Multislot Simultaneous Spectrum Sensing and Energy Harvesting in Cognitive Radio

نویسندگان

  • Xin Liu
  • Zhenyu Na
  • Min Jia
  • Xuemai Gu
  • Xiaotong Li
  • Hongjian Sun
چکیده

In cognitive radio (CR), the spectrum sensing of the primary user (PU) may consume some electrical power from the battery capacity of the secondary user (SU), resulting in a decrease in the transmission power of the SU. In this paper, a multislot simultaneous spectrum sensing and energy harvesting model is proposed, which uses the harvested radio frequency (RF) energy of the PU signal to supply the spectrum sensing. In the proposed model, the sensing duration is divided into multiple sensing slots consisting of one local-sensing subslot and one energy-harvesting subslot. If the PU is detected to be present in the local-sensing subslot, the SU will harvest RF energy of the PU signal in the energy-harvesting slot, otherwise, the SU will continue spectrum sensing. The global decision on the presence of the PU is obtained through combining local sensing results from all the sensing slots by adopting "Or-logic Rule". A joint optimization problem of sensing time and time splitter factor is proposed to maximize the throughput of the SU under the constraints of probabilities of false alarm and detection and energy harvesting. The simulation results have shown that the proposed model can clearly improve the maximal throughput of the SU compared to the traditional sensing-throughput tradeoff model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

Joint Resource Allocation of Spectrum Sensing and Energy Harvesting in an Energy-Harvesting-Based Cognitive Sensor Network

The cognitive sensor (CS) can transmit data to the control center in the same spectrum that is licensed to the primary user (PU) when the absence of the PU is detected by spectrum sensing. However, the battery energy of the CS is limited due to its small size, deployment in atrocious environments and long-term working. In this paper, an energy-harvesting-based CS is described, which senses the ...

متن کامل

Investigation of Always Present and Spectrum Sensing based Incumbent Emulators

Cognitive radio (CR) technology has been suggested for effective use of spectral resources. Spectrum sensing is one of the main operations of CR users to identify the vacant frequency bands. Cooperative spectrum sensing (CSS) is used to increase the performance of CR networks by providing spatial diversity. The accuracy of spectrum sensing is the most important challenge in the CSS process sinc...

متن کامل

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016