scholarly journals Optimal Pricing for Spectrum Allocation in Cognitive Radio Networks

2018 ◽  
Vol 232 ◽  
pp. 01048 ◽  
Author(s):  
Fan Gu ◽  
Xianwei Li ◽  
Liang Zhao ◽  
Haiyang Zhang ◽  
Xiaoying Yang

In this paper, we investigate the problem of spectrum allocation in Cognitive Radio Networks (CRNs) where a primary user (PU) leases its idle spectrums to a number of secondary users (SUs) who may have different willing to pay for these spectrums. For the PU, its main objective is to gain profit from selling the idle spectrums, and from the perspective of the Sus, they aim to maximize their utility from using spectrums. We model the interaction between the PU and SUs as a two-stage Stackelberg game, where the PU sets the prices for its spectrum in the first stage, and SUs make their spectrum demands decisions in the second stage. We use the backward induction method to solve this game. The numerical results show that the proposed solution method can increase revenue of the PU compared with the uniform pricing scheme.

2014 ◽  
Vol 5 (2) ◽  
pp. 61-74 ◽  
Author(s):  
Fatemeh Afghah ◽  
Abolfazl Razi

In this paper, a novel property-right spectrum leasing solution based on Stackelberg game is proposed for Cognitive Radio Networks (CRN), where part of the secondary users present probabilistic dishonest behavior. In this model, the Primary User (PU) as the spectrum owner allows the Secondary User (SU) to access the shared spectrum for a fraction of time in exchange for providing cooperative relaying service by the SU. A reputation based mechanism is proposed that enables the PU to monitor the cooperative behavior of the SUs and restrict its search space at each time slot to the secondary users that do not present dishonest behavior in the proceeding time slots. The proposed reputation-based solution outperforms the classical Stackelberg games from both primary and reliable secondary users' perspectives. This novel method of filtering out unreliable users increases the PU's expected utility over consecutive time slots and also encourages the SUs to follow the game rule.


Author(s):  
Monisha Ravi ◽  
Nisha Ravi ◽  
N. Ravi

Recently, the expansive growth of wireless services, regulated by governmental agencies assigning spectrum to licensed users, has led to a shortage of radio spectrum. Since the FCC (Federal Communications Commissions) approved unlicensed users to access the unused channels of the reserved spectrum, new research areas seeped in, to develop Cognitive Radio Networks (CRN), in order to improve spectrum efficiency and to exploit this feature by enabling secondary users to gain from the spectrum in an opportunistic manner via optimally distributed traffic demands over the spectrum, so as to reduce the risk for monetary loss, from the unused channels. However, Cognitive Radio Networks become vulnerable to various classes of threats that decrease the bandwidth and spectrum usage efficiency. Hence, this survey deals with defining and demonstrating framework of one such attack called the Primary User Emulation Attack and suggests preventive Sensing Protocols to counteract the same. It presents a scenario of the attack and its prevention using Network Simulator-2 for the attack performances and gives an outlook on the various techniques defined to curb the anomaly.


2012 ◽  
Vol 271-272 ◽  
pp. 668-673
Author(s):  
Shan Shan Wang ◽  
Xing Guo Luo ◽  
Bai Nan Li

Cognitive Radio Networks is an effective technology and a hot research direction which can solve the problem of deficient resource and revolutionize utilization. In order to enhance the communication efficiency, secondary users are classified by some strategy. We exploit the queuing theory model to research on the communication performance of secondary users, considering primary user as the first grade user and secondary users as other grades users. The research results indicate that the users which have lower priority level are more sensitive than those have higher priority level when primary user appears. Under Primary User Emulation Attack (PUEA), if the number of secondary users reaches 300, the waiting time would larger than 15 minutes. And if the appearance rate of PUEA reaches 4, the break-out rate would be 80%, which is much harmful for CRN.


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
H. F. Al-Doseri ◽  
M. A. Mangoud

One of the main challenges in cognitive radio networks is the ability of secondary users to detect the primary user presence with high probability of detection. In previous research, optimizing cooperative sensing in cognitive radio networks is performed for either a targeted probability of detection or a false alarm. After setting one of the probabilities as an optimization constraint, the other is optimized. In this paper, a guaranteed constant throughput at the secondary users is introduced as a target while optimizing probability of detection for cooperative sensing. Both sensing time values and number of cooperated cognitive radio secondary users are investigated to maximize the probability of detection of primary user. AND and OR hard decision schemes are considered and compared with soft decision scheme which is weighted modified deflection coefficient scheme (W-MDC). It is illustrated that cooperation of all users and utilizing full frames for sensing time will not provide maximum probability of detection. A tradeoff between performances of cognitive radio networks with and without optimization is presented. The effects of varying network sizes, normalized target throughput, maximum frame duration times, and received signal-to-noise ratio at the fusion center are investigated for different fusion rules.


2021 ◽  
Vol 36 (1) ◽  
pp. 73-79
Author(s):  
Mahmoud Ali Ammar

In Cognitive Radio Networks (CRN), the main aim is to allow the secondary users (SUs) to identify the empty bands and use them to transmit or receive data opportunistically. Primary users (PUs) have the priority to use a channel, while the secondary users must vacant this channel once a primary user requests it. An attack known in cognitive radio networks as a Primary User Emulation Attack (PUEA) aims to prevent the SU from using the empty bands. In this paper, an analytical and experimental approach is presented to mitigate the PUEA. This approach is based on obtaining the Probability Density Functions (PDFs) of the received powers at the secondary users from malicious nodes and also from the primary transmitter in the cognitive network. Then, these obtained PDFs are used in Neyman-Pearson composite hypothesis test to measure the performance metrics (probability of false alarm and miss detection in the network). The results proved that the performance metrics were greatly influenced by the network area, where the secondary user is located, and the threshold value λ used in the decision rule. Also, there are boundaries for the λ choices that cannot be overtaken.


Author(s):  
S. A. Adebo ◽  
E. N. Onwuka ◽  
A. U. Usman ◽  
A. J. Onumanyi

Primary user emulator (PUE) attack occurs in Cognitive Radio Networks (CRNs) when a malicious secondary user (SU) poses as a primary user (PU) in order to deprive other legitimate SUs the right to free spectral access for opportunistic communication. In most cases, these legitimate SUs are unable to effectively detect PUEs because the quality of the signals received from a PUE may be severely attenuated by channel fading and/or shadowing. Consequently, in this paper, we have investigated the use of cooperative spectrum sensing (CSS) to improve PUE detection based on a hybrid localization scheme. We considered different pairs of secondary users (SUs) over different received signal strength (RSS) values to evaluate the energy efficiency, accuracy, and speed of the new cooperative scheme. Based on computer simulations, our findings suggest that a PUE can be effectively detected by a pair of SUs with a low Root Mean Square Error rate of 0.0047 even though these SUs may have close RSS values within the same cluster. Furthermore, our scheme performs better in terms of speed, accuracy and low energy consumption rates when compared with other PUE detection schemes. Thus, it is a viable proposition to better detect PUEs in CRNs.


2017 ◽  
Vol 10 (04) ◽  
pp. 765-772 ◽  
Author(s):  
Nisar Lala ◽  
Altaf Balkhi ◽  
G M Mir

Cognitive radio (CR) is a promising solution to improve the spectrum utilization by enabling unlicensed users to exploit the spectrum in an opportunistic manner. Spectrum handoff is a different type of handoff in CR necessitated by the reappearance of primary user (PU) in the licensed band presently occupied by the secondary users (SUs). Spectrum handoff procedures aim to help the SUs to vacate the occupied licensed spectrum and find suitable target channel to resume the unfinished transmission. The purpose of spectrum mobility management in cognitive radio networks is to make sure that the transitions are made smoothly and rapidly such that the applications running on a cognitive user perceive minimum performance degradation during a spectrum handoff. In this paper, we will survey the literature on spectrum handoff in cognitive radio networks.


Sign in / Sign up

Export Citation Format

Share Document