scholarly journals Effect of Dynamic Spectrum Aggregation and Allocation Algorithms in Cognitive Radio Networks

2019 ◽  
Vol 8 (4) ◽  
pp. 9865-9868

With rapid proliferation of radio technology, discontinuous spectrum aggregation and access in a single radio has become conceivable. When the bandwidth of the spectrum fragment is narrow, then spectrum aggregation can be utilized to bundle multiple small fragments in one radio. This can positively improve the efficiency of the spectrum utilization. Though, aggregation of fragmented segments leads to improved spectrum utilization it results in further spectrum fragmentation leading to practical hardware constraints. As a solution, we use the popular memory allocation techniques to perform spectrum aggregation so that further fragmentation can be reduced. We derive at an efficient Spectrum Aggregation Algorithm based on Memory Allocation techniques.

2018 ◽  
Vol 7 (2.8) ◽  
pp. 372 ◽  
Author(s):  
D Ganesh ◽  
T Pavan Kumar

Cognitive radio is a promising wireless communication technology that improves spectrum utilization and offers many benefits for internet users. Cognitive radio networks utilizes the available limited resources in a more efficient and flexible way. The main objective of the Cognitive network is to efficiently utilize the unutilized spectrum and meet the demand of the secondary users. some of the important features of cognitive of Cognitive radio networks are dynamic spectrum access, self organizing  and flexibility. As Cognitive radio networks are flexible in nature, it will be effected by various security attacks which in turn affects the performance of the network. Furthermore Cognitive radio networks transmit the spectrum in several licensed bands and it also performs dynamic spectrum allocation. Cognitive radio and Cognitive radio networks are wireless in nature these face conventional attacks. In this survey we address various  attacks in different layers , new threats and challenges that Cognitive networks face, current available solutions to address layer attacks. In addition applications, open problems and future Research challenges are also specified.


Author(s):  
Saed Alrabaee ◽  
Mahmoud Khasawneh ◽  
Anjali Agarwal

Cognitive radio technology is the vision of pervasive wireless communications that improves the spectrum utilization and offers many social and individual benefits. The objective of the cognitive radio network technology is to use the unutilized spectrum by primary users and fulfill the secondary users' demands irrespective of time and location (any time and any place). Due to their flexibility, the Cognitive Radio Networks (CRNs) are vulnerable to numerous threats and security problems that will affect the performance of the network. Little attention has been given to security aspects in cognitive radio networks. In this chapter, the authors discuss the security issues in cognitive radio networks, and then they present an intensive list of the main known security threats in CRN at various layers and the adverse effects on performance due to such threats, and the current existing paradigms to mitigate such issues and threats. Finally, the authors highlight proposed directions in order to make CRN more authenticated, reliable, and secure.


Big Data ◽  
2016 ◽  
pp. 1326-1346
Author(s):  
Saed Alrabaee ◽  
Mahmoud Khasawneh ◽  
Anjali Agarwal

Cognitive radio technology is the vision of pervasive wireless communications that improves the spectrum utilization and offers many social and individual benefits. The objective of the cognitive radio network technology is to use the unutilized spectrum by primary users and fulfill the secondary users' demands irrespective of time and location (any time and any place). Due to their flexibility, the Cognitive Radio Networks (CRNs) are vulnerable to numerous threats and security problems that will affect the performance of the network. Little attention has been given to security aspects in cognitive radio networks. In this chapter, the authors discuss the security issues in cognitive radio networks, and then they present an intensive list of the main known security threats in CRN at various layers and the adverse effects on performance due to such threats, and the current existing paradigms to mitigate such issues and threats. Finally, the authors highlight proposed directions in order to make CRN more authenticated, reliable, and secure.


Author(s):  
Haiyan Ye ◽  
Jiabao Jiang

AbstractThe lack of spectrum resources restricts the development of wireless communication applications. In order to solve the problems of low spectrum utilization and channel congestion caused by the static division of spectrum resource, this paper proposes an optimal linear weighted cooperative spectrum sensing for clustered-based cognitive radio networks. In this scheme, different weight values will be assigned for cooperative nodes according to the SNR of cognitive users and the historical sensing accuracy. In addition, the cognitive users can be clustered, and the users with the better channel characteristics will be selected as cluster heads for gathering the local sensing information. Simulation results show that the proposed scheme can obtain better sensing performance, improve the detection probability and reduce the error probability.


2019 ◽  
Vol 16 (12) ◽  
pp. 34-46
Author(s):  
Ehab F. Badran ◽  
Amr A. Bashir ◽  
Amira I. Zaki ◽  
Waleed K. Badawi

Sign in / Sign up

Export Citation Format

Share Document