Cognitive radio network secure communication with and without cooperative jammer

Author(s):  
Weiheng Jiang ◽  
Wenjiang Feng
2015 ◽  
Vol 76 (1) ◽  
Author(s):  
Fawad Salam Khan ◽  
Talha Naqash ◽  
Muhammad Ibrar Khatak ◽  
Raja Masood Larik

Facilities for different sight and sound provisions in remote systems requests extra transmission capacity in the radio frequency range. Effective range administration calculations are important to accomplish massive accomplishment in remote correspondences. Usage of licensed spectrum is increasing day by day so Cognitive Radio is proposed as a solution to meet the demands. CR is a symbolization procedure that distributes the authorized range (the licensed spectrum) despite the fact that facing least obstruction to the authorized clients. In this paper, we investigate the versatile qualities of cognitive radio in secure and dependable correspondence. Anyway the inquiry is the way to make the correspondence dependable such that there happens no spying and data spillage. The conceivable results incorporate coordinating the benefits of spread range balance, utilizing encryption calculations (Encryption keys), and its possibility to switch over different recurrence groups. We concentrate on the different requisitions of CR and the various philosophies which empower a safe Communication system. 


2018 ◽  
Vol 2018 ◽  
pp. 1-6 ◽  
Author(s):  
Ahsan Tanveer ◽  
Z. U. Khan ◽  
A. N. Malik ◽  
I. M. Qureshi

This work presents a Soft Queuing Model (SQM) for number of active users present in a cognitive radio network (CRN) at some given instant. Starting with the existing cellular network where the upper limit for the number of channels and active users is well defined. The idea is then extended to the complicated scenario of CRNs where the upper limit is not deterministic for both the number of channels and the active users. Accordingly a probabilistic SQM is proposed under the condition that the number of channels and active cognitive users are both random variables. The proposed model will be useful to offer the level of reliability to the clients connected with CRN and hence to offer secure communication even on a cooperative CRN. The proposed model has been verified theoretically and simulations have been carried out in diversified set ups to evaluate the performance.


Sign in / Sign up

Export Citation Format

Share Document