scholarly journals Uma proposta para a melhoria da descoberta de vizinhos em Redes Cognitivas

Author(s):  
Yngrid Keila Silva Cabral ◽  
Joab De Araújo Silva ◽  
Marcelo Portela Sousa

Several wireless services make use of the spectrum for communication, from space radio communication to a simple wireless computer network. However, the considerable amount of services that make use of spectrum in the last years, has been responsible for its limited availability and inefficiency.. Cognitive networks or cognitive radio networks, are a technology that offer the efficient use of spectrum through opportunistic access to frequency bands. Throughout the cognitive radios scenario, this work will present a variation of the JENNA neighbors discovery algorithm. In addition to that, this research will propose a sensing model for a more efficient approach.

This paper presents a survey on Security Aware Channel Assignment for Cognitive Radio Networks (CRNs). Cognitive networks are networks are the sort of networks which show the attributes of leveraging the channel state information for the utilization of resources such as bandwidth and energy. The major challenge with cognitive systems comprising of cognitive networks is the fact that finding the channel state information with high accuracy is often extremely complex in nature. Moreover, securing such a network against attacks is even more challenging. This paper focuses on contemporary contributions in the field.


2018 ◽  
Vol 7 (2.8) ◽  
pp. 372 ◽  
Author(s):  
D Ganesh ◽  
T Pavan Kumar

Cognitive radio is a promising wireless communication technology that improves spectrum utilization and offers many benefits for internet users. Cognitive radio networks utilizes the available limited resources in a more efficient and flexible way. The main objective of the Cognitive network is to efficiently utilize the unutilized spectrum and meet the demand of the secondary users. some of the important features of cognitive of Cognitive radio networks are dynamic spectrum access, self organizing  and flexibility. As Cognitive radio networks are flexible in nature, it will be effected by various security attacks which in turn affects the performance of the network. Furthermore Cognitive radio networks transmit the spectrum in several licensed bands and it also performs dynamic spectrum allocation. Cognitive radio and Cognitive radio networks are wireless in nature these face conventional attacks. In this survey we address various  attacks in different layers , new threats and challenges that Cognitive networks face, current available solutions to address layer attacks. In addition applications, open problems and future Research challenges are also specified.


2012 ◽  
Vol 2012 ◽  
pp. 1-9 ◽  
Author(s):  
Ammar Zafar ◽  
Mohamed-Slim Alouini ◽  
Yunfei Chen ◽  
Redha M. Radaydeh

Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources.


2011 ◽  
Vol 121-126 ◽  
pp. 3977-3981
Author(s):  
Li Xia Liu ◽  
Gang Hu ◽  
Zhen Huang ◽  
Yu Xing Peng

In wireless cognitive radio networks (CRNs), user will send the sensing data to neighbors for spectrum allocation. Actually only part of data will affect the allocation result. The transmission of unused sensing data isn’t cost-efficient because it consumes a great deal of computing and network resource, especially for CRNs in which the spectrum and power resource is very precious. We propose an improving transmission availability algorithm— SkyChannel Query, which can find the non dominated channels and only transmit information of these channels. The experimental results show the advantages of our algorithm in terms of saving computing resource and improving transmission availability.


2015 ◽  
Vol 9 (7) ◽  
pp. 1017-1025 ◽  
Author(s):  
Kehao Wang ◽  
Lin Chen ◽  
Quan Liu ◽  
Xiaolin Ma ◽  
Fangmin Li

2014 ◽  
Vol 651-653 ◽  
pp. 1941-1944
Author(s):  
Jie Guo ◽  
Da Hai Jing ◽  
Yan Gu

The main task of spectrum sensing in cognitive radio network is to decide whether the primary user is occupying the specific spectrum band or not. So the main purpose of spectrum sensing is to design a detector with better detection performance. This paper studies a spectrum sensing method with clustering under cognitive radio networks. We studied the cooperative spectrum sensing model with clustering by hard fusion rule, and also proposed the simulation model and steps of this cluster-based spectrum sensing problem under Majority rule. Simulation results show that the spectrum sensing method with clustering has better performance than the other methods.


2019 ◽  
Vol 8 (2) ◽  
pp. 4489-4498

Systems administration cognitive radios and hubs from primary system (PS) results in a heterogeneous existing together multi radio remote system, with the goal that critical system throughput addition can be accomplished. Be that as it may, by exploring cognitive radio networks (CRN) engineering, the connections in CRNs are probably not going to help total security check because of connection elements, crafty accessibility, and uni-directional in accessible time window, so trust and reputation system is required. CORE is a reputation based security mechanism which enforces cooperation of nodes in CRN. CONFIDANT is based on selective unselfish and belief in mobile nodes and it aims to detect and isolate misbehaving nodes. Both CORE and CONFIDANT mechanism give the trustworthiness of all mobile nodes in the network and it punishes misbehaving nodes once it detected. This paper gives the comparative study of trust based neighbor monitoring CORE and CONFIDANT on secured routing protocols. The simulation results shows that our work provides better detection efficiency, better detection coverage and packet delivery ratio in routing protocols with neighbor monitoring scheme.


Sign in / Sign up

Export Citation Format

Share Document