Adaptive TCS creation and assignment mechanism for cognitive radio network using Golden Eagle optimized Hybrid Multilayer Perceptron-Convolutional Neural Network

Author(s):  
Anjana Devi Javar ◽  
V. Prasanna Sriniva

Abstract The increasing number of wireless devices tends to produce a scarcity of spectrum resources. Cognitive Radio is introduced to tackle this scarcity issue since the cognitive radio users are unlicensed users and utilize the underutilized licensed spectrum without impacting any damage to the licensed users. However, this CR generates a target channel sequence (TCS) to assign the channel for the multi-user while occurring handoff. Besides it also faces some challenges like the fair assignment of TCS problems to multiple secondary users, channel access conflicts, channel obsolesces effects during the creation of TCS. To tackle the issues, we proposed a novel Three-stage mechanism to create and assign TCS for the multi-users along with the hybrid optimized Multilayer perceptron-based Convolution neural network approach. Here, the protection to safeguard VoIP communication can be performed with the aid of a proposed hybrid MLP-CNN-GEO approach. The experimental analysis depicts that the proposed work reduces handoff delays and call-drops, and assigns a fair and dynamic channel for secondary users.

Symmetry ◽  
2019 ◽  
Vol 11 (10) ◽  
pp. 1260
Author(s):  
Hyils Sharon Magdalene Antony ◽  
Thulasimani Lakshmanan

Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caused by an imperfect spectrum sensing of the secondary users (SUs). The SUs are intended to access the primary channels. At the same time, the primary user also returns to the channel before the SUs access ends. This similar way of accessing the primary channel will cause interference between the users. Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive radio network. The simulation result provides better evidence for the performance of the proposed technique.


Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.


Sign in / Sign up

Export Citation Format

Share Document