cognitive radio technology
Recently Published Documents


TOTAL DOCUMENTS

97
(FIVE YEARS 6)

H-INDEX

11
(FIVE YEARS 0)

2021 ◽  
pp. 1-10
Author(s):  
S. Surekha ◽  
Md. Zia Ur Rahman

In medical telemetry networks, cognitive radio technology is mostly used to avoid licensed spectrum underutilization and by providing access to unlicensed spectrum users without causing interference to primary users, this concept is widely used in development of smart hospitals and smart cities. In medical telemetry networks frequency spectrum concept is used for providing treatment to patients who are far away from hospitals. In cognitive radios, spectrum sensing concept is used in which energy detection method is mostly used because it is simple to implement. While measuring health care environments using cognitive radios probability detection, false alarm probability and threshold parameters are calculated. In this paper for identifying spectrum holes in spectrum sensing using energy detection, distributed diffusion non-negative least mean square algorithm is proposed. It gives better results compared to energy detection concept alone in terms of probability detection converged earlier. If number of nodes are increasing probability detection is decreased from one and move towards left and its SNR is around 1.5-2 dB with proposed method. Hence simulation results give better results in terms of sensing ability while measuring patient condition.



Author(s):  
Ling Li ◽  
Tien-Szu Pan ◽  
Xiao-Xue Sun ◽  
Shu-Chuan Chu ◽  
Jeng-Shyang Pan

AbstractSpectrum has now become a scarce resource due to the continuous development of wireless communication technology. Cognitive radio technology is considered to be a new method to solve the shortage of spectrum resources. The spectrum allocation model of cognitive radio can effectively avoid the waste of spectrum resources. A novel binary version of slime mould algorithm is proposed for the spectrum allocation model to solve the spectrum allocation scheme. In addition, adding unselected factors strategy can make the approach find a better solution. Compared with other algorithms, the novel binary slime mould algorithm and the strategy of adding unselected factors proposed in this paper have a good performance in spectrum allocation. The resulting spectrum allocation scheme can achieve efficient use of network resources.



2021 ◽  
Author(s):  
Nikhil Marriwala ◽  
Himanshu Punj ◽  
Sunita Panda ◽  
Inderjeet Kaur ◽  
Deepak Rathore

Abstract This is the era of Intelligent cognitive radio network technology that provides the available spectrum with efficient utilization. Cognitive Radio technology must promise to allow interference-free spectrum access by users. The paper discusses the several attacks and motives of attacks. The authentication mechanism role to prevent the attacks for hassle-free spectrum utilization is demonstrated. In this paper, resolving the cognitive network security issues by the authentication mechanism and the methods and need of authentication is discussed. This paper addresses the research challenges in the way of securing the cognitive radio network and countermeasures in CRN security strategies. Cognitive radio is an empowering innovation that guarantees to achieve spectrum utilization. In cognitive radio networks, several security threats affect the process of cognitive radio. Spectrum sensing data falsification (SSDF) attack is most disruptive in which the malicious users degrade the decision-making process by sending the false sensing reports to data fusion centres thus preventing honest users from utilizing the spectrum. Hence, security is a very important issue in cognitive radio networks that needs to be addressed for proper utilization of available spectrum by the users. Cognitive radio technology must promise secure spectrum dynamic access to users. In this paper, to counter the SSDF attack, the trust-based security mechanism is demonstrated to authenticate the honest users and it is observed that the proposed framework in the MATLAB environment is efficient and able to detect malicious users. Cognitive radio technology is the strategy applied to the spectrum to make it efficient for wireless communication. The strategy is an intelligent way to access the spectrum as it can learn its environment and make decisions by easy adaptation of operating parameters. The multiple nodes scenario is a good perspective. Software-defined radio is an essential component of cognitive radio Here, secondary users can access the spectrum to primary users whenever their vacant spectrum is available. The initial step is to sense the spectrum available further steps are spectrum decision making, spectrum management, and spectrum mobility. The network is vulnerable to various attacks on spectrum sensing and policy protocols which lead to disturbing functionality of cognitive radio technology. The defence mechanism based on public-key cryptography is proposed in which PU is authenticated by appending signature provided to PU signal. Authentication with a tag to the primary users is another perspective proposed. CRN technology should provide integrity, confidentiality and authenticity to the users.



Spectrum sensing is the key component of cognitive radio technology. But, detection is compromised when a user reports shadowing or fading consequences. In such instances, the customer cannot apprehend between an unexploited band and a profound fade. Hence, communal spectrum sensing is suggested to optimize sensing overall performance. We recognition performance of communal Spectrum Sensing with Selection Diversity Reception in Cognitive Radio. This study presents a simulation evaluation of choice diversity Reception based totally on the fusion rule. The fusion rule is finished at the fusion center (FC) to make the very last selection about the presence of PU. This leads that spectrum sensing is enthusiastically in the presence of Rayleigh.



2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Renuka N. ◽  
Satya Sairam M.

Purpose The tremendous growth of wireless applications and the demand for high data rate, the spectrum utilization improvement has been the most crucial challenges for wireless communication. Adapting cognitive radio with orthogonal frequency division multiplexing or offset quadrature amplitude modulation (OFDM/OQAM) improves the spectrum and energy efficiencies. Design/methodology/approach Thus, it overcomes the spectral leakage problem at the transmitter side and leads to less interference from secondary user (SUs) to primary user (PUs) and between the SUs in cognitive radio technology. The benefit of exploiting pulse shape filtering in the OFDM/OQAM is to not only eliminate the requirement of the guard bands but also reduce the out of band energy transmission, which also improves the spectral isolation from the neighboring systems. But the high peak to average power ratio (PAPR) phenomenon is a common issue in the majority of the multicarrier modulation systems and thus OFDM/OQAM is no exception in this case. Findings Therefore, this paper aims to examine the effect of integrating the Walsh–Hadamard Transform (WHT) on the power spectral density and investigates the problem of PAPR in the WHT/OQAM system. Originality/value Thus, it overcomes the spectral leakage problem at the transmitter side and leads to less interference from SUs to PUs and between the SUs in cognitive radio technology. The benefit of exploiting pulse shape filtering in the OFDM/OQAM is to not only eliminate the requirement of the guard bands but also reduce the out of band energy transmission, which also improves the spectral isolation from the neighboring systems. But the high PAPR phenomenon is a common issue in the majority of the multicarrier modulation systems thus OFDM/OQAM is no exception in this case.



2020 ◽  
Vol 1575 ◽  
pp. 012031
Author(s):  
Xinsheng Zhou ◽  
Lili Zhao ◽  
Pengpeng Yu ◽  
Qicai Dong ◽  
Juan Yang ◽  
...  


Sign in / Sign up

Export Citation Format

Share Document