scholarly journals Policies for Scheduling Primary and Secondary users in Cognitive Radio Network using Game Theory

Author(s):  
Sreelakshmi Jayasankar ◽  
Joshy Thomas Jose ◽  
2021 ◽  
Author(s):  
Thanga Revathi S ◽  
Gayathri A ◽  
Kalaivani J ◽  
Manickam M ◽  
Kalaiselvi K ◽  
...  

Abstract In a wireless communication industry Cognitive Radio Network is the most important concern to deal with long range communications in efficient manner with futuristic remote sensing and channel allocation policies. This kind of communication principles need to tackle the attacks in wide manner. Generally, the attacks come from the intruder end with several variations but the most common attacks are network sniffing, route trapping and so on, but in the case of Cognitive Radio Network the major threat is called Primary User Impersonation (PUI). This kind of PUI attacks acts like a regular Primary User (PU) and raise a signals accordingly to make confuse the Secondary Users to come out from the communication line as well as the entire communication spectrum utilized by the Secondary User gets affected. Due to these kinds of affections the legitimate Secondary Users suffer and left from the respective channels utilized for communication. This type of attacks highly creates an impact over the Cognitive Radio Network and causes the failure over spectrum accessing. The flexible accessibility by some voluntary users maintains a constant selection of actions to determine their appropriate target, so they can differentiate between accomplishing their objectives and being compliant with their goals. The critical role is protected against obstruction and moreover mandated by vitality criteria. At the aim to develop energy saving and power gathering cooperative spectrum, factors that are central to the success of the project must be suggested in the literature as two major protocols, such as: Time Sharing (TS) and Energy Sharing (ES). An energy utilization constraint restriction is imposed on the power cells (battery) to make sure they do not charge and discharge at around the parallel period Primary User Impersonation detection in an efficient manner, in which it uses recent advancements in cooperative spectrum sensing to devise an algorithm called Energetic Cognitive Radio Network Game Planner (ECRNGP). A Game Theory logic provides an intelligent attack identification abilities to the proposed approach to identify the threat signals immediately and notify that to the respective transmitter unit to make appropriate preventive measures for that as well as this proposed approach efficiently identifies the Primary User Impersonation and provides a sufficient protection to the CRN environment as well as Secondary Users to make a perfect communication between entities without any attack oriented constraints.


Symmetry ◽  
2019 ◽  
Vol 11 (10) ◽  
pp. 1260
Author(s):  
Hyils Sharon Magdalene Antony ◽  
Thulasimani Lakshmanan

Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caused by an imperfect spectrum sensing of the secondary users (SUs). The SUs are intended to access the primary channels. At the same time, the primary user also returns to the channel before the SUs access ends. This similar way of accessing the primary channel will cause interference between the users. Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive radio network. The simulation result provides better evidence for the performance of the proposed technique.


Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.


Sign in / Sign up

Export Citation Format

Share Document