Performance Evaluation of Geolocation Based Opportunistic Spectrum Access in Cloud-Assisted Cognitive Radio Networks

Author(s):  
Swetha Reddy ◽  
Isaac Cushman ◽  
Danda B. Rawat ◽  
Min Song

The popularity of cloud-assisted database-driven cognitive radio network (CRN) has increased significantly due to three main reasons; reduced sensing uncertainties (caused by the use of spectrum scanning and sensing techniques), FCC mandated use of a database for storing and utilizing idle channels, and leveraging cloud computing platform to process big data generated by wideband sensing and analyzing. In database-driven CRN, secondary users periodically query the database to find idle channels for opportunistic communications where secondary users use their geolocation (with the help of Global Positioning System - GPS) to find idle channels for given location and time. Use of GPS makes the overall CRN vulnerable where malicious users falsify their geolocations through GPS spoofing to find more channels. The other main drawback of GPS is estimation error while finding location of users and idle bands. Due to this there will be probability of misdetection and false alarm which will have its effect on overall performance and efficiency of the system. In this paper, the authors present a three-stage mechanism for detecting GPS spoofing attacks using angle of arrival, received signal strength and time of arrival. They also evaluate the probability of misdetection and probability of false alarm in this system while detecting location of secondary users. The authors evaluate the performance of the proposed approach using numerical results.

2018 ◽  
Vol 14 (09) ◽  
pp. 190 ◽  
Author(s):  
Shewangi Kochhar ◽  
Roopali Garg

<p>Cognitive Radio has been skillful technology to improve the spectrum sensing as it enables Cognitive Radio to find Primary User (PU) and let secondary User (SU) to utilize the spectrum holes. However detection of PU leads to longer sensing time and interference. Spectrum sensing is done in specific “time frame” and it is further divided into Sensing time and transmission time. Higher the sensing time better will be detection and lesser will be the probability of false alarm. So optimization technique is highly required to address the issue of trade-off between sensing time and throughput. This paper proposed an application of Genetic Algorithm technique for spectrum sensing in cognitive radio. Here results shows that ROC curve of GA is better than PSO in terms of normalized throughput and sensing time. The parameters that are evaluated are throughput, probability of false alarm, sensing time, cost and iteration.</p>


2021 ◽  
Vol 10 (4) ◽  
pp. 2046-2054
Author(s):  
Mohammed Mehdi Saleh ◽  
Ahmed A. Abbas ◽  
Ahmed Hammoodi

Due to the rapid increase in wireless applications and the number of users, spectrum scarcity, energy consumption and latency issues will emerge, notably in the fifth generation (5G) system. Cognitive radio (CR) has emerged as the primary technology to address these challenges, allowing opportunist spectrum access as well as the ability to analyze, observe, and learn how to respond to environmental 5G conditions. The CR has the ability to sense the spectrum and detect empty bands in order to use underutilized frequency bands without causing unwanted interference with legacy networks. In this paper, we presented a spectrum sensing algorithm based on energy detection that allows secondary user SU to transmit asynchronously with primary user PU without causing harmful interference. This algorithm reduced the sensing time required to scan the whole frequency band by dividing it into n sub-bands that are all scanned at the same time. Also, this algorithm allows cognitive radio networks (CRN) nodes to select their operating band without requiring cooperation with licensed users. According to the BER, secondary users have better performance compared with primary users.


Author(s):  
Sylwia Romaszko ◽  
Petri Mähönen

In the case of Opportunistic Spectrum Access (OSA), unlicensed secondary users have only limited knowledge of channel parameters or other users' information. Spectral opportunities are asymmetric due to time and space varying channels. Owing to this inherent asymmetry and uncertainty of traffic patterns, secondary users can have trouble detecting properly the real usability of unoccupied channels and as a consequence visiting channels in such a way that they can communicate with each other in a bounded period of time. Therefore, the channel service quality, and the neighborhood discovery (NB) phase are fundamental and challenging due to the dynamics of cognitive radio networks. The authors provide an analysis of these challenges, controversies, and problems, and review the state-of-the-art literature. They show that, although recently there has been a proliferation of NB protocols, there is no optimal solution meeting all required expectations of CR users. In this chapter, the reader also finds possible solutions focusing on an asynchronous channel allocation covering a channel ranking.


2016 ◽  
Vol 8 (2) ◽  
pp. 94-110
Author(s):  
Danda B. Rawat ◽  
Sachin Shetty

Opportunistic Spectrum Access (OSA) in a Cognitive Radio Network (CRN) is regarded as emerging technology for utilizing the scarce Radio Frequency (RF) spectrum by allowing unlicensed secondary users (SUs) to access licensed spectrum without creating harmful interference to primary users (PUs). The SUs are considerably constrained by their limited power, memory and computational capacity when they have to make decision about spectrum sensing for wide band regime and OSA. The SUs in CRN have the potential to mitigate these constraints by leveraging the vast storage and computational capacity of cloud computing approaches. In this paper, the authors investigate a game theoretic approach for opportunistic spectrum access in cognitive networks. The proposed algorithm leverages the geo-locations of both SUs and spectrum opportunities to facilitate OSA to SUs. The active SUs using game theory adapt their transmit powers in a distributed manner based on the estimated average packet-error rate while satisfying the Quality-of-Service (QoS) in terms of signal-to-interference-noise-ratio (SINR). Furthermore, to control greedy SUs in distributed power control game, the authors introduce a manager/leader through a Stackelberg power adaptation game. The performance of the proposed approaches is investigated using numerical results obtained from simulations.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 995 ◽  
Author(s):  
Zeng ◽  
Liu ◽  
Wang ◽  
Lan

In the cognitive radio network (CRN), secondary users (SUs) compete for limited spectrum resources, so the spectrum access process of SUs can be regarded as a non-cooperative game. With enough artificial intelligence (AI), SUs can adopt certain spectrum access strategies through their learning ability, so as to improve their own benefit. Taking into account the impatience of the SUs with the waiting time to access the spectrum and the fact that the primary users (PUs) have preemptive priority to use the licensed spectrum in the CRN, this paper proposed the repairable queueing model with balking and reneging to investigate the spectrum access. Based on the utility function from an economic perspective, the relationship between the Nash equilibrium and the socially optimal spectrum access strategy of SUs was studied through the analysis of the system model. Then a reasonable spectrum pricing scheme was proposed to maximize the social benefits. Simulation results show that the proposed access mechanism can realize the consistency of Nash equilibrium strategy and social optimal strategy to maximize the benefits of the whole cognitive system.


2014 ◽  
Vol 643 ◽  
pp. 105-110
Author(s):  
Yuan Li ◽  
Jia Yin Chen ◽  
Xiao Feng Liu ◽  
Ming Chuan Yang

Aiming at the situation where the double-threshold detection has been widely used without complete mathematical proof and condition of application, this paper proves its correctness under the circumstance of spectrum sensing, and circulates the condition where this method can work. The proof and simulation show that, comparing with traditional energy detection, this method can increase the probability of detection by 27% to 42% at most when the SNR is between-15dB and-2dB, while the probability of false alarm is increased by less than 2%.


Author(s):  
Natarajan Meghanathan

A cognitive radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. CRs support dynamic spectrum access and can facilitate a secondary unlicensed user to efficiently utilize the available underutilized spectrum allocated to the primary licensed users. A cognitive radio network (CRN) is composed of both the secondary users with CR-enabled radios and the primary users whose radios need not be CR-enabled. In this chapter, the authors provide an exhaustive analysis of the issues and the state-of-the-art literature solutions available with regards to the following four layers of the TCP/IP protocol layer stack, in the context of CRNs: physical layer (spectrum sensing), medium access control, routing, and transport layers. We discuss the various techniques/mechanisms/protocols that have been proposed for each of these four layers, in the context of CRNs. In addition to the above, we discuss in detail several security attacks that could be launched on CRNs and the countermeasure solutions that have been proposed to avoid or mitigate them. This chapter serves as a good comprehensive review and analysis of all the critical aspects for CRNs, and would lay a strong foundation for someone to further delve onto any particular aspect in greater depth.


Sign in / Sign up

Export Citation Format

Share Document