Cognitive Radio Network-Based Design and Security Challenges in 5G Communication

Cognitive Radio Network-Based Design and Security Challenges in 5G Communication

Arvind Dhaka, Amita Nandal, Rahul Dixit
DOI: 10.4018/978-1-5225-9554-0.ch009
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter deals with the main development challenges of 5G network. The 5G terminals can be made as reconfigurable multimode and cognitive radio enabled. Such networks will have software defined radio modulation schemes. The 5G mobile networks will focus on the development of the user terminals where the terminals will have access to different wireless technologies at the same time and will combine different flows from different technologies. It is beneficial to deploy cloud-computing platforms running on general-purpose hardware, leading to a cloud-RAN system. This chapter is focused on the challenges and benefits of implementing reconfigurable signal processing algorithms on a cloud-computing platform and address various security issues with cognitive radio networks.
Chapter Preview
Top

Introduction

The mobile device has become more than a communication device in modern world so that the computation and communication are ready to serve the user in an intelligent way. Intelligent mobile devices can create a new platform that enables ubiquitous sensing, computing, and communication (Nekovee, 2010; Haykin, 2005). This chapter explores future mobile systems with emphasis on reconfigurability based on cognitive and software defined radios (SDR) (http://www.ieee802.org/21/ - IEEE 802.21: Media Independent Handover). The investigations are focused on a 5G (Fifth Generation) network architecture consisting of reconfigurable multi-technology core and a single fully reconfigurable terminal able to autonomously operate in different heterogeneous access networks. This network can be enforced by nanotechnology, cloud computing and all IP Platforms. As a long-term goal, it is beneficial to deploy cloud-computing platforms. This chapter is focused on the challenges and benefits of implementing reconfigurable signal processing algorithms on a cloud-computing platform and have addressed various security issues with cognitive radio networks (CRN) (Sun, 2008; IEEE Communication Society, Patent No. P802.22, 2011; Ghasemi, 2008; Akyildiz, 2008). This chapter deals with cognitive radio access networks with recent approaches for 5G such as massive multiple-input, multiple-output (MIMO) and multiple radio access technologies. With the development in nanotechnology, the mobile phones can act as intelligent sensors that have applications in many industries such as transportation, communications, medicine and safety. Nanotechnology will have considerable impacts on both mobile device as well as core network as follows:

  • The mobile device has become more than a communication device in modern world; computation and communication are ready to serve the user in an intelligent way. Mobile devices together with the intelligence, embedded in human environments, will create a new platform that enables ubiquitous sensing, computing, and communication. With nanotechnology mobile phones can act as intelligent sensors that have applications in many industries, among them transportation, communications, medicine and safety.

  • The core network requires high speed and a reliable capacity to manipulate and interoperate increasing number of heterogeneous access technologies. At present, nanotechnologies are used in Digital Signal Processing (DSP) Fabrication, introducing new perceptions in DSP designing that increases the overall system speed & capacity using FPGA.

Cloud Computing models a convenient, on-demand network access to a shared pool of configurable computing resources. However, it makes the client data and computation vulnerable to attacks from potential threats as well as from untrusted system administrator. Many trials have been done to address the security concerns in cloud computing but not too much help came around, since using traditional CPU based system, fabrication of these computing nodes is not possible. This chapter explores the concept of effectively using cloud computing platforms to engineer a lithe trusted computing platform by generating a smaller attack surface. Moreover this chapter present a unique practical substitute to imitate the efficient performance within the cloud infrastructure. In a rather smaller but much effective computing platform, CRN aid us in building a defensive system that can verify various forms of attacks, much better than showcased by the software versions. Software-based models do not have the flexibility to check the attack models, as is feasible in hardware-based system.

Complete Chapter List

Search this Book:
Reset