Improved Learning Scheme for Cognitive Radio using Artificial Neural Networks

Author(s):  
Rita Mahajan ◽  
Deepak Bagai

<p>The future of wireless system is facing the problem of spectrum scarcity. Number of users is increasing rapidly but available spectrum is limited. The Cognitive Radio (CR) network technology can enable the unlicensed users to share the frequency spectrum with the licensed users on a dynamic basis without creating any interference to primary user. Whenever secondary user finds that primary user is not transmitting and channel is free then it uses channel opportunistically. In this paper cognitive radio with predictive capability using artificial neural network has been proposed. The advantage of such cognitive user is saving of time and energy for spectrum sensing. Proposed radio will sense only that channel which is predicted to be free and channel is selected on the basis of maximum vacant time. Performance has been evaluated in the term of mean square error. The results show that this learning capability can be embedded in secondary users for better performance of future wireless technologies.  </p>

Author(s):  
Rita Mahajan ◽  
Deepak Bagai

<p>The future of wireless system is facing the problem of spectrum scarcity. Number of users is increasing rapidly but available spectrum is limited. The Cognitive Radio (CR) network technology can enable the unlicensed users to share the frequency spectrum with the licensed users on a dynamic basis without creating any interference to primary user. Whenever secondary user finds that primary user is not transmitting and channel is free then it uses channel opportunistically. In this paper cognitive radio with predictive capability using artificial neural network has been proposed. The advantage of such cognitive user is saving of time and energy for spectrum sensing. Proposed radio will sense only that channel which is predicted to be free and channel is selected on the basis of maximum vacant time. Performance has been evaluated in the term of mean square error. The results show that this learning capability can be embedded in secondary users for better performance of future wireless technologies.  </p>


2021 ◽  
Vol 10 (4) ◽  
pp. 2046-2054
Author(s):  
Mohammed Mehdi Saleh ◽  
Ahmed A. Abbas ◽  
Ahmed Hammoodi

Due to the rapid increase in wireless applications and the number of users, spectrum scarcity, energy consumption and latency issues will emerge, notably in the fifth generation (5G) system. Cognitive radio (CR) has emerged as the primary technology to address these challenges, allowing opportunist spectrum access as well as the ability to analyze, observe, and learn how to respond to environmental 5G conditions. The CR has the ability to sense the spectrum and detect empty bands in order to use underutilized frequency bands without causing unwanted interference with legacy networks. In this paper, we presented a spectrum sensing algorithm based on energy detection that allows secondary user SU to transmit asynchronously with primary user PU without causing harmful interference. This algorithm reduced the sensing time required to scan the whole frequency band by dividing it into n sub-bands that are all scanned at the same time. Also, this algorithm allows cognitive radio networks (CRN) nodes to select their operating band without requiring cooperation with licensed users. According to the BER, secondary users have better performance compared with primary users.


2020 ◽  
Author(s):  
Rahil Sarikhani ◽  
Farshid Keynia

Abstract Cognitive Radio (CR) network was introduced as a promising approach in utilizing spectrum holes. Spectrum sensing is the first stage of this utilization which could be improved using cooperation, namely Cooperative Spectrum Sensing (CSS), where some Secondary Users (SUs) collaborate to detect the existence of the Primary User (PU). In this paper, to improve the accuracy of detection Deep Learning (DL) is used. In order to make it more practical, Recurrent Neural Network (RNN) is used since there are some memory in the channel and the state of the PUs in the network. Hence, the proposed RNN is compared with the Convolutional Neural Network (CNN), and it represents useful advantages to the contrast one, which is demonstrated by simulation.


Game Theory ◽  
2017 ◽  
pp. 487-502
Author(s):  
Sungwook Kim

A cognitive radio is an intelligent radio that can be programmed and configured dynamically. Its transceiver is designed to use the best wireless channels in its vicinity. Such a radio automatically detects available channels in the wireless spectrum, then accordingly changes its transmission or reception parameters to allow more concurrent wireless communications in a given spectrum band at one location. This process is a form of dynamic spectrum management. In recent years, the development of intelligent, adaptive wireless devices called cognitive radios, together with the introduction of secondary spectrum licensing, has led to a new paradigm in communications: cognitive networks. Cognitive networks are wireless networks that consist of several types of users: often a primary user and secondary users. These cognitive users employ their cognitive abilities to communicate without harming the primary users. The study of cognitive networks is relatively new and many questions are yet to be answered. This chapter furthers the study.


Symmetry ◽  
2019 ◽  
Vol 11 (10) ◽  
pp. 1260
Author(s):  
Hyils Sharon Magdalene Antony ◽  
Thulasimani Lakshmanan

Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caused by an imperfect spectrum sensing of the secondary users (SUs). The SUs are intended to access the primary channels. At the same time, the primary user also returns to the channel before the SUs access ends. This similar way of accessing the primary channel will cause interference between the users. Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive radio network. The simulation result provides better evidence for the performance of the proposed technique.


Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1282
Author(s):  
Ernesto Cadena Muñoz ◽  
Luis Fernando Pedraza Martínez ◽  
Jorge Eduardo Ortiz Triviño

Mobile cognitive radio networks provide a new platform to implement and adapt wireless cellular communications, increasing the use of the electromagnetic spectrum by using it when the primary user is not using it and providing cellular service to secondary users. In these networks, there exist vulnerabilities that can be exploited, such as the malicious primary user emulation (PUE), which tries to imitate the primary user signal to make the cognitive network release the used channel, causing a denial of service to secondary users. We propose a support vector machine (SVM) technique, which classifies if the received signal is a primary user or a malicious primary user emulation signal by using the signal-to-noise ratio (SNR) and Rényi entropy of the energy signal as an input to the SVM. This model improves the detection of the malicious attacker presence in low SNR without the need for a threshold calculation, which can lead to false detection results, especially in orthogonal frequency division multiplexing (OFDM) where the threshold is more difficult to estimate because the signal limit values are very close in low SNR. It is implemented on a software-defined radio (SDR) testbed to emulate the environment of mobile system modulations, such as Gaussian minimum shift keying (GMSK) and OFDM. The SVM made a previous learning process to allow the SVM system to recognize the signal behavior of a primary user in modulations such as GMSK and OFDM and the SNR value, and then the received test signal is analyzed in real-time to decide if a malicious PUE is present. The results show that our solution increases the detection probability compared to traditional techniques such as energy or cyclostationary detection in low SNR values, and it detects malicious PUE signal in MCRN.


2014 ◽  
Vol 06 (04) ◽  
pp. 1450059 ◽  
Author(s):  
Naveed Ahmed Azam ◽  
Tariq Shah ◽  
Antonio Aparecido de Andrade

The frequency spectrums are inefficiently utilized and cognitive radio has been proposed for full utilization of these spectrums. The central idea of cognitive radio is to allow the secondary user to use the spectrum concurrently with the primary user with the compulsion of minimum interference. However, designing a model with minimum interference is a challenging task. In this paper, a transmission model based on cyclic generalized polynomial codes discussed in [2] and [15], is proposed for the improvement in utilization of spectrum. The proposed model assures a non interference data transmission of the primary and secondary users. Furthermore, analytical results are presented to show that the proposed model utilizes spectrum more efficiently as compared to traditional models.


Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.


2021 ◽  
Author(s):  
Sivasothy Sen Senthuran

In recent studies it was found out that previously allocated frequency spectrum is not fully utilized in all the wireless systems. Cognitive radio is the new concept to access this underutilized spectrum and, also a promising technology to cope with the ever increasing bandwidth demand for next generation wireless networks. Cognitive radio network can be classified into three different categories: interweave, underlay and overlay. In an interweave cognitive radio system, the unoccupied spectrum holes can be shared by cognitive users with minimal collision with primary users (spectrum owners) whereas in an underlay system, concurrent transmission is allowed with an interference threshold to the primary users. In an underlay system, cognitive users generally transmit at very low power. In an overlay system, cognitive users, similar to underlay cognitive radio systems, concurrently transmit with primary users but cognitive users may know the codewords of the primary transmitter. Hence, using that knowledge, cognitive transmitter may adopt different coding techniques to cancel/mitigate the interference at the primary receiver and/or it may assist the primary system by relaying primary user’s data. In this thesis, we improve the throughput/bit error rate performance of a cognitive radio system by effectively accessing the channels. Throughout the thesis we assume that cognitive user can sense only one channel at a time and we analyze the performance with perfect and imperfect sensing. First, we propose a novel opportunistic access scheme for cognitive radios in an interweave cognitive system, that considers the channel gain as well as the predicted idle channel probability (primary user occupancy: busy/idle). In contrast to previous work where a cognitive user vacates a channel only when that channel becomes busy, the proposed scheme requires the cognitive user to switch to the channel with the next highest idle probability if the current channel’s gain is below a certain threshold. We derive the threshold values that maximize the long term throughput for various primary user transition probabilities and cognitive user’s relative movement (Doppler spread). Then, we propose a three state Markov model to analyze the performance of a hybrid interweave-underlay system where the primary user’s occupancy states are hidden, but their activity statistics, ranges of transmission, and interference thresholds are known. The primary user is assumed to be in one of the three transmission modes as seen by the cognitive user: busy, concurrent and idle. We derive the transmission mode selection criteria (interweave/underlay) to improve the long term throughput of a cognitive user based on the primary user traffic characteristics and the achievable throughput ratio between the two modes of operation. Later, we incorporate the sensing error in our analysis where we study the optimal access strategy. Since the optimal policy requires the channel to be sensed in each time-slot, we propose and analyze a forward algorithm based cross-layer frame based sensing policy. Finally, we focus on the overlay cognitive radio system where cognitive relay nodes assist the primary transmission. As an initial study, we select a two-hop decode-and-forward orthogonal frequency and code division multiplexing based relay network. For this system, we propose adaptive channel allocation and, power allocation strategies and the bit error rate performance is numerically evaluated. This preliminary analysis can be extended to overlay cognitive systems.


Author(s):  
Spriha Pandey* ◽  
Ashawani Kumar

Cognitive radio has proved to be an efficient and promising technology for the future of wireless networks. Its major and fundamental aim is to utilize the spectrum bands which are not efficiently exercised. These bands can be accessed using Opportunistic Spectrum Access (OSA), by a secondary user only when primary user is not transmitting over the channel. Cognitive radio manages spectrum through its cognitive radio cycle, which performs a set of management functions such as, spectrum sensing, spectrum assignment, spectrum sharing and spectrum mobility/handoff. During this cycle, at several stages, cognitive radio is very much vulnerable to security attacks. This is also due to the exposed nature of cognitive radio architecture. One such security attack which has not been much explored and can cause serious security issues is Cognitive User Emulation Attack (CUEA). This attack is expected to occur at the time of spectrum handoff. In this article the reason of occurrence of CUEA is explained along with counter measures to prevent this threat in the network by implementing trust mechanism using fuzzy logic. The proposed system is simulated and analyzed using MATLAB tool.


Sign in / Sign up

Export Citation Format

Share Document