Protocols for dynamic spectrum access in cognitive radio networks
نویسندگان
چکیده
Spectrum access protocols permit secondary users to transmit on frequency bands that are not being utilized by the primary owners. A cognitive radio that wishes to transmit in a band must first decide if the band is available (i.e., not being used by the owner) and then it must periodically re-evaluate the band’s availability once it begins transmitting in the band to ensure that a signal from a primary owner has not emerged. To accomplish these tasks, spectrum access protocols employ periodic sensing of the channel. Frequent sensing intervals are required to ensure that cognitive radios wishing to access the band are not disrupting transmissions by the owners of the band. Because spectrum sensing requires that radios cease transmission to observe the channel, the potential for throughput by the secondary users is reduced. A proposed enhancement to standard spectrum access protocols is presented that permits secondary users to monitor the frequency bands while communicating. This capability increases the amount of time that radios can transmit on the band and it decreases the amount of time required to detect the emergence of transmissions by a primary owner. Both improvements are obtained via a protocol that observes statistics obtained in the receiver of the cognitive radio during packet reception. The statistics are obtained with little or no additional hardware and do not require complicated channel measurements or pilot symbols. The proposed protocol for spectrum access is applicable to both single-link networks and multi-link cooperative networks.
منابع مشابه
Spectrum Assignment in Cognitive Radio Networks Using Fuzzy Logic Empowered Ants
The prevalent communications networks suffer from lack of spectrum and spectrum inefficiency. This has motivated researchers to develop cognitive radio (CR) as a smart and dynamic radio access promised solution. A major challenge to this new technology is how to make fair assignment of available spectrum to unlicensed users, particularly for smart grids communication. This paper introduces an i...
متن کاملSpectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملMedium Access Control Design for Cognitive Radio Networks: A Survey
Designing a medium access control (MAC) protocol is a key for implementing any practical wireless network. In general, a MAC protocol is responsible for coordinating users in accessing spectrum resources. Given that a user in cognitive radio(CR) networks do not have priority in accessing spectrum resources, MAC protocols have to perform dynamic spectrum access (DSA) functions, including spectru...
متن کاملMedium Access Control Protocol Design, Analysis and Identification in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technique to address the spectrum scarcity issue by enabling the unlicensed network users (SUs) to dynamic access the spectrum holes. This thesis designs Medium Access Control (MAC) protocols for SUs to utilize the unused spectrum without interfering the licensed network users’ (PUs) transmissions; analyzes the MAC performance based on the queuing theories; a...
متن کاملPrimary user emulation attack in dynamic spectrum access networks: a game-theoretic approach
Cognitive radio enabled dynamic spectrum access networks are designed to detect and opportunistically utilize the unused or under-utilized spectrum bands. However, due to the open paradigm of cognitive radio networks and lack of proactive security protocols, the dynamic spectrum access networks are vulnerable to various denial-ofservice (DoS) threats. In this paper, we propose a game theoretic ...
متن کامل