DEFENCE AGAINST INTRUDER IN COGNITIVE RADIO NETWORK OMNET BASED APPROACH. J. Avila, V.Padmapriya, Thenmozhi.K
|
|
- Helena Warren
- 5 years ago
- Views:
Transcription
1 Volume 119 No , ISSN: (on-line version) url: DEFENCE AGAINST INTRUDER IN COGNITIVE RADIO NETWORK OMNET BASED APPROACH J. Avila, V.Padmapriya, Thenmozhi.K Department of ECE, School of EEE, SASTRA Deemed University, Thanjavur *Corresponding author: Abstract: Wireless Communication has evolved to fulfill the all-time needs of the current generation. Its widespread usage in almost all the areas has eventually led to spectral inadequacy. Cognitive Radio (CR) has emerged as a successful solution to over the spectral utilization issues. Like any other wireless technique CR also is often subjected to attacks by selfish users. In this manuscript, the security threats in the physical layer of the cognitive radio namely the Primary User Emulation Attack (PUEA) is taken into consideration and the solution to overcome the same has been proposed. Keywords: Cognitive Radio, OFDM, PUEA, Helper Node, OMNeT++, NED, Authentication 1. Introduction Communication plays an imperative role in today s scenario. From the antiquated telegraphy to the modern day cellphones, the evolution of this field has been progressing at a swift pace. One such innovation is the concept of Cognitive Radio. Optimum spectrum utilization is achieved by using the spectrum left by the licensed primary users for unlicensed secondary users whenever it is not in use. Thereby the spectrum management is done effectively. Any wireless system is vulnerable to attacks and the same is applicable to cognitive radio networks. These attacks affect the dynamic spectrum accessing. Hence this paper offer a solution to the threat faced by cognitive and launch a secure connection. Many researchers have proposed various methods to overcome this attack. Some of them are, the aforementioned method makes use of the distance ratio test and the distance difference test in [2]. An algorithm for fast spectrum sensing is given in [1] which deals with the discrete wavelet packet transform based energy detector. In [3], a Primary user emulation attack has been analyzed using dedicated sensor networks. A transmitter location based scheme has been proposed in [4]. Fenton s approximation and markov s inequality based Primary user emulation attack have been performed in [5]. Four dimension continuous Markov chain model to combat PUEA has been proposed in [6]. PU, secondary user, selfish misbehavior secondary user and misbehavior secondary user are the four parameters considered to combat PUEA. Eigen value based PUEA mitigating method has been discussed in [7]. Time Synched link signature scheme to mitigate PUEA has been proposed in [8]. In [9] temporal link signature scheme has been offered to establish link between transmitter and receiver thereby PUEA could be mitigated. Any change in the transmitter location or emulator claiming as transmitter is identified. 513
2 In this paper Helper node based authentication scheme has been proposed. The authentication is achieved with the aid of authentication tag generated by the Helper node. Only the information with the authentication tag is accepted by the cognitive radio [10] and other information are rejected. 2. Materials and Methods The various windows used in this study are outlined here. The signals are chosen in such a way that the spectral leakage occurs and does not occur respectively. Finally, the spectral and SNR analysis is performed with various windows and the results are analyzed for a relative study in the next section. 2.1 Helper Node The tag is generated by the Helper node. Helper node is nothing but the node very close to the primary user and it is trust-worthy. The CR requests the helper node to sense the existence of primary user. On accepting the request the Helper node in turn looks for the availability of the PU. In the absence of the PU it transmits that information to the CR. Absence of PU condition is preferred in order to avoid interference between PU and Helper node [7]. OFDM is chosen as the system model for the Helper node and it is shown in Figure 1. The tag generated is embedded in the parity bits of the error control codes. Error control codes are the extra bits added to the message bit to combat the channel noise. The parity bits which are meant to combat the noise are XORed with tag bits INPUT CONVOLUTION FOURIER TRANSFORM BPSK/QPSK/QAM Figure 1. Transmitter diagram of helper node Spectrum Sensing There are many spectrum sensing schemes available to detect the existence of primary user. In this paper energy detection based spectrum sensing has been considered to find the spectrum holes. The block diagram of energy detector is as shown in Figure 2. The primary user signal is received, filtered and moved on to Fast Fourier Transform (FFT) block. The output of FFT is fed to windowing function block. This is done in order to reduce the side lobs. The out of this block is integrated and the energy of the primary user signal is compared with the predefined threshold. If the signal exceeds the threshold then it is decided that the primary user is present and the spectrum is not vacant. If the signal falls below the threshold then it is concluded that the spectrum is free. The decision Hypothesis is S(t) = u(t) : 514
3 u(t) + n(t) : S(t) is the signal received by the cognitive radio. is null hypothesis which means that only noise is present in the channel. indicates the existence of primary user and noise in the channel. 2.2 Tag Generation Figure 1. Energy detection based spectrum sensing There are many ways to generate the tag. Pseudo Noise sequences, Chaotic sequences etc., can be utilized as authentication tag. Algorithms like AES, DES can also be used to generate the authentication tag. But it is not advisable to utilize them because they are meant to provide security for bulk data transfer. In this case it is only the PU absent information that has to be transmitted from the Helper node to the cognitive radio. Hence any light weight algorithm can be used to generate the authentication tag. 2.3 OMNET Tool The proposed method is explained with the aid of simulated results using OMNET++ tool. OMNET++ is a modular/component based simulation software. In OMNET++ the modules are programmed using C++ and these modules are assembled by the compiler using a high level language called NED. It is the use of this NED language that makes OMNET++ a user friendly software. The user can simply program the modules in a known language (C++) and the compiler assembles them. 3. Simulation Results and Discussion In the graphical view there is one primary transmitter, one primary receiver and three cognitive users. In Figure 3a the cognitive users are sensing the availability of the free holes by receiving the signal from the primary user (PU). Figure 3b shows that PU signal is received by all cognitive users and it is compared with the threshold. Since the received signal exceeds the threshold it is declared that the PU is present. 515
4 Figure 3a and 3b. Cognitive Radio sensing the Primary User Figure 4a shows the inclusion of malicious user in the wireless environment. Malicious users are selfish users who wish to access the free spectrum on their own and block other cognitive users from accessing the free spectrum. In the absence of the primary user they block the cognitive radio by transmitting a duplicate signal imitating the primary user signal. The cognitive radio on receiving the duplicate signal compares it with the threshold. It exceeds the threshold and the cognitive radio makes a decision that the primary user is present. Actually the primary user is absent and the spectrum is free. Figure 4b shows that the cognitive user 3 is checking the availability of the free spectrum. Figure 4a and 4b. Inclusion of Malicious User in the Cognitive Radio environment Figure 5a shows that the malicious user collects the information about the primary user and in the absence of primary user, mimics it. It conveys the message to the cognitive user 3 that the spectrum is not free which is given in figure 5b. Figure 5a and 5b. Malicious User mimicking the Primary User 516
5 Figure 6a shows the insertion of the Helper node amid the PU and the cognitive radio to overcome the primary user emulation attack. The cognitive requests the Helper node to find the availability of the free spectrum. If the spectrum is free it transmits the information to the cognitive users. Figure 6b shows that CR3 is requesting the Helper node. The Helper node senses that the spectrum is free and sends the information along with the authentication tag (M in this case) to the CR3. Figure 6a and 6b. Helper Node to combat the Primary User Emulation Attack Figure 7 shows that the authentication tag is received by CR3, malicious user and the primary receiver. The malicious user and the primary receiver cannot decode the message without the knowledge of the key. Hence privacy is maintained Figure 7. Data Transfer with Authentication Tag 4. Conclusion The security threats in a cognitive network have been addressed by considering the authentication tag generated and transmitted to the cognitive radio from the Helper node. This scheme is resistance to PUEA which is one the important in the physical layer of the cognitive radio. Eliminating the attacks enables the cognitive radio to make the correct decision about the availability of the free spectrum and occupy it. Hence dynamic spectrum access has been efficiently achieved. References [1] Youngwoo Youn, Hyoungsuk Jeon, Hoiyoon Jung, Hyuckjae Lee. Discrete Wavelet Packet Transform based Energy Detector for Cognitive Radios. IEEE 65th vehicular TecHelper Nodeology conference 2007; Doi: /VETECS
6 [2] Ruiliang Chen,Jung-Min Park, Reed.J.H. Defense against Primary User Emulation Attacks in Cognitive Radio Networks. IEEE Selected Areas in Communications 2008; 26(1):25-37.Doi: /JSAC [3] Jin Z, Anand, S,Subbalakshmi, A.Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks. IEEE International Conference on communications 2009;1-5.Doi: /ICC [4] Lu KaiWang, Ke HaiZhou,Yang Jie, Zhang LiangJun. Research of PUE attack based on location.ieee 11th International Conference on Signal Processing (ICSP) 2012; Doi: /ICoSP [5] Anand,S, Jin,Z, K.P.Subbalakshmi.An Analytical Model For Priamry user emulation Attack in cognitive radio networks.ieee symposium on New Frontiers in Dynamic spectrum Access Networks 2008;1-6.Doi: /DYSPAN [6]. WANG Shan-shan, LUO Xing-guo and LI Bai-nan, Primary User Emulation Attacks Analysis for Cognitive Radio Networks Communication, TELKOMNIKA, Vol. 11, No. 7, pp ,2013. [7].Deepa Das and Sumita Das, Eigenvalue Detection Based Method to Mitigate PUEA in Cognitive Radio Networks, IEEE International Conference on Advanced Networks and Telecommunication Systems,pp.1-6, [8].Yao Liu and Peng Ning, Enhanced Wireless Channel Authentication Using Time-Synched Link Signature, Proceedings IEEE INFOCOM,pp ,2012. [9].Neal Patwari and Sneha K. Kasera, Robust Location Distinction using Temporal Link Signatures, IEEE Transactions on Mobile Computing,Vol.10,No.3,pp ,2010. [10].V.P.Charulatha, J.GeethaRamani, Dr.K.Geetha, SPECTRAL PRECODING TECHNIQUES FOR COGNITIVE RADIO SYSTEMS TO IMPROVE International Journal of Innovations in Scientific and Engineering Research (IJISER),vol1no4,pp ,2014 SPECTRUMUTILIZATION [11] Fatty.M.Salem, Maged.H.Ibrahim, Ihab.A.Ali, I.I.Ibrahi.Matched-Filter-based Spectrum Sensing for Secure Cognitive Radio Network Communications. International Journal of Computer Applications 2014;87(18):41-46.Doi /
7 519
8 520
Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks
Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Efe F. Orumwense 1, Thomas J. Afullo 2, Viranjay M. Srivastava 3 School of Electrical, Electronic and Computer Engineering,
More informationInnovative Science and Technology Publications
Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE
More informationWAVELET AND S-TRANSFORM BASED SPECTRUM SENSING IN COGNITIVE RADIO
WAVELET AND S-TRANSFORM BASED SPECTRUM SENSING IN COGNITIVE RADIO S.Raghave #1, R.Saravanan *2, R.Muthaiah #3 School of Computing, SASTRA University, Thanjavur-613402, India #1 raga.vanaj@gmail.com *2
More informationJournal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE
Journal of Asian Scientific Research ISSN(e): 2223-1331/ISSN(p): 2226-5724 URL: www.aessweb.com DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE
More informationA Primary User Authentication System for Mobile Cognitive Radio Networks
A Primary User Authentication System for Mobile Cognitive Radio Networks (Invited Paper) Swathi Chandrashekar and Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona, Tucson,
More informationAttack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks
Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University
More informationCooperative Spectrum Sensing in Cognitive Radio
Cooperative Spectrum Sensing in Cognitive Radio Project of the Course : Software Defined Radio Isfahan University of Technology Spring 2010 Paria Rezaeinia Zahra Ashouri 1/54 OUTLINE Introduction Cognitive
More informationPrimary User Emulation Attack Analysis on Cognitive Radio
Indian Journal of Science and Technology, Vol 9(14), DOI: 10.17485/ijst/016/v9i14/8743, April 016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Primary User Emulation Attack Analysis on Cognitive
More informationCo-Operative Spectrum Sensing In Cognitive Radio Network in ISM Band
Co-Operative Spectrum Sensing In Cognitive Radio Network in ISM Band 1 D.Muthukumaran, 2 S.Omkumar 1 Research Scholar, 2 Associate Professor, ECE Department, SCSVMV University, Kanchipuram ABSTRACT One
More informationCooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review
International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review
More informationAbstract. Keywords - Cognitive Radio, Bit Error Rate, Rician Fading, Reed Solomon encoding, Convolution encoding.
Analysing Cognitive Radio Physical Layer on BER Performance over Rician Fading Amandeep Kaur Virk, Ajay K Sharma Computer Science and Engineering Department, Dr. B.R Ambedkar National Institute of Technology,
More information[Panday* et al., 5(5): May, 2016] ISSN: IC Value: 3.00 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY PERFORMANCE OF WAVELET PACKET BASED SPECTRUM SENSING IN COGNITIVE RADIO FOR DIFFERENT WAVELET FAMILIES Saloni Pandya *, Prof.
More informationIMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS
87 IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS Parvinder Kumar 1, (parvinderkr123@gmail.com)dr. Rakesh Joon 2 (rakeshjoon11@gmail.com)and Dr. Rajender Kumar 3 (rkumar.kkr@gmail.com)
More informationSub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks
Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks Ahmed Alahmadi, Tianlong Song, Tongtong Li Department of Electrical & Computer Engineering Michigan State University,
More informationCognitive Ultra Wideband Radio
Cognitive Ultra Wideband Radio Soodeh Amiri M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : s.amiridoomari@ec.iut.ac.ir
More informationEnhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M.
Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M.E, 2 1 Department of Computer Science and Engineering, Nehru Institute
More informationNagina Zarin, Imran Khan and Sadaqat Jan
Relay Based Cooperative Spectrum Sensing in Cognitive Radio Networks over Nakagami Fading Channels Nagina Zarin, Imran Khan and Sadaqat Jan University of Engineering and Technology, Mardan Campus, Khyber
More informationCooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationSpectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio
ISSN: 2319-7463, Vol. 5 Issue 4, Aril-216 Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio Mudasir Ah Wani 1, Gagandeep Singh 2 1 M.Tech Student, Department
More informationAdaptive Threshold for Energy Detector Based on Discrete Wavelet Packet Transform
for Energy Detector Based on Discrete Wavelet Pacet Transform Zhiin Qin Beiing University of Posts and Telecommunications Queen Mary University of London Beiing, China qinzhiin@gmail.com Nan Wang, Yue
More informationSelfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory
Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Suchita S. Potdar 1, Dr. Mallikarjun M. Math 1 Department of Compute Science & Engineering, KLS, Gogte
More informationA Secure Transmission of Cognitive Radio Networks through Markov Chain Model
A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,
More informationRecent Advances in Cognitive Radios
Page 1 of 8 Recent Advances in Cognitive Radios Harit Mehta, harit.mehta@go.wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download Abstract Recent advances in the field of wireless have
More informationSpectral - Energy Efficiency and Trust-Aware Scheme for Cognitive Radio Networks
Spectral - Energy Efficiency and Trust-Aware Scheme for Cognitive Radio Networks K.Sathya 1, B.K.Anu Preethi 2, V.Vijayaraghavan 3, M.Laavanya 4 PG Student, Dept. of ECE, Info Institute of Engineering,
More informationCyclostationary Detection in Spectrum Pooling System of Undefined Secondary Users
Cyclostationary Detection in Spectrum Pooling System of Undefined Secondary Users Nazar Radhi 1, Kahtan Aziz 2, Rafed Sabbar Abbas 3, Hamed AL-Raweshidy 4 1,3,4 Wireless Network & Communication Centre,
More informationEfficient Method of Secondary Users Selection Using Dynamic Priority Scheduling
Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling ABSTRACT Sasikumar.J.T 1, Rathika.P.D 2, Sophia.S 3 PG Scholar 1, Assistant Professor 2, Professor 3 Department of ECE, Sri
More informationFuzzy Logic Based Smart User Selection for Spectrum Sensing under Spatially Correlated Shadowing
Open Access Journal Journal of Sustainable Research in Engineering Vol. 3 (2) 2016, 47-52 Journal homepage: http://sri.jkuat.ac.ke/ojs/index.php/sri Fuzzy Logic Based Smart User Selection for Spectrum
More informationEffect of Time Bandwidth Product on Cooperative Communication
Surendra Kumar Singh & Rekha Gupta Department of Electronics and communication Engineering, MITS Gwalior E-mail : surendra886@gmail.com, rekha652003@yahoo.com Abstract Cognitive radios are proposed to
More informationSelfish Attack Detection in Cognitive Ad-Hoc Network
Selfish Attack Detection in Cognitive Ad-Hoc Network Mr. Nilesh Rajendra Chougule Student, KIT s College of Engineering, Kolhapur nilesh_chougule18@yahoo.com Dr.Y.M.PATIL Professor, KIT s college of Engineering,
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationCognitive Radio Techniques
Cognitive Radio Techniques Spectrum Sensing, Interference Mitigation, and Localization Kandeepan Sithamparanathan Andrea Giorgetti ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Preface xxi 1 Introduction
More informationDYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO
DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO Ms.Sakthi Mahaalaxmi.M UG Scholar, Department of Information Technology, Ms.Sabitha Jenifer.A UG Scholar, Department of Information Technology,
More informationCOGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio
Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of
More informationFULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL
FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL Abhinav Lall 1, O. P. Singh 2, Ashish Dixit 3 1,2,3 Department of Electronics and Communication Engineering, ASET. Amity University Lucknow Campus.(India)
More informationCOGNITIVE RADIO NETWORKS IS THE NEXT STEP IN COMMUNICATION TECHNOLOGY
Computer Modelling and New Technologies, 2012, vol. 16, no. 3, 63 67 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia COGNITIVE RADIO NETWORKS IS THE NEXT STEP IN COMMUNICATION
More informationIterative Detection and Decoding with PIC Algorithm for MIMO-OFDM Systems
, 2009, 5, 351-356 doi:10.4236/ijcns.2009.25038 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Iterative Detection and Decoding with PIC Algorithm for MIMO-OFDM Systems Zhongpeng WANG
More informationPerformance Study of MIMO-OFDM System in Rayleigh Fading Channel with QO-STB Coding Technique
e-issn 2455 1392 Volume 2 Issue 6, June 2016 pp. 190 197 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Performance Study of MIMO-OFDM System in Rayleigh Fading Channel with QO-STB Coding
More informationReview of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications
American Journal of Engineering and Applied Sciences, 2012, 5 (2), 151-156 ISSN: 1941-7020 2014 Babu and Suganthi, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0
More informationUNIFIED DIGITAL AUDIO AND DIGITAL VIDEO BROADCASTING SYSTEM USING ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) SYSTEM
UNIFIED DIGITAL AUDIO AND DIGITAL VIDEO BROADCASTING SYSTEM USING ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) SYSTEM 1 Drakshayini M N, 2 Dr. Arun Vikas Singh 1 drakshayini@tjohngroup.com, 2 arunsingh@tjohngroup.com
More informationCycloStationary Detection for Cognitive Radio with Multiple Receivers
CycloStationary Detection for Cognitive Radio with Multiple Receivers Rajarshi Mahapatra, Krusheel M. Satyam Computer Services Ltd. Bangalore, India rajarshim@gmail.com munnangi_krusheel@satyam.com Abstract
More informationDemonstration of Real-time Spectrum Sensing for Cognitive Radio
Demonstration of Real-time Spectrum Sensing for Cognitive Radio (Zhe Chen, Nan Guo, and Robert C. Qiu) Presenter: Zhe Chen Wireless Networking Systems Laboratory Department of Electrical and Computer Engineering
More informationENERGY DETECTION BASED SPECTRUM SENSING FOR COGNITIVE RADIO
ENERGY DETECTION BASED SPECTRUM SENSING FOR COGNITIVE RADIO M.Lakshmi #1, R.Saravanan *2, R.Muthaiah #3 School of Computing, SASTRA University, Thanjavur-613402, India #1 mlakshmi.s15@gmail.com *2 saravanan_r@ict.sastra.edu
More informationPERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR
Int. Rev. Appl. Sci. Eng. 8 (2017) 1, 9 16 DOI: 10.1556/1848.2017.8.1.3 PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR M. AL-RAWI University of Ibb,
More informationPerformance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing
Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree
More informationPerformance Evaluation of Wi-Fi and WiMAX Spectrum Sensing on Rayleigh and Rician Fading Channels
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 8 (August 2014), PP.27-31 Performance Evaluation of Wi-Fi and WiMAX Spectrum
More informationAn Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive Radio
International Journal of Engineering Research and Development e-issn: 78-067X, p-issn: 78-800X, www.ijerd.com Volume 11, Issue 04 (April 015), PP.66-71 An Optimized Energy Detection Scheme For Spectrum
More information/13/$ IEEE
A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract
More informationAustralian Journal of Basic and Applied Sciences
ISSN:1991-8178 Australian Journal of Basic and Applied Sciences Journal home page: www.ajbasweb.com Detection of Malicious Secondary User Using Spectral Correlation Technique in Cognitive Radio Network
More informationDS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks Under Denial of Service Attack
DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks Under Denial of Service Attack Muhammad Faisal Amjad, Baber Aslam, Cliff C. Zou Department of Electrical Engineering and
More informationOverview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space
Overview A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications Tevfik Yucek and Huseyin Arslan Cognitive Radio Multidimensional Spectrum Awareness Challenges Spectrum Sensing Methods
More informationSpectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio
5 Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio Anurama Karumanchi, Mohan Kumar Badampudi 2 Research Scholar, 2 Assoc. Professor, Dept. of ECE, Malla Reddy
More informationStudy of Turbo Coded OFDM over Fading Channel
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 54-58 Study of Turbo Coded OFDM over Fading Channel
More informationPerformance Evaluation of Energy Detector for Cognitive Radio Network
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 8, Issue 5 (Nov. - Dec. 2013), PP 46-51 Performance Evaluation of Energy Detector for Cognitive
More informationCognitive Radio Spectrum Access with Prioritized Secondary Users
Appl. Math. Inf. Sci. Vol. 6 No. 2S pp. 595S-601S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Cognitive Radio Spectrum Access
More informationBiologically Inspired Consensus-Based Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios
Biologically Inspired Consensus-Based Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios F. Richard Yu and Minyi Huang, Carleton University Helen Tang, Defense R&D Canada Abstract Cognitive
More informationVolume 5, Issue 9, September 2017 International Journal of Advance Research in Computer Science and Management Studies.
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 9, September 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article
More informationSPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE
Int. J. Chem. Sci.: 14(S3), 2016, 794-800 ISSN 0972-768X www.sadgurupublications.com SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE ADITYA SAI *, ARSHEYA AFRAN and PRIYANKA Information
More informationResource Allocation for Delay Minimization for Cognitive Radio using M-QAM, AWGN Model
ISSN: 2454-2377, Resource Allocation for Delay Minimization for Cognitive Radio using M-QAM, AWGN Model Sonu Dabas 1 & Amanpreet Kaur 2 1 Student, EECE Department, The North Cap University, Gurugram, India
More informationCOGNITIVE RADIO TECHNOLOGY: ARCHITECTURE, SENSING AND APPLICATIONS-A SURVEY
COGNITIVE RADIO TECHNOLOGY: ARCHITECTURE, SENSING AND APPLICATIONS-A SURVEY G. Mukesh 1, K. Santhosh Kumar 2 1 Assistant Professor, ECE Dept., Sphoorthy Engineering College, Hyderabad 2 Assistant Professor,
More informationIMPROVED QR AIDED DETECTION UNDER CHANNEL ESTIMATION ERROR CONDITION
IMPROVED QR AIDED DETECTION UNDER CHANNEL ESTIMATION ERROR CONDITION Jigyasha Shrivastava, Sanjay Khadagade, and Sumit Gupta Department of Electronics and Communications Engineering, Oriental College of
More informationDetection of an LTE Signal Based on Constant False Alarm Rate Methods and Constant Amplitude Zero Autocorrelation Sequence
Detection of an LTE Signal Based on Constant False Alarm Rate Methods and Constant Amplitude Zero Autocorrelation Sequence Marjan Mazrooei sebdani, M. Javad Omidi Department of Electrical and Computer
More informationEfficient CFO Compensation Method in Uplink OFDMA for Mobile WiMax
140 J. ICT Res. Appl., Vol. 10, No. 2, 2016, 140-152 Efficient CFO Compensation Method in Uplink OFDMA for Mobile WiMax Lakshmanan Muthukaruppan 1,*, Parthasharathi Mallick 2, Nithyanandan Lakshmanan 3
More informationSpectrum sensing+puea mitigation=>effective E-health management.
Biomedical Research 2018; 29 (8): 1664-1671 ISSN 0970-938X www.biomedres.info Spectrum sensing+puea mitigation=>effective E-health management. Avila Jayapalan 1*, Prem Savarinathan 2, Venkateswarya Udayakumar
More informationChapter 6. Agile Transmission Techniques
Chapter 6 Agile Transmission Techniques 1 Outline Introduction Wireless Transmission for DSA Non Contiguous OFDM (NC-OFDM) NC-OFDM based CR: Challenges and Solutions Chapter 6 Summary 2 Outline Introduction
More informationEnergy Detection Technique in Cognitive Radio System
International Journal of Engineering & Technology IJET-IJENS Vol:13 No:05 69 Energy Detection Technique in Cognitive Radio System M.H Mohamad Faculty of Electronic and Computer Engineering Universiti Teknikal
More informationInternational Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)
Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform
More informationBit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX
Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX Amr Shehab Amin 37-20200 Abdelrahman Taha 31-2796 Yahia Mobasher 28-11691 Mohamed Yasser
More informationSpectrum Sensing Methods for Cognitive Radio: A Survey Pawandeep * and Silki Baghla
Spectrum Sensing Methods for Cognitive Radio: A Survey Pawandeep * and Silki Baghla JCDM College of Engineering Sirsa, Haryana, India Abstract: One of the most challenging issues in cognitive radio systems
More informationANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau
ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu
More informationAnalysis of Different Spectrum Sensing Techniques in Cognitive Radio Network
Analysis of Different Spectrum Sensing Techniques in Cognitive Radio Network Priya Geete 1 Megha Motta 2 Ph. D, Research Scholar, Suresh Gyan Vihar University, Jaipur, India Acropolis Technical Campus,
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationPerformance Comparison of Channel Estimation Technique using Power Delay Profile for MIMO OFDM
Performance Comparison of Channel Estimation Technique using Power Delay Profile for MIMO OFDM 1 Shamili Ch, 2 Subba Rao.P 1 PG Student, SRKR Engineering College, Bhimavaram, INDIA 2 Professor, SRKR Engineering
More informationApplication of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 10, Number 2 (2017), pp. 71 79 International Research Publication House http://www.irphouse.com Application of
More informationPerformance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment
Performance Analysis of Self-Seduling Multi-annel Cognitive MAC Protocols under Imperfect Sensing Environment Mingyu Lee 1, Seyoun Lim 2, Tae-Jin Lee 1 * 1 College of Information and Communication Engineering,
More informationSpectrum accessing optimization in congestion times in radio cognitive networks based on chaotic neural networks
Manuscript Spectrum accessing optimization in congestion times in radio cognitive networks based on chaotic neural networks Mahdi Mir, Department of Electrical Engineering, Ferdowsi University of Mashhad,
More informationPerformance Analysis of n Wireless LAN Physical Layer
120 1 Performance Analysis of 802.11n Wireless LAN Physical Layer Amr M. Otefa, Namat M. ElBoghdadly, and Essam A. Sourour Abstract In the last few years, we have seen an explosive growth of wireless LAN
More informationOptimized BPSK and QAM Techniques for OFDM Systems
I J C T A, 9(6), 2016, pp. 2759-2766 International Science Press ISSN: 0974-5572 Optimized BPSK and QAM Techniques for OFDM Systems Manikandan J.* and M. Manikandan** ABSTRACT A modulation is a process
More informationPerformance Study of A Non-Blind Algorithm for Smart Antenna System
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 4 (2012), pp. 447-455 International Research Publication House http://www.irphouse.com Performance Study
More informationOptimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach
Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach Yongle Wu, Beibei Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering,
More informationCarrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems
Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems K. Jagan Mohan, K. Suresh & J. Durga Rao Dept. of E.C.E, Chaitanya Engineering College, Vishakapatnam, India
More informationPhysical Layer Frame Structure in 4G LTE/LTE-A Downlink based on LTE System Toolbox
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 1, Issue 3, Ver. IV (May - Jun.215), PP 12-16 www.iosrjournals.org Physical Layer Frame
More informationSpectrum Sensing by Scattering Operators in Cognitive Radio
45, Issue 1 (2018) 13-19 Journal of Advanced Research in Applied Mechanics Journal homepage: www.akademiabaru.com/aram.html ISSN: 2289-7895 Spectrum Sensing by Scattering Operators in Cognitive Radio Open
More informationMulti-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation
More informationChaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System
Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System Sumathra T 1, Nagaraja N S 2, Shreeganesh Kedilaya B 3 Department of E&C, Srinivas School of Engineering, Mukka, Mangalore Abstract-
More informationPseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users
Pseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users Nadia Adem, Bechir Hamdaoui, and Attila Yavuz School of Electrical Engineering and Computer Science Oregon State University,
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to
More informationChannel Hopping Algorithm Implementation in Mobile Ad Hoc Networks
Channel Hopping Algorithm Implementation in Mobile Ad Hoc Networks G.Sirisha 1, D.Tejaswi 2, K.Priyanka 3 Assistant Professor, Department of Electronics and Communications Engineering, Shri Vishnu Engineering
More informationSIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB
SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB 1 ARPIT GARG, 2 KAJAL SINGHAL, 3 MR. ARVIND KUMAR, 4 S.K. DUBEY 1,2 UG Student of Department of ECE, AIMT, GREATER
More informationCreation of Wireless Network using CRN
Creation of 802.11 Wireless Network using CRN S. Elakkiya 1, P. Aruna 2 1,2 Department of Software Engineering, Periyar Maniammai University Abstract: A network is a collection of wireless node hosts forming
More informationDifferent Spectrum Sensing Techniques For IEEE (WRAN)
IJSRD National Conference on Technological Advancement and Automatization in Engineering January 2016 ISSN:2321-0613 Different Spectrum Sensing Techniques For IEEE 802.22(WRAN) Niyati Sohni 1 Akansha Bhargava
More informationREVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY P. Suresh Kumar 1, A. Deepika 2 1 Assistant Professor,
More informationChapter 10. User Cooperative Communications
Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a
More informationAlgorithm to Improve the Performance of OFDM based WLAN Systems
International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 27-31 Algorithm to Improve the Performance of OFDM based WLAN Systems D. Sreenivasa Rao 1, M. Kanti Kiran
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties
More informationLOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955
More informationBANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS
BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS Aminata A. Garba Dept. of Electrical and Computer Engineering, Carnegie Mellon University aminata@ece.cmu.edu ABSTRACT We consider
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationBER Analysis for MC-CDMA
BER Analysis for MC-CDMA Nisha Yadav 1, Vikash Yadav 2 1,2 Institute of Technology and Sciences (Bhiwani), Haryana, India Abstract: As demand for higher data rates is continuously rising, there is always
More informationVarious Sensing Techniques in Cognitive Radio Networks: A Review
, pp.145-154 http://dx.doi.org/10.14257/ijgdc.2016.9.1.15 Various Sensing Techniques in Cognitive Radio Networks: A Review Jyotshana Kanti 1 and Geetam Singh Tomar 2 1 Department of Computer Science Engineering,
More informationSuppression of Side-Lobes in Orthogonal Frequency Division Multiplexing based Cognitive Radio System
Suppression of Side-Lobes in Orthogonal Frequency Division Multiplexing based Cognitive Radio System Muhammad Zahid 1, Muhammad Aamir 2, Atif Elahi 2, Sheroz Khan 3 1 MS Candidate, Department of Electronic
More information