2,935 research outputs found

    Analytical Studies of Fragmented-Spectrum Multi-Level OFDM-CDMA Technique in Cognitive Radio Networks

    Full text link
    In this paper, we present a multi-user resource allocation framework using fragmented-spectrum synchronous OFDM-CDMA modulation over a frequency-selective fading channel. In particular, given pre-existing communications in the spectrum where the system is operating, a channel sensing and estimation method is used to obtain information of subcarrier availability. Given this information, some real-valued multi-level orthogonal codes, which are orthogonal codes with values of {±1,±2,±3,±4,...}\{\pm1,\pm2,\pm3,\pm4, ... \}, are provided for emerging new users, i.e., cognitive radio users. Additionally, we have obtained a closed form expression for bit error rate of cognitive radio receivers in terms of detection probability of primary users, CR users' sensing time and CR users' signal to noise ratio. Moreover, simulation results obtained in this paper indicate the precision with which the analytical results have been obtained in modeling the aforementioned system.Comment: 6 pages and 3 figure

    A Study on Techniques/Algorithms used for Detection and Prevention of Security Attacks in Cognitive Radio Networks

    Get PDF
    In this paper a detailed survey is carried out on the taxonomy of Security Issues, Advances on Security Threats and Countermeasures ,A Cross-Layer Attack, Security Status and Challenges for Cognitive Radio Networks, also a detailed survey on several Algorithms/Techniques used to detect and prevent SSDF(Spectrum Sensing Data Falsification) attack a type of DOS (Denial of Service) attack and several other  Network layer attacks in Cognitive Radio Network or Cognitive Radio Wireless Sensor Node Networks(WSNN’s) to analyze the advantages and disadvantages of those existing algorithms/techniques

    Intelligent Approaches for Energy-Efficient Resource Allocation in the Cognitive Radio Network

    Get PDF
    The cognitive radio (CR) is evolved as the promising technology to alleviate the spectrum scarcity issues by allowing the secondary users (SUs) to use the licensed band in an opportunistic manner. Various challenges need to be addressed before the successful deployment of CR technology. This thesis work presents intelligent resource allocation techniques for improving energy efficiency (EE) of low battery powered CR nodes where resources refer to certain important parameters that directly or indirectly affect EE. As far as the primary user (PU) is concerned, the SUs are allowed to transmit on the licensed band until their transmission power would not cause any interference to the primary network. Also, the SUs must use the licensed band efficiently during the PU’s absence. Therefore, the two key factors such as protection to the primary network and throughput above the threshold are important from the PU’s and SUs’ perspective, respectively. In deployment of CR, malicious users may be more active to prevent the CR users from accessing the spectrum or cause unnecessary interference to the both primary and secondary transmission. Considering these aspects, this thesis focuses on developing novel approaches for energy-efficient resource allocation under the constraints of interference to the PR, minimum achievable data rate and maximum transmission power by optimizing the resource parameters such as sensing time and the secondary transmission power with suitably selecting SUs. Two different domains considered in this thesis are the soft decision fusion (SDF)-based cooperative spectrum sensing CR network (CRN) models without and with the primary user emulation attack (PUEA). An efficient iterative algorithm called iterative Dinkelbach method (IDM) is proposed to maximize EE with suitable SUs in the absence of the attacker. In the proposed approaches, different constraints are evaluated considering the negative impact of the PUE attacker on the secondary transmission while maximizing EE with the PUE attacker. The optimization problem associated with the non-convex constraints is solved by our proposed iterative resource allocation algorithms (novel iterative resource allocation (NIRA) and novel adaptive resource allocation (NARA)) with suitable selection of SUs for jointly optimizing the sensing time and power allocation. In the CR enhanced vehicular ad hoc network (CR-VANET), the time varying channel responses with the vehicular movement are considered without and with the attacker. In the absence of the PUE attacker, an interference-aware power allocation scheme based on normalized least mean square (NLMS) algorithm is proposed to maximize EE considering the dynamic constraints. In the presence of the attacker, the optimization problem associated with the non-convex and time-varying constraints is solved by an efficient approach based on genetic algorithm (GA). Further, an investigation is attempted to apply the CR technology in industrial, scientific and medical (ISM) band through spectrum occupancy prediction, sub-band selection and optimal power allocation to the CR users using the real time indoor measurement data. Efficacies of the proposed approaches are verified through extensive simulation studies in the MATLAB environment and by comparing with the existing literature. Further, the impacts of different network parameters on the system performance are analyzed in detail. The proposed approaches will be highly helpful in designing energy-efficient CRN model with low complexity for future CR deployment

    ActMesh- A Cognitive Resource Management paradigm for dynamic mobile Internet Access with Reliability Guarantees

    Get PDF
    Wireless Mesh Networks (WMNs) are going increasing attention as a flexible low-cost networking architecture to provide media Internet access over metropolitan areas to mobile clients requiring multimedia services. In WMNs, Mesh Routers (MRs) from the mesh backbone and accomplish the twofold task of traffic forwarding, as well as providing multimedia access to mobile Mesh Clients (MCs). Due to the intensive bandwidth-resource requested for supporting QoS-demanding multimedia services, performance of the current WMNs is mainly limited by spectrum-crowding and traffic-congestion, as only scarce spectrum-resources is currently licensed for the MCs' access. In principle, this problem could be mitigated by exploiting in a media-friendly (e.g., content-aware) way the context-aware capabilities offered by the Cognitive Radio (CR) paradigm. As integrated exploitation of both content and context-aware system's capabilities is at the basis of our proposed Active Mesh (ActMesh) networking paradigm. This last aims at defining a network-wide architecture for realizing media-friendly Cognitive Mesh nets (e.g., context aware Cognitive Mesh nets). Hence, main contribution of this work is four fold: 1. After introducing main functional blocks of our ActMesh architecture, suitable self-adaptive Belief Propagation and Soft Data Fusion algorithms are designed to provide context-awareness. This is done under both cooperative and noncooperative sensing frameworks. 2. The resulting network-wide resource management problem is modelled as a constrained stochastic Network Utility Maximization (NUM) problem, with the dual (contrasting) objective to maximize spectrum efficiency at the network level, while accounting for the perceived quality of the delivered media flows at the client level. 3. A fully distributed, scalable and self-adaptive implementation of the resulting Active Resource Manager (ARM) is deployed, that explicitly accounts for the energy limits of the battery powered MCs and the effects induced by both fading and client mobility. Due to informationally decentralized architecture of the ActMesh net, the complexity of (possibly, optimal) centralized solutions for resource management becomes prohibitive when number of MCs accessing ActMesh net grow. Furthermore, centralized resource management solutions could required large amounts of time to collect and process the required network information, which, in turn, induce delay that can be unacceptable for delay sensitive media applications, e.g., multimedia streaming. Hence, it is important to develop network-wide ARM policies that are both distributed and scalable by exploiting the radio MCs capabilities to sense, adapt and coordinate themselves. We validate our analytical models via simulation based numerical tests, that support actual effectiveness of the overall ActMesh paradigm, both in terms of objective and subjective performance metrics. In particular, the basic tradeoff among backbone traffic-vs-access traffic arising in the ActMesh net from the bandwidth-efficient opportunistic resource allocation policy pursued by the deployed ARM is numerically characterized. The standardization framework we inspire to is the emerging IEEE 802.16h one

    ActMesh- A Cognitive Resource Management paradigm for dynamic mobile Internet Access with Reliability Guarantees

    Get PDF
    Wireless Mesh Networks (WMNs) are going increasing attention as a flexible low-cost networking architecture to provide media Internet access over metropolitan areas to mobile clients requiring multimedia services. In WMNs, Mesh Routers (MRs) from the mesh backbone and accomplish the twofold task of traffic forwarding, as well as providing multimedia access to mobile Mesh Clients (MCs). Due to the intensive bandwidth-resource requested for supporting QoS-demanding multimedia services, performance of the current WMNs is mainly limited by spectrum-crowding and traffic-congestion, as only scarce spectrum-resources is currently licensed for the MCs' access. In principle, this problem could be mitigated by exploiting in a media-friendly (e.g., content-aware) way the context-aware capabilities offered by the Cognitive Radio (CR) paradigm. As integrated exploitation of both content and context-aware system's capabilities is at the basis of our proposed Active Mesh (ActMesh) networking paradigm. This last aims at defining a network-wide architecture for realizing media-friendly Cognitive Mesh nets (e.g., context aware Cognitive Mesh nets). Hence, main contribution of this work is four fold: 1. After introducing main functional blocks of our ActMesh architecture, suitable self-adaptive Belief Propagation and Soft Data Fusion algorithms are designed to provide context-awareness. This is done under both cooperative and noncooperative sensing frameworks. 2. The resulting network-wide resource management problem is modelled as a constrained stochastic Network Utility Maximization (NUM) problem, with the dual (contrasting) objective to maximize spectrum efficiency at the network level, while accounting for the perceived quality of the delivered media flows at the client level. 3. A fully distributed, scalable and self-adaptive implementation of the resulting Active Resource Manager (ARM) is deployed, that explicitly accounts for the energy limits of the battery powered MCs and the effects induced by both fading and client mobility. Due to informationally decentralized architecture of the ActMesh net, the complexity of (possibly, optimal) centralized solutions for resource management becomes prohibitive when number of MCs accessing ActMesh net grow. Furthermore, centralized resource management solutions could required large amounts of time to collect and process the required network information, which, in turn, induce delay that can be unacceptable for delay sensitive media applications, e.g., multimedia streaming. Hence, it is important to develop network-wide ARM policies that are both distributed and scalable by exploiting the radio MCs capabilities to sense, adapt and coordinate themselves. We validate our analytical models via simulation based numerical tests, that support actual effectiveness of the overall ActMesh paradigm, both in terms of objective and subjective performance metrics. In particular, the basic tradeoff among backbone traffic-vs-access traffic arising in the ActMesh net from the bandwidth-efficient opportunistic resource allocation policy pursued by the deployed ARM is numerically characterized. The standardization framework we inspire to is the emerging IEEE 802.16h one

    Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

    Full text link
    The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack and defense. Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Next, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we highlight the unsolved research challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
    corecore