Cross-Layer Performance Analysis of the Unreliable Data Transmission for Decentralized Cognitive MAC Protocol under Multiple Secondary Users Scenario

2013 ◽  
Vol 1 (1) ◽  
pp. 74-85
Author(s):  
Xiaofeng Hu ◽  
Xianzhong Xie ◽  
Ting Song

AbstractThe effect of multiple secondary users detecting the same primary user channel during a minor period on the performance of traditional energy detection is investigated. In order to achieve the target probability of detection, the minimum sampling time (MST) for energy detection is derived under the limitation of energy detection (LED), when the random arrival of the secondary users is taken into account. Jointly considering both spectrum sensing and access, we derive the probability of unreliable data transmission for decentralized cognitive MAC (DC-MAC) protocol based on MST under LED. The numerical results show that the simulation and theoretical analysis match very well. The reliability of data transmission is significantly degraded by the secondary users’ traffic. With the target probability of detection increasing, the reliable throughput reduces.

2013 ◽  
Vol 10 (12) ◽  
pp. 125-138 ◽  
Author(s):  
Xie Xianzhong ◽  
Hu Xiaofeng ◽  
Yang Helin ◽  
Ma Bin ◽  
Lei Weijia

2021 ◽  
Vol 10 (4) ◽  
pp. 2046-2054
Author(s):  
Mohammed Mehdi Saleh ◽  
Ahmed A. Abbas ◽  
Ahmed Hammoodi

Due to the rapid increase in wireless applications and the number of users, spectrum scarcity, energy consumption and latency issues will emerge, notably in the fifth generation (5G) system. Cognitive radio (CR) has emerged as the primary technology to address these challenges, allowing opportunist spectrum access as well as the ability to analyze, observe, and learn how to respond to environmental 5G conditions. The CR has the ability to sense the spectrum and detect empty bands in order to use underutilized frequency bands without causing unwanted interference with legacy networks. In this paper, we presented a spectrum sensing algorithm based on energy detection that allows secondary user SU to transmit asynchronously with primary user PU without causing harmful interference. This algorithm reduced the sensing time required to scan the whole frequency band by dividing it into n sub-bands that are all scanned at the same time. Also, this algorithm allows cognitive radio networks (CRN) nodes to select their operating band without requiring cooperation with licensed users. According to the BER, secondary users have better performance compared with primary users.


2014 ◽  
Vol 06 (04) ◽  
pp. 1450059 ◽  
Author(s):  
Naveed Ahmed Azam ◽  
Tariq Shah ◽  
Antonio Aparecido de Andrade

The frequency spectrums are inefficiently utilized and cognitive radio has been proposed for full utilization of these spectrums. The central idea of cognitive radio is to allow the secondary user to use the spectrum concurrently with the primary user with the compulsion of minimum interference. However, designing a model with minimum interference is a challenging task. In this paper, a transmission model based on cyclic generalized polynomial codes discussed in [2] and [15], is proposed for the improvement in utilization of spectrum. The proposed model assures a non interference data transmission of the primary and secondary users. Furthermore, analytical results are presented to show that the proposed model utilizes spectrum more efficiently as compared to traditional models.


Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.


This paper analyzes cooperative spectrum sensing with energy harvesting using power splitting mode of operation simultaneously. Secondary users (SU) will harvests RF energy from primary user (PU) throughout the durations of sensing and transmission. The main aim of this paper is to analyze the residual energy of SU with power splitting ratio, number of samples, number of SUs and probability of detection. Mathematical expressions of energy consumption, harvested energy and residual energy are developed. The simulation results of residual energy with different parameters are verified and have proved that residual energy of SUs is increased with increase in power splitting ratio, number of SUs, number of samples of SU for sensing and probability of detection


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
H. F. Al-Doseri ◽  
M. A. Mangoud

One of the main challenges in cognitive radio networks is the ability of secondary users to detect the primary user presence with high probability of detection. In previous research, optimizing cooperative sensing in cognitive radio networks is performed for either a targeted probability of detection or a false alarm. After setting one of the probabilities as an optimization constraint, the other is optimized. In this paper, a guaranteed constant throughput at the secondary users is introduced as a target while optimizing probability of detection for cooperative sensing. Both sensing time values and number of cooperated cognitive radio secondary users are investigated to maximize the probability of detection of primary user. AND and OR hard decision schemes are considered and compared with soft decision scheme which is weighted modified deflection coefficient scheme (W-MDC). It is illustrated that cooperation of all users and utilizing full frames for sensing time will not provide maximum probability of detection. A tradeoff between performances of cognitive radio networks with and without optimization is presented. The effects of varying network sizes, normalized target throughput, maximum frame duration times, and received signal-to-noise ratio at the fusion center are investigated for different fusion rules.


2020 ◽  
Vol 8 (6) ◽  
pp. 3879-3886

The main purpose of this paper is to solve the complexity problem and improved existing methods such as energy detection, Maximum-Minimum Eigen value detectors (MME), MME with blind two stage detector and adaptive covariance threshold method. PSO algorithm stands for Particle Swarm Optimization is utilized to novelty the optimal sensing time at that there will be maximum detection of probability for the Primary user. In which, we compare the optimal-PSO algorithm with non-optimal method. The simulation of the paper is depend on the performance of probability of detection based on the false alarm rate on the different region of the signal to noise ratio. The proposed optimized method of detector shows a superior performance values when compared to three individual detectors. The performance metrics of proposed method are performed better than other three individual detector.


Author(s):  
Heba A.Tag El-Dien ◽  
Rokaia M. Zaki ◽  
Mohsen M. Tantawy ◽  
Hala M. Abdel-Kader

Detecting the presence or absence of primary user is the key task of cognitive radio networks. However, relying on single detector reduces the probability of detection and increases the probability of missed detection. Combining two conventional spectrum sensing techniques by integrating their individual features improves the probability of detection especially under noise uncertainty. This paper introduces a modified two-stage detection technique that depends on the energy detection as a first stage due to its ease and speed of detection, and the proposed Modified Combinational Maximum-Minimum Eigenvalue based detection as a second stage under noise uncertainty and comperes it with the case of using Maximum-Minimum Eigenvalue and  Combinational Maximum-Minimum Eigenvalue as a second stage.


2013 ◽  
Vol 2013 ◽  
pp. 1-9
Author(s):  
Hang Hu ◽  
Hang Zhang ◽  
Hong Yu ◽  
Javad Jafarian

In cognitive radio (CR) networks, cooperation can greatly improve the performance of spectrum sensing. In this paper, we propose a novel cooperative spectrum sensing (CSS) frame structure in which CR users conduct spectrum sensing and data transmission concurrently over two different parts of the primary user (PU) spectrum band. Energy detection sensing scheme is used to prove that there exists an optimal sensing bandwidth which yields the highest throughput for the CR network. Thus, we focus on the optimal sensing settings of the proposed sensing scheme in order to maximize the throughput of the CR network under the conditions of sufficient protection to PUs and required bandwidth for potential CR user data transmission. Some algorithms are also derived to jointly optimize the sensing bandwidth and the final decision threshold. Our simulation results show that optimizing the sensing bandwidth and the final decision threshold together will further increase the throughput of the CR network as compared to that which only optimizes the sensing bandwidth or the final decision threshold.


2017 ◽  
Vol 2017 ◽  
pp. 1-8 ◽  
Author(s):  
Nandita Lavanis ◽  
Devendra Jalihal

A cognitive radio network (CRN) with a cooperative spectrum sensing scheme is considered. This CRN has a primary user and multiple secondary users, some of which are malicious secondary users (MSUs). Energy detection at each SU is performed using a p-norm detector with p≥2, where p=2 corresponds to the standard energy detector. The MSUs are capable of perpetrating spectrum sensing data falsification (SSDF) attacks. At the fusion center (FC), an algorithm is used to suppress these MSUs which could be either an adaptive weighing algorithm or one of the following: Tietjen-Moore (TM) test or Peirce’s criterion. This is followed by computation of a test statistic (TS) which is a random variable. In this paper, we assume TS to have either a Gamma or a Gaussian distribution and calculate the threshold accordingly. We provide closed-form expressions of probability of false alarm and probability of miss-detection under both assumptions. We show that Gaussian assumption of TS is more suited in presence of an SSDF attack when compared with the Gamma assumption. We also compare the detection performance for various values of p and show that p=3 along with the Gaussian assumption is the best amongst all the cases considered.


Sign in / Sign up

Export Citation Format

Share Document