16,159 research outputs found
Improved Spectrum Mobility using Virtual Reservation in Collaborative Cognitive Radio Networks
Cognitive radio technology would enable a set of secondary users (SU) to
opportunistically use the spectrum licensed to a primary user (PU). On the
appearance of this PU on a specific frequency band, any SU occupying this band
should free it for PUs. Typically, SUs may collaborate to reduce the impact of
cognitive users on the primary network and to improve the performance of the
SUs. In this paper, we propose and analyze the performance of virtual
reservation in collaborative cognitive networks. Virtual reservation is a novel
link maintenance strategy that aims to maximize the throughput of the cognitive
network through full spectrum utilization. Our performance evaluation shows
significant improvements not only in the SUs blocking and forced termination
probabilities but also in the throughput of cognitive users.Comment: 7 pages, 10 figures, IEEE ISCC 201
Game-theoretic Resource Allocation Methods for Device-to-Device (D2D) Communication
Device-to-device (D2D) communication underlaying cellular networks allows
mobile devices such as smartphones and tablets to use the licensed spectrum
allocated to cellular services for direct peer-to-peer transmission. D2D
communication can use either one-hop transmission (i.e., in D2D direct
communication) or multi-hop cluster-based transmission (i.e., in D2D local area
networks). The D2D devices can compete or cooperate with each other to reuse
the radio resources in D2D networks. Therefore, resource allocation and access
for D2D communication can be treated as games. The theories behind these games
provide a variety of mathematical tools to effectively model and analyze the
individual or group behaviors of D2D users. In addition, game models can
provide distributed solutions to the resource allocation problems for D2D
communication. The aim of this article is to demonstrate the applications of
game-theoretic models to study the radio resource allocation issues in D2D
communication. The article also outlines several key open research directions.Comment: Accepted. IEEE Wireless Comms Mag. 201
Coalition Formation Game for Cooperative Cognitive Radio Using Gibbs Sampling
This paper considers a cognitive radio network in which each secondary user
selects a primary user to assist in order to get a chance of accessing the
primary user channel. Thus, each group of secondary users assisting the same
primary user forms a coaltion. Within each coalition, sequential relaying is
employed, and a relay ordering algorithm is used to make use of the relays in
an efficient manner. It is required then to find the optimal sets of secondary
users assisting each primary user such that the sum of their rates is
maximized. The problem is formulated as a coalition formation game, and a Gibbs
Sampling based algorithm is used to find the optimal coalition structure.Comment: 7 pages, 2 figure
Spectrum sharing security and attacks in CRNs: a review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of
the common control channel, more attention is paid to the
security of the common control channel by looking into its
security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges
Market Based Approaches for Dynamic Spectrum Assignment
Abstract—Much of the technical literature on spectrum sharing has been on developing technologies and systems for non-cooperative) opportunistic use. In this paper, we situate this approach to secondary spectrum use in a broader context, one that includes cooperative approaches to Dynamic Spectrum Access (DSA). In this paper, we introduce readers to this broader approach to DSA by contrasting it with non-cooperative sharing (opportunistic use), surveying relevant literature, and suggesting future directions for researc
- …