scholarly journals Bio-inspired route estimation in cognitive radio networks

Author(s):  
Miguel Tuberquia ◽  
Hans Lopez-Chavez ◽  
Cesar Hernandez

Cognitive radio is a technique that was originally created for the proper use of the radio electric spectrum due its underuse. A few methods were used to predict the network traffic to determine the occupancy of the spectrum and then use the ‘holes’ between the transmissions of primary users. The goal is to guarantee a complete transmission for the second user while not interrupting the trans-mission of primary users. This study seeks the multifractal generation of traffic for a specific radio electric spectrum as well as a bio-inspired route estimation for secondary users. It uses the MFHW algorithm to generate multifractal traces and two bio-inspired algo-rithms: Ant Colony Optimization and Max Feeding to calculate the secondary user’s path. Multifractal characteristics offer a predic-tion, which is 10% lower in comparison with the original traffic values and a complete transmission for secondary users. In fact, a hybrid strategy combining both bio-inspired algorithms promise a reduction in handoff. The purpose of this research consists on deriving future investigation in the generation of multifractal traffic and a mobility spectrum using bio-inspired algorithms.

2013 ◽  
Vol 4 (4) ◽  
pp. 1-15
Author(s):  
Yanxiao Zhao ◽  
Bighnaraj Panigrahi ◽  
Kazem Sohraby ◽  
Wei Wang

Cognitive radio networks (CRNs) have received considerable attention and viewed as a promising paradigm for future wireless networking. Its major difference from the traditional wireless networks is that secondary users are allowed to access the channel if they pose no harmful interference to primary users. This distinct feature of CRNs has raised an essential and challenging question, i.e., how to accurately estimate interference to the primary users from the secondary users? In addition, spectrum sensing plays a critical role in CRNs. Secondary users have to sense the channel before they transmit. A two-state sensing model is commonly used, which classifies a channel into either busy or idle state. Secondary users can only utilize a channel when it is detected to be in idle state. In this paper, we tackle the estimation of interference at the primary receiver due to concurrently active secondary users. With the spectrum sensing, secondary users are refrained from transmitting once an active user falls into their sensing range. As a result, the maximum number of simultaneously interfering secondary users is bounded, typically ranging from 1 to 4. This significant conclusion considerably simplifies interference modeling in CRNs. The authors present all the cases with possible simultaneously interfering secondary users. Moreover, the authors derive the probability for each case. Extensive simulations are conducted and results validate the effectiveness and accuracy of the proposed approach.


Author(s):  
K. Annapurna ◽  
B. Seetha Ramanjaneyulu

Satisfying the Quality of Service (QoS) is often a challenge in cognitive radio networks, because they depend on opportunistic channel accessing. In this context, appropriate pricing of vacant channels that is linked to the preference in their allocation, is found to be useful. However, ambiguity on the possible price at which the channel would be allotted is still a concern. In this work, an auction mechanism in which maximum value of the bid is predefined is proposed. With this, users quote their bid values as per their needs of getting the channels, up to the predefined maximum allowed bid price. However, final price of allocation is decided based on the sum total demand from all the users and the availability of vacant channels. Performance of the system is found in terms of blocking probabilities of secondary users and revenues to primary users. The proposed system is found to yield similar quantum of revenues as that of the Generalized Second Price (GSP) auction, while offering much lesser blocking probabilities to high-priority users to satisfy their QoS requirements.


Author(s):  
Saed Alrabaee ◽  
Mahmoud Khasawneh ◽  
Anjali Agarwal

Cognitive radio technology is the vision of pervasive wireless communications that improves the spectrum utilization and offers many social and individual benefits. The objective of the cognitive radio network technology is to use the unutilized spectrum by primary users and fulfill the secondary users' demands irrespective of time and location (any time and any place). Due to their flexibility, the Cognitive Radio Networks (CRNs) are vulnerable to numerous threats and security problems that will affect the performance of the network. Little attention has been given to security aspects in cognitive radio networks. In this chapter, the authors discuss the security issues in cognitive radio networks, and then they present an intensive list of the main known security threats in CRN at various layers and the adverse effects on performance due to such threats, and the current existing paradigms to mitigate such issues and threats. Finally, the authors highlight proposed directions in order to make CRN more authenticated, reliable, and secure.


Author(s):  
Sunil Ghildiyal

<p>The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.</p>


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Suneetha Ch ◽  
Srinivasa Rao S ◽  
K.S. Ramesh

PurposeElectronic devices aid communication during new communication phases and the scope of cognitive radio networks has changed communication paradigms through efficient use of spectrums. The communication prototype of cognitive radio networks defines user roles as primary user and secondary user in the context of the spectrum allocation and use. The users who have licensed authority of the spectrum are denoted as primary users, while other eligible users who access the corresponding spectrum are secondary users.Design/methodology/approachThe multiple factors of transmission service quality can have a negative influence due to improper scheduling of spectrum bands between primary users and secondary users. There are considerable contributions in contemporary literature concerning spectrum band scheduling under spectrum sensing. However, the majority of the scheduling models are intended to manage a limited number of transmission service quality factors. Moreover, these service quality factors are functional and derived algorithmically from the current corresponding spectrum. However, there is evidence of credible performance deficiency regarding contemporary spectrum sensing methodsFindingsThis article intends to portray a fuzzy guided integrated factors-based spectrum band sharing within the spectrum used by secondary users. This study attempts to explain the significance of this proposal compared to other contemporary models.Originality/valueThis article intends to portray a fuzzy guided integrated factors-based spectrum band sharing within the spectrum used by secondary users. This study attempts to explain the significance of this proposal compared to other contemporary models.


2018 ◽  
Vol 7 (4.20) ◽  
pp. 12
Author(s):  
Krishna Chaitanya K ◽  
Meghalatha CK ◽  
Annapurna K ◽  
Seetha Ramanjaneyulu B

Opportunistic channel accessing and handoff mechanisms are crucial for the successful implementation of cognitive radio networks that depend on vacant channel frequencies of TV white spaces and other primary users. In this work, two such mechanisms that enable quick accessing of vacant channels and cause less interference to primary users are proposed. In these methods, combination of database information and local sensing of channels is used, to know about available vacant channels. If the primary user of incumbent channel returns, the secondary user moves to another vacant channel that is found to be free after scanning. Information from database can be used to speed up the process by limiting the scanning to few probable channels, instead of searching for all. The results show that these methods offer quick handoff of secondary users and cause less interference to primary users.  


Sign in / Sign up

Export Citation Format

Share Document