Blind Spectrum Sensing Techniques for Cognitive Radio System

نویسنده

  • Jaekwon Lee
چکیده

As the mobile communication environments grow rapidly, much attention has been paid on the use of spectrum resources. Recently, a new technology called Cognitive Radio (CR) was developed for using the unused spectrum bands efficiently. In the CR system, one possible way to locate these unused spectrum bands is to use so-called spectrum sensing. This technique, however, should be computationally simple and fast in order to catch up with the changing signal parameters. In this paper, we propose a cyclostationary feature based detection technique for spectrum sensing. To improve spectrum sensing performance, the proposed spectrum sensing technique computes the circular correlation of received signal before the cyclostationary feature based detection. Simulation results show that the proposed spectrum sensing technique provides better spectrum sensing performance than cyclostationary feature based detection technique even in the low SNR environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

A Novel Framework for Spectrum Sensing in Cognitive Radio Networks

Cognitive radio (CR) is a key solution for the problem of inefficient usage of spectral resources. Spectrum sensing in each CR aims at detecting whether a preassigned spectrum band is occupied by a primary user or not. Conventional techniques do not allow the CR to communicate with its own base station during the spectrum sensing process. So, only a part of the frame can be used for cognitive d...

متن کامل

Spectrum Sensing for Cognitive Radio Systems Through Primary User Activity Prediction

Traditional spectrum sensing techniques such as energy detection, for instance, can sense the spectrum only when the cognitive radio (CR) is not in operation. This constraint is relaxed recently by some blind source separation techniques in which the CR can operate during spectrum sensing. The proposed method in this paper uses the fact that the primary spectrum usage is correlated across time ...

متن کامل

Blind Source Separation-based Full-Duplex Cognitive Radio

Full-Duplex has been emerged in Cognitive Radio Network in order to avoid the silence period of the Secondary User (SU) during the Spectrum Sensing. SU should monitor the Primary User (PU) activities in order to avoid any harmful interference. The conventional Full-Duplex Cognitive Radio (FDCR) systems are based on the Self-Interference Cancellation, where a problem of Residual Self-Interferenc...

متن کامل

Spectrum Assignment in Cognitive Radio Networks Using Fuzzy Logic Empowered Ants

The prevalent communications networks suffer from lack of spectrum and spectrum inefficiency. This has motivated researchers to develop cognitive radio (CR) as a smart and dynamic radio access promised solution. A major challenge to this new technology is how to make fair assignment of available spectrum to unlicensed users, particularly for smart grids communication. This paper introduces an i...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008