Low-complexity Neighborhood-based Weighted Centroid Localization for Secondary Users in Cognitive Radio Network

Author(s):  
Narayan Nath ◽  
Xiaowei Liang ◽  
Bin Shen
Symmetry ◽  
2019 ◽  
Vol 11 (10) ◽  
pp. 1260
Author(s):  
Hyils Sharon Magdalene Antony ◽  
Thulasimani Lakshmanan

Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caused by an imperfect spectrum sensing of the secondary users (SUs). The SUs are intended to access the primary channels. At the same time, the primary user also returns to the channel before the SUs access ends. This similar way of accessing the primary channel will cause interference between the users. Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive radio network. The simulation result provides better evidence for the performance of the proposed technique.


2019 ◽  
Vol 13 (1) ◽  
pp. 345-356 ◽  
Author(s):  
Mohadeseh Soleimanpour-moghadam ◽  
Mohammad Askarizadeh ◽  
Siamak Talebi ◽  
Shima Esmaeili

Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.


Sign in / Sign up

Export Citation Format

Share Document