Analysis on Communication Performance for Secondary Users Classified in Cognitive Radio Networks

2012 ◽  
Vol 271-272 ◽  
pp. 668-673
Author(s):  
Shan Shan Wang ◽  
Xing Guo Luo ◽  
Bai Nan Li

Cognitive Radio Networks is an effective technology and a hot research direction which can solve the problem of deficient resource and revolutionize utilization. In order to enhance the communication efficiency, secondary users are classified by some strategy. We exploit the queuing theory model to research on the communication performance of secondary users, considering primary user as the first grade user and secondary users as other grades users. The research results indicate that the users which have lower priority level are more sensitive than those have higher priority level when primary user appears. Under Primary User Emulation Attack (PUEA), if the number of secondary users reaches 300, the waiting time would larger than 15 minutes. And if the appearance rate of PUEA reaches 4, the break-out rate would be 80%, which is much harmful for CRN.

Author(s):  
Monisha Ravi ◽  
Nisha Ravi ◽  
N. Ravi

Recently, the expansive growth of wireless services, regulated by governmental agencies assigning spectrum to licensed users, has led to a shortage of radio spectrum. Since the FCC (Federal Communications Commissions) approved unlicensed users to access the unused channels of the reserved spectrum, new research areas seeped in, to develop Cognitive Radio Networks (CRN), in order to improve spectrum efficiency and to exploit this feature by enabling secondary users to gain from the spectrum in an opportunistic manner via optimally distributed traffic demands over the spectrum, so as to reduce the risk for monetary loss, from the unused channels. However, Cognitive Radio Networks become vulnerable to various classes of threats that decrease the bandwidth and spectrum usage efficiency. Hence, this survey deals with defining and demonstrating framework of one such attack called the Primary User Emulation Attack and suggests preventive Sensing Protocols to counteract the same. It presents a scenario of the attack and its prevention using Network Simulator-2 for the attack performances and gives an outlook on the various techniques defined to curb the anomaly.


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
H. F. Al-Doseri ◽  
M. A. Mangoud

One of the main challenges in cognitive radio networks is the ability of secondary users to detect the primary user presence with high probability of detection. In previous research, optimizing cooperative sensing in cognitive radio networks is performed for either a targeted probability of detection or a false alarm. After setting one of the probabilities as an optimization constraint, the other is optimized. In this paper, a guaranteed constant throughput at the secondary users is introduced as a target while optimizing probability of detection for cooperative sensing. Both sensing time values and number of cooperated cognitive radio secondary users are investigated to maximize the probability of detection of primary user. AND and OR hard decision schemes are considered and compared with soft decision scheme which is weighted modified deflection coefficient scheme (W-MDC). It is illustrated that cooperation of all users and utilizing full frames for sensing time will not provide maximum probability of detection. A tradeoff between performances of cognitive radio networks with and without optimization is presented. The effects of varying network sizes, normalized target throughput, maximum frame duration times, and received signal-to-noise ratio at the fusion center are investigated for different fusion rules.


2021 ◽  
Vol 36 (1) ◽  
pp. 73-79
Author(s):  
Mahmoud Ali Ammar

In Cognitive Radio Networks (CRN), the main aim is to allow the secondary users (SUs) to identify the empty bands and use them to transmit or receive data opportunistically. Primary users (PUs) have the priority to use a channel, while the secondary users must vacant this channel once a primary user requests it. An attack known in cognitive radio networks as a Primary User Emulation Attack (PUEA) aims to prevent the SU from using the empty bands. In this paper, an analytical and experimental approach is presented to mitigate the PUEA. This approach is based on obtaining the Probability Density Functions (PDFs) of the received powers at the secondary users from malicious nodes and also from the primary transmitter in the cognitive network. Then, these obtained PDFs are used in Neyman-Pearson composite hypothesis test to measure the performance metrics (probability of false alarm and miss detection in the network). The results proved that the performance metrics were greatly influenced by the network area, where the secondary user is located, and the threshold value λ used in the decision rule. Also, there are boundaries for the λ choices that cannot be overtaken.


Author(s):  
S. A. Adebo ◽  
E. N. Onwuka ◽  
A. U. Usman ◽  
A. J. Onumanyi

Primary user emulator (PUE) attack occurs in Cognitive Radio Networks (CRNs) when a malicious secondary user (SU) poses as a primary user (PU) in order to deprive other legitimate SUs the right to free spectral access for opportunistic communication. In most cases, these legitimate SUs are unable to effectively detect PUEs because the quality of the signals received from a PUE may be severely attenuated by channel fading and/or shadowing. Consequently, in this paper, we have investigated the use of cooperative spectrum sensing (CSS) to improve PUE detection based on a hybrid localization scheme. We considered different pairs of secondary users (SUs) over different received signal strength (RSS) values to evaluate the energy efficiency, accuracy, and speed of the new cooperative scheme. Based on computer simulations, our findings suggest that a PUE can be effectively detected by a pair of SUs with a low Root Mean Square Error rate of 0.0047 even though these SUs may have close RSS values within the same cluster. Furthermore, our scheme performs better in terms of speed, accuracy and low energy consumption rates when compared with other PUE detection schemes. Thus, it is a viable proposition to better detect PUEs in CRNs.


2017 ◽  
Vol 10 (04) ◽  
pp. 765-772 ◽  
Author(s):  
Nisar Lala ◽  
Altaf Balkhi ◽  
G M Mir

Cognitive radio (CR) is a promising solution to improve the spectrum utilization by enabling unlicensed users to exploit the spectrum in an opportunistic manner. Spectrum handoff is a different type of handoff in CR necessitated by the reappearance of primary user (PU) in the licensed band presently occupied by the secondary users (SUs). Spectrum handoff procedures aim to help the SUs to vacate the occupied licensed spectrum and find suitable target channel to resume the unfinished transmission. The purpose of spectrum mobility management in cognitive radio networks is to make sure that the transitions are made smoothly and rapidly such that the applications running on a cognitive user perceive minimum performance degradation during a spectrum handoff. In this paper, we will survey the literature on spectrum handoff in cognitive radio networks.


2013 ◽  
Vol 336-338 ◽  
pp. 1650-1655
Author(s):  
Yuan Gao ◽  
Chang Ping Zhu ◽  
Yi Bin Tamg

For improving the spectrum hole utilization in cognitive radio networks, two-way relaying is used in this paper to assist two secondary users in exchanging information. The 2-step and 3-step two-way relaying models are respectively discussed with imperfect spectrum sensing. Moreover, the closed-form expressions of outage probability for the two models are derived with a primary user protection constraint. Simulation shows that 3-step model outperforms 2-step in terms of the outage performance.


2018 ◽  
Vol 7 (4.20) ◽  
pp. 12
Author(s):  
Krishna Chaitanya K ◽  
Meghalatha CK ◽  
Annapurna K ◽  
Seetha Ramanjaneyulu B

Opportunistic channel accessing and handoff mechanisms are crucial for the successful implementation of cognitive radio networks that depend on vacant channel frequencies of TV white spaces and other primary users. In this work, two such mechanisms that enable quick accessing of vacant channels and cause less interference to primary users are proposed. In these methods, combination of database information and local sensing of channels is used, to know about available vacant channels. If the primary user of incumbent channel returns, the secondary user moves to another vacant channel that is found to be free after scanning. Information from database can be used to speed up the process by limiting the scanning to few probable channels, instead of searching for all. The results show that these methods offer quick handoff of secondary users and cause less interference to primary users.  


2018 ◽  
Vol 232 ◽  
pp. 01048 ◽  
Author(s):  
Fan Gu ◽  
Xianwei Li ◽  
Liang Zhao ◽  
Haiyang Zhang ◽  
Xiaoying Yang

In this paper, we investigate the problem of spectrum allocation in Cognitive Radio Networks (CRNs) where a primary user (PU) leases its idle spectrums to a number of secondary users (SUs) who may have different willing to pay for these spectrums. For the PU, its main objective is to gain profit from selling the idle spectrums, and from the perspective of the Sus, they aim to maximize their utility from using spectrums. We model the interaction between the PU and SUs as a two-stage Stackelberg game, where the PU sets the prices for its spectrum in the first stage, and SUs make their spectrum demands decisions in the second stage. We use the backward induction method to solve this game. The numerical results show that the proposed solution method can increase revenue of the PU compared with the uniform pricing scheme.


Sign in / Sign up

Export Citation Format

Share Document