Comparative Analysis of Cooperative Routing Protocols in Cognitive Radio Networks

Author(s):  
Pablo Palacios Játiva ◽  
Carlos Saavedra ◽  
José Julio Freire ◽  
Milton Román Cañizares ◽  
David Zabala-Blanco
2015 ◽  
Vol 14 (6) ◽  
pp. 1272-1286 ◽  
Author(s):  
Li Sun ◽  
Wei Zheng ◽  
Naveen Rawat ◽  
Vikramsinh Sawant ◽  
Dimitrios Koutsonikolas

2021 ◽  
Vol 15 ◽  
pp. 6-9
Author(s):  
Sami Touati ◽  
Hatem Boujemaa ◽  
Nazha Abed

In this paper, optimal and sub-optimal routing protocols are proposed for cognitive radio networks. We first investigate optimal routing that consists in searching among all paths, the one that minimizes the end-to-end outage while verifying interference constraint to primary receiver. A sub-optimal one-hop routing is proposed where the best relay is selected in each hop. The last routing protocol consists in decomposing the network in many sub-networks composed of K hops. Then the best route is determined in each of these sub-networks so that the K hops-outage probability is minimized. The proposed K-hops routing allows a good compromise between complexity and performance. The performance of different routing protocols are evaluated through simulation results in terms of outage probability.


2019 ◽  
Vol 8 (2) ◽  
pp. 4489-4498

Systems administration cognitive radios and hubs from primary system (PS) results in a heterogeneous existing together multi radio remote system, with the goal that critical system throughput addition can be accomplished. Be that as it may, by exploring cognitive radio networks (CRN) engineering, the connections in CRNs are probably not going to help total security check because of connection elements, crafty accessibility, and uni-directional in accessible time window, so trust and reputation system is required. CORE is a reputation based security mechanism which enforces cooperation of nodes in CRN. CONFIDANT is based on selective unselfish and belief in mobile nodes and it aims to detect and isolate misbehaving nodes. Both CORE and CONFIDANT mechanism give the trustworthiness of all mobile nodes in the network and it punishes misbehaving nodes once it detected. This paper gives the comparative study of trust based neighbor monitoring CORE and CONFIDANT on secured routing protocols. The simulation results shows that our work provides better detection efficiency, better detection coverage and packet delivery ratio in routing protocols with neighbor monitoring scheme.


Sign in / Sign up

Export Citation Format

Share Document