5,283 research outputs found

    Primary Channel Gain Estimation for Spectrum Sharing in Cognitive Radio Networks

    Full text link
    In cognitive radio networks, the channel gain between primary transceivers, namely, primary channel gain, is crucial for a cognitive transmitter (CT) to control the transmit power and achieve spectrum sharing. Conventionally, the primary channel gain is estimated in the primary system and thus unavailable at the CT. To deal with this issue, two estimators are proposed by enabling the CT to sense primary signals. In particular, by adopting the maximum likelihood (ML) criterion to analyze the received primary signals, a ML estimator is first developed. After demonstrating the high computational complexity of the ML estimator, a median based (MB) estimator with proved low complexity is then proposed. Furthermore, the estimation accuracy of the MB estimation is theoretically characterized. By comparing the ML estimator and the MB estimator from the aspects of the computational complexity as well as the estimation accuracy, both advantages and disadvantages of two estimators are revealed. Numerical results show that the estimation errors of the ML estimator and the MB estimator can be as small as 0.60.6 dB and 0.70.7 dB, respectively.Comment: Submitted to IEEE Transactions on Communication

    Contribution to spectrum management in cognitive radio networks: a cognitive management framework

    Get PDF
    To overcome the current under-utilization of spectrum resources, the CR (Cognitive Radio) paradigm has gained an increasing interest to perform the so-called Dynamic Spectrum Access (DSA). In this respect, Cognitive Radio networks (CRNs) have been strengthened with cognitive management support to push forward their deployment and commercialization. This dissertation has assessed the relevance of exploiting several cognitive management functionalities in various scenarios and case studies. Specifically, this dissertation has constructed a generic cognitive management framework, based on the fittingness factor concept, to support spectrum management in CRNs. Under this framework, the dissertation has addressed two of the most promising CR applications, namely an Opportunistic Spectrum Access (OSA) to licensed bands and open sharing of license-exempt bands. In the former application, several strategies that exploit temporal statistical dependence between primary activity/inactivity durations to perform a proactive spectrum selection have been discussed. A set of guidelines to select the most relevant strategy for a given environment have been provided. In the latter application, a fittingness factor-based spectrum selection strategy has been proposed to efficiency exploit the different bands. Several formulations of the fittingness factor have been compared, and their relevance have been assessed under different settings. Drawing inspiration from these applications, a more general proactive strategy exploiting a characterization of spectrum resources at both the time and frequency domains has been developed to jointly assist spectrum selection (SS) and spectrum mobility (SM) functionalities. Several variants of the proposed strategy, each combining different choices and options of implementation, have been compared to identify which of its components have the most significant impact on performance depending on the working conditions of the CRN. To assess rationality of the proposed strategy with respect to other strategies, a cost-benefit analysis has been conducted to confront the introduced gain in terms of user satisfaction level to the incurred cost in terms of signaling amount. Finally, the dissertation has conducted an analysis of practicality aspects in terms of robustness to environment uncertainty and applicability to realistic environments. With respect to the former aspect, robustness has been assessed in front of two sources of uncertainty, namely imperfection of the acquisition process and non-stationarity of the environment, and additional functionalities have been developed, when needed, to improve robustness. With respect to the latter, the proposed framework has been applied to a Digital Home (DH) environment to validate the obtained key findings under realistic conditions.Postprint (published version

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
    • …
    corecore