17 research outputs found

    Spectral Attention-Driven Intelligent Target Signal Identification on a Wideband Spectrum

    Full text link
    This paper presents a spectral attention-driven reinforcement learning based intelligent method for effective and efficient detection of important signals in a wideband spectrum. In the work presented in this paper, it is assumed that the modulation technique used is available as a priori knowledge of the targeted important signal. The proposed spectral attention-driven intelligent method is consists of two main components, a spectral correlation function (SCF) based spectral visualization scheme and a spectral attention-driven reinforcement learning mechanism that adaptively selects the spectrum range and implements the intelligent signal detection. Simulations illustrate that the proposed method can achieve high accuracy of signal detection while observation of spectrum is limited to few ranges via effectively selecting the spectrum ranges to be observed. Furthermore, the proposed spectral attention-driven machine learning method can lead to an efficient adaptive intelligent spectrum sensor designs in cognitive radio (CR) receivers.Comment: 6 pages, 11 figure

    Cognitive MAC Protocols Using Memory for Distributed Spectrum Sharing Under Limited Spectrum Sensing

    Full text link
    The main challenges of cognitive radio include spectrum sensing at the physical (PHY) layer to detect the activity of primary users and spectrum sharing at the medium access control (MAC) layer to coordinate access among coexisting secondary users. In this paper, we consider a cognitive radio network in which a primary user shares a channel with secondary users that cannot distinguish the signals of the primary user from those of a secondary user. We propose a class of distributed cognitive MAC protocols to achieve efficient spectrum sharing among the secondary users while protecting the primary user from potential interference by the secondary users. By using a MAC protocol with one-slot memory, we can obtain high channel utilization by the secondary users while limiting interference to the primary user at a low level. The results of this paper suggest the possibility of utilizing MAC design in cognitive radio networks to overcome limitations in spectrum sensing at the PHY layer as well as to achieve spectrum sharing at the MAC layer.Comment: 24 pages, 7 figure

    Analysis Framework for Opportunistic Spectrum OFDMA and its Application to the IEEE 802.22 Standard

    Full text link
    We present an analytical model that enables throughput evaluation of Opportunistic Spectrum Orthogonal Frequency Division Multiple Access (OS-OFDMA) networks. The core feature of the model, based on a discrete time Markov chain, is the consideration of different channel and subchannel allocation strategies under different Primary and Secondary user types, traffic and priority levels. The analytical model also assesses the impact of different spectrum sensing strategies on the throughput of OS-OFDMA network. The analysis applies to the IEEE 802.22 standard, to evaluate the impact of two-stage spectrum sensing strategy and varying temporal activity of wireless microphones on the IEEE 802.22 throughput. Our study suggests that OS-OFDMA with subchannel notching and channel bonding could provide almost ten times higher throughput compared with the design without those options, when the activity and density of wireless microphones is very high. Furthermore, we confirm that OS-OFDMA implementation without subchannel notching, used in the IEEE 802.22, is able to support real-time and non-real-time quality of service classes, provided that wireless microphones temporal activity is moderate (with approximately one wireless microphone per 3,000 inhabitants with light urban population density and short duty cycles). Finally, two-stage spectrum sensing option improves OS-OFDMA throughput, provided that the length of spectrum sensing at every stage is optimized using our model

    On Optimum Causal Cognitive Spectrum Reutilization Strategy

    Get PDF
    In this paper we study opportunistic transmission strategies for cognitive radios (CR) in which causal noisy observation from a primary user(s) (PU) state is available. PU is assumed to be operating in a slotted manner, according to a two-state Markov model. The objective is to maximize utilization ratio (UR), i.e., relative number of the PU-idle slots that are used by CR, subject to interference ratio (IR), i.e., relative number of the PU-active slots that are used by CR, below a certain level. We introduce an a-posteriori LLR-based cognitive transmission strategy and show that this strategy is optimum in the sense of maximizing UR given a certain maximum allowed IR. Two methods for calculating threshold for this strategy in practical situations are presented. One of them performs well in higher SNRs but might have too large IR at low SNRs and low PU activity levels, and the other is proven to never violate the allowed IR at the price of a reduced UR. In addition, an upper-bound for the UR of any CR strategy operating in the presence of Markovian PU is presented. Simulation results have shown a more than 116% improvement in UR at SNR of -3dB and IR level of 10% with PU state estimation. Thus, this opportunistic CR mechanism possesses a high potential in practical scenarios in which there exists no information about true states of PU

    A survey on MAC protocols for complex self-organizing cognitive radio networks

    Get PDF
    Complex self-organizing cognitive radio (CR) networks serve as a framework for accessing the spectrum allocation dynamically where the vacant channels can be used by CR nodes opportunistically. CR devices must be capable of exploiting spectrum opportunities and exchanging control information over a control channel. Moreover, CR nodes should intelligently coordinate their access between different cognitive radios to avoid collisions on the available spectrum channels and to vacate the channel for the licensed user in timely manner. Since inception of CR technology, several MAC protocols have been designed and developed. This paper surveys the state of the art on tools, technologies and taxonomy of complex self-organizing CR networks. A detailed analysis on CR MAC protocols form part of this paper. We group existing approaches for development of CR MAC protocols and classify them into different categories and provide performance analysis and comparison of different protocols. With our categorization, an easy and concise view of underlying models for development of a CR MAC protocol is provided

    Adaptive Weighted Scheduling in Cognitive Radio Networks

    Get PDF
    A problem in modern wireless communications is the scarcity of electromagnetic radio spectrum. The traditional fixed spectrum assignment strategy results in spectrum crowding on most frequency bands. Due to limited availability of radio spectrum and high inefficiency in its usage, cognitive radio networks have been seen as a promising solution to reducing current spectrum under-utilization while accommodating for the increasing amount of services demands and applications in wireless networks. Compared with the traditional networks, cognitive radio networks exhibit some distinct features, which result in necessity of further research in the resource allocation and scheduling that have been solved for the traditional networks. In this thesis, we focus on the packet scheduling in a single cell cognitive radio system with a single channel. An adaptive weight factor is introduced to adjust the priority of different cognitive radio users to be selected for service. The purpose of this research is to solve the unfairness problem of the traditional proportional scheduling schemes when used directly in a cognitive radio network, which lead to a user starved for a long time if it experiences a poor channel condition when the channel is available and experiences a good channel condition when the channel is not available. An adaptive weighted scheduling scheme is proposed to improve the performance in terms of throughput and fairness by jointly considering the instantaneous propagation conditions, adaptive weighted factor and the channel availability. The saturated traffic and non saturated traffic cases are considered. Some important performance metrics are investigated in the simulation, such as the system throughput, fairness, and service probability, and are quantified by the impact of weights and channel conditions. Extensive simulations have been conducted to demonstrate the effectiveness and efficiency of the proposed scheduling scheme

    Intelligent spectrum management techniques for wireless cognitive radio networks

    Get PDF
    PhD ThesisThis thesis addresses many of the unique spectrum management chal- lenges in CR networks for the rst time. These challenges have a vital e ect on the network performance and are particularly di cult to solve due to the unique characteristics of CR networks. Speci cally, this thesis proposes and investigates three intelligent spectrum management tech- niques for CR networks. The issues investigated in this thesis have a fundamental impact on the establishment, functionality and security of CR networks. First, an intelligent primary receiver-aware message exchange protocol for CR ad hoc networks is proposed. It considers the problem of alleviat- ing the interference collision risk to primary user communication, explic- itly to protect primary receivers that are not detected during spectrum sensing. The proposed protocol achieves a higher measure of safeguard- ing. A practical scenario is considered where no global network topology is known and no common control channel is assumed to exist. Second, a novel CR broadcast protocol (CRBP) to reliably disseminate the broadcast messages to all or most of the possible CR nodes in the network is proposed. The CRBP formulates the broadcast problem as a bipartite-graph problem. Thus, CRBP achieves a signi cant successful delivery ratio by connecting di erent local topologies, which is a unique feature in CR ad hoc networks. Finally, a new defence strategy to defend against spectrum sensing data falsi cation attacks in CR networks is proposed. In order to identify malicious users, the proposed scheme performs multiple veri cations of sensory data with the assistance of trusted nodes.Higher Committee For Education Devel- opment in Iraq (HCED-Iraq

    A novel MAC Protocol for Cognitive Radio Networks

    Get PDF
    In Partial Fulfilment of the Requirements for the Degree Doctor of Philosophy from the University of BedfordshireThe scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting transmission characteristics. In this thesis, recent research and survey about the advances in theory and applications of cognitive radio technology has been reviewed. The thesis starts with the essential background on cognitive radio techniques and systems and discusses those characteristics of CR technology, such as standards, applications and challenges that all can help make software radio more personal. It then presents advanced level material by extensively reviewing the work done so far in the area of cognitive radio networks and more specifically in medium access control (MAC) protocol of CR. The list of references will be useful to both researchers and practitioners in this area. Also, it can be adopted as a graduate-level textbook for an advanced course on wireless communication networks. The development of new technologies such as Wi-Fi, cellular phones, Bluetooth, TV broadcasts and satellite has created immense demand for radio spectrum which is a limited natural resource ranging from 30KHz to 300GHz. For every wireless application, some portion of the radio spectrum needs to be purchased, and the Federal Communication Commission (FCC) allocates the spectrum for some fee for such services. This static allocation of the radio spectrum has led to various problems such as saturation in some bands, scarcity, and lack of radio resources to new wireless applications. Most of the frequencies in the radio spectrum have been allocated although many studies have shown that the allocated bands are not being used efficiently. The CR technology is one of the effective solutions to the shortage of spectrum and the inefficiency of its utilization. In this thesis, a detailed investigation on issues related to the protocol design for cognitive radio networks with particular emphasis on the MAC layer is presented. A novel Dynamic and Decentralized and Hybrid MAC (DDH-MAC) protocol that lies between the CR MAC protocol families of globally available common control channel (GCCC) and local control channel (non-GCCC). First, a multi-access channel MAC protocol, which integrates the best features of both GCCC and non-GCCC, is proposed. Second, an enhancement to the protocol is proposed by enabling it to access more than one control channel at the same time. The cognitive users/secondary users (SUs) always have access to one control channel and they can identify and exploit the vacant channels by dynamically switching across the different control channels. Third, rapid and efficient exchange of CR control information has been proposed to reduce delays due to the opportunistic nature of CR. We have calculated the pre-transmission time for CR and investigate how this time can have a significant effect on nodes holding a delay sensitive data. Fourth, an analytical model, including a Markov chain model, has been proposed. This analytical model will rigorously analyse the performance of our proposed DDH-MAC protocol in terms of aggregate throughput, access delay, and spectrum opportunities in both the saturated and non-saturated networks. Fifth, we develop a simulation model for the DDH-MAC protocol using OPNET Modeler and investigate its performance for queuing delays, bit error rates, backoff slots and throughput. It could be observed from both the numerical and simulation results that when compared with existing CR MAC protocols our proposed MAC protocol can significantly improve the spectrum utilization efficiency of wireless networks. Finally, we optimize the performance of our proposed MAC protocol by incorporating multi-level security and making it energy efficient
    corecore