Spectrum Access Issues and Security in Cognitive Radio Network

Spectrum Access Issues and Security in Cognitive Radio Network

Mamata Rath
DOI: 10.4018/IJOCI.2019040103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Advanced cognitive radio networks (CRNs) are a promising technology. This network functions to solve the issue of scarcity of the radio spectrum by allocating the idle channels. It also carefully allocates the spectrum to unlicensed users in a balanced approach. The expediency of cognitive radio is highly reliant on fair and efficient supervision of the access to the idle portion of frequency channels. This is mainly executed by the network layer and media access control layer of the internet network model. There are various technical and communication issues while intelligently allocation spectrums to high priority and low priority channels. The current article performs a detailed analysis of such challenging issues and technical feasibility of implementing security measures in CRN applications in a systematic order. So, the problem statement of the current research article is a systematic analysis of channel access issues and their proposed solutions using improved protocols.
Article Preview
Top

1. Introduction

In current technology, the improvement of communication modernization is developing quickly. Regular techniques for communication have been extended to meet the developing requests of interchanges. CRN is generally examined in view of its basic shared characteristic and its capacity to distinguish its environment and to alter its communication parameters, it matches channel variety in time. The cognitive capacity of a cognitive radio makes it conceivable to associate continuously with the earth which it is in. Cognitive radio can decide the suitable communication parameters and adjust to the dynamic radio condition. The channel quality evaluation technique comprises of three sections: SNR forecast, SNR estimation and limit correlation. They are accomplished by Kalman channel, second-and fourth-arrange minutes estimation and mistake likelihood execution examination separately.

Like all other common assets, the recurrence groups for remote communication are additionally constrained. Notwithstanding, the quantity of remote gadgets is expanding quickly and making a dumbfounding interest for more spectrum. The idea of cognitive radio (CR) networks has been proposed to relieve this circumstance with a compelling spectrum sharing strategy. In CR networks, the spectrum band proprietors are called essential clients (PUs) and the unlicensed clients are known as the optional clients (SUs) (Askari et al., 2018). The key thought behind CR networks is that the SUs will utilize the recurrence groups when the PUs are still, however will restore those channels when the PUs are reactivated. In this manner, to recognize a specific PU's ON/OFF express, an SU must detect the comparing channel before getting to it. In this way, CR networks make utilization of the tune in before-talk (LBT) protocol, rather than the customary tune in and-talk (LAT) protocol.

Figure 1.

Cognitive engine architecture

IJOCI.2019040103.f01

Figure1 shows the Cognitive Engine Architecture (Zhang et al., 2018). There are various components of the Engine, which are as follows. Sensing Component that provides radio environment sensing results. REM that provides a snapshot of the radio scenario through time, Main Controller that decides which algorithm to use, Knowledge Reasoner that provides coarse solution, starting point for the Multi-objective Optimizer, Multi-purpose. Optimizer that refines the solution obtained by the CBR. Unmistakably, in CR networks, there are three stages: spectrum detecting, channel distribution and information transmission. After spectrum detecting is played out, the free channels must be assigned to the reasonable SUs for the elite of the network. This requires an effective spectrum administration conspire, which is known as the alleged “channel task issue”. A few calculations and protocols (Rath et al., 2014) have been proposed in the current writing to address this issue. Specifically, the amusement theoretic methodologies have been turned out to be exceptionally productive in settling the irreconcilable situation between the assets and the clients in CR networks.

Coordinating hypothesis-based works in CR networks for spectrum sharing and asset administration has been focused (Chowdhury et al., 2018). A coordinating function is a procedure of mapping the components from two actions of equivalent size to each other. The coordinating of components is dictated by the individual inclination of the applicants from the two sets. It can be effectively surmised that, in CR networks, this idea can be reached out to coordinate the SUs with the channels or the PUs. Subsequently, the coordinating hypothesis can encourage the designation of assets among the clients in the network as per the two gatherings' inclination orders.

Organisation of the article is as follows. Section one describes the introduction part of the subject. Section 2 describes the literature review, section three centers around basic communication difficulties and issues in CRN and segment four features on the security parts of CRN based applications. Finally segment 5 concludes the paper.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022)
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing