Cross-Layer Routing Protocol Based on AODV in Cognitive Radio

2013 ◽  
Vol 443 ◽  
pp. 388-391
Author(s):  
Yi Xian Chen

With the rapid development of science and technology, the current spectrum resources cannot simply cope with the high-load wireless networks cross-layer transmission. This thesis is based on the in-depth analysis of cognitive radio technology to understand the routing protocol in wireless cross-layer data transmission, and then discuss the relevant characteristics of the AODV routing protocol, and base on the AODV, the routing protocol uses in the analysis of the radio network organization based on the proposed to the possibility of cross-layer cognitive radio.

2013 ◽  
Vol 336-338 ◽  
pp. 1776-1780 ◽  
Author(s):  
Yi Xian Chen

With the rapid development of science and technology, the current spectrum resources can not simply cope with the high-load wireless networks transmission. In addition, because the use of spectrum resources can not be fully maximize the overload load phenomenon, which leads to the waste of resources and loss of the spectrum, the existing overall spectrum resources are not adequate utilization and its utilization can not be improved. Obviously, in order to meet the growing demand for Internet and wireless communications, we must address the low rate of utilization of spectrum resources To this end, it is proposed to use the spectrum resources in cognitive radio drainage techniques, cognitive radio node to perceive the change of radio spectrum resources, and thus connected in the most appropriate timing and spectral integration, the effect of radio data transmission, and adequately addressed the problem of the spectrum resource low utilization. This thesis is based on the in-depth analysis of cognitive radio technology to understand the routing protocol in wireless cross-layer data transmission, and then discuss the relevant characteristics of the AODV routing protocol, and base on the AODV, the routing protocol uses in the analysis of the radio network organization based on the proposed to the possibility of cognitive radio.


2013 ◽  
Vol 303-306 ◽  
pp. 210-214 ◽  
Author(s):  
Zi Long Jin ◽  
Beom Seok Kim ◽  
Dong Hai Guan ◽  
Jin Sung Cho

The cognitive radio technology has been adopted as a promised solution to deal with overcrowded problem in ISM band. In wireless sensor networks, the cognitive radio technology enables sensor nodes to occupy licensed band in opportunistic manner and introduces advantages of improving spectrum utilization and increasing system throughput. By considering the opportunistic spectrum access nature, in this paper, we aim to provide a stable path selection scheme for cognitive radio sensor networks. The proposed routing protocol utilizes priori delivery information and derives a novel routing metric for the optimal path selection. The routing metric is derived from naïve Bayes inference and used to indicate the path stability by means of delivery probability. We show through extensive simulations that the proposed routing protocol is efficient to find the most probable delivery path and increase the system throughput.


2021 ◽  
Author(s):  
Nikhil Marriwala ◽  
Himanshu Punj ◽  
Sunita Panda ◽  
Inderjeet Kaur ◽  
Deepak Rathore

Abstract This is the era of Intelligent cognitive radio network technology that provides the available spectrum with efficient utilization. Cognitive Radio technology must promise to allow interference-free spectrum access by users. The paper discusses the several attacks and motives of attacks. The authentication mechanism role to prevent the attacks for hassle-free spectrum utilization is demonstrated. In this paper, resolving the cognitive network security issues by the authentication mechanism and the methods and need of authentication is discussed. This paper addresses the research challenges in the way of securing the cognitive radio network and countermeasures in CRN security strategies. Cognitive radio is an empowering innovation that guarantees to achieve spectrum utilization. In cognitive radio networks, several security threats affect the process of cognitive radio. Spectrum sensing data falsification (SSDF) attack is most disruptive in which the malicious users degrade the decision-making process by sending the false sensing reports to data fusion centres thus preventing honest users from utilizing the spectrum. Hence, security is a very important issue in cognitive radio networks that needs to be addressed for proper utilization of available spectrum by the users. Cognitive radio technology must promise secure spectrum dynamic access to users. In this paper, to counter the SSDF attack, the trust-based security mechanism is demonstrated to authenticate the honest users and it is observed that the proposed framework in the MATLAB environment is efficient and able to detect malicious users. Cognitive radio technology is the strategy applied to the spectrum to make it efficient for wireless communication. The strategy is an intelligent way to access the spectrum as it can learn its environment and make decisions by easy adaptation of operating parameters. The multiple nodes scenario is a good perspective. Software-defined radio is an essential component of cognitive radio Here, secondary users can access the spectrum to primary users whenever their vacant spectrum is available. The initial step is to sense the spectrum available further steps are spectrum decision making, spectrum management, and spectrum mobility. The network is vulnerable to various attacks on spectrum sensing and policy protocols which lead to disturbing functionality of cognitive radio technology. The defence mechanism based on public-key cryptography is proposed in which PU is authenticated by appending signature provided to PU signal. Authentication with a tag to the primary users is another perspective proposed. CRN technology should provide integrity, confidentiality and authenticity to the users.


2014 ◽  
Vol 2014 ◽  
pp. 1-13
Author(s):  
Yongli An ◽  
Dong Wang ◽  
Yang Xiao

Cognitive radio technology has received wide attention for its ability to sense and use idle frequency. IEEE 802.22 WRAN, the first to follow the standard in cognitive radio technology, is featured by spectrum sensing and wireless data transmission. As far as wireless transmission is concerned, the availability and implementation of a mature and robust physical layer algorithm are essential to high performance. For the physical layer of WRAN using OFDMA technology, this paper proposes a synchronization algorithm and at the same time provides a public platform for the improvement and verification of that new algorithm. The simulation results show that the performance of the platform is highly close to the theoretical value.


In this paper, a heterogeneous network consists of Device to Device (D2D) communication users and Cognitive Radio (CR) network users are considered. D2D users can communicate through licensed band or unlicensed band. Unlicensed band accessing D2D users are called as D2D-U users. CR users are using the unlicensed band for data transmission and they have the capability to access the licensed band when it is not in use. This proposed system is considering D2D-U users and Wi-Fi users in a local geographical area and applying scheduling technique for both to access the licensed band without affecting the licensed user’s transmission. The proposed system evaluated the data sum rate against number of user. The simulation results are generated and discussed


Sign in / Sign up

Export Citation Format

Share Document