scholarly journals Throughput Maximization by Optimizing Secondary Users in a Cooperative Cognitive Radio Network using Hard Fusion Rules

Cognitive radio network is a promising technology for enabling secondary users to utilize the licensed spectrum of the primary user without causing interference. The data trans- mitted by the secondary users through primary channel without affecting the primary user is known as channel throughput. In cooperative spectrum sensing(CSS) as the number of secondary users increases the channel throughput increases which in turn reduces the spectrum efficiency due to more spectrum wastage. Therefore in this paper, channel throughput is maximized by optimizing secondary users proposed and throughput for variable secondary users for OR and AND fusion rules is investigated. The optimal secondary users is estimated mathematically and simulation results shows the variation of throughput for variable number of secondaryusers

2021 ◽  
Author(s):  
BALACHANDER T ◽  
Mukesh Krishnan M B

Abstract In the recent past, efficient cooperative spectrum sensing and usage are playing a vital role in wireless communication because of the significant progress of mobile devices. There is a recent surge and interest on Non-Orthogonal Multiple Access (NOMA) focused on communication powered by wireless mode. In modern research, more attention has been focused on efficient and accurate Non-Orthogonal Multiple Access (NOMA). NOMA wireless communication is highly adapted with Cognitive Radio Network (CRN) for improving performance. In the existing cognitive radio network, the secondary users could be able to access the idle available spectrum while primary users are engaged. In the traditional CRN, the primary user’s frequency bands are sensed as free, the secondary users could be utilized those bands of frequency resources. In this research, the novel methodology is proposed for cooperative spectrum sensing in CRN for 5G wireless communication using NOMA. The higher cooperative spectrum efficiency can be detected in the presence of channel noise. Cooperative spectrum sensing is used to improve the efficient utilization of spectrum. The spectrum bands with license authority primary user are shared by Secondary Users (SU) by simultaneously transmitting information with Primary Users (PU). The cooperative spectrum sensing provides well under the circumstances that the different channel interference to the primary user can be guaranteed to be negligible than an assured thresholding value. The Noisy Channel State Information (CSI) like AWGN and Rayleigh fading channels are considered as wireless transmission mediums for transmitting a signal using Multiple-Input-Multiple-Output (MIMO) NOMA to increase the number of users. The proposed NOMA is fascinated with significant benefits in CRN is an essential wireless communication method for upcoming 5G technology. From experimental results it has been proved that the novel methodology performance is efficient and accurate than existing methodologies by showing graphical representations and tabulated parameters.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Hongwei Zhang ◽  
Xinyu Da ◽  
Hang Hu ◽  
Lei Ni ◽  
Yu Pan

Unmanned aerial vehicle- (UAV-) assisted communication has great potential to provide on-demand wireless services and improve the outdoor link throughput. In this paper, a UAV-based cognitive radio network (CRN) is investigated in which the UAV works as a secondary user (SU). Considering the overlay spectrum sensing mode, the UAV can operate on the licensed spectrum bands of primary user (PU) only when PU is idle. In each working frame structure, both sensing time slot and transmission time slot are analysed in radians. Specifically, our objective is to maximize the spectrum efficiency (SE) of the UAV by jointly optimizing the sensing radian and the number of radians. For the single-radian and multiradian schemes, the dichotomy and alternative iterative optimization (AIO) algorithm are proposed to solve the SE optimization problem. Simulation results show that the proposed multiradian cooperative spectrum sensing (CSS) scheme can achieve better performance on ensuring the quality-of-service (QoS) of the PU, and it can significantly enhance the SE of the UAV especially in the severe channel environments.


Symmetry ◽  
2019 ◽  
Vol 11 (10) ◽  
pp. 1260
Author(s):  
Hyils Sharon Magdalene Antony ◽  
Thulasimani Lakshmanan

Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caused by an imperfect spectrum sensing of the secondary users (SUs). The SUs are intended to access the primary channels. At the same time, the primary user also returns to the channel before the SUs access ends. This similar way of accessing the primary channel will cause interference between the users. Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive radio network. The simulation result provides better evidence for the performance of the proposed technique.


Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.


2020 ◽  
Vol 2020 ◽  
pp. 1-11 ◽  
Author(s):  
Muhammad Sajjad Khan ◽  
Liaqat Khan ◽  
Noor Gul ◽  
Muhammad Amir ◽  
Junsu Kim ◽  
...  

Cognitive radio is an intelligent radio network that has advancement over traditional radio. The difference between the traditional radio and the cognitive radio is that all the unused frequency spectrum can be utilized to the best of available resources in the cognitive radio unlike the traditional radio. The core technology of cognitive radio is spectrum sensing, in which secondary users (SUs) opportunistically access the spectrum while avoiding interference to primary user (PU) channels. Various aspects of the spectrum sensing have been studied from the perspective of cognitive radio. Cooperative spectrum sensing (CSS) technique provides a promising performance, compared with individual sensing techniques. However, the existence of malicious users (MUs) highly degrades the performance of cognitive radio network (CRN) by sending falsified results to a fusion center (FC). In this paper, we propose a machine learning algorithm based on support vector machine (SVM) to classify legitimate SUs and MUs in the CRN. The proposed SVM-based algorithm is used for both classification and regression. It clearly classifies legitimate SUs and MUs by drawing a hyperplane on the base of maximal margin. After successful classification, the sensing results from the legitimate SUs are combined at the FC by utilizing Dempster-Shafer (DS) evidence theory. The effectiveness of the proposed SVM-based classification algorithm is demonstrated through simulations, compared with existing schemes.


2021 ◽  
Author(s):  
Thanga Revathi S ◽  
Gayathri A ◽  
Kalaivani J ◽  
Manickam M ◽  
Kalaiselvi K ◽  
...  

Abstract In a wireless communication industry Cognitive Radio Network is the most important concern to deal with long range communications in efficient manner with futuristic remote sensing and channel allocation policies. This kind of communication principles need to tackle the attacks in wide manner. Generally, the attacks come from the intruder end with several variations but the most common attacks are network sniffing, route trapping and so on, but in the case of Cognitive Radio Network the major threat is called Primary User Impersonation (PUI). This kind of PUI attacks acts like a regular Primary User (PU) and raise a signals accordingly to make confuse the Secondary Users to come out from the communication line as well as the entire communication spectrum utilized by the Secondary User gets affected. Due to these kinds of affections the legitimate Secondary Users suffer and left from the respective channels utilized for communication. This type of attacks highly creates an impact over the Cognitive Radio Network and causes the failure over spectrum accessing. The flexible accessibility by some voluntary users maintains a constant selection of actions to determine their appropriate target, so they can differentiate between accomplishing their objectives and being compliant with their goals. The critical role is protected against obstruction and moreover mandated by vitality criteria. At the aim to develop energy saving and power gathering cooperative spectrum, factors that are central to the success of the project must be suggested in the literature as two major protocols, such as: Time Sharing (TS) and Energy Sharing (ES). An energy utilization constraint restriction is imposed on the power cells (battery) to make sure they do not charge and discharge at around the parallel period Primary User Impersonation detection in an efficient manner, in which it uses recent advancements in cooperative spectrum sensing to devise an algorithm called Energetic Cognitive Radio Network Game Planner (ECRNGP). A Game Theory logic provides an intelligent attack identification abilities to the proposed approach to identify the threat signals immediately and notify that to the respective transmitter unit to make appropriate preventive measures for that as well as this proposed approach efficiently identifies the Primary User Impersonation and provides a sufficient protection to the CRN environment as well as Secondary Users to make a perfect communication between entities without any attack oriented constraints.


2018 ◽  
Vol 14 (2) ◽  
pp. 155014771875921
Author(s):  
Yibing Li ◽  
Xueying Diao ◽  
Qianhui Dong ◽  
Chunrui Tang

This article aims to optimize the information rate of a cognitive radio network with multiple secondary users. A primary user rate optimization approach based on dichotomy of the degree of freedom is proposed, where the primary users’ eigenmodes are adjusted according to its rate requirement. In order to provide a higher sum rate of secondary users, two interference alignment schemes are presented. The first one is an interference sub-space alignment scheme, which aims to align the sub-spaces spanned by interference from other secondary users with the sub-space spanned by interference from primary user. However, interference sub-space alignment may not be favorable in low signal-to-interference ratio region due to the negligence of the influence of noise. Thus, an iterative interference alignment scheme which maximizes the secondary system sum rate based on Grassmann manifold is developed. To accelerate the convergence speed, the objective function in Grassmann manifold is transformed into two parts without the inversion operation using the extensions of the Minkowski inequality. Simulation results show that interference sub-space alignment is more effective than Grassmann manifold to mitigate interference in the system with more secondary users. We further validate the effectiveness of Grassmann manifold and interference sub-space alignment in comparison with the existing schemes employing a water filling algorithm.


Author(s):  
Aasia Rehman ◽  
Deo Prakash

Cognitive Radio Network Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. This paper is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. This paper solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of NBA is to minimize two fitness functions namely non-linear least square and the maximum likelihood in order to optimize the estimation error. After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation and Particle Swarm Optimization.


Sign in / Sign up

Export Citation Format

Share Document