scholarly journals Symmetric Channel Hopping algorithm for a Cognitive Radio Network in Asynchronous environment

Author(s):  
Arunanshu Mahapatro ◽  
sangeeta Sa

<div>Rendezvous is a critical step in Cognitive Radio Network (CRN) prior to transmission for establishing communication links between secondary users (SUs). Due to the long-term blocking, channel saturation, and scalability issues encountered by dedicated common control channels (CCC) in a distributed CRN, rendezvous is preferable on the available idle channels of the primary users (PUs). In fact, each SU is unaware of the other SUs’ available channel sets, and the blind rendezvous is performed through the channel hopping (CH) process. As a result, ensuring a rendezvous between two SUs in a finite period in an asynchronous environment remains a challenging problem. In this work, a disjoint difference set based CH (DDSCH) method is developed that ensures the highest degree of rendezvous in comparatively less time. </div>

2021 ◽  
Author(s):  
Arunanshu Mahapatro ◽  
sangeeta Sa

<div>Rendezvous is a critical step in Cognitive Radio Network (CRN) prior to transmission for establishing communication links between secondary users (SUs). Due to the long-term blocking, channel saturation, and scalability issues encountered by dedicated common control channels (CCC) in a distributed CRN, rendezvous is preferable on the available idle channels of the primary users (PUs). In fact, each SU is unaware of the other SUs’ available channel sets, and the blind rendezvous is performed through the channel hopping (CH) process. As a result, ensuring a rendezvous between two SUs in a finite period in an asynchronous environment remains a challenging problem. In this work, a disjoint difference set based CH (DDSCH) method is developed that ensures the highest degree of rendezvous in comparatively less time. </div>


2018 ◽  
Vol 2018 ◽  
pp. 1-9
Author(s):  
Yongchul Kim ◽  
Young-Hyun Oh ◽  
Jungho Kang

Cognitive radio networks (CRNs) are considered an attractive technology to mitigate inefficiency in the usage of licensed spectrum. CRNs allow the secondary users (SUs) to access the unused licensed spectrum and use a blind rendezvous process to establish communication links between SUs. In particular, quorum-based channel-hopping (CH) schemes have been studied recently to provide guaranteed blind rendezvous in decentralized CRNs without using global time synchronization. However, these schemes remain vulnerable to jamming attacks. In this paper, we first analyze the limitations of quorum-based rendezvous schemes called asynchronous channel hopping (ACH). Then, we introduce a novel sequence sensing jamming attack (SSJA) model in which a sophisticated jammer can dramatically reduce the rendezvous success rates of ACH schemes. In addition, we propose a fast and robust asynchronous rendezvous scheme (FRARS) that can significantly enhance robustness under jamming attacks. Our numerical results demonstrate that the performance of the proposed scheme vastly outperforms the ACH scheme when there are security concerns about a sequence sensing jammer.


Symmetry ◽  
2019 ◽  
Vol 11 (10) ◽  
pp. 1260
Author(s):  
Hyils Sharon Magdalene Antony ◽  
Thulasimani Lakshmanan

Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caused by an imperfect spectrum sensing of the secondary users (SUs). The SUs are intended to access the primary channels. At the same time, the primary user also returns to the channel before the SUs access ends. This similar way of accessing the primary channel will cause interference between the users. Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive radio network. The simulation result provides better evidence for the performance of the proposed technique.


Sign in / Sign up

Export Citation Format

Share Document