Interference Modeling and Analysis in Cognitive Radio Networks

2013 ◽  
Vol 4 (4) ◽  
pp. 1-15
Author(s):  
Yanxiao Zhao ◽  
Bighnaraj Panigrahi ◽  
Kazem Sohraby ◽  
Wei Wang

Cognitive radio networks (CRNs) have received considerable attention and viewed as a promising paradigm for future wireless networking. Its major difference from the traditional wireless networks is that secondary users are allowed to access the channel if they pose no harmful interference to primary users. This distinct feature of CRNs has raised an essential and challenging question, i.e., how to accurately estimate interference to the primary users from the secondary users? In addition, spectrum sensing plays a critical role in CRNs. Secondary users have to sense the channel before they transmit. A two-state sensing model is commonly used, which classifies a channel into either busy or idle state. Secondary users can only utilize a channel when it is detected to be in idle state. In this paper, we tackle the estimation of interference at the primary receiver due to concurrently active secondary users. With the spectrum sensing, secondary users are refrained from transmitting once an active user falls into their sensing range. As a result, the maximum number of simultaneously interfering secondary users is bounded, typically ranging from 1 to 4. This significant conclusion considerably simplifies interference modeling in CRNs. The authors present all the cases with possible simultaneously interfering secondary users. Moreover, the authors derive the probability for each case. Extensive simulations are conducted and results validate the effectiveness and accuracy of the proposed approach.

2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Suneetha Ch ◽  
Srinivasa Rao S ◽  
K.S. Ramesh

PurposeElectronic devices aid communication during new communication phases and the scope of cognitive radio networks has changed communication paradigms through efficient use of spectrums. The communication prototype of cognitive radio networks defines user roles as primary user and secondary user in the context of the spectrum allocation and use. The users who have licensed authority of the spectrum are denoted as primary users, while other eligible users who access the corresponding spectrum are secondary users.Design/methodology/approachThe multiple factors of transmission service quality can have a negative influence due to improper scheduling of spectrum bands between primary users and secondary users. There are considerable contributions in contemporary literature concerning spectrum band scheduling under spectrum sensing. However, the majority of the scheduling models are intended to manage a limited number of transmission service quality factors. Moreover, these service quality factors are functional and derived algorithmically from the current corresponding spectrum. However, there is evidence of credible performance deficiency regarding contemporary spectrum sensing methodsFindingsThis article intends to portray a fuzzy guided integrated factors-based spectrum band sharing within the spectrum used by secondary users. This study attempts to explain the significance of this proposal compared to other contemporary models.Originality/valueThis article intends to portray a fuzzy guided integrated factors-based spectrum band sharing within the spectrum used by secondary users. This study attempts to explain the significance of this proposal compared to other contemporary models.


Author(s):  
K. Annapurna ◽  
B. Seetha Ramanjaneyulu

Satisfying the Quality of Service (QoS) is often a challenge in cognitive radio networks, because they depend on opportunistic channel accessing. In this context, appropriate pricing of vacant channels that is linked to the preference in their allocation, is found to be useful. However, ambiguity on the possible price at which the channel would be allotted is still a concern. In this work, an auction mechanism in which maximum value of the bid is predefined is proposed. With this, users quote their bid values as per their needs of getting the channels, up to the predefined maximum allowed bid price. However, final price of allocation is decided based on the sum total demand from all the users and the availability of vacant channels. Performance of the system is found in terms of blocking probabilities of secondary users and revenues to primary users. The proposed system is found to yield similar quantum of revenues as that of the Generalized Second Price (GSP) auction, while offering much lesser blocking probabilities to high-priority users to satisfy their QoS requirements.


Author(s):  
Miguel Tuberquia ◽  
Hans Lopez-Chavez ◽  
Cesar Hernandez

Cognitive radio is a technique that was originally created for the proper use of the radio electric spectrum due its underuse. A few methods were used to predict the network traffic to determine the occupancy of the spectrum and then use the ‘holes’ between the transmissions of primary users. The goal is to guarantee a complete transmission for the second user while not interrupting the trans-mission of primary users. This study seeks the multifractal generation of traffic for a specific radio electric spectrum as well as a bio-inspired route estimation for secondary users. It uses the MFHW algorithm to generate multifractal traces and two bio-inspired algo-rithms: Ant Colony Optimization and Max Feeding to calculate the secondary user’s path. Multifractal characteristics offer a predic-tion, which is 10% lower in comparison with the original traffic values and a complete transmission for secondary users. In fact, a hybrid strategy combining both bio-inspired algorithms promise a reduction in handoff. The purpose of this research consists on deriving future investigation in the generation of multifractal traffic and a mobility spectrum using bio-inspired algorithms.


Author(s):  
Saed Alrabaee ◽  
Mahmoud Khasawneh ◽  
Anjali Agarwal

Cognitive radio technology is the vision of pervasive wireless communications that improves the spectrum utilization and offers many social and individual benefits. The objective of the cognitive radio network technology is to use the unutilized spectrum by primary users and fulfill the secondary users' demands irrespective of time and location (any time and any place). Due to their flexibility, the Cognitive Radio Networks (CRNs) are vulnerable to numerous threats and security problems that will affect the performance of the network. Little attention has been given to security aspects in cognitive radio networks. In this chapter, the authors discuss the security issues in cognitive radio networks, and then they present an intensive list of the main known security threats in CRN at various layers and the adverse effects on performance due to such threats, and the current existing paradigms to mitigate such issues and threats. Finally, the authors highlight proposed directions in order to make CRN more authenticated, reliable, and secure.


2011 ◽  
Vol 219-220 ◽  
pp. 961-964
Author(s):  
Li Na Wang

In this paper, we investigated the problem of spectrum sensing to identify primary users in cognitive radio networks. And then we proposed a sequential spectrum sensing scheme based on distance vector. A reliable factor was introduced into the sequential spectrum sensing scheme. This factor was related to distance and could determine the reliability of individual local decision. Simulation results show that the proposed spectrum sensing scheme can provide better performance, and the probability of sensing error can be reduced to 3% compared to the SPRT scheme.


Sign in / Sign up

Export Citation Format

Share Document