792 research outputs found
Spectrum sharing security and attacks in CRNs: a review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of
the common control channel, more attention is paid to the
security of the common control channel by looking into its
security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges
Improved Spectrum Mobility using Virtual Reservation in Collaborative Cognitive Radio Networks
Cognitive radio technology would enable a set of secondary users (SU) to
opportunistically use the spectrum licensed to a primary user (PU). On the
appearance of this PU on a specific frequency band, any SU occupying this band
should free it for PUs. Typically, SUs may collaborate to reduce the impact of
cognitive users on the primary network and to improve the performance of the
SUs. In this paper, we propose and analyze the performance of virtual
reservation in collaborative cognitive networks. Virtual reservation is a novel
link maintenance strategy that aims to maximize the throughput of the cognitive
network through full spectrum utilization. Our performance evaluation shows
significant improvements not only in the SUs blocking and forced termination
probabilities but also in the throughput of cognitive users.Comment: 7 pages, 10 figures, IEEE ISCC 201
EVM as generic QoS trigger for heterogeneous wieless overlay network
Fourth Generation (4G) Wireless System will integrate heterogeneous wireless
overlay systems i.e. interworking of WLAN/ GSM/ CDMA/ WiMAX/ LTE/ etc with
guaranteed Quality of Service (QoS) and Experience (QoE).QoS(E) vary from
network to network and is application sensitive. User needs an optimal mobility
solution while roaming in Overlaid wireless environment i.e. user could
seamlessly transfer his session/ call to a best available network bearing
guaranteed Quality of Experience. And If this Seamless transfer of session is
executed between two networks having different access standards then it is
called Vertical Handover (VHO). Contemporary VHO decision algorithms are based
on generic QoS metrics viz. SNR, bandwidth, jitter, BER and delay. In this
paper, Error Vector Magnitude (EVM) is proposed to be a generic QoS trigger for
VHO execution. EVM is defined as the deviation of inphase/ quadrature (I/Q)
values from ideal signal states and thus provides a measure of signal quality.
In 4G Interoperable environment, OFDM is the leading Modulation scheme (more
prone to multi-path fading). EVM (modulation error) properly characterises the
wireless link/ channel for accurate VHO decision. EVM depends on the inherent
transmission impairments viz. frequency offset, phase noise,
non-linear-impairment, skewness etc. for a given wireless link. Paper provides
an insight to the analytical aspect of EVM & measures EVM (%) for key
management subframes like association/re-association/disassociation/ probe
request/response frames. EVM relation is explored for different possible
NAV-Network Allocation Vectors (frame duration). Finally EVM is compared with
SNR, BER and investigation concludes EVM as a promising QoS trigger for OFDM
based emerging wireless standards.Comment: 12 pages, 7 figures, IJWMN 2010 august issue vol. 2, no.
- …