Performance evaluation of secondary users in Dynamic Spectrum Access system

Author(s):  
Huang Qing ◽  
Xu Shaoyi ◽  
Jin Xiaojun
2015 ◽  
Vol 8 (1) ◽  
pp. 140-148
Author(s):  
Chen Guizhen ◽  
Ding Enjie ◽  
Wang Gang ◽  
Xue Xue

This paper proposes a dynamic spectrum access system for underground wireless communication——a dynamic spectrum sharing system under interference temperature constrains. It can make the best of spectrum resources and improve the utilization efficiency. Then, a multi-dimensional Markov chain is used to model the system. On the basis, the secondary users’ performance under interference temperature constrains is obtained. As two important performance indexes to measure secondary users’ performance, cognitive users’ interrupting probability and blocking probability are calculated. Finally, cognitive users’ performance under different users’ access is analyzed, and the performances in dynamic spectrum access system and overlay access system are compared. Simulation results indicate that the dynamic spectrum sharing access system under interference temperature constrains is superior to the overlay access system and helpful to improve the spectrum sharing system in coal mines.


2018 ◽  
Vol 12 (18) ◽  
pp. 2243-2252 ◽  
Author(s):  
Anirudh Agarwal ◽  
Ranjan Gangopadhyay ◽  
Shivangi Dubey ◽  
Soumitra Debnath ◽  
Mohd Asif Khan

2021 ◽  
Author(s):  
Zhihui Gao ◽  
Ang Li ◽  
Yunfan Gao ◽  
Bing Li ◽  
Yu Wang ◽  
...  

Author(s):  
Hui Sun ◽  
Han Han

Dynamic spectrum Access (DSA)is used to make use of the spectrum in wireless network. In most situations, control channel is a common approach to negotiation between secondary users. But, based on this feature, the attacker can destroy the communication network only influence the control center. So, in this paper, two methods without control channel are simulated in Qualent platform. The results prove that those methods are available, and the Receiver-directed channel selection is more match to the regular control channel standards in throughput.


Author(s):  
Natarajan Meghanathan

A cognitive radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. CRs support dynamic spectrum access and can facilitate a secondary unlicensed user to efficiently utilize the available underutilized spectrum allocated to the primary licensed users. A cognitive radio network (CRN) is composed of both the secondary users with CR-enabled radios and the primary users whose radios need not be CR-enabled. In this chapter, the authors provide an exhaustive analysis of the issues and the state-of-the-art literature solutions available with regards to the following four layers of the TCP/IP protocol layer stack, in the context of CRNs: physical layer (spectrum sensing), medium access control, routing, and transport layers. We discuss the various techniques/mechanisms/protocols that have been proposed for each of these four layers, in the context of CRNs. In addition to the above, we discuss in detail several security attacks that could be launched on CRNs and the countermeasure solutions that have been proposed to avoid or mitigate them. This chapter serves as a good comprehensive review and analysis of all the critical aspects for CRNs, and would lay a strong foundation for someone to further delve onto any particular aspect in greater depth.


Sign in / Sign up

Export Citation Format

Share Document