Overview of cognitive radio and cognitive networks research at the University of York

Author(s):  
D. Grace

The faster development of wireless communications has made the spectrum ending up with increasingly with more shortage. The idea of CR was proposed to meet the problem of spectrum effectiveness. In the cognitive networks, the SUs are permitted to detect, distinguish and access the frequency bands that are not at present used by the PU’s. the SU’s must outfit with the spectrum access information to use the primary user’s licence in the home region network. We propose a maximum throughput and power based cognitive radio for home region systems (HAN). At the point when there are different SU’s and numerous channels, spectrum sharing must be taken into account. In this paper we additionally propose a system of multiple channel sensing. We consider the interference to PU brought about by the dynamic access and the erroneous spectrum sensing technique. We investigate the obstruction brought about by the secondary user’s through a reestablishment hypothesis. Under the limitation of interference to primary user, the queuing theory is used to overcome this issue and to obtain the higher data rate of SU’s. finally, it is demonstrated that the cyclostationary detection method can be improved when extra channels are accessible.


Author(s):  
Yngrid Keila Silva Cabral ◽  
Joab De Araújo Silva ◽  
Marcelo Portela Sousa

Several wireless services make use of the spectrum for communication, from space radio communication to a simple wireless computer network. However, the considerable amount of services that make use of spectrum in the last years, has been responsible for its limited availability and inefficiency.. Cognitive networks or cognitive radio networks, are a technology that offer the efficient use of spectrum through opportunistic access to frequency bands. Throughout the cognitive radios scenario, this work will present a variation of the JENNA neighbors discovery algorithm. In addition to that, this research will propose a sensing model for a more efficient approach.


Game Theory ◽  
2017 ◽  
pp. 487-502
Author(s):  
Sungwook Kim

A cognitive radio is an intelligent radio that can be programmed and configured dynamically. Its transceiver is designed to use the best wireless channels in its vicinity. Such a radio automatically detects available channels in the wireless spectrum, then accordingly changes its transmission or reception parameters to allow more concurrent wireless communications in a given spectrum band at one location. This process is a form of dynamic spectrum management. In recent years, the development of intelligent, adaptive wireless devices called cognitive radios, together with the introduction of secondary spectrum licensing, has led to a new paradigm in communications: cognitive networks. Cognitive networks are wireless networks that consist of several types of users: often a primary user and secondary users. These cognitive users employ their cognitive abilities to communicate without harming the primary users. The study of cognitive networks is relatively new and many questions are yet to be answered. This chapter furthers the study.


2016 ◽  
Vol 8 (2) ◽  
pp. 94-110
Author(s):  
Danda B. Rawat ◽  
Sachin Shetty

Opportunistic Spectrum Access (OSA) in a Cognitive Radio Network (CRN) is regarded as emerging technology for utilizing the scarce Radio Frequency (RF) spectrum by allowing unlicensed secondary users (SUs) to access licensed spectrum without creating harmful interference to primary users (PUs). The SUs are considerably constrained by their limited power, memory and computational capacity when they have to make decision about spectrum sensing for wide band regime and OSA. The SUs in CRN have the potential to mitigate these constraints by leveraging the vast storage and computational capacity of cloud computing approaches. In this paper, the authors investigate a game theoretic approach for opportunistic spectrum access in cognitive networks. The proposed algorithm leverages the geo-locations of both SUs and spectrum opportunities to facilitate OSA to SUs. The active SUs using game theory adapt their transmit powers in a distributed manner based on the estimated average packet-error rate while satisfying the Quality-of-Service (QoS) in terms of signal-to-interference-noise-ratio (SINR). Furthermore, to control greedy SUs in distributed power control game, the authors introduce a manager/leader through a Stackelberg power adaptation game. The performance of the proposed approaches is investigated using numerical results obtained from simulations.


This paper presents a survey on Security Aware Channel Assignment for Cognitive Radio Networks (CRNs). Cognitive networks are networks are the sort of networks which show the attributes of leveraging the channel state information for the utilization of resources such as bandwidth and energy. The major challenge with cognitive systems comprising of cognitive networks is the fact that finding the channel state information with high accuracy is often extremely complex in nature. Moreover, securing such a network against attacks is even more challenging. This paper focuses on contemporary contributions in the field.


2020 ◽  
Vol 8 (5) ◽  
pp. 3529-3533

The ad hoc mobile cognitive network is an advanced network technology for the Federal Communications Commission (FCC) problem of frequency deficiency. Cognitive radio networks are cognitive networks that select their network parameters based on the network environment. In a cognitive radio network, two users, the primary and the secondary or the cognitive user, gain access to the spectrum available to communicate with each other when the primary user accesses the spectrum. The secondary user should leave the spectrum and use the spectrum for the spectrum if the spectral hole is available for transmission. Therefore, routing in cognitive networks is a challenge and a challenge in mobile cognitive networks because of node mobility, the primary user interface, and the lack of spectrum. A delay minimized routing protocol is proposed for minimum delay route selection between the source and destination, which is improved version of AODV. The numerical and ns2 simulation results for the proposed protocol significantly state that delay minimized routing protocol (DMR) is better in terms of average end-to-end delay and average throughput.


2018 ◽  
Vol 7 (2.8) ◽  
pp. 372 ◽  
Author(s):  
D Ganesh ◽  
T Pavan Kumar

Cognitive radio is a promising wireless communication technology that improves spectrum utilization and offers many benefits for internet users. Cognitive radio networks utilizes the available limited resources in a more efficient and flexible way. The main objective of the Cognitive network is to efficiently utilize the unutilized spectrum and meet the demand of the secondary users. some of the important features of cognitive of Cognitive radio networks are dynamic spectrum access, self organizing  and flexibility. As Cognitive radio networks are flexible in nature, it will be effected by various security attacks which in turn affects the performance of the network. Furthermore Cognitive radio networks transmit the spectrum in several licensed bands and it also performs dynamic spectrum allocation. Cognitive radio and Cognitive radio networks are wireless in nature these face conventional attacks. In this survey we address various  attacks in different layers , new threats and challenges that Cognitive networks face, current available solutions to address layer attacks. In addition applications, open problems and future Research challenges are also specified.


2011 ◽  
Vol 121-126 ◽  
pp. 3977-3981
Author(s):  
Li Xia Liu ◽  
Gang Hu ◽  
Zhen Huang ◽  
Yu Xing Peng

In wireless cognitive radio networks (CRNs), user will send the sensing data to neighbors for spectrum allocation. Actually only part of data will affect the allocation result. The transmission of unused sensing data isn’t cost-efficient because it consumes a great deal of computing and network resource, especially for CRNs in which the spectrum and power resource is very precious. We propose an improving transmission availability algorithm— SkyChannel Query, which can find the non dominated channels and only transmit information of these channels. The experimental results show the advantages of our algorithm in terms of saving computing resource and improving transmission availability.


2020 ◽  
Vol 9 (3) ◽  
pp. 1046-1054
Author(s):  
Thi-Anh Hoang ◽  
Chi-Bao Le ◽  
Dinh-Thuan Do

The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify the derived expressions.


Sign in / Sign up

Export Citation Format

Share Document