the PUE attacker, an interference-aware power allocation scheme based on normalized least mean square (NLMS) algorithm is proposed to maximize EE considering the dynamic constraints. In the presence of the attacker, the optimization problem associated with the non-convex and time-varying constraints is solved by an efficient approach based on genetic algorithm (GA). Further, an investigation is attempted to apply the CR technology in industrial, scientific and medical (ISM) band through spectrum occupancy prediction, sub-band selection and optimal power allocation to the CR users using the real time indoor measurement data. Efficacies of the proposed approaches are verified through extensive simulation studies in the MATLAB environment and by comparing with the existing literature. Further, the impacts of different network parameters on the system performance are analyzed in detail. The proposed approaches will be highly helpful in designing energy-efficient CRN model with low complexity for future CR deployment

    A Context-aware Trust Framework for Resilient Distributed Cooperative Spectrum Sensing in Dynamic Settings

    Get PDF
    Cognitive radios enable dynamic spectrum access where secondary users (SUs) are allowed to operate on the licensed spectrum bands on an opportunistic noninterference basis. Cooperation among the SUs for spectrum sensing is essential for environments with deep shadows. In this paper, we study the adverse effect of insistent spectrum sensing data falsification (ISSDF) attack on iterative distributed cooperative spectrum sensing. We show that the existing trust management schemes are not adequate in mitigating ISSDF attacks in dynamic settings where the primary user (PU) of the band frequently transitions between active and inactive states. We propose a novel context-aware distributed trust framework for cooperative spectrum sensing in mobile cognitive radio ad hoc networks (CRAHN) that effectively alleviates different types of ISSDF attacks (Always-Yes, Always-No, and fabricating) in dynamic scenarios. In the proposed framework, the SU nodes evaluate the trustworthiness of one another based on the two possible contexts in which they make observations from each other: PU absent context and PU present context. We evaluate the proposed context-aware scheme and compare it against the existing context-oblivious trust schemes using theoretical analysis and extensive simulations of realistic scenarios of mobile CRAHNs operating in TV white space. We show that in the presence of a large set of attackers (as high as 60% of the network), the proposed context-aware trust scheme successfully mitigates the attacks and satisfy the false alarm and missed-detection rates of 10210^{-2} and lower. Moreover, we show that the proposed scheme is scalable in terms of attack severity, SU network density, and the distance of the SU network to the PU transmitter
    corecore