Providing Some Minimum Guarantee for Real-Time Secondary Users in Cognitive Radio Sensor Networks

Author(s):  
Changa Andrew ◽  
Tonny Bulega ◽  
Michael Okopa
Sensors ◽  
2015 ◽  
Vol 15 (8) ◽  
pp. 19783-19818 ◽  
Author(s):  
Ibrahim Mustapha ◽  
Borhanuddin Ali ◽  
Mohd Rasid ◽  
Aduwati Sali ◽  
Hafizal Mohamad

2015 ◽  
Vol 2015 ◽  
pp. 1-14
Author(s):  
Dawei Wang ◽  
Pinyi Ren ◽  
Qinghe Du ◽  
Li Sun ◽  
Yichen Wang

Aiming at allocating more licensed spectrum to wireless sensor nodes (SNs) under the constraint of the information security requirement of the primary system, in this paper, we propose a cooperative relaying and jamming secure transmission (CRJS) scheme in which SNs will relay primary message and jam primary eavesdrop concurrently with SN’s downlink and uplink information transmission in cognitive radio sensor networks (CRSNs). In our proposed CRJS scheme, SNs take advantages of physical layer secure technologies to protect the primary transmission and acquire some interference-free licensed spectrum as a reward. In addition, both decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols are investigated in our proposed CRJS scheme. Our object is to maximize the transmission rate of SNs by optimal allocating of the relaying power, jamming power, and downlink and uplink transmit power under the target secure transmission rate requirement of the primary system. Moreover, two suboptimal algorithms are proposed to deal with these optimization problems. Furthermore, we analyze the transmission rate of SNs and allocate the relaying power, jamming power, and downlink and uplink transmit power for the asymptotic scenarios. Simulation results demonstrate the performance superiority of our developed strategy over conventional jamming scheme in terms of the transmission rate of WSN.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 335
Author(s):  
Shweta Alpna ◽  
Amrit Mukherjee ◽  
Amlan Datta

The proposed work illustrates a novel technique for cooperative spectrum sensing in a cognitive radio (CR) network. The work includes an approach of identifying secondary users (SUs) based on Hierarchical Maximum Likelihood (HML) technique followed by Vector Quantization. Initially, the arrangement of the SUs are been observed using HML with respect to a spatial domain and then the active SUs among them are identified using VQ. The approach will not only save the energy, but the decision of the real-time and dynamic cooperative communication network becomes more accurate as we can predict the behavior of SUs movement and spectrum sensing by each individual SU at that particular  place. The results and simulations of the real-time experiment justifies with the proposed approach. 


Sensors ◽  
2015 ◽  
Vol 15 (4) ◽  
pp. 9360-9387 ◽  
Author(s):  
Juan Zhang ◽  
Hong Jiang ◽  
Zhenhua Huang ◽  
Chunmei Chen ◽  
Hesong Jiang

Sign in / Sign up

Export Citation Format

Share Document