scholarly journals A Real Time Estimation of QoS for GA and LOA Algorithm in Cognitive Radio Network

Cognitive radio networks sets priority for users to provide improved QoS for primary users. In most cognitive radio networks the primary user is assigned highest priority for communication. This causes the secondary user to wait for communication. Hence, alternative methods employ for secondary user to make transmit data on channel reserved for primary users. The secondary users sense free channels by spectrum sensing mechanism. In this paper, Heuristic Greedy algorithm (GA) and Lion optimization algorithm (LOA) apply for efficient channel utilization to improve QoS. In GA algorithm, the spectrum is shared between primary and secondary users on a time basis. In LOA, the primary and secondary users share spectrum information with each other. The GA and LOA algorithm apply in hardware testbed to evaluate comparative QoS analysis in terms of power consumption, delay and bandwidth. The analysis show LOA algorithm provide better QoS compared to GA algorithm.

2009 ◽  
Vol 53 (8) ◽  
pp. 1158-1170 ◽  
Author(s):  
Xavier Gelabert ◽  
Ian F. Akyildiz ◽  
Oriol Sallent ◽  
Ramon Agustí

2013 ◽  
Vol 4 (4) ◽  
pp. 1-15
Author(s):  
Yanxiao Zhao ◽  
Bighnaraj Panigrahi ◽  
Kazem Sohraby ◽  
Wei Wang

Cognitive radio networks (CRNs) have received considerable attention and viewed as a promising paradigm for future wireless networking. Its major difference from the traditional wireless networks is that secondary users are allowed to access the channel if they pose no harmful interference to primary users. This distinct feature of CRNs has raised an essential and challenging question, i.e., how to accurately estimate interference to the primary users from the secondary users? In addition, spectrum sensing plays a critical role in CRNs. Secondary users have to sense the channel before they transmit. A two-state sensing model is commonly used, which classifies a channel into either busy or idle state. Secondary users can only utilize a channel when it is detected to be in idle state. In this paper, we tackle the estimation of interference at the primary receiver due to concurrently active secondary users. With the spectrum sensing, secondary users are refrained from transmitting once an active user falls into their sensing range. As a result, the maximum number of simultaneously interfering secondary users is bounded, typically ranging from 1 to 4. This significant conclusion considerably simplifies interference modeling in CRNs. The authors present all the cases with possible simultaneously interfering secondary users. Moreover, the authors derive the probability for each case. Extensive simulations are conducted and results validate the effectiveness and accuracy of the proposed approach.


Author(s):  
K. Annapurna ◽  
B. Seetha Ramanjaneyulu

Satisfying the Quality of Service (QoS) is often a challenge in cognitive radio networks, because they depend on opportunistic channel accessing. In this context, appropriate pricing of vacant channels that is linked to the preference in their allocation, is found to be useful. However, ambiguity on the possible price at which the channel would be allotted is still a concern. In this work, an auction mechanism in which maximum value of the bid is predefined is proposed. With this, users quote their bid values as per their needs of getting the channels, up to the predefined maximum allowed bid price. However, final price of allocation is decided based on the sum total demand from all the users and the availability of vacant channels. Performance of the system is found in terms of blocking probabilities of secondary users and revenues to primary users. The proposed system is found to yield similar quantum of revenues as that of the Generalized Second Price (GSP) auction, while offering much lesser blocking probabilities to high-priority users to satisfy their QoS requirements.


Author(s):  
Miguel Tuberquia ◽  
Hans Lopez-Chavez ◽  
Cesar Hernandez

Cognitive radio is a technique that was originally created for the proper use of the radio electric spectrum due its underuse. A few methods were used to predict the network traffic to determine the occupancy of the spectrum and then use the ‘holes’ between the transmissions of primary users. The goal is to guarantee a complete transmission for the second user while not interrupting the trans-mission of primary users. This study seeks the multifractal generation of traffic for a specific radio electric spectrum as well as a bio-inspired route estimation for secondary users. It uses the MFHW algorithm to generate multifractal traces and two bio-inspired algo-rithms: Ant Colony Optimization and Max Feeding to calculate the secondary user’s path. Multifractal characteristics offer a predic-tion, which is 10% lower in comparison with the original traffic values and a complete transmission for secondary users. In fact, a hybrid strategy combining both bio-inspired algorithms promise a reduction in handoff. The purpose of this research consists on deriving future investigation in the generation of multifractal traffic and a mobility spectrum using bio-inspired algorithms.


Author(s):  
Saed Alrabaee ◽  
Mahmoud Khasawneh ◽  
Anjali Agarwal

Cognitive radio technology is the vision of pervasive wireless communications that improves the spectrum utilization and offers many social and individual benefits. The objective of the cognitive radio network technology is to use the unutilized spectrum by primary users and fulfill the secondary users' demands irrespective of time and location (any time and any place). Due to their flexibility, the Cognitive Radio Networks (CRNs) are vulnerable to numerous threats and security problems that will affect the performance of the network. Little attention has been given to security aspects in cognitive radio networks. In this chapter, the authors discuss the security issues in cognitive radio networks, and then they present an intensive list of the main known security threats in CRN at various layers and the adverse effects on performance due to such threats, and the current existing paradigms to mitigate such issues and threats. Finally, the authors highlight proposed directions in order to make CRN more authenticated, reliable, and secure.


Sign in / Sign up

Export Citation Format

Share Document