scholarly journals Machine Learning Implementation in Cognitive Radio Networks with Game-Theory Technique

2020 ◽  
Vol 2 (2) ◽  
pp. 68-75
Author(s):  
Dr. Jennifer S. Raj

Significant enhancement of spectrum utilization can be performed by means of Cognitive Radio technology. A game theory based Cognitive Radio Network with Dynamic Spectrum Allocation model is proposed in this paper. M|M|1 queuing model is implemented along with Preemptive Resume Priority for accommodation of all the cases. An Incremental Weights-Decremental Ratios (IW-DR) algorithm based on priority-based scheduling is used for supplementing this theory. Regression models are used for restructuring and improving the efficiency of the system.

2021 ◽  
Author(s):  
Nikhil Marriwala ◽  
Himanshu Punj ◽  
Sunita Panda ◽  
Inderjeet Kaur ◽  
Deepak Rathore

Abstract This is the era of Intelligent cognitive radio network technology that provides the available spectrum with efficient utilization. Cognitive Radio technology must promise to allow interference-free spectrum access by users. The paper discusses the several attacks and motives of attacks. The authentication mechanism role to prevent the attacks for hassle-free spectrum utilization is demonstrated. In this paper, resolving the cognitive network security issues by the authentication mechanism and the methods and need of authentication is discussed. This paper addresses the research challenges in the way of securing the cognitive radio network and countermeasures in CRN security strategies. Cognitive radio is an empowering innovation that guarantees to achieve spectrum utilization. In cognitive radio networks, several security threats affect the process of cognitive radio. Spectrum sensing data falsification (SSDF) attack is most disruptive in which the malicious users degrade the decision-making process by sending the false sensing reports to data fusion centres thus preventing honest users from utilizing the spectrum. Hence, security is a very important issue in cognitive radio networks that needs to be addressed for proper utilization of available spectrum by the users. Cognitive radio technology must promise secure spectrum dynamic access to users. In this paper, to counter the SSDF attack, the trust-based security mechanism is demonstrated to authenticate the honest users and it is observed that the proposed framework in the MATLAB environment is efficient and able to detect malicious users. Cognitive radio technology is the strategy applied to the spectrum to make it efficient for wireless communication. The strategy is an intelligent way to access the spectrum as it can learn its environment and make decisions by easy adaptation of operating parameters. The multiple nodes scenario is a good perspective. Software-defined radio is an essential component of cognitive radio Here, secondary users can access the spectrum to primary users whenever their vacant spectrum is available. The initial step is to sense the spectrum available further steps are spectrum decision making, spectrum management, and spectrum mobility. The network is vulnerable to various attacks on spectrum sensing and policy protocols which lead to disturbing functionality of cognitive radio technology. The defence mechanism based on public-key cryptography is proposed in which PU is authenticated by appending signature provided to PU signal. Authentication with a tag to the primary users is another perspective proposed. CRN technology should provide integrity, confidentiality and authenticity to the users.


Author(s):  
Saed Alrabaee ◽  
Mahmoud Khasawneh ◽  
Anjali Agarwal

Cognitive radio technology is the vision of pervasive wireless communications that improves the spectrum utilization and offers many social and individual benefits. The objective of the cognitive radio network technology is to use the unutilized spectrum by primary users and fulfill the secondary users' demands irrespective of time and location (any time and any place). Due to their flexibility, the Cognitive Radio Networks (CRNs) are vulnerable to numerous threats and security problems that will affect the performance of the network. Little attention has been given to security aspects in cognitive radio networks. In this chapter, the authors discuss the security issues in cognitive radio networks, and then they present an intensive list of the main known security threats in CRN at various layers and the adverse effects on performance due to such threats, and the current existing paradigms to mitigate such issues and threats. Finally, the authors highlight proposed directions in order to make CRN more authenticated, reliable, and secure.


Big Data ◽  
2016 ◽  
pp. 1326-1346
Author(s):  
Saed Alrabaee ◽  
Mahmoud Khasawneh ◽  
Anjali Agarwal

Cognitive radio technology is the vision of pervasive wireless communications that improves the spectrum utilization and offers many social and individual benefits. The objective of the cognitive radio network technology is to use the unutilized spectrum by primary users and fulfill the secondary users' demands irrespective of time and location (any time and any place). Due to their flexibility, the Cognitive Radio Networks (CRNs) are vulnerable to numerous threats and security problems that will affect the performance of the network. Little attention has been given to security aspects in cognitive radio networks. In this chapter, the authors discuss the security issues in cognitive radio networks, and then they present an intensive list of the main known security threats in CRN at various layers and the adverse effects on performance due to such threats, and the current existing paradigms to mitigate such issues and threats. Finally, the authors highlight proposed directions in order to make CRN more authenticated, reliable, and secure.


2018 ◽  
Vol 8 (6) ◽  
pp. 3673-3680
Author(s):  
K. Kimani ◽  
M. Njiraine

Frequency spectrum is a limited resource and the increasing demand caused by emerging services, augmented number of wireless users along with the demand for high-quality multimedia applications have resulted in the overcrowding of the allocated spectrum bands. The overcrowding of spectrum bands has exacerbated by the current spectrum licensing policy which has emerged as a bottleneck to efficient spectrum utilization, due to its inflexibility, resulting in most of the licensed spectrum being severely under-utilized. However, the problem of scarcity of spectrum bands and the inefficient utilization of the already allocated radio spectrum can be smartly addressed through spectrum sharing by enabling opportunistic usage of the underutilized frequency bands. One of the most exciting ways of spectrum sharing is cognitive radio technology which allows a wireless node to sense the environment, detect the network changes, and then make intelligent decisions by dynamically changing its reception or transmission parameters to communicate while ensuring that no interference is affected to the licensed users. It thus improves the spectrum utilization by reusing the unused or underutilized spectrum owned by the incumbent systems (primary systems). In this paper, a comprehensive survey and review of recent research about the advances in cognitive radio technology will be carried out. We will also evaluate the various spectrum sensing techniques in a cognitive radio network in the UHF/VHF bands allocated for TV broadcasting.


Author(s):  
Ling Li ◽  
Tien-Szu Pan ◽  
Xiao-Xue Sun ◽  
Shu-Chuan Chu ◽  
Jeng-Shyang Pan

AbstractSpectrum has now become a scarce resource due to the continuous development of wireless communication technology. Cognitive radio technology is considered to be a new method to solve the shortage of spectrum resources. The spectrum allocation model of cognitive radio can effectively avoid the waste of spectrum resources. A novel binary version of slime mould algorithm is proposed for the spectrum allocation model to solve the spectrum allocation scheme. In addition, adding unselected factors strategy can make the approach find a better solution. Compared with other algorithms, the novel binary slime mould algorithm and the strategy of adding unselected factors proposed in this paper have a good performance in spectrum allocation. The resulting spectrum allocation scheme can achieve efficient use of network resources.


2012 ◽  
Vol 2012 ◽  
pp. 1-13 ◽  
Author(s):  
Luis Guijarro ◽  
Vicent Pla ◽  
Jose R. Vidal ◽  
Jorge Martinez-Bauset

Spectrum management based on private commons is argued to be a realistic scenario for cognitive radio deployment within the current mobile market structure. A scenario is proposed where a secondary entrant operator leases spectrum from a primary incumbent operator. The secondary operator innovates incorporating cognitive radio technology, and it competes in quality of service and price against the primary operator in order to provide service to users. We aim to assess which benefit users get from the entry of secondary operators in the market. A game theory-based model for analyzing both the competition between operators and the subscription decision by users is proposed. We conclude that an entrant operator adopting an innovative technology is better off entering the market, and that a regulatory authority should intervene first allowing the entrant operator to enter the market and then setting a maximum amount of spectrum leased. This regulatory intervention is justified in terms of users utility and social welfare.


2019 ◽  
Vol 8 (4) ◽  
pp. 9865-9868

With rapid proliferation of radio technology, discontinuous spectrum aggregation and access in a single radio has become conceivable. When the bandwidth of the spectrum fragment is narrow, then spectrum aggregation can be utilized to bundle multiple small fragments in one radio. This can positively improve the efficiency of the spectrum utilization. Though, aggregation of fragmented segments leads to improved spectrum utilization it results in further spectrum fragmentation leading to practical hardware constraints. As a solution, we use the popular memory allocation techniques to perform spectrum aggregation so that further fragmentation can be reduced. We derive at an efficient Spectrum Aggregation Algorithm based on Memory Allocation techniques.


Author(s):  
Haiyan Ye ◽  
Jiabao Jiang

AbstractThe lack of spectrum resources restricts the development of wireless communication applications. In order to solve the problems of low spectrum utilization and channel congestion caused by the static division of spectrum resource, this paper proposes an optimal linear weighted cooperative spectrum sensing for clustered-based cognitive radio networks. In this scheme, different weight values will be assigned for cooperative nodes according to the SNR of cognitive users and the historical sensing accuracy. In addition, the cognitive users can be clustered, and the users with the better channel characteristics will be selected as cluster heads for gathering the local sensing information. Simulation results show that the proposed scheme can obtain better sensing performance, improve the detection probability and reduce the error probability.


Sign in / Sign up

Export Citation Format

Share Document