2,232 research outputs found

    ETSI RRS - The Standardization Path to Next Generation Cognitive Radio Systems

    No full text
    This paper details the current work status of the ETSI Reconfigurable Radio Systems (RRS) Technical Committee (TC) and gives an outlook on the future evolution. While previous publications have presented an overview of ETSI RRS' main working axes related to i) Cognitive Radio System Aspects, ii) Radio Equipment Architecture (including a Cognitive Pilot Channel (CPC) proposal and a Functional Architecture (FA) for Management and Control of Reconfigurable Radio Systems), iii) Cognitive Management and Control and iv) Public Safety, this document focuses on latest progress related to UHF White Spaces work and the definition of an SDR Handset Architecture. In particular, it is outlined how Cognitive Radio principles can help to adapt existing and/or evolving Radio Standards, such as 3GPP Long Term Evolution, to a possible operation in UHF White Space bands

    Project Final Report – FREEDOM ICT-248891

    Get PDF
    This document is the final publishable summary report of the objective and work carried out within the European Project FREEDOM, ICT-248891.This document is the final publishable summary report of the objective and work carried out within the European Project FREEDOM, ICT-248891.Preprin

    Cognitive pilot channel enabling spectrum awareness

    Get PDF
    This paper presents the Cognitive Pilot Channel (CPC) solution as a mechanism allowing the terminal to be aware of the communication means available at a given time and place in a flexible spectrum management scenario. The different aspects to be considered in the CPC deployment are highlighted, together with the different implementation options. As a result, a CPC dimensioning methodology is formulated, identifying the main parameters involved in the process and the corresponding design trade-offs.Postprint (published version

    Cognitive pilot channel: A radio enabler for spectrum awareness and optimized radio resource management

    Get PDF
    Today’s wireless communications landscape is characterized by the coexistence of a plethora of disparate radio access technologies (RATs), which exhibit varying features in terms of capacity and coverage capabilities, mobility support etc. and also offer a great number of applications and services to different types of devices. In such a miscellaneous environment, mobile terminals are provided with a great set of options while setting up the parameters of their operation including among others the RAT, carrier frequency, and must also take into account the latest trend towards a flexible spectrum framework in heterogeneous radio access networks (RANs). As a result, in order to implement the optimal action, a mobile terminal needs to be enabled to acquire knowledge of its environment and established policies. Apart from mobilizing a rather time- and power-consuming operation such as spectrum sensing, the Cognitive Pilot Channel (CPC) concept has been proposed as a solution for providing the terminal with the necessary radio awareness at a given time and place, in a possible flexible spectrum management context. Framed within the above, this paper, developed within the E3 project, aims at describing the CPC concept by showcasing its twofold role. First, as an enabler of the switch-on process for assisting the mobile terminal to camp onto the network side and second, as an enabler of an efficient decentralized and network-assisted radio resource management during the on-going communication phase.Postprint (published version

    Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

    Full text link
    The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack and defense. Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Next, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we highlight the unsolved research challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral

    A Framework for Enhancing the Energy Efficiency of IoT Devices in 5G Network

    Get PDF
    A wide range of services, such as improved mobile broadband, extensive machine-type communication, ultra-reliability, and low latency, are anticipated to be delivered via the 5G network. The 5G network has developed as a multi-layer network that uses numerous technological advancements to provide a wide array of wireless services to fulfil such a diversified set of requirements. Several technologies, including software-defined networking, network function virtualization, edge computing, cloud computing, and tiny cells, are being integrated into the 5G networks to meet the needs of various requirements. Due to the higher power consumption that will arise from such a complicated network design, energy efficiency becomes crucial. The network machine learning technique has attracted a lot of interest from the scientific community because it has the potential to play a crucial role in helping to achieve energy efficiency. Utilization factor, access latency, arrival rate, and other metrics are used to study the proposed scheme. It is determined that our system outperforms the present scheme after comparing the suggested scheme to these parameters
    • …
    corecore