On the Performance of Cooperative Spectrum Sensing of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments

نویسندگان

  • Wasan Kadhim Saad
  • Mahamod Ismail
  • Rosdiadee Nordin
  • Ayman A. El-Saleh
چکیده

| PDF (1174 Kbytes) ■ Sub-channel Allocation Based on Multi-level Priority in OFDMA Systems 1876 1889 JongChan Lee, MoonHo Lee Abstract | PDF (562 Kbytes) ■ Robust Backup Path Selection in Overlay Routing with Bloom Filters 1890 1910 http://www.itiis.org/tiis/content_view_articles.jsp?vol=0&userid= 1 -> 3 08.09.2013 13:58 Xiaolei Zhou, Deke Guo, Tao Chen and Xueshan Luo Abstract | PDF (1483 Kbytes) ■ From WiFi to WiMAX: Efficient GPU-based Parameterized Transceiver across Different OFDM Protocols 1911 1932 Rongchun Li, Yong Dou, Jie Zhou, Baofeng Li and Jinbo Xu Abstract | PDF (1206 Kbytes) ■ Realistic and Efficient Radio Propagation Model for V2X Communications 1933 1954 Rashid Hafeez Khokhar, Tanveer Zia, Kayhan Zrar Ghafoor, Jaime Lloret and Muhammad Shiraz Abstract | PDF (1565 Kbytes) ■ Joint Relay Selection and Power Allocation 1955 1971 Sijia Lou , Longxiang Yang Abstract | PDF (925 Kbytes)| PDF (925 Kbytes) [Multimedia] ■ No published papers in this Issue. [Internet Security] ■ Provably Secure Forward Secure Certificateless Proxy Signature Scheme 1972 1988 Jiguo Li, Yanqiong Li and Yichen Zhang Abstract | PDF (826 Kbytes) ■ RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing 1989 2009 Zhiqiang Wang, Yuqing Zhang and Qixu Liu Abstract | PDF (935 Kbytes) ■ An Efficient Biometric Identity Based Signature Scheme 2010 2026 Yang Yang, Yupu Hu and Leyou Zhang Abstract | PDF (886 Kbytes)| PDF (886 Kbytes) ■ A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy 2027 2041 Chuan Qin, Chin-Chen Chang and Yen-Chang Chen Abstract | PDF (694 Kbytes) ■ HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks 2042 2060 Rong Jiang, Jun Luo and Xiaoping Wang Abstract | PDF (874 Kbytes)| PDF (874 Kbytes) ■ A New Roaming Authentication Framework For Wireless Communication 2061 2080 Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao and Qianqian Zhao http://www.itiis.org/tiis/content_view_articles.jsp?vol=0&userid= 2 -> 3 08.09.2013 13:58 Abstract | PDF (698 Kbytes)| PDF (698 Kbytes) ● The TIIS journal is supported and funded by the National Research Foundation under the Ministry of Education, Science and Technology (MEST) and the Korean Federation of Science and Technology Societies (KOFST), the Korean government. This journal has been selected as an outstanding international journal by the MEST, the Korean government since 2009. Other Issues (Open Access) Year 2010 (Volume 4) Year 2009 (Volume 3) Year 2008 (Volume 2) Year 2007 (Volume 1) ● Issue 1 (February) ● Issue 1 (February) ● Issue 1 (Feb. 25) ● Issue 1 (Dec. 25) ● Issue 2 (April) ● Issue 2 (April) ● Issue 2 (Apr. 25) ● Issue 3 (June) ● Issue 3 (June) ● Issue 3 (Jun. 25) ● Issue 4 (August) ● Issue 4 (August) ● Issue 4 (Aug. 25) ● Issue 5 (October) ● Issue 5 (October) ● Issue 5 (Oct. 25) ● Issue 6 (December) ● Issue 6 (December) ● Issue 6 (Dec. 25) Year 2014 (Volume 8) Year 2013 (Volume 7) Year 2012 (Volume 6) Year 2011 (Volume 5) ● Issue 1 (January) ● Issue 1 (January) ● Issue 1 (January) ● Issue 1 (January) ● Issue 2 (February) ● Issue 2 (February) ● Issue 2 (February) ● Issue 2 (February) ● Issue 3 (March) ● Issue 3 (March) ● Issue 3 (March) ● Issue 3 (March) ● Issue 4 (April) ● Issue 4 (April) ● Issue 4 (April) ● Issue 4 (April) ● Issue 5 (May) ● Issue 5 (May) ● Issue 5 (May) ● Issue 5 (May) ● Issue 6 (June) ● Issue 6 (June) ● Issue 6 (June) ● Issue 6 (June) ● Issue 7 (July) ● Issue 7 (July) ● Issue 7 (July) ● Issue 7 (July) ● Issue 8 (August) ● Issue 8 (August) ● Issue 8 (August) ● Issue 8 (August) ● Issue 9 (September) ● Issue 9 (September) ● Issue 9 (September) ● Issue 9 (September) ● Issue 10 (October) ● Issue 10 (October) ● Issue 10 (October) ● Issue 10 (October) ● Issue 11 (November) ● Issue 11 (November) ● Issue 11 (November) ● Issue 11 (November) ● Issue 12 (December) ● Issue 12 (December) ● Issue 12 (December) ● Issue 12 (December) http://www.itiis.org/tiis/content_view_articles.jsp?vol=0&userid= 3 -> 3 08.09.2013 13:58 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 7, NO. 8, Aug. 2013 1805 Copyright c 2013 KSII This work was supported by Sakarya University Scientific Research Foundation (Project Number: 2012-50-02-002). http://dx.doi.org/10.3837/tiis.2013.08.004 isMAC: An Adaptive and Energy-Efficient MAC Protocol Based on Multi-Channel Communication for Wireless Body Area Networks Ismail Kirbas 1 , Alper Karahan 2 , Abdullah Sevin 1 and Cuneyt Bayilmis 1 Department of Computer Engineering, Technology Faculty, Sakarya University Sakarya Turkey [e-mail: [email protected], [email protected], [email protected]] Department of Electronics and Computer Education, Technical Education Faculty, Kocaeli University Kocaeli Turkey [e-mail: [email protected]] *Corresponding author: Ismail Kirbas Received February 20, 2013; revised April 30, 2013; revised June 24, 2013; accepted July 20, 2013; published August 30, 2013

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

Cooperative Spectrum Sensing over Rayleigh Fading Channel in Cognitive Radio

Cognitive radio is a novel technology that can potentially improve the utilization efficiency of the radio spectrum. Spectrum sensing is the key component of cognitive radio technology. However, detection is compromised when a user experiences shadowing or fading effects. In such cases, user cannot distinguish between an unused band and a deep fade. Thus, cooperative spectrum sensing is propose...

متن کامل

Energy Detection Based Spectrum Sensing Performance Evaluations in Cooperating Cognitive Radio Networks Ireyuwa

The ever growing wireless technologies has put a lot of demand on the usage of available spectrum, thus leading to spectrum underutilization and scarcity. To address this issue and improve spectrum utilization gave rise to the concept of the cognitive radio. The cognitive radio is known to enhance the utilization of spectrum of where a secondary user can utilize the spectrum of the primary user...

متن کامل

A Performance Study of Energy Detection Based Spectrum Sensing for Cognitive Radio Networks

This study evaluates the performance of the energy detection based spectrum sensing technique in noisy and fading environments. Both single user detection and cooperative detection situations were investigated. Closed form solutions for the probabilities of detection and false alarm were derived. Analytical results were verified by numerical computations using Monte Carlo method in MATLAB. The ...

متن کامل

Improved Detection Performance of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments

Cognitive radios (CRs) have been recently emerging as prime candidates to enhance spectral efficiency by exploiting spectrum-aware systems which can reliably monitor licensed users’ activities. CR users monitor such activities by performing spectrum sensing to detect potential white spaces. However, this process of local sensing might be a challenging task in fading environments. The inefficien...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • TIIS

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2013